Prospectus Isc

Embed Size (px)

Citation preview

  • 7/27/2019 Prospectus Isc

    1/72

    PROSPECTUS

    Level1

    Level2

    Certified System Security Analyst [CSSA]

    Certified System Security Professional [CSSP]

    Level3 C e r t if i e d I nf o r m at i o n S ys t e m s S e c u r it y Au d i t or [ C I S SA ]

    C e r t if i e d S y s t e m S e c u r it y S o lu t i o n D e s i gn e r [ C S S SD ]

    Or

    C e r t if i e d C o m p u t er F o r e ns i c P r o f e s s i on a l [ C C F P ]

    Or

    C er t i f ic at i on S ch em e f or I . T. S E CU R IT Y P RO FE S SI ON AL S

    NIELIT

  • 7/27/2019 Prospectus Isc

    2/72

    N a ti on a l I n st i tu t e o f E l e ct r on i cs A nd I nf o rm at i on T e ch n ol og y

    ( N I E L I T )

    ( A n A ut o n o mo u s S ci e n t if i c S o ci e t y o f D e p a rt m e n t of E l e ct r o n ic s & I n f o rm a t io n

    Te c h n o l o g y, M i n i s t r y o f C o m m u n i c a t i o ns & I n f o r m a t i o n Te c h n o l o g y, G o v e r n m e n t o f I n d i a )

    E L EC T RO N IC S N I KE TA N 6 , CG O C O MP L EX , NE W DE L HI -1 1 0 0 0 3

    Mobile and Wire le ss Se curity

    Se curity Standards & Inf ormation Se curity Policy

    Public K e y Inf rastructure and Trust Manage me nt A n a ly s i s o f D i g i ta l E v i de n c e

    S y s te m a n d D e v ic e S e c ur i t y

    Public K e y Inf rastructure and Trust Manage me nt

    Auditing, Pe ne tration Te sting & Inf ormation Se curity

    Risk Management S ei z ur e & I ma g in g o f D i gi t al E v id e nc e

    Cryptography and Ne twork Se curity

    Application Se curity & E-Comme rce

    Se curity Standards & Inf ormation Se curity Policy C y b er C r i me , I n d ia n I T ( A m en d m en t ) A c t 2 0 08 a n d

    Introduction to Compute r Fore nsics

    Certified Information Systems Security Auditor [CISSA]

    D a t ab a s e a n d W eb A p p l ic a t i on S e c u r it y

    C yb er L aw a nd I PR I ss ue s

    I n d us t r i al P r o j ec t [ 4 8 0 H o u r s]

    I n d us t r i al P r o j ec t [ 4 8 0 H o u r s]I n d us t r i al P r o j ec t [ 4 8 0 H o u r s]

    C yb er L aw a nd I PR I ss ue sC o m pu t e r F o r en s i cs f o r W i nd o w s & L i n ux S y st e m s a n d

    Anti-f ore nsics

    Certified Sy stem Sec urity Profes s ional [CSSP]

    Certified System Security Solution Designer [CSSSD]

    Lev el-2

    Lev el-3

    Lev el-3 Lev el-3

    Certification Scheme in Information Securityertification Scheme in Information Security

    Inf ormation Se curity Conce pts

    O p e ra t i n g S y s te m A d m in i s tr a t io n

    C o m pu t e r F u n d am e n ta l s a n d C o m pu t e r N e t wo r k s

    S y s te m S e c ur i t y

    Certified Sy s tem Sec urity Analy s t [CSSA]Lev el-1

    Certified Com puter Forens ic Profes s ional [CCFP]

    At A Glance

  • 7/27/2019 Prospectus Isc

    3/72

    prospectus

    CONTENTS

    1 . N IE LI T - A n I nt ro du ct io n 0 1

    2 . N I E LI T, G o r ak h p ur C e n tr e - A n I n t r od u c ti o n 0 1

    3 . I n f or m a t io n S e c ur i t y E d u ca t i on & A w ar e n es s ( I S EA ) P r o je c t 0 14 . C e r t if i c a ti o n S c h em e i n I n f or m a t io n S e c ur i t y 0 2

    5 . C ou rs e O bj ec ti ve 0 2

    6 . C ou rs e S tr uc tu re 0 3

    7 . E li gi bi li ty C ri te ri a 0 5

    7. 1 Ce rt if ied S ys tem Sec ur it y Ana ly st 05

    7 .2 C er ti fi ed S ys te m S ec ur it y P ro fe ss io na l 0 5

    7 . 3 C er t i fi e d C om pu t er F o r en s ic P r o f es s io n al / Ce r ti f ie d I n fo r ma t io n S y st e ms S e c ur i ty A ud I to r /

    Ce rtifie d Syste m Se cu rity So lu tio n De sig n e r 0 5

    8 . M od e of Ad mi ss io n 0 5

    8.1. R eg ular Cou rse 05

    8.2. Dire ct Course (Distance Cou rse) 05

    9 . R u l es a n d R e g ul a t i on s f o r C a n di d a te s S e e ki n g C e r t if i c a ti o n 0 5

    10. Training Centres 06

    11. Cour se Fee 06

    11.1. Fee For Regular Course 06

    11. 2. Fee Fo r Dir ect Co urse 06

    1 2 . Re g istra tio n 0 7

    13. Calend er of Events for Ce rtifica tio n 07

    14. Entr ance Examination Pattern for Regular Candidates only 07

    1 5 . Ce rtifica tio n Exa min a tio n Pa tte rn 0 8

    16. Cour se Module 08

    17. Guidelines for th e Pr oje ct s 10

    18. Entran ce Examination/ Cer tif ication Examination Centr es 13

    19.Expert Committee for Certification Scheme in Infor mation Security 14

    19 .1. Committee Members 14

    1 9 .2 . Te rms o f th e Re fe re n ce o f th e Co mmitte e 1 4

    A P PE N DI X A : D E TA I LE D S Y LL A BU S L E VE L 1

    CERTIFIED SYSTEM SECURITY ANALYST

    1.1. Comp uter Funda mentals and Computer Netwo rks 15

    1.2. Op erating System Administra tio n 19

    1 .3 . I nf or ma ti on S ec ur it y C on ce pt s 2 2

    1.4. System Secur it y 25

  • 7/27/2019 Prospectus Isc

    4/72

    prospectus

    CONTENTS

    A PP EN DI X B : D ETA IL ED S YL LA BU S L EV EL 2

    CERTIFIED SYSTEM SECURITY PROFESSIONAL

    2.1. Cryptography and Network Security 2 9

    2.2. S ys t em a n d D e vi c e S e cu r it y 3 1

    2.3. M o b i le a n d W i r e l es s S e c u r i t y 3 4

    2.4. D a t ab a s e a n d W eb A p p l i ca t i o n S e c ur i t y 3 8

    A P PE N DI X C : D E TA I LE D S Y LL A BU S L E VE L 3

    C E R TI F I E D S Y S TE M S E C U RI T Y S O L UT I O N D E S IG N E R ( C S S SD )

    3.1. Application Security & E-Comme rce 43

    . 3.2. Public Key Infrastru ctu re and Trust Manag ement 45

    3.3. Secur ity Standar ds & In formation Security Policy 47

    3.4. Cybe r Law and IPR Issu es 49

    C E RT I FI E D I N FO R MAT I ON S Y ST E MS S E CU R IT Y A U DI TO R ( C IS S A)

    4.1. Secur ity Standar ds & In formation Security Policy 51

    4.2. Auditing, Penet ration Testing & In formation Security Risk Managemen t 53

    4.3. Public Key Infrastru ctu re and Trust Manag ement 56

    4.4. Cybe r Law and IPR Issu es 58

    C E RT I FI E D C OM P UT E R F O RE N SI C P R OF E SS I ON A L [ C CF P ]

    5.1. Cybe r Crime, Indian IT ( Amen dment) Act 2008 an d Introdu ctio n to 60Co mp u te r Fo re n sics

    5.2. Seizure & Imag in g of Digit al Evidence 62

    5.3. Analysis of Digital Evidence 64

    5.4. Co mputer Forensics for Windows & Linux Systems and Anti-fore nsics 66

  • 7/27/2019 Prospectus Isc

    5/72

    I E L I T ( N a t io n a l I n s t it u t e o f E l e c tr o n i cs A nd I n f o rm a t i on Te c h n ol o g y ) i s a n au t o n om o u sNs c i en t i f i c s o c i et y o f t h e D e p a rt m e nt o f E l e c tr o n ic s & I n f o r ma t i o n Te c h n ol o g y, M i n i st r y o f C o m mu n i c at i o n s & I n f o rm a t i on Te c h n ol o g y, G o ve r n m en t o f I n d i a wi t h H ea d Q u a r te r s a t Ne wD e lh i . I t is e n vi s io n ed t o b ri n g t h e mo s t up d at e d g l ob a l i n du s tr y r el e va n t co m pu t er e d uc a ti o n,w i t h in t h e r e a c h o f m o r e a n d m o r e i n t he a r ea s of I n f o rm a t i on , E le c t r on i c s a n d C o m mu n i c at i o n

    Te c hn o lo g y ( I EC T ). NI E LI T i s i m pl e me n ti n g a jo i nt sc h em e o f A l l I n di a C o un c il f o r Te c hn i ca lE du ca ti on (A IC TE ) a nd D ep ar tm en t of E le ct ro ni cs & I nf or ma ti on Te ch no lo gy [f or me rl yDepartment of Information Technology (DIT)], Government of India.

    N I EL I T w as f o r me d o n t h e 9 t h N ov em b er 1 9 94 a n d i s r e gi s te r ed u n de r t h e S oc i et i es R e gi s tr at i onA c t , 1 8 6 0 . T h e m an a g e me n t a n d a d m i ni s t ra t i o n o f t h e N I E LI T i s o v e rs e e n b y G o ve r n i ng C o u n ci l ,u nd er t he c h ai rm an sh ip o f t he M i ni st er o f S ta te , C om mu ni ca ti on s & I nf or ma ti on Te ch no lo gy,G o ve r n m en t o f I n d i a. M e m b e rs o f t h e C o u nc i l c o n si s t o f e m i n en t a c a d e mi a f r o m I I Ts , U n i v er s i t ie s ,e t c . a n d p r o f es s i o na l s f r o m t h e i n d u s t ry.

    I E L I T, G o ra k h p ur C e n t re i s a un i t o f N I E LI T w h i ch i s a n a u t o no m o us b o d y o f D e p a rt m e n t o f NE l e ct r o n ic s & I n f o r ma t i o n Te c h n ol o g y (D e i tY ) , M i n i st r y o f C o m mu n i ca t i o n s & I n f o rm a t i onTechnology, Govt. of India. The Centre is a Premier Organization for Education, Training, R&D andC o n su l t a nc y i n I T a n d E l e c tr o n i cs . T h e C e n t r e o f f er s c o u r se s i n a r e a s l i k e E m b ed d e d S y s te m s ,VLSI, Instrumentation, BioInformatics, ITES-BPO, Information Security, Cyber Law, Networkinga n d o t h e r a r e a s o f I n f o r ma t i o n Te c h no l o g y.

    nformation Security is an emerging area. At present there are not many Information security

    Iprofessionals in the country. Also, the Information Security awareness level is low in the

    c o u n tr y. T h i s n ec e s si t a t es d e v el o p me n t o f s p e ci a l i z ed m a n p ow e r, b o t h a t h ig h a n d l o w e nd s .A c c o rd i n g ly, G o ve r n me n t o f I n d i a (D e p a rt m e n t o f E l e ct r o n ic s & I n f o rm a t i on Te c h n ol o g y) h a sl a u n ch e d I n f o r ma t i o n Se c u r it y E d u ca t i o n a nd A w a re n e s s ( I S E A ) Pr o j e ct w i t h t he f o l l ow i n g b r o a daims to

    i . I n tr o du c e I n fo r ma t io n S e cu r it y C u rr i cu l um a t M . Te c h. & B . Te c h. l e ve l a n d R es e ar c h

    Activity / PhD;

    i i. Tr ai n Sy st em A dm in is tr at or s/ P ro fe ss io na ls ;

    i i i . Tr a i n G o ve r n me n t O f f i c er s on I nf o r m at i o n S e c u ri t y i s s ue s i. e . C om p u t er n e t w or k i n g, c yb e rhygiene, data security etc.;

    i v. B r in g I n fo r ma t io n Se c ur i ty Aw ar e ne s s i n th e co u nt r y; a nd

    v. E du ca ti on Exc ha ng e P ro gra mm e.

    U n d e r t h e p r oj e c t, t h e a c t iv i t i es o f i n t r od u c t io n o f I n f o rm a t i on S e c ur i t y cu r r i cu l u m & t r a in i n go f S ys t em A d mi n is t ra t or s a r e b e in g i m pl e me n te d t h ro u gh Re s ou r ce Ce n tr e s ( R C - pr e mi e ri n s t it u t e s l i k e I I Ts a n d I I S c . ) a n d P a rt i c i pa t i n g I n s t it u t e s( P I - N I Ts , G o v t. D e g re e E n g i ne e r i ngC o l le g e s , I I I Ts , S o c i et i e s o f D e i tY, e t c . ). T h e a c t i vi t y o f t r a in i n g o f C e n t ra l a n d S t a t e G o v er n m en to f f i ce r s a r e b e i n g i m p l em e n te d t h r ou g h s i x D e i t Y o r g a ni z a t i on s v i z . C D A C , E R N ET I n d i a , N I EL I T,C E RT- I n , S T Q C D i r ec t o ra t e , & N I C . T h e I n f o r ma t i o n S e c u ri t y a w a re n e ss p ro g r am m e f o r t h ei n d u st r y, e d u c a t io n a l i n s t it u t e s a n d t h e m a s se s i s b e i n g i m p le m e nt e d t h r ou g h C D A C, H y d e ra b a d ,w h ic h i s a l so d e ve l op i ng L e ar n in g M a te r ia l f o r t h e t ra i ni n g o f g o vt . o f fi c er s . O n e o f t h e a c ti v it ye nv is ag ed i s to l au nc h a na ti on al l ev el C er ti fi ca ti on S ch em e fo r I nf or ma ti on S ec ur it yProfessionals. This activity has been assigned to NIELIT.

    3 . In f or m at i on S e cu r it y E d uc a ti o n & A w ar en e ss ( IS E A) P r oj e ct

    2 . N IE L I T , G o r ak h p u r C e n tr e - A n I n t ro d u ct i o n

    01

    prospectus

    1 . N I EL I T - A n I n tr o du c ti o n

  • 7/27/2019 Prospectus Isc

    6/72

    4 . Ce r ti f ic a ti o n S c he m e i n I n fo r ma t io n S e cu ri t y

    5 . C ou r s e O b j ec t i v e

    n e of t h e o b j e ct i v es of t h e I S E A p r o j ec t is t o i m p l em e n t a r ob u s t c e r ti f i c a ti o n m e c ha n i s m i nOI n f o rm a t i on S e cu r i t y w i t h t e c hn i c a l e x p er i e n ce a n d g u i d a nc e f ro m R C ' s ( o f I S E A P r o je c t ) w h i c hwill set the international acceptable standards with NIELIT as the implementing organization.

    W i t h t h e a b ov e o b j ec t i ve i n t h e m i n d , t h e N I EL I T h a s l a u n ch e d t h e f o l l ow i n g c e r t if i c a ti o n s c h em e i nI n f o rm a t i on s e c u r it y w i t h t h re e l e v el s o f c e r t if i c a t io n s c h e me a s a p a r t o f I n f o r ma t i o n s ec u r i tye d u ca t i o n a n d a w a re n e s s p r o j ec t . NI E L I T , G o ra k h p ur C e n tr e i s a c t i ng a s n od a l c e n t re . H ow e ve r t h en a ti o na l i m ag e o f t h e s c he m e i s b e in g m a in t ai n ed b y N I EL I T , Ne w D e lh i a s t h e i m pl e me n ti n gorganization.

    o i m pl e me n t a n at i on a l l e ve l C e rt i fi c at i on S c he m e in I n f or ma t io n S ec u ri t y as p a rt o f t h eTInformation Security Education and Awareness Project of DeitY.The Course structure has been designed to conduct examination for three levels of certification i.e.

    02

    prospectus

    Level-1

    Level-2

    C e rt i f ie d S ys t em S e cu r i ty A n al y s t [C S SA ]

    C er ti fi ed S ys t em S ec u ri t y P ro fe ss io na l [ CS SP ]

    Level-3 C e r t i f ie d I n f o r ma t i o n S y s te m s S e c u r i ty A u d i t or [ C I SS A ]

    C e rt i f ie d S ys t em S e cu r i ty S o lu t io n D e s ig n er [ C SS S D]

    OrC e rt i fi e d C o mp u te r F or e ns i c P r of e ss i o na l [ C C FP ]

    Or

  • 7/27/2019 Prospectus Isc

    7/72

  • 7/27/2019 Prospectus Isc

    8/72

    04

    prospectus

    S .N o. C od e Pap er Th eory(Hours)

    Practical(Hours)

    01. IS-C3-A-01 Security Standards & In f o r m a t io n S e c u r it y P o li c y

    60 60

    02. IS-C3-A-02 Auditing, Penetration Testing & Information Security Risk

    Management

    60 60

    03. IS-C3-A-03 P u b l i c K e y In f r a s t ru c t ur e a n dTrust Management

    60 60

    04. IS-C3-A-04 C y b e r L a w a nd I P R Is s u e s 60 60

    T o t a l 240 240

    + Si x M o nt h In d u s tr i a l P r o je c t (480 Hours)

    Level-3C e rt i fi e d I n fo rm a ti o n S y st e ms S e cu r it y A u di t or ( C IS S A)

    S .N o. C od e Pap er Th eory(Hours)

    Practical(Hours)

    01. IS-C3-F-01 Cyber Crime, Indian IT

    ( Am en d m e n t) Ac t 2 0 08 a ndIntroduction to

    Computer Forensics

    60 60

    02. IS-C3-F-02 S e iz u r e & Im a g i n g of Di g i ta lEvidence

    60 60

    03. IS-C3-F-03 A n al y si s o f D i g i ta l E v i d en c e 60 60

    04. IS-C3-F-04 Computer Forensics for Windows& L in ux S ys te m s a n d A nt i-

    forensics

    60 60

    T o t a l 240 240

    + Si x M o nt h In d u st r ia l P r o je c t (480 Hours)

    Level-3Certified Computer Forensic Professional (CCFP)

    t e r F or e n si c s f o r W i n d o w s & L i n u x S y s t e ms a n d A n t i -f o r en s i c s

  • 7/27/2019 Prospectus Isc

    9/72

    7 . E l ig i b i l it y C r i t er i a

    7 . 1. C er t if i ed S ys t em S e c ur i ty A n al y st ( L ev e l - 1 )

    7.2.Certified System Security Professional (Level - 2)

    7 . 3 . Ce r t i fi e d C o m pu t e r F o r en s i c P r o f es s i on a l / C e r ti f i ed I n f o rm a t io n S y s te m s S e c ur i t y

    A u d it o r / C e r ti f i ed S y s te m S e c ur i t y S o l ut i o n D e s ig n e r ( Le v e l - 3 )

    8 . M od e O f A dm i s si o n :

    9 . R u le s a n d R e gu l at i on s f o r C a nd i da t es S e ek i ng C er t if i ca t io n

    Concurrently with B.E/ B.Tech (All streams) / MCA / 'B' Level/ MBA/M.Sc.(CS/IT/Mathematics/Physics/Electronics)

    PGDCA/ NIELIT 'A' Level/ BCA/Diploma/ B.Sc. (CS/IT/Mathematics/Physics

    L e v el - 1 ( Ce r t i f ie d S y s te m S e c u ri t y A n a l ys t )or

    L e v el - 2 ( Ce r t i f ie d S y s te m S e c u ri t y Pr o f e ss i o n al )or

    N ot e : 1 . Certification Scheme is free For NIELIT Employees( Satisfying the Eligilibilty Criteria for

    P a r ti c u l ar L e v e l) .2. NIELIT E m pl o ye e s A pp l yi n g f o r t h e ce r ti f ic a ti o n n ee d t o s ub m it a l e t te r f r om t h er e e m pl o ye ri n d i ca t i n g t h a t t h e y a r e i n t h e j o b a n d g i v e n p e r m i ss i o n t o a p p e ar i n t h e c e r t i fi c a ti o n .3. C a n d i da t e s t a k i ng a d m i ss i o n i n L ev e l - 3 c a n ch o o s e a n y o n e of t h e th r e e sp e c i al i z a ti o n gi v e nf or L eve l -3 .

    A d m i ss i o n c a n b e t a k en in on e o f t h e f o l l ow i n g m o d e :8.1. Regular Course: C a n d id a t e s w i l l b e pr o v i de d c l a s sr o o m f a c i l it i e s, s i x m o n th s tr a i ni n gw i ll b e p ro v id e d a t N IE L IT C e nt r es o f f er i ng s u ch t r ai n in g p r og ra m .

    8.2. Direct Course( Distance Course) : Direct mode is an option for candidates to enroll through self -s t u dy mo d e w i t ho u t a t t e nd i n g r e g u la r c o u rs e .

    I . A c a nd i da t e c o ul d t a ke r eg u la r s t ud y b y ta k in g a d mi s si o n a t th e I n st i tu t e o f fe r in g s u chtraining programme at Level-1/Level-2 as per eligibility criteria mentioned for

    or

    B.E/ B.Tech/ MCA/B Level/MBA/M.Sc.(CS/IT/Mathematics/Physics/Electronics) or

    PGDCA/ NIELIT A Level/BCA/ Diploma/ B.Sc.(CS/IT/Mathematics/Physics) with 2 yearsrelevant experience.

    B.E./B.Tech(All Streams)/MCA/NIELIT BLevel/MBA/M.Sc(CS/IT/Mathematics/Physics/Electronics) with 2 years relevant experience

    orPGDCA/NIELITALevel/BCA/Diploma/B.Sc. (CS/IT/Mathematics/Physics) with 3 years relevantexperience.

    o

    /Level 3

    05

    prospectus

    th

    18November, 2013.

  • 7/27/2019 Prospectus Isc

    10/72

    06

    prospectus

    1.NIELIT, Gorakhpur Centre

    2.NIELIT, Imphal Centre

    3 . N I EL I T , J a m mu C e n tr e

    M . M . M. E n g i n e e ri n g C o l le g e C a m p us

    Deoria Road, Gorakhpur-UPPin-273010

    Akampat,Post Box No.104,I mp ha l M an ip ur - 7 9 50 01 .

    N e w C a mp u s U n i ve r s it y o f J a m mu ,D r. B R A mb ed ka r R oa dJammu - 180006.

    4.NIELIT, Kolkata Centre

    .NIELIT,

    .NIELIT,

    J a d a vp u r U n i ve r s i ty C a m p usKolkata - 700032

    5 Srinagar Centre

    6 Calicut Centre

    Sidco Electronics ComplexO l d A i rp o rt R oa dR a n gr e t h ,S r i n ag a r - 1 9 00 0 7

    Post Box No. 5, NIT Campus P. O.,Calicut,Kerala - 673601.

    1 0 . T r a in i n g C e n te r s

    Tr ai n in g i s p r ov i de d f o r R eg u la r S t ud e nt s a t f o ll o wi n g N I EL I T C e nt r es fo r L e ve l -1 , Le ve l -2 a n dLevel-3:

    1 1. C ou r se F e e

    1 1 . 1 . F e e F o r R eg u l a r C o u r s e

    1 1 . 2 . F e e F o r D ir e c t C o u r se

    F ee s tr uc tu re i s s am e f or L ev e l- 1 , L e ve l- 2 an d L ev e l- 3

  • 7/27/2019 Prospectus Isc

    11/72

    07

    prospectus

    13. Calendar Of Events For Certification

    112. RegistrationR e gi s t ra t i o n i s a p r e - r e qu i s i te f o r a p p e a ri n g i n t h e c e r t i f ic a t i on e x a m i n at i o n . S o me i m p o r t an taspects of registration are:( i ) R eg i st ra t io n N o i s u n iq u e a n d w i ll r e ma i n s a me f o r a p a rt i cu l ar l e ve l .

    ( ii ) Re gi st ra ti on w il l b e va li d f or a p er io d o f 4 y ea rs f or a p ar ti cu la r l eve l a ft er w hi chre- registration is required.

    ( i ii ) A f t er c o mp l et i on o f a p a rt i cu l ar l e ve l s u cc e ss f ul l y r e gi s tr at i on i s a l lo w ed f o r n e xt h i gh e rlevel a f te r p ay in g t he pr es cr ib ed f ee .

    ( i v) R eg i st ra t io n i s o p en t h ro u gh o ut t h e y ea r a n d v al i d f o r a s p ec i fi e d n u mb e r o f c o ns e cu t iv ee i g h t ex a m i na t i o ns t a k in g i n t o a cc o u n t t h e c ut - of f d a t e f or t h e n ex t i m me d i a tee x a mi n a t i on a f t e r r e g i st r at i o n . Th e r e i s a cu t -o f f d a t e b ey o n d w h i c h th e r e gi s t ra n t scannot take immediate examination.

