Bca Cyber Security Curriculum Syllabus
Bca Cyber Security Curriculum Syllabus
(3 YEARS)
Regulation 2018
Motto:
Vision:
To be an International Institute of Excellence, providing a conducive environment for
education with a strong emphasis on innovation, quality, research and strategic
partnership blended with values and commitment to society.
Mission:
● To create an ecosystem that promotes learning and world class research.
● To nurture creativity and innovation.
● To install highest ethical standards and values.
● To pursue activities for the development of the Society.
● To develop national and international collaborations with institutes and industries of
eminence.
● To enable graduates to become future leaders and innovators.
Value Statement:
Integrity, Innovation, Internationalization.
1
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
VISION
MISSION
• To design and deliver curriculum to meet the changing the needs of industry.
2
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
The Program Educational Objectives (PEOs) are defined and developed for each
program with the consultation and involvement of various stakeholders such as
management, students, industry, regulating authorities, alumni, faculty and parents.
Their interests, social relevance and contributions are taken into account in defining
and developing the PEOs.
The Program Educational Objectives (PEOs) of the Computer Applications are listed
below:
PEO III To prepare the students for a successful career in IT and ITES industries
with effective Institute‐Industry Interaction.
PEO IV To inculcate the desire for lifelong learning and contribute to the society
and introduce them the best practices.
3
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
PO3 Modern tool usage: Create, select and apply appropriate techniques,
resources, and modern engineering and IT tools including prediction and
modelling to complex IT applications with an understanding of the
limitations.
PO5 Ethics: Apply ethical principles and commit to professional ethics and
responsibilities and norms of the engineering practice.
4
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
At the end of this program, graduates will be able to execute the outcomes
defined by Professional body.
PSO3: Improve the analytical knowledge of the students to design a cyber security
model to secure the data using modern tools and techniques.
5
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
1 BS ELA4104 English ‐1 3 0 0 3 0 3
2 BS MAA1101 Applied Mathematics 3 0 0 3 0 3
Computer Concepts &
3 BS BCB2101 3 1 0 4 0 4
Problem Solving
Introduction to Digital Logic
4 BS BCB2102 3 1 0 4 0 4
Fundamentals
5 PC BCB2103 Programming in C 3 0 0 3 0 3
PRACTICAL
Computer Concepts and
6 PC BCB2131 0 0 2 1 0 2
Problem Solving Laboratory
7 PC BCB2132 C Programming Laboratory 0 0 2 1 0 2
Total 15 2 4 19 0 21
L – Lecture; T – Tutorial; P – Practical; S- Self Study; C – Credit; TCH -Total Contact Hour
SEMESTER - II
SL. COURSE COURS
NAME OF THE COURSE L T P C S TCH
NO CATEGORY E
CODE
1 BS ELA4116 English –II 3 0 0 3 0 3
2 BS GEA1116 Business Statistics 3 1 0 4 0 4
3 PC BCB2116 Data Structures 3 1 0 4 0 4
4 PC BCB2117 Microprocessors 3 0 0 3 0 3
5 BS GEA2117 Introduction to Accounting 3 0 0 3 0 3
PRACTICAL
6 PC BCB2141 Data Structures Lab 0 0 2 1 0 2
7 BS GEA1146 Accounting Laboratory 0 0 2 1 0 2
Total 15 2 4 19 0 21
L – Lecture; T – Tutorial; P – Practical; S- Self Study; C – Credit; TCH -Total Contact Hour
6
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
SEMESTER - III
SL. COURSE COURSE
NAME OF THE COURSE L T P C S TCH
NO CATEGORY CODE
1 PC BCB2201 Web Designing 3 0 0 3 0 3
2 PC BCB2202 PC Hardware & Networking 3 0 0 3 0 3
3 PC BCB2203 Software Engineering 3 0 2 4 0 5
4 PC BCB2204 Object Oriented Programming 3 0 0 3 0 3
5 PC BCB2205 Computer Organization 3 0 0 3 0 3
PRACTICAL
PC BCB2231 Object Oriented
6 0 0 2 1 0 2
Programming Laboratory
7 PC BCB2232 Web Designing Laboratory 0 0 2 1 0 2
Total 15 0 6 18 0 21
L – Lecture ; T – Tutorial ; P – Practical ; S- Self Study; C – Credit; TCH -Total Contact Hour
SEMESTER - IV
SL. COURSE COURSE
NAME OF THE COURSE L T P C S TCH
NO CATEGORY CODE
1 PC BCB2216 Web Programming using PHP 3 0 2 4 0 5
2 PC BCB2217 Operating Systems 3 0 0 3 0 3
3 PC BCB2218 Computer Networks 3 0 0 3 0 3
4 PC BCB2219 Database Management Systems 3 0 0 3 0 3
5 PC BCB2220 Enterprise Resource Planning 3 0 0 3 0 3
PRACTICAL
PC BCB2241 Relational Database
6 0 0 2 1 0 2
Management Systems
Laboratory
7 PC BCB2242 Operating Systems Laboratory 0 0 2 1 0 2
Total 15 0 6 18 0 21
L – Lecture ; T – Tutorial ; P – Practical ; S- Self Study; C – Credit; TCH -Total Contact Hour
7
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
SEMESTER - V
SL. COURSE COURSE
NAME OF THE COURSE L T P C S TCH
NO CATEGORY CODE
1 PC BCB2302 Introduction to Java Programming 3 0 0 3 0 3
2 PC BCB2303 Introduction to Python Programming 3 0 0 3 0 3
3 PC BCB2304 Cyber Security and SIEM 3 0 0 3 0 3
4 DE ****** E1 Elective – I 3 0 0 3 0 3
5 DE ****** E2 Elective – II 3 0 0 3 0 3
PRACTICAL
6 PC BCB2332 Java Programming laboratory 0 0 2 1 0 2
7 PC BCB2333 Python Programming Laboratory 0 0 2 1 0 2
Total 15 0 4 17 0 19
L – Lecture ; T – Tutorial ; P – Practical ; S- Self Study; C – Credit; TCH -Total Contact Hour
SEMESTER - VI
SL. COURSE COURSE
NAME OF THE COURSE L T P C S TCH
NO CATEGORY CODE
1 PC BCB2316 Computer Graphics 3 0 0 3 0 3
2 PC BCB2317 Data Warehousing and Data Mining 3 0 0 3 0 3
3 DE ****** E3 Elective – III 3 0 0 3 0 3
4 DE ****** E4 Elective – IV 3 0 0 3 0 3
5 DE ****** E5 Elective – V 3 0 0 3 0 3
PRACTICAL
6 PC BCB2346 Project Work 0 0 8 4 0 8
Total 15 0 8 19 0 23
L – Lecture ; T – Tutorial ; P – Practical ; S- Self Study; C – Credit; TCH -Total Contact Hour
8
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
9
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
SEMESTER – I
COURSE TITLE ENGLISH-I CREDITS 3
COURSE CODE ELA4104 COURSE CATEGORY BS L-T-P-S 3-0-0-0
26th ACM LEARNING
Version 1.0 Approval Details BTL-4
23-03-2019 LEVEL
ASSESSMENT SCHEME
Second Seminar/ Surprise
First Periodical
Periodical Assignments/ Test / Attendance ESE
Assessment
Assessment Project Quiz
15% 15% 10% 5% 5% 50%
This course has been designed to develop students’ language skills and
communication needs. It attempts to develop their proficiency through
Course
oral communication skills with an application knowledge of grammar and
Description
vocabulary. This course teaches students how to communicate accurately,
appropriately and fluently in professional and social situations.
1. To acquire self-confidence by which the learner can improve upon
their informative listening skills by an enhanced acquisition of the
English language
2. To provide an environment to Speak in English at the formal and
informal levels and use it for daily conversation, presentation, group
discussion and debate
Course 3. To equip the students to read intensively and extensively, short
Objective meaningful extracts from literary and non-literary texts and identify
various types of connections among statements
4. To enhance the oral communication skills of the students via functions
in clusters and respond to daily conversations naturally
5. To equip the learners in develop critical thinking skills and participate
in Group activities, task-based activities and respond to hypothetical
situations
Upon completion of this course, the students will be able to
1. Identify relationships between topic sentences and subordinate
sentences
2. Develop the skill to listen to speeches, lectures, telephone
conversations, recorded versions of all the above, and responding non-
Course
verbally as well as verbally
Outcome
3. Develop a conscious awareness about the processes of metacognitive
skills by considering societal and environmental contexts
4. Apply and analyse the contextual knowledge through reading the
passages and participate in group activities and task-based activities
5. Identify his/her choicest field or specialized area through wide reading
10
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
11
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
12
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
Suggested sources:
1. Embark, English for Under Graduates by Steve Hart, Arvind Nair, Veena
Bhambhani, Cambridge University Press 2016.
13
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
14
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
15
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
16
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
17
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
18
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
19
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
20
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
21
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
22
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
23
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
24
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
25
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
SEMESTER- II
COURSE TITLE ENGLISH II CREDITS 3
COURSE CODE ELA4116 COURSE CATEGORY BS L-T-P-S 3-0-0-0
26th ACM LEARNING
Version 1.0 Approval Details BTL-4
23-03-2019 LEVEL
ASSESSMENT SCHEME
First Second Seminar/
Surprise
Periodical Periodical Assignments/ Attendance ESE
Test / Quiz
Assessment Assessment Project
15% 15% 10% 5% 5% 50%
This course has been designed to develop students' language skills and
communication needs. It attempts to develop their proficiency through oral
Course
communication skills with application knowledge of grammar and vocabulary.
