SlideShare a Scribd company logo
Course Code Information Security Management L T P C
CSE3502 Job Role: SSC/Q0901 1 0 2 2
Pre-requisite Syllabus version
v.1.0
Objective of the course
1. To introduce system security related incidents and insight on potential defenses, counter
measures against common threat/vulnerabilities.
2. To provide the knowledge of installation, configuration and troubleshooting of information
security devices.
3. To make students familiarize on the tools and common processes in information security audits
and analysis of compromised systems.
Expected Outcome
After successfully completing the course the student should be able to
1. Contribute to managing information security
2. Co-ordinate responses to information security incidents
3. Contribute to information security audits
4. Support teams to prepare for and undergo information security audits
5. Maintain a healthy, safe and secure working environment
6. Provide data/information in standard formats
7. Develop knowledge, skills and competence in information security
Student Learning Outcomes (SLO) 1, 2, 17
1. Having an ability to apply mathematics and science in engineering applications
2. Having a clear understanding of the subject related concepts and of contemporary issues
17. Having an ability to use techniques, skills and modern engineering tools necessary for
engineering practice
1 Information Security Devices 2 hours
Identify and Access Management (IdAM), Networks (Wired And Wireless) Devices, Endpoints/Edge
Devices, Storage Devices, Servers, Infrastructure Devices (e.g. Routers, Firewall Services), Computer
Assets, Servers And Storage Networks, Content management.
2 Security Device Management 2 hours
Different types of information security devices and their functions, Technical and configuration
specifications, architecture concepts and design patterns and how these contribute to the security of
design and devices.
3 Device Configuration 2 hours
Common issues in installing or configuring information security devices, Methods to resolve these
issues, Methods of testing installed/configured information security devices.
4 Team Work and Communication 2 hours
Communicate with colleagues clearly, concisely and accurately, Work with colleagues to integrate
their work effectively, Pass on essential information to colleagues in line with organizational
requirements.
5 Managing Health and Safety 2 hours
Comply with organization’s current health, safety and security policies and procedures, Report any
identified breaches in health, safety, and Security policies and procedures, Identify, report and correct
any hazards, Organization’s emergency procedures, Identify and recommend opportunities for
improving health, safety, and security.
6 Data and Information Management 2 hours
Fetching the data/information from reliable sources, checking that the data/information is accurate,
complete and up-to-date, Rule-based analysis of the data/information, Insert the data/information into
the agreed formats, Reporting unresolved anomalies in the data/information.
7 Learning and Self Development 2 hours
Identify accurately the knowledge and skills needed, Current level of knowledge, skills and
competence and any learning and development needs, Plan of learning and development activities to
address learning needs.
8 Contemporary Issues 1 hour
Total Lecture hours: 15 hours
Text Book(s)
1.
2.
3.
Information Systems Security: Security Management, Metrics, Frameworks and Best Practices,
Nina Godbole, Wiley, 2017
Rhodes-Ousley, Mark. Information Security: The Complete Reference, Second Edition, .
Information Security Management: Concepts and Practice. New York, McGraw-Hill, 2013.
Christopher J. Alberts, Audrey J. Dorofee , Managing Information Security Risks, Addison-
Wesley Professional, 2004
Reference Books
1.
2.
3.
4.
5.
Andrew Vladimirov Michajlowski, Konstantin, Andrew A. Vladimirov, Konstantin V.
Gavrilenko, Assessing Information Security: Strategies, Tactics, Logic and Framework, IT
Governance Ltd, O’Reilly 2010
Christopher J. Alberts, Audrey J. Dorofee , Managing Information Security Risks, Addison-
Wesley Professional, 2004
Chuck Easttom , System Forensics Investigation and Response, Second Edition, Jones & Bartlett
Learning, 2014
David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni, Metasploit The Penetration
Tester’s Guide, No Starch Press, 2014
Ref Links:
https://www.iso.org/isoiec-27001-information-security.html
https://www.sans.org/reading-room/whitepapers/threats/paper/34180
https://csrc.nist.gov/publications/detail/sp/800-40/version-20/archive/2005-11-16
https://www.sscnasscom.com/qualification-pack/SSC/Q0901/
List of Experiments (Indicative) SLO: 1,2,17
1.  Install and configure information security devices
 Penetration Testing
 MySQL SQL Injection
 Intrusion Detection/Prevention
 Port Redirection and Tunneling
 Working with Commercial Tools like HP Web Inspect and IBM
AppScan etc.,
 Explore Open Source tools like sqlmap, Nessus, Nmap etc
Total Laboratory Hours 15 hours
Recommended by Board of Studies
Approved by Academic Council Date

