Cyber Commando Training 2025 Screening Test Syllabus PDF

Summary

This document is a syllabus for the Cyber Commando Training 2025 screening test. Topics include computer hardware, networking, mobile technologies, social media, and cyber security. It appears to be a guide for individuals training or participating in a cybersecurity program.

Full Transcript

Cyber Commando Training 2025 Annexure III Cyber Commando Training Program Screening Test Syllabus Unit: 1 Introduction to Binary, Octal, Decimal and Hexadecimal Number Systems; Conversion from Binary to De...

Cyber Commando Training 2025 Annexure III Cyber Commando Training Program Screening Test Syllabus Unit: 1 Introduction to Binary, Octal, Decimal and Hexadecimal Number Systems; Conversion from Binary to Decimal, Decimal to Binary, Binary to Hexadecimal, Hexadecimal to Binary; Representation of signed and unsigned Binary Numbers; ASCII and UTF. Definition of Computer, History of Computer Evolution, Key Terms, Computer Architecture, Hardware and Software, Programming Languages, Compiler and Interpreter. Unit: 2 Introduction to Computer Hardware - Various Components of a Computer, Motherboard, Processor, Memory, Storage Devices Hardware and Software, Primary and Secondary Storage Devices; and Networking components. Understanding Computer Operating Systems (OS), Booting process of computers., Types of Operating System- Windows and Linux OS architectures, Introduction to Filesystems Unit: 3 Definition of Computer Network, Digital and Analog Signaling Methods, Components of Network, Topology and Types of Networks – LAN, MAN and WAN. Routers and Routing Protocols, Introduction to OSI layer and TCP / IP protocol suite, Communication Devices, Different types of IP Addresses and Classes, Subnet Masks, MAC Addresses, Understanding Internet, Introduction to websites and webpages; understanding Firewall, IDS and IPS; Introduction to Network and Internet Related Crimes. Unit: 4 Introduction to Mobile Technologies – Components of cellular Network (CDMA /GSM), Introduction to Different Mobile Device, Hardware Characteristic of Mobile Device, Software Characteristic of Mobile Device, Mobile Operating System, Component of Mobile Phones, International Mobile Equipment Identity (IMEI), Subscriber Identity Module (SIM), SIM Files, Introduction to Smartphones. Unit: 5 Introduction to social media, Security Issues in social media, Types of crimes of social media – Cyberbullying, Online Grooming, Cyberstalking. Social media and its impact on Business, Politics, and Revolutions, Emerging Trends in social media. Introduction 32 Cyber Commando Training 2025 to Computer related Crimes, Form and Characteristics of Cyber Crime, Internal and External Attacks, Crimes related to social media, and FinTech. Investigation of Cyber Crime, Challenges in the Investigation of Cyber Crime, Do’s and Don’ts while investigation of cyber crime. Unit: 6 General knowledge, General Intelligence & Reasoning, General Awareness, Quantitative Aptitude, English Language & comprehension, Quantitative Aptitude, English Language & Comprehension, Statistics. References and Suggested Readings: 1. Operating Systems | Internals and Design Principles, Ninth Edition by William Stallings 2. John P. Hayes; “Computer Architecture and Organization”, McGraw-Hill, 1988. 3. V. Rajaraman and Niharika Adabala; “Fundamentals of Computers”, 6th Edition, PHI Learning Pvt. Ltd., 2015. 4. Anita Goel; “Computer Fundamentals”, Pearson Publications, 2010. 5. Beherouz. A Forouzan; “Data Communication and Networking”, 4th Edition, TMH, 2000. 6. Andrew S.Tanenbaum; “Modern Operating Systems”, 2nd edition, Addison Wesley, 2001. 7. Gary Nutt; “Operating Systems: A Modern Perspective”, 2nd edition, Pearson Education, 2001. 8. William Stallings; “Operating Systems: Internals and Design Principles”, 5th Edition, Prentice Hall, 2005. 9. Learn Computer Forensics: A beginner’s guide to searching, analyzing, and securing digital evidence 1st Edition by William Oettinger. 10. Practical Guide to Computer Forensics Investigations, A (Pearson IT Cybersecurity Curriculum (ITCC)) 1st Edition by Darren R. Hayes. 11. Nina Godbole and Sunit Belapore; “Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives”, Wiley Publications,2011. 33

Use Quizgecko on...
Browser
Browser