West Bengal Board Class 11 Cyber Security Syllabus 2024-25: Download Detailed Syllabus PDF For Free!

Jul 18, 2024, 13:13 IST

West Bengal Board Class 11 Cyber Security Syllabus 2024-25: This article will provide insights on the latest syllabus of West Bengal Board for classes 11 and 12. Read the article and download the Cyber Security syllabus PDF for free.

West Bengal Board Class 11 Cyber Security Syllabus 2024-25
West Bengal Board Class 11 Cyber Security Syllabus 2024-25

West Bengal Board Class 11 Cyber Security Syllabus 2024-25: Students of West Bengal Board can access the detailed Cyber Security syllabus for the academic year 2024-25. The syllabus outlines the prescribed chapters along with all the topics covered. It also provides the important information needed to understand the course content and effectively prepare for the upcoming exams to score well. 

The Cyber Security Syllabus is divided into two parts: theory and practical. 

  • The theory part will cover the topics divided into two semesters. 
  • The practical part will cover the topics one can perform easily to understand the theory part. 

West Bengal Board Class 11 Cyber Security Syllabus 2024-25

Semester-1

 

Marks

1

Computer Systems

15

 

1.1

Evolution of Computers:

● Different Generations of Computers

● Brief Idea about Quantum Computers

1

 

1.2

Computer Organization:

● Logic Gates with Truth Tables: AND, OR, NOT, X- OR

● Functional Components of a Computer System and their Interconnections

● Memory Organization (Diagrams Only) and Its Types

● I/O Devices

2

 

1.3

Encoding Schemes and Number System:

● ASCII, EBCDIC

● Binary, Octal, Hexadecimal Number Systems

2

 

1.4

Data and Information:

● Definitions

● Understanding the difference between data and information (through examples)

● Types of Data

1

 

1.5

Operating Systems:

● Roles and Functions of Operating Systems

● Types of Operating Systems

● Concepts of Processes, Threads

● Memory Management (Basic Concepts)

● File Systems

2

 

1.6


Database Management Systems:

● Overview of databases, and their importance in modern computing

● Role of DBMS in managing data

● Relational Databases

● Structured Query Language (SQL)


2

 

1.7

Programming a Computer:

● Algorithms (Pseudocodes)

● Flowcharts

● Compiler, Interpreter

● Programming Languages (Examples)

○ C, C++

○ Python, Java, Java-Script

● Introduction to Python Programming (Simple Example Based)

○ Python Installation

○ Basic Structure

○ Conditional Constructs

○ Looping Constructs

○ Arrays, Lists, Sets

○ Functions

5

2

Computer Networks

15

 

2.1

Types of Networks:

● LAN, MAN, WAN

● Wireless LAN

● Internet

1

 

2.2

Components of a Network:

● Servers and Workstations

● Network Interface Cards

● Guided Media: Cables – UTP, STP, Co-axial, Fibre Optic

● Unguided Media: Infra-Red, Radio and Microwave Communication, Satellite,

● Repeaters, Hubs, Bridges, Switches, Routers, Gateways

2

 

2.3

Network Topologies: Mesh, Ring, Bus, Star, Tree or Hybrid

1

 

2.4

Concept of Channel, Bandwidth (Hz, KHz, MHz), and Data Transfer rate (bps, Kbps, Mbps, Gbps, Tbps)

1

 

2.5


The Internet:

● History and Evolution of the Internet

● TCP/IP Protocol Stack, Functionality and Protocols of each layer

● MAC Address

● IPv4 Class A, Class B, Class C Address

● Concept of Subnet Mask and Default Gateway

● IPv6 Address (Basic Format)

● ICMP


5

 
 

2.6

Internet Applications: E-mail, WWW, Domain Name Systems

1

 

2.7

Internet of Things:

● The architecture of IoT systems

● Types of IoT devices (sensors, actuators, gateways, etc.)