    (v) Registration Fee is 500/- + Service Tax(as applica ble)

    Schedule For August, 2013 Batch of Certification Scheme in Information SecurityLevel-1, Level-2 and Level-3

    Last dateforsubmission ofEntranceExam

    Application

    EntranceExamDate

    Admission Cut-offdate

    Commencementdate of classes

    Lastd at e f orsubmissi on o f Registration

    Form

    Last dateforsubmission of fi ll ed-i n Exa mform

    Last dateforsubmission of f il led-i n E xamform with

    l at e f ee

    Date of Commencement of exam

    Dat e o f Declaration ofResults

    08thAugust

    2013

    25thAugust

    2013

    16thSeptember

    2013

    16thSeptember

    2013

    18thNovembe

    r

    2013

    27thDecember

    2013

    10thJanuary

    2014

    First weekof

    February2014

    Last weeko f Ma rch

    2014

    13.2 For Direct Students

    13.1 For Regular Students

    S ch ed ul e F o r Au gu st , 20 13 B at ch of Ce rt if i ca t ion S ch eme i n I n fo rma t ion Se c ur i ty Le v el -1 , Le v el -2 an d L ev el -3

    L as t da t e f o rsubmission of

    Registration Form

    Last date forsubmission of

    filled-in Examform

    L a st d at e fo rsubmission of

    f i l l ed - in E x a m f o r mw i th la t e f e e

    D ate of Commencement of

    exam

    Date of Declaration of

    Results

    18t h November, 2013

    27t hD ec e mb e r , 2 0 13

    10t hJanuary, 2014

    F i rs t we e k o f F eb r u ar y , 2 0 14

    La st w ee k o f M ar ch , 2 01 4

    1 4 . En t ra n ce E x am i na t io n p a tt e rn f o r Re g ul a r Ca n di d at e s o nl y

    1 6 9 ( 1 5 0 + 1 9 S e r v i c e Ta x )

    D e m an d d r a ft dr a wn in f av o ur o f N I E LI T, Go r a kh p u r C e n t re pa y ab l e a t G o ra k h p ur.

    Wwww.nielitgkp.edu.inWwww.nielit.in

  • 7/27/2019 Prospectus Isc

    12/72

    08

    prospectus

    1 6 . C o u rs e M o d ul e s

    LEVEL-1C E R TI F I E D S Y S TE M S E C U R I TY A N A L Y S T

    S.N o. Cod e Pap er Max. Mar k s

    1. I S-C1- 01 Compute r Funda ment als A nd Compute r Ne tw orks 100

    2. I S-C1- 02 Ope r ati ng Sys te m A dmini st r ati on 100

    3. I S-C1- 03 Infor mat ion S ecur i ty Conce pts 100

    4. I S-C1- 04 Sys te m S ecuri ty 100

    5. I S-C1- 05 Pr a cti cal 100

    1 5 . C e r ti f i c at i o n E x a m in a t i on P a t t er n

    T h e e x a m in a t i on f o r I n f o r ma t i o n S e c ur i t y C e r ti f i c a ti o n S c h e m e w i l l b e c o n d u c te d o n f o l l o w in gpattern:

    i . E x am i na t io n w i ll b e c o nd u ct e d t w o t i me s i n a y e ar o n l a st w e ek o f D e ce m be r /J a nu a ry a n dJune/July.

    i i. T he t he or y e xa mi na ti on o f e ac h p ap er w il l c on ta in b ot h o bj ec ti ve a s w el l a s s ub je ct iv e

    questions.

    i i i. To q u al i fy f or a p a ss i n a mo d ul e , a ca n di d at e mu s t ha ve o bt a in e d a t l ea s t 50 % i n e ac h th e or ya n d p r a ct i c a l e x a mi n a t i on .

    i v. T h er e wi l l b e a s i ng l e a p pl i ca t io n fo r m f o r e x am i na t io n an d f o r e a ch e xa m in a ti o n t h e c a nd i da t eh as to fi ll i n t he sa id f or m. Ex am in at io n f or m w il l b e a va il ab le fo r f re e d ow nl oa d f ro m o urwebsite (http://www.nielitgkp.edu.in) from 18 November, 2013.

    v. O n su cc es sf ul c om pl et io n of a ll m od ul es ( th eo ry a nd p ra ct ic al ) of l ev el s 1& 2 t he c an di da te w il lb e a wa r d e d c e r ti f i c a te . B ut i n th e c as e o f l e v el 3 c a n d id a t e h a v e t o c le a r a l l t h e th e o ry p a pe r s ,

    p ra ct ic al a nd v iv a co rr es po nd in g t o t he i n du st ri al p ro je ct .

    V i . T h e s t ru c tu r e f o r t h e e x am i na t io n f e e i s a s f o ll o ws :

    Fo r L eve l - 3 c an di da te s h ave to

    c h o o se o n e o f t h e th r e e s p e c ia l i z at i o n g i v e n f o r L e v el - 3 .

    E x am i na t io n F e e

    F ee s t r uc t ur e i s s am e f o r L e ve l - 1 , Le v el - 2 a n d L e ve l -3

  • 7/27/2019 Prospectus Isc

    13/72

    09

    prospectus

    S .N o. Cod e Pap er Max. M ark s

    01. I S -C2-01 Cr yptogra phy and N etw or k S ecuri ty 100

    02. I S -C2-02 Sys te m and De vice Se curit y 100

    03. I S -C2-03 Mobi le a nd Wire les s S ecuri ty 100

    04. I S -C2-04 Da taba s e and We b Appl ic ati on Se curit y 100

    05. I S -C2-05 Pra cti ca l 100

    S .N o. Cod e Pap er Max. M ark s

    01. IS - C3- D -01 Appl ic ati on S ec ur it y & E-Com merc e 100

    02. IS -C3- D-02 Publ ic Ke y In fra s truct ur e and T rust

    Management

    100

    03 . I S- C3- D- 03 Se cu rit y Stan da r ds & I nf or mat ion S ecur i tyPolicy 100

    04. IS - C3- D -04 Cyber La w a nd I P R Iss ues 100

    05. IS - C3- D -05 Pra cti ca l 100

    S .N o. Cod e Pap er Max. M ark s

    01 . I S- C3 -A -0 1 Se cu rit y Stan da r ds & I nf or mat ion S ecur i tyPolicy

    100

    0 2. I S- C3 -A -0 2 Au di t i ng , Pen e tr a tio n T es tin g & In fo rmat i on

    Security Risk Management

    100

    03. I S- C3-A -03 Publ ic Ke y In fra s truct ur e and T rustManagement

    100

    04. I S - C3-A -04 Cyber La w a nd I P R Iss ues 100

    05. I S - C3-A -05 Pra cti ca l 100

    Level-2C e r ti f i e d S y s te m S e c ur i t y P r o f es s i on a l ( 6 M o n th s )

    Level-3C e rt i fi ed S y st e m S e cu r it y S ol u ti o n D es i gn e r ( 6 M o nt h s + 6

    M o n t h I n d us t r ia l p r o je c t )

    Level-3C er t if i ed I n fo r ma t io n S y st e ms S ec u ri t y A u di t or ( 6 M o nt h s + 6

    M o n t h I n d us t r i al p r o j ec t )

  • 7/27/2019 Prospectus Isc

    14/72

    10

    prospectus

    Or

    Or

    1 7. G ui d el i ne s f o r t h e P r oj e ct s

    In Level-3 there is an Industrial Project in the NIELIT Certification Scheme, in Information Security.This project is an an integral part of the Level3, to qualify for the certification at level3. The Project isi de n ti f ie d b y t h e s t ud e nt u nd e r g u id a nc e a n d s u pp o rt of f a cu l ty, ma n ag e me n t o f t h e r e sp e ct i vei n s ti t u te a n d t h r o u gh I n d u st r i al I n t e ra c t io n w i th t h e I n du s t r y in w h i ch s t u d en t w o u ld u n d e rg o t h ep r oj e ct . T h e P r oj e ct w o rk s h ou l d b e o f n a tu r e o f P r od u ct / sy s te m d e si g n a n d d e ve l op me n t. T h ep r o bl e m m a y b e s e l e c t ed f r o m a n i n d u s tr y / i ns t i tu t i on .

    The project has to be done individually and no grouping is allowed. There is only one project to be

    s u bm i tt e d. P r o je c t i s ev al u at e d a ga i ns t 5 00 m ar k s. O u t o f 5 00 m a rk s 1 00 m a rk s a re e a r ma r ke d f o rp ro je ct g ui de fr om t he ce nt re ,1 00 m ar ks ar e e ar ma rk ed f or p ro je ct gu id e/ su pe rv is or f ro m t hei n d u st r y w h e r e s t u de n t i s un d e r go i n g t h e p r o j ec t a n d 3 0 0 m a r ks ar e ea r m ar k e d f o r v i v a- v oi c e t o b ec o n d uc t e d b y a n e x t e rn a l e x p e rt a n d i t i s n e c e ss a r y t h at s t u d en t o b t ai n 5 0 % m a r ks i n e a c h t o p a s s t h ep r o j e ct p a r t . I n p r o j ec t o n e m e m be r c o m mi t t ee e x p e r t s i ts f o r t h e e v al u a ti o n a t t h e e x t e rn a l e x p e rte n d . P r oj e c t h as t o b e s u b mi t t ed a l o n g w i t h a f ee o f R s 5 0 0 p l u s s er v i c e t ax a s a p pl i c ab l e (i n t h e f o r m o f d r a ft i n th e f a vo u r o f N I E LI T, Gorakhpur Centre and payable at Gorakhpur), along with certificate int he p re sc ri be d f or ma t . A v iv a- vo ce w il l b e c on du ct ed b y a n e xp er t n om in at ed b y t he N IE LI TG o ra k hp u r C e nt r e f o r t h e e va l ua t io n by ex t er n al e x pe r t, as f ar a s po s si b le n ea r t h e c a nd i da te ' sl o c a ti o n . In c a se o f D i r ec t C an d i da t e s 2 0 0 m a r ks a r e e a r ma r k ed f o r p r o j ec t g ui d e /s u p er v i s or f r o m t h ei n d u st r y a s t h e r e w il l b e n o i n t e r na l g u i de .

    1 . O bj e c t iv e o f th e P r o je c t

    T h e a im o f t h e pr o j e c t i s t o g i v e t h e s tu d e n ts a n in t e g ra t e d e x p er i e n c e i n s o lv i n g a r e al l i f e p r o bl e m b ya p pl y in g k n ow le d ge a n d s k il l s ga i ne d o n c om pl e ti o n of t h eo r y pa pe r s up t o l ev e l3 . I t pr o vi de s a no c c a si o n f or s t u de n t s to r e a li z e t he i m po r t a nc e o f r e s o u rc e a n d t i me m a n ag e m en t , o wn e r s h ip o f t a s ktowards deliverables, innovation and efficiency in task management. It also provides a goodo p po r tu n it y fo r s t ud e nt s to b u il d , en h an c e an d s u st a in h ig h l ev e ls o f p r of e ss i on a l c o nd u ct a ndp e rf o rm an c e an d e v ol v es a p r ob l em s o lv e r f ra m e of m i nd i n s tu d en t . It i s a ls o f el t t ha t ta k in g u p t h ep r o j ec t b y a s tu d e n t p r e p ar e s h i m f o r a j o b i n i n du s t r y an d e l s e wh e r e .

    2 . W h o c ou l d b e a S u p er v is o r/ G ui d e:

    A g ui de f or p ro je ct s ho ul d b e a p er so n wi th M .Te ch o r e qu iv al en t qu al if ic at io n an d a de qu at eexperience in the area in which the student has chosen the Project.There will be two guides one fromt h e c e n t re a t w h i c h t h e s t ud e n t i s u n d er g o in g t h e c o u r se a n d o t h e r f r o m t h e I n d us t r y a t w h ic h t h e

    S.N o. C od e Pap er Max. M ark s

    01. IS -C3-F-01 Cyber Cr ime , Indian IT (Am endme nt) A ct

    2 0 0 8 a nd I n tr o d uc t io n t oComputer Forensics

    100

    02. IS -C3-F-02 S eiz ure & Im aging of Di gita l Evi dence 100

    03. IS -C3-F-03 A nalys i s of D igi tal Evide nce 100

    04. IS -C3-F-04 Comput er F orens ic s for Wi ndow s & LinuxSystems and Anti-forensics

    100

    05. IS -C3-F-05 P rac tic al 100

    Level-3C e r t if i e d C o m pu t e r F o r e ns i c P r o f es s i on a l ( 6 M o n t hs + 6 M o n t h

    Industrial project )

  • 7/27/2019 Prospectus Isc

    15/72

    11

    prospectus

    Or

    Or

    s t u de n t w il l d o t h e pr o j e c t. R eg a r di n g g u i de f r o m t h e I n du s t r y th e Q u a li f i c at i o n f or t h e g u id e c o u ld b eB.Tech with five year of adequate experience in the area in which the student has chosen the project.T h e I n s t it u t e c o n c e rn e d w i l l r e n d er a l l h e l p i n c l ud i n g t h e n o m in a t io n o f t h e g u i de s .

    3 . T i me o f S u bm i s si o n o f P r oj e c t

    Students can submit the project only after clearing all papers at Level3.

