0% found this document useful (0 votes)
13 views12 pages

3IT

The document outlines the development of various software applications including a leave management system, project management dashboard, and an online survey application. It details course objectives and outcomes for software engineering, virtualization, and mobile applications development, emphasizing skills in software design, testing, and project management. Additionally, it includes practical exercises and suggested domains for mini-projects, along with references and mappings of course outcomes to program outcomes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views12 pages

3IT

The document outlines the development of various software applications including a leave management system, project management dashboard, and an online survey application. It details course objectives and outcomes for software engineering, virtualization, and mobile applications development, emphasizing skills in software design, testing, and project management. Additionally, it includes practical exercises and suggested domains for mini-projects, along with references and mappings of course outcomes to program outcomes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

6.

Develop a leave management system for an organization where users can apply different
types of leaves such as casual leave and medical leave. They also can view the available
number of days.
7. Develop a simple dashboard for project management where the statuses of various tasks
are available. New tasks can be added and the status of existing tasks can be changed
among Pending, InProgress or Completed.
8. Develop an online survey application where a collection of questions is available and users
are asked to answer any random 5 questions.
TOTAL: 60 PERIODS
COURSE OUTCOMES:
CO1: Design full stack applications with clear understanding of user interface, business
logic and data storage.
CO2: Design and develop user interface screens
CO3: Implement the functional requirements using appropriate tool
CO4: Design and develop database based on the requirements
CO5: Integrate all the necessary components of the application

CO’s-PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 1 3 1 1 1 2 1 1 1 2 2 1
2 3 3 3 2 3 1 1 1 2 1 1 1 2 2 1
3 3 3 3 3 3 1 1 1 2 1 1 1 2 2 1
4 3 3 3 3 3 2 1 1 1 1 2 1 1 2 1
5 3 3 3 3 2 1 1 1 1 1 1 1 2 2 1
AVg. 3 3 3 2 3 1 1 1 1 1 1 1 2 2 1
1 - low, 2 - medium, 3 - high, ‘-“- no correlation

CCS356 OBJECT ORIENTED SOFTWARE ENGINEERING LTPC


302 4
COURSE OBJECTIVES:
• To understand Software Engineering Lifecycle Models
• To Perform software requirements analysis
• To gain knowledge of the System Analysis and Design concepts using UML.
• To understand software testing and maintenance approaches
• To work on project management scheduling using DevOps

UNIT I SOFTWARE PROCESS AND AGILE DEVELOPMENT 9


Introduction to Software Engineering, Software Process, Perspective and Specialized Process
Models –Introduction to Agility-Agile process-Extreme programming-XP Process-Case Study.

UNIT II REQUIREMENTS ANALYSIS AND SPECIFICATION 9


Requirement analysis and specification – Requirements gathering and analysis – Software
Requirement Specification – Formal system specification – Finite State Machines – Petrinets –

100
Object modelling using UML – Use case Model – Class diagrams – Interaction diagrams – Activity
diagrams – State chart diagrams – Functional modelling – Data Flow Diagram- CASE TOOLS.

UNIT III SOFTWARE DESIGN 9


Software design – Design process – Design concepts – Coupling – Cohesion – Functional
independence – Design patterns – Model-view-controller – Publish-subscribe – Adapter –
Command – Strategy – Observer – Proxy – Facade – Architectural styles – Layered - Client
Server - Tiered - Pipe and filter- User interface design-Case Study.

UNIT IV SOFTWARE TESTING AND MAINTENANCE 9


Testing – Unit testing – Black box testing– White box testing – Integration and System testing–
Regression testing – Debugging - Program analysis – Symbolic execution – Model Checking-
Case Study

UNIT V PROJECT MANAGEMENT 9


Software Project Management- Software Configuration Management - Project Scheduling-
DevOps: Motivation-Cloud as a platform-Operations- Deployment Pipeline:Overall Architecture
Building and Testing-Deployment- Tools- Case Study

COURSE OUTCOMES:
CO1: Compare various Software Development Lifecycle Models
CO2: Evaluate project management approaches as well as cost and schedule estimation
strategies.
CO3: Perform formal analysis on specifications.
CO4: Use UML diagrams for analysis and design.
CO5: Architect and design using architectural styles and design patterns, and test the system