Description
This course teaches students how to communicate accurately, appropriately
and fluently in professional and social situations.
1. To communicate effectively with grammatical accuracy and socio-cultural
appropriacy with friends, classmates and other persons in the social circle
2. To design and formulate one’s own ideas, investigate and develop
solutions for problems and make effective presentations
3. To create, select appropriate techniques and use modern tools for
Course communication such as mails, advertising materials, brochures, bills,
Objective vouchers and other essential modes of writing discourse
4. To apply reasoning for contextual knowledge received from media
discourse so as to gain the attention of the reader (print media) and viewer
(visual media)
5. To use modern tools and learning materials such as MOOC, NPTEL and
display a passion for extensive reading
Upon completion of this course, the students will be able to
1. Describe objects, places, landscapes, people, natural processes and
upgrade from grammatical competence to communicative competence
through problem solving tasks
Course 2. Develop presentation skills and effective seminar participation
Outcome 3. Develop business communication
4. Identify and list natural ways of functioning in contexts, based on short
extracts taken from news reading, advertisements, plays, or dialogues
from media
5. Perform self-check grammar tests to improve grammatical accuracy
Prerequisites: Plus Two English-Intermediate Level
CO, PO AND PSO MAPPING
CO PO -1 PO-2 PO-3 PO-4 PO-5 PO-6 PSO-1 PSO-2 PSO-3
CO-1 1 - - - 1 3 1 2 -
CO-2 1 1 - 1 - - 1 1 1
CO-3 2 - - - - 2 1 2 -
26
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
CO-4 - - 1 - - - 1 1 1
CO-5 - - - - 1 3 1 2 -
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: COMMUNICATIVE WRITING (9L)
Messages (informal, formal) - Memos - Formal letters of invitation - personal letters
of invitation - Writing formal letters (a) business (b) official - Short paragraphs -
Describing objects, places, landscapes, people, natural processes, describing
processes (man-made) - Expanding short aphorisms, proverbs, quotes, idioms etc.
into short paragraphs - Making posters for various occasions such as World Wildlife
Day, AIDS Awareness, Anti-Ragging etc.
Suggested Activities:
Writing (a)Short publicity materials, (b) Brochures (c) user manuals, (d)warranty
CO-1
cards (e) captions
BTL-2
Suggested Reading:
1. Cambridge Academic English, An integrated skills course for EAP by Martin
Hewings and Craig Thaine, by Cambridge University Press, 2014
2. Professional Speaking Skills by Aruna Koneru, Oxford Press, 2015
3. Embark, English for Under Graduates by Steve Hart, Arvind Nair, Veena
Bhambhani, Cambridge University Press 2016.
4. English for Life and the Workplace Through LSRW&T skills, by Dolly John, Pearson
Publications, 2014 edition
MODULE 2 –SKILLS FOR ACADEMIC PURPOSES (9L)
Enriching word power -- Language in use -- Listening comprehension -- Group
discussion -- Note making -- Intensive reading -- Interpretation -- Interview skills
– E mail writing -- Synthesizing information from various sources --Expanding quotes
- Job applications — Preparing CV – Preparing the profiles of organizations and
institutions — Presentation skills – Effective seminar participation
Suggested activities: CO-2
Preparation and Writing of Slides, Embellishments - Oral presentation - Self BTL-3
Evaluation - Listening and note taking, identifying hard spots, framing questions &
Raising doubts / Seeking clarifications (Seminar)
Suggested sources:
English for Life and the Workplace Through LSRW&T skills, by Dolly John, Pearson
Publications, 2014 edition
MODULE – 3 : BUSINESS COMMUNICATION (WRITTEN) (9L)
Writing project proposals (pre-project stage) — writing project proceedings (while-
project stage) —writing project reports (post-project stage) — writing project
evaluation — Writing reviews of journal articles — Business correspondence for
various purposes such as placing orders, reminding, complaining, notifying damage CO-3
of consignment and demanding replacement, sales promotion BTL-4
Suggested Activities:
writing gist of articles for putting them together in an edited form — Writing
transcripts of lectures and speeches on academic interest
27
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
Suggested sources:
Essential English Grammar by Raymond Murphy, Cambridge University Press, 2016
edition
MODULE – 4 : WRITING FOR MEDIA (PRACTICE) (9L)
From events to news story — the various stages of development of news reporting
– Editing — Basics of editing; (i) At the level of contents & (ii) at the level of language
– Advertisements - Electronic media and their advantages and limitations - Proof
reading
Suggested activities: CO-4
Identifying and listing natural ways of functioning in contexts, based on short BTL-3
extracts taken from news reading, advertisements, plays, or dialogues from media
Suggested sources:
Embark, English for Under Graduates by Steve Hart, Arvind Nair, Veena Bhambhani,
Cambridge University Press 2016.
