B.E CSE Cybersecurity Curriculum Syllabus
B.E CSE Cybersecurity Curriculum Syllabus
B.E CSE Cybersecurity Curriculum Syllabus
CURRICULUM
(REGULATIONS 2019 V21)
FOR
CYBER SECURITY
1 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
SEMESTER I
Hours / Week
S.No Course Code Course Title Category CREDITS
L T P R
THEORY
1. 191LEH101T Technical English HS 3 - - - 3
2. 191MAB101T Engineering Mathematics I BS 3 2 - - 4
3. 191PYB101T Engineering Physics BS 3 - - - 3
4. 191CYB101T Engineering Chemistry BS 3 - - - 3
5. 191GES101T Engineering Graphics ES 2 - 4 - 4
6. 191GES102T Problem Solving through Python Programming ES 3 - - - 3
LABORATORY
7. 191GEB111L Physics and Chemistry Laboratory BS - - 4 - 2
8. 191GES111L Python Programming Laboratory ES - - 3 1 2
TOTAL CREDITS 24
MANDATORY COURSE
& &
9. 191GEM101L Induction Training MC - - 2 - 1
10. 191GEM102T / Heritage of Tamils MC 1 - - 1
^
^
Mandatory to register for the course and earn one credit
&
Mandatory to attend Induction training programme and earn one credit.
SEMESTER II
Hours / Week
S.No Course Code Course Title Category CREDITS
L T P R
THEORY
1. 191LEH201T Professional Communication – BEC Certification HS 3 - - - 3
2. 191MAB201T Engineering Mathematics II BS 3 2 - - 4
3. 191PYB202T Physics for Information Science BS 3 - - - 3
4. 191GES201T Basic Electrical and Electronics Engineering ES 3 - - - 3
5. 191GES204T Programming in C ES 3 - - - 3
LABORATORY
6. 191GES211L Engineering Practices Laboratory ES - - 4 - 2
7. 191GES213L C Programming Laboratory ES - - 3 1 2
MANDATORY COURSE
&& &&
8. 191CYM201T Environmental Science MC 3 - - - 3
*
9. 191GEM211L NSS / NCC /YRC – Phase - I MC - - 2 - 1*
Technology
TOTAL 18 2 9 1 20
^
Mandatory to register for the course and earn one credit
&& Mandatory to register for the course and earn three credits
* The student may opt for any one. They have to complete the respective Phase II and Phase III. Those who are not opting
NSS/NCC/YRC have to opt for Foreign language / Indian constitution in the sixth semester.
2 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
SEMESTER III
Hours / Week
S.No Course Code Course Title Category CREDITS
L T P R
THEORY
LABORATORY
TOTAL CREDITS 24
ONLINE COURSE
$ $
12 Online Course (Optional) PE - - - - 3
** Student may opt for any one. They have to complete the respective Phase II insemester V.
rd th
# Mandatory to do Internship and earn minimum one credit between 3 and 6 semester.
## Students may earn credits in lieu of Professional elective - V in 8th semester.Please refer Clause 26.1.1 of B.E. Regulations 2019.
$ Online courses of three credits each can be considered in lieu of ProfessionalElective – IV and Professional Elective – VI. A
student earned only three credits can drop only Professional Elective – VI. Please refer Clause14.9 of B.E. Regulations 2019.
3 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
SEMESTER IV
S. Hours / Week
Course Code Course Title Category CREDITS
No L T P R
THEORY
LABORATORY
TOTAL CREDITS 22
MANDATORY COURSE
*
9. 191GEM411L NSS / NCC / YRC – Phase - II MC - - 2 - 1*
ONLINE COURSE
$ $
12. Online Course (Optional) PE 3 - - - 3
4 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
SEMESTER V
Hours / Week
S.No Course Code Course Title Category CREDITS
L T P R
THEORY
3. 191CCC502T Cryptography PC 3 - - - 3
4. Professional Elective-I PE 3 - - - 3
5. Open Elective - I OE 3 - - - 3
LABORATORY
TOTAL CREDITS 20
ONLINE COURSE
$ $
11. Online Course (Optional) PE 3 - - - 3
5 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
SEMESTER VI
Hours / Week
S.No Course Code Course Title Category CREDITS
L T P R
THEORY
4. Professional Elective – II PE 3 - - - 3
5. Open Elective - II OE 3 - - - 3
LABORATORY
Interpersonal
6. 191LEH611L HS - - 2 - 1
Skills / Listening and Speaking
TOTAL CREDITS 19
MANDATORY COURSE
ONLINE COURSE
$ $
12. Online Course (Optional) PE 3 - - - 3
6 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
SEMESTER VII
Hours / Week
S.No Course Code Course Title Category CREDITS
L T P R
THEORY
4. Professional Elective – IV PE 3 - - - 3
SEMESTER VIII
THEORY
1. Professional Elective - V PE 3 - - 3
2. Professional Elective - VI PE 3 - - 3
TOTAL 6 - - 20 16
7 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
LIST OF SUBJECTS
8 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
16 191CCC502T Cryptography V 3
TOTAL CREDITS 64
9 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
10 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
11 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
Technology
*
5 191GEM211L NSS / NCC /YRC - Phase I II 1*
*
6 191GEM411L NSS / NCC / YRC - Phase II IV 1*
*
7 191GEM611L NSS / NCC / YRC - Phase III VI 1*
& &
8 191GEM601T Foreign Language / Indian Constitution VI 3
CREDIT DISTRIBUTION
Basic Sciences(BS) 12 7 4 4 27
12 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
Minimum credits
I II III IV V VI VII VIII to be earned for
awarding degree
In plant Training / Internship √ √ √ √ √ 1
Industry Supported Course √ √ √ √ √ -
Mandatory courses (MC) √ √ √ √ 7
Online Courses (PE) √ √ √ √ √ -
13 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
SYLLABUS OF
SEMESTER – I
COURSES
14 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
1. To develop the basic writing skills of the First year Engineering students.
To help learners develop their listening skills, which will, enable them to listen to lectures and enhance their
2.
ability to comprehend by asking questions and seeking clarification.
3. To help learners develop their speaking skills and help them to speak fluently.
4. To inculcate reading habit and to develop effective reading skills.
5. To help students improve their active and passive vocabulary.
15 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
TOTAL PERIODS: 45
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Listening – Listen and comprehend lectures and talks in their area of specialization successfully
CO2: Speaking- Speak appropriately and effectively in varied formal and informal contexts.
CO3: Reading – Read technical texts and write area- specific texts effortlessly
CO4: Writing- Write reports and winning job applications
CO5: Speak convincingly and participate in Group Discussions
Communicate effectively through emails and analyze issues, technical articles and involve in speed
CO6:
reading
TEXT BOOKS:
Sanjay Kumar, PushpLata. English Language and Communication Skills for Engineers, Oxford University
1.
Press 2018
REFERENCE BOOKS:
1. Bailey, Stephen. Academic Writing: A practical guide for students. New York: Rutledge, 2011.
2. Dutt P. Kiranmai and RajeevanGeeta. Basic Communication Skills, Foundation Books: 2013
Means,L. Thomas and Elaine Langlois. English & Communication for Colleges. Cengage Learning USA:
3.
2007
WEBSITES:
1. https://www.usingenglish.com, http://grammarbook.com
JOURNALS:
EXTENSIVE READER:
16 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
TOTAL PERIODS: 60
17 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
The Course aims to equip the students with standard concepts and tools at an intermediate to advanced level that
will serve them well towards tackling more advanced level of mathematics and applications that they would find
useful in their disciplines.
The students will learn:
Examine the consistency of given linear Homogeneous and Non-Homogeneous simultaneous equations
CO1:
by using rank method.
CO2: Find Eigen values, Eigen vectors of square matrices to convert quadratic form in to canonical form
Find the extreme values of functions of single and multivariable functions by using derivatives and partial
CO3:
derivatives respectively.
Evaluate single integral involving trigonometry, algebraic, exponential and logarithmic functions by using
CO4:
methods of substitution and integration by parts.
Find area enclosed by simple closed curve using double integral and volume of solid by using triple
CO5:
integral
TEXT BOOKS:
1. Grewal B.S., - Higher Engineering Mathematics, Khanna Publishers, New Delhi, 43rd Ed., 2014.
2 Joel Hass, Christopher Heil and Maurice D.Weir ―Thomas‗ Calculus‖, 14th Edition, Pearson.
REFERENCE BOOKS:
Bali N.P.and Manish Goyal ― Engineering Mathematics‖ ( For Semester I) Third Edition, University
1.
Science Press.
