githubEdit

CSC401 / Cyber Security

Syllabus

Resources

chevron-rightM1: Introduction to Applied Cryptosystemshashtag

[⤓] 1.1 Basic of Cryptographyarrow-up-right

[⤓] 1.1 Protocols for identification and loginarrow-up-right

[⤓] 1.2 challenge-response, auth protocol and its attacksarrow-up-right

[⤓] 1.2 Schnorr’s identification protocolarrow-up-right

[⤓] 1.2 Secret Key Cryptographyarrow-up-right

[⤓] 1.3 Data Encryption Standardarrow-up-right

[⤓] 1.3 Proving properties in zero knowledgearrow-up-right

[⤓] 1.4 One-sided authenticated key exchangearrow-up-right

[⤓] 1.4 Security Goalsarrow-up-right

[⤓] 1.5 Security of protocol AKE1, PAKE0, PAKE1, PAKE2arrow-up-right

MODULE 1 - CSC401 - STRUCTURED SYLLABUS

  • Protocols for Identification and Login:

    • Interactive Protocols

    • ID Protocols

    • Password Protocols

    • Challenge-Response Protocols

    • Schnorr's Identification Protocol

  • Proving Properties in Zero Knowledge:

  • Authenticated Key Exchange:

    • One-sided Authenticated Key Exchange

    • Security of Protocol AKE1

    • Protocol PAKE0

    • Protocol PAKE1

    • Protocol PAKE2

chevron-rightM2: Fundamentals of Security Protocols and usagehashtag

[⤓] 2.1 SCParrow-up-right

[⤓] 2.1 Secure Copy Protocol (SCP)arrow-up-right

[⤓] 2.2 SSH (Secure Shell)arrow-up-right

[⤓] 2.3 SSL (Secure Sockets Layer)arrow-up-right

[⤓] 2.4 TLS (Transport Layer Security)arrow-up-right

[⤓] 2.5 Digital Signaturearrow-up-right

[⤓] 2.5 STARTTLSarrow-up-right

[⤓] 2.6 IPSec (Internet Protocol Security)arrow-up-right

[⤓] 2.7 VPN (Virtual Private Network)arrow-up-right

[⤓] 2.8 HTTPS (Hyper Text Transfer Protocol Secure)arrow-up-right

[⤓] 2.9 Encrypting and Signing Emails-PGParrow-up-right

[⤓] 2.10 Encrypting and Signing Emails DKIMarrow-up-right

[⤓] 2.11 Encrypting and Signing Emails-SPFarrow-up-right

[⤓] 2.12 Single Sign On (SSO)arrow-up-right

[⤓] 2.13 Signature and Anomaly based detectionarrow-up-right

[⤓] 2.14 Honeypots and Honeynetsarrow-up-right

MODULE 2 - CSC401 - STRUCTURED SYLLABUS

  • Security Protocols and Standards:

    • SCP (Secure Copy Protocol)

    • SSH (Secure Shell)

    • SSL (Secure Sockets Layer)

    • TLS (Transport Layer Security)

    • STARTTLS

    • IPSec (Internet Protocol Security)

    • VPN (Virtual Private Network)

    • HTTPS (Hypertext Transfer Protocol Secure)

  • Encrypting and Signing Emails:

    • PGP (Pretty Good Privacy) - GPG/OpenPGP

    • DKIM (DomainKeys Identified Mail)

    • SPF (Sender Policy Framework)

  • Single Sign-On (SSO):

    • OAuth

    • OpenID

  • Security Monitoring and Management:

    • Signature and Anomaly Based Detection

    • Honeypots and Honeynets

    • Network Log Management (syslog or SPLUNK)

  • Role-Based Access Control (RBAC):

    • Role Mining

  • Domain Name System (DNS):

    • Dig Tool

    • DNSSEC (DNS Security Extensions) - DS and NSEC Records

chevron-rightM3: Implementation of Cryptosystemshashtag

MODULE 3 - CSC401 - STRUCTURED SYLLABUS

  • Authenticated Key Exchange:

    • Goals for Authentication and Key Establishment

    • Encryption-based Protocol and its Attacks

    • Perfect Forward Secreteness

    • Protocol based on Ephemeral Encryption

    • Attacks on Insecure Variations

    • Identity Protection

    • Password Authenticated Key Exchange (PAKE)

      • Phishing Attacks

    • Explicit Key Confirmation

chevron-rightM4: Network Security Primitiveshashtag

MODULE 4 - CSC401 - STRUCTURED SYLLABUS

  • Classes of Key Agreement Protocols:

    • Pairing-based Cryptographic Protocols

    • ID-based Encryption Schemes

    • Conference Key Protocols

    • Security Goals (for Key Agreement)

    • Static and Dynamic Groups

    • Key Exchange Protocol

  • Techniques for Network Protection:

    • Monitoring and Detection

    • Firewalls:

      • Packet Filter Firewalls

      • Stateful Firewalls

      • Application-Aware Firewalls

      • Personal Firewalls

    • Proxies

    • NAT (Network Address Translation)

    • ACL (Access Control List)

chevron-rightM5: Security issues and solutionshashtag

MODULE 5 - CSC401 - STRUCTURED SYLLABUS

  • Intrusion Detection Systems (IDS):

    • Snort

  • Attack Techniques:

    • Network Reconnaissance:

      • Nmap

      • Vulnerability Audits - OpenVAS

    • DNS-based Attacks:

    • Phishing:

      • DNSTwist

    • Network-based Malware Attacks:

      • Remote Access Trojan (e.g., Poison Ivy)

      • Domain Name Generation Algorithm (DGA) based Botnets

    • LAN Attacks:

      • ARP Cache Poisoning (Ettercap/arp spoof)

      • MAC Flooding

      • Man-in-the-Middle Attacks

      • Port Stealing

      • DHCP Attacks

      • VLAN Hopping

    • Network Sniffing:

      • Wireshark

    • Password Cracking:

      • John the Ripper

    • Attacks on SSL/TLS:

      • SSL Stripping

      • DROWN Attack

      • POODLE Attack

  • Network Packet Creation and Manipulation:

    • Scapy Library

    • dpkt Library

chevron-rightM6: Protecting the Network Infrastructurehashtag

MODULE 6 - CSC401 - STRUCTURED SYLLABUS

  • Securing Network Services:

    • NTP (Network Time Protocol) - Vulnerabilities and Configuration

    • SNMP (Simple Network Management Protocol) - Vulnerabilities and Configuration

  • Network Security Technologies:

    • VPN (Virtual Private Network)

    • IPSec (Internet Protocol Security)

    • RADIUS (Remote Authentication Dial-In User Service)

    • TACACS+ (Terminal Access Controller Access Control System Plus)

  • Intrusion Prevention Systems (IPS):

    • Operation of Host-Based Intrusion Prevention Systems

    • Operation of Network-Based Intrusion Prevention Systems

  • Content and Endpoint Security

Notes

MidTerm

[⤓] CSC401-M1-Concept-Outlinearrow-up-right

[⤓] CSC401-M2-Concept-Outlinearrow-up-right

[⤓] CSC401-CYBER-SECURITY-M1+M2-SHORT-NOTES-MidTermarrow-up-right

[⤓] CSC401-CYBER-SECURITY-M1+M2-Concept-Diagrams-MidTermarrow-up-right

EndSem

[⤓] CSC401-M3+4+5+6-Concept-Diagramarrow-up-right

Question Directory

[⤓] CSC401-Applied-Crypto-QUESTION-BANK-BTECHarrow-up-right

[⤓] CSC401-Applied-Crypto-QUESTION-BANK-ANSWERS+CONCEPT-DIAGRAMarrow-up-right

Assignment Questions

[⤓] CSC401-CYBER-Assignment-MidTermarrow-up-right

Previous Year Questions

[⤓] Y2S4-CSC401-CYBERSEC-MidTerm-PYQ-Apr25arrow-up-right

[⤓] Y2S4-CSC401-CYBERSEC-EndSem-PYQ-Jun25arrow-up-right

Get Credited for sharing your Knowledge Source with your Peers
Submit Queries/Feedbacks/Suggestions/Complaints using this Form

Last updated