Professional Documents
Culture Documents
PROGRAM OUTCOMES
PO PO Description
A student completing bachelor of vocation degree in Cyber Security and Forensics
program will be able to
PO 1 To provide judicious mix of skills relating to a profession and appropriate content of General
Education
PO 2 To ensure that the students have adequate knowledge and skills, so that they are work ready at
each exit point of the programme
PO 3 To provide flexibility to the students by means of pre-defined entry and multiple exit points
PO 4 To integrate NSQF within the undergraduate level of higher education in order to enhance
employability of the graduates and meet industry requirements
PO 5 To provide vertical mobility to students coming out of 10+2 with vocational subjects
1
B. K. Birla College (Autonomous), Kalyan, Syllabus for B.Voc. (Cyber Security and Forensics) 2021-22
PSO Description
PSO 1 To identify, analyse and remediate computer security breaches by learning and implementing
the real-world scenarios
PSO 3 To introduce techniques of forensic data examination of computers and digital storage media
PSO 4 To gain industrial exposure through Industrial Internship in cyber security and forensics
industry.
PSO 5 To make them employable according to current demand of cyber security and forensics
industry and responsible citizen
2
B. K. Birla College (Autonomous), Kalyan, Syllabus for B.Voc. (Cyber Security and Forensics) 2021-22
Communication 4 60 4 60 40 100
Skills
Basics of
Computer and
4 60 4 60 40 100
Hardware
Maintenance
Discrete
4 60 4 60 40 100
Mathematics
Computer
4 60 4 60 40 100
Networking
C++
4 60 4 60 40 100
Programming
Skill Component
Fundamentals
of Cyber 4 60 4 60 40 100
Security
C++
Programming 3 45 4 50 50 100
Lab
Fundamentals
of Cyber 3 45 4 50 50 100
Security Lab
Total 30 32 800
4 60 4 60 40 100
General
Electronics
Green
4 60 4 60 40 100
Computing
Human Rights 4 60 4 60 40 100
Operating
4 60 4 60 40 100
Systems
Database
Management 4 60 4 60 40 100
Skill Component
System
Web
4 60 4 60 40 100
Programming
Database
Management
3 45 4 50 50 100
System
Lab
Web
Programming 3 45 4 50 50 100
Lab
Total 30 32 800
3
B. K. Birla College (Autonomous), Kalyan, Syllabus for B.Voc. (Cyber Security and Forensics) 2021-22
Techniques
Search Engine
Optimization
4 60 4 60 40 100
and Digital
Marketing
Free and Open
Source
4 60 4 60 40 100
Softwares
(FOSS)
Software
4 60 4 60 40 100
Engineering
Media Content
4 60 4 60 40 100
Skill Component
Development
Python
4 60 4 60 40 100
Programming
Software
Engineering 3 45 4 50 50 100
Lab
Media Content
Development 3 45 4 50 50 100
Lab
Total 30 32 800
4 60 4 60 40 100
General
Criminology
Entrepreneurship 4 60 4 60 40 100
Android App
4 60 4 60 40 100
Development
Cryptography 4 60 4 60 40 100
Secure
Programming 4 60 4 60 40 100
Skill Component
Practices
Fundamentals of
Computer 4 60 4 60 40 100
Forensics
Cryptography
3 45 4 50 50 100
Lab
Fundamentals of
Computer 3 45 4 50 50 100
Forensics Lab
Total 30 32 800
4
B. K. Birla College (Autonomous), Kalyan, Syllabus for B.Voc. (Cyber Security and Forensics) 2021-22
4 60 4 60 40 100
General
Development
IT and Related
4 60 4 60 40 100
Laws
Wireless Security 4 60 4 60 40 100
Information
4 60 4 60 40 100
Security
Skill Component
Software Forensics
and Vulnerability
Analysis 4 60 4 60 40 100
**inclusive of hands-
on practical training
Ethical Hacking
**inclusive of hands- 4 60 4 60 40 100
on practical training
INTERNSHIP 6 90 8 80 120 200
Total 30 32 800
Offensive Security
**inclusive of hands- 4 60 4 60 40 100
on practical training
Operating System
and Mobile
Forensics 4 60 4 60 40 100
**inclusive of hands-
on practical training
PROJECT 6 90 8 80 120 200
Total 30 32 800
5
B. K. Birla College (Autonomous), Kalyan, Syllabus for B.Voc. (Cyber Security and Forensics) 2021-22
SEMESTER I
6
B. K. Birla College (Autonomous), Kalyan, Syllabus for B.Voc. (Cyber Security and Forensics) 2021-22
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1 Recognize and understand different communication styles
CO 2 Enhance their ability in listening and speaking
CO 3 Enrich their intrapersonal and interpersonal skills
CO 4 Advance their group interaction and communication
CO 5 Improve their presentation skills
Communication.
