Computer Science and Engineering (Cyber Security)
Computer Science and Engineering (Cyber Security)
(Group A)
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. To familiarize students with the foundations of probability and analysis of random processes used
in various applications in engineering and science.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Random variables, Discrete random variables and their probability
distributions, Cumulative distribution function, Expectation, Mean and
variance, the Binomial probability distribution, the Poisson probability
distribution, Poisson distribution as a limit of the binomial distribution, Joint
1 9
pmf of two discrete random variables, Marginal pmf, Independent random
variables, Expected value of a function of two discrete variables.
[Text 1: Relevant topics from sections 3.1 to 3.4, 3.6, 5.1, 5.2]
[Text 1: Relevant topics from sections 3.1, 4.1, 4.2, 4.3, 4.4, 5.1, 5.2]
Limit theorems : Markov’s Inequality, Chebyshev’s Inequality, Strong Law
of Large Numbers (Without proof), Central Limit Theorem (without proof),
Stochastic Processes: Discrete-time process, Continuous-time process,
3 Counting Processes, The Poisson Process, Interarrival times (Theorems 9
without proof)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 - 2 - - - - - - - 2
CO2 3 3 - 2 - - - - - - - 2
CO3 3 3 - 2 - - - - - - - 2
CO4 3 3 - 2 - - - - - - - 2
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Probability and Statistics for 9th edition,
1 Devore J. L Cengage Learning
Engineering and the Sciences 2016
THEORY OF COMPUTATION
(Common to CS/CA/CM/CD/CN/CC)
Teaching Hours/Week
3:1:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Foundations (Linz, Hopcroft)
Motivation for studying computability, need for mathematical modeling -
automata, Introducing automata through simple models - On/Off switch,
coffee vending machine. Three basic concepts: Alphabet, Strings, and
Languages
Finite Automata (Linz, Hopcroft)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Classify formal languages into regular, context-free, context-sensitive,
CO1 K2
and unrestricted languages.
Design finite state automata, regular grammar, regular expression, and
CO2 K3
Myhill- Nerode relation representations for regular languages.
Design push-down automata and context-free grammar representations
CO3 K3
for context-free languages.
Design Turing Machines to accept recursive and recursively
CO4 K3
enumerable languages.
Understand the notions of decidability and undecidability of problems,
CO5 K2
Halting problem.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
An Introduction to Formal Peter Linz and Susan H. Jones and Bartlett
1 7/e, 2022
Languages and Automata Rodger Publishers, Inc
Introduction to Automata
John E.Hopcroft, Rainbow Book
2 Theory Languages and 3/e, 2015
Jeffrey D.Ullman Distributiors
Computation
3 Automata and Computability Dexter C. Kozen Springer 1/e,2007
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Introduction to the Theory of Cengage India Private 3/e, 2014
1 Michael Sipser
Computation Limited
Introduction to Languages and McGraw-Hill
2 John C Martin 4/e, 2010
the Theory of Computation Education
Theory of Computation: A
3 Kavi Mahesh Wiley 1/e, 2012
Problem-Solving Approach
Elements of the Theory of Harry R. Lewis, Christos
4 Pearson Education 2/e, 2015
Computation Papadimitriou
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
https://archive.nptel.ac.in/courses/106/104/106104148/
1
https://nptel.ac.in/courses/106106049
https://archive.nptel.ac.in/courses/106/104/106104148/
2
https://nptel.ac.in/courses/106106049
https://archive.nptel.ac.in/courses/106/104/106104148/
3
https://nptel.ac.in/courses/106106049
https://archive.nptel.ac.in/courses/106/104/106104148/
4
https://nptel.ac.in/courses/106106049
SEMESTER S3
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Basic Concepts of Data Structures
Definitions; Data Abstraction; Performance Analysis - Time & Space
Complexity, Asymptotic Notations; Polynomial representation using Arrays,
1 11
Sparse matrix (Tuple representation); Stacks and Queues - Stacks, Multi-
Stacks, Queues, Circular Queues, Double Ended Queues; Evaluation of
Expressions- Infix to Postfix, Evaluating Postfix Expressions.
Linked List and Memory Management
Singly Linked List - Operations on Linked List, Stacks and Queues using
2 Linked List, Polynomial representation using Linked List; Doubly Linked List; 11
Circular Linked List; Memory allocation - First-fit, Best-fit, and Worst-fit
allocation schemes; Garbage collection and compaction.
Trees and Graphs
Trees :- Representation Of Trees; Binary Trees - Types and Properties, Binary
Tree Representation, Tree Operations, Tree Traversals; Expression Trees;
3 11
Binary Search Trees - Binary Search Tree Operations; Binary Heaps - Binary
Heap Operations, Priority Queue.
Graphs :- Definitions; Representation of Graphs; Depth First Search and
Breadth First Search; Applications of Graphs - Single Source All Destination.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Identify appropriate data structures for solving real world problems. K3
Describe and implement linear data structures such as arrays, linked K3
CO2
lists, stacks, and queues.
Describe and Implement non linear data structures such as trees and K3
CO3
graphs.
Select appropriate searching and sorting algorithms to be used in K3
CO4
specific circumstances.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Universities
Ellis Horowitz, Sartaj Sahni
1 Fundamentals of Data Structures in C press, 2/e, 2007
and Susan Anderson-Freed,
Teaching Hours/Week
4 ESE Marks 40
(L: T:P: R)
Course Objectives:
1. To understand and analyse the concepts of computer networking and its performance measures.
2. Understand the concepts of physical layer and data link layer
3. Understand important aspects and functions of network layer and various routing algorithms.
4. Understand and analyse the various transport and application layer protocols.
5. Acquire skill sets required for the development and deployment of networking applications
SYLLABUS
Module Contact
Syllabus Description
No. Hours
History of Computer Networks and the Internet , types of networks, Client-
server and peer-to-peer architecture. Design issues for the layers – Interface
& Service – Service Primitives. Reference models – OSI – TCP/IP.
1 9
Concept of Quality of Service metrics - throughput, delay, packet loss, and
jitter in packet-switched networks.
Physical layer design issues - Media, Signal strength and interference. Data
encoding, Multiplexing (TDM, FDM).
Data Link layer Design Issues – Flow Control and ARQ techniques. Data
2 9
link Protocols – HDLC. IEEE 802 FOR LANs IEEE 802.3, 802.5. Wireless
LANs - 802.11.
Networking devices - Bridges, Routers, Gateways,
Network Layer Protocols - Virtual circuits and datagrams, Principles of
routing, internet protocol Ipv4 CIDR, IPv6, Network Address Translation ,
3 9
Firewalls, and VPNs
Routing algorithms - Link-state and distance vector routing, Routing on the
internet RIP OSPF and BGP.
Introduction to transport layer, Multiplexing and de-multiplexing, Principles
of Reliable data transfer – end-to - end flow control mechanisms, Connection
oriented transport TCP, Connectionless transport UDP.
4 9
Application layer protocols - HTTP and HTTPs, FTP, SMTP- S/MIME,
DNS, and Peer-to-peer file sharing networks
Project: Installation and configuration of the LAMP stack. Design and develop a relevant web
application using the LAMP stack. Deploy the web application project in a LAN with a server and
clients with distinct IP addresses.
5 30 12.5 12.5 60
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO2 Understand the concepts of physical layer and data link layer K2
Understand important aspects and functions of network layer and K2
CO3
various routing algorithms
Understand and analyse the various transport and application layer K2
CO4
protocols.
Acquire skill sets required for the development and deployment of K6
CO5
networking applications
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2 2 2 2
CO2 3 2 2 2 2 2
CO3 3 2 2 2 2
CO4 3 2 2 2 2 2
CO5 3 2 3 2 3 2 2 2 3 3 3 2
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Behrouz A. Forouzan Tata McGraw Hill First
1 Computer Networks: A Top-
and Education Private Edition
Down Approach
Firouz Mosharraf Limited 2023
The Morgan Sixth
2 Computer Networks-A Systems Larry L. Peterson &
Kaufmann Series in Edition,
Approach Bruce S. Dave
Networking 2021
Andrew S. Tanenbaum, Sixth
3 Computer Networks Nick Feamster, David Pearson Edition,
Wetherall 2021
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
James F. Kurose Seventh
1 Computer Networking
and Pearson Edition,
A Top-Down Approach
Keith W. Ross 2017
Fifth
2 Computer Networking and the
Fred Halsall Pearson Edition,
Internet
2006
The Illustrated Network: How Second
3 TCP/IP Works in a Modern Walter Goralski Morgan Kaufmann Edition,
Network 2009
Seventh
4 Networking All-in-One for
Doug Lowe John Wiley & Sons Edition,
Dummies
2020
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 https://nptel.ac.in/courses/106105183
2 https://www.udemy.com/course/networkingbasics/
3 https://ubuntu.com/server/docs/get-started-with-lamp-applications
Simulation/
Workshops
Group
Project Analysis Data Collection Evaluation
discussion
Poster Presentation/
Guest Speakers
Case Study/ Field Video Presentation: Students
(Industry Prototyping
Survey Report present their results in a 2 to 5
Experts)
minutes video
Assessment and Evaluation for Project Activity
5 Final Presentations 5
Total 30
Teaching Hours/Week
3:1:0:0 ESE Marks 60
(L:T:P: R)
Course Objectives:
2. To enable the learner to design simple combinational and sequential logic circuits which is
essential in understanding organization & design of computer systems.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to digital Systems :- Digital abstraction
Number Systems – Binary, Hexadecimal, grouping bits, Base conversion;
Binary Arithmetic – Addition and subtraction, Unsigned and Signed numbers;
Fixed-Point Number Systems; Floating-Point Number Systems
Basic gates- Operation of a Logic circuit; Buffer; Gates - Inverter, AND gate,
1 OR gate, NOR gate, NAND gate, XOR gate, XNOR gate; Digital circuit 11
operation - logic levels, output dc specifications, input dc specifications, noise
margins, power supplies; Driving loads - driving other gates, resistive loads and
LEDs.
Verilog (Part 1) :-
HDL Abstraction; Modern digital design flow - Verilog constructs: data types,
the module, Verilog operators.
Combinational Logic Design: –
Boolean Algebra - Operations, Axioms, Theorems; Combinational logic
analysis - Canonical SOP and POS, Minterm and Maxterm equivalence; Logic
minimization - Algebraic minimization, K-map minimization, Dont cares, Code
2 convertors. 11
Modeling concurrent functionality in Verilog:-
Continuous assignment - Continuous Assignment with logical operators,
Continuous assignment with conditional operators, Continuous assignment with
delay.
MSI Logic and Digital Building Blocks
MSI logic - Decoders (One-Hot decoder, 7 segment display decoder),
Encoders, Multiplexers, Demultiplexers; Digital Building Blocks - Arithmetic
3 8
Circuits - Half adder, Full adder, half subtractor, full subtractor; Comparators.
Structural design and hierarchy - lower level module instantiation, gate level
primitives, user defined primitives, adding delay to primitives.
Sequential Logic Design :- Latches and Flip-Flops- SR latch, SR latch with
enable, JK flipflop, D flipflop, Register Enabled Flip-Flop, Resettable Flip-
Flop. Sequential logic timing considerations; Common circuits based on
sequential storage devices - toggle flop clock divider, asynchronous ripple
counter, shift register.
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Summarize the basic concept of different number systems and perform
CO1 K2
conversion and arithmetic operations between different bases.
Interpret a combinational logic circuit to determine its logic expression, truth
CO2 table, and timing information and to synthesize a minimal logic circuit through K2
algebraic manipulation or with a Karnaugh map.
Illustrate the fundamental role of hardware description languages in modern
CO3 digital design and be able to develop the hardware models for different digital K3
circuits.
Develop MSI logic circuits using both the classical digital design approach
CO4 K3
and the modern HDL-based approach.
Develop common circuits based on sequential storage devices including
CO5 counter, shift registers and a finite state machine using the classical digital K3
design approach and an HDL-based structural approach.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
CO5 3 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Name of the Edition
Title of the Book
No Author/s Publisher and Year
Introduction to Logic Circuits & Logic Springer International
1 Brock J. LaMeres 2/e, 2017
Design with Verilog Publishing
Digital Design and Computer Sarah L. Harris,
2 Morgan Kaufmann 1/e, 2022
Architecture - RISC-V Edition David Harris
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Digital Design with an Introduction to the M Morris Mano,
1 Pearson 6/e, 2018
Verilog HDL, VHDL, and System Verilog Michael D Ciletti
2 Digital Fundamentals Thomas Floyd Pearson 11/e, 2015
Fundamentals of Digital Logic with Verilog Stephen Brown,
3 McGrawHill 3/e, 2014
Design Zvonko Vranesic
Zvi Kohavi Cambridge
4 Switching and Finite Automata Theory 3/e, 2010
Niraj K. Jha University Press
Video Links (NPTEL, SWAYAM…)
No. Link ID
1 https://nptel.ac.in/courses/117105080
2 https://onlinecourses.nptel.ac.in/noc21_ee39/
3 https://onlinecourses.nptel.ac.in/noc24_cs61/
SEMESTER S3/S4
Teaching Hours/Week
2:0:0:0 ESE Marks 50
(L: T:P: R)
Course Objectives:
1. Understanding of finance and costing for engineering operation, budgetary planning and control
2. Provide fundamental concept of micro and macroeconomics related to engineering industry
3. Deliver the basic concepts of Value Engineering.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Cost concepts – Social cost, private cost – Explicit and implicit cost – Sunk
cost - Opportunity cost - short run cost curves - Revenue concepts
2 Firms and their objectives – Types of firms – Markets - Perfect Competition 6
– Monopoly - Monopolistic Competition - Oligopoly (features and
equilibrium of a firm)
Value Analysis and value Engineering - Cost Value, Exchange Value, Use
Value, Esteem Value - Aims, Advantages and Application areas of Value
4 6
Engineering - Value Engineering Procedure - Break-even Analysis - Cost-
Benefit Analysis - Capital Budgeting - Process planning
Internal Internal
Assignment/ Case
Attendance Examination-1 Examination- 2 Total
study/Microproject
(Written) (Written)
10 15 12.5 12.5 50
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 and learn the concepts of demand, supply, elasticity and production
function.
Develop decision making capability by applying concepts relating to K3
CO2 costs and revenue, and acquire knowledge regarding the functioning of
firms in different market situations.
Outline the macroeconomic principles of monetary and fiscal systems, K2
CO3
national income and stock market.
Make use of the possibilities of value analysis and engineering, and K3
CO4 solve simple business problems using break even analysis, cost benefit
analysis and capital budgeting techniques.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 - - - - - 1 - - - - 1 -
CO2 - - - - - 1 1 - - - 1 -
CO3 - - - - 1 - - - - - 2 -
CO4 - - - - 1 1 - - - - 2 -
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Geetika, Piyali Ghosh
1 Managerial Economics Tata McGraw Hill, 2015
and Chodhury
H. G. Thuesen, W. J.
2 PHI 1966
Engineering Economy Fabrycky
Teaching Hours/Week
2:0:0:0 ESE Marks 50
(L: T:P: R)
Course Objectives:
1. Equip with the knowledge and skills to make ethical decisions and implement gender-
sensitive practices in their professional lives.
2. Develop a holistic and comprehensive interdisciplinary approach to understanding
engineering ethics principles from a perspective of environment protection and sustainable
development.
3. Develop the ability to find strategies for implementing sustainable engineering solutions.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Fundamentals of ethics - Personal vs. professional ethics, Civic Virtue,
Respect for others, Profession and Professionalism, Ingenuity, diligence
and responsibility, Integrity in design, development, and research domains,
Plagiarism, a balanced outlook on law - challenges - case studies,
Technology and digital revolution-Data, information, and knowledge,
Cybertrust and cybersecurity, Data collection & management, High
1 6
technologies: connecting people and places-accessibility and social
impacts, Managing conflict, Collective bargaining, Confidentiality, Role
of confidentiality in moral integrity, Codes of Ethics.
Basic concepts in Gender Studies - sex, gender, sexuality, gender
spectrum: beyond the binary, gender identity, gender expression, gender
stereotypes, Gender disparity and discrimination in education,
employment and everyday life, History of women in Science & Technology,
Gendered technologies & innovations, Ethical values and practices in
connection with gender - equity, diversity & gender justice, Gender policy
and women/transgender empowerment initiatives.
Continuous internal evaluation will be based on individual and group activities undertaken throughout
the course and the portfolio created documenting their work and learning. The portfolio will include
reflections, project reports, case studies, and all other relevant materials.
The students should be grouped into groups of size 4 to 6 at the beginning of the semester.
These groups can be the same ones they have formed in the previous semester.
Activities are to be distributed between 2 class hours and 3 Self-study hours.
The portfolio and reflective journal should be carried forward and displayed during the 7th
Semester Seminar course as a part of the experience sharing regarding the skills developed
through various courses.
Sl. Item Particulars Group/I Marks
No. ndividua
l (G/I)
3 Activities 2. One activity* each from Module II, Module III & Module IV G 15
Total Marks 50
Evaluation Criteria:
● Depth of Analysis: Quality and depth of reflections and analysis in project reports and
case studies.
● Application of Concepts: Ability to apply course concepts to real-world problems and
local contexts.
● Creativity: Innovative approaches and creative solutions proposed in projects and reflections.
● Presentation Skills: Clarity, coherence, and professionalism in the final presentation.
Course Outcomes (COs)
Bloom’s
Course Outcome Knowledge
Level (KL)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
3 2 3 3 2 2
CO1
1 3 2 3 3 2 2
CO2
3 3 2 3 2 2
CO3
1 3 3 2 3 2 2
CO4
3 3 2 3 2 2
CO5
Reference Books
Edition and
Sl. No Title of the Book Name of the Author/s Name of the Publisher
Year
2nd edition
Ethics in Engineering Practice Cambridge University
1 Caroline Whitbeck & August
and Research Press & Assessment
2011
2nd edition
Cambridge University &
3 Bert J. M. de Vries
Sustainability Science Press & Assessment December
2023
Cambridge University
4 Sustainable Engineering Bhavik R. Bakshi, 2019
Principles and Practice Press & Assessmen
M Govindarajan, S
PHI Learning Private
5 Natarajan and V S 2012
Engineering Ethics Ltd, New Delhi
Senthil Kumar
Suggested Activities/Projects:
Module-II
Module-IV
● Evaluate the potential for installing solar panels on the college campus including cost-benefit analysis
and feasibility study.
● Analyse the energy consumption patterns of the college campus and propose sustainable alternatives
to reduce consumption - What gadgets are being used? How can we reduce demand using energy-
saving gadgets?
● Analyse a local infrastructure project for its climate resilience and suggest improvements.
● Analyse a specific environmental regulation in India (e.g., Coastal Regulation Zone) and its impact
on local communities and ecosystems.
● Research and present a case study of a successful sustainable engineering project in Kerala/India
(e.g., sustainable building design, water management project, infrastructure project).
● Research and present a case study of an unsustainable engineering project in Kerala/India
highlighting design and implementation faults and possible corrections/alternatives (e.g., a housing
complex with water logging, a water management project causing frequent floods, infrastructure
project that affects surrounding landscapes or ecosystems).
SEMESTER S3
DATA STRUCTURES LAB
(Common to CS/CA/CM/CD/CR/AI/AM/AD/CB/CN/CC/CU/CI/CG)
Course Code PCCSL307 CIE Marks 50
Course Objectives :
1. To give practical experience for learners on implementing different linear and non linear data
structures, and algorithms for searching and sorting.
Expt.
Experiments
No.
1 Find the sum of two sparse polynomials using arrays
2 Find the transpose of a sparse matrix and sum of two sparse matrices.
3 Convert infix expression to postfix (or prefix) and then evaluate using stack,
Implement backward and forward navigation of visited web pages in a web browser (i.e.
5
back and forward buttons) using doubly linked list operations.
6 Implement addition and multiplication of polynomials using singly linked lists.
Create a binary tree for a given simple arithmetic expression and find the prefix / postfix
7
equivalent.
8 Implement a dictionary of word-meaning pairs using binary search trees.
9 Find the shortest distance of every cell from a landmine inside a maze.
We have three containers whose sizes are 10 litres, 7 litres, and 4 litres, respectively. The
7-litre and 4-litre containers start out full of water, but the 10-litre container is initially
empty. We are allowed one type of operation: pouring the contents of one container into
10 another, stopping only when the source container is empty or the destination container is
full. We want to know if there is a sequence of pourings that leaves exactly 2 litres in the 7
or 4-litre container. Model this as a graph problem and solve.
14 Ordinary. The customers are to be given preference in the decreasing order - Differently
abled, Senior citizen, Defence personnel, Normal person. Generate the possible sequence
of completion.
Implement a spell checker using a hash table to store a dictionary of words for fast
Simulation of a basic memory allocator and garbage collector using doubly linked
16 list
The CSE dept is organizing a tech fest with so many exciting events. By participating
in an event, you can claim for activity points as stipulated by KTU. Each event i gives
17
you A[i] activity points where A is an array. If you are not allowed to participate in more
than k events, what’s the max number of points that you can earn?
Merge K sorted lists into a single sorted list using a heap. Use a min-heap to keep track of
18 the smallest element from each list. Repeatedly extract the smallest element and insert the
next element from the corresponding list into the heap until all lists are merged.
Course Assessment Method
(CIE: 50 marks, ESE: 50 marks)
Continuous Internal Evaluation Marks (CIE):
5 25 20 50
● Endorsement by External Examiner: The external examiner shall endorse the record
Bloom’s
Course Outcome Knowledge
Level (KL)
Model a real world problem using suitable data structure and implement the
CO1 K3
solution.
Compare efficiency of different data structures in terms of time and space
CO2 K4
complexity.
CO3 Evaluate the time complexities of various searching and sorting algorithms. K5
Differentiate static and dynamic data structures in terms of their advantages
CO4 K3
and application.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO- PO Mapping (Mapping of Course Outcomes with Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3 3
CO2 3 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Universities
Fundamentals of Data Ellis Horowitz, Sartaj Sahni and Susan Press,
1 2/e, 2007
Structures in C Anderson-Freed,
Reference Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
1 Classic Data Structures Samanta D. Prentice Hall India. 2/e, 2018
No. Link ID
1 https://nptel.ac.in/courses/106102064
2 https://ocw.mit.edu/courses/6-851-advanced-data-structures-spring-2012/
● Quality of Reports: Clarity, completeness and accuracy of lab reports. Proper documentation
of experiments, data analysis and conclusions.
● Timely Submission: Adhering to deadlines for submitting lab reports/rough record and
maintaining a well-organized fair record.
● Oral Examination: Ability to explain the experiment, results and underlying principles during
a viva voce session.
Final Marks Averaging: The final marks for preparation, conduct of experiments, viva,
and record are the average of all the specified experiments in the syllabus.
● Setup and Execution: Proper setup and accurate execution of the experiment or programming
task.
● Ability to explain the experiment, procedure results and answer related questions
● Proficiency in answering questions related to theoretical and practical aspects of the subject.
5. Record (5 Marks)
Teaching Hours/Week
0:0:2:0 ESE Marks 50
(L: T:P: R)
Course Objectives:
1. The course aims to master Shell Scripting and get hands-on exposure to network
Administration.
2. The course aims to offer hands-on experience for learners in Python programming and use it
for security implementations.
3. The course aims to offer exposure to Practical Application of Tools and Utilities
Expt.
Experiments
No.
Introduction of Linux and usage of terminal editors.
Study the following aspects of Shell scripting: bash syntax, environment variables,
2 variables, control constructs such as if, for and while, aliases and functions, accessing
command line arguments passed to shell scripts.
3
Study of startup scripts, login and logout scripts, familiarity with system d and system V
init scripts expected.
a) Write a script to automate a task (e.g., backup important files) and schedule it
5
using cron.
b) Create a script to clean up old log files periodically.
Write a script to monitor system resources such as CPU, memory, and disk usage and
6
Implement a script to send an alert if resource usage exceeds a specified threshold.
a) Study of IPv4 networking, command line tools, and network commands, including
ping, traceroute, nslookup, ip, nc, and tcpdump.
7 b) Configuring IP addresses, both dynamic and static Subnet masks, CIDR address
schemes.
c) Study concepts of iptables, LAN firewall configuration, and application layer
(L7) proxies
a) Write a script to start, stop, and restart network services (e.g., Apache, Nginx,
10 MySQL)
b) Implement a script to check the status of these services and restart them if they are
not running.
(Continuous Assessment)
5 25 20 50
Submission of Record: Students shall be allowed for the end semester examination only upon
submitting the duly certified record.
Endorsement by External Examiner: The external examiner shall endorse the record
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Familiarizing the basic Linux and networking commands/operations K2
CO2 Illustrate the use of shell scripting in system and network administration K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO- PO Mapping (Mapping of Course Outcomes with Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3
CO2 3 3
CO3 3 3
CO4 3 3
CO5 3 3 3
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Second
The Linux Command Line: A
1 William E. Shotts Jr. No Starch Press Internet
Complete Introduction
Edition
2 https://archive.nptel.ac.in/courses/106/106/106106212/
Quality of Reports: Clarity, completeness and accuracy of lab reports. Proper documentation
of experiments, data analysis and conclusions.
Timely Submission: Adhering to deadlines for submitting lab reports/rough record and
maintaining a well-organized fair record.
Oral Examination: Ability to explain the experiment, results and underlying principles during
a viva voce session.
Final Marks Averaging: The final marks for preparation, conduct of experiments, viva,
and record are the average of all the specified experiments in the syllabus.
Ability to explain the experiment, procedure results and answer related questions
Proficiency in answering questions related to theoretical and practical aspects of the subject.
5. Record (5 Marks)
(Group A)
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Graphs - Basic definition, Application of graphs, finite and
infinite graphs, Incidence and Degree, Isolated vertex, Pendant vertex and
Null graph. Isomorphism, Sub graphs, Walks, Paths and circuits, Connected
1 9
graphs, Disconnected graphs and components.
[Text 1: Relevant topics from sections 1.1, 1.2, 1.3, 1.4, 1.5, 2.1, 2.2, 2.4,
2.5. Proofs of theorems 2.5, 2.7 are excluded.]
Euler graphs, Operations on Graphs, Hamiltonian paths and circuits,
Travelling Salesman Problem, Connectivity, Edge connectivity, Vertex
2 connectivity, Directed graphs, Types of directed graphs. 9
[Text 1: Relevant topics from sections 2.6, 2.7, 2.8, 2.9, 2.10, 4.1, 4.2, 4.5,
9.1, 9.2. Proofs of theorems 4.6, 4.11, 4.12 are excluded.]
Trees- properties, Pendant vertices, Distance and centres in a tree, Rooted
3 and binary trees, Counting trees, Spanning trees, Prim's algorithm and 9
Kruskal's algorithm, Dijkstra's shortest path algorithm, Floyd-Warshall
shortest path algorithm.
[Text 1: Relevant topics from sections 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.10,
11.5. Proofs of theorems 3.10, 3.16 are excluded.]
Matrix representation of graphs- Adjacency matrix, Incidence Matrix, Circuit
Matrix, Path Matrix, Coloring, Chromatic number, Chromatic polynomial,
4 Greedy colouring algorithm. 9
[Text 1: Relevant topics from sections 7.1, 7.3, 7.8, 7.9, 8.1, 8.3. Proofs of
theorems 7.4, 7.7, 7.8, 8.2, 8.3, 8.5, 8.6 are excluded.]
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Micro project
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 2 - - - - - - - - 2
CO2 3 3 2 - - - - - - - - 2
CO3 3 3 2 2 - - - - - - - 2
CO4 3 3 2 2 - - - - - - - 2
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Graph Theory with Prentice Hall India
1st edition,
1 Applications to Engineering Narsingh Deo Learning Private
1979
and Computer Science Limited
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Introduction to Graph Theory 2e Douglas B. West Pearson Education 2nd edition,
India 2015
2 Introduction to Graph Theory Robin J. Wilson Longman Group Ltd. 5th edition,
2010
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Introduction to Databases :- Database System Concepts and Architecture-
Data Models, Schemas and Instances, Three-Schema Architecture and Data
Independence, Database Languages and Interfaces, Centralized and
Client/Server Architectures for DBMSs.
1
Conceptual Data Modelling and Database Design:- Data Modelling Using the 11
Entity, Relationship (ER) Model - Entity Types, Entity Sets, Attributes, and Keys,
Relationship Types, Relationship Sets, Roles, and Structural Constraints, Weak
Entity Types. Refining the ER Design for the COMPANY Database.
The Relational Data Model and SQL - The Relational Data Model and Relational
Database Constraints-Relational Algebra and Relational Calculus - Structured Query
2 Language (SQL)-Data Definition Language, Data Manipulation Language,
Assertions, Triggers, views, Relational Database Design Using ER-to-Relational 11
Mapping.
Database Design Theory & Normalization - Functional Dependencies -
3 Basic definition; Normalization- First, Second, and Third normal forms. 11
Transaction Management - Transaction Processing : Introduction, problems and
failures in transaction, Desirable properties of transaction, Characterizing
schedules based on recoverability and serializability; Concurrency Control
with Two-Phase Locking Techniques- Database Recovery management:
Deferred update-immediate update- shadow paging.
Introduction To NoSQL Concepts - types of NoSQL databases- CAP
Theorem- BASE properties- Use Cases and limitations of NoSQL.
4
SQL architectural Patterns - Key value Stores, Graph Stores, Column 11
Family stores and Document Stores.
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Summarize and exemplify the fundamental nature and characteristics of
CO1 K2
database systems
Model and design solutions for efficiently representing data using the
CO2 K3
relational model or non-relational model
Discuss and compare the aspects of Concurrency Control and Recovery in
CO3 K3
Database systems
Construct advanced SQL queries to effectively retrieve, filter, and
CO4 K3
manipulate data from relational databases.
CO5 Experiment with NoSQL databases in real world applications K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3 2 2 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Fundamentals of Database Systems
1 Elmasri, Navathe Pearson 7/e,
[Module 1,2,3,4]
Making the Sense of NoSQL : A guide Dan McCreary and
2 Manning 2014
for Managers and rest of us [Module 4] Ann Kelly
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Sliberschatz A., H. F.
A., H. F. Korth and S. Sudarshan, Korth and S. Sudarshan,
McGraw
1 Database System Concepts, Database System 7/e, 2011
Hill,
Concepts, 6/e, McGraw
Hill, 2011.
Beginning Database Design
2 Rod Stephens Wiley 2/e, 2023
Solutions
Pramod J. Sadalage, Addison-
2 NoSQL Distilled 1/e, 2012
Martin Fowler Wesley
NoSQL Data Models: Trends and
3 Challenges (Computer Engineering: Olivier Pivert Wiley 2018
Databases and Big Data),
OPERATING SYSTEMS
(Common to CS/CD/CM/CR/CA/AD/AI/CB/CN/CC/CU/CI/CG)
Teaching Hours/Week
3:1:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. To introduce the structure of a typical operating system and its core functionalities
2. To impart to the students, a practical understanding of OS implementation nuances based on the
Linux operating system
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Operating Systems (Book 1 Ch 2 introductory part),
Operating System Services (Book 3 Ch 2) Overview of Operating Systems
and Kernels, Linux Versus Classic Unix Kernels (Book 2 Ch 1)
Going beyond physical memory - Swap space, page fault and its control
flow, page replacement policies, Thrashing (Book 1 Ch 21, 22)
4 Case study: Linux I/O schedulers - Elevator, Complete Fair Queuing (Book 10
2 Ch 14)
Files and Directories: The File System Interface - File descriptor, reading
and writing files (sequential and random access), Removing files - Hard links
and Symbolic links, Creating, reading and deleting directories, Permission
bits and Access Control Lists, Mounting a file system (Book 1 Ch 39)
Case study: VFS Objects and Their Data Structures - The Inode Object,
Inode Operations (Book 2 Ch 13)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Micro project
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Apply the concepts of process management and process scheduling
CO1 K3
mechanisms employed in operating systems.
Choose various process synchronization mechanisms employed in
CO2 K3
operating systems.
Use deadlock prevention and avoidance mechanisms in operating
CO3 K3
systems.
CO4 Select various memory management techniques in operating systems. K3
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
CO5 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Operating Systems: Three Easy Andrea Arpaci-Dusseau,
1 Pieces Remzi Arpaci-Dusseau CreateSpace 1/e, 2018
Teaching Hours/Week
3:0:0:1 ESE Marks 40
(L: T:P: R)
Course Objectives
1. Introduce principles of computer organization and the basic architectural concepts using
RISC.
2. Introduce the concepts of microarchitecture, memory systems, and I/O systems.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Basic Structure of computers :– Functional units - Basic operational
concepts; Memory map; Endianness.
CISC vs RISC architectures:- RISC Introduction - Assembly Language,
Assembler directives, Assembling.
1 11
Programming concepts - Program flow, Branching, Conditional statements,
Loops, Arrays, Function calls; Instruction execution cycle.
Machine language - Instructions, addressing modes, Stored program
concept. Evolution of the RISC Architecture.
Microarchitecture - Introduction; Performance analysis; Single-Cycle
Processor - Single Cycle Datapath, Single Cycle Control; Pipelined
2 11
Processor - Pipelined Data Path, Pipelined Control: Hazards, Solving
Data/Control Hazards, Performance Analysis.
Memory Systems: Introduction; performance analysis; Caches - basic
concepts, Cache mapping, Cache replacement, Multiple-Level Caches,
3 11
Reducing Miss Rate, Write Policy; Virtual Memory - Address Translation;
Page Table; Translation Lookaside Buffer; Memory Protection.
Input / Output - External Devices; I/O Modules; Programmed I/O,
5 30 12.5 12.5 60
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Identify the basic structure and functional units of a digital computer and the K2
CO1
features of RISC architecture.
Experiment with the single cycle processor, pipelining, and the associated K3
CO2
problems.
CO3 Utilize the memory organization in modern computer systems. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
Text Books
Total 30
Course objectives:
2. Constructing parallel and distributed applications, including testing, debugging and performance
evaluation
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2
CO2 3 3 2 2
CO3 3 2 2
CO4 3 2 2 2 2 2
CO5 3 2 2 2 2
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Morgan
Maurice Herlihy
1 The Art of Multiprocessor Programming Kaufmann 2008
and NirShavit
Publishers
C. Lin, L. Snyder,
2 Principles of Parallel Programming 2009
Addison-Wesley
George Coulouris,
Distributed Systems: Concepts and Jean Dollimore, Fifth
3 Addison Wesley
Design Tim Kindberg and edition
Gordon Blair
An Introduction to Distributed
4 Valmir C. Barbosa MIT Press 2003
Algorithms
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
None/
Prerequisites (if any) (Course code) Course Type Theory
Course Objectives:
1. To undertake path-breaking research that creates new computing technologies and solutions
for industry and society at large.
2. To create cryptocurrencies and give a strong technical understanding of Blockchain
technologies with an in-depth understanding of applications, open research challenges, and
future directions.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Cryptography: Concepts and Techniques-Introduction, plaintext and cipher
text, substitution techniques, transposition techniques, encryption and
decryption, symmetric and asymmetric key cryptography.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Illustrate the cryptographic building blocks and fundamental concepts K2
CO1
of blockchain technology.
K2
CO2 Explain the concepts of consensus and decentralization in blockchain.
Explain the concepts of first decentralized cryptocurrency bitcoin and K2
CO3
blockchain platforms.
K2
CO4 Explain the use of smart contracts and Ethereum.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2
CO2 3 2 2
CO3 3 2 2
CO4 3 2 2
CO5 3 2 2 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Blockchain: The Blockchain for
Create Space
Beginnings, Guild to Blockchain
1 Josh Thompson Independent 2017
Technology and Blockchain
Publishing Platform
Programming
Mastering Blockchain: A deep dive
into distributed ledgers, consensus second
2 protocols, smart contracts, DApps, Imran Bashir Packt Publishing edition,
cryptocurrencies, Ethereum, and 2018.
more,
Reference Books
Name of the Name of the Edition and
Sl. No Title of the Book
Author/s Publisher Year
Solidity Programming Essentials: A
First edition,
1 beginner's guide to build smart Ritesh Modi Packt Publishing
2018
contracts for Ethereum and blockchain
Blockchain Technology: Concepts and Kumar Saurabh, Wiley First edition,
2
Applications Ashutosh Saxena Publications 2020
Chandramouli
Universities Press First edition,
3 Blockchain Technology Subramanian,
(India) Pvt. Ltd. August 2020
Asha A George,
INTRODUCTION TO AI AND ML
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Introduction to AI - History and Applications of AI: Intelligent Agents -
Types of intelligent agents, Problem-solving & search algorithms
(uninformed and informed search): Knowledge Representation and
Reasoning - Propositional logic, First-order logic, Reasoning systems
1
Introduction to Machine Learning: Machine learning vs. traditional
9
programming, Types of learning (supervised, unsupervised, reinforcement
learning). The Machine Learning Pipeline, Data Preprocessing, Idea of
Training, Testing, Validation; Review of Gradient Descent Algorithm
4 9
Ethical Considerations in AI and ML: Bias, Fairness, Explainability,
Societal Impact
Case Study: Application of AI for Intrusion Detection
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Students will Understand and will be able to explain the fundamental
CO1 K2
principles of AI
Students will be able to design, train, and optimize neural networks and
CO3 K2
will Understand Deep Learning concepts like ANN and CNN
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
3 2 1 2
CO1
3 3 2 2 3 2 2
CO2
3 3 3 2 3 2 2
CO3
3 2 2 3 3 3 2 3 3
CO4
3 3 3 3 3 2 3 2 3 3
CO5
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Artificial Intelligence: A Modern Stuart Russell and Peter 4th Edition
1 Pearson
Approach Norvig (2022)
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Hands-On Machine Learning 2nd
1 with Scikit-Learn, Keras, and Aurélien Géron O'Reilly Media, Inc Edition
TensorFlow (2019)
3rd
Artificial Intelligence for Heaton Research
2 Jeff Heaton Edition
Humans LLC
(2020)
https://www.youtube.com/watch?v=T3PsRW6wZSY&list=PLIg1dOXc_acbdJo-
2 AE5RXpIM_rvwrerwR
3 https://www.youtube.com/watch?v=QlhHqMnd9Wo
4 https://www.youtube.com/watch?v=KjDWcYHclOM
SEMESTER S4
Course Objectives:
1. Enables the learners to understand the basic concepts of Industrial control system.
2. The course helps the students to identify the difference between OT and IT networks in
Industrial Systems.
3. Enables the students to describe the different cyber security controls and Access control
Mechanisms.
4. Enables the learners to summarize the operation, design and vulnerabilities of Industrial
Control System and understand various Networking and Industrial protocols.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to ICS(Industrial Control System)
System Overview: Industrial Control System Architecture-Distributed
Control Systems (DCS)-Programmable Logic Controller (PLC) - SCADA
1
overview.
9
Building Automation and Control System Overview, Safety Instrumented
Systems, Industrial Internet of Things
Purdue Model for Industrial Control Systems, Difference Between OT and
IT Networks in Industrial Systems , OT Versus IT
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Illustrate the basic concepts of Industrial Control systems and K2
CO1 differentiate between different types of Industrial Control Systems.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
3 3 2 3
CO1
3 3 2 3
CO2
3 2 2 3
CO3
3 2 2 2 2 2 2 3
CO4
3 3 2 2 2 2 2 3
CO5
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Thomson
Introduction to Programmable Delmar Cengage
1 Gary Dunning 2nd edition,
Logic Controllers Learning
2013
4th
SCADA Supervisory Control
2 Stuart A Boyer ISA Edition,
and Data Acquisition
2009
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Industrial Automation using 2nd Edition,
1 R.G.Jamkar Global Education Ltd
PLC , SCADA & DCS 2018
2 https://www.udemy.com/course/cyber-security-industrial-control-system-security
3 https://www.udemy.com/course/mastering-cybersecurity-and-supply-chain-risk-management
4 https://www.udemy.com/course/assessingprotectingics
SEMESTER S4
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Foundational Data Structures- Overview of Arrays and Linked Lists,
implementation of pointers and objects, Representing rooted trees, Hashing -
Hash Tables, Hash functions, Cuckoo Hashing; Bloom Filters - Count-Min
1 11
Sketch, Applications to Networks - Click Stream Processing using Bloom
Filters, Applications to Data Science - Heavy Hitters and count-min
structures.
Advanced Tree Data Structures - Balanced Trees - AVL Trees (review),
Red-Black Trees, Suffix Trees and Arrays, Segment Trees, Heaps and
5 15 10 10 40
Implement various real world problems using multiple suitable data structures and compare the
performance.
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Implement and use arrays, linked lists, rooted trees and hashing
CO1 K3
techniques in various programming scenarios.
Design and implement advanced tree data structures for information
CO2 K3
retrieval.
CO3 Use spatial and temporal data structures in data science problems. K3
Analyze data structures in special scenarios such as distributed, parallel
CO4 K5
and data compression areas.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2 3 2 3
CO2 3 3 3 3 3 2 3
CO3 3 3 3 3 3 2 3
CO4 3 3 3 3 3 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Advanced Data Structures: Suman Saha, Shailendra
1 CRC Press 1/e, 2019
Theory and Applications Shukla
Cambridge
2 Advanced Data Structures Peter Brass 1/e, 2008
University Press
Thomas H Cormen, Charles E
3 Introduction to Algorithms Leiserson, Ronald L Rivest, MIT Press 4/e, 2022
Clifford Stein
Fundamentals of Computer Ellis Horowitz, SatrajSahani
4 University Press 2/e, 2009
Algorithms and Rajasekharam
Oxford University
5 Advanced Data Structures Reema Thareja, S. Rama Sree 1/e, 2018
Press
Data Structures and Algorithm 2/e, 2004.
6 Mark Allen Weiss Pearson
Analysis in C++,
Design and Analysis of M T Goodrich, Roberto
7 Wiley 1/e, 2021
Algorithms Tamassia
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 https://web.stanford.edu/class/cs166/
SEMESTER S3/S4
Teaching Hours/Week
2:0:0:0 ESE Marks 50
(L: T:P: R)
Course Objectives:
1. Understanding of finance and costing for engineering operation, budgetary planning and
control
2. Provide fundamental concept of micro and macroeconomics related to engineering
industry
3. Deliver the basic concepts of Value Engineering.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Basic Economics Concepts - Basic economic problems – Production
Possibility Curve – Utility – Law of diminishing marginal utility – Law of
Demand - Law of supply – Elasticity - measurement of elasticity and its
1 6
applications – Equilibrium- Changes in demand and supply and its effects
Cost concepts – Social cost, private cost – Explicit and implicit cost – Sunk
cost - Opportunity cost - short run cost curves - Revenue concepts
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Micro project
(Written) (Written)
10 15 12.5 12.5 50
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand the fundamentals of various economic issues using laws K2
CO1 and learn the concepts of demand, supply, elasticity and production
function.
Develop decision making capability by applying concepts relating to K3
CO2 costs and revenue, and acquire knowledge regarding the functioning of
firms in different market situations.
Outline the macroeconomic principles of monetary and fiscal systems, K2
CO3
national income and stock market.
