programmedetails_2

download programmedetails_2

of 39

Transcript of programmedetails_2

  • 7/28/2019 programmedetails_2

    1/39

    INDIRA GANDHI NATIONAL OPEN UNIVERSITY SCHOOL OF VOCATIONAL EDUCATION & TRAINING

    (SOVET)

    Application Form for esttt. of Programme Study Centres (PSC)(1) PG Diploma in Information Security (PGDIS)

    (2) PG Certificate in Information Security (PGCIS) (With an exit option of PGCertificate in Information Security (PGCIS) after successfully completion of first

    semester)(3) Advanced Certificate in Information Security (ACISE) (With an exit option of

    Certificate in Information Security (CISE) after successfully completion of first threecourses of 12 Credits)

    Dear Sir/Madam,

    I am delighted to inform you that IGNOU is ready to launch PG Diploma in InformationSecurity (PGDIS) (one year duration) (With an exit option of PG Certificate inInformation Security (PGCIS) after successfully completion of first semester) andAdvanced Certificate in Information Security (ACISE) (six month duration) (With anexit option of Certificate in Information Security (CISE) after successfully completion

    of first three courses of 12 Credits). Please find enclosed the Programme InformationSheet and Performa of the Application to be completed and submitted to IGNOU.

    Kindly note the following:

    1) On receipt of your application by IGNOU and if found satisfactory, theprocess of inspection and approval of your Institute as Programme StudyCentre (PSC) will be undertaken.

    2) Institute will be communicated with regard to promotional efforts andadmission process so as to commence the classes on schedule.

    3) The filled in application along with supporting document may be sent to the

    address given below so that the same can reach us on or before 31-05- 2011. Programme Co-ordinatorRoom No. 19, Block-1SOVET, IGNOUMaidan GarhiNew Delhi-110068

    4) My Colleague, Ms. Urshla Kant, Assistant Professor, School of VocationalEducation and Training, IGNOU is the Programme Coordinator for the aboveprogrammes. Please feel free to contact her either on her telephone No. 011-29571123 or her e-mail. [email protected] for seeking any clarification.

    5) In case you need any further clarification/ information please feel free tocontact the school. We will be more than delighted to be of assistance to you.

    We recognize your role and contribution to the success of this academic endeavour. Theultimate objective is being to fulfill the aspirations of our students and the need of theInformation Security.

    With kind regards, Yours Sincerely,

    (Prof. C.G. Naidu)Director (SOVET)

  • 7/28/2019 programmedetails_2

    2/39

    Annexure-1

    INDIRA GANDHI NATIONAL OPEN UNIVERSITYSCHOOL OF VOCATIONAL EDUCATION & TRAINING (SOVET)

    Programme Information Sheet(1) PG Diploma in Information Security (PGDIS)

    (2) PG Certificate in Information Security (PGCIS) (With an exit option of PGCertificate in Information Security (PGCIS) after successfully completion of first

    semester)(3) Advanced Certificate in Information Security (ACISE) (With an exit option of

    Certificate in Information Security (CISE) after successfully completion of first threecourses of 12 Credits)

    These innovative Programmes in the area of Information Security from IGNOU envisages tocombine the strength of both IGNOU and Programme Study Centres to bridge the gap inawareness and competency required by various categories of people as the users of Internetand various IT enabled services about deeper aspects of Information Security, responsibleuse and management of IT services. Certification of skills would help them in getting gainfulemployment in the emerging global market. It incorporates the flexibility of open anddistance learning with continuing education through the conventional system by way of Face-to-Face interaction at the Programme Study Centre (PSC) for both theory and practicalcomponents.

    Name of the Programme : (1) PG Diploma in Information Security (PGDIS)(2) PG Certificate in Information Security (PGCIS)

    (With an exit option of PG Certificate inInformation Security (PGCIS) after

    successfully completion of first semester)

    Programme Code : (1) PGDIS(2) PGCIS

    Number of Credits : 32Duration : 1 YearMedium of Instruction : EnglishProgramme Fee : Rs. 8000/- (per semester)

    Eligibility : A. B.Sc (Computer Science)/ B.C.A/ B.Tech (Computer Sc.)/ B.Tech (IT) or itsequivalent

    B. Bachelor Degree in any discipline or its equivalent from the recognizedUniversity/ Institute with CIT/CIC from IGNOU

    C. Bachelor Degree in any discipline or its equivalent from the recognizedUniversity/ Institute with 1 year working experience in Computer application/IT.

  • 7/28/2019 programmedetails_2

    3/39

    Course Details:

    Semester one:

    Semester Two:

    Structure of this Programme

    PG Diploma in Information Security

    Duration : 1Year Semester: 2 Semesters No. of Credits: 32

    (With an exit option of PG Certificate in Information Security aftersuccessfully completion of first semester)

    Target Group:

    A. B.Sc (Computer Science)/ B.C.A/ B.Tech (Computer Sc.)/ B.Tech (IT) or itsequivalent

    B. Bachelor Degree in any discipline or its equivalent from the recognized University/ Institute with CIT/CIC from IGNOU

    C. Bachelor Degree in any discipline or its equivalent from the recognized University/ Institute with 1 year working experience in Computer application/IT.

    Sl.No. Course Code Title of the course Type of coursecompulsory/optional

    Credits Theory/Practical/ Project

    1. MSEI-021 Introduction to InformationSecurity

    Compulsory 4 Integrated (Theory& Practical)

    2. MSEI-022 Network Security Compulsory 4 Integrated (Theory& Practical)

    3. MSEI-023 Cyber Security Compulsory 4 Integrated (Theory& Practical)

    4. MSE-024 Policy, Standards and Laws Compulsory 4 TheoryTotal 16

    Sl.No. Course Code Title of the course Type of coursecompulsory/optional

    Credits Theory/Practical/ Project

    5. MSEI-025 Application and BusinessSecurity Developments

    Compulsory 4 Integrated (Theory& Practical)

    6. MSEI-026 BCP, DR Planning and Audit Compulsory 4 Integrated (Theory& Practical)

    7. MSEI-027 Digital Forensics Compulsory 4 Integrated (Theory& Practical)

    8. MSEP-028 Project Compulsory 4 ProjectTotal 16

  • 7/28/2019 programmedetails_2

    4/39

    1st Semester

    Course 1: Introduction to Information Security ( 4 Credits, Compulsory,Theory and Practical) : MSEI-021

    Block 1: Business Needs and Security AwarenessUnit 1. Information Technology Concept and ApplicationUnit 2. Security AwarenessUnit 3. Information Security: OverviewUnit 4. Legal and Ethical Issues

    Block 2: Security Threat and Vulnerability.Unit 1. Introduction to Security threats and Vulnerability

    (Computer as a target, as a mean of resource or as a mean of attack)Unit 2. Malware

    (Viruses, Worms, Trojan horses)

    Unit 3. Hacking: Issues and TechniquesUnit 4. Security Counter Measures

    Block 3: Networking Concepts and Attacks.Unit 1. Introduction to Data Communication and Transmission MediaUnit 2. Overview of Networking technologies

    (Topologies)Unit 3. Network Management and ProtocolUnit 4. Network Attacks

    Block 4: Operating System ConceptsUnit 1. Introduction to Operating SystemUnit 2. Operating System Security: An Overview

    (Authentication, Access controls, Security models, Updates, Patches, Integritychecks, Antivirus software)

    Unit 3. Operating System Hardening and ControlsUnit 4. ADC/SAMBA

    (File servers)

    Course 2: Network Security( 4 Credits, Compulsory, Theory and Practical): MSEI-022

    Block 1: Introduction to Network SecurityUnit 1. Network Security Concepts

    (Threats, Mechanism)Unit 2. Network Security Techniques

    ( Digital Water marking, ATC)Unit 3. Identity Management

    (Biometrics, All Physical Security, login, Finger Printing)Unit 4. Security Issues in Wireless and next generation networks

