prospectus isc
TRANSCRIPT
-
7/27/2019 Prospectus Isc
1/72
PROSPECTUS
Level1
Level2
Certified System Security Analyst [CSSA]
Certified System Security Professional [CSSP]
Level3 C e r t if i e d I nf o r m at i o n S ys t e m s S e c u r it y Au d i t or [ C I S SA ]
C e r t if i e d S y s t e m S e c u r it y S o lu t i o n D e s i gn e r [ C S S SD ]
Or
C e r t if i e d C o m p u t er F o r e ns i c P r o f e s s i on a l [ C C F P ]
Or
C er t i f ic at i on S ch em e f or I . T. S E CU R IT Y P RO FE S SI ON AL S
NIELIT
-
7/27/2019 Prospectus Isc
2/72
N a ti on a l I n st i tu t e o f E l e ct r on i cs A nd I nf o rm at i on T e ch n ol og y
( N I E L I T )
( A n A ut o n o mo u s S ci e n t if i c S o ci e t y o f D e p a rt m e n t of E l e ct r o n ic s & I n f o rm a t io n
Te c h n o l o g y, M i n i s t r y o f C o m m u n i c a t i o ns & I n f o r m a t i o n Te c h n o l o g y, G o v e r n m e n t o f I n d i a )
E L EC T RO N IC S N I KE TA N 6 , CG O C O MP L EX , NE W DE L HI -1 1 0 0 0 3
Mobile and Wire le ss Se curity
Se curity Standards & Inf ormation Se curity Policy
Public K e y Inf rastructure and Trust Manage me nt A n a ly s i s o f D i g i ta l E v i de n c e
S y s te m a n d D e v ic e S e c ur i t y
Public K e y Inf rastructure and Trust Manage me nt
Auditing, Pe ne tration Te sting & Inf ormation Se curity
Risk Management S ei z ur e & I ma g in g o f D i gi t al E v id e nc e
Cryptography and Ne twork Se curity
Application Se curity & E-Comme rce
Se curity Standards & Inf ormation Se curity Policy C y b er C r i me , I n d ia n I T ( A m en d m en t ) A c t 2 0 08 a n d
Introduction to Compute r Fore nsics
Certified Information Systems Security Auditor [CISSA]
D a t ab a s e a n d W eb A p p l ic a t i on S e c u r it y
C yb er L aw a nd I PR I ss ue s
I n d us t r i al P r o j ec t [ 4 8 0 H o u r s]
I n d us t r i al P r o j ec t [ 4 8 0 H o u r s]I n d us t r i al P r o j ec t [ 4 8 0 H o u r s]
C yb er L aw a nd I PR I ss ue sC o m pu t e r F o r en s i cs f o r W i nd o w s & L i n ux S y st e m s a n d
Anti-f ore nsics
Certified Sy stem Sec urity Profes s ional [CSSP]
Certified System Security Solution Designer [CSSSD]
Lev el-2
Lev el-3
Lev el-3 Lev el-3
Certification Scheme in Information Securityertification Scheme in Information Security
Inf ormation Se curity Conce pts
O p e ra t i n g S y s te m A d m in i s tr a t io n
C o m pu t e r F u n d am e n ta l s a n d C o m pu t e r N e t wo r k s
S y s te m S e c ur i t y
Certified Sy s tem Sec urity Analy s t [CSSA]Lev el-1
Certified Com puter Forens ic Profes s ional [CCFP]
At A Glance
-
7/27/2019 Prospectus Isc
3/72
prospectus
CONTENTS
1 . N IE LI T - A n I nt ro du ct io n 0 1
2 . N I E LI T, G o r ak h p ur C e n tr e - A n I n t r od u c ti o n 0 1
3 . I n f or m a t io n S e c ur i t y E d u ca t i on & A w ar e n es s ( I S EA ) P r o je c t 0 14 . C e r t if i c a ti o n S c h em e i n I n f or m a t io n S e c ur i t y 0 2
5 . C ou rs e O bj ec ti ve 0 2
6 . C ou rs e S tr uc tu re 0 3
7 . E li gi bi li ty C ri te ri a 0 5
7. 1 Ce rt if ied S ys tem Sec ur it y Ana ly st 05
7 .2 C er ti fi ed S ys te m S ec ur it y P ro fe ss io na l 0 5
7 . 3 C er t i fi e d C om pu t er F o r en s ic P r o f es s io n al / Ce r ti f ie d I n fo r ma t io n S y st e ms S e c ur i ty A ud I to r /
Ce rtifie d Syste m Se cu rity So lu tio n De sig n e r 0 5
8 . M od e of Ad mi ss io n 0 5
8.1. R eg ular Cou rse 05
8.2. Dire ct Course (Distance Cou rse) 05
9 . R u l es a n d R e g ul a t i on s f o r C a n di d a te s S e e ki n g C e r t if i c a ti o n 0 5
10. Training Centres 06
11. Cour se Fee 06
11.1. Fee For Regular Course 06
11. 2. Fee Fo r Dir ect Co urse 06
1 2 . Re g istra tio n 0 7
13. Calend er of Events for Ce rtifica tio n 07
14. Entr ance Examination Pattern for Regular Candidates only 07
1 5 . Ce rtifica tio n Exa min a tio n Pa tte rn 0 8
16. Cour se Module 08
17. Guidelines for th e Pr oje ct s 10
18. Entran ce Examination/ Cer tif ication Examination Centr es 13
19.Expert Committee for Certification Scheme in Infor mation Security 14
19 .1. Committee Members 14
1 9 .2 . Te rms o f th e Re fe re n ce o f th e Co mmitte e 1 4
A P PE N DI X A : D E TA I LE D S Y LL A BU S L E VE L 1
CERTIFIED SYSTEM SECURITY ANALYST
1.1. Comp uter Funda mentals and Computer Netwo rks 15
1.2. Op erating System Administra tio n 19
1 .3 . I nf or ma ti on S ec ur it y C on ce pt s 2 2
1.4. System Secur it y 25
-
7/27/2019 Prospectus Isc
4/72
prospectus
CONTENTS
A PP EN DI X B : D ETA IL ED S YL LA BU S L EV EL 2
CERTIFIED SYSTEM SECURITY PROFESSIONAL
2.1. Cryptography and Network Security 2 9
2.2. S ys t em a n d D e vi c e S e cu r it y 3 1
2.3. M o b i le a n d W i r e l es s S e c u r i t y 3 4
2.4. D a t ab a s e a n d W eb A p p l i ca t i o n S e c ur i t y 3 8
A P PE N DI X C : D E TA I LE D S Y LL A BU S L E VE L 3
C E R TI F I E D S Y S TE M S E C U RI T Y S O L UT I O N D E S IG N E R ( C S S SD )
3.1. Application Security & E-Comme rce 43
. 3.2. Public Key Infrastru ctu re and Trust Manag ement 45
3.3. Secur ity Standar ds & In formation Security Policy 47
3.4. Cybe r Law and IPR Issu es 49
C E RT I FI E D I N FO R MAT I ON S Y ST E MS S E CU R IT Y A U DI TO R ( C IS S A)
4.1. Secur ity Standar ds & In formation Security Policy 51
4.2. Auditing, Penet ration Testing & In formation Security Risk Managemen t 53
4.3. Public Key Infrastru ctu re and Trust Manag ement 56
4.4. Cybe r Law and IPR Issu es 58
C E RT I FI E D C OM P UT E R F O RE N SI C P R OF E SS I ON A L [ C CF P ]
5.1. Cybe r Crime, Indian IT ( Amen dment) Act 2008 an d Introdu ctio n to 60Co mp u te r Fo re n sics
5.2. Seizure & Imag in g of Digit al Evidence 62
5.3. Analysis of Digital Evidence 64
5.4. Co mputer Forensics for Windows & Linux Systems and Anti-fore nsics 66
-
7/27/2019 Prospectus Isc
5/72
I E L I T ( N a t io n a l I n s t it u t e o f E l e c tr o n i cs A nd I n f o rm a t i on Te c h n ol o g y ) i s a n au t o n om o u sNs c i en t i f i c s o c i et y o f t h e D e p a rt m e nt o f E l e c tr o n ic s & I n f o r ma t i o n Te c h n ol o g y, M i n i st r y o f C o m mu n i c at i o n s & I n f o rm a t i on Te c h n ol o g y, G o ve r n m en t o f I n d i a wi t h H ea d Q u a r te r s a t Ne wD e lh i . I t is e n vi s io n ed t o b ri n g t h e mo s t up d at e d g l ob a l i n du s tr y r el e va n t co m pu t er e d uc a ti o n,w i t h in t h e r e a c h o f m o r e a n d m o r e i n t he a r ea s of I n f o rm a t i on , E le c t r on i c s a n d C o m mu n i c at i o n
Te c hn o lo g y ( I EC T ). NI E LI T i s i m pl e me n ti n g a jo i nt sc h em e o f A l l I n di a C o un c il f o r Te c hn i ca lE du ca ti on (A IC TE ) a nd D ep ar tm en t of E le ct ro ni cs & I nf or ma ti on Te ch no lo gy [f or me rl yDepartment of Information Technology (DIT)], Government of India.
N I EL I T w as f o r me d o n t h e 9 t h N ov em b er 1 9 94 a n d i s r e gi s te r ed u n de r t h e S oc i et i es R e gi s tr at i onA c t , 1 8 6 0 . T h e m an a g e me n t a n d a d m i ni s t ra t i o n o f t h e N I E LI T i s o v e rs e e n b y G o ve r n i ng C o u n ci l ,u nd er t he c h ai rm an sh ip o f t he M i ni st er o f S ta te , C om mu ni ca ti on s & I nf or ma ti on Te ch no lo gy,G o ve r n m en t o f I n d i a. M e m b e rs o f t h e C o u nc i l c o n si s t o f e m i n en t a c a d e mi a f r o m I I Ts , U n i v er s i t ie s ,e t c . a n d p r o f es s i o na l s f r o m t h e i n d u s t ry.
I E L I T, G o ra k h p ur C e n t re i s a un i t o f N I E LI T w h i ch i s a n a u t o no m o us b o d y o f D e p a rt m e n t o f NE l e ct r o n ic s & I n f o r ma t i o n Te c h n ol o g y (D e i tY ) , M i n i st r y o f C o m mu n i ca t i o n s & I n f o rm a t i onTechnology, Govt. of India. The Centre is a Premier Organization for Education, Training, R&D andC o n su l t a nc y i n I T a n d E l e c tr o n i cs . T h e C e n t r e o f f er s c o u r se s i n a r e a s l i k e E m b ed d e d S y s te m s ,VLSI, Instrumentation, BioInformatics, ITES-BPO, Information Security, Cyber Law, Networkinga n d o t h e r a r e a s o f I n f o r ma t i o n Te c h no l o g y.
nformation Security is an emerging area. At present there are not many Information security
Iprofessionals in the country. Also, the Information Security awareness level is low in the
c o u n tr y. T h i s n ec e s si t a t es d e v el o p me n t o f s p e ci a l i z ed m a n p ow e r, b o t h a t h ig h a n d l o w e nd s .A c c o rd i n g ly, G o ve r n me n t o f I n d i a (D e p a rt m e n t o f E l e ct r o n ic s & I n f o rm a t i on Te c h n ol o g y) h a sl a u n ch e d I n f o r ma t i o n Se c u r it y E d u ca t i o n a nd A w a re n e s s ( I S E A ) Pr o j e ct w i t h t he f o l l ow i n g b r o a daims to
i . I n tr o du c e I n fo r ma t io n S e cu r it y C u rr i cu l um a t M . Te c h. & B . Te c h. l e ve l a n d R es e ar c h
Activity / PhD;
i i. Tr ai n Sy st em A dm in is tr at or s/ P ro fe ss io na ls ;
i i i . Tr a i n G o ve r n me n t O f f i c er s on I nf o r m at i o n S e c u ri t y i s s ue s i. e . C om p u t er n e t w or k i n g, c yb e rhygiene, data security etc.;
i v. B r in g I n fo r ma t io n Se c ur i ty Aw ar e ne s s i n th e co u nt r y; a nd
v. E du ca ti on Exc ha ng e P ro gra mm e.
