0% found this document useful (0 votes)
70 views

CS-597 Cyber Security

This document outlines the course details for a Cyber Security course offered at PMAS Arid Agriculture University Rawalpindi. The 3 credit, 3 hour per week course aims to prepare students to work as information security professionals through lectures, assignments, presentations and exams. Over 14 weeks, students will learn about topics like information security, hacking, malware, sniffing, social engineering, DoS attacks, session hijacking, web applications security, SQL injection, wireless security and more. The course objectives are to provide knowledge of securing networks and systems, hands-on pentesting experience, and the ability to detect attacks and ensure data security and recovery.

Uploaded by

Noureen Zafar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views

CS-597 Cyber Security

This document outlines the course details for a Cyber Security course offered at PMAS Arid Agriculture University Rawalpindi. The 3 credit, 3 hour per week course aims to prepare students to work as information security professionals through lectures, assignments, presentations and exams. Over 14 weeks, students will learn about topics like information security, hacking, malware, sniffing, social engineering, DoS attacks, session hijacking, web applications security, SQL injection, wireless security and more. The course objectives are to provide knowledge of securing networks and systems, hands-on pentesting experience, and the ability to detect attacks and ensure data security and recovery.

Uploaded by

Noureen Zafar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

PMAS Arid Agriculture University Rawalpindi

University Institute of Information Technology

CS-597 Cyber Security


Credit Hours: 3(3-0) Prerequisites: None
Teacher:

Course Description:
Basic security concepts, Information security terminology, Malware classifications,
Types of malware. Server side web applications attacks. Cross-site scripting, SQL
Injection, Cross-site request forgery, Planning and policy, Network protocols and service
models. Transport layer security, Network layer security, Wireless security, Cloud & IoT
security.
Course Objective:
To prepare the trainees to work as Information Security Professional in a wide variety of computer-
related industries and has a strong emphasis on Network related problems
Teaching Methodology:
Lectures, Assignments, Presentations, etc. Major component of the course should be
covered using conventional lectures.
Courses Assessment:
Exams, Assignments, Quizzes. Course will be assessed using a combination of written
examinations.
Reference Materials:
 Security+ Guide to Network Security Fundamentals by Mark Ciampa, th Edition
 Corporate Computer Society by Randall J.Boyle, 3rd Edition

Course Learning Outcomes (CLOs):


At the end of the course the students will be able to: Domain BT Level*
1. Knowledge of Information technology catering principles and
Capabilities with particular -emphasis on the technical support of
C 2
local area networks.

2. Knowledge of securing networks, systems, servers and operating


Systems with troubleshooting. C 2

3. Hands on experience in pentesting all network technologies regarding


with local area network and perform various tests to detect and
provide defense against vulnerabilities. C 3

4. Ability to detect attack vectors, identify attack type and provide C 4


continuity of operations and to recover data from damaged disks to
ensure data consistency.
* BT= Bloom’s Taxonomy, C=Cognitive domain, P=Psychomotor domain, A= Affective
doma

Week/Lecture Theory
#

Week 1 • Motivational Lecture


• Course Introduction
• Success stories
• Job market
• Course Applications
• Institute/work ethics
• Introduction to Cybersecurity
• Objectives
• Roles
• Differences between Information security and cybersecurity  What is
Cyberspace?
• What is Cyber security?
• Why is Cyber security Important?
• What is a Hacker?

Week 2 • Describe the elements of information security


• Explain information security threats and attack vectors
• Describe the hacking concepts, types, and phases
• Explain the ethical hacking concepts and scope
• Understand the information security controls (information defense-in-depth,
policies, procedures, awareness, physical management process, and risk
management.

Week 3  Describe the network scanning concepts


 Use various scanning tools
 Perform scanning to check for live systems and open ports

