MTech - Syllabus - Final 2.0
MTech - Syllabus - Final 2.0
MTech - Syllabus - Final 2.0
Page 1 of 23
Contents
Page 2 of 23
Detailed Course Structure
Subject L-T-P Credits
Semester I
CBM 511 Mathematical Foundations for Cyber 2-0-0 2
Security
DSC 512 Programming and Data Structures 2-0-2 3
CBM 513 Computer Networks and Security 2-0-2 3
Semester II
CBM 521 Secure Software Engineering / Digital 2-0-0 2
Forensics
CBM 522 Information Security and Applied 2-0-2 3
Cryptography
CBM 524 AI, Machine Learning and Security / 2-0-2 3
Decision Support and Artificial
Intelligence
Semester III
CBM 611 Operating System Security / Cloud 2-0-2 3
Computing and Security
CBM 612 Advanced Database Security /Secure 2-0-2 3
Hardware Design
CBM 614 Blockchain Architecture and Applications 2-0-2 3
/ Network, Wireless, IOT, Mobile &
Security
Semester IV
CBM 621 Forensics, Malware, and Penetration 3-0-2 4
Testing / Intrusion Detection Systems and
Firewall
CBM 622 Legal Aspects of Computing / 2-0-0 2
Information Security Policies, Security
Standards, Audits, Cyber Ethics, Privacy
and Legal Issues
CBM 623 Criminal Psychology and Behaviour 1-0-0 1
Intelligence
Semester V
CBE 711 Project (Stage 1) 14
Semester VI
CBE 721 Project (Stage 2) 14
Total Credits 60
Page 3 of 23
CURRICULUM
SEMESTER I
CBM 511 MATHEMATICAL FOUNDATIONS FOR CYBER SECURITY [2-0-0-2]
Students are expected to have knowledge in basic linear algebra, probability theory, set theory and
logic.
Course Objectives
Expected Outcome
Page 4 of 23
Reference Books
1. Papoulis A, Pillai SU. Probability, Random Variables, and Stochastic Processes. Tata
McGraw-Hill Education, 2002.
2. Niven I, Zuckerman HS, Montgomery HL. An introduction to the theory of numbers. John
Wiley & Sons, 1991.
3. Lewis, Harry, and Rachel Zax. Essential discrete mathematics for computer science.
Princeton University Press, 2019.
4. Stinson, Douglas Robert, and Maura Paterson. Cryptography: theory and practice. CRC
press, 2018.
5. Vince, John. Foundation Mathematics for Computer Science. Springer International
Publishing, Switzerland, 2015.
6. Montgomery, Douglas C., and George C. Runger. Applied statistics and probability for
engineers. Seventh Edition, John Wiley & Sons, 2018.
7. Gross, Jonathan L., and Jay Yellen. Graph theory and its applications. CRC press, 2005.
Research Papers
Page 5 of 23
DSC 512 PROGRAMMING AND DATA STRUCTURE [2-0-2-3]
Course Objectives
The course is intended to provide the foundations of the practical implementation and usage of
Algorithms and Data Structures. One objective is to ensure that the student evolves into a
competent programmer capable of designing and analysing implementations of algorithms and
data structures for different kinds of problems. The second objective is to expose the student to
the algorithm analysis techniques, to the theory of reductions, and to the classification of problems
into complexity classes like NP.
Course Outcomes
Learning Resources
Page 6 of 23
CBM 513 COMPUTER NETWORKS AND SECURITY [2-0-2-3]
No prerequisite courses. However, please consult the instructor if you are not sure about the
programming requirement.
Course Objectives
Expected Outcome
Page 7 of 23
Introduction to Network Security, Need for Network Security, Network Security Fundamentals,
Principles of Security, Working of internet and DNS Vulnerabilities, Secure Network
Communication.
Malware, Insider Attack and Defence, Computer Virus Types and Defence, Computer Worms,
Rootkits, Botnet, Denial of Service Attack.
Need For Physical Security, User Authentication Technologies, Environmental Attacks and
Accidents, Firewall, Intrusion Detection System, Honeypot, Tunnelling, Virtual Private Network,
Privacy Preserving Communication, Anonymity, Onion Routing.
