Admissions 2021 - 2022

Approved by AICTE, New Delhi
Affiliated to Anna University

Mohamed-Sathak-A-J-Engineering TNEA-Code
Mohamed-Sathak-A-J-Engineering CII-Code

Cyber Security Academy – Palo Alto Systems

The Students will be able to

Essentials I & II: learn the general security concepts involved in maintaining a secure network computing environment,the nature and scope of today’s cybersecurity challenges, strategies for network defense & next-generation cybersecurity solutions.
Cyber Security Foundation:learn the fundamentals of cybersecurity, identify the concepts required to recognize and potentially mitigate attacks against enterprise networks & mission critical infrastructure.
Gateway I &II : Learn fundamental tenants of networking and concepts involved in maintaining a secure network computing environment.

The students will be able to

Essentials I : Formulate an industry-standard design to protect infrastructure against cybersecurity threats, Apply advanced filtering methodologies such as user, application, and content ID to protect against all known and unknown attack vectors,deploy a variety of security methodologies as well as technologies and concepts used for implementing a secure network environment.
Cyber Security Foundation:Apply the fundamentals of cybersecurity, identify the concepts required to recognize and potentially mitigate attacks against enterprise networks & mission critical infrastructure.
Gateway 1 : Demonstrate knowledge of interconnected technology in daily communication, Identify systems that need protection , Apply physical, logical, and virtual addressing to various sized networks through the use of subnet mask schemes.
Gateway II : Examine cybersecurity landscape environments, attack threat vectors, exposure, vulnerabilities, and risk factors, • Apply the knowledge and skills necessary to plan, design, implement, troubleshoot, and maintain network infrastructure environmentsn.
Essentials II:Demonstrate ability to assess and harden endpoints based on security policies, use advanced malware research and analysis to provide enhanced protection for enterprise networks, Examine mobile and cloud-based connection technologies.

Fundamentals of cyber security  (4 hours)
Security trends – Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies – Model of network security - OSI security architecture.

Cyber Security Concepts  (4 Hours)
Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security – information theory – product cryptosystem – cryptanalysis. Essential Terminologies: CIA, Risks, Breaches, Threats, Attacks, Exploits. Information Gathering (Social Engineering, Foot Printing & Scanning).

Lab session-1 (3 Hours)
Lab session using  Tools like nmap, zenmap, Port Scanners, Network scanners.

Security algorithms (4 hours)
Asymmetric key Cryptography-Message Authentication, Digital Signatures, Applications of Cryptography. Overview of Firewalls- Types of Firewalls, User Management, VPN Security

Lab session-2 (3 Hours)
Calculate the message digest of a text using the SHA-1 algorithm.  

Infrastructure based security  (6 Hours)
Network packet Sniffing, Network Design Simulation. DOS/ DDOS attacks. Asset Management and Audits, Vulnerabilities and Attacks. Intrusion detection and Prevention Techniques, Host based Intrusion prevention Systems, Security Information Management, Network Session Analysis, System Integrity Validation  

Lab session-3 (3 Hours)
Implement the sniffing using any tool.      

Lab session-4 (3 Hours)
Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other s/w.

Lab session-5 (3 Hours)
Automated Attack and Penetration Tools Exploring N-Stalker     

  Malware  (6 Hours)
Explanation of Malware, Types of Malware: Virus, Worms, Trojans, Rootkits, Robots, Adware’s, Spywares, Ransom wares, Zombies etc., OS Hardening (Process Management, Memory Management, Task Management, Windows Registry/ services another configuration), Malware Analysis.     

  Lab session-6  (6 Hours)
Building Trojans
a. Defeating Malware
b. Rootkit Hunter

Sources extracted from
1. Anna University CNS Lab syllabus
2. AICTE emerging technology syllabus
3. IGNOU security certificate c

Download Syllabus