● Communication protocols used in IoT networks (MQTT, CoAP, Zigbee)

2

 

2.8

Cloud Computing:

● Brief Introduction to

○ Cloud Service Models (IaaS/PaaS/SaaS)

○ Cloud Deployment Models (Public/Private/Hybrid),

● Overview of cloud storage services

● Overview of major cloud service providers (e.g., AWS, Azure, Google Cloud)

2


3


Introduction to Cybersecurity


5

 

3.1

Overview of Cybersecurity and Its Relevance

0

 

3.2

History of Cybersecurity: Major Incidents and Their Impacts

0

 

3.3

CIA Triad: Confidentiality, Integrity and Availability

1

 

3.4

Important Terms and Definitions: Security, Privacy, Threats, Vulnerabilities, Exploits, Risks, Attacks, Attack Vectors, Hackers, Crackers

2

 

3.5

Cyber Threats and Its Classifications:

● Malware

● Social Engineering

● DoS/DDoS

● Insider Threats

● Advanced Persistent Threats (APTs)

● Data Breaches and Information Theft

2

Note: Additional 10 hours for Remedial and Tutorial Classes

Semester-2

 

Marks

1

Network Security

15

 

1.1

Overview and Importance

0

 

1.2

Network Access Control:

● Authentication Mechanisms - Passwords, Biometrics, Hardware Tokens

● Authorization and Access Control Lists (ACLs)

2

 

1.3

Firewalls:

● Role of Firewalls in Network Security

● Types of Firewalls: Packet-Filtering Firewalls, Stateful Inspection Firewalls

● Firewall Architectures: Host-Based Firewalls Network-Based Firewalls

● Firewall Configuration and Management: Configuring Basic Firewall Rules with Linux IPTables

● Network Address Translation (NAT)

4

 

1.4


Intrusion Detection Systems (IDS):

● Overview and Importance

● Types of IDS: Host-Based IDS, Network-Based IDS

● IDS Architectures: Centralized IDS, Distributed IDS

● Detection Techniques: Signature, Statistical Anomaly Detection (Various Features like User Login Time, Duration etc.)

● IDS Configuration and Management: IDS Sensor Configuration and Rule Creation using Snort


4

 

1.5

Wireless Network Security:

● Overview of Wireless Security Vulnerabilities

● Securing Wi-Fi Networks - WPA2, WPA3

1

 

1.6

IoT Security:

● Common security threats targeting IoT devices

● Attack Vectors in IoT Ecosystems: Device Compromise, Data Interception, Denial of Service (DoS), etc.

● Case Studies of Notable IoT Security Breaches

● Privacy Considerations in IoT Deployments

2

 

1.7

Cloud Security:

● Common Security Threats to Cloud Environments

● Security in Cloud Storage

2

2

Cryptography - Part I (Without any Mathematical Derivations or Proofs)

15

 

2.1

Introduction:

● Overview

● Encryption and Decryption Function

● Plain Text, Cipher Text

● Symmetric Cipher Models: Substitution Ciphers, Transposition Ciphers

● Steganography

3

 

2.2

Secret Key Cryptography:

● Symmetric Key Encryption

● Block Cipher, Traditional Block Cipher Structures

● Data Encryption Standard (DES), Example of DES, Strength of DES

● Advanced Encryption Standard (AES), Example of AES, Strength of AES

● Block Cipher Modes of Operations

● Stream Cipher

● Synchronous and Asynchronous Stream Cipher

● Autokey Stream Cipher

● RC4 Stream Cipher

8

 

2.3

Public Key Cryptography:

● Principles of Public Key Cryptography

● RSA Algorithm with Examples

4

3

Internet Security

5

 

3.1

Social Engineering

● Overview and Importance

● Common Techniques: Phishing, Pretexting, Baiting, Vishing (Voice Phishing), Smishing (SMS Phishing))

- with Real Life Examples

● Impersonation

● Case Studies of Successful Social Engineering Attacks: Banking Frauds, Social Media Related Frauds/Blackmailing, Fake Profiles, Fake Videos

● Best Practices Against Social Engineering Attacks

3

 

3.2

Email Security:

● Email Threats - Spamming, Spoofing, Phishing, Spear Phishing, Malware Distribution, Credential Harvesting - with Real Life Examples

● Email Security Best Practices

2

West Bengal Board Class 11 Cyber Security Practical Syllabus 2024-25

 

Marks

1

Laboratory Experiments

25

 

1.1

Computer Fundamentals:

● Visit to Computer Lab and familiarise yourself with computers, peripherals, and different networking devices (e.g., modem, switch, router).