U n d e r t h e p r oj e c t, t h e a c t iv i t i es o f i n t r od u c t io n o f I n f o rm a t i on S e c ur i t y cu r r i cu l u m & t r a in i n go f S ys t em A d mi n is t ra t or s a r e b e in g i m pl e me n te d t h ro u gh Re s ou r ce Ce n tr e s ( R C - pr e mi e ri n s t it u t e s l i k e I I Ts a n d I I S c . ) a n d P a rt i c i pa t i n g I n s t it u t e s( P I - N I Ts , G o v t. D e g re e E n g i ne e r i ngC o l le g e s , I I I Ts , S o c i et i e s o f D e i tY, e t c . ). T h e a c t i vi t y o f t r a in i n g o f C e n t ra l a n d S t a t e G o v er n m en to f f i ce r s a r e b e i n g i m p l em e n te d t h r ou g h s i x D e i t Y o r g a ni z a t i on s v i z . C D A C , E R N ET I n d i a , N I EL I T,C E RT- I n , S T Q C D i r ec t o ra t e , & N I C . T h e I n f o r ma t i o n S e c u ri t y a w a re n e ss p ro g r am m e f o r t h ei n d u st r y, e d u c a t io n a l i n s t it u t e s a n d t h e m a s se s i s b e i n g i m p le m e nt e d t h r ou g h C D A C, H y d e ra b a d ,w h ic h i s a l so d e ve l op i ng L e ar n in g M a te r ia l f o r t h e t ra i ni n g o f g o vt . o f fi c er s . O n e o f t h e a c ti v it ye nv is ag ed i s to l au nc h a na ti on al l ev el C er ti fi ca ti on S ch em e fo r I nf or ma ti on S ec ur it yProfessionals. This activity has been assigned to NIELIT.
3 . In f or m at i on S e cu r it y E d uc a ti o n & A w ar en e ss ( IS E A) P r oj e ct
2 . N IE L I T , G o r ak h p u r C e n tr e - A n I n t ro d u ct i o n
01
prospectus
1 . N I EL I T - A n I n tr o du c ti o n
-
7/27/2019 Prospectus Isc
6/72
4 . Ce r ti f ic a ti o n S c he m e i n I n fo r ma t io n S e cu ri t y
5 . C ou r s e O b j ec t i v e
n e of t h e o b j e ct i v es of t h e I S E A p r o j ec t is t o i m p l em e n t a r ob u s t c e r ti f i c a ti o n m e c ha n i s m i nOI n f o rm a t i on S e cu r i t y w i t h t e c hn i c a l e x p er i e n ce a n d g u i d a nc e f ro m R C ' s ( o f I S E A P r o je c t ) w h i c hwill set the international acceptable standards with NIELIT as the implementing organization.
W i t h t h e a b ov e o b j ec t i ve i n t h e m i n d , t h e N I EL I T h a s l a u n ch e d t h e f o l l ow i n g c e r t if i c a ti o n s c h em e i nI n f o rm a t i on s e c u r it y w i t h t h re e l e v el s o f c e r t if i c a t io n s c h e me a s a p a r t o f I n f o r ma t i o n s ec u r i tye d u ca t i o n a n d a w a re n e s s p r o j ec t . NI E L I T , G o ra k h p ur C e n tr e i s a c t i ng a s n od a l c e n t re . H ow e ve r t h en a ti o na l i m ag e o f t h e s c he m e i s b e in g m a in t ai n ed b y N I EL I T , Ne w D e lh i a s t h e i m pl e me n ti n gorganization.
o i m pl e me n t a n at i on a l l e ve l C e rt i fi c at i on S c he m e in I n f or ma t io n S ec u ri t y as p a rt o f t h eTInformation Security Education and Awareness Project of DeitY.The Course structure has been designed to conduct examination for three levels of certification i.e.
02
prospectus
Level-1
Level-2
C e rt i f ie d S ys t em S e cu r i ty A n al y s t [C S SA ]
C er ti fi ed S ys t em S ec u ri t y P ro fe ss io na l [ CS SP ]
Level-3 C e r t i f ie d I n f o r ma t i o n S y s te m s S e c u r i ty A u d i t or [ C I SS A ]
C e rt i f ie d S ys t em S e cu r i ty S o lu t io n D e s ig n er [ C SS S D]
OrC e rt i fi e d C o mp u te r F or e ns i c P r of e ss i o na l [ C C FP ]
Or
-
7/27/2019 Prospectus Isc
7/72
-
7/27/2019 Prospectus Isc
8/72
04
prospectus
S .N o. C od e Pap er Th eory(Hours)
Practical(Hours)
01. IS-C3-A-01 Security Standards & In f o r m a t io n S e c u r it y P o li c y
60 60
02. IS-C3-A-02 Auditing, Penetration Testing & Information Security Risk
Management
60 60
03. IS-C3-A-03 P u b l i c K e y In f r a s t ru c t ur e a n dTrust Management
60 60
04. IS-C3-A-04 C y b e r L a w a nd I P R Is s u e s 60 60
T o t a l 240 240
+ Si x M o nt h In d u s tr i a l P r o je c t (480 Hours)
Level-3C e rt i fi e d I n fo rm a ti o n S y st e ms S e cu r it y A u di t or ( C IS S A)
S .N o. C od e Pap er Th eory(Hours)
Practical(Hours)
01. IS-C3-F-01 Cyber Crime, Indian IT
( Am en d m e n t) Ac t 2 0 08 a ndIntroduction to
Computer Forensics
60 60
02. IS-C3-F-02 S e iz u r e & Im a g i n g of Di g i ta lEvidence
60 60
03. IS-C3-F-03 A n al y si s o f D i g i ta l E v i d en c e 60 60
04. IS-C3-F-04 Computer Forensics for Windows& L in ux S ys te m s a n d A nt i-
forensics
60 60
T o t a l 240 240
+ Si x M o nt h In d u st r ia l P r o je c t (480 Hours)
Level-3Certified Computer Forensic Professional (CCFP)
t e r F or e n si c s f o r W i n d o w s & L i n u x S y s t e ms a n d A n t i -f o r en s i c s
-
7/27/2019 Prospectus Isc
9/72
7 . E l ig i b i l it y C r i t er i a
7 . 1. C er t if i ed S ys t em S e c ur i ty A n al y st ( L ev e l - 1 )
7.2.Certified System Security Professional (Level - 2)
7 . 3 . Ce r t i fi e d C o m pu t e r F o r en s i c P r o f es s i on a l / C e r ti f i ed I n f o rm a t io n S y s te m s S e c ur i t y
A u d it o r / C e r ti f i ed S y s te m S e c ur i t y S o l ut i o n D e s ig n e r ( Le v e l - 3 )
8 . M od e O f A dm i s si o n :
9 . R u le s a n d R e gu l at i on s f o r C a nd i da t es S e ek i ng C er t if i ca t io n
Concurrently with B.E/ B.Tech (All streams) / MCA / 'B' Level/ MBA/M.Sc.(CS/IT/Mathematics/Physics/Electronics)
PGDCA/ NIELIT 'A' Level/ BCA/Diploma/ B.Sc. (CS/IT/Mathematics/Physics
L e v el - 1 ( Ce r t i f ie d S y s te m S e c u ri t y A n a l ys t )or
L e v el - 2 ( Ce r t i f ie d S y s te m S e c u ri t y Pr o f e ss i o n al )or
N ot e : 1 . Certification Scheme is free For NIELIT Employees( Satisfying the Eligilibilty Criteria for
P a r ti c u l ar L e v e l) .2. NIELIT E m pl o ye e s A pp l yi n g f o r t h e ce r ti f ic a ti o n n ee d t o s ub m it a l e t te r f r om t h er e e m pl o ye ri n d i ca t i n g t h a t t h e y a r e i n t h e j o b a n d g i v e n p e r m i ss i o n t o a p p e ar i n t h e c e r t i fi c a ti o n .3. C a n d i da t e s t a k i ng a d m i ss i o n i n L ev e l - 3 c a n ch o o s e a n y o n e of t h e th r e e sp e c i al i z a ti o n gi v e nf or L eve l -3 .
A d m i ss i o n c a n b e t a k en in on e o f t h e f o l l ow i n g m o d e :8.1. Regular Course: C a n d id a t e s w i l l b e pr o v i de d c l a s sr o o m f a c i l it i e s, s i x m o n th s tr a i ni n gw i ll b e p ro v id e d a t N IE L IT C e nt r es o f f er i ng s u ch t r ai n in g p r og ra m .
8.2. Direct Course( Distance Course) : Direct mode is an option for candidates to enroll through self -s t u dy mo d e w i t ho u t a t t e nd i n g r e g u la r c o u rs e .
I . A c a nd i da t e c o ul d t a ke r eg u la r s t ud y b y ta k in g a d mi s si o n a t th e I n st i tu t e o f fe r in g s u chtraining programme at Level-1/Level-2 as per eligibility criteria mentioned for
or
B.E/ B.Tech/ MCA/B Level/MBA/M.Sc.(CS/IT/Mathematics/Physics/Electronics) or
PGDCA/ NIELIT A Level/BCA/ Diploma/ B.Sc.(CS/IT/Mathematics/Physics) with 2 yearsrelevant experience.
B.E./B.Tech(All Streams)/MCA/NIELIT BLevel/MBA/M.Sc(CS/IT/Mathematics/Physics/Electronics) with 2 years relevant experience
orPGDCA/NIELITALevel/BCA/Diploma/B.Sc. (CS/IT/Mathematics/Physics) with 3 years relevantexperience.
o
/Level 3
05
prospectus
th
18November, 2013.
-
7/27/2019 Prospectus Isc
10/72
06
prospectus
1.NIELIT, Gorakhpur Centre
2.NIELIT, Imphal Centre
3 . N I EL I T , J a m mu C e n tr e
M . M . M. E n g i n e e ri n g C o l le g e C a m p us
Deoria Road, Gorakhpur-UPPin-273010
Akampat,Post Box No.104,I mp ha l M an ip ur - 7 9 50 01 .
N e w C a mp u s U n i ve r s it y o f J a m mu ,D r. B R A mb ed ka r R oa dJammu - 180006.
4.NIELIT, Kolkata Centre
.NIELIT,
.NIELIT,
J a d a vp u r U n i ve r s i ty C a m p usKolkata - 700032
5 Srinagar Centre
6 Calicut Centre
Sidco Electronics ComplexO l d A i rp o rt R oa dR a n gr e t h ,S r i n ag a r - 1 9 00 0 7
Post Box No. 5, NIT Campus P. O.,Calicut,Kerala - 673601.
1 0 . T r a in i n g C e n te r s
Tr ai n in g i s p r ov i de d f o r R eg u la r S t ud e nt s a t f o ll o wi n g N I EL I T C e nt r es fo r L e ve l -1 , Le ve l -2 a n dLevel-3:
1 1. C ou r se F e e
1 1 . 1 . F e e F o r R eg u l a r C o u r s e
1 1 . 2 . F e e F o r D ir e c t C o u r se
F ee s tr uc tu re i s s am e f or L ev e l- 1 , L e ve l- 2 an d L ev e l- 3
-
7/27/2019 Prospectus Isc
11/72
07
prospectus
13. Calendar Of Events For Certification
112. RegistrationR e gi s t ra t i o n i s a p r e - r e qu i s i te f o r a p p e a ri n g i n t h e c e r t i f ic a t i on e x a m i n at i o n . S o me i m p o r t an taspects of registration are:( i ) R eg i st ra t io n N o i s u n iq u e a n d w i ll r e ma i n s a me f o r a p a rt i cu l ar l e ve l .
( ii ) Re gi st ra ti on w il l b e va li d f or a p er io d o f 4 y ea rs f or a p ar ti cu la r l eve l a ft er w hi chre- registration is required.
( i ii ) A f t er c o mp l et i on o f a p a rt i cu l ar l e ve l s u cc e ss f ul l y r e gi s tr at i on i s a l lo w ed f o r n e xt h i gh e rlevel a f te r p ay in g t he pr es cr ib ed f ee .
( i v) R eg i st ra t io n i s o p en t h ro u gh o ut t h e y ea r a n d v al i d f o r a s p ec i fi e d n u mb e r o f c o ns e cu t iv ee i g h t ex a m i na t i o ns t a k in g i n t o a cc o u n t t h e c ut - of f d a t e f or t h e n ex t i m me d i a tee x a mi n a t i on a f t e r r e g i st r at i o n . Th e r e i s a cu t -o f f d a t e b ey o n d w h i c h th e r e gi s t ra n t scannot take immediate examination.