Reference Books
Page 8 of 23
SEMESTER II
CBM 521 SECURE SOFTWARE ENGINEERING [2-0-0-2]
Course Objectives
1. Design and implementation of secure software
2. Introduce the role of security in the development lifecycle
3. To design secure software
4. To learn methodological approaches to improving software security during different
phases of software development lifecycle
5. To know best security programming practices
Expected Outcome
Students who successfully complete this course will be able to:-
1. Explain terms used in secured software development and life cycle process
2. Incorporate requirements into secured software development process and test software
for security vulnerability
3. Identify vulnerable code in implemented software and describe attack consequences
4. Apply mitigation and implementation practices to construct attack resistant software
5. Apply secure design principles for developing attack resistant software
Introduction & Motivation: Hacker vs. Cracker, Historical Background, Mode of Ethical Hacking,
Hacker Motive, Gathering Information, Secure Software, Compliance Requirements, C-Level
Language, Assets, Threats and Risks, Security Requirements, Confidentiality, Integrity,
Availability
Secure Software Development Methodologies: Secure Software Development Lifecycle
(SSDLC), Guidelines for Secure Software, SD-3 Principles, Security Practices, Secure coding
standards, OWASP, ISO15408, Common Criteria (CC), build-insecurity
Requirements Engineering: Availability, Authenticity, Confidentiality, Efficiency, Integrity,
Maintainability, Portability, Reliability, Requirements Engineering, Trustworthiness, Threat
Analysis and Risk Management
Secure Architectural Design: Threat Modelling, Asset, Threat, Attack, Dataflow Diagram (DFD),
Threat Tree (Attack Tree), STRIDE, DREAD. Security Architecture, Software Attack Surface,
Secure, Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-based
Access Control (RBAC), Access Matrix
Secure Coding and Security Testing: Introduction to Vulnerabilities, Vulnerability Patterns,
Page 9 of 23
Secure Coding Practices, Code Checking, Tools, Cross Site Scripting, Injection Flaws, Cross Site
Request Forgery, Denial of Service, Test Cases, Security Test Plan, White Box Test, Black Box
Test, Penetration Testing, Code Review, Test Report
Secure Deployment: Secure Default Configuration, Product Life Cycle, Automated Deployment
Process, Secure Target Environment, Secure Delivery of Code, Trusted Origin, Code Signing,
Least Privilege Permissions, ITIL Release and Deployment Management
Security Response: Security Response, Security Bulletins, Vulnerabilities, Security Patches,
Disclosure, Responsible Disclosure, Patch Tuesday, Security Response Policy, Security Response
Process, Common Vulnerability Scoring System, CVSS
Code & Resource Protection: Introduction to Back Door, Time Bomb, Four-Eyes Principle,
Confidentiality Classification, Background Screening, Security Clearance, Offline and Online
Licensing, Mechanisms, Code Obfuscation
Reference Books
1. Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw and Nancy Mead Software
Security Engineering: A Guide for Project Managers by. Addison-Wesley, (2004).
2. Gary McGraw, Software Security: Building Security, Addison-Wesley (2006).
3. Threat Modelling: Designing for Security by Adam Shostack, John Wiley and Sons Inc.
4. Mano Paul ,7 Qualities of Highly secure Software Taylor and Francis, CRC Press (2012)
5. Mark Merkow and Lakshmikanth Raghavan, Secure and Resilient Software, CRC Press,
ISBN 9781439826973.
Course Objectives
Page 10 of 23
Expected Outcome
Reference Books
1. William Stallings, Cryptography and Network Security –6th Edition, Pearson Education.
2. Behrouz A. Forouzan, Debdeep Mukhopadhyay, Cryptography and Network
Security, 5nd Edition, Mc Graw Hill Education.
3. Rich Helton, Johennie Helton, Mastering Java Security: Cryptography Algorithms and
Practices, John Wiley Publishers.
4. Charles P. Pleeger, “Security in Computing”, Pearson Education Asia, 5th Edition.
5. William Stallings, “Network Security Essentials: Applications and standards”,
Person Education Asia.
6. Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security: Private
Communication in a public world”, Prentice Hall India, 6th Edition.
Page 11 of 23
CBM 523 DECISION SUPPORT AND ARTIFICIAL INTELLIGENCE [2-0-2-3]
Course Objectives
Expected Outcome
Introduction: data science, data analytics, machine learning, and Artificial Intelligence.
Programming in Python, Basics of manipulation of Data. Introduction to modern data analysis
(Data visualization; probability; histograms; multinomial distributions),
Artificial Intelligence in Cyber Security: Model Stealing & Watermarking, Network Traffic
Analysis, Network Traffic Analysis
Reference Books
Page 12 of 23
CBM 524 AI, MACHINE LEARNING AND SECURITY [2-0-2-3]
Course Objectives
Reference Books
Page 13 of 23
SEMESTER III
CBM 611 OPERATING SYSTEM SECURITY [2-0-2-3]
Course Objectives
Expected Outcome
Page 14 of 23
Reference Books
1. Andrew S. Tanenbaum, Modern Operating Systems, Third Edition, Prentice Hall, 2007.
2. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, Operating System Concepts
3. with Java”, Eighth Edition, Wiley, 2008.
