Post on 03-Apr-2018
7/28/2019 programmedetails_2
1/39
INDIRA GANDHI NATIONAL OPEN UNIVERSITY SCHOOL OF VOCATIONAL EDUCATION & TRAINING
(SOVET)
Application Form for esttt. of Programme Study Centres (PSC)(1) PG Diploma in Information Security (PGDIS)
(2) PG Certificate in Information Security (PGCIS) (With an exit option of PGCertificate in Information Security (PGCIS) after successfully completion of first
semester)(3) Advanced Certificate in Information Security (ACISE) (With an exit option of
Certificate in Information Security (CISE) after successfully completion of first threecourses of 12 Credits)
Dear Sir/Madam,
I am delighted to inform you that IGNOU is ready to launch PG Diploma in InformationSecurity (PGDIS) (one year duration) (With an exit option of PG Certificate inInformation Security (PGCIS) after successfully completion of first semester) andAdvanced Certificate in Information Security (ACISE) (six month duration) (With anexit option of Certificate in Information Security (CISE) after successfully completion
of first three courses of 12 Credits). Please find enclosed the Programme InformationSheet and Performa of the Application to be completed and submitted to IGNOU.
Kindly note the following:
1) On receipt of your application by IGNOU and if found satisfactory, theprocess of inspection and approval of your Institute as Programme StudyCentre (PSC) will be undertaken.
2) Institute will be communicated with regard to promotional efforts andadmission process so as to commence the classes on schedule.
3) The filled in application along with supporting document may be sent to the
address given below so that the same can reach us on or before 31-05- 2011. Programme Co-ordinatorRoom No. 19, Block-1SOVET, IGNOUMaidan GarhiNew Delhi-110068
4) My Colleague, Ms. Urshla Kant, Assistant Professor, School of VocationalEducation and Training, IGNOU is the Programme Coordinator for the aboveprogrammes. Please feel free to contact her either on her telephone No. 011-29571123 or her e-mail. urshlakant@ignou.ac.in for seeking any clarification.
5) In case you need any further clarification/ information please feel free tocontact the school. We will be more than delighted to be of assistance to you.
We recognize your role and contribution to the success of this academic endeavour. Theultimate objective is being to fulfill the aspirations of our students and the need of theInformation Security.
With kind regards, Yours Sincerely,
(Prof. C.G. Naidu)Director (SOVET)
7/28/2019 programmedetails_2
2/39
Annexure-1
INDIRA GANDHI NATIONAL OPEN UNIVERSITYSCHOOL OF VOCATIONAL EDUCATION & TRAINING (SOVET)
Programme Information Sheet(1) PG Diploma in Information Security (PGDIS)
(2) PG Certificate in Information Security (PGCIS) (With an exit option of PGCertificate in Information Security (PGCIS) after successfully completion of first
semester)(3) Advanced Certificate in Information Security (ACISE) (With an exit option of
Certificate in Information Security (CISE) after successfully completion of first threecourses of 12 Credits)
These innovative Programmes in the area of Information Security from IGNOU envisages tocombine the strength of both IGNOU and Programme Study Centres to bridge the gap inawareness and competency required by various categories of people as the users of Internetand various IT enabled services about deeper aspects of Information Security, responsibleuse and management of IT services. Certification of skills would help them in getting gainfulemployment in the emerging global market. It incorporates the flexibility of open anddistance learning with continuing education through the conventional system by way of Face-to-Face interaction at the Programme Study Centre (PSC) for both theory and practicalcomponents.
Name of the Programme : (1) PG Diploma in Information Security (PGDIS)(2) PG Certificate in Information Security (PGCIS)
(With an exit option of PG Certificate inInformation Security (PGCIS) after
successfully completion of first semester)
Programme Code : (1) PGDIS(2) PGCIS
Number of Credits : 32Duration : 1 YearMedium of Instruction : EnglishProgramme Fee : Rs. 8000/- (per semester)
Eligibility : A. B.Sc (Computer Science)/ B.C.A/ B.Tech (Computer Sc.)/ B.Tech (IT) or itsequivalent
B. Bachelor Degree in any discipline or its equivalent from the recognizedUniversity/ Institute with CIT/CIC from IGNOU
C. Bachelor Degree in any discipline or its equivalent from the recognizedUniversity/ Institute with 1 year working experience in Computer application/IT.
7/28/2019 programmedetails_2
3/39
Course Details:
Semester one:
Semester Two:
Structure of this Programme
PG Diploma in Information Security
Duration : 1Year Semester: 2 Semesters No. of Credits: 32
(With an exit option of PG Certificate in Information Security aftersuccessfully completion of first semester)
Target Group:
A. B.Sc (Computer Science)/ B.C.A/ B.Tech (Computer Sc.)/ B.Tech (IT) or itsequivalent
B. Bachelor Degree in any discipline or its equivalent from the recognized University/ Institute with CIT/CIC from IGNOU
C. Bachelor Degree in any discipline or its equivalent from the recognized University/ Institute with 1 year working experience in Computer application/IT.
Sl.No. Course Code Title of the course Type of coursecompulsory/optional
Credits Theory/Practical/ Project
1. MSEI-021 Introduction to InformationSecurity
Compulsory 4 Integrated (Theory& Practical)
2. MSEI-022 Network Security Compulsory 4 Integrated (Theory& Practical)
3. MSEI-023 Cyber Security Compulsory 4 Integrated (Theory& Practical)
4. MSE-024 Policy, Standards and Laws Compulsory 4 TheoryTotal 16
Sl.No. Course Code Title of the course Type of coursecompulsory/optional
Credits Theory/Practical/ Project
5. MSEI-025 Application and BusinessSecurity Developments
Compulsory 4 Integrated (Theory& Practical)
6. MSEI-026 BCP, DR Planning and Audit Compulsory 4 Integrated (Theory& Practical)
7. MSEI-027 Digital Forensics Compulsory 4 Integrated (Theory& Practical)
8. MSEP-028 Project Compulsory 4 ProjectTotal 16
7/28/2019 programmedetails_2
4/39
1st Semester
Course 1: Introduction to Information Security ( 4 Credits, Compulsory,Theory and Practical) : MSEI-021
Block 1: Business Needs and Security AwarenessUnit 1. Information Technology Concept and ApplicationUnit 2. Security AwarenessUnit 3. Information Security: OverviewUnit 4. Legal and Ethical Issues
Block 2: Security Threat and Vulnerability.Unit 1. Introduction to Security threats and Vulnerability
(Computer as a target, as a mean of resource or as a mean of attack)Unit 2. Malware
