ISIT Syllabus - Detailed Index
**Index of ISIT Syllabus**
### 1. Introduction and Security Trends (6 Periods)
- Need for security
- Security principles
- Authentication
- Access control
#### 1.2 Threats to Security
- Viruses and Worms
- Intruders, Insiders
- Criminal organizations
- Terrorists
- Information Warfare (IW)
- Avenues of attack
- Steps in attack
#### 1.3 Types of Attack
- Active and Passive attacks
- Denial of service
- Backdoors and trapdoors
- Sniffing, Spoofing
- Man in the Middle
- Replay
- TCP/IP Hacking
Page 1
ISIT Syllabus - Detailed Index
- Encryption attacks
- Malware: Viruses, Logic Bombs
### 2. Organizational/Operational Security (7 Periods)
#### 2.1 Role of People in Security
- Password selection
- Piggybacking
- Shoulder surfing
- Dumpster diving
- Installing unauthorized software/hardware
- Access by non-employees
- Security awareness
- Individual user responsibilities
#### 2.2 Physical Security
- Access controls (Biometrics: Fingerprints, Handprints, Retina, Patterns, Voice Patterns)
- Signature and writing patterns
- Keystrokes and physical barriers
#### 2.3 Network Security Basics
- Model for network security
### 3. Cryptography and Public Key Infrastructure (13 Periods)
#### 3.1 Introduction
- Cryptography
Page 2
ISIT Syllabus - Detailed Index
- Cryptanalysis
- Cryptology
- Substitution techniques:
- Caesar's cipher
- Monoalphabetic and polyalphabetic transposition techniques:
- Rail Fence technique
- Simple Columnar
- Steganography
#### 3.2 Hashing
- Concept
#### 3.3 Symmetric and Asymmetric Cryptography
- Symmetric Encryption: DES (Data Encryption Standard) Algorithm
- Diffie-Hellman Algorithm
- Problem of key distribution
- Asymmetric Key Cryptography
- Digital Signature, Key escrow
#### 3.4 Public Key Encryption
- Basics
- Digital certificates
- Certificate authorities
- Registration authorities
- Steps for obtaining a digital certificate
Page 3
ISIT Syllabus - Detailed Index
- Steps for verifying authenticity and integrity of a certificate
### 4. Network Security (8 Periods)
#### 4.1 Firewalls
- Concept
- Design
- Principles
- Limitations
- Trusted System
- Kerberos Concept
#### 4.2 Security Topologies
- Security Zones
- DMZ
- Internet
- Intranet
- VLAN
- Security Implications
- Tunneling
#### 4.3 IP Security (IPSec)
- Overview
- Architecture
- IPSec Configuration
- IPSec Security
Page 4
ISIT Syllabus - Detailed Index
#### 4.4 Virtual Private Network (VPN)
#### 4.5 Email Security
- Email Security Standards:
- Working principles of SMTP, PEM, PGP, S/MIME, Spam
### 5. System Security (8 Periods)
#### 5.1 Intruders
- Intrusion Detection System (IDS)
- Host-based IDS
- Network-based IDS
#### 5.2 Password Management
- Vulnerability of passwords
- Password selection strategies
- Components of good passwords
#### 5.3 Operating System Security
- Operating System Hardening
- General Steps for Securing Windows Operating System
- Hardening UNIX/Linux-based Operating Systems
- Updates:
- Hot Fix
- Patch
Page 5
ISIT Syllabus - Detailed Index
- Service Pack
### 6. Application and Web Security (6 Periods)
#### 6.1 Application Hardening
- Application Patches
- Web Servers
- Active Directory
#### 6.2 Web Security Threats
- Web Traffic Security Approaches
- Secure Socket Layer and Transport Layer Security
- Secure Electronic Transaction Software Development:
- Secure Code Techniques
- Buffer Overflow
- Code Injection
- Least Privilege
- Good Practices
- Testing
### 7. IT Laws (8 Periods)
#### 7.1 Information Security Standards
- ISO
- IT Act
- Copyright Act
- Patent Law
Page 6
ISIT Syllabus - Detailed Index
- IPR
- Cyber Laws in India
- IT Act 2000 Provisions and Latest Amendments
#### 7.2 Intellectual Property Law
- Copy Right Law
- Software License
- Semiconductor Law
- Patent Law
Page 7