The Students will be able
 ![]()  | 
											Essentials I & II: learn the general security concepts involved in maintaining a secure network computing environment,the nature and scope of today’s cybersecurity challenges, strategies for network defense & next-generation cybersecurity solutions. | 
 ![]()  | 
											Cyber Security Foundation:learn the fundamentals of cybersecurity, identify the concepts required to recognize and potentially mitigate attacks against enterprise networks & mission critical infrastructure. | 
 ![]()  | 
											Gateway I &II : Learn fundamental tenants of networking and concepts involved in maintaining a secure network computing environment. | 
The students will be able to
 ![]()  | 
											Essentials I : Formulate an industry-standard design to protect infrastructure against cybersecurity threats, Apply advanced filtering methodologies such as user, application, and content ID to protect against all known and unknown attack vectors,deploy a variety of security methodologies as well as technologies and concepts used for implementing a secure network environment. | 
 ![]()  | 
											Cyber Security Foundation:Apply the fundamentals of cybersecurity, identify the concepts required to recognize and potentially mitigate attacks against enterprise networks & mission critical infrastructure. | 
 ![]()  | 
											Gateway 1 : Demonstrate knowledge of interconnected technology in daily communication, Identify systems that need protection , Apply physical, logical, and virtual addressing to various sized networks through the use of subnet mask schemes. | 
 ![]()  | 
											Gateway II : Examine cybersecurity landscape environments, attack threat vectors, exposure, vulnerabilities, and risk factors, • Apply the knowledge and skills necessary to plan, design, implement, troubleshoot, and maintain network infrastructure environmentsn. | 
 ![]()  | 
											Essentials II:Demonstrate ability to assess and harden endpoints based on security policies, use advanced malware research and analysis to provide enhanced protection for enterprise networks, Examine mobile and cloud-based connection technologies. | 
Mohamed Sathak A J College of Engineering has partnered with CISCO, the world leaders in networking to establish 
										 the Networking Academy(NetAcad).
											Cisco Networking Academy is an IT skills and career building program which provides
											 
 ![]()  | 
											Unique hands-on learning experience in the latest networking, security, and cloud technologies using simulation tools | 
 ![]()  | 
											Professional certification recognized by employers worldwide | 
 ![]()  | 
											Career pathways to connect to an estimated eight million networking jobs around the world through Netacad | 
Courses Offered:
 ![]()  | 
											Network Essentials | 
 ![]()  | 
											Mobility Fundamentals | 
 ![]()  | 
											CCNA: Introduction to Networks | 
 ![]()  | 
											CCNA: Switching, Routing, and Wireless Essentials | 
 ![]()  | 
											CCNA: Enterprise Networking, Security and Automation OR Networking Courses | 
 ![]()  | 
											Security Courses | 
 ![]()  | 
											IoT & Data Analytics Courses | 
 ![]()  | 
											OS and IT Courses | 
 ![]()  | 
											Programming Courses | 
 ![]()  | 
											Entrepreneurship | 
Certifications:
 ![]()  | 
											CISCO Certified Network Associate | 
 ![]()  | 
											Implementing CISCO Enterprise Network Core Technologies | 
									  Fundamentals of cyber security  (4 hours)
									  Security trends – Legal, Ethical and Professional Aspects of Security,  Need for Security at Multiple levels, Security Policies – Model of network  security - OSI security architecture.
									  Cyber Security Concepts  (4  Hours)
									Classical encryption techniques: substitution techniques,  transposition techniques, steganography- Foundations of modern cryptography:  perfect security – information theory – product cryptosystem – cryptanalysis.  Essential Terminologies: CIA, Risks, Breaches, Threats, Attacks, Exploits.  Information Gathering (Social Engineering, Foot Printing & Scanning).
									  Lab session-1 (3 Hours)
									  Lab session using  Tools  like nmap, zenmap, Port Scanners, Network scanners.
									  Security algorithms (4 hours)
									  Asymmetric key Cryptography-Message Authentication, Digital  Signatures, Applications of Cryptography. Overview of Firewalls- Types of  Firewalls, User Management, VPN Security
									  Lab session-2 (3 Hours)
									  Calculate the message digest of a text using the SHA-1 algorithm.   
									  Infrastructure based security  (6 Hours)
									  Network packet Sniffing, Network Design Simulation. DOS/ DDOS attacks.  Asset Management and Audits, Vulnerabilities and Attacks. Intrusion detection  and Prevention Techniques, Host based Intrusion prevention Systems, Security  Information Management, Network Session Analysis, System Integrity  Validation   
									  Lab session-3 (3 Hours)
									  Implement the sniffing using any tool.      
									  Lab session-4 (3 Hours)
									  Demonstrate intrusion detection system (ids) using any tool eg. Snort  or any other s/w. 
									  Lab session-5 (3 Hours)
									  Automated Attack and Penetration Tools Exploring N-Stalker     
 
									  Malware  (6 Hours)
									  Explanation of Malware, Types of Malware: Virus, Worms, Trojans,  Rootkits, Robots, Adware’s, Spywares, Ransom wares, Zombies etc., OS Hardening  (Process Management, Memory Management, Task Management, Windows Registry/  services another configuration), Malware Analysis.     
 
									  Lab session-6  (6 Hours)
									  Building Trojans
									  a.  Defeating Malware
									  b. Rootkit  Hunter
Sources extracted from
									  1. Anna  University CNS Lab syllabus
									  2. AICTE  emerging technology syllabus
									3. IGNOU security certificate c