(Viruses, Worms, Trojan horses)
Unit 3. Hacking: Issues and TechniquesUnit 4. Security Counter Measures
Block 3: Networking Concepts and Attacks.Unit 1. Introduction to Data Communication and Transmission MediaUnit 2. Overview of Networking technologies
(Topologies)Unit 3. Network Management and ProtocolUnit 4. Network Attacks
Block 4: Operating System ConceptsUnit 1. Introduction to Operating SystemUnit 2. Operating System Security: An Overview
(Authentication, Access controls, Security models, Updates, Patches, Integritychecks, Antivirus software)
Unit 3. Operating System Hardening and ControlsUnit 4. ADC/SAMBA
(File servers)
Course 2: Network Security( 4 Credits, Compulsory, Theory and Practical): MSEI-022
Block 1: Introduction to Network SecurityUnit 1. Network Security Concepts
(Threats, Mechanism)Unit 2. Network Security Techniques
( Digital Water marking, ATC)Unit 3. Identity Management
(Biometrics, All Physical Security, login, Finger Printing)Unit 4. Security Issues in Wireless and next generation networks
7/28/2019 programmedetails_2
5/39
Block 2: Secure ProtocolsUnit 1. Introduction to Secure ProtocolsUnit 2. Specific Protocol-I
(at network level eg. IPSec, VPN, SHCN, SSL)Unit 3. Specific Protocol-II
(at Application level eg. PGP, SHTTP, SSH etc)
Block 3: Cryptography TechniquesUnit 1. Introduction to CryptographyUnit 2. Symmetric Key CryptographyUnit 3. Asymmetric Key Cryptography
(Hash function)Unit 4. Applications of cryptography
(Steganography, PK(Public key infrastructure), DH(Diffe-Hellman key), ElectronicSignatures)
Block 4: Network Security Technology(Firewalls, Routers etc)
Unit 1. Firewalls(Network, Application amd Host based Firewalls, Proxy)
Unit 2. IDS/IPS/Honey PotsUnit 3. Scanning and Analysis Tools
Course 3: Cyber Security ( 4 Credits, Compulsory, Theory and Practical): MSEI-023
Block 1: Information GatheringUnit 1. Social EngineeringUnit 2. E-mail Crime and Investigation
Unit 3. Reverse EngineeringUnit 4. Cracking Methodology
Block 2: Database SecurityUnit 1. Introduction to Database ConceptsUnit 2. Handon Database usage and Hacking AttemptUnit 3. Database Security-I
(Distributed Databases, Security aspects related to centralized Distributed Database)Unit 4. Database Security-II
(Concurrence, Failure recovery, Fault tolerance, Transaction theory)
Block 3: WEB TechnologyUnit 1. Introduction to WEB Architecture
(W3C)Unit 2. Client Site ScriptsUnit 3. Server Site ScriptsUnit 4. Attacks on WEB Application
Block 4: Internet TechnologyUnit 1. Internet ArchitectureUnit 2. Social Networking Sites
7/28/2019 programmedetails_2
6/39
Unit 3. Advanced Searching Techniques(Search engines like Google etc)
Unit 4. Latest trend in Internet Securities(Web 2.0)
Course 4: Policy, Standards and Laws( 4 Credits, Compulsory, Theory): MSE-024
Block 1: Security StandardsUnit 1. Introduction to Security Policies and Standards
(Need, Methods, Various Standards: ISO 27001, HIPA, Vertical)Unit 2. Security Framework Standards
(ISO Standards-all)Unit 3. Security Mechanism Standards
(Encryption, Digital Signatures, Techniques, Algorithm)Unit 4. Security Protocol Standards
(Entity authentication protocol, Key establishment, Time stamping)
Block 2: ISO StandardsUnit 1. Study of ISO Standards: A complete Case Study
Block 3: Cyber LawsUnit 1. International Treaties, Conventions and Protocols concerning cyberspace
(Guidelines issued by various ministries, Alternative Dispute Resolution, OnlineDispute Resolution)
Unit 2. Information Technology Amendment Act 2008-I(In Introduction: Criminal Law & Constitutional Law in brief)
Unit 3. Information Technology Amendment Act 2008-II
(Limitations)Unit 4. Cyberspace and IPR(Search engines, Web crawling, Indexing, searching, Ranking of web pages,
Spamdexing)
Block 4: Cyber Crimes and RegulationUnit 1. Introduction to Computer CrimesUnit 2. Conventional Crimes through ComputerUnit 3. Crimes and Torts committed on a Computer NetworkUnit 4. Crimes relating to Data Alteration/ Destruction/ Theft of source code and
Database
(Online Dispute Resolution, theft of source code; a case study)
2nd Semester
Course 5: Application and Business Security Developments ( 4 Credits,Compulsory, Theory and Practical) : MSEI-025
Block 1: Application Development Life CycleUnit 1. Application DesignUnit 2. Application Coding
7/28/2019 programmedetails_2
7/39
Unit 3. Application TestingUnit 4. Application Production and Maintenance
Block 2: Secure Application Development-IUnit 1. Critical Application Security ConceptsUnit 2. Input Validation and EncodingUnit 3. Authentication, Authorization and Session ManagementUnit 4. Encryption, Confidentiality and Data Protection
Block 3: Secure Application Development -IIUnit 1. Data AccessUnit 2. Error Handling and LoggingUnit 3. Server Configuration and Code ManagementUnit 4. Application Threat Modeling
Block 4: Application Testing and Ethical HackingUnit 1. Assessment Methodologies and ToolsUnit 2. Application Security AssessmentsUnit 3. WEB Application Scanning and Vulnerability AssessmentUnit 4. WEB Application Ethical Hacking
Course 6: BCP, DR Planning and Audit ( 4 Credits, Compulsory, Theory andPractical) : MSEI-026
Block 1: Risk AnalysisUnit 1. Introduction to Risk AnalysisUnit 2. Risk AssessmentUnit 3. Risk Analysis Techniques and MethodologiesUnit 4. Risk Mitigation
Block 2: Business ContinuityUnit 1. Need for a Business Continuity ProgramUnit 2. Overview of Business Continuity Management Life CycleUnit 3. Defining Organizations Business Continuity RequirementsUnit 4. Identifying and Selecting Business Continuity Strategies
Block 3: DR StrategiesUnit 1. Developing Plans for Computer System RecoveryUnit 2. Developing Plans for Business ResumptionUnit 3. Plan Templates and Software ToolsUnit 4. Implementing Crisis Management Framework
Block 4: BCM Program ManagementUnit 1. Maintaining and Administering BCM PlansUnit 2. Auditing and Evaluating BCM plansUnit 3. Developing and Implementing a BCM ResponseUnit 4. Disaster Simulation Exercise
7/28/2019 programmedetails_2
8/39
Course 7: Digital Forensics ( 4 Credits, Compulsory, Theory and Practical) : MSEI-027
Block 1: Cyber Crime and Cyber ForensicsUnit 1. Various Types of Cyber CrimesUnit 2. Banking and Financial CrimesUnit 3. Identify Thefts and Data Thefts/ Source Code TheftsUnit 4. SPAM and BOTNETS
( 1 Case Study on Nigerian Letter Fraud)
Block 2: Digital ForensicsUnit 1. Digital InvestigationUnit 2. Data Acquisition and Information GatheringUnit 3. Forensic Examination of Systems
