0% found this document useful (0 votes)
173 views13 pages

Information Security Diploma Course Outline

This document outlines the content of an information security course. The course covers topics such as introduction to information security, desktop and server security, data security, network security, web security, and vulnerability assessment and penetration testing (VAPT). Each module provides learning objectives, goals, and descriptions of units that will be covered to educate students on fundamentals of information security, cyber threats, and methods for securing systems and data.

Uploaded by

Avaneet Ranjan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
173 views13 pages

Information Security Diploma Course Outline

This document outlines the content of an information security course. The course covers topics such as introduction to information security, desktop and server security, data security, network security, web security, and vulnerability assessment and penetration testing (VAPT). Each module provides learning objectives, goals, and descriptions of units that will be covered to educate students on fundamentals of information security, cyber threats, and methods for securing systems and data.

Uploaded by

Avaneet Ranjan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

APPIN TECHNOLOGY LAB

FRONT RUNNER DIPLOMA


INFORMATION SECURITY
COURSE CONTENT
MODULE: INTRODUCTION TO INFORMATION SECURITY

Objective:
1. Understand Basics of computer networking
2. Need of information security
3. Understand cyber threats and issues

Goal: Learn fundamentals for Information security

Description:
 INFORMATION SECURITY
 ESSENTIAL TERMINOLOGIES
 SECURITY AND ITS NEED
 WHY IS IT SECURITY NECESSARY?
 IT SECURITY SERVICES LIFE CYCLE
 OPERATING SYSTEM BASICS
 DATA COMMUNICATION BASICS
 BASICS OF COMPUTER NETWORKING
 OSI AND TCP/IP MODEL
 TCP VS UDP
 TCP FRAME STRUCTURE
 UDP FRAME STRUCTURE
 TCP COMMUNICATION FLAGS
 NETWORKING DEVICES
 CYBER THREATS AND ISSUES
 PROTECTING YOUR COMPUTER AND NETWORK
 SOFTWARE SECURITY FOR PORTABLE COMPUTERS
 PROTECTING YOUR PASSWORD AND LOGGING ON SECURELY
 SELECTING TOOLS
 INFORMATION SECURITY POLICIES AND IMPLEMENTATION

MODULE: DESKTOP AND SERVER SECURITY

Objective:
1. Understand attack and security infrastructure for system.
2. Linux and Windows 8 security

Goal: Exposure to system security


APPIN TECHNOLOGY LAB
Description:

UNIT 1: DESKTOP AND SERVER SECURITY


 INTRODUCTION
 SECURING YOUR MIGRATED WINDOWS 7 DESKTOP
 DESKTOPS: LOCAL RIGHTS AND PRIVILEGES
 OVERALL DESKTOP SECURITY
 WHAT IS REGISTRY?
 REGISTRY EDITING
 BACKUPS AND RECOVERY
 POLICY
 STEPS TO CREATE REGISTRY VALUES
 SOME OF THE EXAMPLES TO CHANGE THE REGISTRY DEFAULT SETTINGS
 NT SECURITY
 THE LOGON PROCESS
 SECURITY ARCHITECTURE COMPONENTS
 INTRODUCTION TO SECURING IN NT BOX
 BACKUPS
 WINDOWS VULNERABILITIES AND THREATS
 DETERMINING IF YOU ARE ACTIVELY BEING COMPROMISED
 CLIENT –SERVER ARCHITECTURE
 SERVER SECURITY PRINCIPLES
 SECURING THE SERVER OPERATING SYSTEM
 APPLICATIONS AND NETWORK PROTOCOLS
 CONFIGURE OS USER AUTHENTICATION