● Opening of the CPU box/cabinet and identification of different parts (e.g., Motherboard, CPU/Processor, RAM, Hard Disk, power supply).

0

 

1.2

Familiarity with Linux Operating Systems:

● Basic Commands

● Creating New Users, Setting Passwords

● Configuring Network Settings

0

 

1.3

Python Programming Practices

● Simple programs involving conditional and loop constructs

● Socket Programming

○ TCP and UDP Sockets

10

 

1.4

Laboratory Experiments using Wireshark:

● Capturing Network Traffic:

○ Set up Wireshark to capture network traffic on a specific interface (e.g., Ethernet, Wi-Fi).

○ Filter captured traffic based on IP addresses, protocols, or ports.

○ Analyze captured packets to identify different types of network communication (e.g., HTTP, DNS, TCP, UDP).

● TCP Handshake and Data Transfer:

○ Capture TCP traffic to observe the TCP handshake process.

○ Analyze TCP flags (SYN, ACK, FIN) and sequence numbers exchanged during the handshake.

○ Monitor TCP data transfer

● UDP Communication Analysis:

○ Capture UDP traffic to observe communication between client and server applications.

○ Analyze UDP packets to identify source and destination ports, as well as payload contents.

○ Understand the differences between TCP and UDP in terms of reliability and connection-oriented nature.

5

       
 

1.5

Laboratory Experiments using IPTables:

● Basic Firewall Configuration:

○ Set up a Linux system with IPTables installed.

○ Create a basic firewall configuration to allow all outgoing traffic and block all incoming traffic.

○ Test the firewall by attempting to access services from external hosts and verify that incoming connections are blocked.

● Allowing Specific Traffic:

○ Modify the firewall configuration to allow specific types of incoming traffic (e.g., SSH, HTTP, HTTPS).

○ Use IPTables rules to open ports for allowed services while still blocking all other incoming traffic.

○ Test the firewall by connecting to allowed services from external hosts and verify that connections are permitted.

● Denying Specific Traffic:

○ Configure IPTables rules to deny specific types of incoming traffic (e.g., ICMP ping requests, Telnet).

○ Testing the firewall and verification of connections.

4

 

1.6

Laboratory Experiments using Snort:

● Configuring Snort

○ Configure Snort to operate in either IDS (Intrusion Detection System) or IPS (Intrusion Prevention System) mode.

○ Set up Snort to monitor a specific network interface for incoming network traffic.

● Writing and Testing Snort Rules:

○ Create custom Snort rules to detect specific network traffic patterns or signatures.

○ Test the effectiveness of the rules by generating sample network traffic that matches the defined signatures.

4

       
 

1.7

Laboratory Experiments using OpenSSL:

● Encrypt a file using symmetric encryption (e.g., AES) with OpenSSL.

● Decrypt the encrypted file using the corresponding decryption key.

2

3

Viva

5

Now, that the students have the syllabus with them, they can easily start preparing for the exam to score well. We are also providing the syllabus below to download the PDF for free. 

CHECK: West Bengal Board Class 11 Cyber Security Practical Syllabus 2024-25

Other Related Links



Akshita Jolly
Akshita Jolly

Content Writer

Akshita Jolly is a multimedia professional specialising in education, entertainment, fashion, health, and lifestyle news. Holding a degree in Journalism and Mass Communication, she has contributed to renowned media organisations, including the Press Trust of India. She currently serves as Executive – Editorial at Jagran New Media, where she writes, edits, and manages content for the School and News sections of the Jagran Josh (English) portal. She also creates engaging and informative videos for the Jagran Josh YouTube platform, helping to make educational content more accessible and dynamic. Her work has contributed to reaching over 10 million monthly users, reflecting both the impact and scale of her content. For inquiries, she can be reached at akshitajolly@jagrannewmedia.com.
... Read More

Get here latest School, CBSE and Govt Jobs notification and articles in English and Hindi for Sarkari Naukari, Sarkari Result and Exam Preparation. Empower your learning journey with Jagran Josh App - Your trusted guide for exams, career, and knowledge! Download Now

Trending

Latest Education News