Back close

Course Detail

Course Name Special Topics in Cyber Security
Course Code 24CY765
Program M. Tech. in Cyber Security
Credits 3
Campus Coimbatore

Syllabus

Syllabus

Information Technology and IPR, Intellectual Property Law, privacy law and data protection, Privacy issues in citizen digital data, lockers, electronic voting, digital cash, health and other societal digital information, Information & cyber warfare, social engineering attacks, Quantum computers, cyber security during crisis & pandemic, detection of fake news & misinformation, cyber-attacks on ICS & critical infrastructure, state-level cyber operations & cyber weapons, threat detection & response, Digital trust & safety, digital privacy & ethics, ethics in cyberspace, Information Protection Bill, data security governance-CMMC, Supply-chain attacks, Password less & hardware based authentication, Ethical hacking tools & techniques, Significant case studies & hands-on experience using tools / packages for each module, IDPR, trans-border data flow issues. 

Objectives and Outcomes

Prerequisite

224CY602: Network Security, 24CY613: Concepts in System Security

 

Course Outcome
 

Course Outcome  

Bloom’s  

Taxonomy Level  

CO 1  

Understanding privacy law & data protection, trans border data flow issues 

L1,L2  

CO 2  

Understanding the social engineering attacks, supply-chain attacks 

L2,L5  

CO 3  

Cyber-attacks on ICS & critical infrastructure 

L4  

CO 4  

Understanding data security governance, Information Protection Bill 

L2,L3,L4  

CO 5  

Hands-on experience in Ethical hacking tools & techniques 

L3,L5,L6  

 
CO-PO Mapping

CO-PO Mapping  

CO/PO  

PO 1 

PO 2 

PO 3 

PO 4 

PO 5 

PO 6 

PO 7 

PO 8 

PO 9 

PO 10 

PSO1 

PSO2 

PSO3 

CO 1 

– 

– 

CO 2 

– 

– 

CO 3 

– 

– 

CO 4 

– 

– 

CO 5 

– 

– 

Text Books / References

  1. Easttom, Chuck. Computer security fundamentals. Pearson IT Certification, 2019. 
  2. Whyte, Christopher, A. Trevor Thrall, and Brian M. Mazanec, eds. Information Warfare in the Age of Cyber Conflict. Routledge, 2020. 
  3. Stuttard, Dafydd, and Marcus Pinto. The web application hacker’s handbook: Finding and exploiting security flaws. John Wiley & Sons, 2011. 
  4. Look, Burt G. Handbook of SCADA/control systems security. CRC Press, 2016. 
  5. Eddison, Leonard. Tor And The Deep Web: The Complete Guide To Stay Anonymous In The Dark Net. CreateSpace Independent Publishing Platform, 2018. 

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now