M.Tech Cyber
M.Tech Cyber
Motto:
VISION
“TO MAKE EVERY MAN A SUCCESS AND NO MAN A FAILURE”
MISSION
VALUE STATEMENT
VISION
To excel in Computer Science and Engineering education, research and project
management by empowering the students with strong conceptual knowledge.
MISSION
M1. To educate the students with basic foundation blocks of core and allied
disciplines of Computer Science and Engineering.
M2. To provide practical skills in the advancements of the Computer Science and
Engineering field required for the growing dynamic IT and ITES industries.
PEO I Excel in their professional career by applying advanced knowledge and/or pursue
higher education including research by applying the knowledge of Computer
Science and Engineering.
PEO II Asses the industry requirements and provide tangible solutions with social
consciousness and ethical values.
PROGRAM OUTCOMES (ALIGNED WITH GRADUATE ATTRIBUTES) (PO)
PO3 Problem Solving: Think laterally and originally, conceptualize and solve
engineering problems, evaluate a wide range of potential solutions for those and
arrive at feasible, optimal solutions after considering public health and safety,
cultural, societal and environmental factors in the core areas of expertise.
PO5 Usage of modern tools: Create, select, learn, and apply appropriate techniques,
resources, and engineering and IT tools, including prediction and modeling, to
complex engineering activities with an understanding of the limitations.
PO9 Life-Long Learning: Recognize the need for, and have the preparation and ability
to engage in life-long learning independently, with a high level of enthusiasm and
commitment to improve knowledge and competence continuously.
P10 Ethical Practices and Social Responsibility: Acquire professional and intellectual
integrity, professional code of conduct, ethics of research and scholarship,
consideration of the impact of research outcomes on professional practices and an
understanding of responsibility to contribute to the community for sustainable
development of society.
P11 Independent and Reflective Learning: Observe and examine critically the
outcomes of one’s actions and make corrective measures subsequently, and learn
from mistakes without depending on external feedback
PSO2: To develop the skill set of the students especially in Data Science and Engineering,
Software Engineering and Information Security.
PSO3 To inculcate the analytical knowledge in the students for innovative system design
using modern tools and techniques.
M.Tech - COMPUTER SCIENCE AND ENGINEERING
SEMESTER - I
PRACTICAL
Total 20 29
SEMESTER - II
PRACTICAL
7 PC CSA3751 Seminar 0 0 3 2 0 2
Total 20 25
SEMESTER - III
PRACTICAL
Internship/Mini Project 2 0
Total 13 27
SEMESTER - IV
PRACTICAL
Total 12 24
M.Tech - COMPUTER SCIENCE AND ENGINEERING
ELECTIVE I
COURSE
SL. COURSE
CATEGOR NAME OF THE COURSE L T P C S TCH
NO CODE
Y
COURSE
SL. COURSE
CATEGOR NAME OF THE COURSE L T P C S TCH
NO CODE
Y
ELECTIVE III
COURSE
SL. COURSE
CATEGOR NAME OF THE COURSE L T P C S TCH
NO CODE
Y
COURSE
SL. COURSE
CATEGOR NAME OF THE COURSE L T P C S TCH
NO CODE
Y
Course This course serves as an introduction to the world of Statistical models. It describes how
Description to use forecasting methods to support managerial, financial, and operational.
REFERENCE BOOKS
1 K.S.Trivedi.John , “Probability and statistics with reliability, Queuing and computerScience
Application”, Second edition, Wiley&Son, 2016
2 Levin Richard and Rubin Davids, “Statistics for Management “, Pearson Publications,2016
3 Robert Stine, Dean Foster ,“Statistical for Business: Decision Making and Analysis”. Pearson
23 ACM, LEARNING
Version 1.0 Approval Details BTL-4
06.02.2021 LEVEL
ASSESSMENT SCHEME
Seminar/
First Periodical Second Periodical Surprise Test
Assignments/ Attendance ESE
Assessment Assessment / Quiz
Project
Course This course serves as an introduction to the world of Advanced Data Structures and algorithms.
Description And used to Estimate time and space complexities for a given algorithm.
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 - 2 2 2 1 2 3 3 3 1 1 2 1 - -
CO-2 - 2 2 2 2 2 2 2 2 2 3 3 - - 3
CO-3 1 2 3 3 3 1 2 2 2 1 1 - - 2 -
CO-4 2 1 3 2 2 2 2 2 2 2 2 2 1 2 -
CO-5 - - 3 2 2 2 2 2 2 2 3 3 - 1 3
Abstract Data Types-Time and Space Analysis of Algorithms-Big Oh and Theta Notations- Average,
best and worst case analysis-Simple recurrence relations–Mappings.
Suggested Activities: Find the time and space complexities of the following algorithms CO-1
Suggested sources:
https://nptel.ac.in/courses/106105164/https://nptel.ac.in/courses/106105085/18
Min-maxheaps-Heaps-Leftistheaps-Binomialheaps-Fibonacciheaps-Skewheaps-Lazy- binomial
heaps.
CO-2
Suggested Activities: Implement the following Heap structures using C,C++,Java or Python
BTL-2
1. Max-min Heap 2. Binomial Heap 3. Fibonacci Heap
Binarysearchtrees-AVLtrees-2-3trees-2-3-4trees-Red-blacktrees-B-trees-splaytrees–k-d trees,Tries.
Suggested Activities: Implement the following tree structures using C, C++, Java or Python CO-3
Divide and conquer and Greedy: Quicksort-Strassen’s matrix multiplication-convex hull-Tree- vertex
splitting-Job sequencing with deadlines-Optimal storage on tapes Dynamic Programming and
Backtracking: Multistage graphs - 0/1 knapsack - 8- queens problem - graph coloring, Palindrome
partitioning.
Parallel Algorithms: Basic Techniques- Work & Efficiency - Distributed Computation - Heuristic
&Approximation Approaches.
1. HillClimbing CO-5
2. SimulatedAnnealing
BTL-2
3. ParticleSwarmOptimization
4. GeneticAlgorithm
Suggested sources:https://nptel.ac.in/courses/106104120/4,
https://nptel.ac.in/courses/106106126/9 - 15
TEXT BOOKS
1
E. Horowitz, S.Sahni and Dinesh Mehta, Fundamentals of Data structures in C++, University Press,
2009.
2 E.Horowitz,S.SahniandS.Rajasekaran,ComputerAlgorithms/C++,SecondEdition,UniversityPress, 2007.
3 Mark Allen Weiss, "Data Structures and Algorithm Analysis in C", Third Edition,
PearsonEducation, Asia.2007.
