| Course Title |
Cyber Security |
| Week 1 |
Introduction to Cyber Security |
The very basic ideas of cyber security will be presented in this week, making it easier for students
to learn. The topic covers history, protection of information, and some basic concepts about threats
and vulnerabilities. This course is going to introduce basic terminology and how security policies
are written or implemented. Some practical exercises will be involved in working with
principles of network security. |
| Week 2 |
Ethical Hacking Basics (CEH) |
Semantic HTML for accessibility and SEO, advanced HTML forms: input types, validation, and
accessibility. Deep dive into Flexbox. Create dynamic User Experiences with CSS Animations and
Transitions. Introduction to the Bootstrap framework: Grid System, Components, and Utilities.
Basics of SASS: Variables, Nesting, Mixins, Functions. Project Work The students will work on
a project in order to create a responsive web page using Bootstrap and SASS. |
| Week 3 |
System Hacking: CEH |
The third week focuses on the module of system hacking methodologies. In the module, the student
shall get an overview of the methodologies pertaining to password cracking, several malware threats,
and network sniffing. Upon completion of this course, a student will have practical experience in
system hacking and sniffing through hands-on labs. |
| Week 4 |
Web Application Security, CEH |
Covers the insecurities of a web application. Testing for SQL injection, cross-site scripting, and
hijacking of sessions are looked into in detail. The learners will identify and mitigate these
vulnerabilities through practical sessions in the lab on testing for the security of Web Applications. |
| Week 5 |
Wireless Network Security (CEH) |
This will talk about details of the wireless network, its working process, the encryption protocols,
and common attacks on wireless. All the best practices to secure a wireless network will be
discussed. Practical labs will let students hands-on in securing and attacking
wireless networks. |
| Week 6 |
Cryptography |
Introduce the principles and algorithm of cryptography. He will teach students symmetric and
asymmetric encryptions, hashing techniques, and digital signatures. Practical labs will give
hands-on experiences about implementation of cryptographic techniques. |
| Week 7 |
Computer Hacking Forensics, CHFI Introduction |
The overview of computer forensics is done in this week. It describes the various principles and
processes involved. It comprises digital evidence types, incident response, and forensic tools.
Practical exercises will be oriented toward collecting and analyzing digital evidence. |
| Week 8 |
Forensic Investigation Process—CHFI |
Covers the forensic investigation process, that comprises techniques for data acquisition,
methods of data analysis, and good practice in reporting forensic findings. The students will
work with lab sessions on how to conduct forensic investigations. |
| Week 9 |
Network Forensics (CHFI) |
Introduce them to network forensics, covering network traffic analysis, intrusion detection,
and malware analysis. Practical laboratories will capture network traffic and analyze it for
intrusion detection. |
| Week 10 |
Mobile Forensics (CHFI) |
Covers the very basics of the technology of cellular forensics, which include information acquisition from mobile
gadgets, techniques of statistics evaluation, and mobile forensic gear. This take a look at is supported with the
aid of fingers-on labs on the purchase and evaluation of facts on cell gadgets. |
| Week 11 |
Cloud Forensics (CHFI) |
Introduces the learner to Cloud forensics; it covers the basics of Cloud computing and introduces
methods for extracting and analyzing data in the Cloud environment. Cloud data extraction and
analysis are part of hands-on labs. |
| Week 12 |
Final Project and Review |
The final week will involve the design, development, and finalization of an exhaustive project
that draws together elements of CEH and CHFI. The students will be asked to present their work,
defend against others' feedback, and evaluate their own work against criteria that will be set. |