You are on page 1of 2

15 Days Skill Enhancement Introductory Course on Cyber Security &

Ethical Hacking

Batch Size-50

Date of commencement: 15-07-2020

C.V. Raman Global University Cyber Security COE

Short Term Online Course

Subject: Skill Enhancement Introductory Course on Cyber Security & Ethical


Hacking

Duration: 15 Days (2Hrs Per Day)

Timing: 3.00pm to 5.00pm

Eligibility: Any one completes Higher Secondary, Any Graduate

Prerequisite: Basic knowledge on Computer Science

Objective: The objectives of the course are:

1) to make aware the students about the Cyber Security trend.

2) To Give introductory Idea about different types of attacks, vulnerabilities,


Security issues and risk 3) To familiarize the students with the open source tools
to check the vulnerability, threats

4) Demonstrate different attacks and provide methods to safeguard security


requirements

Outcome: After completing the course the students are able to


(1) Describe the Security standards, goals, scope of Cyber Security as a career,
impact of COVID-19 on Cyber security , World skill competition on Cyber
Security
(2)Differentiate among types of Security threats, attacks and vulnerabilities,
(3)Demonstrate different encryption and decryption techniques
(4) Demonstrate different attacks on vulnerable machines
(5) Know the career scopes in the field of cyber Security and can do advanced
training and certification in the same area to strengthen their knowledge base .
Day Wise Teaching Plan

DAY Content

1 Networking Fundamental Concepts, The Internet Architecture, Domain Name System

2 TCP IP Protocol Suit, IP Addressing, Routing

3 Introduction to Ethical Hacking, Installation of VM ware/ virtual box, Creating your own lab

4 Internet Security, Security Goals, Security Services, Security Standards, Linux commands

5 Reconnaissance, Phases of Reconnaissance, Advanced Reconnaissance, Tools and


Techniques, Different types of attacks,

6 What is Scanning, Tools for Scanning, Types of scanning, Enumeration

7 Metasploit exploiting software, Metasploit social Engineering attacks, Man in the Middle
Attack

8 Cryptography, Encryption, Decryption, Cryptographic hash Function, Applications

9 Steganography, Tools to do and detect Steganography

10 Network Based Attack, DNS and e-mail Security

11 Password Cracking, Phishing attack, DoS and DDoS Attack

12 Virus, Worms, Trojan Horse, other types of Malwares for Windows ,Linux and android and
Defence

13 Web Application vulnerability scanning, Browser security, SQL Injection, XSS

14 Some common brute force attack, ARP spoofing

15 A project on Penetration Testing, Scope and Career in Cyber security

You might also like