    P r o j ec t s w o u l d b e a p p ro x i ma t e ly 48 0 m a n -h o u r s a n d s h o u ld b e o f a b o ut 50 p a g es (e x c lu d i ng c o d in g )a nd c ar ri es a t o ta l o f 5 00 m ar ks (1 00 m ar ks f o r p ro j ec t g ui de f r om t he c e nt re ,1 00 m ar ks f o r p ro je ctg u i de / s u pe r v i so r f r o m t h e i nd u s tr y a n d 3 0 0 m a r ks f o r v i va - vo i c e t o b e co n d u ct e d b y e x te r n a l e x p e rt ) .

    4 . S o m e i m p or t a n t n o t es w h i l e p r e pa r i n g t h e p r o je c t p r o p os a l

    T h e f o l lo w i n g s u g ge s t e d g u i de l i n es m a y b y f o l lo w e d i n p r e p ar i n g t h e F i n al p r o j ec t R e po r t :

    a. G oo d q ua li ty wh it e ex ec ut iv e b on d p ap er A 4 s iz e sh ou ld b e u se d f or t yp in g a nd d up li ca ti on . Ca res h o u l d b e t a ke n t o a v oi d s m u dg i n g w h i le d u p l ic a t in g t h e c o p ie s .

    b . P a g e S p e ci f i c at i o n: ( W ri t t en p a p er a n d s o u r ce c o d e )

    L e f t m a r gi n 3 . 0 c m sR i gh t m a r gi n 3 . 0 c m sTo p 2 .7 c msB ot to m 2 .7 c ms

    c . P a ge n u mb er s A l l t e xt p ag e s a s we l l a s Pr o gr am s o ur c e co d e l i st i ng s h ou l d b e nu m be r ed a t th eb o tt o m c e nt e r o f t h e p a ge s .

    5. Submission of Project Report to NIELIT Centres

    T h e s t ud e n t wi l l s u b mi t h i s /h e r p r o j e ct r e p o rt i n t h e p re s c r ib e d f o r ma t . T h e Pr o j e ct R e po r t s h o ul dinclude:

    1. Two hard Copies of the Project Report2. Soft copy of project on Floppy/CD3. The Project Report may be about 50 pages (excluding coding).4 . D ra f t o f R s 5 0 0+ s e r vi c e t a x a s a pp l i ca b l e i n t he f a v o ur o f N I E L IT , G O R A K HP U R C E N TR E p a ya b l eat Gorakhpur.

  • 7/27/2019 Prospectus Isc

    16/72

    prospectus

    12

    F OR MAT F OR CE RT IF IC AT E F RO M N IE LI T C EN TR ES F OR PR OJ EC T AT L EV EL -3

    Th i s i s t o c e rt i f y t h at t h i s i s a b o n a fi d e r e co r d o f t h e P r oje c t Wo r k ( Ti tl e d__________________________ ) done satisfactorily at NIELIT Centre_______________by Mr./Ms ___________________________ havingR eg i st ra t io n N u m be r _ _ __ _ __ _ __ _ __ _ i n p a r t ia l f u lf i ll m en t o f C e rt i fi c at i on a tL e v el 3 o f N I E LI T C e r t i fi c a t io n S c h e me i n I n f or m a t io n S e c ur i t y.

    T h is r e po r t or a s i mi l ar r e po r t on t h e to p ic h a s no t b ee n s ub m it t ed f o r a ny o t he re x am i na t io n a nd d o es n o t fo r m p a rt o f a ny o t he r c o ur s es u n de r go ne b y t hecandidate.

    P l a c e : S i g n at u r e o f C a n di d a t e

    Date :

    S i g na t u re o f g u i d e f r o mt h e N IE L IT C E NT R E

    N am e & S ea l o f N IE LI T Ce nt re

    S ig na tu re o f g ui de f r om t heIndustry

    N am e & S ea l o f t h e I n du s tr y

  • 7/27/2019 Prospectus Isc

    17/72

    13

    prospectus

    Or

    Or

    1 8. E nt r an c e E x am i na t io n / F i na l E x am in a ti o n C e nt r es ( w it h A l ph a c o de )

    E XA MI NAT IO N P RO PO SE D TO B E C ON DU CT ED AT T HE CE NT RE S A LL OV ER I ND IA A S

    G I VE N B E LO W:

    IS

    Note : N I E L IT r e s e r v e s t h e r i g ht t o c h a n ge / c an c e l a n y c e n t re m e n t i o ne d a b o ve . I n s u c h c a s ec a nd id a te s w h o h av e a p pl i ed f o r t h at c e nt r e w i ll b e a l lo c at e d t h ei r s e co n d c h oi c e/ n ea r es t c e nt r eexamination centre.

    J am mu & K a shm ir De l hi M a har as htr a Or i ssa U t t ar P r a d e sh

    J a m m u

    J K J A M

    S r i n a g a r

    J K S N G

    New Delhi

    DLNDL

    A u r a n g a b a d

    M H A U R

    B hubaneshwar

    O R B H U

    Lucknow

    UPLNW

    Gorakhpur

    U P G K P

    Cha nd i ga rh Ke ra l a Wes t B eng a l Ta mi l N ad u B iha r

    C h a n d i g a r h

    C H C H A

    C alicut

    K R C A L

    K o l k a t a

    W B K K T

    C hennai

    TNC HN

    P a t n a

    B H P A T

    M a n i p u r A n dh r a P r a d e sh K a r n a t a k a

    I m p h a l

    M N I M P

    Hyderabad

    APHYD

    B angalore

    K R B A N

  • 7/27/2019 Prospectus Isc

    18/72

    1 9 .E x pe r t C o mm i tt e e f o r c e rt i fi c at i on s c he m e i n I n fo r ma t io n S e cu r it y

    1 9 .1 . C o mm i tt e e M e m be r s :

    T h e r e i s a n E x p e r t C o m m it t e e c o n s ti t u t ed f o r t h e c e r t i fi c a ti o n s c h e m e i n I n f or m a t i on S e c u r i t y w i th

    t h e a p p r ov a l o f S e c r e ta r y, D e p a r tm e n t o f I n f o r ma t i o n Te c h n o lo g y. T h e f o l lo w i n g i s t h e s t ru c t u r e o f

    the Committee:

    14

    prospectus

    1 9. 2. T he T er ms o f th e R ef er en ce o f th e C om mi tt ee a re a s f ol lo ws :-

    i) Pro f. Suk umar Nan di,IIT,Guwahati

    ii) Dr.M.S. Gaur,

    M a l v i ya N a t i o na l I n s t it u t e o f Te c h n o lo g y ( M NI T ) , Ja i p u r

    iii) Dr. Kam lesh Baj aj, CEO

    D a t a S ec u r i ty C o u n ci l o f I n d i a ( D S CI ) , N ew D e l hi

    iv) Dr. Ajay Data

    CEO,Data Infos ys Limited

    Jaip ur

    v ) Shri San jay Vyas , Jo int Director,

    HRD Division, DeitY,New Delhi

    v i) Representative of AICTE

    v ii) Representative of BSNL

    V iii ) S hr i Al ok Tr ipa th i, J oi nt D ir ec to r

    NIELIT, Centre Gorakhpur

    IX) Shri Basab Das gup ta, Deputy DirectorNIELIT, Delhi

    Chairman

    Member

    Member

    Member

    Member

    Member

    Member

    Member

    M e mb e r S e cr e ta r y

  • 7/27/2019 Prospectus Isc

    19/72

    15

    prospectus

    LEVEL-1

    C E R T IF I E D S Y S TE M S E C U R I TY A N A L Y S T

    L e c t u re H o u r s: 6 0 H ou r sPractical Hours: 60Hours

    I S - C1 - 0 1: C o m p u t er F u n d a m en t a l s a n d C o m pu t e r N e t w or k s

    A pp en di x A

    D e t ai l e d S y l la b u s

    What is a Computer , How computers operate ,Types of computers , The computing environment,The

    Enterprise Computer Environment , Types of computers in the enterprise, Where the PC fits in the

    e n te r pr i se e nv i ro n me n t , C om p ut e rs a nd P C H a rd w ar e Ar c hi t ec t ur al C o mp o ne n ts , CP U s,

    C h i p se t s , Me m o ry , I / O , C o mp o n e nt i n t e r a ct i o n , P C S o f t wa r e , C I S C v e rs u s R I S C c o m p ut e r m o d el s

    , S o f t wa r e , A s s e mb l y, i n t e r p r et e d , a n d c o m pi l e d s o f t wa r e , M o t h er B o a rd C o m po n e n ts , C P U , C h i p s et s

    , In te rr up t an d D MA c on tr ol le rs a nd h ow t he y wo rk , Me mo ry , St at ic a nd d yn am ic R AM a nd t he ir

    d e ri va t io n s B I OS , C MO S R A M , I /O s u bs y st e m , E mb e dd e d a n d a d d- i n d e vi c es

    Overview of PC Architecture 2 Hours

    Dif ferent BUS standards 3 Hours S e ri a l I n te r co n ne c ts a n d L a ye r ed P ro t oc o ls , Pa ra l le l m o de l s , S er i al m o de l s, Sy n ch r on o us v er s us

    a s y nc h r o no u s o p e ra t i o n , P h ys i c a l L a y er F u n c ti o n a n d S e r v ic e s , L o g i ca l S u b - Bl o c k , E x p a ns i o n s S lo t s

    S r. N o. T o pi c s N u mb e r o f H o ur s

    1. O ve r vi ew o f P C a rc hit e ct ur e 0 22. D i f fer en t b u s s t an dar d s ( I S A , P C I , P C M CI A ) 0 33. D i ff e re n t A dd - o n C a rd s l ik e m e mo r y, G r ap h ic s e t c. 0 34. O p er a t in g s y st e m a r c hi t ec t u re 0 2

    5. P r o cess M an agem en t 0 36. M emo r y M an ag em en t 0 67. F i le s y st e m M a na g e me n t 0 38. I n t ro d uc t io n t o N et w o rk O S 0 39. B as ic s o f C o mm un ic a t io n S ys t ems 0 310. T r a ns m is s io n M e d ia 0 311. O S I , T CP / IP M o de ls 0 612. L oc al Ar ea N et wo rk s 0 213. W id e Ar ea N et wo rk s 0 314. Networking Protocols 0315. I P ad d r es s i ng & R o u t i ng 0 3

    16. Understanding & recognizing TCP, IP, UDP, ICMP,Ethernet Packets

    03

    17. I n t er net w o r k in g D ev i ces ( H u b, S w i t ch, R o u t er et c. ) 0 518. Wir e less Net works 04

    Total 60

  • 7/27/2019 Prospectus Isc

    20/72

    a n d A d d - In C a rd s , Bu s e vo l u t io n a n d t h e bu s w ar s , I SA , E I SA , M CA , P C I, P C I- X , P C I E x p re s s

    , PC MI A, V id eo a nd M on it or Ty pe s , P or ts S er ia l a nd p ar al le l , US B a nd F ir eW ir e , E th er ne t , Ma ss

    S t or a ge D ev i ce s , Fl o pp y an d h a rd d r iv e s , H i gh a nd l o w l e ve l f o rm a tt i ng , C Ds a nd D V Ds , Ty p es ,

    s p e e ds , a n d f o r m at t i n g

    Add-on Video Cards ,Add-on Memory Cards , Add-on Graphics Cards

    I n tr o du c ti o n to O p er at i ng S ys t em s , OS I n te r na l s an d A r ch i te c tu r e , Me m or y ma n ag e me n t,

    p r o c es s e s a nd t h r e ad s , F i l e s, f i l e s y st e m s an d d i r e ct o r y s tr u c t ur e , T h e Bo o t P ro c e ss , P O S T ,

    Windows boot process , Linux boot process , Basic OS Configuration

    Ty p e s of P r o ce s s , M ul t i t a sk i n g , I n p u t , Ou t p u t & E r r or r e d i re c t io n , M a n ag i n g r u n n in g p r o c es s , K i ll i n g

    S t ar t ed p r oc e ss , U n de r st a nd i ng t h e i n it pr o ce s s , Pa r en t p r oc e ss e s , To o ls fo r w or k in g w i th

    p r o ce s s e s, P r o ce s s sc h e d ul i n g , I n t e r p r o c es s c om m u ni c a t io n , S i gn a l s , Pi p e s , FI F O , Q u e ue s ,

    S e m a ph o r es , S h a r ed M e m or y

    Different Add-on cards 3 Hours

    Operating System Architecture 2 Hours

    Process Management 3 Hours

    16

    prospectus

    Memory Management 6 Hours

    File System Management 3 Hours

    I n t ro d u ct i o n t o N e t wo r k o p er a t i ng S y s te m 3 H o u rs

    Basics of Communication Systems 3 Hours

    W h a t is M e mo r y Ma n a g e me n t , Ab s t ra c t Mo d e l o f V i r t ua l M e m or y , De m a n d P a g in g S w ap p i n g , S h a re d

    V i rt u al M e mo r y , P hy s ic a l & V i rt u al a d dr e ss i ng M o de s , A c c es s C on t ro l , C ac h es , B u f f er C a ch e , Pa g e