IV Group Communication: The Basics of Group Dynamics, Group Interaction
and Communication, How to Be Effective in Groups, Handling 12
Criticism.
V Presentation Process: Planning the presentations, executing the presentations,
Impressing the audience by performing, Planning stage: Brainstorming, mind
maps / concept maps, executing stage: chunking theory, creating outlines, Use
12
of templates. Adding graphics to your presentation: Visual communication,
Impressstage: use of font, colour, layout, Importance of practice and
performance.
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1 Introduce the basic terminology in the field of IT
CO 2 Impart functional knowledge about PC hardware, operations and
concepts
CO 3 Distinguish between different types of software
CO 4 Impart functional knowledge in the use of GUI Operating System
CO 5 Impart functional knowledge in a standard office package
III Hardware: CPU, Memory, Input devices, output devices. Memory units: RAM
(SDRAM, DDR RAM, RDRAM etc. feature wise comparison only); ROM- 12
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1 Construct easy mathematical proofs and retain the ability to verify them
OrderingPrinciplefortheIntegers,Correctnessofalgorithms,defining
sequencesrecursively,solvingrecurrencerelationsbyiteration,Second order
linear homogenous recurrence relations with constant coefficients. general
recursive definitions and structural induction.
Functions: Functions Defined on General Sets, One-to-One and Onto,
Inverse Functions, Composition of Functions, Cardinality with Applications to
Computability
IV Relations: Relations on Sets, Reflexivity, Symmetry, and Transitivity,
Equivalence Relations, Partial Order Relations 12
Graphs and Trees: Definitions and Basic Properties, Trails, Paths, and
Circuits, Matrix Representations of Graphs, Isomorphism’s of Graphs, Trees,
Rooted Trees, Isomorphism’s of Graphs, Spanning trees and shortest paths.
V Counting and Probability: Introduction, Possibility Trees and the
Multiplication Rule, Possibility Trees and the Multiplication Rule, Counting
Elements of Disjoint Sets: The Addition Rule, The Pigeonhole Principle,
12
Counting Subsets of a Set: Combinations, r- Combinations with Repetition
Allowed, Probability Axioms and Expected Value, Conditional Probability,
Bayes’ Formula, and Independent Events.
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1 Understand the basic concepts of data communication, layered model,
protocols, and inter- working between computer networks and switching
components in telecommunication systems.
CO 2 Understand how errors detected and corrected that occur in transmission
CO 3 Handle collisions when many stations share a single channel
CO 4 Understand routing mechanisms and different routing protocols
CO 5 Understand transport layer functions and different application layer protocols
III Data Link Control: DLC services, data link layer protocols, HDLC, Point-
to-point protocol. 12
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1
Understand the fundamental programming concepts and methodologies which are
essential to building good C++ programs
CO 2 Create and analyze algorithms for solving simple problems.
