{"id":8178,"date":"2024-04-04T11:35:03","date_gmt":"2024-04-04T11:35:03","guid":{"rendered":"https:\/\/www.inspirenignite.com\/kl\/6309a-cyber-security-lab-syllabus-for-robotics-process-automation-7th-sem-2021-revision-sitttr-professional-elective-v\/"},"modified":"2024-05-25T16:18:45","modified_gmt":"2024-05-25T16:18:45","slug":"6309a-cyber-security-lab-syllabus-for-robotics-process-automation-6th-sem-2021-revision-sitttr-professional-elective-v","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/kl\/6309a-cyber-security-lab-syllabus-for-robotics-process-automation-6th-sem-2021-revision-sitttr-professional-elective-v\/","title":{"rendered":"6309A: Cyber Security Lab Syllabus for Robotics Process Automation 6th Sem 2021 Revision SITTTR (Professional Elective-V)"},"content":{"rendered":"<p align=\"justify\">Cyber Security Lab detailed syllabus for Robotics Process Automation (RP) for 2021 revision curriculum has been taken from the <a class=\"rank-math-link\" style=\"color: inherit;\" href=\"http:\/\/www.sitttrkerala.ac.in\/\" target=\"_blank\" rel=\"noopener\">SITTTRs<\/a> official website and presented for the Robotics Process Automation (RP) students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.<\/p>\n<p align=\"justify\">For Robotics Process Automation 6th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/sitttr-diploma-robotics-process-automation-rp-syllabus-for-6th-sem-2021-revision\">Robotics Process Automation (RP) 6th Sem 2021 regulation scheme<\/a>. For Professional Elective-V scheme and its subjects refer to <a class=\"rank-math-link\" href=\"..\/sitttr-robotics-process-automation-6th-sem-professional-elective-v-syllabus-2021-revision\">Robotics Process Automation (RP) Professional Elective-V syllabus scheme<\/a>. The detailed syllabus of cyber security lab is as follows.<\/p>\n<h4>Course Objectives:<\/h4>\n<ul>\n<li>Troubleshooting using software utility\/commands.<\/li>\n<li>Troubleshooting using packet analyser tools.<\/li>\n<li>Setup and configure firewalls<\/li>\n<li>Setup an intrusion detection system.<\/li>\n<\/ul>\n<h4>Course Outcomes:<\/h4>\n<p>On completion of the course student will be able to:<\/p>\n<ol>\n<li>Familiarize with the working of Wireshark and study the different network troubleshooting commands.<\/li>\n<li>Study of the features of firewall in providing network security and to set Firewall Security in windows.<\/li>\n<li>Demonstrate the use of passwords in a computer system.<\/li>\n<li>Demonstrate intrusion detection system using any tool (snort ).<\/li>\n<\/ol>\n<h4>Module 1:<\/h4>\n<ol>\n<li>Analysis Network using Wireshark for (a)Traffic Monitoring (b) Packet Sniffing<\/li>\n<li>Study the use of TCPDump and NetDiscover commands<\/li>\n<li>Familiarization of network trouble shooting commands &#8211; ping, traceroute\/tracert, ipconfig\/ifconfig, nslookup,netstat, putty\/tera term,subnet and IP calculator, speedtest.net \/pingtest.net ,pathping \/ mtr route , iptables, tcpdump, nmap, arp, dig<\/li>\n<\/ol>\n<h4>Module 2:<\/h4>\n<ol>\n<li>Study the steps to configure windows firewalls. Add exceptions.<\/li>\n<li>Firewall customization<\/li>\n<li>Access the Windows Firewall with Advanced Security. Configure inbound and outbound rules and analyse the traffic<\/li>\n<\/ol>\n<h4>Module 3:<\/h4>\n<ol>\n<li>Study the steps to protect your personal computer system by creating User Accounts with Passwords and types of User Accounts for safety and security.<\/li>\n<li>Study the steps to protect a Microsoft Word Document using passwords, and removing passwords from a Microsoft Word Document<\/li>\n<\/ol>\n<h4>Module 4:<\/h4>\n<ol>\n<li>Installation of snort<\/li>\n<li>Demonstrate three modes of operation of snort<\/li>\n<\/ol>\n<h4>Micro Project<\/h4>\n<p>Students are expected to do a micro project in cyber security during the course for the purpose of continuous evaluation. This experiment shall be included in the bonafide record.