Cyber Security For GTU Sem 5 Elective - I Information Technology / Computer Course Code : 3150714

Cyber Security For GTU Sem 5 Elective - I Information Technology / Computer Course Code : 3150714  (Hardcover, Sridhar Chandramohan Iyer, Sharvari Sagar Patil)

Price: Not Available
Currently Unavailable
Highlights
  • Author: Sridhar Chandramohan Iyer, Sharvari Sagar Patil
  • 150 Pages
  • Language: English
  • Publisher: Tech-Neo Publications
Description
Syllabus Sr. No. Topics Total Hrs. Marks Weightage 1. Systems Vulnerability Scanning Overview of vulnerability scanning, Open Port / Service Identification, Banner / Version Check, Traffic Probe, Vulnerability Probe, Vulnerability Examples, OpenVAS, Metasploit. Networks Vulnerability Scanning - Netcat, Socat, understanding Port and Services tools - Datapipe, Fpipe, WinRelay, Network Reconnaissance – Nmap, THC-Amap and System tools. Network Sniffers and Injection tools – Tcpdump and Windump, Wireshark, Ettercap, Hping Kismet (Refer Chapter 1) 08 25 2. Network Defense tools Firewalls and Packet Filters: Firewall Basics, Packet Filter Vs Firewall, Packet Characteristic to Filter, Stateless Vs Stateful Firewalls, Network Address Translation (NAT) and Port Forwarding, Snort: Introduction Detection System (Refer Chapter 2) 06 25 3. Web Application Tools Scanning for web vulnerabilities tools: Nikto, W3af, HTTP utilities - Curl, OpenSSL and Stunnel, Application Inspection tools – Zed Attack Proxy, Sqlmap. DVWA, Webgoat, Password Cracking and Brute-Force Tools – John the Ripper, L0htcrack, Pwdump, HTC-Hydra (Refer Chapter 3) 06 25 4. Introduction to Cyber Crime and law Cyber Crimes, Types of Cybercrime, Hacking, Attack vectors, Cyberspace and Criminal Behavior, Clarification of Terms, Traditional Problems Associated with Computer Crime, Introduction to Incident Response, Digital Forensics, Realms of the Cyber world, Recognizing and Defining Computer Crime, Contemporary Crimes, Contaminants and Destruction of Data, Indian IT ACT 2000. (Refer Chapter 4) 03 10 5. Introduction to Cyber Crime Investigation Keyloggers and Spyware, Virus and Warms, Trojan and backdoors, Steganography, DOS and DDOS attack, SQL injection, Buffer Overflow, Attack on wireless Networks (Refer Chapter 5) 05 15
Read More
Specifications
Book
  • Cyber Security For GTU Sem 5 Elective - I Information Technology / Computer Course Code : 3150714
Author
  • Sridhar Chandramohan Iyer, Sharvari Sagar Patil
Binding
  • Hardcover
Publishing Date
  • 2021
Publisher
  • Tech-Neo Publications
Edition
  • 1
Board
  • GTU
Number of Pages
  • 150
Language
  • English
Subject
  • Cyber Security
Age Group
  • 15-55
Specialization
  • Computer Engineering, Information Technology, Computer Science and Engineering, Information and Communication Technology
University
  • GTU
Genre
  • Academic & Test Preparation
Book Subcategory
  • Other Books
Degree/Diploma
  • Degree
Term/Year
  • 3 Year
Term/Semester
  • SEM 5
Author Info
  • Sharvari Sagar Patil, Sridhar Chandramohan Iyer
University/Subject
  • GTU
Be the first to ask about this product
Safe and Secure Payments.Easy returns.100% Authentic products.
Back to top