(v) Registration Fee is 500/- + Service Tax(as applica ble)
Schedule For August, 2013 Batch of Certification Scheme in Information SecurityLevel-1, Level-2 and Level-3
Last dateforsubmission ofEntranceExam
Application
EntranceExamDate
Admission Cut-offdate
Commencementdate of classes
Lastd at e f orsubmissi on o f Registration
Form
Last dateforsubmission of fi ll ed-i n Exa mform
Last dateforsubmission of f il led-i n E xamform with
l at e f ee
Date of Commencement of exam
Dat e o f Declaration ofResults
08thAugust
2013
25thAugust
2013
16thSeptember
2013
16thSeptember
2013
18thNovembe
r
2013
27thDecember
2013
10thJanuary
2014
First weekof
February2014
Last weeko f Ma rch
2014
13.2 For Direct Students
13.1 For Regular Students
S ch ed ul e F o r Au gu st , 20 13 B at ch of Ce rt if i ca t ion S ch eme i n I n fo rma t ion Se c ur i ty Le v el -1 , Le v el -2 an d L ev el -3
L as t da t e f o rsubmission of
Registration Form
Last date forsubmission of
filled-in Examform
L a st d at e fo rsubmission of
f i l l ed - in E x a m f o r mw i th la t e f e e
D ate of Commencement of
exam
Date of Declaration of
Results
18t h November, 2013
27t hD ec e mb e r , 2 0 13
10t hJanuary, 2014
F i rs t we e k o f F eb r u ar y , 2 0 14
La st w ee k o f M ar ch , 2 01 4
1 4 . En t ra n ce E x am i na t io n p a tt e rn f o r Re g ul a r Ca n di d at e s o nl y
1 6 9 ( 1 5 0 + 1 9 S e r v i c e Ta x )
D e m an d d r a ft dr a wn in f av o ur o f N I E LI T, Go r a kh p u r C e n t re pa y ab l e a t G o ra k h p ur.
Wwww.nielitgkp.edu.inWwww.nielit.in
-
7/27/2019 Prospectus Isc
12/72
08
prospectus
1 6 . C o u rs e M o d ul e s
LEVEL-1C E R TI F I E D S Y S TE M S E C U R I TY A N A L Y S T
S.N o. Cod e Pap er Max. Mar k s
1. I S-C1- 01 Compute r Funda ment als A nd Compute r Ne tw orks 100
2. I S-C1- 02 Ope r ati ng Sys te m A dmini st r ati on 100
3. I S-C1- 03 Infor mat ion S ecur i ty Conce pts 100
4. I S-C1- 04 Sys te m S ecuri ty 100
5. I S-C1- 05 Pr a cti cal 100
1 5 . C e r ti f i c at i o n E x a m in a t i on P a t t er n
T h e e x a m in a t i on f o r I n f o r ma t i o n S e c ur i t y C e r ti f i c a ti o n S c h e m e w i l l b e c o n d u c te d o n f o l l o w in gpattern:
i . E x am i na t io n w i ll b e c o nd u ct e d t w o t i me s i n a y e ar o n l a st w e ek o f D e ce m be r /J a nu a ry a n dJune/July.
i i. T he t he or y e xa mi na ti on o f e ac h p ap er w il l c on ta in b ot h o bj ec ti ve a s w el l a s s ub je ct iv e
questions.
i i i. To q u al i fy f or a p a ss i n a mo d ul e , a ca n di d at e mu s t ha ve o bt a in e d a t l ea s t 50 % i n e ac h th e or ya n d p r a ct i c a l e x a mi n a t i on .
i v. T h er e wi l l b e a s i ng l e a p pl i ca t io n fo r m f o r e x am i na t io n an d f o r e a ch e xa m in a ti o n t h e c a nd i da t eh as to fi ll i n t he sa id f or m. Ex am in at io n f or m w il l b e a va il ab le fo r f re e d ow nl oa d f ro m o urwebsite (http://www.nielitgkp.edu.in) from 18 November, 2013.
v. O n su cc es sf ul c om pl et io n of a ll m od ul es ( th eo ry a nd p ra ct ic al ) of l ev el s 1& 2 t he c an di da te w il lb e a wa r d e d c e r ti f i c a te . B ut i n th e c as e o f l e v el 3 c a n d id a t e h a v e t o c le a r a l l t h e th e o ry p a pe r s ,
p ra ct ic al a nd v iv a co rr es po nd in g t o t he i n du st ri al p ro je ct .
V i . T h e s t ru c tu r e f o r t h e e x am i na t io n f e e i s a s f o ll o ws :
Fo r L eve l - 3 c an di da te s h ave to
c h o o se o n e o f t h e th r e e s p e c ia l i z at i o n g i v e n f o r L e v el - 3 .
E x am i na t io n F e e
F ee s t r uc t ur e i s s am e f o r L e ve l - 1 , Le v el - 2 a n d L e ve l -3
-
7/27/2019 Prospectus Isc
13/72
09
prospectus
S .N o. Cod e Pap er Max. M ark s
01. I S -C2-01 Cr yptogra phy and N etw or k S ecuri ty 100
02. I S -C2-02 Sys te m and De vice Se curit y 100
03. I S -C2-03 Mobi le a nd Wire les s S ecuri ty 100
04. I S -C2-04 Da taba s e and We b Appl ic ati on Se curit y 100
05. I S -C2-05 Pra cti ca l 100
S .N o. Cod e Pap er Max. M ark s
01. IS - C3- D -01 Appl ic ati on S ec ur it y & E-Com merc e 100
02. IS -C3- D-02 Publ ic Ke y In fra s truct ur e and T rust
Management
100
03 . I S- C3- D- 03 Se cu rit y Stan da r ds & I nf or mat ion S ecur i tyPolicy 100
04. IS - C3- D -04 Cyber La w a nd I P R Iss ues 100
05. IS - C3- D -05 Pra cti ca l 100
S .N o. Cod e Pap er Max. M ark s
01 . I S- C3 -A -0 1 Se cu rit y Stan da r ds & I nf or mat ion S ecur i tyPolicy
100
0 2. I S- C3 -A -0 2 Au di t i ng , Pen e tr a tio n T es tin g & In fo rmat i on
Security Risk Management
100
03. I S- C3-A -03 Publ ic Ke y In fra s truct ur e and T rustManagement
100
04. I S - C3-A -04 Cyber La w a nd I P R Iss ues 100
05. I S - C3-A -05 Pra cti ca l 100
Level-2C e r ti f i e d S y s te m S e c ur i t y P r o f es s i on a l ( 6 M o n th s )
Level-3C e rt i fi ed S y st e m S e cu r it y S ol u ti o n D es i gn e r ( 6 M o nt h s + 6
M o n t h I n d us t r ia l p r o je c t )
Level-3C er t if i ed I n fo r ma t io n S y st e ms S ec u ri t y A u di t or ( 6 M o nt h s + 6
M o n t h I n d us t r i al p r o j ec t )
-
7/27/2019 Prospectus Isc
14/72
10
prospectus
Or
Or
1 7. G ui d el i ne s f o r t h e P r oj e ct s
In Level-3 there is an Industrial Project in the NIELIT Certification Scheme, in Information Security.This project is an an integral part of the Level3, to qualify for the certification at level3. The Project isi de n ti f ie d b y t h e s t ud e nt u nd e r g u id a nc e a n d s u pp o rt of f a cu l ty, ma n ag e me n t o f t h e r e sp e ct i vei n s ti t u te a n d t h r o u gh I n d u st r i al I n t e ra c t io n w i th t h e I n du s t r y in w h i ch s t u d en t w o u ld u n d e rg o t h ep r oj e ct . T h e P r oj e ct w o rk s h ou l d b e o f n a tu r e o f P r od u ct / sy s te m d e si g n a n d d e ve l op me n t. T h ep r o bl e m m a y b e s e l e c t ed f r o m a n i n d u s tr y / i ns t i tu t i on .
The project has to be done individually and no grouping is allowed. There is only one project to be
s u bm i tt e d. P r o je c t i s ev al u at e d a ga i ns t 5 00 m ar k s. O u t o f 5 00 m a rk s 1 00 m a rk s a re e a r ma r ke d f o rp ro je ct g ui de fr om t he ce nt re ,1 00 m ar ks ar e e ar ma rk ed f or p ro je ct gu id e/ su pe rv is or f ro m t hei n d u st r y w h e r e s t u de n t i s un d e r go i n g t h e p r o j ec t a n d 3 0 0 m a r ks ar e ea r m ar k e d f o r v i v a- v oi c e t o b ec o n d uc t e d b y a n e x t e rn a l e x p e rt a n d i t i s n e c e ss a r y t h at s t u d en t o b t ai n 5 0 % m a r ks i n e a c h t o p a s s t h ep r o j e ct p a r t . I n p r o j ec t o n e m e m be r c o m mi t t ee e x p e r t s i ts f o r t h e e v al u a ti o n a t t h e e x t e rn a l e x p e rte n d . P r oj e c t h as t o b e s u b mi t t ed a l o n g w i t h a f ee o f R s 5 0 0 p l u s s er v i c e t ax a s a p pl i c ab l e (i n t h e f o r m o f d r a ft i n th e f a vo u r o f N I E LI T, Gorakhpur Centre and payable at Gorakhpur), along with certificate int he p re sc ri be d f or ma t . A v iv a- vo ce w il l b e c on du ct ed b y a n e xp er t n om in at ed b y t he N IE LI TG o ra k hp u r C e nt r e f o r t h e e va l ua t io n by ex t er n al e x pe r t, as f ar a s po s si b le n ea r t h e c a nd i da te ' sl o c a ti o n . In c a se o f D i r ec t C an d i da t e s 2 0 0 m a r ks a r e e a r ma r k ed f o r p r o j ec t g ui d e /s u p er v i s or f r o m t h ei n d u st r y a s t h e r e w il l b e n o i n t e r na l g u i de .
1 . O bj e c t iv e o f th e P r o je c t
T h e a im o f t h e pr o j e c t i s t o g i v e t h e s tu d e n ts a n in t e g ra t e d e x p er i e n c e i n s o lv i n g a r e al l i f e p r o bl e m b ya p pl y in g k n ow le d ge a n d s k il l s ga i ne d o n c om pl e ti o n of t h eo r y pa pe r s up t o l ev e l3 . I t pr o vi de s a no c c a si o n f or s t u de n t s to r e a li z e t he i m po r t a nc e o f r e s o u rc e a n d t i me m a n ag e m en t , o wn e r s h ip o f t a s ktowards deliverables, innovation and efficiency in task management. It also provides a goodo p po r tu n it y fo r s t ud e nt s to b u il d , en h an c e an d s u st a in h ig h l ev e ls o f p r of e ss i on a l c o nd u ct a ndp e rf o rm an c e an d e v ol v es a p r ob l em s o lv e r f ra m e of m i nd i n s tu d en t . It i s a ls o f el t t ha t ta k in g u p t h ep r o j ec t b y a s tu d e n t p r e p ar e s h i m f o r a j o b i n i n du s t r y an d e l s e wh e r e .
2 . W h o c ou l d b e a S u p er v is o r/ G ui d e:
A g ui de f or p ro je ct s ho ul d b e a p er so n wi th M .Te ch o r e qu iv al en t qu al if ic at io n an d a de qu at eexperience in the area in which the student has chosen the Project.There will be two guides one fromt h e c e n t re a t w h i c h t h e s t ud e n t i s u n d er g o in g t h e c o u r se a n d o t h e r f r o m t h e I n d us t r y a t w h ic h t h e
S.N o. C od e Pap er Max. M ark s
01. IS -C3-F-01 Cyber Cr ime , Indian IT (Am endme nt) A ct
2 0 0 8 a nd I n tr o d uc t io n t oComputer Forensics
100
02. IS -C3-F-02 S eiz ure & Im aging of Di gita l Evi dence 100
03. IS -C3-F-03 A nalys i s of D igi tal Evide nce 100
04. IS -C3-F-04 Comput er F orens ic s for Wi ndow s & LinuxSystems and Anti-forensics
100
05. IS -C3-F-05 P rac tic al 100
Level-3C e r t if i e d C o m pu t e r F o r e ns i c P r o f es s i on a l ( 6 M o n t hs + 6 M o n t h
Industrial project )
-
7/27/2019 Prospectus Isc
15/72
11
prospectus
Or
Or
s t u de n t w il l d o t h e pr o j e c t. R eg a r di n g g u i de f r o m t h e I n du s t r y th e Q u a li f i c at i o n f or t h e g u id e c o u ld b eB.Tech with five year of adequate experience in the area in which the student has chosen the project.T h e I n s t it u t e c o n c e rn e d w i l l r e n d er a l l h e l p i n c l ud i n g t h e n o m in a t io n o f t h e g u i de s .
3 . T i me o f S u bm i s si o n o f P r oj e c t
Students can submit the project only after clearing all papers at Level3.
P r o j ec t s w o u l d b e a p p ro x i ma t e ly 48 0 m a n -h o u r s a n d s h o u ld b e o f a b o ut 50 p a g es (e x c lu d i ng c o d in g )a nd c ar ri es a t o ta l o f 5 00 m ar ks (1 00 m ar ks f o r p ro j ec t g ui de f r om t he c e nt re ,1 00 m ar ks f o r p ro je ctg u i de / s u pe r v i so r f r o m t h e i nd u s tr y a n d 3 0 0 m a r ks f o r v i va - vo i c e t o b e co n d u ct e d b y e x te r n a l e x p e rt ) .