(Keyword, Data recovery, Various tools NKS)Unit 4. Forensic Examination of Network Devices
(Routers, Firewalls, IDS/IPS etc)
Block 3: Mobile ForensicsUnit 1. Introduction to Mobile Forensics and TechnologiesUnit 2. Analysis of CDRsUnit 3. Application of SIM Card ReadersUnit 4. Forensic Examination of Mobile Devices
(Mobile Frauds)Block 4: Security Issues in Wireless TechnologiesUnit 1. Introduction to Wireless TechnologiesUnit 2. Wireless DevicesUnit 3. Securing Wireless Network
Unit 4. Ethical Hacking- Wireless Security
Course 8: MSEP-028 Project 4 Credits
7/28/2019 programmedetails_2
9/39
Name of the Programme : (3) Advanced Certificate in Information Security(ACISE) (With an exit option of Certificate inInformation Security (CISE) after successfullycompletion of first three courses of 12 Credits)
Programme Code : ACISECISE
Number of Credits : 18Duration : 6 MonthsMedium of Instruction : EnglishProgramme Fee : Rs. 4000/- (one time)Eligibility : 10 th or its equivalent
Course Details:
Structure of this Programme
Advanced Certificate in Information Security
Duration : 6 Months No. of Credits: 18
(With an exit option of Certificate in Information Security after
successfully completion of first three courses of 12 Credits)Target Group: 10 th Pass or its equivalent
Course 1: Information Security ( 4 Credits (1 Credit-Theory and 3 Credit-Practical), Compulsory) : OSEI-041
Block 1: Overview of Information SecurityUnit 1. Information Security Concepts
(How to Secure Software) Unit 2. User Habits
Sl.No. Course Code Title of the course Type of course
compulsory/optional
Credits Theory/Practica
l/ Project
1. OSEI-041 Information Security Compulsory 4 Integrated(Theory &Practical)
2. OSEI-042 Securing Internet Access Compulsory 4 Integrated(Theory &Practical)
3. OSE-043 Information Technology Security Compulsory 4 Theory4. OSEI-044 Server Security Compulsory 6 Integrated
(Theory &Practical)
Total 18
7/28/2019 programmedetails_2
10/39
Unit 3. Threats, Vulnerability and Malware(Viruses, Worms, Trojan horses)
Unit 4. Impact of Hardware and Software Protocols with Preventive Measures
Block 2: Securing DesktopUnit 1. Securing Desktop ConcernsUnit 2. Securing Files and Folders with Password
(Poweron Password, Login Password)
Unit 3. User Restricted Data, Sharing of Files and Secure Downloading from Internet Unit 4. Security Threats due to Software Piracy
Block 3: Securing DataUnit 1. Securing, Backup and Restore Strategies for DataUnit 2. Concepts of PC auditing Unit 3. Snapshot UtilityUnit 4. Defragmentation
Block 4: Securing ConnectivityUnit 1. Secure Network Connectivity Unit 2. FirewallsUnit 3. EncryptionUnit 4. Using some secure protocols
Course 2: Securing Internet Access( 4 Credits (1 Credit-Theory and 3 Credit-Practical), Compulsory) : OSEI-042
Block 1: Secure BrowsingUnit 1. Browsing History Unit 2. Cookies, E-mail and Internet Applications
Unit 3. Log Files, Plug-ins and ScriptsUnit 4. Protecting from Fake Websites
Block 2: Internet Transaction SecurityUnit 1. Secure ProtocolsUnit 2. Privacy policies Unit 3. How Identity Theft Works and its PreventionUnit 4. Credit Card Fraud
Block 3: Securing Web ServicesUnit 1. Security Challenges Specific to Web ServicesUnit 2. Web Application Security TestingUnit 3. Cyber Forensics, Digital Certificates and Digital WatermarkingUnit 4. Threat Profile, Risk Analysis and Defence Against Threats
Block 4: Securing during MobilityUnit 1. Security in Wireless Environment Unit 2. Wi-fi, Blue tooth, LANUnit 3. Digital Incident ResponseUnit 4. Industry Perspective
7/28/2019 programmedetails_2
11/39
Course 3: Information Technology Security ( 4 Credits-Theory, Compulsory) :OSE-043
Block 1: W3C ComplianceUnit 1. Introduction to W3CUnit 2. Recommendations and certifications of W3CUnit 3. W3C Standards and PracticesUnit 4. How do we Improve Internet Privacy using W3C
Block 2: Introduction to ISO 27000Unit 1. Need of CertificationUnit 2. ISO/IEC 27000 family of Information Security Management Systems (ISMS)
standardsUnit 3. Cyber Security StandardsUnit 4. Employee perspective of ISO 27000
Block 3: Information Technology ActUnit 1. Introduction to Information Technology Amendment Act 2008
(Unique ID (UID), Limitations of Information Technology Amendment Act 2008)Unit 2. Legal Implications of Personal SecurityUnit 3. Common Cyber Crimes and Government Laws and Rules in Information
security
Course 4: Server Security (6 Credits (1 Credit-Theory and 5 Credit-Practical),Compulsory): OSEI-044
Block 1: Email SecurityUnit 1. Email ServersUnit 2. Email Forgery and SpammingUnit 3. Password Attack VectorsUnit 4. Account Security
Block 2: Windows Security Unit 1. Windows System ArchitectureUnit 2. Windows System SecurityUnit 3. Hacking Windows
Block 3: Linux Security Unit 1. Linux System Architecture
Unit 2. Linux System SecurityUnit 3. Hacking Linux
Block 4: Webserver Security Unit 1. Understanding Web TechnologiesUnit 2. Web Application Attacks
Block 5: Wireless Network Security Unit 1. Wireless Network ConceptsUnit 2. Wireless AttacksUnit 3. Wireless Security Measures
7/28/2019 programmedetails_2
12/39
Block 6: Software Security Unit 1. Recovering Software CodesUnit 2. Understanding Software CodeUnit 3. Developing Software Patches and Code
Note: All applicable topics should be explained for Open office and MS-Word.
The eligibility conditions for the academic counselors for both theory and practical areas follows:
A) For PG Diploma in Information Security (PGDIS) (one year duration) (With anexit option of PG Certificate in Information Security (PGCIS) after successfullycompletion of first semester)Qualification: MCA/ M.Tech/ B.Tech/ B.E (CSE/IT) with relevant experience of 2years
B) Advanced Certificate in Information Security (six month duration) (With an exitoption of Certificate in Information Security after successfully completion of first three courses of 12 Credits)
Qualification: Graduate and adequate familiarity to Internet and basic computersystem
7/28/2019 programmedetails_2
13/39
Annexure-2
INDIRA GANDHI NATIONAL OPEN UNIVERSITYSCHOOL OF VOCATIONAL EDUCATION & TRAINING
Application, Norms and Standards to become an Approved Programme Study Centre (PSC)
for PG Diploma in Information Security (PGDIS) (one year duration) (With an exitoption of PG Certificate in Information Security (PGCIS) after successfully completionof first semester) and Advanced Certificate in Information Security (ACISE) (six monthduration) (With an exit option of Certificate in Information Security (CISE) aftersuccessfully completion of first three courses of 12 Credits)
Guidelines for applying:
1. The Institute must be a Registered Society/Trust/Company.
2. Softwares and equipment required for the Computer Laboratory which are window
based licensed and open source
B) For PG Diploma in Information Security (PGDIS) (one year duration) (With anexit option of PG Certificate in Information Security (PGCIS) after successfullycompletion of first semester)
Course 1: Introduction to Information Security (4 Credits, Compulsory, Theory andPractical)Block 1: Business Needs and Security Awareness
Block 2: Security Threat and Vulnerability.Unit 1. Introduction to Security threats and Vulnerability
BFB TesterCROSS (Codenomicon Robust Open Source SoftwareGendrameMetasploitNessus (Sedulity OS EH Edition)NikoWireshark (Sedulity OS EH Edition)OedipusParosFlaw Finder
Unit 2. MalwareNuclear RAT V2.XXSubSevenTurkojan4.exeHydraetherflood.zipiris.zipnetworkview.exesmac20_setup.exesnort-2.8.6.1.tar.gzSnort_2_8_6_1_Installer.exeNetBusBack Orificewireshark-win32-1.4.0.exe
7/28/2019 programmedetails_2
14/39
Unit 3. Hacking: Issues and TechniquesNovaBACKUPDT UtilitiesPC BackupGenie Backup ManagerAcronis True ImageNTI Backup NowAcronis Backup & Recovery Norton GhostPowerBackupBullGuard BackupTurboBackupNmapsnortnetcatMetasploitKismetNiktoEthercapGFI LanGaurdSuper ScanRetina
Unit 4. Security Counter Measuresfirestarter-1.0.3.tar.gzkerio-kwf-whql-6.7.1-6399-win32.exekmyfirewall-1.1.1.tar.bz2NPF_Retail(2).EXEzapSetup_93_037_000_en.exesnortWindows/ Linux FirewallZone Alarm ProSegate Personal Firewall
Block 3: Networking Concepts and Attacks.Unit 1. Introduction to Data Communication and Transmission Mediasubnet calculatorAngry IP Scanner
Unit 2. Overview of Networking technologiesRouterWatchDemoSetup.exeSolarWinds-Subnet-Calculator.exebos_sub.exeTCPtracerouteTctraceitrace
Unit 3. Network Management and ProtocolWireshark (Sedulity OS EH Edition)cain and abelEthercap
Unit 4. Network Attacksdoshttp_setup.execa_setup.exedsniff-2.3(2).tar.gzdsniff-2.3.tar.gzetherflood.zip
7/28/2019 programmedetails_2
15/39
iris.zipnetworkview.exesmac20_setup.exesnort-2.8.6.1.tar.gzSnort_2_8_6_1_Installer.exewireshark-win32-1.4.0.exeSniffers
1.DSniff2.Ettercap
3.Ettercap-GTK4.ntop5.SMBRelay36.SSLDump7.Tcpick8.Wireshark9.xspy
Block 4: Operating System Concepts Unit 1. Introduction to Operating SystemUnit 2. Operating System Security: An Overview
john-16w
kerbcracklc4setup.exelc5setup.exelegionlns.exemakestrm.exemd5sum.exeMerge Streamsnbname.cppnbtdeputyNTFS and ADS.htmntinfoscan.exe
NTLM Authentication.pptNt_rootkit0.40Offline NT Password Resetterpsexecpwdump2pwdump3v2remoxec
1.5nmap2.Autoscan3.Nmap4.onesixtyone5.p0f
6.Protos7.sslscan8.Xprobe29.Zenmap
Unit 3. Operating System Hardening and Controlsopt cracklopth crackgpedit
Unit 4. ADC/SAMBAWindows ADC installation and setups
7/28/2019 programmedetails_2
16/39
Linux Samba Installations and Setup
Course 2: Network Security(4 Credits, Compulsory, Theory and Practical)Block 1: Introduction to Network SecurityUnit 1. Network Security Conceptsipscannerport scannersNmap
netcatwhois
Unit 2. Network Security Techniquesport blockersIDS and FirewallNetwork monitoring and Trackinglogs maintains
Unit 3. Identity ManagementLaptopAlarmSetup.exenTracker_Trial.zip
TrueCrypt Setup 7.0a.exetruecrypt-7.0a-linux-x86.tar.gzwebsetupLite.exeUnit 4. Security Issues in Wireless and next generation networksBacktrack4.0Airsnarf - A rogue AP setup utility.htmAirsnortCqure APNetStumblerInstaller.exeWEPCrackWiFiScanner-LinuxWireless Hacking Tools
Wireless Security Tools.htmairopeek.exeairsnarf-0.2.tar.gzarppoisonkismetwidzv1wlanexpert
*.Aircrack -ng*.Airmon-ng*.Airodump-ng*.AirSnarf*.ASLEAP
*.Cowpatty*.Genpmk*.Kismet*.Mackchanger*.WEPbuster
2.Cracking*.Aircrack -ng*.Airmon-ng*.Airodump-ng*.AirSnarf*.ASLEAP*.Cowpatty
7/28/2019 programmedetails_2
17/39
*.Genpmk*.Kismet*.WEPbuster
Bluetooth1.Blueprint2.BlueSmash3.Btcsanner5.Minicom6.obexFtp
7.Ussp-PushRFDI1.RFIDIOt Frosch2.RFDIOt Frosh3.RFIDIOt PCSC
Block 2: Secure ProtocolsImplementation of httpsImplementation of smtpsImplementation of Ssh
Block 3: Cryptography TechniquesUnit 1. Introduction to CryptographyUnit 2. Symmetric Key CryptographyUnit 3. Asymmetric Key CryptographyUnit 4. Applications of cryptographyafe_setup.exeahtmlepp109_setup.exeencryptmyfolder.exeglue.zipStegSpy2.1.zipstool.exeMicrosoft Cryptography tools
cert2spc.exeMakeCat.exesigner.dll.zipstool.exewondercryptencryptor
Block 4: Network Security TechnologyUnit 1. Firewallsfirestarter-1.0.3.tar.gzkerio-kwf-whql-6.7.1-6399-win32.exe
kmyfirewall-1.1.1.tar.bz2NPF_Retail(2).EXEzapSetup_93_037_000_en.exesnortFirewallADMmutate-0.8.1.tar.gzbro-1.5-release.tar.gznidsbench.tar.gzBlackice
Unit 3. Scanning and Analysis Toolstripwire-2.3.1-2.tar.gz
7/28/2019 programmedetails_2
18/39
tcpreplay-3.4.4.tar.gzfragroute-1.2.tar.gzAntiFirewallbackstealthdnsdigger.zipfirewalkPortscanning
1.Autoscan2.Nmap
3.propecia4.UnicornScan5.Zenmap
Service Fingerprinting1.Amap2.Httprint3.Httprint_GUI
Identify Live Hosts1.0trace2.5nmp3.Autoscan4.Fping
5.Hping26.Hping37.Netdiscover8.Nmap9.onesixtyone10.sslscan11.TCPtraceroute12.Zenmap
Network Mappings1.5nmp2.Amap3.Httprint
4.Httprint_GUI5.Autoscan6.Fping7.Hping28.Hping39.P0f10.ike-scan11.Netdiscover12.Netmask13.Nmap14.onesixtyone15.Propecia
16.PSK-Crack17.sslscan18.XProbe219.0trace20.TCPtraceroute21.Protos22.UnicornScan23.Zenmap
Identify Live Hosts1.0trace2.5nmp3.Autoscan
7/28/2019 programmedetails_2
19/39
4.Fping5.Hping26.Hping37.Netdiscover8.Nmap9.onesixtyone10.sslscan11.TCPtraceroute12.Zenmap
OS-Fingerprinting1.5nmap2.Autoscan3.Nmap4.onesixtyone5.p0f6.Protos7.sslscan8.Xprobe29.Zenmap
Course 3: Cyber Security (4 Credits, Compulsory, Theory and Practical)
Block 1: Information GatheringUnit 1. Social Engineering
Unit 2. E-mail Crime and Investigation65Advanced Stealth Email Redirector.zipaep.zipEmail_Spider_Easy.zipempasrec.zipfreesmtp.zipmailpv.zipMSN Explorer Password Recovery Software.exeNucleus-MSN-Password.exe
