CBST
CBST
SECONDARY EDUCATION
Course Description:
Course Objectives:
The objectives of this course are to equip students with a comprehensive understanding
of various aspects of cybersecurity, including:
Course Outcomes:
Upon successful completion of this course, the student shall be able to:
Contact Marks
Hours
1. Computer Systems 25 15
2. Computer Networks 25 15
3. Introduction to Cybersecurity 10 5
Contact Marks
Hours
1. Network Security 25 15
1.3 Firewalls: 6 4
● Role of Firewalls in Network Security
● Types of Firewalls: Packet-Filtering Firewalls,
Stateful Inspection Firewalls
● Firewall Architectures: Host-Based Firewalls
Network-Based Firewalls
● Firewall Configuration and Management:
Configuring Basic Firewall Rules with Linux
IPTables
● Network Address Translation (NAT)
1.4 Intrusion Detection Systems (IDS): 6 4
● Overview and Importance
● Types of IDS: Host-Based IDS, Network-Based IDS
● IDS Architectures: Centralized IDS, Distributed IDS
● Detection Techniques: Signature Based, Statistical
Anomaly Detection Based (Various Features like
User Login Time, Duration etc.)
● IDS Configuration and Management: IDS Sensor
Configuration and Rule Creation using Snort
2.1 Introduction: 5 3
● Overview
● Encryption and Decryption Function
● Plain Text, Cipher Text
● Symmetric Cipher Models: Substitution Ciphers,
Transposition Ciphers
● Steganography
2.2 Secret Key Cryptography: 14 8
● Symmetric Key Encryption
● Block Cipher, Traditional Block Cipher Structures
● Data Encryption Standard (DES), Example of DES,
Strength of DES
● Advanced Encryption Standard (AES), Example of
AES, Strength of AES
● Block Cipher Modes of Operations
● Stream Cipher
● Synchronous and Asynchronous Stream Cipher
● Autokey Stream Cipher
● RC4 Stream Cipher
3. Internet Security 10 5
Contact Marks
Hours
1. Laboratory Experiments 60 25
3. Viva 5
Class – XII
Semester - III
Contact Marks
Hours
1. Web Security 18 10
Contact Marks
Hours
1 Cryptography - Part II 25 15
1.4 SSL/TLS: 6 3
● SSL/ TLS architecture
● SSL/ TLS handshake, Authentication
● Choice of algorithms in SSL, Choice of algorithms in
TLS
● Vulnerabilities in SSL
2 Ethical Hacking 15 10
2.4 Spoofing 3 2
● Definition of spoofing
● Email, IP, and DNS spoofing
4. Emerging Trends 5 0
Contact Marks
Hours
1. Laboratory Experiments 40 15
2. Project 20 10
3. Viva 5
Subject: Cyber Security
Class XI
Total Theory Marks: 70
Total 35
Total 12 23 35
Subject: Cyber Security
Class XII
Total Theory Marks: 70
Total 35
Class XII Semester 4 Topics: [Short Answer Questions, Descriptive Questions] Marks: 35
4 Emerging Trends 0 0 0
Total 12 23 35