M.sc. Cyber Security
M.sc. Cyber Security
,
CYBER SECURITY
SYLLABUS
1
CONTENTS
i. PO and PSO Description
ii. PG – Template
iii. Methods of Evaluation & Methods of Assessment
iv. Semester Index.
v. Subjects – Core, Elective, Nonmajor, Skill Enhanced, Ability Enhanced, Extension Activity,
Environment, Professional Competency
1) Course Lesson Box
2) Course Objectives
3) Units
4) Learning Outcome
5) Reference and Text Books
6) Web Sources
7) PO & PSO Mapping tables
2
MISSION
3
Programme Educational Objectives (PEOs)
The M.Sc. Cyber Security program describe accomplishments that graduates are expected to
attain within five to seven years after graduation.
4
Programme Specific Outcomes (PSOs)
After the successful completion of M.Sc Cyber Security program the students are expected
to
Impart education with domain knowledge effectively and efficiently in par with the
PSO1
expected quality standards for Cyber Security professional.
Ability to apply the mathematical, technical and critical thinking skills in the discipline
PSO2
of Cyber Security in digital information.
Ability to engage in life-long learning and adopt fast changing technology to prepare
PSO3
for professional development.
Expose the students to learn the important Cyber Security such as Cyber Policing, Web
PSO4 Application Security, Server Security, firewalls, Malware Analysis, so that they can
opportunity to be a part of industry 5.0 applications irrespective of domains.
PSO5 Inculcate effective communication skills combined with professional & ethical attitude.
5
Programme Outcomes (POs)
PO3 needs through appropriate consideration for the public health, safety, cultural, societal,
and environmental concerns.
Establish the ability to Listen, read, proficiently communicate and articulate
PO4
complex ideas with respect to the needs and abilities of diverse audiences.
Deliver innovative ideas to instigate new business ventures and possess the
PO5
qualities of a good entrepreneur
PO6 Acquire the qualities of a good leader and engage in efficient decision-making.
Graduates will be able to undertake any responsibility as an individual/member of
PO7
multidisciplinary teams and have an understanding of team leadership
Function as socially responsible individual with ethical values and accountable to
PO8 ethically validate any actions or decisions before proceeding and actively contribute to
the societal concerns.
Identify and address own educational needs in a changing world in ways sufficient
PO9 to maintain the competence and to allow them to contribute to the advancement of
knowledge
Demonstrate knowledge and understanding of management principles and apply
PO10
these to one own work to manage projects and in multidisciplinary environment.
6
TANSCHE REGULATIONS ON LEARNING OUTCOMES-BASED CURRICULUM
FRAMEWORK FOR POSTGRADUATE EDUCATION
Programme Code
7
PO8: Contribution to Society
Succeed in career endeavors and contribute significantly to society.
PO 9 Multicultural competence
Possess knowledge of the values and beliefs of multiple cultures and
a global perspective.
8
Credit Distribution for PG Programme
9
Component wise Credit Distribution
10
METHODS OF EVALUATION
Seminars
METHODS OF ASSESSMENT
11
– solving.
Evaluation questions do not have single right answers.
Create (K6) The questions of this category challenge students to
get engaged in creative and original thinking.
Developing original ideas and problem solving skills
12
M. Sc. Cyber Security
Course
Title of the Course Credits Hours Maximum marks
Code
Practi
Theory CIA ESE Total
cal
FIRST SEMESTER
Core – I Paper : Foundation of
Information Security 5 7 25 75 100
Core – II Paper : Network Technology
5 7 25 75 100
and Security
Core - III Paper : Ethical Hacking for
Cyber Security 4 6 25 75 100
Elective – I Python Programming 3 5 25 75 100
Elective - Practical Python Programming 5
Lab 3 5 25 75 100
II
Total 20 30
SECOND SEMESTER
Core – IV Paper : Introduction to Cyber
Crime 5 6 25 75 100
Core – V Paper : Web and Database
5 6 25 75 100
Security
Core – VI Paper :Digital Forensic and Best
Practices 4 6 25 75 100
Elective – Paper : Cloud Fundamentals and
Cloud Security 3 4 25 75 100
III
Elective - Practical Ethical Hacking and 4
3 5 25 75 100
IV Digital Forensics Lab
NME 4
2 5 25 75 100
Total 22 30
THIRD SEMESTER
Core - Paper : Network security and
Cryptography \5 6 25 75 100
VII
Core – Paper : Security Standards and
5 6 25 75 100
VIII Compliance
Core – IX Paper : Mobile and Wireless
Security 5 6 25 75 100
Core – X Paper : Evolving Technologies
4 6 25 75 100
and Threats
13
Elective – Practical V:Advance Digital 3
3 4 25 75 100
V Forensics Lab
NME 3
2 4 25 75 100
Internship/ Industrial Activity
2 2 25 25 50
Total 26 30
FOURTH SEMESTER
Core – XI Information Security 6
5
Lab
Core - Web and Database 6
Security Lab 5
XII
Project Work and viva voce (200 10
7 - - - 200*
Marks)
Elective – Network Security & 4
3
VI Cryptography Lab
Skill Enhancement Course - 4
Professional Competency Skill 2
Extension Activity
1
Total 23 30 200
Grand Total 91 60 30 1025 1025 2250
ONLINE COURSES
#Swayam / MOOC/ Spoken
English Tutorial 2
#Job Oriented Certificate Course 2
14
SEMESTER –1
15
Course Code FOUNDATIONS OF INFORMATION L T P C
SECURITY
Core/elective/Supportive Core 5 0 0 4
Pre - requisite Basic knowledge in Computers Security Syllabus I
version
Course Objectives
The main objectives of this course are to:
1. To understand the fundamental functioning of security patterns.
2. To understand the security Attack and Preventions.
3. To understand the need for Authentication, Access controls, Security operations.
16
Total Lecture Hours 60
Hours
Text Book(s)
1 Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank
Buschmann, Peter Sommerlad,“Security Patterns: Integrating Security and Systems
Engineering”, Wiley Publications, 2013
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S M M M L L L
CO2 S S M M M L L L L L
CO3 S S M M L L L L L L
CO4 S S M L L M L L L L
CO5 S M M L L L L L L L
*S-Strong; M-Medium; L-Low
17
Course Code NETWORK TECHNOLOGY AND L T P C
SECURITY
Core/elective/Supportive Core 5 0 0 4
Pre - requisite Basic knowledge in Network and Syllabus I
Cryptography version
Course Objectives
The main objectives of this course are to:
1. To understand the basics of network security in the computer systems
2. To understand the type’s protocols and reference models.
3. To discuss about the network security attacks and network security assessment
4. To know about assessment of network security and remote Information Services
18
Services: Remote Information Services – DNS – Finger – Auth – NTP – SNMP – LDAP – rwho –
RPC risers – Remote Information Services Countermeasures
UNIT V BASICS OF CRYPTOGRAPHY ALGORITHMS 13
Overview of Cryptography: Computer Security Concepts – OSI Security Architecture – Security
Attacks – Security Services – Security Mechanisms. Symmetric Ciphers: Traditional Block Cipher
Structure – DES – AES. Asymmetric Ciphers: Public Key Cryptography and RSA. Hash Functions: –
SHA – SHA 3. Message Authentication: Requirements – Functions – codes - CCM and GCM. Digital
Signatures and Scheme: (EDSS &SDSS) - Algorithms - NIST – ECDS – RSA-PSS.
Total Lecture Hours 60
Hours
Text Book(s)
1 Computer Networks (5th Edition), Andrew S.Tanenbaum David J. Wetherall, 2014.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M L S L
CO2 S S M M S L L M L L
CO3 S S M S M L M L S S
CO4 S S M L L M L L S L
CO5 S M M M M L M M L L
*S-Strong; M-Medium; L-Low
19
Course Code ETHICAL HACKING FOR CYBER L T P C
SECURITY
Core/elective/Supportive Core: 3 5 0 0 4
Pre - requisite Basic knowledge in Computer network, Syllabus I
firewall, Hacking and cyber security version
terminology
Course Objectives
The main objectives of this course are to:
1. To understand Information Security, Cyber threats, attacks, web security.
2. To know about different modes of hacking tools and phases of penetration tests and Methodologies.
20
Attacks – Broken Authentication – Sensitive Data Exposure – XML External Entities – Broken Access
Control – Security misconfiguration – Website pen testing - Cross Site Scripting (XSS) – Insecure
Deserialization – Using Components with known vulnerabilities – Insufficient logging and monitoring
Total Lecture Hours 60
Hours
Text Book(s)
1 McClure, S., Scambray, J. and Kurtz, G., 2012. Hacking Exposed 7Network
Security Secrets and Solutions. New York: McGraw-Hill.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M L L L
CO2 S S M M S L L M L L
CO3 S S M S M L L L L L
CO4 S S S L L M L L S L
CO5 S S S M M L L L L L
*S-Strong; M-Medium; L-Low
21
Course Code PYTHON PROGRAMMING L T P C
Core/elective/Supportive Core 5 0 0 4
Pre - requisite Basic knowledge in Object Oriented Syllabus I
Programming and Network. version
Course Objectives
The main objectives of this course are:
1. Understand different Data Structures of Python.
2. To understand the basics of Python programming and Ethical Hacking from Scratch.
3. To strengthen fundamental skills in Network security and penetration testing.
22
Penetration Test Introduction – Categories – Pen-testing Process – Use Cases: Developing Ethical
Hacking Tools: Automating Information Gathering – Keylogger.
Total Lecture Hours 60
Hours
Text Book(s)
1 Mark Lutz, “Learning Python”, O’Reilly, Fifth Edition, 2013.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S M M M L L L
CO2 S S M S S L L M L L
CO3 S S M S M L L L L L
CO4 S S M L L L L L L L
CO5 S M M M L L L L L L
*S-Strong; M-Medium; L-Low
23
Course Code PYTHON PROGRAMMING LAB L T P C
Core/elective/Supportive Core Lab 0 0 5 4
Pre - requisite Basic knowledge in Object Syllabus I
oriented Programming. version
Course Objectives
The main objectives of this course are to:
1. To understand the basic data structures like tuple, List, Dictionary.
2. To understand the applications of the data structures using various techniques
3. To Learn the python performance in many cybersecurity functions, including malware analysis,
scanning, and penetration testing functions
LIST OF PROGRAMS 10
1. Write a python Program for list, tuples and dictionary.
2. Program using conditional statement of python
3. Programs using exception handling
4. Programs using different packages in python
5. Programs using functions in python
6. Program for webserver finger printing
7. Program for port scanning
8. Program for transmission of traffic in the network
9. Program for web app testing
10. Program for network scanning
Total Lecture Hours 45
Hours
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M L L L L L L L L
CO2 S M M L L L L L L L
CO3 S S S L L L L L L L
*S-Strong; M-Medium; L-Low
24
Course Code INFORMATION SECURITY LAB L T P C
Core/elective/Supportive Core Lab 0 0 5 4
LIST OF PROGRAMS 10
To Demonstrate the User Identity and Access Management
To Demonstrate the Account Authorization in windows operating system
To Demonstrate the Access and Privilege Management in Directories
To Demonstrate the System and Network Access Control
To Demonstrate the Operating Systems Access Controls
To Demonstrate the process of access Monitoring Systems with windows
To Demonstrate the Website blocking with browser
To demonstrate the IP Allocation for the computers.
To demonstrate the Trouble shooting for the hardware devices
To demonstrate the event logging
To demonstrate the ICMP tracing packets over the network
Total Lecture Hours 45
Hours
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S M M L L L L L
CO2 S S M M L L L L L L
CO3 S S M M L L L L L L
CO4 S S M L L L L L L L
*S-Strong; M-Medium; L-Low
25
SEMESTER – 2
26
Course Code Introduction to Cyber Crime L T P C
Core/elective/Supportive Core 4 0 0 4
Pre - requisite Basic knowledge in Internet and data crimes. Syllabus I
version
Course Objectives
The main objectives of this course are to:
1. To explain the concept of cybercrime and various types of attacks
2. To explain the impact of cybercrime on society
Expected Course Outcomes
1 Understand the concept of cybercrime and emerging crime threats and attacks in K2
cyberspace
2 Classify the main typologies, characteristics, activities, actors and forms of K3
cybercrime, including the definitional, technical and social aspects.
3 Evaluate behavioral aspects of the various type of attacks in cyberspace. K4
4 Analyze the impact of cybercrime crime on businesses and individuals and discuss the K4
impact of cybercrime on society
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create
27
UNIT V Cybercrime and cloud computing 18
Cybercrime and cloud computing, Different types of tools used in cybercrime, Password Cracking –
Online attacks, Offline attacks, Remote attacks, Random Passwords, Strong and weak passwords.
Viruses and its types. Ransomware and Crypto currencies. DoS and DDoS attacks and their types.
Cybercriminal syndicates and nation state groups.
Total Lecture Hours 90
Hours
Text Book(s)
Nina Godbole and SunitBelapore; “Cyber Security: Understanding Cyber Crimes,
1 Computer Forensics and Legal Perspectives”, Wiley Publications, 2011.
2 Shon Harris, “All in One CISSP, Exam Guide Sixth Edition”, McGraw Hill, 2013.
Bill Nelson, Amelia Phillips and Christopher Steuart; “Guide to
3 Computer Forensics and Investigations” – 3rd Edition, Cengage, 2010
BBS.
Reference Book(s)
William Stallings; “Cryptography and Network Security: Principles and
1
Practices”, Fifth Edition, Prentice Hall Publication Inc., 2007.
2 Atul Jain; “Cyber Crime: Issues, Threats and Management”, 2004.
3 Majid Yar; “Cybercrime and Society”, Sage Publications, 2006.
Michael E Whiteman and Herbert J Mattord; “Principles of Information Security”,
4 Vikas Publishing House, New Delhi, 2003. 8. Matt Bishop, “Computer Security
Art and Science”, Pearson/PHI, 2002
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M M L L L L L L L
*S-Strong; M-Medium; L-Low
28
Course Code WEB AND DATABASE SECURITY L T P C
Core/elective/Supportive Core 4 0 0 4
Pre - requisite Basic knowledge in Cyber Security Syllabus I
version
Course Objectives
The main objective of the course is:
1. To Understand an Overview of information security
2. To Understand an overview of Access control of relational databases
29
1 Web Security, Privacy and Commerce, Simson G. Arfinkel, Gene Spafford, O’
Reilly
2 Handbook on Database security applications and trends, Michael Gertz, Sushil
Jajodia
REFERENCE BOOK(S):
1 “Web applications security” By Andrew Hoffman, O’Reilly
2 “Database and Applications Security” Bhavani Thuraisingham, Auerbach
Publications
RELATED ONLINE CONTENTS (MOOC, SWAYAM, NPTEL, WEBSITES ETC)
1 https://nptel.ac.in/noc/courses/noc15/SEM1/noc15-cs03/
2 https://www.tutorialspoint.com/db2/db2_database_security.htm
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M L L L L L
CO2 S S M M M L L L L L
CO3 S S M M M M M L S S
CO4 S S M M M M L L S L
*S-Strong; M-Medium; L-Low
30
Course Code DIGITAL FORENSICS AND BEST L T P C
PRACTICES
Core/elective/Supportive Core 4 0 0 4
Pre - requisite None I
Course Objectives
The main objective of this courses are:
1. To introduce the principle and concepts of digital forensic
2. To detail about the various investigation procedures like data acquisition nd evidence gathering
31
analysis. Understanding Storage Formats for Digital Evidence – Raw Format, Proprietary Formats,
Advanced Forensic Formats.
UNIT V Windows and Linux Forensics 12
Windows Systems Artifacts: File Systems, Registry, Event logs, Shortcut files, Executables.
Alternate Data Streams (ADS), Hidden files, Slack Space, Disk Encryption, Windows registry,
startup tasks, jump lists, Volume Shadow, shell bags, LNK files, Recycle Bin Forensics (INFO, $i, $r
files). Forensic Analysis of the Registry – Use of registry viewers, Regedit. Extracting USB related
artifacts and examination of protected storages. Linux System Artifact: Ownership and Permissions,
Hidden files, User Accounts and Logs.
Total Lecture Hours 90
Hours
Text Book(s)
1 Nina Godbole and Sunit Belapore; “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley Publications,2011.
2 Bill Nelson, Amelia Phillips and Christopher Steuart; “Guide to Computer Forensics and
Investigations” – 3rd Edition, Cengage, 2010 BBS.
3 Shon Harris; “All in One CISSP Guide, Exam Guide Sixth Edition”, McGraw Hill, 2013.
Reference Book(s)
1 LNJN National Institute of Criminology and Forensic Science, “A Forensic Guide for Crime
Investigators – Standard Operating Procedures”, LNJNNICFS, 2016.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S S M L L L L L L L
CO5 S S S L L L L L L L
*S-Strong; M-Medium; L-Low
32
Course Code CLOUD FUNDAMENTALS AND CLOUD L T P C
SECURITY
Core/elective/Supportive Core 4 0 0 4
Pre - requisite Basic knowledge in cloud computing Syllabus I
and architecture. version
Course Objectives
The main objective of this courses are:
1. To understand the various issues in cloud computing.
2. To understand the security issues in the grid and the cloud environment.
3. To gain expertise in server, network and cloud service management.
33
UNIT V SECURING THE CLOUD 13
Securing The Cloud: Security Concepts - Confidentiality, privacy, integrity, authentication,
nonrepudiation, availability, access control, defence in depth, least privilege- how these concepts
apply in the cloud and their importance in PaaS, IaaS and SaaS. e.g. User authentication in the cloud
Total Lecture Hours 60
Hours
Text Book(s)
1 Rittinghouse, J.W. & Ransome, J.F. (2010). Cloud Computing: Implementation,
Management, and Security. CRC Press.
2 Tim Mather, Subra Kumaraswamy, Shahed Latif, “Cloud Security and Privacy: An
Enterprise Perspective on Risks and Compliance”, O'Reilly Media; 1 edition,
[ISBN: 0596802765], 2009.
REFERENCE BOOK(S):
1 Ronald L. Krutz, Russell Dean Vines, “Cloud Security”, Wiley [ISBN:
0470589876], , 2010.
2 Vacca, J. (2016). Cloud Computing Security: Foundations and Challenges. CRC
Press
RELATED ONLINE CONTENTS (MOOC, SWAYAM, NPTEL, WEBSITES ETC)
1 https://www.javatpoint.com/what-is-cloud-security
2 https://nptel.ac.in/courses/106/105/106105167/
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M L S L
CO2 S S M M S L L M L L
CO3 S S M S M L M L L L
CO4 S S M L L M L L S L
CO5 S S M M M L M M L L
*S-Strong; M-Medium; L-Low
34
Course Code ETHICAL HACKING AND DIGITAL L T P C
FORENSICS LAB
Core/elective/Supportive Core Lab 0 0 5 4
Pre - requisite Types of Computer File Systems and Syllabus I
computer Networks basics. version
Course Objectives
The main objectives of this course are to:
1. To understand the basics of network and ethical hacking.
2. To understand the digital forensic laboratory tools.
3. To Learn about Secure the system in networks.
LIST OF PROGRAMS 10
Ethical Hacking:
1. Perform network scanning to identify live and vulnerable machines in a network.
2. Perform OS banner grabbing, service, and user enumeration
3. Perform port scanning to identify live vulnerability in machines over network
4. Perform password Hacking and dictionary attack
5. Perform penetration testing of applications
Digital forensics:
1. Explore and exploit the various computer forensic tools for evidence collection and
analysis used in File analysis.
2. Collect and analyze browser information, including browser history, cookies, proxy
settings, web forms, bookmarks, cache, add-ons, saved passwords, etc
3. Collect digital evidence from mobile phones and cloud services used on phones (Android)
4. Preparing and processing of investigations. Try to examine and identify the evidences from
the drives.
5. Extracting of files that has deleted in the disk.
Course Designed by :
35
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S M M L L L L L
CO2 S S M M L L L L L L
CO3 S S M M L L L L L L
CO4 S S M L L L L L L L
*S-Strong; M-Medium; L-Low
LIST OF PROGRAMS 9
1. Creation and manipulation of database using SQL scripts and graphical interfaces
2. Implementing DAC: Implementation of database security policies using DAC in oracle 10g/SQL
server
3. Implementing of MAC to ensure confidentiality and control information flow using either
Oracle 10g or SQL server. This provides exposure to understand the concepts of MAC and
Trojan hose
4. Implementation of Virtual Private Database using View using Oracle 10g or SQL server
5. Design a method to simulate the HTML injections and cross-site scripting (XSS) to exploit the
attackers
6. Determine HTML injection bugs and possible measures to prevent HTML injection exploits.
7. Implement Secure coding for buffer flow heap attacks
8. Implementation of Design methods to break authentication schemes
9. Implementation of methods for abusing Design Deficiencies against web sites.
36
Total Lecture Hours 45
Hours
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S M M L L L L L
CO2 S S M M L L L L L L
CO3 S S M M L L L L L L
CO4 S S M L L L L L L L
*S-Strong; M-Medium; L-Low
37
SEMESTER – 3
38
Course Code NETWORK SECURITY AND L T P C
CRYPTOGRAPHY
Core/elective/Supportive Core 4 0 0 4
Pre - requisite Basics of Networks & its Security Syllabus I
version
Course Objectives
The main objectives of this course are to:
1. Enable students to learn the Introduction to Cryptography, Web Security and Case studies in
Cryptography.
2. To gain knowledge on classical encryption techniques and concepts of modular arithmetic and
number theory.
3. To explore the working principles and utilities of various cryptographic algorithms including secret
key cryptography, hashes and message digests, and public key algorithms.
UNIT I INTRODUCTION 12
Introduction to Cryptography – Security Attacks – Security Services –Security Algorithm- Stream
cipher and Block cipher - Symmetric and Asymmetric-key Cryptosystem Symmetric Key
Algorithms: Introduction – DES – Triple DES – AES – IDEA – Blowfish – RC5.
UNIT II CRYPTO SYSTEM 11
Public-key Cryptosystem: Introduction to Number Theory - RSA Algorithm – Key Management -
Diffie-Hell man Key exchange – Elliptic Curve Cryptography Message Authentication and Hash
functions – Hash and Mac Algorithm – Digital Signatures and Authentication Protocol.
UNIT III NETWORK SECURITY 12
Network Security Practice: Authentication Applications – Kerberos – X.509 Authentication services
and Encryption Techniques. E-mail Security – PGP – S / MIME – IP Security.
UNIT IV WEB SECURITY 12
Web Security - Secure Socket Layer – Secure Electronic Transaction. System Security - Intruders and
Viruses – Firewalls– Password Security
UNIT V CASE STUDY 13
39
Case Study: Implementation of Cryptographic Algorithms – RSA – DSA – ECC (C / JAVA
Programming). Network Forensic – Security Audit - Other Security Mechanism: Introduction to:
Stenography – Quantum Cryptography – Water Marking - DNA Cryptography
Total Lecture Hours 60
Hours
Text Book(s)
1 William Stallings, “Cryptography and Network Security”, PHI/PearsonEducation.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S S M M L S L
CO2 S S M M S L L M L L
CO3 S S S S M M M L L L
CO4 S S M L L M L L L L
CO5 S M M M M L M M L L
*S-Strong; M-Medium; L-Low
40
Course Code SECURITY STANDARDS AND L T P C
COMPLIANCE
Core/elective/Supportive Core 4 0 0 4
Pre - requisite Basic knowledge of Policy, Process, Standard, Syllabus I
Procedure and Compliance version
Course Objectives
The main objectives of this course are to:
1. To understand the risk management process for all organizations.
2. To understand the security standards, compliance, security controls and access controls.
3. To learn what PCI DSS is and understand how it applies to the organizations.
4. To understand the technologies referenced by PCI DSS
5. To understand how to building and maintaining a Secure Network
41
Building and Maintaining a Secure Network: Establishing Firewall Configuration Standards – Tools
and Best Practices – Common Mistakes and Pitfalls – Case Study.
UNIT V STRONG ACCESS CONTROLS 13
Principles of Access Control – Limitations of User Access – Authentication Basics – Windows and
PCI Compliance – POSIX Access Control – CISCO and PCI Requirements – CISCO Enforce Session
Timeout – Physical Security – Random Password for Users – Common Mistakes and Pitfalls – Case
Study.
Total Lecture Hours 60
Hours
Text Book(s)
1 Anne Kohnke, Ken Sigler, Dan Shomaker, “Implementing Cybersecurity: A Guide
to the National Standards and Technology Risk Management Framework” CRC
Press, 2017.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M L S L
CO2 S S M M S L L M L L
CO3 S S M S M L M L S S
CO4 S S M L L M L L S L
CO5 S M M M M L M M L L
*S-Strong; M-Medium; L-Low
42
Course Code MOBILE AND WIRELESS SECURITY L T P C
Core/elective/Supportive Core 4 0 0 4
Pre - requisite Basic knowledge in wireless standards Syllabus I
and Network Security. version
Course Objectives
The main objective of the courses are to:
To ensure effective, automated wireless threat protection, companies and government
organizations should implement a complete wireless security solution covering assets across the
enterprise that enables them to discover vulnerabilities, assess threats, prevent attacks, and ensure
ongoing compliance.
UNIT I INTRODUCTION 12
Security and Privacy for Mobile and Wireless Networks: Introduction- State of the Art- Areas for
Future Research- General Recommendation for Research. Pervasive Systems: Enhancing Trust
Negotiation with Privacy Support: Trust Negotiation- Weakness of Trust Negotiation- Extending
Trust Negotiation to Support Privacy.
UNIT II MOBILE SECURITY 11
MOBILE SECURITY: Mobile system architectures, Overview of mobile cellular systems, GSM and
UMTS Security & Attacks, Vulnerabilities in Cellular Services, Cellular Jamming Attacks &
Mitigation, Security in Cellular VoIP Services, Mobile application security.
UNIT III SECURING WIRELESS NETWORKS 12
SECURING WIRELESS NETWORKS: Overview of Wireless security, Scanning and
Enumerating 802.11 Networks, Attacking 802.11 Networks, Attacking WPA protected 802.11
Networks, Bluetooth Scanning and Reconnaissance, Bluetooth Eavesdropping, Attacking and
Exploiting Bluetooth, Zigbee Security, ZigbeeAttacks .
UNIT IV ADHOC NETWORK SECURITY 12
ADHOC NETWORK SECURITY : Security in Ad Hoc Wireless Networks, Network Security
Requirements, Issues and Challenges in Security Provisioning, Network Security Attacks, Key
Management in Adhoc Wireless Networks, Secure Routing in Adhoc Wireless Networks
43
UNIT V RFID SECURITY 13
RFID SECURITY : Introduction, RFID Security and privacy, RFID chips Techniques and Protocols,
RFID anti-counterfeiting, Man-in-the-middle attacks on RFID systems, Digital Signature Transponder,
Combining Physics and Cryptography to Enhance Privacy in RFID Systems, Scalability Issues in
Large-Scale Applications, An Efficient and Secure RFID Security Method with Ownership Transfer,
Policy-based Dynamic Privacy Protection Framework leveraging Globally Mobile RFIDs, RFID: an
anti-counterfeiting tool.
Total Lecture Hours 60
Hours
Text Book(s)
1 Kia Makki, Peter Reiher, “Mobile and Wireless Network Security and Privacy“,
Springer, ISBN 978-0-387-71057-0, 2007.
2 C. Siva Ram Murthy, B.S. Manoj, “Adhoc Wireless Networks Architectures and
Protocols”, Prentice Hall, x ISBN 9788131706885, 2007.
REFERENCE BOOK(S):
1 NoureddineBoudriga,”Security of Mobile Communications”, ISBN
9780849379413, 2010.
2 Johny Cache, Joshua Wright and Vincent Liu,” Hacking Wireless Exposed:
Wireless Security Secrets & Solutions “, second edition, McGraw Hill, ISBN: 978-
0-07-166662-6, 2010.
RELATED ONLINE CONTENTS (MOOC, SWAYAM, NPTEL, WEBSITES ETC)
1 https://nptel.ac.in/courses/106/105/106105160/
2 https://www.tutorialspoint.com/wireless_security/index.htm
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M L L L
CO2 S S M M S L L M L L
CO3 S S M S M L M L L L
CO4 S S M L L M L L L L
CO5 S M M M M L L L L L
*S-Strong; M-Medium; L-Low
44
Course Code EVOLVING TECHNOLOGIES AND L T P C
THREATS
Core/elective/Supportive Core: 1 4 0 0 4
Pre - requisite Current and Future Technology Trends Syllabus I
version
Course Objectives
The main objectives of this course are to:
1. To understand Web Technology, Robotics and Autonomous Systems
2. To analyze security problems associated with big data
3. To analyze and Build Big data Applications
45
UNIT IV THREATS OF BIG DATA 12
An Approach to Facilitate Security Assurance for Information Sharing and Exchange in BigData:
Applications, UML extensions for XML security, Extensions for policy modeling and integration,
Integrating local security policies into a global security policy, Real-time Network Intrusion
Detection Using Hadoop-Based Bayesian Classifier, Overview on Hadoop based technologies,
Survey of Intrusion Detection Systems, Hadoop-based real-time Intrusion Detection: System
architecture, Practical application scenario and system evaluation.
UNIT V ROBOTICS & AUTONOMOUS SYSTEMS 13
Emerging Security Challenges in Cloud Computing, from Infrastructure-Based Security to Proposed
Provisioned Cloud Infrastructure - Infrastructure security, Cloud service models, Provisioned access
control infrastructure (DACI).
Total Lecture Hours 60
Hours
Text Book(s)
1 Babak Akhgar Hamid Arabnia, “Emerging Trends in ICT Security”, Morgan
Kaufmann, 2013
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M L S L
CO2 S S M M S L L M L L
CO3 S S M S M L M L S S
CO4 S S M L L M L L S L
CO5 S M M M M L M M L L
*S-Strong; M-Medium; L-Low
46
Course Code NETWORK SECURITY AND L T P C
CRYPTOGRAPHY LAB
Core/elective/Supportive Core Lab 0 0 4 4
Pre - requisite Basic knowledge in data structure and network Syllabus I
security. version
Course Objectives
The main objectives of this course are to:
1. To understand the simple client/server model.
2. To understand the insecurity of default passwords, printed passwords and password transmitted
in plain text.
3. To learn the skills for developing the own cryptography algorithms.
LIST OF PROGRAMS 10
1. Implement the following SUBSTITUTION TECHNIQUES concepts:
a) Caesar Cipher b) Play-fair Cipher c) Hill Cipher
2. Implement the Rail fence – row & Column Transformation
3. Implement the DES algorithms
4. Implement the RSA Algorithm
5. Implement the MD5 Algorithm
6. Implement the SHA-1 Algorithm
7. Implement the Signature Scheme - Digital Signature Standard
8. Setup a honey pot and monitor the honeypot on network
9. Perform wireless audit on an access point or a router and decrypt WEP and WPA.
10. Demonstrate Intrusion Detection System (IDS) using any tool.
Course Designed by :
47
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S M M L L L L L
CO2 S S M M L L L L L L
CO3 S S M M L L L L L L
CO4 S S M L L L L L L L
*S-Strong; M-Medium; L-Low
48
Course Code ADVANCE DIGITAL FORENSIC LAB L T P C
Core/elective/Supportive Core Lab : 4 0 0 4 4
Pre - requisite Basic knowledge in Disc file structure of Syllabus I
NTFS, FAT and Forensic Tools. version
Course Objectives
The main objectives of this course are to:
1. To understand the cyber security related activities in real world.
2. To learn the skills for data carving and data hiding
3. To understand the methodology for data carving from any electronic devices.
LIST OF PROGRAMS 10
1. Create an image file from the any storage devices (Disc, secondary memory, memory card).
2. Find the hash values for avoiding data duplication.
3. Find the information form the disc with FAT File system.
4. Find the information form the disc with NTFS file system.
5. Collect log details form running machines.
6. Find the network data transmission with any network forensic tools
7. Find the image form SIM cards by using any mobile forensic tools.
8. To recover the electronic evidence from mobile phone and Tablets.
9. Search a binary image of embedded files in .exe code.
10. Perform memory analysis for windows operating system.
Course Designed by :
49
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S M M L L L L L
CO2 S S M M L L L L L L
CO3 S S M M L L L L L L
CO4 S S M L L L L L L L
*S-Strong; M-Medium; L-Low
LIST OF PROGRAMS 10
Each students have to do 2 Case studies and subject the report concern guides.
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S S L L M M L
CO2 S S S S S L L M L L
CO3 S S S S M M L L L L
CO4 S S S S L L M M L L
*S-Strong; M-Medium; L-Low
50
SEMESTER 4
51
Course Code Project Work Lab L T P C
Core/elective/Supportive Core - 13 8
1. The aim of the project work is to acquire practical knowledge on the implementation of
the programming concepts studied.
2. Each student should carry out individually one project work and it may be a work using the
software packages that they have learned or the implementation of concepts from the papers studied
or implementation of any innovative idea focusing on application-oriented concepts.
3. The project work should be compulsorily done in the college only under the supervision of
the department staff concerned.
Viva Voce
1. Viva-Voce will be conducted at the end of the year by both Internal (Respective Guides) and
52
External Examiners, after duly verifying the Annexure Report available in the College, for a total of
200 marks at the last day of the practical session.
2. Out of 200 marks, 160 marks for project report and 40 marks for Viva Voce.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S M L L L L L
CO2 S S S S M L L L L L
CO3 S S S S M M M L L L
CO4 S S S S M M M L L L
CO5 S S S S M M M L L L
*S-Strong; M-Medium; L-Low
53
ELECTIVE
COURSES
54
Course Code INTRODUCTION TO BIG L T P C
DATA SECURITY
Core/elective/Supportive Electives 4 0 0 4
55
1 Mark Van Rijmenam, “Think Bigger: Developing a Successful Big Data
Strategy for Your Business”, Amazon, 1 edition, 2014
2 Frank Ohlhorst John Wiley & Sons, “Big Data Analytics: Turning Big Data
into Big Money”, John Wiley & Sons, 2013.
REFERENCE BOOK(S):
1 SherifSakr, “Large Scale and Big Data: Processing and Management”, CRC
Press, 2014
2 Sudeesh Narayanan, “Securing Hadoop”, Packt Publishing, 2013.
RELATED ONLINE CONTENTS (MOOC, SWAYAM, NPTEL, WEBSITES
ETC)
1 https://www.cloudera.com/content/cloudera/en/solutions/ Enterprise
solutions/security-for-hadoop.html
2 https://nptel.ac.in/courses/106/104/106104189/
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M L L L
CO2 S S M M L L L L L L
CO3 S S M S M L M L L L
CO4 S S M L L M L L L L
CO5 S M M L L L L L L L
*S-Strong; M-Medium; L-Low
Core/elective/Sup Electives 4 0 0 4
portive
Pre - requisite Basics of AI & an Introduction about ML Syllabus I
version
Course Objectives
The main objectives of this course are to:
1. Enable the students to learn the basic functions of AI, Heuristic Search Techniques.
2. Provide knowledge on concepts of Representations and Mappings and Predicate Logic.
3. Introduce Machine Learning with respect Data Mining, Big Data and Cloud.
4. Study about Applications & Impact of ML.
56
3 Apply basic principles of AI in solutions that require problem solving, K3,
inference, perception, knowledge representation, and learning K5
4 Analyze the impact of machine learning on applications K4,
K5
5 Analyze and design a real world problem for implementation and understand K5
the dynamic behavior of a system
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create
UNIT I INTRODUCTION 12
Introduction: AI Problems - Al techniques - Criteria for success. Problems, Problem Spaces,
Search: State space search - Production Systems - Problem Characteristics - Issues in design
of Search.
UNIT II SEARCH TECHNIQUES 11
Heuristic Search techniques: Generate and Test - Hill Climbing- Best-First, Problem
Reduction, Constraint Satisfaction, Means-end analysis. Knowledge representation issues:
Representations and mappings -Approaches to Knowledge representations -Issues in
Knowledge representations - Frame Problem.
UNIT III PREDICATE LOGIC 12
Using Predicate logic: Representing simple facts in logic - Representing Instance and
Isa relationships - Computable functions and predicates - Resolution - Natural
deduction. Representing knowledge using rules: Procedural Vs Declarative knowledge
- Logic programming - Forward Vs Backward reasoning - Matching - Control
knowledge.
UNIT IV MACHINE LEARNING 12
Understanding Machine Learning: What Is Machine Learning?-Defining Big Data-Big Data
in Context with Machine Learning-The Importance of the Hybrid Cloud-Leveraging the
Power of Machine Learning-The Roles of Statistics and Data Mining with Machine
Learning-Putting Machine Learning in Context-Approaches to Machine Learning.
UNIT V APPLICATIONS OF MACHINE LEARNING 13
Looking Inside Machine Learning: The Impact of Machine Learning on Applications - Data
Preparation-The Machine Learning Cycle.
Total Lecture Hours 60
Hours
Text Book(s)
1 Elaine Rich and Kevin Knight," Artificial Intelligence", Tata McGraw
Hill Publishers company Pvt Ltd, Second Edition, 1991.
2 George F Luger, "Artificial Intelligence",4th Edition, Pearson Education
Publ,2002.
REFERENCE BOOK(S):
1 Machine Learning For Dummies®, IBM Limited Edition by Judith
Hurwitz, Daniel Kirsch.
RELATED ONLINE CONTENTS (MOOC, SWAYAM, NPTEL,
WEBSITES ETC)
1 https://www.ibm.com/downloads/cas/GB8ZMQZ3
57
2 https://www.javatpoint.com/artificial-intelligence-tutorial
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M L L M
CO2 S S M M M M L L L L
CO3 S S M S M L M M L L
CO4 S S M M M M L L M L
CO5 S M M L L L M L M L
*S-Strong; M-Medium; L-Low
Core/elective/Supportiv Electives 4 0 0 4
e
Pre - requisite Basic knowledge in Computer Hardware Syllabus I
and Protocols. version
Course Objectives
The main objective of this courses are:
1. To understand the fundamentals of Internet of Things
2. To learn about the basics of IOT protocols
3. To build a small low cost embedded system using Raspberry Pi.
4. To apply the concept of Internet of Things in the real world scenario.
58
model - Domain model - information model - functional model - communication model - IoT
reference architecture
UNIT III IoT PROTOCOLS 12
Protocol Standardization for IoT – Efforts – M2M and WSN Protocols – SCADA and RFID
Protocols – Unified Data Standards – Protocols – IEEE 802.15.4 – BACNet Protocol – Modbus–
Zigbee Architecture – Network layer – 6LowPAN - CoAP - Security
UNIT IV BUILDING IoT WITH RASPBERRY PI & ARDUINO 12
Building IOT with RASPERRY PI- IoT Systems - Logical Design using Python – IoT Physical
Devices & Endpoints - IoT Device -Building blocks -Raspberry Pi -Board - Linux on Raspberry Pi
- Raspberry Pi Interfaces -Programming Raspberry Pi with Python - Other IoT Platforms -
Arduino.
UNIT V REAL-WORLD APPLICATIONS AND CASE STUDIES 13
Real world design constraints - Applications - Asset management, Industrial automation, smart
grid, Commercial building automation, Smart cities - participatory sensing - Data Analytics for IoT
– Software & Management Tools for IoT Cloud Storage Models & Communication APIs - Cloud
for IoT - Amazon Web Services for IoT.
Total Lecture Hours 60
Hours
Text Book(s)
1 Arshdeep Bahga, Vijay Madisetti, ―Internet of Things – A hands-on approach‖,
Universities Press, 2015
2 Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds), ―Architecting
the Internet of Things‖, Springer, 2011.
REFERENCE BOOK(S):
1 Olivier Hersent, David Boswarthick, Omar Elloumi , ―The Internet of Things
– Key applications and Protocols‖, Wiley, 2012
2 Honbo Zhou, ―The Internet of Things in the Cloud: A Middleware
Perspective‖, CRC Press, 2012.
RELATED ONLINE CONTENTS (MOOC, SWAYAM, NPTEL, WEBSITES
ETC)
1
2
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M L S L
CO2 S S M M S L L M L L
CO3 S S M S M L M L S S
CO4 S S M L L M L L S L
CO5 S M M M M L M M L L
*S-Strong; M-Medium; L-Low
59
Course MALWARE ANALYSIS L T P C
Code
Core/elective/ Electives 4 0 0 4
Supportive
Pre - requisite Operating System, Basics of Malware, Security Syllabus I
Concepts and Algorithms version
Course Objectives
The main objectives of this course are to:
1. To understand the nature of malware, its capabilities, and how it is combated through
detection and classification.
2. To able apply the tools and methodologies used to perform static and dynamic analysis
on unknown executable.
3. To understand the social, economic, and historical context in which malware occurs.
60
Debugger – Exceptions – Modifying Execution with a Debugger. OllyDbg: Loading Malware
– OllyDbg Interface – Memory Map Viewing Threads and Stacks – Executing Code –
Breakpoints – Loading DLLs – Tracing – Exception Handling – Patching – Analyzing
Shellcode.
UNIT V ANTI-DISASSEMBLY AND ANTI-DEBUGGING 13
Anti-Disassembly: Understanding Anti-Disassembly – Defeating Disassembly Algorithm –
Anti-Disassembly Techniques – Obscuring Flow Control – Thwarting Stack-Frame Analysis.
Anti-Debugging: Windows Debugger Detection – Identifying Debugger Behaviour – Defeat
Malware.
Total Lecture Hours 60
Hours
Text Book(s)
1 Michael Sikorski, Andrew Honig, “Practical Malware Analysis”, No
Strach Press, 2012
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S M M L L S L
CO2 S S S M S M L L L L
CO3 S S M S M L M L L L
CO4 S S M M M M L L L L
CO5 S M M M M L L L L L
*S-Strong; M-Medium; L-Low
61
Course APPLICATIONS & SYSTEMS SECURITY L T P C
Code
Core/elective/ Electives 4 0 0 4
Supportive
Pre - requisite Basic knowledge in Network and Syllabus I
Cryptography version
Course Objectives
The main objectives of the course are:
1. To learn about security measures at the application level.
2. to prevent data or code within the app from being stolen or hijacked.
3. To learn about Professional monitoring services
62
Infrastructure Security: IT Infrastructure Management Services, Service Strategy, Service
Design, Service Transition, Service Operation, Continual Service Improvement. Data Centre
Management: Introduction to DCM, Data Center design, Data Center Security Procedure,
Server Security, Storage area network, Virtualization, Introduction of Virtual Private Cloud
(VPC), Cloud Logging and monitoring.
Total Lecture Hours 60
Hours
Text Book(s)
1 Principles of Computer Security: W.A.Coklin, G.White, Fourth Edition,
McGrawHill
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S M M L L L L
CO2 S S S M S M L L L L
CO3 S S M S M L M L L L
CO4 S S S M M M L L L L
CO5 S S S M M L L L L L
*S-Strong; M-Medium; L-Low
Course Objectives
The main objectives of this course are to:
63
1. Learn the concepts of RPA, its benefits, types and models.
2. Gain the knowledge in application of RPA in Business Scenarios.
3. Identify measures and skills required for RPA
UNIT I INTRODUCTION 12
Introduction to RPA - Overview of RPA - Benefits of RPA in a business environment -
Industries & domains fit for RPA - Identification of process for automation - Types of Robots
- Ethics of RPA & Best Practices - Automation and RPA Concepts - Different business
models for implementing RPA - Centre of Excellence – Types and their applications -
Building an RPA team - Approach for implementing RPA initiatives
UNIT II AUTOMATION 11
Role of a Business Manager in Automation initiatives - Skills required by a Business
Manager for successful automation - The importance of a Business Manager in automation -
Analyzing different business processes - Process Mapping frameworks - Role of a Business
Manager in successful implementation – Part 1 - Understanding the Automation cycle – First
3 automation stages and activities performed by different people.
UNIT III AUTOMATION IMPLEMENTATION 12
Evaluating the Automation Implementation Detailed description of last 3 stages and
activities performed by different people - Role of a Business Manager in successful
completion – Part 2 - Activities to be performed post-implementation - Guidelines for
tracking the implementation success - Metrics/Parameters to be considered for gauging
success - Choosing the right licensing option - Sending emails - Publishing and Running
Workflows.
UNIT IV ROBOT 12
Ability to process information through scopes/systems - Understand the skill of information
processing and its use in business - Leveraging automation - Creating a Robot - New
Processes. Establish causality by variable behavior - Understand the skill of drawing
inference or establishing causality by tracking the behavior of a variable as it varies across
time/referenced variable - Leveraging automation for this skill - Robot & new process
creation.
UNIT V ROBOT SKILL 13
Inference from snapshots of curated terms – Omni-source data curation - Multisource trend
tracking - Understand the skill of drawing inference from the behavior of curated terms by
taking snapshots across systems in reference to time/variable(s) - Leveraging automation for
this skill – Robot creation and new process creation for this skill.
Total Lecture Hours 60
64
Hours
Text Book(s)
1 Alok Mani Tripathi” Learning Robotic Process Automation: Create
Software robots and automate business processes with the leading RPA
tool” Packt Publishing Limited March 2018
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M L S L
CO2 S S M M S L L M L L
CO3 S S M S M L M L S S
CO4 S S M L L M L L S L
CO5 S M M M M L M M L L
*S-Strong; M-Medium; L-Low
65
DEPARTMENT OF COMPUTER SCIENCE
MISSION
1. To keep pace with emerging technologies and concepts, students are thrown open to the
ever changing arena, meeting the industry requirements and standards, with the necessary
knowledge and skill sets.
2. Are trained to explore more, at their own pace, knowing the demands of the IT world.
3. Apart from all the technical stuff, to inculcate the students about the Human Values and
Professional ethics and to play a vital role in the society. Imparting them not only as
world class Professionals, but also as tech savvy human beings to serve mankind.
ELECTIVE I:
ELECTIVE II:
1. Malware Analysis
2. Applications & Systems Security
3. Robotic Process Automation for Business
66