MODULE - 5 COMPREHENSION STRATEGIES (9L)
Silent reading and testing comprehension skills — Reading aloud and accuracy in
pronunciation —Making short speeches before small groups to check fluency —
Writing small pieces of discourse meant for day-to-day communication — Writing
short academic pieces for exam purposes — Doing self-check grammar tests to
improve grammatical accuracy
CO-5
Suggested Activities:
BTL-1
Reading primary sources—reading secondary sources and supporting the points
already gathered from the primary sources
Suggested Sources:
Essential English Grammar by Raymond Murphy, Cambridge University Press, 2016
edition
TEXT BOOKS
1 Martin Hewings ,Craig Thaine(2014), Cambridge Academic English -an integrated skills
course for EAP, Cambridge University Press.
2 Raymond Murphy(2016), Essential English Grammar, Cambridge University Press.
REFERENCE BOOKS
1 Sabina Pillai and Agna Fernandez(2018), Soft Skills & Employability Skills, Cambridge
University Press
2 Aruna Koneru(2015), Professional Speaking Skills, Oxford Publications.
E BOOKS
1 https://www.britishcouncil.in/english/courses-business
2 http://www.bbc.co.uk/learningenglish/english/features/pronunciation
MOOC
1 https://www.mooc-list.com/tags/english
2 http://www.cambridgeenglish.org/learning-english/free-resources/mooc/
28
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
29
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
Method – Method of Least Square – Moving Average Method – Seasonal Variation BTL-2
Suggested Readings: Time series.
MODULE 2: INDEX NUMBERS (9L+3T)
Index Numbers – Aggregative and Relative Index – Chain and Fixed Index –
CO-2
Wholesale Index – Cost of Living Index.
BTL-2
Suggested Readings: Basic statistics
MODULE 3: PROBABILITY (9L+3T)
Probability – Addition and Multiplication Theorem – Conditional probability –
CO-3
Baye’s Theorem (without proof) – Simple problems.
BTL-3
Suggested Readings: Problems based on events
MODULE 4: TESTING OF HYPOTHESIS (9L+3T)
Sampling Techniques – Types of Sample and Sampling procedures – Tests of
CO-4
Significance – Normal, t, F, Chi –square – Simple problems.
BTL-2
Suggested Readings: Different types of samples
MODULE 5: CORRELATION AND REGRESSION (9L+3T)
Correlation: Rank correlation coefficient – Regression. CO-5
Suggested Readings: Statistical relationship between variables. BTL-2
TEXT BOOKS
1. S.P Gupta(2017) , Statistical Methods –Sultan Chand and sons
REFERENCE BOOKS
1. Dr. P.R. Vittal(2012) Introduction to Operations Research , Margham Publications.
2. Snedecor G. W. & Cochran W. G (2014) , Statistical Methods, Oxford and IBH
E BOOKS
1. https://www.elsevier.com/books/statistical‐methods/freund/978‐0‐08‐049822‐5
MOOC
1. https://www.mooc‐list.com/tags/statistical‐methods
30
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
based lists, linked lists, hash tables, recursion, binary trees, scapegoat trees, red–
black trees, heaps, sorting algorithms, graphs, and binary tree.
1. To learn the basic techniques of algorithm analysis.
2. To demonstrate several searching and sorting algorithms.
Course 3. To implement linear and non-linear data structures.
Objective 4. To demonstrate various tree and graph traversal algorithms.
5. To analyse and choose appropriate data structure to solve problems in real
world.
Upon completion of this course, the students will be able to
1. Select appropriate data structure as applied to specified problem
2. Describe linear and non‐linear data structures like stacks, queues, linked list
Course etc.
Outcome 3. Describe the trees and the associated merits of executing
different operations on it.
4. Apply the different sorting and searching techniques in real time.
5. Implement various graph techniques and witness its merits and applications
Prerequisites: Programming in C
CO, PO AND PSO MAPPING
CO PO -1 PO-2 PO-3 PO-4 PO-5 PO-6 PSO-1 PSO-2 PSO-3
CO-1 3 3 3 - 1 - 2 - 2
CO-2 1 2 1 - - - 2 -
CO-3 3 1 2 1 - - 1 1 2
CO-4 2 2 1 - - 1 1 -
CO-5 3 1 1 - - - - - 2
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1 – PROBLEM SOLVING (9L+3T)
Problem solving – Top‐down Design– Implementation– Verification – Efficiency–
Analysis – Sample algorithms. CO-1
Practical component Top Down Design Algorithm Implementation in C BTL-2
Suggested Readings: Problem Solving Techniques, Algorithmic Efficiency Analysis.
