What you'll learn

This course introduces the fundamental concepts and practical skills necessary to understand and implement cybersecurity in real world environments. It covers the core principles of information security, common threats and vulnerabilities, and essential protection mechanisms. Emphasis is placed on networking basics and Linux fundamentals critical foundations for any cybersecurity professional. Students will explore cryptography, system hardening, secure configurations, and threat analysis through hands-on labs using Linux tools, command line interfaces, and basic networking utilities. The course also delves into emerging threats, ethical hacking, and real-world case studies to build a strong security first mindset. Learning Outcomes: By the end of this course, learners will be able to: Understand and define essential cybersecurity principles such as confidentiality, integrity, availability (CIA triad), authentication, and non-repudiation. Explain key networking concepts including TCP/IP model, ports, protocols (HTTP, HTTPS, FTP, SSH, etc.), and network addressing. Use basic Linux commands and tools to navigate systems, manage files, users, and processes relevant to cybersecurity tasks. Analyze common cyber threats and attack vectors, including phishing, malware, ransomware, and denial-of-service attacks. Implement basic Linux security practices, such as file permissions, user/group management, service hardening, and firewall configuration (iptables, ufw). Understand and utilize basic networking tools (e.g., ping, netstat, nmap, traceroute, Wireshark) for security analysis and troubleshooting. Explain cryptographic concepts including encryption, hashing, digital signatures, and certificates. Identify system and network vulnerabilities and outline strategies for mitigation using firewalls, antivirus, and system patching. Apply security best practices across different environments including browsers, mobile devices, and cloud platforms. Demonstrate an understanding of security policies, risk management, and compliance standards such as ISO 27001, NIST, and GDPR. Gain introductory experience with ethical hacking and penetration testing tools, particularly within Linux-based environments (e.g., Kali Linux). Analyze real-world cyber incidents and assess failures in security architecture and response mechanisms. Develop a cybersecurity mindset for both personal and organizational contexts, encouraging secure behavior and continuous awareness.

  • Understand the fundamentals, applications, and critical areas of cybersecurity.
  • Learn about security weaknesses, threat types, attack models, and confidentiality-integrity-availability principles.
  • Explore career paths like Ethical Hacker, SOC Analyst, Penetration Tester, and more.
  • Introduction to legal frameworks, privacy standards, and organizational security policies.
  • Understand basic networking structures, communication models, and common protocols.
  • Learn about network models, IP classes, and dividing networks using subnetting.
  • Overview of key network devices and their roles in security infrastructure.
  • Practice designing and simulating network setups using Cisco Packet Tracer.
  • Learn how hardware components impact system security and vulnerabilities.
  • Understand OS architecture, differences, and security features across platforms.
  • Install and configure Windows/Linux OS in a virtualized environment for practice.
  • Explore real-world best practices for securing systems and networks.
  • Introduction to Windows tools for scanning networks and analyzing traffic.
  • Learn about Linux directory structures, user management, and permission settings.
  • Hands-on with Linux Command Line Interface for basic administration and security tasks.
  • Explore graphical tools for social engineering, network scanning, and vulnerability management.
  • Live demonstration of network discovery using popular scanning tools.
  • Capture and analyze network packets to detect anomalies and potential attacks.
  • Perform automated vulnerability scans to identify network and system flaws.
  • Study common cyber threats like malware infections, phishing scams, and man-in-the-middle attacks.
  • Build a small lab environment for practicing penetration testing techniques.
  • Learn to find and exploit vulnerabilities in Metasploitable using professional tools.
  • Understand brute-force and dictionary attacks for password recovery and testing.
  • Explore how insecure databases can be attacked using SQLi and manual methods.
  • Investigate real-world cyber incidents to understand attack strategies and consequences.
  • Guidance for students on next steps: professional certifications and career advancement.

Manish Singh
Assistant Professor

Manish Singh is a cybersecurity professional, academician, and research scholar with expertise in network security, ethical hacking, and secure system design. He currently serves as an Assistant Professor and is actively involved in cybersecurity training, research, and curriculum development. He holds multiple globally recognized certifications and affiliations, including credentials aligned with ISACA, EC-Council, and CompTIA. His professional certifications include CISSP, Fortinet NSE 7, RHCSA, and MCSA (Windows Server 2012), demonstrating strong expertise across cybersecurity, network defense, and system administration domains. Manish is also an Academic Allied Member with Juniper Networks, reflecting his engagement with enterprise networking technologies and industry collaboration. His technical skillset includes network architecture, penetration testing, vulnerability assessment, firewall and security appliance configuration, and secure infrastructure management. With a strong hands-on approach, he has experience working with industry tools and platforms, and delivers practical training sessions focused on real-world cybersecurity scenarios. His work integrates enterprise networking concepts with modern security practices to prepare students for industry certifications and professional roles.


Dr. Mohit Arora
Associate Professor

Dr. Mohit Arora is an Associate Professor and Head of the AI and Machine Learning domain in the School of Computing and AI at Lovely Professional University, with over 16 years of teaching and research experience. His expertise lies in Machine Learning, Predictive Analytics, and Intelligent Systems, with a strong focus on developing industry-relevant and application-oriented solutions. He has extensive experience in teaching core programming subjects, data structures, and advanced AI/ML courses. Dr. Arora has guided numerous student projects in areas such as machine learning, deep learning, and software development, emphasizing practical implementation and problem-solving skills. Dr. Arora is passionate about mentoring students for placements and competitive coding, focusing on building strong fundamentals in programming and data structures to enhance employability and industry readiness.