The Students will be able
![]() |
Essentials I & II: learn the general security concepts involved in maintaining a secure network computing environment,the nature and scope of today’s cybersecurity challenges, strategies for network defense & next-generation cybersecurity solutions. |
![]() |
Cyber Security Foundation:learn the fundamentals of cybersecurity, identify the concepts required to recognize and potentially mitigate attacks against enterprise networks & mission critical infrastructure. |
![]() |
Gateway I &II : Learn fundamental tenants of networking and concepts involved in maintaining a secure network computing environment. |
The students will be able to
![]() |
Essentials I : Formulate an industry-standard design to protect infrastructure against cybersecurity threats, Apply advanced filtering methodologies such as user, application, and content ID to protect against all known and unknown attack vectors,deploy a variety of security methodologies as well as technologies and concepts used for implementing a secure network environment. |
![]() |
Cyber Security Foundation:Apply the fundamentals of cybersecurity, identify the concepts required to recognize and potentially mitigate attacks against enterprise networks & mission critical infrastructure. |
![]() |
Gateway 1 : Demonstrate knowledge of interconnected technology in daily communication, Identify systems that need protection , Apply physical, logical, and virtual addressing to various sized networks through the use of subnet mask schemes. |
![]() |
Gateway II : Examine cybersecurity landscape environments, attack threat vectors, exposure, vulnerabilities, and risk factors, • Apply the knowledge and skills necessary to plan, design, implement, troubleshoot, and maintain network infrastructure environmentsn. |
![]() |
Essentials II:Demonstrate ability to assess and harden endpoints based on security policies, use advanced malware research and analysis to provide enhanced protection for enterprise networks, Examine mobile and cloud-based connection technologies. |
Mohamed Sathak A J College of Engineering has partnered with CISCO, the world leaders in networking to establish
the Networking Academy(NetAcad).
Cisco Networking Academy is an IT skills and career building program which provides
![]() |
Unique hands-on learning experience in the latest networking, security, and cloud technologies using simulation tools |
![]() |
Professional certification recognized by employers worldwide |
![]() |
Career pathways to connect to an estimated eight million networking jobs around the world through Netacad |
Courses Offered:
![]() |
Network Essentials |
![]() |
Mobility Fundamentals |
![]() |
CCNA: Introduction to Networks |
![]() |
CCNA: Switching, Routing, and Wireless Essentials |
![]() |
CCNA: Enterprise Networking, Security and Automation OR Networking Courses |
![]() |
Security Courses |
![]() |
IoT & Data Analytics Courses |
![]() |
OS and IT Courses |
![]() |
Programming Courses |
![]() |
Entrepreneurship |
Certifications:
![]() |
CISCO Certified Network Associate |
![]() |
Implementing CISCO Enterprise Network Core Technologies |
Fundamentals of cyber security (4 hours)
Security trends – Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies – Model of network security - OSI security architecture.
Cyber Security Concepts (4 Hours)
Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security – information theory – product cryptosystem – cryptanalysis. Essential Terminologies: CIA, Risks, Breaches, Threats, Attacks, Exploits. Information Gathering (Social Engineering, Foot Printing & Scanning).
Lab session-1 (3 Hours)
Lab session using Tools like nmap, zenmap, Port Scanners, Network scanners.
Security algorithms (4 hours)
Asymmetric key Cryptography-Message Authentication, Digital Signatures, Applications of Cryptography. Overview of Firewalls- Types of Firewalls, User Management, VPN Security
Lab session-2 (3 Hours)
Calculate the message digest of a text using the SHA-1 algorithm.
Infrastructure based security (6 Hours)
Network packet Sniffing, Network Design Simulation. DOS/ DDOS attacks. Asset Management and Audits, Vulnerabilities and Attacks. Intrusion detection and Prevention Techniques, Host based Intrusion prevention Systems, Security Information Management, Network Session Analysis, System Integrity Validation
Lab session-3 (3 Hours)
Implement the sniffing using any tool.
Lab session-4 (3 Hours)
Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other s/w.
Lab session-5 (3 Hours)
Automated Attack and Penetration Tools Exploring N-Stalker
Malware (6 Hours)
Explanation of Malware, Types of Malware: Virus, Worms, Trojans, Rootkits, Robots, Adware’s, Spywares, Ransom wares, Zombies etc., OS Hardening (Process Management, Memory Management, Task Management, Windows Registry/ services another configuration), Malware Analysis.
Lab session-6 (6 Hours)
Building Trojans
a. Defeating Malware
b. Rootkit Hunter
Sources extracted from
1. Anna University CNS Lab syllabus
2. AICTE emerging technology syllabus
3. IGNOU security certificate c