Contents
Page.no
- Introduction 1
- Occupational outlook 2
- Skill Profile 3
- Curriculum structure 4
- Core Number
C – 1 Digital Securities 5
C – 2 Online Anonymity 7
C – 3 Cryptography and Secure Communication 11
C – 4 Cyber Crime Issues ad Investigation 13
C – 5 Digital Forensics 15
INTRODUCTION
INTRODUCTION TO CYBER SECURITY
Cybercrime is a global problem that’s been dominating the news cycle. It poses a threat to individual security and an even bigger threat to large international companies, banks, and governments. Today’s organized cybercrimes far out shadow lone hackers of the past now large organized crime rings function like start-ups and often employ highly-trained developers who are constantly innovating online attacks. With so much data to exploit out there, Cyber security has become essential.
Today’s generation lives on the internet, and we general users are almost ignorant as to how those random bits of 1’s and 0’s reach securely to our computer. For a hacker, it’s a golden age. With so many access points, public IP’s and constant traffic and tons of data to exploit, black hat hackers are having one hell of a time exploiting vulnerabilities and creating malicious software for the same. Above that, cyber attacks are evolving by the day. Hackers are becoming smarter and more creative with their malware and how they bypass virus scans and firewalls still baffles many people.
The use of cyber security can help prevent cyber attacks, data breaches, and identity theft and can aid in risk management. To learn cyber security and build a colorful career in cyber security, then check out our Cyber security which comes with instructor-led live training and real-life project experience. This training will help you understand cyber security in depth and help you achieve mastery over the subject.
OBJECTIVES:
- To understand the Applications of cyber security
- To learn the Digital Locker.
- To learn digital economy is likely to help trigger a fresh wave of economic growth.
- To increase the amount of consumer and citizen data will be stored digitally.
- To setup Secure WIFI settings,
- To learn cyber crime issues and investigation
OCCUPATIONAL OUTLOOK
This is great scope for professionals seeking cyber security jobs and related careers in online fraud detections. There are number of companies and banks use the online business. Hence learning the cyber security has wide opportunity in banks and online marketing and Banks, financial firms, credit card companies
Most Demand Cyber Security Jobs
- Security Analyst
- Security Engineer
- Security Software Developer
- Chief Information Security Officer
- Source Code Auditor
- Virus Technician
- Intrusion Detection Specialist
COMPETENCY PROFILE
A1.types of attack | A2. Digital privacy | A3.online tracking | A4. Antivirus other security problem | A5. Email security |
A6.cloud storage security | A7.IOT security | |||
B1. Anonymous networks | B2. Tor network | B3. Anonymous OS | B4. Secure file sharing | B5. Web browser privacy configuration |
B6. Anonymous payment | ||||
C1. Encryption and cryptography(difference) | C2. Cryptographic function and types | C3 Digital signature | C4. Cryptographic system trust model | C5. Disk encryption using window bitlocker |
C6. Disk encryption using open source tool | C7. Encrypt DNS traffic and email communication | |||
D1. Unauthorized access | D2. Computer intrusion | D3. Internet hacking and tracking | D4. Virus attack | D5. Digital law and legislation |
D6. Enforcement roles and response and investigation tool | D7. Email and IP Tracking | D8. Password cracking | ||
E1. introduction to digital forensics | E2. Forensic software and hardware | E3. Forensic technologies and practices | E4. Forensic ballistic and photography | E5. Finger print recognition |
E6. Audio video analysis | E7 Window system and linux system forensic | E8. Network ,Mobile,Cloud forensic |
COMPETENCY AREA COMPETENCIE
PROGRAM STRUCTURE
Skill Sector | Core and Practical Number | Topic | Competencies | Time (Hours) | |||||||||
