0% found this document useful (0 votes)
3 views

CBST

The document outlines the syllabus for a Cyber Security course for Class XI and XII, detailing course objectives, outcomes, and specific topics covered in both theoretical and practical sessions. Key areas of focus include computer systems, network security, cryptography, web security, and mobile device security, along with hands-on laboratory experiments. The course aims to equip students with essential cybersecurity knowledge and skills relevant to today's digital landscape.

Uploaded by

semaba8447
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

CBST

The document outlines the syllabus for a Cyber Security course for Class XI and XII, detailing course objectives, outcomes, and specific topics covered in both theoretical and practical sessions. Key areas of focus include computer systems, network security, cryptography, web security, and mobile device security, along with hands-on laboratory experiments. The course aims to equip students with essential cybersecurity knowledge and skills relevant to today's digital landscape.

Uploaded by

semaba8447
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

WEST BENGAL COUNCIL OF HIGHER

SECONDARY EDUCATION

SYLLABUS FOR CLASS XI AND XII

SUBJECT: CYBER SECURITY

Course Description:

This course introduces students to the fundamentals of cybersecurity, focusing on


understanding common threats, security principles, and best practices.

Course Objectives:

The objectives of this course are to equip students with a comprehensive understanding
of various aspects of cybersecurity, including:

1. Understanding of basic principles, terminology, and concepts of cybersecurity


and its importance in today's digital world.
2. Understanding of common cyber threats and vulnerabilities.
3. Understanding different security technologies, tools, and techniques used to
protect systems, networks, and data.
4. Exploring ethical considerations and legal regulations related to cybersecurity,
including privacy laws, intellectual property rights, and ethical hacking principles.
5. Promoting awareness and education about cybersecurity best practices.

Course Outcomes:

Upon successful completion of this course, the student shall be able to:

1. Demonstrate an understanding of cybersecurity fundamentals


2. Demonstrate an understanding of the threat landscape
3. Demonstrate familiarity in cybersecurity technologies
4. Develop skills in cybersecurity
5. Demonstrate an understanding of Cryptography
6. Demonstrate familiarity of cyber security ethical issues, laws and regulations
Class – XI
Semester - I

Subject: Cyber Security

Course Code: Theory

Full Marks – 35 Contact Hours - 60 Hours

Contact Marks
Hours

1. Computer Systems 25 15

1.1 Evolution of Computers: 2 1


● Different Generations of Computers
● Brief Idea about Quantum Computers

1.2 Computer Organization: 3 2


● Logic Gates with Truth Tables: AND, OR, NOT, X-
OR
● Functional Components of a Computer System and
their Interconnections
● Memory Organization (Diagrams Only) and Its
Types
● I/O Devices

1.3 Encoding Schemes and Number System: 3 2


● ASCII, EBCDIC
● Binary, Octal, Hexadecimal Number Systems

1.4 Data and Information: 2 1


● Definitions
● Understanding the difference between data and
information (through examples)
● Types of Data

1.5 Operating Systems: 3 2


● Roles and Functions of Operating Systems
● Types of Operating Systems
● Concepts of Processes, Threads
● Memory Management (Basic Concepts)
● File Systems
1.6 Database Management Systems: 3 2
● Overview of databases, and their importance in
modern computing
● Role of DBMS in managing data
● Relational Databases
● Structured Query Language (SQL)

1.7 Programming a Computer: 9 5


● Algorithms (Pseudocodes)
● Flowcharts
● Compiler, Interpreter
● Programming Languages (Examples)
○ C, C++
○ Python, Java, Java-Script
● Introduction to Python Programming (Simple
Example Based)
○ Python Installation
○ Basic Structure
○ Conditional Constructs
○ Looping Constructs
○ Arrays, Lists, Sets
○ Functions

2. Computer Networks 25 15

2.1 Types of Networks: 2 1


● LAN, MAN, WAN
● Wireless LAN
● Internet

2.2 Components of a Network: 4 2


● Servers and Workstations
● Network Interface Cards
● Guided Media: Cables – UTP, STP, Co-axial, Fibre
Optic
● Unguided Media: Infra-Red, Radio and Microwave
Communication, Satellite,
● Repeaters, Hubs, Bridges, Switches, Routers,
Gateways

2.3 Network Topologies: Mesh, Ring, Bus, Star, Tree or Hybrid 1 1

2.4 Concept of Channel, Bandwidth (Hz, KHz, MHz), and Data 1 1


Transfer rate (bps, Kbps, Mbps, Gbps, Tbps)
2.5 The Internet: 8 5
● History and Evolution of Internet
● TCP/IP Protocol Stack, Functionality and Protocols
of each layer
● MAC Address
● IPv4 Class A, Class B, Class C Address
● Concept of Subnet Mask and Default Gateway
● IPv6 Address (Basic Format)
● ICMP

2.6 Internet Applications: E-mail, WWW, Domain Name 3 1


Systems

2.7 Internet of Things: 3 2


● The architecture of IoT systems
● Types of IoT devices (sensors, actuators,
gateways, etc.)
● Communication protocols used in IoT networks
(MQTT, CoAP, Zigbee)

2.8 Cloud Computing: 3 2


● Brief Introduction to
○ Cloud Service Models (IaaS/PaaS/SaaS)
○ Cloud Deployment Models
(Public/Private/Hybrid),
● Overview of cloud storage services
● Overview of major cloud service providers (e.g.,
AWS, Azure, Google Cloud)

3. Introduction to Cybersecurity 10 5

3.1 Overview of Cybersecurity and Its Relevance 1 0

3.2 History of Cybersecurity: Major Incidents and Their Impacts 2 0

3.3 CIA Triad: Confidentiality, Integrity and Availability 1 1

3.4 Important Terms and Definitions: Security, Privacy, 3 2


Threats, Vulnerabilities, Exploits, Risks, Attacks, Attack
Vectors, Hackers, Crackers
3.5 Cyber Threats and Its Classifications: 3 2
● Malware
● Social Engineering
● DoS/DDoS
● Insider Threats
● Advanced Persistent Threats (APTs)
● Data Breaches and Information Theft

Note: Additional 10 hours for Remedial and/or Tutorial Classes


Class – XI
Semester - II

Subject: Cyber Security

Course Code: Theory

Full Marks – 35 Contact Hours - 60 Hours

Contact Marks
Hours

1. Network Security 25 15

1.1 Overview and Importance 1 0

1.2 Network Access Control: 3 2


● Authentication Mechanisms - Passwords,
Biometrics, Hardware Tokens
● Authorization and Access Control Lists (ACLs)

1.3 Firewalls: 6 4
● Role of Firewalls in Network Security
● Types of Firewalls: Packet-Filtering Firewalls,
Stateful Inspection Firewalls
● Firewall Architectures: Host-Based Firewalls
Network-Based Firewalls
● Firewall Configuration and Management:
Configuring Basic Firewall Rules with Linux
IPTables
● Network Address Translation (NAT)
1.4 Intrusion Detection Systems (IDS): 6 4
● Overview and Importance
● Types of IDS: Host-Based IDS, Network-Based IDS
● IDS Architectures: Centralized IDS, Distributed IDS
● Detection Techniques: Signature Based, Statistical
Anomaly Detection Based (Various Features like
User Login Time, Duration etc.)
● IDS Configuration and Management: IDS Sensor
Configuration and Rule Creation using Snort

1.5 Wireless Network Security: 2 1


● Overview of Wireless Security Vulnerabilities
● Securing Wi-Fi Networks - WPA2, WPA3

1.6 IoT Security: 4 2


● Common security threats targeting IoT devices
● Attack Vectors in IoT Ecosystems: Device
Compromise, Data Interception, Denial of Service
(DoS), etc.
● Case Studies of Notable IoT Security Breaches
● Privacy Considerations in IoT Deployments

1.7 Cloud Security: 3 2


● Common Security Threats to Cloud Environments
● Security in Cloud Storage

2. Cryptography - Part I (Without any Mathematical 25 15


Derivations or Proofs)

2.1 Introduction: 5 3
● Overview
● Encryption and Decryption Function
● Plain Text, Cipher Text
● Symmetric Cipher Models: Substitution Ciphers,
Transposition Ciphers
● Steganography
2.2 Secret Key Cryptography: 14 8
● Symmetric Key Encryption
● Block Cipher, Traditional Block Cipher Structures
● Data Encryption Standard (DES), Example of DES,
Strength of DES
● Advanced Encryption Standard (AES), Example of
AES, Strength of AES
● Block Cipher Modes of Operations
● Stream Cipher
● Synchronous and Asynchronous Stream Cipher
● Autokey Stream Cipher
● RC4 Stream Cipher

2.3 Public Key Cryptography: 6 4


● Principles of Public Key Cryptography
● RSA Algorithm with Examples

3. Internet Security 10 5

3.1 Social Engineering 6 3


● Overview and Importance
● Common Techniques: Phishing, Pretexting, Baiting,
Vishing (Voice Phishing), Smishing (SMS Phishing))
- with Real Life Examples
● Impersonation
● Case Studies of Successful Social Engineering
Attacks: Banking Frauds, Social Media Related
Frauds/Blackmailing, Fake Profiles, Fake Videos
● Best Practices Against Social Engineering Attacks

3.2 Email Security: 4 2


● Email Threats - Spamming, Spoofing, Phishing,
Spear Phishing, Malware Distribution, Credential
Harvesting - with Real Life Examples
● Email Security Best Practices

Note: Additional 10 hours for Remedial and/or Tutorial Classes


Class – XI

Subject: Cyber Security

Course Code: Practical

Full Marks – 30 Contact Hours - 60 Hours

Contact Marks
Hours

1. Laboratory Experiments 60 25

1.1 Computer Fundamentals: 4 0


● Visit to Computer Lab and familiarization with
computers and peripherals and different networking
devices (e.g., modem, switch, router).
● Opening of the CPU box/cabinet and identification
of different parts (e.g., Motherboard,
CPU/Processor, RAM, Hard Disk, power supply).

1.2 Familiarity with Linux Operating Systems: 4 0


● Basic Commands
● Creating New Users, Setting Passwords
● Configuring Network Settings

1.3 Python Programming Practices 20 10


● Simple programs involving conditional and loop
constructs
● Socket Programming
○ TCP and UDP Sockets
1.4 Laboratory Experiments using Wireshark: 12 5
● Capturing Network Traffic:
○ Set up Wireshark to capture network traffic
on a specific interface (e.g., Ethernet, Wi-Fi).
○ Filter captured traffic based on IP addresses,
protocols, or ports.
○ Analyze captured packets to identify different
types of network communication (e.g.,
HTTP, DNS, TCP, UDP).
● TCP Handshake and Data Transfer:
○ Capture TCP traffic to observe the TCP
handshake process.
○ Analyze TCP flags (SYN, ACK, FIN) and
sequence numbers exchanged during the
handshake.
○ Monitor TCP data transfer
● UDP Communication Analysis:
○ Capture UDP traffic to observe
communication between client and server
applications.
○ Analyze UDP packets to identify source and
destination ports, as well as payload
contents.
○ Understand the differences between TCP
and UDP in terms of reliability and
connection-oriented nature.
1.5 Laboratory Experiments using IPTables: 8 4
● Basic Firewall Configuration:
○ Set up a Linux system with IPTables
installed.
○ Create a basic firewall configuration to allow
all outgoing traffic and block all incoming
traffic.
○ Test the firewall by attempting to access
services from external hosts and verify that
incoming connections are blocked.
● Allowing Specific Traffic:
○ Modify the firewall configuration to allow
specific types of incoming traffic (e.g., SSH,
HTTP, HTTPS).
○ Use IPTables rules to open ports for allowed
services while still blocking all other
incoming traffic.
○ Test the firewall by connecting to allowed
services from external hosts and verify that
connections are permitted.
● Denying Specific Traffic:
○ Configure IPTables rules to deny specific
types of incoming traffic (e.g., ICMP ping
requests, Telnet).
○ Testing the firewall and verification of
connections.

1.6 Laboratory Experiments using Snort: 8 4


● Configuring Snort
○ Configure Snort to operate in either IDS
(Intrusion Detection System) or IPS
(Intrusion Prevention System) mode.
○ Set up Snort to monitor a specific network
interface for incoming network traffic.
● Writing and Testing Snort Rules:
○ Create custom Snort rules to detect specific
network traffic patterns or signatures.
○ Test the effectiveness of the rules by
generating sample network traffic that
matches the defined signatures.
1.7 Laboratory Experiments using OpenSSL: 4 2
● Encrypt a file using symmetric encryption (e.g.,
AES) with OpenSSL.
● Decrypt the encrypted file using the corresponding
decryption key.