More Related Content

DOCX
Instructor_manual_for_principles_of_information_security_7th_edition.
PDF
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
PDF
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
PDF
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
PPT
is_1_Introduction to Information Security
PPT
information security management
DOCX
Project Access Control ProposalPurposeThis course project i.docx
PDF
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Instructor_manual_for_principles_of_information_security_7th_edition.
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
is_1_Introduction to Information Security
information security management
Project Access Control ProposalPurposeThis course project i.docx
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...

Similar to Information security management.doc (20)

PDF
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
PDF
Recapitulating the development initiatives of a robust information security s...
DOCX
University of maryland infa 620 homework help
PDF
Secure software design
PPT
2 Security And Internet Security
PDF
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
PDF
Fissea09 mgupta-day3-panel process-program-build-effective-training
PPTX
ICS_Unit-I_Foundations of Information Security
PDF
Effective Cyber Security Technology Solutions for Modern Challenges
DOCX
12022, 929 AM Originality Reporthttpsucumberlands.bl
DOCX
12022, 929 AM Originality Reporthttpsucumberlands.bl
PDF
Ch08 8 Information Security Process it-slideshares.blogspot.com
PDF
RFC 2196 Site Security Handbook
PPTX
Get training in cyber security & place yourself in good companies through...
PDF
IS-Intro.pdf
PDF
Appling tracking game system to measure user behavior toward cybersecurity p...
PDF
NIST Privacy Engineering Working Group -- Risk Models
PDF
Fundamentals of-information-security
DOCX
BSCS_IASN21C-24-25-Information-Assurance-and-Security-1 (1).docx
PDF
Introduction to the management of information security
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
Recapitulating the development initiatives of a robust information security s...
University of maryland infa 620 homework help
Secure software design
2 Security And Internet Security
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Fissea09 mgupta-day3-panel process-program-build-effective-training
ICS_Unit-I_Foundations of Information Security
Effective Cyber Security Technology Solutions for Modern Challenges
12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl
Ch08 8 Information Security Process it-slideshares.blogspot.com
RFC 2196 Site Security Handbook
Get training in cyber security & place yourself in good companies through...
IS-Intro.pdf
Appling tracking game system to measure user behavior toward cybersecurity p...
NIST Privacy Engineering Working Group -- Risk Models
Fundamentals of-information-security
BSCS_IASN21C-24-25-Information-Assurance-and-Security-1 (1).docx
Introduction to the management of information security
Ad

Recently uploaded (20)

PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Cell Types and Its function , kingdom of life
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
RMMM.pdf make it easy to upload and study
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Cell Structure & Organelles in detailed.
PDF
Microbial disease of the cardiovascular and lymphatic systems
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Final Presentation General Medicine 03-08-2024.pptx
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Microbial diseases, their pathogenesis and prophylaxis
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Cell Types and Its function , kingdom of life
Orientation - ARALprogram of Deped to the Parents.pptx
Supply Chain Operations Speaking Notes -ICLT Program
Module 4: Burden of Disease Tutorial Slides S2 2025
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
RMMM.pdf make it easy to upload and study
Anesthesia in Laparoscopic Surgery in India
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Complications of Minimal Access Surgery at WLH
Cell Structure & Organelles in detailed.
Microbial disease of the cardiovascular and lymphatic systems
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Final Presentation General Medicine 03-08-2024.pptx
Ad