    C a c he , S w a p C a c he , H a r d w a re C a c h es , P a g e Ta b l e s, P a g e A l l oc a t i on & d e a l lo c a t io n , M e m o ryM a pp i ng , D em a nd P ag i ng , Pa g e Ca c he , S wa p pi n g o u t & d i sc a rd i ng P ag e s , Re d uc i ng S i ze o f P ag e &

    b u f f e r c a c h e , Sw a p pi n g o u t s y st e m s h a r ed m e m or y p a g es , S wa p , C a ch e , S w ap p i n g P a ge s i n

    Ty p es of f i le s ys t em , C o mp a ri s on of f i le sy s te m , V ir t ua l f i le S ys t em , P ro g ra m u s ed t o ma n ag e fi l e

    s ys te m , Ma ki ng a fi le sy st em , C he ck in g a fi le sy st em , Fi le Sy st em F ra gm en ta ti on , Fi le

    Fragmentation , Free Space Fragmentation, Related file Fragmentation

    N e t wo r k in g O S S o f t wa r e , N e tw o r k b as i c s a nd n e t wo r k m o de l s , P r o t oc o l s , O S I a n d T C P Dr i v er s

    Basic Telecommunication System ,Types of Communication , Transmission Impairments , Analog

    Versus Digital Transmission , Components, Data representation, Data Flow , Issues in Computer

    N e t wo r k in g , Th e B e g i nn i n g o f t h e I n t e rn e t , Se r v i ce an d A p p l i ca t i o ns , P a ck e t S w i tc h i n g C o n ce p t s ,

    V i r t ua l C i r cu i t , D a t a g ra m S e r v ic e , S o u r c e R ou t i n g , I s s u e s i n C o mp u t e r N e t wo r k i ng

  • 7/27/2019 Prospectus Isc

    21/72

    Transmission Media 3 hours

    O S I M o d el , T C P /I P M o d el 6 h o u rs

    Local Area Networks 2 hours

    Wide Area Networks 3 hours

    Networking Protocols 3 hours

    IP Addressing and Routing 3 hours

    Understanding and Recognizing TCP,IP UDP, ICMP,Ethernet Packets 3 hours

    Tw i st e d P ai r C a bl e ,C oa x ia l C a bl e , F i be r O p ti c C a bl e , U n gu i de d M e di a : W i re l es s Ra d io Wa ve s ,

    Micro Waves , Infrared

    O S I M od e l , L ay er e d A r ch i te c tu r e , Pe e r t o Pe e r P r oc e ss , En c ap s ul a ti o n , L ay er s i n th e OS I M o de l ,P h ys i ca l L a ye r , D a ta L i nk L ay er , N e tw o rk L a ye r , Tr a ns p or t L ay er , S e ss i on L a ye r , P r es e nt a ti o n

    L a y er , A p p l i ca t i o n L ay e r , S u m m ar y o f L a ye r s , T CP / I P Pr o t oc o l S u i t e , P hy s i ca l a n d D a t a L in k L a ye r s ,

    Network Layer , Transport Layer

    T h e E t h er n e t L A N , L A N P r o to c o l , C S M A / CD p r o t o co l , E t h e r ne t A d d r e ss e s , E t h e rn e t F r am e F o rm a t ,

    L A N Tr a n sm i s si o n M e d i a , L A N To p o l og i e s , M e d i u m A c c e ss C o n t r ol P r o to c o l s i n L A N s, L A N S t a n d ar d s ,

    L A N B r i dg e , W i r e l e s s L AN s

    I s su e s i n W i de a r e a N e tw o rk i ng , X . 2 5 P ro t oc o l , O v e rv i ew o f X . 2 5 , A S a te l li t e- B as e d X . 25 N e tw o rk s ,

    A d d r es s i n g i n X . 2 5 N e t wo r k s

    Internetworking, Need for Network Layer, Internet as a datagram network, Internet as a connection

    l e s s n e tw o r k, I P v 4 , D a t a gr a m , F r a g m en t a t i on , C h e c ks u m , I P v6 , A d v a nt a g e s o f P a ck e t F or m a t ,Extension Headers

    I P V 4 A d d r es s , Ad d r e ss Sp a c e , N o t a ti o n s , C l a s sf u l A d d r es s i ng , Cl a s s le s s A d d r es s i n g, Ne t w or k

    A d d r es s Tr a n sl a t i on ( N AT ) , I P v 6 A d d r es s , S t r u ct u r e , A d dr e s s S p ac e , R o ut i n g p r o t oc o l s, D i r e c t

    D e l i ve r y, I n di r e c t D e l i ve r y, Ro u t i ng Ta b l e s a n d n e x t- H o p R o ut i n g A d a p t iv e r o u t in g , R o u ti n g w i t hi n

    Autonomous systems, Open shortest path First (OSPF), Flooding, Routing between autonomous

    systems, Exterior gate way protocol, Border Gate way Protocol

    T C P ( Tr a n sm i s si o n C o n t ro l P r o t oc o l ) , F l o w C on t r o l a n d A c k n ow l e d gm e n ts , S t o p -a n d - wa i t P r o t oc o l ,

    S l i d i ng W i n d ow Pr o t oc o l , C on g e s ti o n C o n tr o l , I P (I n t e rn e t P r o to c o l ), O v er v i e w o f I P, I n te r n e t

    A d dr e ss i ng S c he m e , Do t te d D e ci ma l n o ta t io n , A d dr e ss R es o lu t io n P ro t oc o l , R e ve r se A d d re s s

    r e so l ut i on p r o to c ol , I P D at a gr am f o rm a t , U D P ( Us e r D a ta g ra m P ro t oc o l) , U D P D at a gr am f o rm a t ,

    Overview of ICMP, Overview of Ethernet Packets

    17

    prospectus

  • 7/27/2019 Prospectus Isc

    22/72

    Internet Working Devices 5 Hours

    Wireless Networks 4 Hours

    HUB, Switch and Routers

    I n t r od u c t io n t o p e r s on a l A r e a N e tw o r ks , O v e rv i e w o f B l u e t oo t h , H o me R F , I R D A , I E E E 8 0 2 . 1 X

    1 . A + J um ps ta rt P C H ar dw ar e a nd O. S. B as ic s b y Fa it he We mb en ,B PB.

    2. A+ Complete study Guide by Quentum Doctor.,BPB

    3 . C C N A s t u d y G u i d e b y To d d L a m ma l e , BP B

    t h4 . N + s t u d y G u i d e 4 E d i t io n D a v id G r o t h, B P B

    References

    18

    prospectus

    PRACTICAL ASSIGNMENTS Total: 60 hrs

  • 7/27/2019 Prospectus Isc

    23/72

    IS-C1-02: Operating System Administration

    L e c t ur e H ou r s : 6 0 H o u rs

    P r a ct i c a l H o u rs : 6 0 Ho u r s

    S. No. Topic No. of Hours

    1. Introduction to Windows Operating System 02

    2. Installation and Conf iguration 07

    3. Installation and Managing Active Directory 05

    4. Managing and Securing Resources 12

    5. Perf ormance and Maintenance 05

    6. Introduction to Linux 02

    7. Linux Installa tion 03

    8. Booting Procedures 03

    9. Linux Commands and Shell Programming 07

    10. System Administration 10

    11. X Windows 02

    12. Perf ormance Tuning 02

    W I N DO W S O PE R A T IN G S Y S TE M

    L IN UX O PE RA TI NG S YS TE M

    19

    prospectus

    D e t ai l e d S y l la b u s

    W i nd o ws O p er a ti n g S y st e m

    I nt r od u ct i on t o W i nd ow s O p er a ti ng S y st e m 0 2 ho u rs

    Installation and Conf iguration 07hours

    Installation and Managing Active Directory 02hours

    Windows 2003 Server, System Requirement, Architecture, Groups, Domains and Active Directory.

    H a rd wa r e R eq u ir e me n t, P r e p ar at i on f o r I n st a ll a ti o n, D i s k P ar t it i on i ng , D u a l B o ot i ng F ea t ur e ,Remote Installation Server, Troubleshooting during Installation.

    U n de r st a nd i ng f e at u re o f A c ti v e D i re c to r y, S t r u ct u re , N a mi n g C o nv en t io n , W i nd o w 2 00 3 D o ma i nO r ga n iz a ti o na l U n it s , I n s ta l li n g A c ti v e D i re c to r y, C o nt r ol l in g A c ce s s t o A c t i ve D i re c to r y, L o c a ti n gObjects Inactive Directory and Administration of Active Directory Objects.

  • 7/27/2019 Prospectus Isc

    24/72

    Managing and Securing Resources 12hours

    Performance and Maintenance 05hours

    I n tr o du c ti o n t o L i nu x 0 2 ho ur s

    Linux Installation 03hours

    Booting Procedures 03hours

    Linux Commands and Shell Programming 07hours

    System Administration 10hours

    Xwindows 02hours

    Performance Tuning 02hours

    C o nf i gu ra t io n o f H a rd wa r e D ev i ce s , A PM , Wo r ki n g w i th F i l e S ys t em , U p g ra d at i on o f H a rd D i sk ,B a ck u p S t ra t eg y, M a n a gi n g U s er s A c co u nt a n d P r of i le s , M an a gi n g G r ou p A c co u nt s , S ys t em P ol i cya nd G ro up P ol ic y, Mo ni to ri ng D is k Q uo ta s, Au di ti ng , C on f ig ur in g a nd S ch ed ul in g P ri nt er To ol s,S e tt i ng U p o f I I S We b S e rv er, S Q L S e rv e r a n d E xc h an g e Se r ve r.

    M o n it o r i ng P e rf o r m an c e u s i n g S y s te m M o n it o r, S e t ti n g u p o f S e r v ic e s , R e co v er i n g f r o m D i s k F ai l u r e.

    D e ve l o p me n t o f L i n u x, V a r i ou s D i s t r ib u t i on o f L i n u x, L i n u x S y st e m C o n ce p t s - D ir e c to r y S t r u ct u r ea n d F i l e S t ru c t u re .

    S y st e m R e qu i r e me n t , D i f fe r e n t t yp e s o f I n s t al l a t io n - C D R O M, N e t w o rk a n d q u i c k S ta r t , D i f f er e n tt y p e s o f L i n u x I n s t al l a t io n S e r ve r, Wo r k st a t i on a nd C u s to m s , D i s k P a rt i t i on i n g A u t o a n d M a n u al ,

    Boot Loader, Packet Selection, Network and Authentication Support.

    L I L O / G R U B C o n f ig u r at i o n , S e r ve r S e c u ri t y, R u n L e v e l , I n i t ia l i z a ti o n S c r i pt , D e v i c es I n i t i a l iz a t i ona n d t h e i r A c c e ss , S e t D o w n Pr o c ed u r e s.

    C on ce pt s of P ro ce ss es , Co mm on ly u se d u se r C om ma nd s, v i E di to r, Va ri ou s Sh el ls a nd S he llProgramming.

    S e rv i ce s - I n it i al i za t io n a n d S t at u s, C r ea t in g a n d M a in t ai n in g o f U s er A c co u nt , a n d G r ou p A c co u nt ,D i s k a n d D e v ic e Ma n a g e me n t , B a c ku p C o n ce p t s , I n s t al l a t i on a n d M a i n te n a n ce o f v a r io u s S e r ve r sApache, Squid, NFS, DHCP, NIS and Printer Server.

    Introduction, Installation and Configuration of XWindows, Working with X- Windows GNOME, KDE,Window Manager.

    Logrotate, Backup Strategy, Study of various Services for Performance Tuning, Enhancement andOptimization.

    1.Windows Server 2003 Network Security Design Study Guide by Reisman

    B P B Te c h m ed i a .

    2.Windows Server 2003 Network security Administration Study Guide by Kaufmann BPB Techmedia.

    3 . R ed H a t L i n u x S e c u r it y a n d O p t i mi z a t io n . R e d H a t p r e s s .

