Unit 1 [Book] | |
Introduction to Information Security, Elements of Information Security | VIEW |
Security System Development Life Cycle | VIEW |
Security Professionals and Organisations | VIEW |
Business Need for Security | VIEW |
Threats and attacks | VIEW |
IPR Software | VIEW |
Hardware Threats and Attacks | VIEW |
QoS attacks | VIEW |
Professional, Legal, and Ethical issues in Security | VIEW |
Unit 2 [Book] | |
Managing IT Risk | VIEW |
Introduction to Risk Analysis | VIEW |
Risk Assessment | VIEW |
IT Risk Analysis Techniques and Methodologies | VIEW |
Risk Mitigation | VIEW |
Business Continuity Planning | VIEW |
Cyber Security, Cyber Crimes, Classification, Tools, and Methods of Cyber Crimes | VIEW |
Social, Political, Ethical issues in Cyber Security | VIEW |
Concept of Computer Forensics | VIEW |
Unit 3 [Book] | ||
Security Technologies: Wireless | VIEW | |
VPNs and Firewalls | VIEW | |
Access Controls | VIEW | |
Prevention Systems, Honeypots, Honeynets | VIEW | |
Intrusion Detection and Prevention (IDPS) | VIEW | |
Digital Signatures and Certificates | VIEW | VIEW |
Encryption | VIEW | |
Decryption | VIEW | |
Cryptanalysis, Ciphering Methods | VIEW | |
Unit 4 [Book] | |
Information System Auditing, Foundations of Information System Auditing, Objectives, Scope | VIEW |
Audit Process Management | VIEW |
Controls and Application Controls | VIEW |
Information Technology Law IT Act Definition, | VIEW |
Important terms under IT Legislation, Electronic records, Certifying authority, Jurisdictional Issues | VIEW |
Cyber Regulation Appellate Tribunal | VIEW |
Cyber Regulation Offences and Penalties | VIEW |