Cyber Security detailed syllabus for Master of Computer Applications (MCA), R20 regulation has been taken from the JNTUH official website and presented for the students affiliated to JNTUH course structure. For Course Code, Subject Names, Theory Lectures, Tutorial, Practical/Drawing, Credits, and other information do visit full semester subjects post given below. The syllabus PDF files can also be downloaded from the universities official website.
For all the other MCA 2nd Year 1st Sem syllabus for R20 regulation JNTUH, visit Master of Computer Applications 2nd Year 1st Sem R20 Scheme.
For all the (Professional Elective-2) subjects refer to Professional Elective-2 Scheme. The detail syllabus for cyber security is as follows.
Course Objectives:
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
.
Course Outcomes:
- The students will be able to understand cyber-attacks, types of cybercrimes, cyber laws and also how to protect them self and ultimately the entire Internet community from such attacks.
Unit -I
Introduction to Cybercrime: Introduction, Cybercrime, and Information Security, Who are Cybercriminals, Classifications of Cybercrimes, And Cybercrime: The legal Perspectives and Indian Perspective, Cybercrime and the Indian ITA 2000, A Global Perspective on Cybercrimes.
Unit -II
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
.
Unit -III
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for Organizations, Organizational Measures for Handling Mobile, Organizational Security Policies an Measures in Mobile Computing Era, Laptops.
Unit -IV
Tools and Methods Used in Cybercrime: Introduction, Proxy Servers and Anonymizers, Phishing, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horse and Backdoors, Steganography, DoS and DDoS attacks, SQL Injection, Buffer Overflow.
Unit -V
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
.
Text Books:
- Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Nina Godbole and Sunil Belapure, Wiley INDIA.
Reference Books:
- Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press.
- Introduction to Cyber Security, Chwan-Hwa (John), Wu, J. David Irwin. CRC Press T&F Group.
For detail syllabus of all other subjects of 2nd Year 1st Sem Master of Computer Applications, visit MCA 2nd Year 1st Sem syllabus subjects.
For all MCA results, visit JNTUH MCA all years, and semester results from direct links.