4 . S o m e i m p or t a n t n o t es w h i l e p r e pa r i n g t h e p r o je c t p r o p os a l
T h e f o l lo w i n g s u g ge s t e d g u i de l i n es m a y b y f o l lo w e d i n p r e p ar i n g t h e F i n al p r o j ec t R e po r t :
a. G oo d q ua li ty wh it e ex ec ut iv e b on d p ap er A 4 s iz e sh ou ld b e u se d f or t yp in g a nd d up li ca ti on . Ca res h o u l d b e t a ke n t o a v oi d s m u dg i n g w h i le d u p l ic a t in g t h e c o p ie s .
b . P a g e S p e ci f i c at i o n: ( W ri t t en p a p er a n d s o u r ce c o d e )
L e f t m a r gi n 3 . 0 c m sR i gh t m a r gi n 3 . 0 c m sTo p 2 .7 c msB ot to m 2 .7 c ms
c . P a ge n u mb er s A l l t e xt p ag e s a s we l l a s Pr o gr am s o ur c e co d e l i st i ng s h ou l d b e nu m be r ed a t th eb o tt o m c e nt e r o f t h e p a ge s .
5. Submission of Project Report to NIELIT Centres
T h e s t ud e n t wi l l s u b mi t h i s /h e r p r o j e ct r e p o rt i n t h e p re s c r ib e d f o r ma t . T h e Pr o j e ct R e po r t s h o ul dinclude:
1. Two hard Copies of the Project Report2. Soft copy of project on Floppy/CD3. The Project Report may be about 50 pages (excluding coding).4 . D ra f t o f R s 5 0 0+ s e r vi c e t a x a s a pp l i ca b l e i n t he f a v o ur o f N I E L IT , G O R A K HP U R C E N TR E p a ya b l eat Gorakhpur.
-
7/27/2019 Prospectus Isc
16/72
prospectus
12
F OR MAT F OR CE RT IF IC AT E F RO M N IE LI T C EN TR ES F OR PR OJ EC T AT L EV EL -3
Th i s i s t o c e rt i f y t h at t h i s i s a b o n a fi d e r e co r d o f t h e P r oje c t Wo r k ( Ti tl e d__________________________ ) done satisfactorily at NIELIT Centre_______________by Mr./Ms ___________________________ havingR eg i st ra t io n N u m be r _ _ __ _ __ _ __ _ __ _ i n p a r t ia l f u lf i ll m en t o f C e rt i fi c at i on a tL e v el 3 o f N I E LI T C e r t i fi c a t io n S c h e me i n I n f or m a t io n S e c ur i t y.
T h is r e po r t or a s i mi l ar r e po r t on t h e to p ic h a s no t b ee n s ub m it t ed f o r a ny o t he re x am i na t io n a nd d o es n o t fo r m p a rt o f a ny o t he r c o ur s es u n de r go ne b y t hecandidate.
P l a c e : S i g n at u r e o f C a n di d a t e
Date :
S i g na t u re o f g u i d e f r o mt h e N IE L IT C E NT R E
N am e & S ea l o f N IE LI T Ce nt re
S ig na tu re o f g ui de f r om t heIndustry
N am e & S ea l o f t h e I n du s tr y
-
7/27/2019 Prospectus Isc
17/72
13
prospectus
Or
Or
1 8. E nt r an c e E x am i na t io n / F i na l E x am in a ti o n C e nt r es ( w it h A l ph a c o de )
E XA MI NAT IO N P RO PO SE D TO B E C ON DU CT ED AT T HE CE NT RE S A LL OV ER I ND IA A S
G I VE N B E LO W:
IS
Note : N I E L IT r e s e r v e s t h e r i g ht t o c h a n ge / c an c e l a n y c e n t re m e n t i o ne d a b o ve . I n s u c h c a s ec a nd id a te s w h o h av e a p pl i ed f o r t h at c e nt r e w i ll b e a l lo c at e d t h ei r s e co n d c h oi c e/ n ea r es t c e nt r eexamination centre.
J am mu & K a shm ir De l hi M a har as htr a Or i ssa U t t ar P r a d e sh
J a m m u
J K J A M
S r i n a g a r
J K S N G
New Delhi
DLNDL
A u r a n g a b a d
M H A U R
B hubaneshwar
O R B H U
Lucknow
UPLNW
Gorakhpur
U P G K P
Cha nd i ga rh Ke ra l a Wes t B eng a l Ta mi l N ad u B iha r
C h a n d i g a r h
C H C H A
C alicut
K R C A L
K o l k a t a
W B K K T
C hennai
TNC HN
P a t n a
B H P A T
M a n i p u r A n dh r a P r a d e sh K a r n a t a k a
I m p h a l
M N I M P
Hyderabad
APHYD
B angalore
K R B A N
-
7/27/2019 Prospectus Isc
18/72
1 9 .E x pe r t C o mm i tt e e f o r c e rt i fi c at i on s c he m e i n I n fo r ma t io n S e cu r it y
1 9 .1 . C o mm i tt e e M e m be r s :
T h e r e i s a n E x p e r t C o m m it t e e c o n s ti t u t ed f o r t h e c e r t i fi c a ti o n s c h e m e i n I n f or m a t i on S e c u r i t y w i th
t h e a p p r ov a l o f S e c r e ta r y, D e p a r tm e n t o f I n f o r ma t i o n Te c h n o lo g y. T h e f o l lo w i n g i s t h e s t ru c t u r e o f
the Committee:
14
prospectus
1 9. 2. T he T er ms o f th e R ef er en ce o f th e C om mi tt ee a re a s f ol lo ws :-
i) Pro f. Suk umar Nan di,IIT,Guwahati
ii) Dr.M.S. Gaur,
M a l v i ya N a t i o na l I n s t it u t e o f Te c h n o lo g y ( M NI T ) , Ja i p u r
iii) Dr. Kam lesh Baj aj, CEO
D a t a S ec u r i ty C o u n ci l o f I n d i a ( D S CI ) , N ew D e l hi
iv) Dr. Ajay Data
CEO,Data Infos ys Limited
Jaip ur
v ) Shri San jay Vyas , Jo int Director,
HRD Division, DeitY,New Delhi
v i) Representative of AICTE
v ii) Representative of BSNL
V iii ) S hr i Al ok Tr ipa th i, J oi nt D ir ec to r
NIELIT, Centre Gorakhpur
IX) Shri Basab Das gup ta, Deputy DirectorNIELIT, Delhi
Chairman
Member
Member
Member
Member
Member
Member
Member
M e mb e r S e cr e ta r y
-
7/27/2019 Prospectus Isc
19/72
15
prospectus
LEVEL-1
C E R T IF I E D S Y S TE M S E C U R I TY A N A L Y S T
L e c t u re H o u r s: 6 0 H ou r sPractical Hours: 60Hours
I S - C1 - 0 1: C o m p u t er F u n d a m en t a l s a n d C o m pu t e r N e t w or k s
A pp en di x A
D e t ai l e d S y l la b u s
What is a Computer , How computers operate ,Types of computers , The computing environment,The
Enterprise Computer Environment , Types of computers in the enterprise, Where the PC fits in the
e n te r pr i se e nv i ro n me n t , C om p ut e rs a nd P C H a rd w ar e Ar c hi t ec t ur al C o mp o ne n ts , CP U s,
C h i p se t s , Me m o ry , I / O , C o mp o n e nt i n t e r a ct i o n , P C S o f t wa r e , C I S C v e rs u s R I S C c o m p ut e r m o d el s
, S o f t wa r e , A s s e mb l y, i n t e r p r et e d , a n d c o m pi l e d s o f t wa r e , M o t h er B o a rd C o m po n e n ts , C P U , C h i p s et s
, In te rr up t an d D MA c on tr ol le rs a nd h ow t he y wo rk , Me mo ry , St at ic a nd d yn am ic R AM a nd t he ir
d e ri va t io n s B I OS , C MO S R A M , I /O s u bs y st e m , E mb e dd e d a n d a d d- i n d e vi c es
Overview of PC Architecture 2 Hours
Dif ferent BUS standards 3 Hours S e ri a l I n te r co n ne c ts a n d L a ye r ed P ro t oc o ls , Pa ra l le l m o de l s , S er i al m o de l s, Sy n ch r on o us v er s us
a s y nc h r o no u s o p e ra t i o n , P h ys i c a l L a y er F u n c ti o n a n d S e r v ic e s , L o g i ca l S u b - Bl o c k , E x p a ns i o n s S lo t s
S r. N o. T o pi c s N u mb e r o f H o ur s
1. O ve r vi ew o f P C a rc hit e ct ur e 0 22. D i f fer en t b u s s t an dar d s ( I S A , P C I , P C M CI A ) 0 33. D i ff e re n t A dd - o n C a rd s l ik e m e mo r y, G r ap h ic s e t c. 0 34. O p er a t in g s y st e m a r c hi t ec t u re 0 2
5. P r o cess M an agem en t 0 36. M emo r y M an ag em en t 0 67. F i le s y st e m M a na g e me n t 0 38. I n t ro d uc t io n t o N et w o rk O S 0 39. B as ic s o f C o mm un ic a t io n S ys t ems 0 310. T r a ns m is s io n M e d ia 0 311. O S I , T CP / IP M o de ls 0 612. L oc al Ar ea N et wo rk s 0 213. W id e Ar ea N et wo rk s 0 314. Networking Protocols 0315. I P ad d r es s i ng & R o u t i ng 0 3
16. Understanding & recognizing TCP, IP, UDP, ICMP,Ethernet Packets
03
17. I n t er net w o r k in g D ev i ces ( H u b, S w i t ch, R o u t er et c. ) 0 518. Wir e less Net works 04
Total 60
-
7/27/2019 Prospectus Isc
20/72
a n d A d d - In C a rd s , Bu s e vo l u t io n a n d t h e bu s w ar s , I SA , E I SA , M CA , P C I, P C I- X , P C I E x p re s s
, PC MI A, V id eo a nd M on it or Ty pe s , P or ts S er ia l a nd p ar al le l , US B a nd F ir eW ir e , E th er ne t , Ma ss
S t or a ge D ev i ce s , Fl o pp y an d h a rd d r iv e s , H i gh a nd l o w l e ve l f o rm a tt i ng , C Ds a nd D V Ds , Ty p es ,
s p e e ds , a n d f o r m at t i n g
Add-on Video Cards ,Add-on Memory Cards , Add-on Graphics Cards
I n tr o du c ti o n to O p er at i ng S ys t em s , OS I n te r na l s an d A r ch i te c tu r e , Me m or y ma n ag e me n t,
p r o c es s e s a nd t h r e ad s , F i l e s, f i l e s y st e m s an d d i r e ct o r y s tr u c t ur e , T h e Bo o t P ro c e ss , P O S T ,
Windows boot process , Linux boot process , Basic OS Configuration
Ty p e s of P r o ce s s , M ul t i t a sk i n g , I n p u t , Ou t p u t & E r r or r e d i re c t io n , M a n ag i n g r u n n in g p r o c es s , K i ll i n g
S t ar t ed p r oc e ss , U n de r st a nd i ng t h e i n it pr o ce s s , Pa r en t p r oc e ss e s , To o ls fo r w or k in g w i th
p r o ce s s e s, P r o ce s s sc h e d ul i n g , I n t e r p r o c es s c om m u ni c a t io n , S i gn a l s , Pi p e s , FI F O , Q u e ue s ,
S e m a ph o r es , S h a r ed M e m or y
Different Add-on cards 3 Hours
Operating System Architecture 2 Hours
Process Management 3 Hours
16
prospectus
Memory Management 6 Hours
File System Management 3 Hours
I n t ro d u ct i o n t o N e t wo r k o p er a t i ng S y s te m 3 H o u rs
Basics of Communication Systems 3 Hours
W h a t is M e mo r y Ma n a g e me n t , Ab s t ra c t Mo d e l o f V i r t ua l M e m or y , De m a n d P a g in g S w ap p i n g , S h a re d
V i rt u al M e mo r y , P hy s ic a l & V i rt u al a d dr e ss i ng M o de s , A c c es s C on t ro l , C ac h es , B u f f er C a ch e , Pa g e