45 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
LIST OF EXPERIMENTS:
1. Identify a software system that needs to be developed.
2. Document the Software Requirements Specification (SRS) for the identified system.
3. Identify use cases and develop the Use Case model.
4. Identify the conceptual classes and develop a Domain Model and also derive a Class Diagram
from that.
5. Using the identified scenarios, find the interaction between objects and represent them using
UML Sequence and Collaboration Diagrams
6. Draw relevant State Chart and Activity Diagrams for the same system.
7. Implement the system as per the detailed design
8. Test the software system for all the scenarios identified as per the usecase diagram
9. Improve the reusability and maintainability of the software system by applying appropriate
design patterns.
10. Implement the modified system and test it for various scenarios.

SUGGESTED DOMAINS FOR MINI-PROJECT:


1. Passport automation system.
2. Book bank

101
3. Exam registration
4. Stock maintenance system.
5. Online course reservation system
6. Airline/Railway reservation system
7. Software personnel management system
8. Credit card processing
9. e-book management system
10. Recruitment system
11. Foreign trading system
12. Conference management system
13. BPO management system
14. Library management system
15. Student information system
TOTAL:75 PERIODS
TEXT BOOKS
1. Bernd Bruegge and Allen H. Dutoit, “Object-Oriented Software Engineering: Using UML,
Patterns and Java”, Third Edition, Pearson Education, 2009.
2. Roger S. Pressman, Object-Oriented Software Engineering: An Agile Unified Methodology,
First Edition, Mc Graw-Hill International Edition, 2014.

REFERENCES
1. Carlo Ghezzi, Mehdi Jazayeri, Dino Mandrioli, Fundamentals of Software Engineering, 2nd
edition, PHI Learning Pvt. Ltd., 2010.
2. Craig Larman, Applying UML and Patterns, 3rd ed, Pearson Education, 2005.
3. Len Bass, Ingo Weber and Liming Zhu, ―DevOps: A Software Architect‘s Perspective‖,
Pearson Education, 2016
4. Rajib Mall, Fundamentals of Software Engineering, 3rd edition, PHI Learning Pvt. Ltd.,
2009.
5. Stephen Schach, Object-Oriented and Classical Software Engineering, 8th ed, McGraw-
Hill, 2010.
CO’s-PO’s & PSO’s MAPPING
CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 1 2 2 - - - - 1 1 2 2 2 1
2 2 3 2 3 2 - - - 2 2 3 2 3 2 1
3 2 3 2 1 1 - - - 2 2 3 2 2 3 1
4 2 3 2 2 3 - - - 2 2 3 2 2 3 1
5 2 3 1 2 2 - - - - - - 1 3 2 2
AVg. 2 2 1 2 2 - - - - 1 1 2 2 2 1
1 - low, 2 - medium, 3 - high, ‘-“- no correlation

IT3681 MOBILE APPLICATIONS DEVELOPMENT LABORATORY L T P C


0 0 3 1.5
COURSE OBJECTIVES:
The objective of this course is to enable the students to

102
3. Krutz, R. L., Vines, R. D, “Cloud security. A Comprehensive Guide to Secure Cloud
Computing”, Wiley Publishing, 2010.
REFERENCES
1. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and
Processes”, Elsevier/Morgan Kaufmann, 2005.
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, “Cloud Security and Privacy: an
enterprise perspective on risks and compliance”, O’Reilly Media, Inc., 2009.

CO’s-PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 1 1 1 - - - 2 3 1 3 2 1 3
2 3 1 2 2 1 - - - 1 2 1 3 2 2 1
3 2 3 2 3 1 - - - 3 1 1 3 1 1 1
4 1 2 3 3 3 - - - 3 3 1 2 1 3 3
5 2 3 3 1 3 - - - 2 2 1 2 2 2 3
AVg. 2.2 2.2 2.2 2 1.8 - - - 2.2 2.2 1 2.6 1.6 1.8 2.2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

CCS372 VIRTUALIZATION LTPC


2 023
COURSE OBJECTIVES:
 To Learn the basics and types of Virtualization
 To understand the Hypervisors and its types
 To Explore the Virtualization Solutions
 To Experiment the virtualization platforms