  • 7/28/2019 programmedetails_2

    5/39

    Block 2: Secure ProtocolsUnit 1. Introduction to Secure ProtocolsUnit 2. Specific Protocol-I

    (at network level eg. IPSec, VPN, SHCN, SSL)Unit 3. Specific Protocol-II

    (at Application level eg. PGP, SHTTP, SSH etc)

    Block 3: Cryptography TechniquesUnit 1. Introduction to CryptographyUnit 2. Symmetric Key CryptographyUnit 3. Asymmetric Key Cryptography

    (Hash function)Unit 4. Applications of cryptography

    (Steganography, PK(Public key infrastructure), DH(Diffe-Hellman key), ElectronicSignatures)

    Block 4: Network Security Technology(Firewalls, Routers etc)

    Unit 1. Firewalls(Network, Application amd Host based Firewalls, Proxy)

    Unit 2. IDS/IPS/Honey PotsUnit 3. Scanning and Analysis Tools

    Course 3: Cyber Security ( 4 Credits, Compulsory, Theory and Practical): MSEI-023

    Block 1: Information GatheringUnit 1. Social EngineeringUnit 2. E-mail Crime and Investigation

    Unit 3. Reverse EngineeringUnit 4. Cracking Methodology

    Block 2: Database SecurityUnit 1. Introduction to Database ConceptsUnit 2. Handon Database usage and Hacking AttemptUnit 3. Database Security-I

    (Distributed Databases, Security aspects related to centralized Distributed Database)Unit 4. Database Security-II

    (Concurrence, Failure recovery, Fault tolerance, Transaction theory)

    Block 3: WEB TechnologyUnit 1. Introduction to WEB Architecture

    (W3C)Unit 2. Client Site ScriptsUnit 3. Server Site ScriptsUnit 4. Attacks on WEB Application

    Block 4: Internet TechnologyUnit 1. Internet ArchitectureUnit 2. Social Networking Sites

  • 7/28/2019 programmedetails_2

    6/39

    Unit 3. Advanced Searching Techniques(Search engines like Google etc)

    Unit 4. Latest trend in Internet Securities(Web 2.0)

    Course 4: Policy, Standards and Laws( 4 Credits, Compulsory, Theory): MSE-024

    Block 1: Security StandardsUnit 1. Introduction to Security Policies and Standards

    (Need, Methods, Various Standards: ISO 27001, HIPA, Vertical)Unit 2. Security Framework Standards

    (ISO Standards-all)Unit 3. Security Mechanism Standards

    (Encryption, Digital Signatures, Techniques, Algorithm)Unit 4. Security Protocol Standards

    (Entity authentication protocol, Key establishment, Time stamping)

    Block 2: ISO StandardsUnit 1. Study of ISO Standards: A complete Case Study

    Block 3: Cyber LawsUnit 1. International Treaties, Conventions and Protocols concerning cyberspace

    (Guidelines issued by various ministries, Alternative Dispute Resolution, OnlineDispute Resolution)

    Unit 2. Information Technology Amendment Act 2008-I(In Introduction: Criminal Law & Constitutional Law in brief)

    Unit 3. Information Technology Amendment Act 2008-II

    (Limitations)Unit 4. Cyberspace and IPR(Search engines, Web crawling, Indexing, searching, Ranking of web pages,

    Spamdexing)

    Block 4: Cyber Crimes and RegulationUnit 1. Introduction to Computer CrimesUnit 2. Conventional Crimes through ComputerUnit 3. Crimes and Torts committed on a Computer NetworkUnit 4. Crimes relating to Data Alteration/ Destruction/ Theft of source code and

    Database

    (Online Dispute Resolution, theft of source code; a case study)

    2nd Semester

    Course 5: Application and Business Security Developments ( 4 Credits,Compulsory, Theory and Practical) : MSEI-025

    Block 1: Application Development Life CycleUnit 1. Application DesignUnit 2. Application Coding

  • 7/28/2019 programmedetails_2

    7/39

    Unit 3. Application TestingUnit 4. Application Production and Maintenance

    Block 2: Secure Application Development-IUnit 1. Critical Application Security ConceptsUnit 2. Input Validation and EncodingUnit 3. Authentication, Authorization and Session ManagementUnit 4. Encryption, Confidentiality and Data Protection

    Block 3: Secure Application Development -IIUnit 1. Data AccessUnit 2. Error Handling and LoggingUnit 3. Server Configuration and Code ManagementUnit 4. Application Threat Modeling

    Block 4: Application Testing and Ethical HackingUnit 1. Assessment Methodologies and ToolsUnit 2. Application Security AssessmentsUnit 3. WEB Application Scanning and Vulnerability AssessmentUnit 4. WEB Application Ethical Hacking

    Course 6: BCP, DR Planning and Audit ( 4 Credits, Compulsory, Theory andPractical) : MSEI-026

    Block 1: Risk AnalysisUnit 1. Introduction to Risk AnalysisUnit 2. Risk AssessmentUnit 3. Risk Analysis Techniques and MethodologiesUnit 4. Risk Mitigation

    Block 2: Business ContinuityUnit 1. Need for a Business Continuity ProgramUnit 2. Overview of Business Continuity Management Life CycleUnit 3. Defining Organizations Business Continuity RequirementsUnit 4. Identifying and Selecting Business Continuity Strategies

    Block 3: DR StrategiesUnit 1. Developing Plans for Computer System RecoveryUnit 2. Developing Plans for Business ResumptionUnit 3. Plan Templates and Software ToolsUnit 4. Implementing Crisis Management Framework

    Block 4: BCM Program ManagementUnit 1. Maintaining and Administering BCM PlansUnit 2. Auditing and Evaluating BCM plansUnit 3. Developing and Implementing a BCM ResponseUnit 4. Disaster Simulation Exercise

  • 7/28/2019 programmedetails_2

    8/39

    Course 7: Digital Forensics ( 4 Credits, Compulsory, Theory and Practical) : MSEI-027

    Block 1: Cyber Crime and Cyber ForensicsUnit 1. Various Types of Cyber CrimesUnit 2. Banking and Financial CrimesUnit 3. Identify Thefts and Data Thefts/ Source Code TheftsUnit 4. SPAM and BOTNETS

    ( 1 Case Study on Nigerian Letter Fraud)

    Block 2: Digital ForensicsUnit 1. Digital InvestigationUnit 2. Data Acquisition and Information GatheringUnit 3. Forensic Examination of Systems

    (Keyword, Data recovery, Various tools NKS)Unit 4. Forensic Examination of Network Devices

    (Routers, Firewalls, IDS/IPS etc)

    Block 3: Mobile ForensicsUnit 1. Introduction to Mobile Forensics and TechnologiesUnit 2. Analysis of CDRsUnit 3. Application of SIM Card ReadersUnit 4. Forensic Examination of Mobile Devices

    (Mobile Frauds)Block 4: Security Issues in Wireless TechnologiesUnit 1. Introduction to Wireless TechnologiesUnit 2. Wireless DevicesUnit 3. Securing Wireless Network

    Unit 4. Ethical Hacking- Wireless Security

    Course 8: MSEP-028 Project 4 Credits

  • 7/28/2019 programmedetails_2

    9/39

    Name of the Programme : (3) Advanced Certificate in Information Security(ACISE) (With an exit option of Certificate inInformation Security (CISE) after successfullycompletion of first three courses of 12 Credits)

    Programme Code : ACISECISE

    Number of Credits : 18Duration : 6 MonthsMedium of Instruction : EnglishProgramme Fee : Rs. 4000/- (one time)Eligibility : 10 th or its equivalent

    Course Details:

    Structure of this Programme

    Advanced Certificate in Information Security

    Duration : 6 Months No. of Credits: 18

    (With an exit option of Certificate in Information Security after

    successfully completion of first three courses of 12 Credits)Target Group: 10 th Pass or its equivalent

    Course 1: Information Security ( 4 Credits (1 Credit-Theory and 3 Credit-Practical), Compulsory) : OSEI-041