    4 . B u i ld i n g S e c u r e S e r v er w i t h Li n u x . O ' R ei l l y P u b l is h e r s5.Linux Security by Hontanun. BPB Techmedia

    L IN UX O PE RA TI NG S YS TE M

    References:

    20

    prospectus

  • 7/27/2019 Prospectus Isc

    25/72

    21

    prospectus

    IS-C1-02: Operating Sysytem Administration

    PRACTICAL ASSIGNMENTS Total: 60 hrs

    W i n d o ws Pr a c ti c a l L i s t

  • 7/27/2019 Prospectus Isc

    26/72

    22

    prospectus

    No Topic Minimum No

    o f H ou rs

    1 Bas ic s o f I nfo r mat io n Secur it y 10

    2 S e cu r it y t h re a t s a nd V u ln er a b il it i e s 8

    3 C r y pt o g r ap h y 6

    4 Ident ificat io n a nd Aut he nt icat io n 2

    5 N et wo r k S ec ur it y 8

    6 Secur it y Too ls and Technique s 2

    7 Int er net Securit y 5

    8 E -ma il Secur it y 2

    9 Wir e less Secur it y 5

    10 R isk Asse ss ment and D isa st er Reco ver y 611 Comput er Fo rens ics 4

    12 Info r mat io n Secur it y la ws 2

    T ot al Hr s 60

    D e t ai l e d S y l la b u s

    Basics of Information Security 10 hours

    Security threats, Vulnerabilities 08 hours

    Cryptography 06 hours

    I n t r od u c t io n t o I n f o r m at i o n S e cu r i t y, H i s t o r y o f I n f o rm a t i on S e c u r it y, N e e d f o r c o m pu t e r s e c ur i t yConfidentiality, Integrity, Availability, Authenticity, Accountability, non-repudiation, Authorization,Security threats, Intrusion, Hacking, Security mechanisms Prevention, Detection, Recovery, Anti

    virus, Encryption, Firewall, VPN, Access control, Smart card, Biometrics, Intrusion Detection, Policym a n a ge m e n t, V ul n e ra b i l i ty S ca n n i ng , P hy s i ca l s e c u ri t y, B a ck u p , A u d i ti n g , Lo g g i ng , N a t io n a l & I n t e rn a t i o na l S c e n ar i o

    O v e rv i e w o f S e c ur i t y t h r e at s , V u ln e r ab i l i ti e s , A c c es s A t t a ck s S n o o pi n g , E a v es d r o pp i n gInterception, Modification Attacks Changes, Insertion, Deletion, Denial-of-Service Attacks - Denialo f A c c es s t o I n f o r ma t i o n, A p p l i c a ti o n s, S y s t e ms , C o m mu n i c at i o n s, R e p u d ia t i o n A t ta c k sMasquerading, Denying an Event , Malicious code - Viruses, worms, Trojan horses, how they worka n d h o w to d e f en d a g a i n st t h e m, S n i ff i n g , ba c k do o r, s p o of i n g , br u t e f o r c e a t t a ck , S o ci a lEngineering, Vulnerable Configurations , Security of Hard drives, laptops & mobile devices

    Symmetric versus asymmetric cryptography, Advantages & disadvantages of Symmetric versusasymmetric cryptography, How to mix and match both in practical scenario, Key management,D i g i ta l S i g n at u r e & o t h e r a p p l i ca t i o n o f c r y pt o g ra p h y, PK I C A , R A , S u b s cr i b e r e t c , P K I u s a g e, Fr o mu s er s i de , C A /R A s i de et c , Ty p e o f P K I h i er a rc hy, Si n gl e C A , t r us t m od e ls e t c, Ce r ti f ic a temanagemen

    Identification and Authentication 02 hours

    Network Security 08 hours

    Access Control models Mandatory Access Control, Discretionary Access Control, Role based AccessControl, Methods of Authentication Kerberos, CHA, Certificates, Username/Password, Tokens,Biometrics, Multi-factor, Mutual

    Network Infrastructure Security Workstation, Server, Router, Switch, Modem, Mobile devices,F i r e wa l l s a nd p a c ke t f i l te r i ng , P r ox y o r a p p l i ca t i o n le v e l g a t e wa y s s e c ur i t y d e v i ce s , V PN , I n tr u s i ondetection System , Electronic payment System Introduction to IPSec, PPTP,L2TP

    I S - C1 - 0 3: I n f or m a t io n S e c ur i t y C o n ce p t s

    L e c tu r e Ho u r s : 6 0 H o u r sPractical Hours: 60Hours

  • 7/27/2019 Prospectus Isc

    27/72

    23

    prospectus

    Security Tools and Technologies 02 hours

    Internet Security 05 hours

    E-mail Security 02 hours

    Wireless Security 05 hours

    Risk Assessment and Disaster Recovery 06 hours

    Computer Forensics 04 hours

    Information Security laws 02 hours

    Network scanners, Vulnerability scanners, OS fingerprinting: nmap, nessus, MBSA, SAINT, John theRipper, Forensic tools, Others.

    R e co g n i ze a nd u n d e rs t a n d t h e f o l l ow i n g I n t e rn e t s e c ur i t y c o n ce p t s , C u st o m i zi n g B r o ws e r S e c u ri t ySettings, Vulnerabilities Cookies, Java Script, ActiveX, Applets, Buffer overflows, Anonymoussurfing, Phishing, HTTP/S, SSL/TLS and Certificates Internet use - best practices

    P O P 3 v s . We b - b a se d e - m ai l , E n cr y p t in g a n d s i g n in g m e s sa g e s , S/ M I M E, P G P, V u ln e r ab i l i ti e s S p am ,E - m a il h o a xe s , E ma i l u s e - b e s t p r a ct i c e s

    W i re d /W i re l es s n e tw o rk s , A d -h o c n e tw o rk an d s e ns o r n e tw o rk s , W T SL , 8 0 2. 1 1 a n d 8 0 2. 1 1 x,WEP/WAP(Wired Equivalent Privacy /Wireless Access Protocol), Vulnerabilities , Site Surveys, DOSa nd D DO S a tt ac ks

    Asset classification, Information classification, Organization level strategy, Process level strategy,Risk assessment methods, Risk classification, Business continuity plan , Business impact analysis,Event logs, Security Auditing , Disaster Recovery Plan , Backup, Secure Recovery- Alternate sites,Security Policies & Procedures

    N a tu r e a n d t y pe s of c y be r c r im e - I n du s tr i al e s pi o na g e, c y be r t e rr o ri s m, P r in c ip l es o f c r im i na l l a w,Computer forensic investigation Digital evidence, Forensic analysis

    IT-Act, The rights the various parties have with respect to creating, modifying, using, distributing,

    s t or i ng a n d c o py i ng d i gi t al d a ta . C o nc u rr e nt r e sp o ns i bi l it i es a n d p o te n ti a l l i ab i li t ie s , I n te l le c tu a lp r o p er t y i ss u e s c o n n ec t e d w i t h us e a n d m a n a ge m e nt o f d i g i ta l d a t a

    R e c om m e nd e d B o o ks

    M a i n r e a di n g1 . N e tw o r k S ec u r i ty B i b le E r i c co l e a n d R o na l d L K r u t zW i l e d re a m t ec h I n d ia P v t L t d, N e w D el h i

    2.Fundamentals of Network Security by Eric Maiwald , Dreamtech Press3.Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses By Andy Walker, Publisher:

    Que4.Computer Security Basics, 2nd Edition By Rick Lehtinen, Publisher: O'Reilly

    Supplementary Reading

    1 . N e tw or k S e cu r it y E s se n ti a ls : A p pl i ca t io n s a n d s t an d ar d s S t al l in g s, P ea r so n E d uc a ti o n P v tLtd, Delhi

    2 . C om pu te r v ir us es , C om pu te r S ec ur it y, A G lo ba l c ha ll en ge b y C oh en E l se vi er P re ss

    3 . I nc id en t Re sp on se & C om pu te r F or en si cs by Ke vi n M an di a, Ch ri s & M at t Pe pe TATA M cG RA WH i ll E d it i on

    4 . 8 02 .1 1 S ecu ri ty Br uc e Po tte r Bo b F li ck , O' Rei ll y

    5. B.Schnier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2/e, John

    Wiley and Sons, New York, 1996.6 . Fo un da ti on s of C om pu te r S ec ur it y by D av id S ol om on , Pu bl is he r: S pr in ge r

    7 . S ec ur it y+ I n d ep th b y Pa ul C am pb el l, Pu bl is he r: V ij ai N ic ol I mp ri nt s C he nn ai

    8 . D ig it al S ec ur it y C on ce pt s a nd C as es , I CFA I U ni ve rs it y P re ss , H yd er ab ad

  • 7/27/2019 Prospectus Isc

    28/72

    24

    prospectus

    PRACTICAL ASSIGNMENTS Total: 60 hrs

  • 7/27/2019 Prospectus Isc

    29/72

    25

    prospectus

    IS-C1-04: System Security

    L e c tu r e Ho u r s : 6 0 H o u r s

    P r ac t i c al H o u r s : 6 0 H o ur s

    O u t l in e o f t h e S y l la b u s

    Sr. no Topic Minimum no. of hours

    01. Design of Secure Operating System 04

    02. Design of Trusted Operating System 04

    03. Operating System Hardening 06

    04. Operating System Controls 04

    05. Internet Protocols and S ecurity 04

    06. Application Security 02

    07. WWW Security 02

    08. SHTTP(Secure HTTP) 02

    09. SMI ME ( Secure Multipurpose Internet Mail E xtension) 02

    10. PGP 02

    11. SET (Secure Electronic Transaction) 02

    12. E-mail security and I nstant Message Security 02

    13. Access Control 04

    14. Internet Security Protocols 04

    15. Ma naging Personal Firewall and Antivirus 06

    16. Remote Access Security 04

    17. Secure Conf iguration of Web Server 02

    18. Secure Conf iguration of Data ba se Server 02

    19. Secure Conf iguration of Email Server 02

  • 7/27/2019 Prospectus Isc

    30/72

    26

    prospectus

    Operating System Controls 04 hours

    Internet Protocols and Security 04 hours

    Application Security 02 hours

    WWW Security 02 hours

    SHTTP(Secure HTTP) 02 hours

    SMIME ( Secure Multipurpose Internet Mail Extension) 02 hours

    PGP 02 hours

    SET (Secure Elect ronic Transaction) 02 hours

    I nt ro du ct io n - Ho w t he Co mp ut er S ys te m Wo rk s, Pu rp os e o f a n O pe ra ti ng S ys te m Ty pe s o f O p e ra t i n g S y st e m , Wa k e u p C a l l , Po w e r o n S e l f Te s t , B I OS , B o ot L o a d e r Ta s k o f a n O p e ra t i n g S y st e m

    Introduction of Internet Protocols, IPSec Operation, IPSec Implementation, IPV4 Network VersusIPV6 Network, Problems with IPSec

    H a c ki n g W E B A p p l ic a t i on s , H ow a r e th e W E B a p p l i ca t i o n s a t t a c ke d , I n pu t Va l i d a ti o n a tt a c k , F u l lKnowledge Analysis

    We b S e c u ri t y C o n si d e ra t i o ns , H a c k in g We b P l a t f or m s , W eb P l a t fo r m S e c u ri t y B e s t P r ac t i c es , We bAuthentication threats, Bypassing Web Authentication, (Token Relay, Identity Management, Client-S i d e P i g g yb a c ki n g ) , A t t a ck i n g W eb A u t h or i z a ti o n

    Introduction , Overview of SHTTP

    I n t r o d u c t i o n , F u n c t i o n a l i t y , D i g i t a l S i g n a t u r e , M e s s a g e E n c r y p t i o n , T r i p l e - W r a p p e dM e s sa g e s , S/ M I ME C e r ti f i c a te s , U s a g e o f S / M I ME i n v a r io u s e - m a il s o f t wa r e , O b s t ac l e o f D e p l oy i n gS/MIME, CAVEATS

    I n t r od u c t io n , U se o f P G P , En c r yp t i o n a n d D e c ry p t i on i n P GP, P G P Se r v i ce s , M es s a ge , K eyManagement

    Introduction of SET, SET Technology, Symmetric and Asymmetric encryption in SET, TransactionAuthenticity, Importance of secure transactions

    D e t ai l e d S y l la b u s

    Design of Secure Operating System 04 hours

    Design of Trusted Operating System 04 hours

    Operating System Hardening 06 hours

    I n tr o du c ti o n o f a S e c u re d S ys t em , D r aw b ac k s o f E x is t in g O p er a ti n g S y st e m ( B ug s , Fa u lt I s o l at i on ,H u g e si z e Ke r n e l P r o gr a m e t c . ) , P a tc h i n g L e g a cy O p e ra t i n g S y st e m , Pa r a vi r t u al M a c h in e s Co n c ep t ,Future System

    I n t r od u c t io n , S e c ur i t y A s s u ra n c e E v al u a t io n , N e e d f o r Tr u s t ed O p e ra t i n g S y st e m F e a tu r e s o f Tr u st e d O S s

    F u nc t io n o f O p er at i ng s y st e m , Ty p es o f O S ( R e al t i me O S , Si n gl e U se r S i ng l e ta s k OS , S in g le U s er -M u l t i t a s k in g S y st e m , Mu l t i us e r S y st e m ) , Ta s k o f O S , P r o ce s s Ma n a g e me n t , M em o r y Ma n a g e me n t ,D e v ic e M a n a g em e n t , S t o ra g e M a n a g em e n t , A p p li c a t io n I n t e r f a ce , U s e r I n t e rf a c e , S e c ur i t yWe a kn e ss , Op e ra t in g S y st e m, W in d ow s We a kn e ss , LI N UX We a kn e ss , Ha r de n in g O S d u ri n gI n s t al l a t io n , S e c u re Us e r A c c ou n t P o li c y, S tr o n g U s e r P a ss w o rd P o li c y, C re a t i ng l i s t o f S e r vi c e s a n dP r o gr a ms r u n n i n g o n S e r v er, P a t c h in g S o f t wa r e , H a r d en i n g W i n d ow s , S e l e ct i n g F i l e S y st e m , A c t i veDirectory / Kerberos, General Installation Rules, Hardening Linux, Choose the correct installation

    procedure , different installation tools, Partitions and Security, Network Services, Boot Loaders,Reverse Engineering

  • 7/27/2019 Prospectus Isc

    31/72

    27

    prospectus

    Secure Configuration of Web Serv er 02 hours

    Secure Configuration of Database Server 02 hours

    Secure Configuration of Email Serv er 02 hours

    P r o te c t i ng D i r ec t o ri e s a n d F i l e s a g a i n st Pr o f i l in g , I I S H a r d en i n g , A p a c he Ha r d e ni n g , A n a l yz i n gS e c u ri t y L o g s, W e b A u t h or i z a ti o n / S e s s i o n To k e n S e cu r i t y, I E S e c u ri t y Z o ne s , L o w P r i vi l e g eBrowsing, Server Side countermeasure

    A c c es s c o n t ro l p o l i cy , P r o te c t i ng R e a d O n l y A c c o un t s , P r o te c t i ng h i g h r i s k s t o r ed p r o c ed u r e s a n d

    extended functionality, Patch updates

    Vulnerabilities of Mail Server, Improving the Security through appropriate planningS e cu r it y Ma n ag e me n t Pr ac t ic e s a n d C o nt r ol s , Se c ur e d O S a n d S e cu r ed A p pl i ca t io n I ns t al l at i on ,Improving the Security through Secured Network Infrastructures

    References:

    1) Network Security Bible, Cole, WILEY2 ) D e s i gn i n g S e c u ri t y A r c h it e c t ur e So l u t io n s , R a m ac h a n dr a n , W I L E Y

    3 ) N e t wo r k S e c u ri t y E s s en t i a l s : A p p l ic a t i on s a n d S t a n da r d s , Wi l l i am S t a l l in g s .