UNIT I INTRODUCTION TO VIRTUALIZATION 7


Virtualization and cloud computing - Need of virtualization – cost, administration, fast deployment,
reduce infrastructure cost – limitations- Types of hardware virtualization: Full virtualization - partial
virtualization - Paravirtualization-Types of Hypervisors

UNIT II SERVER AND DESKTOP VIRTUALIZATION 6


Virtual machine basics- Types of virtual machines- Understanding Server Virtualization- types of
server virtualization- Business Cases for Server Virtualization – Uses of Virtual Server
Consolidation – Selecting Server Virtualization Platform-Desktop Virtualization-Types of Desktop
Virtualization

UNIT III NETWORK VIRTUALIZATION 6


Introduction to Network Virtualization-Advantages- Functions-Tools for Network Virtualization-
VLAN-WAN Architecture-WAN Virtualization

140
UNIT IV STORAGE VIRTUALIZATION 5
Memory Virtualization-Types of Storage Virtualization-Block, File-Address space Remapping-Risks
of Storage Virtualization-SAN-NAS-RAID

UNIT V VIRTUALIZATION TOOLS 6


VMWare-Amazon AWS-Microsoft HyperV- Oracle VM Virtual Box - IBM PowerVM- Google
Virtualization- Case study.
30 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
1.Create type 2 virtualization in VMWARE or any equivalent Open Source Tool. Allocate memory
and storage space as per requirement. Install Guest OS on that VMWARE.
2.
a.Shrink and extend virtual disk
b. Create, Manage, Configure and schedule snapshots
c. Create Spanned, Mirrored and Striped volume
d. Create RAID 5 volume
3.
a.Desktop Virtualization using VNC
b.Desktop Virtualization using Chrome Remote Desktop
4.Create type 2 virtualization on ESXI 6.5 server
5.Create a VLAN in CISCO packet tracer
6.Install KVM in Linux
7.Create Nested Virtual Machine(VM under another VM)

COURSE OUTCOMES:
CO1: Analyse the virtualization concepts and Hypervisor
CO2: Apply the Virtualization for real-world applications
CO3: Install & Configure the different VM platforms
CO4: Experiment with the VM with various software
TOTAL :60 PERIODS
TEXT BOOKS
1. Cloud computing a practical approach - Anthony T.Velte , Toby J. Velte Robert Elsenpeter,
TATA McGraw- Hill , New Delhi – 2010
2. Cloud Computing (Principles and Paradigms), Edited by Rajkumar Buyya, James Broberg,
Andrzej Goscinski, John Wiley & Sons, Inc. 2011
3. David Marshall, Wade A. Reynolds, Advanced Server Virtualization: VMware and Microsoft
Platform in the Virtual Data Center, Auerbach
4. Chris Wolf, Erick M. Halter, “Virtualization: From the Desktop to the Enterprise”, APress,
2005.
5. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and
Processes”, Elsevier/Morgan Kaufmann, 2005.
6. David Marshall, Wade A. Reynolds, “Advanced Server Virtualization: VMware and
Microsoft Platform in the Virtual Data Center”, Auerbach Publications, 2006.

CO’s-PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 1 3 1 3 2 - - - 1 1 3 1 2 3 2
141
2 3 2 2 1 2 - - - 1 2 2 3 3 2 1
3 3 2 1 3 1 - - - 2 2 1 3 3 3 2
4 1 1 2 3 3 - - - 3 3 1 1 3 2 2
5 1 3 2 3 1 - - - 2 1 3 3 1 1 2
AVg. 1.8 2.2 1.6 2.6 1.8 - - - 1.8 1.8 2 2.2 2.4 2.2 1.8
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

CCS341 DATA WAREHOUSING LTPC


2 023
COURSE OBJECTIVES:
 To know the details of data warehouse Architecture
 To understand the OLAP Technology
 To understand the partitioning strategy
 To differentiate various schema
 To understand the roles of process manager & system manager

UNIT I INTRODUCTION TO DATA WAREHOUSE 5


Data warehouse Introduction - Data warehouse components- operational database Vs data
warehouse – Data warehouse Architecture – Three-tier Data Warehouse Architecture -
Autonomous Data Warehouse- Autonomous Data Warehouse Vs Snowflake - Modern Data
Warehouse

UNIT II ETL AND OLAP TECHNOLOGY 6


What is ETL – ETL Vs ELT – Types of Data warehouses - Data warehouse Design and Modeling -
Delivery Process - Online Analytical Processing (OLAP) - Characteristics of OLAP - Online
Transaction Processing (OLTP) Vs OLAP - OLAP operations- Types of OLAP- ROLAP Vs
MOLAP Vs HOLAP.

UNIT III META DATA, DATA MART AND PARTITION STRATEGY 7


Meta Data – Categories of Metadata – Role of Metadata – Metadata Repository – Challenges for
Meta Management - Data Mart – Need of Data Mart- Cost Effective Data Mart- Designing Data
Marts- Cost of Data Marts- Partitioning Strategy – Vertical partition – Normalization – Row Splitting
– Horizontal Partition

UNIT IV DIMENSIONAL MODELING AND SCHEMA 6


Dimensional Modeling- Multi-Dimensional Data Modeling – Data Cube- Star Schema- Snowflake
schema- Star Vs Snowflake schema- Fact constellation Schema- Schema Definition - Process
Architecture- Types of Data Base Parallelism – Datawarehouse Tools

UNIT V SYSTEM & PROCESS MANAGERS 6


Data Warehousing System Managers: System Configuration Manager- System Scheduling
Manager - System Event Manager - System Database Manager - System Backup Recovery
Manager - Data Warehousing Process Managers: Load Manager – Warehouse Manager- Query
Manager – Tuning – Testing
30 PERIODS

142
UNIT I INTRODUCTION 8
Basics of cryptography, conventional and public-key cryptography, hash functions, authentication,
and digital signatures.

UNIT II KEY MANAGEMENT AND AUTHENTICATION 7


Key Management and Distribution: Symmetric Key Distribution, Distribution of Public Keys, X.509
Certificates, Public-Key Infrastructure. User Authentication: Remote User-Authentication
Principles, Remote User-Authentication Using Symmetric Encryption, Kerberos Systems, Remote
User Authentication Using Asymmetric Encryption.

UNIT III ACCESS CONTROL AND SECURITY 4


Network Access Control: Network Access Control, Extensible Authentication Protocol, IEEE
802.1X Port-Based Network Access Control - IP Security - Internet Key Exchange (IKE).
Transport-Level Security: Web Security Considerations, Secure Sockets Layer, Transport Layer
Security, HTTPS standard, Secure Shell (SSH) application.

UNIT IV APPLICATION LAYER SECURITY 5


Electronic Mail Security: Pretty Good Privacy, S/MIME, DomainKeys Identified Mail. Wireless
Network Security: Mobile Device Security

UNIT V SECURITY PRACTICES 6


Firewalls and Intrusion Detection Systems: Intrusion Detection Password Management, Firewall
Characteristics Types of Firewalls, Firewall Basing, Firewall Location and Configurations.
Blockchains, Cloud Security and IoT security
30 PERIODS
PRACTICALEXERCISES: 30 PERIODS
1. Implement symmetric key algorithms
2. Implement asymmetric key algorithms and key exchange algorithms
3. Implement digital signature schemes
4. Installation of Wire shark, tcpdump and observe data transferred in client-server
communication using UDP/TCP and identify the UDP/TCP datagram.
5. Check message integrity and confidentiality using SSL
6. Experiment Eavesdropping, Dictionary attacks, MITM attacks
7. Experiment with Sniff Traffic using ARP Poisoning
8. Demonstrate intrusion detection system using any tool.
9. Explore network monitoring tools
10. Study to configure Firewall, VPN

COURSE OUTCOMES:
At the end of this course, the students will be able:
CO1: Classify the encryption techniques
CO2: Illustrate the key management technique and authentication.
CO3 Evaluate the security techniques applied to network and transport layer
CO4: Discuss the application layer security standards.
CO5: Apply security practices for real time applications.
TOTAL:60 PERIODS

161
TEXT BOOKS:
1. Cryptography and Network Security: Principles and Practice, 6th Edition, William Stallings,
2014, Pearson, ISBN 13:9780133354690.