    Block 1: Overview of Information SecurityUnit 1. Information Security Concepts

    (How to Secure Software) Unit 2. User Habits

    Sl.No. Course Code Title of the course Type of course

    compulsory/optional

    Credits Theory/Practica

    l/ Project

    1. OSEI-041 Information Security Compulsory 4 Integrated(Theory &Practical)

    2. OSEI-042 Securing Internet Access Compulsory 4 Integrated(Theory &Practical)

    3. OSE-043 Information Technology Security Compulsory 4 Theory4. OSEI-044 Server Security Compulsory 6 Integrated

    (Theory &Practical)

    Total 18

  • 7/28/2019 programmedetails_2

    10/39

    Unit 3. Threats, Vulnerability and Malware(Viruses, Worms, Trojan horses)

    Unit 4. Impact of Hardware and Software Protocols with Preventive Measures

    Block 2: Securing DesktopUnit 1. Securing Desktop ConcernsUnit 2. Securing Files and Folders with Password

    (Poweron Password, Login Password)

    Unit 3. User Restricted Data, Sharing of Files and Secure Downloading from Internet Unit 4. Security Threats due to Software Piracy

    Block 3: Securing DataUnit 1. Securing, Backup and Restore Strategies for DataUnit 2. Concepts of PC auditing Unit 3. Snapshot UtilityUnit 4. Defragmentation

    Block 4: Securing ConnectivityUnit 1. Secure Network Connectivity Unit 2. FirewallsUnit 3. EncryptionUnit 4. Using some secure protocols

    Course 2: Securing Internet Access( 4 Credits (1 Credit-Theory and 3 Credit-Practical), Compulsory) : OSEI-042

    Block 1: Secure BrowsingUnit 1. Browsing History Unit 2. Cookies, E-mail and Internet Applications

    Unit 3. Log Files, Plug-ins and ScriptsUnit 4. Protecting from Fake Websites

    Block 2: Internet Transaction SecurityUnit 1. Secure ProtocolsUnit 2. Privacy policies Unit 3. How Identity Theft Works and its PreventionUnit 4. Credit Card Fraud

    Block 3: Securing Web ServicesUnit 1. Security Challenges Specific to Web ServicesUnit 2. Web Application Security TestingUnit 3. Cyber Forensics, Digital Certificates and Digital WatermarkingUnit 4. Threat Profile, Risk Analysis and Defence Against Threats

    Block 4: Securing during MobilityUnit 1. Security in Wireless Environment Unit 2. Wi-fi, Blue tooth, LANUnit 3. Digital Incident ResponseUnit 4. Industry Perspective

  • 7/28/2019 programmedetails_2

    11/39

    Course 3: Information Technology Security ( 4 Credits-Theory, Compulsory) :OSE-043

    Block 1: W3C ComplianceUnit 1. Introduction to W3CUnit 2. Recommendations and certifications of W3CUnit 3. W3C Standards and PracticesUnit 4. How do we Improve Internet Privacy using W3C

    Block 2: Introduction to ISO 27000Unit 1. Need of CertificationUnit 2. ISO/IEC 27000 family of Information Security Management Systems (ISMS)

    standardsUnit 3. Cyber Security StandardsUnit 4. Employee perspective of ISO 27000

    Block 3: Information Technology ActUnit 1. Introduction to Information Technology Amendment Act 2008

    (Unique ID (UID), Limitations of Information Technology Amendment Act 2008)Unit 2. Legal Implications of Personal SecurityUnit 3. Common Cyber Crimes and Government Laws and Rules in Information

    security

    Course 4: Server Security (6 Credits (1 Credit-Theory and 5 Credit-Practical),Compulsory): OSEI-044

    Block 1: Email SecurityUnit 1. Email ServersUnit 2. Email Forgery and SpammingUnit 3. Password Attack VectorsUnit 4. Account Security

    Block 2: Windows Security Unit 1. Windows System ArchitectureUnit 2. Windows System SecurityUnit 3. Hacking Windows

    Block 3: Linux Security Unit 1. Linux System Architecture

    Unit 2. Linux System SecurityUnit 3. Hacking Linux

    Block 4: Webserver Security Unit 1. Understanding Web TechnologiesUnit 2. Web Application Attacks

    Block 5: Wireless Network Security Unit 1. Wireless Network ConceptsUnit 2. Wireless AttacksUnit 3. Wireless Security Measures

  • 7/28/2019 programmedetails_2

    12/39

    Block 6: Software Security Unit 1. Recovering Software CodesUnit 2. Understanding Software CodeUnit 3. Developing Software Patches and Code

    Note: All applicable topics should be explained for Open office and MS-Word.

    The eligibility conditions for the academic counselors for both theory and practical areas follows:

    A) For PG Diploma in Information Security (PGDIS) (one year duration) (With anexit option of PG Certificate in Information Security (PGCIS) after successfullycompletion of first semester)Qualification: MCA/ M.Tech/ B.Tech/ B.E (CSE/IT) with relevant experience of 2years

    B) Advanced Certificate in Information Security (six month duration) (With an exitoption of Certificate in Information Security after successfully completion of first three courses of 12 Credits)

    Qualification: Graduate and adequate familiarity to Internet and basic computersystem

  • 7/28/2019 programmedetails_2

    13/39

    Annexure-2

    INDIRA GANDHI NATIONAL OPEN UNIVERSITYSCHOOL OF VOCATIONAL EDUCATION & TRAINING

    Application, Norms and Standards to become an Approved Programme Study Centre (PSC)

    for PG Diploma in Information Security (PGDIS) (one year duration) (With an exitoption of PG Certificate in Information Security (PGCIS) after successfully completionof first semester) and Advanced Certificate in Information Security (ACISE) (six monthduration) (With an exit option of Certificate in Information Security (CISE) aftersuccessfully completion of first three courses of 12 Credits)

    Guidelines for applying:

    1. The Institute must be a Registered Society/Trust/Company.

    2. Softwares and equipment required for the Computer Laboratory which are window

    based licensed and open source

    B) For PG Diploma in Information Security (PGDIS) (one year duration) (With anexit option of PG Certificate in Information Security (PGCIS) after successfullycompletion of first semester)

    Course 1: Introduction to Information Security (4 Credits, Compulsory, Theory andPractical)Block 1: Business Needs and Security Awareness

    Block 2: Security Threat and Vulnerability.Unit 1. Introduction to Security threats and Vulnerability

    BFB TesterCROSS (Codenomicon Robust Open Source SoftwareGendrameMetasploitNessus (Sedulity OS EH Edition)NikoWireshark (Sedulity OS EH Edition)OedipusParosFlaw Finder

    Unit 2. MalwareNuclear RAT V2.XXSubSevenTurkojan4.exeHydraetherflood.zipiris.zipnetworkview.exesmac20_setup.exesnort-2.8.6.1.tar.gzSnort_2_8_6_1_Installer.exeNetBusBack Orificewireshark-win32-1.4.0.exe

  • 7/28/2019 programmedetails_2

    14/39

    Unit 3. Hacking: Issues and TechniquesNovaBACKUPDT UtilitiesPC BackupGenie Backup ManagerAcronis True ImageNTI Backup NowAcronis Backup & Recovery Norton GhostPowerBackupBullGuard BackupTurboBackupNmapsnortnetcatMetasploitKismetNiktoEthercapGFI LanGaurdSuper ScanRetina

    Unit 4. Security Counter Measuresfirestarter-1.0.3.tar.gzkerio-kwf-whql-6.7.1-6399-win32.exekmyfirewall-1.1.1.tar.bz2NPF_Retail(2).EXEzapSetup_93_037_000_en.exesnortWindows/ Linux FirewallZone Alarm ProSegate Personal Firewall

    Block 3: Networking Concepts and Attacks.Unit 1. Introduction to Data Communication and Transmission Mediasubnet calculatorAngry IP Scanner