C a c he , S w a p C a c he , H a r d w a re C a c h es , P a g e Ta b l e s, P a g e A l l oc a t i on & d e a l lo c a t io n , M e m o ryM a pp i ng , D em a nd P ag i ng , Pa g e Ca c he , S wa p pi n g o u t & d i sc a rd i ng P ag e s , Re d uc i ng S i ze o f P ag e &
b u f f e r c a c h e , Sw a p pi n g o u t s y st e m s h a r ed m e m or y p a g es , S wa p , C a ch e , S w ap p i n g P a ge s i n
Ty p es of f i le s ys t em , C o mp a ri s on of f i le sy s te m , V ir t ua l f i le S ys t em , P ro g ra m u s ed t o ma n ag e fi l e
s ys te m , Ma ki ng a fi le sy st em , C he ck in g a fi le sy st em , Fi le Sy st em F ra gm en ta ti on , Fi le
Fragmentation , Free Space Fragmentation, Related file Fragmentation
N e t wo r k in g O S S o f t wa r e , N e tw o r k b as i c s a nd n e t wo r k m o de l s , P r o t oc o l s , O S I a n d T C P Dr i v er s
Basic Telecommunication System ,Types of Communication , Transmission Impairments , Analog
Versus Digital Transmission , Components, Data representation, Data Flow , Issues in Computer
N e t wo r k in g , Th e B e g i nn i n g o f t h e I n t e rn e t , Se r v i ce an d A p p l i ca t i o ns , P a ck e t S w i tc h i n g C o n ce p t s ,
V i r t ua l C i r cu i t , D a t a g ra m S e r v ic e , S o u r c e R ou t i n g , I s s u e s i n C o mp u t e r N e t wo r k i ng
-
7/27/2019 Prospectus Isc
21/72
Transmission Media 3 hours
O S I M o d el , T C P /I P M o d el 6 h o u rs
Local Area Networks 2 hours
Wide Area Networks 3 hours
Networking Protocols 3 hours
IP Addressing and Routing 3 hours
Understanding and Recognizing TCP,IP UDP, ICMP,Ethernet Packets 3 hours
Tw i st e d P ai r C a bl e ,C oa x ia l C a bl e , F i be r O p ti c C a bl e , U n gu i de d M e di a : W i re l es s Ra d io Wa ve s ,
Micro Waves , Infrared
O S I M od e l , L ay er e d A r ch i te c tu r e , Pe e r t o Pe e r P r oc e ss , En c ap s ul a ti o n , L ay er s i n th e OS I M o de l ,P h ys i ca l L a ye r , D a ta L i nk L ay er , N e tw o rk L a ye r , Tr a ns p or t L ay er , S e ss i on L a ye r , P r es e nt a ti o n
L a y er , A p p l i ca t i o n L ay e r , S u m m ar y o f L a ye r s , T CP / I P Pr o t oc o l S u i t e , P hy s i ca l a n d D a t a L in k L a ye r s ,
Network Layer , Transport Layer
T h e E t h er n e t L A N , L A N P r o to c o l , C S M A / CD p r o t o co l , E t h e r ne t A d d r e ss e s , E t h e rn e t F r am e F o rm a t ,
L A N Tr a n sm i s si o n M e d i a , L A N To p o l og i e s , M e d i u m A c c e ss C o n t r ol P r o to c o l s i n L A N s, L A N S t a n d ar d s ,
L A N B r i dg e , W i r e l e s s L AN s
I s su e s i n W i de a r e a N e tw o rk i ng , X . 2 5 P ro t oc o l , O v e rv i ew o f X . 2 5 , A S a te l li t e- B as e d X . 25 N e tw o rk s ,
A d d r es s i n g i n X . 2 5 N e t wo r k s
Internetworking, Need for Network Layer, Internet as a datagram network, Internet as a connection
l e s s n e tw o r k, I P v 4 , D a t a gr a m , F r a g m en t a t i on , C h e c ks u m , I P v6 , A d v a nt a g e s o f P a ck e t F or m a t ,Extension Headers
I P V 4 A d d r es s , Ad d r e ss Sp a c e , N o t a ti o n s , C l a s sf u l A d d r es s i ng , Cl a s s le s s A d d r es s i n g, Ne t w or k
A d d r es s Tr a n sl a t i on ( N AT ) , I P v 6 A d d r es s , S t r u ct u r e , A d dr e s s S p ac e , R o ut i n g p r o t oc o l s, D i r e c t
D e l i ve r y, I n di r e c t D e l i ve r y, Ro u t i ng Ta b l e s a n d n e x t- H o p R o ut i n g A d a p t iv e r o u t in g , R o u ti n g w i t hi n
Autonomous systems, Open shortest path First (OSPF), Flooding, Routing between autonomous
systems, Exterior gate way protocol, Border Gate way Protocol
T C P ( Tr a n sm i s si o n C o n t ro l P r o t oc o l ) , F l o w C on t r o l a n d A c k n ow l e d gm e n ts , S t o p -a n d - wa i t P r o t oc o l ,
S l i d i ng W i n d ow Pr o t oc o l , C on g e s ti o n C o n tr o l , I P (I n t e rn e t P r o to c o l ), O v er v i e w o f I P, I n te r n e t
A d dr e ss i ng S c he m e , Do t te d D e ci ma l n o ta t io n , A d dr e ss R es o lu t io n P ro t oc o l , R e ve r se A d d re s s
r e so l ut i on p r o to c ol , I P D at a gr am f o rm a t , U D P ( Us e r D a ta g ra m P ro t oc o l) , U D P D at a gr am f o rm a t ,
Overview of ICMP, Overview of Ethernet Packets
17
prospectus
-
7/27/2019 Prospectus Isc
22/72
Internet Working Devices 5 Hours
Wireless Networks 4 Hours
HUB, Switch and Routers
I n t r od u c t io n t o p e r s on a l A r e a N e tw o r ks , O v e rv i e w o f B l u e t oo t h , H o me R F , I R D A , I E E E 8 0 2 . 1 X
1 . A + J um ps ta rt P C H ar dw ar e a nd O. S. B as ic s b y Fa it he We mb en ,B PB.
2. A+ Complete study Guide by Quentum Doctor.,BPB
3 . C C N A s t u d y G u i d e b y To d d L a m ma l e , BP B
t h4 . N + s t u d y G u i d e 4 E d i t io n D a v id G r o t h, B P B
References
18
prospectus
PRACTICAL ASSIGNMENTS Total: 60 hrs
-
7/27/2019 Prospectus Isc
23/72
IS-C1-02: Operating System Administration
L e c t ur e H ou r s : 6 0 H o u rs
P r a ct i c a l H o u rs : 6 0 Ho u r s
S. No. Topic No. of Hours
1. Introduction to Windows Operating System 02
2. Installation and Conf iguration 07
3. Installation and Managing Active Directory 05
4. Managing and Securing Resources 12
5. Perf ormance and Maintenance 05
6. Introduction to Linux 02
7. Linux Installa tion 03
8. Booting Procedures 03
9. Linux Commands and Shell Programming 07
10. System Administration 10
11. X Windows 02
12. Perf ormance Tuning 02
W I N DO W S O PE R A T IN G S Y S TE M
L IN UX O PE RA TI NG S YS TE M
19
prospectus
D e t ai l e d S y l la b u s
W i nd o ws O p er a ti n g S y st e m
I nt r od u ct i on t o W i nd ow s O p er a ti ng S y st e m 0 2 ho u rs
Installation and Conf iguration 07hours
Installation and Managing Active Directory 02hours
Windows 2003 Server, System Requirement, Architecture, Groups, Domains and Active Directory.
H a rd wa r e R eq u ir e me n t, P r e p ar at i on f o r I n st a ll a ti o n, D i s k P ar t it i on i ng , D u a l B o ot i ng F ea t ur e ,Remote Installation Server, Troubleshooting during Installation.
U n de r st a nd i ng f e at u re o f A c ti v e D i re c to r y, S t r u ct u re , N a mi n g C o nv en t io n , W i nd o w 2 00 3 D o ma i nO r ga n iz a ti o na l U n it s , I n s ta l li n g A c ti v e D i re c to r y, C o nt r ol l in g A c ce s s t o A c t i ve D i re c to r y, L o c a ti n gObjects Inactive Directory and Administration of Active Directory Objects.
-
7/27/2019 Prospectus Isc
24/72
Managing and Securing Resources 12hours
Performance and Maintenance 05hours
I n tr o du c ti o n t o L i nu x 0 2 ho ur s
Linux Installation 03hours
Booting Procedures 03hours
Linux Commands and Shell Programming 07hours
System Administration 10hours
Xwindows 02hours
Performance Tuning 02hours
C o nf i gu ra t io n o f H a rd wa r e D ev i ce s , A PM , Wo r ki n g w i th F i l e S ys t em , U p g ra d at i on o f H a rd D i sk ,B a ck u p S t ra t eg y, M a n a gi n g U s er s A c co u nt a n d P r of i le s , M an a gi n g G r ou p A c co u nt s , S ys t em P ol i cya nd G ro up P ol ic y, Mo ni to ri ng D is k Q uo ta s, Au di ti ng , C on f ig ur in g a nd S ch ed ul in g P ri nt er To ol s,S e tt i ng U p o f I I S We b S e rv er, S Q L S e rv e r a n d E xc h an g e Se r ve r.
M o n it o r i ng P e rf o r m an c e u s i n g S y s te m M o n it o r, S e t ti n g u p o f S e r v ic e s , R e co v er i n g f r o m D i s k F ai l u r e.
D e ve l o p me n t o f L i n u x, V a r i ou s D i s t r ib u t i on o f L i n u x, L i n u x S y st e m C o n ce p t s - D ir e c to r y S t r u ct u r ea n d F i l e S t ru c t u re .
S y st e m R e qu i r e me n t , D i f fe r e n t t yp e s o f I n s t al l a t io n - C D R O M, N e t w o rk a n d q u i c k S ta r t , D i f f er e n tt y p e s o f L i n u x I n s t al l a t io n S e r ve r, Wo r k st a t i on a nd C u s to m s , D i s k P a rt i t i on i n g A u t o a n d M a n u al ,
Boot Loader, Packet Selection, Network and Authentication Support.
L I L O / G R U B C o n f ig u r at i o n , S e r ve r S e c u ri t y, R u n L e v e l , I n i t ia l i z a ti o n S c r i pt , D e v i c es I n i t i a l iz a t i ona n d t h e i r A c c e ss , S e t D o w n Pr o c ed u r e s.
C on ce pt s of P ro ce ss es , Co mm on ly u se d u se r C om ma nd s, v i E di to r, Va ri ou s Sh el ls a nd S he llProgramming.
S e rv i ce s - I n it i al i za t io n a n d S t at u s, C r ea t in g a n d M a in t ai n in g o f U s er A c co u nt , a n d G r ou p A c co u nt ,D i s k a n d D e v ic e Ma n a g e me n t , B a c ku p C o n ce p t s , I n s t al l a t i on a n d M a i n te n a n ce o f v a r io u s S e r ve r sApache, Squid, NFS, DHCP, NIS and Printer Server.
Introduction, Installation and Configuration of XWindows, Working with X- Windows GNOME, KDE,Window Manager.
Logrotate, Backup Strategy, Study of various Services for Performance Tuning, Enhancement andOptimization.
1.Windows Server 2003 Network Security Design Study Guide by Reisman
B P B Te c h m ed i a .
2.Windows Server 2003 Network security Administration Study Guide by Kaufmann BPB Techmedia.
3 . R ed H a t L i n u x S e c u r it y a n d O p t i mi z a t io n . R e d H a t p r e s s .