Make use of the possibilities of value analysis and engineering, and K3
CO4 solve simple business problems using break even analysis, cost benefit
analysis and capital budgeting techniques.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 - - - - - 1 - - - - 1 -
CO2 - - - - - 1 1 - - - 1 -
CO3 - - - - 1 - - - - - 2 -
CO4 - - - - 1 1 - - - - 2 -
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Geetika, Piyali Ghosh
1 Managerial Economics Tata McGraw Hill, 2015
and Chodhury
H. G. Thuesen, W. J.
2 Engineering Economy PHI 1966
Fabrycky
3 Engineering Economics R. Paneerselvam PHI 2012
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Leland Blank P.E,
1 Engineering Economy Mc Graw Hill 7TH Edition
Anthony Tarquin P. E.
2 Indian Financial System Khan M. Y. Tata McGraw Hill 2011
Engineering Economics and Donald G. Newman,
3 Engg. Press, Texas 2002
analysis Jerome P. Lavelle
Contemporary Engineering Prentice Hall of India
4 Chan S. Park 2001
Economics Ltd
SEMESTER S3/S4
Teaching Hours/Week
2:0:0:0 ESE Marks 50
(L: T:P: R)
Course Objectives:
1. Equip with the knowledge and skills to make ethical decisions and implement gender-
sensitive practices in their professional lives.
2. Develop a holistic and comprehensive interdisciplinary approach to understanding
engineering ethics principles from a perspective of environment protection and sustainable
development.
3. Develop the ability to find strategies for implementing sustainable engineering solutions.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Fundamentals of ethics - Personal vs. professional ethics, Civic Virtue,
Respect for others, Profession and Professionalism, Ingenuity, diligence
and responsibility, Integrity in design, development, and research domains,
Plagiarism, a balanced outlook on law - challenges - case studies,
Technology and digital revolution-Data, information, and knowledge,
Cybertrust and cybersecurity, Data collection & management, High
1 technologies: connecting people and places-accessibility and social 6
impacts, Managing conflict, Collective bargaining, Confidentiality, Role of
confidentiality in moral integrity, Codes of Ethics.
Basic concepts in Gender Studies - sex, gender, sexuality, gender
spectrum: beyond the binary, gender identity, gender expression, gender
stereotypes, Gender disparity and discrimination in education,
employment and everyday life, History of women in Science & Technology,
Gendered technologies & innovations, Ethical values and practices in
connection with gender - equity, diversity & gender justice, Gender policy
and women/transgender empowerment initiatives.
Introduction to Environmental Ethics: Definition, importance and
historical development of environmental ethics, key philosophical theories
(anthropocentrism, biocentrism, ecocentrism). Sustainable Engineering
Principles: Definition and scope, triple bottom line (economic, social and
environmental sustainability), life cycle analysis and sustainability metrics.
2 Ecosystems and Biodiversity: Basics of ecosystems and their functions, 6
Importance of biodiversity and its conservation, Human impact on
ecosystems and biodiversity loss, An overview of various ecosystems in
Kerala/India, and its significance. Landscape and Urban Ecology:
Principles of landscape ecology, Urbanization and its environmental impact,
Sustainable urban planning and green infrastructure.
Hydrology and Water Management: Basics of hydrology and water cycle,
Water scarcity and pollution issues, Sustainable water management practices,
Environmental flow, disruptions and disasters. Zero Waste Concepts and
Practices: Definition of zero waste and its principles, Strategies for waste
reduction, reuse, reduce and recycling, Case studies of successful zero waste
initiatives. Circular Economy and Degrowth: Introduction to the circular
3 economy model, Differences between linear and circular economies, 6
degrowth principles, Strategies for implementing circular economy practices
and degrowth principles in engineering. Mobility and Sustainable
Transportation: Impacts of transportation on the environment and climate,
Basic tenets of a Sustainable Transportation design, Sustainable urban
mobility solutions, Integrated mobility systems, E-Mobility, Existing and
upcoming models of sustainable mobility solutions.
Renewable Energy and Sustainable Technologies: Overview of renewable
energy sources (solar, wind, hydro, biomass), Sustainable technologies in
energy production and consumption, Challenges and opportunities in
renewable energy adoption. Climate Change and Engineering Solutions:
Basics of climate change science, Impact of climate change on natural and
4 6
human systems, Kerala/India and the Climate crisis, Engineering solutions to
mitigate, adapt and build resilience to climate change. Environmental
Policies and Regulations: Overview of key environmental policies and
regulations (national and international), Role of engineers in policy
implementation and compliance, Ethical considerations in environmental
policy-making. Case Studies and Future Directions: Analysis of real-
world case studies, Emerging trends and future directions in environmental
ethics and sustainability, Discussion on the role of engineers in promoting a
sustainable future.
Course Assessment Method
(CIE: 50 marks , ESE: 50)
The students should be grouped into groups of size 4 to 6 at the beginning of the semester.
These groups can be the same ones they have formed in the previous semester.
Activities are to be distributed between 2 class hours and 3 Self-study hours.
The portfolio and reflective journal should be carried forward and displayed during the 7th
Semester Seminar course as a part of the experience sharing regarding the skills developed
through various courses.
3 Activities 2. One activity* each from Module II, Module III & Module IV G 15
Total Marks 50
Bloom’s
Course Outcome Knowledge
Level (KL)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 3 3 2 2
CO2 1 3 2 3 3 2 2
CO3 3 3 2 3 2 2
CO4 1 3 3 2 3 2 2
CO5 3 3 2 3 2 2
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
2nd edition
Ethics in Engineering Practice Cambridge University
1 Caroline Whitbeck & August
and Research Press & Assessment
2011
2nd edition
Cambridge University &
3 Bert J. M. de Vries
Sustainability Science Press & Assessment December
2023
Cambridge University
4 Sustainable Engineering Bhavik R. Bakshi, 2019
Principles and Practice Press & Assessmen
M Govindarajan, S
PHI Learning Private
5 Natarajan and V S 2012
Engineering Ethics Ltd, New Delhi
Senthil Kumar
Suggested Activities/Projects:
Module-II
● Write a reflection on a local environmental issue (e.g., plastic waste in Kerala
backwaters or oceans) from different ethical perspectives (anthropocentric, biocentric,
ecocentric).
● Write a life cycle analysis report of a common product used in Kerala (e.g., a coconut,
bamboo or rubber-based product) and present findings on its sustainability.
● Create a sustainability report for a local business, assessing its environmental, social, and
economic impacts
● Presentation on biodiversity in a nearby area (e.g., a local park, a wetland, mangroves,
college campus etc) and propose conservation strategies to protect it.
● Develop a conservation plan for an endangered species found in Kerala.
● Analyze the green spaces in a local urban area and propose a plan to enhance urban
ecology using native plants and sustainable design.
● Create a model of a sustainable urban landscape for a chosen locality in Kerala.
Module-III
● Study a local water body (e.g., a river or lake) for signs of pollution or natural flow disruption and
suggest sustainable management and restoration practices.
● Analyse the effectiveness of water management in the college campus and propose improvements -
calculate the water footprint, how to reduce the footprint, how to increase supply through rainwater
harvesting, and how to decrease the supply-demand ratio
● Implement a zero waste initiative on the college campus for one week and document the challenges
and outcomes.
● Develop a waste audit report for the campus. Suggest a plan for a zero-waste approach.
● Create a circular economy model for a common product used in Kerala (e.g., coconut oil, cloth etc).
● Design a product or service based on circular economy and degrowth principles and present a
business plan.
● Develop a plan to improve pedestrian and cycling infrastructure in a chosen locality in Kerala
Module-IV
● Evaluate the potential for installing solar panels on the college campus including cost-benefit analysis
and feasibility study.
● Analyse the energy consumption patterns of the college campus and propose sustainable alternatives
to reduce consumption - What gadgets are being used? How can we reduce demand using energy-
saving gadgets?
● Analyse a local infrastructure project for its climate resilience and suggest improvements.
● Analyse a specific environmental regulation in India (e.g., Coastal Regulation Zone) and its impact
on local communities and ecosystems.
● Research and present a case study of a successful sustainable engineering project in Kerala/India
(e.g., sustainable building design, water management project, infrastructure project).
● Research and present a case study of an unsustainable engineering project in Kerala/India
highlighting design and implementation faults and possible corrections/alternatives (e.g., a housing
complex with water logging, a water management project causing frequent floods, infrastructure
project that affects surrounding landscapes or ecosystems).
SEMESTER S4
Teaching Hours/Week
0:0:3:0 ESE Marks 50
(L: T:P: R)
Course Objectives:
Expt.
Experiments
No.
1 Familiarisation with basic Linux programming commands: ps, strace, gdb, strings,
objdump, nm, file, od, xxd, time, fuser, top
Use /proc file system to gather basic information about your machine:
Create a new process using a fork system call. Print the parent and child process IDs. Use
4 the pstree command to find the process tree for the child process starting from the init
process.
Write a program to add two integers (received via the command line) and compile it to an
5
executable named “myadder”. Now write another program that creates a new process
using a fork system call. Make the child process add two integers by replacing its image
with the “myadder” image using execvp system call.
Create a new process using a fork system call. The child process should print the string
6 “PCCSL407” and the parent process should print the string “Operating Systems Lab”.
Use a wait system call to ensure that the output displayed is “PCCSL407 Operating
Systems Lab”
Input a list of processes, their CPU burst times (integral values), arrival times, and
priorities. Then simulate FCFS, SRTF, non-preemptive priority (a larger priority number
9 implies a higher priority), and RR (quantum = 3 units) scheduling algorithms on the
process mix, determining which algorithm results in the minimum average waiting time
(over all processes).
10 Use semaphores to solve the readers-writers problem with writers being given priority
over readers.
11 Obtain a (deadlock-free) process mix and simulate the banker’s algorithm to determine a
safe execution sequence.
14
Simulate the address translation in the paging scheme as follows: The program receives
three command line arguments in the order
Simulate the FIFO, LRU, and optimal page-replacement algorithms as follows: First,
generate a random page-reference string where page numbers range from 0 to 9. Apply the
15 random page-reference string to each algorithm, and record the number of page faults
incurred by each algorithm. Assume that demand paging is used. The length of the
reference string and the number of page frames (varying from 1 to 7) are to be received as
command line arguments.
Simulate the SSTF, LOOK, and CSCAN disk-scheduling algorithms as follows: Your
program will service a disk with 5,000 cylinders numbered 0 to 4,999. The program will
16 generate a random series of 10 cylinder requests and service them according to each of the
algorithms listed earlier. The program will be passed the initial position of the disk head
(as a parameter on the command line) and will report the total number of head movements
required by each algorithm.
(Continuous Assessment)
5 25 20 50
● Submission of Record: Students shall be allowed for the end semester examination only upon
submitting the duly certified record.
● Endorsement by External Examiner: The external examiner shall endorse the record
Bloom’s
Course Outcome Knowledge
Level (KL)
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3 3
CO2 3 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
CO5 3 3 3 3 3 3
Andrea Arpaci-
1 Operating Systems: Three Easy Pieces Dusseau, Remzi CreateSpace 1/e, 2018
Arpaci-Dusseau
Reference Books/Websites
2 The Little Book of Semaphores Allen B. Downey Green Tea Press 1/e, 2016
Module
Link ID
No.
1 https://archive.nptel.ac.in/courses/106/105/106105214/
2 https://www.youtube.com/playlist?list=PLDW872573QAb4bj0URobvQTD41IV6gRkx
● Quality of Reports: Clarity, completeness and accuracy of lab reports. Proper documentation
of experiments, data analysis and conclusions.
● Timely Submission: Adhering to deadlines for submitting lab reports/rough record and
maintaining a well-organized fair record.
● Oral Examination: Ability to explain the experiment, results and underlying principles during
a viva voce session.
Final Marks Averaging: The final marks for preparation, conduct of experiments, viva,
and record are the average of all the specified experiments in the syllabus.
● Setup and Execution: Proper setup and accurate execution of the experiment or programming
task.
3. Result with Valid Inference/Quality of Output (10 Marks)
● Ability to explain the experiment, procedure results and answer related questions
● Proficiency in answering questions related to theoretical and practical aspects of the subject.
5. Record (5 Marks)
DBMS Lab
(Common to CS/CD/CR/CA/AD/AI/CB/CN/CC/CU/CI/CG)
Course Objectives:
1. To equip students with comprehensive skills in SQL, PL/SQL, and NoSQL databases.
2. To enable the learner to proficiently design, implement, and manage relational and non-
relational databases to meet diverse data management needs
Expt.
Experiments
No.
1 Design a database schema for an application with ER diagram from a problem description.
Creation of database schema - DDL (create tables, set constraints, enforce relationships,
2 create indices, delete and modify tables). Export ER diagram from the database and verify
relationships (with the ER diagram designed in step 1).
Database initialization - Data insert, Data import to a database (bulk import using UI and
3
SQL Commands).
Practice SQL commands for DML (insertion, updating, altering, deletion of data, and
4
viewing/querying records based on condition in databases).
Implementation of various aggregate functions, Order By, Group By & Having clause in
5
SQL.
6 Implementation of set operators nested queries, and join queries.
Practice of SQL TCL DCL commands like Rollback, Commit, Savepoint,Practice of SQL
7
DCL commands for granting and revoking user privileges.
8 Practice of SQL commands for creation of views and assertions.
9 Creation of Procedures, Triggers and Functions.
10 Creation of Packages and cursors.
11 Design a database application using any front-end tool for any problem selected in
experiment number 1. The application constructed should have five or more tables**.
12 Perform basic CRUD (Create, Read, Update, Delete) operations on a Cassandra table.
13 Write and execute CQL queries to retrieve specific data from Cassandra tables
14 Create a simple application using Mongodb with python
** The problem must be designed to convey the difference of NoSQL from SQL databases.
5 25 20 50
● Submission of Record: Students shall be allowed for the end semester examination only upon
submitting the duly certified record.
● Endorsement by External Examiner: The external examiner shall endorse the record
Bloom’s
Course Outcome Knowledge
Level (KL)
Develop database schema for a given real world problem-domain using
CO1 K3
standard design and modeling approaches
Construct queries using SQL for database creation, interaction, modification,
CO2 K3
and updation.
Plan and implement triggers and cursors, procedures, functions, and control
CO3 K3
structures using PL/SQL
CO4 Perform CRUD operations in NoSQL Databases K3
CO5 Design database applications using front-end tools and back-end DBMS K5
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 1 3 3
CO2 3 3 3 1 3 3
CO3 3 3 3 1 3 3
CO4 3 3 3 2 3 3 3
CO5 3 3 3 2 3 3 3 3
1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
1 Fundamentals of Database Systems Elmasri, Navathe Pearson 7/e, 2017
2 Professional NoSQL Shashank Tiwari Wiley 1/e, 2011
Reference Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
1 Database System Concepts, Sliberschatz Korth and S.
McGraw Hill, 7/e, 2017
Sudarshan
2 John Wiley &
NoSQL for Dummies Adam Fowler 1/e, 2015
Sons
NoSQL Data Models: Trends and
3 Challenges (Computer Engineering: Olivier Pivert Wiley 1/e, 2018
Databases and Big Data),
Making the Sense of NoSQL : A Dan McCreary and Ann
4 Manning 1/e, 2014
guide for Managers and Rest of us. Kelly
2 https://onlinecourses.nptel.ac.in/noc21_cs04/preview
3 https://onlinecourses.nptel.ac.in/noc21_cs04/preview
4 https://archive.nptel.ac.in/courses/106/104/106104135/
Continuous Assessment (25 Marks)
● Quality of Reports: Clarity, completeness and accuracy of lab reports. Proper documentation
of experiments, data analysis and conclusions.
● Timely Submission: Adhering to deadlines for submitting lab reports/rough record and
maintaining a well-organized fair record.
4. Viva Voce (5 Marks)
● Oral Examination: Ability to explain the experiment, results and underlying principles during
a viva voce session.
Final Marks Averaging: The final marks for preparation, conduct of experiments, viva,
and record are the average of all the specified experiments in the syllabus.
● Setup and Execution: Proper setup and accurate execution of the experiment or programming
task.
● Ability to explain the experiment, procedure results and answer related questions
● Proficiency in answering questions related to theoretical and practical aspects of the subject.
5. Record (5 Marks)
APPLIED CRYPTOGRAPHY
Teaching Hours/Week
3:1:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Introduction to Cryptography and Security
Introduction to Cryptography: Definition and History of Cryptography -
Importance and Applications - Key Terminologies and Concepts - Types of
Attacks
Classical Encryption Techniques: Substitution Ciphers: Caesar Cipher,
Monoalphabetic Cipher, Playfair Cipher, Hill Cipher, Polybius Square
2 OFB, CTR 10
Asymmetric Key Cryptography: Principles of Public Key Cryptosystems-
RSA Algorithm-Diffie-Hellman Key Exchange-Elliptic Curve Cryptography
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Students will be able to understand the fundamental principles and K3
CO1 historical context of cryptography, including key terminologies and
classical encryption techniques.
Students will be able to implement and analyze symmetric and K3
CO2 asymmetric cryptographic algorithms, hash functions, and message
authentication codes.
Students will demonstrate the ability to apply cryptographic protocols to K2
CO3
secure communication, key management, and electronic transactions.
Students will be able to understand advanced cryptographic applications K2
CO4 and emerging trends, including security in cloud computing, IoT, and
quantum computing.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 1
CO2 3 3 3 1
CO3 3 3 3 3 1 1
CO4 3 2 3 3 1 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Cryptography and Network
8th Ed,
1 Security: Principles and William Stallings Pearson
2021
Practices
Introduction to Modern
Jonathan Katz and 2020 (3rd
2 Cryptography: Principles and CRC Press
Yehuda Lindell Edition)
Protocols
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Applied Cryptography:
1 Protocols, Algorithms, and Bruce Schneier Wiley 2015
Source Code in C
Cryptography and Network William Easttom
2 Dreamtech Press 2017
Security: Black Book
Understanding Cryptography:
Christof Paar and Jan
3 A Textbook for Students and Springer 2009
Pelzl
Practitioners
Network Security Essentials:
4 William Stallings Pearson 2016
Applications and Standards
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 https://www.youtube.com/watch?v=iTVyKbDCJrA
2 https://www.youtube.com/watch?v=UxtR-CB69Rw
https://www.youtube.com/watch?v=FOk8TN7HQLo
3
4 https://www.youtube.com/watch?v=9XC4mY_3X2I
SEMESTER S5
Teaching Hours/Week
3:1:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. Enables the learners to understand network security domain, the techniques for network protection
2. This course helps to identify the attacks and defence in Data and wireless networks.
3. Enables the students to the basic functionalities and hardening of Windows and Linux operating
system.
4. This course helps to identify the attacks and security in internet and web service.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Module-1 (Principles of Network Security)
Module-3(System Security)
Web Browser and Client risk- How a web browser works, Web browser
attacks, Operating safely, Web security- How HTTP works, Server and Client
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Explain network security domain, the techniques for network K1
protection and explore new tools and attacks in Network security
CO1
domain.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 3 2 2 3 3 3
CO2 2 3 2 2 3 2 2
CO3 2 2 2 2 3 3 2
CO4 2 2 2 2 3 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Eric Cole, Ronald
Wiley India Pvt Ltd,
Network Security Bible Krutz, James W.
1 2010 First
Conley, Edition,2010
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
4th
William Stallings Pearson Education Edition,
Network Security Essentials
1 2011
MACHINE LEARNING
(Common to CS/AD/CR/CA/CC/CD)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to ML :-
1 Supervised Learning :- 9
Unsupervised Learning
4 9
Dimensionality reduction - Principal Component Analysis, Multidimensional
scaling
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Illustrate Machine Learning concepts and basic parameter estimation
CO1 methods. K2
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
CO5 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
1 Introduction to Machine Learning Ethem Alpaydin MIT Press 4/e, 2020
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Applied Machine Learning M Gopal McGraw Hill 2/e, 2018
Machine Learning
Manaranjan Pradhan | U
2 Wiley 1/e, 2019
using Python Dinesh Kumar
3 https://nptel.ac.in/courses/106106202\
SEMESTER S5
MICROCONTROLLERS
(Common to CS/CC)
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Introduction to ARM Cortex-M Architecture:-
● Identify real world problems requiring hardware solutions and develop them using
peripheral devices. Some of the examples would be - Home automation, Small home/office
security system, ARM based voice response system etc.
5 30 12.5 12.5 60
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
CO5 3 3 3 3 3
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
The Definitive Guide to ARM Cortex-
1 Joseph Yiu Newnes - Elsevier 3/e, 2014
M3 and Cortex-M4 Processors
Introduction to ARM ®
3 Jonathan W. Valvano Self-Published 5/e, 2014
Cortex-M Microcontrollers
2 https://www.st.com/resource/en/datasheet/
Simulation/
Presentation
Lecture Laboratory
Project identification (Progress and Final
delivery Work/
Presentations)
Workshops
Group
Project Analysis Data Collection Evaluation
discussion
Question
Project Milestone Reviews,
answer Analytical thinking
Feedback,
Sessions/ and Testing
Project reformation (If
Brainstorming self-learning
required)
Sessions
Poster Presentation/
Guest Speakers
Case Study/ Field Video Presentation: Students
(Industry Prototyping
Survey Report present their results in a 2 to
Experts)
5 minutes video
Assessment and Evaluation for Project Activity
5 Final Presentations 5
Total 30
CIE
Course Code 40
PECCT521 Marks
Teaching 3:0:0:0 ESE
Hours/Week 60
Marks
(L: T:P: R)
3 Exam
Credits 2 Hrs. 30 Min.