SECRET_INSTALL.EXEsmtpserver.exeYahoo Messenger Archive Recovery Software.exeExim/ Postfix MTA configuration
Unit 3. Reverse Engineering3568_ResHack.zipadc-0.69.zipboomerang-linux-alpha-0.3.tar.gzboomerang-win32-alpha-0.3.1.ziphw32v601.exeidademo54.exe
PE.Explorer_setup.exePE.Explorer_setup.zipspices.zipspicesdc.zipHex EditEvans DebuggerOllyDBG
Unit 4. Cracking Methodology65Advanced Stealth Email Redirector.zipFlexiSpy.rarremotedesktopspy-setup.exe
7/28/2019 programmedetails_2
20/39
spybuddy-setup-sw.exespyhunterS.exeWCASSU54.exe007PWD11.EXEAccent_Office_Password_Recovery_1[1].02_by_AmoKCMOSDEL.EXEJohn the ripperM0ong4B0oNg4.zipNeverExpire.msi
advanced i messanger password recoveryaopb.zipaoxppr_p.zipares.zipariskkey.exebrutus-aet2.zipbrutusaet2.zipsetup_akll.exePerfect Keylogger.exeXP Logon Password Logger.exeLog Monitors.zipiks2k20d.exe
E-Mail Keylogger.exeVPN1.ike-scan2.PSK-Crack
SMB Analysis1.SMBClient.py
Password Attacks1.Password offline Attacks
*.bkhive*.john*.samdump2*.sqlpat
*.wyd2.password online attacks*.BruteSSH*.hydra*.Lodowep*.Medusa*.SSHater
3.chntpw
Block 2: Database SecurityUnit 1. Introduction to Database ConceptsMySQL Server Configuration
Unit 2. Hand on Database usage and Hacking AttemptBlindfolded_SQL_Injection.pdfDataThiefMSSQL Server Named Pipe Privilege Escalation Exploit.htmManipulating Microsoft SQL Server Using SQL Injection.docMicrosoft SQL Server DoS Remote Exploit (MS03-031).htmOracle Auditing ToolsOracle SID EnumerationOracle SQL Injection.mhtOracle XDB FTP Service UNLOCK Buffer Overflow Exploit.htmPHP-NUKE version = 6.9 cid sql injection Remote Exploit.htm
7/28/2019 programmedetails_2
21/39
SQL Injection Passwd.txtSQLInjectionWhitePaper.pdfSQLSmack.plSql demo scriptsUsing Binary Search with SQL Injection.txtadvanced_sql_injection.pdfforceSQLoat-binary-1.3.1.ziporacle_password_cracker
phpBB 2.0.5 SQL Injection password disclosure Exploit.htmphpBB 2.0.6 search_id sql injection MD5 Hash Remote Exploit.htmsqlat-src-1.0.0.tarsqlat-src-1.1.0.tar.gzsqlbfsqlbf-win-binary-1.0.0.zipsqlcrawlsqlexecsqlscanthcsqlwpoison
1.DB-Generic
2.MSSQL*.sqlpat
Unit 3. Database Security-ISecurity and Privledges for MySQL Dababase
Unit 4. Database Security-IIImplementation of Security Policies
Block 3: WEB Technology
Unit 1. Introduction to WEB Architecture
Unit 2. Client Site ScriptsJava Script on Web Server like Apache
Unit 3. Server Site ScriptsPHP Server Side Script Implementation
Unit 4. Attacks on WEB Application32 Bit IP ResolverAutomatic-Printing-in-IE Vulnerability.htmBrute Force Attack Estimator.xlsForm Bookmarklets.url
Form Bookmarks.htmGenerate Unicode Strings.htmGenerate Xss ExploitHTTP File StealingHelpMe2.plIE Cache ExtractorIEENIISHACK.docRunning this page will crash IE.htmWinDNSSpoofhacking web servershttp traffic monitor
7/28/2019 programmedetails_2
22/39
ieflawiehist-win32-0_0_1.zip
jadlynxmonkeyshell.tar.gzreadme.htmsitedigger
1.ASP-Audit2.Burpsuite
3.CSRPTester4.Curl5.DirBuster4.Grabber5.Grendel scan6.Httprint7.Httprint_GUI8.Lbd9.List-Urls10.Mini Mysqlator11.Nikto12.Paros Proxy
13.Ratproxy14.Swfintruder15.W3AF16.Wapti17.Webshag18.Wfuzz
Nessus ServerNessus
Block 4: Internet Technology
Unit 1. Internet Architecture
Unit 2. Social Networking SitesBrowsers like firefox, Opera, Crome
Unit 3. Advanced Searching Techniquesgoogle hacking methodologies
Unit 4. Latest trend in Internet SecuritiesVirtuallization of Servers
Course 4: Policy, Standards and Laws(4 Credits, Compulsory, Theory)
Block 1: Security Standards
Block 2: ISO Standards
Block 3: Cyber Laws
Block 4: Cyber Crimes and Regulation
2nd SemesterCourse 5: Application and Business Security Developments (4 Credits,
Block 1: Application Development Life Cycle
7/28/2019 programmedetails_2
23/39
Block 2: Secure Application Development-IContent Management SystemsBlock 3: Secure Application Development -II
Block 4: Application Testing and Ethical HackingManageEngine_ApplicationsManager.exeNessus-3[1].2.1.1.exensauditor_setup.exe
Portscanners PFSETUP1.EXEPORTSCAN.EXESITESCAN.ZIPnmap-3.55-SP2-win32.zipnmapwin_1.3.1.exesup3rsc4n.zipws_ping_pro.zipPortscanning
1.Autoscan2.Nmap3.propecia
4.UnicornScan5.ZenmapService Fingerprinting
1.Amap2.Httprint3.Httprint_GUI
Course 6: BCP, DR Planning and Audit (4 Credits, Compulsory, Theory and Practical)
Block 1: Risk Analysis
Block 2: Business Continuity
Block 3: DR Strategies
Block 4: BCM Program Management
Course 7: Digital Forensics (4 Credits, Compulsory, Theory and Practical)
Block 1: Cyber Crime and Cyber Forensics
Block 2: Digital ForensicsUnit 1. Digital Investigation
Unit 2. Data Acquisition and Information Gathering
Unit 3. Forensic Examination of SystemsFTK-Forensic_Toolkit-1.81.5.exeEnCase Setup.exesteller Data acquisition.exeQuickRecoveryDemoLINUX.exe
Unit 4. Forensic Examination of Network Devices
Block 3: Mobile ForensicsUnit 1. Introduction to Mobile Forensics and Technologies
7/28/2019 programmedetails_2
24/39
Unit 2. Analysis of CDRs
Unit 3. Application of SIM Card Readers
Unit 4. Forensic Examination of Mobile DevicesAD_Mobile phone examiner.zipMobileInspector.exeOPM_Forensic_Trial_Setup.exe
memory-card-data-recovery-demo.exeopen folder.ppssim-card.exe
Block 4: Security Issues in Wireless TechnologiesUnit 1. Introduction to Wireless Technologies
Unit 2. Wireless Devices
Unit 3. Securing Wireless NetworkWireless Security Tools.htmElcomsoft Wireless Security Auditor 3.2.0.395
LucidLink Home Office Edition 2.2PW0-200 - Wireless Security Professional (WSP) Practice Test Questions 1.0AirStop Wireless 2.4.3
Unit 4. Ethical Hacking- Wireless SecurityAirsnarf - A rogue AP setup utility.htmAirsnortCqure APNetStumblerInstaller.exeWEPCrackWiFiScanner-LinuxWireless Hacking Tools
airopeek.exeairsnarf-0.2.tar.gzarppoisonkismetwidzv1wlanexpertWireless Network Anaysis (Linux)Bluetooth