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1 Understand the fundamentals of the cyber security domain and related
issues
CO 2 Impart practical knowledge of various tools, processes and methods to
ensure security of systems
CO 3 Gain a basic knowledge on how to build bug-free systems
CO 4 Apply basic network and vulnerability scanning process
CO 5 Understand the basic of computer forensics
Does Espionage Occur? Phone Taps and Bugs, Protecting against Industrial
Espionage, Industrial Espionage Act, Spear Phishing
List of Practical:
1. Basic Programs:
a. Write a program to display the message HELLO WORLD.
b. Write a program to declare some variables of type int, float and double. Assign
some values to these variables and display these values.
c. Write a program to find the addition, subtraction, multiplication and division of
two numbers.
2. Programs on variables:
a. Write a program to swap two numbers without using third variable.
b. Write a program to find the area of rectangle, square and circle.
c. Write a program to find the volume of a cube, sphere, and cylinder.
5. Programs on patterns:
a. Programs on different patterns.
6. Functions:
a. Programs on Functions.
7. Arrays
a. Write a program to find the largest value that is stored in the array.
b. Write a program to compute the sum of all elements stored in anarray.
c. Write a program to arrange the ‘n’ numbers stored in the array in ascending and
descending order.
d. Write a program that performs addition and subtraction of matrices.
e. Write a program that performs multiplication of matrices.
a. Designanemployeeclassforreadinganddisplayingtheemployeeinformation,the
getInfo() and displayInfo() methods will be used repectively. Where getInfo() will
be private method
b. Design the class student containing getData() and displayData() as two of its
methods which will be used for reading and displaying the student information
respectively.WheregetData() will be private method.
c. Design the class Demo which will contain the following methods: readNo(),
factorial() for calculating the factorial of a number, reverseNo() will reverse the
given number, isPalindrome() will check the given number is palindrome,
isArmstrong() which will calculate the given number is armStrong or
not.WherereadNo() will be private method.
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1 Understand the concepts and techniques used in digital electronics.
CO 2 To acquire basic knowledge for the conversion of different type of codes and number
systems, which are used in digital communication and computer system.
CO 3 Analyze different types of digital electronic circuit using various mapping and logical
tools.
CO 4 Enable students to develop skill to build digital circuits using Simulators
CO 5 Understand, analyze, design and implement combinational and sequential logic circuits.
Flip-Flop:
Introduction, Terminologies used, S-R flip-flop, D flip-fop, JK flip-
flop, Race-around condition, Master–slave JK flip-flop, T flip-flop,
conversion from one type of flip-flop to another, Application of flip-
flops.
V Counters:
Introduction, Asynchronous counter, Terms related to counters, IC 7493 (4-
12
bit binary counter), Synchronous counter, Bushing, Type T Design, Type JK
Design, Presettable counter, IC 7490, IC 7492, Synchronous counter ICs,
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1 Understand the role of Green Computing and their impact on the global
carbon footprint
CO 2 Estimate the carbon footprint of the Green Computing operations of an
organization
CO 3 Reduce the carbon footprint by changes to policies for procurement of
Green Computing
CO 4 Impart various recycling and virtualization procedures
CO 5 Revise business processes by imparting Green Computing techniques
III Going Paperless Paper Problems The Environment & Your Costs Paper and
Your Office Practicality, Storage, Destruction Going Paperless Organizational 12
Electronic Data Interchange (EDI) Nuts and Bolts, Value Added Networks,
Advantages, Obstacles.
Datacenter Design and Redesign Energy Consumption Growth, Other Costs
Design Efficiency, Floor Layout, Server Configuration, Floor Vent Tiles,
Rightsizing
V Recycling & Virtualization Problems China, Africa, Materials Means of
Disposal Recycling, Refurbishing, Make the Decision
Life Cycle From Cradle to Grave, Life, Cost, Green Design Recycling
Companies Finding the Best One, Checklist, Certifications Hard Drive
Recycling Consequences, How to Clean a Hard Drive, Which Method?
12
CDs and DVDs Bad News, Good News, Change Your Mindset Virtualization
Server Virtualization Server Virtualization Introduction, Advantages, Best
Practices, Use Caution
Server Virtualization Solutions VMware Infrastructure 3, Microsoft Virtual
Server 2005
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1 Familiarize with the philosophy and the concept of Human Rights.
