शनिवार, 28 मार्च 2020

Syllabus of Information Security Management (A10.3-R5)

A Level - Syllabus of Module: A10.3-R5-Information Security Management 

Introduction : This module is designed to focus on information security skills and techniques to protect and secure organization's information assets and business systems. Students understand of various types of security incidents, threats and attacks, and learn methods to prevent, detect and react to incidents and attacks.
A Level - Syllabus of Module: A10.3-R5-Information Security Management
A Level - Syllabus of Module: A10.3-R5-Information Security Management 
Detailed Syllabus : 
(i) Network Fundamentals : Introduction to Ethernet, OSI layers, TCP/IP models, Functions/ protocols & devices at each layer, Protocol headers for frame, TCP, UDP, IP ,ICMP, applications layers like http, snmpetc, Network Topology, Working of Hub bridge, switch, router, UTM, remote administration of and managed network devices, Types of Networks, VLAN, Subnetting, NAT Working with Number systems, Fixed Length subnet masking, Variable Length subnet, masking, Classless Inter Domain Routing, Inter VLAN routing, Static Routing, RIP, RIPv2, OSPF, EIGRP, IGRP using IPv4, Routing in Ipv6. 

(ii) Introduction to cyber security and Attacks : Fundamentals of information security - CIA Triad, Cyber Security Controls, Logical Controls, Physical Controls, Tools & Techniques, understanding threats, attacks categories, hacking process, Vulnerability, Threat & Risk (with examples), Types of Attacks (DDOS, Phishing, Malware etc. with examples), Threats at Client systems (malware, social engineering, open ports, etc.) Threats to Network, Web, Storage & Devices, Understanding the network security, Mitigation Techniques, fundamental of web/mobile application security, Web Application Attacks (SQL Injection, Cross site scripting etc.), Mobile Application Attacks, data center security, cloud computing and data security.

(iii) Cryptography : Data Transmission and Organization, error detecting and correcting codes, need of cryptography. Cryptology fundamentals, Symmetric-Asymmetric cryptography & cryptographic algorithms, Private key encryption, Public key encryption, Protocols, Key management, including key generation, key storage, Key exchange, Encryption folders(Graphical/ using cipher), Data recovery agent, Symmetric key encryption algorithm, DES/3DES, IDEA,RC5, AES, Public key algorithm, RSA & ECC, Diffie-Hellman key exchange, Hash functions, MD5-message digest algorithm, SHA-1 Secure Hash algorithm, HMAC, Applications of cryptography- Secure Email PGP, SSL TLS S/MIME, File Encryption IPsec, IOT Attacks against encryption, Public Key Infrastructure Understanding digital certificates and signatures.PKI Standards and Management, X.500, X.509, ETF, IRTF. 

(iv) Network Security and countermeasures : Securing Networks, Network security devices– Router, ACL, firewalls, types of firewalls, configuration and deployment, overview of IDS, Network-based IDS (NIDS), Host-based IDS, Overview of IPS, Host-based IPS, (HIPS), Network-based IPS(NIPS), UTMTMG threat management gateway, network security tools (scanners, sniffers etc) and Countermeasures. wireless security, securing wireless networks: wireless overview, Bluetooth, 820.11 

(v) Web Server and Application Security : Client-Server Relationship, Vulnerabilities in web server and applications, Attack methods, Buffer overflow, SQL injection, cross site scripting, session hijack etc., Secure Coding Practices, OWASP top 10 vulnerabilities and mitigation techniques, Web Application vulnerability scanning, tools (Nessus), Web application security challenges 

(vi) Security Auditing : Audit planning (scope, pre-audit planning, data gathering, audit risk), Risk management, Overall Audit Risk, Risk based approach, Evidence, Evidence gathering techniques, Sampling, Control Self-Assessment, Risk analysis, Purpose of risk analysis, Risk based auditing, Types of Control, Risk Assessment using Simple Risk or Eramba (Open source Tools), 3 phase approach – Risk assessment IT/IS Audit, Log analysis, Using Microsoft Security Assessment Tool, Using Microsoft Security Baseline Analyzer, Configuring Windows File system auditing. Event ID Log Analysis, OS and Application specific auditing, Performing Risk Assessment based on ISO27001 using ISO27001 security toolkit, Preparing Audit Questionnaire and Performing Audit for ISO27001 Standard.

(vii) Cyber Law and IT Act 2000 : Information Technology Act 2000 (as amended in 2008), Rules under Information Technology Act 2000. The Rule of Cyberspace. Cyber Law – Policy Issues and Emerging Trends Online Contract. Digital Signature Cyber Crime, Data Protection, Liability of Intermediary, Copyright and Internet. Domain Name Dispute, Harmful content in Internet, Case Studies. 

(viii) Cyber Forensics : Digital Evidence, identification of digital evidence, Cyber forensics Processes Identification, Preservation, seizure and acquisitions, Analysis, authentication and presentations, fundamental of Incident response and handling, Reporting, mitigation, Volatile evidence collection and analysis, disk imaging and analysis, Investigating Information-hiding, analysis of e-mail, Tracing Internet access, Understanding importance of report, writing of reports, generating report finding with forensics tools, Chain of custody forms, Laboratory documents and procedures. 

Click Here for PDF - A Level - Syllabus of Module: A10.3-R5-Information Security Management

कोई टिप्पणी नहीं:

एक टिप्पणी भेजें