    Unit 2. Overview of Networking technologiesRouterWatchDemoSetup.exeSolarWinds-Subnet-Calculator.exebos_sub.exeTCPtracerouteTctraceitrace

    Unit 3. Network Management and ProtocolWireshark (Sedulity OS EH Edition)cain and abelEthercap

    Unit 4. Network Attacksdoshttp_setup.execa_setup.exedsniff-2.3(2).tar.gzdsniff-2.3.tar.gzetherflood.zip

  • 7/28/2019 programmedetails_2

    15/39

    iris.zipnetworkview.exesmac20_setup.exesnort-2.8.6.1.tar.gzSnort_2_8_6_1_Installer.exewireshark-win32-1.4.0.exeSniffers

    1.DSniff2.Ettercap

    3.Ettercap-GTK4.ntop5.SMBRelay36.SSLDump7.Tcpick8.Wireshark9.xspy

    Block 4: Operating System Concepts Unit 1. Introduction to Operating SystemUnit 2. Operating System Security: An Overview

    john-16w

    kerbcracklc4setup.exelc5setup.exelegionlns.exemakestrm.exemd5sum.exeMerge Streamsnbname.cppnbtdeputyNTFS and ADS.htmntinfoscan.exe

    NTLM Authentication.pptNt_rootkit0.40Offline NT Password Resetterpsexecpwdump2pwdump3v2remoxec

    1.5nmap2.Autoscan3.Nmap4.onesixtyone5.p0f

    6.Protos7.sslscan8.Xprobe29.Zenmap

    Unit 3. Operating System Hardening and Controlsopt cracklopth crackgpedit

    Unit 4. ADC/SAMBAWindows ADC installation and setups

  • 7/28/2019 programmedetails_2

    16/39

    Linux Samba Installations and Setup

    Course 2: Network Security(4 Credits, Compulsory, Theory and Practical)Block 1: Introduction to Network SecurityUnit 1. Network Security Conceptsipscannerport scannersNmap

    netcatwhois

    Unit 2. Network Security Techniquesport blockersIDS and FirewallNetwork monitoring and Trackinglogs maintains

    Unit 3. Identity ManagementLaptopAlarmSetup.exenTracker_Trial.zip

    TrueCrypt Setup 7.0a.exetruecrypt-7.0a-linux-x86.tar.gzwebsetupLite.exeUnit 4. Security Issues in Wireless and next generation networksBacktrack4.0Airsnarf - A rogue AP setup utility.htmAirsnortCqure APNetStumblerInstaller.exeWEPCrackWiFiScanner-LinuxWireless Hacking Tools

    Wireless Security Tools.htmairopeek.exeairsnarf-0.2.tar.gzarppoisonkismetwidzv1wlanexpert

    *.Aircrack -ng*.Airmon-ng*.Airodump-ng*.AirSnarf*.ASLEAP

    *.Cowpatty*.Genpmk*.Kismet*.Mackchanger*.WEPbuster

    2.Cracking*.Aircrack -ng*.Airmon-ng*.Airodump-ng*.AirSnarf*.ASLEAP*.Cowpatty

  • 7/28/2019 programmedetails_2

    17/39

    *.Genpmk*.Kismet*.WEPbuster

    Bluetooth1.Blueprint2.BlueSmash3.Btcsanner5.Minicom6.obexFtp

    7.Ussp-PushRFDI1.RFIDIOt Frosch2.RFDIOt Frosh3.RFIDIOt PCSC

    Block 2: Secure ProtocolsImplementation of httpsImplementation of smtpsImplementation of Ssh

    Block 3: Cryptography TechniquesUnit 1. Introduction to CryptographyUnit 2. Symmetric Key CryptographyUnit 3. Asymmetric Key CryptographyUnit 4. Applications of cryptographyafe_setup.exeahtmlepp109_setup.exeencryptmyfolder.exeglue.zipStegSpy2.1.zipstool.exeMicrosoft Cryptography tools

    cert2spc.exeMakeCat.exesigner.dll.zipstool.exewondercryptencryptor

    Block 4: Network Security TechnologyUnit 1. Firewallsfirestarter-1.0.3.tar.gzkerio-kwf-whql-6.7.1-6399-win32.exe

    kmyfirewall-1.1.1.tar.bz2NPF_Retail(2).EXEzapSetup_93_037_000_en.exesnortFirewallADMmutate-0.8.1.tar.gzbro-1.5-release.tar.gznidsbench.tar.gzBlackice

    Unit 3. Scanning and Analysis Toolstripwire-2.3.1-2.tar.gz

  • 7/28/2019 programmedetails_2

    18/39

    tcpreplay-3.4.4.tar.gzfragroute-1.2.tar.gzAntiFirewallbackstealthdnsdigger.zipfirewalkPortscanning

    1.Autoscan2.Nmap

    3.propecia4.UnicornScan5.Zenmap

    Service Fingerprinting1.Amap2.Httprint3.Httprint_GUI

    Identify Live Hosts1.0trace2.5nmp3.Autoscan4.Fping

    5.Hping26.Hping37.Netdiscover8.Nmap9.onesixtyone10.sslscan11.TCPtraceroute12.Zenmap

    Network Mappings1.5nmp2.Amap3.Httprint

    4.Httprint_GUI5.Autoscan6.Fping7.Hping28.Hping39.P0f10.ike-scan11.Netdiscover12.Netmask13.Nmap14.onesixtyone15.Propecia

    16.PSK-Crack17.sslscan18.XProbe219.0trace20.TCPtraceroute21.Protos22.UnicornScan23.Zenmap

    Identify Live Hosts1.0trace2.5nmp3.Autoscan

  • 7/28/2019 programmedetails_2

    19/39

    4.Fping5.Hping26.Hping37.Netdiscover8.Nmap9.onesixtyone10.sslscan11.TCPtraceroute12.Zenmap

    OS-Fingerprinting1.5nmap2.Autoscan3.Nmap4.onesixtyone5.p0f6.Protos7.sslscan8.Xprobe29.Zenmap

    Course 3: Cyber Security (4 Credits, Compulsory, Theory and Practical)

    Block 1: Information GatheringUnit 1. Social Engineering

    Unit 2. E-mail Crime and Investigation65Advanced Stealth Email Redirector.zipaep.zipEmail_Spider_Easy.zipempasrec.zipfreesmtp.zipmailpv.zipMSN Explorer Password Recovery Software.exeNucleus-MSN-Password.exe

    SECRET_INSTALL.EXEsmtpserver.exeYahoo Messenger Archive Recovery Software.exeExim/ Postfix MTA configuration

    Unit 3. Reverse Engineering3568_ResHack.zipadc-0.69.zipboomerang-linux-alpha-0.3.tar.gzboomerang-win32-alpha-0.3.1.ziphw32v601.exeidademo54.exe

    PE.Explorer_setup.exePE.Explorer_setup.zipspices.zipspicesdc.zipHex EditEvans DebuggerOllyDBG

    Unit 4. Cracking Methodology65Advanced Stealth Email Redirector.zipFlexiSpy.rarremotedesktopspy-setup.exe

  • 7/28/2019 programmedetails_2

    20/39

    spybuddy-setup-sw.exespyhunterS.exeWCASSU54.exe007PWD11.EXEAccent_Office_Password_Recovery_1[1].02_by_AmoKCMOSDEL.EXEJohn the ripperM0ong4B0oNg4.zipNeverExpire.msi

    advanced i messanger password recoveryaopb.zipaoxppr_p.zipares.zipariskkey.exebrutus-aet2.zipbrutusaet2.zipsetup_akll.exePerfect Keylogger.exeXP Logon Password Logger.exeLog Monitors.zipiks2k20d.exe

    E-Mail Keylogger.exeVPN1.ike-scan2.PSK-Crack

    SMB Analysis1.SMBClient.py

    Password Attacks1.Password offline Attacks

    *.bkhive*.john*.samdump2*.sqlpat

    *.wyd2.password online attacks*.BruteSSH*.hydra*.Lodowep*.Medusa*.SSHater

    3.chntpw

    Block 2: Database SecurityUnit 1. Introduction to Database ConceptsMySQL Server Configuration