1.Blueprint2.BlueSmash3.Btcsanner4.HCIDump
5.Minicom6.obexFtp7.Ussp-Push
RFDI1.RFIDIOt Frosch
*.Brute Force Hitag2*.Bruteforce Mifare*.Calculate JCOP MIFARE Keys*.Continues Delect Tag*.Copy ISO15693 TAG*.ePassport READ WRIE CLONE*.Format MIFARE 1k Value Blocks
7/28/2019 programmedetails_2
25/39
*.Identify LF TAG Type*.JCOP Info*.JCOP MIFARE READ WRITE*.JCOP Set ATR historical Bytes*.Read ACG Reader EEPROM*.Read LF TAG*.Read MIFARE*.Read Tag*.READ WRITE CLONE UNIQUE
*.RESET Q5 TAG*.Select Tag*.Set FDX-B ID*.Test ACG LAHF
2.RFDIOt Frosh*.READ WRITE CLONE Unique*.Reset hitag2 Tag*.Set FDX-B ID*.Test Frosch Reader
3.RFIDIOt PCSC*.Bruteforce MIFARE*.Calculate JCOP MIFARE Keys
*.Chip and info*.Continues Select TAG*.ePassport READ WRITE/CLONE*.Install ATR Historical byte applet to JCOP*.Install MIfare applet to JCOP*.install vonjeek epassport emulator to JCOP*.Install vonjeek ePassport emulator to Nokia*.JCOP Info*.JCOP Info*.JCOP MIFARE READ/WRITE*.JCPO Set ATR Historical Bytes*.Read MIFARE
*.Read TAG*.Select TAGWi-Fi
1.All*.Aircrack -ng*.Airmon-ng*.Airodump-ng*.AirSnarf*.ASLEAP*.Cowpatty*.Genpmk*.Kismet
*.Mackchanger*.WEPbuster2.Cracking
*.Aircrack -ng*.Airmon-ng*.Airodump-ng*.AirSnarf*.ASLEAP*.Cowpatty*.Genpmk*.Kismet*.WEPbuster
7/28/2019 programmedetails_2
26/39
B) Advanced Certificate in Information Security (ACISE) (six month duration) (With an exit option of Certificate in Information Security (CISE) after successfullycompletion of first three courses of 12 Credits)
Course 1: Information Security (4 Credits (1 Credit-Theory and 3 Credit-Practical),Compulsory)Block 1: Overview of Information Security
Unit 1. Information Security Concepts (Testing Tools)BFB TesterCROSS (Codenomicon Robust Open Source SoftwareGendrameMetasploitNessus (Sedulity OS EH Edition)NikoWireshark (Sedulity OS EH Edition)OedipusParosFlaw Finder
Unit 2. User HabitsEncryptorWindows/ Linux FirewallSecurity Settings as per Operating SystemWonderCryptFileCryptoAnti VirusSetup of Wifi's
Unit 3. Threats, Vulnerability and MalwareNuclear RAT V2.XXSubSeven
Turkojan4.exeetherflood.zipiris.zipnetworkview.exesmac20_setup.exesnort-2.8.6.1.tar.gzSnort_2_8_6_1_Installer.exeNetBusBack Orificewireshark-win32-1.4.0.exeHydra (Sedulity OS EH Edition)
Unit 4. Impact of Hardware and Software Protocols with Preventive MeasuresMetasploitNessus (Sedulity OS EH Edition)NikoWireshark (Sedulity OS EH Edition)Oedipus
Block 2: Securing DesktopUnit 1. Securing Desktop Concerns Theory
Unit 2. Securing Files and Folders with PasswordAxCrypt
7/28/2019 programmedetails_2
27/39
WinCryFolder Guard
Unit 3. User Restricted Data, Sharing of Files and Secure Downloading from InternetSFTPKodak EasyShareInternet Download Manager softwares
Unit 4. Security Threats due to Software Piracy
Block 3: Securing DataUnit 1. Securing, Backup and Restore Strategies for Data
Unit 2. Concepts of PC auditingSystemMechanic7Pro.exeWinAudit.exeNessus (Sedulity OS EH Edition)Ratina
Unit 3. Snapshot Utilitysystracer_setup_en.exe
Virtualization
Unit 4. DefragmentationAuslogics Disk DefragSmart Defrag 1.5JK DefragPageDefragSpeeDefragDiskeeperOS Based Defragmentation
Block 4: Securing Connectivity
Unit 1. Secure Network ConnectivityNovaBACKUPDT UtilitiesPC BackupGenie Backup ManagerAcronis True ImageNTI Backup NowAcronis Backup & Recovery Norton GhostPowerBackupBullGuard BackupTurboBackupNmap
snortnetcatMetasploitKismetNiktoEthercapGFI LanGaurdSuper ScanRetina
Unit 2. Firewallsfirestarter-1.0.3.tar.gz
7/28/2019 programmedetails_2
28/39
kerio-kwf-whql-6.7.1-6399-win32.exekmyfirewall-1.1.1.tar.bz2NPF_Retail(2).EXEzapSetup_93_037_000_en.exesnortWindows/ Linux FirewallZone Alarm ProSegate Personal Firewall
Unit 3. Encryptionafe_setup.exeahtmlepp109_setup.exeencryptmyfolder.exeglue.zipStegSpy2.1.zipstool.exeMicrosoft Cryptography tools cert2spc.exeMakeCat.exesigner.dll.zipStools
EncryptorWonderCrypt
Unit 4. Using some secure protocols TheoryImplementation of httpsImplementation of smtpsImplementation of Ssh
Course 2: Securing Internet Access(4 Credits (1 Credit-Theory and 3 Credit-Practical),Compulsory)
Block 1: Secure BrowsingUnit 1. Browsing HistoryPop-up History 0.0.3Private Browsing 1.2.9Attention Recorder 0.65WinSettings 8.1Trackless 1.03Squidlogsfirefox, chrome, mozilla
Unit 2. Cookies, E-mail and Internet Applications65Advanced Stealth Email Redirector.zipaep.zipEmail_Spider_Easy.zipempasrec.zipfreesmtp.zipmailpv.zipMSN Explorer Password Recovery Software.exeNucleus-MSN-Password.exeSECRET_INSTALL.EXEsmtpserver.exeYahoo Messenger Archive Recovery Software.exePortable Historian 1.4.4.0pidginTeamViewer
7/28/2019 programmedetails_2
29/39
SkypeBitTorrent
Unit 3. Log Files, Plug-ins and ScriptsActive LogView 2.09.1.7378XFile 2.021ksLogger 1.17logs
Unit 4. Protecting from Fake WebsitesNetcraft ToolbarGeoTrust TrustWatchTrustToolbarClear Search Anti-PhishingBullGuard Internet Security (32-bit version)phishing protection from the browsersThunderbird Security
Block 2: Internet Transaction Security
Unit 1. Secure Protocols Theoryhttps implementationsmtps implementationsssh (secure shell)
Unit 2. Privacy policies TheoryIP tablesFirewallsUser Authentications
Unit 3. How Identity Theft Works and its Prevention Theory
MySecurityVault PROMyIdentityDefender ToolbarIdentity Theft ProtectorTrustedID Identity Theft ProtectionIdentity Theft Toolkit
Unit 4. Credit Card Fraud Theory
Block 3: Securing Web ServicesUnit 1. Security Challenges Specific to Web Services TheorywebInject
Unit 2. Web Application Security Testing32 Bit IP ResolverAutomatic-Printing-in-IE Vulnerability.htmBrute Force Attack Estimator.xlsForm Bookmarklets.urlForm Bookmarks.htmGenerate Unicode Strings.htmGenerate Xss ExploitHTTP File StealingHelpMe2.plIE Cache ExtractorIEEN
7/28/2019 programmedetails_2
30/39
IISHACK.docRunning this page will crash IE.htmWinDNSSpoofhacking web servershttp traffic monitorieflawiehist-win32-0_0_1.zip
