25UCB508-PRINCIPLES OF CYBER SECURITY

Wishlist Share

Course Content

25UCB508-PRINCIPLES OF CYBER SECURITY

UNIT : I INTRODUCTION TO CYBER SECURITY
Evolution of cyber security-CIA triad - Cyber attacks (DoS, DDoS, Malware, Phishing, Insider threats)-Cyber laws & ethics.

UNIT : II NETWORK & OPERATING SYSTEM SECURITY
GOSI & TCP/IP models-Firewalls – IDS/IPS – VPNs-Wireless security (WPA3) Authentication, File permissions-Access control models (DAC, MAC, RBAC)Patch management and system hardening

UNIT : III CRYPTOGRAPHY & ENCRYPTION
Stages, jobs, and workflows- Jenkins Basics: Installation, configuration, and plugin management- GitHub Actions Basics: Creating workflows using YAML- Automating Builds- Pipeline Triggers: Event-based, scheduled, and manual triggers.

UNIT : IV THREAT DETECTION & WEB SECURITY
Malware analysis -Indicators of compromise (IoC) ᧓ SIEM tools-Incident response lifecycle-OWASP Top 10 vulnerabilities-SQL Injection ᧓ XSS ᧓ CSRF ᧓ SSRF-Secure coding practices and API security.

UNIT : V CLOUD SECURITY, ETHICAL HACKING & FUTURE TRENDS
Cloud Models (Iaas, Paas, Saas) – Iam Policies-Securing Containers & Kubernetes-Penetration Testing Methodology-Tools: Metasploit, Nmap, Burp Suite-Bug Bounty Programs-Ai, Iot, And Blockchain In Cybersecurity-Capstone Project: Security Audit Of a Sample System. Case study on Cloud Data– AWS, Azure, or GCP misconfiguration leading to major breaches.Case study on Penetration Testing in Enterprise – Ethical hacking reports showing vulnerabilities in 2025.

Student Ratings & Reviews

No Review Yet
No Review Yet
screen tagSupport