    Unit 2. Hand on Database usage and Hacking AttemptBlindfolded_SQL_Injection.pdfDataThiefMSSQL Server Named Pipe Privilege Escalation Exploit.htmManipulating Microsoft SQL Server Using SQL Injection.docMicrosoft SQL Server DoS Remote Exploit (MS03-031).htmOracle Auditing ToolsOracle SID EnumerationOracle SQL Injection.mhtOracle XDB FTP Service UNLOCK Buffer Overflow Exploit.htmPHP-NUKE version = 6.9 cid sql injection Remote Exploit.htm

  • 7/28/2019 programmedetails_2

    21/39

    SQL Injection Passwd.txtSQLInjectionWhitePaper.pdfSQLSmack.plSql demo scriptsUsing Binary Search with SQL Injection.txtadvanced_sql_injection.pdfforceSQLoat-binary-1.3.1.ziporacle_password_cracker

    phpBB 2.0.5 SQL Injection password disclosure Exploit.htmphpBB 2.0.6 search_id sql injection MD5 Hash Remote Exploit.htmsqlat-src-1.0.0.tarsqlat-src-1.1.0.tar.gzsqlbfsqlbf-win-binary-1.0.0.zipsqlcrawlsqlexecsqlscanthcsqlwpoison

    1.DB-Generic

    2.MSSQL*.sqlpat

    Unit 3. Database Security-ISecurity and Privledges for MySQL Dababase

    Unit 4. Database Security-IIImplementation of Security Policies

    Block 3: WEB Technology

    Unit 1. Introduction to WEB Architecture

    Unit 2. Client Site ScriptsJava Script on Web Server like Apache

    Unit 3. Server Site ScriptsPHP Server Side Script Implementation

    Unit 4. Attacks on WEB Application32 Bit IP ResolverAutomatic-Printing-in-IE Vulnerability.htmBrute Force Attack Estimator.xlsForm Bookmarklets.url

    Form Bookmarks.htmGenerate Unicode Strings.htmGenerate Xss ExploitHTTP File StealingHelpMe2.plIE Cache ExtractorIEENIISHACK.docRunning this page will crash IE.htmWinDNSSpoofhacking web servershttp traffic monitor

  • 7/28/2019 programmedetails_2

    22/39

    ieflawiehist-win32-0_0_1.zip

    jadlynxmonkeyshell.tar.gzreadme.htmsitedigger

    1.ASP-Audit2.Burpsuite

    3.CSRPTester4.Curl5.DirBuster4.Grabber5.Grendel scan6.Httprint7.Httprint_GUI8.Lbd9.List-Urls10.Mini Mysqlator11.Nikto12.Paros Proxy

    13.Ratproxy14.Swfintruder15.W3AF16.Wapti17.Webshag18.Wfuzz

    Nessus ServerNessus

    Block 4: Internet Technology

    Unit 1. Internet Architecture

    Unit 2. Social Networking SitesBrowsers like firefox, Opera, Crome

    Unit 3. Advanced Searching Techniquesgoogle hacking methodologies

    Unit 4. Latest trend in Internet SecuritiesVirtuallization of Servers

    Course 4: Policy, Standards and Laws(4 Credits, Compulsory, Theory)

    Block 1: Security Standards

    Block 2: ISO Standards

    Block 3: Cyber Laws

    Block 4: Cyber Crimes and Regulation

    2nd SemesterCourse 5: Application and Business Security Developments (4 Credits,

    Block 1: Application Development Life Cycle

  • 7/28/2019 programmedetails_2

    23/39

    Block 2: Secure Application Development-IContent Management SystemsBlock 3: Secure Application Development -II

    Block 4: Application Testing and Ethical HackingManageEngine_ApplicationsManager.exeNessus-3[1].2.1.1.exensauditor_setup.exe

    Portscanners PFSETUP1.EXEPORTSCAN.EXESITESCAN.ZIPnmap-3.55-SP2-win32.zipnmapwin_1.3.1.exesup3rsc4n.zipws_ping_pro.zipPortscanning

    1.Autoscan2.Nmap3.propecia

    4.UnicornScan5.ZenmapService Fingerprinting

    1.Amap2.Httprint3.Httprint_GUI

    Course 6: BCP, DR Planning and Audit (4 Credits, Compulsory, Theory and Practical)

    Block 1: Risk Analysis

    Block 2: Business Continuity

    Block 3: DR Strategies

    Block 4: BCM Program Management

    Course 7: Digital Forensics (4 Credits, Compulsory, Theory and Practical)

    Block 1: Cyber Crime and Cyber Forensics

    Block 2: Digital ForensicsUnit 1. Digital Investigation

    Unit 2. Data Acquisition and Information Gathering

    Unit 3. Forensic Examination of SystemsFTK-Forensic_Toolkit-1.81.5.exeEnCase Setup.exesteller Data acquisition.exeQuickRecoveryDemoLINUX.exe

    Unit 4. Forensic Examination of Network Devices

    Block 3: Mobile ForensicsUnit 1. Introduction to Mobile Forensics and Technologies

  • 7/28/2019 programmedetails_2

    24/39

    Unit 2. Analysis of CDRs

    Unit 3. Application of SIM Card Readers

    Unit 4. Forensic Examination of Mobile DevicesAD_Mobile phone examiner.zipMobileInspector.exeOPM_Forensic_Trial_Setup.exe

    memory-card-data-recovery-demo.exeopen folder.ppssim-card.exe

    Block 4: Security Issues in Wireless TechnologiesUnit 1. Introduction to Wireless Technologies

    Unit 2. Wireless Devices

    Unit 3. Securing Wireless NetworkWireless Security Tools.htmElcomsoft Wireless Security Auditor 3.2.0.395

    LucidLink Home Office Edition 2.2PW0-200 - Wireless Security Professional (WSP) Practice Test Questions 1.0AirStop Wireless 2.4.3

    Unit 4. Ethical Hacking- Wireless SecurityAirsnarf - A rogue AP setup utility.htmAirsnortCqure APNetStumblerInstaller.exeWEPCrackWiFiScanner-LinuxWireless Hacking Tools

    airopeek.exeairsnarf-0.2.tar.gzarppoisonkismetwidzv1wlanexpertWireless Network Anaysis (Linux)Bluetooth

    1.Blueprint2.BlueSmash3.Btcsanner4.HCIDump

    5.Minicom6.obexFtp7.Ussp-Push

    RFDI1.RFIDIOt Frosch

    *.Brute Force Hitag2*.Bruteforce Mifare*.Calculate JCOP MIFARE Keys*.Continues Delect Tag*.Copy ISO15693 TAG*.ePassport READ WRIE CLONE*.Format MIFARE 1k Value Blocks

  • 7/28/2019 programmedetails_2

    25/39

    *.Identify LF TAG Type*.JCOP Info*.JCOP MIFARE READ WRITE*.JCOP Set ATR historical Bytes*.Read ACG Reader EEPROM*.Read LF TAG*.Read MIFARE*.Read Tag*.READ WRITE CLONE UNIQUE

    *.RESET Q5 TAG*.Select Tag*.Set FDX-B ID*.Test ACG LAHF

    2.RFDIOt Frosh*.READ WRITE CLONE Unique*.Reset hitag2 Tag*.Set FDX-B ID*.Test Frosch Reader

    3.RFIDIOt PCSC*.Bruteforce MIFARE*.Calculate JCOP MIFARE Keys

    *.Chip and info*.Continues Select TAG*.ePassport READ WRITE/CLONE*.Install ATR Historical byte applet to JCOP*.Install MIfare applet to JCOP*.install vonjeek epassport emulator to JCOP*.Install vonjeek ePassport emulator to Nokia*.JCOP Info*.JCOP Info*.JCOP MIFARE READ/WRITE*.JCPO Set ATR Historical Bytes*.Read MIFARE