4 . B u i ld i n g S e c u r e S e r v er w i t h Li n u x . O ' R ei l l y P u b l is h e r s5.Linux Security by Hontanun. BPB Techmedia
L IN UX O PE RA TI NG S YS TE M
References:
20
prospectus
-
7/27/2019 Prospectus Isc
25/72
21
prospectus
IS-C1-02: Operating Sysytem Administration
PRACTICAL ASSIGNMENTS Total: 60 hrs
W i n d o ws Pr a c ti c a l L i s t
-
7/27/2019 Prospectus Isc
26/72
22
prospectus
No Topic Minimum No
o f H ou rs
1 Bas ic s o f I nfo r mat io n Secur it y 10
2 S e cu r it y t h re a t s a nd V u ln er a b il it i e s 8
3 C r y pt o g r ap h y 6
4 Ident ificat io n a nd Aut he nt icat io n 2
5 N et wo r k S ec ur it y 8
6 Secur it y Too ls and Technique s 2
7 Int er net Securit y 5
8 E -ma il Secur it y 2
9 Wir e less Secur it y 5
10 R isk Asse ss ment and D isa st er Reco ver y 611 Comput er Fo rens ics 4
12 Info r mat io n Secur it y la ws 2
T ot al Hr s 60
D e t ai l e d S y l la b u s
Basics of Information Security 10 hours
Security threats, Vulnerabilities 08 hours
Cryptography 06 hours
I n t r od u c t io n t o I n f o r m at i o n S e cu r i t y, H i s t o r y o f I n f o rm a t i on S e c u r it y, N e e d f o r c o m pu t e r s e c ur i t yConfidentiality, Integrity, Availability, Authenticity, Accountability, non-repudiation, Authorization,Security threats, Intrusion, Hacking, Security mechanisms Prevention, Detection, Recovery, Anti
virus, Encryption, Firewall, VPN, Access control, Smart card, Biometrics, Intrusion Detection, Policym a n a ge m e n t, V ul n e ra b i l i ty S ca n n i ng , P hy s i ca l s e c u ri t y, B a ck u p , A u d i ti n g , Lo g g i ng , N a t io n a l & I n t e rn a t i o na l S c e n ar i o
O v e rv i e w o f S e c ur i t y t h r e at s , V u ln e r ab i l i ti e s , A c c es s A t t a ck s S n o o pi n g , E a v es d r o pp i n gInterception, Modification Attacks Changes, Insertion, Deletion, Denial-of-Service Attacks - Denialo f A c c es s t o I n f o r ma t i o n, A p p l i c a ti o n s, S y s t e ms , C o m mu n i c at i o n s, R e p u d ia t i o n A t ta c k sMasquerading, Denying an Event , Malicious code - Viruses, worms, Trojan horses, how they worka n d h o w to d e f en d a g a i n st t h e m, S n i ff i n g , ba c k do o r, s p o of i n g , br u t e f o r c e a t t a ck , S o ci a lEngineering, Vulnerable Configurations , Security of Hard drives, laptops & mobile devices
Symmetric versus asymmetric cryptography, Advantages & disadvantages of Symmetric versusasymmetric cryptography, How to mix and match both in practical scenario, Key management,D i g i ta l S i g n at u r e & o t h e r a p p l i ca t i o n o f c r y pt o g ra p h y, PK I C A , R A , S u b s cr i b e r e t c , P K I u s a g e, Fr o mu s er s i de , C A /R A s i de et c , Ty p e o f P K I h i er a rc hy, Si n gl e C A , t r us t m od e ls e t c, Ce r ti f ic a temanagemen
Identification and Authentication 02 hours
Network Security 08 hours
Access Control models Mandatory Access Control, Discretionary Access Control, Role based AccessControl, Methods of Authentication Kerberos, CHA, Certificates, Username/Password, Tokens,Biometrics, Multi-factor, Mutual
Network Infrastructure Security Workstation, Server, Router, Switch, Modem, Mobile devices,F i r e wa l l s a nd p a c ke t f i l te r i ng , P r ox y o r a p p l i ca t i o n le v e l g a t e wa y s s e c ur i t y d e v i ce s , V PN , I n tr u s i ondetection System , Electronic payment System Introduction to IPSec, PPTP,L2TP
I S - C1 - 0 3: I n f or m a t io n S e c ur i t y C o n ce p t s
L e c tu r e Ho u r s : 6 0 H o u r sPractical Hours: 60Hours
-
7/27/2019 Prospectus Isc
27/72
23
prospectus
Security Tools and Technologies 02 hours
Internet Security 05 hours
E-mail Security 02 hours
Wireless Security 05 hours
Risk Assessment and Disaster Recovery 06 hours
Computer Forensics 04 hours
Information Security laws 02 hours
Network scanners, Vulnerability scanners, OS fingerprinting: nmap, nessus, MBSA, SAINT, John theRipper, Forensic tools, Others.
R e co g n i ze a nd u n d e rs t a n d t h e f o l l ow i n g I n t e rn e t s e c ur i t y c o n ce p t s , C u st o m i zi n g B r o ws e r S e c u ri t ySettings, Vulnerabilities Cookies, Java Script, ActiveX, Applets, Buffer overflows, Anonymoussurfing, Phishing, HTTP/S, SSL/TLS and Certificates Internet use - best practices
P O P 3 v s . We b - b a se d e - m ai l , E n cr y p t in g a n d s i g n in g m e s sa g e s , S/ M I M E, P G P, V u ln e r ab i l i ti e s S p am ,E - m a il h o a xe s , E ma i l u s e - b e s t p r a ct i c e s
W i re d /W i re l es s n e tw o rk s , A d -h o c n e tw o rk an d s e ns o r n e tw o rk s , W T SL , 8 0 2. 1 1 a n d 8 0 2. 1 1 x,WEP/WAP(Wired Equivalent Privacy /Wireless Access Protocol), Vulnerabilities , Site Surveys, DOSa nd D DO S a tt ac ks
Asset classification, Information classification, Organization level strategy, Process level strategy,Risk assessment methods, Risk classification, Business continuity plan , Business impact analysis,Event logs, Security Auditing , Disaster Recovery Plan , Backup, Secure Recovery- Alternate sites,Security Policies & Procedures
N a tu r e a n d t y pe s of c y be r c r im e - I n du s tr i al e s pi o na g e, c y be r t e rr o ri s m, P r in c ip l es o f c r im i na l l a w,Computer forensic investigation Digital evidence, Forensic analysis
IT-Act, The rights the various parties have with respect to creating, modifying, using, distributing,
s t or i ng a n d c o py i ng d i gi t al d a ta . C o nc u rr e nt r e sp o ns i bi l it i es a n d p o te n ti a l l i ab i li t ie s , I n te l le c tu a lp r o p er t y i ss u e s c o n n ec t e d w i t h us e a n d m a n a ge m e nt o f d i g i ta l d a t a
R e c om m e nd e d B o o ks
M a i n r e a di n g1 . N e tw o r k S ec u r i ty B i b le E r i c co l e a n d R o na l d L K r u t zW i l e d re a m t ec h I n d ia P v t L t d, N e w D el h i
2.Fundamentals of Network Security by Eric Maiwald , Dreamtech Press3.Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses By Andy Walker, Publisher:
Que4.Computer Security Basics, 2nd Edition By Rick Lehtinen, Publisher: O'Reilly
Supplementary Reading
1 . N e tw or k S e cu r it y E s se n ti a ls : A p pl i ca t io n s a n d s t an d ar d s S t al l in g s, P ea r so n E d uc a ti o n P v tLtd, Delhi
2 . C om pu te r v ir us es , C om pu te r S ec ur it y, A G lo ba l c ha ll en ge b y C oh en E l se vi er P re ss
3 . I nc id en t Re sp on se & C om pu te r F or en si cs by Ke vi n M an di a, Ch ri s & M at t Pe pe TATA M cG RA WH i ll E d it i on
4 . 8 02 .1 1 S ecu ri ty Br uc e Po tte r Bo b F li ck , O' Rei ll y
5. B.Schnier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2/e, John
Wiley and Sons, New York, 1996.6 . Fo un da ti on s of C om pu te r S ec ur it y by D av id S ol om on , Pu bl is he r: S pr in ge r
7 . S ec ur it y+ I n d ep th b y Pa ul C am pb el l, Pu bl is he r: V ij ai N ic ol I mp ri nt s C he nn ai
8 . D ig it al S ec ur it y C on ce pt s a nd C as es , I CFA I U ni ve rs it y P re ss , H yd er ab ad
-
7/27/2019 Prospectus Isc
28/72
24
prospectus
PRACTICAL ASSIGNMENTS Total: 60 hrs
-
7/27/2019 Prospectus Isc
29/72
25
prospectus
IS-C1-04: System Security
L e c tu r e Ho u r s : 6 0 H o u r s
P r ac t i c al H o u r s : 6 0 H o ur s
O u t l in e o f t h e S y l la b u s
Sr. no Topic Minimum no. of hours
01. Design of Secure Operating System 04
02. Design of Trusted Operating System 04
03. Operating System Hardening 06
04. Operating System Controls 04
05. Internet Protocols and S ecurity 04
06. Application Security 02
07. WWW Security 02
08. SHTTP(Secure HTTP) 02
09. SMI ME ( Secure Multipurpose Internet Mail E xtension) 02
10. PGP 02
11. SET (Secure Electronic Transaction) 02
12. E-mail security and I nstant Message Security 02
13. Access Control 04
14. Internet Security Protocols 04
15. Ma naging Personal Firewall and Antivirus 06
16. Remote Access Security 04
17. Secure Conf iguration of Web Server 02
18. Secure Conf iguration of Data ba se Server 02
19. Secure Conf iguration of Email Server 02
-
7/27/2019 Prospectus Isc
30/72
26
prospectus
Operating System Controls 04 hours
Internet Protocols and Security 04 hours
Application Security 02 hours
WWW Security 02 hours
SHTTP(Secure HTTP) 02 hours
SMIME ( Secure Multipurpose Internet Mail Extension) 02 hours
PGP 02 hours
SET (Secure Elect ronic Transaction) 02 hours
I nt ro du ct io n - Ho w t he Co mp ut er S ys te m Wo rk s, Pu rp os e o f a n O pe ra ti ng S ys te m Ty pe s o f O p e ra t i n g S y st e m , Wa k e u p C a l l , Po w e r o n S e l f Te s t , B I OS , B o ot L o a d e r Ta s k o f a n O p e ra t i n g S y st e m
Introduction of Internet Protocols, IPSec Operation, IPSec Implementation, IPV4 Network VersusIPV6 Network, Problems with IPSec
H a c ki n g W E B A p p l ic a t i on s , H ow a r e th e W E B a p p l i ca t i o n s a t t a c ke d , I n pu t Va l i d a ti o n a tt a c k , F u l lKnowledge Analysis
We b S e c u ri t y C o n si d e ra t i o ns , H a c k in g We b P l a t f or m s , W eb P l a t fo r m S e c u ri t y B e s t P r ac t i c es , We bAuthentication threats, Bypassing Web Authentication, (Token Relay, Identity Management, Client-S i d e P i g g yb a c ki n g ) , A t t a ck i n g W eb A u t h or i z a ti o n
Introduction , Overview of SHTTP
I n t r o d u c t i o n , F u n c t i o n a l i t y , D i g i t a l S i g n a t u r e , M e s s a g e E n c r y p t i o n , T r i p l e - W r a p p e dM e s sa g e s , S/ M I ME C e r ti f i c a te s , U s a g e o f S / M I ME i n v a r io u s e - m a il s o f t wa r e , O b s t ac l e o f D e p l oy i n gS/MIME, CAVEATS
I n t r od u c t io n , U se o f P G P , En c r yp t i o n a n d D e c ry p t i on i n P GP, P G P Se r v i ce s , M es s a ge , K eyManagement
Introduction of SET, SET Technology, Symmetric and Asymmetric encryption in SET, TransactionAuthenticity, Importance of secure transactions
D e t ai l e d S y l la b u s
Design of Secure Operating System 04 hours
Design of Trusted Operating System 04 hours
Operating System Hardening 06 hours
I n tr o du c ti o n o f a S e c u re d S ys t em , D r aw b ac k s o f E x is t in g O p er a ti n g S y st e m ( B ug s , Fa u lt I s o l at i on ,H u g e si z e Ke r n e l P r o gr a m e t c . ) , P a tc h i n g L e g a cy O p e ra t i n g S y st e m , Pa r a vi r t u al M a c h in e s Co n c ep t ,Future System
I n t r od u c t io n , S e c ur i t y A s s u ra n c e E v al u a t io n , N e e d f o r Tr u s t ed O p e ra t i n g S y st e m F e a tu r e s o f Tr u st e d O S s
F u nc t io n o f O p er at i ng s y st e m , Ty p es o f O S ( R e al t i me O S , Si n gl e U se r S i ng l e ta s k OS , S in g le U s er -M u l t i t a s k in g S y st e m , Mu l t i us e r S y st e m ) , Ta s k o f O S , P r o ce s s Ma n a g e me n t , M em o r y Ma n a g e me n t ,D e v ic e M a n a g em e n t , S t o ra g e M a n a g em e n t , A p p li c a t io n I n t e r f a ce , U s e r I n t e rf a c e , S e c ur i t yWe a kn e ss , Op e ra t in g S y st e m, W in d ow s We a kn e ss , LI N UX We a kn e ss , Ha r de n in g O S d u ri n gI n s t al l a t io n , S e c u re Us e r A c c ou n t P o li c y, S tr o n g U s e r P a ss w o rd P o li c y, C re a t i ng l i s t o f S e r vi c e s a n dP r o gr a ms r u n n i n g o n S e r v er, P a t c h in g S o f t wa r e , H a r d en i n g W i n d ow s , S e l e ct i n g F i l e S y st e m , A c t i veDirectory / Kerberos, General Installation Rules, Hardening Linux, Choose the correct installation
procedure , different installation tools, Partitions and Security, Network Services, Boot Loaders,Reverse Engineering
-
7/27/2019 Prospectus Isc
31/72
27
prospectus
Secure Configuration of Web Serv er 02 hours
Secure Configuration of Database Server 02 hours
Secure Configuration of Email Serv er 02 hours
P r o te c t i ng D i r ec t o ri e s a n d F i l e s a g a i n st Pr o f i l in g , I I S H a r d en i n g , A p a c he Ha r d e ni n g , A n a l yz i n gS e c u ri t y L o g s, W e b A u t h or i z a ti o n / S e s s i o n To k e n S e cu r i t y, I E S e c u ri t y Z o ne s , L o w P r i vi l e g eBrowsing, Server Side countermeasure
A c c es s c o n t ro l p o l i cy , P r o te c t i ng R e a d O n l y A c c o un t s , P r o te c t i ng h i g h r i s k s t o r ed p r o c ed u r e s a n d
extended functionality, Patch updates
Vulnerabilities of Mail Server, Improving the Security through appropriate planningS e cu r it y Ma n ag e me n t Pr ac t ic e s a n d C o nt r ol s , Se c ur e d O S a n d S e cu r ed A p pl i ca t io n I ns t al l at i on ,Improving the Security through Secured Network Infrastructures
References:
1) Network Security Bible, Cole, WILEY2 ) D e s i gn i n g S e c u ri t y A r c h it e c t ur e So l u t io n s , R a m ac h a n dr a n , W I L E Y
3 ) N e t wo r k S e c u ri t y E s s en t i a l s : A p p l ic a t i on s a n d S t a n da r d s , Wi l l i am S t a l l in g s .
