The document outlines the course outcomes and practical sessions for a Cyber Security and Cyber Laws semester 6 course. It details 10 practical sessions covering topics like port scanning, vulnerability assessment, firewall configuration, cyber forensics, and cryptography.
The document outlines the course outcomes and practical sessions for a Cyber Security and Cyber Laws semester 6 course. It details 10 practical sessions covering topics like port scanning, vulnerability assessment, firewall configuration, cyber forensics, and cryptography.
The document outlines the course outcomes and practical sessions for a Cyber Security and Cyber Laws semester 6 course. It details 10 practical sessions covering topics like port scanning, vulnerability assessment, firewall configuration, cyber forensics, and cryptography.
The document outlines the course outcomes and practical sessions for a Cyber Security and Cyber Laws semester 6 course. It details 10 practical sessions covering topics like port scanning, vulnerability assessment, firewall configuration, cyber forensics, and cryptography.
Charotar University of Science and Technology (CHARUSAT)
Faculty of Technology and Engineering (FTE)
Department of Computer Science & Engineering
Subject Name: Cyber Security and Cyber Laws Semester: 6
Subject Code: CS383 Academic year: 2023-2024 Course Outcomes (Cos): At the end of the course, the students will be able to CO1 After learning the course, students should be able to learn about cyber-attack, types of cybercrimes CO2 Learn cyber security vulnerabilities and security safeguards. CO3 Learn hands-on how to prevent the web using different web application tools. CO4 Learn about how to protect the network using different network tools and Intrusion detection and prevention techniques, CO5 Learn the basis of Cryptography and network security CO6 Understand cyber laws CO7 Learn about cyber forensics and investigation of information hiding. CO8 Learn about how to protect themself and ultimately society from cyber-attacks.
Sr. Name of Practical Hrs CO’s
No.: 1. Perform 5 different types of (port) scanning using nmap on a 2 1 single port capture the packets using Wireshark and analyze the output. 2. Perform a Vulnerability Scan on a system within the Local Area 2 2 Network and Submit the report 3. Implementation to identify web vulnerabilities, using the 2 2,3,4 OWASP project 4. Implementation of Windows/Linux security using a 4 1,2 firewall A. Block ICMP ping using OUTPUT chain and echo- reply. B. Setup SPI Firewall that a. Allow all outgoing connections. b. Block all unwanted incoming connections. 5. Configure a Windows FTP server for user-based access. Capture 4 3,4 packets while you connect to the FTP server and log in. Find the packet that shows the username and password. Capture packets and observe the results. 6. Implementation to gather information from any PC connected 2 1,2,5 to the LAN using whois, port scanners, network scanning, IP scanners etc. 7. Set up a Virtual lab environment with Windows XP (SP1), 4 3,4,5 Metasploitable OS, and BRICKS/DVWA web server and an Attacker machine (KALI/BT) in virtual machines (network in NAT mode). Now carry out Vulnerability assessment in the environment a. Network VA/PT i. Find the open ports in the domain. ii. Find out the hosts in domains. iii. Find out the services running on domains and their versions. iv. Banner Grabbing of server. v. Find out default vulnerabilities in Services. vi. Exploit the vulnerabilities. vii. Deploy and maintain the backdoor. b. Web VA/PT i. Find the domain information. ii. Find the details of the server and its default vulnerabilities. iii. Perform automated testing using BurpSuite or ZAP proxies. Tools: nmap, netcat, Netcraft, nslookup, whois, dig, ping, Nessus, Metasploit, FOCA. 8. Gather information on any domain/website/IP address using 2 3,4,5,8 the following information-gathering tools. 1. Samspade 2. Nslookup 3. Whois 4. Tracert 9 Create a remote connection using open SSH. 2 5 10 Perform Live / Memory Analysis on a Linux OS and prepare a 2 4,5 detailed report.