{"id":32061,"date":"2023-04-25T02:41:13","date_gmt":"2023-04-25T02:41:13","guid":{"rendered":"https:\/\/www.inspirenignite.com\/vtu\/betck105i-introduction-to-cyber-security-syllabus-civil-stream-chemistry-group-2022-scheme-emerging-technology-course-i\/"},"modified":"2023-04-25T02:41:13","modified_gmt":"2023-04-25T02:41:13","slug":"betck105i-introduction-to-cyber-security-syllabus-civil-stream-chemistry-group-2022-scheme-emerging-technology-course-i","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/vtu\/betck105i-introduction-to-cyber-security-syllabus-civil-stream-chemistry-group-2022-scheme-emerging-technology-course-i\/","title":{"rendered":"BETCK105I: Introduction to Cyber Security syllabus Civil Stream Chemistry Group 2022 Scheme (Emerging Technology Course-I)"},"content":{"rendered":"<p align=\"justify\">Introduction to Cyber Security detailed syllabus for Civil Stream Chemistry Group for 2022 Scheme curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/vtu.ac.in\/b-e-scheme-syllabus\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">VTUs<\/a> official website and presented for the Civil Stream Chemistry Group students. For course code, course name, duration, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Civil Stream Chemistry Group 1st Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/civil-stream-chemistry-group-1st-sem-syllabus-2022-scheme\">Civil Stream Chemistry Group 1st Sem 2022 Scheme scheme<\/a>. For Emerging Technology Course-I scheme and its subjects refer to <a class=\"rank-math-link\" href=\"..\/emerging-technology-course-i-syllabus-civil-stream-chemistry-group-2022-scheme\">Civil Stream Chemistry Group Emerging Technology Course-I syllabus scheme<\/a>. The detailed syllabus of introduction to cyber security is as follows. <\/p>\n<p>  <title>Introduction to Cyber Security<\/title><\/p>\n<h4>Course Objectives:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all Syllabus, QPs and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Teaching-Learning Process<\/h4>\n<p>  These are sample Strategies, which teacher can use to accelerate the attainment of the various course outcomes and make Teaching -Learning more effective<\/p>\n<ol>\n<li>Chalk and Board<\/li>\n<li>Demonstration<\/li>\n<li>Interactive learning<\/li>\n<li>Videos and online material<\/li>\n<\/ol>\n<h4>Module 1:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all Syllabus, QPs and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Module 2:<\/h4>\n<p>  (8 hours of pedagogy) Cyber Offenses: How Criminals Plan Them:Introduction, How criminals plan the attacks, Social Engineering, Cyber Stalking, Cybercaafe &amp; cybercrimes. Botnets: The fuel for cybercrime, Attack Vector. Textbook:1 Chapter 2 (2.1 to 2.7)<\/p>\n<h4>Module 3:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all Syllabus, QPs and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Module 4:<\/h4>\n<p>  ( 8 ours of pedagogy) Phishing and Identity Theft: Introduction, methods of phishing, phishing,phising techniques, spear phishing, types of phishing scams, phishing toolkits and spy phishing, counter measures, Identity Theft Textbook:1 Chapter 5 (5.1. to 5.3)<\/p>\n<h4>Module 5:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all Syllabus, QPs and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Course Outcomes:<\/h4>\n<p>  (Course Skill Set) At the end of the course the student will be able to:<\/p>\n<ol>\n<li>Explain the cybercrime terminologies<\/li>\n<li>Describe Cyber offenses and Botnets<\/li>\n<li>Illustrate Tools and Methods used on Cybercrime<\/li>\n<li>Explain Phishing and Identity Theft<\/li>\n<li>Justify the need of computer forensics<\/li>\n<\/ol>\n<h4>Suggested Learning Resources:<\/h4>\n<p>  Books (Title of the Book\/Name of the author\/Name of the publisher\/Edition and Year)<\/p>\n<ol>\n<li>Sunit Belapure and Nina Godbole, \u201cCyber Security: Understanding Cyber Crimes, Computer Forensics And Legal Perspectives\u201d, Wiley India Pvt Ltd, ISBN: 978-81- 265-21791, 2011, First Edition (Reprinted 2018)<\/li>\n<\/ol>\n<h4>Web links and Video Lectures (e-Resources):<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all Syllabus, QPs and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Activity Based Learning (Suggested Activities in Class)\/ Practical Based learning<\/h4>\n<ul>\n<li>Illustration of standard case study of cyber crime<\/li>\n<li>Setup a cyber court at Institute level<\/li>\n<\/ul>\n<p align=\"justify\">For detailed syllabus of all the other subjects of Civil Stream Chemistry Group 1st Sem, visit <a class=\"rank-math-link\" href=\"..\/category\/chemistry-group-civil-stream+1st-sem\">Civil Stream Chemistry Group 1st Sem subject syllabuses for 2022 Scheme<\/a>. <\/p>\n<p align=\"justify\">For all Civil Stream Chemistry Group results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/vtu\/vtu-be-btech-results\/\">VTU Civil Stream Chemistry Group all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Cyber Security detailed syllabus for Civil Stream Chemistry Group for 2022 Scheme curriculum has been taken from the VTUs official website and presented for the Civil Stream Chemistry [&hellip;]<\/p>\n","protected":false},"author":2298,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[100],"tags":[],"class_list":["post-32061","post","type-post","status-publish","format-standard","hentry","category-chemistry-group-civil-stream"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/posts\/32061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/users\/2298"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/comments?post=32061"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/posts\/32061\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/media?parent=32061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/categories?post=32061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/tags?post=32061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}