REFERENCES:

1. Network Security: Private Communications in a Public World, M. Speciner, R. Perlman, C.


Kaufman, Prentice Hall, 2002.
2. Linux iptables Pocket Reference, Gregor N. Purdy, O'Reilly, 2004, ISBN-13: 978-
0596005696.
3. Linux Firewalls, by Michael Rash, No Starch Press, October 2007, ISBN: 978-1-59327-
141-1.
4. Network Security, Firewalls And VPNs, J. Michael Stewart, Jones & Bartlett Learning,
2013, ISBN-10: 1284031675, ISBN-13: 978-1284031676.
5. The Network Security Test Lab: A Step-By-Step Guide, Michael Gregg, Dreamtech Press,
2015, ISBN-10:8126558148, ISBN-13: 978-8126558148.

CO’s-PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 2 2 - - - 2 1 2 1 2 3 1
2 1 1 3 2 2 - - - 2 2 1 1 3 1 2
3 1 2 1 1 2 - - - 3 3 1 3 2 1 3
4 2 2 3 2 3 - - - 3 3 2 1 2 1 3
5 2 1 3 2 2 - - - 2 1 1 3 2 1 1
AVg. 1.8 1.8 2.4 1.8 2.2 - - - 2.4 2 1.4 1.8 2.2 1.4 2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

CCS333 AUGMENTED REALITY/VIRTUAL REALITY L T P C


2 0 2 3
COURSE OBJECTIVES:
 To impart the fundamental aspects and principles of AR/VR technologies.
 To know the internals of the hardware and software components involved in the
development of AR/VR enabled applications.
 To learn about the graphical processing units and their architectures.
 To gain knowledge about AR/VR application development.
 To know the technologies involved in the development of AR/VR based applications.

UNIT I INTRODUCTION 7
Introduction to Virtual Reality and Augmented Reality – Definition – Introduction to Trajectories
and Hybrid Space-Three I’s of Virtual Reality – Virtual Reality Vs 3D Computer Graphics –
Benefits of Virtual Reality – Components of VR System – Introduction to AR-AR Technologies-
Input Devices – 3D Position Trackers – Types of Trackers – Navigation and Manipulation
Interfaces – Gesture Interfaces – Types of Gesture Input Devices – Output Devices – Graphics
Display – Human Visual System – Personal Graphics Displays – Large Volume Displays – Sound
Displays – Human Auditory System.

162
CCW332 DIGITAL MARKETING LTPC
202 3
COURSE OBJECTIVES:
 The primary objective of this module is to examine and explore the role and importance of
digital marketing in today’s rapidly changing business environment.
 It also focuses on how digital marketing can be utilized by organizations and how
its effectiveness can be measured.

UNIT I INTRODUCTION TO ONLINE MARKET 6


Online Market space- Digital Marketing Strategy- Components - Opportunities for building Brand
Website - Planning and Creation - Content Marketing.

UNIT II SEARCH ENGINE OPTIMISATION 6


Search Engine optimisation - Keyword Strategy- SEO Strategy - SEO success factors -On-Page
Techniques - Off-Page Techniques. Search Engine Marketing- How Search Engine works- SEM
components- PPC advertising -Display Advertisement

UNIT III E- MAIL MARKETING 6


E- Mail Marketing - Types of E- Mail Marketing - Email Automation - Lead Generation - Integrating
Email with Social Media and Mobile- Measuring and maximizing email campaign effectiveness.
Mobile Marketing- Mobile Inventory/channels- Location based; Context based; Coupons and
offers, Mobile Apps, Mobile Commerce, SMS Campaigns-Profiling and targeting

UNIT IV SOCIAL MEDIA MARKETING 6


Social Media Marketing - Social Media Channels- Leveraging Social media for brand
conversations and buzz. Successful /benchmark Social media campaigns. Engagement
Marketing- Building Customer relationships - Creating Loyalty drivers - Influencer Marketing.