CO 2 Understand the norms, standards and mechanisms of International
Human Rights
CO 3 Understand the execution of Human Rights policies in India
CO 4 Create an understanding of the various systems and provisions that can
foster Human Rights.
CO 5 Sensitize the diverse Human Rights issues in terms of their complex
nature
1949, 1977 Geneva Protocols II & I. ii) Basic principles: humanity, protection
of civilians and civilian objects, humane treatment of prisoners and civilians
under custody, prohibition of use of weapons and methods of warfare, causing
superfluous injury and unnecessary suffering, prohibition of widespread,
long-term and severe damage to natural environment. iii) Indian Geneva
Conventions Act 1949: Indian Red Cross Society iv) The role of International
Committee of Red Cross
V EVOLUTION OF THE CONCEPT OF HUMAN RIGHTS AND
DUTIES IN INDIA i) Evolution of the composite culture of India,
contribution of diverse religions ii) Concepts of human welfare, rights and
duties, totality of the cosmology of universe with human beings as its intrinsic 12
part iii) Human rights and duties in contemporary India: Law, politics and
society iv) Social movements of the 19th and 20th centuries, independence
movement, Gandhi, Nehru, Ambedkar etc. v) Making of the Constitution
1. UN Centre for Human Rights, Elimination of all Forms of Intolerance and Discrimination
Based on Religion or Belief (New York: UN Publication Division, 1989).
2. UN Centre for Human Rights, Human Rights Machinery (Geneva: World Campaign for Human
Rights, 1987).
3. UN Centre for Human Rights, International Human Rights Standards for Law Enforcement
(Geneva: World Campaign for Human Rights, 1996).
4. UN Centre for Human Rights, International Humanitarian Law and Human Rights (Geneva:
World Campaign for Human Rights, 1992).
5. UN Centre for Human Rights, National Institutions for the Promotion and Protection of Human
Rights (Geneva: World Campaign for Human Rights, 1993).
6. UN Centre for Human Rights, Special Issue on Implementation of International Human Rights
Instruments (New York, 1990).
7. UN Centre for Human Rights, The International Bill of Human Rights (Geneva: World
Campaign for Human Rights, 1996).
8. UN High Commissioner for Human Rights, An Introduction: Making Human Rights a Reality
(New York: UN Publication Division, 1996).
9. UN World Campaign for Human Rights, The African Charter on Human and People’s Rights
(Geneva: UN Publication Division, 1990).
10. UN, Declaration of the Right to Development (New York: UN Department of Public
Information, 1988).
11. UN, Human Rights and Scientific and Technological Developments (New York: UN
Department of Public Information, 1982).
12. UN, The Universal Declaration of Human Rights 1948-1998 (New York: UN Department of
Public Information, 1998).
13. UN, United Nations Action in the Field of Human Rights (New York: UN Publication Division,
1994).
14. UN, United Nations and Human Rights (New York: UN Publication Division, 1984).
15. UN, World Conference on Human Rights: The Vienna Declaration and Programme of Action
(New York: UN, 1995).
16. UNESCO, Human Rights: Major International Instruments: Status as at 31 May 1999
(Paris:UNESCO, 1999).
17. UNESCO, International Dimensions of Humanitarian Law (Paris: UNESCO, 1988).
18. UNESCO, Philosophical Formulations of Human Rights (Paris: UNESCO, 1986).
19. UNESCO, Taking Action for Human Rights in the Twenty-first Century (Paris: UNESCO,
1998).
20. UNESCO, UNESCO and Human Rights (Paris: UNESCO, 1999).
21. UNHRC, Collection of International Instruments and other Legal Texts Concerning Refugees
and Displaced Persons (UNHRC, 1995)
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1 Analyse the structure and functions of operating systems.
CO 2 Understand role of operating system as process manager, resource manager, file
system manager, memory manager and I/O manager.
CO 3 Understand the Mutual exclusion and Deadlock detection.
CO 4 Understand benefits of cloud and virtualization. Understand differences of three
types of computing: multiprocessor, multicomputer and distributed systems.