Hours
Basic knowledge of networking
concepts and familiarity with Course
Prerequisites (if any) Theory
Type
operating systems
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Introduction to Networking Concepts and Cloud Computing:- Basics of
Computer Networks: Overview of Network Types: LAN, WAN, Pan, OSI
and TCP/IP Models.IP Addressing and Subnetting: IPv4 vs. IPv6 Addressing,
SubnettingConcepts and Techniques.
1 9
Introduction to Cloud Computing: Cloud Computing Models: IaaS, PaaS,
SaaS. Cloud Architecture Overview.
Networking in Cloud Environments: Importance of Networking in Cloud,
Interaction Between Traditional Networks and Cloud Infrastructures.
Networking Protocols and Cloud Connectivity :-
2 TCP/IP Protocol Suite: Deep Dive into TCP/IP Protocols, Role of TCP/IP 9
in Cloud Environments.
DNS and DHCP in the Cloud, DNS Configuration in Cloud, DHCP in Cloud
Networks.
Virtual Private Networks (VPN): VPN Implementation in Cloud, Securing
VPNs for Cloud Connectivity.
Load Balancing in Cloud: Load Balancer Types and Configurations,
Implementing Load Balancers in Cloud.
Virtual Private Cloud (VPC), VPC Configuration and Management, VPC
Peering and Gateways.
Hybrid Cloud Connectivity, Integrating Public and Private Clouds,
Challenges and Solutions in Hybrid Cloud Connectivity.
Cloud Networking Components, Architectures, and Security:
Virtual Networking and SDN: Virtual Networks(VNet) Configuration,
Principles of SDN and Implementation in Cloud, Network Function.
Virtualization (NFV) and Microservices: NFV Components and Architecture,
Networking for Containers (Docker, Kubernetes).
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Illustrate Fundamental Networking Concepts and Cloud
CO1 K2
Computing Basics.
CO2 Explain IP Addressing and Subnetting Techniques. K2
Apply Networking Protocols and Cloud Connectivity
CO3 K3
Solutions.
CO4 Illustrate Cloud Networking Components and SecurityMeasures K2
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2
CO2 3 2 2
CO3 3 2 2
CO4 3 2 2
CO5 3 2 2 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Computer Networking: A Top- James F. Kurose and
Down Approach Keith W. Ross Pearson Eight
1 Publications Edition,
2017.
Cloud Computing: Concepts, Thomas Erl, Ricardo Prentice Hall
2 Technology & Architecture Puttini, and Zaigham Publications First
Mahmood edition,
2013.
Reference Books
Edition
Sl. No Title of the Book Name of the Author/s Name of the Publisher
and Year
Cloud Networking: Gary Lee and Lee
Understanding Cloud- based Hwee Kuan CRC Press First
1 Data Center Networks edition,
2017.
Network Security Essentials:
Applications and Standards William Stallings Pearson Sixth
2 Publications edition,
2020.
Brad Bulger, Ather
AWS Certified Advanced Khan, and Stephen Wiley First
3 Networking Official Study Cole Publications edition,
Guide: Specialty Exam 2020.
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 https://youtu.be/fErDcUtd8fA?si=vk5rYduwokgAqUMh
2 https://youtu.be/3NDhETVfrp0?si=MyOfYaRDJRJ0gn9F
3 https://youtu.be/RWgW-CgdIk0?si=HN9mHIo4w9-J4IaJ
4 https://youtu.be/YmYWevNdcik?si=8dO1vCGjO1yPQ8XE
SEMESTER S5
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. To undertake path-breaking research that creates new computing technologies and solutions for
industry and society at large.
2. To create cryptocurrencies and give a strong technical understanding of Blockchain technologies
with an in-depth understanding of applications, open research challenges, and future directions .
SYLLABUS
Module Contact
Syllabus Description
No. Hours
INTRODUCTION TO BLOCKCHAIN
Block chain- Public Ledgers, Blockchain as Public Ledgers – Block in a
2 FORTH – the precursor for Bitcoin scripting, Bitcoin Scripts , Bitcoin P2P 9
Network, Transaction in Bitcoin Network, Block Mining, Block propagation
and block relay
BITCOIN CONSENSUS
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand emerging abstract models for Blockchain Technology
CO1 K2
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2 3
CO2 2 3 2 2
CO3 3 2 2 2
CO4 2 3 2 2
CO5 3 2 2 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Mastering Blockchain: Inner
workings of blockchain, from
1 cryptography and decentralized Bashir and Imran Kindle Edition 2023
identities, to DeFi, NFTs and
Web3, 4th Edition
“Mastering Bitcoin: Unlocking Andreas Antonopoulos
2 O’Reilly 2023
Digital Cryptocurrencies”, Drescher
Elsevier Inc. ISBN:
Handbook of Research on
3 978012819816 2020.
Blockchain Technology
AI IN CYBER SECURITY
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
PECCT413
Prerequisites (if any) Course Type Theory
Introduction to AI and
ML
Course Objectives:
Module Contact
Syllabus Description
No. Hours
AI in Cyber Security
Role of AI in Cyber Security: Introduction to the role of AI in cybersecurity:
how AI is transforming cyber defences, Discussion on the current state of
cyber threats and how AI can mitigate them
Review of Basic Cyber Threats: Overview of basic cyber threats: malware,
phishing, DDoS attacks, etc.
3 world applications 9
Introduction to AI-Driven Data Analysis Techniques: Basic concepts of
AI-driven data analysis in cybersecurity
Case Study: How AI-driven data analysis thwarted a cyber-attack (e.g.,
IBM’s Watson in Cybersecurity)
Ethical Considerations and Challenges in AI for Cyber Security
Ethical Implications of AI in Cyber Security: Ethical issues surrounding AI
in cybersecurity (privacy, bias, etc.)
Challenges in Implementing AI for Cyber Security: Technical challenges
in AI-based cybersecurity (data quality, model robustness), Future Trends and
4 9
Ethical Balances in AI and Cyber Security, Emerging trends in AI for
cybersecurity
Case Study: Privacy concerns with AI-driven surveillance (e.g., AI in facial
recognition by law enforcement)
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 To describe the role of AI in modern cybersecurity. K2
CO2 To explain the application of supervised learning in threat detection. K2
To analyze real-world applications of AI in virus detection and intrusion
CO3 K3
prevention.
To explain the ethical implications of AI in cybersecurity, including
CO4 K2
privacy and bias issues.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 1 1 1
CO2 3 1 1 1
CO3 3 2 2 1 1 1
CO4 3 2 1 1 1
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Himanshu Upadhyay,
Artificial Intelligence in Cyber Steven Lawrence
1 Springer International
Security: Theories and Fernandes, Tarun 2023
Publishing
Applications Kumar Sharma, Tushar
Bhardwaj
ARTIFICIAL Rahul Neware Khaja
2 INTELLIGENCE IN CYBER Mannanuddin, Mukesh
Book Rivers 2022
SECURITY Madanan, Dr. Shikha
Gupta
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Artificial Intelligence in Springer International
1 Leslie F. Sikos 2018
Cybersecurity Publishing
Artificial Intelligence for
Springer International
2 Cybersecurity: Techniques, Mark Stamp 2022
Publishing
Challenges and Research
Machine Learning and
Clarence Chio, David
3 Security: Protecting Systems O'Reilly Media 2018
Freeman
with Data and Algorithms
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 Cyber Security and Privacy by Prof. Saji K Mathew (NPTEL)
Applied Accelerated Artificial Intelligence
2 By Prof. Satyajit Das, Prof. Satyadhyan Chickerur, Prof. Bharatkumar Sharma, Prof. Adesuyi
Tosin, Prof.Ashrut Ambastha
Applied Accelerated Artificial Intelligence
3 By Prof. Satyajit Das, Prof. Satyadhyan Chickerur, Prof. Bharatkumar Sharma, Prof. Adesuyi
Tosin, Prof.Ashrut Ambastha
Applied Accelerated Artificial Intelligence
4 By Prof. Satyajit Das, Prof. Satyadhyan Chickerur, Prof. Bharatkumar Sharma, Prof. Adesuyi
Tosin, Prof.Ashrut Ambastha
SEMESTER S5
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
PECCT414
FUNDAMENTALS OF
Prerequisites (if any) INDUSTRIAL
Course Type Theory
CONTROL SYSTEM
SECURITY
Course Objectives:
1. Enables the learners to understand the advanced concepts of Network Security and Endpoint
Security.
2. Enables the learners to apply the best practices in each phase of SDLC and gain an insight on data
classification and data loss prevention.
3. Enables learners to manage the full life cycle of digital entities, gain skills in deploying SIEM
systems and apply threat intelligence to improve organizational security.
4. Enables the learners to understand the Compliance and regulatory controls and gain knowledge
on emerging technologies related to industrial cyber security.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Network Security Controls : Firewalls - Types of Firewalls, Configuration
of Firewalls,
Intrusion Detection and Prevention Systems (IDPS), Virtual Private
1 9
Networks (VPNs),
Network Segmentation.
Endpoint Security : Antivirus and Antimalware, Endpoint Detection and
Response (EDR),
Patch Management, Device Encryption.
3 9
Security Monitoring and Incident Response: Security Information and
Event Management (SIEM),Threat Intelligence, Incident Response
Planning,Forensics and Post-Incident Analysis
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Able to configure firewall rules and policies and identify different types K2
CO1
of malware.
Integrate security practices into each phase of SDLC and apply the K3
CO2
principles of encryption for data protection
Design and implement Identity management processes and understand K3
CO3
the role of SIEM systems in analysing security events.
Integrate Threat Intelligence into security operations and conduct post- K3
CO4
incident analysis to determine the root cause of security incidents.
Understand the compliance and regulatory controls and gain knowledge K2
CO5
on emerging technologies related to industrial cyber security.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2 2 1 1 1 1 1
CO2 3 2 2 2 1 1 1 1 1
CO3 3 2 2 2 1 1 1 1 1
CO4 3 2 2 2 1 1 1 1 1
CO5 3 2 2 2 1 1 1 1 1
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Network Security Essentials: Pearson 6th
1 William Stallings
Applications and Standards. Edition,2016
Network Intrusion Detection
Ali A Ghorbani, Wei Springer-Verlag 1st Edition,
2 and Prevention: Concepts and
Lu, Mahabod Tavallaee NewYork Inc. 2010
Practices
Malware Analyst’s Cookbook
Michael Ligh,
and DVD: Tools and 1st
3 Steven Adair, Wiley
Techniques for fighting Edition,2010
Blake Heartstein
malicious code
Software Security: Building 1st
4 Gary Mcgraw Addison-Wesley
Security In Edition,2006
Identity and Access
Management :Business 1st
5 Ertem Osmanoglu Syngress
Performance through Edition,2013
Connected Intelligence
Zero Trust Networks: Building Evan Gilman,
1st Edition
6 Secure systems in Untrusted Doug Barth O’Reilly
2017
Networks
Reference Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Web Application Security:
Exploitation and Orielly and 2nd
1 Andrew Hoffman
Countermeasures for Modern Associates Inc. Edition,2020
Web Applications
David Miller, Shon
Harris,
Security Information and Event Allen Harper, McGraw Hill 2nd
2
Management Implementation Stephen Wandyke, Education Edition,2010
Chris Blask
2 https://nptel.ac.in/courses/128106006
3 https://onlinecourses.nptel.ac.in/noc24_cs85/preview
4 https://onlinecourses.nptel.ac.in/noc24_cs121/preview
http://www.digimat.in/nptel/courses/video/106104220/L01.html
SEMESTER S5
Course Objectives:
1. To learn the techniques to effectively plan, manage, execute, and control projects within time and
cost targets with a focus on Information Technology and Service Sector.
2. To learn agile project management techniques such as Scrum and DevOps.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Project scheduling and feasibility study : -
Internal Internal
Assignment/ Examination-1 Examination- 2
Attendance Total
Microproject
(Written) (Written)
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2 2
CO2 3 3 3 2 2
CO3 3 3 3 2 2
CO4 3 3 3 2 2
CO5 3 3 3 2 2
Text Books
Name of the Name of the Edition and
Sl. No Title of the Book
Author/s Publisher Year
Succeeding with Agile: Software
1 Mike Cohn Addison-Wesley 1/e, 2009
Development Using Scrum
Reference Books
Name of the Edition and
Sl. No Title of the Book Name of the Publisher
Author/s Year
1 Agile Product Management with Roman Pichler Addison-Wesley 1/e, 2010
Scrum
Agile Project Management with
2 Ken Schwaber Microsoft Press 1/e, 2004
Scrum
2 https://www.youtube.com/watch?v=TPEgII1OilU
3 https://www.youtube.com/watch?v=7Bxdds2siU8
SEMESTER S5
DATA MINING
(Common to CS/CD/CM/CA/AM)
Course Objectives:
1. To provide a thorough understanding of the key processes and concepts involved in data mining and
data warehousing within application domains
2. To enable students to understand the different data preprocessing techniques, fundamentals and
advanced concepts of classification, clustering, association rule mining, text mining and web
mining, and apply these techniques in real-world scenarios
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Data Preprocessing :-
2 Data Preprocessing - Need of data preprocessing, Data Cleaning- Missing values, 11
Web Mining - Web Content Mining, Web Structure Mining- Page Rank, Web
4 Usage Mining- Preprocessing, Data structures, Pattern Discovery, Pattern 12
Analysis
Text Mining - Text Data Analysis and information Retrieval, Basic measures for
Text retrieval, Text Retrieval methods, Text Indexing Technique
Students must be asked to identify problems involving large datasets and identify the right solution from
the concepts already learned. A comparison of the results with a similar approach also need to be
performed to assess the Knowledge Level 5.
End Semester Examination Marks (ESE):
In Part A, all questions need to be answered and in Part B, each student can choose any
one full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2
CO2 3 3 3 3 2 2
CO3 3 3 3 3 2 2
CO4 3 3 3 3 2 2
CO5 2 2 2
Text Books
Reference Books
Module
Link ID
No.
1 https://youtu.be/ykZ-_UGcYWg?si=qiqynQyjI1sNNiHE
2 https://youtu.be/NSxEiohAH5o?si=ZIJHMiRvpFcNQNMA
3 https://youtu.be/VsYKqOokgaE?si=rgndBZqpzB29LUGg
4 https://youtu.be/N_whCVtfL9M?si=VPMH9NP4vdAaiuPe
SEMESTER S5
CRYPTOGRAPHY LAB
Teaching Hours/Week
0:0:3:0 ESE Marks 50
(L: T:P: R)
Course Objectives:
1. Develop Practical Skills in Cryptographic Techniques: To equip students with hands-on experience
in implementing and analyzing various cryptographic algorithms, including classical ciphers,
symmetric encryption, and asymmetric encryption techniques.
2. Enhance Understanding of Cryptographic Principles and Applications: To enable students to
demonstrate and apply fundamental cryptographic principles in real-world scenarios, ensuring data
integrity, confidentiality, and authentication through practical coding exercises.
3. Foster Proficiency in Secure Communication and Memory Management: To cultivate students'
ability to design and implement secure communication protocols and to simulate memory
allocation and garbage collection using linked lists, integrating cryptographic methods with
effective memory management techniques.
Expt.
Experiments
No.
Represent a string (char pointer) with a value “Hello world”. The program should XOR
1 each character in this string with 0 and displays the result.*
Represent string (char pointer) with a value “Hello world” The program should AND, OR,
2
and XOR each character in this string with 127 and display the result.
Perform encryption and decryption using the following algorithms*
3
a. Ceaser cipher b. Substitution cipher c. Hill Cipher
4 Implementation of Encryption and Decryption using DES*
5 Implementation of RSA Encryption Algorithm
6 Implementation of Hash Functions*
7 Implementation of Blowfish algorithm logic*
8 Implement the Diffie-Hellman Key Exchange mechanism
9 Implement RC4 logic using Java*
10 Encrypt the text “Hello world” using Blowfish.
11 Implement the SIGNATURE SCHEME –Digital Signature Standard*
12 Implement LSB Steganography.
PRACTICE QUESTIONS
1. Write a C program that contains a string (char pointer) with a value”Helloworld”. The program
should XOR each character in this string with 0 and displays the result.
2. Write a C program that contains a string (char pointer) with a value “Hello world‟. The program
should AND, OR, and XOR each character in this string with 127 and display the result.
3. Write a Java program to perform encryption and decryption using the following algorithms
a. Caeser cipher
b. Substitution cipher
c. Hill Cipher
4. Write a C/JAVA program to implement DES Encryption and Decryption
5. Write a C/JAVA program to implement RSA Encryption Algorithm
6. Write a C/JAVA program to implementation of Hash Functions.
7. Write a C/JAVA program to implement the Blowfish algorithm logic.
8. Write the RC4 logic in Java Using Java cryptography; encrypt the text Hello world using
Blowfish. Create your own key using Java key tool.
9. Write a C/JAVA program to implement the Diffie-Hellman Key Exchange mechanism
10. Implement the SIGNATURE SCHEME –Digital Signature Standard
11. Embed a short text message (up to 8 characters) into the least significant bits of the image's pixel
data. Read the modified image and extract the hidden message.
5 25 20 50
End Semester Examination Marks (ESE):
Endorsement by External Examiner: The external examiner shall endorse the record
Bloom’s
Course Outcome Knowledge
Level (KL)
Students will implement various classical and modern cipher techniques to K3
CO1
understand the process of securing information.
Students will code and distinguish between symmetric and asymmetric K3
CO2
cryptographic methods, gaining practical knowledge of both types.
Students will explore and implement different encryption techniques and K3
CO3
message authentication codes (MACs) to ensure data integrity and security.
Students will write programs to implement the DES (Data Encryption K3
CO4 Standard) and RSA (Rivest-Shamir-Adleman) algorithms, understanding
their mechanisms and uses.
Students will create a program using linked lists to simulate memory K3
CO5 allocation and garbage collection, applying data structure concepts to
memory management.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2 1 1 1 1
CO2 3 3 3 2 1 1 1 1
CO3 3 3 3 2 1 1 1 1
CO4 3 3 3 2 1 1 1 1
CO5 3 3 3 2 1 1 1
1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Applied Cryptography:
1 Protocols, Algorithms and Bruce Schneier Wiley 2015
Source Code in C
Quality of Reports: Clarity, completeness and accuracy of lab reports. Proper documentation of
experiments, data analysis and conclusions.
Timely Submission: Adhering to deadlines for submitting lab reports/rough record and
maintaining a well-organized fair record.
4. Viva Voce (5 Marks)
Oral Examination: Ability to explain the experiment, results and underlying principles during a
viva voce session.
Final Marks Averaging: The final marks for preparation, conduct of experiments, viva, and
record are the average of all the specified experiments in the syllabus.
Setup and Execution: Proper setup and accurate execution of the experiment or programming
task.
Ability to explain the experiment, procedure results and answer related questions
Proficiency in answering questions related to theoretical and practical aspects of the subject.
5. Record (5 Marks)
Teaching Hours/Week
0:0:3:0 ESE Marks 50
(L: T:P: R)
Course Objectives:
Expt.
Experiments
No.
1
Preventing PC against latest threats using Windows Defender.
1. You need to protect a Windows computer from malware and viruses without installing any third-party
software. Which built-in tool can you use to scan and remove malicious threats?
2. A user reports that their computer is behaving strangely, and you suspect malware. Which default
Windows tool would you use to perform a quick or full system scan to identify and eliminate the
threat?
3. You need to troubleshoot network latency issues by examining the timing of packet transmissions.
Which tool will help you capture and analyze the packet flow to identify the cause of the delay?
4. To verify the integrity of communication between two endpoints on your network, you want to
capture and analyze the packets being exchanged. Which tool would be best suited for this task?
5. You need to scan a network to discover active devices and identify open ports on each device. Which
tool can you use to perform this network discovery and security auditing?
6. You need to create an offline copy of a website for analysis and reference. Which tool can you use to
download the entire site, including HTML, images, and other files?
7. You want to back up a website's content and structure to ensure you have a local copy in case the site
becomes unavailable. Which tool should you use to accomplish this task efficiently?
8. You need to hide sensitive data within an image file to ensure it remains undetected by unauthorized
users. Which tool would you use to embed and later extract this hidden information?
9. During a network inventory process, you want to quickly discover and document all the IP addresses
currently in use. Which tool would help you perform this task efficiently?
10. To test the security of a web application, you need to perform automated vulnerability scanning and
manual testing for common web application flaws. Which tool provides integrated features for both
types of testing?
Course Assessment Method
5 25 20 50
Submission of Record: Students shall be allowed for the end semester examination only upon
submitting the duly certified record.
Endorsement by External Examiner: The external examiner shall endorse the record
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Familiarize tools to prevent latest threats K3
CO2 Analyze the network traffic using sniffing tools K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO- PO Mapping (Mapping of Course Outcomes with Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2 2 3 2 2
CO2 2 2 2 2 3 2 2
CO3 2 2 3 2 3 2 2
CO4 2 2 3 2 3 2 2
CO5 2 2 3 2 3 2 2
1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Quality of Reports: Clarity, completeness and accuracy of lab reports. Proper documentation of
experiments, data analysis and conclusions.
Timely Submission: Adhering to deadlines for submitting lab reports/rough record and
maintaining a well-organized fair record.
Oral Examination: Ability to explain the experiment, results and underlying principles during a
viva voce session.
Final Marks Averaging: The final marks for preparation, conduct of experiments, viva, and
record are the average of all the specified experiments in the syllabus.
Setup and Execution: Proper setup and accurate execution of the experiment or programming
task.
Ability to explain the experiment, procedure results and answer related questions
Proficiency in answering questions related to theoretical and practical aspects of the subject.