Theory | Practical | In plant Training | |||||||||||
A | Digital security | M -01 | Digital security | A1 | A2 | A3 | A4 | A5 | 20 | 10 | 5 | ||
A6 | A7 | ||||||||||||
B | Online anonymity | M -02 | Online anonymity | B1 | B2 | B3 | B4 | B5 | 20 | 20 | 5 | ||
B6 | |||||||||||||
C | Cryptography and secure communication | M -03 | Cryptography and secure communication | C1 | C2 | C3 | C4 | C5 | 20 | 20 | 5 | ||
C6 | C7 | ||||||||||||
D | Cyber crime investigation | M -04 | Cyber crime investigation | D1 | D2 | D3 | D4 | D5 | 10 | 20 | 5 | ||
D6 | D6 | D7 D8 | |||||||||||
E | Digital forensic | M -05 | Digital forensic | E1 | E2 | E3 | E4 | E5 | 20 | 30 | 5 | ||
E6 | E7` | E8 | |||||||||||
90 | 100 | 25 | |||||||||||
Core Code : M-01
Approved on :
To be revised on :
Occupation : Security Engineer
Competency Area : Digital security
Performance Objective: After completion of this module the trainee will be able to perform each of the tasks mentioned here according to the relevant standards
Tasks to be performed:
Task No. | Task | Criterion |
A1 | Types of attack | Denial of serviceMan in middlePhishing and spear phishing Drive by attackPassword attackEavesdropping attackMalware attack |
A2 | Digital privacy | Individual privacyInformation privacyCommunication privacyDevelopment and controversy |
A3 | Online tracking | Canvas fingerprintingMobile trackingSession replay |
A4 | Antivirus and other security problem | Computer access controlApplication securityDefense in depthFire wallEncryption |
A5 | E-mail security | Strong passwords Password rotations Spam filters Desktop-based anti-virus/anti-spam applications |
A6 | Cloud storage security | Backup and recovery functionGeo fencingData aware filteringPolicy based lifecycle retentionDetailed logs and full user/workload audit trail reporting. |
A7 | IOT Security | Keep tabs on mobile devices Implement automatic antivirus updates Require strong login credentials Deploy end-to-end encryption |
Related Knowledge:
- Knowledge on types of attack
- Need of digital privacy
- Online tracking
- Knowledge on antivirus and other security problems
- Work with E- mail security
- Present the ideas of cloud storage security
Prerequisites: Basic English, Mathematics and computer knowledge
Materials, Tools & Equipments Required:
Computer, Operating system, Firewall software
Target Time:
Institutional: Theory – 25 hrs
Practical – 15 hrs
Core Code : C-02
Approved on :
To be revised on :
Occupation : online anonymity
Competency Area : online anonymity
Performance Objective: After completion of this core the trainee will be able to perform each of the tasks mentioned here.
Tasks to be performed:
Task No. | Task | Criterion |
B1 | Anonymous networks | Public P2P clientIp2 clientsHypothetical or defunct network |
B2 | Tor network | Originating trafficOnion servicesNyx status monitorTraffic analysis attack |
B3 | Anonymous OS | Tails Whonix Kodachi Qubes subgraphs |
B4 | Secure file sharing | VPN Proxy Server Connection Leak Testing Secure Search Engine |
B5 | Web browser privacy configuration | Don’t save passwords Cookies and Site Data Tracking Protection Block unwanted pop-ups |
B6 | Anonymous payment | Donations and payments Keeping a low profile Estate transfer Keeping Assets and Payments Private |
Related Knowledge:
- Knowledge on the anonymous network
- Knowledge on the tor network
- Methods of secure file sharing
- Knowledge on web browser privacy configuration
- Secure payement
Prerequisites: Basic English, Mathematics and computer knowledge
Materials, Tools & Equipments Required:
Computer, Operating system, Firewall software, Proxy server setup
Target Time:
Institutional: Theory – 25 hrs
Practical – 15 hrs
Core Code : C-03
Approved on :
To be revised on :
Occupation : Security Engineer
Competency Area : Cryptography and secure communication
Performance Objective: After completion of this core the trainee will be able to perform each of the tasks mentioned here.