CO 5 Compare various types of computing systems
Kernel Memory.
Protection and Security: Protection -principles of protection, domain of
protection, access matrix, access control; Security- threats, user
authentication.
V Storage management: File system Interface — file concept, access methods,
directory structure, File Sharing. File system implementation- file system
structure & implementation, directory implementation, allocation methods,
12
free space management; Mass storage management - disk structure, disk
scheduling, RAID; I/O Systems- I,/O hardware, Application I/O interface,
kernel I/O subsystem.
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1 Understand basic database concepts, including the structure and operation of the
relational data model.
CO 2 Apply logical database design principles, including E-R diagrams and database
normalization.
CO 3 Enhance the knowledge and understanding of Database analysis and design
CO 4 Construct simple database queries using Oracle.
CO 5 Handle unexpected exceptions effectively
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1 Understand Internet and Web Programming basic concepts
CO 2 Understand the front end and back-end Web Applications.
CO 3 Develop Web pages using web programming tools and techniques.
CO 4 Develop static and dynamic Web Applications.
CO 5 Integrate and blend latest web technologies for creating Web Applications.
2. SQL Statements – 2
a. Displaying Data from Multiple Tables
b. Aggregating Data Using Group Functions
c. Subqueries
3. Manipulating Data
a. Using INSERT statement
b. Using DELETE statement
c. Using UPDATE statement
6. PL/SQL Basics
a. Declaring Variables
b. Control Structures
c. Procedures
d. Functions
e. Exception Handling
f. Packages
g. Triggers
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1 Learn the concepts of probability and distributions
CO 2 Gain insight into consequences of plan by probability techniques and processing
samples using sampling techniques
CO 3 Draw valid conclusion using estimation theory and proper decision using
decision theory
CO 4 Learn techniques to correlate the relationship between various variables
CO 5 Demonstrate the concepts of numerical methods used for different applications
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1 Understand the concept of a search engine optimization
CO 2 Distinguish different types of digital marketing
CO 3 Apply various web analytics tools for search engine optimization and
digital marketing
CO 4 Promote a website and define rules for publishing a website.
CO 5 Apply optimization techniques for greater visibility of a website on
search engines
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
functions
Forms in PHP: Creating a simple input form, combining HTML & PHP code
on a single page, redirecting the user ,creating a send mail form, File upload
form
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
Software Testing: System Testing, Component Testing, Test Case Design, Test
Automation.
Software Measurement: Size-Oriented Metrics, Function-Oriented Metrics,
Extended Function Point Metrics
Software Cost Estimation: Software Productivity, Estimation Techniques,
Algorithmic Cost Modelling, Project Duration and Staffing
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
Types
Strings: A String Is a Sequence, Traversal with a for Loop, String Slices,
Strings Are Immutable, Searching, Looping and Counting, String Methods,
The in Operator, String Comparison, String Operations.
III Lists: Values and Accessing Elements, Lists are mutable, traversing a List,
Deleting elements from List, Built-in List Operators, Concatenation, 12
****
*********
*******
a=[1,1,2,3,5,8,13,21,34,55,89]
and write a program that prints out all the elements of the list that are less than 5.
Now open a new file and save it in the same directory. You should now be able
importgeometry
Try and add print dir(geometry)to the file and run it.
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
Storage Android SQLite SQLite Tutorial SQLite Spinner XML and JSON
XML Parsing SAX, XML Parsing DOM XML Pull Parser JSON Parsing
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
of Tokens, How Tokens, Privileges, SIDs, ACLs, and Processes Relate, Three
Reasons Applications Require Elevated Privileges, Solving the Elevated
Privileges Issue, A Process for Determining Appropriate Privilege
Protecting Secret Data: Attacking Secret Data, Sometimes You Don’t Need
to Store a Secret, Getting the Secret from the User, Protecting Secrets in
Windows OS, Not Opting for a Least Common Denominator Solution,
Managing Secrets in Memory
IV Database Input Issues: The Issue, Pseudo remedy #1: Quoting the Input,
Pseudo remedy #2: Use Stored Procedures, Remedy #1: Never Ever Connect 12
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
swap chain and Page flipping, Depth Buffering, Texture Resource Views,
Multisampling Theory and MS in Direct3D, Feature Levels
Direct3D 11 Rendering Pipeline: Overview, Input Assembler Stage (IA),
Vertex Shader Stage (VS), The Tessellation Stage (TS), Geometry Shader
Stage (GS), Pixel Shader Stage (PS), Output merger Stage (OM)
Understanding Meshes or Objects, Texturing, Lighting, Blending.
