Vous êtes sur la page 1sur 2

SP105 – ICT Tools and Cyber Security

Course Learning Outcomes:


After successful completion of the course, students will be able to

 demonstrate the use of various ICT tools for effective knowledge presentation and
information sharing
 exhibit the knowledge about the components and basic terms used for the internet
access, privacy concerns and security

Syllabus

SYLLABUS FOR SP105 – ICT TOOLS AND CYBER SECURITY Teaching


Hours

Unit I – ICT Tools [18]


Internet as Learning tool: Introduction to various online learning resources namely
tutorial point, slide share, Wikipedia, w3schools, Ted talk, stack overflow

Search Engines: Introduction to various search engines like google, Bing, Yahoo,
ask.com, baidu, duckduckgo and yandex
Using symbols for effective search: Use of special symbols, features of search engine
for unique specific terms, dropping unnecessary suffix, wildcard characters and
operators for effective searching; advanced search options; searching technical
articles through google scholar
User Profiling by search engines and their effects, dangers of Internet Search

Online learning resources: Awareness about Massive Open Online Courses through
courseware available on Coursera, Udacity, edX etc.

Sharing and Collaboration Tools: Introducing various blogging platforms, Creation


of blogs through wordpress, theme based blog design; insert text, images, videos etc.
Introduction to forums and how to post a question, how to choose relevant forums
and use them for domain specific searching
Collaborative resource sharing through Google sheets, Google docs, sheets/docs,
Inviting collaborators and assigning roles, activity log, inserting form and
commenting on google sheets

Teaching-learning tools:
Google Classroom: Creating and collaborating through google classroom, Inviting
collaborators and assigning roles, assignment submission through google classroom
Peer Collaboration platforms: Introduction to platforms like Research-gate,
Academia, LinkedIn etc. and their significance, creation of account, importance of
profile creation, effective profile creation, importance of endorsement, search and
follow people working in domain of interest

Information development and Management Tools: Introduction to mindomo,


evernote, Teamweek, resourceguru, float, hubplanner; google sites (creation and
designing options)

Information Analysis Tool: Introduction to spreadsheets, formatting options,


conditional formatting, formula, symbols, formula with referencing, referencing to
other spread sheets, functions, Plotting & reading graph: Introduction to different
types of graphs and charts, reading data presented as graph, creating appropriate graph
in open source office based on given data and target of analysis, Using tables & graphs
for presentation

Presentation tools: Creating presentations through open-source office, introduction


to creative presentation software like prezi

Audio-video resource creation tools: animoto, memoo, stupflix, audio slide show
through photopeach, easyvideo, goanimate; Designing diagrams through Dia

Unit II – Cyber Security [12]


Internet and Cyber Security: Working of Internet, Wi-Fi, Mobile Networks, Basic
Networking devices, Basics of security

Attacks and prevention


Introduction to Spywares, Detection Escapism, Invading Privacy, Hijacking home
page and search pages, working of key-loggers and root-kits, working of anti-
spyware, Websites and privacy, Dangers of Internet Search, Phishing Attacks:
Working of Phishing, following phishing money trail, protection against phishing
attacks, Zombies and Trojan Horses, Security Dangers in Browsers, Worms and
viruses, Wi-Fi security dangers and protections, Working of Spam, Denial of Service
Attacks and Protection

Self-Study
The self-study components of the syllabus will be declared at the commencement of the
semester. Around 10% of the questions will be asked from self-study content.

Topics/content for self-study are as listed below:


1. Social Engineering and its dangers
2. Working of dialers

Students are expected to study above mentioned topics on their own. These topics will not be
taught in the classroom. Students should refer to books available in the library for the same.

References
1. Preston Gralla, How Personal and Internet Security Work,Que Publications
2. Stallings, William. Cryptography and network security: principles and practice.
Pearson Education India, 2003.
3. Alfred Basta and Wolf Halton, Computer Security Concepts, Issues and
Implementation, Cengage Learning
Note: The latest edition of books should be referred.

Vous aimerez peut-être aussi