Module ID | Module Title | Credit | Description | Content |
---|---|---|---|---|
CS961 | Introduction to Cryptography | 5 | The module covers the basics of finite field arithmetic, private and public-key cryptography, existing cryptosystems and their security, cryptanalysis of existing systems and more. |
|
CS962 | Operating System Principles | 5 | Practical understanding of operating system design is desirable for application developers, system software developers, security professionals and system administrators. The goal of this course is to provide better understanding of the OS from the system programmer's perspective with emphasis on security-related OS design principles such as separation of privileges at different levels and resource multiplexing with isolation guarantees. |
|
CS963 | Computer Networks I | 5 | The objective of this course is to introduce students with the concepts of networking including protocols, LAN, WAN and wireless networks. |
|
CS964 | Introduction to Application Security, Mobile Security and Critical Infrastructure Security | 5 | Discover software bugs that pose cyber security threats, explain and recreate exploits of such bugs in realizing a cyber attack on such software and explain how to fix the bugs to mitigate such threats. Articulate the urgent need for cyber security in critical computer systems, networks and world wide web and explain various threat scenarios. Articulate the issues of Cyber Security in Mobile Computing Systems such as Android. Articulate the well-known cyber-attack incidents, explain the attack scenarios, and explain mitigation techniques. Articulate the cyber threats to critical infrastructures. |
|
CS971 | Computer Networks II | 5 | The objective of this course is to introduce students with the concepts of network, transport and application layer protocols of the TCP/IP protocol stack. |
|
CS972 | Introduction to Linear Algebra | 5 |
Matrices and Gaussian Elimination: Geometry of Linear Equations, Matrix Notation and matrix multiplication, Gaussian elimination, Row transformations, row exchanges, triangular factors, Inverses, transposes, solving Ax=b, A=LU decomposition.
Vector Spaces: Vector spaces, subspaces, solving Ax=0 and Ax=b, Linear independence, Basis, bases and dimension. Four fundamental subspaces of a matrix. Linear Transformations.
Orthogonality: Orthogonal vectors, orthogonal subspaces, Projections onto lines, projections onto subspaces and least squares, Gram-Schmidt.
Example: Fast Fourier Transform, Fourier series.
Determinants: Introductions, properties of the Determinant, Formulas for the Determinant, Applications. Eigenvalues and Eigenvectors: Diagonalization of Matrix, Powers A^k, Complex Matrices, Similarity Transformation, *Difference Equations and powers A^k, *Differential Equations and e^{At}. Positive Definite Matrices: Minima, Maxima, Saddle points, Tests for Positive definiteness, Singular Value Decomposition SVD. *Matrix norm, Condition number, Iterative methods for Ax=b, Linear Programming *represents optional topics. |
|
CS973 | Machine Learning for Cyber Security | 5 |
1. Articulate and explain which problems in Cyber Security may be solvable with Machine Learning. 2. Understand and implement machine learning algorithms and models for Cyber Security problems such as malware analysis, intrusion detection, spam filtering, fraud detection, online behavior analysis etc. 3. Get basic hands-on experience with supervised, unsupervised learning methods. 4. Understand basic theory of supervised and unsupervised machine learning. 5. Understand feature extraction from data. Even though we will not make it mandatory to implement machine learning models for a cyber security problem, more advanced students with programming skills may also be able to develop tools for cyber defense using machine learning having taken this course. However, that will not be evaluated. |
|
CS974 | Introduction to Web Security, Network Security, and Defenses | 5 |
To understand and discover security vulnerabilities on browser-side web applications and corresponding security threats. To understand and discover vulnerabilities on the web server-side and corresponding security threats. To understand and discover mitigation techniques to reduce the risk of cyber-attacks on web applications. To understand and discover security vulnerabilities in Networked Systems, Protocols and the Internet. To understand and discover security vulnerabilities in Wireless LAN and defense mechanisms against such vulnerabilities. |
|
CS980 | Cyber Laws, Case Studies and Trends | 5 | The importance of cyber laws and extant cyber laws in India. Comparison between cyber laws regime in India and US/Europe. |
|
