Introduction
The course enlighten about the basic introduction to cyber security, cyber crime and Information Security. Classifications of Cybercrimes. An Indian Perspective, Hacking and Indian Laws., Global Perspectives. How Criminals Plan Them: Introduction, How criminals plan the attacks, Social Engineering, Cyber Stalking, Cyber Café & cybercrimes. Botnets: The fuel for cybercrime, Attack Vector. Tools and Methods used in Cybercrime: Introduction, Proxy Servers, Anonymizers, Phishing, Password Cracking, Key Loggers and Spyways, Virus and Worms, Trozen Horses and Backdoors, Steganography, DoS and DDOS Attackes, Attacks on Wireless networks. Phishing and Identity Theft: Introduction, methods of phishing, phishing,phising techniques, spear phishing, types of phishing scams, phishing toolkits and spy phishing, counter measures, Identity Theft. Understnading Computer Forensics: Introdcution, Historical Background of Cyberforensics, Digital Foresics Science, Need for Computer Foresics, Cyber Forensics and Digital Evidence, Digital Forensic Life cycle, Chain of Custody Concepts, network forensics. This course is a Prerequisite for many courses and the same is shown in the link file.
Prerequisite courses: Students are expected to be relatively fluent with the knowledge of Computer Applications.
Course Learning Objective
This course will enable students to
Kindly click the link for VTU Syllabus for Introduction to Cyber Security -BETCK105I/205I, for 2023-2024. Latest Syllabus
Course Outcome
After studying this course, Students will be able to
Program Outcomes
L1 - Remember
L2 - Understand
L3 - Apply
L4 - Analyze
L5 - Evaluate
L6 - Create
Sunit Belapure and Nina Godbole, “Cyber Security: Understanding Cyber Crimes, Computer Forensics And Legal Perspectives”, Wiley India Pvt Ltd, ISBN: 978-81- 265-21791, 2011, First Edition (Reprinted 2018)