Tasks to be performed:
Task No. | Task | Criterion |
C1 | Encryption and cryptography(difference) | NatureUtilizationMessage verificationCategoryBasisdefinition |
C2 | Cryptographic function and types | Classic cryptography Computer era Advent of modern cryptography Symmetric-key cryptography |
C3 | Digital signature | Non-repudiationOther smart card designsDigital signatures versus ink on paper signatures |
C4 | Cryptographic system trust model | Create a Cryptographic Key Pair Using pg4win/gpg4usb Public Key Cryptography (PKC) Hash Functions |
C5 | Disk encryption using window Bitlocker | Transparent operation mode: User authentication mode: USB Key Mode |
C6 | Disk encryption using open source tool | ultitas K Encryption Tools Attacking Cryptographic Systems Countermeasures Against Cryptography Attacks Securing Data in Transit Cloud Storage Encryption |
C7 | Encrypt DNS traffic and email communication | Secure IM video call |
Related Knowledge:
- A talent for choosing encryption methods
- Cryptographic function and types
- Importance of digital signature
- Ability to disk encryption and use of open source tool
Prerequisites: Basic English, Mathematics and computer knowledge
Materials, Tools & Equipments Required:
Computer, Operating system, Firewall software, Proxy server setup
Target Time:
Institutional: Theory – 25 hrs
Practical – 15 hrs
Core Code : C -04
Approved on :
To be revised on :
Occupation : Security Engineer
Competency Area : Cyber crime issue and investigation
Performance Objective: After completion of this core the trainee will be able to perform each of the tasks mentioned here.
Tasks to be performed:
Task No. | Task | Criterion |
D1 | Unauthorized access | TailgatingDoor ProppingLevering Doors KeysAccess Cards |
D 2 | Computer intrusion | Analyzed activityNetwork intrusion detection systemsHost intrusion detection systemsDetection method[edit]Signature-basedAnomaly-based |
D 3 | Internet hacking and tracking | Levels of privacyLevels of privacyHTTP cookiesFlash cookies |
D 4 | Virus attack | PornographySoftware Piracy Intellectual PropertyMail BombsExploitation Stalking and Obscenity in Internet |
D 5 | Digital law and legislation | Illegal File SharingDownloading Copyrighted MusicPirating Software |
D 6 | Enforcement roles and response &investigation tool | Investigation Tools e-Discovery EDRM Model Digital Evidence Collection Evidence Preservation |
D7 | Email and IP Tracking | E-Mail TrackingIP TrackingE-Mail RecoveryHands on Case StudiesSearch and Seizure of Computers Recovering Deleted Evidences |
D8 | Password cracking | Easy to remember, hard to guess |
Related Knowledge:
- Knowledge on intrusion detection
- Different hacking methods and hackers behavior
- Knowledge on E-Mail and IP hacking
- Knowledge on password cracking
Prerequisites: Basic English, Mathematics and computer knowledge
Materials, Tools & Equipments Required:
Computer, Operating system, Firewall software, Proxy server setup
Target Time:
Institutional: Theory – 25 hrs
Practical – 15 hrs
Core Code : C-05
Approved on :
To be revised on :
Occupation : Security Engineer
Competency Area : Digital forensic
Performance Objective: After completion of this core the trainee will be able to perform each of the tasks mentioned here.
Tasks to be performed:
Task No. | Task | Criterion |
E 1 | Introduction to digital forensic | Database forensics.Email analysis.Audio/video forensics.Internet browsing analysis.Network forensics.Memory forensics.File analysis.Disk and data capture. |
E 2 | Forensic software and hardware | Database forensics Email analysis Audio/video forensics Internet browsing analysis Network forensics Memory forensics File analysis Disk and data capture Computer forensics Digital image forensics |
E 3 | Forensic technology and practises | Facial ReconstructionDigital Surveillance For Gaming EquipmentDigital Surveillance For Gaming Equipment |
E 4 | Forensic ballistic and photography | GunCatapultBow |
E5 | Finger print recognition | Detection of drug usePolice force databasesCrime scene investigations |
E6 | Audio and video analysis | Forensic Image Clarification (ClearID)Forensic Audio Clarification (QEAS)Avid Nexus StorageSafeAV SAS StorageSafeAV NAS Storage |
E7 | Windows system and linux system forensic | UsabilitySupportUpdateSecurityaccess |
E8 | Network,mobile,cloud forensic | Service provider logsAcquisitionSeizure |
Related Knowledge:
- Knowledge on E-mail analysis, File analysis, network forensics
- Different forensics software and tools.
- Identification of hardware tools for forensics
- Audio and video analysis
- Knowledge on Linux system forensic
Prerequisites: Basic English, Mathematics and computer knowledge
Materials, Tools & Equipments Required:
Computer, Operating system, Firewall software, Proxy server setup
Target Time:
Institutional: Theory – 25 hrs
Practical – 15 hrs