5. Record (5 Marks)
COMPILER DESIGN
(Common to CS/CD/CU/CC/CN/CB)
Course Objectives:
2. To introduce compiler construction tools like Lex and YACC and use them in lexical analysis and
parsing.
SYLLABUS
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Use lexical analysis techniques to build a scanner for a given language
CO1 K3
specification. (Cognitive Knowledge Level: Apply)
Construct parse trees for input programs using parsing algorithms and
CO2 detect syntactic errors. K3
(Cognitive Knowledge Level: Apply)
Develop semantic analysis techniques to check program correctness.
CO3 K3
(Cognitive Knowledge Level: Apply)
Build intermediate code representations by applying intermediate code
CO4 K3
generation techniques. (Cognitive Knowledge Level: Apply)
Optimize generated code using code optimization strategies to improve
CO5 K3
performance. (Cognitive Knowledge Level: Apply)
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 2
CO2 3 3 3 3 2
CO3 3 3 3 3 2
CO4 3 3 3 3 2
CO5 3 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Engineering a Compiler Keith D. Cooper, Linda Torczon Elsevier Science 3/e, 2023
Reference Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Compilers – Principles Aho A.V., Ravi Sethi
1 Techniques and Tools and D. Ullman. Addison Wesley, 2/e, 2010.
CYBER FORENSICS
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. To understand about Computer Forensics and the procedures for investigations and incident
response.
2. To study about data acquisition and to have an understanding of different forensic acquisition
tools.
3. To explore the various cyber threats, attacks and the different anti forensic techniques.
4. To study the theory behind Network Forensics, Mobile Forensics and various types of Forensics.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Cyber Forensics and Investigations: Introduction- Computer Forensic
Investigations - Forensics Investigation Process -Preparing for computer
investigations, understanding Public and private investigations. Data
Acquisition - storage formats for digital evidence, determining the best
1
acquisition method -Forensic Protocol for Evidence Acquisition - Digital
9
Forensics Standards and Guidelines – Incident Response stages -Digital
Evidence – identification, collection, processing, seizing documenting and
storing - contingency planning for image acquisitions.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Explain the basic concepts in cyber forensics, forensics Investigation
CO1 K2
Process and the usage of Cyber Forensics Tools in investigations
Infer the basic concepts of file systems, its associated attribute
CO2 K2
definitions
Utilize the methodologies used in memory analysis and network
CO3 K3
analysis for detection of artifacts
Explain the basic concepts in cyber security and study the essence of
CO4 K2
IT Act.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 3 2
CO2 2 2 2
CO3 2 2 3 3 3 2
CO4 2 2 3 3 3 2
CO5 2 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Bill Nelson, Amelia
Guide to computer forensics 6th Edition
1 Philipps and Christopher Cengage
and investigations 2020
Steuart
Pearson Education, 1st
2 File System Forensic Analysis Brian Carrier
Inc. Edition,2005
Windows Forensic Analysis 2nd
3 Harlan Carvey Syngress
DVD Toolkit Edition,2009
Unix and Linux Forensic Chris Pogue , Cory 1st
4 Syngress
Analysis DVD Toolkit Altheide, Tode Haverkos Edition,2008
Fundamentals of Network 1st Edition,
5 E. Maiwald McGraw-Hill
Security 2017
Network Security Essentials 6th Edition,
6 William Stallings Pearson Education
Applications and Standards 2018
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Traditional computing: Limitations, Overview of Computing Paradigms:
Grid Computing, Cluster Computing, Distributed Computing, Utility
Computing, Cloud Computing, NIST reference Model, Basic terminology
and concepts, Cloud characteristics, benefits and challenges,
1
Cloud delivery (service) models: Infrastructure-as-a-Service (IaaS), Platform-
9
as-a-Service (PaaS), Software-asaService (SaaS), XaaS (Anything-as-a-
service), Cloud deployment models: Public cloud, Community cloud, Private
cloud, Hybrid cloud, Open Cloud Services.
Basic Terms and Concepts in Security, Threat Agents, Cloud Security
Threats, Identity Management
4 IaaS, Privacy Issues, Data Life Cycle, Key Privacy Concerns in the Cloud,
9
Protecting Privacy, Changes to Privacy Risk Management and Compliance
in Relation to Cloud Computing, Legal and Regulatory Implications
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
To provide students with a comprehensive understanding of cloud
CO1 K2
computing concepts and infrastructure
CO2 To explore various cloud service models and deployment models K2
To understand the security challenges and solutions in cloud
CO3 K2
computing environments
To understand fundamental of Identity and Access Management and K3
CO4
compliance
Identify the industry security standards, regulatory mandates, audit K3
CO5
policies and compliance requirements for Cloud based infrastructures
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2
CO2 3 3 2 2
CO3 3 2 2
CO4 3 2 2 2 2 2
CO5 3 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Cambridge University First edition
1 Cloud computing Bhowmik, S.
Press, 2017 ,2017
Thomas, E., Zaigham, First
2 Cloud Computing Concepts, Prentice Hall,
M., Ricardo, P Edition,2013
Technology & Architecture
Cloud Security: A Comprehensive Ronald L. Krutz, Wiley Publishing, First edition
3
Guide to Secure Cloud Computing Russell Dean Vines 2010 ,2010
Tim Mather,
O’Reilly Media, Inc., First edition
4 Cloud Security and Privacy SubraKumaraswamy,
2009 2009
and ShahedLatif
SEMESTER S6
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Foundations of Blockchain
Blockchain Architecture –Challenges –Applications –Blockchain Design
Principles -The Blockchain Ecosystem - The consensus problem -
1
Asynchronous Byzantine Agreement - AAP protocol and its analysis - peer-
7
to-peer network – Abstract Models - GARAY model - RLA Model-Proof of
Work (PoW) -Proof of Stake (PoS) based Chains - Hybrid models.
Fundamentals of Cryptography
Introduction to Cryptography, Symmetric cryptography – AES. Asymmetric
cryptography – RSA. Elliptic curve cryptography, Digital signatures – RSA
2 7
digital signature algorithms. Secure Hash Algorithms – SHA-256.
Applications of cryptographic hash functions – Merkle trees, Distributed
hash tables.
Crypto Primitives, Securing and Interconnecting Public and Private
Block Chains
3 7
Hash Function and Merle Tree-Security Properties-Security Considerations
for block chain Digital Signature-Public Key Cryptography-Bitcoin
blockchain incentive structures- Nash Equilibriums- evolutionary stable
strategies,-and Pareto efficiency (game theory) Weaknesses and news Points
of Failure, Mitigation Methods, Redundancies and fall-back methods.
Blockchain Protocols
Ethereum tokens –Augur -Golem -Understanding Ethereum tokens -App
4 6
Coins and Protocol Tokens - Blockchain Token Securities Law Framework -
Token Economy - Token sale structure - Ethereum Subreddit.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand Blockchain ecosystem and its services in real world K2
CO1
sceneries.
Distinguish between Symmetric cryptography and asymmetric K4
CO2
cryptography.
CO3 Explain the working of AES algorithm. K4
Understanding the methods for Securing and Interconnecting Public K2
CO4
and Private Block Chains
CO5 Acquaint the protocol and assess their computational requirements K2
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 3 1 2
CO2 2 2 3 1 2 2
CO3 2 2 3 1 2 2
CO4 2 2 3 1 2 2
CO5 2 2 3 1 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Blockchain enabled Dhillon, V., Metcalf, D., 1st Edition,
1 CA: Apress, Berkeley
applications and Hooper, M 2017
Mastering Blockchain: A deep
dive into distributed ledgers,
Third
consensus protocols, smart
2 Imran Bashir Packt Publishing edition,
contracts, DApps,
2020
cryptocurrencies, Ethereum,
and more
Reference Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Blockchains, digital assets,
Diedrich, Wildfire publishing, 1st Edition,
1 smart contracts, decentralized
H. Ethereum Sydney. 2016
autonomous organizations
Blockchain Technology: Kumar Saurabh, 1st
2 Wiley Publications
Concepts and Applications Ashutosh Saxena Edition,2020
Chandramouli
Universities Press First edition,
3 Blockchain Technology Subramanian, Asha A
(India) Pvt. Ltd August 2020
George, et al
Createspace
Distributed Ledger
Independent Pub,
4 Technology: The Science of Wattenhofer, R. P 2 nd Edition
Scotts Valley,
the Blockchain
California, US.
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Introduction: Role of AI in Cyber Security and Security Framework
Review of Artificial Intelligence in Cyber Security: Definition and
Importance, Challenges and promises, Security Threats of Artificial
Intelligence: Types and Examples
2 Transformer-Based Models
Applications of Generative AI in Various Domains: Text Generation, Image 10
Synthesis
Case Study: Successful Generative AI Applications and their Impact
Generative AI for Cybersecurity
Overview of Cybersecurity Challenges and the Potential of Generative
AI: Applications of Generative AI in Cybersecurity; Anomaly Detection,
Threat Hunting, Vulnerability Analysis
4 Encryption Protocols 9
Case Study: Real-World Applications of Generative AI in Cybersecurity
defence, Best Practices for Securing Generative AI Systems, Future Trends
in Generative AI for Cybersecurity defence
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
To explain the significance of AI in cybersecurity, including its K2
CO1
challenges and potential threats.
To identify and apply machine learning techniques relevant to K3
CO2
cybersecurity tasks, such as anomaly detection and intrusion detection.
To evaluate the effectiveness of generative AI techniques in addressing K4
CO3 cybersecurity challenges, including incident response and threat
mitigation.
To assess security risks related to AI systems and propose best practices K4
CO4
for securing generative AI applications in cybersecurity.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 1
CO2 2 3 2
CO3 2 2 1
CO4 3 2 2 1
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Himanshu Upadhyay,
Artificial Intelligence in Cyber Steven Lawrence
Springer International
1 Security: Theories and Fernandes, Tarun Kumar 2023
Publishing
Applications Sharma, Tushar
Bhardwaj
Rahul Neware Khaja
ARTIFICIAL
INTELLIGENCE IN CYBER Mannanuddin, Mukesh
2 Book Rivers 2022
SECURITY Madanan, Dr. Shikha
Gupta
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Hands-on Artificial Intelligence for Alessandro
1 Packt Publishing 2022
Cybersecurity Parisi
Artificial Intelligence for Cybersecurity: Springer International
2 Mark Stamp 2022
Techniques, Challenges and Research Publishing
OT THREAT PREVENTION
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Fundamentals and
Prerequisites (if any) Course Type Theory
advanced Industrial
Cyber Security
Course Objectives:
1. Enables the learners to understand the Distinctions and Integration of OT and IT Systems and
helps the students to identify the difference between OT and IT networks in Industrial Systems.
2. Enables the students to identify and classify OT Assets based on criticality.
3. Enables the learners to implement Access Control and Secure Network Access.
4. Enables the learners to monitor, analyze, and respond to Threats and Vulnerabilities
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Understanding OT and IT Systems
Overview of OT and IT Systems: Defining Operational Technology (OT)
and Information Technology (IT), Key differences between OT and IT in
terms of architecture, functionality, and security, Independent OT networks:
Architecture, use cases, and benefits.
Integration of OT with IT Networks: Drivers for OT-IT convergence,
1
Challenges in integrating OT with IT networks, Common architectures for
9
OT-IT integration
Threats and Vulnerabilities in Integrated Networks:Threat landscape for
integrated OT-IT environments, Vulnerabilities specific to OT, IT, and their
integration, Case studies of security incidents in integrated networks
Asset Identification and Criticality Classification: Identifying OT
Assets: Techniques for asset discovery in OT environments, Importance of
maintaining an up-to-date asset inventory, Tools and technologies for OT
asset identification
Criticality Classification: Criteria for classifying OT assets based on
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Differentiate Between OT and IT Systems and Understand Their K2
CO1
Integration.
CO2 Identify, Inventory, and Classify OT Assets Based on Criticality. K2
Implement Effective Access Control and Secure Network Access K3
CO3
Mechanisms.
Deploy Continuous Monitoring and Advanced Threat Detection K3
CO4
Systems.
Develop and Execute Comprehensive Incident Response and Recovery K3
CO5
Plans.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2 2 1 1 2 1
CO2 3 2 2 2 1 1 1 2 1
CO3 3 3 2 3 1 2 2 2 1 1
CO4 3 3 3 3 2 3 2 3 2 2 1 2
CO5 3 3 3 3 3 3 2 3 3 3 2 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Thomson
Practical Industrial Delmar Cengage
2nd edition,
1 Cybersecurity: ICS, OT, and Philip A. Craig Learning
2013
IIoT
Cybersecurity for Industrial Tyson Macaulay, Bryan Ist edition,
2 Control Systems: SCADA, CRC Press
L. Singer 2012
DCS, PLC, HMI, and SIS
Applied Cyber Security and the
Smart Grid: Implementing Eric D. Knapp, Raj Ist edition,
3 Syngress
Security Controls into the Samani 2013
Modern Power Infrastructure
Industrial Network Security
:Securing Critical Infrastructure 2nd Edition,
Eric D Knapp
4 Networks for Smart Grid, Syngress
Joel Thomas Langill 2014
SCADA and other Industrial
Control Systems
Industrial Cybersecurity: 2nd Edition,
5 Efficiently Secure Critical Pascal Ackerman Packt Publishing
2021
Infrastructure Systems
Building an Effective
Cybersecurity Program: Ist edition,
6 Lessons Learned from an Tari Schreider Rothstein Publishing
2017
Industrial Control Systems
Environment
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Industrial Automation using 2nd Edition,
1 R.G.Jamkar Global Education Ltd
PLC , SCADA & DCS 2018
Handbook of SCADA/Control Robert Radvanovsky, 2nd Edition,
2 CRC Press
Systems Security Jacob Brodsky 2016
Effective Cyber security : A
Addison-Wesley 1st edition,
3 Guide to Using Best Practices William Stallings
Professional 2018
and Standards
https://nptel.ac.in/courses/108/101/108101167/
2 https://nptel.ac.in/courses/106/105/106105217/
https://nptel.ac.in/courses/106/106/106106220/
3 https://nptel.ac.in/courses/108/108/108108122/
https://nptel.ac.in/courses/108/108/108108098/
4 https://nptel.ac.in/courses/106/105/106105217/
SEMESTER S6
BIOMETRIC SECURITY
Course Code PECCT635 CIE Marks 40
Teaching Hours/Week ESE Marks 60
(L: T:P: R) 3:0:0:0
Course Objectives:
In Part A, all questions need to be answered and in Part B, each student can choose any one full question
out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand the fundamental concepts of biometric systems, including K2
CO1
their technologies and key processes.
Understand key performance metrics of biometric systems and their K2
CO2
relevance to system accuracy.
Apply various biometric recognition techniques, including fingerprint, K3
CO3 face, iris, and palm print recognition, understanding the acquisition,
feature extraction, and matching processes.
Identify potential security and privacy threats in biometric systems, K3
CO4 and recommend strategies to mitigate attacks on biometric processing,
user interfaces, and databases.
Understand the biometric standards, databases, and their applications K2
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2 2
CO2 2 2 2 2
CO3 3 3 2 2 2 2
CO4 3 3 2 2 2 2
CO5 2 2 2 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Anil K. Jain, Arun A.
1 Introduction to Biometrics Ross, Karthik Springer 2011
Nandakumar,
2 Handbook of Biometrics Jain, P. Flynn, A. Ross Springer 2008
Reference Books
Modu
Link ID
le No.
https://www.youtube.com/watch?v=GMDggxifxqk&list=PLbMVogVj5nJSCwX0N6MAXPsKGW
1
FRI5Y5m&index=1
https://www.youtube.com/watch?v=7aQgQGeZ_qo&list=PLbMVogVj5nJSCwX0N6MAXPsKGW
2
FRI5Y5m&index=5
https://www.youtube.com/watch?v=ZEV3th6_olk&list=PLbMVogVj5nJSCwX0N6MAXPsKGWF
3
RI5Y5m&index=8
https://www.youtube.com/watch?v=eNPAas0XgVI&list=PLbMVogVj5nJSCwX0N6MAXPsKGW
4
FRI5Y5m&index=15
SEMESTER S6
Teaching Hours/Week
3:0:0:1 ESE Marks 40
(L: T:P: R)
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Elements of Information Security, Authenticity and Non-Repudiation, Security
Challenges, Effects of Hacking, Hacker – Types of Hacker, Ethical Hacker,
Role of Security and Penetration Tester, Penetration Testing Methodologies:–
OSSTMM, NIST, OWASP, Categories of Penetration Test, Types of
Penetration Tests, Vulnerability Assessment.
1
Tools for Foot Printing, Conducting Competitive Intelligence, Google 11
Hacking, Scanning, Enumeration, Trojans & Backdoors, Virus & Worms,
Proxy & Packet Filtering, Denial of Service, Sniffer, Social Engineering–
shoulder surfing, Dumpster Diving, Piggybacking.
Vulnerability Data Resources – Exploit Databases – Network Sniffing –
Types of Sniffing – MITM Attacks – ARP Attacks – Denial of Service
Attacks - Hijacking Session with MITM Attack -DNS Spoofing – ARP
2 Spoofing Attack Manipulating the DNS Records – DHCP Spoofing -Remote
11
Exploitation – Attacking Network Remote Services – Overview of Brute
Force Attacks – Traditional Brute Force – Attacking SMTP – Attacking SQL
Servers – Testing for Weak Authentication.
Routers, Firewall & Honey pots, IDS &IPS, Web Filtering, Vulnerability,
Penetration Testing, Session Hijacking, Web Server, SQL Injection, Cross
Site Scripting, Exploit Writing, Buffer Overflow, Reverse Engineering,
Email Hacking, Incident Handling & Response, Bluetooth Hacking, Mobiles
Phone Hacking.
What is IoT, Genesis of IoT, IoT and Digitization, IoT Impact, Convergence
of IT and IoT, IoT Challenges, IoT Network Architecture and Design,
Drivers Behind New Network Architectures, Comparing IoT Architectures,
A Simplified IoT Architecture, The Core IoT Functional Stack, IoT Data
Management and Compute Stack.
3 Smart Objects: The “Things” in IoT, Sensors, Actuators, and Smart Objects, 11
Sensor Networks, Connecting Smart Objects, Communications Criteria, IoT
Access Technologies.
IP as the IoT Network Layer, The Business Case for IP, The need for
Optimization, Optimizing IP for IoT, Profiles and Compliances, Application
Protocols for IoT, The Transport Layer, IoT Application Transport Methods.
Data and Analytics for IoT, An Introduction to Data Analytics for IoT,
Machine Learning, Big Data Analytics Tools and Technology, Edge
Streaming Analytics, Network Analytics, Securing IoT, A Brief History of
4 OT Security, Common Challenges in OT Security, Differences between IT 11
and OT Security Practices and Systems, Formal Risk Analysis Structures:
OCTAVE and FAIR.
5 30 12.5 12.5 60
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Explain the basic concepts of Ethical hacking K2
Utilize the tools to conduct competitive intelligence and social K3
CO2
engineering.
CO3 Appreciate the security considerations in IoT. K2
Outline the fundamentals of IoT and its underlying physical and logical K2
CO4
architecture
CO5 Implement IoT applications using the available hardware and software. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2
CO2 3 2 2
CO3 3 2 2
CO4 3 2 2
CO5 3 2 2 2 2 2
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
“Hands on ethical hacking and Michael T Simpson,
2nd edition,
1 network defense”, Cengage Kent Back man, James
2010
Learning. Corley,
“Ethical Hacking and
2 Rafay Baloch CRC Press 2014.
Penetration Testing Guide”
“Internet of Things: A hands- Arshadeep Bahga, Vijay 2015 (First
3 University Press
on approach” Madisetti, edition)
Internet of Things: Converging
Technologies for Smart Dr. Ovidiu Vermesan,
4 River Publishers 2013
Environments and Integrated Dr. Peter Friess
Ecosystems,
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
“Certified Ethical Hacker: A
1 Study Guide”, Wiley Kimberly Graves, Wiley Publishing, Inc. 2010
Publishing, Inc., 2010.
“Hacking Exposed 7 :Network Stuart Mc Clure, Joel McGraw-Hill edition 7,
2
Security Secrets & Solutions” Scambray, publishing, 2012
"IoT Fundamentals: David Hanes, Gonzalo
Networking Technologies, Salgueiro, Patrick
3 Pearson Education 1st Edition
Protocols, and Use Cases for rossetete, Robert Barton,
the Internet of Things” Jerome Henry ,
“Internet of Things:
McGraw Hill (India)
4 Architecture and Design Rajkamal
Private Limited
Principles”
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 https://www.youtube.com/watch?v=fNzpcB7ODxQ
2 https://www.youtube.com/@HackerSploit
3 https://www.youtube.com/watch?v=7zWVxrjjIpE
4 https://www.youtube.com/playlist?list=PL1ljc761XCiaTRgucelgZS8pbTEyt1BjX
Teaching Hours/Week
2:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. To guide students through the iterative stages of design thinking, including empathizing with
users, defining problems, ideating solutions and developing Proof of Concepts (PoC) and
technical feasibility studies.
3. To equip students with the ability to involve in product design considering the sustainability,
inclusivity, diversity and equity aspects.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Fundamentals of design thinking and product development: Overview of
stages of product development lifecycle; Design thinking -Definition-Design
thinking for product innovation; Bringing social impact in ideation-
Internal
Examination Reflective Journal
Attendance Assignments Total
and Portfolio
5 20 10 5 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Empathize to capture the user needs and define the objectives with due
CO1 consideration of various aspects including inclusivity, diversity and K5
equity
Ideate using divergent and convergent thinking to arrive at innovative
CO2 ideas keeping in mind the sustainability, inclusivity, diversity and K6
equity aspects.
