UNIT 1:
network software, reference models: OSI
Network applications, network hardware
Connection oriented network
Theoretical basis for communication
guided transmission media
the public switched telephone networks
UNIT 2:
Sources of security threats
Target Assets and vulnerabilities
UNIT 3:
Active/ Passive – Interference
Active/ Passive – Interference
Impersonation – Worms –Virus
Impersonation – Worms –Virus
Spam’s – Ad ware - Spy ware
IP, Spoofing - ARP spoofing
Trojans and covert channels
Sabotage-Internal treats Environmental threats
Threats to Server security.
UNIT 4:
Authorization and Authentication
types, policies and techniques
Security monitoring and Auditing
Security Requirements Specifications
Security Policies and Procedures,
UNIT 5:
Cyber security design and maintaining resilience
Critical security components
Cloud Security and Application Security