# CSC301 / Cyber Security

## Syllabus

<details>

<summary>M1: Cryptography</summary>

* Overview of Cryptography
  * Introduction to Cryptography
  * Importance of Cryptography in Cybersecurity
* Identifying Resources for Hunting Cyber Threats
  * Tools and Techniques for Threat Hunting
  * Cyber Threat Intelligence (CTI)
* Security Flaws in TCP/IP Protocol
  * Vulnerabilities in TCP/IP Protocol Suite
  * Exploits and Mitigations
* Cryptography and Its Types
  * Symmetric vs. Asymmetric Cryptography
  * Key Management and Cryptographic Primitives
* Cryptographic Algorithms Used in Cybersecurity
  * RSA (Rivest-Shamir-Adleman) Algorithm
  * AES (Advanced Encryption Standard) Algorithm
  * MD5 (Message Digest Algorithm 5)
* Web Service Security Concepts
  * Securing Web Services with Cryptography
  * SSL/TLS for Web Service Security
* Understanding Attacks on Networks and Hosts
  * Common Attacks on Networks (e.g., Man-in-the-Middle)
  * Host-Based Attacks (e.g., Malware, Ransomware)
* Common Endpoint Security Technologies
  * Antivirus and Anti-malware Solutions
  * Endpoint Detection and Response (EDR)
  * Device Control and Encryption

</details>

<details>

<summary>M2: Comm. Charact. &#x26; Deploy Mechanisms</summary>

* Incident Investigation Models
  * **Kill Chain Model:** Phases of a Cyber Attack (Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, Action)
  * **Diamond Model:** Framework for Threat Analysis (Adversary, Infrastructure, Capability, Target)
* Exploit Kits and Threat Actors
  * Role of Exploit Kits in Cyber Attacks
  * Common Exploit Kits Used by Threat Actors
* Event Data Normalization and Correlation
  * Importance of Normalizing Event Data
  * Event Correlation to Identify Patterns and Suspicious Activities
* Common Attack Vectors
  * Phishing, Malware, Social Engineering, DDoS Attacks, Insider Threats
* Identifying Malicious Activities and Suspicious Behaviors
  * Behavioral Analysis to Detect Anomalies
  * Indicators of Compromise (IOCs)
* Security Incident Investigations
  * Procedures for Investigating Security Incidents
  * Using Logs and Network Data for Forensic Analysis
* Playbooks in Security Operations Centers (SOC)
  * Definition and Importance of Playbooks
  * Automating Incident Response with Playbooks
* SOC Metrics and Effectiveness
  * Key Performance Indicators (KPIs) for SOC
  * Measuring SOC Efficiency and Incident Response Times
* Workflow Management and Automation in SOC
  * Tools and Techniques to Automate SOC Workflows
  * Integration of Automation for Incident Handling

</details>

<details>

<summary>M3: Incident Reporting</summary>

* Incident Response Plan (IRP)
  * Structure and Components of an Incident Response Plan
  * Roles and Responsibilities in Incident Response
* Computer Security Incident Response Team (CSIRT)
  * Functionality and Structure of CSIRT
  * Coordination with External Agencies
* Vocabulary for Event Recording and Incident Sharing (VERIS)
  * Overview of VERIS Framework
  * Use of VERIS in Incident Reporting
* Security Incident Format
  * Common Incident Reporting Formats
  * Best Practices for Incident Documentation
* Defining the Security Operations Center (SOC)
  * Role and Function of SOC in Cybersecurity
  * Organizational Structure of a SOC
* Network Infrastructure and Security Monitoring Tools
  * Tools for Network Traffic Analysis (e.g., Wireshark, Zeek, Suricata)
  * Network Intrusion Detection Systems (NIDS)
* Common TCP/IP Attacks
  * Types of Attacks: IP Spoofing, SYN Flood, DNS Spoofing
  * Mitigation and Detection Strategies
* Endpoint Security Technologies
  * Endpoint Protection Platforms (EPP)
  * Advanced Threat Protection (ATP)
* Incident Analysis in a Threat-Centric SOC
  * Threat-Centric Approach to Security Operations
  * Analysis and Prioritization of Threats
* Event Correlation and Normalization
  * Techniques to Normalize and Correlate Security Events for Incident Response

</details>

<details>

<summary>M4: Cyber Security Issues</summary>

* Identifying Common Attack Vectors
  * Social Engineering, Phishing, Malware Delivery
  * Insiders and Advanced Persistent Threats (APTs)
* Malicious Activity and Suspicious Behavior Patterns
  * Identifying Anomalous Traffic Patterns
  * Behavioral Analytics and Anomaly Detection
* Security Incident Investigations
  * Investigating Suspicious Activities and Indicators of Compromise (IOCs)
  * Gathering Evidence and Preserving Forensics
* Using Playbook Models for Security Monitoring
  * Standardizing Incident Response with Playbook Models
  * Using Playbooks to Improve SOC Efficiency
* Network Security Monitoring (NSM) Tools
  * Use of NSM Tools for Analyzing Data Categories (Suricata, Zeek, etc.)
  * Detecting and Analyzing Network Traffic
* Endpoint Security Analysis
  * Investigating Endpoints for Malware and Threats
  * Detecting Suspicious Processes and Files on Endpoints
* Hacker Methodology
  * Steps Involved in a Cyber Attack (Reconnaissance, Exploitation, etc.)
  * Understanding Attack Methods to Improve Detection
* Malicious Traffic Hunting
  * Techniques for Hunting Malicious Traffic in Networks
  * Tools for Traffic Analysis and Threat Detection
* Event Log Correlation and Packet Captures (PCAPs)
  * Correlating Event Logs from Different Sources
  * Analyzing Packet Captures for Security Analysis
* Security Onion Tools Overview
  * Elasticsearch, Logstash, Kibana (ELK): Log Management and Visualization
  * Suricata and Zeek: Network Traffic Analysis
  * Wazuh: Host-based IDS and SIEM Integration
  * TheHive, Cortex: Incident Response and Analysis
  * NetworkMiner: Network Forensics
  * CyberChef, Stenographer: Data Analysis and Steganography