jadlynx
monkeyshell.tar.gzreadme.htmsitediggerOdysseusmetaexploitParos Proxy
Unit 3. Cyber Forensics, Digital Certificates and Digital WatermarkingFTK-Forensic_Toolkit-1.81.5.exeEnCase Setup.exesteller Data acquisition.exeQuickRecoveryDemoLINUX.exe
Web Analysis1.ASP-Audit (Sedulity OS EH Edition)2.Burpsuite (Sedulity OS EH Edition)3.CSRPTester (Sedulity OS EH Edition)4.Curl (Sedulity OS EH Edition)5.DirBuster (Sedulity OS EH Edition)4.Grabber5.Grendel scan (Sedulity OS EH Edition)6.Httprint (Sedulity OS EH Edition)7.Httprint_GUI (Sedulity OS EH Edition)8.Lbd (Sedulity OS EH Edition)9.List-Urls (Sedulity OS EH Edition)
10.Mini Mysqlator (Sedulity OS EH Edition)11.Nikto (Sedulity OS EH Edition)12.Paros Proxy (Sedulity OS EH Edition)13.Ratproxy (Sedulity OS EH Edition)14.Swfintruder (Sedulity OS EH Edition)15.W3AF (Sedulity OS EH Edition)16.Wapti (Sedulity OS EH Edition)17.Webshag (Sedulity OS EH Edition)18.Wfuzz19.ZZuff (Sedulity OS EH Edition)20.Webscarb Lite (Sedulity OS EH Edition)
Nessus Server (Sedulity OS EH Edition)
Nessus (Sedulity OS EH Edition)
Unit 4. Threat Profile, Risk Analysis and Defence Against ThreatsManageEngine_ApplicationsManager.exeNessus-3[1].2.1.1.exensauditor_setup.exePenetration
1.Framework2-MsfCli2.Framework2-MsfCnsole3.Framework2-MsfUpdate4.Framework3-MsfCli
7/28/2019 programmedetails_2
31/39
5.Framework3-MsfConsole6.Framework3-MsfUpdate7.Framework3-Msfweb8.Inguma9.Update Miliw0rm
Framewok Version 21.Framework2-MsfCli2.Framework2-MsfCnsole
3.Framework2-MsfUpdateFramework Version31.Framework3-MsfCli2.Framework3-MsfConsole3.Framework3-MsfUpdate4.Framework3-Msfweb
miliw0rm Exploit ArchiveFast TrackInguma
1.Nessus Server2.ADMSnmp3.ASP-Audit
4.Bed5.braa6.bunny7.Burpsuite8.Cisco Auditing Tool9.Cisco Global Exploiter10.Cisco OCS mass SCanner11.Cisco passwd Scanner12.Copy Router Config13.CSRFTester14.Curl15.DirBuster
16.Grabber17.Grendel Scan18.Httprint19.httprint_GUI20.JBroFuzz21.Lbd22.List-Urls23.Merge Router Config24.Metacoretex25.Mini Mysqlator26.Nessus27.Nikto
28.Paros Proxy29.Pblind30.peach31.Ratproxy32.SMBClient.py33.Snmp Enum34.Spike35.SQLbrute36.SQLIX37.SQLMap38.SQL Ninja39.swfintruder
7/28/2019 programmedetails_2
32/39
40.Voiper41.W3AF42.Wapiti43.Webscarab Lite44.Webshag45.Wfuzz46.WSFuzzer47.ZZuf
Cisco
1.Cisco Auditing Tool2.Cisco Global Exploiter3.Cisco OCS Mass Scanner4.Copy Router Config5.Merge Router Config
Database1.DB-Generic2.MSSQL
Fuzzers1.Bed2.bunny3.JBroFuzz
4.Peach5.Spike6.Voiper7.WSFuzzer8.ZZuf
SMB Analysis1.SMBClient.py
SNMP Analysis1.ADMSnmp2.braa3.Snmp Enum
Nessus Server
Block 4: Securing during Mobility
Unit 1. Security in Wireless Environment Theory
Unit 2. Wi-fi, Blue tooth, LANAirsnarf - A rogue AP setup utility.htmAirsnortCqure APNetStumblerInstaller.exeWEPCrackWiFiScanner-Linux
Wireless Hacking Toolsairopeek.exeairsnarf-0.2.tar.gzarppoisonkismetwidzv1wlanexpertWireless Network AnaysisBluetooth
1.Blueprint2.BlueSmash3.Btcsanner
7/28/2019 programmedetails_2
33/39
4.HCIDump5.Minicom6.obexFtp7.Ussp-Push
Wi-Fi1.All
*.Aircrack -ng (Sedulity OS EH Edition)*.Airmon-ng (Sedulity OS EH Edition)*.Airodump-ng (Sedulity OS EH Edition)
*.AirSnarf (Sedulity OS EH Edition)*.ASLEAP (Sedulity OS EH Edition)*.Cowpatty (Sedulity OS EH Edition)*.Genpmk (Sedulity OS EH Edition)*.Kismet (Sedulity OS EH Edition)*.Mackchanger (Sedulity OS EH Edition)*.WEPbuster (Sedulity OS EH Edition)
2.Cracking*.Aircrack -ng (Sedulity OS EH Edition)*.Airmon-ng (Sedulity OS EH Edition)*.Airodump-ng (Sedulity OS EH Edition)*.AirSnarf (Sedulity OS EH Edition)
*.ASLEAP (Sedulity OS EH Edition)*.Cowpatty (Sedulity OS EH Edition)*.Genpmk (Sedulity OS EH Edition)*.Kismet (Sedulity OS EH Edition)*.WEPbuster (Sedulity OS EH Edition)
Unit 3. Digital Incident Response
Unit 4. Industry Perspective
Course 3: Information Technology Security (4 Credits-Theory, Compulsory)
Block 1: W3C Compliance
Unit 1. Introduction to W3C Theory
Unit 2. Recommendations and certifications of W3C Theory
Unit 3. W3C Standards and Practices Theory
Unit 4. How do we Improve Internet Privacy using W3C Theorycynthia.exe
Block 2: Introduction to ISO 27000
Unit 1. Need of Certification TheoryUnit 2. ISO/IEC 27000 family of Information Security Management Systems (ISMS)standards TheoryUnit 3. Cyber Security Standards TheoryUnit 4. Employee perspective of ISO 27000 Theory
Block 3: Information Technology ActUnit 1. Introduction to Information Technology Amendment Act 2008 (Unique ID(UID), Limitations of Information Technology Amendment Act 2008) TheoryUnit 2. Legal Implications of Personal Security TheoryUnit 3. Common Cyber Crimes and Government Laws and Rules in Informationsecurity Theory
7/28/2019 programmedetails_2
34/39
Course 4: Server Security (6 Credits (1 Credit-Theory and 5 Credit-Practical),Compulsory)
Block 1: Email SecurityUnit 1. Email ServersPostFixIceWarp Mail ServerCourier mail serverEudora WorldMail ServerDovecotWebEasyMailRockliffeIMail Server
Unit 2. Email Forgery and Spamming65Advanced Stealth Email Redirector.zipaep.zipEmail_Spider_Easy.zipempasrec.zipfreesmtp.zipmailpv.zipSECRET_INSTALL.EXEsmtpserver.exe
Unit 3. Password Attack VectorsYahoo Messenger Archive Recovery Software.exeMSN Explorer Password Recovery Software.exeNucleus-MSN-Password.exe
Unit 4. Account Security Theory
Block 2: Windows Security
Unit 1. Windows System Architecture Theory
Unit 2. Windows System Security Theory
Unit 3. Hacking WindowsADS Streaming UtilityADS Visual Detector_DEMOADS Visual Detector_DEMO.zipAntispectorauditpol.exebrowselist.exec2myazzCapture LM Manager Passwordcat.exeChange_NT-2000_Passwordscmdlogcp.exeCrash on Demand.exedumpel.exeefsview.exeelsaveEvidenceEliminator.exefoundstone_toolsFU_Rootkitgetadmin
7/28/2019 programmedetails_2
35/39
HiddenFileDetectorSetupHide Folders XPhkhydan-0.10.tarInvisible Folders.exeInvisible Secrets.exe