    *.Read TAG*.Select TAGWi-Fi

    1.All*.Aircrack -ng*.Airmon-ng*.Airodump-ng*.AirSnarf*.ASLEAP*.Cowpatty*.Genpmk*.Kismet

    *.Mackchanger*.WEPbuster2.Cracking

    *.Aircrack -ng*.Airmon-ng*.Airodump-ng*.AirSnarf*.ASLEAP*.Cowpatty*.Genpmk*.Kismet*.WEPbuster

  • 7/28/2019 programmedetails_2

    26/39

    B) Advanced Certificate in Information Security (ACISE) (six month duration) (With an exit option of Certificate in Information Security (CISE) after successfullycompletion of first three courses of 12 Credits)

    Course 1: Information Security (4 Credits (1 Credit-Theory and 3 Credit-Practical),Compulsory)Block 1: Overview of Information Security

    Unit 1. Information Security Concepts (Testing Tools)BFB TesterCROSS (Codenomicon Robust Open Source SoftwareGendrameMetasploitNessus (Sedulity OS EH Edition)NikoWireshark (Sedulity OS EH Edition)OedipusParosFlaw Finder

    Unit 2. User HabitsEncryptorWindows/ Linux FirewallSecurity Settings as per Operating SystemWonderCryptFileCryptoAnti VirusSetup of Wifi's

    Unit 3. Threats, Vulnerability and MalwareNuclear RAT V2.XXSubSeven

    Turkojan4.exeetherflood.zipiris.zipnetworkview.exesmac20_setup.exesnort-2.8.6.1.tar.gzSnort_2_8_6_1_Installer.exeNetBusBack Orificewireshark-win32-1.4.0.exeHydra (Sedulity OS EH Edition)

    Unit 4. Impact of Hardware and Software Protocols with Preventive MeasuresMetasploitNessus (Sedulity OS EH Edition)NikoWireshark (Sedulity OS EH Edition)Oedipus

    Block 2: Securing DesktopUnit 1. Securing Desktop Concerns Theory

    Unit 2. Securing Files and Folders with PasswordAxCrypt

  • 7/28/2019 programmedetails_2

    27/39

    WinCryFolder Guard

    Unit 3. User Restricted Data, Sharing of Files and Secure Downloading from InternetSFTPKodak EasyShareInternet Download Manager softwares

    Unit 4. Security Threats due to Software Piracy

    Block 3: Securing DataUnit 1. Securing, Backup and Restore Strategies for Data

    Unit 2. Concepts of PC auditingSystemMechanic7Pro.exeWinAudit.exeNessus (Sedulity OS EH Edition)Ratina

    Unit 3. Snapshot Utilitysystracer_setup_en.exe

    Virtualization

    Unit 4. DefragmentationAuslogics Disk DefragSmart Defrag 1.5JK DefragPageDefragSpeeDefragDiskeeperOS Based Defragmentation

    Block 4: Securing Connectivity

    Unit 1. Secure Network ConnectivityNovaBACKUPDT UtilitiesPC BackupGenie Backup ManagerAcronis True ImageNTI Backup NowAcronis Backup & Recovery Norton GhostPowerBackupBullGuard BackupTurboBackupNmap

    snortnetcatMetasploitKismetNiktoEthercapGFI LanGaurdSuper ScanRetina

    Unit 2. Firewallsfirestarter-1.0.3.tar.gz

  • 7/28/2019 programmedetails_2

    28/39

    kerio-kwf-whql-6.7.1-6399-win32.exekmyfirewall-1.1.1.tar.bz2NPF_Retail(2).EXEzapSetup_93_037_000_en.exesnortWindows/ Linux FirewallZone Alarm ProSegate Personal Firewall

    Unit 3. Encryptionafe_setup.exeahtmlepp109_setup.exeencryptmyfolder.exeglue.zipStegSpy2.1.zipstool.exeMicrosoft Cryptography tools cert2spc.exeMakeCat.exesigner.dll.zipStools

    EncryptorWonderCrypt

    Unit 4. Using some secure protocols TheoryImplementation of httpsImplementation of smtpsImplementation of Ssh

    Course 2: Securing Internet Access(4 Credits (1 Credit-Theory and 3 Credit-Practical),Compulsory)

    Block 1: Secure BrowsingUnit 1. Browsing HistoryPop-up History 0.0.3Private Browsing 1.2.9Attention Recorder 0.65WinSettings 8.1Trackless 1.03Squidlogsfirefox, chrome, mozilla

    Unit 2. Cookies, E-mail and Internet Applications65Advanced Stealth Email Redirector.zipaep.zipEmail_Spider_Easy.zipempasrec.zipfreesmtp.zipmailpv.zipMSN Explorer Password Recovery Software.exeNucleus-MSN-Password.exeSECRET_INSTALL.EXEsmtpserver.exeYahoo Messenger Archive Recovery Software.exePortable Historian 1.4.4.0pidginTeamViewer

  • 7/28/2019 programmedetails_2

    29/39

    SkypeBitTorrent

    Unit 3. Log Files, Plug-ins and ScriptsActive LogView 2.09.1.7378XFile 2.021ksLogger 1.17logs

    Unit 4. Protecting from Fake WebsitesNetcraft ToolbarGeoTrust TrustWatchTrustToolbarClear Search Anti-PhishingBullGuard Internet Security (32-bit version)phishing protection from the browsersThunderbird Security

    Block 2: Internet Transaction Security

    Unit 1. Secure Protocols Theoryhttps implementationsmtps implementationsssh (secure shell)

    Unit 2. Privacy policies TheoryIP tablesFirewallsUser Authentications

    Unit 3. How Identity Theft Works and its Prevention Theory

    MySecurityVault PROMyIdentityDefender ToolbarIdentity Theft ProtectorTrustedID Identity Theft ProtectionIdentity Theft Toolkit

    Unit 4. Credit Card Fraud Theory

    Block 3: Securing Web ServicesUnit 1. Security Challenges Specific to Web Services TheorywebInject

    Unit 2. Web Application Security Testing32 Bit IP ResolverAutomatic-Printing-in-IE Vulnerability.htmBrute Force Attack Estimator.xlsForm Bookmarklets.urlForm Bookmarks.htmGenerate Unicode Strings.htmGenerate Xss ExploitHTTP File StealingHelpMe2.plIE Cache ExtractorIEEN

  • 7/28/2019 programmedetails_2

    30/39

    IISHACK.docRunning this page will crash IE.htmWinDNSSpoofhacking web servershttp traffic monitorieflawiehist-win32-0_0_1.zip

    jadlynx

    monkeyshell.tar.gzreadme.htmsitediggerOdysseusmetaexploitParos Proxy

    Unit 3. Cyber Forensics, Digital Certificates and Digital WatermarkingFTK-Forensic_Toolkit-1.81.5.exeEnCase Setup.exesteller Data acquisition.exeQuickRecoveryDemoLINUX.exe

    Web Analysis1.ASP-Audit (Sedulity OS EH Edition)2.Burpsuite (Sedulity OS EH Edition)3.CSRPTester (Sedulity OS EH Edition)4.Curl (Sedulity OS EH Edition)5.DirBuster (Sedulity OS EH Edition)4.Grabber5.Grendel scan (Sedulity OS EH Edition)6.Httprint (Sedulity OS EH Edition)7.Httprint_GUI (Sedulity OS EH Edition)8.Lbd (Sedulity OS EH Edition)9.List-Urls (Sedulity OS EH Edition)

    10.Mini Mysqlator (Sedulity OS EH Edition)11.Nikto (Sedulity OS EH Edition)12.Paros Proxy (Sedulity OS EH Edition)13.Ratproxy (Sedulity OS EH Edition)14.Swfintruder (Sedulity OS EH Edition)15.W3AF (Sedulity OS EH Edition)16.Wapti (Sedulity OS EH Edition)17.Webshag (Sedulity OS EH Edition)18.Wfuzz19.ZZuff (Sedulity OS EH Edition)20.Webscarb Lite (Sedulity OS EH Edition)