IV Interpolation and Character Animation:
Trigonometry: The Trigonometric Ratios, Inverse Trigonometric Ratios, 12
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
Information and Event Management (SIEM). Voice over IP (VoIP) and PBX
Security: Background, VoIP Components, VoIP Vulnerabilities and
Countermeasures, PBX, TEM: Telecom Expense Management.
Operating System Security Models: Operating System Models, Classic
Security Models, Reference Monitor, Trustworthy Computing, International
Standards for Operating System Security.
V Virtual Machines and Cloud Computing: Virtual Machines, Cloud
Computing.
Secure Application Design: Secure Development Lifecycle, Application
Security Practices, Web Application Security, Client Application Security,
12
Remote Administration Security.
Physical Security: Classification of Assets, Physical Vulnerability Assessment,
Choosing Site Location for Security, Securing Assets: Locks and Entry Controls,
Physical Intrusion Detection.
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 1 Understand the basics of software security, operations security and service level
security.
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
III Introduction: Black Hat vs. Gray Hat vs. White Hat (Ethical) hacking, Why
is Ethical hacking needed?, How is Ethical hacking different from security 12
8. https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents
9. https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_ Guide
10. https://cve.mitre.org/
11. https://access.redhat.com/blogs/766093/posts/2914051
12. http://resources.infosecinstitute.com/applications-threat-modeling/#gref
13. http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html
Appendix 1
(Performa for the certificate for internship in official letter head)
Signature:
Name:
Designation:
Contact number:
Email:
Appendix 2
(Performa for the Evaluation of the intern by the supervisor/to whom the intern was
reporting in the organization)
Professional Evaluation of Intern
Name of intern:
College/institution:
[Note: Give a score in the 1-5 scale by putting √ in the respective cells]
Sr Particular Excellent Very Good Moderate Satisfactory
No Good
1 Attendance
2 Punctuality
3 Adaptability
4 Ability to shoulder
responsibility
5 Ability to work in
a team
6 Written and oral
communication
skills
7 Problem solving
skills
8 Ability to grasp
new concepts
9 Ability to
complete task
10 Quality of work
done
Comments:
Signature:
Name:
Designation:
Contact number:
Email:
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
II IDA PRO: Loading an executable, IDA Pro Interface, Using cross references,
Analysing functions, Using graphing options, Enhancing disassembly,
12
Extending IDA with plug-ins.
Recognizing C Code constructs in assembly: Global v/s local variables,
Disassembling arithmetic operations, recognizing if statements, recognizing
loops, function call conventions, Analysing switch statements, Disassembling
arrays, Identifying structs, Analysing linked list traversal. Analysing Malicious
Windows Programs: The windows API, The Windows Registry, Networking
APIs, Understanding running malware. Kernel v/s user mode, Native API.
Advanced Dynamic Analysis – Debugging: Source-level v/s Assembly-level
debugging, kernel v/s user mode debugging, Using a debugger, Exceptions,
Modifying execution with a debugger, modifying program execution.