MODULE 2 – LISTS, STACKS AND QUEUES (9L+3T)
Abstract Data Type (ADT) – The List ADT – Definition, Representation of linked lists in
Memory, Memory allocation ‐ Linked list operations ‐Traversing, Searching, Insertion,
and Deletion, Doubly Linked lists, Circular linked lists, and header linked lists ‐. CO-2
Applications of Linked lists –The Stack ADT –The Queue ADT BTL-2
Practical component:Implementation of LISTS, STACKS AND QUEUES in C.
Suggested Readings: Abstract Data types, Applications of Linear Data structure
MODULE 3 – TREES (9L+3T)
Preliminaries – Binary Trees – The Search Tree ADT – Binary Search Trees – AVL Trees
– Tree Traversals – Hashing – General Idea – Hash Function – Separate Chaining – Open
CO-3
addressing.
BTL-3
Practical component: Implementation of Binary Tree structure in C
Suggested Readings: Applications of Tress, Heaps
31
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
32
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
33
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
34
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
35
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
36
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
37
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
38
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
Prerequisites: NIL
CO, PO AND PSO MAPPING
CO PO -1 PO-2 PO-3 PO-4 PO-5 PO-6 PSO-1 PSO-2 PSO-3
CO-1 2 1 1 - 1 - 1 - 1
CO-2 1 - 1 - - - 1 -
CO-3 2 1 2 1 - - 1 1 1
CO-4 2 1 1 - - 1 1 -
CO-5 1 1 - - - - - 2
1: Weakly related, 2: Moderately related and 3: Strongly related
LAB / MINI PROJECT/FIELD WORK
1. Company Creation, preparation of groups
2. Preparation of ledgers
3. Preparation of Voucher
4. Preparation of Profit and Loss Account
5. Preparations of Final Accounts with and without Adjustments
6. Cash Flow and Fund Flow Analysis
7. Preparation of Ratio Analysis
8. Stock Transactions
9. F11 – Features and F12 – Configurations
Other Features and Report Generation
TEXT BOOKS
1 Jain and Narang(2014),” Advanced Accounting”, Kalyani Publishers
2 Gupta R L and Radhaswamy M(2014), “Advanced Accountancy”, Sultan Chand &
Sons
REFERENCE BOOKS
1 Tulsian P C(2002), ”Financial Accounting”, Pearson Education
2. Bhushan Y K(2000), “Fundamentals Of Business Organisation And Management”,
Sultan Chand & Sons
E BOOKS
1. http://www.freebookcentre.net/Business/Accounting‐Books.html
MOOC
1. https://www.coursera.org/learn/wharton‐accounting
39
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
SEMESTER III
40
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
41
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
42
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
43
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
44
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
45
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
46
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
47
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
CO-1 1 2 3 2 1 - 3 1 -
CO-2 3 2 1 2 - - 1 2 1
CO-3 2 2 3 2 2 1 3 3 -
CO-4 3 2 1 2 - 1 1 1 1
CO-5 1 2 3 3 - 1 3 1 -
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1 – BUILDING BLOCKS OF COMPUTER SYSTEM (9L)
Basic building blocks – I/O, Memory, ALU and its components, Control Unit and its
functions, Instruction –word, Instruction and Execution cycle, branch, skip, jump and CO-1
shift instruction, Operation of control registers; Controlling of arithmetic operations BTL-3
Suggested Readings: Transfer logic, Micro operations and Binary codes.
MODULE 2 – ADDRESSING TECHNIQUES AND REGISTERS (9L)
Addressing techniques – Direct, Indirect, Immediate, Relative, indexed addressing
and paging. Registers – Indexed, General purpose, Special purpose, overflow, carry,
CO-2
shift, scratch, Memory Buffer register; accumulators; stack pointers; floating point;
BTL-3
status information and buffer registers.
Suggested Readings: Instruction execution stages, addressing modes.
MODULE 3 – MEMORY (9L)
Main memory, RAM, static and dynamic, ROM, EPROM, EEPROM, EAROM, Cache and
CO-3
Virtual memory.
BTL-3
Suggested Readings: Memory hierarchy, Use of cache memory and virtual memory
MODULE 4 – INTERCONNECTING SYSTEM COMPONENTS (9L)
Buses, interfacing buses, Bus formats – address, data and control, Interfacing
keyboard, display, auxiliary storage devices and printers. I/O cards in personal CO-4
computers. BTL-3
Suggested Readings: Parallel processing, Pipelining and Peripheral devices
MODULE 5 – INTRODUCTION TO MICROPROCESSORS AND MICROCONTROLLERS (9L)
Introduction to 8085 microprocessors, examples of few instructions to understand
CO-5
addressing techniques. Difference between microprocessor and microcontrollers.
BTL-3
Suggested Readings: Addressing techniques and Types of memory.