UNIT 2: WINDOWS 8 INTRODUCTION AND SECURITY


 INTRODUCTION.
 SIMILARITIES BETWEEN WINDOWS 7 & WINDOWS 8.
 NEW FEATURES OF WINDOWS 8.
 HARDWARE RECOMMENDATIONS.
 HARDWARE INNOVATIONS.
 WINDOWS 8 EDITIONS.
 GETTING STARTED WITH WINDOWS 8.
 PROTECTING THE CLIENT AGAINST THREATS.
 BOOT OPTIONS FOR SECURITY.
 SMART SCREEN.
 VULNERABILITY MITIGATION AND SANDBOXING.
 PROTECTING SENSITIVE DATA: BITLOCKER.
 SECURE ACCESS TO RESOURCES:

UNIT 3: LINUX SECURITY


 INTRODUCTION
 BENEFITS OF LINUX
 HOW SECURE SHOULD MY LINUX BE?
 WINDOWS VS. LINUX DESIGN
APPIN TECHNOLOGY LAB
 LAYERS OF LINUX/UNIX
 LINUX DIRECTORY STRUCTURE (FILE SYSTEM STRUCTURE) EXPLAINED WITH EXAMPLES
 SHADOW AND PASSWORD FILES
 HOW TO SET UP A FIREWALL UNDER LINUX?
 SECURING AND HARDENING TIPS LINUX SYSTEMS
 REALISTIC SECURITY AND SEVERITY METRICS

MODULE: DATA SECURITY

Objective:
1. Understand data backup and recovery strategies
2. Understand cryptography and steganography
3. Understand physical security methods

Goal: Exposure to methods for securing data

Description:

UNIT1: DATA SECURITY


 INTRODUCTION
 DATA SECURITY MANAGEMENT
 CHARACTERISTICS OF ACCESS SECURITY IN THE SYSTEM
 TYPES OF DATABASE ATTACKS
 DATA SECURITY ISSUES AND SOLUTIONS
 INTRODUCTION TO CLOUD COMPUTING
 PROTECTING THE USERS
 CLOUD COMPUTING IN REAL DOMAIN
 BENEFITS FROM CLOUD COMPUTING

UNIT 2: DATABACKUP
 DATA BACKUP
 INTRODUCTION
 DATA BACKUP STRATEGIES
 OFFLINE DATA BACKUP
 ONLINE DATA BACKUP

UNIT 3: CRYPTOGRAPHY
 STRENGTH OF THE CRYPTOGRAPHY
 SOME TECHNICAL TERMS
 TYPES OF CIPHER TEXT
 TYPES OF CRYPTOGRAPHY
 DATA ENCRYPTION STANDARD (DES)
 IDEA: INTERNATIONAL DATA ENCRYPTION ALGORITHM
 ASYMMETRIC CRYPTOGRAPHY
 RSA ALGORITHM
 HASH FUNCTIONS&ALGORITHM
APPIN TECHNOLOGY LAB
 DIGITAL SIGNATURES
 DIGITAL CERTIFICATION

UNIT 4: STEGANOGRAPHY
 OVERVIEW
 STEGANOGRAPHY TECHNIQUES
 TYPES OF STEGANOGRAPHY
 STEGANALYSIS
 STEGANOGRAPHY DETECTION TOOL

UNIT 5:- PHYSICAL SECURITY


 HARDWARE BASED MECHANISMS FOR PROTECTING DATA:
 SOFTWAARE BASED MECHANISMS FOR PROTECTING DATA:
 BIOMETRIC SECURITY

MODULE: NETWORK SECURITY

Objective:
1. Exposure to network level attacks
2. Understand wireless and router security
3. Understand IDS/IPS

Goal: Exposure to network hacking and security

Description:

UNIT 1: VIRTUAL PRIVATE NETWORK SECURITY


 INTRODUCTION TO VPN
 APPLICATION & REQUIREMENTS OF VPN
 VPN TYPES
 OPEN VPN
 MODELS OF VPN
 IPSEC VPN
 VPN SECURITY FRAMEWORK
 VPN SECURITY ISSUES
 OTHER VPN THREATS

