Categories
- Pharmacy
- Nursing
-
MBA
-
BBA
- U.P. State University
- Veer Bahadur Singh Purvanchal University, Jaunpur
- Chaudhary Charan Singh University, Meerut
- Dr. Bhimrao Ambedkar University, Agra
- Chhatrapati Shahu Ji Maharaj University, Kanpur
- Mahatma Jyotiba Phule Rohilkhand University, Bareilly
- Mahatma Gandhi Kashi Vidyapith, Varanasi
- Dr. Ram Manohar Lohia Avadh University, Ayodhya
- Deen Dayal Upadhyaya Gorakhpur University
- Prof. Rajendra Singh (Rajju Bhaiya) University, Prayagraj
- BCA
-
B Ed
- Lucknow University B.Ed Books
- Chaudhary Charan Singh University/Maa Shakambhari University, Saharanpur
- Dr Bhim Rao Ambedkar University, Agra
- Mahatma Gandhi Kashi Vidyapeeth, Varanasi
- Chhatrapati Shahu Ji Maharaj University
- Prof. Rajendra Singh (Rajju Bhaiya) University, Prayagraj (PRSU)
- Mahatma Jyotiba Phule Rohilkhand University(Mjpru), Bareilly
- Dr. Ram Manohar Lohia Avadh University, Ayodhya
- Bundelkhand University, Jhansi
- Deen Dayal Upadhyaya Gorakhpur University
- Veer Bahadur Purvanchal University (VBPU)
- Maharaja Suhel Dev State University ,Azamgarh (MSDSU)
- Raja Mahendra Pratap Singh State University, Aligarh (RMPSSU)
- Barkatullah Vishwavidyalaya (Bhopal)
- Jiwaji University (Gwalior)
- Vikram University (Ujjain)
- Dr. Harisingh Gour University (Sagar)
- Devi Ahilya Vishwavidyalaya (Indore)
- Rani Durgavati Vishwavidyalaya (Jabalpur)
- Awadhesh Pratap Singh University (Rewa)
- Maharaja Chhatrasal Bundelkhand University (Chhatarpur)
- D. EL. ED
- TET
-
B Com
-
B Sc
- B.Sc. U.P. State Universities Common Syllabus NEP
- Veer Bahadur Singh Purvanchal University, Jaunpur
- University of Lucknow
- Chaudhary Charan Singh University, Meerut
- Madhya Pradesh
- Chhatrapati Shahu Ji Maharaj University, Kanpur
- Dr. Bhimrao Ambedkar University, Agra
- Mahatma Gandhi Kashi Vidyapith, Varanasi
- DEEN DAYAL UPADHYAYA GORAKHPUR UNIVERSITY
- Prof. Rajendra Singh (Rajju Bhaiya) University, Prayagraj
- Dr. Ram Manohar Lohia Avadh University, Ayodhya
- Mahatma Jyotiba Phule Rohilkhand University, Bareilly
- Uttarakhand State Universities
- B.Sc. Bihar Universities Common Syllabus NEP
- University of Rajasthan (Jaipur)
- Haryana
-
B A
- B.A. Of U.P. State Universities Common Syllabus NEP
- Veer Bahadur Singh Purvanchal University, Jaunpur
- University of Lucknow
- Chaudhary Charan Singh University, Meerut
- Chhatrapati Shahu Ji Maharaj University, Kanpur
- Dr. Bhimrao Ambedkar University, Agra
- Mahatma Gandhi Kashi Vidyapith, Varanasi
- Deen Dayal Upadhyaya Gorakhpur University
- Prof. Rajendra Singh (Rajju Bhaiya) University, Prayagraj
- Dr. Ram Manohar Lohia Avadh University, Ayodhya
- Mahatma Jyotiba Phule Rohilkhand University, Bareilly
- Madhya Pradesh
- Uttarakhand
- Bihar
- University of Rajasthan (Jaipur Syllabus as Per NEP2020)
- Haryana NEP-2020
- B Tech
Cyber Security

ISBN- 978-93-5480-068-9
AUTHORS- Nutan Prakash Joshi, Ms. Manishaben Jaiswal, Prof. Dhananjay Murlidhar Wagh
Tax excluded
ISBN- 978-93-5480-068-9
AUTHORS- Nutan Prakash Joshi, Ms. Manishaben Jaiswal, Prof. Dhananjay Murlidhar Wagh
Syllabus
CYBER SECURITY
(Course Code: CA-501)
Unit
|
Topic
|
No of lectures
|
1
|
Chapter 1:- Introduction to Cyber Crime and Cyber Security