    Nessus Server (Sedulity OS EH Edition)

    Nessus (Sedulity OS EH Edition)

    Unit 4. Threat Profile, Risk Analysis and Defence Against ThreatsManageEngine_ApplicationsManager.exeNessus-3[1].2.1.1.exensauditor_setup.exePenetration

    1.Framework2-MsfCli2.Framework2-MsfCnsole3.Framework2-MsfUpdate4.Framework3-MsfCli

  • 7/28/2019 programmedetails_2

    31/39

    5.Framework3-MsfConsole6.Framework3-MsfUpdate7.Framework3-Msfweb8.Inguma9.Update Miliw0rm

    Framewok Version 21.Framework2-MsfCli2.Framework2-MsfCnsole

    3.Framework2-MsfUpdateFramework Version31.Framework3-MsfCli2.Framework3-MsfConsole3.Framework3-MsfUpdate4.Framework3-Msfweb

    miliw0rm Exploit ArchiveFast TrackInguma

    1.Nessus Server2.ADMSnmp3.ASP-Audit

    4.Bed5.braa6.bunny7.Burpsuite8.Cisco Auditing Tool9.Cisco Global Exploiter10.Cisco OCS mass SCanner11.Cisco passwd Scanner12.Copy Router Config13.CSRFTester14.Curl15.DirBuster

    16.Grabber17.Grendel Scan18.Httprint19.httprint_GUI20.JBroFuzz21.Lbd22.List-Urls23.Merge Router Config24.Metacoretex25.Mini Mysqlator26.Nessus27.Nikto

    28.Paros Proxy29.Pblind30.peach31.Ratproxy32.SMBClient.py33.Snmp Enum34.Spike35.SQLbrute36.SQLIX37.SQLMap38.SQL Ninja39.swfintruder

  • 7/28/2019 programmedetails_2

    32/39

    40.Voiper41.W3AF42.Wapiti43.Webscarab Lite44.Webshag45.Wfuzz46.WSFuzzer47.ZZuf

    Cisco

    1.Cisco Auditing Tool2.Cisco Global Exploiter3.Cisco OCS Mass Scanner4.Copy Router Config5.Merge Router Config

    Database1.DB-Generic2.MSSQL

    Fuzzers1.Bed2.bunny3.JBroFuzz

    4.Peach5.Spike6.Voiper7.WSFuzzer8.ZZuf

    SMB Analysis1.SMBClient.py

    SNMP Analysis1.ADMSnmp2.braa3.Snmp Enum

    Nessus Server

    Block 4: Securing during Mobility

    Unit 1. Security in Wireless Environment Theory

    Unit 2. Wi-fi, Blue tooth, LANAirsnarf - A rogue AP setup utility.htmAirsnortCqure APNetStumblerInstaller.exeWEPCrackWiFiScanner-Linux

    Wireless Hacking Toolsairopeek.exeairsnarf-0.2.tar.gzarppoisonkismetwidzv1wlanexpertWireless Network AnaysisBluetooth

    1.Blueprint2.BlueSmash3.Btcsanner

  • 7/28/2019 programmedetails_2

    33/39

    4.HCIDump5.Minicom6.obexFtp7.Ussp-Push

    Wi-Fi1.All

    *.Aircrack -ng (Sedulity OS EH Edition)*.Airmon-ng (Sedulity OS EH Edition)*.Airodump-ng (Sedulity OS EH Edition)

    *.AirSnarf (Sedulity OS EH Edition)*.ASLEAP (Sedulity OS EH Edition)*.Cowpatty (Sedulity OS EH Edition)*.Genpmk (Sedulity OS EH Edition)*.Kismet (Sedulity OS EH Edition)*.Mackchanger (Sedulity OS EH Edition)*.WEPbuster (Sedulity OS EH Edition)

    2.Cracking*.Aircrack -ng (Sedulity OS EH Edition)*.Airmon-ng (Sedulity OS EH Edition)*.Airodump-ng (Sedulity OS EH Edition)*.AirSnarf (Sedulity OS EH Edition)

    *.ASLEAP (Sedulity OS EH Edition)*.Cowpatty (Sedulity OS EH Edition)*.Genpmk (Sedulity OS EH Edition)*.Kismet (Sedulity OS EH Edition)*.WEPbuster (Sedulity OS EH Edition)

    Unit 3. Digital Incident Response

    Unit 4. Industry Perspective

    Course 3: Information Technology Security (4 Credits-Theory, Compulsory)

    Block 1: W3C Compliance

    Unit 1. Introduction to W3C Theory

    Unit 2. Recommendations and certifications of W3C Theory

    Unit 3. W3C Standards and Practices Theory

    Unit 4. How do we Improve Internet Privacy using W3C Theorycynthia.exe

    Block 2: Introduction to ISO 27000

    Unit 1. Need of Certification TheoryUnit 2. ISO/IEC 27000 family of Information Security Management Systems (ISMS)standards TheoryUnit 3. Cyber Security Standards TheoryUnit 4. Employee perspective of ISO 27000 Theory

    Block 3: Information Technology ActUnit 1. Introduction to Information Technology Amendment Act 2008 (Unique ID(UID), Limitations of Information Technology Amendment Act 2008) TheoryUnit 2. Legal Implications of Personal Security TheoryUnit 3. Common Cyber Crimes and Government Laws and Rules in Informationsecurity Theory

  • 7/28/2019 programmedetails_2

    34/39

    Course 4: Server Security (6 Credits (1 Credit-Theory and 5 Credit-Practical),Compulsory)

    Block 1: Email SecurityUnit 1. Email ServersPostFixIceWarp Mail ServerCourier mail serverEudora WorldMail ServerDovecotWebEasyMailRockliffeIMail Server

    Unit 2. Email Forgery and Spamming65Advanced Stealth Email Redirector.zipaep.zipEmail_Spider_Easy.zipempasrec.zipfreesmtp.zipmailpv.zipSECRET_INSTALL.EXEsmtpserver.exe

    Unit 3. Password Attack VectorsYahoo Messenger Archive Recovery Software.exeMSN Explorer Password Recovery Software.exeNucleus-MSN-Password.exe

    Unit 4. Account Security Theory

    Block 2: Windows Security

    Unit 1. Windows System Architecture Theory

    Unit 2. Windows System Security Theory

    Unit 3. Hacking WindowsADS Streaming UtilityADS Visual Detector_DEMOADS Visual Detector_DEMO.zipAntispectorauditpol.exebrowselist.exec2myazzCapture LM Manager Passwordcat.exeChange_NT-2000_Passwordscmdlogcp.exeCrash on Demand.exedumpel.exeefsview.exeelsaveEvidenceEliminator.exefoundstone_toolsFU_Rootkitgetadmin

  • 7/28/2019 programmedetails_2

    35/39

    HiddenFileDetectorSetupHide Folders XPhkhydan-0.10.tarInvisible Folders.exeInvisible Secrets.exe

    john-16wkerbcracklc4setup.exe

    lc5setup.exelegionlns.exemakestrm.exemd5sum.exeMerge Streamsnbname.cppnbtdeputyNTFS and ADS.htmntinfoscan.exeNTLM Authentication.pptNt_rootkit0.40

    Offline NT Password Resetterpsexecpwdump2pwdump3v2remoxecRightClickHideRootkit Detector V0.3 for windowsrootkithunter-1.00RC1.tar.gzsamdumpSecurity side-effects of Word fields.htmShutDown.exeSMB Proxy

    smbgrinderOS-Fingerprinting1.5nmap (Sedulity OS EH Edition)2.Autoscan (Sedulity OS EH Edition)3.Nmap (Sedulity OS EH Edition)4.onesixtyone (Sedulity OS EH Edition)5.p0f (Sedulity OS EH Edition)6.Protos (Sedulity OS EH Edition)7.sslscan (Sedulity OS EH Edition)8.Xprobe2 (Sedulity OS EH Edition)9.Zenmap (Sedulity OS EH Edition)

