Semester 1:
|
Course |
Download |
Topic |
Watch Video |
|
e-readiness |
|||
|
e-commerce |
|||
|
Introduction to cyber crimes |
|||
|
Information Security I |
|||
|
Information Security II |
|||
|
Guidelines for choosing browser |
|||
|
Cyber Crime - Case Studies |
|||
|
Types of cyber attacks |
|||
|
Asset, Threats and Risk Management |
|||
|
Organization security & Frameworks |
|||
|
Security control designs |
|||
|
Information Security Governance |
|||
|
SDLC(I) |
|||
|
SDLC(II) |
|||
|
Introduction to Cryptography |
|||
|
Authentication and Password Security |
|||
|
Wireless Security |
|||
|
PDF
|
Cyber security initiative in India |
||
|
Managing Cyber Security |
|||
|
Wi Fi Threats and Security |
|||
|
Web Application Security |
|||
|
Cyber Security Threat Landscape |
|||
|
Intrusion Detection System |
|||
|
Cyber Security Assurance |
|||
|
Introduction to Malware |
|||
|
Social Engineering |
|||
|
National Cyber Security Strategies and policies |
|||
|
PDF
|
Semester 2 :
|
Course |
Download |
Topic |
Watch Video |
|
Information Security Assurance: Framework, Standards & Industry Best Practices |
PDF
|
||
|
OSI Reference Model |
|||
|
TCP/IP Architecture |
|||
|
Internet Protocol |
|||
|
IP Addressing |
|||
|
IP Addressing : Advantages |
|||
|
Classless Interdomain Routing |
|||
|
PDF
|
|||
|
PDF
|