2. Erwin Kreyszig, Advanced Engineering Mathematics, 10th Edition, John Wiley & Sons.
3. Fritz John and Richard Courant, ―Introduction to Calculus and Analysis‖ Springer.
4. James Stewart, "Calculus: Early Transcendental", Cengage Learning, 7th Edition, New Delhi, 2015.
5 Veerarajan T., Engineering Mathematics, Tata McGraw-Hill, New Delhi.
18 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
To enhance the fundamental knowledge in Physics and its applications relevant to various streams of
1.
Engineering and Technology.
TOTAL PERIODS: 45
19 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
At the end of this course:
CO1: Choose the material for required elastic properties
CO2: Design ultrasonic devices for engineering and medical disciplines
CO3: Design thermal devices for real life domestic applications
CO4: Apply the principles of quantum mechanics to one dimensional motion of particles.
CO5: Select the appropriate laser and optical fibers for industry, medicine and telecommunication applications.
TEXT BOOKS:
1. Bhattacharya D.K &T.Poonam, Engineering Physics , Oxford University Press, 2015.
REFERENCE BOOKS:
20 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
To make the students conversant with boiler feed water requirements, related problems and water
1.
treatment techniques.
2. To get the basic idea about the polymers and applications of polymers and polymer reinforced composites.
It deals with the information about the types of fuels, calorific value calculationsand manufacture of solid,
3.
liquid and gaseous fuels.
It enable the students to gain information about Principles and generation of energy in batteries, nuclear
4.
reactors, solar cells, wind mills and fuel cells
5. To impart knowledge about the nanomaterials synthesis, properties and applications
21 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
TOTAL PERIODS: 45
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Identify an appropriate water treatment technique for the given water sample.
CO2: Choose an appropriate method for polymer synthesis and fabrication of plastics.
CO3: Select a suitable fuel for an application, based on the fuel properties
CO4: Design the electrical power generation technology for nuclear, solar, wind and battery sources.
CO5: Synthesize the nanomaterials for various applications.
TEXT BOOKS:
Kannan P and Ravikrishnan A, ―Engineering Chemistry‖, Sri Krishna, Hitech publishing Company Pvt.
1.
Ltd, 2014
Jain P.C. and Monika Jain, ―Engineering Chemistry‖ Dhanpat Rai, Publishing Company (P) Ltd.,New
2.
Delhi, 2015.
REFERENCE BOOKS:
Dara S.S &S.S Umare, ―A Text book of Engineering Chemistry‖, S.Chand& Company Ltd., New Delhi,
1.
2015.
2. Palanna O.G, ―Engineering Chemistry‖, McGraw Hill Education (India)Pvt. Ltd, Chennai,2017
Vairam S ,P. Kalyani and Suba Ramesh., ―Engineering Chemistry, Wiley India PVT, Ltd, New Delhi,
3.
2013.
22 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
To develop students, graphic skills for communication of concepts, ideas and design of engineering
1.
products.
2. To expose them to existing National standards related to technical drawings.
3. To Familiarize with basic geometrical constructions and orthographic projections.
4. To make the students to draw the different projections of the solids.
5. To view the true shape and apparent shape of the sectioned solids and their developments.
6. To get an idea about 3D views through isometric projections.
23 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
TOTAL PERIODS: 90
COURSE OUTCOMES:
On successful completion of this course, the student will be able to:
CO1: Construct conic sections and cycloids
CO2: Draw the projections of points, Straight lines and planes inclined to both the principal planes.
Draw the projections of the simple solids like cylinder, cone, prisms and pyramids inclined to one of the
CO3:
principle planes.
CO4: Draw the sectional views of simple solids, obtain true shape and develop the sectioned solids.
Construct Orthographic views from pictorial views and the isometric view and isometric projection of
CO5:
simple and truncated solids in vertical position.
TEXT BOOKS:
1. Natarajan K.V., ―A text book of Engineering Graphics‖, Dhanalakshmi Publishers, Chennai, 2009.
REFERENCE BOOKS:
Basant Agarwal and Agarwal C.M., ―Engineering Drawing‖, Tata McGraw Hill Publishing Company
1.
Limited, New Delhi, 2008.
2. Bhatt N.D. and Panchal V.M., ―Engineering Drawing‖, Charotar Publishing House, 50th Edition, 2010.
Dinesh Kumar S, K.Sivakumar and R.Ramadoss, ― Engineering Graphics‖, Maruthi Publishers,
3.
Chennai,2019.
4. Gopalakrishna K.R., ―Engineering Drawing‖ (Vol. I&II combined), Subhas Stores, Bangalore, 2007.
5. Parthasarathy N S and Vela Murali, ―Engineering Graphics‖, Oxford University, Press, New Delhi, 2015.
6. Shah M.B., and Rana B.C., ―Engineering Drawing‖, Pearson, 2nd Edition, 2009.
24 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
The course on Python Programming is intended to enhance the computational and logical thinking of
1. students. Upon completion of the course, the students would be able to master the principles of Python
programming and demonstrate significant experience in problem solving.
TOTAL PERIODS: 45
25 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Develop solutions for simple problems using algorithmic problem solving approach.
CO2: Create programs using simple python statements and expressions
CO3: Apply the concepts of modularity and reusability through user defined functions.
CO4: Solve problems using the concepts of sequential datastructures.
CO5: Build python programs to handle large data using python file handling functions.
CO6: Use exception handling in python application to handle errors.
TEXT BOOKS:
Allen B. Downey, "Think Python: How to Think Like a Computer Scientist, Version 2.0.17 edition, Updated
1.
for Python 3,Shroff/O‗ReillyPublishers, (http://greenteapress.com/wp/thinkpython/)
2. ReemaThareja ―Python Programming using Problem solving Approach‖, Oxford University Press.
REFERENCE BOOKS:
Paul Gries, Jennifer Campbell and Jason Montojo, ―Practical Programming: An Introduction to Computer
1.
Science using Python 3‖, Second edition, Pragmatic Programmers, LLC, 2013.
Robert Sedgewick, Kevin Wayne, Robert Dondero, ―Introduction to Programming in Python: An Inter-
2.
disciplinary Approach, Pearson India Education Services Pvt. Ltd., 2016.
3. Timothy A. Budd, ―Exploring Python‖, Mc-Graw Hill Education (India) Private Ltd. 2015.
26 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
A. PHYSICS LABORATORY
PREREQUISITES:
NIL
COURSE OBJECTIVES:
The purpose of this course is to develop scientific temper in experimental techniques and to reinforce the
1.
physics concepts among the engineering students
INSTRUCTIONAL OBJECTIVES:
1. To gain knowledge in the scientific methods and learn the process of measuring different Physical variables
2. Develop the skills in arranging and handling different measuring instruments
Get familiar on experimental errors in various physical measurements and to plan/ suggest on how the
3.
contributions could be made of the same order, so as to minimize the errors.
TOTAL PERIODS: 30
TEXT BOOKS:
1. G.Rajkumar, Physics laboratory Practical, McGraw Hill publication, 2019.
R.K.Shukla and Anchal Srivastava, Practical Physics, 1st Edition, New Age International (P) Ltd, New
2.
Delhi, 2006.
Physics Laboratory Manual, Faculty Members, Department of Physics, Easwari Engineering College,
3.
Chennai.
27 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
REFERENCE BOOKS:
Chattopadhyay D, P.C.Rakshit and B.Saha, An Advanced Course in Practical Physics, 2nd ed., Books &
1.
Allied Ltd., Calcutta, 1990.
2. Souires G L , Practical Physics, 4th Edition, Cambridge University, UK, 2001.
B. CHEMISTRY LABORATORY
COURSE OBJECTIVES:
1. To make the student to acquire practical skills in the determination of water quality parameters.
2. To acquaint the students with the determination of molecular weight of polymer by using viscometer.
TOTAL PERIODS: 30
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Determine the elastic properties of materials using torsional Pendulum and non-uniform bending.
CO2: Examine the optical properties of light waves using optical fiber, laser and spectrometer grating.
CO3: Find the thermal conductivity of a bad conductor using Lee‘s Disc apparatus
CO4: Analyze the water quality parameters like hardness, chloride and DO content
CO5: Determine the molecular weight and classify the polymers.
CO6: Estimate the strength of acids using different instrumental techniques.
28 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
REFERENCE BOOKS:
29 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
The course on Python programming laboratory is used to write, test and debug simple Python programs.
1. Upon completion of the course, the students would be able to master the concepts of data types, loops,
functions, list, tuples, dictionary, files and GUI.
LIST OF PROGRAMS:
TOTAL PERIODS: 60
30 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Illustrate the essentials of python language like libraries, syntax, data types.
CO2: Create programs using control flow structures in python.
CO3: Develop python program for defining functions and calling them.
CO4: Utilize python lists, tuples, dictionaries for compound data type.
CO5: Design python programs for file handling and exception handling.