</details>

<details>

<summary>M5: Cyber Security Ops Center</summary>

* SOC Metrics and Performance Measurement
  * Key Metrics for SOC Effectiveness (Mean Time to Detect (MTTD), Mean Time to Respond (MTTR))
  * Continuous Improvement of SOC Performance
* SOC Workflow and Automation
  * Defining SOC Workflow Processes
  * Using Automation to Improve SOC Response Time
* Incident Response in the SOC
  * Response Procedures in the SOC
  * Integrating Automation for Faster Incident Handling
* Using VERIS for Incident Reporting
  * Applying VERIS to Document and Share Security Events
* Alerts and Investigation of Browser-Based Attacks
  * Identifying and Investigating Browser Exploits
  * Tools for Detecting and Mitigating Browser-Based Attacks
* Suspicious DNS Activity
  * Investigating Anomalous DNS Queries and Responses
  * Tools and Techniques for DNS Traffic Analysis
* Exploring Security Data for Analysis
  * Gathering and Analyzing Security Data from Various Sources (SIEM, IDS, Firewall Logs)
* Investigating Advanced Persistent Threats (APTs)
  * Characteristics of APTs
  * Techniques for Detecting and Mitigating APTs

</details>

## Notes

<table><thead><tr><th width="81.69140625">[⤓] </th><th width="695.29296875">Content Preview</th></tr></thead><tbody><tr><td><a href="https://drive.google.com/uc?export=download&#x26;id=10wzyWbqColKgCKv3utrsY9ukGNe_QzIa" class="button primary" data-icon="arrow-down-to-square"></a></td><td><a href="https://drive.google.com/file/d/10wzyWbqColKgCKv3utrsY9ukGNe_QzIa/view?usp=drive_link">CSC301-CYBER-SECURITY-ALL-MODULES-KEYNOTES</a> (Contributed by: Parikshit Singh)</td></tr><tr><td><a href="https://drive.google.com/uc?export=download&#x26;id=1P6xN7hAY5rPplq_U2jG4hCPCK3dEWa2V" class="button primary" data-icon="arrow-down-to-square"></a></td><td><a href="https://drive.google.com/file/d/1P6xN7hAY5rPplq_U2jG4hCPCK3dEWa2V/view?usp=drive_link">CSC301 CYBER SEC TOPICS</a></td></tr></tbody></table>

{% embed url="<https://drive.google.com/file/d/1P6xN7hAY5rPplq_U2jG4hCPCK3dEWa2V/view?usp=drive_link>" %}

## Question Directory

### Previous Year Questions

\[⤓] [Midsem-CSC301-Y2S3-BTECH-CSE-IT-OCT24](https://drive.google.com/file/d/1w7XVya7zJfldrI6q9rAX7nK-T1prVoEj/view?usp=drive_link)

{% embed url="<https://drive.google.com/file/d/1w7XVya7zJfldrI6q9rAX7nK-T1prVoEj/view?usp=drive_link>" %}

\[⤓] [CSC301-PYQ-BTECH-CSE-IT-Sem3Dec23-1](https://drive.google.com/file/d/10Q914hrGeRW5uMyos_TSWjH7LcNU8GWJ/view?usp=drive_link)

{% embed url="<https://drive.google.com/file/d/10Q914hrGeRW5uMyos_TSWjH7LcNU8GWJ/view?usp=drive_link>" %}

\[⤓] [CSC301-PYQ-BTECH-CSE-IT-Sem3Dec23-2](https://drive.google.com/file/d/10eBz91DgTlTpOQeeGyZVWAS7uryGe3JF/view?usp=drive_link)

{% embed url="<https://drive.google.com/file/d/10eBz91DgTlTpOQeeGyZVWAS7uryGe3JF/view?usp=drive_link>" %}

\[⤓][ CSC301-PYQ-BTECH-CSE-IT-Sem3Dec24](https://drive.google.com/file/d/1nuj5uyt3m4nS3NubD8h4aOhe0Qz_7hef/view?usp=drive_link)

{% embed url="<https://drive.google.com/file/d/1nuj5uyt3m4nS3NubD8h4aOhe0Qz_7hef/view?usp=drive_link>" %}

{% embed url="<https://mantavyam.notion.site/18152f7cde8880d699a5f2e65f87374e>" %}
Get Credited for sharing your Knowledge Source with your Peer
{% endembed %}

{% embed url="<https://mantavyam.notion.site/17e52f7cde8880e0987fd06d33ef6019>" %}
Submit Queries/Feedbacks/Suggestions/Complaints using this Form
{% endembed %}