4 AnanthGrama,AnshulGupta,GeorgeKarypis,VipinKuma,“IntroductiontoParallelComputing“, Second
Edition, Addison Wesley, 2003
E BOOKS
OmidBozorg-Haddad,MohammadSolgi,HugoA.Loáiciga,“Meta-heuristicandEvolutionaryAlgorithms
1
for Engineering Optimization 1st Edition”, Wiley , 2017
https://onlinecourses.nptel.ac.in/noc18_cs51/
23 ACM, LEARNING
Version 1.0 Approval Details BTL-4
06.02.2021 LEVEL
ASSESSMENT SCHEME
Seminar/
First Periodical Second Periodical Surprise Test
Assignments/ Attendance ESE
Assessment Assessment / Quiz
Project
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 - 3 2 2 1 2 2 3 3 2 3 2 - 2 3
CO-2 - 2 2 3 1 2 2 3 3 2 3 2 - 2 -
CO-3 3 2 2 1 2 2 3 3 2 3 2 - 2 - 1
CO-4 2 - 2 1 2 2 3 3 2 3 2 - 2 - 2
CO-5 - - 3 - 2 1 2 2 3 3 2 3 2 - 2
Learning - Types of machine learning - Supervised learning - The brain and the neurons,Linear
Discriminants -Perceptron - Linear Separability -Linear Regression - Multilayer perceptron –
Examples of using MLP - Back propagation of error. CO-1
Suggested Activities: Design a Multilayer Perceptron for Rain Forecasting system BTL-2
Suggested sources:Enrico C, Simon W, Jay R, Machine Learning Techniques for Space Weather, Elsevier,
2018
MODULE4: OPTIMIZATIONTECHNIQUES(9)
TEXT BOOKS
1
EthemAlpaydin, "Machine Learning: The New AI”, MIT Press, 2016.
2 Shai Shalev-Shwartz, Shai Ben-David, "Understanding Machine Learning: From Theory to
E BOOKS
http://www.cs.huji.ac.il/~shais/UnderstandingMachineLearning/index.html
1
http://www.mlyearning.org/
2
MOOC
1 https://www.coursera.org/learn/machine-learning
2 https://www.my-mooc.com/en/categorie/machine-learning
COURSE TITLE RESEARCH METHODOLOGY & IPR CREDITS 2
23 ACM, LEARNING
Version 1.0 Approval Details BTL-2
06.02.2021 LEVEL
ASSESSMENT SCHEME
Seminar/
First Periodical Second Periodical Surprise Test
Assignments/ Attendance ESE
Assessment Assessment / Quiz
Project
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 - 2 1 1 1 2 3 2 3 2 3 2 - 3 2
CO-2 - 2 2 3 1 1 2 3 3 2 3 2 - 2 -
CO-3 3 2 2 1 2 2 3 3 2 3 2 - 2 - 1
CO-4 2 - 2 1 2 2 3 3 2 3 2 - 2 - 2
CO-5 - - 3 - 2 1 2 2 3 3 2 3 2 - 2
research problem. Approaches of investigation of solutions for research problem, data BTL-2
collection, analysis, interpretation, Necessary instrumentations
Scope of Patent Rights. Licensing and transfer of technology. Patent information and
databases. Geographical Indications. Administration of Patent System. New CO-5
TEXT BOOKS
3 Donald Cooper & Pamela Schindler ,”Business Research Methods “, TMGH, 9th edition
E BOOKS
https://www.modares.ac.ir/uploads/Agr.Oth.Lib.17.pdf
1
https://drive.google.com/file/d/0Bwk5FIsI0ctxNXBvU2dGVlJhSTg/view?usp=drivesdk
2
MOOC
1 https://www.coursera.org/browse/physical-science-and-engineering/research-
methods
2 https://www.ccrm.in/register.html
CSA3781 COURSE
COURSE CODE PC L-T-P-S 0- 0- 6- 0
CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-3
06.02.2021 LEVEL
ASSESSMENT SCHEME
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 3 3 3 3 - 2 - - 3 3 3 2 3 3 2
CO-2 3 3 3 3 - 2 - 3 3 3 3 2 3 3 2
CO-3 3 3 3 3 3 - - 3 3 - 3 2 3 3 3
CO-4 3 3 3 3 3 - - 3 3 - 3 2 3 3 3
CO-5 3 3 3 3 3 2 - 3 3 - 3 2 3 3 3
GUIDELINES
COURSE COURSE
CSA3706 PC L-T-P-S 3- 0- 0- 0
CODE CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-4
06.02.2021 LEVEL
ASSESSMENT SCHEME
First
Second Periodical
Periodical Practical Component ESE
Assessment
Assessment
The objective of this course is to define and clarify the cloud technologies that can be
Course used to deploy cloud-based applications and services. It also explains how they differ in
Description their implementation and usage. Any enterprise may implement any of the cloud
deployment models and use the cloud services as per their needs.
Prerequisites: Nil
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 3 3 - - 3 - - - 2 - - 1 1 1 -
CO-2 3 3 - - -3 - - - - 2 - - 1 1 -
CO-3 3 3 - - 3 1 - - - - - - 1 1 -
CO-4 3 3 - - 3 - - - - - - 2 1 1 -
CO-5 3 2 3 - 2 - - - - - - 3 1 1 -
GUIDELINES
1. The MOOC course will be selected as per the HOD instruction The students
must register for the selected MOOC Course. Faculty will be assigned to assist
for assignment completion.
2. At the end of the course will be directly transferred to the student’s
coursework.
3. For all other courses the concurrence from a faculty member to set the CO1, CO2,
question paper and evaluate the performance of the student should be CO3, CO4,
4. All the internal examination will be conducted. The candidate will have to
appear for the
5. end semester examinations.
6. At the end of the online & contact courses, the student should submit the
course
completion certificate(s) with grades/marks for record in his/her course work.
MOOC
https://www.mooc-list.com/course/cloud-computing-applications-part-1-cloud-systems-
1.
and-infrastructure-coursera
2. https://www.mooc-list.com/course/cloud-computing-concepts-part-2-coursera
23 ACM, LEARNING
Version 1.0 Approval Details BTL-4
06.02.2021 LEVEL
ASSESSMENT SCHEME
Seminar/
First Periodical Second Periodical Surprise Test
Assignments/ Attendance ESE
Assessment Assessment / Quiz
Project
PO PO- PO- PO- PO- PO- PO- PO- PO- PO - PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO-1 - 3 2 2 1 1 2 3 3 2 3 2 - 2 3
CO-2 - 2 2 3 1 1 2 3 3 2 3 2 - 2 -
CO-3 3 2 2 3 2 1 3 3 2 3 2 - 2 - 1
CO-4 2 - 2 3 2 2 3 3 2 3 2 - 2 - 2
CO-5 - - 3 - 2 1 2 2 3 3 2 3 2 - 2
Practices
1. Implementation of semaphores for multiprocessor OS
3. ImplementationofmultiplesleepingbarbersproblemforsynchronizationindistributedOS
6. ImplementationoftransactionsandconcurrencyinDatabaseoperatingsystem.
TEXT BOOKS
1 Mukesh Singhal, Niranjan G.Shivaratri, "Advanced concepts in operating systems", TMH, 2011
REFERENCE BOOKS
1
Abraham Silberschatz, Peter B. Galvin, G. Gagne, “Operating System Concepts”, Ninth Edition, Addison
Wesley Publishing Co.,2013.