john-16wkerbcracklc4setup.exe
lc5setup.exelegionlns.exemakestrm.exemd5sum.exeMerge Streamsnbname.cppnbtdeputyNTFS and ADS.htmntinfoscan.exeNTLM Authentication.pptNt_rootkit0.40
Offline NT Password Resetterpsexecpwdump2pwdump3v2remoxecRightClickHideRootkit Detector V0.3 for windowsrootkithunter-1.00RC1.tar.gzsamdumpSecurity side-effects of Word fields.htmShutDown.exeSMB Proxy
smbgrinderOS-Fingerprinting1.5nmap (Sedulity OS EH Edition)2.Autoscan (Sedulity OS EH Edition)3.Nmap (Sedulity OS EH Edition)4.onesixtyone (Sedulity OS EH Edition)5.p0f (Sedulity OS EH Edition)6.Protos (Sedulity OS EH Edition)7.sslscan (Sedulity OS EH Edition)8.Xprobe2 (Sedulity OS EH Edition)9.Zenmap (Sedulity OS EH Edition)
Password Attacks
1.Password offline Attacks*.bkhive (Sedulity OS EH Edition)*.john (Sedulity OS EH Edition)*.samdump2 (Sedulity OS EH Edition)*.sqlpat (Sedulity OS EH Edition)*.wyd (Sedulity OS EH Edition)
Block 3: Linux Security
Unit 1. Linux System Architecture
Unit 2. Linux System Security Theory
7/28/2019 programmedetails_2
36/39
Unit 3. Hacking Linux Theory7350nxt-v3.tar.gz9x_cgi.zipADM-spoof-NEW.tgzanonirc.cboscript-0_2_tar.tarbsd-rdist.ccctt-0.1.7.tar.gz
cgiscan2.ccheops-0_55_tar.tarcold-1_0_10.tgzcops_104_tar.zcrack5_0_tar.gzcracklib25_small_tar.zcrontab_backdoor.shdipexploitlinux.cDistributed John.tgzdtk-0_7.tarethereal-0_5_0_tar.tarfakebo-032.tgz
Firebird 1.0.2 FreeBSD 4.7-RELEASE local root exploit.htmgammaprog150.tgzhackunix.zipholelist.txthping2_v1.5.pdfHP-UX B11.11 -usr-bin-ct local format string Root Exploit.htmhunt-1_0.tgzibnc2_0a.tarindex.htmlinstall.txtIntel PXE Exploit in RedHat 8.txtinv.c
ipbomb.cipgrab-0_6_tar.taripsend2_1a_tar.taripspoof_script.zipircbnc.c
jizz.c jizz.sh john-1.6.34.tar.gz john-1_6_tar.tarlibpcap-0_4_tar.tarLinux 2.4.20 kernel decode_fh Denial of Service Exploit.htmLinux Basic Commands.pdf
Linux eXtremail 1.5.x Remote Format Strings Exploit.htmlinux.txtlogwatch-1_5_1_tar.tarlrk4readme.txtmailbseq.cMandrake Linux 8.2 -usr-mail local exploit (d86mail.pl).htmmerlin_tar.gzmflash.cmodify_ldt_exploit.cmountexp.cnessus-unstable-120198.tgznfsbug.c
7/28/2019 programmedetails_2
37/39
nmap-2_12.tarOpenBSD 2.x - 3.3 exec_ibcs2_coff_prep_zmagic() kernel Explo.htmOpenBSD ibcs2_exec Kernel local Exploit.htmpppsetup.txtrdC-LPRng_c.htmrdistexp.credir-1_1_tar.tarSAdoor-20030805.tgzsatan.zip
secure_delete-1_8_tar.tarsigurgexp.cSolaris runtime linker (ld.so.1) buffer overflow Exploit (SP.htmSolaris Sadmind Default Configuration Remote Root Exploit.htmspamshield-1_40_tar.gzspike.shSuSE linux 9.0 YaST config Skribt Local Exploit.htmtcptrace_tar.gzthc-uht1.tgztrace_shell.ctraffic-vis-0_22_tar.tarttywatcher-1_0a_tar.gz
ttywatcher-1_1beta1_tar.gzunix.zipunix-pc.zipuserdump.zipvoodoo_tar.gzwgate-bsd_tar.tarWSD-dns.tgzxenon-r1.tarxtermoverflo_exp.c
Block 4: Webserver Security
Unit 1. Understanding Web Technologies Theory
Unit 2. Web Application Attacks32 Bit IP ResolverAutomatic-Printing-in-IE Vulnerability.htmBrute Force Attack Estimator.xlsForm Bookmarklets.urlForm Bookmarks.htmGenerate Unicode Strings.htmGenerate Xss ExploitHTTP File StealingHelpMe2.pl
IE Cache ExtractorIEENIISHACK.docRunning this page will crash IE.htmWinDNSSpoofhacking web servershttp traffic monitorieflawiehist-win32-0_0_1.zip
jadlynxmonkeyshell.tar.gz
7/28/2019 programmedetails_2
38/39
readme.htmsitediggerWeb Analysis
1.ASP-Audit (Sedulity OS EH Edition)2.Burpsuite (Sedulity OS EH Edition)3.CSRPTester (Sedulity OS EH Edition)4.Curl (Sedulity OS EH Edition)5.DirBuster (Sedulity OS EH Edition)4.Grabber
5.Grendel scan (Sedulity OS EH Edition)6.Httprint (Sedulity OS EH Edition)7.Httprint_GUI (Sedulity OS EH Edition)8.Lbd (Sedulity OS EH Edition)9.List-Urls (Sedulity OS EH Edition)10.Mini Mysqlator (Sedulity OS EH Edition)11.Nikto (Sedulity OS EH Edition)12.Paros Proxy (Sedulity OS EH Edition)13.Ratproxy (Sedulity OS EH Edition)14.Swfintruder (Sedulity OS EH Edition)15.W3AF (Sedulity OS EH Edition)16.Wapti (Sedulity OS EH Edition)
17.Webshag (Sedulity OS EH Edition)18.Wfuzz19.ZZuff (Sedulity OS EH Edition)20.Webscarb Lite (Sedulity OS EH Edition)
Nessus Server (Sedulity OS EH Edition)Nessus (Sedulity OS EH Edition)
Block 5: Wireless Network SecurityUnit 1. Wireless Network Concepts Theory
Unit 2. Wireless Attacks
Airsnarf - A rogue AP setup utility.htmAirsnortCqure APNetStumblerInstaller.exeWEPCrackWiFiScanner-LinuxWireless Hacking Toolsairopeek.exeairsnarf-0.2.tar.gzarppoisonkismetwidzv1
wlanexpertWi-Fi1.All
*.Aircrack -ng (Sedulity OS EH Edition)*.Airmon-ng (Sedulity OS EH Edition)*.Airodump-ng (Sedulity OS EH Edition)*.AirSnarf (Sedulity OS EH Edition)*.ASLEAP (Sedulity OS EH Edition)*.Cowpatty (Sedulity OS EH Edition)*.Genpmk (Sedulity OS EH Edition)*.Kismet (Sedulity OS EH Edition)*.Mackchanger (Sedulity OS EH Edition)
7/28/2019 programmedetails_2
39/39
*.WEPbuster (Sedulity OS EH Edition)2.Cracking
*.Aircrack -ng (Sedulity OS EH Edition)*.Airmon-ng (Sedulity OS EH Edition)*.Airodump-ng (Sedulity OS EH Edition)*.AirSnarf (Sedulity OS EH Edition)*.ASLEAP (Sedulity OS EH Edition)*.Cowpatty (Sedulity OS EH Edition)*.Genpmk (Sedulity OS EH Edition)
*.Kismet (Sedulity OS EH Edition)*.WEPbuster (Sedulity OS EH Edition)
Unit 3. Wireless Security MeasuresElcomsoft Wireless Security Auditor 3.2.0.395LucidLink Home Office Edition 2.2PW0-200 - Wireless Security Professional (WSP) Practice Test Questions 1.0AirStop Wireless 2.4.3
Block 6: Software SecurityUnit 1. Recovering Software Codes3568_ResHack.zip
adc-0.69.zipboomerang-linux-alpha-0.3.tar.gzboomerang-win32-alpha-0.3.1.ziphw32v601.exeidademo54.exePE.Explorer_setup.exePE.Explorer_setup.zipspices.zipspicesdc.zip
Unit 2. Understanding Software Code Theory
Unit 3. Developing Software Patches and CodeFASM148.ZIPfasmw148-090.zipWDASM89.ZIP
3. The Institute is required to furnish the attached proforma for establishment as anIGNOU programme study centre.