III Advanced Dynamic Analysis – OLLYDBG: Loading Malware, The Ollydbg
Interface, Memory Map, Viewing threads and Stacks, Executing code, 12
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
3. CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition, O’Reilly, 4th
Edition, 2019
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
Setting Up Your AI for Cyber security Arsenal, Getting to know Python for
AI and cyber security, Python libraries for AI, Enter Anaconda; the data
scientist's environment of choice, Playing with Jupyter Notebooks, Installing
DL libraries
II Ham or Spam? Detecting Email Cyber security Threats with AI, Detecting
spam with Perceptron, Spam detection with SVMs, Phishing detection with
12
logistic regression and decision trees, Spam detection with Naive Bayes, NLP
to the rescue
III Network Anomaly Detection with AI, How to classify network attacks,
Detecting botnet topology, Different ML algorithms for botnet detection 12
sample data and running Jupyter Notebook in the cloud, Evaluating the quality
of our predictions
GANs in a nutshell, GAN Python tools and libraries, Network attack via
model substitution, IDS evasion via GAN, Facial recognition attacks with
GAN
V Best practices of feature engineering, Evaluating a detector's performance
with ROC, How to split data into training and test sets, Using cross validation
for algorithms 12
Evading ML detectors, Challenging ML anomaly detection, Testing for data
and model quality, Ensuring security and reliability
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
CO 2 Evaluate the effectiveness of the individual elements and the overall security
system of the organization.
CO 3 Detect various attacks across the network
CO 4 Report any attacks on network on real time situation
CO 5 Take appropriate actions to avoid or mitigate the attacks
Management
Introduction to Enterprise Mobility Management Mobile Device Management
Configuration and Change Management
Configuration Management Change Management Vulnerability Management
Vulnerability Identification Finding Information about a Vulnerability
Vulnerability Scan Penetration Assessment
Product Vulnerability Management
Vulnerability Analysis and Prioritization
Vulnerability Remediation Patch Management References and Additional
Readings
Fundamentals of Cryptography and Public Key Infrastructure (PKI)
Cryptography Ciphers and Keys
Ciphers Keys Block and Stream Ciphers
Symmetric and Asymmetric Algorithms
Symmetric Algorithms Asymmetric Algorithms Hashes Hashed Message
Authentication Code Digital Signatures
Digital Signatures in Action Key Management
Next-Generation Encryption Protocols
IPsec and SSL IPsec SSL Fundamentals of PKI Public and Private Key Pairs
RSA Algorithm, the Keys, and Digital Certificates
Certificate Authorities Root and Identity Certificates Root Certificate Identity
Certificate X.500 and X.509v3 Certificates
Authenticating and Enrolling with the CA
Public Key Cryptography Standards
Simple Certificate Enrollment Protocol
Revoking Digital Certificates Using Digital Certificates PKI Topologies Single
Root CA
Hierarchical CA with Subordinate CAs
Cross-certifying CAs Exam Preparation Tasks
Review All Key Topics Complete Tables and Lists from Memory
Introduction to Virtual Private Networks (VPNs)
Chain of Custody
Fundamentals of Microsoft Windows Forensics Processes, Threads, and
Services
Memory Management Windows Registry
The Windows File System Master Boot Record (MBR) The Master File Table
(MFT)
Data Area and Free Space FAT
NTFS MFT Timestamps, MACE, and Alternate Data Streams EFI
Fundamentals of Linux Forensics Linux Processes Ext4
Journaling Linux MBR and Swap File System
Exam Preparation Tasks
Fundamentals of Intrusion Analysis
Common Artifact Elements and Sources of Security Events False Positives,
False Negatives, True Positives, and True Negatives
Understanding Regular Expressions
Protocols, Protocol Headers, and Intrusion Analysis Using Packet Captures for
Intrusion Analysis Mapping Security Event Types to Source Technologies
IV Introduction to Incident Response and the Incident Handling Process
Introduction to Incident Response 12
What Are Events and Incidents? The Incident Response Plan The Incident
Response Process
The Preparation Phase The Detection and Analysis Phase Containment,
Eradication, and Recovery Post-Incident Activity (Postmortem) Information
Sharing and Coordination Incident Response Team Structure The Vocabulary
for Event Recording and Incident Sharing (VERIS)
Incident Response Teams
Computer Security Incident Response Teams (CSIRTs) Product Security
Incident Response Teams (PSIRTs) Security Vulnerabilities and Their Severity
Vulnerability Chaining Role in Fixing Prioritization Fixing Theoretical
Vulnerabilities Internally Versus Externally Found Vulnerabilities National
CSIRTs and Computer Emergency Response Teams (CERTs) Coordination
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
Using the Kali Linux virtual machine - the easiest way Installing Metasploit
on Windows Installing Metasploit on Linux Setting up exploitable targets in
a virtual environment
Metasploit Components and Environment Configuration
Anatomy and structure of Metasploit
Metasploit components
Auxiliaries Exploits Encoders Payloads
Post, Playing around with msfconsole
Variables in Metasploit
Updating the Metasploit Framework
IV Information Gathering with Metasploit
Information gathering and enumeration 12
Privilege escalation
Client-side Attacks with Metasploit
Need of client-side attacks
What are client-side attacks?