 Perform scanning by using various scanning techniques

 Scan beyond intrusion detection system (IDS) and firewall


 Perform banner grabbing

 Draw network diagrams using network discovery tools

 Perform scanning penetration testing

 Describe the enumeration concepts

 Explain different techniques for Netbios enumeration

 Explain different techniques for SNMP enumeration

 Explain different techniques for LDAP enumeration

 Explain different techniques for NTP enumeration

 Explain different techniques for SMTP and DNS enumeration

 Explain other enumerations such as IPsec, VolP, RPC, and Linux/Unix enum

 Apply enumeration countermeasures

 Perform enumeration penetration testing

Week 4  Describe vulnerability assessment


 Describe about vulnerability management life cycle (vulnerability assessment

 Understand different approaches of vulnerability assessment solutions

 Describe different characteristics of good vulnerability assessment solutions

 Explain different types of vulnerability assessment tools

 Choose an appropriate vulnerability assessment tools

 Understand vulnerability scoring systems

 Use various vulnerability assessment tools

Week 5  Describe the Hacking Methodology


 Explain different techniques to gain access to the system

 Apply privilege escalation techniques

 Explain different techniques to create and maintain remote access to the system

 Describe different types of rootkits


 Explain steganography and steganalysis techniques

 Apply different techniques to hide the evidence of compromise

 Perform system hacking penetration testing

Week 6  Describe the concepts of malware and malware propagation techniques

 Describe the concepts of Trojans, their types, and how they infect systems

 Explain the concepts of viruses, their types, and how they infect fi

 Explain the concept of computer worms

 Perform malware analysis

 Explain different techniques to detect malware

 Apply malware countermeasures

 Perform malware penetration testing

Week 7  Describe the sniffing concepts Explain different MAC attacks



 Explain different DHCP attacks

 Describe the ARP poisoning

 Explain different MAC spoofing tracks

 Describe the DNS poisoning

 Use different sniffing tools

 Apply sniffing countermeasures

 Apply various techniques to detect sniffing

 Perform sniffing penetration testing

Week 8  Describe the social engineering concepts Perform social engineering using various
 techniques

 Describe insider threats

 Perform impersonation on social networking sites

 Describe identity theft


 Apply social engineering countermeasures

 Apply insider threats and identity theft countermeasures

 Perform social engineering penetration testing

MID TERM

Week 9  Describe the DoS/DD0S concepts


 Perform DoS/DDOS using various attack techniques

 Describe Botnets

 Describe DoS/DDOS case studies

 Explain different DoS/DDoS attack tools

 Apply best practices to mitigate DdoS/DD0S attacks

 Perform DoS/DDOS penetration testing


Week 10  Describe the session hijacking concaps
 Perform application level sesionhpcing

 Perform network lewl session hijacking

 Apply different session hijacking tools

 Apply session hijacking countermeasures

 Perform session hijacking penetration testing

Week 11  Describe IDS, firewall, and honeypot concepts


Use different IDs, firewall and honeypot solutions

 Explain different techniques to bypass IDS

 Explain various techniques to bypass firewalls

 Use different IDS/firewall evading tools

 Explain different techniques to detect honeypots


 Apply IDS/firewall evasion countermeasures

 Perform IDS and firewall penetration testing

Week 12  Hacking web servers


 Describe the web server concepts
 Perform various web server attack

 Describe about web server attack methodology

 Use different web server attack tools

 Apply web server attack countermeasures

 Describe the patch management concepts

 Use different web server security tools

 Perform web server penetration testing

Week 13 ▪ Describe web application concepts


▪ Perform various web application attacks
▪ Describe about web application hacking methodology
▪ Use different web application hacking tools
▪ Apply web application attacks countermeasures
▪ Use different web application security testing tools
▪ Perform web application penetration testing
▪ Describe the SQL injection concepts
▪ Perform various types of SQL injection attacks
▪ Describe SQL injection methodology
▪ Use different SQL injection tools
▪ Explain different IDS evasion techniques
▪ Apply SQL injection countermeasures
▪ Use different SQL injection detection tools

Week 14 • Describe wireless concepts


• Explain different wireless encryption algorithms
• Describe wireless threats
• Describe wireless hacking methodology
• Use different wireless hacking tools
• Describe Bluetooth hacking techniques
• Apply wireless hacking countermeasures
• Use different wireless security tools
• Perform wireless penetration testing
• Understand mobile platform attack vectors
• Understand various Android threats and attacks
• Understand various iOS threats and attacks
• Use various mobile spyware
• Describe Mobile Device Management
(MDM)
• Apply various mobile security countermeasures
• Use various mobile security tools
• Perform mobile penetration testing
• Describe cloud computing concepts
• Understand cloud computing threats
• Explain cloud computing attacks

Week 15 • Security Through Network Devices


o Standard Network Devices o Network Security Hardware

• Security Through Network Technologies


o Network Address Translation
(NAT) o Network Access Control (NAC)

• Security Through Network Design


Elements o Demilitarized Zone (DMZ) o Subnetting

o Virtual LANs (VLANs)


• Remote Access
• What Is Access Control?
o Access Control Terminology o Access Control Models o Best
Practices for Access Control
• Implementing Access Control
o Access Control Lists (ACLs) o Group Policies o Account

Restrictions

• Authentication Services o RADIUS o Kerberos

o Terminal Access Control Access


Control System (TACACS) o Terminal Access Control Access Control
System (TACACS)
• Security Assertion Markup Language (SAML)
Week 16 ● Guidelines to the Trainees for selection of students employable project
like final year project (FYP)
● Assign Independent project to each Trainee
● A project based on trainee’s aptitude and acquired skills.
● Designed by keeping in view the emerging trends in the local market as
well as across the globe.
● The project idea may be based on Entrepreneur.
● Leading to the successful employment.
● The duration of the project will be 6 weeks
● Ideas may be generated via different sites such as:
https://1000projects.org/ https://nevonprojects.com/
https://www.freestudentprojects.com/ https://technofizi.net/best-
computerscience-and-engineering-cse-projecttopics-ideas-for-students/
• Final viva/assessment will be conducted on project assignments.
• At the end of session the project will be presented in skills competition
• The skill competition will be conducted on zonal, regional and National
level.
• The project will be presented in front of Industrialists for
commercialization
• The best business idea will be placed in NAVTTC business incubation
center for commercialization.

FINAL TERM

You might also like