    4) Hacking Web Applications Exposed, TATA McGraw-HILL By Joel Scambray, MikeS h e ma , C a l eb S i m a

    E-mail security and Instant Message Security 02 hours

    Access Control 04 hours

    Internet Security Protocols 04 hours

    Managing Personal Firewall and Antivirus 06 hours

    Remote Access Security 04 hours

    I n t r od u c t io n , E - m a i l A t t a ck , U s e o f D i g i ta l C e r t if i c a t e t o p r e ve n t a t t a c k, I n t r o d u ct i o n t o I M S e c u ri t y,B e s t Pr a c ti c e s f or I M s e c ur i t y

    Access Control Basics, Access Control Technique, Access Control Administration, Centralized AccessC o n tr o l , D e c e n t ra l i z ed A c c es s C o n t r o l , A c c o u nt a b i l it y, A c c e ss C o n tr o l M o d el s , I d e n t i f i ca t i o n a n d

    Authentication Methods, Biometric Authentication

    IP Security Architecture, Authentication Header, Encapsulating Security Payload CombiningSecurity Associations, Key Management

    Managing Logs, Upgrades, SNMP, Internet Service Provider Issues, Defense in Depth

    Business Requirement of Remote Access, Remote Access Technologies, VPN, Extranet and Intranet

    S o l u ti o n , Us e o f V P N f o r R e mo t e Ac c e ss S e cu r i t y, I P S ec , Po i n t to Po i n t Tu n n e li n g P r o t oc o l ( P P TP ) ,L ay er 2 Tu nn el in g P ro to co l ( L2 TP ), S SL A ut he nt ic at ed a cc es s of f il es t hr ou gh S AM BA f or d if f er en tO S , O ve rv i ew o f R A S S e rv er f o r S m al l E n te r pr i se A p p l ic a ti o n, O v e rv i ew o f R em o te A c c es s t h ro u ghISP, Remote Administration

  • 7/27/2019 Prospectus Isc

    32/72

    28

    prospectus

    PRACTICAL ASSIGNMENTS Total: 60 hrs

  • 7/27/2019 Prospectus Isc

    33/72

    29

    prospectus

    LEVEL-2

    CERTIFIED SYSTEM SECURITY PROFESSIONAL

    L e ct u re H o ur s : 6 0 H o ur s

    Practical Hours: 60Hours

    I S -C 2 -0 1: C r yp t og ra p hy a n d N e tw o rk S e cu ri t y

    A pp en di x B

    D e ta i le d S y ll a bu s

    1. Introduction 02 hours

    2 . Cl as si cal Enc ryp ti on T ech ni que s 04 h ou rs

    3 . Ma t he ma t ic s F u nd a me n ta l s a s so c ia t ed w i th c ry p to g ra p hy 0 6 h o ur s

    Active attacks, passive attacks, confidentiality, integrity, availability, Non-repudiation, plain text,

    encryption algorithm, secret key, text, decryption algorithm, cryptanalysis, brute force attacks.

    Substitution Techniques, Transposition Techniques, Rotor machine, steganography key range and keysize.

    G r o u ps , Ri n g s , F i e l ds , Pr i m e n u m b er s , E u c li d ' s A l g o ri t h m, M od u l a r A r i t hm e t i c a n d D i s cr e t el o g a ri t h m s, F i n i t e Fi e l d s, P o ly n o mi n a l a r i t hm e t ic , F e rm a t 's T h e or e m E u l e r' s T h eo r e m, C h i n es eRe ma in de r Te st in g f or P ri ma li ty Q ua dra ti c Re si du es , Le ge nd r S ym bo l, J a co bi S ym bo l H as se 'sTheorem, Quadratic Reciprocity Theorem, Masseyomura protocol, Inverse of a matrix.

    4. Symmetric ciphers 08 hours

    B l oc k ci p he r p r in c ip l es , DE S , S t re n gt h of D E S, D if f e re n ti a l a n d L i ne a r c r yp t an a ly si s , B l oc k ci p he r

    D e s ig n p r i n c ip l e s , I n t er n a t io n a l D a t a E n c ry p t i on a l g o r i t hm ( I D E A) , S t e a m c i p h er R C 4 , R C 5 , B l ow f i s h,A E S E v al u a t i on c r i t e r i a f o r A E S , Tr i p l e D E S, T ra f f i c c o n f id e n t ia l i t y k e y d i s tr i b u ti o n , R a n d om n u m b ergeneration

    S r.N o. Topi cs Nu mb er o f H our s

    1. I ntroduct ion 022. Clas s ica l Enc ryption T echni ques 04

    3. Ma them ati cs Funda ment als as s ocia ted w it h crypt ography 06

    4 . Sym met r ic c ipher s 08

    5 . As ymm e tr i c ci p her s 1 06. I nterne t S ecuri ty P rotocol s 08

    7 . Us e r A u th e n ti c at i o n a nd K e rb er o s 0 6

    8. Ele ctroni c M ail Se cur it y 04

    9. I P S ec ur ity 06

    1 0 . Fi r ew al l s an d Vi r t u al Pr i v at e Net w o r k s ( V P N ) 0 6 Total 60

  • 7/27/2019 Prospectus Isc

    34/72

    30

    prospectus

    5.Asymmetric chippers 10 hours

    6.Internet Security P rotocols 08 hours

    7.User Authentication and Kerberos 06 hours

    8.Electronic Mail Security 04 hours

    9.IP Security 06 hours

    10.Firewalls a nd V irtual Private N etworks ( VPN) 06 hours

    Brief history, overview, RSA algorithm, Key management, Diffie-Hellman key exchange, Ellipticcurve cryptography, Difference between Asymmetric and Symmetric ciphers. Authenticationm e s sa g e , A ut h e n ti c a t io n c od e s , Ha s h f un c t i on s , S ec u r i ty o f H a s h f u n c ti o n s an d M A C , Ha s hA l g o ri t h m W h i rl p o o l, H M A C , CM A C . D ig i t a l S i g n a tu r e , A u th e n t ic a t i on p r o to c o l s, D i g i t al s i g n at u r estandard, Public-key Infrastructure, Models of PKI, Digital certifications private key management.

    Introduction,secure socket layer, Transport Security Layer (TLS), Secure Hyper Text TransferP r o to c o l ( S H TT P ) , T i m e S t a mp i n g P r o t oc o l ( T S P) , S e c u r e E l e ct r o n ic Tr a n sa c t i on ( S E T ) , S S L V er s u sSET, 3D Secure Protocol, Electronic Money.

    Introduction, Authentication Basics, Passwords, Authentication, Biometric Authentication,Kerberos, Key Distribution Centre (KDC), Security Handshake Default, Single Sign (SSO)A p pr o ac h ed .

    Introduction, E-mail headers and Body, Proxy SMTP, Pretty Good Privacy (PGP), S/MIME.

    IP Security overview, IP Security Architecture, Authentication Header, Encapsulating Securitypayload (ESP), Combining Security Associations, Key Management .

    Firewalls, Firewall Design Principles, Virtual Private Network (VPN), Intrusion

    R ef er en ce s :

    D e t ai l e d R ef e r en c e s a r e p ro v i de d i n t h e co u r se m a t er i a l t o b e gi v e n t o r e gi s t er e dcandidates.

    Note: T h is p a pe r i s t he or e ti c al p a pe r a n d c on s is t s ma i nl y t ut o ri a ls b ut f ewhands-on may be done using Crypto tool. S o f t wa r e m a y b e d ow n l o ad e d f r o mo ur w eb si te .

  • 7/27/2019 Prospectus Isc

    35/72

    31

    prospectus

    I S - C2 - 0 2: S y s te m a n d D e v ic e s e c ur i t yL e ct u re H o ur s : 6 0 H o ur sPractical Hours: 60Hours

    O ut li ne o f t h e S yl la bu s

    Sr. no Topic Minimum no. of hours

    P a rt - I ( O pe r at i ng S y st e m T hr e at s )

    1. Program Security 22. Fascination of Malicious Code Analysis 43. Malicious Code Environment 44. Classification of Infection Strategies 35. Strategies of Computer Worm 3

    P a rt - I I ( S ec u ri ng O S f ro m T hr ea t s)

    6. Antivirus Techniques 47. Advanced Antivirus Techniques 68. Case Studies 4

    P a rt - II I ( D ev i ce S ec u ri t y)

    9. Introduction to Network Infrastructure Security 410. Switch Security 2

    11. Router Security 412. DNS Security 413 . ADSL Security 514. Cable Modem Security 515. Protecting Network Infrastructure- A new approach 6

    P a r t- I ( O p er a t i ng S y s te m T h r ea t s )

    S e cu r e P ro g ra m , V i ru s an d o t he r M a li c io u s c o de , ta r ge t ed m a li c io u s c o de , Co n tr o l a g ai n stP r o g ra m t h r e at s

    Common pattern of virus research, antivirus defense development, terminology of maliciousp r o g ra m , C o m p u t er m a l wa r e n a m i n g s c h em e

    C o mp u te r a r ch i te c tu r e d ep e nd e nc y, C P U d e p en d en c y, O S d e pe n de n cy, F i l e s y st e m a n d f i le

    format dependency, Network protocol dependency

    D e t ai l e d S y l la b u s

    1.Program Security 02 hours

    2. F a sc i na t io n o f M a li c io u s C od e A n al y si s 0 4h o ur s

    3.M a l i ci o u s C o d e E n v i ro n me n t 0 4 h ou r s

  • 7/27/2019 Prospectus Isc

    36/72

    32

    prospectus

    4. C la ss if ic at io n o f I nf ec ti on S tr at eg ie s 0 3h ou rs

    5. Strategies of Computer Worm 03hours

    6. Antivirus T echniques 04Hours

    7. Advanced antivirus techniques 06hours

    8. Case Studies 04hours

    9. I n tr o du c ti o n t o N et w or k i n fr a st r uc t ur e s e cu r it y 0 4h o ur s

    10 Switch Security 02hours

    11.Router security 04hours

    12.DNS Security 04hours

    13.ADSL Security 05hours

    14.Cable Modem security 05hours

    15.Protecting Network Inf rastructure- A new Approach 06hours

    Boot Viruses, File infection techniques, In depth look at WIN32 Viruses

    G e n er i c s t r u c tu r e o f c o m pu t e r w o r ms , C o m m o n w o r ms c o d e t r a n s f er a n d e x ec u t i on t e c h n i q ue s

    P a rt - II ( Se c ur i ng O S f r o m t h re a ts )

    Detection: Static Methods, Scanners, Static Heuristics, Integrity Checkers,Dynamic Methods,Behavior Monitors/Blockers, Emulation,Comparison of antivirus techniques

    Retroviruses, Entry point obfuscation, Anti-Emulation (outlast, outsmart, overextent) Armoring( A n t i -D e b u gg i n g , A n t i - bi s a s se m b ly ) , Tu n n e li n g ( I n t eg r i t y c h e ck e r s a t t a ck s ) , A v o id a n ce ,Deworming, defense (User, host, perimeter), capture and containment (Honey pots, ReverseFirewalls, Throtting), Automatic Counter measures

    L i n u x/ U n i x S e c ur i t y D e t a il s , Tr u s t ed O p e ra t i n g S y s te m s

    P a r t -I I I ( D e vi c e S e c ur i t y)

    Internet infrastructure, key components in the internet infrastructure, internet infrastructuresecurity

    Introduction, How switches can be attacked

    O v er v i ew o f I n te r ne t r ou t in g , Ex t er n al a n d i n te r na l a t ta c ks , R IP a t ta c ks a n d c o un t er m ea s ur e s,OSPF attacks and countermeasures, BGP Attacks and countermeasures

    Introduction, DHCP attacks, DNS attacks

    I n t r od u c t io n , D S L f a m i l y t r e e , A D S L, A DS L b e n e fi t s , s e c ur i t y t h r e at s , c o u nt e r m ea s u r es ,

    t o p o lo g i e s wi t h A D S L m o d em s , To p o l og i e s w it h A D S L r o u te r s , r e co m me n d e d t o p ol o g i es , u s i n grouters as a firewall, limitations, Features Risk, precautionary Measures.