Engage in Human Centric Design of innovative products meeting the
CO3 K5
specifications
Develop Proof of Concepts (PoC), prototypes & pilot build of
CO4 products and test their performance with respect to the Specification K4
Requirement Document.
Reflect on professional and personal growth through the learnings in
CO5 K4
the course, identifying areas for further development
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2 2 3 3 3 2 2 3
CO2 3 2 3 2 3 3 3 2 2 3
CO3 3 2 3 2 3 3 2 2 2 3
CO4 3 2 2 3 3 3 2 2 2 3
CO5 3 3 3 2 2 2 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Name of the Edition
Title of the Book
No Author/s Publisher and Year
Product Sense: Engineering
1 Dr. K R Suresh Nair NotionPress.com 2024
your ideas into reality
Change by Design: How
Design Thinking Transforms HarperCollins
2 Tim Brown 2009
Organizations and Publishers Ltd.
Inspires Innovation
Design Thinking for Strategic John Wiley & Sons
3 Idris Mootee 2013
Innovation Inc.
Sample Assignments:
1. Evaluate and prepare a report on how the aspects including inclusivity, diversity and equity are taken
into consideration during the empathize and define phases of the Miniproject course.
2. Evaluate and prepare a report on how the aspects including sustainability, inclusivity, diversity and
equity are taken into consideration during the ideate phase of the Miniproject course.
3. Evaluate and prepare a report on how User-Centric Design (UCD) is used in the design and
development of PoC of the product being developed in the Miniproject course.
4. Prepare a plan for the prototype building of the product being developed in the Miniproject course.
5. Report on the activities during the empathize phase including the maps & other materials created during
the sessions.
6. Report on the activities during the define phase including the maps & other materials created during the
sessions.
7. Report of all the ideas created during the ideation phase of the Miniproject course through the tools
including SCAMPER technique, SWOT analysis, Decision matrix analysis, six thinking hats exercise
8. Prepare a full scale production plan for the product being developed in the Miniproject course.
An industrial visit of at least a day for experiential learning and submit a report on the learnings, for
example industry standards and procedures.
SEMESTER 6
DATA STRUCTURES
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Basic Concepts of Data Structures
Singly Linked List - Operations on Linked List, Stacks and Queues using
2 9
Linked List, Polynomial representation using Linked List; Doubly Linked
List.
Sorting Techniques :- Selection Sort, Insertion Sort, Quick Sort, Merge Sort;
4 9
Searching Techniques - Linear Search, Binary Search, Hashing - Hashing
functions : Division; Collision Resolution : Linear probing, Open hashing.
Internal Internal
Assignment/ Examination-1 Examination- 2
Attendance Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
Name of
Edition
Sl. No Title of the Book Name of the Author/s the
and Year
Publisher
Reference Books
Prentice Hall
1 Classic Data Structures Samanta D. 2/e, 2018
India.
Aho A. V., J. E.
Pearson
2 Data Structures and Algorithms Hopcroft and J. D. 1/e, 2003
Publication.
Ullman
Module
Link ID
No.
1 https://nptel.ac.in/courses/106102064
2 https://ocw.mit.edu/courses/6-851-advanced-data-structures-spring-2012/
SEMESTER S6
DATA COMMUNICATION
(Common to CS/CM/CD/CA)
Course Objectives:
1. To understand the details of data communication at the lower level and the associated issues.
2. To gain insight into the important aspects of data communication and computer networking
systems and to apply the in practical applications.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Communication model - Simplex, Half duplex, Full duplex transmission.
Periodic analog signals - Sine wave, Amplitude, Phase, Wavelength, Time
and frequency domain, Bandwidth. Analog & digital data and signals.
Transmission impairments - Attenuation, Delay distortion, Noise. Data rate
limits - Noiseless channel, Nyquist bandwidth, Noisy channel, Shannon's
1 capacity formula. 10
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Identify the characteristics of signals for analog and digital transmissions
CO1 K3
so as to define the associated real world challenges.
CO2 Select transmission media based on characteristics and propagation modes. K3
CO3 Choose appropriate signal encoding techniques for a given scenario K3
CO4 Illustrate multiplexing and spread spectrum technologies K2
Use error detection, correction and switching techniques in data
CO5 K3
communication
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 2 3
CO3 3 3 2 3
CO4 3 3 3 2 3
CO5 3 3 3 2 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
1 Data Communications and Networking Forouzan B. A McGraw Hill 6/e, 2019
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Mobile Communications Schiller J Pearson 2/e, 2009
Fundamentals of Networking
2 Curt M. White Cengage 7/e, 2010
and Communication
FOUNDATIONS OF CRYPTOGRAPHY
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Integer Arithmetic – Divisibility, Greatest Common Divisor Euclid’s and
Extended Euclid’s Algorithm for GCD; Modular Arithmetic – Operations,
1 9
Properties, Polynomial Arithmetic; Algebraic Structures – Group Ring
Field.
Prime numbers and Prime Factorisation - Primitive Roots, Existence of
Primitive Roots for Primes, Fermat’s Theorem, Primality Testing, Euler’s
2 9
Theorem, Euler’s Totient Function, Discrete Logarithms, Modular
Arithmetic, Chinese Remainder Theorem.
Principles of security - Types of Security attacks, Security services, Security
Mechanisms; Cryptography - Introduction, cryptographic notations,
3 9
substitution techniques, Transposition Techniques, limitations of classical
cryptography.
Symmetric key Ciphers - Block Cipher principles & Algorithms- DES, AES,
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Explain the integer arithmetic operations including divisibility and
GCD algorithms, modular arithmetic operations and properties,
CO1 K2
polynomial arithmetic, and algebraic structures such as groups, rings,
and fields.
Describe the number theory concepts essential for cryptographic
CO2 K2
applications and mathematical problem-solving.
Explain the security principles, types of attacks, and protective
CO3 measures, alongside a thorough understanding of cryptographic K2
techniques and their applications in securing data.
Discuss symmetric and asymmetric key cryptography, including block
CO4 cipher principles, algorithms, public key cryptosystems, and hash K2
functions
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2
CO2 2 2 2
CO3 2 2 2
CO4 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
Cryptography & Network
1 Behrouz A. Forouzan McGraw Hill 3/e, 2007
Security
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Cryptography and Network
1 William Stallings Pearson Education 7/e,2017
Security
2 https://nptel/courses/video/106105031/L17.html
3 https://onlinecourses.nptel.ac.in/noc22_cs90/preview
SEMESTER S6
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to ML
Unsupervised Learning
Internal Internal
Assignment/ Examination-1 Examination- 2
Attendance Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO3 Illustrate the concepts of Multilayer neural network and Decision trees K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 2
CO2 3 3 3 3 2 2
CO3 3 3 3 3 2 2
CO4 3 3 3 3 2 2
CO5 3 3 3 3 2 2
Text Books
Reference Books
Trevor Hastie,
The Elements Of Statistical
5 Robert Tibshirani, Springer 2/e, 2007
Learning
Jerome Friedman
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 https://youtu.be/fC7V8QsPBec?si=8kqBn-_7x1RG5V1J
2 https://youtu.be/g__LURKuIj4?si=Xj10NPfMfpQSOhVx
3 https://youtu.be/yG1nETGyW2E?si=ySlxpeWuFAUQBf7-
4 https://youtu.be/zop2zuwF_bc?si=W7TpSHLdi4rykva4
SEMESTER S6
Course Objectives:
1. To teach the core object-oriented principles such as abstraction, encapsulation, inheritance, and
polymorphism, robust error-handling using exception mechanisms to ensure program reliability.
2. To equip the learner to develop object oriented programs encompassing fundamental structures,
environments, and the effective utilization of data types, arrays, strings, operators, and control
statements for program flow in Java.
3. To enable the learner to design and develop event-driven graphical user interface (GUI) database
applications using Swing and database connection components.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Internal Internal
Assignment/ Examination-1 Examination- 2
Attendance Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
1 Java: The Complete Reference Herbert Schildt Tata McGraw Hill 13/e, 2024
Reference Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
1 Head First Java: A Brain Friendly Kathy Sierra & Bert
O’Reilly 3/e, 2022
Guide Bates
2 JAVA™ for Programmers Paul Deitel PHI 11/e, 2018
3 Clean Code : A Handbook of Agile Robert C. Martin Prentice Hall 1/e, 2008
Software Craftsmanship
4 Programming with Java E Balagurusamy McGraw Hill 6/e, 2019
3 https://nptel.ac.in/courses/106105191 (Lecture no: 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
https://nptel.ac.in/courses/106105191
4
(Lecture no: 43, 44, 45, 46, 47, 50, 51, 52, 53, 54, 55)
SEMESTER S6
Teaching Hours/Week
0:0:3:0 ESE Marks 50
(L: T:P: R)
Course Objectives:
1. The course aims to master Cyber Forensics procedures and get hands-on exposure to different
Cyber Forensics tools.
2. The course aims to offer hands-on experience on integrity check of files and use it for security
implementations.
3. The course aims to offer exposure to live and static forensic analysis.
Expt.
Experiments
No.
1 Registry Viewing and Editing using native tools of Operating Systems.
Hex analysis using Hex Workshop tool
2 Using Hex Workshop perform file signature analysis. Write down the hex values of
popular file types
Bit level Forensic Analysis of evidential image using FTK or Encase or ProDiscover
3 Tools.
Image Acquisition and perform static analysis to mount an image of a drive.
Hash code generation, comparison of files using tools like HashCalc
4
Using HashCalc write down the Hash values of popular hashing algorithms.
5 25 20 50
Endorsement by External Examiner: The external examiner shall endorse the record
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Use the Windows Registry and Registry Editor. K3
Use the different Cyber Forensics Tools for static and dynamic forensics
CO2 K3
analysis.
CO3 Familiarize file signature analysis and applications. K3
Use FTK or Encase or ProDiscover tools for bit level forensic analysis of
CO4 K3
evidential image.
CO5 Prepare an investigation report following the chain of custody. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO- PO Mapping (Mapping of Course Outcomes with Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3
CO2 3 3
CO3 3 3
CO4 3 3
CO5 3 3 3
1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Bill Nelson, Amelia
1 Guide to computer forensics 6th Edition
Philipps and Christopher Cengage
and investigations 2020
Steuart
2 Windows Forensic Analysis 2nd
Harlan Carvey Syngress
DVD Toolkit Edition,2009
Unix and Linux Forensic Chris Pogue , Cory 1st
3 Altheide, Tode Haverkos Syngress
Analysis DVD Toolkit Edition,2008
Quality of Reports: Clarity, completeness and accuracy of lab reports. Proper documentation of
experiments, data analysis and conclusions.
Timely Submission: Adhering to deadlines for submitting lab reports/rough record and
maintaining a well-organized fair record.
Oral Examination: Ability to explain the experiment, results and underlying principles during a
viva voce session.
Final Marks Averaging: The final marks for preparation, conduct of experiments, viva, and
record are the average of all the specified experiments in the syllabus.
Setup and Execution: Proper setup and accurate execution of the experiment or programming
task.
Ability to explain the experiment, procedure results and answer related questions
Proficiency in answering questions related to theoretical and practical aspects of the subject.
5. Record (5 Marks)
MALWARE FORENSICS
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. Acquire the ability to identify and assess various forms of malware, enabling students to tackle
the difficulties presented by newly evolving malware.
2. Applying both automatic and manual methods to examine malware, comprehend malware
activity monitoring tools and various malware analysis techniques.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to malware, malware threats, evolution of malware, malware
types. Types of malware Analysis – Static Analysis, Dynamic Analysis,
1 8
Malware Analysis Techniques - Obfuscated, Deobfuscated, Malware Analysis
Tools - Static Analysis Tools, Dynamic Analysis Tools. Static Analysis
Dynamic analysis: Live malware analysis, dead malware analysis, analyzing
traces of malware, system-calls, api-calls, registries, network activities. Anti-
dynamic analysis techniques anti-vm, runtime-evasion techniques, Malware
Sandbox, Monitoring with Process Monitor, Packet Sniffing with Wireshark,
Kernel vs. User-Mode, Debugging-OllyDbg, Breakpoints, Tracing, Exception
2
Handling, Patching.
11
Malware Detection Techniques: Signature-based techniques: malware
signatures, packed malware signature, metamorphic and polymorphic
signature. Non-signature based techniques: similarity-based techniques,
machine-learning methods.
Malware Incident response: Volatile Data Collection and Examination on a
3 10
Live Windows Systems - Volatile Data collection methodology from
Windows systems- Preservation of Volatile data, Collecting Subject System
details, Identifying users Logged into the System, Inspect Network
Connections and Activity, Current and Recent Network Connections,
Collecting Process Information, Correlate Open Ports with Running Processes
and Programs, Identifying Services and Drivers, Determining Scheduled
Tasks, Collecting Clipboard Contents, Non-Volatile Data Collection from a
Live Windows System, Volatile Data collection methodology from Linux
systems, Non volatile Data collection from a live Linux system
Post-Mortem Forensics - Malware Discovery and Extraction from a Windows
and Linux system, Examine Windows and Linux file system, Examine
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand the evolution, types, and threats of malware, and enable the
CO1 Understand
identification and classification of malicious software.
Understand static and dynamic analysis techniques to investigate
CO2 malware, utilizing tools to assess and mitigate malware impacts on Understand
systems.
Understand anti-dynamic analysis techniques to enhance the
CO3 Understand
effectiveness of malware analysis and detection.
Analyse and employ both signature-based and non-signature-based
CO4 malware detection techniques to detect and prevent advanced malware Analyse
threats.
Understand malware incident response strategies and post-mortem
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 2 3
CO3 3 3 3 2 3
CO4 3 3 3 2 3
CO5 3 3 3 3 2 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Malware Forensics Field Guide James M. Aquilina,
First
1 for Windows Systems: Digital Cameron H. Malin Syngress Publishing
Edition,2012
Forensics Field Guides ,Eoghan Casey
Malware Forensics Field Guide James M. Aquilina,
Second
2 for Linux Systems: Digital Cameron H. Malin, Syngress Publishing
Edition,2014
Forensics Field Guides” , Eoghan Casey
Practical malware analysis T he
Michael Sikorski and First
3 Hands-On Guide to Dissecting No starch press
Andrew Honig Edition,2012
Malicious Software
Malware Forensics Eoghan Casey, James M.
First
4 Investigating and Analysing Aquilina, Cameron H. Syngress Publishing,
Edition,2008
Malicious code Malin,
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Malware & rootkits: malware & Michael Davis, Sean
Second
1 rootkits security secrets & Bodmer, Aaron McGraw Hill
Edition,2010
Solutions Lemasters
First
Windows Malware Analysis
2 Essentials
Victor Marak Packt Publishing Edition,
2015
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. To understand of the fundamental concepts of Intrusion detection and prevention systems and the
different control strategies used to implement IDPS.
2. To understand of the usage of different Intrusion detection systems so that protection against attacks
can be minimized.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction-Intrusion Detection and Prevention Systems, IDPS terminology,
Network attacks- Probes, Privilege Escalation Attacks, Denial of Service
(DoS) and Distributed Denial of Service (DDoS) Attacks, Worms Attacks,
1 Routing Attacks, Why use an IDPS, Types of IDPS, IDPS Detection methods-
Signature-Based IDPS, Statistical Anomaly-Based IDPS, Stateful Protocol 9
Analysis IDPS, Log File Monitors, IDPS Response Options Selecting IDPS
Approaches and Products, Strengths and Limitations of IDPSs.
IDPS Control Strategies-Centralized Control Strategy, Fully Distributed
Control Strategy, Partially Distributed Control Strategy, IDPS Deployment-
Deploying Network-Based IDPSs, Deploying Host Based IDPSs, Measuring
the Effectiveness of IDPSs, Intrusion Detection systems-How the IDS
2
Watches Your Network -Packet Sniffing, Log Parsing, System Call
9
Monitoring, Filesystem Watching, What the IDS Does When It Finds an
Attack Attempt, Passive Response, Active Response, Analyzing Your IDS
Design and Investment, False Positives versus False Negatives.
IDPS Technologies-components and architecture, Network architectures,
security capabilities, prevention capabilities, Network based IDPS,
Networking overview, components and architecture, Security Capabilities,
Information Gathering Capabilities, Logging Capabilities, Detection
Capabilities, Types of Events Detected, Detection Accuracy , Tuning and
3 9
Customization, Technology Limitations, Prevention Capabilities,
Implementation, Wireless IDPS, WLAN Standards, WLAN Components,
Threats against WLANs, Components and Architecture, Sensor Locations,
Information Gathering Capabilities, Types of Events Detected, Prevention
Capabilities.
Host-Based IDPS-Components and Architecture, Typical Components,
Network Architectures, Agent Locations, Host Architectures, Security
Capabilities, Logging Capabilities, Detection Capabilities, Types of Events
Detected, Technology Limitations, Prevention Capabilities, Other
Capabilities, Implementation, The Need for Multiple IDPS Technologies,
Direct IDPS Integration, Indirect IDPS Integration, Network Forensic
Analysis Tool (NFAT) Software, Anti-Malware Technologies, Firewalls and
4
Routers, Honeypots. 11
IDPS Detection Approaches-Misuse detection-pattern matching, Rule based
techniques,state based techniques, Anomaly Detection-Advanced Statistical
Models, Rule based Techniques, Biological Models, Learning Models,
Specification-based Detection, Hybrid Detection, Architecture and
Implementation-Centralized, Distributed-Intelligent Agents,Mobile Agents,
Cooperative Intrusion Detection
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Comprehend the different terminologies and types related to Intrusion
CO1 Understand
detection and prevention systems.
CO2 Familiarize the different control strategies and and detection systems. Understand
Explore the different technologies and detection capabilities related to
CO3 Understand
Network IDPS.
CO4 Identify the capabilities, security attacks against wireless IDPS. Apply
Explore the different technologies and detection capabilities and
CO5 Apply
approaches related to host IDPS.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2 2
CO2 3 2 2 2
CO3 3 2 2 2
CO4 3 2 2 2 2
CO5 3 2 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Fourth
Principles of Information Michael E. Whitman and Course Technology,
1 Edition
Security Herbert J. Mattord Cengage Learning
,2012
second
Brian Caswell, Mike Jay Beale's Open
2 Snort 2.1: Intrusion Detection edition,
Poor Source Security
2004.
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
National Institute of
Guide to Intrusion Detection Karen Scarfone Peter First edition,
1 Standards and
and Prevention Systems (IDPS) Mell 2007
Technology,
Stephen Northcutt, Judy New Riders Third
2 Network Intrusion Detection
Novak Publications Edition,2002
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. To provide an understanding of the security challenges associated with Big Data systems.
2. To impart knowledge on securing Big Data environments using various techniques and
frameworks.
3. To explore privacy-preserving mechanisms and compliance with legal regulations in Big Data.
4. To equip students with skills to identify and mitigate threats and vulnerabilities in Big Data.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Big Data:
Definition and characteristics: Volume, Velocity, Variety, Veracity, and
Value, Importance of Big Data in modern industries, Security Challenges in
Big Data:- Data breaches, privacy concerns, and compliance issues ,The CIA
triad in the context of Big Data.
1
Big Data Architecture: Hadoop ecosystem: HDFS, Map Reduce, YARN,
8
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand and articulate the key characteristics of Big Data and athe
CO1 security challenges, including the CIA triad, within Big Data K2
architectures like Hadoop and Apache Spark.
Understand security mechanisms such as authentication, authorization,
CO4 modelling and security best practices, to safeguard Big Data systems and K3
respond effectively to security incidents
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 1 1 1
CO2 3 2 3 2 2
CO3 3 2 2 3 2
CO4 3 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Big Data: Principles and Best
Nathan Marz and James 1st edition
1 Practices of Scalable Real-time Warren. Manning Publications
2015
Data Systems
Hadoop Security: Protecting Ben Spivey and Joey 1st edition
2 O’Reilly Media
Your Big Data Platform Echeverria 2015
Hemalatha M, B. K. 1st edition
3 Big Data Security CRC
Tripathy, and L. Sudha. 2021
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Security and Privacy in Big Data: Shui Yu and
1 Xiaodong Lin. Springer 1st edition
Volume 1: Foundations
Data-Intensive Text Processing with Jimmy Lin and Chris
2 Morgan & Claypool 1st edition
MapReduce Dyer
Benjamin C. M.
Privacy-Preserving Data Publishing:
Fung, Ke Wang, Ada
3 Anonymization Models, Algorithms, Chapman and Hall 1st edition
Wai-Chee Fu, and
and Applications
Philip S. Yu.
Computer Security: Principles and William Stallings
4 Pearson 4th edition
Practice and Lawrie Brown
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
[Introduction to Big Data (NPTEL)]
1
[Big Data Computing )
Cloud Computing
2
(NPTEL)
3 - [Information Security - V (NPTEL)]
[Information Security - IV (NPTEL)]
4
- [Network Security [NPTEL])
SEMESTER S7
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
SOC in Industrial Environments
Overview of SOC Operations in OT Environments: Role of SOC in
industrial settings, Challenges of monitoring OT networks vs. IT networks
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Proficient in SOC Operations for Industrial Environments. K2
CO2 Skilled in Integrating IT and OT Security. K2
CO3 Capable of Utilizing Industrial-Specific Threat Intelligence. K3
CO4 Prepared for Incident Response and Forensics in OT. K3
Advanced in Implementing Security Operations and Continuous
CO5 K3
Improvement.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2 2
CO2 3 2 3 3 2 2
CO3 3 3 2 2 3 2 2
CO4 3 3 3 3 2 2 2
CO5 3 3 3 3 2 2 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Industrial Network Security:
Securing Critical Infrastructure
Eric D. Knapp and Joel 2nd edition,
1 Networks for Smart Grid, Syngress
Thomas Langill 2014
SCADA, and Other Industrial
Control Systems
Cybersecurity for Industrial
Tyson Macaulay, Bryan Ist edition,
2 Control Systems: SCADA, CRC Press
L. Singer 2012
DCS, PLC, HMI, and SIS
Applied Cyber Security and the
Smart Grid: Implementing Eric D. Knapp, Raj Ist edition,
3 Syngress
Security Controls into the Samani 2013
Modern Power Infrastructure
Building an Effective
Cybersecurity Program:
Ist edition,
4 Lessons Learned from an Tari Schreider Rothstein Publishing
2017
Industrial Control Systems
Environment
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
The Industrial Control System Cyber 1st edition,
Liam M. Randall Packt Publishing
1
Security: A Practitioner's Perspective 2020
Practical Industrial Cybersecurity: 1st edition,
2 Philip A. Craig Jr. Packt Publishing
ICS, SCADA, and PLC Security 2017
Josh Diakun, Paul R.