UNIT 2: WIRELESS LAN


 INTRODUCTION
 802.11 STANDARDS OF WLAN
 BASICS OF WIRELESS LAN
 ANTENNAS
 ACCESS POINT POSITIONING
 ROGUE ACCESS POINT
 WIRED EQUIVALENT PRIVACY
 DOS ATTACK
APPIN TECHNOLOGY LAB
 MAN IN MIDDLE ATTACK (MITM)
 COUNTERMEASURES FOR WLAN
 TOOLS
 WIRELESS INTRUSION DETECTION
 WIRELESS INTRUSION PREVENTION
 OPEN SOURCE SCANNING SOFTWARE

UNIT 3: ROUTER SECURITY


 WHAT IS A ROUTER?
 STATIC AND DYNAMIC ROUTING
 WORK TO ROUTER
 KEEPING THE MESSAGES MOVING
 DIRECTING TRAFFIC
 TRANSMITTING PACKETS
 KNOWING WHERE TO SEND DATA
 MAC ADDRESSES
 UNDERSTANDING THE PROTOCOLS
 TRACING THE MESSAGE
 DENIAL OF SERVICE ATTACK
 CONFIGURATION OF ROUTER
 PROTOCOLS ON A ROUTER
 RFC 1483
 HANDSHAKE PROTOCOLS
 NAT (NETWORK ADDRESS TRANSLATION)
 NAPT SERVICES
 ADSL DETAILS
 TROUBLE SHOOTING
 ROUTING TABLE PROBLEMS
 VARIOUS TYPES OF INTRUSION
 SECURING THE ROUTERS

UNIT 4: INTRUSION DETECTION AND PREVENTION


 INTRODUCTION
 INTRUSION DETECTION AND PREVENTION
 IDS
 NEED OF IDS
 COMPONENTS
 TYPES
 WHAT IS NOT AN IDS?
 DETECTION METHODOLOGIES
 VARIOUS TOOLS AVAILABLE
 LIMITATIONS OF IDS
 INTRUSION PREVENTION SYSTEM
 TYPES
 NETWORK BASED IPS
 COUNTER MEASURES TAKEN BY AN IPS
APPIN TECHNOLOGY LAB
 RISKS INVOLVE

UNIT 5: ACCESS CONTROL SYSTEM


 INTRODUCTION: WHAT IS ACCESS CONTROL
 ACCESS CONTROL IN PHYSICAL SECURITY
 ACCESS CONTROL IN INFORMATION SECURITY
 NEED OF AN ACCESS CONTROL SYSTEM
 SOME CONCEPTS RELATED TO ACCESS CONTROL
 ACCESS CONTROL TECHNIQUES
 NON-DISCRETIONARY ACCESS CONTROL
 MANDATORY ACCESS CONTROL (MAC)
 ROLE-BASED ACCESS CONTROL
 LATTICE BASED ACCESS CONTROL
 CHINESE WALL
 ACCESS CONTROL MODELS

MODULE: WEB SECURITY

Objective:
1. Understand firewalls and proxy
2. Understand sniffing
3. Understand security for internet access

Goal: Exposure to security issues on internet

Description:

UNIT 1: LAN SECURITY


 THE INITIAL INTERNETTING CONCEPTS
 INTRODUCTION TO LAN
 WHY LAN SECURITY IS IMPORTANT
 LAN/WAN COMPONENTS
 TOPOLOGY
 PROTOCOLS
 THREATS OF LAN
 INAPPROPRIATE ACCESS TO LAN RESOURCES
 DISCLOSURE OF DATA
 UNAUTHORIZED MODIFICATION OF DATA AND SOFTWARE
 DISCLOSURE OF LAN TRAFFIC
 SPOOFING OF LAN TRAFFIC
 DISRUPTION OF LAN FUNCTIONS
 SECURITY SERVICES AND MECHANISMS
 PROTECTING MAC ADDRESS
 NETWORK SCANNERS
 TYPES OF SCANNING
 SCANNING METHODOLOGY
APPIN TECHNOLOGY LAB
UNIT 2: FIREWALL SECURITY
 FIREWALLS
 WORKING OF FIREWALL
 TYPES OF FIREWALL
 FIREWALL MONITORING.
 PROXY SERVER
 USE OF PROXY
 WORKING OF PROXY SERVER
 APPLICATIONS OF FIREWALL
 FIREWALL EVASION TOOL

