{"id":3919,"date":"2022-01-22T07:48:22","date_gmt":"2022-01-22T07:48:22","guid":{"rendered":"https:\/\/www.inspirenignite.com\/rj\/7cs6-60-2-cyber-security-syllabus-for-eee-7th-sem-2020-21-regulation-rtu-open-elective-1\/"},"modified":"2022-01-22T07:48:22","modified_gmt":"2022-01-22T07:48:22","slug":"7cs6-60-2-cyber-security-syllabus-for-eee-7th-sem-2020-21-regulation-rtu-open-elective-1","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/rj\/7cs6-60-2-cyber-security-syllabus-for-eee-7th-sem-2020-21-regulation-rtu-open-elective-1\/","title":{"rendered":"7CS6-60.2: Cyber Security Syllabus for EEE 7th Sem 2020-21 Regulation RTU (Open Elective-1)"},"content":{"rendered":"<p align=\"justify\">Cyber Security detailed syllabus for Electrical &amp; Electronics Engineering (EEE) for 2020-21 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/www.rtu.ac.in\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Rajasthan Technical University<\/a> official website and presented for the electrical &amp; electronics engineering students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Electrical &amp; Electronics Engineering 7th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/electrical-electronics-engineering-eee-syllabus-for-7th-sem-2020-21-regulation-rtu\">EEE 7th Sem 2020-21 regulation scheme<\/a>. For Open Elective-1 scheme and its subjects refer to <a class=\"rank-math-link\" href=\"..\/open-elective-1-syllabus-for-eee-7th-sem-2020-21-regulation-rtu\">EEE Open Elective-1 syllabus scheme<\/a>. The detailed syllabus of cyber security is as follows. <\/p>\n<p>  <title>Cyber Security<\/title><\/p>\n<h4>Unit 1<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Unit 2<\/h4>\n<p>  <strong>Introduction to Cybercrime:<\/strong> Introduction, Cybercrime, and Information Security, Defining Cybercriminals, Classifications of Cybercrimes. Cybercrime: The legal Perspectives and Indian Perspective, Cybercrime and the Indian ITA 2000, A Global Perspective on Cybercrimes.<\/p>\n<h4>Unit 3<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Unit 4<\/h4>\n<p>  <strong>Cyber Offenses:<\/strong> How Criminals Plan Them: Introduction, How Criminals plan the Attacks, Social Engineering, Cyber stalking, Cyber cafe and Cybercrimes, Botnets: The Fuel for Cybercrime, Attack Vector, Cloud Computing.<\/p>\n<h4>Unit 5<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Unit 6<\/h4>\n<p>  <strong>Cyber Security:<\/strong> Organizational Implications Introduction, Cost of Cybercrimes and IPR issues, Web threats for Organizations, Security and Privacy Implications, Social media marketing: Security Risks and Perils for Organizations, Social Computing and the associated challenges for Organizations.<\/p>\n<h4>Unit 7<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Text Books:<\/h4>\n<ol>\n<li>Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Nina Godbole and Sunil Belapure, Wiley INDIA.<\/li>\n<\/ol>\n<h4>Reference Books:<\/h4>\n<ol>\n<li>Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press.<\/li>\n<li>Introduction to Cyber Security , Chwan-Hwa(john) Wu,J.David Irwin.CRC Press T&amp;F Group<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all other subjects of Electrical &amp; Electronics Engineering, 2020-21 regulation curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/eee+7th-sem\">EEE 7th Sem subject syllabuses for 2020-21 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Electrical &amp; Electronics Engineering results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/rj\/category\/results\/\">Rajasthan Technical University electrical &amp; electronics engineering all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security detailed syllabus for Electrical &amp; Electronics Engineering (EEE) for 2020-21 regulation curriculum has been taken from the Rajasthan Technical University official website and presented for the electrical &amp; [&hellip;]<\/p>\n","protected":false},"author":2491,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[28],"tags":[],"class_list":["post-3919","post","type-post","status-publish","format-standard","hentry","category-eee"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/rj\/wp-json\/wp\/v2\/posts\/3919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/rj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/rj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/rj\/wp-json\/wp\/v2\/users\/2491"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/rj\/wp-json\/wp\/v2\/comments?post=3919"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/rj\/wp-json\/wp\/v2\/posts\/3919\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/rj\/wp-json\/wp\/v2\/media?parent=3919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/rj\/wp-json\/wp\/v2\/categories?post=3919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/rj\/wp-json\/wp\/v2\/tags?post=3919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}