2 Andrew S.Tanenbaum, "Modern operating system", PHI, 3rd edition,2008
E BOOKS
https://books.google.co.in/books/about/Advanced_Concepts_In_Operating_Systems.html?id=nel4vdeLcqkC
1
http://www.cs.iit.edu/~sun/pdfd/cs550-lec1.pdf
2
MOOC
1 https://www.coursera.org/learn/practical-machine-learning
2 https://www.coursera.org/learn/python-machine-learning
CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-4
06.02.2021 LEVEL
ASSESSMENT SCHEME
Seminar/
First Periodical Second Periodical Surprise Test
Assignments/ Attendance ESE
Assessment Assessment / Quiz
Project
CO-1 3 2 2 1 1 2 3 3 2 3 2 - 2 3 -
CO-2 2 2 3 1 1 2 3 3 2 3 2 - 2 - -
CO-3 2 2 3 2 1 3 3 2 3 2 - 2 - 1 2
CO-4 1 2 2 2 2 3 3 2 3 2 - 2 - 2 1
CO-5 - 3 - 2 1 2 2 3 3 2 3 2 - 2 -
Introduction to Neuro – Fuzzy and Soft Computing – Fuzzy Sets – Basic Definition and
Terminology – Set-theoretic Operations – Member Function Formulation and
parameterization – Fuzzy Rules and Fuzzy Reasoning – Extension Principle and Fuzzy
Relations – Fuzzy If-Then Rules – Fuzzy Reasoning – Fuzzy Inference Systems – Mamdani
CO-1
Fuzzy Models – Sugeno Fuzzy Models – Tsukamoto Fuzzy Models – Input Space
Partitioning and Fuzzy Modeling. BTL-2
Suggested Activities: Apply fuzzy logic and reasoning to handle uncertainty and solve
engineering problems.
Suggested Activities:Develop the application based on Genetic Algorithm and Ant BTL-2
Colony optimization
Suggested sources:
http://in.mathworks.com/help/fuzzy/adaptive-neuro-fuzzy-inference-systems.html
Suggested Activities: Prepare the students for developing intelligent modeling, CO-5
TEXT BOOKS
2 N.P.Padhy, “Artificial Intelligence and Intelligent Systems”, Oxford University Press, 2006
REFERENCE BOOKS
1
SamirRoy”IntroductiontoSoftcomputing“NeuroFuzzyandGeneticAlgorithms”,Firstedition,Pearson
Publishers, 2015.
2 J.S.R.Jang, C.T.Sun and E.Mizutani, “Neuro-Fuzzy and Soft Computing”, Pearson, 2004.
4 DavisE.Goldberg,“GeneticAlgorithms:Search,OptimizationandMachineLearning”,AddisonWesley, 2009.
5 S. Rajasekaran and G.A.V.Pai, “Neural Networks, Fuzzy Logic and Genetic Algorithms”, PHI,2003.
E BOOKS
https://stimelstep.firebaseapp.com/15/Introduction-to-Soft-Computing-Neuro-Fuzzy-and-Genetic
1
Algorithms.pdf
http://www.a-zshiksha.com/forum/viewtopic.php?f=147&t=61593
2
MOOC
1 https://www.class-central.com/tag/soft-computing
2 https://www.class-central.com/course/nptel-introduction-to-soft-computing-10053
COURSE
ADVANCED DATA BASE TECHNOLOGY CREDITS 4
TITLE
COURSE COURSE
CSA370 PC L-T-P-S 2-1-2-0
CODE CATEGORY
23 ACM,
LEARNIN
Version 1.0 Approval Details 06.02.20 BTL-5
G LEVEL
21
ASSESSMENT SCHEME
Course This course serves as an introduction to Advanced Data Base Technology and to
Description learn advanced data models and emerging databases.
1. To Implement parallel and distributed databases.
Course 2. To Implement object and object relational databases
Objective 3. To Learn advanced data models
4. To Learn emerging databases
Upon completion of this course, the students will be able to
CO-1 3 2 2 1 1 2 2 3 2 3 2 - 2 3 -
CO-2 2 2 3 1 2 2 2 3 2 3 2 - 2 - 2
CO-3 2 2 3 2 2 3 3 2 3 2 - 2 - 1 1
CO-4 1 2 2 2 1 2 3 2 3 2 - 2 - 2 1
CO-5 - 3 - 2 1 2 2 3 3 2 3 2 - 2 -
Suggested sources:
https://www.cse.iitb.ac.in/~cs6212011/.../Intelligent%20Database%20Syste
ms.ppt
MODULE 4: ADVANCED DATAMODELS (12)
Suggested Sources:
https://www.slideshare.net/avnishpatel165/multimedia-database-56310108,
https://www.geeksforgeeks.org/dbms-multimedia-database/
https://www.techwalla.com/articles/what-is-a-web-database
https://www.ibm.com/cloud/learn/what-is-cloud-database
TEXT BOOKS
1 ApproachtoDesign,Implementation,andManagement”,SixthEdition,PearsonEducation,2015.
REFERENCE BOOKS
1
RamezElmasri&ShamkantB.Navathe, “Fundamentals of Database Systems”, Seventh Edition
,Pearson Education , 2016.
2 Tamer Ozsu M., Patrick Ualduriel, “Principles of Distributed Database Systems”, Second
Edition,Pearson Education, 2003.
4 Peter Rob and Corlos Coronel, “Database Systems – Design, Implementation and
Management”,Thompson Learning, Course Technology, 9th Edition, 2011.
5 Henry
FKorth,AbrahamSilberschatz,S.Sudharshan,“DatabaseSystemConcepts”,SeventhEdition,McGraw
Hill, 2010.
E BOOKS
http://aries.ektf.hu/~hz/pdf-tamop/pdf-xx/Radvanyi-hdbms-eng2.pdf
1
https://dsinghpune.wordpress.com/advanced-database-management-system/
2
MOOC
1 https://www.coursera.org/learn/distributed-database
2 https://nptel.ac.in/courses/106106093/38
COURSE
SEMINAR CREDITS 2
TITLE
COURSE
CSA3751 COURSE CATEGORY LAB L-T-P-S 0-0-3-0
CODE
23 ACM,
Version 1.0 Approval Details 06.02.202 LEARNING LEVEL BTL-3
1
ASSESSMENT SCHEME
First
Second Review Third Review Model Evaluation ESE
Review
20% 20% 20% 40% ---
Course In this course, students will develop the scientific and technical reading, writing and
Description presentation skills they need to understand and construct research articles.
1. To develop the skills in doing literature survey, technical presentation and report
preparation
Course 2. To Selecting a subject, narrowing the subject into a topic
Objective 3. To Link the papers and preparing a draft of the paper.
4. To Stud the papers and understanding the authors contributions and critically
analysing each paper.
