Beruflich Dokumente
Kultur Dokumente
Relevance of Traditional Security even in modern days-Safekeeping of the Data & Records-Physical
Access Control-Human Issues-Nasty petty devices and related menace- Environmental Controls
C 03 Access Control
Full Spectrum of Access Control-Overview of Access Control Methods-Access Control Lists (ACL)-
Security Concerns
C 04 Network Security
C 05 Cryptography Fundamentals
C 06 Unix Architecture
C 07 Windows Architecture
Internet & Web Re-orientation for Controls-Overview of Protocols-Mapping Protocols onto OSI
Layers-Advanced Protocols-Security in non-Web modes of Internet
C 11 Applied Cryptography
C 14 Operations Security
C 15 Application Security
C 17 Windows Security
C 19 Security Models
C 20 Security Certifications
Overview of Legal System-Origin & History of Cyber Laws-Broad Outline of IT Act, 2000-
Authorities empowered under IT Act, 2000 IT Act Amendments-Administration of Justice under the
Act-Case Law-Anti Money Laundering Laws
Security Events & Incidents Nature, Symptoms & Impact-Incident Handling Process-Incident
Varieties-External Organizations.
Please note that with a view of maintaining the curriculum live and updated, there could be
some changes to this syllabus to ensure that PRISM students keep abreast with the latest
development in the information security sphere.