Page 1 of 5
Bachelor of Technology (Computer Science & Engineering)
Credit-Based Scheme of Studies/Examination
Semester VIII (w.e.f. session 2021-2022 )
S.
No
.
Course Code Subject L:T:P Hours/Week Credits Examination Schedule (Marks) Duratio
n of
Exam
(Hrs)
Major
Test
Minor
Test
Practical Total
1 PE Elective-VI 3:0:0 3 3 75 25 0 100 3
2 OE Open
Elective-III
2:0:0 2 2 75 25 0 100 3
3 OE Open
Elective-IV
2:0:0 2 2 75 25 0 100 3
4 PROJ-CS-
402A
Project-III 0:0:12 12 6 0 40 60 100 3
5 PE-LA Elective-VI
Lab
0:0:4 4 2 0 40 60 100 3
Total 23 15 225 155 120 500
The course of both PE & OE will be offered at 1/3rd strength or 20 students (whichever
is smaller) of the section.
PE Elective-VI
Cloud Computing: PE-CS-A402A
Computer Graphics: PE-CS-A404A
Software Reliability: PE-CS-A406A
Mobile Apps Development: PE-CS-A408A
OE Elective-III OE Elective-IV
Cyber Security: OE-CS-402A Web and Internet Technology: OE-CS-410A
Satellite Communication: OE-CS-404A Automation in Manufacturing: OE-CS-412A
Social Networks Analysis & Mining: OE-CS-
406A
IPR, Bioethics and Biosafety: OE-CS-414A
Agile Software Engineering: OE-CS-408A Signal & Systems: OE-CS-416A
Page 2 of 5
PE-CS-A402A Cloud Computing
Lecture Tutorial Practical Credit Major Test Minor Test Total Time
3 0 0 3 75 25 100 3 Hrs.
Purpose To familiar the concepts of cloud services and storage to deploy various resources and arbitrary
software.
Course Outcomes (CO)
CO1 Summarize main concepts, key technologies, strengths and limitations of Cloud Computing.
CO2 Explore various cloud service and deployment models to utilize different cloud services.
CO3 Interpret various data, scalability & cloud services in order to get efficient database for cloud storage.
CO4 To deal with various security threats and their controlling mechanism for accessing safe cloud
services.
Unit-I
Overview of Computing Paradigm: Recent trends in Computing, Grid Computing, Cluster
Computing, Distributed Computing, Utility Computing, Cloud Computing, evolution of cloud
computing, Business driver for adopting cloud computing. Cloud Computing (NIST Model): History
of Cloud Computing, Cloud service providers, Properties, Characteristics & Disadvantages, Pros and
Cons of Cloud Computing, Benefits of Cloud Computing, Cloud computing vs. Cluster computing vs.
Grid computing, Role of Open Standards.
Unit-II
Cloud Computing Architecture: Cloud computing stack, Comparison with traditional computing
architecture (client/server), Services provided at various levels, How Cloud Computing Works, Role
of Networks in Cloud computing, protocols used, Role of Web services, Service Models (XaaS) -
Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS),
Deployment Models- Public cloud, Private cloud, Hybrid cloud, Community cloud, Cloud
Architecture and open source.
Unit-III
Service Management in Cloud Computing: Service Level Agreements (SLAs), Billing & Accounting,
comparing Scaling Hardware: Traditional vs. Cloud, Economics of scaling: Benefitting enormously,
Managing Data- Looking at Data, Scalability & Cloud Services, Database & Data Stores in Cloud,
Large Scale Data Processing, Cloud management with Puppet.
Case study: Eucalyptus, Microsoft Azure, Amazon EC2.
Unit-IV
Cloud Security: Infrastructure Security, Network level security, Host level security, Application level
security, Data security and Storage, Data privacy and security Issues, Jurisdictional issues raised by
Data location, Identity & Access Management, Access Control, Trust, Reputation, Risk,
Authentication in cloud computing, Client access in cloud, Cloud contracting Model, Commercial and
business considerations, DROPS: Division and Replication of data in Cloud for Optimal Performance
and Security.
