1 |
Fundamentals of Network and Operating System |
- Basic networking concepts including IP addressing, routing, and protocols
- Principles of operating systems – file management, system processes, user interfaces
- Network devices – routers, switches, firewalls and their interactions
- Network settings configuration and troubleshooting
- Operating system management, updates and system security
|
30 |
60 |
90 |
- Acquire knowledge of basic networking concepts, including IP addressing, routing, and network protocols.
- Learn the principles of operating systems, such as file management, system processes, and user interfaces.
- Understand how different network devices (routers, switches, firewalls) interact within a network.
- Gain practical skills in configuring network settings and troubleshooting common networking issues.
- Develop the ability to manage operating system settings, perform system updates, and ensure system security.
|
2 |
Fundamentals of Cyber Security |
- Cybersecurity concepts – threats, vulnerabilities, and protocols
- Data protection – encryption, access control, secure storage
- Role of security tools – firewalls, IDS/IPS, antivirus
- User authentication and access control
- Cyber threat identification and mitigation
|
50 |
100 |
150 |
- Acquire knowledge of key cybersecurity concepts, including threats, vulnerabilities, and security protocols.
- Learn the importance of data protection strategies, such as encryption, access controls, and secure storage.
- Understand the role of firewalls, intrusion detection/prevention systems, and antivirus software in defending against cyber-attacks.
- Gain practical skills in implementing security measures such as secure authentication, authorization, and user access controls.
- Develop the ability to identify common cyber threats, including malware, phishing, and denial-of-service attacks.
|
3 |
Cryptography and Ethical Hacking |
- Cryptographic algorithms and applications
- Symmetric and asymmetric encryption techniques
- Ethical hacking methodologies and tools
- Penetration testing and system vulnerability assessment
- Public Key Infrastructure (PKI) and digital certificates
|
25 |
35 |
60 |
- Develop a thorough understanding of cryptographic algorithms, their applications, and their role in securing communication.
- Learn how to implement encryption and decryption techniques, including symmetric and asymmetric cryptography.
- Understand ethical hacking methodologies and tools used to identify and exploit vulnerabilities in systems.
- Gain practical experience in securing data and conducting penetration testing.
- Demonstrate the ability to use cryptographic protocols and ethical hacking tools to strengthen system security.
|
4 |
Network and Infrastructure Security |
- Network security concepts – firewalls, IDS/IPS
- Configuring network security devices
- Secure network architecture and communication protocols
- Mitigating common network attacks
- Network monitoring and traffic analysis
|
15 |
15 |
30 |
- Understand network security concepts, including firewalls, IDS, and IPS.
- Learn to configure security devices for protecting networks.
- Understand secure communication protocols (TCP/IP) and network vulnerabilities.
- Gain expertise in VPNs, network segmentation, and secure wireless setups.
- Develop ability to monitor and analyze network traffic to detect and respond to threats.
|
Sub Total (A) |
120 |
210 |
330 |
- |
5 |
Employability Skills (B) |
- |
- |
- |
60 |
Students will be able to get additional skills apart from technical skills, to be job ready. |
6 |
OJT / Project (C) |
- |
- |
- |
60 |
Students will be able to learn practical job-oriented working experience. |
Total Duration (A + B + C) |
120 |
210 |
450 |
- |