Cyber Security Essentials

Course Overview/Objective

Course Objective:

This course aims to introduce the foundational principles, tools, and practices of cyber security to university students and IT professionals. It equips learners with a comprehensive understanding of security threats, vulnerabilities, and mitigation techniques used in protecting digital assets, systems, and networks. The course is designed to foster awareness, develop critical thinking, and instill proactive strategies for handling cyber security challenges in real-world scenarios.

 

Learning Outcomes:

By the end of this course, learners will be able to:

  1. Understand core concepts and terminologies in cyber security.
  2. Identify and analyze common threats, attacks, and vulnerabilities.
  3. Apply security best practices for securing systems, networks, and data.
  4. Use essential tools for detecting, analyzing, and responding to cyber incidents.
  5. Develop a security mindset to protect personal and organizational assets.
  6. Recognize the importance of cyber laws, policies, and ethical issues.

 

Course Module Overview

Module ID

Module Name

Duration

CSE-101

Introduction to Cyber Security

3 hours

CSE-102

Threats, Attacks & Vulnerabilities

6 hours

CSE-103

Network Security Fundamentals

6 hours

CSE-104

Operating System & Endpoint Security

6 hours

CSE-105

Web & Application Security

6 hours

CSE-106

Cryptography Basics

6 hours

CSE-107

Cyber Security Tools & Incident Response

6 hours

CSE-108

Cyber Laws, Ethics & Risk Management

3 hours

 

Total Duration

45 hours

 

Requirements

Graduate from any discipline

 

Course Project
N/A
Used Tools
Internet, As per Instructor
Course Outline

 

CSE-101: Introduction to Cyber Security

  • What is Cyber Security?
  • Key Terminologies: Asset, Threat, Vulnerability, Risk
  • CIA Triad (Confidentiality, Integrity, Availability)
  • Categories of Cyber Crime
  • Importance of Cyber Hygiene

CSE-102: Threats, Attacks & Vulnerabilities

  • Types of Threats: Malware, Phishing, Social Engineering
  • Common Attack Techniques: DoS, Man-in-the-Middle, SQL Injection
  • Vulnerability Scanning and Assessment
  • Security Misconfigurations and Patch Management

CSE-103: Network Security Fundamentals

  • Basics of Networking: IP, TCP/IP, Ports
  • Firewalls and IDS/IPS
  • Secure Network Design Principles
  • Wireless Security
  • VPNs and Secure Remote Access

CSE-104: Operating System & Endpoint Security

  • Security Features of Windows, Linux, and macOS
  • User Account Management and Permissions
  • Endpoint Protection Platforms (EPP)
  • Mobile Device Security
  • System Hardening Techniques

CSE-105: Web & Application Security

  • OWASP Top 10 Vulnerabilities
  • Secure Coding Practices
  • Input Validation and Output Encoding
  • Authentication and Authorization Mechanisms
  • Session Management & Tokenization

CSE-106: Cryptography Basics

  • Importance of Encryption
  • Symmetric vs Asymmetric Encryption
  • Hashing Algorithms (MD5, SHA-256)
  • Public Key Infrastructure (PKI)
  • Digital Signatures and Certificates

CSE-107: Cyber Security Tools & Incident Response

  • Overview of Tools: Wireshark, Nmap, Metasploit, Antivirus, SIEM
  • Basics of Security Monitoring and Logging
  • Incident Detection and Handling
  • Steps in Incident Response Lifecycle
  • Role of SOC (Security Operations Center)

CSE-108: Cyber Laws, Ethics & Risk Management

  • Overview of Cyber Laws and Legal Framework (Global & Local)
  • Ethics in Cyber Security
  • Risk Management Lifecycle
  • Security Policy Creation and Enforcement
  • Business Continuity and Disaster Recovery Basics