"Safeguarding digital assets and ensuring secure information flow in an interconnected world."Â
Course Description:
Cyber and Information Security (IT425) provides an in-depth understanding of the principles, techniques, and tools required to secure digital information and systems against various cyber threats. The course focuses on the study of cryptographic methods, network security protocols, secure software development practices, and risk management techniques.
Students will explore real-world scenarios to identify vulnerabilities and apply appropriate mitigation strategies. Key topics include advanced cryptography, network security, malware analysis, ethical hacking, incident response, and legal considerations in cybersecurity.
Through hands-on labs and case studies, students will gain practical experience in deploying security measures and investigating cyber incidents. The course also covers emerging trends such as IoT security, AI in cybersecurity, and blockchain for secure systems. By the end of the course, students will be equipped with the knowledge and skills to protect digital assets, ensure data integrity, and contribute to a secure digital ecosystem.
Course Outcome:
After completion of this course, students will be able to:
CO1: Understand the fundamental concepts of cyber security, including threats, vulnerabilities, and attack vectors, to analyze security requirements for various systems.
CO2: Apply cryptographic techniques and security protocols to secure data and communication in real-world scenarios.
CO3: Analyze network security measures, including firewalls, intrusion detection systems, and access control mechanisms, to mitigate potential security breaches.
CO4: Demonstrate knowledge of software security principles, such as secure coding practices and malware analysis, to develop robust and secure applications.
CO5: Evaluate legal, ethical, and professional issues in cybersecurity to make informed decisions about privacy, data protection, and digital forensics.
CO6: Design and implement security policies and disaster recovery plans to ensure business continuity and resilience against cyberattacks.
CO7: Explore emerging trends in cybersecurity, such as blockchain, artificial intelligence in security, and IoT security, to address modern challenges.