    Wo r ki n g o f c a bl e M o de m , C ab l e Mo d em s e cu r it y t hr e at s , d if f e re n t f il t er i ng t e ch n iq u es , D H CPserver filter, Microsoft networking filter, Network isolation filter, static IP address filter, MACa d d r es s f i l t e r, c o m p a ri n g D S L a n d c a b l e M od e m s e c ur i t y t h re a t s .

    Analysis on security problems of network infrastructure, steps in hacking network infrastructure,F l a t n e t w or k d e s i g n m o de l a n d M a s q ue r ad i n g , A n e w M o d e l t o p r o t e ct n e t w o r k i n f ra s t r uc t u re .

    D e t a il e d R e f er e n c e s a re p r o v i d e d i n t h e c o u r s e m at e r i al t o b e g i v e n t o r e g i s te r e d c a n d id a t e s.

    R e f er e n ce s :

  • 7/27/2019 Prospectus Isc

    37/72

    IS-C2-02:

    PRACTICAL ASSIGNMENTS

    S y st e m a n d D e vi c e S e cu ri t y

    PL1To s tu d y n e tw o rk / Sy s te m s ca n ni n g u s in g n m ap i n d et a il s .PL2

    To s t u d y A R P C a ch e Po i s o ni n g , M IT M A t t a ck & a p p l yi n g i t s c ou n t e rm e a su r e s .PL3To st ud y I P Sp oo fi ng a nd D en ia l o f S er vi ce a tt ac k o n a w eb s er ve r & a pp ly in g i tscountermeasures.PL4To create a Trojan based application/utility to create backdoors on a system & a p p l yi n g i t s c o u n te r m ea s u r es .PL5To s t u d y C o de I n j e c t io n & a p p l yi n g i t s c o u nt e r me a s u re s .PL6C o n fi g u r in g I P Ta b l e s f ir e wa l l o n a L i n ux s y s te m .

    PL7To c o nf i gu r e pr i ma r y an d s e co n da r y DN S S e rv er s a nd c o nf i gu r in g i t f or s e cu r eZone Transfer.PL8C o n fi g u r in g v a r io u s s e c ur i t y o p ti o n s a va i l a bl e i n a n A D S L M o d e mPL9C on f ig u ri n g S N OR T I D S o n a L i nu x s ys t em f o r g e ne ra t in g a l er t s f o r i n co m in gICMP traffic.PL10To study SELinux in a RHEL/Fedora Machine.

    prospectus

    33

  • 7/27/2019 Prospectus Isc

    38/72

    34

    prospectus

    I S -C 2 -0 3: M o bi l e a n d W i re l es s N e tw o rk S ec u ri t yL e c t u re H o u r s: 6 0 H ou r sPractical Hours: 60Hours

    O ut li ne o f t h e S yl la bu s

    Sr.no T opic Minimum no. 0f hours

    P a rt - I ( W ir e le s s T e ch n ol o gy )

    1. Wireless Fundamentals 22. Wireless Network Logical Architecture 43. Wireless Network Physical Architecture 44. Wireless LAN Standard 4

    P a rt - I I ( Se c ur i ty f o r Mo b il i ty )

    5. PKI in Mobile Systems 26. Personal PKI 27. Smartcard as a Mobile Security Device 28. Secure Mobile Tokens-The Future 29. Universal Mobile Telecommunications System(UMTS)

    Security 210. Securing Network Access in Future Mobile System 611. Security Issues in a MobileIPV6 Network 212. Mobile Code Issues 413. Secure Mobile Commerce 2

    P a rt - II I ( Wi r el e ss N et w or k S e cu r it y )

    14. Security in Traditional Wireless Network 215. Wireless LAN Security 216. Security in Wireless Ad-hoc Network 217. Implementing Basic Wireless Security 218. Implementing Advanced Wireless Security 2

    P a r t - IV ( O t he r W i r el e s s T e c h no l o gy )

    19. Home Network Security 220. Wireless Embedded System Security 221. RFI D Security 222. Security Issues in Single Hop Wireless Networks 223. S e c ur i t y I s s u es i n M u l t i H o p W i r e le s s N e t wo r k s 4

  • 7/27/2019 Prospectus Isc

    39/72

    35

    prospectus

    D e t ai l e d S y l la b u s P a rt - I ( W ir e le ss T e ch no l og y )

    Wireless Medium: Radio Propagation Effects, Exposed Terminal Problem, Bandwidth, WirelessN e tw o rk i ng B a si c s: W L AN , w or k in g o f W L AN , C ur r en t W LA N S t an d ar d .

    O S I N e t wo r k M o d e l, N e t w o r k L a ye r Te c h no l o g ie s , D a t a L i n k L a y e r Te c h n ol o g i es , O p e r a ti n gS y s te m C o n si d e ra t i o n

    Wired Network Topologies, Wireless Network Topologies, Wireless LAN Devices, Wireless PAND e v ic e s , W i re l e s s M AN D e v ic e s

    T H E 8 0 2. 1 1 W L AN S t an d ar d s, 8 0 2. 1 1 M AC L a ye r, 8 0 2. 1 1 P H Y L a ye r, 8 0 2. 1 1 E n ha n ce me n ts ,o th er W LA N S ta nd ar d

    P a rt - II ( S ec u ri t y f o r M o bi l it y )

    P K I o v er v i e w, P K I i n c u rr e n t Mo b i l e S y st e m s, P K I i n F u tu r e M ob i l e Sy s t em

    I s s ue s i n P er s o n al P K I , P e rs o n a l P K I r e q ui r e m en t , P er s o na l C A s , D e v ic e I n i t i al i z a ti o n , P r o of o f possession, Revocation in Personal PKIs

    S t o ra g e c a r ds a n d P r o ce s s or c a r d s, S t a n d a rd i z a ti o n d a t a o bj e c t s an d c o m ma n d s , S ma r t c ar d sa n d b i om e tr i cs

    Security Modules, Current use of Security Modules, Security Module Technology, Current useo f s e c ur e m ob i l e t ok e n s, P e rs o n a l S e c u ri t y t ok e ns

    B u i l di n g a G S M S e c u ri t y, U M T S a c c es s s e c u r it y, N e t w o r k S e c ur i t y, I P M u l ti m e d ia S u b s y s t emSecurity

    O u t l in e o f S e c u ri t y A r c h it e c tu r e , D e s ig n a lt e r n at i v es f o r a u t h en t i c at i o n a n d e s t a bl i s h me n t of Security association, IP Layer Security, Link Layer Security, Network Security options

    Introduction to Mobile IP, MobileIPV6 Security Mechanisms, AAA (authorization,a u t h en t i c at i o n a nd a c c o un t i n g) r e q u ir e m en t s f o r M o b il e I P

    Agent and Multi-agent Systems, Security Implication, Security Measures for Mobile Agents,S e c u ri t y I ss u e s fo r D o wn l o a de d c o d e in M o b il e p h o ne s

    M - C om m e rc e a nd i t s s e c ur i t y c h a l le n g e s, S e cu r i t y o f t h e r a d io i n te r f a ce , S ec u r it y of m -commerce

    1 . W i re l es s F u nd a me nt a ls 2 h ou r s

    2 . W i r el e s s N e t wo r k i ng L o g ic a l A r c h it e c t ur e 4 h o ur s

    3 . W i re l es s N e tw o rk P h ys i ca l A r ch i te c tu r e 4 h ou r s

    4 . W ir el es s L AN S ta nd ar d 4 ho ur s

    5.PKI in Mobile Systems 2hours

    6 . P e rs o n al P K I 2 h ou r s

    7 . S ma rt ca rd a s a M ob il e S ec ur it y D ev ic e 2 ho ur s

    8 .S ec ur e M ob il e T ok en s- Th e F ut ur e 2 ho ur s

    9 . U n iv e r s al M o b il e T e l ec o m mu n i c at i o n S y s te m S e c ur i t y 2 h o ur s

    1 0. Se cu ri ng N et wo rk A cc es s i n F ut ur e M ob il e S ys te m 6 ho ur s

    1 1. Se cu ri ty I ss ue s i n a M ob il e I PV 6 N et wo rk 2 ho ur s

    1 2. Mo bi le C od e I ss ue s 4 ho ur s

    1 3. S ec u re M o bi l e C om m er c e 2 h ou r s

  • 7/27/2019 Prospectus Isc

    40/72

    36

    prospectus

    P a rt - II I ( W ir e le ss N e tw o rk S e cu ri t y)

    Security in First Generation TWNs, Security in Second Generation TWNs, Security in 2.5 GenerationTWNs, Security in 3G TWNs

    Key Establishment, Anonymity, Authentication, Confidentiality, Data Integrity and Loopholes in802.11

    Bluetooth: Basics, Security Modes, Key Establishment, Authentication, Confidentiality, IntegrityProtection, Enhancements

    Enabling Security Features on a Linksys WAP 11802.11b Access, Filtering by MAC Address, EnablingS e c u ri t y F e at u r es o n a L i n k s y s W RT 5 4 G 8 0 2 . 11 b / g , C o n fi g u r in g S e c u ri t y F e at u r e s o n W ir e l e ssClients

    I m p l em e n t in g W i F i P r o te c t e d A c c e ss ( W PA ) , I m p l em e n ti n g a W i r el e s s G a t e wa y w i t h R ee f E d g e ,I m pl e me n ti n g a V P N o n a L i nk s ys W R V5 4 G V PN B r oa d ba n d

    P a r t -I V ( O t h er W i r el e s s T e c hn o l og y )

    B a s ic s o f W i r el e s s S e c ur i t y, B a s i c s o f W i r el e s s S e c ur i t y M e as u r es , A d d i t i on a l H o t s po t S e c u r it yMeasures

    Wireless Technologies, Bluetooth, ZigBee, Wireless Technologies and the Future

    Introduction, RFID Radio Basics, RFID Architecture, Threat and Target Identification, Managemento f R F I D S e c u ri t y

    C e l lu l a r N e t wo r k S ec u r i ty , A c ce s s Co n t r ol a n d R o am i n g I s s u es , M o bi l e I P Se c u ri t y, P er v as i v e

    C om p ut i ng S e cu r it y

    Mobile Adhoc Network Security, Trust Management and Routing Issues, Wireless SensorN e tw or k S e cu r it y, K e y M an a ge m en t , S yb i l A t ta c ks a n d L o ca t io n P r iv ac y, V e hi c ul a r N e tw o rkApplications and Security, Wireless Metropolitan Area Networks(e.g. 802.11b)

    1 4 . S e c ur i t y i n T r a d it i o na l W i r el e s s N e t wo r k s 2 h o ur s

    1 5. W ir el es s L AN S ec ur it y 2 ho ur s

    1 6. S ec u ri t y i n W ir e le ss A d -h o c N e tw o rk 2 h ou r s

    1 7 . Im p l em e n ti n g B a s ic W i r el e s s S e c ur i t y 2 h o ur s

    1 8. I mp l em en t in g A d va n ce d W i re l es s S ec u ri t y 2 ho u rs

    1 9. H om e N et wo rk S ec ur it y 2 ho ur s

    2 0. W ir e le s s E m be d de d S y st e m S e cu ri t y 2 h ou r s

    2 1. R F ID S ec u ri t y 2 h ou r s

    2 2. Se cu ri ty I ss ue s i n S in gl e H op W ir el es s N et wo rk s 2h ou rs

    2 3. S ec u ri t y I s su es i n M u lt i ho p W i re l es s N e tw o rk s 4 ho u rs

    R e f er e n ce s :

    D e t ai l e d R ef e r en c e s a r e p r ov i d ed i n t h e co u r se m a t er i a l t o b e gi v e n t o r e gi s t er e dcandidates.

  • 7/27/2019 Prospectus Isc

    41/72

    prospectus

    37

    I S -C 2 -0 3 : M o bi l e a n d W i re l es s S e cu ri t y

    Practical1To s t u d y i n st a l l a ti o n a n d C o n fi g u ra t i o n o f A c c es s P o in t .

    Practical 2To st u dy W L AN S e tu p u s in g A D HO C m od e .Practical 3T