Suggested Books: Barrie Sosinsky, Cloud Computing Bible, Wiley-India, 2010. | Rajkumar Buyya,
James Broberg, Andrzej M. Goscinski,Cloud Computing: Principles and Paradigms, Wiley, 2011. |
Nikos Antonopoulos, Lee Gillam, Cloud Computing: Principles, Systems and Applications,
Springer, 2012. | Ronald L. Krutz, Russell Dean Vines, Cloud Security: A Comprehensive Guide to
Secure Cloud Computing, Wiley-India, 2010.
Page 3 of 5
PE-CS-A406A Web and Internet Technology
Lecture Tutorial Practical Credit Major Test Minor Test Total Time
3 0 0 3 75 25 100 3 Hrs.
Purpose To gain a broad understanding of the discipline of Web engineering and its application to the
development and management of Web Applications.
Course Outcomes (CO)
CO1 Learn the basic concepts of internet and its conncetivity.
CO2 Learn about the services of internet, designing and its architecture.
CO3 Understand the basic concepts of Python and its applications as per information industry standards.
CO4 Acquaint the latest programming language for the implementation of object based and procedure
based applications using Python.
Unit I
Intenet, growth of internet, owners of the internet, anatomy of internet, ARPANET and internet
history of the worls wide web, basic internt terminology, internet applications-commerce on the
internet, governance on the internet, impact of internet on society- crime on/through the internet, the
role of information architect, collaboration and communication. Organizing information, Organizing
web sites and Intranets, Creating cohesive organization systems, designing navigation systems, types
of navigation systems, Integrated navigation elements, designing navigation systems, Searching
systems, Searching your web site, designing the search interface.
Unit II
Setting up a connection: Hardware requirement, selection of a modem, software requirement, modem
configuration, common terminologies: Node, Host, Workstation, bandwidth, interoperability, network
administrator, netwotk security, network components: servers, clients, communication medis, service
options- email, News firewall etc.
Introduction to XHTML and HTML5: Origins and Evolution of HTML and XHTML, Basic
Syntax, Standard XHTML Document Structure, Basic Text Markup, Images, Hypertext Links, Lists,
Tables, Forms, HTML5, Syntactic Differences between HTML and XHTML.
Cascading Style Sheets: Introduction, Levels of Style Sheets, Style Specification Formats, Selector
Forms, Property Value Forms, Font Properties, List Properties, Color, Alignment of Text, Box Model,
Background Images
Unit III
Introduction to Python: Applications of python in information industry, Introduction to Python,
Data Types, branching programs, control structures, array and input, iteration.
Functions and scoping: Functions and scoping, recursion and global variables. Creation, insertion and
deletion of items: strings, tuples, lists and dictionaries.
Unit IV
Classes and objects-oriented programming: Abstract data types and classes, inheritance, encapsulation
and information hiding. File handling, exception handling, database (MySQLdb) operation: file check,
table creation, insertion and deletion of data, regular expressions-Res in Python and plotting.
Suggested Books: By Peter Morville, Louis Rosenfeld, “Information Architecture on the World Wide
Web”, O'Reilly Media, 2006. | Robert W. Sebesta, “Programming The World Wide Web”, Eight
Edition, Pearson India, 2015. | Kenneth A. Lambert, “The Fundamentals of Python: First Programs”,
2011, Cengage Learning. | Thomas A Powell, “HTML The Complete Reference”, Tata McGraw Hill
Publications.
Page 4 of 5
PE—CS-
A402AL
Cloud Computing Lab
Lecture TutorialPractical Credit Minor Test Practical Total Time
- - 4 2 40 60 100 3hrs
Purpose Design and Implement various mobile applications using emulators and
learn how to Deploy applications to hand-held devices.