Prerequisites: Nil
PO- PO- PO- PO- PO- PO- PO- PO- PO- PO- PO- PO- PSO PS PS
CO
1 2 3 4 5 6 7 8 9 10 11 12 -1 O-2 O-3
CO-1 1 2 3 - 3 - - - - - - 3 - - 3
CO-2 1 2 3 - - - - - - - - - - - 3
CO-3 1 2 3 - - - - - - - - - - - 3
CO-4 1 2 3 - - - - - - - - - - - 3
1. For seminar, a student under the supervision of a faculty member, shall collect
the literature on a topic and critically review the literature and submit it to the
department in a report form and shall make an oral presentation before the
Departmental Academic Committee consisting of Department PG Coordinator,
Supervisor and two other senior faculty members of the department.
2. Each student will make a seminar presentation using audio/visual aids for a
duration of 20-25 minutes and submit the seminar report prepared in Latex only
CO1/BTL3
3. For Seminar there will be only internal evaluation.
4. Out of the total allocated marks distribution of marks shall be 30% for the report,
50% for presentation and 20% for the queries.
5. A candidate has to secure a minimum of 50% of marks to be declared successful.
6. If the student fails to fulfill minimum marks, the student has to reappear during
the supplementary examinations.
7. There shall be no semester end examinations for the seminar.
REFERENCE BOOKS
1. NYIF ,”Technical Analysis: A Personal Seminar”, Prentice Hall Press (10 March 2005)
E BOOKS
1. https://link.springer.com/book/10.1007%2F978-94-6300-524-1
COURSE TITLE PROJECT PHASE –I CREDITS 8
COURSE
COURSE CODE CSA3782 PC L-T-P-S 0- 0- 24- 0
CATEGORY
ASSESSMENT SCHEME
Prerequisites: NIL
CO, PO AND PSO MAPPING
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 - 2 - - 1 - 3 - - - - - - - 3
CO-2 - - 1 - - - - 2 - 2 - - - 2 -
CO-3 - - - - - 1 - - 2 - - - 2 - -
CO-4 2 - - - - - - 2 - - - 1 - - 3
CO-5 - - 3 - - - - - - - - - - 2 -
GUIDELINES (12)
CSA3783 COURSE
COURSE CODE PC L-T-P-S 0- 0- 24- 0
CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-3
06.02.2021 LEVEL
ASSESSMENT SCHEME
Seminar/
First Periodical Second Periodical Surprise Test
Assignments/ Attendance ESE
Assessment Assessment / Quiz
Project
Prerequisites: NIL
CO, PO AND PSO MAPPING
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 - 2 - - 1 - 3 - - - - - - - 3
CO-2 - - 1 - - - - 2 - 2 - - - 2 -
CO-3 - - - - - 1 - - 2 - - - 2 - -
CO-4 2 - - - - - - 2 - - - 1 - - 3
CO-5 - - 3 - - - - - - - - - - 2 -
1. Each student is expected to do an individual project. The project work is carried out in
two phases – Phase I in III semester and Phase II in IV semester. Phase II of the project
work shall be in continuation of Phase I only.
2. At the completion of a project the student will submit a project report, which will be
evaluated (end semester assessment) by duly appointed examiner(s). This evaluation
will be based on the project report and a viva voce examination on the project.
3. Use Science/Engineering principles to solve the identified issues
4. Adopt relevant and well-defined / innovative methodologies to fulfill the specified
objective CO-1
5. Submission of scientific report in a specified format (after plagiarism check)
BTL-2
6. Project should be for two semesters based on the completion of required number of
credits as per the academic regulations.
7. Carried out inside or outside the university, in any relevant industry or research
institution.
8. Publications in the peer reviewed journals / International Conferences will be an
added advantage
9. Student will be allowed to appear in the final viva voce examination only if he / she
has submitted his / her project work in the form of paper for presentation /
publication in a conference / journal and produced the proof of acknowledgement of
receipt of paper from the organizers / publishers.
ELECTIVE – I
COURSE
COURSE CODE ITB3721 DE L-T-P-S 3-0-0-0
CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-3
06.02.2021 LEVEL
ASSESSMENT SCHEME
Second Seminar/
First Periodical Surprise Test
Periodical Assignments/ Attendance ESE
Assessment / Quiz
Assessment Project
CO-1 - 3 2 2 1 2 2 1 2 2 1 2 1 1 3
CO-2 3 2 2 1 2 2 1 2 2 1 2 1 - 3 1
CO-3 1 - 2 2 1 2 2 1 2 2 1 2 1 - 3
CO-4 2 2 2 1 2 2 1 2 2 1 2 1 - 3 2
CO-5 - 2 2 1 2 2 1 2 2 1 2 1 - 3 -
TEXT BOOKS
Michael T. Simpson, Kent Backman, James Corley, Hands‐On Ethical Hacking and
1.
Network Defense, Cengage Learning India Pvt. Ltd, 2016.
REFERENCE BOOKS
1. Patrick Engebretson, The Basics of Hacking and Penetration Testing: Ethical Hacking
and Penetration Testing Made Easy, Syngress Basics Series, 2011
James Corley, Hands‐On Ethical Hacking and Network Defense, 2nd Edition, Cengage
2.
Learning India Pvt. Ltd, 2011
E BOOKS
https://www.insecure.in/network_hacking.asp
1.
MOOC
https://www.greatlearning.in/academy/learn-for-free/courses/introduction-to-
1.
ethical-hacking
2. https://www.udemy.com/course/burp-suite/
COURSE TITLE CYBER CRIME & SECURITY CREDITS 3
COURSE COURSE
ITB3722 DE L-T-P-S 3-0-0-0
CODE CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-3
06.02.2021 LEVEL
ASSESSMENT SCHEME
First Seminar/
Second Periodical Surprise Test
Periodical Assignments/ Attendance ESE
Assessment / Quiz
Assessment Project
Cyber Security as a profession is evolving over the years, reason being the increasing rate
of cybercrimes. Any industry that transacts online or carries sensitive data is in need of a
Course
Cyber Security professional to safeguard its date from such delinquents. Cyberspace being
Description
a common platform which is accessed anyone from every corner of the world, the scope
of cybersecurity is equally spread across the globe.
