You are on page 1of 7

Certified Cyber Security Analyst

VS-1160
Certified Cyber Security Analyst
www.vskills.in


C CC Certified ertified ertified ertified Cyber Security Analyst Cyber Security Analyst Cyber Security Analyst Cyber Security Analyst
Certification Code Certification Code Certification Code Certification Code VS-1160
Vskills certification for Cyber Security Analyst assesses the candidate as per the companys
need for cyber security and forensics. The certification tests the candidates on arious areas
in cybercrime! "T Act #000! cyberoffenses! $ireless deices cybercrime! phishin%!
keylo%%ers! backdoors! S&' in(ection! ))oS attacks! identity theft! computer and $ireless
forensics! cyberterrorism! social media marketin%! incident handlin% and priacy.

*hy should one take this certification+ *hy should one take this certification+ *hy should one take this certification+ *hy should one take this certification+
This Course is intended for professionals and %raduates $antin% to e,cel in their chosen
areas. "t is also $ell suited for those $ho are already $orkin% and $ould like to take
certification for further career pro%ression.

-arnin% Vskills Cyber Security Analyst Certification can help candidate differentiate in
today.s competitie (ob market! broaden their employment opportunities by displayin%
their adanced skills! and result in hi%her earnin% potential.

*ho $ill benefit from takin% this certification+ *ho $ill benefit from takin% this certification+ *ho $ill benefit from takin% this certification+ *ho $ill benefit from takin% this certification+
/ob seekers lookin% to find employment in "T or cyber security departments of arious
companies! students %enerally $antin% to improe their skill set and make their CV
stron%er and e,istin% employees lookin% for a better role can proe their employers the
alue of their skills throu%h this certification.
Test )etails Test )etails Test )etails Test )etails
)uration0 )uration0 )uration0 )uration0 60 minutes
1o. of 2uestions0 1o. of 2uestions0 1o. of 2uestions0 1o. of 2uestions0 30
4a,imum marks0 4a,imum marks0 4a,imum marks0 4a,imum marks0 30! 5assin% marks0 #3 63078
There is no ne%atie markin% in this module.
9e 9e 9e 9ee Structure e Structure e Structure e Structure
:s. ;!000<- 6"ncludes all ta,es8
Companies that hire Vskills Companies that hire Vskills Companies that hire Vskills Companies that hire Vskills Cyber Security Analyst Cyber Security Analyst Cyber Security Analyst Cyber Security Analyst
Cyber Security Analysts are in %reat demand. Companies speciali=in% in "T or cyber
security is constantly hirin% skilled Cyber Security Analysts. Various public and priate
companies also need Cyber Security Analysts for their "T or cyber security departments.






Certified Cyber Security Analyst
www.vskills.in

Table of Contents Table of Contents Table of Contents Table of Contents

1. 1. 1. 1. "ntroduction to Cybercrime "ntroduction to Cybercrime "ntroduction to Cybercrime "ntroduction to Cybercrime
1.1 Definition and History
1.2 Cybercrime and Information Security
1.3 Who are Cybercriminals and their classifications
1.4 The Legal Perspectives
1.5 An Indian Perspective
1.6 Cybercrime and the Indian ITAct 2000
1.7 A Global Perspective on Cybercrimes
1.8 Survival for the Netizens
1.9 Concluding Remarks and Way Forward to Further Chapters

#. #. #. #. Cyberoffenses Cyberoffenses Cyberoffenses Cyberoffenses
2.1 How Criminals Plan the Attacks
2.2 Social Engineering
2.3 Cyberstalking
2.4 Cybercafe and Cybercrimes
2.5 Botnets
2.6 Attack Vector
2.7 Cloud Computing

;. ;. ;. ;. Cybercrime Cybercrime Cybercrime Cybercrime and *ireless )eices and *ireless )eices and *ireless )eices and *ireless )eices
3.1 Proliferation of Mobile and Wireless Devices
3.2 Trends in Mobility
3.3 Credit Card Frauds in Mobile and Wireless Computing Era
3.4 Security Challenges Posed by Mobile Devices
3.5 Registry Settings for Mobile Devices
3.6 Authentication Service Security
3.7 Attacks on Mobile/Cell Phones
3.8 Security Implications for Organizations
3.9 Organizational Measures for Handling Mobile
3.10 Organizational Security Policies and Measures in Mobile Computing Era
3.11 Laptops

>. >. >. >. Tools and 4ethods ?sed in Cybercrime Tools and 4ethods ?sed in Cybercrime Tools and 4ethods ?sed in Cybercrime Tools and 4ethods ?sed in Cybercrime
4.1 Proxy Servers and Anonymizers
4.2 Phishing
4.3 Password Cracking
4.4 Keyloggers and Spywares
4.5 Virus and Worms
4.6 Trojan Horses and Backdoors
4.7 Steganography
4.8 DoS and DDoS Attacks
4.9 SQL Injection
Certified Cyber Security Analyst
www.vskills.in

4.10 Buffer Overflow
4.11 Attacks on Wireless Networks

3. 3. 3. 3. 5hishin% and "dentity Theft 5hishin% and "dentity Theft 5hishin% and "dentity Theft 5hishin% and "dentity Theft
5.1 Phishing
5.2 Identity Theft (ID Theft)

6. 6. 6. 6. The 'e%al 5erspecties The 'e%al 5erspecties The 'e%al 5erspecties The 'e%al 5erspecties
6.1 Cybercrime and the Legal Landscape around the World
6.2 Cyberlaws in India
6.3 The Indian IT Act
6.4 Challenges to Indian Law and Cybercrime Scenario in India
6.5 Consequences of Not Addressing the Weakness in Information Technology Act
6.6 Digital Signatures and the Indian IT Act
6.7 Amendments to the Indian IT Act
6.8 Cybercrime and Punishment

@. @. @. @. Computer 9orensics Computer 9orensics Computer 9orensics Computer 9orensics
7.1 Historical Background of Cyberforensics
7.2 Digital Forensics Science
7.3 The Need for Computer Forensics
7.4 Cyberforensics and Digital Evidence
7.5 Forensics Analysis of E-Mail
7.6 Digital Forensics Life Cycle
7.7 Chain of Custody Concept
7.8 Network Forensics
7.9 Approaching a Computer Forensics Investigation
7.10 Setting up a Computer Forensics Laboratory
7.11 Computer Forensics and Steganography
7.12 Relevance of the OSI 7 Layer Model to Computer Forensics
7.13 Forensics and Social Networking Sites
7.14 Computer Forensics from Compliance Perspective
7.15 Challenges in Computer Forensics
7.16 Special Tools and Techniques
7.17 Forensics Auditing
7.18 Antiforensics

A. A. A. A. 9orensics of Band 9orensics of Band 9orensics of Band 9orensics of Band- -- -Beld )eices Beld )eices Beld )eices Beld )eices
8.1 Understanding Cell Phone Working Characteristics
8.2 Hand-Held Devices and Digital Forensics
8.3 Toolkits for Hand-Held Device Forensics
8.4 Forensics of iPods and Digital Music Devices
8.5 An Illustration on Real Life Use of Forensics
8.6 Techno-Legal Challenges with Evidence from Hand-Held Devices
8.7 Organizational Guidelines on Cell Phone Forensics

Certified Cyber Security Analyst
www.vskills.in

C. C. C. C. Cybersecurity Cybersecurity Cybersecurity Cybersecurity and and and and D DD Dr%ani=ations r%ani=ations r%ani=ations r%ani=ations
9.1 Cost of Cybercrimes and IPR Issues
9.2 Web Threats for Organizations
9.3 Security and Privacy Implications from Cloud Computing
9.4 Social Media Marketing
9.5 Social Computing and the Associated Challenges for Organizations
9.6 Protecting People's Privacy in the Organization
9.7 Organizational Guidelines for Internet Usage
9.8 Safe Computing Guidelines and Computer Usage Policy
9.9 Incident Handling
9.10 Forensics Best Practices for Organizations
9.11 Media and Asset Protection
9.12 Importance of Endpoint Security in Organizations

10. 10. 10. 10. Cybercrime and Cyberterrorism Cybercrime and Cyberterrorism Cybercrime and Cyberterrorism Cybercrime and Cyberterrorism
10.1 Intellectual Property in the Cyberspace
10.2 The Ethical Dimension of Cybercrimes
10.3 The Psychology, Mindset and Skills of Hackers and Other Cybercriminals
10.4 Sociology of Cybercriminals
10.5 Information Warfare

11. 11. 11. 11. Cybercrime Cybercrime Cybercrime Cybercrime Case Study Case Study Case Study Case Study
11.1 Real-Life Examples
11.2 Mini-Cases
11.3 Illustrations of Financial Frauds in Cyber Domain
11.4 Digital Signature-Related Crime Scenarios
11.5 Digital Forensics Case Illustrations
11.6 Online Scams

















Sample &uestions Sample &uestions Sample &uestions Sample &uestions
Certified Cyber Security Analyst
www.vskills.in

1. 1. 1. 1. Computer forensics inoles all of the follo$in% stated actiities e,cept Computer forensics inoles all of the follo$in% stated actiities e,cept Computer forensics inoles all of the follo$in% stated actiities e,cept Computer forensics inoles all of the follo$in% stated actiities e,cept
A. "nterpretation of computer data
E. 4anipulation of computer data
C. -,traction of computer data
). 1one of the aboe

# ## #. . . . A set of instructions compiled into a pro%ram that performs a particular task is A set of instructions compiled into a pro%ram that performs a particular task is A set of instructions compiled into a pro%ram that performs a particular task is A set of instructions compiled into a pro%ram that performs a particular task is
kno$n as kno$n as kno$n as kno$n as
A. Central processin% unit
E. Soft$are
C. Bard$are
). 1one of the aboe

; ;; ;. . . . The smallest addressable unit of data The smallest addressable unit of data The smallest addressable unit of data The smallest addressable unit of data by a B)) %enerally consists of by a B)) %enerally consists of by a B)) %enerally consists of by a B)) %enerally consists of
A. 6>F
E. A bits
C. 31# bytes
). 1one of the aboe

> >> >. . . . A drie is prepared in three processes. The processes include all of the follo$in% A drie is prepared in three processes. The processes include all of the follo$in% A drie is prepared in three processes. The processes include all of the follo$in% A drie is prepared in three processes. The processes include all of the follo$in%
e,cept e,cept e,cept e,cept
A. Bi%h-leel formattin%
E. 'o$-leel formattin%
C. 5artitionin%
). 1one of the aboe

3 33 3. . . . Areas of files and disks that are not apparent to the user! and sometimes not een Areas of files and disks that are not apparent to the user! and sometimes not een Areas of files and disks that are not apparent to the user! and sometimes not een Areas of files and disks that are not apparent to the user! and sometimes not een
to the operatin% system! is termed as to the operatin% system! is termed as to the operatin% system! is termed as to the operatin% system! is termed as
A. 'atent data
E. Bidden data
C. 4issin% data
). 1one of the aboe


Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)