UNIT 3: INTERNET SECURITY


 INTRODUCTION
 SECURITY INTRUSIONS AND SECURITY PROPERTIES
 THREATS FACED ON INTERNET
 TYPES OF INTERNET SECURITY
 INTRODUCTION TO IP ADDRESSES
 FINDING IP ADDRESS OF A REMOTE SYSTEM
 HIDING YOUR IDENTITY: ANONYMOUS SURFING
 WHAT IS A SOCKS PROXY SERVER?

MODULE: VAPT

Objective:
1. Understand the need of VAPT
2. Understand how VAPT is performed and various tools

Goal: Learn VAPT skills

Description:

UNIT 1: INTRODUCTION TO VAPT


 INTRODUCTION
 IMPORTANT TECHNICAL TERMS
 INFORMATION GATHERING
 SCANNING AND FINGERPRINTING

UNIT 2: VULNERABILITY ASSESSMENT


 VULNERABILITIES
 VULNERABILITY ASSESSMENT
 PROTECTIVE MEASURES
 STEP WISE APPROACH
 VULNERABILITY ASSESSMENT: THE RIGHT TOOLS TO PROTECT YOUR CRITICAL DATA
 TYPES OF VULNERABILITY ASSESSMENT
 THE CHALLENGES OF VULNERABILITY ASSESSMENTS
APPIN TECHNOLOGY LAB
 TOOLS FOR VA
 RISK ASSESSMENT
 NETWORK SECURITY AUDIT CASE STUDY

UNIT 3: PENETRATION TESTING


 INTRODUCTION AND METHODOLOGY
 TYPES OF PENETRATION TESTS
 METHODOLOGY
 PENETRATION TESTING APPROACH
 PENETRATION TESTING VS VULNERABILITY ASSESSMENT
 HOW VULNERABILITIES ARE IDENTIFIED
 A SAMPLE PENETRATION TESTING REPORT
 SECURITY SERVICES
 SECURITY SERVICES MANAGEMENT TOOLS
 FIREWALL
 AUTOMATED VULNERABILITY SCANNING
 AN APPROACH TO VULNERABILITY SCANNING
 DENIAL OF SERVICE (DOS) TESTING
 WIRELESS PENETRATION TESTING
 PENETRATION TESTING TOOLS
 ESCALATION OF PRIVILEGES
 CASE STUDIES

MODULE: PROTECTION FROM CYBER ATTACKS

Objective:
1. Understand malware attacks and security
2. Understand how google is used by hackers

Goal: Learn about malware attacks and google hacking

Description:

UNIT 1: MALWARES
 INTRODUCTION TO MALWARES
 TYPES OF MALWARES
 INFECTIOUS MALWARE
 VULNERABILITY TO MALWARE
 ANTI-MALWARE STRATEGIES
 INSTALLING BOTS ON TARGET MACHINES
 WORKING OF BOTS
 MALWARE DETECTION TECHNIQUES
 COUNTER MEASURES

UNIT 2: NETWORK INTRUSION


 INTRODUCTION
APPIN TECHNOLOGY LAB
 TYPES OF INTRUSIONS
 NON-TECHNICAL INTRUSIONS
 TABNABBING
 BACKTRACK
 BACKDOOR
 BACKDOOR COUNTERMEASURES
 ROOTKITS
 MONITORING TOOLS
 MALWARE GLOSSARY

