0% found this document useful (0 votes)
53 views2 pages

BCAC602 - Lession Plan

BCA 6TH SEM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views2 pages

BCAC602 - Lession Plan

BCA 6TH SEM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

PAILAN COLLEGE OF MANAGEMENT AND TECHNOLOGY

DEPARTMENT – COMPUTER APPLICATION


LESSON PLAN
PAPER NAME – CYBER SECURITY PAPER CODE – BCAC602
TOTAL CREDIT – 6 SEMESTER – 6TH

Chapter Name of the Topic Hour Marks


01 Fundamentals 8 10
1.1 Fundamentals of data communication and networking 1
1.2 Network Reference Models: OSI and TCP/IP Models, 1
1.3 3 way handshake and TCP flags, 1
1.4 Network Address Translation(NAT) concepts 1
1.5 Network Transmission media and network devices information 1
1.6 Security definition 1
1.7 Information security goals(Confidentiality, Integrity and availability) 1
1.8 Basic concepts of Cryptography and Steganography 1
02 Hacking Concepts 10 15
2.1 Hacking, Types of Hacking/Hackers, 1
2.2 Types of cyber crime 1
2.3 Classifications of Security attacks(Passive Attacks and Active 1
Attacks)
2.4 Essential Terminology(Threat, Vulnerability, Target of Evaluation, 1
Attack, Exploit)
2.5 Concept of Ethical Hacking 1
2.6 Phase of Ethical Hacking, Hacktivism 1
2.7 Cyber Law: Cyber terrorism, Cyber laws, What offences are covered 1
under these laws.
2.8 Hacking, Data theft, Identity theft(including Password theft) 1
2.9 Email spoofing, Sending offensive messages, Voyeurism, Cyber 1
terrorism
2.10 Punishment for cyber-crime in India 1
03 Malware 12 20
3.1 About Malware, Types of Malware(Virus, worm, Trojan horse, 1
spyware, adware, ransomware)
3.2 Type of Computer Viruses(File Virus, Boot-sector virus, Macro virus, 1
email virus, multi-variant virus)
3.3 Some indications of a malware attacks, Popular Antivirus programs 1
3.5 Basic idea of how antivirus, identifies a virus(Signature-based 1
detection, Heuristics-based detection, Cloud-based detection)
3.6 Virus Total Website DOS, IDS, IPS 1
3.7 Denial of service attack, Distributed DOS attack 1
3.8 IDS, IPS, Snooping, Eavesdropping 1
3.9 Key loggers and Firewall, BOTs/BOTNETS(Zombies) 1
3.10 Web Application Based Threats, Cross-site scripting 1
3.11 SQL injection, Command injection, Buffer overload 1

1
Chapter Topic Name Hour Marks
3.12 Directory traversal, Phishing scams, Drive by downloads 1
04 Wireless Networking 12 15
4.1 Concept of wireless networking, Wireless standards 1
4.2 Common term used in wireless networking 1
4.3 WLAN, Wireless 1
4.4 Wireless Access point, cellular 1
4.5 Attenuation, Antenna, Microwave 1
4.6 Jamming, SSID, Bluetooth 1
4.7 Wi-Fi hotspots, What is Wi-Fi 1
4.8 Wireless attacks(War Driving, War Walking: War Flying, War 1
Chalking, Blue Jacking)
4.9 How to secure wireless networks 1
4.10 Protocols & Proxy: Topics: Some protocols(HTTP, HTTPS, FTP, SSH, 1
TELNET, SMTP, DNS, POP3 and related ports)
4.11 Proxy concept, Different types of proxy
4.12 Forward and reverse proxy concepts, proxy chain
05 Stay Secure in Digital World 2 10
5.1 Usage of Password, Different types of password(Biometric, Pattern
based Graphical password, Strong Password technique), Types of
Password attacks
5.2 Steps to stay secure in digital world, have strong password, encrypt
your data, security suit software, firewall setup, update OS
Sub Total 44 70
Internal Assessment Examination & Preparation of Semester 4 30
Examination
Total 48 100

Name of Faculty: Bhaskar Roy

Signature of Faculty: _______________ Date: ___________________

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy