CYBER SECURITY COURSE OUTLINE

Course Content/Lesson Plan

Course Title: Cyber Security

Duration:3 Months

Course Title Cyber Security
Week 1 Introduction to Cyber Security The very basic ideas of cyber security will be presented in this week, making it easier for students to learn. The topic covers history, protection of information, and some basic concepts about threats and vulnerabilities. This course is going to introduce basic terminology and how security policies are written or implemented. Some practical exercises will be involved in working with principles of network security.
Week 2 Ethical Hacking Basics (CEH) Semantic HTML for accessibility and SEO, advanced HTML forms: input types, validation, and accessibility. Deep dive into Flexbox. Create dynamic User Experiences with CSS Animations and Transitions. Introduction to the Bootstrap framework: Grid System, Components, and Utilities. Basics of SASS: Variables, Nesting, Mixins, Functions. Project Work The students will work on a project in order to create a responsive web page using Bootstrap and SASS.
Week 3 System Hacking: CEH The third week focuses on the module of system hacking methodologies. In the module, the student shall get an overview of the methodologies pertaining to password cracking, several malware threats, and network sniffing. Upon completion of this course, a student will have practical experience in system hacking and sniffing through hands-on labs.
Week 4 Web Application Security, CEH Covers the insecurities of a web application. Testing for SQL injection, cross-site scripting, and hijacking of sessions are looked into in detail. The learners will identify and mitigate these vulnerabilities through practical sessions in the lab on testing for the security of Web Applications.
Week 5 Wireless Network Security (CEH) This will talk about details of the wireless network, its working process, the encryption protocols, and common attacks on wireless. All the best practices to secure a wireless network will be discussed. Practical labs will let students hands-on in securing and attacking wireless networks.
Week 6 Cryptography Introduce the principles and algorithm of cryptography. He will teach students symmetric and asymmetric encryptions, hashing techniques, and digital signatures. Practical labs will give hands-on experiences about implementation of cryptographic techniques.
Week 7 Computer Hacking Forensics, CHFI Introduction The overview of computer forensics is done in this week. It describes the various principles and processes involved. It comprises digital evidence types, incident response, and forensic tools. Practical exercises will be oriented toward collecting and analyzing digital evidence.
Week 8 Forensic Investigation Process—CHFI Covers the forensic investigation process, that comprises techniques for data acquisition, methods of data analysis, and good practice in reporting forensic findings. The students will work with lab sessions on how to conduct forensic investigations.
Week 9 Network Forensics (CHFI) Introduce them to network forensics, covering network traffic analysis, intrusion detection, and malware analysis. Practical laboratories will capture network traffic and analyze it for intrusion detection.
Week 10 Mobile Forensics (CHFI) Covers the very basics of the technology of cellular forensics, which include information acquisition from mobile gadgets, techniques of statistics evaluation, and mobile forensic gear. This take a look at is supported with the aid of fingers-on labs on the purchase and evaluation of facts on cell gadgets.
Week 11 Cloud Forensics (CHFI) Introduces the learner to Cloud forensics; it covers the basics of Cloud computing and introduces methods for extracting and analyzing data in the Cloud environment. Cloud data extraction and analysis are part of hands-on labs.
Week 12 Final Project and Review The final week will involve the design, development, and finalization of an exhaustive project that draws together elements of CEH and CHFI. The students will be asked to present their work, defend against others' feedback, and evaluate their own work against criteria that will be set.