TEXT BOOKS
1 David A. Patterson ,( 2012)"Computer Architecture and logical Design", McGraw Hill
48
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
49
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
50
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
51
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
SEMESTER IV
COURSE TITLE WEB PROGRAMMING USING PHP CREDITS 4
COURSE CODE BCB2216 COURSE CATEGORY PC L-T-P-S 3- 0- 2 -0
26th ACM LEARNING
Version 1.0 Approval Details BTL-3
23-03-2019 LEVEL
ASSESSMENT SCHEME
First Second Seminar/
Surprise
Periodical Periodical Assignments/ Attendance ESE
Test / Quiz
Assessment Assessment Project
15% 15% 10% 5% 5% 50%
This course explains about introduction to php, SQL languages, MYSQL with
Course PHP, built-in functions of PHP, cookies, session, implement all these concepts
Description to create a web page design and client/server design. This paper starts with
theoretical concepts of PHP and implement into real time applications
1. To design web pages using PHP
2. To design SQL language within MySQL and PHP to access and manipulate
Course databases
Objective 3. To create PHP code that utilizes the commonly used library functions
4. To demonstrate use of cookie, session, and authentication programming
To design and create a complete web site
Upon completion of this course, the students will be able to
1. Develop web pages using PHP
2. Demonstrate to execute and connect MySQL and PHP to access and
manipulate databases
Course
3. Create PHP code that utilizes the commonly used library functions
Outcome
4. Demonstrate use of cookie, session, and authentication programming in
PHP
5. Design and create a complete web site that demonstrates good
PHP/MySQL client/ server design
Prerequisites: Programming skills
CO, PO AND PSO MAPPING
CO PO -1 PO-2 PO-3 PO-4 PO-5 PO-6 PSO-1 PSO-2 PSO-3
CO-1 3 3 1 1 - 1 3 - 1
CO-2 2 - 1 1 2 1 2 3 1
CO-3 3 3 1 1 - 1 3 2 1
CO-4 1 3 2 1 - 1 1 3 1
CO-5 3 2 1 1 - 1 3 - 1
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: INTRODUCTION TO PHP (9L+3P)
Origin of PHP ‐ PHP with web server ‐ Benefits – Syntax – Delimiters‐ Variables –
CO-1
Datatypes – Operators – Dynamic variables – Strings ‐ Flow Control – Arrays – Array
BTL- 3
operators
52
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
53
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
54
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
55
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
First Seminar/
Second Periodical Surprise
Periodical Assignments/ Attendance ESE
Assessment Test / Quiz
Assessment Project
15% 15% 10% 5% 5% 50%
The main emphasis of this course is on the organization and management of local
area networks (LANs). The course objectives include learning about computer
network organization and implementation, obtaining a theoretical understanding
of data communication and computer networks, and gaining practical experience
Course in installation, monitoring, and troubleshooting of current LAN systems. Students
Description are introduced to computer communication network design and its operations,
and discuss the following topics: Open Systems Interconnection (OSI)
communication model; error detection and recovery; local area networks; bridges,
routers and gateways;On completion of the course, students should be able, in
part to design, implement and maintain a typical computer network (LAN).
1. Describe the general principles of data communication.
2. Describe how computer networks are organized with the concept of layered
approach
Course
3. Implement a simple LAN with hubs, bridges and switches.
Objective
4. Describe how packets in the Internet are delivered.
5. Analyze the contents in a given data link layer packet, based on the layer
concept
Upon completion of this course, the students will be able to
1. Describe the basic of Computer Network and the models.
Course 2. Comprehend about the transmission.
Outcome 3. Implement multiplexing and Ethernet.
4. Analyse the various types of protocol.
5. Define the functionalities of layers in networking.
Prerequisites: Basic Knowledge about Computer Network
CO, PO AND PSO MAPPING
CO PO -1 PO-2 PO-3 PO-4 PO-5 PO-6 PSO-1 PSO-2 PSO-3
CO-1 1 2 1 1 - 1 3 3 2
CO-2 2 2 1 1 - - 3 3 -
CO-3 3 - 1 1 1 - - 3 1
CO-4 - 3 - 1 - - 3 - -
CO-5 3 3 1 1 - - 3 3 -
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1 – DATA COMMUNICATIONS (9L)
Components – Direction of Data flow – networks – Components and Categories – types
CO-1
of Connections – Topologies –Protocols and Standards – ISO / OSI model –
BTL-3
Transmission Media –Coaxial Cable – Fiber Optics – Line Coding – Modems – RS232
56
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
Interfacing sequences.
Suggested Readings: OSI Model
MODULE 2 – DATA LINK LAYER (9L)
Error – detection and correction – Parity – LRC – CRC – Hamming code – low Control
and Error control ‐ stop and wait – go back ‐N ARQ – selective repeat ARQ‐ sliding CO-2
window – HDLC. ‐ LAN ‐ Ethernet– FDDI ‐ SONET – Bridges. BTL-3
Suggested Readings: Error Detection and Correction
MODULE 3 – NETWORK LAYER (9L)
Internetworks – Packet Switching and Datagram approach – IP addressing methods –
CO-3
Sub netting – Routing – Distance Vector Routing – Link State Routing – Routers.
