IT471
Course Name:
Cybersecurity (IT471)
Programme:
Category:
Credits (L-T-P):
Content:
Digital Securities: Introduction, Types of Attacks, Digital Privacy, Online Tracking, Privacy Laws, Types of Computer Security risks ( Malware, Hacking, Pharming, Phishing, Ransomware, Adware and Spyware, Trojan, Virus, Worms, WIFI Eavesdropping, Scareware, Distributed Denial-Of-Service Attack, Rootkits, Juice Jacking), Antivirus and Other Security solution, Password, Secure online browsing, Email Security, Social Engineering, Secure WIFI settings, Track yourself online, Cloud storage security, IoT security, Physical Security Threads. Online Anonymity: Anonymous Networks, Tor Network, I2P Network, Freenet, Darknet, Anonymous OS – Tails, Secure File Sharing, VPN, Proxy Server, Connection Leak Testing, Secure Search Engine, Web Browser Privacy Configuration, Anonymous Payment: Cryptography and Secure Communication: The Difference Between Encryption and Cryptography, Cryptographic Functions, Cryptographic Types, Digital Signature, The Difference Between Digital Signatures and Electronic Signatures, Cryptographic Systems Trust Models, Create a Cryptographic Key Pair Using Gpg4win/gpg4usb, Disk Encryption Using Windows BitLocker, Disk Encryption Using Open Source Tools, Multitask Encryption Tools, Attacking Cryptographic Systems, Countermeasures Against Cryptography Attacks, Securing Data in Transit, Cloud Storage Encryption, Encrypt DNS Traffic and Email communication, Secure IM and video calls. Cyber Crime Issues and Investigation: Unauthorized Access, Computer Intrusions, White collar Crimes, Viruses and Malicious Code, Internet Hacking and Cracking, Virus Attacks, Pornography, Software Piracy, Intellectual Property, Mail Bombs, Exploitation, Stalking and Obscenity in Internet, Digital laws and legislation, Law Enforcement Roles and Responses, Investigation Tools, eDiscovery, EDRM Model, Digital Evidence Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery, Hands on Case Studies, Search and Seizure of Computers, Recovering Deleted Evidences, Password Cracking.