UNIT 3: ART OF GOOGLING


 INTRODUCTION
 THE GOOGLE TOOLBAR
 SEARCHING TECHNIQUES
 DIRECTORY LISTING
 LOCATING CGI-BIN
 LOCATING ROBOTS.TXT
 CAMERA INTRUSION
 SOME TRICKS
 THE HARVESTER TOOL
 ARTICLES

MODULE: INFORMATION SECURITY MANAGEMENT SYSTEM

Objective:
1. Understand need for ISMS
2. Understand security auditing and various frameworks

Goal: Exposure to ISMS and ISO auditing

Description:

UNIT 1: SECURITY AUDITING


 INTRODUCTION
 SECURITY AUDITING OBJECTIVES
 RISK INVOLVED
 AUDITING STEPS
 AUDITED PROCESSES.
 AUDITED SYSTEMS.
 AUDITING APPLICATION SECURITY.

UNIT 2: LEAD AUDITOR: IT (LA-27001


 INTRODUCTION
 PURPOSE OF STANDARDS
 CONTROLS & ITS OBJECTIVES
 ISO/IEC 27001 AUDITOR: AUDITOR’S ROLES AND RESPONSIBILITIES
APPIN TECHNOLOGY LAB
 REVIEW OF THE ISO 27001:2005
 UNDERSTANDING OF THE RELATIONS BETWEEN ISO 27001:2005
AND ISO/IEC 17799:2005
 SECURITY RELATED THREAT AND VULNERABILITIES EVALUATION
 UNDERSTANDING OF THE SECURITY CONTROLS AND COUNTERMEASURES

MODULE: CYBER LAWS AND IT ACTS

Objective:
1. Understand the role of cyber laws and acts

Goal: To know what is illegal in IT environment

Description:

 INTRODUCTION
 CYBER LAWS: INTERNATIONAL PERSPECTIVE
 E-GOVERNANCE
 IMPEDIMENTS IN IMPLEMENTING E-GOVERNANCE PROJECTS FROM LEGAL PERSPECTIVE
 ANALYSIS OF PROBLEMS – REPERCUSSIONS
 RELEVANT LAWS
 JURISPRUDENCE OF INDIAN CYBER LAW
 THE INFORMATION TECHNOLOGY ACT, 2000 (SOME LAWS)
 AMENDMENT TO THE IT ACT 2000 BY ITAA2008
 ADVANTAGES OF CYBER LAWS
 PROSECUTION OF CYBER CRIMES UNDER INDIAN CYBER LAWS (IT ACT, 2000)
 PROBABLE SOLUTIONS
 ARTICLES ON CYBER LAWS
 CASES ON CYBER LAWS

MODULE: CYBER FORENSICS

Objective:
1. Understand need for forensics and various strategies
2. Forensics of mobiles and computers

Goal: Learn computer and networking skills

Description:

UNIT 1: CYBER CRIME


 CYBER SECURITY & FORENSICS
 WHAT IS CYBER CRIMES?
 CLASSIFICATION OF CYBER CRIME
 WHY LEARN ABOUT CYBER CRIME
 TYPES OF CYBER CRIME
 CHARACTERISTICS OF COMPUTER CRIME
APPIN TECHNOLOGY LAB
 PREVENTION OF CYBER CRIME
 QUESTIONNAIRE BASED ON RECOMMENDATIONS FROM THE FOURTH MEETING OF
GOVERNMENTAL EXPERTS ON CYBER-CRIME CYBER CRIMINALS
 CASE STUDIES

UNIT 2: CYBER FORENSICS


 CYBER FORENSICS: DETAILED VIEW
 DIGITAL EVIDENCE
 CHALLENGES OF FORENSIC SCIENCE
 FORENSIC METHODOLOGY
 SOME FORENSIC SOFTWARES/ HARDWARES
 BASIC APPROACHES
 FORENSICS TOOLS EXAMPLE

UNIT 3: CATCHING CRIMINALS


 CYBER TERRORISM- THE DARK SIDE OF THE WEB WORLD
 HONEY POTS AND HONET NETS

UNIT 4: MOBILE FORENSICS


 INTRODUCTION TO MOBILE FORENSICS
 GENERAL PHONES (NOKIA, SAMSUNG, LG)
 BLACKBERRY DEVICES
 CHINESE DEVICES
 ANDROID PHONES
 EXTRACTION METHODS OF MOBILE FORENSICS
 MOBILE PHONE CHARACTERISTICS
 MOBILE FORENSIC ANALYSIS
 THE CHALLENGES OF MOBILE FORENSICS
 TOOLS FOR MOBILE FORENSICS
 FORENSIC TOOLKIT

MODULE: COMMUNICATION SECURITY

Objective:
1. Learn mobile communications basics
2. Understand VOIP security
3. Learn attacks and security measures for emails

Goal: Exposure to security and threats for various communication methods

Description:

UNIT 1: MOBILE SECURITY


 INTRODUCTION
 WHAT IS MOBILE?
 ARCHITECTURE OF MOBILE COMMUNICATION
APPIN TECHNOLOGY LAB
 MOBILE GENERATION
 TECHNOLOGY OF MOBILE COMMUNICATION
 MOBILE PHONE STANDARDS
 PROTOCOLS USED IN MOBILE
 INTRODUCTION TO SMS MESSAGING
 SIM
 INTRODUCTION TO MOBILE OS
 POPULAR OPERATING SYSTEMS
 ANDROID FROM GOOGLE INC.
 BLACKBERRY OS FROM RIM
 IOS FROM APPLE INC
 SYMBIAN OS
 WINDOWS PHONE OS
 SAMSUNG BADA
 WHAT IS NFC, HOW IT WORKS AND WHAT ARE ITS PRACTICAL APPLICATIONS
 WHY IS MOBILE SECURITY IMPORTANT?
 MOBILE PLATFORM COMPARISON
 MOBILE THREATS
 TRENDS OF MOBILE THREATS
 WHAT IS BLUETOOTH? & HOW DOES IT WORK??
 HOW BLUETOOTH CREATES A CONNECTION
 BLUETOOTH INTRUSIONS ON MOBILE PHONES
 BLUETOOTH WEAKNESSES
 MOBILE SAFEGUARDS AND SOLUTIONS

UNIT 2: VOICE OVER INTERNET PROTOCOL


 DEFINITION & TRENDS
 SERVICES
 TYPES OF VOIP
 COMPONENTS OF VOIP
 IP TELEPHONY & IP PAGING
 PROTOCOLS AND ACRONYMS
 REASONS FOR VOIP
 PROBLEMS IN VOIP
 VOIP SECURITY SCENARIO
 HOW DO WE SECURE VOIP?
 TYPES OF VOIP ENCRYPTION AND AUTHENTICATION

UNIT 3: E-MAIL SECURITY


 INTRODUCTION
 HISTORY OF E-MAIL
 EMAIL ADDRESSES
 HOW E-MAIL WORKS?
 VARIOUS MAIL SERVERS
 E-MAIL PROTOCOLS
 ANALYSIS OF EMAIL HEADERS
APPIN TECHNOLOGY LAB
 EMAIL TRACKING
 IP TRACKING USING EMAIL
 SPAMMING
 WAYS TO PREVENT SPAM
 SECURITY THREATS TO YOUR EMAIL COMMUNICATIONS(recent updates)
 SETUP EMAIL FILTER IN GMAIL, HOTMAIL & YAHOO
 HOW TO STEAL DATA FROM AN E-MAIL?
 E-MAIL EXCHANGE SERVER SECURITY
 VIRUS PROTECTION
 RPC OVER HTTP
 PROTECTING FRONT-END SERVERS
 KEEP EXCHANGE SERVER UP-TO-DATE
 CYBER LAWS REGARDING SPAMMING
 SECURITY POLICIES

You might also like