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 3 3 3 - 1 - 2 - - - - - 2 1 -
CO-2 3 3 3 - - - - - - 2 - - 2 1 -
CO-3 3 3 3 - - 1 2 - - - - 2 2 1 -
CO-4 3 3 3 - - - - - - - - 2 2 1 -
CO-5 3 3 3 - - - 2 - - - - 2 2 1 -
Introduction to IT laws & Cyber Crimes – Internet, Hacking, Cracking, Viruses, Virus
CO-1
Attacks, Pornography, Software Piracy, Intellectual property, Legal System of Information
BTL-2
Technology, Social Engineering, Mail Bombs, Bug Exploits, and Cyber Security
Computer Ethics and Application Programs, Cyber Forensic Basics- Introduction to Cyber BTL-3
Forensics, Storage Fundamentals, File System Concepts, Data Recovery, Operating System
Software and Basic Terminology
Introduction to Deleted File Recovery, Formatted Partition Recovery, Data Recovery Tools,
Data Recovery Procedures and Ethics, Preserve and safely handle original media, CO-3
Document a "Chain of Custody", Complete time line analysis of computer files based on
BTL-3
file creation, file modification and file access, Recover Internet Usage Data, Recover Swap
Files/Temporary Files/Cache Files, Introduction to Encase Forensic Edition, Forensic Tool
Kit (FTK) etc, Use computer forensics software tools to cross validate findings in computer
evidence-related cases
Tracking, E-Mail Recovery, Encryption and Decryption methods, Search and Seizure of BTL-4
Computers, Recovering deleted evidences, Password Cracking
Intrusion Analysis as a Core Skill set, Methods to Performing Intrusion Analysis, Intrusion
Kill Chain, Passively Discovering Activity in Historical Data and Logs, Detecting Future CO-5
Threat Actions and Capabilities, Denying Access to Threats, Delaying and Degrading
BTL-4
Adversary Tactics and Malware, Identifying Intrusion Patterns and Key Indicators
TEXT BOOKS
1.
Nina Godbole, SunitBelapure ,Cyber Security, Wiley, 2011.
Dan Shoemaker and Wm Arthur Conklin, Cyber Security – the Essential body of knowledge,
2.
Cengage Learning, 2012
E BOOKS
https://www.kobo.com/us/en/ebook/cyber-security-cyber-crime-and-cyber-forensics
1.
MOOC
1. https://www.shiksha.com/it-software/cyber-security-chp
2. https://onlinecourses.swayam2.ac.in/ugc19_hs25/preview
COURSE TITLE INFORMATION SECURITY ARCHITECTURE CREDITS 3
COURSE COURSE
CSA3723 PE L-T-P-S 2-0-2-0
CODE CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-5
06.02.2021 LEVEL
ASSESSMENT SCHEME
First Seminar/
Second Periodical Surprise Test /
Periodical Assignments/ Attendance ESE
Assessment Quiz
Assessment Project
The course covers the basics of Information Security, security investigation, analysis, logical
Course
design and physical design
Description
Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues
CO-2
Practical component: Design a Secure Business Model
BTL-3
Suggested Readings: Information Security threats and vulnerabilities
COURSE COURSE
CSC3736 DE L-T-P-S 2-0-2-0
CODE CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-3
06.02.2021 LEVEL
ASSESSMENT SCHEME
First Seminar/
Second Periodical Surprise Test
Periodical Assignments/ Attendance ESE
Assessment / Quiz
Assessment Project
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 3 2 1 - 3 - - - - 1 - 3 2 1 -
CO-2 3 2 1 - 3 - - - - - - 3 2 1 -
CO-3 3 2 1 - 3 - - - - - - 3 2 1 -
CO-4 3 2 1 - 3 - - - - 1 - 3 2 1 -
CO-5 3 2 3 - 3 3 - - - 1 - 3 2 1 -
Cyber world - Data - Information – cyber threat - cybercrime – White collar crimes –
economic offense – cyber stalking - cyber extortion – insider threat - Hacker - types–
cyber terrorism - cyber espionage - cyber warfare -weapons - Child Pornography - Job
Racketing - Marketing and Advertisement Rackets - Nigerian Frauds - Card Cloning - salami CO-1
Network components - Port scans – SYN flood -Key Loggers - Email Forensics - email
spoofing – Phishing – mail header analysis - Network protocols – Protocols Susceptible to
Sniffing - Active and Passive Sniffing - Wireshark – Capture and Display Filters - pcap
analysis – Problems - Trojans and Backdoors, Overt and Covert Channels, Types of Trojans
CO-2
- Botnets - types of botnet- Structure of bots – Crime bots - Spamming bots - DoS – DDoS
BTL-3
Attacks – types - Honey Pots - Forensic evidences.
Digital data – digital device – Hard disk – Types – Disk characteristics – SSD - File systems -
NTFS – MFT Structure - fragmentation -MFT fragmentation – Files and attributes - File
hashing - Slack space – Disk Forensics tools - Win Hex – Disk imaging – write blockers –
types of blockers - Data Carving – techniques - Scalpel - Registry Forensics - Registry – CO-3
Practical component:Case Studies – Cyber Crime charge – trial, IPR Case Studies BTL-4
TEXT BOOKS
1.
Gerard Johanses, Digital forensics and incident response, 2017
E BOOKS
http://index-of.es/Varios-
1. 2/Computer%20Forensics%20and%20Cyber%20Crime%20An%20Introduction.pdf
MOOC
https://www.coursera.org/lecture/cyber-security-manufacturing/intrusion-response-
1.
recovery-and-forensics-0ifzv
2. https://www.udemy.com/course/cyber-forensic-1/
ELECTIVE II
COURSE COURSE
ITB3723 DE L-T-P-S 3-0-0-0
CODE CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-3
06.02.2021 LEVEL
ASSESSMENT SCHEME
First Seminar/
Second Periodical Surprise Test
Periodical Assignments/ Attendance ESE
Assessment / Quiz
Assessment Project
Ethical Hacking and Systems Defense combines an ethical hacking methodology with the
Course hands-on application of security tools to better help students secure their systems.
Description Students are introduced to common countermeasures that effectively reduce and/or
mitigate attacks
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 3 2 1 - 1 - - - - - - 1 2 1 -
CO-2 3 2 1 - - - - - - 2 - 1 2 1 -
CO-3 3 2 1 - - 1 - - - - - 1 2 1 -
CO-4 3 2 1 - - - - - - - - 1 2 1 -
CO-5 3 2 1 - - - - - - - - 1 2 1 -
TEXT BOOKS
Michael T Simpson, Nicholas Antil, Hands-On Ethical Hacking And Network Defense, 3rd
1.
Edition, Cengage Learning, 2012.
REFERENCE BOOKS
1. James S. Tiller, The Ethical Hack: A Framework for Business Value Penetration Testing,
Auerbach Publications, 2004.
E BOOKS
https://www.vitalsource.com/products/ethical-hacking-and-systems-defense-national-
1. sean-philip-oriyano-v9781284239652
MOOC
https://www.nationalcyberwatch.org/programs-resources/curriculum/technical-
1.
course/ncc-214-ethical-hacking-systems-defense/
2. https://nic.campusconcourse.com/view_syllabus?course_id=41104
COURSE TITLE ETHICAL HACKING AND DIGITAL FORENSICS CREDITS 3
COURSE COURSE
ITB3724 DE L-T-P-S 2-0-2-0
CODE CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-3
06.02.2021 LEVEL
ASSESSMENT SCHEME
First Seminar/
Second Periodical Surprise Test
Periodical Assignments/ Attendance ESE
Assessment / Quiz
Assessment Project
Ethical hacker and computer hacking forensic investigator is to keep the important data
Course
of a business organization or a security agency safe from the malicious hackers. But
Description
ethical hackers investigate only the probabilities of hacking a computer system.