    Password Attacks

    1.Password offline Attacks*.bkhive (Sedulity OS EH Edition)*.john (Sedulity OS EH Edition)*.samdump2 (Sedulity OS EH Edition)*.sqlpat (Sedulity OS EH Edition)*.wyd (Sedulity OS EH Edition)

    Block 3: Linux Security

    Unit 1. Linux System Architecture

    Unit 2. Linux System Security Theory

  • 7/28/2019 programmedetails_2

    36/39

    Unit 3. Hacking Linux Theory7350nxt-v3.tar.gz9x_cgi.zipADM-spoof-NEW.tgzanonirc.cboscript-0_2_tar.tarbsd-rdist.ccctt-0.1.7.tar.gz

    cgiscan2.ccheops-0_55_tar.tarcold-1_0_10.tgzcops_104_tar.zcrack5_0_tar.gzcracklib25_small_tar.zcrontab_backdoor.shdipexploitlinux.cDistributed John.tgzdtk-0_7.tarethereal-0_5_0_tar.tarfakebo-032.tgz

    Firebird 1.0.2 FreeBSD 4.7-RELEASE local root exploit.htmgammaprog150.tgzhackunix.zipholelist.txthping2_v1.5.pdfHP-UX B11.11 -usr-bin-ct local format string Root Exploit.htmhunt-1_0.tgzibnc2_0a.tarindex.htmlinstall.txtIntel PXE Exploit in RedHat 8.txtinv.c

    ipbomb.cipgrab-0_6_tar.taripsend2_1a_tar.taripspoof_script.zipircbnc.c

    jizz.c jizz.sh john-1.6.34.tar.gz john-1_6_tar.tarlibpcap-0_4_tar.tarLinux 2.4.20 kernel decode_fh Denial of Service Exploit.htmLinux Basic Commands.pdf

    Linux eXtremail 1.5.x Remote Format Strings Exploit.htmlinux.txtlogwatch-1_5_1_tar.tarlrk4readme.txtmailbseq.cMandrake Linux 8.2 -usr-mail local exploit (d86mail.pl).htmmerlin_tar.gzmflash.cmodify_ldt_exploit.cmountexp.cnessus-unstable-120198.tgznfsbug.c

  • 7/28/2019 programmedetails_2

    37/39

    nmap-2_12.tarOpenBSD 2.x - 3.3 exec_ibcs2_coff_prep_zmagic() kernel Explo.htmOpenBSD ibcs2_exec Kernel local Exploit.htmpppsetup.txtrdC-LPRng_c.htmrdistexp.credir-1_1_tar.tarSAdoor-20030805.tgzsatan.zip

    secure_delete-1_8_tar.tarsigurgexp.cSolaris runtime linker (ld.so.1) buffer overflow Exploit (SP.htmSolaris Sadmind Default Configuration Remote Root Exploit.htmspamshield-1_40_tar.gzspike.shSuSE linux 9.0 YaST config Skribt Local Exploit.htmtcptrace_tar.gzthc-uht1.tgztrace_shell.ctraffic-vis-0_22_tar.tarttywatcher-1_0a_tar.gz

    ttywatcher-1_1beta1_tar.gzunix.zipunix-pc.zipuserdump.zipvoodoo_tar.gzwgate-bsd_tar.tarWSD-dns.tgzxenon-r1.tarxtermoverflo_exp.c

    Block 4: Webserver Security

    Unit 1. Understanding Web Technologies Theory

    Unit 2. Web Application Attacks32 Bit IP ResolverAutomatic-Printing-in-IE Vulnerability.htmBrute Force Attack Estimator.xlsForm Bookmarklets.urlForm Bookmarks.htmGenerate Unicode Strings.htmGenerate Xss ExploitHTTP File StealingHelpMe2.pl

    IE Cache ExtractorIEENIISHACK.docRunning this page will crash IE.htmWinDNSSpoofhacking web servershttp traffic monitorieflawiehist-win32-0_0_1.zip

    jadlynxmonkeyshell.tar.gz

  • 7/28/2019 programmedetails_2

    38/39

    readme.htmsitediggerWeb Analysis

    1.ASP-Audit (Sedulity OS EH Edition)2.Burpsuite (Sedulity OS EH Edition)3.CSRPTester (Sedulity OS EH Edition)4.Curl (Sedulity OS EH Edition)5.DirBuster (Sedulity OS EH Edition)4.Grabber

    5.Grendel scan (Sedulity OS EH Edition)6.Httprint (Sedulity OS EH Edition)7.Httprint_GUI (Sedulity OS EH Edition)8.Lbd (Sedulity OS EH Edition)9.List-Urls (Sedulity OS EH Edition)10.Mini Mysqlator (Sedulity OS EH Edition)11.Nikto (Sedulity OS EH Edition)12.Paros Proxy (Sedulity OS EH Edition)13.Ratproxy (Sedulity OS EH Edition)14.Swfintruder (Sedulity OS EH Edition)15.W3AF (Sedulity OS EH Edition)16.Wapti (Sedulity OS EH Edition)

    17.Webshag (Sedulity OS EH Edition)18.Wfuzz19.ZZuff (Sedulity OS EH Edition)20.Webscarb Lite (Sedulity OS EH Edition)

    Nessus Server (Sedulity OS EH Edition)Nessus (Sedulity OS EH Edition)

    Block 5: Wireless Network SecurityUnit 1. Wireless Network Concepts Theory

    Unit 2. Wireless Attacks

    Airsnarf - A rogue AP setup utility.htmAirsnortCqure APNetStumblerInstaller.exeWEPCrackWiFiScanner-LinuxWireless Hacking Toolsairopeek.exeairsnarf-0.2.tar.gzarppoisonkismetwidzv1

    wlanexpertWi-Fi1.All

    *.Aircrack -ng (Sedulity OS EH Edition)*.Airmon-ng (Sedulity OS EH Edition)*.Airodump-ng (Sedulity OS EH Edition)*.AirSnarf (Sedulity OS EH Edition)*.ASLEAP (Sedulity OS EH Edition)*.Cowpatty (Sedulity OS EH Edition)*.Genpmk (Sedulity OS EH Edition)*.Kismet (Sedulity OS EH Edition)*.Mackchanger (Sedulity OS EH Edition)

  • 7/28/2019 programmedetails_2

    39/39

    *.WEPbuster (Sedulity OS EH Edition)2.Cracking

    *.Aircrack -ng (Sedulity OS EH Edition)*.Airmon-ng (Sedulity OS EH Edition)*.Airodump-ng (Sedulity OS EH Edition)*.AirSnarf (Sedulity OS EH Edition)*.ASLEAP (Sedulity OS EH Edition)*.Cowpatty (Sedulity OS EH Edition)*.Genpmk (Sedulity OS EH Edition)

    *.Kismet (Sedulity OS EH Edition)*.WEPbuster (Sedulity OS EH Edition)

    Unit 3. Wireless Security MeasuresElcomsoft Wireless Security Auditor 3.2.0.395LucidLink Home Office Edition 2.2PW0-200 - Wireless Security Professional (WSP) Practice Test Questions 1.0AirStop Wireless 2.4.3

    Block 6: Software SecurityUnit 1. Recovering Software Codes3568_ResHack.zip

    adc-0.69.zipboomerang-linux-alpha-0.3.tar.gzboomerang-win32-alpha-0.3.1.ziphw32v601.exeidademo54.exePE.Explorer_setup.exePE.Explorer_setup.zipspices.zipspicesdc.zip

    Unit 2. Understanding Software Code Theory

    Unit 3. Developing Software Patches and CodeFASM148.ZIPfasmw148-090.zipWDASM89.ZIP

    3. The Institute is required to furnish the attached proforma for establishment as anIGNOU programme study centre.