You are on page 1of 2

suppose you are the examiner of the Cyber Security subject at college level, if you conduct an

exam for the college students of this subject, what are you will be asked I will provide you with a
syllabus of this, here it is:-

1.Introduction: Introduction to Cyber Security, Importance and challenges in Cyber Security, Cyberspace,
Cyber threats, Cyberwarfare, CIA Triad, Cyber Terrorism, Cyber Security of Critical Infrastructure,
Cybersecurity - Organizational Implications

2. Hackers and Cyber Crimes: Types of Hackers, Hackers and Crackers, Cyber-Attacks and Vulnerabilities,
Malware threats, Sniffing, Gaining Access, Escalating Privileges, Executing Applications, Hiding Files,
Covering Tracks, Worms, Trojans, Viruses, Backdoors

3. Ethical Hacking and Social Engineering: Ethical Hacking Concepts and Scopes, Threats and Attack
Vectors, Information Assurance, Threat Modelling, Enterprise Information Security Architecture,
Vulnerability Assessment and Penetration Testing, Types of Social Engineering, Insider Attack,
Preventing Insider Threats, Social Engineering Targets and Defence Strategies.

4. Cyber Forensics and Auditing: Introduction to Cyber Forensics, Computer Equipment and associated
storage media, Role of forensics Investigator, Forensics Investigation Process, Collecting Network based
Evidence, Writing Computer Forensics Reports, Auditing, Plan an audit against a set of audit criteria,
Information Security Management System Management. Introduction to ISO 27001:2013

5. Cyber Ethics and Laws: Introduction to Cyber Laws, E-Commerce and E-Governance, Certifying
Authority and Controller, Offences under IT Act, Computer Offences and its penalty under IT Act 2000,
Intellectual Property Rights in Cyberspace. at Network Layer-IPSec.
1. Security Architecture - This topic falls under the Introduction to Cyber Security
(Chapter 1) as it involves understanding the foundational concepts of securing systems
and networks.
2. Encryption - Encryption is a part of various chapters, especially in Ethical Hacking and
Social Engineering (Chapter 3) regarding securing data, but it can also relate to Cyber
Forensics and Auditing (Chapter 4) when discussing securing information during
investigations.
3. Email Security - Email Security is generally discussed in the context of Cyber Forensics
and Auditing (Chapter 4) due to the need for securing communication channels and
investigating email-related cybercrimes.
4. Response Codes - This topic might be more aligned with Cyber Forensics and Auditing
(Chapter 4) as response codes can be relevant in forensic investigations and audits.
5. Matrix Mining - Matrix Mining might be associated with Threats to Information
Systems (Chapter 2), involving the analysis of various data sets to identify potential
threats or patterns.
6. Handshake Protocol and SSL Protocol Stack - These topics are typically part of
Security Architecture (Chapter 1) and Email Security (Chapter 4) as they involve
understanding protocols used to secure communication channels.
7. Threats to Information Systems - Clearly related to the section on Hackers and Cyber
Crimes (Chapter 2), focusing on identifying and understanding various threats that can
affect information systems.
8. Information Assurance - This concept falls under the Ethical Hacking and Social
Engineering (Chapter 3) section, emphasizing the importance of ensuring the integrity
and availability of information.
9. Firewalls - Firewalls are a key component of Security Architecture (Chapter 1),
discussing how networks and systems are protected by controlling incoming and
outgoing network traffic.
10. Backup - This topic is crucial in the context of Cyber Forensics and Auditing (Chapter 4),
emphasizing the importance of data backup for forensic investigations and system
recovery after a cyber incident.
11. Cybercrime - Cybercrime is a broad topic that spans across multiple chapters, primarily
within Hackers and Cyber Crimes (Chapter 2), but it's also relevant in discussing Cyber
Ethics and Laws (Chapter 5) concerning legal aspects and consequences.

You might also like