Diploma in Cyber Security

Contents

Page.no

  1. Introduction                                                                                                                    1
  2. Occupational outlook                                                                                                      2
  3. Skill Profile                                                                                                                     3
  4. Curriculum structure                                                                                                      4
  5. Core Number

C – 1 Digital Securities                                                                                                   5

C – 2 Online Anonymity                                                                                                 7

C – 3 Cryptography and Secure Communication                                                           11

C – 4 Cyber Crime Issues ad Investigation                                                                     13

C – 5 Digital Forensics                                                                                                   15

INTRODUCTION

INTRODUCTION TO CYBER SECURITY

Cybercrime is a global problem that’s been dominating the news cycle. It poses a threat to individual security and an even bigger threat to large international companies, banks, and governments. Today’s organized cybercrimes far out shadow lone hackers of the past now large organized crime rings function like start-ups and often employ highly-trained developers who are constantly innovating online attacks. With so much data to exploit out there, Cyber security has become essential.

Today’s generation lives on the internet, and we general users are almost ignorant as to how those random bits of 1’s and 0’s reach securely to our computer. For a hacker, it’s a golden age. With so many access points, public IP’s and constant traffic and tons of data to exploit, black hat hackers are having one hell of a time exploiting vulnerabilities and creating malicious software for the same. Above that, cyber attacks are evolving by the day. Hackers are becoming smarter and more creative with their malware and how they bypass virus scans and firewalls still baffles many people.

The use of cyber security can help prevent cyber attacks, data breaches, and identity theft and can aid in risk management. To learn cyber security and build a colorful career in cyber security, then check out our Cyber security which comes with instructor-led live training and real-life project experience. This training will help you understand cyber security in depth and help you achieve mastery over the subject.

OBJECTIVES:

  • To understand the Applications of  cyber security
  • To learn the Digital Locker.
  • To learn digital economy is likely to help trigger a fresh wave of economic growth.
  • To increase the amount of consumer and citizen data will be stored digitally.
  • To setup Secure WIFI settings,
  • To learn cyber crime issues and investigation

OCCUPATIONAL OUTLOOK

Image of infographic showing the Industries impacted by the AI revolution

This is great scope for professionals seeking cyber security jobs and related careers in online fraud detections. There are number of companies and banks use the online business. Hence learning the cyber security has wide opportunity in banks and online marketing and Banks, financial firms, credit card companies

Most Demand Cyber Security Jobs

  • Security Analyst
  • Security Engineer
  • Security Software Developer
  • Chief Information Security Officer
  • Source Code Auditor
  • Virus Technician
  • Intrusion Detection Specialist

Pentagon: Digital forensic	Pentagon: Cyber crime  issue& Investigation		Pentagon: Cryptography,secure communicationPentagon: Online anonymityPentagon: Digital securitiesCOMPETENCY PROFILE

A1.types of attackA2. Digital privacyA3.online trackingA4. Antivirus other security problemA5. Email security  
A6.cloud storage securityA7.IOT security   
B1. Anonymous networksB2. Tor networkB3. Anonymous OSB4. Secure file sharingB5. Web browser privacy configuration  
B6. Anonymous payment    
C1. Encryption and cryptography(difference)C2. Cryptographic function and types  C3  Digital signatureC4. Cryptographic system trust modelC5. Disk encryption using window bitlocker
C6. Disk encryption using open source toolC7. Encrypt DNS traffic and email communication   
D1. Unauthorized accessD2. Computer intrusionD3. Internet hacking and trackingD4. Virus attackD5. Digital law and legislation  
D6. Enforcement roles and response and investigation toolD7. Email and IP TrackingD8. Password cracking  
E1. introduction to digital forensics    E2.  Forensic software and hardwareE3. Forensic technologies and practicesE4.   Forensic ballistic and photographyE5. Finger print recognition
E6. Audio video analysisE7 Window system and linux system forensicE8. Network ,Mobile,Cloud forensic  

 COMPETENCY AREA                                                                                                                     COMPETENCIE