<br \/>\nExample projects include:<\/p>\n<ul>\n<li>Implement various security attacks such as DoS attacks, SQL injection etc.<\/li>\n<li>Install an antivirus tool and set traffic rules.<\/li>\n<\/ul>\n<h4>Text Books:<\/h4>\n<ol>\n<li>Practical computer network analysis and design by McCabe, James D<\/li>\n<li>Computer Networking: A Top-Down Approach Kurose, Ross<\/li>\n<li>Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide by Laura Chappell (Author), Gerald Combs (Foreword)<\/li>\n<\/ol>\n<h4>Online Resources<\/h4>\n<ol>\n<li>http:\/\/vlabs.iitkgp.ac.in\/ant<\/li>\n<li>https:\/\/ocean.sagepub.com\/online-network-analysis-voson-lab<\/li>\n<\/ol>\n<h4>List of Experiments:<\/h4>\n<ol>\n<li>Install wireshark and analyse network traffic for traffic monitoring.<\/li>\n<li>Using wireshark, analyse network traffic for packet sniffing.<\/li>\n<li>Study the use of TCPDump and NetDiscover commands<\/li>\n<li>Demonstrate the network trouble shooting commands &#8211; ping, traceroute\/tracert, ipconfig\/ifconfig, nslookup,netstat, putty\/teraterm,subnet and IP calculator, speedtest.net \/pingtest.net ,pathping \/ mtr route , iptables, tcpdump, nmap, arp, dig<\/li>\n<li>Configure windows firewall and customize it.<\/li>\n<li>Add exceptions in firewall and demonstrate the working.<\/li>\n<li>Access the Windows Firewall with Advanced Security. Configure inbound and outbound rules and analyse the traffic<\/li>\n<li>Protect a computer system by creating User Accounts with Passwords and types of User Accounts for safety and security.<\/li>\n<li>Protect a Microsoft Word Document using passwords, and remove password from a Microsoft Word Document.<\/li>\n<li>Install snort intrusion detection system and demonstrate its working<\/li>\n<li>Configure three modes of operation in snort.<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all other subjects of Robotics Process Automation, 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/sitttr\/rp\">Robotics Process Automation (RP) 6th Sem subject syllabuses for 2021 revision<\/a>.<\/p>\n<p align=\"justify\">To see the syllabus of all other branches of diploma 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-syllabus\/\"> SITTTR diploma all branches syllabus.<\/a>.<\/p>\n<p align=\"justify\">To see the results of Robotics Process Automation of diploma 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-results\/\"> SITTTR diploma results.<\/a>.<\/p>\n<p align=\"justify\">For all Robotics Process Automation academic calendars, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-academic-calendar\/\"> Robotics Process Automation all semesters academic calendar<\/a> direct link.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security Lab detailed syllabus for Robotics Process Automation (RP) for 2021 revision curriculum has been taken from the SITTTRs official website and presented for the Robotics Process Automation (RP) [&hellip;]<\/p>\n","protected":false},"author":2462,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[90],"tags":[],"class_list":["post-8178","post","type-post","status-publish","format-standard","hentry","category-rp"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/8178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/users\/2462"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/comments?post=8178"}],"version-history":[{"count":1,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/8178\/revisions"}],"predecessor-version":[{"id":8435,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/8178\/revisions\/8435"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/media?parent=8178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/categories?post=8178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/tags?post=8178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}