1.1 Introduction 1.2 Cybercrime: Definition and Origin of the Word 1.3 Cybercrime and Information Security 1.4 Who are Cybercriminals? 1.5 Classifications of Cybercrimes: E-Mail Spoofing, Spamming, Cyber defamation, Internet Time Theft, Salami Attack/Salami Technique, Data Diddling,Forgery, Web Jacking, Newsgroup, Spam/Crimes Emanating from Usenet Newsgroup, Industrial Spying/Industrial Espionage, Hacking,OnlineFrauds,Computer Sabotage, Email Bombing/Mail Bombs, Computer Network Intrusions, Password Sniffing, Credit Card Frauds, Identity Theft 1.6 Definition of Cyber Security 1.7 Vulnerability, Threats and Harmful acts 1.8 CIA Triad 1.9 Cyber Security Policy and Domains of Cyber Security Policy |
(07)
|
2
|
Chapter 2:- Cyber offenses and Cyberstalking
2.1 Criminals Plan: Categories of Cybercrime Cyber Attacks: Reconnaissance, Passive Attack, Active Attacks, Scanning/Scrutinizing gathered Information, Attack (Gaining and Maintaining the System Access), Social Engineering, and Classification of Social Engineering. 2.2 Cyberstalking: Types of Stalkers, Cases Reported on Cyberstalking, Working of Stalking 2.3 Real-Life Incident of Cyber stalking 2.4 Cybercafe and Cybercrimes 2.5 Botnets: The Fuel for Cybercrime, Botnet, Attack Vector 2.6 Cybercrime: Mobile and Wireless Devices – Proliferation - Trends in Mobility 2.7 Credit Card Frauds in Mobile and Wireless Computing Era 2.8 Security Challenges Posed by Mobile Devices 2.9 Authentication Service Security 2.10 Attacks on Mobile/Cell Phones
|
(10)
|
3
|
Chapter 3:- Tools and Methods Used in Cybercrime
3.1 Introduction 3.2 Proxy Servers and Anonymizers 3.3 Phishing 3.4 Password Cracking 3.5 Keyloggers and Spywares 3.6 Virus and Worms 3.7 Trojan Horses and Backdoors 3.8 Steganography 3.9 DoS and DDoS Attacks 3.10 SQL Injection
|
(05)
|
4
|
Chapter 4:- Cybercrimes and Cyber security: The Legal Perspectives
4.1 Introduction 4.2 Cybercrime and the Legal Landscape around the World 4.3 Why Do We Need Cyberlaws: The Indian Context 4.4 The Indian IT Act 4.5 Challenges to Indian Law and Cybercrime Scenario in India 4.6 Consequences of not Addressing the Weakness in Information Technology Act 4.7 Digital Signatures and the Indian IT Act 4.8 Amendments to the Indian IT Act 4.9 Cybercrime and Punishment 4.10 Cyberlaw, Technology and Students: Indian Scenario
|
(07)
|
5
|
Chapter 5:- Cyber Forensics
5.1 Introduction 5.2 Historical background of Cyber forensics 5.3 Digital Forensics Science 5.4 The Need for Computer Forensics 5.5 Cyber Forensics and Digital evidence 5.6 Forensics Analysis of Email 5.7 Digital Forensics Lifecycle 5.8 Challenges in Computer Forensics
|
(06)
|
6
|
Chapter 6:- Cybersecurity: Organizational Implications
6.1 Organizational Implications: Cost of cybercrimes and IPR issues 6.2 Web threats for organizations 6.3 Security and Privacy Implications from Cloud Computing 6.4 Social media marketing 6.5 Social computing and the associated challenges for organizations, Protecting people’s privacy in the organization 6.6 Organizational guidelines for Internet usage and safe computing guidelines and computer usage policy 6.7 Incident handling 6.8 Intellectual property in the cyberspace of cyber security. |
(07)
|
7
|
Chapter 7:- Cybercrime: Illustrations, Examples and Mini-Cases
7.1Real-Life Examples 7.2 Mini-Cases 7.3 Illustrations of Financial Frauds in Cyber Domain 7.4 Digital Signature-Related Crime Scenarios 7.5 Digital Forensics Case Illustrations 7.6 Online Scams
|
(06)
|