Cyber Security for SPPU 19 Course (TE - SEM VI - AI & DS - 317530)

Rs. 280.00
Tax included. Shipping calculated at checkout.

Syllabus Cyber Security - [317530] Credit Examination Scheme : 03 Mid_Semester (TH) : 30 Marks End_Semester (TH) : 70 Marks Unit I Introduction Introduction, Elements of Information Security, Security Policy, Techniques, Steps, Categories, Operational Model of Network Security, Basic Terminologies in Network Security. Threats and Vulnerability, Difference between Security and Privacy. (Chapter - 1) Unit II Data Encryption Techniques and Standards Introduction, Encryption Methods : Symmetric, Asymmetric, Cryptography, Substitution Ciphers. Transposition Ciphers, Stenography applications and limitations, Block Ciphers and methods of operations, Feistal Cipher, Data Encryption Standard (DES), Triple DES, Weak Keys in DES Algorithms, Advance Encryption Standard (AES). (Chapter - 2) Unit III : Public Key And Management Public Key Cryptography, RSA Algorithm : Working, Key length, Security, Key Distribution, Deffie-Hellman Key Exchange, Elliptic Curve : Arithmetic, Cryptography, Security, Authentication methods, Message Digest, Kerberos, X.509 Authentication service. Digital Signatures: Implementation, Algorithms, Standards (DSS), Authentication Protocol. (Chapter - 3) Unit IV : Security Requirements IP Security : Introduction, Architecture, IPV6, IPv4, IPSec protocols and Operations, AH Protocol, ESP Protocol, ISAKMP Protocol, VPN. WEB Security : Introduction, Secure Socket Layer (SSL), SSL Session and Connection, SSL Record Protocol, Change Cipher Spec Protocol, Alert Protocol, Handshake Protocol. Electronic Mail Security : Introduction, Pretty Good Privacy, MIME, S/MIME, Comparison. Secure Electronic Transaction (SET). (Chapter - 4) Unit V : Firewall and Intrusion Introduction, Computer Intrusions. Firewall Introduction, Characteristics and types, Benefits and limitations. Firewall architecture, Trusted Systems, Access Control. Intrusion detection, IDS : Need, Methods, Types of IDS, Password Management, Limitations and Challenges. (Chapter - 5) Unit VI : Cyber Forensic, Hacking & its Countermeasures Personally Identifiable Information (PII), Cyber Stalking, Cybercrime, PII Confidentiality Safeguards, Information Protection Law : Indian Perspective. Hacking : Remote connectivity and VoIP hacking, Wireless Hacking, Mobile Hacking, countermeasures. (Chapter - 6)

Pickup available at Nashik Warehouse

Usually ready in 24 hours

Check availability at other stores
Pages: 172 Edition: 2024 Vendors: Technical Publications