Course Outcomes(CO)
CO1 Know the components and structure of mobile application development
frameworks for Android based mobiles.
CO2 Understand how to work with various mobile application development
frameworks.
CO3 Learn the basic and important design concepts and issues of development
of mobile applications.
CO4 Understand the capabilities of mobile devices.
List of Practicals
1. Write a program to use the API's of Hadoop to interact with it.
2. Install a C compiler in the virtual machine created using virtual box and execute
Simple Programs
3. Install Google App Engine. Create hello world app and other simple web applications
using python/java.
4. Use GAE launcher to launch the web applications.
5. Show the virtual machine migration based on the certain condition from one node to
the other.
6. Write a word count program to demonstrate the use of Map and Reduce tasks.
7. Find procedure to set up the one node Hadoop cluster and run simple applications like
word count.
Page 5 of 5
OE-CS-402A Cyber Security
Lecture Tutorial Practical Credit MajorTest MinorTest Total Time
2 0 0 2 75 25 100 3 Hour
Purpose To gain a broad understanding in order to get predictive ways out related to cyber security.
Course Outcomes
CO 1 To facilitate the basic knowledge of cyber security.
CO 2 To explore and sort issues related to different types of activities in cyber crime.
CO 3 To get enable to fix the various cyber attacks.
CO 4 To deal with the digital forensics and related scenarios of cyber crimes.
Unit-I
Introduction: Fundamentals of Cyber Crime, Nature and Scope of Cyber Crime, Types of Cyber
Crime: crime against individual, Crime against property, Cyber extortion, Drug trafficking, cyber
terrorism.
Cryptanalysis-steganography, stream and block ciphers, modern block ciphers: Block cipher
principles, Shannon’s theory of confusion and diffusion, fiestal structure, Data Encryption Standard
(DES), strength of DES, differential and linear crypt analysis of DES, block cipher modes of
operations, triple DES-AES
Unit-II
Integrity checks and authentication algorithms MD5 message digest algorithm, Secure Hash
Algorithm (SHA), Digital Signatures, authentication protocols, digital signature standards (DSS),
proof of digital signature algorithm, authentication application, Kerberos and X.509, directory
authentication service, electronic mail security, pretty good privacy (PGP), S/MIME.
Unit-III
Introduction to cyber attacks: passive attacks, active attacks, Cyber crime prevention methods,
Application security (Database, E-mail and Internet), Data Security Considerations-Backups, Archival
Storage and Disposal of Data, Security Technology-Firewall and VPNs, Intrusion Detection, Access
Control,Hardware protection mechanisms, OS Security.
Web Security: Secure socket layer and transport layer security-secure electronic transaction (SET)-
system security: Intruders-Viruses and related threats, firewall design principles, trusted systems.
Unit-IV
Digital Forensics: Introduction to Digital Forensics, historical background of digital forensics,
Forensic Software and Hardware, need for computer forensics science, special tools and techniques
digital forensic life cycle, challenges in digital forensic.
Law Perspective: Introduction to the Legal Perspectives of Cybercrimes and Cyber security,
Cybercrime and the Legal Landscape around the World, Why Do We Need Cyber laws, The Indian IT
Act, Cybercrime Scenario in India, Digital Signatures and the Indian IT Act, Cybercrime and
Punishment.
IP Security: Architecture-Authentication header-Encapsulating security payloads, combining security
associations, key management.
Suggested Books: Nelson Phillips and Enfinger Steuart, “Computer Forensics and Investigations”,
Cengage Learning, New Delhi, 2009. | Robert M Slade,” Software Forensics”, Tata McGraw - Hill,
New Delhi, 2005. | Sunit Belapure and Nina Godbole, “Cyber Security: Understanding Cyber Crimes,
Computer Forensics and Legal Perspectives”, Wiley India Pvt. Ltd.