4) Hacking Web Applications Exposed, TATA McGraw-HILL By Joel Scambray, MikeS h e ma , C a l eb S i m a
E-mail security and Instant Message Security 02 hours
Access Control 04 hours
Internet Security Protocols 04 hours
Managing Personal Firewall and Antivirus 06 hours
Remote Access Security 04 hours
I n t r od u c t io n , E - m a i l A t t a ck , U s e o f D i g i ta l C e r t if i c a t e t o p r e ve n t a t t a c k, I n t r o d u ct i o n t o I M S e c u ri t y,B e s t Pr a c ti c e s f or I M s e c ur i t y
Access Control Basics, Access Control Technique, Access Control Administration, Centralized AccessC o n tr o l , D e c e n t ra l i z ed A c c es s C o n t r o l , A c c o u nt a b i l it y, A c c e ss C o n tr o l M o d el s , I d e n t i f i ca t i o n a n d
Authentication Methods, Biometric Authentication
IP Security Architecture, Authentication Header, Encapsulating Security Payload CombiningSecurity Associations, Key Management
Managing Logs, Upgrades, SNMP, Internet Service Provider Issues, Defense in Depth
Business Requirement of Remote Access, Remote Access Technologies, VPN, Extranet and Intranet
S o l u ti o n , Us e o f V P N f o r R e mo t e Ac c e ss S e cu r i t y, I P S ec , Po i n t to Po i n t Tu n n e li n g P r o t oc o l ( P P TP ) ,L ay er 2 Tu nn el in g P ro to co l ( L2 TP ), S SL A ut he nt ic at ed a cc es s of f il es t hr ou gh S AM BA f or d if f er en tO S , O ve rv i ew o f R A S S e rv er f o r S m al l E n te r pr i se A p p l ic a ti o n, O v e rv i ew o f R em o te A c c es s t h ro u ghISP, Remote Administration
-
7/27/2019 Prospectus Isc
32/72
28
prospectus
PRACTICAL ASSIGNMENTS Total: 60 hrs
-
7/27/2019 Prospectus Isc
33/72
29
prospectus
LEVEL-2
CERTIFIED SYSTEM SECURITY PROFESSIONAL
L e ct u re H o ur s : 6 0 H o ur s
Practical Hours: 60Hours
I S -C 2 -0 1: C r yp t og ra p hy a n d N e tw o rk S e cu ri t y
A pp en di x B
D e ta i le d S y ll a bu s
1. Introduction 02 hours
2 . Cl as si cal Enc ryp ti on T ech ni que s 04 h ou rs
3 . Ma t he ma t ic s F u nd a me n ta l s a s so c ia t ed w i th c ry p to g ra p hy 0 6 h o ur s
Active attacks, passive attacks, confidentiality, integrity, availability, Non-repudiation, plain text,
encryption algorithm, secret key, text, decryption algorithm, cryptanalysis, brute force attacks.
Substitution Techniques, Transposition Techniques, Rotor machine, steganography key range and keysize.
G r o u ps , Ri n g s , F i e l ds , Pr i m e n u m b er s , E u c li d ' s A l g o ri t h m, M od u l a r A r i t hm e t i c a n d D i s cr e t el o g a ri t h m s, F i n i t e Fi e l d s, P o ly n o mi n a l a r i t hm e t ic , F e rm a t 's T h e or e m E u l e r' s T h eo r e m, C h i n es eRe ma in de r Te st in g f or P ri ma li ty Q ua dra ti c Re si du es , Le ge nd r S ym bo l, J a co bi S ym bo l H as se 'sTheorem, Quadratic Reciprocity Theorem, Masseyomura protocol, Inverse of a matrix.
4. Symmetric ciphers 08 hours
B l oc k ci p he r p r in c ip l es , DE S , S t re n gt h of D E S, D if f e re n ti a l a n d L i ne a r c r yp t an a ly si s , B l oc k ci p he r
D e s ig n p r i n c ip l e s , I n t er n a t io n a l D a t a E n c ry p t i on a l g o r i t hm ( I D E A) , S t e a m c i p h er R C 4 , R C 5 , B l ow f i s h,A E S E v al u a t i on c r i t e r i a f o r A E S , Tr i p l e D E S, T ra f f i c c o n f id e n t ia l i t y k e y d i s tr i b u ti o n , R a n d om n u m b ergeneration
S r.N o. Topi cs Nu mb er o f H our s
1. I ntroduct ion 022. Clas s ica l Enc ryption T echni ques 04
3. Ma them ati cs Funda ment als as s ocia ted w it h crypt ography 06
4 . Sym met r ic c ipher s 08
5 . As ymm e tr i c ci p her s 1 06. I nterne t S ecuri ty P rotocol s 08
7 . Us e r A u th e n ti c at i o n a nd K e rb er o s 0 6
8. Ele ctroni c M ail Se cur it y 04
9. I P S ec ur ity 06
1 0 . Fi r ew al l s an d Vi r t u al Pr i v at e Net w o r k s ( V P N ) 0 6 Total 60
-
7/27/2019 Prospectus Isc
34/72
30
prospectus
5.Asymmetric chippers 10 hours
6.Internet Security P rotocols 08 hours
7.User Authentication and Kerberos 06 hours
8.Electronic Mail Security 04 hours
9.IP Security 06 hours
10.Firewalls a nd V irtual Private N etworks ( VPN) 06 hours
Brief history, overview, RSA algorithm, Key management, Diffie-Hellman key exchange, Ellipticcurve cryptography, Difference between Asymmetric and Symmetric ciphers. Authenticationm e s sa g e , A ut h e n ti c a t io n c od e s , Ha s h f un c t i on s , S ec u r i ty o f H a s h f u n c ti o n s an d M A C , Ha s hA l g o ri t h m W h i rl p o o l, H M A C , CM A C . D ig i t a l S i g n a tu r e , A u th e n t ic a t i on p r o to c o l s, D i g i t al s i g n at u r estandard, Public-key Infrastructure, Models of PKI, Digital certifications private key management.
Introduction,secure socket layer, Transport Security Layer (TLS), Secure Hyper Text TransferP r o to c o l ( S H TT P ) , T i m e S t a mp i n g P r o t oc o l ( T S P) , S e c u r e E l e ct r o n ic Tr a n sa c t i on ( S E T ) , S S L V er s u sSET, 3D Secure Protocol, Electronic Money.
Introduction, Authentication Basics, Passwords, Authentication, Biometric Authentication,Kerberos, Key Distribution Centre (KDC), Security Handshake Default, Single Sign (SSO)A p pr o ac h ed .
Introduction, E-mail headers and Body, Proxy SMTP, Pretty Good Privacy (PGP), S/MIME.
IP Security overview, IP Security Architecture, Authentication Header, Encapsulating Securitypayload (ESP), Combining Security Associations, Key Management .
Firewalls, Firewall Design Principles, Virtual Private Network (VPN), Intrusion
R ef er en ce s :
D e t ai l e d R ef e r en c e s a r e p ro v i de d i n t h e co u r se m a t er i a l t o b e gi v e n t o r e gi s t er e dcandidates.
Note: T h is p a pe r i s t he or e ti c al p a pe r a n d c on s is t s ma i nl y t ut o ri a ls b ut f ewhands-on may be done using Crypto tool. S o f t wa r e m a y b e d ow n l o ad e d f r o mo ur w eb si te .
-
7/27/2019 Prospectus Isc
35/72
31
prospectus
I S - C2 - 0 2: S y s te m a n d D e v ic e s e c ur i t yL e ct u re H o ur s : 6 0 H o ur sPractical Hours: 60Hours
O ut li ne o f t h e S yl la bu s
Sr. no Topic Minimum no. of hours
P a rt - I ( O pe r at i ng S y st e m T hr e at s )
1. Program Security 22. Fascination of Malicious Code Analysis 43. Malicious Code Environment 44. Classification of Infection Strategies 35. Strategies of Computer Worm 3
P a rt - I I ( S ec u ri ng O S f ro m T hr ea t s)
6. Antivirus Techniques 47. Advanced Antivirus Techniques 68. Case Studies 4
P a rt - II I ( D ev i ce S ec u ri t y)
9. Introduction to Network Infrastructure Security 410. Switch Security 2
11. Router Security 412. DNS Security 413 . ADSL Security 514. Cable Modem Security 515. Protecting Network Infrastructure- A new approach 6
P a r t- I ( O p er a t i ng S y s te m T h r ea t s )
S e cu r e P ro g ra m , V i ru s an d o t he r M a li c io u s c o de , ta r ge t ed m a li c io u s c o de , Co n tr o l a g ai n stP r o g ra m t h r e at s
Common pattern of virus research, antivirus defense development, terminology of maliciousp r o g ra m , C o m p u t er m a l wa r e n a m i n g s c h em e
C o mp u te r a r ch i te c tu r e d ep e nd e nc y, C P U d e p en d en c y, O S d e pe n de n cy, F i l e s y st e m a n d f i le
format dependency, Network protocol dependency
D e t ai l e d S y l la b u s
1.Program Security 02 hours
2. F a sc i na t io n o f M a li c io u s C od e A n al y si s 0 4h o ur s
3.M a l i ci o u s C o d e E n v i ro n me n t 0 4 h ou r s
-
7/27/2019 Prospectus Isc
36/72
32
prospectus
4. C la ss if ic at io n o f I nf ec ti on S tr at eg ie s 0 3h ou rs
5. Strategies of Computer Worm 03hours
6. Antivirus T echniques 04Hours
7. Advanced antivirus techniques 06hours
8. Case Studies 04hours
9. I n tr o du c ti o n t o N et w or k i n fr a st r uc t ur e s e cu r it y 0 4h o ur s
10 Switch Security 02hours
11.Router security 04hours
12.DNS Security 04hours
13.ADSL Security 05hours
14.Cable Modem security 05hours
15.Protecting Network Inf rastructure- A new Approach 06hours
Boot Viruses, File infection techniques, In depth look at WIN32 Viruses
G e n er i c s t r u c tu r e o f c o m pu t e r w o r ms , C o m m o n w o r ms c o d e t r a n s f er a n d e x ec u t i on t e c h n i q ue s
P a rt - II ( Se c ur i ng O S f r o m t h re a ts )
Detection: Static Methods, Scanners, Static Heuristics, Integrity Checkers,Dynamic Methods,Behavior Monitors/Blockers, Emulation,Comparison of antivirus techniques
Retroviruses, Entry point obfuscation, Anti-Emulation (outlast, outsmart, overextent) Armoring( A n t i -D e b u gg i n g , A n t i - bi s a s se m b ly ) , Tu n n e li n g ( I n t eg r i t y c h e ck e r s a t t a ck s ) , A v o id a n ce ,Deworming, defense (User, host, perimeter), capture and containment (Honey pots, ReverseFirewalls, Throtting), Automatic Counter measures
L i n u x/ U n i x S e c ur i t y D e t a il s , Tr u s t ed O p e ra t i n g S y s te m s
P a r t -I I I ( D e vi c e S e c ur i t y)
Internet infrastructure, key components in the internet infrastructure, internet infrastructuresecurity
Introduction, How switches can be attacked
O v er v i ew o f I n te r ne t r ou t in g , Ex t er n al a n d i n te r na l a t ta c ks , R IP a t ta c ks a n d c o un t er m ea s ur e s,OSPF attacks and countermeasures, BGP Attacks and countermeasures
Introduction, DHCP attacks, DNS attacks
I n t r od u c t io n , D S L f a m i l y t r e e , A D S L, A DS L b e n e fi t s , s e c ur i t y t h r e at s , c o u nt e r m ea s u r es ,
t o p o lo g i e s wi t h A D S L m o d em s , To p o l og i e s w it h A D S L r o u te r s , r e co m me n d e d t o p ol o g i es , u s i n grouters as a firewall, limitations, Features Risk, precautionary Measures.