BTL-3
Suggested Readings: Internetworks
MODULE 4 – TRANSPORT LAYER (9L)
Duties of transport layer – Multiplexing – Demultiplexing – Sockets – User Datagram
Protocol (UDP) – Transmission Control Protocol (TCP) – Congestion Control – Quality CO-4
of services (QOS) – Integrated Services BTL-3
Suggested Readings: Transmission Control Protocol (TCP)
MODULE 5 – APPLICATION LAYER (9L)
Domain Name Space (DNS) – SMTP – FTP – HTTP ‐ WWW – Security – Cryptography CO-5
Suggested Readings: Cryptography BTL-2
TEXT BOOKS
1 Sanjay Sharma(2013) , “Computer Networks”, Publisher‐ S K Kataria and Sons,
2 Andrew S. Tanenbaum, David J(2012). Computer Networks, Pearson Education,
REFERENCE BOOKS
1. Harvey M. Deitel(2007), "Operating Systems", Second Edition, Pearson Education
E BOOKS
http://www.freebookcentre.net/Networking/Free‐Computer‐Networking‐Books‐
1.
Download.html
MOOC
1. https://www.coursera.org/learn/fundamentals‐network‐communications
57
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
58
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
59
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
60
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
CO-1 3 - - - - - 3 2 1
CO-2 - 2 2 - - 1 - - 1
61
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
CO-3 3 - - - - - 3 2 1
CO-4 - 2 2 - 1 - - - 1
CO-5 3 2 2 2 - 1 3 2 1
1: Weakly related, 2: Moderately related and 3: Strongly related
LAB /MINI PROJECT/FIELD WORK
Creation of Database and performing the operations given below: Insertion, Deletion, Modification,
Generating a simple report for the following.
1. Payroll Processing
2. Mark sheet Processing
3. Saving bank account for banking
4. Inventory System
5. Library information System
6. Student information System
7. Electricity bill preparation System
8. Telephone directory maintenance
TEXT BOOKS
Pranab Kumar Das Gupta & P. RadhaKrishna(2013).” Database Management Systems Oracle
1.
SQL and PL/SQL”.
REFERENCE BOOKS
Jefferey A.Hoffer, Mary Prescott(2006), “Modern Database Management” Pearson
1.
Education
MOOC
https://www.amazon.com/Database‐Management‐Systems‐Raghu-Ramakrishnan/dp/
1.
0072465638
2. https://www.coursera.org/learn/core‐database
62
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
CO-1 2 2 1 2 1 1 2 - 1
CO-2 2 1 1 1 1 1 3 2 1
CO-3 2 1 1 2 1 1 - - 1
CO-4 2 2 1 2 1 1 3 2 -
CO-5 2 1 1 1 1 1 3 2 1
1: Weakly related, 2: Moderately related and 3: Strongly related
LAB /MINI PROJECT/FIELD WORK
(Implement the following on LINUX platform. Use C for high level language implementation)
1. Shell programming‐ command syntax‐ write simple functions‐ basic tests
2. Shell programming‐ loops‐ patterns‐ expansions‐ substitutions
3. Write programs using the following system calls of UNIX operating system: fork, exec, getpid,
4. exit, wait, close, stat, open dir, read dir
5. Write programs using the I/O system calls of UNIX operating system (open, read, write, etc)
6. Write C programs to simulate UNIX commands like ls, grep, etc.
7. Given the list of processes, their CPU burst times and arrival times, display/print the
Gantt chart for FCFS and SJF. For each of the scheduling policies, compute and print the
average waiting time and average turnaround time. For FCFS and SJF. For each of the
scheduling policies, compute and print the average waiting time and average turnaround
time
8. Given the list of processes, their CPU burst times and arrival times, display/print the Gantt
chart for Priority and Round robin. For each of the scheduling policies, compute and print the
average waiting time and average turnaround time.
9. Implement the Producer – Consumer problem using
semaphores.
10. Implement some memory management schemes – I
11. Implement some memory management schemes – II
TEXT BOOKS
63
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
64
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
SEMESTER V
65
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
66
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
67
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
68
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
69
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
3 Robert Johnston, Michael Shulver, Nigel Slack and Graham Clark(2021), Service
Operations Management – Pearson 5th Edition. (2021).
4 Betsy Page Sigman and Erickson Delgado (2016), Splunk Essentials 2nd Edition.
REFERENCE BOOKS
1 Don Murdoch (2019).Blue Team Handbook: SOC, SIEM, and Threat Hunting Use
Cases
2 Phillip Q. Maier (2006).Audit and Trace Log Management Consolidation and Analysis
70
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
71
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
72
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
73
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
SEMESTER VI
74
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
75
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
76
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
77
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
78
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
79
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
80
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
81
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
82
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
83
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
84
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
85
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
cybersecurity architecture principles. Cybersecurity models (the CIA triad, the star
model, the Parkerian hexad).