More Related Content

PDF
Design of an IT Capstone Subject - Cloud Robotics
PDF
FiCloud2016 lov4iot second life ontology
PDF
Risk Management of Secure Cloud in Higher Educational Institution
PDF
Fi cloudpresentationgyrardaugust2015 v2
PDF
Multimedia Communications Lab (KOM) - TU Darmstadt - Research Overview
PDF
A computational scientist's wish list for tomorrow's computing systems
PPTX
Building a Computer Science Pathway for Endorsements
PDF
Teaching and practicing the students‘ knowledge using games
Design of an IT Capstone Subject - Cloud Robotics
FiCloud2016 lov4iot second life ontology
Risk Management of Secure Cloud in Higher Educational Institution
Fi cloudpresentationgyrardaugust2015 v2
Multimedia Communications Lab (KOM) - TU Darmstadt - Research Overview
A computational scientist's wish list for tomorrow's computing systems
Building a Computer Science Pathway for Endorsements
Teaching and practicing the students‘ knowledge using games

Similar to CSE NEW_4th yr w.e.f. 2018-19.pdf (20)

PDF
3rd Year IT Syllabus.pdf
PDF
Open elective iii & iv list 2021 22
PDF
Semester V-converted.pdf
PDF
Design of an IT Capstone Subject - Cloud Robotics
PDF
Seminar VU Amsterdam 2015
PDF
8th semester syllabus b sc csit-pawan kafle
DOCX
Advance diploma in it
DOCX
MGU SYLLABUS MANUAL-Advance diploma in computer applications
PDF
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENT
PDF
IRJET- Advanced Cloud in E-Libraries
PDF
mca-5thSem-curriculum-and-Syllabus-2017-Batch.pdf
PDF
Final teit syllabus_2012_course_04.06.2014
PDF
Cloud Computing of the college .pdf
PDF
Bachelor in-computer-application
PPT
Rahul internet of things
PDF
Vii cse grading
PDF
New Frontiers In Information And Software As Services Service And Application...
PDF
Artificial intelligence engineer course
DOCX
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docx
DOCX
COMP1609 (202223)Network and Internet Technologyand DesignF.docx
3rd Year IT Syllabus.pdf
Open elective iii & iv list 2021 22
Semester V-converted.pdf
Design of an IT Capstone Subject - Cloud Robotics
Seminar VU Amsterdam 2015
8th semester syllabus b sc csit-pawan kafle
Advance diploma in it
MGU SYLLABUS MANUAL-Advance diploma in computer applications
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENT
IRJET- Advanced Cloud in E-Libraries
mca-5thSem-curriculum-and-Syllabus-2017-Batch.pdf
Final teit syllabus_2012_course_04.06.2014
Cloud Computing of the college .pdf
Bachelor in-computer-application
Rahul internet of things
Vii cse grading
New Frontiers In Information And Software As Services Service And Application...
Artificial intelligence engineer course
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docx
COMP1609 (202223)Network and Internet Technologyand DesignF.docx
Ad

Recently uploaded (20)

PPTX
Petroleum Refining & Petrochemicals.pptx
PPTX
Amdahl’s law is explained in the above power point presentations
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PPTX
mechattonicsand iotwith sensor and actuator
PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
Principal presentation for NAAC (1).pptx
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
PPT
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Feature types and data preprocessing steps
PPTX
Software Engineering and software moduleing
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PPTX
Building constraction Conveyance of water.pptx
PDF
Implantable Drug Delivery System_NDDS_BPHARMACY__SEM VII_PCI .pdf
PDF
Computer System Architecture 3rd Edition-M Morris Mano.pdf
PDF
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
Petroleum Refining & Petrochemicals.pptx
Amdahl’s law is explained in the above power point presentations
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
August 2025 - Top 10 Read Articles in Network Security & Its Applications
August -2025_Top10 Read_Articles_ijait.pdf
20250617 - IR - Global Guide for HR - 51 pages.pdf
mechattonicsand iotwith sensor and actuator
Abrasive, erosive and cavitation wear.pdf
Principal presentation for NAAC (1).pptx
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Feature types and data preprocessing steps
Software Engineering and software moduleing
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
Building constraction Conveyance of water.pptx
Implantable Drug Delivery System_NDDS_BPHARMACY__SEM VII_PCI .pdf
Computer System Architecture 3rd Edition-M Morris Mano.pdf
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
Ad

CSE NEW_4th yr w.e.f. 2018-19.pdf

  • 1. Page 1 of 5 Bachelor of Technology (Computer Science & Engineering) Credit-Based Scheme of Studies/Examination Semester VIII (w.e.f. session 2021-2022 ) S. No . Course Code Subject L:T:P Hours/Week Credits Examination Schedule (Marks) Duratio n of Exam (Hrs) Major Test Minor Test Practical Total 1 PE Elective-VI 3:0:0 3 3 75 25 0 100 3 2 OE Open Elective-III 2:0:0 2 2 75 25 0 100 3 3 OE Open Elective-IV 2:0:0 2 2 75 25 0 100 3 4 PROJ-CS- 402A Project-III 0:0:12 12 6 0 40 60 100 3 5 PE-LA Elective-VI Lab 0:0:4 4 2 0 40 60 100 3 Total 23 15 225 155 120 500 The course of both PE & OE will be offered at 1/3rd strength or 20 students (whichever is smaller) of the section. PE Elective-VI Cloud Computing: PE-CS-A402A Computer Graphics: PE-CS-A404A Software Reliability: PE-CS-A406A Mobile Apps Development: PE-CS-A408A OE Elective-III OE Elective-IV Cyber Security: OE-CS-402A Web and Internet Technology: OE-CS-410A Satellite Communication: OE-CS-404A Automation in Manufacturing: OE-CS-412A Social Networks Analysis & Mining: OE-CS- 406A IPR, Bioethics and Biosafety: OE-CS-414A Agile Software Engineering: OE-CS-408A Signal & Systems: OE-CS-416A
  • 2. Page 2 of 5 PE-CS-A402A Cloud Computing Lecture Tutorial Practical Credit Major Test Minor Test Total Time 3 0 0 3 75 25 100 3 Hrs. Purpose To familiar the concepts of cloud services and storage to deploy various resources and arbitrary software. Course Outcomes (CO) CO1 Summarize main concepts, key technologies, strengths and limitations of Cloud Computing. CO2 Explore various cloud service and deployment models to utilize different cloud services. CO3 Interpret various data, scalability & cloud services in order to get efficient database for cloud storage. CO4 To deal with various security threats and their controlling mechanism for accessing safe cloud services. Unit-I Overview of Computing Paradigm: Recent trends in Computing, Grid Computing, Cluster Computing, Distributed Computing, Utility Computing, Cloud Computing, evolution of cloud computing, Business driver for adopting cloud computing. Cloud Computing (NIST Model): History of Cloud Computing, Cloud service providers, Properties, Characteristics & Disadvantages, Pros and Cons of Cloud Computing, Benefits of Cloud Computing, Cloud computing vs. Cluster computing vs. Grid computing, Role of Open Standards. Unit-II Cloud Computing Architecture: Cloud computing stack, Comparison with traditional computing architecture (client/server), Services provided at various levels, How Cloud Computing Works, Role of Networks in Cloud computing, protocols used, Role of Web services, Service Models (XaaS) - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Deployment Models- Public cloud, Private cloud, Hybrid cloud, Community cloud, Cloud Architecture and open source. Unit-III Service Management in Cloud Computing: Service Level Agreements (SLAs), Billing & Accounting, comparing Scaling Hardware: Traditional vs. Cloud, Economics of scaling: Benefitting enormously, Managing Data- Looking at Data, Scalability & Cloud Services, Database & Data Stores in Cloud, Large Scale Data Processing, Cloud management with Puppet. Case study: Eucalyptus, Microsoft Azure, Amazon EC2. Unit-IV Cloud Security: Infrastructure Security, Network level security, Host level security, Application level security, Data security and Storage, Data privacy and security Issues, Jurisdictional issues raised by Data location, Identity & Access Management, Access Control, Trust, Reputation, Risk, Authentication in cloud computing, Client access in cloud, Cloud contracting Model, Commercial and business considerations, DROPS: Division and Replication of data in Cloud for Optimal Performance and Security. Suggested Books: Barrie Sosinsky, Cloud Computing Bible, Wiley-India, 2010. | Rajkumar Buyya, James Broberg, Andrzej M. Goscinski,Cloud Computing: Principles and Paradigms, Wiley, 2011. | Nikos Antonopoulos, Lee Gillam, Cloud Computing: Principles, Systems and Applications, Springer, 2012. | Ronald L. Krutz, Russell Dean Vines, Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Wiley-India, 2010.