3. Viva 5
Class – XII
Semester - III

Subject: Cyber Security

Course Code: Theory

Full Marks – 35 Contact Hours - 60 Hours

Contact Marks
Hours

1. Web Security 18 10

1.1 Basics of Web: 3 2


● HTTP
● Static and Dynamic Web Pages
● Layers of the Web Stack: Client-Side, Server-Side,
and Database

1.2 Web Browser Security: 12 6


● Components of Web Browser: Rendering Engine,
JavaScript Engine, Networking Stack, etc.
● Common Vulnerabilities in Web Browsers: (Cross-
Site Scripting (XSS), Cross-Site Request Forgery
(CSRF), Clickjacking, etc.)
● Security Features in Modern Web Browsers: Same
Origin Policy (SOP), Content Security Policy (CSP),
Sandboxing, etc.
● Cookies
● Browser Security Settings: Privacy Settings, Cookie
Handling, Pop-up Blockers
● Addons and Plugins

1.3 Secure HTTP 3 2


● Risks Associated with HTTP
○ Data Interception
○ Eavesdropping
○ Man-in-the-Middle Attacks
● Role of HTTPS in Protecting Sensitive Information
2. Malicious Software 17 10

Malware Types: Virus, Worms, Trojans, Spyware, Adware, 5 2


2.1
Key-logger, Ransomware

Common Methods of Malware Propagation: 6 4


● Email Attachments
● Malicious Websites
● Removable Media
2.2 ● File Sharing Networks
● Malvertising
● Software Vulnerabilities
● Watering Hole Attacks
● Botnets

Protection against Malware: 6 4


● Antivirus/Antimalware Software
● Regular Software Updates
● Email Filtering
● Web Filtering
2.3
● Least Privilege Access
● Network Segmentation
● Data Backup and Recovery
● Strong Passwords and Multi-Factor Authentication
(MFA)

3. Mobile Device Security 25 15

3.1 Types of Mobile Devices: Mobile Phones, Tablets, Wearable 1 0


Devices

3.2 Privacy Concerns and Data Collection: 8 4


● Privacy Concerns Related to Mobile Device Usage
○ Location Tracking and Geolocation Data
○ Device Identifiers and Unique Identifiers
(UDIDs)
○ Personalized Advertising and Data
Monetization Practices
● Risks of Data Collection and Sharing by Mobile Apps
and Service Providers on User Privacy.

3.3 Mobile App Security: 4 3


● Security Implications of Mobile Apps
● Mobile App Permission Management and Best
Practices
● Risks of Location-Based Social Networks
3.4 Data Security on Mobile Devices: 4 2
● Importance of Data Security on Mobile Devices to
Protect Sensitive Information.
● Risks of Unencrypted Data Storage, and
Communication on Mobile Platforms.
● Benefits of Device Encryption, Secure Messaging
Apps, and Encrypted Storage Solutions.

3.5 Network Security Risks: 3 2


● Security Risks of Unsecured Wi-Fi Networks and
Public Hotspots.
● Man-in-the-Middle Attacks, Wi-Fi Spoofing

3.6 Physical Security Threats: 4 3


● Types of Physical Security Threats to Mobile
Devices: Theft, Unauthorized Access.
● Strategies for Protecting Mobile Devices Physically
○ Device Passcodes and Biometric
Authentication
○ Remote Tracking and Wiping Capabilities
○ Secure Device Storage and Carrying
Practices

3.7 Safe Disposal of Mobile Devices 1 1

Note: Additional 10 hours for Remedial and/or Tutorial Classes


Class – XII
Semester - IV

Subject: Cyber Security

Course Code: Theory

Full Marks – 35 Contact Hours - 60 Hours

Contact Marks
Hours

1 Cryptography - Part II 25 15

1.1 Hash Functions and Its Applications: 10 7


● Definition
● Security properties of hash functions
● Example of hash functions
● Secure Hash Algorithm (SHA)
● Applications of hash functions
○ Message Authentication
○ Digital Signature
○ Other applications (one-way password files,
intrusion detection, virus detection, etc.)

1.2 Digital Signatures: 5 3


● Definition
● Properties of digital signatures
● Types of attacks against digital signatures
● Requirements for digital signature designs
● RSA signature, Example of RSA signature

1.3 Digital Certificates: 4 2


● Public Key Certificates
● Details of X.509

1.4 SSL/TLS: 6 3
● SSL/ TLS architecture
● SSL/ TLS handshake, Authentication
● Choice of algorithms in SSL, Choice of algorithms in
TLS
● Vulnerabilities in SSL
2 Ethical Hacking 15 10

2.1 ● Definition of ethical hacking 2 1


● Types of ethical hacking
● Five phases of ethical hacking
● Roles and responsibilities of ethical hackers

2.2 Information Gathering (Reconnaissance): 6 4


● Active information gathering
● Passive information gathering
● Scanning (active information gathering)
● Web reconnaissance (passive information gathering)

2.3 System Hacking 4 3


● System hacking concepts
● Cracking passwords
● Escalating privileges
● Hiding files and covering tracks

2.4 Spoofing 3 2
● Definition of spoofing
● Email, IP, and DNS spoofing

3. Ethical and Legal Considerations 15 10

2.1 Cyber Ethics 2 1

2.2 Use of Trusted Software 1 1

2.3 Intellectual Property Rights 2 1


2.4 Cyber Law and IT Act 8 6
● Introduction to Indian Cyber Law
● Distinction between Cyber Crime and Conventional
Crime
● Cyber Criminals and their Objectives
● Kinds of Cyber Crime:
○ Cyber Stalking;
○ Cyber Pornography;
○ Forgery and Fraud;
○ Crime Related to IPRs;
○ Cyber Terrorism;
○ Computer Vandalism etc.
● Penalties & Offences under the IT Act
● Offences under the Indian Penal Code, 1860
● Cyber Crime under the Special Act
○ Online Sale of Drugs under NDPS Act
○ Online Sale of Arms under Arms Act

2.5 Digital Personal Data Protection Act 2 1

4. Emerging Trends 5 0

4.1 Artificial Intelligence and Machine Learning in Cybersecurity 2 0

4.2 Brief Idea of Block-Chain Technology 1 0

4.3 Impact of Generative AI in Cyber Security 1 0

4.4 Quantum Cryptography 1 0

Note: Additional 10 hours for Remedial and/or Tutorial Classes


Class – XII

Subject: Cyber Security

Course Code: Practical

Full Marks – 30 Contact Hours - 60 Hours

Contact Marks
Hours

1. Laboratory Experiments 40 15

1.1 Laboratory Experiments using Python Scapy Library: 16 6


● Packet Crafting and Manipulation:
○ Use Scapy to craft custom packets with
specific headers, payloads, and options.
○ Experiment with modifying packet fields
(e.g., source/destination IP addresses, TCP
flags, ICMP types) to understand their
impact on network communication.
● Packet Sniffing and Analysis:
○ Use Scapy to capture network traffic on a
local network interface.
○ Analyze captured packets to extract
information such as source/destination IP
addresses, protocols, packet sizes, and
payload contents.
1.1 Laboratory Experiments using Wireshark: 12 5
● HTTP Traffic Analysis:
○ Capture HTTP traffic between a client and
server using Wireshark.
○ Analyze HTTP request and response
headers to understand the communication
flow.
○ Extract and view the contents of HTTP
messages, including URLs, headers, and
payloads.
● DNS Resolution Analysis:
○ Capture DNS traffic to observe DNS query
and response messages.

1.1 Laboratory Experiments using OpenSSL: 12 4


● Generate a digital signature for a file using
OpenSSL and a private key.
● Verify the digital signature using the corresponding
public key.
● Generate a self-signed certificate authority (CA)
certificate and private key.
● Issue server and client certificates signed by the
CA.

2. Project 20 10

3. Viva 5
Subject: Cyber Security

Class XI
Total Theory Marks: 70

Class XI Semester 1 Topics: (MCQ) Marks: 35 [1 Marks per Question]

Unit Topic Marks Allotted

1 Computer Systems 15x1=15

2 Computer Networks 15x1=15

3 Introduction to Cybersecurity 5x1=5

Total 35

Class XI Semester 2 Topics: [Short Answer Questions, Descriptive Questions] Marks: 35

Unit Topic Short Answer Descriptive Total Marks


Type Questions Type Questions Allotted
(2 Marks) (3/4/5 Marks)

1 Network Security 3x2=6 1x4=4 15


1x5=5

2 Cryptography - Part I 2x2=4 1x3=3 15


2x4=8

3 Internet Security 1x2=2 1x3=3 5

Total 12 23 35
Subject: Cyber Security

Class XII
Total Theory Marks: 70

Class XII Semester 3 Topics: (MCQ) Marks: 35 [1 Marks per Question]

Unit Topic Marks Allotted

1 Web Security 10x1=10

2 Malicious Software 10x1=10

3 Mobile Device Security 15x1=15

Total 35

Class XII Semester 4 Topics: [Short Answer Questions, Descriptive Questions] Marks: 35

Unit Topic Short Answer Descriptive Total Marks


Type Questions Type Questions Allotted
(2 Marks) (3/4/5 Marks)

1 Cryptography - Part II 3x2=6 1x4=4 15


1x5=5

2 Ethical Hacking 2x2=4 2x3=3 10

3 Ethical and Legal 1x2=2 2x4=8 10


Considerations

4 Emerging Trends 0 0 0

Total 12 23 35

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy