ST4056CEM Introduction to Web Development and Database System
Python, MySQL, Django, HTML, CSS, JavaScript
ST4059CEM Legal and Ethical Foundations in Cybersecurity
Cyber Law in Nepal, Internal Laws and Regulations
ST4060CEM Digital Forensics Fundamentals
Device, Network, Memory Forensics; Preparation of forensics investigation report
ST4061CEM Programming and Algorithms 1
Python, C/C++, Assembly X86, unit testing, version control
ST4062CEM Skills Development 1
Linux operation system (Kali Linux), System tools, Ethical Hacking tools.
ST4063CEM The Security Professional
Ethical framework for Hackers
ST4064CEM Foundations of Cybersecurity
Social engineering, vulnerability assessment and exploitation based on network and devices
ST4065CEM Computer Systems and Networks
LAN, WAN, Routing, Firewall, Network Security
STA103IAE Creative Thinking for Business
How to create a new business venture or solve a problem?
ST5062CEM Programming and Algorithms 2
Advanced data structures, compiler analysis, multi-threading, file I/O, device drivers
ST5063CEM Practical Pen-Testing
Penetration testing on networks and applications
ST5064CEM Networking
Networked applications, file systems, enterprise scale network security, VPN, Virtualisation and simulation
ST5065CEM Applied Forensics
Using forensics tools like SIFT or FTK, Mobile devices forensics, Legislation
ST5066CEM Skills Development 2
Intermediate Linux skills, Network traversal, Privilege Escalation
ST5067CEM Web Security
OWASP list, Proxy, two factor authentication, Cookies, Session Hacking
ST5068CEM Platforms and Operating Systems
Memory Management, Concurrency, Security mechanism of OS, Virtualisation and Isolation, Security as a service
ST5069CEM Cybersecurity Careers
Plan for self-learning and improvement, candidate screening and hiring
STA201IAE Be Your Own Boss
Business start-ups, ideation, market research, competitor analysis, financing
ST6047CEM Cybersecurity Project
Individual research project in ethical hacking and cybersecurity
ST6048CEM Exploit Development
Fuzzing applications, Memory corruption, Compiler defences, Stack and Head overflows, Anti-forensic techniques
ST6049CEM Managing Red Teams and Pen-testing
Security vulnerabilities and limitations of penetration testing techniques, Assessing network and application design for security
ST6050CEM Security Audit and Monitoring
Information system security auditing, internal audit, Intrusion detection systems and methods, Intrusion response
ST6051CEM Practical Cryptography
Cipher and algorithm types, Public/Private key encryption, Integrity, PKI, Digital certificates
ST6052CEM Reverse Engineering
Malware analysis, obfuscation and de-obfuscation of code, tools for reverse engineering
ST6053CEM Skills Development 3
Remote host audit, exploitation of vulnerable services, privilege escalation mechanisms
ST6054CEM Security Management
Security Control Assessment, Threat modelling, Third-party assessment and monitoring
STA309IAE Design Thinking and Innovation
Entrepreneurship and design thinking, applied scenario activities, creativity, business feasibility study