  • 3. Page 3 of 5 PE-CS-A406A Web and Internet Technology Lecture Tutorial Practical Credit Major Test Minor Test Total Time 3 0 0 3 75 25 100 3 Hrs. Purpose To gain a broad understanding of the discipline of Web engineering and its application to the development and management of Web Applications. Course Outcomes (CO) CO1 Learn the basic concepts of internet and its conncetivity. CO2 Learn about the services of internet, designing and its architecture. CO3 Understand the basic concepts of Python and its applications as per information industry standards. CO4 Acquaint the latest programming language for the implementation of object based and procedure based applications using Python. Unit I Intenet, growth of internet, owners of the internet, anatomy of internet, ARPANET and internet history of the worls wide web, basic internt terminology, internet applications-commerce on the internet, governance on the internet, impact of internet on society- crime on/through the internet, the role of information architect, collaboration and communication. Organizing information, Organizing web sites and Intranets, Creating cohesive organization systems, designing navigation systems, types of navigation systems, Integrated navigation elements, designing navigation systems, Searching systems, Searching your web site, designing the search interface. Unit II Setting up a connection: Hardware requirement, selection of a modem, software requirement, modem configuration, common terminologies: Node, Host, Workstation, bandwidth, interoperability, network administrator, netwotk security, network components: servers, clients, communication medis, service options- email, News firewall etc. Introduction to XHTML and HTML5: Origins and Evolution of HTML and XHTML, Basic Syntax, Standard XHTML Document Structure, Basic Text Markup, Images, Hypertext Links, Lists, Tables, Forms, HTML5, Syntactic Differences between HTML and XHTML. Cascading Style Sheets: Introduction, Levels of Style Sheets, Style Specification Formats, Selector Forms, Property Value Forms, Font Properties, List Properties, Color, Alignment of Text, Box Model, Background Images Unit III Introduction to Python: Applications of python in information industry, Introduction to Python, Data Types, branching programs, control structures, array and input, iteration. Functions and scoping: Functions and scoping, recursion and global variables. Creation, insertion and deletion of items: strings, tuples, lists and dictionaries. Unit IV Classes and objects-oriented programming: Abstract data types and classes, inheritance, encapsulation and information hiding. File handling, exception handling, database (MySQLdb) operation: file check, table creation, insertion and deletion of data, regular expressions-Res in Python and plotting. Suggested Books: By Peter Morville, Louis Rosenfeld, “Information Architecture on the World Wide Web”, O'Reilly Media, 2006. | Robert W. Sebesta, “Programming The World Wide Web”, Eight Edition, Pearson India, 2015. | Kenneth A. Lambert, “The Fundamentals of Python: First Programs”, 2011, Cengage Learning. | Thomas A Powell, “HTML The Complete Reference”, Tata McGraw Hill Publications.