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 1 - - - 1 2 1 - - - 1 - 2 1 3
CO-2 - - 2 1 - - - 1 2 2 - 1 2 2 2
CO-3 - 1 - - - 1 2 - - - 2 - 2 1 2
History and current state of hacking and penetration testing-Profiles of hackers and
cybercriminals-History of computer hacking-Common hacking methodologies-Ethical CO-1
hacking and penetration testing in relation to black-hat and white-hat activities-Laws and BTL-1
ethical standards for penetration testers and ethical hackers
TCP / IP – Checksums – IP Spoofing port scanning, DNS Spoofing. Dos attacks – SYN
CO-2
attacks, Smurf attacks, UDP flooding, DDOS – Models. Firewalls – Packet filter firewalls,
BTL-3
Packet Inspection firewalls – Application Proxy Firewalls. Batch File Programming
computer fraud Prevention – Protection of Web sites – Intrusion detection system – NIDS, BTL-2
HIDS – Penetrating testing process – Web Services – Reducing transaction risks.
Key Fraud Indicator selection process customized taxonomies – Key fraud signature
selection Process –Accounting Forensics – Computer Forensics – Journaling and it CO-3
requirements – Standardized logging criteria – Journal risk and control matrix – Neural
BTL-3
networks – Misuse detection and Novelty detection.
REFERENCE BOOKS
1 Kenneth C.Brancik “Insider Computer Fraud” Auerbach Publications Taylor & Francis Group,
2008
2 AnkitFadia“ Ethical Hacking” 2nd Edition Macmillan India Ltd, 2006
COURSE COURSE
ITB3725 PE L-T-P-S 2-0-2-0
CODE CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-3
06.02.2021 LEVEL
ASSESSMENT SCHEME
First Seminar/
Second Periodical Surprise Test
Periodical Assignments/ Attendance ESE
Assessment / Quiz
Assessment Project
Course Mobile device forensics is a branch of digital forensics relating to recovery of digital
Description evidence or data from a mobile device under forensically sound conditions.
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 1 - 1 3 1 2 1 - 2 - 1 - 2 1 3
CO-2 1 - 2 1 - - - 3 2 2 - 1 2 2 2
CO-3 1 1 - 2 - 1 2 1 - - 2 - 2 1 2
Personal Area Networks, Wireless Local Area Networks, Metropolitan Area Networks,
Wide Area Networks. Wireless threats, vulnerabilities and security: Wireless LANs, War CO-1
Driving, War Chalking, War Flying, Common Wi-fi security recommendations, PDA BTL-2
Security, Cell Phones and Security, Wireless DoS attacks, GPS Jamming, Identity theft
Voice, SMS and Identification data interception in GSM: Introduction, practical setup and
tools, implementation- Software and Hardware Mobile phone tricks: Netmonitor, GSM CO-1
network service codes, mobile phone codes, catalog tricks and AT command set- SMS BTL-2
security issues
crime and mobile phones, evidences, forensic procedures, files present in SIM card, device
data, external memory dump, evidences in memory card, operators systems- Android CO-2
forensics: Procedures for handling an android device, imaging android USB mass storage BTL-2
devices, logical and physical techniques
MODULE 4: DIGITAL FORENSICS (9)
Introduction – Evidential potential of digital devices: closed vs. open systems, evaluating
CO-2
digital evidence potential- Device handling: seizure issues, device identification,
BTL-2
networked devices and contamination
Previewing, imaging, continuity, hashing and evidence locations- Seven element security CO-3
model- developmental model of digital systems- audit and logs- Evidence interpretation:
Data content and context BTL-2
REFERENCE BOOKS
1
Gregory Kipper, “Wireless Crime and Forensic Investigation”, Auerbach Publications, 2007
Iosif I. Andreoulakis, “ Mobile phone security and forensics: A practical approach”, Springer
2
publications, 2012
Andrew Hoog, “Android Forensics: Investigation, Analysis and Mobile Security for Google
3
Android”, Elsevier publications, 2011
COURSE COURSE
CSC3737 PE L-T-P-S 2-0-2-0
CODE CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-3
06.02.2021 LEVEL
ASSESSMENT SCHEME
Course Social network analysis is the process of investigating social structures through the use of
Description networks and graph theory.
1. Formalize different types of entities and relationships as nodes and edges and
represent this information as relational data.
2. Plan and execute network analytical computations.
3. Use advanced network analysis software to generate visualizations and perform
Course
empirical investigations of network data.
Objective
4. Interpret and synthesize the meaning of the results with respect to a question,
goal, or task.
5. Collect network data in different ways and from different sources while adhering to
legal standards and ethics standards.
Upon completion of this course, the students will be able to
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 1 1 - 3 - 1 2 1 - - 2 - 2 1 2
CO-2 1 - 2 1 2 - - 1 2 3 - 1 2 2 2
CO-3 1 - 1 1 1 2 3 - 2 - 1 3 2 1 3
CO-4 1 - 2 1 - - - 1 2 3 - 1 2 2 2
CO-5 1 1 - 1 - 3 2 1 - - 2 - 2 1 2
MODULE 1: INTRODUCTION(9)
Ontology and their role in the Semantic Web: Ontology-based knowledge Representation
– Ontology languages for the Semantic Web-Ontology language for Semantic web-
CO-2
Modelling and aggregating social network data
BTL-2
Suggested sources: - Algergawy, Alsayed( 2020), Ontology Modularization with OAPT,
Journal on Data Semantics.
Visualization and Applications of Social Networks- Novel Visualizations and Interactions CO-5
for Social Networks Exploration- Applications of Social Network Analysis- Online
Advertising in Social Networks. BTL-2
TEXT BOOKS
1 Peter Mika, Social Networks and the Semantic Web, First Edition, Springer 2007.
2 Charles Kadushin, Understanding Social Networks: Theories, Concepts and Findings, First
Edition. Oxford University Press, 2012
REFERENCE BOOKS
1
GuandongXu ,Yanchun Zhang and Lin Li, Web Mining and Social Networking – Techniques
and applications, First Edition, Springer, 2011.
2 BorkoFurht, Handbook of Social Network Technologies and Applications, 1st Edition,
Springer, 2010.
3 Max Chevalier, Christine Julien and Chantal Soulé-Dupuy, Collaborative and Social
Information Retrieval and Access: Techniques for Improved user Modelling, IGI
E BOOKS
https://link.springer.com/book/10.1007%2F978-0-387-71001-3
1
https://www.springer.com/gp/book/9781441971418
2
https://mylifemynotes.files.wordpress.com/2012/03/handbook-of-social-network-
3
technologies-and-applns-b-furht-springer-2010-bbs.pdf
MOOC
1 https://www.coursera.org/learn/social-media-data-analytics
2 https://www.coursera.org/learn/social-network-analysis
ELECTIVE III
This course will explore the various means that an intruder has available to gain access to
Course computer resources. We will investigate weaknesses by discussing the theoretical
Description background behind, and whenever possible, actually performing the attack. We will then
discuss methods to prevent/reduce the vulnerability.
