| UNIT 1 |
Information Technology Concept and Application |
| UNIT 2 |
Security Awareness |
| UNIT 3 |
Information Security: Overview |
| UNIT 4 |
Legal and Ethical Issues |
| UNIT 1 |
Introduction to Security Threats and Vulnerability |
| UNIT 2 |
Malware |
| UNIT 3 |
Hacking: Issues and Techniques |
| UNIT 4 |
Security Counter Measures |
| UNIT 1 |
Introduction to Data Communication and Transmission Media |
| UNIT 2 |
Overview of Networking Technologies |
| UNIT 3 |
Network Management and Protocol |
| UNIT 4 |
Network Attacks |
| UNIT 1 |
Introduction to Operating System |
| UNIT 2 |
Operating System Security : Overview |
| UNIT 3 |
Operating System Hardening and Controls |
| UNIT 4 |
ADC/SAMBA |
| UNIT 1 |
Network Security Concepts |
| UNIT 2 |
Network Security Techniques |
| UNIT 3 |
Identity Management |
| UNIT 4 |
Security Issues in Wireless and Next Generation Networks |
| UNIT 1 |
Introduction to Secure Protocols |
| UNIT 2 |
Specific Protocol-I |
| UNIT 3 |
Specific Protocol-II |
| UNIT 1 |
Introduction to Cryptography |
| UNIT 2 |
Symmetric Key Cryptography |
| UNIT 3 |
Asymmetric Key Cryptography |
| UNIT 4 |
Applications of Cryptography |
| UNIT 1 |
Firewalls |
| UNIT 2 |
IDS/IPS/Honeypots |
| UNIT 3 |
Scanning and Analysis Tools |
| UNIT 1 |
Social Engineering |
| UNIT 2 |
E-mail Crime and Investigation |
| UNIT 3 |
Reverse Engineering |
| UNIT 4 |
Cracking Methodology |
| UNIT 1 |
Introduction to Database Concepts |
| UNIT 2 |
Hands-on Database Usage and Hacking Attempt |
| UNIT 3 |
Database Security - I |
| UNIT 4 |
Database Security - II |
| UNIT 1 |
Introduction to Web Architecture |
| UNIT 2 |
Client Side Scripts |
| UNIT 3 |
Server Side Scripts |
| UNIT 4 |
Attacks on Web Application |
| UNIT 1 |
Internet Architecture |
| UNIT 2 |
Social Networking Sites |
| UNIT 3 |
Advanced Searching Techniques |
| UNIT 4 |
Latest Trend in Internet Securities |
| UNIT 1 |
Introduction to Security. Policies and Standards |
| UNIT 2 |
Security Framework Standards |
| UNIT 3 |
Security Mechanism Standards |
| UNIT 4 |
Security Protocol Standards |
| UNIT 1 |
Study of ISO Standards: A Complete Case Study |
| UNIT 1 |
International Treaties, Conventions and: Protocols Concerning Cyberspace |
| UNIT 2 |
Information Technology Amendment Act 2008-1 |
| UNIT 3 |
Information Technology Amendment Act 2008-11 |
| UNIT 4 |
Cyberspace and IPR |
| UNIT 1 |
Introduction to Computer Crimes |
| UNIT 2 |
Conventional Crimes through Computer |
| UNIT 3 |
Crimes and Torts Committed on a Computer Network |
| UNIT 4 |
Crimes Relating to Data Alteration/ Destruction/ Theft of Source Code and Database |
| UNIT 1 |
Analysis and Application Design |
| UNIT 2 |
Application Coding |
| UNIT 3 |
Application Testing |
| UNIT 4 |
Application Production and Maintenance |
| UNIT 1 |
Critical Application Security Concepts |
| UNIT 2 |
Input Validation and Encoding |
| UNIT 3 |
Authentication, Authorization and Session Management |
| UNIT 4 |
Encryption, Confidentiality and Data Protection |
| UNIT 1 |
Data Access |
| UNIT 2 |
Error Handling and Logging |
| UNIT 3 |
Server Configuration and Code Management |
| UNIT 4 |
Application Threat Modeling |
| UNIT 1 |
Assessment Methodologies and Tools |
| UNIT 2 |
Application Security Assessments |
| UNIT 3 |
WEB Application Scanning and Vulnerability Assessment |
| UNIT 4 |
WEB Application Ethical Hacking |
| UNIT 1 |
Introduction to Risk Analysis |
| UNIT 2 |
Risk Assessment |
| UNIT 3 |
Risk Analysis Techniques and Methodologies |
| UNIT 4 |
Risk Mitigation |
| UNIT 1 |
Need for a Business Continuity Program |
| UNIT 2 |
Overview of Business Continuity Management Life Cycle |
| UNIT 3 |
Defining Organization's Business Continuity Requirements |
| UNIT 4 |
Identifying and Selecting Business Continuity Strategies |
| UNIT 1 |
Developing Plans for Computer System Recovery |
| UNIT 2 |
Developing Plans for Business Resumption |
| UNIT 3 |
Plan Templates and Software Tools |
| UNIT 4 |
Implementing Crisis Management Framework |
| UNIT 1 |
Maintaining and Administering BCM Plans |
| UNIT 2 |
Auditing and Evaluating BCM plans |
| UNIT 3 |
Developing and Implementing a BCM Response |
| UNIT 4 |
Disaster Simulation Exercise |
| UNIT 1 |
Various Types of Cyber Crimes |
| UNIT 2 |
Banking and Financial Crimes |
| UNIT 3 |
Identify Thefts and Data Thefts/Source Code Thefts |
| UNIT 4 |
Spam and Botnets |
| UNIT 1 |
Digital Investigation |
| UNIT 2 |
Data Acquisition and Information Gathering |
| UNIT 3 |
Forensic Examination of Systems |
| UNIT 4 |
Forensic Examination of Network Devices |
| UNIT 1 |
Introduction to Mobile Forensics and Technologies |
| UNIT 2 |
Analysis of CDR's |
| UNIT 3 |
Application of SIM Card Reader's |
| UNIT 4 |
Forensic Examination of Mobile Devices |
| UNIT 1 |
Introduction to Wireless Technologies |
| UNIT 2 |
Wireless Devices |
| UNIT 3 |
Securing Wireless Network |
| UNIT 4 |
Ethical Hacking-Wireless Security |
Comments