Syllabus
PROFESSIONAL ELECTIVES Electives in Cyber Security
Unit I
Introduction to Network Security – Basic concepts and terminologies – Importance of network security -Common network security threats and vulnerabilities. Network Architecture and Design. Secure network topologies and architectures – Defense-in-depth principles – Secure network segmentation and zoning – Access Control and Authentication.
Unit II
Secure protocols (e.g., SSL/TLS, IPsec), Network-level attacks (e.g., DoS, DDoS), Intrusion detection and prevention systems (IDS/IPS), Network Perimeter Security. Firewalls and their configurations – Intrusion detection and prevention at the perimeter – Virtual Private Networks (VPNs) and secure remote access – Wireless Network Security.
Unit III
Network monitoring tools and techniques – Vulnerability assessments and penetration testing – Incident detection, analysis, and response -Incident handling and post-incident procedures – Network Security Auditing and Testing.
Objectives and Outcomes
Course Objectives
- Equip students with a comprehensive understanding of fundamental cybersecurity concepts and network security principles, enabling them to design, implement, and manage secure network infrastructures.
- Develop students’ proficiency in identifying and mitigating common web application vulnerabilities and threats.
- Foster students’ ability to effectively monitor, analyze, and manage security events and incidents to maintain a secure environment.
Course Outcomes
CO1: Understand the key concepts and principles of network security, including the common network security.
threats and vulnerabilities and be able to analyze and evaluate security risks in various contexts.
CO2: Apply skills in network architecture and design appropriate security measures.
CO3: Apply secure protocols and network security mechanisms to protect against attacks and ensure data
confidentiality, integrity, and availability.
CO4: Understand the principles and applications of network monitoring tools and techniques, to effectively manage
security risks and respond to security incidents in organizations.
CO-PO Mapping
PO/PSO |
PO1 |
PO2 |
PO3 |
PO4 |
PO5 |
PO6 |
PO7 |
PO8 |
PO9 |
PO10 |
PO11 |
PO12 |
PSO1 |
PSO2 |
CO |
CO1 |
3 |
2 |
2 |
2 |
|
|
|
|
|
|
|
|
3 |
3 |
CO2 |
3 |
3 |
3 |
2 |
|
|
|
|
|
|
|
|
3 |
3 |
CO 3 |
3 |
3 |
2 |
2 |
3 |
|
|
|
|
|
|
|
3 |
3 |
CO4 |
2 |
2 |
2 |
2 |
|
|
|
3 |
|
|
|
|
3 |
3 |
Evaluation Pattern
Evaluation Pattern: 70:30
Assessment |
Internal |
End Semester |
Midterm |
20 |
|
*Continuous Assessment Theory (CAT) |
10 |
|
*Continuous Assessment Lab (CAL) |
40 |
|
**End Semester |
|
30 (50 Marks; 2 hours exam) |
* CAT – Can be Quizzes, Assignment, and Reports
* CAL – Can be Lab Assessments, Projects, and Reports
**End Semester can be theory examination/ lab-based examination/ project presentation
Text Books / References
Textbook(s)
- Michael Stewart, Denise Kinsey, “Network Security, Firewalls, and VPNs”, Jones & Bartlett Learning, LLC, 2020.
Sanders C, Smith J. “Applied network security monitoring: collection, detection, and analysis”. Elsevier; 2013 Nov 26.
Reference(s)
William Stallings, “Network Security Essentials: Applications and Standards,” Pearson, 6th edition, 2016.