1. To develop a comprehensive test plan utilizing penetration testing
2. To integrate social engineering into the testing scenario
Course
3. To identify application weaknesses using vulnerability scanners
Objective
4. To assess vulnerabilities of wireless networking protocols
Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams, “Gray Hat
1 Hacking: The Ethical Hackers Handbook : The Ethical Hacker's Handbook”, 5th Edition, McGraw
Hill , 2015.
PatrickEngebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and
2
Penetration Testing Made Easy” , 2nd Edition , Syngress, 2013.
Course Crime analysis is one of the most important activities of the majority of the intelligent
Description and law enforcement organizations all over the world.
Prerequisites: NIL
CO, PO AND PSO MAPPING
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO
CO
-1 -2 -3 -4 -5 -6 -7 -8 -9 -10 -11 -12 -1 -2 -3
CO-1 1 - 2 1 - - - 1 2 2 - 2 2 2 2
CO-2 1 2 - 3 - 2 2 1 - 3 2 - 2 1 2
CO-3 2 - 2 1 2 - 3 1 2 2 - 2 2 2 2
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1:DEVIANCE AND CRIMINAL SUBCULTURE IN CYBERSPACE(6)
Introduction to criminal subculture cyberspace – Café Culture and Heresy of CO-1
Yahooboyism in Nigeria - Internet Gambling . Consolidate the analytics outcome. BTL-2
MODULE 2:PERPETRATORS’ PERSPECTIVES AND OFFENDER USE OF THE INTERNET (10)
Identity Construction Among Hackers - Virtual Sex Offenders: A Clinical Perspective -
Self-Reported Internet Child Pornography Consumers: A Personality Assessment Using
Bandura’s Theory of Reciprocal Determinism - Online Social Networking and Pedophilia: CO-1
An Experimental Research “Sting” - Adult–Child Sex Advocacy Websites as Learning BTL-2
Environments for Crime - The Internet as a Terrorist’s Tool: A Social Learning
Perspective .
MODULE 3: DIGITAL PIRACY (12)
Value and Choice: Examining Their Roles in Digital Piracy - Suing the Genie Back in the
Bottle: The Failed RIAA Strategy to Deter P2P Network Users - Criminological Predictors
CO-2
of Digital Piracy: A Path Analysis - Change of Music Piracy and Neutralization: An
BTL-2
Examination Using Short-Term Longitudinal Data - Digital File Sharing: An Examination
of Neutralization and Rationalization Techniques Employed by Digital File Sharers.
MODULE 4: VICTIMIZATION (9)
Cyber-Routine Activities: Empirical Examination of Online Lifestyle, Digital Guardians,
and Computer-Crime Victimization - Adolescent Online Victimization and Constructs of
CO-2
Routine Activities Theory - Cyber Stalking: Typology, Etiology, and Victims - Online Social
BTL-2
Networking and Women Victims - Malware Victimization: A Routine Activities
Framework.
MODULE 5: LEGAL AND POLICY ISSUES OF CYBER CRIMES (8)
Fatwas Chaos Ignites Cyber Vandalism: Islamic Criminal Law Prohibit Cyber Vandalism - CO-3
Cyber Bullying: Legal Obligations and Educational Policy Vacuum - Human Rights
BTL-3
Infringement in the Digital Age.
REFERENCE BOOKS
1 Jai Shankar, Cyber Criminology, “Exploring Internal Crimes and Criminal Behaviour”, CRC
Press, Taylor and Francis Group, 2016.
Colleen Mccue, “Data Mining and Predictive Analysis – Intelligence Gathering and Crime
2
Analysis”, Elsevier-Science Direct, 2015.
REFERENCE BOOKS
This course unit introduces students to basic and advanced approaches to formally build verified
Course
trustworthy software systems, where trustworthy comprise five attributes: reliability, availability, safety,
Description
resilience and security.
1. Lean how and why (certain) software defenses can be bypassed
Course
2. Familiarize with exploit development techniques, in order to better understand the
Objective
boundaries of protection mechanisms and argue about their effectiveness
Upon completion of this course, the students will be able to
1. Explain software security fundamentals
Course 2. Do code review with a tool
Outcome 3. Perform Security Testing
4. Identify the Security Gap
5. Analyze the files both statically and dynamically
Prerequisites: Security Software Engineering
CO, PO AND PSO MAPPING
PO PO PO- PO- PO- PO- PO- PO- PO- PO - PO- PO- PSO- PSO- PSO-
CO
-1 -2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO-1 3 3 3 2 1 - - - 2 - - - 1 - 1
CO-2 3 3 3 2 2 - - - 2 - - - 1 - 2
CO-3 3 2 2 2 2 - - 1 2 1 - - 1 - 3
1
CO-4 3 3 2 2 1 - 2 2 - 2 - - - 3
CO-5 2 2 2 2 1 3 - - 2 - - - 1 1 2
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: SOFTWARE SECURITY FUNDAMENTALS(9)
Defining a discipline: Security Problems in Software - The three pillars of software security -
CO-1
The rise of security engineering - Risk Management framework.
BTL-2
Suggested Activity:Study about the common security issues of software
MODULE 2:TOUCH POINT SOFTWARE SECURITY (9)
Introduction to software security touch points -Code review with a tool CO-2
Suggested Activity:Identify the Seven Touchpoints for Software Security BTL-3
1. Gary R.McGraw, "Software Security : Building Security In", Addison Wesley, 2006
REFERENCE BOOKS
1. Sommerville, “Software Engineering”, Adison Wesley, 10th Edition, 2016
2. Pfleeger, “Software Engineering”, Prentice Hall, 4th Edition, 2010
Carlo Ghezzi, Mehdi Jazayari and Dino Mandrioli, “Fundamentals of Software Engineering”,Prentice Hall of
3.
India, 2th Edition, 2004
4. CraigLarman,“AgileandIterativeDevelopment:AManager’sGuide”,PearsonEducation,2009.
5. M.ShawandD.Garlan,“SoftwareArchitecture:PerspectivesonanEmergingDiscipline”,
Prentice Hall of India Private Limited , New Delhi 2010
E BOOKS
1. https://www.amazon.com/Secure-Software-Design-Theodor-Richardson/.../14496263..
MOOC
1. ceur-ws.org/Vol-1977/paper3.pdf
2. https://pe.gatech.edu/courses/secure-software-development
ELECTIVE IV
Course Cybercrime investigations for officers. We describe the basic steps necessary when
Description conducting the investigation with law.
1. To Enable Learner To Understand, Explore, And Acquire A Critical
Course
Understanding Cyber Law.
