| Unit 1 [Book] | |
| Introduction to Information Security, Elements of Information Security | VIEW |
| Security System Development Life Cycle | VIEW |
| Security Professionals and Organisations | VIEW |
| Business Need for Security | VIEW |
| Threats and attacks | VIEW |
| IPR Software | VIEW |
| Hardware Threats and Attacks | VIEW |
| QoS attacks | VIEW |
| Professional, Legal, and Ethical issues in Security | VIEW |
| Unit 2 [Book] | |
| Managing IT Risk | VIEW |
| Introduction to Risk Analysis | VIEW |
| Risk Assessment | VIEW |
| IT Risk Analysis Techniques and Methodologies | VIEW |
| Risk Mitigation | VIEW |
| Business Continuity Planning | VIEW |
| Cyber Security, Cyber Crimes, Classification, Tools, and Methods of Cyber Crimes | VIEW |
| Social, Political, Ethical issues in Cyber Security | VIEW |
| Concept of Computer Forensics | VIEW |
| Unit 3 [Book] | ||
| Security Technologies: Wireless | VIEW | |
| VPNs and Firewalls | VIEW | |
| Access Controls | VIEW | |
| Prevention Systems, Honeypots, Honeynets | VIEW | |
| Intrusion Detection and Prevention (IDPS) | VIEW | |
| Digital Signatures and Certificates | VIEW | VIEW |
| Encryption | VIEW | |
| Decryption | VIEW | |
| Cryptanalysis, Ciphering Methods | VIEW | |
| Unit 4 [Book] | |
| Information System Auditing, Foundations of Information System Auditing, Objectives, Scope | VIEW |
| Audit Process Management | VIEW |
| Controls and Application Controls | VIEW |
| Information Technology Law IT Act Definition, | VIEW |
| Important terms under IT Legislation, Electronic records, Certifying authority, Jurisdictional Issues | VIEW |
| Cyber Regulation Appellate Tribunal | VIEW |
| Cyber Regulation Offences and Penalties | VIEW |