CS981 | Advanced Topics on Cryptography | 5 | This course focuses on some recent advanced topics on cryptography. The first part of this course would focus on public key cryptography and the impact of quantum computing on cryptographic applications. Public key cryptography plays a major role in maintaining the security and integrity of communication channels. However, due to the advent of quantum computing, existing public-key cryptographic algorithms like RSA or elliptic curve cryptography will cease to remain secure. Shor’s algorithm can find prime factors of integer numbers efficiently on quantum computers, thus undermining the basic security assumption of RSA and elliptic curve cryptography. In this course, we will cover the basic concepts and traditional attacks on public key cryptography, followed by some concepts on quantum computing and Shor’s algorithm. Additionally, we would also describe very briefly a post-quantum secure public key algorithm, based on lattice-based cryptography. The second part of the course would focus on advanced cryptographic protocols like authentication, attestation, bit-commitment protocols and oblivious transfer etc. The contents selected for the course are based on research papers from top-tier journals and conferences such as IEEE TIFS, IACR TCHES, IEEE TC, ACM TECS, IEEE TVLSI, DAC, DATE etc. |
|
CS982 | Computational Number Theory for Cryptographers | 5 | The module covers Elementary Operations, Polynomials, Integer Lattices, Elliptic Curves and more. The module covers Elementary Operations, Polynomials, Integer Lattices, Elliptic Curves and more. |
|
CS983 | Embedded, Cyber Physical Systems and IoT Security | 5 | To understand different IoT system architecture and related components. To know various sensors and actuators used in IoT applications. To develop an IoT system in a simulated environment. To obtain the knowledge of various communication protocols and networking strategies used in IoT systems. To understand security threats in IoT systems, attack detection methodologies and digital forensics of IoT systems. To get an overview of new trends and applications in various domains. |
|
CS984 | Introduction to Hardware Security | 5 |
To understand and discover security vulnerabilities of physical implementation of cryptographic algorithms. Will get to know about different hardware security threats like side channel attacks, hardware Trojans, fault attacks.
Will obtain knowledge about passive side channel attacks (power and electromagnetic attacks) and corresponding countermeasures. Will obtain knowledge about fault attacks and corresponding countermeasures. To understand and discover security vulnerabilities of different micro-architectural attacks. Will get to know hardware security primitives like Physically Unclonable Functions (PUF), True Random Number Generator (TRNG), Logic locking and security protocol. |
|
CS985 | Introduction to Malware Analysis | 5 | The module covers malware classification, types, and platform-specific issues with malware. It also explores intrusion into IT and operational networks (OT) and their signs. Students will learn manual malware infection analysis, signature-based malware detection and classification – pros and cons, and the need for machine learning-based techniques. |
|
CS986 | Game Theory | 5 | The module covers non-cooperative game theory, complete information sequential move games, complete information simultaneous move games, incomplete information games, cooperative Game Theory, and more. |
|
CS987 | Advanced Critical Infrastructure Security | 5 | To identify the key research questions in cyber-security of critical infrastructure. To apply research methods which includes survey, experiments, and articulation of research problems in this area and methods for finding solutions to selected problems. To become adept at the use of machine learning for cyber security. To present in written and/or verbal form key findings in the specific subject area of the course from contemporary research papers. To read and analyze research papers from journals and conferences in the specific subject area of the course. |
|
CS988 | Honeypots and Deception Technologies for Advanced Protection | 5 | The module covers Cyber Threat Intelligence Collection Techniques, OSINT, Deception Technology for Monitoring Cyber Threat, Client-Side Deception Techniques, Service side Deception techniques, IT honeypots, OT honeypot, ICS Honeypots and more. |
|
CS989 | Introduction to Blockchain Technology | 5 | The module covers Basic Cryptographic primitives used in Blockchain Secure, Collision-resistant hash functions, digital signature, public-key cryptosystems, zero-knowledge proof systems, basic Distributed System concepts, Blockchain 2.0, Blockchain 3.0, E-Governance and other contract enforcement mechanisms, and more. |
|