  • 4. Page 4 of 5 PE—CS- A402AL Cloud Computing Lab Lecture TutorialPractical Credit Minor Test Practical Total Time - - 4 2 40 60 100 3hrs Purpose Design and Implement various mobile applications using emulators and learn how to Deploy applications to hand-held devices. Course Outcomes(CO) CO1 Know the components and structure of mobile application development frameworks for Android based mobiles. CO2 Understand how to work with various mobile application development frameworks. CO3 Learn the basic and important design concepts and issues of development of mobile applications. CO4 Understand the capabilities of mobile devices. List of Practicals 1. Write a program to use the API's of Hadoop to interact with it. 2. Install a C compiler in the virtual machine created using virtual box and execute Simple Programs 3. Install Google App Engine. Create hello world app and other simple web applications using python/java. 4. Use GAE launcher to launch the web applications. 5. Show the virtual machine migration based on the certain condition from one node to the other. 6. Write a word count program to demonstrate the use of Map and Reduce tasks. 7. Find procedure to set up the one node Hadoop cluster and run simple applications like word count.
  • 5. Page 5 of 5 OE-CS-402A Cyber Security Lecture Tutorial Practical Credit MajorTest MinorTest Total Time 2 0 0 2 75 25 100 3 Hour Purpose To gain a broad understanding in order to get predictive ways out related to cyber security. Course Outcomes CO 1 To facilitate the basic knowledge of cyber security. CO 2 To explore and sort issues related to different types of activities in cyber crime. CO 3 To get enable to fix the various cyber attacks. CO 4 To deal with the digital forensics and related scenarios of cyber crimes. Unit-I Introduction: Fundamentals of Cyber Crime, Nature and Scope of Cyber Crime, Types of Cyber Crime: crime against individual, Crime against property, Cyber extortion, Drug trafficking, cyber terrorism. Cryptanalysis-steganography, stream and block ciphers, modern block ciphers: Block cipher principles, Shannon’s theory of confusion and diffusion, fiestal structure, Data Encryption Standard (DES), strength of DES, differential and linear crypt analysis of DES, block cipher modes of operations, triple DES-AES Unit-II Integrity checks and authentication algorithms MD5 message digest algorithm, Secure Hash Algorithm (SHA), Digital Signatures, authentication protocols, digital signature standards (DSS), proof of digital signature algorithm, authentication application, Kerberos and X.509, directory authentication service, electronic mail security, pretty good privacy (PGP), S/MIME. Unit-III Introduction to cyber attacks: passive attacks, active attacks, Cyber crime prevention methods, Application security (Database, E-mail and Internet), Data Security Considerations-Backups, Archival Storage and Disposal of Data, Security Technology-Firewall and VPNs, Intrusion Detection, Access Control,Hardware protection mechanisms, OS Security. Web Security: Secure socket layer and transport layer security-secure electronic transaction (SET)- system security: Intruders-Viruses and related threats, firewall design principles, trusted systems. Unit-IV Digital Forensics: Introduction to Digital Forensics, historical background of digital forensics, Forensic Software and Hardware, need for computer forensics science, special tools and techniques digital forensic life cycle, challenges in digital forensic. Law Perspective: Introduction to the Legal Perspectives of Cybercrimes and Cyber security, Cybercrime and the Legal Landscape around the World, Why Do We Need Cyber laws, The Indian IT Act, Cybercrime Scenario in India, Digital Signatures and the Indian IT Act, Cybercrime and Punishment. IP Security: Architecture-Authentication header-Encapsulating security payloads, combining security associations, key management. Suggested Books: Nelson Phillips and Enfinger Steuart, “Computer Forensics and Investigations”, Cengage Learning, New Delhi, 2009. | Robert M Slade,” Software Forensics”, Tata McGraw - Hill, New Delhi, 2005. | Sunit Belapure and Nina Godbole, “Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives”, Wiley India Pvt. Ltd.