CO6: Create GUI application for user defined requirement.
31 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
SYLLABUS OF
SEMESTER – II
COURSES
32 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
To strengthen their listening skills which help them comprehend lectures and talks in their areas
1.
ofspecialization
2. To develop their speaking skills to make technical presentations, participate in Group Discussions.
To develop strategies and skills to enhance their ability to read and comprehend engineering and
3.
technology texts.
4. To foster their ability to write convincing job applications
5. To equip with appropriate skills for writing effective reports.
TOTAL PERIODS: 45
33 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Listening – listen/view and comprehend conversations and short talks delivered in English.
Speaking- participate effectively in informal conversations; introduce themselves and their friends and
CO2:
express opinions in English.
CO3: Reading – read articles of a general kind in magazines and newspapers.
CO4: Writing- write short essays of a general kind and personal letters and emails in English
Revise and edit effectively all written matter by organizing ideas cohesively, coherently, logically and using
CO5:
a wide vocabulary range.
Understand current resources for locating secondary information, and also understand the strategies of
CO6:
effective primary data gathering.
TEXT BOOKS:
Raymond Murphy, English Grammar in Use: Reference and Practice for Intermediate Students,
1.
Cambridge : CUP, 2004
REFERENCE BOOKS:
1. M. Ashraf Rizvi ‗Effective Technical Communication‗, Tata McGraw-Hill, New Delhi, 2005
2. Richard Johnson - Sheehan, Technical Communication Today, Longman Publishing Group, 2011
3. Golding S.R. ‗Common Errors in English Language‗, Macmillan, 1978
WEBSITES:
1. https://owl.purdue.edu
2. https:www.hellolingo.com
JOURNALS:
EXTENSIVE READER:
1. Stephen R. Covey, The Seven Habits of Highly Effective People, Free Press, 1989
34 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
The objective of this course is to familiarize the prospective engineers with techniques in ordinary
1.
differential equations, complex variables and complex integration.
The Study of Laplace transform help to solve the differential equations that occur in various branches of
2.
engineering disciplines.
3. Vector calculus can be widely used for modelling the various laws of physics.
The various methods of complex analysis can be used for efficiently solving the problems that occur in
4.
various branches of engineering disciplines.
35 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
TOTAL PERIODS: 60
COURSE OUTCOMES:
The Course aims to equip the students to deal with advanced level of mathematics and applications that would be
essential for their disciplines.
The students will learn :
CO1: Solve linear first and higher order ordinary differential equations (ODE).
CO2: Solve ODEs by using Laplace transform technique.
CO3: Use vector calculus to convert triple integrals into double and double integrals into single integral.
CO4: Derive necessary condition for a given complex function to be analytic.
CO5: Identify a suitable method of complex integration for evaluating certain indefinite integrals
TEXT BOOKS:
1. Grewal B.S., ―Higher Engineering Mathematics‖, Khanna Publishers, New Delhi, 43rd Edition, 2014.
2. Joel Hass, Christopher Heil and Maurice D.Weir Thomas‗ Calculus , 14th Edition, Pearson.
REFERENCE BOOKS:
1. Erwin Kreyszig, Advanced Engineering Mathematics, 9th Edition, John Wiley & Sons.
N.P.Bali and Manish Goyal ― Engineering Mathematics‖( For Semester II) Third Edition, University
2.
Science Press .
3. Veerarajan T., Engineering Mathematics for first year, Tata McGraw-Hill, NewDelhi.
4. O‗Neil, P.V. ―Advanced Engineering Mathematics‖, Cengage Learning India Pvt., Ltd, New Delhi, 2007 .
5. James Stewart, "Calculus: Early Transcendentals", Cengage Learning, 7th Edition, New Delhi, 2015.
36 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
To enrich the understanding of various types of materials and their applications in Engineering and
1.
Technology.
TOTAL PERIODS: 45
37 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
At the end of this course :
CO1: Gain knowledge on classical and quantum electron theories, and energy band structures
CO2: Acquire knowledge on basics of semiconductor physics and its applications in various devices
CO3: Get knowledge on magnetic properties of materials and their applications in data storage
CO4: Get knowledge on Superconducting materials and their applications in various field
CO5: Have the necessary understanding on the functioning of optical and Modern Engineering materials
CO6: Understand the basics of Nano Materials and quantum structures and their applications in real time
TEXT BOOKS:
1. P.K.Palanisamy, Materials Science. SCITECH Publishers, 2011.
2. S.O.Pillai, Solid State Physics. New Age International(P) Ltd., publishers, 2009
3. V.Rajendran, Materials Science, McGraw Hill Education (India) Private Ltd., 2017
REFERENCE BOOKS:
38 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
TOTAL PERIODS: 45
39 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Apply principles of electric and electronic circuits to solve engineering problems.
CO2: Explain the operating principles of measuring instruments.
CO3: Explain the working principle and applications of electrical machines
CO4: Analyze the characteristics of analog electronic devices
Carry out proper maintenance of electrical equipment by understanding various standards, and use
CO5:
relevant electric/electronic protective devices safely.
TEXT BOOKS:
1. S.Hasan Saeed, D.K.Sharma, Non-Conventional Energy Resources, Katson Books, 3rd Edition, 2013
John Cadick, Mary Capelli-Schellpfeffer, Dennis Neitzel, Al Winfield,‗Electrical Safety Handbook‗,
2.
McGraw-Hill Education, 4thEdition, 2012.
D.P.Kothari and I.J. Nagarath –―Basic Electrical & Electronics Engineering‖, Mc.Grawhill publications, 1st
3.
Edition, 2014.
4. Leonard S Bobrow, ―Foundations of Electrical Engineering‖, Oxford University Press, 2013
REFERENCE BOOKS:
Del Toro, ―Electrical Engineering Fundamentals‖, Pearson Education, New Delhi, 2007 2. John Bird,
1.
―Electrical Circuit Theory and Technology‖, Elsevier, First Indian Edition, 2006.
Maxwell Adams.J, ‗Electrical Safety- a guide to the causes and prevention of electric hazards‗, The
2. Institution of Electric Engineers, IET 1994. 2. Ray A. Jones, Jane G. Jones, ‗Electrical Safety in the
Workplace‗, Jones & Bartlett Learning, 2000.
3. V.K.Mehta&Rohit Mehta, Principles of Electrical Engineering, S.Chand publications, 2nd Edition, 2003.
4. Lawmans, Electricity act 2003, Act No. 36 of 2003, Kamal Publishers, New Delhi.
40 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
1. Learn to think logically and write pseudo code or draw flow charts for problems.
2. Be exposed to the syntax of C.
3. To develop C Programs using basic programming constructs.
4. Learn to use arrays and strings in C.
5. To develop applications in C using functions , pointers and structures
6. To do input/output and file handling in C
TOTAL PERIODS: 45
41 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Compile simple programs using basic C programming concepts.
CO2: Apply arrays and strings for application development.
CO3: Solve complex problems using functions and pointers.
CO4: Organize heterogeneous data with structures and unions.
CO5: Choose suitable file manipulation techniques for data processing.
TEXT BOOKS:
1. ReemaThareja, ―Programming in C, Oxford University Press, Second Edition, 2016.
2. Ajay Mittal ― Programming in C, A practical Approach, Ltd., Pearson Education in South Asia, 2011.
REFERENCE BOOKS:
Byron S. Gottfried, "Schaum's Outline of Theory and Problems of Programming with C", McGraw-Hill
1.
Education, 1996.
PradipDey, Manas Ghosh, ―Fundamentals of Computing and Programming in C, First Edition, Oxford
2.
University Press, 2009.
3. Paul Deitel and Harvey Deitel, ―C How to Program, Seventh edition, Pearson Publication
4. Juneja, B. L and Anita Seth, ―Programming in C, CENGAGE Learning India pvt. Ltd., 2011.
Kernighan, B.W and Ritchie, D.M, ―The C Programming language, Second Edition, Pearson Education,
5.
2006.
42 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
To provide exposure to the students with the concepts involved in product realization by carrying out
1. manufacturing shop exercises. Hands-on practice with manufacturing shop exercises and assembly
leading to realization of a new product in a group.
TOTAL PERIODS: 30
43 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
Residential house wiring using switches, fuse, indicator, lamp and energy meter.
Fluorescent lamp wiring.
Stair case wiring
Measurement of electrical quantities – voltage, current, power & power factor in RLC circuit.
Measurement of energy using single phase energy meter.
Measurement of resistance to earth of electrical equipment.
III ELECTRONICS ENGINEERING PRACTICE
Electronic components and equipment‘s – Resistor, colour coding measurement of AC signal parameter
(peak- peak, RMS period, frequency) using CR.
Logic gates AND, OR, EX-OR and NOT.
Generation of Clock Signal.
Soldering practice – Components Devices and Circuits – Using general purpose PCB.
Measurement of ripple factor of HWR and FWR.
TOTAL PERIODS: 30
COURSE OUTCOMES:
On successful completion of this course, the student will be able to:
CO1: Fabricate carpentry components and pipe connections including plumbing works.
CO2: Use welding equipment to join the structures.
CO3: Carry out the basic machining operations
CO4: Make the models using sheet metal works
Carry out basic home electrical works and Understand works of Home Appliances Measure the electrical
CO5:
quantities
CO6: Elaborate on the Electronic components, Logic gates and soldering practice.
44 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
LIST OF EXPERIMENTS
1. Programs using only I/O functions.
2. Programs to study operators and data types.
3. Programs based on control structures (IF, SWITCH CASE).
4. Programs using FOR and WHILE loops.
5. Programs using single dimensional arrays.
6. Programs using multi dimensional arrays.
7. Programs on Sorting and Searching using arrays.
8. Programs based on String manipulations.
9. Programs based on User Defined Functions.
10. Programs using Functions with Parameters.
11. Programs using Storage Classes.
12. Programs to introduce Pointers.
13. Programs using Structures and Union.
14. Programs using Array of Structures.
15. Programs based on Files.
MINI PROJECT:
Create a ―Railway reservation system / Airline reservation system with the following
1.
modules
Booking
Availability checking
Cancellation
Prepare chart
TOTAL PERIODS: 60
45 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Develop simple programs using basic constructs in C programming.
CO2: Develop C programs for simple applications making use of arrays and strings.
CO3: Implement modular programming with functions.
CO4: Build programs with storage classes and pointers for memory management.
CO5: Construct programs with user defined data types.
CO6: Design applications using file processing techniques.
46 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
1. To appreciate and acquire knowledge about nature, environmental education and biodiversity.
To understand the interrelationship between living organism and environment, environment functions and
2.
its value.
3. To assess the environmental pollution and its impact on the human world.
4. To find and implement scientific, economic and political solutions to environmental problems.
5. To gain knowledge about waste management and resource recovery for protecting the environment.
47 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
TOTAL PERIODS: 45
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Analyze various threat to biodiversity for its conservation
CO2: Select a suitable method to conserve natural resources for sustainable development.
CO3: Apply necessary steps for pollution prevention and disaster management..
CO4: Plan for a sustainable lifestyle to protect the environment
CO5: Apply the technique to recover resources from the waste.
TEXT BOOKS:
1. Benny Joseph, ‗Environmental Science and Engineering‗, Tata McGraw-Hill, New Delhi, 2006.
Handbook of Solid Waste Management (McGraw-Hill Handbooks), George Tchobanoglous, Frank Kreith,
2.
Publisher: McGraw-Hill Education; 2 edition July, 2002
REFERENCE BOOKS:
R.K. Trivedi, ‗Handbook of Environmental Laws, Rules, Guidelines, Compliances and Standards‗, Vol. I
1.
and II, Enviro Media.
2. Dharmendra S. Sengar, ‗Environmental law‗, Prentice hall of India PVT LTD,New Delhi, 2007.
3. Rajagopalan, R, ‗Environmental Studies-From Crisis to Cure‗, Oxford University Press 2005.
Waste Management and Resource Recovery, Charles R. Rhyner, Leander J.Schwartz, Robert B. Wenger,
4.
Mary G. Kohrell, CRC Press Published August 31, 1995.
Industrial wastewater management, treatment and disposal, Water management‖ Federation Alexandria
5.
Virgiia, Third Edition, 2008.
48 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
SYLLABUS OF
SEMESTER – III
COURSES
49 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
1. To extend student‗s logical and mathematical maturity and ability to deal with abstraction.
To introduce most of the basic terminologies used in computer science courses and application of ideas to
2.
solve practical problems.
3. To understand the basic concepts of Combinatorics and graph theory.
4. To familiarize the applications of algebraic structures.
To understand the concepts and significance of lattices and Boolean algebra which are widely used in
5.
computer science and engineering.
TOTAL PERIODS: 60
50 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Identify the consistency of the given propositions
CO2: Use basic terminologies of counting principles to solve practical problems in CSE and IT
CO3: Apply Graph theoretical ideas which are highly useful in networking and data structures.
CO4: Recall the concepts of groups and fields which are used in coding theory.
CO5: Produce results in Lattices and Boolean algebras analogues to results in group theory.
TEXT BOOKS:
Rosen, K.H., "Discrete Mathematics and its Applications", 7th Edition, Tata McGraw Hill Pub. Co. Ltd.,
New Delhi, Special Indian Edition, 2011.
1. Unit-II: Sections: 4.1, 4.2, 5.1, 5.2, 5.3, 6.1, 6.2, 6.4, 6.5, 6.6
Unit-III: Sections: 8.1, 8.2, 8.3, 8.4, 8.5
Unit-IV: Sections: 11.1, 11.2, 11.3, 11.4, 11.5
Tremblay, J.P. and Manohar.R, ―Discrete Mathematical Structures with Applications to Computer Science",
Tata McGraw Hill Pub. Co. Ltd, New Delhi, 30th Reprint, 2011.
REFERENCE BOOKS:
Grimaldi, R.P. "Discrete and Combinatorial Mathematics: An Applied Introduction", 4th Edition, Pearson
1.
Education Asia, Delhi, 2007.
Lipschutz, S. and Mark Lipson., "Discrete Mathematics", Schaum‗s Outlines, Tata McGraw Hill Pub. Co.
2.
Ltd., New Delhi, 3rd Edition, 2010.
3. Koshy, T. "Discrete Mathematics with Applications", Elsevier Publications, 2006.
51 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
TOTAL PERIODS: 45
52 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Simplify the Boolean expressions using different methods.
CO2: Design and analyse the combinational logic circuits.
Apply the fundamental knowledge of digital principles to design and implement synchronous and
CO3:
asynchronous sequential circuits.
CO4: Write simple HDL codes for the combinational and sequential digital circuits using Verilog.
Assess the nomenclature and technology in the area of memory devices and apply the concepts in real
CO5:
time applications.
TEXT BOOKS:
M. Morris R. Mano, Michael D. Ciletti, ―Digital Design: With an Introduction to the Verilog HDL, VHDL, and
1.
System Verilog‖, 6th Edition, Pearson Education, 2017.
REFERENCE BOOKS:
Charles H. Roth Jr, Larry L. Kinney, Fundamentals of Logic Design, Sixth Edition, CENGAGE Learning,
1.
2013
2. Donald D. Givone, Digital Principles and Design‖, Tata Mc Graw Hill, 2003
3. John F. Wakerly, Digital Design Principles and Practices, Fifth Edition, Pearson Education, 2017
4. Kharate G. K., Digital Electronics, Oxford University Press, 2010
53 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
TOTAL PERIODS: 45
54 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Choose the appropriate process model for software development
CO2: Classify the requirements of the project development, as functional and non-functional
CO3: Integrate the architectural styles for software design
CO4: Apply the appropriate testing strategies for software verification and validation
CO5: Estimate the risk and cost for effective project management
TEXT BOOKS:
1. Ian Sommerville, ―Software Engineering‖, 9th Edition, Pearson Education Asia, 2011.
Roger S. Pressman, ―Software Engineering – A Practitioner‘s Approach‖, Seventh Edition, Mc Graw-Hill
2.
International Edition, 2010.
REFERENCE BOOKS:
1. Kelkar S.A., ―Software Engineering‖, Prentice Hall of India Pvt Ltd, 2007.
2. Pankaj Jalote, ―Software Engineering, A Precise Approach‖, Wiley India, 2010.
3. Rajib Mall, ―Fundamentals of Software Engineering‖, Third Edition, PHI Learning Private Limited, 2009
4. Stephen R.Schach, ―Software Engineering‖, Tata McGraw-Hill Publishing Company Limited, 2007.
55 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
TOTAL PERIODS: 45
56 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Apply the concepts of object oriented programming using C++.
CO2: Make use of functions and constructors for complex problems.
CO3: Construct programs with inheritance and polymorphism.
CO4: Implement operator overloading concept with type conversion.
CO5: Develop programs using files, templates and exception handling
CO6: Build real world applications using Object Oriented Concepts.
TEXT BOOKS:
Balaguruswamy E. ―Object Oriented Programming with C++‖, 6th edition, Tata McGraw Hill Education,
1.
2015
2. Bjarne Stroustrup ,‖The C++ Programming Language‖, 4th Edition, Addison Wesley, 2015
3. Robert Lafore, ―Object-Oriented Programming in C++‖, Fourth Edition, Sams Publication, 2002
REFERENCE BOOKS:
57 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
TOTAL PERIODS: 45
58 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Implement the abstract data types of Linear and Non Linear data structures
CO2: Choose the appropriate linear data structures for real world applications
CO3: Organize the data using suitable tree data structures.
CO4: Solve the real world problems using graph data structures.
CO5: Analyze sorting, searching and hashing algorithms for data access
TEXT BOOKS:
1. Mark Allen Weiss, ―Data Structures and Algorithm Analysis in C, 2nd Edition, Pearson Education,2018.
2. ReemaThareja, ―Data Structures Using C, Second Edition , Oxford University Press, 2018
REFERENCE BOOKS:
1. Aho, Hopcroft and Ullman, ―Data Structures and Algorithms‖, Pearson Education,1983
2. Ellis Horowitz, SartajSahni, Susan Anderson-Freed, Fundamentals of Data
3. Stephen G. Kochan, ―Programming in C, 3rd edition, Pearson Education.
Thomas H. Cormen, Charles E. Leiserson, Ronald L.Rivest, Clifford Stein -- Introduction to Algorithms",
4.
Second Edition, Mcgraw Hill, 2002.
59 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
TOTAL PERIODS: 45
60 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Utilize various instruction formats for computer operations.
CO2: Design of arithmetic and logic unit
CO3: Build the data path with pipelining techniques
CO4: Apply various parallel processing architectures for computational problems.
CO5: Analyze the performance of various memory systems and I/O communication
TEXT BOOKS:
Carl Hamacher, ZvonkoVranesic, SafwatZaky and NaraigManjikian, Computer Organization and
1.
Embedded Systems, Sixth Edition, Tata McGraw Hill, 2012.
David A. Patterson and John L. Hennessy, Computer Organization and Design: The Hardware/Software
2.
Interface, Fifth Edition, Morgan Kaufmann / Elsevier, 2014.
REFERENCE BOOKS:
John L. Hennessey and David A. Patterson, Computer Architecture – A Quantitative Approach, Morgan
1.
Kaufmann / Elsevier Publishers, Fifth Edition, 2012.
2. John P. Hayes, Computer Architecture and Organization, Third Edition, Tata McGraw Hill, 2012.
William Stallings, Computer Organization and Architecture – Designing for Performance, Eighth Edition,
3.
Pearson Education, 2010.
61 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
LIST OF EXPERIMENTS:
TOTAL PERIODS: 60
62 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Write functions to implement linear data structure operations using C
CO2: Solve problems using non-linear data structures
CO3: Implement Graph and Traversal algorithms
CO4: Develop searching and sorting algorithms.
CO5: Develop programs using Hashing techniques
63 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
LIST OF EXPERIMENTS:
Design C++ classes with static members, methods with default arguments, friend functions. (For example,
1. design matrix and vector classes with static allocation, and a friend function to do matrix-vector
multiplication)
Implement complex number class with necessary operator overloadings and type conversions such as
2.
integer to complex, double to complex, complex to double etc.
Implement Matrix class with dynamic memory allocation and necessary methods. Give proper constructor,
3.
destructor, copy constructor, and overloading of assignment operator.
4. Overload the new and delete operators to provide custom dynamic allocation of memory.
5. Develop a template of linked-list class and its methods.
Develop templates of standard sorting algorithms such as bubble sort, insertion sort, merge sort, and quick
6.
sort.
7. Design stack and queue classes with necessary exception handling.
Define Point class and an Arc class. Define a Graph class which represents graph as a collection of Point
8.
objects and Arc objects. Write a method to find a minimum cost spanning tree in a graph.
Develop with suitable hierarchy, classes for Point, Shape, Rectangle, Square, Circle, Ellipse, Triangle,
9.
Polygon, etc. Design a simple test application to demonstrate dynamic polymorphism and RTTI.
Write a C++ program that randomly generates complex numbers (use previously designed Complex class)
and writes them two per line in a file along with an operator (+, -, *, or /). The numbers are written to file in
10. the format (a + ib). Write another program to read one line at a time from this file, perform the
corresponding operation on the two complex numbers read, and write the result to another file (one per
line).
MINI PROJECT:
Create a ―Railway reservation system / Airline reservation system with the following modules
11. − Booking
− Availability checking
− Cancellation
TOTAL PERIODS: 60
64 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Develop programs using functions and constructors in C++.
CO2: Write programs using inheritance and polymorphism.
CO3: Implement the concepts of operator overloading in C++.
CO4: Develop programs using template for searching and sorting algorithms.
CO5: Design applications for file manipulation and exception handling.
CO6: Create an application program using the concepts implicated in C++.
65 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
SYLLABUS OF
SEMESTER – IV
COURSES
66 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
To provide necessary basic concepts in probability and random processes for applications such as random
1.
signals, linear systems in communication engineering.
To understand the basic concepts of probability, one and two dimensional random variables and to
2.
introduce some standard distributions applicable to engineering which can describe real life phenomenon.
3. To understand the basic concepts in number theory .
4. To examine the key questions in the Theory of Numbers.
To give an integrated approach to number theory and provide a firm basis for further reading and study in
5.
the subject.
TOTAL PERIODS: 60
67 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Recall the concepts of probability to study discrete and continuous distribution.
Compose the joint probability density function (PDF) of two new random variables by using the PDF of two
CO2:
given random variables and given transformation.
CO3: Apply division algorithm and Euclidean algorithm to find the GCD of any two positive integers.
CO4: Analyze linear congruence‘s to solve a system of linear congruence‘s.
CO5: Revise classical theorems on number theory which help to solve linear congruence‘s.
TEXT BOOKS:
1. Koshy, T., ―Elementary Number Theory with Applications‖, Elsevier Publications, New Delhi, 2002.
Ibe. O.C., "Fundamentals of Applied Probability and Random Processes", Elsevier, 1st Indian Reprint,
2.
2007.
REFERENCE BOOKS:
Hwei Hsu, "Schaum‗s Outline of Theory and Problems of Probability, Random Variables and Random
1.
Processes", Tata McGraw Hill Edition, New Delhi, 2004.
Niven, I., Zuckerman.H.S., and Montgomery, H.L., ―An Introduction to Theory of Numbers‖, John Wiley
2.
and Sons , Singapore, 2004.
San Ling and Chaoping Xing, ―Coding Theory – A first Course‖, Cambridge Publications, Cambridge,
3.
2004..
68 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
TOTAL PERIODS: 45
69 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Analyze the algorithms by time and space complexity.
CO2: Solve the problems using Brute force and Divide-and-Conquer method.
CO3: Solve the problems using Dynamic Programming And Greedy technique.
CO4: Build the solution for the problem using Iterative algorithmic design techniques.
CO5: Design algorithms for the real-world problems.
TEXT BOOKS:
Anany Levitin, ‖Introduction to the Design and Analysis of Algorithms‖, Third Edition, Pearson
1.
Education,2012.
Ellis Horowitz, SartajSahni and SanguthevarRajasekaran, Computer Algoritms / C++,Second Edition,
2.
University Press,2007.
REFERENCE BOOKS:
Alfred V. Aho, John E.Hopcroft and Jeffrey D.Ullman, ‖Data Structures and Algorithms‖, Pearson
1.
Education, Reprint 2006.
2. Harsh Bhasin, ‖Algorithms Design and Analysis‖,Oxford university press,2016.
3. Sridhar S ,‖Design and Analysis of Algorithms‖,Oxford university press,2014.
Thomas H.Cormen, Charles E.Leiserson, Ronald L. Rivest and Clifford Stein, ‖Introduction to Algorithms‖,
4.
Third Edition,PHI Learning Private Limited,2012
WEBSITES:
1. http://nptel.ac.in/
70 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
71 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
TOTAL PERIODS: 45
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Interpret the basics of operating systems
CO2: Apply scheduling, synchronization, threading and deadlock concepts for process management
CO3: Analyze various management scheme for memory allocation
CO4: Implement file system management concepts.
CO5: Build LINUX Multifunction Server
TEXT BOOKS:
Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, ―Operating System Concepts‖, 9th Edition,
1.
John Wiley and Sons Inc., 2012.
REFERENCE BOOKS:
1. Andrew S. Tanenbaum, ―Modern Operating Systems‖, Second Edition, Addison Wesley, 2001.
2. Charles Crowley, ―Operating Systems: A Design-Oriented Approach‖, Tata McGraw Hill Education‖, 1996.
Dhamdhere D. M., ―Operating Systems: A Concept-Based Approach‖, Second Edition, Tata McGraw-Hill
3.
Education, 2007.
4. William Stallings, ―Operating Systems – Internals and Design Principles‖, 7th Edition, Prentice Hall, 2011
WEBSITES:
1. http://nptel.ac.in/
72 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
1. To learn the fundamentals of data models and to represent a database system using ER diagrams
2. To study SQL and relational database design
To understand the internal storage structures using different file and indexing techniques which will help in
3.
physical DB design
To understand the fundamental concepts of transaction processing- concurrency control techniques and
4.
recovery procedures
5. To have an introductory knowledge about the Storage and Query processing Techniques
73 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
TOTAL PERIODS: 45
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Design relational database model for real world applications
CO2: Develop ER model into Relational model for real world scenario
CO3: Apply normalization for effective database design
CO4: Apply Transaction management strategies to achieve Consistency
CO5: Analyse indexing strategies for File organisation and Query Optimization
CO6: Appraise advanced databases over traditional databases
TEXT BOOKS:
Abraham Silberschatz, Henry F. Korth, S. Sudharshan, ―Database System Concepts‖, Sixth Edition, Tata
1.
McGraw Hill, 2011
RamezElmasri, Shamkant B. Navathe, ―Fundamentals of Database Systems‖, Sixth Edition, Pearson
2.
Education, 2011
REFERENCE BOOKS:
74 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
TOTAL PERIODS: 45
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Develop Simple Java programs using Object Oriented Programming principles
CO2: Develop Java programs with the concepts inheritance and interfaces.
CO3: Build Java applications using exceptions and I/O streams.
CO4: Develop Java applications with threads and generics classes.
CO5: Develop interactive Java programs using swings.
TEXT BOOKS:
1. Cay S. Horstmann, Gary cornell, ―Core Java Volume –I Fundamentals‖, 9th Edition, Prentice Hall, 2013.
2. Herbert Schildt, ―Java The complete reference‖, 8th Edition, McGraw Hill Education, 2011.
REFERENCE BOOKS:
Danny Poo, Derek Kiong, Swarnalatha Ashok, ―Object-Oriented Programming and Java‖, 2nd Edition,
1.
Springer Publication, 2008.
2. Paul Deitel, Harvey Deitel, ―Java SE 8 for programmers‖, 3rd Edition, Pearson, 2015.
3. Steven Holzner, ―Java 2 Black book‖, Dreamtech press, 2011.
Timothy Budd, ―Understanding Object-oriented programming with Java‖, Updated Edition, Pearson
4.
Education, 2000.
76 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
LIST OF EXPERIMENTS
77 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
a. Sequential
b. Indexed
c. Linked
TOTAL PERIODS: 60
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Create shell program for simple applications
CO2: Develop programs for various CPU Scheduling Algorithms
CO3: Implement Deadlock avoidance and Detection techniques
Implement the concepts of Semaphore, Inter Process Communications and threads to solve real time
CO4:
applications
CO5: Analyze the performance of various Page Replacement Algorithms
CO6: Create File Organization and File Allocation Strategies in Operating Systems
78 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
LIST OF EXPERIMENTS
Data Definition Commands, Data Manipulation Commands for inserting, deleting, updating and retrieving
1.
Tables and Transaction Control statements
2. Database Querying – Simple queries, Nested queries, Sub queries and Joins
3. Views, Sequences, Synonyms
4. Database Programming: Implicit and Explicit Cursors
5. Procedures and Functions
6. Triggers
7. Exception Handling
8. Database Design using ER modelling, normalization and Implementation for any application
9. Database Connectivity with Front End Tools
10. Case Study using real life database applications
TOTAL PERIODS: 60
79 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Apply data definitions and manipulation commands
CO2: Create Nested and Join Queries for given real world scenario
CO3: Create Views, Sequences and Synonyms for tables
CO4: Develop simple programs with Cursors, Functions, Procedures, Exception handling and triggers .
CO5: Construct real time applications using Front end Tools with database connectivity
WEBSITES:
1. spoken-tutorial.org
80 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
LIST OF EXPERIMENTS
Develop a Java application to generate Electricity bill. Create a class with the following members:
Consumer no., consumer name, previous month reading, current month reading, type of EB connection (i.e
1.
domestic or commercial). Compute the bill amount using the following tariff.
If the type of the EB connection is domestic, calculate the amount to be paid as follows:
● First 100 units - Rs. 1 per unit
● 101-200 units - Rs. 2.50 per unit
● 201-500 units - Rs. 4 per unit
● >501 units - Rs. 6 per unit
If the type of the EB connection is commercial, calculate the amount to be paid as follows:
● First 100 units - Rs. 2 per unit
● 101-200 units - Rs. 4.50 per unit
● 201 -500 units - Rs. 6 per unit
● >501 units - Rs. 7 per unit
Develop a Java application to implement currency converter (Dollar to INR, EURO to INR, Yen to INR and
2. vice versa), distance converter (meter to KM, miles to KM and vice versa), time converter (hours to
minutes, seconds and vice versa) using packages.
Develop a Java application with Employee class with Emp_name, Emp_id, Address, Mail_id, Mobile no. as
members. Inherit the classes, Programmer, Assistant Professor, Associate Professor and Professor from
3. employee class. Add Basic Pay (BP) as the member of all the inherited classes with 97% of BP as DA, 10
% of BP as HRA, 12% of BP as PF, 0.1% of BP for staff club fund. Generate pay slips for the employees
with their gross and net salary.
Design a Java interface for ADT Stack. Implement this interface using array. Provide necessary exception
4.
handling in both the implementations.
5. Write a program to perform string operations using Array List. Write functions for the following
a. Append - add at end
b. Insert - add at particular index
81 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
c. Search
d. List all string starts with given letter
Write a Java Program to create an abstract class named Shape that contains two integers and an empty
method named print Area(). Provide three classes named Rectangle, Triangle and Circle. such that each
6.
one of the classes extends the class Shape. Each one of the classes contains only the method print Area ()
that prints the area of the given shape.
7. Write a Java program to implement user defined exception handling.
Write a Java program that reads a file name from the user, displays information about whether the file
8.
exists, whether the file is readable, or writable, the type of file and the length of the file in bytes.
Write a Java program that implements a multi-threaded application that has three threads. First thread
9. generates a random integer every 1 second and if the value is even, second thread computes the square of
the number and prints. If the value is odd, the third thread will print the value of cube of the number.
10. Write a Java program to find the maximum value from the given type of elements using a generic function.
11. Design a calculator using event-driven programming paradigm of Java with the following options.
a. Decimal manipulations
b. Scientific manipulations
12. Develop a mini project for any application using Java concepts.
TOTAL PERIODS: 60
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Develop Simple application using Classes and Objects.
CO2: Develop Java applications using Packages, Inheritance, Abstract Classes and Interfaces.
CO3: Build Java application using Array list and Exception handling.
CO4: Develop Java programs using Multithreading and I/O Streams.
CO5: Develop Java application using generic functions and event handling.
CO6: Create a real time application using Java concepts
82 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
SYLLABUS OF
SEMESTER – V
COURSES
83 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
UNIT PERIODS
I FUNDAMENDALS AND PHYSICAL LAYER L - 9, T - 3
Networks – Network Types – Internet Architecture - Protocol Layering – TCP/IP Protocol suite – OSI Model –
Physical Layer: Performance – Transmission media – Switching – Circuit-switched Networks – Packet Switching.
UNIT PERIODS
II DATA-LINK LAYER & MEDIA ACCESS L - 9, T - 3
Link layer Addressing - Services – Framing – Error Detection – Flow control – HDLC - Media access control –
Ethernet (802.3) – Wireless LANs – IEEE 802.11 – Bluetooth.
UNIT PERIODS
III NETWORK LAYER L - 9, T - 3
Network Layer Services – Switch basics – Basic Internetworking (IP, CIDR, ARP, DHCP and ICMP) - IPV4
Addressing – IPV6 Protocol - Routing (RIP, OSPF, metrics) – Global Internet (Areas, BGP, IPv6), Multicast –
addresses – multicast routing (DVMRP, PIM).
UNIT PERIODS
IV TRANSPORT LAYER L - 9, T - 3
Overview of Transport layer – UDP – Reliable byte stream (TCP) – Connection management – Flow control –
Retransmission – TCP Congestion control – Congestion avoidance (DECbit, RED) – QoS – Application
requirements.
UNIT PERIODS
V APPLICATION LAYER L - 9, T - 3
WWW and HTTP – FTP – Electronic Mail (SMTP, POP3, IMAP, MIME) –Telnet –SSH – DNS – SNMP.
TOTAL PERIODS: 60
84 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Assess the required functionality at each layer
CO2: Analyze the flow of information in the network
CO3: Apply the various routing algorithms.
CO4: Appraise QoS principles based on Congestion Control methods.
CO5: Analyze the working of various application layer protocols
TEXT BOOKS:
1. Behrouz A. Forouzan, Data Communications and Networking, Fifth Edition TMH, 2013.
Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems Approach‖, Fifth Edition, Morgan
2.
Kaufmann Publishers, 2011.
REFERENCE BOOKS:
85 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
UNIT PERIODS
I CYBER SECURITY FUNDAMENTALS 9
Introduction to Cyber Security - Security challenges - Essentials of Security - Impacts due to lack of security -
Challenges of Security - Security Model Work - Confidentiality, Integrity, and Availability (CIA) Triad - Types of
Security Threats - Hackers - Types of hackers
UNIT PERIODS
II NETWORK AND SECURITY CONCEPTS 9
Information Assurance Fundamentals - Basic Cryptography - Symmetric Encryption - Public Key Encryption - The
Domain Name System (DNS) - Firewalls - Virtualization - Radio-Frequency Identification - Case Study: Microsoft
Windows Security Principles.
UNIT PERIODS
III ATTACKER TECHNIQUES AND EXPLOITATION 9
Anti Forensics - Proxies - Tunneling Techniques - Fraud Techniques: Phishing, Smishing, Vishing, and Mobile
Malicious Code, Rogue Antivirus, Click Fraud - Exploitation: Techniques to Gain a Foothold - DoS Conditions -
Brute Force and Dictionary Attacks - Misdirection, Reconnaissance, and Disruption Methods.
UNIT PERIODS
IV DETECTION AND PREVENTION OF MALICIOUS CODES 9
Self-Replicating Malicious Code - Evading Detection and Elevating Privileges - Rootkits - Spyware - Attacks against
Privileged User Accounts and Escalation of Privileges - Token Kidnapping - Virtual Machine Detection - Stealing
Information and Exploitation.
UNIT PERIODS
V DEFENSE AND ANALYSIS TECHNIQUES 9
Memory Forensics - Capabilities of Memory Forensics - Memory Analysis Frameworks - Dumping Physical Memory
- Installing and Using Volatility - Finding Hidden Processes - Volatility Analyst Pack.
TOTAL PERIODS: 45
86 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Understand the basics of cyber security, cyber threats.
CO2: Apply network security solutions to prevent the users and systems connecting tounknown locations.
CO3: Classify various types of attacks and learn the tools to launch the attacks
CO4: Apply intrusion techniques to detect intrusion
CO5: Apply intrusion prevention techniques to prevent intrusion
TEXT BOOKS:
Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short - Cybersecurity Essentials, October 2018,
1.
Sybex publications, ISBN: 9781119362395
James Graham, Ryan Olson, Rick Howard - Cyber Security Essentials Paperback, Auerbach Publications
2.
(O‘reilly), 1st edition (15 December 2010), ISBN-10 : 1439851239, ISBN-13 : 978-1439851234, eBook
REFERENCE BOOKS:
87 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
UNIT PERIODS
I INTRODUCTION TO SECURITY 9
IComputer Security Concepts – The OSI Security Architecture – Security Attacks – Security Services and
Mechanisms – A Model for Network Security – Classical encryption techniques:Substitution techniques,
Transposition techniques, Steganography – Foundations of modern cryptography: Perfect security – Information
Theory – Product Cryptosystem – Cryptanalysis.
UNIT PERIODS
II SYMMETRIC CIPHERS 9
Number theory – Algebraic Structures – Modular Arithmetic - Euclid‗s algorithm – Congruence andmatrices –
Group, Rings, Fields, Finite Fields
SYMMETRIC KEY CIPHERS: SDES – Block Ciphers – DES, Strength of DES – Differential andlinear cryptanalysis
– Block cipher design principles – Block cipher mode of operation – Evaluationcriteria for AES – Pseudorandom
Number Generators – RC4 – Key distribution.
UNIT PERIODS
III ASYMMETRIC CRYPTOGRAPHY 9
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing –Factorization – Euler‘s
totient function, Fermat‘s and Euler‘s Theorem – Chinese RemainderTheorem – Exponentiation and logarithm
ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key management – DiffieHellman key
exchange -– Elliptic curve arithmetic – Elliptic curve cryptography.
UNIT PERIODS
IV INTEGRITY AND AUTHENTICATION ALGORITHMS 9
Authentication requirement – Authentication function – MAC – Hash function – Security of hashfunction: HMAC,
CMAC – SHA – Digital signature and authentication protocols – DSS – Schnorr
Digital Signature Scheme – ElGamal cryptosystem – Entity Authentication: Biometrics, Passwords,Challenge
Response protocols – Authentication applications – Kerberos
MUTUAL TRUST: Key management and distribution – Symmetric key distribution using symmetric and asymmetric
encryption – Distribution of public keys – X.509 Certificates.
88 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
UNIT PERIODS
V CYBER CRIMES AND CYBER SECURITY 9
Cyber Crime and Information Security – classifications of Cyber Crimes – Tools and Methods –Password Cracking,
Keyloggers, Spywares, SQL Injection – Network Access Control – Cloud Security – Web Security – Wireless
Security
TOTAL PERIODS: 45
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
Understand the fundamentals of networks security, security architecture, threats and
CO1:
vulnerabilities
CO2: Apply the different cryptographic operations of symmetric cryptographic algorithms
CO3: Apply the different cryptographic operations of public key cryptography
CO4: Apply the various Authentication schemes to simulate different applications.
CO5: Understand various cyber crimes and cyber security.
TEXT BOOKS:
William Stallings, "Cryptography and Network Security - Principles and Practice", Seventh
1.
Edition, Pearson Education, 2017.
Nina Godbole, SunitBelapure, ―Cyber Security: Understanding Cyber crimes, Computer
2.
Forensics and Legal Perspectives‖, First Edition, Wiley India, 2011.
REFERENCE BOOKS:
Behrouz A. Ferouzan, DebdeepMukhopadhyay, "Cryptography and Network Security", 3rd
1.
Edition, Tata Mc Graw Hill, 2015.
Charles Pfleeger, Shari Pfleeger, Jonathan Margulies, "Security in Computing", Fifth
2.
Edition, Prentice Hall, New Delhi, 2015.
89 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
LIST OF EXPERIMENTS
1. Learn to use various networking commands and examine.
2. Write a program to implement socket programming.
3. Write a HTTP web client program to download a web page using TCP / UDP sockets.
4. Write a program to implement DNS using TCP / UDP sockets.
Write a program to implement Echo client and echo server and chat application using Transport layer
5.
protocol.
6. Implementation of File Transfer using TCP / UDP.
7. Study of Network simulator (NS)
8. Simulation of Congestion / flow control Algorithms using NS.
9. Performance of TCP and UDP using Simulation tool.
10. Simulation of Distance Vector and Link state Routing algorithm.
11. Implementation of IPv4 and IPv6
12. Implementation of SMTP
13. Implementation of error correction code (like CRC).
TOTAL PERIODS: 60
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Apply networking commands for various operating systems.
CO2: Implement various protocols using TCP / UDP sockets.
CO3: Implement Cyclic Redundancy Check for error detection and correction.
CO4: Analyze the performance of various network protocols using simulation tools.
CO5: Evaluate the various routing algorithms for finding optimal path
90 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OBJECTIVES:
LIST OF EXPERIMENTS
Write a program to implement the following cipher techniques to perform encryption and decryption
Caesar Cipher
1.
Playfair Cipher
Hill Cipher
Write a program to implement the following transposition techniques
2. (i) Rail fence technique –Row major transformation
(ii) Rail fence technique - Column major transformation
3. Write a program to implement DES algorithm
4. Write a program to implement RSA Encryption algorithm
5. Write a program to implement AES algorithm
Write a program to implement the Diffie-Hellman Key Exchange mechanism. Consider one of the parties
6.
as Alice and the other party as bob.
7. Write a program to calculate the message digest of a text using the SHA-1 algorithm.
8. Write a program to calculate the message digest of a text using the MD-5 algorithm.
9. Write a program to implement digital signature standard.
TOTAL PERIODS: 30
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Develop a code for classical encryption techniques.
CO2: Build the symmetric algorithms.
CO3: Build the asymmetric algorithms.
CO4: Construct a code for various Authentication schemes.
Apply the principles of digital signature.
CO5:
91 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
SYLLABUS OF
SEMESTER – VI
COURSES
92 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
TOTAL PERIODS: 45
93 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Apply IP sec protocols in network layer and transport layer.
CO2: Design firewalls for trusted system.
CO3: Investigate cyber crimes using computer forensics techniques.
CO4: Use forensics tools for evidence collection.
CO5: Analyze forensics data for data validation.
TEXT BOOKS:
Man Young Rhee, ―Internet Security: Cryptographic Principles‖, ―Algorithms and Protocols, Wiley
1.
Publications, 2003.
Nelson, Phillips, Enfinger, Steuart, ―Computer Forensics and Investigations‖, Cengage Learning, India
2.
Edition, 2008.
REFERENCE BOOKS:
94 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
The Need for Cyber Threat Intelligence: The menace of targeted attacks, The monitor– and–respond strategy, Why the
strategy is failing, Cyber Threat Intelligence Defined, Key Characteristics: Adversary based, Risk focused, Process
oriented, Tailored for diverse consumers, The Benefits of Cyber Threat Intelligence
UNIT TITLE PERIODS
II DEVELOPING CYBER THREAT INTELLIGENCE REQUIREMENTS 9
Assets That Must Be Prioritized: Personal information, Intellectual property, Confidential business information,
Credentials and IT systems information, Operational systems. Adversaries: Cybercriminals, Competitors and cyber
espionage agents, Hack activists. Intelligence Consumers: Tactical users, Operational users, Strategic users
UNIT TITLE PERIODS
III COLLECTING CYBER THREAT INFORMATION 9
Threat Indicators, File hashes and reputation data, Technical sources: honey pots and scanners, Industry sources:
malware and reputation feeds. Level 2: Threat Data Feeds, Cyber threat statistics, reports, and surveys, Malware
analysis. Level 3: Strategic Cyber Threat Intelligence, Monitoring the underground, Motivation and intentions, Tactics,
techniques, and procedures
UNIT TITLE PERIODS
IV ANALYZING AND DISSEMINATING CYBER THREAT INTELLIGENCE 9
Information versus Intelligence, Validation and Prioritization: Risk scores, Tags for context, Human assessment.
Interpretation and Analysis: Reports, Analyst skills, Intelligence platform, Customization. Dissemination: Automated feeds
and APIs, Searchable knowledge base, Tailored reports
UNIT TITLE PERIODS
V OPEN SOURCE SOFTWARE DEVELOPMENT 9
Types of Partners: Providers of threat indicators, Providers of threat data feeds, Providers of comprehensive cyber threat
intelligence. Important Selection Criteria: Global and cultural reach, Historical data and knowledge, Range of intelligence
deliverables, APIs and integrations, Intelligence platform, knowledge base, and portal, Client services, Access to experts.
Intelligence–driven Security
TOTAL PERIODS: 45
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Study of different Cyber Threat.
CO2: Study the technique to Develop Cyber Threat Intelligence Requirements.
95 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
1. Jon Friedman. Mark Bouchard, CISSP. Foreword by John P. Watters, Cyber Threat Intelligence,
Definitive Guide TM, 2015.
2. Scott J. Roberts, Rebekah Brown, Intelligence– Driven Incident Response: Outwitting the Adversary,
O‘Reilly Media, 2017.
EF REFERENCE BOOKS:
1. Henry Dalziel, How to Define and Build an Effective Cyber Threat Intelligence Capability Elsevier
Science & Technology, 2014.
John Robertson, Ahmad Diab, Ericsson Marin, Eric Nunes, VivinPaliath, Jana
2. Shakarian,PauloShakarian, DarkWeb Cyber Threat Intelligence Mining Cambridge University Press,
2017
3. Bob Gourley, The Cyber Threat, Createspace Independent Pub, 2014.
96 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
TOTAL PERIODS: 60
97 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Make use of regular expressions to perform lexical analysis.
CO2: Develop parsers using parsing algorithms.
CO3: Generate intermediate code for the source program.
CO4: Analyze the various storage allocation strategies for generation of target code
CO5: Apply appropriate code optimization techniques for the given intermediate code.
TEXT BOOKS:
Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman, Compilers: Principles, Techniques and
1.
Tools‖, Second Edition, Pearson Education, 2009
REFERENCE BOOKS:
98 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
1. Equip students with the English language skills required for the successful undertaking
Provide guidance and practice in basic general and classroom conversation and to engage in specific
2.
academic speaking activities.
3. Improve general and academic listening skills
4. Make effective presentations.
TOTAL PERIODS: 30
99 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Listen and respond appropriately.
CO2: Participate in group discussions
CO3: Make effective presentations
CO4: Participate confidently and appropriately in conversations both formal and informal
TEXT BOOKS:
Brooks, Margret. Skills for Success. Listening and Speaking. Level 4, Oxford University Press, Oxford:
1.
2011.
2. Richards, C. Jack. & David Bholke. Speak Now Level 3, Oxford University Press, Oxford: 2010
REFERENCE BOOKS:
Bhatnagar, Nitin and MamtaBhatnagar, Communicative English for Engineers and Professionals. Pearson:
1.
New Delhi, 2010.
2. Hughes, Glyn and Josephine Moate, Practical English Classroom. Oxford University Press: Oxford, 2014.
3. Ladousse, Gillian Porter, Role Play. Oxford University Press: Oxford, 2014
4. Richards C. Jack, Person to Person (Starter). Oxford University Press: Oxford, 2006
5. Vargo, Mari, Speak Now Level 4. Oxford University Press: Oxford, 2013.
100 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
LIST OF EXPERIMENTS
TOTAL PERIODS: 60
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Learn different HEX editors
CO2: Study Encase Forensics.
CO3: Implement and install HEX Editor.
CO4: Use Encase Forensics.
CO5: Extracting Browser Artifacts
101 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
SYLLABUS OF
SEMESTER – VII
COURSES
102 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
TOTAL PERIODS: 45
103 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Apply Human values, skills, and attitudes to become more aware of themselves and their surroundings
CO2: Apply moral rights and values in the Society
CO3: Analyze the role of professional engineer as responsible social experimenter
CO4: Apply the fundamentals of safety, Responsibilities and Rights in real life
CO5: Analyze the global issues related to Engineers
TEXT BOOKS:
1. Mike W. Martin and Roland Schinzinger, ―Ethics in Engineering‖, Tata McGraw Hill, New Delhi, 2003.
Govindarajan M, Natarajan S, Senthil Kumar V. S, ―Engineering Ethics‖, Prentice Hall of India, New Delhi,
2.
2004.
REFERENCE BOOKS:
1. Charles B. Fleddermann, ―Engineering Ethics‖, Pearson Prentice Hall, New Jersey, 2004.
Charles E. Harris, Michael S. Pritchard and Michael J. Rabins, ―Engineering Ethics – Concepts and
2.
Cases‖, Cengage Learning, 2009
3. John R Boatright, ―Ethics and the Conduct of Business‖, Pearson Education, New Delhi, 2003
Edmund G Seebauer and Robert L Barry, ―Fundametals of Ethics for Scientists and Engineers‖, Oxford
4.
University Press, Oxford, 2001
Laura P. Hartman and Joe Desjardins, ―Business Ethics: Decision Making for Personal Integrity and Social
5.
Responsibility‖ Mc Graw Hill education, India Pvt. Ltd.,New Delhi 2013.
6. World Community Service Centre, ‖ Value Education‖, Vethathiri publications, Erode, 2011
104 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
TOTAL PERIODS: 45
105 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Describe computer and network security fundamental concepts and principles.
Acquire the knowledge of various authentication protocols, key exchange mechanism, and
CO2:
digital certificates.
To get better knowledge on fundamental concepts of cryptography, encryption and hashing
CO3:
techniques.
Identify and assess different types of threats and attacks such as social engineering, rootkit,
CO4:
and botnets,etc.
Acquire Demonstrate the ability to select among available network security technology and
CO5:
protocols such as IDS, firewalls, SSL , TLS, etc.
TEXT BOOKS:
Network Security Essentials (Applications and Standards) by William Stallings Pearson
1.
Education.
REFERENCE BOOKS:
Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe
1. Grand, David Ahmad, Hal
Flynn IdoDubrawsky, Steve W.Manzuik and Ryan Permeh, Wiley Dreamtech
2. Cryptography and network Security, Third edition, Stallings, PHI/Pearson
3. A look back at Security Problems in the TCP/IP Protocol Suite, S. Bellovin, ACSAC 2004.
106 | Page
R2019 V-21– Computer Science and Engineering (Cyber Security) Syllabus Easwari Engineering College (Autonomous)
PREREQUISITES:
NIL
COURSE OBJECTIVES:
LIST OF EXPERIMENTS
1. To perform the Foot printing
2. Demonstrate Port scanning
3. Implement Windows and Linux Enumerations
4. Simulate Hacking web applications
5. Simulate Hacking web servers
6. Simulate Network hacking
7. Perform Database hacking
8. Study Sniffer tools
9. Simulate Antivirus Programming
10. Perform Password cracking
TOTAL PERIODS: 60
COURSE OUTCOMES:
Upon completion of this course, student will be able to:
CO1: Learn about the Foot printing
CO2: Learn about the Port scanning
CO3: Know about the Windows and Linux Enumerations
CO4: Know about the Antivirus Programming
CO5: Know about the Password cracking
107 | Page