The Students will be able
Essentials I & II: learn the general security concepts involved in maintaining a secure network computing environment,the nature and scope of today’s cybersecurity challenges, strategies for network defense & next-generation cybersecurity solutions. | |
Cyber Security Foundation:learn the fundamentals of cybersecurity, identify the concepts required to recognize and potentially mitigate attacks against enterprise networks & mission critical infrastructure. | |
Gateway I &II : Learn fundamental tenants of networking and concepts involved in maintaining a secure network computing environment. |
The students will be able to
Essentials I : Formulate an industry-standard design to protect infrastructure against cybersecurity threats, Apply advanced filtering methodologies such as user, application, and content ID to protect against all known and unknown attack vectors,deploy a variety of security methodologies as well as technologies and concepts used for implementing a secure network environment. | |
Cyber Security Foundation:Apply the fundamentals of cybersecurity, identify the concepts required to recognize and potentially mitigate attacks against enterprise networks & mission critical infrastructure. | |
Gateway 1 : Demonstrate knowledge of interconnected technology in daily communication, Identify systems that need protection , Apply physical, logical, and virtual addressing to various sized networks through the use of subnet mask schemes. | |
Gateway II : Examine cybersecurity landscape environments, attack threat vectors, exposure, vulnerabilities, and risk factors, • Apply the knowledge and skills necessary to plan, design, implement, troubleshoot, and maintain network infrastructure environmentsn. | |
Essentials II:Demonstrate ability to assess and harden endpoints based on security policies, use advanced malware research and analysis to provide enhanced protection for enterprise networks, Examine mobile and cloud-based connection technologies. |
Mohamed Sathak A J College of Engineering has partnered with CISCO, the world leaders in networking to establish
the Networking Academy(NetAcad).
Cisco Networking Academy is an IT skills and career building program which provides
Unique hands-on learning experience in the latest networking, security, and cloud technologies using simulation tools | |
Professional certification recognized by employers worldwide | |
Career pathways to connect to an estimated eight million networking jobs around the world through Netacad |
Courses Offered:
Network Essentials | |
Mobility Fundamentals | |
CCNA: Introduction to Networks | |
CCNA: Switching, Routing, and Wireless Essentials | |
CCNA: Enterprise Networking, Security and Automation OR Networking Courses | |
Security Courses | |
IoT & Data Analytics Courses | |
OS and IT Courses | |
Programming Courses | |
Entrepreneurship |
Certifications:
CISCO Certified Network Associate | |
Implementing CISCO Enterprise Network Core Technologies |
Fundamentals of cyber security (4 hours)
Security trends – Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies – Model of network security - OSI security architecture.
Cyber Security Concepts (4 Hours)
Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security – information theory – product cryptosystem – cryptanalysis. Essential Terminologies: CIA, Risks, Breaches, Threats, Attacks, Exploits. Information Gathering (Social Engineering, Foot Printing & Scanning).
Lab session-1 (3 Hours)
Lab session using Tools like nmap, zenmap, Port Scanners, Network scanners.
Security algorithms (4 hours)
Asymmetric key Cryptography-Message Authentication, Digital Signatures, Applications of Cryptography. Overview of Firewalls- Types of Firewalls, User Management, VPN Security
Lab session-2 (3 Hours)
Calculate the message digest of a text using the SHA-1 algorithm.
Infrastructure based security (6 Hours)
Network packet Sniffing, Network Design Simulation. DOS/ DDOS attacks. Asset Management and Audits, Vulnerabilities and Attacks. Intrusion detection and Prevention Techniques, Host based Intrusion prevention Systems, Security Information Management, Network Session Analysis, System Integrity Validation
Lab session-3 (3 Hours)
Implement the sniffing using any tool.
Lab session-4 (3 Hours)
Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other s/w.
Lab session-5 (3 Hours)
Automated Attack and Penetration Tools Exploring N-Stalker
Malware (6 Hours)
Explanation of Malware, Types of Malware: Virus, Worms, Trojans, Rootkits, Robots, Adware’s, Spywares, Ransom wares, Zombies etc., OS Hardening (Process Management, Memory Management, Task Management, Windows Registry/ services another configuration), Malware Analysis.
Lab session-6 (6 Hours)
Building Trojans
a. Defeating Malware
b. Rootkit Hunter
Sources extracted from
1. Anna University CNS Lab syllabus
2. AICTE emerging technology syllabus
3. IGNOU security certificate c