Professional Documents
Culture Documents
Em01 - Cyber Security
Em01 - Cyber Security
Science and
Engineering
Engineering Minor
• A set of four courses in an engineering stream to develop a
competency within or outside the discipline area (e.g. a computer
science engineering student choosing Cyber Security or Machine
Learning or a mechanical engineering student taking courses from
computer science engineering or as his/her engineering minor area).
It covers the concepts of cyber security with their importance and identify various
vulnerabilities and security flaws in the operating systems and networks. It also focuses on
secure social networking sites and email communications along with the prevention methods.
Course Outcome:
• Discover the basic concepts of cyber security and their importance in the cyber world.
• Identify and analyse various vulnerabilities and security flaws in the operating systems, web
servers, network equipments and to be able to patch them.
• Observe the measures to protect a system from possible security breaches.
• Observe application of scripting language in cyber security.
2) INT243 : INFORMATION SYSTEM SECURITY
It introduce the concepts of computer security incident, detection, live data collection and its forensics
duplication. It also emphasis on the data collection techniques and investigate windows systems and
routers for the audit.
Course Outcome:
• Describe the basics of incident response handling process.
• Analyze the practices and procedures involved in incident response handling process.
• Observe different methods of obtaining information and data for forensic investigation.
• Demonstrate various procedures for acquiring forensic evidences and document their details, in order
to present them as legal evidence.
Description of the Courses cont….
3) INT244: SECURING COMPUTING SYSTEMS
It covers the basic concepts of penetration testing along with the analysis of various
vulnerabilities and security flaws exist in the operating systems, web servers, network
equipments through the techniques used by hackers.
Course Outcome:
• Identify the basic concept, fundamentals and practice of penetration testing.
• Analyze various vulnerabilities and security flaws in the operating systems, web servers,
network equipment's and to be able to patch them.
• Distinguish and compare legal and illegal techniques used by hackers, specific types of attacks
and their counter measures.
4) INT245: PENETRATION TESTING
It covers the tools and technologies used by ethical hackers in order to identify weaknesses in
information system and recommend mitigation measures to increase the resistance of the
information technology (IT) infrastructure to unauthorized access.
Course Outcome:
• Recite how to analyze the outcome from the tools and technologies used by ethical hackers.
• Examine intensive assessments required to effectively identify and mitigate risks to the
information security of the infrastructure.
• Summarize weaknesses in information system and recommend mitigation measures to increase
the resistance of the information technology (IT) infrastructure to unauthorized access.
• Analyze the outcomes of their Vulnerability Assessments in the form of Penetration testing
report.
Industrial applications:
• Intelligence agencies
• Defense
• Automation systems
• Retail
• Banking
• Internet of Things
• Automotive sector
• E-commerce
Special requirements: