School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library,...

38
School of Computing Science and Engineering Department of Computer Science and Engineering Document Reference Revision No. / Date Prepared By Approved By SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018 B. Tech CSE (with Specialization in Cyber Security and Forensics) Semester – VII CIA: Continuous Internal Assessment L: Theory Lecture T: Tutorial P: Practical TH: Theory Exam. #: Internship for 15 days. *: Oral Examination UC: University Core PC: Programme Core PE: Programme Elective CIA Weightage Description CIA 1 10% Home Assignment CIA 2 20% Mid-Term Exam (MTE) CIA 3 10% Seminar Presentation CIA 4 10% Research Based Activity TOTAL 50% Open Elective II: 1. Cloud Computing and Virtualization(YCF O03) 2. Cyber Laws (YCFO04) 3. Introduction on Intellectual Property to Engineers and Technologists(YCFO05) Note: YCF714 - After 6 th Semester Maximum of Five weeks, Student must submit a report for the same. Sr. No. Core Course Code Course Name Teaching Scheme (Hrs./Week) Examination Scheme Total Marks L T P C Formative Assessment CIA Summative Assessment ESE Course Lab Course Lab 1 PC YCF701 Object Oriented Analysis and Design 3 -- -- 3 50 -- 50 -- 100 2 PC YCF702 Digital Forensics 3 -- -- 3 50 -- 50 -- 100 3 PC YCF703 Information Security Audit and Monitoring and management practices 3 -- -- 3 50 -- 50 -- 100 4 PC YCFO__ Open Elective II 3 -- -- 3 50 -- 50 -- 100 5 PC YCF711 Object Oriented Analysis and DesignLab -- -- 4 2 -- 25 -- 25 50 6 PC YCF712 Digital Forensics Lab -- -- 4 2 -- 25 -- 25 50 7 UC YCF713 Dissertation Stage I -- -- 8 4 -- 50 -- 50 100 8 UC YCF714 Industry Internship -- 2 -- 2 -- 50 -- -- 50 TOTAL 12 02 16 22 200 150 200 100 650

Transcript of School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library,...

Page 1: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

B. Tech CSE (with Specialization in Cyber Security and Forensics)

Semester – VII

CIA: Continuous Internal Assessment

L: Theory Lecture

T: Tutorial

P: Practical

TH: Theory Exam.

#: Internship for 15 days.

*: Oral Examination

UC: University Core

PC: Programme Core

PE: Programme Elective

CIA Weightage Description

CIA 1 10% Home Assignment

CIA 2 20% Mid-Term Exam (MTE)

CIA 3 10% Seminar Presentation

CIA 4 10% Research Based Activity

TOTAL 50%

Open Elective II:

1. Cloud Computing and Virtualization(YCF O03)

2. Cyber Laws (YCFO04)

3. Introduction on Intellectual Property to Engineers and Technologists(YCFO05)

Note: YCF714 - After 6

th Semester Maximum of Five weeks, Student must submit a report for the same.

Sr.

No. Core

Course

Code Course Name

Teaching Scheme

(Hrs./Week)

Examination Scheme

Total Marks

L T P C

Formative

Assessment

CIA

Summative

Assessment

ESE

Course Lab Course Lab

1 PC YCF701 Object Oriented Analysis and

Design 3 -- -- 3 50 -- 50 -- 100

2 PC YCF702 Digital Forensics 3 -- -- 3 50 -- 50 -- 100

3 PC YCF703

Information Security Audit and

Monitoring and management

practices

3 -- -- 3 50 -- 50 -- 100

4 PC YCFO__ Open Elective II 3 -- -- 3 50 -- 50 -- 100

5 PC YCF711 Object Oriented Analysis and

DesignLab -- -- 4 2 -- 25 -- 25 50

6 PC YCF712 Digital Forensics Lab -- -- 4 2 -- 25 -- 25 50

7 UC YCF713 Dissertation Stage I -- -- 8 4 -- 50 -- 50 100

8 UC YCF714 Industry Internship -- 2 -- 2 -- 50 -- -- 50

TOTAL 12 02 16 22 200 150 200 100 650

Page 2: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VII

Course: Object Oriented Analysis and Design Course Code: YCF701

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

3 - - 3 10 20 10 10 -- 50 -- 100

Max. Time, End Semester Exam (Theory) - 03 Hrs. End Semester Exam (Lab) – 00 Hrs.

Prerequisites:

Software Engineering

Objectives:

The course will enables students to:-

1 To Introduce various designing techniques and methods for object oriented

2 Performance analysis with real time system

3 Demonstrate a familiarity with object oriented data and system.

4 To give clear idea on implementing design with UML diagram like state diagram, activity

diagram, use case diagram etc.

Unit

No Details Hours

1

Module 1: Introduction, Object orientation, OODevelopment, OO themes,

Modeling as a design technique, Class Modeling. 4

Module 2:Abstraction, The three models, Object and classconcepts, Link and

association concepts, Generalization &Inheritance, Navigation of class models. 4

2

Module 1: Advanced object and class concepts, Association Ends, N-

aryassociation, Aggregation, Abstract classes, Multiple inheritance, 4

Module 2:Metadata, Reification, Constraints, Derived data, Packages,State

Modeling: Events, States, Transitions and Conditions, State diagrams, State

diagram behavior.

3

3

Module 1: Nested state diagram, Signal Generalization, Nested states,

Concurrency, Relation of class and state models, Use case model. 4

Module 2: Sequence models, Activity models, Use case relationships, Procedural

sequence model, Special constructs for activitymodels. 4

4

Module 1:Development stages, Development life cycle, Devising a

systemconcepts, Elaborating a concepts. 4

Module 2:, Preparing a problemstatements, Overview of analysis, Domain class

models, Domainstate model, Domain Interaction model. 3

5

Module 1:Overview of System Design, EstimatingPerformance, Making a reuse

plan, Breaking a system into subsystems, Identifying Concurrency, Allocation

ofsubsystems, Management of data storage, Handling globalresources, Choosing a

software control strategy.

4

Page 3: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Module 2:Handlingboundary conditions, Architectureof the ATM

system.Realizing the use cases, Designing algorithms recursing Downwards,

Refactoring, DesignOptimization, Reification of behavior, Organizing a class

design, ATM examples.

4

Outcomes:

On completion of the course, student will be able to–

1 Describe Object Oriented Analysis and Design concepts and apply them to solve problems

2 Prepare Object Oriented Analysis and Design documents for a given problem using Unified

Modeling Language

Text Books

Blaha ,Rumbaugh:”Object Oriented Modeling and Design with UML”(2/e) Pearson Education.

Reference Book

1. Dathan ,Ramnath : “Object Oriented Analysis, Design &Implementation,”OUP.

2. McRobb& Farmer: “Object Oriented System Analysis &Design”McGraw Hill.

3. 3Booch, Rumbaugh& Jacobson: “The UML User guide”PearsonEducation.

4. Whitten & Bentley: “System Analysis & Design Methods”TataMcGraw Hill.

5. Booch: “Object Oriented Analysis & Design with Applications”,Pearson Education.

6. Visual modeling with Rational Rose and UML by Terry Quatrani, by Addison-Wesley

Professional.

Page 4: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VII

Course: Digital Forensics Course Code: YCF702

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

3 - - 3 10 20 10 10 -- 50 -- 100

Max. Time, End Semester Exam (Theory) - 03 Hrs. End Semester Exam (Lab) – 00 Hrs.

Prerequisites:

Information Security, System Security

Objectives:

The course will enables students to:-

1 Demonstrate knowledge and comprehension ofbasic tools and techniques used in the field

of computer forensics sciences.

2 Demonstrate general knowledge and comprehension of digital forensic sciences as a

profession.

Unit

No Details Hours

1

Module 1: Computer Forensics Standard Procedure, Incident Verification, System identification, Recovery of

Erased and damaged data,

4

Module 2:Disk imaging and preservation, Data encryption and compression,

Automated search techniques,Forensic software 4

2

Module 1: Network Forensics and Internet Forensics Tracking network traffic, Reviewing Network Logs, Tools, Performing Live

Acquisitions, Order ofvolatility, Standard Procedure. Internet & World Wide Web

threats (Email, Chat-rooms, Search Engines,Hacking & illegal access, Obscene

and indecent transmission, Extortion & threats), Domain NameOwnership

Investigation, Reconstructing Past Internet Activities and Events, Email Forensics:

E-mailAnalysis, Email Forensics: Email Headers and Spoofing, Email Forensics:

Laws against Email Crime

4

Module 2:Messenger Forensics: AOL, Yahoo, MSN, and Chats, Browser

Forensics: Analyzing Cache and TemporaryInternet Files, Browser Forensics:

Cookie Storage and Analysis, Browser Forensics: Web BrowsingActivity

Reconstruction

3

3

Module 1: Forensic Investigation and Evidence Presentation, Legal aspects of

Digital Forensics Authorization to collect the evidence, Acquisition of evidence, Authentication of

the evidence, Analysisof the evidence, Reporting on the findings, Testimony.

4

Module 2:Laws & regulations - Information Technology Act,Giving evidence in

court 4

Page 5: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

4

Module 1:Memory Forensics, Mobile Forensics & Steganography Memory Data Collection and Examination, Extracting and Examining Processes.

Collecting and AnalyzingCell Phone, PDA, Blackberry, iPhone, iPod, iPad,and

MP3 Evidence, Analyzing CD, DVD, Tape Drives, USB,Flash Memory, and other

Storage Devices

4

Module 2:Digital Camera Forensics, Reconstructing Users Activities,Recovering

and Reconstructing Deleted Data. Steganography Tools and Tricks, Data Hiding,

DataRecovery.

3

5

Module 1: Malware Analysis Analyzing Live Windows System for Malware, Analyzing Live Linux System for

Malware, AnalyzingPhysical and Process Memory Dumps for Malware,

Discovering and Extracting Malware from WindowsSystems,

4

Module 2: Discovering and Extracting Malware from Linux Systems, Rootkits

and Rootkit Detection andRecovery, Reverse Engineering Tools and Techniques 4

Outcomes:

At the end of the course, the student will

1 Understand the different data recovery standards.

2 Gain an insight into various digital storage devices.

3 Develop an understanding of various sources of digital evidences.

4 Analyze how to perform auditing.

Text Books

1. Digital Forensics (IBM ICE Publication)

Reference Book

Page 6: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VII

Course: Information Security Governance, Audit, Monitoring

and Management Practices Course Code: YCF703

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

3 - - 3 10 20 10 10 -- 50 -- 100

Max. Time, End Semester Exam (Theory) - 03 Hrs. End Semester Exam (Lab) – 00 Hrs.

Prerequisites:

IT System Security, IT Application Security

Objectives:

The course will enables students to:-

1 Know different auditing methods

2 Various reporting techniques

3 Different tools and techniques available for information monitoring

4 Different tools and techniques available for information management

Unit

No Details Hours

1

Module 1: Accountability, Compliance, Audit Trails, Reporting timeline, Record

Retention, External Auditors. 4

Module 2: Laws Monitoring tools, Warning banner, Traffic analysis, Trend

analysis.. 4

2

Module 1: Customers and Legal Agreements, Rules of Engagement, Penetration

Testing Planning and Scheduling, Pre Penetration Testing Checklist, Information

Gathering, Vulnerability Analysis, External Penetration Testing, Internal Network

Penetration Testing, Penetration testing for Denial of Service, Password Cracking,

Social Engineering, Stolen Laptop, PDAs and Cell phones, Application, Physical

Security, Database, VoIP, VPN, War Dialing, Virus and Trojan Detection

4

Module 2:Log Management, File Integrity Checking,

Blue Tooth and Hand held Device, Telecommunication and Broadband

Communication, Email Security, Security Patches, Data Leakage, Penetration

Testing Deliverables and Conclusion, Penetration Testing Report and

Documentation Writing, Penetration Testing Report Analysis, Post Testing

Actions, Ethics of a Penetration Tester, Standards and Compliance.

Countermeasures.

3

3

Module 1: Information Security Governance, Tone at the Top, Tone at the Bottom,

Governance, Risk, and Compliance (GRC), the Compliance Dilemma.

Evolution of Information Security, Organization Historical Perspective,

4

Page 7: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Understand the External Environment, The Internal Company Culture, Prior

Security Incidents, Audits , Security Strategy Development Techniques, Security

Planning.

Module 2: History of the Security Leadership Role Is Relevant, The New Security

Officer, Mandate, Security Leader Titles, Techie versus Leader, The Security

Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven

Competencies for Effective Security Leadership, Security Functions, Reporting

Model.

4

4

Module 1: Communication between the CEO, CIO, Other Executives, and CISO,

Building Grassroots Support through an Information Security Council. Risk in Our

Daily Lives, Accepting Organizational Risk, Just Another Set of Risks,

Management Owns theRisk Decision, Qualitative versus Quantitative Risk

Analysis, Risk Management Process, Risk Mitigation Options.

4

Module 2:Why Information Security Policies Are Important, Avoiding Shelfware,

Electronic Policy Distribution, Canned Security Policies, Policies, Standards,

Guidelines Definitions, an Approach for Developing Information Security,

Policies, Utilizing the Security Council for Policies, the Policy Review Process.

3

5

Module 1 Security Control Convergence, Security Control Methodology, Security

Assessment and Authorization Controls, Planning Controls, Risk Assessment

Controls, System and Services Acquisition Controls, Program Management

Controls.Access Control Controls, Audit and Accountability, Controls,

Identification and Authentication, System and Communications Protections.

4

Module 2:Awareness and Training Controls, Configuration Management Controls,

Contingency Planning Controls, Incident Response Controls, Maintenance

Controls, Media Protection Controls, Physical and Environmental Protection

Controls, Personnel Security Controls, System and Information Integrity Controls.

4

Outcomes:

On completion of the course, student will be able to–

1 Knows Various reporting techniques

2 Understands different tools and techniques available for information monitoring

3 Understands different tools and techniques available for information management

Text Books

1. Professional Ethics: R. Subramanian, Oxford University Press, 2015.

2. Ethics in Engineering Practice & Research, Caroline Whit beck, 2e, Cambridge University Press

2015.

Reference Book

1. Engineering Ethics, Concepts Cases: Charles E Harris Jr., Michael S Pritchard, Michael J

Rabins, 4e, Cengagelearning, 2015.

2. Business Ethics concepts & Cases: Manuel G Velasquez, 6e, PHI, 2008.

Page 8: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VII

Course: Cloud Computing and Virtualization Course Code: YCFO03

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

3 -- -- 3 10 20 10 10 -- 50 -- 100

Max. Time, End Semester Exam (Theory) -3Hrs. End Semester Exam (Lab) - 00Hrs.

Prerequisites:

Computer Network, Operating System

Objectives:

Students are able to:-

1 Analyze the components of cloud computing showing how business agility in an

organization can be created

2 Evaluate the deployment of web services from cloud architecture

3 Critique the consistency of services deployed from a cloud architecture

4 Compare and contrast the economic benefits delivered by various cloud models based on

application requirements, economic constraints and business requirements.

5 Critically analyze case studies to derive the best practice model to apply

when developing and deploying cloud based application

Unit

No Details Hours

1

Module 1:CLOUD COMPUTING FUNDAMENTALS

Cloud Computing definition, private, public and hybrid cloud. Cloud types;

IaaS,PaaS, SaaS. Benefits and challenges of cloud computing, public vs private

clouds, role of virtualization in enabling the cloud; Business Agility: Benefits

and challenges to Cloud architecture.

4

Module 2:Application availability, performance, security and disaster recovery;

next generation Cloud Applications. 4

2

Module 1:MANAGEMENT OF CLOUD SERVICES

Reliability, availability and security of services deployed from the cloud.

Performance and scalability of services, tools and technologies used to manage

cloud services deployment; Cloud Economics : CloudComputing infrastructures

available for implementing cloud based services.

3

Module 2:Economics of choosing a Cloud platform for an organization, based

on application requirements, economic constraints and business needs (e.g

Amazon, Microsoft and Google, Salesforce.com, Ubuntu and Redhat)

3

3

Module 1:CLOUD IT MODEL

Analysis of Case Studies when deciding to adopt cloud computing architecture.

How to decide if the cloud is right for your requirements.

4

Page 9: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Module 2:Cloud based service,applications and development platform

deployment soas to improve the total costof ownership (TCO) 4

4

Module 1:VIRTUALIZED DATA CENTER ARCHITECTURE

Cloud infrastructures; public, private, hybrid. Service provider interfaces; Saas,

Paas, Iaas.

3

Module 2:VDC environments; concept, planning anddesign, business continuity

and disaster recovery principles. Managing VDC and cloud environments and

infrastructures.

3

5

Module 1:SECURITY CONCEPTS

Confidentiality, privacy, integrity, authentication, non-repudiation, availability,

access control, defence in depth, least privilege,how these concepts apply in the

cloud, what these concepts mean and their importance in PaaS, IaaS and SaaS.

e.g. User authentication in the cloud.

4

Module 2:Cryptographic Systems- Symmetric

cryptography, stream ciphers, block ciphers, modesof operation, public-key

cryptography, hashing, digital signatures

4

Outcomes:

After completion of course students will-

1 Explain the core concepts of the cloud computing paradigm: how and why this paradigm

shift came about, the characteristics, advantages and challenges brought about by the

various models and services in cloud computing.

2 Discuss system, network and storage virtualization and outline their role in enabling the

cloud computing system model.

3 Illustrate the fundamental concepts of cloud storage and demonstrate their use in storage

systems such as Amazon S3 and HDFS.

4 Analyze various cloud programming models and apply them to solve problems on the

cloud.

Text Books

1. GautamShroff, “Enterprise Cloud Computing Technology Architecture Applications”,

Cambridge University Press; 1 edition,[ISBN: 978-0521137355], 2010.

Reference Book

1. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical Approach”

McGraw-Hill Osborne Media; 1 edition [ISBN: 0071626948], 2009.

2. Dimitris N. Chorafas, “Cloud Computing Strategies”CRC Press; 1 edition [ISBN: 1439834539],

2010.

3. Tim Mather, SubraKumaraswamy, ShahedLatif, “Cloud Security and Privacy: An Enterprise

Perspective on Risks and Compliance”O'Reilly Media; 1 edition[ISBN: 0596802765],2009

4. Greg Schulz, “Cloud and Virtual Data Storage Networking”, Auerbach Publications [ISBN: 978-

1439851739], 2011.

Page 10: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VII

Course: Cyber Laws Course Code: YCFO04

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

3 -- -- 3 10 20 10 10 -- 50 -- 100

Max. Time, End Semester Exam (Theory) -3Hrs. End Semester Exam (Lab) - 2Hrs.

Prerequisites:

Digital Forensics

Objectives:

Students are able to:-

1 Understand various legal measures that can be taken against various cyber crimes.

2 Understand various types of illegal or punishable offenses that can be done through digital

media.

3 Understand punishments constituted in cyber laws related to various malpractices in digital

world.

Unit

No Details Hours

1

Module 1:Introduction to cyber law, Indian Judiciary system 3

Module 2:Digital Signature and Electronic Signature, Penalty and compensation for

damage to computer 4

2

Module 1:Tampering with computer source documents, punishment for sending offensive

messages through communication service. 3

Module 2:Punishment for dishonestly receiving stolen computer resources or

communication device. 5

3

Module 1: Identity theft, punishment for identity theft, punishment for cheating by

personation by using computer resources. 3

Module 2:Explanation of privacy, punishment for violation of privacy, punishment for

cyber terrorism. 4

4

Module 1:Punishment for publishing or transmitting obscene material in electronic form,

punishment for plagiarism. 4

Module 2:Punishment for publishing or transmitting of material

containing sexually explicit act 3

5

Module 1:Punishmentfor publishing or transmitting of material depicting children in

sexually explicitact 3

Module 2:Breach of confidentiality and privacy 4

Outcomes:

1 Students are able to distinguish between legal and illegal activities in cyber world.

2 Students are able to use digital signature to claim the originator’s identity for an electronic

Page 11: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

document.

3 Students are able to state various punishments related to plagiarism or illegal possession of

digital information.

4 Students will be driven away from performing any cyber crime.

Text Books

Cyber Laws Online Leaning Material

Reference Book

--

Page 12: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VII

Course: Introduction on Intellectual Properties to Course Code: YCFO05

Engineers and Technologists

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

3 -- -- 3 10 20 10 10 -- 50 -- 100

Max. Time, End Semester Exam (Theory) -3Hrs. End Semester Exam (Lab)

Prerequisites:

Cyber Laws

Objectives:

Students are able to:-

1 Understand basics of intellectual properties and copyrights.

2 Distinguish patentable and non-patentable inventions.

3 Understand industrial design basics and trademark basics.

4 Understand the infringement of copyright or trademark.

Unit

No Details Hours

1 Module 1: Basics of intellectual properties, introduction to law, theories of IP. 3

Module 2:Different forms of IP and application of thory. 4

2 Module 1:Patent Basics, Patent Ability criteria 4

Module 2:Non Patentable inventions, Prier art search, Patent filling procedure 4

3 Module 1: Patent Prosecution, International Patents 3

Module 2:Patent infringement, Patent management 4

4 Module 1:Utility module protection, copyright basics, copy right registration 4

Module 2:Copyright infringement and fair use, Copy right in digital media 4

5 Module 1:Industrial design basics, Industrial design registration 4

Module 2:Trademark basics, IC layout design 4

Outcomes:

1 Students are able to understand and use patent law and how patents are prosecuted and

enforced.

2 Students are able to comprehend complex intellectual property scenario.

3 Students are able to state criteria that determine infringement and law against it.

4 Students will be able to draft patent application.

5 Students will understand the importance of intellectual property laws in engineering and

related environment.

Text Books

Page 13: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

1. Fundamentals of IP for engineers: K. Bansal and P. Bansal

2. Intellectual Property Rights: Deborah, E. Bauchoux. Cengage Learning

Reference Book

Intellectual Property Right- Unleashing the knowledge economy: PrabuddhaGanguli, TMH Publ.

Page 14: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VII

Course: Object Oriented Analysis and DesignLab Course Code: YCF711

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

-- -- 4 2 -- -- -- -- 25 -- 25 50

Max. Time, End Semester Exam (Theory) -00 Hrs. End Semester Exam (Lab) – 03 Hrs.

Prerequisites:

Software Engineering

Objectives:

Students are able to:-

1 To Introduce various designing techniques and methods for object oriented

2 Performance analysis with real time system

3 Demonstrate a familiarity with object oriented data and system.

4 To give clear idea on implementing design with UML diagram like state diagram, activity

diagram, use case diagram etc.

Guidelines for Assessment

Continuous assessment of laboratory work is done based on overall performance and lab assignments

performance of student. Each lab assignment assessment will assign grade/marks based on parameters

with appropriate weightage. Suggested parameters for overall assessment as well as each lab assignment

assessment include- timely completion, performance, innovation, efficient codes, punctuality and

neatness.

Guidelines for Laboratory Conduction

The instructor is expected to frame the assignments by understanding the prerequisites, technological

aspects, utility and recent trends related to the topic. The assignment framing policy need to address the

average students and inclusive of an element to attract and promote the intelligent students. The

instructor may set multiple sets of assignments and distribute among batches of students. It is

appreciated if the assignments are based on real world problems/applications. Encourage students for

appropriate use of Hungarian notation, Indentation and comments. Use of open source software is

encouraged.

In addition to these, instructor may assign one real life application in the form of a mini-project based

on the concepts learned. Instructor may also set one assignment or mini-project that is suitable to

respective branch beyond the scope of syllabus.

Operating System recommended : 64-bit Open source Linux or its derivative

Programming tools recommended: Open Source C Programming tool like GCC

Suggested List of Laboratory Assignments

1. Study of Software Development Life Cycle

2. Study of Unified Modeling language and IBM Rational Rose.

Page 15: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

3. Design of Information Flow diagram for Hospital Management System.

4. Design of Use Case diagram for Hospital Management System.

5. Design of Activity diagram for Hospital Management System.

6. Design of Sequence diagram for Hospital Management System.

7. Design of Class diagram for Hospital Management System.

8. Design of State Chart diagram for Hospital Management System.

9. Design of a Mini Project using UML.

Page 16: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VII

Course:Digital ForensicsLab Course Code: YCF712

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

-- -- 4 2 -- -- -- -- 25 -- 25 50

Max. Time, End Semester Exam (Theory) -00 Hrs. End Semester Exam (Lab) – 03 Hrs.

Prerequisites:

Cyber forensics

Objectives:

Students are able to:-

1 Demonstrate knowledge and comprehension ofbasic tools and techniques used in the field

of computer forensics sciences.

2 Demonstrate general knowledge and comprehension of digital forensic sciences as a

profession.

Guidelines for Assessment

Continuous assessment of laboratory work is done based on overall performance and lab assignments

performance of student. Each lab assignment assessment will assign grade/marks based on parameters

with appropriate weightage. Suggested parameters for overall assessment as well as each lab assignment

assessment include- timely completion, performance, innovation, efficient codes, punctuality and

neatness.

Guidelines for Laboratory Conduction

The instructor is expected to frame the assignments by understanding the prerequisites, technological

aspects, utility and recent trends related to the topic. The assignment framing policy need to address the

average students and inclusive of an element to attract and promote the intelligent students. The

instructor may set multiple sets of assignments and distribute among batches of students. It is

appreciated if the assignments are based on real world problems/applications. Encourage students for

appropriate use of Hungarian notation, Indentation and comments. Use of open source software is

encouraged.

In addition to these, instructor may assign one real life application in the form of a mini-project based

on the concepts learned. Instructor may also set one assignment or mini-project that is suitable to

respective branch beyond the scope of syllabus.

Operating System recommended : 64-bit Open source Linux or its derivative

Programming tools recommended: Open Source C Programming tool like GCC

Suggested List of Laboratory Assignments

Group A (Compulsory Assignments)

1. Implementation of following spoofing assignments using C++ multicore Programming

a) IP Spoofing

Page 17: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

b) Web Spoofing

2. Write a computer forensic application program in Java/Python/C++ for Recovering Deleted Files

and Deleted Partitions.

3. Write a program in C++ /Python to analyze Email Header.

Group B (Any 7)

1. Develop a GUI and write a Java/Python/C++ program to monitor Network Forensics,

Investigating Logs and Investigating Network Traffic.

2. Write a program in Python for Investigating Wireless Attacks using Multicore

3. Programming

4. Create a Scenario and write a program for overcoming a Website hacking problems and

identifying hacker machine using Java/Python/C++. Develop a prototype website using Ruby on

rails.

5. Write a program in C++ for Tracking Emails and Investigating Email Crimes

6. Install and use Android Mobile Forensics Open Source Tools

7. Install and use an open source tool to Identifying MMS attacks, create necessary Scenario

8. Write a program to identifying private data acquisition of digital evidence using Java in a WiFi

system, use SAN storage(BIGDATA)

9. Write a program to Implement a fingerprint recognition using Java Programming

10. Write a program for identifying the image tampering, voice data

(recorded/Blogged/twitted/Social Web Sites) tampering Python Programming. use SAN

storage(BIGDATA)

11. Write a program for Identifying the tampering of digital signature using Python

12. Write a C++/Java program for Log Capturing and Event Correlation

Group C (Any 1)

1. Implementation of Steganography program

2. Implement a program to generate and verify CAPTCHA image

3. Intrusion Detection System

4. Write a program to detect and prevent windows 8 registry Hacks and Tricks

Page 18: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VII

Course: Dissertation Stage I Course Code: YCF713

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

-- -- 8 4 -- -- -- -- 50 -- 50 100

Max. Time, End Semester Exam (Theory) -00 Hrs. End Semester Exam (Lab) – 03 Hrs.

Objectives:

Students are able to:-

1 To develop problem solving abilities using mathematics;

2 To apply algorithmic strategies while solving problems;

3 To develop time and space efficient algorithms;

4 To develop software engineering documents and testing plans;

5 To use algorithmic solutions using distributed, Embedded, concurrent and parallel environments.

Unit

No Details Hours

1

Course (catalog) description: As a part of the B. Tech Curriculum, Dissertation

Stage- I is a Practical course, in which the students of CSE are trained for

project based learning.

Proposed Criteria for Dissertation Evaluation

I suggest the following 9 aspects of every project and presentation. Every item is

worth 10 points out of total 90.

For each of the items I give several key words explaining my understanding of the

item. This grading scheme is only a proposal and is open for any input, discussion

and final approval by members of the seminar. As the evaluation procedure I

suggest for each project and each of the first 8 items to assign a base group to

evaluate it.

Content: (1) Topic: Is the topic chosen interesting, useful, worth researching?

(2) Thesis: Are the theses of the project identifiable, plausible, insightful, and

clear?

(3) Evidence / Sources: Are the sources of information used primary, sufficient,

and relevant? Is evidence clearly related to claims?

(4) Analysis / Logic / Argumentation: Is analysis fresh, posing new ways to think

of the material? Are Ideas represented logically? Is the argument identifiable,

reasonable, and sound? Do authors anticipate and defuse counter-argument?

Presentation: (5) Structure: Is the structure evident, understandable, and appropriate? Is

Page 19: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

transition from point to point smooth?

(6) Slides / transparencies: Are slides well designed (not too busy, right font)?

Are graphic and visual appropriate? Any spelling, grammar, word use slips?

(7) Timing: Is presentation timed properly, rehearsed?

(8) Style: Is the level of treatment appropriate (not too detailed or too general)?

Is the presentation energetic, enthusiastic, and clear? Is the volume good?

(9) Extra points for excellence

Tools Required: Preferably 64-bit FOSS tools but if sponsoring company’s requirement is non-open

sourceplatform then it must be latest and current version of non-absolute tools. 64-

bit i5/i7Desktops/Mobiles, Latest SAN,3-tier architectures along with latest

version of FOSS Operating systems like Fedora 21or equivalent, LAMP tools,

WEB server, Applications servers, Database servers, MongoDBor latest open

source BigDATA tools, FOSS Programming Tools like gcc,g++,Eclipse,Python,

Java and other tools are as per the requirement of the SRS. The

documentationtools like Open office, GIT, Latex, Latex-Presentation

Outcomes:

On completion of the course, student will be able to–

1 An ability to work in actual working environment.

2 An ability to utilize technical resources.

3 An ability to write technical documents and give oral presentations related to the work

completed.

Page 20: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VII

Course: Industry Internship Course Code: YCF714

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

-- 2 -- 2 -- -- -- -- 50 -- -- 50

Max. Time, End Semester Exam (Theory) -00 Hrs. End Semester Exam (Lab) – 00 Hrs.

Objectives:

Students are able to:-

1 To expose students to the 'real' working environment and get acquainted with the

organization structure, business operations and administrative functions.

2 To set the stage for future recruitment by potential employers.

Unit

No Details Hours

1

Course (catalog) description: As a part of the B. Tech Curriculum, Industry

Internship is a Practical course, in which the students of CSE are trained for

technical skills.

Grading:

The Course is graded based on:

Presentation : 50%

Student’s reports : 50%

Employers Expectations: Source of highly motivated pre professionals.

Students bring new perspectives to old problems.

Visibility of your organization is increased on campus.

Quality candidates for temporary or seasonal positions and projects.

Freedom for professional staff to pursue more creative projects.

Flexible, cost effective work force not requiring a long term employer

commitment.

Proven, cost effective way to recruit and evaluate potential employees.

Your image in the community is enhanced as you contribute your expertise to the

educational enterprise

Outcomes:

On completion of the course, student will be able to–

1 An ability to work in actual working environment.

2 An ability to utilize technical resources.

3 An ability to write technical documents and give oral presentations related to the work

completed.

Page 21: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

STUDENT EVALUATION OF INDUSTRY INTERNSHIP

Please respond to the following questions regarding your internship experience.

The purpose of this form is to provide opportunity for an honest appraisal of the internship site and

supervisor.

Organization: ___________________________________________

Semester/Year:_____________

Location: ___________________________________

Supervisor: _________________________________

1. Please rate the following aspects of your internship placement on the basis of this scale:

(0) No Observation, (1) Poor, (2) Fair, (3) Good, (4) Excellent

• Work experience relates to my career goals

• Adequacy of employer supervision

• Helpfulness of supervisor

• Acceptance by fellow workers

• Opportunity to use my training

• Opportunity to develop my human relations skills

• Provided levels of responsibility consistent with my ability and growth

• Opportunity to develop my communication skills

• Opportunity to develop my creativity

• Cooperativeness of fellow workers

• Opportunity to problem solve

• Opportunity to develop critical thinking skills

• Provided orientation to the organization

• Attempt to offer feedback on my progress and abilities

• Effort to make it a learning experience for me

Feel free to explain any of your responses to the above criteria here (use other side if

necessary):

2. Would you work for this supervisor again? ___ Yes ___ No ___ Uncertain

3. Would you work for this organization again? ___ Yes ___ No

Uncertain

4. Would you recommend this organization to other students? ___ Yes ___ No ___ Uncertain

Why or why not?

5. Your Name: _________________________________________ Date: ______________

Page 22: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

B. Tech CSE (with Specializationin Cyber Security and Forensics)

Semester – VIII

CIA: Continuous Internal Assessment

L: Theory Lecture

T: Tutorial

P: Practical

TH: Theory Exam.

#: Internship for 15 days.

*: Oral Examination

UC: University Core

PC: Programme Core

PE: Programme Elective

CIA Weightage Description

CIA 1 10% Home Assignment

CIA 2 20% Mid-Term Exam (MTE)

CIA 3 10% Seminar Presentation

CIA 4 10% Research Based Activity

TOTAL 50%

Sr.

No. Core

Course

Code Course Name

Teaching Scheme

(Hrs./Week)

Examination Scheme

Total Marks

L T P C

Formative

Assessment

CIA

Summative

Assessment

ESE

Course Lab Course Lab

1 PC YCF801 Software Testing Methodology 3 1 0 4 50 0 50 0 100

2 PC YCF802 Information Security Intelligence

and Compliance Analytics 3 0 0 3 50 0 50 0 100

3 PE YCFE__ Program Elective 3 0 0 3 50 0 50 0 100

4 PC YCF811 Information Security Intelligence

and Compliance Analytics Lab 0 0 4 2 -- 25 -- 25 50

5 UC YCF812 Dissertation Stage II 0 0 12 8 -- 50 -- 100 150

TOTAL 09 01 16 20 150 75 150 125 500

Program Elective : 1. Advance Software Engineering(YCFE01)

2. Software Project Management(YCFE02)

3. Grid and Cluster Computing(YCFE03)

4. Machine Learning(YCFE04)

Page 23: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VIII

Course: Software Testing Methodology Course Code: YCF801

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

3 1 - 4 10 20 10 10 -- 50 -- 100

Max. Time, End Semester Exam (Theory) - 03 Hrs. End Semester Exam (Lab) – 00 Hrs.

Prerequisites:

Software Engineering

Objectives:

Students are able to:-

1 To understand the software testing methodologies such as flow graphs and path testing,

transaction flows testing, data flow testing, domain testing and logic base testing.

Unit

No Details Hours

1

Module 1: What is testing?, Purpose of testing, Dichotomies, model for testing,

consequences of bugs, taxonomy of bugs. 4

Module 2:Flow graphs and Path testing:- Basics concepts of path testing,

predicates, path predicates and achievable paths, path sensitising, path

instrumentation, application of path testing.

4

2

Module 1: transaction flows, transaction flow testing techniques. 4

Module 2:Basics of dataflow testing, strategies in dataflow testing, application of

dataflow testing. 3

3

Module 1: domains and paths, Nice & ugly domains, domain testing 4

Module 2:domains and interfaces testing, domain and interface testing, domains

and test ability. 4

4

Module 1:path products & path expression, reduction procedure, applications,

regular expressions & flow anomaly detection. 4

Module 2:Logic Based Testing:- overview, decision tables, path expressions, kv

charts, specifications. 3

5

Module 1:state graphs, good & bad state graphs, state testing, Testability tips. 4

Module 2:Graph Matrices and Application:-Motivational overview, matrix of

graph, relations, power of a matrix, node reduction algorithm, building tools. 4

Outcomes:

1 Ability to apply the process of testing and various methodologies in treating for testing for

developed software.

2 Ability to write test cases for given software to test it before delivery to the customer

Page 24: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Text Books

1. Software Testing techniques — Boris Beizer, Dreamtech, second edition.

2. Software Testing Tools — Dr.K.V.K.K.Prasad, Dreamtech.

Reference Book

1. The craft of software testing – Brian Marick, Pearson Education.

2. Software Testing,3rdedition,P.C. Jorgen sen, Aurbach publications (Dist.by SPD).

3. Software Testing, N.Chauhan, Oxford University press.

4. Introduction to Software Testing, P.Amman n & J offutt, cambridge Univ.Press.

5. Effective methods of Software Testing, perry, John Wiley, 2nd Edition, 1999.

6. Software Testing Concepts and Tools, P.Nageswararaodreamtech Press.

Page 25: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VIII

Course: Information Security intelligence and compliance analytics Course Code: YCF802

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

3 -- -- 3 10 20 10 10 -- 50 -- 100

Max. Time, End Semester Exam (Theory) - 03 Hrs. End Semester Exam (Lab) – 00 Hrs.

Prerequisites:

IT Data Security

Objectives:

The course will enables students to:-

1 Different security issues in information

2 Concepts of Information Security intelligence

3 Know different tools used for compliance analytics

Unit

No Details Hours

1

Module 1: what is big data?, The arrival of analytics, where is the value?, more to

big data than meets the eye, dealing with the nuances of big data, an open source

brings forth tools, caution: obstacles ahead.

4

Module 2:why big data matters - big data reaches deep, obstacles remain,

Data continue to evolve, data and data analysis are getting more complex, the

future is now, big data and the business case - realizing value, the case for big data,

the rise of big data options, beyond hadoop, with choice come decisions

4

2

Module 1:The data scientist, the team challenge, different teams, different goals. 4

Module 2:don’t forget the data, challenges remain, teams versus culture, gauging

success. 3

3

Module 1:hunting for data, setting the goal, big data sources growing, diving

deeper into big data sources, a wealth of public information, getting started with

big data acquisition, ongoing growth, no end in sight. The storage dilemma,

building a platform, bringing

Structure to unstructured data processing power, choosing among in-house,

Outsourced, or hybrid approaches

4

Module 2:the storage dilemma, building a platform, bringing structure to

unstructured data processing power, choosing among in-house, outsourced, or

hybrid approaches.

4

4

Module 1:pragmatic steps to securing big data, classifying data, protecting big

data analytics 4

Module 2:Big data and compliance, the intellectual property challenge

Big data: the modern era, today, tomorrow, and the next day, changing algorithms. 3

Page 26: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

5

Module 1:start small with big data, thinking big, avoiding worst practices, baby

steps, the value of anomalies, expediency versus accuracy, in-memory processing. 4

Module 2:the path to big data, the realities of thinking big data, hands-on big data,

the big data pipeline in depth, big data visualization, big data privacy. 4

Outcomes:

On completion of the course, student will be able to–

1 Knows Information security fundamentals

2 Tools and techniques used for Security intelligence

Tools and techniques used for compliance analytics

Text Books

Information Security intelligence and compliance analytics (IBM ICE Publication)

Reference Book

Page 27: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VIII

Course: Advance Software Engineering Course Code: YCFE01

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

3 - - 3 10 20 10 10 -- 50 -- 100

Max. Time, End Semester Exam (Theory) - 03 Hrs. End Semester Exam (Lab) – 00 Hrs.

Prerequisites:

Software Engineering

Objectives:

Students are able to:-

1 appreciate the wider engineering issues which form the background to developing complex,

evolving (software-intensive) systems

2 plan a software engineering process to account for quality issues and non-functional

requirements

3 employ a selection of concepts and techniques to complete a small-scale study into one of

the advanced topic areas

4 Embark on more in-depth research or practice in software engineering.

Unit

No Details Hours

1 Module 1: Introduction to software engineering. 4

Module 2: , Basics of software engineering. 4

2

Module 1: Embedded software and systems engineering: overview, examples and

industrial realities. 4

Module 2:Project Management - Project Planning and Scheduling

standards,Scheduling. 3

3

Module 1: Unified Software Development Process, Software Process

Improvement, Software Economics, Software Quality. 4

Module 2:Software Metrics - Measurement, Estimation and Prediction,

Requirements Management, Configuration Management, Risk Management,

Testing and Inspection.

4

4

Module 1: Architecture Description Languages, Pattern-Oriented Software

Architecture, Component-based Development. 4

Module 2:Distributed Software Architectures using Middleware, Enterprise

Application Integration, Architectures for Mobile and Pervasive Systems, Model

Driven Architecture.

3

5 Module 1: UML Extension Mechanisms. 4

Module 2:Object Constraint Language, Model Checking. 4

Page 28: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Outcomes:

Students are able to:-

1 Apply software engineering life cycle by demonstrating competence in communication,

planning, analysis, design, construction, and deployment.

2 Have brief account of associated professional and legal issues.

3 Ability to perform independent research and analysis.

4 Ability to work as an effective member or leader of software engineering teams.

5 To manage time, processes and resources effectively by prioritising competing demands to

achieve personal and team goals Identify and analyzes the common threats in each domain.

Text Books

1. Software Engineering: A Practitioner’s Approach, Roger S Pressman 6th Edition

Reference Book

1. Software Engineering: IyanSomarville, 7th Edition

Page 29: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VIII

Course: Software Project Management Course Code: YCFE02

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

3 - - 3 10 20 10 10 50 100

Max. Time, End Semester Exam (Theory) - 03 Hrs. End Semester Exam (Lab) – 00 Hrs.

Prerequisites:

Understanding of software Engineering Process.

Objectives:

Students are able to:-

1 Explore software project management activities from product concept through

Developmentbased upon case studies and best practices.

Unit

No Details Hours

1

Module 1: Importance of Software Project Management – Activities

Methodologies – Categorization of Software Projects – Setting objectives –

Management Principles – Management Control .

4

Module 2:Project portfolio Management – Cost-benefit evaluation technology –

Risk evaluation – Strategic program Management – Stepwise Project Planning 4

2

Module 1: Software process and Process Models – Choice of Process models –

mental delivery – Rapid Application development – Agile methods – Extreme

Programming .SCRUM – Managing interactive processes – Basics of Software

estimation – Effort and Cost estimation techniques – COSMIC Full function points

– COCOMO II A Parametric Productivity Model – Staffing Pattern.

4

Module 2:SCRUM – Managing interactive processes – Basics of Software

estimation – Effort and Cost estimation techniques – COSMIC Full function points

– COCOMO II A Parametric Productivity Model – Staffing Pattern.

3

3

Module 1: Objectives of Activity planning – Project schedules – Activities –

Sequencing and scheduling – Network Planning models – Forward Pass &

Backward Pass techniques – Critical path (CRM) method.

4

Module 2:Risk identification – Assessment – Monitoring – PERT technique –

Monte Carlo simulation – Resource Allocation – Creation of critical patterns –

Cost schedules.

4

4

Module 1:Framework for Management and control – Collection of data Project

termination – Visualizing progress – Cost monitoring. 4

Module 2:Earned Value Analysis- Project tracking – Change control- Software

Configuration Management – Managing contracts – Contract Management. 3

5 Module 1:Managing people – Organizational behavior – Best methods of staff

selection – Motivation – The Oldham-Hackman job characteristic model – Ethical 4

Page 30: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

and Programmed concerns.

Module 2:Working in teams – Decision making – Team structures – Virtual teams

– Communications genres – Communication plans. 4

Outcomes:

At the end of Course students will be able to-

1 To understand Software Project Models and Software Management Concepts

2 To understand the various methods of Cost Estimation

3 To Study about Software Quality Management

4 To Study about Software Metrics.

5 To understand Project Evaluation.

Text Books

1. Bob Hughes, Mike Cotterell and Rajib Mall: Software Project Management – Fifth Edition, Tata

McGraw Hill, New Delhi, 2012.

Reference Book

1. Robert K. Wysocki “Effective Software Project Management” – Wiley Publication,2011.

Page 31: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VIII

Course: Grid and Cluster Computing Course Code: YCFE03

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

3 - - 3 10 20 10 10 -- 50 -- 100

Max. Time, End Semester Exam (Theory) - 03 Hrs. End Semester Exam (Lab) – 00 Hrs.

Prerequisites:

Computer Architecture and Programming Concepts, Operating Systems, Data Communication And

Computer Networks

Objectives:

Students are able to:-

1 To investigate cluster and grid as computing platform for distributed computing.

2 To make students aware of distinguishing characteristics of cluster and grid computing.

3 Introducing software tools used in both cluster and grid computing.

Unit

No Details Hours

1

Module 1: Basic concepts in Distributed Systems, Notion of time 4

Module 2: Introduction to Cluster Computing, Scalable Parallel Computer

Architectures, Cluster Computer and its Architecture, Categories of clusters,

Cluster Components, Cluster Middleware and Single System Image.

4

2

Module 1: Programming Environments and Tools, Networking Protocols and I/O

for clusters, Load Sharing, Load Balancing, Resource Management System,

Process Scheduling, Performance measures and metrics, Detecting and Masking

Faults, Recovering from Faults

4

Module 2:Case Study : Beowulf and PARAM. 3

3

Module 1: Introduction to Message Passing Interface (MPI), Programming using

message-passing - send and receive operations, Message passing interface,

Introduction to MPI routines — send, receive, broadcast, gather, scatter, barrier,

reduction, prefix, all-to-all communication. Demonstration of programs using MPI

routines — matrix-matrix multiplication, quick sort, etc.

4

Module 2:Introducing OpenMP programming. 4

4

Module 1:Introduction to Grid Computing, Difference between Cluster and Grid

computing, Grid Architecture and its key components, Computational, Data,

Enterprise, and, Desktop grids

4

Module 2:Overview of applications of Grid Computing, Grid Infrastructure. 3

5

Module 1:Web Services and Service Oriented Architecture (SAO), Open Grid

Services Architecture (OGSA), OGSA Platform Components, Open Grid Services

Infrastructure (OGSI), OGSA Basic Services, Web Services Resource Framework

(WSRF)

4

Page 32: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Module 2:List of Globally available Middleware, Introducing Grid Computing

Toolkit : Globus, Introducing India’s Grid Computing initiative GARUDA 4

Outcomes: On completion of the course, student will –

1 Be acquainted with various tools and techniques used in the arena of Cluster and Grid

Computing.

2 Able to justify the choice or selection of distributed computing platform for a specific

application.

3 Able to design programs in OpenMP and MPI.

Text Books

1. Prabhu, C. S. R. Grid and cluster computing. PHI Learning Pvt. Ltd., 2008.

2. Quinn, Michael J. Parallel Programming. TMH CSE 526, 2003.

3. Foster, Ian, and Carl Kesselman, eds. The Grid 2: Blueprint for a new computing infrastructure.

Elsevier, 2003.

4. Joseph, Joshy, and Craig Fellenstein. Grid computing. Prentice Hall Professional, 2004.

Reference Book

1. Pacheco, Peter S. Parallel programming with MPI. Morgan Kaufmann, 1997.

2. Buyya, Rajkumar. High performance cluster computing: Architectures and systems (volume 1).

Prentice Hall, Upper SaddleRiver, NJ, USA 1, 999, 1999.

Page 33: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VIII

Course: Machine Learning Course Code: YCFE04

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

3 - - 3 10 20 10 10 -- 50 -- 100

Max. Time, End Semester Exam (Theory) - 03 Hrs. End Semester Exam (Lab) – 00 Hrs.

Prerequisites:

Artificial Intelligence, Fuzzy Logic

Objectives:

Students are able to:-

1 Introduce the fundamental problems of machine learning.

2 Provide understanding of techniques, mathematical concepts, and algorithms used in

machine learning to facilitate further study in this area.

3 Provide pointers into the literature and exercise a project based on literature search and one

or more research papers.

Unit

No Details Hours

1

Module 1: Basic Maths: Probability, Linear Algebra, Convex Optimization 4

Module 2:Background: Statistical Decision Theory, Bayesian Learning (ML,

MAP, Bayes estimates, Conjugate priors) 4

2

Module 1: Regression : Linear Regression, Ridge Regression, Lasso 4

Module 2:Dimensionality Reduction : Principal Component Analysis, Partial

Least Squares 3

3

Module 1: Classification : Linear Classification, Logistic Regression, Linear

Discriminant Analysis, Quadratic Discriminant Analysis, Perceptron, Support

Vector Machines Kernels,

4

Module 2:. Artificial Neural Networks Back Propagation, Decision Trees, Bayes

Optimal Classifier, Naive Bayes. 4

4

Module 1:Evaluation measures : Hypothesis testing, Ensemble Methods,

Bagging Adaboost Gradient Boosting, 4

Module 2:Clustering, K-means, K-medoids, Density-based Hierarchical, Spectral 3

5

Module 1:Miscellaneous topics: Expectation Maximization, GMMs, Learning

theory Intro to Reinforcement Learning 4

Module 2:Graphical Models: Bayesian Networks. 4

Outcomes: On completion of the course, student will –

1 Provide understanding of the limitations of various machine learning algorithms and the

Page 34: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

way to evaluate performance of machine learning algorithms.

Text Books

1. Christopher M. Bishop. Pattern Recognition and Machine Learning (Springer)

2. David Barber, Bayesian Reasoning and Machine Learning (Cambridge University Press).

Online version available

3. Tom Mitchell. Machine Learning (McGraw Hill)

4. Richard O. Duda, Peter E. Hart, David G. Stork. Pattern Classification (John Wiley & Sons)

Reference Book

1. T. Hastie, R. Tibshirani, J. Friedman. The Elements of Statistical Learning, 2e, 2008.

2. Christopher Bishop. Pattern Recognition and Machine Learning. 2e

Page 35: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester –VIII

Course: Information Security intelligence and compliance

analytics Lab Course Code: YCF811

Teaching

Scheme

(Hrs. /Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

0 0 4 2 -- -- -- -- 25 0 25 50

Max. Time, End Semester Exam (Theory) -00 Hrs. End Semester Exam (Lab) – 03 Hrs.

Prerequisites:

IT Data Security

Objectives:

Students are able to:-

1 Different security issues in information

2 Concepts of Information Security intelligence

3 Know different tools used for compliance analytics

Guidelines for Assessment

Continuous assessment of laboratory work is done based on overall performance and lab assignments

performance of student. Each lab assignment assessment will assign grade/marks based on parameters

with appropriate weightage. Suggested parameters for overall assessment as well as each lab assignment

assessment include- timely completion, performance, innovation, efficient codes, punctuality and

neatness.

Guidelines for Laboratory Conduction

The instructor is expected to frame the assignments by understanding the prerequisites, technological

aspects, utility and recent trends related to the topic. The assignment framing policy need to address the

average students and inclusive of an element to attract and promote the intelligent students. The

instructor may set multiple sets of assignments and distribute among batches of students. It is

appreciated if the assignments are based on real world problems/applications. Encourage students for

appropriate use of Hungarian notation, Indentation and comments. Use of open source software is

encouraged.

In addition to these, instructor may assign one real life application in the form of a mini-project based

on the concepts learned. Instructor may also set one assignment or mini-project that is suitable to

respective branch beyond the scope of syllabus.

Operating System recommended : 64-bit Open source Linux or its derivative

Programming tools recommended: Open Source C Programming tool like GCC

Suggested List of Laboratory Assignments

1. Writing basic program using python

2. Creating program using conditional statements and loops

3. Creating functions in python

Page 36: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

4. Creating recursive functions

5. Creating lists, dictionaries in python

6. File handling using python

7. Word count function in python

8. Installing Hadoop

9. Configuring Hadoop

10. Running jobs on Hadoop

11. Working on HDFS

12. Hadoop streaming

13. Creating Mapper function using python.

14. Creating Reducer function using python

15. Python iterator and generators

Page 37: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

Year: Fourth Year Semester – VIII

Course: Dissertation Stage II Course Code: YCF812

Teaching

Scheme (Hrs.

/Week)

Continuous Internal Assessment (CIA) End Semester

Examination Total

L T P C CIA-1 CIA-2 CIA-3 CIA-4 Lab Theory Lab

-- -- 12 8 -- -- -- -- 50 -- 100 150

Max. Time, End Semester Exam (Theory) -03 Hrs. End Semester Exam (Lab) – 00 Hrs.

Objectives:

Students are able to:-

1 To expose students to the 'real' working environment and get acquainted with the

organization structure, business operations and administrative functions.

2 To set the stage for future recruitment by potential employers.

3 To develop time and space efficient algorithms;

4 To develop software engineering documents and testing plans;

5 To use algorithmic solutions using distributed, Embedded, concurrent and parallel environments.

Unit

No Details Hours

1

Course (catalog) description: As a part of the B. Tech Curriculum, Dissertation

Stage- II is a Practical course, in which the students of CSE are trained for

project based learning.

Proposed Criteria for Dissertation Evaluation

I suggest the following 9 aspects of every project and presentation. Every item is

worth 10 points out of total 90.

For each of the items I give several key words explaining my understanding of the

item. This grading scheme is only a proposal and is open for any input, discussion

and final approval by members of the seminar. As the evaluation procedure I

suggest for each project and each of the first 8 items to assign a base group to

evaluate it.

Content: (1) Topic: Is the topic chosen interesting, useful, worth researching?

(2) Thesis: Are the theses of the project identifiable, plausible, insightful, and

clear?

(3) Evidence / Sources: Are the sources of information used primary, sufficient,

and relevant? Is evidence clearly related to claims?

(4) Analysis / Logic / Argumentation: Is analysis fresh, posing new ways to think

of the material? Are Ideas represented logically? Is the argument identifiable,

reasonable, and sound? Do authors anticipate and defuse counter-argument?

Presentation:

Page 38: School of Computing Science and Engineering Department of … · 2019-12-26 · Leaders Library, Security Leadership Defined, Security Leader Soft Skills, Seven Competencies for Effective

School of Computing Science and Engineering Department of Computer Science and Engineering

Document Reference Revision No. / Date Prepared By Approved By

SUN/SOCSE/COMP/UG/CSF/31/08/18 R0 / 31 August 2018

(5) Structure: Is the structure evident, understandable, and appropriate? Is

transition from point to point smooth?

(6) Slides / transparencies: Are slides well designed (not too busy, right font)?

Are graphic and visual appropriate? Any spelling, grammar, word use slips?

(7) Timing: Is presentation timed properly, rehearsed?

(8) Style: Is the level of treatment appropriate (not too detailed or too general)?

Is the presentation energetic, enthusiastic, and clear? Is the volume good?

(9) Extra points for excellence

Tools Required: Preferably 64-bit FOSS tools but if sponsoring company’s requirement is non-open

sourceplatform then it must be latest and current version of non-absolute tools. 64-

bit i5/i7Desktops/Mobiles, Latest SAN,3-tier architectures along with latest

version of FOSS Operating systems like Fedora 21or equivalent, LAMP tools,

WEB server, Applications servers, Database servers, MongoDBor latest open

source BigDATA tools, FOSS Programming Tools like gcc,g++,Eclipse,Python,

Java and other tools are as per the requirement of the SRS. The

documentationtools like Open office, GIT, Latex, Latex-Presentation

Outcomes:

On completion of the course, student will be able to–

1 An ability to work in actual working environment.

2 An ability to utilize technical resources.

3 An ability to write technical documents and give oral presentations related to the work

completed.