Course Name: 

Cybersecurity (IT471)


B.Tech (AI)


Programme Specific Electives (PSE)

Credits (L-T-P): 

(3-0-2) 4


Digital Securities: Introduction, Types of Attacks, Digital Privacy, Online Tracking, Privacy Laws, Types of Computer Security risks ( Malware, Hacking, Pharming, Phishing, Ransomware, Adware and Spyware, Trojan, Virus, Worms, WIFI Eavesdropping, Scareware, Distributed Denial-Of-Service Attack, Rootkits, Juice Jacking), Antivirus and Other Security solution, Password, Secure online browsing, Email Security, Social Engineering, Secure WIFI settings, Track yourself online, Cloud storage security, IoT security, Physical Security Threads. Online Anonymity: Anonymous Networks, Tor Network, I2P Network, Freenet, Darknet, Anonymous OS – Tails, Secure File Sharing, VPN, Proxy Server, Connection Leak Testing, Secure Search Engine, Web Browser Privacy Configuration, Anonymous Payment: Cryptography and Secure Communication: The Difference Between Encryption and Cryptography, Cryptographic Functions, Cryptographic Types, Digital Signature, The Difference Between Digital Signatures and Electronic Signatures, Cryptographic Systems Trust Models, Create a Cryptographic Key Pair Using Gpg4win/gpg4usb, Disk Encryption Using Windows BitLocker, Disk Encryption Using Open Source Tools, Multitask Encryption Tools, Attacking Cryptographic Systems, Countermeasures Against Cryptography Attacks, Securing Data in Transit, Cloud Storage Encryption, Encrypt DNS Traffic and Email communication, Secure IM and video calls. Cyber Crime Issues and Investigation: Unauthorized Access, Computer Intrusions, White collar Crimes, Viruses and Malicious Code, Internet Hacking and Cracking, Virus Attacks, Pornography, Software Piracy, Intellectual Property, Mail Bombs, Exploitation, Stalking and Obscenity in Internet, Digital laws and legislation, Law Enforcement Roles and Responses, Investigation Tools, eDiscovery, EDRM Model, Digital Evidence Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery, Hands on Case Studies, Search and Seizure of Computers, Recovering Deleted Evidences, Password Cracking.


Nihad Hassan, Rami Hijazi, “Digital Privacy and Security Using Windows: A Practical Guide” Apress.
“Network Security Essentials”, William Stallings, 4th Edition, Pearson Education, 2008.
“Internet and Intranet Security”, Rolf Oppliger, 2nd Edition, Artech House, 2007.
“Applied Cryptography, Code Complete, Secure Programming”, Articles and papers from
“Fundamental Problems in Provable Security and Cryptography”, Alexander W. Dent (Research Paper).
“Cryptography: An Introduction”, Nigel Smart, 3rd Edition, Mcgraw-Hill, 2013.
“Cryptography and Network Security”, Behrouz A Forouzan/ Mukhopadhyay, 3rd Ed., McGraw-Hill, 2015


Information Technology

Contact us

Head of the Department,
Department of Information Technology,
National Institute of Technology Karnataka,
SurathkalP. O. Srinivasnagar, Mangalore - 575 025
Ph.:    +91-824-2474056
Email:  hodit [at] nitk [dot] edu [dot] in

Web Admin: Sowmya Kamath S

Connect with us

We're on Social Networks. Follow us & stay in touch.