Back close

Course Detail

Course Name Foundations of Cyber Security
Course Code 23CSE313
Program B. Tech. in Computer Science and Engineering (CSE)
Semester 6
Credits 3
Campus Amritapuri ,Coimbatore,Bengaluru, Amaravati, Chennai

Syllabus

Unit I

Fundamentals of Cybersecurity – Introduction to Cybersecurity: CIA triad – attacks – cybersecurity fundamentals such as Principle of Least Privilege, Security Principles and Models, Introduction to cryptographic algorithms, types.

Unit II

Practical Security Concepts with stress on Technologies used in Cybersecurity Software Development and Application Security: OWASP Top 10 and CWE – Input Validation, Authentication – Authorization – Browser Security Principles – Same origin policy (SOP) – Database security principles – File Security principles – Directory traversal.

Unit III

Network Security: Network Threat Landscape, Types of Network Attacks and Sources. Security Standards; Regulatory Requirements; Security Assessment; Digital Forensics; Incident Response, Disaster Recovery and Business Continuity Management; Security Governance, Risk and Compliance; Identity and Access Management (IAM).

Objectives and Outcomes

Course Objectives

  • Develop a comprehensive understanding of cybersecurity fundamentals, including principles, models, and regulatory requirements, to establish a strong foundation in the field.
  • Acquire practical knowledge and skills in identifying and mitigating vulnerabilities in software applications, networks, and systems, applying industry-standard practices and technologies.
  • Understand the principles of security governance to be able to ensure compliance with industry best practices and legal requirements, and effectively manage security risks in organizations.

Course Outcomes

CO1: Understand the key concepts and principles of cybersecurity, including the CIA triad, attacks, and security fundamentals such as principle of least privilege and security models.

CO2: Develop practical skills in software development and application security, including input validation, authentication and authorization, browser, database, and file security principles.

CO3: Identify network security threats and apply appropriate security measures, incident response, disaster recovery, and business continuity plan to mitigate the impact of security breaches and ensure continuity of operations.

CO4: Understand the principles of security governance, risk and compliance (GRC), and identity and access management (IAM) to protect against unauthorized access to information systems.

CO-PO Mapping

 PO/PSO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO
CO1 3 3 2 2 2 2
CO2 3 3 3 3 2 3 3
CO3 3 3 3 2 2 3 3
CO4 3 3 2 2 3 3

Evaluation Pattern

Evaluation Pattern: 70:30

Assessment Internal End Semester
Midterm 20
*Continuous Assessment Theory (CAT) 10
*Continuous Assessment Lab (CAL) 40
**End Semester 30 (50 Marks; 2 hours exam)

*CAT – Can be Quizzes, Assignment, and Reports

*CAL – Can be Lab Assessments, Projects, and Reports

**End Semester can be theory examination/ lab-based examination

Text Books / References

Textbook(s)

William Stallings and Lawrie Brown. “Computer Security: Principles and Practice”. Fourth Edition, Pearson, 2019

William Stallings. “Network Security Essentials: Applications and Standards”. Pearson, 2017.

Bryan Sullivan and Vincent Liu. “Web Application Security: A Beginner’s Guide”. McGraw-Hill Education, 2011.

Reference(s)

John Sammons, “The Basics of Digital Forensics”, Elsevier Science, 2011.

Ross J. Anderson. “Security Engineering: A Guide to Building Dependable Distributed Systems”. Wiley, 2008.

Raef Meeuwisse. “Cybersecurity: The Beginner’s Guide”. John Wiley & Sons, Inc., 2017

P.W. Singer and Allan Friedman. “Cybersecurity and Cyberwar: What Everyone Needs to Know”. Oxford University Press, 2014.

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now