PROGRAM STRUCTURE

Skill SectorCore and Practical NumberTopicCompetenciesTime (Hours)
TheoryPracticalIn plant Training
ADigital securityM -01Digital securityA1A2A3A4A520105
    A6A7      
BOnline anonymityM -02Online anonymityB1B2  B3B4  B520205
B6 
CCryptography and secure communicationM -03Cryptography and secure communicationC1C2C3C4C5  20205
C6C7 
DCyber crime investigationM -04Cyber crime investigationD1D2D3D4D510205
D6D6D7      D8
EDigital forensicM -05Digital forensicE1  E2E3E4E5    20305
E6E7`E8
 9010025  

Core Code                  : M-01

Approved on             : 

To be revised on        :          

Occupation                 :  Security Engineer

Competency Area     :  Digital security

Performance Objective:  After completion of this module the trainee will be able to perform each of the tasks mentioned here according to the relevant standards

Tasks to be performed:

Task No.TaskCriterion
A1  Types of attackDenial of serviceMan in middlePhishing and spear phishing Drive by attackPassword attackEavesdropping attackMalware attack  
A2Digital privacyIndividual privacyInformation privacyCommunication privacyDevelopment and controversy
A3Online trackingCanvas fingerprintingMobile trackingSession replay  
A4Antivirus and other security problemComputer access controlApplication securityDefense in depthFire wallEncryption  
A5E-mail securityStrong passwords Password rotations Spam filters Desktop-based anti-virus/anti-spam applications  
A6Cloud storage securityBackup and recovery  functionGeo fencingData aware filteringPolicy based lifecycle retentionDetailed logs and full user/workload audit trail reporting.
A7IOT SecurityKeep tabs on mobile devices  Implement automatic antivirus updates  Require strong login credentials  Deploy end-to-end encryption 

Related Knowledge:

  • Knowledge on types of attack
  • Need of digital privacy
  • Online tracking
  • Knowledge on antivirus and other security problems
  • Work with E- mail security
  • Present the ideas of cloud storage security

Prerequisites:    Basic English, Mathematics and computer knowledge

Materials, Tools & Equipments Required:

Computer, Operating system, Firewall software

Target Time:

Institutional:    Theory             – 25 hrs

                        Practical          – 15 hrs

Core Code                  : C-02

Approved on             : 

To be revised on        :          

Occupation                 :  online anonymity

Competency Area     :  online anonymity

Performance Objective:  After completion of this core the trainee will be able to perform each of the tasks mentioned here.

Tasks to be performed:

Task No.TaskCriterion
B1Anonymous networksPublic P2P clientIp2 clientsHypothetical or defunct network  
B2Tor networkOriginating trafficOnion servicesNyx status monitorTraffic analysis attack
B3Anonymous OSTails Whonix Kodachi Qubes subgraphs
B4Secure file sharingVPN Proxy Server  Connection Leak Testing  Secure Search Engine
B5Web browser privacy configurationDon’t save passwords  Cookies and Site Data  Tracking Protection Block unwanted pop-ups   
B6Anonymous paymentDonations and payments Keeping a low profile Estate transfer Keeping Assets and Payments Private  

Related Knowledge:

  • Knowledge on the  anonymous network
  • Knowledge on the  tor network
  • Methods of secure file sharing
  • Knowledge on web browser privacy configuration
  • Secure payement

Prerequisites:    Basic English, Mathematics and computer knowledge

Materials, Tools & Equipments Required:

Computer, Operating system, Firewall software, Proxy server setup

Target Time:

Institutional:    Theory             – 25 hrs

                        Practical          – 15 hrs

Core Code                  : C-03

Approved on             : 

To be revised on        :          

Occupation                 :  Security Engineer

Competency Area     :  Cryptography and secure communication

Performance Objective:  After completion of this core the trainee will be able to perform each of the tasks mentioned here.

Tasks to be performed:

Task No.TaskCriterion
C1Encryption and cryptography(difference)NatureUtilizationMessage verificationCategoryBasisdefinition  
C2Cryptographic function and typesClassic cryptography Computer era Advent of modern cryptography Symmetric-key cryptography
C3Digital signatureNon-repudiationOther smart card designsDigital signatures versus ink on paper signatures  
C4Cryptographic system trust modelCreate a Cryptographic Key Pair Using pg4win/gpg4usb Public Key Cryptography (PKC) Hash Functions  
C5Disk encryption using window BitlockerTransparent operation mode: User authentication mode:  USB Key Mode  
C6Disk encryption using open source toolultitas K Encryption Tools  Attacking Cryptographic Systems  Countermeasures Against Cryptography Attacks  Securing Data in Transit  Cloud Storage Encryption
C7Encrypt DNS traffic and email communicationSecure IM  video call