The Security Analyst's Guide to 1st edition,
3 Johnson, and Gary R. Packt Publishing
Splunk 2016
Jefress
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
https://archive.nptel.ac.in/courses/108/105/108105062/
1
https://onlinecourses.nptel.ac.in/noc23_cs127/preview
2 https://onlinecourses.nptel.ac.in/noc24_cs85/preview
3 https://www.udemy.com/course/incident-response-for-cyber-professionals
https://nptel.ac.in/courses/108/108/108108098/
4
https://nptel.ac.in/courses/106/105/106105217/
SEMESTER 7
COMPUTER VISION
PECST745
Course Code CIE Marks 40
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Credits 5/3 Exam Hours 2 Hrs 30 Mins
Course Objectives:
1. To cover the basics of image formation, key computer vision concepts, methods,
techniques, pattern recognition, and various problems in designing computer vision and
object recognition systems.
2. To enable the learners to understand the fundamentals of computer vision and machine
learning models to develop applications in computer vision.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Fundamentals in Computer Vision :-
Linear Filters- Linear Filters and Convolution, Shift Invariant Linear Systems.
Estimating Derivatives with Finite Differences, Noise, Edges and Gradient-
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand the basic concepts and terminologies like Camera
CO1 K2
Calibration, Stereopsis in computer vision
CO2 Apply filters for feature extraction and for finding patterns. K3
CO3 Build different machine learning models for computer vision K3
CO4 Implement segmentation and object detection models K3
Analyze different machine learning models for segmentation/object
CO5 K4
detection.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Computer vision: A modern Forsyth, David, and Jean
1 Prentice hall 2011
approach Ponce
Valliappa Lakshmanan,
Practical Machine Learning for
3 Martin Görner, Ryan O'Reilly Media 2021
Computer Vision
Gillard
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Computer vision: algorithms Springer Science &
1 Szeliski, Richard 2010
and applications Business Media
Image Segmentation:
2 Principles, Techniques, and Tao Lei, Asoke K. Nandi John Wiley & Sons 2022
Applications
Deep Learning in Computer
Ali Ismail Awad,
3 Vision Principles and CRC Press 2020
Mahmoud Hassaballah
Applications
https://www.kaggle.com/datasets/hgunraj/covidxct
SEMESTER S7
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. Enables the learners to understand the Fundamentals of Data Communication and Networking.
2. Enables the students to learn Networking Protocols and Standards.
3. Enables the learners to Explore Emerging Technologies and Trends in Networking.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Fundamentals of Data Communication
Introduction to Data Communication: Basic components: transmitters,
receivers, transmission media, Data flow types: simplex, half-duplex, full-
duplex.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand the basics of data communication, including transmission
CO1 K2
media and modulation techniques.
CO2 Explain network models, topologies, and the role of networking devices. K2
Apply data link and network layer protocols for efficient network
CO3 K3
communication.
Analyze the use of transport and application layer protocols in network
CO4 K3
services.
Explore emerging networking technologies and their future
CO5 K2
implications.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2 1 3
CO2 3 2 2 1 3
CO3 3 3 3 2 3
CO4 3 3 3 2 3
CO5 2 3 2 2 1 1 1 1 1 1 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Data and Computer
1 William Stallings Pearson 10th Edition
Communications
Andrew S. Tanenbaum and
2 Computer Networks Pearson 5th Edition
David J. Wetherall
Data Communications and McGraw-Hill
3 Behrouz A. Forouzan 5th Edition
Networking Education
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Communication Networks:
Alberto Leon-Garcia and
1 Fundamental Concepts and Indra Widjaja McGraw-Hill 2nd Edition
Key Architectures
Network Security Essentials:
2 William Stallings Pearson 6th Edition
Applications and Standards
https://nptel.ac.in/courses/106/105/106105183/
2
https://nptel.ac.in/courses/106/105/106105081/
https://nptel.ac.in/courses/106/105/106105183/
3 https://nptel.ac.in/courses/106/105/106105082/
https://nptel.ac.in/courses/106/102/106102245/
https://nptel.ac.in/courses/106/105/106105183/
https://nptel.ac.in/courses/106/105/106105166/
4
https://nptel.ac.in/courses/106/106/106106129/
https://nptel.ac.in/courses/115/106/115106086/
SEMESTER S7
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. Understand the social and ethical challenges posed by the widespread use of the internet.
2. Analyse legal frameworks and regulations governing digital spaces.
3. Assess the ethical implications of emerging technologies.
4. Develop strategies to address privacy, security, and ethical concerns in the digital world.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Basics of Social and Ethical Issues:
Understanding Ethics in the Digital World - Ethics, Relationship between
ethics and technology. Impact of the Internet on Society - Social consequences
of internet expansion, digital inequality, technology access.
2 Internet Governance and Regulations - The worldwide and local laws that
8
govern the internet, comparing self-regulation and government regulation
(Overview only). Intellectual Property Rights (IPR) -copyright, patents,
trademarks, and their significance in the context of the internet.
Cybercrime and Cyber Law - Different types of cybercrimes, legislation
against cybercrime, digital evidence, and forensic analysis (Detailed study).
Ethical considerations of regulating content, hate speech, and censorship laws
in the debate between Freedom of Speech and Censorship (Overview only).
Case Studies of legal disputes - big companies involved in legal cases,
challenges with determining jurisdiction in cyberspace.
Data Protection and Security:
Principles of data protection, GDPR, and other regulations for ethical data
handling.
Ethical issues in data aggregation and the commercialization of personal data
in Big Data and Surveillance Capitalism.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand and analyse the ethical implications of technology and the
CO1 K2
internet
Evaluate legal and regulatory challenges associated with internet
CO2 K4
governance and cybercrimes
Critically assess ethical practices in data handling, privacy, and
CO3 K4
cybersecurity
Examine the impact of social media, AI, and algorithms on ethics and
CO4 K3
society
Discuss and propose ethical solutions for challenges posed by emerging
CO5 K4
technologies
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 - 1 - 2 - 3 - - - 2
CO2 3 3 1 2 2 2 1 - - - - 3
CO3 3 2 3 2 - - - 2 - - - -
CO4 2 2 2 3 1 - - 3 2 2 - -
CO5 3 3 2 3 2 1 - 2 1 1 2 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Michael J. Quinn 7th Edition,
1 Ethics for the Information Age Pearson
2017
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
The Ethics of Cybersecurity Markus Christen et al. Springer 2020
1
Cybersecurity Ethics: An 1st Edition,
2 Mary Manjikian Routledge
Introduction 2017
2 https://nptel.ac.in/courses/106105217
3 https://nptel.ac.in/courses/106104119)
4 https://onlinecourses.swayam2.ac.in/cec21_ge12/preview
SEMESTER S7
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. The goal of this course is to familiarize students with Security in computing, program security
in the context of Public and private sectors.
2. The topics also cover the familiarization of database security and the methods of administering
security in private and public domains.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Security Problem in Computing:
The meaning of computer Security, Computer Criminals, Methods of Defense,
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 To understand the foundation of security problems in computing Understand
To understand and to employ methods for program security and for
CO2 Apply
protecting files
To understand and to employ methods for database security and for
CO3 Apply
protecting network in public and private domains
Investigate and do administration on Organizational policies and adopt
CO4 Analyze
ethical policies in Security.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 2
CO2 3 3 2
CO3 3 3 2
CO4 3 3 2
CO5 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Charles P.Pfleeger, Shari 5th Edition,
1 Security in Computing PHI
Lawrence Pfleeger 2015
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. To address the major questions, challenges, and processes that Systems Security Engineers (SSE)
face in evaluating the cyber risk and resiliency associated with a large-scale system.
2. To develop systems that are more cyber-resilient.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Define key concepts and principles of Systems Security Engineering.
Summarize the role of policies, standards, procedures, and guidelines in
securing systems. Outline the transferable (i.e. soft) and technical skills that
effective Systems Security Engineers embody.
Define the three system security engineering contexts - problem context,
1
solution context, and trustworthiness context SIE 573 5 - as outlined in the 11
System Security Engineering Framework. Identify the systems security
outcomes, tasks, and activities relevant to each process outlined in the System
Life Cycle - Technical, Technical Management, Organizational Project-
Enabling, and Agreement.
Supervisory Control and Data Acquisition (SCADA) system. security
techniques used in Supervisory Control and Data Acquisition (SCADA)
systems. Classification of the 16 Critical Infrastructure (CI) Sectors.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Demonstrate the ability to develop and apply cyber-related engineering
CO1 Analyse
design considerations.
Identify, formulate, and solve complex engineering problems in Systems
CO2 Apply
Security Engineering and Cyber Resiliency
Recognize and address both ethical and professional responsibilities in
CO3 Understand
cyber policy, standards and engineering.
identifying specific security controls for any shortcomings that may be
CO4 uncovered during a security/compliance assessment as it relates to a Analyse
specific critical infrastructure sector.
Understanding how and where cyber resiliency factors should be
CO5 Understand
considered throughout the SDLC.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2 2
CO2 3 2 2 2
CO3 3 2 2 2
CO4 3 2 2 2 2
CO5 3 2 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Security and Privacy Controls National Institute of
for Information Systems and Special Publication Fifth Edition
1 Standards and
Organizations,Special 800-53 ,2020
Technology (NIST)
Publication 800-53.
Risk-Management Framework
for Information Systems and National Institute of second
Special Publication
2 Organizations – A System Life Standards and edition,
800-37
Cycle Approach for Security Technology (NIST) 2018.
and Privacy.
National Institute of
Engineering Trustworthy Special Publication First
3 Standards and
Secure Systems 800-160. edition,2022
Technology (NIST)
Developing Cyber-Resilient National Institute of
Special Publication First
4 Systems, A Systems Security Standards and
800-160 edition,2021
Engineering Approach Technology (NIST)
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Breyan Mesmer, Incose First edition,
1 Systems Engineering Principles Michael Watson Publications 2022
Principles for Trustworthy Design of Hild D, McEvilley M, MITRE Technical Third
2
Cyber-Physical Systems. Winstead M Report Edition,2021
https://www.youtube.com/watch?v=XbZE0Xd5Rls&pp=ygU3U3VwZXJ2aXNvcnkgQ29udHJvbCB
2 BbmQgRGF0YSBBY3F1aXNpdGlvbiAoU0NBREEpIHN5c3RlbQ%3D%3D
https://www.youtube.com/watch?v=kbwsxEGYgbs&pp=ygUdU2VjdXJpdHkgYW5kIFByaXZhY3k
3 gQ29udHJvbHM%3D
https://www.youtube.com/watch?v=3DM2FsBSJjY&pp=ygUoIEN5YmVyIFJlc2lsaWVuY3kgRW5n
4 aW5lZXJpbmcgRnJhbWV3b3JrLg%3D%3D
SEMESTER S7
Course Objectives:
1. Enables the learners to understand the basics of threat intelligence and how it helps organizations
protect their data.
2. Enables the learners to identify and manage different threat vectors and use scanning tools to detect
vulnerabilities.
3. Enables the learners to gain insights into securing applications and applying security measures
throughout the development process.
4. Enables the learners to explore how SIEM platforms work, utilize AI and user behavior analytics
in security, and practice threat hunting techniques.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Threat intelligence overview
Definition, Strategy and external sources, How organisation use CTI, Role of
CTI analyst, Threat intelligence platforms, Threat intelligence frameworks,
1 Security intelligence.
11
Data security and protection
Data security challenges, common pitfalls, Industry specific data security
challenges, Data protection capabilities
Threat vectors and scanning
Threat vector, types of threat vector, mitigate risk from threat vector, scanning,
2
types of scanning, port scanning, network protocol analyser, vulnerability 8
assessment tools.
Application security and testing
Characteristic of security architecture, High level architectural models,
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full question
out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Understand Threat Intelligence. K2
CO2 Identify and Mitigate Threat Vectors. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2 2 2
CO2 3 2 2 2 2
CO3 3 3 2 2 1 2
CO4 3 3 3 3 1 2 2 2
CO5 3 3 3 2 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
The Threat Intelligence
Handbook: A Practical Guide Recorded Future Ist Edition,
1 for Security Teams to Recorded Future
(Company) 2020
Unlocking the Power of Threat
Intelligence
6th Edition,
2 Network Security Essentials William Stallings Pearson
2019
Application Security Program:
A Practical Guide to Ist edition,
3 A. Michael Houghton CRC Press
Implementing Secure Software 2020
Development Lifecycle
Security Information and Event
Ist edition,
4 Management(SIEM) David Miller Packt Publishing
2019
Implementation
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Practical Malware Analysis:
Michael Sikorski and Ist Edition,
1 The Hands-On Guide to No Starch Press
Andrew Honig 2012
Dissecting Malicious Software
The Web Application Hacker's
Dafydd Stuttard and 2nd Edition,
2 Handbook: Discovering and Wiley
Marcus Pinto 2011
Exploiting Security Flaws
Practical Threat Hunting:
Ist Edition,
3 Detecting and Responding to Aditya K. Sood Springer
2020
Cyber Attacks
2 https://www.coursera.org/learn/network-security
3 https://www.udemy.com/topic/web-application-security-tester
4 https://www.udemy.com/course/cyber-security-soc-analyst-training-siem-splunk-60-hrs
SEMESTER 7
CYBER SECURITY
Course Objectives:
1. To teach the basic attacks, threats and vulnerabilities related to cyber security
2. To make the learner aware of cyber crimes and cyber laws
3. To give concepts of the malwares and its protection mechanisms in systems and mobile
devices
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Cyber Security :-
Basic Cyber Security Concepts, Layers of Security, Vulnerability, Threats,
Computer Criminals, CIA Triad, Motive of Attackers, Active attacks, Passive
1 9
attacks, Software attacks, Hardware attacks, Cyber Threats and its
Classifications- Malware, Social Engineering, DoS/DDoS, Insider Threats,
Advanced Persistent Threats (APTs), Data Breaches and Information Theft.
Cybercrime and CyberLaw :-
Cybercrime, Classification of Cybercrimes, The legal perspectives- Indian
perspective, Global perspective, Categories of Cybercrime.
2 9
Fundamentals of cyber law, Outline of legislative framework for cyber Law,
History and emergence of cyber law, Outreach and impact of cyber law, Major
amendments in various statutes.
Malwares and Protection against Malwares :-
Virus, Worms, Trojans, Spyware, Adware, Key-logger, Ransomware,
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 3 2
CO2 2 3 2 2
CO3 2 3 2 2
CO4 2 3 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Reference Books
Sl. Name of the Name of the Edition
Title of the Book
No Author/s Publisher and Year
Computer Security: Principles and
1 William Stallings Pearson 5/e, 2011
Practices
Cyber Security- Understanding Cyber
Nina Godbole,
2 Crimes, Computer Forensics and Legal Wiley 1/e, 2011
Sunit Belapure
Perspectives
Computer and Cyber Security: B.B.Gupta, D.P
3 Principles, Algorithm, Applications, and Agrawal, Haoxiang CRC Press 1/e, 2018
Perspectives Wang.
James Graham,
4 Cyber Security Essentials Richard Howard, Auerbach 1/e, 2010
Ryan Otson
CLOUD COMPUTING
Course Code OECST722 CIE Marks 40
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. To understand the core principles, architecture, and technologies that underpin cloud
computing, including virtualization, data storage, and cloud services.
2. To equip students with the skills to use cloud computing tools effectively, implement
cloud-based applications, and address security challenges within cloud environments.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction - Cloud Computing, Types of Cloud, Working of Cloud
1 Computing, Cloud Computing Architecture - Cloud Computing 8
Technology, Cloud Architecture, Cloud Modelling and Design.
Virtualization - Foundations, Grid, Cloud And Virtualization,
Virtualization And Cloud Computing; Data Storage And Cloud
2 9
Computing - Data Storage, Cloud Storage, Cloud Storage from LANs
to WANs.
Cloud Computing Services - Cloud Computing Elements,
Understanding Services and Applications by Type, Cloud Services;
3 10
Cloud Computing and Security - Risks in Cloud Computing, Data
Security in Cloud, Cloud Security Services.
Cloud Computing Tools - Tools and Technologies for Cloud, Apache
Hadoop, Cloud Tools; Cloud Applications - Moving Applications to
4 9
the Cloud, Microsoft Cloud Services, Google Cloud Applications,
Amazon Cloud Services.
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO
PO1 PO2 PO3 PO4 PO6 PO7 PO8 PO9 PO10 PO11 PO12
5
CO1 2 2 2 2
CO2 2 2 2 2 2
CO3 2 2 2 2 2
CO4 2 2 2 2 2
Text Books
Reference Books
Cambridge University
2 Cloud Computing Sandeep Bhowmik 1/e, 2017
Press
Module
Link ID
No.
1 https://onlinecourses.nptel.ac.in/noc21_cs14/preview
SEMESTER 7
SOFTWARE ENGINEERING
Course Code OECST723 CIE Marks 40
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Software Engineering and Process Models - Software
engineering, Software characteristics and types, Layers of Software Engineering-
Process, Methods, Tools and Quality focus. Software Process models –
Waterfall, Prototype, Spiral, Incremental, Agile model – Values and Principles.
1 9
Requirement engineering - Functional, Non-functional, System and User
requirements. Requirement elicitation techniques, Requirement validation,
Feasibility analysis and its types, SRS document characteristics and its structure.
Coding guidelines - Code review, Code walkthrough and Code inspection, Code
debugging and its methods.
Testing - Unit testing , Integration testing, System testing and its types, Black
box testing and White box testing, Regression testing
3 10
Overview of DevOps and Code Management - Code management, DevOps
automation, Continuous Integration, Delivery, and Deployment (CI/CD/CD),
Case study – Netflix.
Risk management: Risk and its types, Risk monitoring and management model
4 7
Software Project Management - Planning, Staffing, Organisational structures,
Scheduling using Gantt chart. Software Configuration Management and its
phases, Software Quality Management – ISO 9000, CMM, Six Sigma for
software engineering.
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
Continuous Internal Evaluation Marks (CIE):
Internal Internal
Assignment/ Examination-1 Examination- 2
Attendance Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO4 Develop a software product based on cost, schedule and risk constraints. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
Text Books
Reference Books
Waman S
2 Software Engineering: A Primer Tata McGraw-Hill 1/e, 2008
Jawadekar
5 Object-Oriented Design and Patterns Cay Horstmann Wiley India 2/e, 2005
Module
Link ID
No.
1 https://www.youtube.com/watch?v=Z6f9ckEElsU
2 https://www.youtube.com/watch?v=1xUz1fp23TQ
3 http://digimat.in/nptel/courses/video/106105150/L01.html
4 https://www.youtube.com/watch?v=v7KtPLhSMkU
2 https://archive.nptel.ac.in/courses/106/105/106105182/
SEMESTER S7
COMPUTER NETWORKS
Course Objectives:
1. To Introduce the core concepts of computer networking.
2. To Explore routing protocols and their role in network communication
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Computer Networks:-
Introduction, Network Components, Network Models, ISO/OSI, TCP/IP,
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
1 Computer Networks: A Top- Behrouz A Forouzan McGraw Hill SIE, 2017
Down Approach
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Computer Networks, A Systems L. L. Peterson and B. S.
1 Morgan Kaufmann 5/e, 2011
Approach Davie
Sameer Seth
2 TCP/IP Architecture, design,
M. Ajaykumar Wiley 1/e, 2008
and implementation in Linux
Venkatesulu
Sl.No. Link ID
1 https://nptel.ac.in/courses/106/105/106105183/
SEMESTER 7
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Fundamentals of Mobile Application Development:
Introduction to Mobile Application Development, Overview of Mobile
Platforms: iOS and Android, Introduction to Flutter: History, Features, and
1 Benefits, Setting Up the Flutter Development Environment*, Mobile App 9
Architectures (MVC, MVVM, and BLoC), Basics of Dart Programming
Language.
3 9
State Management in Flutter: Provider, Riverpod, and BLoC
Networking in Flutter: HTTP Requests, JSON Parsing, RESTful APIs
Internal Internal
Assignment/ Examination-1 Examination- 2
Attendance Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Explain the basics of mobile application development and different mobile
CO1 K2
platforms and the environment setup.
Apply principles of effective mobile UI/UX design, develop responsive
CO2 K3
user interfaces using Flutter widgets.
Experiment effectively with state in Flutter applications. networking and
CO3 data persistence in Flutter apps. K3
Apply security best practices in mobile app development and debug Flutter
CO4 applications effectively. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3
CO2 3 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Flutter Cookbook Simone Alessandria Packt 2/e, 2023
Sl.No. Link ID
1 https://www.youtube.com/watch?v=VPvVD8t02U8
SEMESTER 8
COMPUTER SCIENCE AND ENGINEERING
(CYBER SECURITY)
SEMESTER S8
IPR AND CYBER LAWS
Course Code PECCT861 CIE Marks 40
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Fundamentals of Cyber Law and Cyber Space
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Describe the concepts of cyber law and the various components and
CO1 K2
challenges associated with cyberspace.