Information security management.doc

  • 1. Course Code Information Security Management L T P C CSE3502 Job Role: SSC/Q0901 1 0 2 2 Pre-requisite Syllabus version v.1.0 Objective of the course 1. To introduce system security related incidents and insight on potential defenses, counter measures against common threat/vulnerabilities. 2. To provide the knowledge of installation, configuration and troubleshooting of information security devices. 3. To make students familiarize on the tools and common processes in information security audits and analysis of compromised systems. Expected Outcome After successfully completing the course the student should be able to 1. Contribute to managing information security 2. Co-ordinate responses to information security incidents 3. Contribute to information security audits 4. Support teams to prepare for and undergo information security audits 5. Maintain a healthy, safe and secure working environment 6. Provide data/information in standard formats 7. Develop knowledge, skills and competence in information security Student Learning Outcomes (SLO) 1, 2, 17 1. Having an ability to apply mathematics and science in engineering applications 2. Having a clear understanding of the subject related concepts and of contemporary issues 17. Having an ability to use techniques, skills and modern engineering tools necessary for engineering practice 1 Information Security Devices 2 hours Identify and Access Management (IdAM), Networks (Wired And Wireless) Devices, Endpoints/Edge Devices, Storage Devices, Servers, Infrastructure Devices (e.g. Routers, Firewall Services), Computer Assets, Servers And Storage Networks, Content management. 2 Security Device Management 2 hours Different types of information security devices and their functions, Technical and configuration specifications, architecture concepts and design patterns and how these contribute to the security of design and devices. 3 Device Configuration 2 hours Common issues in installing or configuring information security devices, Methods to resolve these issues, Methods of testing installed/configured information security devices. 4 Team Work and Communication 2 hours Communicate with colleagues clearly, concisely and accurately, Work with colleagues to integrate their work effectively, Pass on essential information to colleagues in line with organizational requirements. 5 Managing Health and Safety 2 hours
  • 2. Comply with organization’s current health, safety and security policies and procedures, Report any identified breaches in health, safety, and Security policies and procedures, Identify, report and correct any hazards, Organization’s emergency procedures, Identify and recommend opportunities for improving health, safety, and security. 6 Data and Information Management 2 hours Fetching the data/information from reliable sources, checking that the data/information is accurate, complete and up-to-date, Rule-based analysis of the data/information, Insert the data/information into the agreed formats, Reporting unresolved anomalies in the data/information. 7 Learning and Self Development 2 hours Identify accurately the knowledge and skills needed, Current level of knowledge, skills and competence and any learning and development needs, Plan of learning and development activities to address learning needs. 8 Contemporary Issues 1 hour Total Lecture hours: 15 hours Text Book(s) 1. 2. 3. Information Systems Security: Security Management, Metrics, Frameworks and Best Practices, Nina Godbole, Wiley, 2017 Rhodes-Ousley, Mark. Information Security: The Complete Reference, Second Edition, . Information Security Management: Concepts and Practice. New York, McGraw-Hill, 2013. Christopher J. Alberts, Audrey J. Dorofee , Managing Information Security Risks, Addison- Wesley Professional, 2004 Reference Books 1. 2. 3. 4. 5. Andrew Vladimirov Michajlowski, Konstantin, Andrew A. Vladimirov, Konstantin V. Gavrilenko, Assessing Information Security: Strategies, Tactics, Logic and Framework, IT Governance Ltd, O’Reilly 2010 Christopher J. Alberts, Audrey J. Dorofee , Managing Information Security Risks, Addison- Wesley Professional, 2004 Chuck Easttom , System Forensics Investigation and Response, Second Edition, Jones & Bartlett Learning, 2014 David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni, Metasploit The Penetration Tester’s Guide, No Starch Press, 2014 Ref Links: https://www.iso.org/isoiec-27001-information-security.html https://www.sans.org/reading-room/whitepapers/threats/paper/34180 https://csrc.nist.gov/publications/detail/sp/800-40/version-20/archive/2005-11-16 https://www.sscnasscom.com/qualification-pack/SSC/Q0901/ List of Experiments (Indicative) SLO: 1,2,17 1.  Install and configure information security devices  Penetration Testing  MySQL SQL Injection  Intrusion Detection/Prevention  Port Redirection and Tunneling  Working with Commercial Tools like HP Web Inspect and IBM
  • 3. AppScan etc.,  Explore Open Source tools like sqlmap, Nessus, Nmap etc Total Laboratory Hours 15 hours Recommended by Board of Studies Approved by Academic Council Date