UNIT V DIGITAL TRANSFORMATION 6


Digital Transformation & Channel Attribution- Analytics- Ad-words, Email, Mobile, Social Media,
Web Analytics - Changing your strategy based on analysis- Recent trends in Digital marketing.
30 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
1. Subscribe to a weekly/quarterly newsletter and analyze how its content and structure aid
with the branding of the company and how it aids its potential customer segments.
2. Perform keyword search for a skincare hospital website based on search volume and
competition using Google keyword planner tool.
3. Demonstrate how to use the Google WebMasters Indexing API
4. Discuss an interesting case study regarding how an insurance company manages leads.
5. Discuss negative and positive impacts and ethical implications of using social media for
political advertising.
6. Discuss how Predictive analytics is impacting marketing automation

COURSE OUTCOMES:
CO1: To examine and explore the role and importance of digital marketing in today’s
rapidly changing business environment..
CO2: To focuses on how digital marketing can be utilized by organizations and how its
effectiveness can be measured.
169
CO3: To know the key elements of a digital marketing strategy.
CO4: To study how the effectiveness of a digital marketing campaign can be measured
CO5: To demonstrate advanced practical skills in common digital marketing tools such as SEO,
SEM, Social media and Blogs.
TOTAL:60 PERIODS
TEXT BOOKS
1. Fundamentals of Digital Marketing by Puneet Singh Bhatia;Publisher: Pearson
Education;
2. First edition ( July 2017);ISBN-10: 933258737X;ISBN-13: 978-9332587373.
3. Digital Marketing by Vandana Ahuja ;Publisher: Oxford University Press ( April 2015).
ISBN-10: 0199455449
4. Marketing 4.0: Moving from Traditional to Digital by Philip Kotler;Publisher: Wiley; 1st
edition ( April 2017); ISBN10: 9788126566938;ISBN 13: 9788126566938;ASIN:
8126566930.
5. Ryan, D. (2014 ). Understanding Digital Marketing: Marketing Strategies for Engaging the
Digital Generation, Kogan Page Limited..
6. Barker, Barker, Bormann and Neher(2017), Social Media Marketing: A Strategic
Approach, 2E South-Western ,Cengage Learning.
7. Pulizzi,J Beginner's Guide to Digital Marketing , Mcgraw Hill Education

CO’s-PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 1 3 - - - 1 2 3 3 3 3 3
2 2 2 2 1 3 - - - 1 2 3 3 3 3 3
3 1 1 1 2 2 - - - 1 2 1 1 3 2 1
4 3 2 2 3 1 - - - 1 3 2 3 2 3 2
5 2 3 1 3 3 - - - 2 3 1 2 1 2 1
AVg. 2.2 2.2 1.6 2 2.4 - - - 1.2 2.4 2 2.4 2.4 2.6 2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

CCS373 VISUAL EFFECTS LTPC


2 023
COURSE OBJECTIVES
● To get a basic idea on animation principles and techniques
● To get exposure to CGI, color and light elements of VFX
● To have a better understanding of basic special effects techniques
● To have a knowledge of state of the art vfx techniques
● To become familiar with popular compositing techniques

UNIT I ANIMATION BASICS 6


VFX production pipeline, Principles of animation, Techniques: Keyframe, kinematics, Full
animation, limited animation, Rotoscoping, stop motion, object animation, pixilation, rigging,
shape keys, motion paths.

170
 To learn how to prevent a cyber attack.

UNIT I INTRODUCTION 6
Cyber Security – History of Internet – Impact of Internet – CIA Triad; Reason for Cyber Crime –
Need for Cyber Security – History of Cyber Crime; Cybercriminals – Classification of Cybercrimes
– A Global Perspective on Cyber Crimes; Cyber Laws – The Indian IT Act – Cybercrime and
Punishment.

UNIT II ATTACKS AND COUNTERMEASURES 6


OSWAP; Malicious Attack Threats and Vulnerabilities: Scope of Cyber-Attacks – Security Breach
– Types of Malicious Attacks – Malicious Software – Common Attack Vectors – Social engineering
Attack – Wireless Network Attack – Web Application Attack – Attack Tools – Countermeasures.