What is a Shellcode? What is a reverse shell? What is a bind shell? What is
an encoder? The msfvenom utility
Generating a payload with msfvenom
Social Engineering with Metasploit
Generating malicious PDF
Creating infectious media drives
V Approaching a Penetration Test Using Metasploit
Organizing a penetration test
Preinteractions
Intelligence gathering/reconnaissance phase Predicting the test grounds
Modeling threats Vulnerability analysis
Exploitation and post-exploitation
Reporting Mounting the environment
Setting up Kali Linux in virtual environment
The fundamentals of Metasploit
Conducting a penetration test with Metasploit Recalling the basics of
Metasploit 12
Benefits of penetration testing using Metasploit Open source
Support for testing large networks and easy naming conventions
Smart payload generation and switching mechanism Cleaner exits The GUI
environment
Penetration testing an unknown network Assumptions Gathering intelligence
Using databases in Metasploit Modeling threats
Vulnerability analysis of VSFTPD backdoor The attack procedure
The procedure of exploiting the vulnerability
Exploitation and post exploitation
Vulnerability analysis of PHP-CGI query string parameter vulnerability
COURSE OUTCOMES:
COURSE DESCRIPTION
OUTCOME
After Completing this course student will be able to:
V Mobile Phone Forensics: Crime and Mobile Phones, Voice, SMS and
Identification of Data Interception in GSM, Mobile Phone Tricks, SMS 12
Security, Mobile Forensic.
The project report should be documented with scientific approach to the solution of the problem
that the students have sought to address. The project report should be prepared in order to solve
the problem in a methodical and professional manner, making due references to appropriate
techniques, technologies and professional standards. The student should start the documentation
process from the first phase of development so that one can easily identify the issues to be focused
upon in the ultimate project report. The student should also include the details from the project
diary, in which they will record the progress of their project throughout the course. The project
report should contain enough details to enable examiners to evaluate the work. The important
points should be highlighted in the body of the report, with details often referred to appendices.
(Note: All entries of the Performa of approval should be filled up with appropriate and complete
information. Incomplete Performa of approval in any respect will be summarily rejected.)
By(12 Bold)
COLLEGE LOGO
College Logo
This is to certify that the project entitled, "Title of The Project", is bonafied work of NAMEOF
THE STUDENT bearing Seat. No: (NUMBER) submitted in partial fulfillment of the
requirements for the award of degree of BACHELOR OF VOCATION in CYBER SECURITY
AND FORENSICS from University of Mumbai. (12, times new roman, justified)
External Examiner
ACKNOWLEDGEMENT
(20, BOLD, ALL CAPS, CENTERED)
The acknowledgement should be in timesnewroman,12 font with 1.5 line spacing,
justified.
(Declaration page format)
I hereby declare that the project entitled, ‘Title of the Project’ done at place where the
project is done, has not been in any case duplicated to submit to any other university for the award
of any degree. To the best of my knowledge other than me, no one has submitted to any other
university.
The project is done in partial fulfillment of the requirements for the award of degree of
BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY) to be submitted
as final semester project as part of our curriculum.