Related Knowledge:

  • A talent for choosing encryption methods
  • Cryptographic function and types
  • Importance of digital signature
  • Ability to disk encryption and use of open source tool

Prerequisites:    Basic English, Mathematics and computer knowledge

Materials, Tools & Equipments Required:

Computer, Operating system, Firewall software, Proxy server setup

Target Time:

Institutional:    Theory             – 25 hrs

                        Practical          – 15 hrs

         Core Code                     : C -04

         Approved on                : 

                     To be revised on           :          

Occupation                 : Security Engineer

Competency Area     :  Cyber crime issue and investigation

Performance Objective:  After completion of this core the trainee will be able to perform each of the tasks mentioned here.

Tasks to be performed:

Task No.TaskCriterion
D1Unauthorized accessTailgatingDoor ProppingLevering Doors KeysAccess Cards
D 2Computer intrusionAnalyzed activityNetwork intrusion detection systemsHost intrusion detection systemsDetection method[edit]Signature-basedAnomaly-based
D 3Internet hacking and trackingLevels of privacyLevels of privacyHTTP cookiesFlash cookies
D 4Virus attackPornographySoftware Piracy Intellectual PropertyMail BombsExploitation Stalking and Obscenity in Internet
D 5Digital law and legislationIllegal File SharingDownloading Copyrighted MusicPirating Software
D 6Enforcement roles and response &investigation toolInvestigation Tools e-Discovery EDRM Model Digital Evidence Collection Evidence Preservation
D7Email and IP TrackingE-Mail TrackingIP TrackingE-Mail RecoveryHands on Case StudiesSearch and Seizure of Computers Recovering Deleted Evidences
D8Password crackingEasy to remember, hard to guess

Related Knowledge:

  • Knowledge on intrusion detection
  • Different hacking methods and hackers behavior
  • Knowledge on E-Mail and IP hacking
  • Knowledge on password cracking

Prerequisites:    Basic English, Mathematics and computer knowledge

Materials, Tools & Equipments Required:

Computer, Operating system, Firewall software, Proxy server setup

Target Time:

Institutional:    Theory             – 25 hrs

                        Practical          – 15 hrs

         Core Code                     : C-05

         Approved on                : 

                     To be revised on           :          

Occupation                 :  Security Engineer

Competency Area     : Digital forensic

Performance Objective:  After completion of this core the trainee will be able to perform each of the tasks mentioned here.

Tasks to be performed:

Task No.TaskCriterion
E 1Introduction to digital forensicDatabase forensics.Email analysis.Audio/video forensics.Internet browsing analysis.Network forensics.Memory forensics.File analysis.Disk and data capture.  
E 2Forensic software and hardwareDatabase forensics Email analysis Audio/video forensics Internet browsing analysis Network forensics Memory forensics File analysis Disk and data capture Computer forensics Digital image forensics  
E 3Forensic technology and practisesFacial ReconstructionDigital Surveillance For Gaming EquipmentDigital Surveillance For Gaming Equipment  
E 4Forensic ballistic and photographyGunCatapultBow  
E5Finger print recognitionDetection of drug usePolice force databasesCrime scene investigations
E6Audio and video analysis  Forensic Image Clarification (ClearID)Forensic Audio Clarification (QEAS)Avid Nexus StorageSafeAV SAS StorageSafeAV NAS Storage  
E7Windows system and linux system forensicUsabilitySupportUpdateSecurityaccess
E8Network,mobile,cloud forensicService provider logsAcquisitionSeizure

Related Knowledge:

  • Knowledge on E-mail analysis, File analysis, network forensics
  • Different forensics software and tools.
  • Identification of hardware tools for forensics
  • Audio and video analysis
  • Knowledge on Linux system forensic

Prerequisites:    Basic English, Mathematics and computer knowledge

Materials, Tools & Equipments Required:

Computer, Operating system, Firewall software, Proxy server setup

Target Time:

Institutional:    Theory             – 25 hrs

                        Practical          – 15 hrs