Understand cybercrime classifications, mobile security challenges, and
CO2 K2
key ethical principles in information society.
Understand the need for information security policies, key ISO
CO3 standards, and the legal framework of the IT Act, including penalties, K2
appeals, and amendments.
Describe copyright and patent issues in IT, including software piracy,
CO4 trademarks, domain name disputes, and database protection, with a focus K2
on legal perspectives in the U.S., EU, and India.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2
CO2 2 2 2
CO3 2 2 2
CO4 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Reference Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Cyber Security and Cyber Nilakshi Jain, Ramesh
1 Wiley 2020
Laws Menon
Surya Prakash Tripathi,
Introduction to Information
2 Ritendra Goel, Praveen Dreamtech Press 2014
Security and Cyber Laws
Kumar Shukla
Universal Law
3 Cyber Laws Justice Yatindra Singh 2016.
Publishing
Cyber Ethics 4.0: Serving Christoph
4 Humanity with Values Stückelberger , Pavan Springer 2020
Duggal
Cyber Laws: Intellectual
First
5 property & E Commerce, K. Kumar Dominant Publisher
Edition,2011
Security
3 https://www.coursera.org/learn/data-security-privacy#modules
4 https://jurnal.fh.unila.ac.id/index.php/fiat/article/download/2667/1961/12044
SEMESTER S8
SECURITY IN WIRELESS NETWORKS
Course Code PECCT862 CIE Marks 40
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Overview of Wireless Networks
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Understand the wireless network K2
CO2 Demonstrate fundamental techniques of secure wireless systems K3
Examine security threats in wireless networks and design strategies to K4
CO3
manage network security
CO4 Understand the Security of wireless networks K2
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 1 1 1 2 2
CO2 2 3 2 1 2
CO3 2 1 2 2 1 1
CO4 2 2 2 1 1 2
CO5 2 1 1
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Wireless Communications and 1st Edition,
1 William Stallings Prentice Hall
Networks 2004
Levente Buttyan
Security and Cooperation in (BME) and Jean- 1st Edition,
2 Cambridge University
Wireless Networks Pierre Hubaux 2007
(EPFL)
Security and Cooperation in
Wireless Networks: Thwarting Butty L. &Hubaux J. 1st Edition,
3 Cambridge University
Malicious and Selfish Behavior in P 2007
the Age of Ubiquitous Computing
Mobile and Wireless Network K Makki, P 1st Edition,
4 Springer
Security and Privacy Reiher,et. all. 2007
Reference Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Clint Smith. P.E., and 2nd Edition,
1 3G Wireless Networks Tata McGraw Hill
Daniel Collins 2007
Wireless and Mobile Network Pallapa Venkataram, 1st Edition,
2 Tata McGraw Hill
Security Satish Babu 2010
Wireless Security-Models, Tata McGraw – 1st Edition,
3 Nichols and Lekka
Threats and Solutions Hill, New Delhi 2006
Prentice Hall, New 1st Edition,
4 Security in Computing Charles P. Fleeger
Delhi 2009
Module
Link ID
No.
1 https://youtu.be/pnunzdvezto?feature=shared
2 https://youtu.be/jSsehESW37c?feature=shared
3 https://youtu.be/YNmLYQWjYUY?feature=shared
4 https://youtu.be/bur9hq_abog?feature=shared
SEMESTER S8
A sound knowledge
Prerequisites (if any) Course Type Theory
in Java.
Course Objectives:
1. To understand mobile systems, interfaces, and the Android framework for app development.
2. To understand implementation of 2D graphics and multimedia techniques in Android
applications.
3. To explore mobile embedded system architecture and scheduling algorithms.
4. To understand application of data storage techniques and leverage mobile cloud computing in
app deployment.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Overview of Mobile App and Mobile Interface
Case Study: Evernote Security Breach (2013) - Focus on how weak data
storage security led to breaches in a popular note-taking app, and how secure
SQLite operations could have mitigated the attack.
Mobile Cloud Computing in Mobile Applications Deployment
Case Study: iCloud Hack (2014) - Analysis of how mobile cloud security
vulnerabilities exposed user data and what strategies could be used to prevent
such breaches in mobile cloud environments.
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Describe the concepts, security challenges in mobile system and mobile K2
CO1
applications
Understand the implementation of 2D graphics, Graphical User K2
CO2
Interface and incorporation of multimedia in Android applications
Explain the concepts of general and Android based mobile embedded K2
CO3 systems and its application, processor technology and scheduling
algorithms
CO4 Illustrate the storage of data from mobile applications to a mobile device K2
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 1
CO2 3 1 2 2
CO3 3 2 2
CO4 3 1 2
CO5 3 2 2 1
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the
Sl. No Title of the Book Edition and Year
Author/s Publisher
Mobile Applications
Meikang Qiu,
Development with Android
1 Wenyun Dai, and Taylor and Francis
Technologies and
Keke Gai,
Algorithms
Himanshu Dwivedi,
Mobile Application McGraw-Hill
2 David Thiel, and
Security
Chris Clark
Education
Reference Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Mobile Applications: Design,
1 Development, and Tejinder S. Randhawa Springer 2022
Optimization
Module
Link ID
No.
1 https://youtu.be/rjcpzn7ty0o
2 https://youtu.be/-j1wISEOXYc
3 https://youtu.be/b1AgSvtl03g
4 https://youtu.be/LcAPj95KeSA
SEMESTER S8
NETWORK FORENSICS
Course Objectives:
5. Identify the significance and principles underlying networking concepts and protocols
6. Explain Network Forensics and its importance and understand Security issues of network
communications.
7. Understand network forensics tools and techniques and evaluate procedure for network
forensics investigation.
8. Comprehend wireless basics, authentication types, and attacks on wireless networks.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Basics of Computer Networks- Definition of Network, Need of Networks,
Protocol, Types of Networks- LAN, MAN, WAN. Network Components-
Twisted Pair Cable, Coaxial cable, Fiber Optic Cables, Network Interface
1 Card, HUB, Switch, Router. OSI model and TCP/IP protocol suite,
Introduction Network Protocols- IP, TCP, UDP, DHCP, DNS. Types of 9
Topologies- RING, STAR, BUS, MESH (features, advantages,
disadvantages). Classification by Component: Peer to Peer, Client/ Server.
Overview of Network Forensics: Definition, Process of Network Forensics,
Importance, Advantages and Disadvantages, Application of Network
2 Forensics. Network threats and vulnerabilities:
Types of network attacks- eavesdropping, spoofing, modification, Cross-site 9
scripting, DNS Spoofing, Routing Table Page Poisoning, ARP Poisoning,
Web Jacking. Social Engineering Attacks and its types. Types of network
forensics investigations: Incident Response and Proactive Investigations
Identifying sources of evidence- Digital devices, Network traffic, Cloud
environments, Steps for handling evidence. Data acquisition methods-
Network traffic capture, Log file analysis, Memory acquisition, List Packet
capture tools. Introduction to Data Preservation Technique- Write-blocking,
Data encryption, Data hashing, Metadata preservation.
Network Traffic Analysis Methods- Flow analysis, Packet analysis, Deep
3 9
packet inspection (DPI), and Network behavior analysis.
Identifying sources of evidence, learning to handle the evidence, collecting
network traffic using tcpdump, Collecting network traffic using Wireshark,
Collecting network logs, Acquiring memory using FTK Imager, Tapping into
network traffic: Packet sniffing and analysis using Wireshark, Packet sniffing
and analysis using NetworkMiner.
Introduction to Wireless Networks: Basics of wireless (IEEE 802.11)
communication and security challenges.
Types of Authentications: WEP, WPA and WPA-2 Encryption. Attacks on
Wireless networks: Man-in-the middle (MITM), Brute-Force, Evil Twin,
Rogue access points, Phishing, Wireless Jamming (Denial-of-Service
4
Attacks), Wireless Eavesdropping. 9
Legal challenges in network forensics: Authorization, Privacy, Data
Preservation, Disclosure, Cross-Border Investigations. Digital Personal Data
Protection Act,2023: Introduction, Data, Data Fiduciary, Data Principal, Data
Processor, Personal Data Breach, Need of DPDP, Key Features of DPDP
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Illustrate the Basics of Networking Concepts and Protocols Understand
Describe the significance of network forensics and the security concerns Understand
CO2
associated with network communications.
Describe the process of evidence handling, data acquisition methods, Analyse
CO3
and Network Traffic Analysis methods
Comprehend wireless basics, authentication types, and attacks on Understand
CO4
wireless networks
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2
CO2 3 2 2
CO3 3 2 2
CO4 3 2 2
CO5 3 2 2 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the
Sl. No Title of the Book Edition and Year
Author/s Publisher
Learning Network
1 Samir Datt PACKT Publications , ISBN: 9781782174905
Forensics
Meghanathan, N.,
Tools and techniques for arXiv preprint
2 Allam, S. R., & 2010
network forensics arXiv:1004.0570.
Moore, L. A.
3 Network Forensics Ric Messier Wiley ISBN: 9781119328285
(2012)(Vol. 2014).
Network forensics:
Davidoff, S., & ISBN: 9780132565110
4 tracking hackers through Pearson
Ham, J. Upper Saddle River:
cyberspace
Prentice Hall.
Reference Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Introduction to Security and CRC press
1 William J. Buchanan 2011
Network Forensics publications.
March 2019
2 Hands-On Network Forensics Nipun Jaswa PACKT Publications ,ISBN
9781789344523
December
CRC press 2021
3 Network Forensics Anchit Bijalwan
publications. 978-
0367493615
Module
Link ID
No.
1 https://youtu.be/VwN91x5i25g?feature=shared
2 https://youtu.be/VklrX2IfCNk
3 https://youtu.be/VklrX2IfCNk?feature=shared
4 https://youtu.be/U_cl7QqCF3c?feature=shared
SEMESTER S8
Course Objectives:
1. The goal of this course is to familiarize students with Windows and Linux OS forensic
analysis in the context of Disk Forensics.
2. The topics also covers the familiarization of different tools which may explore new
3. ways to approach problems in the fields of digital forensic analysis.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Digital investigation foundation: Digital investigations and evidence,
Digital crime scene investigation process, Data analysis, overview of
toolkits.
1
Computer foundations- Data organizations-booting process-Hard
9
disk technology- Hard disk data acquisition-introduction- reading the
source data-writing the output data.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
To understand the foundation of digital investigation and methods of Understand
CO1
data analysis.
Tools and utilities can be used to collect and analyze live response data Analyse
CO2
from questionable machines.
CO3 Conduct research and investigation in the disk forensic sector. Create
investigate and do research on Linux systems in order to create forensic Create
CO4
tools.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2
CO2 3 2 2
CO3 3 2 2
CO4 3 2 2
CO5 3 2 2 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Windows Forensic Harlan Carvey Syngress Inc. Edition
1
Analysis DVD Toolkit 2,2009
Windows Registry Forensics:
Advanced Digital Forensic Harlan Carvey Syngress Inc. Edition
2 Analysis of the Windows 2,2009
Registry
Practical Linux Forensics: A Bruce Nikkel
3 Guide For Digital 2021
Investigators
SEMESTER S8
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Introduction to Interaction Design and AR/VR :- Fundamentals of
Interaction Design - Principles of interaction design, Human-computer
interaction (HCI) basics, User experience (UX) design principles; Introduction
1 10
to AR and VR - Overview of AR and VR technologies (Key differences and
Application), Overview of AR/VR hardware (headsets, controllers, sensors),
Software tools and platforms for AR/VR development.
Understanding User Needs and Context - User research methods, Personas and
user journey mapping, Contextual inquiry for AR/VR, Designing for AR/VR
2 Environments, Spatial design principles, Immersion and presence in AR/VR, 10
User interface (UI) design for AR/VR; Prototyping and Testing - Rapid
prototyping technique, Usability testing methods, Iterative design and
feedback loops.
● 2 Questions from each 2 questions will be given from each module, out of
module. which 1 question should be answered. Each question
● Total of 8 Questions, can have a maximum of 3 subdivisions. Each 60
each carrying 3 marks question carries 9 marks.
(8x3 =24marks) (4x9 = 36 marks)
Bloom’s
Course Outcome Knowledge
Level (KL)
Apply fundamental interaction design principles and human-computer
CO1 interaction (HCI) concepts to create effective and intuitive user K3
experiences in AR/VR applications.
Demonstrate proficiency in using AR/VR hardware and software tools
CO2 K3
for the development and prototyping of immersive environments.
Conduct user research and apply user-centered design methodologies to
CO3 K4
tailor AR/VR experiences that meet specific user needs and contexts.
Implement advanced interaction techniques such as gesture controls,
CO4 voice commands, haptic feedback, and eye gaze in AR/VR applications K3
to enhance user engagement and immersion.
Evaluate AR/VR projects, utilizing appropriate evaluation methods and
CO5 metrics, and propose improvements based on user feedback and emerging K5
trends in the field.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3
CO2 3 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
CO5 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Augmented Reality - Theory, Design
1 Chetankumar G Shetty McGraw Hill 1/e, 2023
and Development
Ralf Doerner, Wolfgang
Virtual Reality and Augmented
2 Broll, Paul Grimm, and Wiley 1/e, 2018
Reality: Myths and Realities
Bernhard Jung
Dieter Schmalstieg and
Augmented Reality: Principles and
3 Tobias Hollerer Pearson 1/e, 2016
Practice
Alan Dix, Janet Finlay,
Sl.No. Link ID
1 Interaction Design https://archive.nptel.ac.in/courses/107/103/107103083/
2 Virtual Reality https://archive.nptel.ac.in/courses/106/106/106106138/
3 Augmented Reality https://www.youtube.com/watch?v=WzfDo2Wpxks
SEMESTER S8
INTRODUCTION TO ALGORITHMS
(Common to CS/CA/CM/CD/CR/AD/AM)
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Internal Internal
Assignment/ Examination-1 Examination- 2
Attendance Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Use binary trees and search trees, and apply graph representations,
CO2 K3
BFS, DFS, and topological sorting
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 1
CO2 2 3 2 2 2
CO3 3 3 3 2 2
CO4 2 2 2
CO5 2 3 2 2
T. H. Cormen, C. E.
1 Introduction to Algorithms Leiserson, R. L. Rivest, C. Prentice-Hall India 4/e, 2022
Stein
Reference Books
Sl.No. Link ID
1 https://archive.nptel.ac.in/courses/106/105/106105164/
SEMESTER S8
WEB PROGRAMMING
Course Objectives:
1. To equip students with the knowledge and skills required to create, style, and script web
pages using HTML5, CSS, JavaScript, and related technologies.
2. To provide hands-on experience with modern web development tools and frameworks
such as React, Node.js, JQuery, and databases, enabling students to design and build
dynamic, responsive, and interactive web applications.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Creating Web Page using HTML5 - Introduction, First HTML5 example,
Headings, Linking, Images, Special Characters and Horizontal Rules, Lists,
Tables, Forms, Internal Linking, meta Elements, HTML5 Form input Types,
Input and datalist Elements and autocomplete Attribute, Page-Structure
Elements; Styling Web Page using CSS - Introduction, Inline Styles,
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
Randy Connolly, Ricardo
1 Fundamentals of Web Development Pearson 1/e, 2017
Hoar
Building User Interfaces with ReactJS
2 Chris Minnick Wiley 1/e, 2022
- An Approachable Guide
Internet & World Wide Web - How to Paul J. Deitel, Harvey M.
3 Pearson 1/e, 2011
Program Deitel, Abbey Deitel
SPA Design and Architecture:
Manning
4 Understanding Single Page Web Emmit Scott 1/e, 2015
Publications
Applications
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
A Hand Book On Web
1 Development : From Basics of Pritma Jashnani Notion press 1/e, 2022
HTML to JavaScript and PHP
Advanced Web Development
2 Mohan Mehul BPB 1/e, 2020
with React
JavaScript Frameworks for Tim Ambler, Sufyan bin
3 Apress 1/e, 2019
Modern Web Development Uzayr, Nicholas Cloud
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Software Testing & Automation:-
2 Unit Testing- Static and Dynamic Unit Testing, control flow testing, data 8
flow testing, domain testing; Mutation Testing- Mutation operators,
mutants, mutation score, and modern mutation testing tools (e.g.,
Muclipse); JUnit Framework - Automation of unit testing, frameworks
for testing in real-world projects; AI in Testing - GenAI for test case
generation and optimization, impact on automation; Industry Tools -
Application of AI-driven testing tools in automation and predictive
testing; Case Study - Mutation testing using JUnit, AI-enhanced test case
automation.
Graph Coverage Criteria - Node, edge, and path coverage; prime path and
round trip coverage; Data Flow Criteria - du paths, du pairs, subsumption
relationships; Graph Coverage for Code - Control flow graphs (CFGs) for
3 complex structures (e.g., loops, exceptions); Graph Coverage for Design 10
Elements - Call graphs, class inheritance testing, and coupling data-flow
pairs; Security Testing - Fundamentals, tools (OWASP, Burp Suite), and
their role in protecting modern applications; Case Study - Application of
graph based testing and security testing using industry standard tools.
5 15 10 10 40
CO2 3 3 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3
CO6 3 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
1 Cambridge
Introduction to Software Testing. Paul Ammann, Jeff Offutt 2/e, 2016
University Press
Reference Books
Name of
Sl. Edition
Title of the Book Name of the Author/s the
No and Year
Publisher
Module
Link ID
No.
1 https://archive.nptel.ac.in/courses/106/101/106101163/
2 https://archive.nptel.ac.in/courses/106/101/106101163/
3 https://archive.nptel.ac.in/courses/106/101/106101163/
4 https://archive.nptel.ac.in/courses/106/101/106101163/
SEMESTER S8
INTERNET OF THINGS
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to IoT - Physical Design of IoT, Logical Design of IoT, IoT levels
1 and Deployment templates, Domain Specific IoT- Home automation, Energy, 9
Agriculture, Health and lifestyle.
IoT and M2M-M2M, Difference between IoT and M2M, Software Defined
Networking, Network Function virtualization, Need for IoT System
Management, Simple Network Management Protocol(SNMP), NETCONF,
2 9
YANG; LPWAN - LPWAN applications, LPWAN technologies, Cellular
(3GPP) and Non 3GPP standards, Comparison of various protocols like
Sigfox, LoRA, LoRAWAN, Weightless, NB-IoT, LTE-M.
Developing IoT - IoT design methodology, Case study on IoT system for
weather monitoring, Motivations for using python, IoT-system Logical design
3 9
using python, Python Packages of Interest for IoT - JSON, XML, HTTPlib &
URLLib, SMTPLib
Programming Raspberry Pi with Python-Controlling LED with Raspberry Pi,
4 Interfacing an LED and switch with Raspberry Pi, Other IoT devices- PcDino, 9
Beagle bone Black, Cubieboard, Data Analytics for IoT
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
Continuous Internal Evaluation Marks (CIE):
Internal Internal
Assignment/ Examination-1 Examination- 2
Attendance Total
Microproject
(Written) (Written )
5 15 10 10 40
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2 3
CO2 3 3 3 2 3
CO3 3 3 3 2 2 3
CO4 3 3 3 2 2 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Internet of Things - a Hands On Arshdeep Bahga, Vijay
1 Universities Press 1/e, 2016
Approach. Madisetti
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Internet of Things : Architecture
1 Rajkamal McGraw Hill 2/e, 2022
and Design Principles
The Internet of Things –Key Olivier Hersent, David
2 Wiley 1/e, 2012
applications and Protocols Boswarthick, Omar Elloumi
IoT fundamentals : Networking David Hanes Gonzalo.
3 technologies, Protocols and use Salgueiro, Grossetete, Robert Cisco Press 1/e, 2017
cases for the Internet of things Barton
Sl.No. Link ID
1 https://archive.nptel.ac.in/courses/106/105/106105166/
2 https://archive.nptel.ac.in/courses/108/108/108108179/
SEMESTER 8
COMPUTER GRAPHICS
OECST835
Course Code CIE Marks 40
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Credits 3 Exam Hours 2 Hrs. 30 Min.
Course Objective:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Basics of Computer graphics - Basics of Computer Graphics and its
applications. Video Display devices - LED, OLED, LCD, PDP and FED and
reflective displays. Random and Raster scan displays and systems.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Understand the principles of computer graphics and displays K2
CO2 Illustrate line drawing, circle drawing and polygon filling algorithms K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Computer Graphics : Algorithms and D. P. Mukherjee,
1 PHI 1/e, 2010
Implementations Debasish Jana
Donald Hearn, M.
2 Computer Graphics with OpenGL Pauline Baker and PHI 4/e, 2013
Warren Carithers
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Jiun-Haw Lee, I-Chun
Introduction to Flat Panel
1 Cheng, Hong Hua, Shin- Wiley 1/e, 2020
Displays
Tson Wu
Computer Graphics and
2 ITL ESL Pearson 1/e, 2013
Multimedia
Zhigang Xiang and Roy
3 Computer Graphics McGraw Hill 2/e, 2000
Plastock
Principles of Interactive Computer William M. Newman and
4 McGraw Hill 1/e, 2001
Graphics Robert F. Sproull
Procedural Elements for
5 David F. Rogers McGraw Hill 1/e, 2017
Computer Graphics
Donald D Hearn, M Pauline
6 Computer Graphics Pearson 2/e, 2002
Baker
Sl.No. Link ID