4. Trent Jaeger, Operating System Security, Synthesis Lectures on Information Security,
5. Privacy and Trust, Morgan and Claypool, 2008.
6. C. P. Pfleeger and S. L. Pfleeger, Security in Computing, Prentice Hall Professional, 2003.
7. W. Mauerer, Professional Linux Kernel Architecture, Wiley, 2008.
8. D. P. Bovet and M.Cesati, Understanding the Linux Kernel, Third Edition, O'Reilly Media,
Inc., 2005.
Course Objectives
Expected Outcome
Page 15 of 23
Database security methods and techniques- Access control to database objects: tables, attributes,
records. Triggers, views, data masking. Cryptographic methods of protection. Escaping queries
to a database. Change Tracking. Data integrity in the databases. Database backups.
Security features in databases- SQL statements for access control. Integrity (domain, attributes,
tables, referential). Database monitoring tools.
Database security analysis tools- An overview of the main methods for analyzing database
security. SQL injections. Database security scanners. Writing your own security analysis tools.
References Books
1. Basta A., Zgola M, “Database Security” 3nd Edition, Cengage Learning, US, 2011
2. Ron Ben Natan, “Implementing database security and auditing”, Digital Press, 2005.
3. Bhavani Thuraisingham, Database and Applications Security, Auerbach
Publications, 2005.
4. Rose Anderson, Security Engineering: A Guide to Building Dependable Distributed
Systems, John Wiley & Sons, 2001.
5. Michael Gertz, Sushil Jajodia, Handbook of Database Security Applications and
Trends, Springer, 2008.
6. Silvana Castano, Database Security, ACM Press. Alfred Basta, Melissa Zgola, Database
Security, Cengage Learning.
Course Objectives
Expected Outcome
Page 16 of 23
4. Demonstrate proficiencies in applying cryptography and security primitives to address
hardware security issues.
5. Demonstrate critical thinking and analytical skills through a summary and evaluation of
an open hardware security problem.
Introduction - Hardware Security & Trust, Security & Protection Objectives, Why choose
hardware? - Performance, Protection Environment, Scalability
Security by design- Physical or implementation attacks- Side-channel attacks- Hardware reverse
engineering attacks- Hardware Trojans.
FPGAs - FPGA Versus Software Programming: Why, When, and How?, High-Level Synthesis,
High-Level Synthesis Solutions for FPGAs.
The role of cryptography- Modern Cryptography: PKE, RSA, AES, SIMON, Working together
Useful Hardware Security Primitives: Cryptographic Hardware and their Implementation,
Optimization of Cryptographic Hardware on FPGA, Physically Unclonable Functions (PUFs),
PUF Implementations.
Side-channel Attacks on Cryptographic Hardware: Basic Idea, Current-measurement based Side-
channel Attacks (Case Study: Kocher’s Attack on DES), Design Techniques to Prevent Side-
channel Attacks, Cache Attacks.
Hardware Trojans: Hardware Trojan Nomenclature and Operating Modes, Countermeasures Such
as Design and Manufacturing Techniques to Prevent/Detect Hardware Trojans, Logic Testing and
Side-channel Analysis based Techniques for Trojan Detection, Impact of Hardware Security
Compromise on Public Infrastructure, Defense Techniques.
Reference Books
Page 17 of 23
CBM 614 BLOCKCHAIN ARCHITECTURE AND APPLICATIONS [2-0-2-3]
Course Objectives
Expected Outcome
Reference Books
1. Baxv Kevin Werbach, The Blockchain and the new architecture of Trust, MIT Press,
2018
2. Joseph J. Bambara and Paul R. Allen, Blockchain – A practical guide to developing
business, law, and technology solutions, McGraw Hill, 2018.
3. Joseph J. Bambara and Paul R. Allen, Blockchain, IoT, and AI: Using the power of
three to develop business, technical, and legal solutions, Barnes & Noble publishers,
2018.
4. Melanie Swan, Blockchain – Blueprint for a new economy, OReilly publishers,
2018.
Page 18 of 23
5. Jai Singh Arun, Jerry Cuomo, Nitin Gaur, Blockchain for Business, Pearson
publishers, 2019.
6. Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System.
Page 19 of 23
SEMESTER IV
CBM 621 FORENSICS, MALWARE, AND PENETRATION TESTING [3-0-2-4]
Student should have a passing Grade in CBM 513 (Computer Networks and Security) and CBM
522 (Information Security and Applied Cryptography) or the instructor’s approval.
Course Objectives
Expected Outcome
Introduction and Information Security Overview, Hacking and Ethical hacking concepts, Hacker
behaviour & mindset, Hacking Methodology.