Practical component: Packet sniffing using Wireshark.
Suggested Readings: Advances in Cyber Security: Principles, Techniques, and
Applications
MODULE 3: SECURITY PLANS, POLICIES AND PROCEDURES (9L)
Defining a Cyber Security policy, General security expectations, roles and
responsibilities in the organization – Stakeholders.
CO-3
Practical component:
BTL-3
Managing securing policies using tcpdump, dumpcap using Wireshark.
Suggested Readings: Best practices for Cyber security standards
MODULE 4: OVERVIEW OF SECURITY COUNTERMEASURE TOOLS (9L)
Introduction to key security tools including firewalls, anti-virus and cryptography –
Identify security tools and hardening techniques – Prevention of cyber-attacks. Security
CO-4
Countermeasure tools and techniques - Encryption standards.
BTL-2
Practical component: Security analysis and reporting using Wireshark.
Suggested Readings: Cyber-attacks, countermeasures and protection schemes
MODULE 5: TESTING, DIGITAL FORENSICS AND NEXT GENERATION SECURITY (9L)
Cyber security testing – Penetration testing. System Level Solutions - Intrusion
Detection System (IDS) and Intrusion Protection System (IPS). Basic Concept of Ethical
Hacking. Protecting against Cyber Crime – Identity Theft, Cyber Stalking and CO-5
Investment fraud. BTL-2
Practical component: PenTest (Penetration Testing) using Wireshark.
Suggested Readings: Next-generation digital forensics
TEXT BOOKS
William Stallings, (2016)“Principle of Computer Security”, McGraw Hill Education, Fourth
1.
Edition
REFERENCE BOOKS
William, Stallings. (2018). Effective Cyber security: A Guide to Using Best Practices and
1
Standards, Addison - Wesley Professional Publishers, 1st Edition.
E BOOKS
1. https://bookauthority.org/books/best-network-security-ebooks
MOOC
1. https://www.coursera.org/specializations/computer-security-systems-management
2. https://www.coursera.org/specializations/computer-network-security
86
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
87
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
logger - Job Racketing - Marketing and Advertisement Rackets - Nigerian frauds- pay
per click scams – web defacement - ATM frauds - IP spoofing - email & ip address –
Software piracy - software license - commercial piracy.
Practical Component: Implementation of Steganography
Suggested Readings: Steganography
MODULE 2 – VIRTUAL LAB SET UP ( 6L+6P)
Installing VMware -Setting Up Kali Linux - Target Virtual Machines - Creating the
Windows XP Target - Setting Up the Ubuntu 8.10 Target - Creating the Windows 7
CO-2
Target.
BTL-3
Practical Component: Implementation of Symmetric and Asymmetric cryptography.
Suggested Readings: VMware, Kali Linux
MODULE 3 – KALI LINUX ( 6L+6P)
Linux Command Line - The Linux Filesystem - User Privileges - File Permissions - Editing
Files- Data Manipulation - Managing Installed Packages - Processes and Services -
Managing Networking - Netcat: The Swiss Army Knife of TCP/IP Connections -
CO-3
Automating Tasks.
BTL-3
Practical Component: Implementation of Windows security using firewall and other
tools
Suggested Readings: The Linux Filesystem, Netcat
MODULE 4– METASPLOIT FRAMEWORK ( 6L+6P)
Starting Metasploit - Finding Metasploit Modules - Setting Module Options - Payloads
- Types of Shells - Setting a Payload Manually - Msfcli - Creating Standalone Payloads
CO-4
with Msfvenom - Using an Auxiliary Module.
BTL-3
Practical Component: Implementation to identify web vulnerabilities
Suggested Readings: Metasploit, Msfcli
MODULE 5– MOBILE HACKING ( 6L+6P)
Mobile Attack Vectors - The Smartphone Pentest Framework - Remote Attacks - Client-
Side Attacks - Malicious Apps - Mobile Post Exploitation CO-5
Practical Component: Implementation of Mobile Audit and generate the report of the BTL-3
existing Artiacts Suggested Readings: Pentest Framework
TEXT BOOKS
1. Gautam Kumawat(2017), Ethical Hacking & Cyber Security Course: A Complete
Package, Udemy Course (First Unit)
2. Georgia Weidman(2014) , Penetration testing A Hands- On Introduction to Hacking, no
starch press II-V unit)
REFERENCE BOOKS
1. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies (2015), Security in
Computing, 5th Edition , Pearson Education .
E BOOKS
1 https://www.newhorizons.com/promotions/cybersecurity-ebooks
MOOC
1 https://www.udemy.com/course/hands-on-penetration-testing-labs-30/
88
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
89
CURRICULUM AND SYLLABUS B.C.A – COMPUTER APPLICATIONS
90