Back close

Course Detail

Course Name Foundations of Cyber-Security
Course Code 24CS634
Program M. Tech. in Computer Science & Engineering
Semester Soft Core
Credits 4
Campus Coimbatore, Bengaluru, Nagercoil, Chennai

Syllabus

Security Concepts: Confidentiality, Integrity, and Availability, Cryptography, Confusion vs Diffusion, Stream vs Block ciphers, Private-Key vs Public Key Cryptography, Cryptanalysis. Feistal Networks and Non Feistal Networks, Key Exchange, Public Key Encryption systems. Hash Functions, Message Digest, Signing and Verification, X509 certificates, SSL, TLS, HTTPS, Open SSL.

Authentication and Authorization: Identity and Access Management, Factors, Multi-factor, Kerberos, Role based Access Control. Operating System Security: Windows and Linux,

Protection System, Authorization, Security Analysis and Vulnerabilities, Security issues related to Internet, Intranet, Cloud Computing, Embedded System, Mobile System, Internet of Things and Wireless Networks.
Database Security: Securing different types of data, Database security, Data sanitization, Attacks on Data, SQL Injection, Buffer-flow, Privacy of Data, Security issues in Big Data and Cloud. Implementing Cryptographic schemes on datasets. Tools: Snort, NPM, Open VAS, Burp Suite, Nessus. Case Study: Implementing Cryptographic schemes on datasets. Understanding vulnerabilities using security tools: Snort, NPM, Open VAS, Burp Suite, Nessus.

Summary

Pre-Requisite(s): None
Course Type: Project

Course Objectives and Outcomes

Course Objectives

  • Knowledge in encryption and decryption using private and public key cryptography, digital signatures, cryptographic hash functions.
  • Understand and apply authentication and authorization mechanisms to protect OS and database.
  • Understand the threats and vulnerabilities and need for securing resources and exercising privacy preservation.

Course Outcomes

CO1: Understand the Fundamentals of Cyber Security Domain
CO2: Analyze and Apply Authentication and Authorization Techniques
CO3: Acquire foundational skills for developing expertise in one or more sub-domains of cyber-security and perform security reviews and audits
CO4: Identify insights on how to apply Cyber Security to secure operating systems and database design

CO-PO Mapping

CO PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 2 2 2
CO2 3 2 2 2
CO3 3 3 2 2 2
CO4 3 2 2 3

Evaluation Pattern: 70/30

Assessment Internal Weightage External Weightage
Midterm Examination 20
Continuous Assessment (Theory) 10
Continuous Assessment (Project) 40
End Semester Project Review 30

Text Books/References

  1. William Stallings, Cryptography and Network Security Principles and Practice, 8th Edition, 2023.
  2. Jose Manuel Ortega, Mastering Python for Networking and Security, Packt Publishing, 2018
  3. R. Sarma Danturthi, Database and Application Security: A Practitioner’s Guide, Addison-Wesley Professional; 1st edition, 2024
  4. Padmanabhan TR, Shyamala C K, and Harini N, “Cryptography and Security”, First Edition, Wiley India Publications, 2011
  5. Jose Manuel Ortega, Mastering Python for Networking and Security, Packt Publishing, 2018.
  6. Matt Bishop, Computer security: Art and Science, Vol. 2, Addison-Wesley, 2012.

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now