Footprinting Concepts and Methodology, Footprinting Tools and Countermeasures, Active and
Passive Sniffing, Network Scanning Concepts and Tools, Preparation of Ethical Hacking and
Penetration Test Reports and Documents.
Social Engineering attacks and countermeasures, Password attacks, Privilege Escalation and
Executing Applications, Network Infrastructure Vulnerabilities, IP spoofing, DNS spoofing.
DoS attacks. Web server and application vulnerabilities, SQL injection attacks, Vulnerability
Analysis and Reverse Engineering, Buffer overflow attacks. Client-side browser exploits,
privilege escalation.
Metasploit framework, Metasploit Console, Payloads, Metrpreter, Introduction to Armitage,
Introduction to penetration testing tools in Kali Linux.
Page 20 of 23
Reference Books
1. Baloch, R., Ethical Hacking and Penetration Testing Guide, Auerbach Publications, CRC
Press, 2015.
2. David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni, Metasploit: The
Penetration Tester's Guide, No Starch Press, 2011, ISBN: 159327288X,9781593272883.
3. Sagar Rahalkar, Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and
Metasploit, 1st Edition, Apress publications, 2019, Softcover ISBN: 978-1-4842-4269-8.
4. Christopher Hadnagy, Social Engineering: The Science of Human Hacking, 2nd Edition,
Wiley Publisher, 2018, ISBN-13: 978-1119433385.
5. Glen D. Singh, Learn Kali Linux 2019: Perform Powerful Penetration Testing Using Kali
Linux, Metasploit, Nessus, Nmap, And Wireshark, Packt Publishing, 2019, ISBN:
1789611806.
6. Michael Hixon, Justin Hutchens, Kali Linux. Network Scanning Cookbook, Packt
Publishing, 2017, ISBN: 139781787287907
None.
Course Objectives
The course deals with all the aspects of Cyber law as per Indian/IT act. It also covers overview of
Intellectual Property Right and Trademark Related laws with respect to Cyber Space.
Expected Outcome
Students who successfully complete this course will be able to demonstrate a critical
understanding of the Cyber law with respect to Indian IT/Act and Intellectual Property Rights.
Cyber Crimes Categories and kinds, Evolution of the IT Act, IT Act, 2000, various authorities
under IT Act and their powers. Penalties & Offences, amendments.
Case Laws on Cyber Space Jurisdiction and Jurisdiction issues under IT Act, E –commerce and
Laws in India, Digital / Electronic Signature in Indian Laws.
Page 21 of 23
Intellectual Property Rights, Domain Names and Trademark Disputes, Copyright in Computer
Programmes, Concept of Patent Right, Sensitive Personal Data or Information in Cyber Law,
Cyber Law an International Perspective.
Reference Books
1. Sushma Arora, Raman Arora, Cyber Crimes & Laws, 4th Edition 2021, Publisher:
Taxmann, ISBN-10: 9390712491
2. N S Nappinai, Technology Laws Decoded, 1st Edition, Publisher: Lexis Nexis, ISBN:
9789350359723
3. Suresh T. Vishwanathan, The Indian Cyber Law, Bharat Law House New Delhi
4. P.M. Bukshi and R.K. Suri, Guide to Cyber and E –Commerce Laws, Bharat Law House,
New Delhi
5. Rodney D. Ryder, Guide to Cyber Laws; Wadhwa and Company, Nagpur
6. The Information Technology Act, 2000; Bare Act –Professional Book Publishers, New
Delhi
None.
Course Objectives
Expected Outcome
Students who successfully complete this course should have a comprehensive understanding of
Criminal Behaviour and Psychological aspects of various crimes.
Nature and History of Criminal and Forensic Psychology, Social context of Crime: Extent of
Criminality, Changing nature of Crime: Conservative and Radical interpretations in complexity
of victimization.
Page 22 of 23
Types of Offenders, Violent Offenders: Media influences and Research Statistics, Theories of
Homicide: Psychological disposition, Socio-Biological theory and Multi-Factorial Approach.
Mental Illness and Crime: Problem of evidence; Mental illness and Crime in general.
Eyewitness Testimony: Accuracy of witness evidence in Court, Witness confidence and
improving the validity of line-up, Clinical approaches in Risk and danger assessment.
Reference Books
1. Dennis Howitt, Introduction to Forensic and Criminal Psychology, 6th Edition, Publisher:
Pearson, 2018
2. Wayne Petherick Brent Turvey Claire Ferguson, Forensic Criminology, 1st Edition,
Publisher: Elseiver, ISBN: 9780123750716
3. Bruce Arrigo Stacey Shipley, Introduction to Forensic Psychology, 2nd Edition, Publisher:
Academic press, ISBN: 9780080468532
Page 23 of 23