Objective
2. DevelopCompetencies For Dealing With Frauds And Deceptions
Upon completion of this course, the students will be able to
1. Need for cyber issues there in and to apply a cyber-law
Course
2. Address e-trade and e-governance
Outcome
3. Resolve the issues and problems arising out of online transactions
4. Understanding crimes with case law
Prerequisites: NIL
CO, PO AND PSO MAPPING
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO
CO
-1 -2 -3 -4 -5 -6 -7 -8 -9 -10 -11 -12 -1 -2 -3
CO-1 1 - 1 1 1 2 1 - 2 - 1 - 2 1 3
CO-2 1 1 - - - 1 2 1 - - 2 - 2 1 2
CO-3 1 - 1 1 1 2 1 - 2 - 1 - 2 1 3
CO-4 1 - 2 1 - - - 1 2 2 - 1 2 2 2
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: INRODUCTION (9)
Cyber Space- Fundamental definitions -Interface of Technology and Law –
Jurisprudence and-Jurisdiction in Cyber Space - Indian Context of Jurisdiction - CO-1
Enforcement agencies – Need for IT act - UNCITRAL – E-Commerce basics Information BTL-2
Technology Act, 2000 - Aims and Objects — Overview of the Act – Jurisdiction.
MODULE 2: E-GOVERNANCE (9)
Electronic Governance – Legal Recognition of Electronic Records and Electronic
Evidence -Digital Signature Certificates - Securing Electronic records and secure digital
CO-2
signatures - Duties of Subscribers - Role of Certifying Authorities - Regulators under the
BTL-2
Act -The Cyber Regulations Appellate Tribunal - Internet Service Providers and their
Liability– Powers of Police under the Act – Impact of the Act on other Laws.
MODULE 3: TYPES OF CYBER CRIMES (9)
Cyber Crimes -Meaning of Cyber Crimes –Different Kinds of Cyber crimes – Cyber
crimes under IPC, Cr.P.C and Indian Evidence Law - Cyber crimes under the Information
Technology Act,2000 - Cyber crimes under International Law - Hacking Child
CO-3
Pornography, Cyber Stalking, Denial of service Attack, Virus Dissemination, Software
BTL-2
Piracy, Internet Relay Chat (IRC) Crime, Credit Card Fraud, Net Extortion, Phishing etc -
Cyber Terrorism Violation of Privacy on Internet - Data Protection and Privacy – Indian
Court cases.
MODULE 4: INTELLECTURAL PROPERTY RIGHTS (9)
Intellectual Property Rights – Copyrights- Software – Copyrights vs Patents debate -
Authorship and Assignment Issues - Copyright in Internet - Multimedia and Copyright CO-3
issues - Software Piracy - Trademarks - Trademarks in Internet – Copyright and BTL-2
Trademark cases, Patents.
MODULE 5: PATENTS (9)
Understanding Patents - European Position on Computer related Patents, Legal position CO-4
on Computer related Patents - Indian Position on Patents – Case Law, Domain names -
BTL-3
registration - Domain Name Disputes-Cyber Squatting-IPR cases.
REFERENCE BOOKS
1 Ashwani Kumar Bansal “Justice Yatindra Singh: Cyber Laws”, Universal Law Publishing
Co., New Delhi, 2010.
2 Farouq Ahmed, “Cyber Law in India”, New Era publications, New Delhi, 2015.
3 S.R.Myneni, “Information Technology Law(Cyber Laws)”, Asia Law House, 2017
4 Chris Reed, “Internet Law-Text and Materials”, Cambride University Press, 2004.
5 Pawan Duggal, “Cyber Law- the Indian perspective” Universal Law Publishing Co., 2018
Course This course introducing the new concepts to students such as vulnerability analysis and
Description penetration testing
To understand the in-depth methodologies, techniques, and tools to identify
Course
vulnerabilities, exploit, and assess security risk to networks, operating systems, and
Objective
applications.
Kali Linux Wireless Penetration Testing Beginner's Guide by Vivek Ramachandran, Cameron
1.
Buchanan, 2015 Packt Publishing
2 SQL Injection Attacks and Defense 1st Edition, by Justin Clarke-Salt, Syngress Publication
3 Mastering Modern Web Penetration Testing By Prakhar Prasad, October 2016 Packt Publishing
4 Kali Linux 2: Windows Penetration Testing, By Wolf Halton, Bo Weaver , June 2016 Packt Publishing
Course This course introduces students about the risk management, environmental assessments
Description and social dimensions of risk management
The blockchain technology course allows the students to explore the driving force
Course
behind the cryptocurrency Bitcoin. Along with the Decentralization, Cryptography,
Description
Bitcoins with its alternative coins, Smart contracts and outside of currencies.
The course will enable the students to
1. Understand how blockchain systems (mainly Bitcoin and Ethereum) work
Course 2. To securely interact with them
Objective 3. Design, build, and deploy smart contracts and distributed applications
4. Integrate ideas from blockchain technology into their own projects.
Prerequisites: Basic idea in Networking, finance, Supply chain, Cryptography, Network Security
CO, PO AND PSO MAPPING
PO PO PO PO PO PO PO PO- PO PO PO- PSO- PSO-
CO PSO-3
-1 -2 -3 -4 -5 -6 -7 8 -9 -10 11 1 2
CO-1 3 3 2 3 1 1 1 2 2 1 3 2 2 3
CO-2 3 3 2 3 1 1 1 2 2 1 3 2 2 3
CO-3 3 3 2 3 2 1 1 2 2 1 3 2 2 3
CO-4 3 3 2 3 1 1 1 2 2 1 3 2 2 3
CO-5 3 3 3 1 3 1 1 1 2 1 3 2 2 3
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE1: INTRODUCTIONTOBLOCKCHAIN (9)
History: Digital Money to Distributed Ledgers -Design Primitives: Protocols, Security, Consensus,
CO-1
Permissions, Privacy : Blockchain Architecture and Design-Basic crypto primitives: Hash, Signature-
BTL-2
Hash chain to Blockchain-Basic consensus mechanisms
Suggested Activity:1. Study about blockchain tools in the Market
TEXT BOOKS
Mark Gates, “Blockchain: Ultimate guide to understanding blockchain, bitcoin,
1 cryptocurrencies, smart contracts and the future of money”, Wise Fox Publishing and Mark
Gates, 2017.
Salman Baset,LucDesrosiers,NitinGaur,PetrNovotny,AnthonyO'Dowd,Venkatraman
2 Ramakrishna, “Hands On Blockchain with Hyperledger: Building decentralized applications
with HyperledgerFabricandComposer”,2018.
ArshdeepBahga,VijayMadisetti,“Blockchain Applications:A Hands-On Approach”,
3
Vijay Madisetti publishers 2017.
REFERENCE BOOKS
1 Andreas Antonopoulos,“MasteringBitcoin:Unlocking Digital Cryptocurrencies”
,O'ReillyMedia,Inc., 2014.
2 Melanie Swa, “Blockchain ”,O'Reilly Media, 2014
E BOOKS
1 Blockchain Applications- https://www.blockchain-books.com
MOOC
1. https://onlinecourses.nptel.ac.in/noc18_cs47/preview
2. https://www.udemy.com/blockchain-and-bitcoin-fundamentals/