CYBER SECURITY

BCC301 / BCC401 / BCC301H / BCC401H

Dr. A.P.J. Abdul Kalam Technical University, Uttar Pradesh

Course Overview

This course provides a comprehensive understanding of cybercrime, security threats, defensive mechanisms, forensic investigation techniques, and the legal framework governing cyberspace. The curriculum is designed to equip students with foundational knowledge essential for information security professionals.

Core Learning Areas

  • Cybercrime Fundamentals
  • Mobile and Wireless Security
  • Attack Tools and Methods
  • Digital Forensics
  • Cyber Laws and Policies

Introduction to the Course

Cyber Security is a critical discipline in computer science and information technology that focuses on protecting computer systems, networks, programs, and data from digital attacks, unauthorized access, and damage.

The course covers fundamental concepts of cybercrime and its classification, security challenges in mobile and wireless computing environments, tools and methods employed by cybercriminals, computer forensics principles, and the legal and policy frameworks essential for information security professionals.

Examination Focus

This course operates at Bloom's Taxonomy levels K1 (Remember) and K2 (Understand). Questions will primarily test recall of definitions, concepts, and classifications, along with comprehension and explanation of security mechanisms and procedures.

Academic Importance of Cyber Security

The study of Cyber Security holds significant academic and professional relevance in the contemporary digital era:

Course Outcomes

Upon successful completion of this course, students will be able to:

CO Course Outcome Description Level
CO1 Understand the basic concepts of cyber security and cybercrimes, including definitions, classifications, and global perspectives on cybercrime. K1, K2
CO2 Understand the security policies and cyber laws, including national and international legal frameworks governing cyberspace. K1, K2
CO3 Understand the tools and methods used in cyber crime, including attack vectors, malware types, and exploitation techniques. K2
CO4 Understand the concepts of cyber forensics, including evidence collection, analysis procedures, and chain of custody principles. K1, K2
CO5 Understand the cyber security policies and cyber laws applicable to information systems and digital transactions. K2

Bloom's Taxonomy Knowledge Levels

This course primarily operates at the following cognitive levels:

Level Category Description Application in Course
K1 Remember Recall of facts, terms, basic concepts, and definitions Defining cybercrime, listing types of malware, recalling legal provisions
K2 Understand Comprehension of concepts, explaining ideas, interpreting information Explaining attack mechanisms, describing forensic procedures, interpreting security policies

Course Structure

Unit Title Focus Areas Lectures
I Introduction to Cyber Crime Definitions, classifications, cybercriminals, attack vectors 04
II Mobile and Wireless Devices Mobile security challenges, authentication, organizational policies 04
III Tools and Methods Malware, proxies, password cracking, attack techniques 04
IV Computer Forensics Evidence collection, chain of custody, forensic procedures 04
V Security Policies and Laws IT Act, DPDP Act 2023, intellectual property, compliance 04

Total Lectures: 20

Quick Navigation