Wo r ki n g o f c a bl e M o de m , C ab l e Mo d em s e cu r it y t hr e at s , d if f e re n t f il t er i ng t e ch n iq u es , D H CPserver filter, Microsoft networking filter, Network isolation filter, static IP address filter, MACa d d r es s f i l t e r, c o m p a ri n g D S L a n d c a b l e M od e m s e c ur i t y t h re a t s .
Analysis on security problems of network infrastructure, steps in hacking network infrastructure,F l a t n e t w or k d e s i g n m o de l a n d M a s q ue r ad i n g , A n e w M o d e l t o p r o t e ct n e t w o r k i n f ra s t r uc t u re .
D e t a il e d R e f er e n c e s a re p r o v i d e d i n t h e c o u r s e m at e r i al t o b e g i v e n t o r e g i s te r e d c a n d id a t e s.
R e f er e n ce s :
-
7/27/2019 Prospectus Isc
37/72
IS-C2-02:
PRACTICAL ASSIGNMENTS
S y st e m a n d D e vi c e S e cu ri t y
PL1To s tu d y n e tw o rk / Sy s te m s ca n ni n g u s in g n m ap i n d et a il s .PL2
To s t u d y A R P C a ch e Po i s o ni n g , M IT M A t t a ck & a p p l yi n g i t s c ou n t e rm e a su r e s .PL3To st ud y I P Sp oo fi ng a nd D en ia l o f S er vi ce a tt ac k o n a w eb s er ve r & a pp ly in g i tscountermeasures.PL4To create a Trojan based application/utility to create backdoors on a system & a p p l yi n g i t s c o u n te r m ea s u r es .PL5To s t u d y C o de I n j e c t io n & a p p l yi n g i t s c o u nt e r me a s u re s .PL6C o n fi g u r in g I P Ta b l e s f ir e wa l l o n a L i n ux s y s te m .
PL7To c o nf i gu r e pr i ma r y an d s e co n da r y DN S S e rv er s a nd c o nf i gu r in g i t f or s e cu r eZone Transfer.PL8C o n fi g u r in g v a r io u s s e c ur i t y o p ti o n s a va i l a bl e i n a n A D S L M o d e mPL9C on f ig u ri n g S N OR T I D S o n a L i nu x s ys t em f o r g e ne ra t in g a l er t s f o r i n co m in gICMP traffic.PL10To study SELinux in a RHEL/Fedora Machine.
prospectus
33
-
7/27/2019 Prospectus Isc
38/72
34
prospectus
I S -C 2 -0 3: M o bi l e a n d W i re l es s N e tw o rk S ec u ri t yL e c t u re H o u r s: 6 0 H ou r sPractical Hours: 60Hours
O ut li ne o f t h e S yl la bu s
Sr.no T opic Minimum no. 0f hours
P a rt - I ( W ir e le s s T e ch n ol o gy )
1. Wireless Fundamentals 22. Wireless Network Logical Architecture 43. Wireless Network Physical Architecture 44. Wireless LAN Standard 4
P a rt - I I ( Se c ur i ty f o r Mo b il i ty )
5. PKI in Mobile Systems 26. Personal PKI 27. Smartcard as a Mobile Security Device 28. Secure Mobile Tokens-The Future 29. Universal Mobile Telecommunications System(UMTS)
Security 210. Securing Network Access in Future Mobile System 611. Security Issues in a MobileIPV6 Network 212. Mobile Code Issues 413. Secure Mobile Commerce 2
P a rt - II I ( Wi r el e ss N et w or k S e cu r it y )
14. Security in Traditional Wireless Network 215. Wireless LAN Security 216. Security in Wireless Ad-hoc Network 217. Implementing Basic Wireless Security 218. Implementing Advanced Wireless Security 2
P a r t - IV ( O t he r W i r el e s s T e c h no l o gy )
19. Home Network Security 220. Wireless Embedded System Security 221. RFI D Security 222. Security Issues in Single Hop Wireless Networks 223. S e c ur i t y I s s u es i n M u l t i H o p W i r e le s s N e t wo r k s 4
-
7/27/2019 Prospectus Isc
39/72
35
prospectus
D e t ai l e d S y l la b u s P a rt - I ( W ir e le ss T e ch no l og y )
Wireless Medium: Radio Propagation Effects, Exposed Terminal Problem, Bandwidth, WirelessN e tw o rk i ng B a si c s: W L AN , w or k in g o f W L AN , C ur r en t W LA N S t an d ar d .
O S I N e t wo r k M o d e l, N e t w o r k L a ye r Te c h no l o g ie s , D a t a L i n k L a y e r Te c h n ol o g i es , O p e r a ti n gS y s te m C o n si d e ra t i o n
Wired Network Topologies, Wireless Network Topologies, Wireless LAN Devices, Wireless PAND e v ic e s , W i re l e s s M AN D e v ic e s
T H E 8 0 2. 1 1 W L AN S t an d ar d s, 8 0 2. 1 1 M AC L a ye r, 8 0 2. 1 1 P H Y L a ye r, 8 0 2. 1 1 E n ha n ce me n ts ,o th er W LA N S ta nd ar d
P a rt - II ( S ec u ri t y f o r M o bi l it y )
P K I o v er v i e w, P K I i n c u rr e n t Mo b i l e S y st e m s, P K I i n F u tu r e M ob i l e Sy s t em
I s s ue s i n P er s o n al P K I , P e rs o n a l P K I r e q ui r e m en t , P er s o na l C A s , D e v ic e I n i t i al i z a ti o n , P r o of o f possession, Revocation in Personal PKIs
S t o ra g e c a r ds a n d P r o ce s s or c a r d s, S t a n d a rd i z a ti o n d a t a o bj e c t s an d c o m ma n d s , S ma r t c ar d sa n d b i om e tr i cs
Security Modules, Current use of Security Modules, Security Module Technology, Current useo f s e c ur e m ob i l e t ok e n s, P e rs o n a l S e c u ri t y t ok e ns
B u i l di n g a G S M S e c u ri t y, U M T S a c c es s s e c u r it y, N e t w o r k S e c ur i t y, I P M u l ti m e d ia S u b s y s t emSecurity
O u t l in e o f S e c u ri t y A r c h it e c tu r e , D e s ig n a lt e r n at i v es f o r a u t h en t i c at i o n a n d e s t a bl i s h me n t of Security association, IP Layer Security, Link Layer Security, Network Security options
Introduction to Mobile IP, MobileIPV6 Security Mechanisms, AAA (authorization,a u t h en t i c at i o n a nd a c c o un t i n g) r e q u ir e m en t s f o r M o b il e I P
Agent and Multi-agent Systems, Security Implication, Security Measures for Mobile Agents,S e c u ri t y I ss u e s fo r D o wn l o a de d c o d e in M o b il e p h o ne s
M - C om m e rc e a nd i t s s e c ur i t y c h a l le n g e s, S e cu r i t y o f t h e r a d io i n te r f a ce , S ec u r it y of m -commerce
1 . W i re l es s F u nd a me nt a ls 2 h ou r s
2 . W i r el e s s N e t wo r k i ng L o g ic a l A r c h it e c t ur e 4 h o ur s
3 . W i re l es s N e tw o rk P h ys i ca l A r ch i te c tu r e 4 h ou r s
4 . W ir el es s L AN S ta nd ar d 4 ho ur s
5.PKI in Mobile Systems 2hours
6 . P e rs o n al P K I 2 h ou r s
7 . S ma rt ca rd a s a M ob il e S ec ur it y D ev ic e 2 ho ur s
8 .S ec ur e M ob il e T ok en s- Th e F ut ur e 2 ho ur s
9 . U n iv e r s al M o b il e T e l ec o m mu n i c at i o n S y s te m S e c ur i t y 2 h o ur s
1 0. Se cu ri ng N et wo rk A cc es s i n F ut ur e M ob il e S ys te m 6 ho ur s
1 1. Se cu ri ty I ss ue s i n a M ob il e I PV 6 N et wo rk 2 ho ur s
1 2. Mo bi le C od e I ss ue s 4 ho ur s
1 3. S ec u re M o bi l e C om m er c e 2 h ou r s
-
7/27/2019 Prospectus Isc
40/72
36
prospectus
P a rt - II I ( W ir e le ss N e tw o rk S e cu ri t y)
Security in First Generation TWNs, Security in Second Generation TWNs, Security in 2.5 GenerationTWNs, Security in 3G TWNs
Key Establishment, Anonymity, Authentication, Confidentiality, Data Integrity and Loopholes in802.11
Bluetooth: Basics, Security Modes, Key Establishment, Authentication, Confidentiality, IntegrityProtection, Enhancements
Enabling Security Features on a Linksys WAP 11802.11b Access, Filtering by MAC Address, EnablingS e c u ri t y F e at u r es o n a L i n k s y s W RT 5 4 G 8 0 2 . 11 b / g , C o n fi g u r in g S e c u ri t y F e at u r e s o n W ir e l e ssClients
I m p l em e n t in g W i F i P r o te c t e d A c c e ss ( W PA ) , I m p l em e n ti n g a W i r el e s s G a t e wa y w i t h R ee f E d g e ,I m pl e me n ti n g a V P N o n a L i nk s ys W R V5 4 G V PN B r oa d ba n d
P a r t -I V ( O t h er W i r el e s s T e c hn o l og y )
B a s ic s o f W i r el e s s S e c ur i t y, B a s i c s o f W i r el e s s S e c ur i t y M e as u r es , A d d i t i on a l H o t s po t S e c u r it yMeasures
Wireless Technologies, Bluetooth, ZigBee, Wireless Technologies and the Future
Introduction, RFID Radio Basics, RFID Architecture, Threat and Target Identification, Managemento f R F I D S e c u ri t y
C e l lu l a r N e t wo r k S ec u r i ty , A c ce s s Co n t r ol a n d R o am i n g I s s u es , M o bi l e I P Se c u ri t y, P er v as i v e
C om p ut i ng S e cu r it y
Mobile Adhoc Network Security, Trust Management and Routing Issues, Wireless SensorN e tw or k S e cu r it y, K e y M an a ge m en t , S yb i l A t ta c ks a n d L o ca t io n P r iv ac y, V e hi c ul a r N e tw o rkApplications and Security, Wireless Metropolitan Area Networks(e.g. 802.11b)
1 4 . S e c ur i t y i n T r a d it i o na l W i r el e s s N e t wo r k s 2 h o ur s
1 5. W ir el es s L AN S ec ur it y 2 ho ur s
1 6. S ec u ri t y i n W ir e le ss A d -h o c N e tw o rk 2 h ou r s
1 7 . Im p l em e n ti n g B a s ic W i r el e s s S e c ur i t y 2 h o ur s
1 8. I mp l em en t in g A d va n ce d W i re l es s S ec u ri t y 2 ho u rs
1 9. H om e N et wo rk S ec ur it y 2 ho ur s
2 0. W ir e le s s E m be d de d S y st e m S e cu ri t y 2 h ou r s
2 1. R F ID S ec u ri t y 2 h ou r s
2 2. Se cu ri ty I ss ue s i n S in gl e H op W ir el es s N et wo rk s 2h ou rs
2 3. S ec u ri t y I s su es i n M u lt i ho p W i re l es s N e tw o rk s 4 ho u rs
R e f er e n ce s :
D e t ai l e d R ef e r en c e s a r e p r ov i d ed i n t h e co u r se m a t er i a l t o b e gi v e n t o r e gi s t er e dcandidates.
-
7/27/2019 Prospectus Isc
41/72
prospectus
37
I S -C 2 -0 3 : M o bi l e a n d W i re l es s S e cu ri t y
Practical1To s t u d y i n st a l l a ti o n a n d C o n fi g u ra t i o n o f A c c es s P o in t .
Practical 2To st u dy W L AN S e tu p u s in g A D HO C m od e .Practical 3T