UNIT III RECONNAISSANCE 5


Harvester – Whois – Netcraft – Host – Extracting Information from DNS – Extracting Information
from E-mail Servers – Social Engineering Reconnaissance; Scanning – Port Scanning – Network
Scanning and Vulnerability Scanning – Scanning Methodology – Ping Sweer Techniques – Nmap
Command Switches – SYN – Stealth – XMAS – NULL – IDLE – FIN Scans – Banner Grabbing
and OS Finger printing Techniques.

UNIT IV INTRUSION DETECTION 5


Host -Based Intrusion Detection – Network -Based Intrusion Detection – Distributed or Hybrid
Intrusion Detection – Intrusion Detection Exchange Format – Honeypots – Example System Snort.

UNIT V INTRUSION PREVENTION 5


Firewalls and Intrusion Prevention Systems: Need for Firewalls – Firewall Characteristics and
Access Policy – Types of Firewalls – Firewall Basing – Firewall Location and Configurations –
Intrusion Prevention Systems – Example Unified Threat Management Products.
30 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
1. Install Kali Linux on Virtual box
2. Explore Kali Linux and bash scripting
3. Perform open source intelligence gathering using Netcraft, Whois Lookups, DNS
Reconnaissance, Harvester and Maltego
4. Understand the nmap command d and scan a target using nmap
5. Install metasploitable2 on the virtual box and search for unpatched vulnerabilities
6. Use Metasploit to exploit an unpatched vulnerability
7. Install Linus server on the virtual box and install ssh
8. Use Fail2banto scan log files and ban Ips that show the malicious signs
9. Launch brute-force attacks on the Linux server using Hydra.
10. Perform real-time network traffic analysis and data pocket logging using Snort

COURSE OUTCOMES:
On successful completion of this course, the student will be able to
CO1: Explain the basics of cyber security, cyber crime and cyber law (K2)
CO2: Classify various types of attacks and learn the tools to launch the attacks (K2)
CO3 Apply various tools to perform information gathering (K3)
CO4: Apply intrusion techniques to detect intrusion (K3)
178
CO5: Apply intrusion prevention techniques to prevent intrusion (K3)

TOTAL:60 PERIODS
TEXTBOOKS
1. Anand Shinde, “Introduction to Cyber Security Guide to the World of Cyber Security”,
Notion Press, 2021 (Unit 1)
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley Publishers, 2011 (Unit 1)
3. https://owasp.org/www-project-top-ten/

REFERENCES
1. David Kim, Michael G. Solomon, “Fundamentals of Information Systems Security”, Jones &
Bartlett Learning Publishers, 2013 (Unit 2)
2. Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and
Penetration Testing Made easy”, Elsevier, 2011 (Unit 3)
3. Kimberly Graves, “CEH Official Certified Ethical hacker Review Guide”, Wiley Publishers,
2007 (Unit 3)
4. William Stallings, Lawrie Brown, “Computer Security Principles and Practice”, Third Edition,
Pearson Education, 2015 (Units 4 and 5)
5. Georgia Weidman, “Penetration Testing: A Hands-On Introduction to Hacking”, No Starch
Press, 2014 (Lab)

CO’s- PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 1 1 1 1 - 1 - - - - 1 - 2 2 2
2 1 3 1 3 2 1 - - - - - - 2 2 1
3 2 1 1 1 - 1 - - - - 1 - 2 2 2
4 3 3 2 2 2 1 - - - - - - 2 2 3
5 3 2 1 1 1 1 - 1 - - 1 - 2 2 2
AVg. 2 2 1.2 1.6 1 1 0 0.2 0 0 0.6 0 2 2 2
1 - low, 2 - medium, 3 - high, ‘-“- no correlation

CCS359 QUANTUM COMPUTING LTPC


2 023
COURSE OBJECTIVES:
 To know the background of classical computing and quantum computing.
 To learn the fundamental concepts behind quantum computation.
 To study the details of quantum mechanics and its relation to Computer Science.
 To gain knowledge about the basic hardware and mathematical models of quantum
computation.
 To learn the basics of quantum information and the theory behind it.

UNIT I QUANTUM COMPUTING BASIC CONCEPTS 6


Complex Numbers - Linear Algebra - Matrices and Operators - Global Perspectives Postulates of
Quantum Mechanics – Quantum Bits - Representations of Qubits - Superpositions
179

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy