Week - 1
1.Introduction to Cyber Space
2.Introduction to Information Systems
3.Need for Cyber Security
Week - 2
4.Introduction to Cyber Attacks
5.Classification of Cyber Attacks
6.Classification of Malware, Threats
Week - 3
7.Vulnerability Assessment
8.Intrusion Detection Systems
9.Intrusion Prevention Systems
Week - 4
10.Introduction to User Authentication Methods
11.Biometric Authentication Methods
12.Biometric Systems
Week - 5
13.Different Security Models and Security Mechanisms
14.Information Security and Network Security
15.Operating System Security
Week - 6
16.Web Security
17.Email Security
18.Mobile Device Security, Cloud Security
Week - 7
19.IoT Security
20.Cyber Physical System Security
21.Social Media Security
Week - 8
22.Virtual Currency
23.Block Chain Technology
24.Security Auditing
Week - 9
25.Cyber Crimes
26.Different Types of Cyber Crimes, Scams and Frauds
Week - 10
27.Analysis of Crimes, Human Behavior
28.Stylometry, Incident Handling
Week - 11
29.Investigation Methods
30.Criminal Profiling, Cyber Trails
Week - 12
31.Digital Forensics, History, Challenges
32.Branches of Digital Forensics
Week - 13
33.Digital Forensic Investigation Methods
34.Reporting, Management of Evidence
Week - 14
35.Cyber Law-Basics
36.Information Technology Act 2000
37.Amendments to IT Act 2000
Week - 15
38.Evidentiary value of Email/SMS, Cybercrimes and Offenses dealt with IPC
39.RBI Act and IPR Act in India
40.Jurisdiction of Cyber Crime, Cyber Security Awareness Tips
DOWNLOAD APP
FOLLOW US