M Tech Full Time Cloud Computing PDF
M Tech Full Time Cloud Computing PDF
SCHOOL OF COMPUTING
Master of Technology
in
CLOUD COMPUTING
CURRICULUM
(Empowered by Virtusa)
Students will have the ability to adapt, contribute and innovate new technologies and systems in the key
PEO - 1
domains of Cloud computing
Students will be able to perform in technical/managerial roles ranging from design, development, problem
PEO - 2
solving to production support in software industries and R&D sectors in Cloud platform.
PEO - 3 Students will be able to successfully pursue higher education in reputed institutions.
Mission Stmt. - 1 Mission Stmt. - 2 Mission Stmt. - 3 Mission Stmt. - 4 Mission Stmt. - 5
PEO - 1 H H H H H
PEO - 2 H H H H H
PEO - 3 H H H L H
H – High Correlation, M – Medium Correlation, L – Low Correlation
1. (d) Mapping Program Educational Objectives (PEO) to Program Learning Outcomes (PLO)
Communication
Development
Modern Tool
Engineering
Knowledge
Life Long
Design &
Analysis,
Research
Learning
Analysis
Problem
Design,
Usage
PEO - 1 H H H H H H H
PEO - 2 H H H H H H H
PEO - 3 H H H H H L H
1. (a) Program Structure (M. Tech in CLOUD COMPUTING)
Hours/ Hours/
Course Course Course Course
Week Week
Code Title L T P C Code Title L T P C
CC2059 Project Phase-I 0 0 12 6
Career Advancement Course
CAC2001 1 0 1 1 CC2060 Project Phase-II 0 0 32 16
for Engineers - I
Career Advancement Course Total Learning Credits 22
CAC2002 1 0 1 1
for Engineers - II
Career Advancement Course
CAC2003 1 0 1 1
for Engineers - III
Total Learning Credits 3
1. (a) Program Articulation (M. Tech in CLOUD COMPUTING)
Analysis, Design,
Communication
Development
Course
Engineering
Knowledge
Course Name
Design &
Code
Research
CC2021 Web Application Development H H H H H M H
CC2022 Cloud Architectures H H H H H M H
CC2023 Cloud Storage Infrastructure H H H H H L H
CC2024 Data Center Networking H H H H H L H
CC2025 Cloud Security H H H H H M H
CC2026 Managing Virtual Environments H H H H H M H
CC2057 Seminar (Pass/Fail Course) H H H H H H H
CC2059 Project Phase-I H H H H H L H
CC2060 Project Phase-II H H H H H H H
Analysis, Design,
Communication
Development
Modern Tool
Engineering
Knowledge
Research
Usage
CC2131 Design & Development of Cloud Applications H H H H M
CC2132 Application Development Frameworks H H H
CC2133 Scripting for System Administrators H H H H M
CC2134 Data Warehousing and Mining H M H M
CC2135 Converged Networks H H H
CC2136 Network Security H H H
CC2137 Enterprise Storage Systems H M H
CC2138 Object Oriented Software Engineering H L H H H
CC2139 Data Center Virtualization H M H
CC2140 Cloud Application Development H H
CC2141 Cloud Strategy Planning & Management M H
CC2142 Data Science & Big Data Analytics M H H
Semester – I
Hours/ Semester - III
Code Course Title Week C Hours/
L T P Code Course Title Week C
CC2021 Web Application 3 0 2 4 L T P
Development Program Elective – 2 3 0 0 3
CC2022 Cloud Architectures 3 0 2 4 Industry Supportive
3 0 0 3
CC2023 Cloud Storage Infrastructure 3 0 2 4 Elective course – 3
Industry Supportive Elective Industry Supportive
3 0 0 3 3 0 0 3
course – 1 Elective course – 4
Industry Supportive Industry Supportive
0 0 2 1 0 0 2 1
certification course - 1 certification course - 3
CC2012 Data Analysis using 3 0 0 3 Career Advancement
CAC2003 1 0 1 1
Multivariate Techniques and Course for Engineers - III
Forecasting Methods CC2059 Project Phase-I 0 0 12 6
Career Advancement Course CC2057 Seminar (Pass/Fail Course) 0 0 1 1
CAC2002 1 0 1 1
for Engineers – I Total Learning Credits 18
Total Learning Credits 20
Semester - IV
Semester – II Hours/
Hours/ Code Course Title Week C
Code Course Title Week C L T P
L T P CC2060 Project Phase-II 0 0 32 16
CC2024 Data Center Networking 3 0 2 4 Total Learning Credits 16
CC2025 Cloud Security 3 0 2 4
CC2026 Managing Virtual 3 0 2 4
Environments
Program Elective – 1 3 0 0 3
Industry Supportive Elective
3 0 0 3
course – 2
Industry Supportive
0 0 2 1
certification course - 2
Career Advancement Course
CAC2001 1 0 1 1
for Engineers - II
Total Learning Credits 20
Total Credits: 74
WEB APPLICATION DEVELOPMENT L T P C
CC2021 Total Contact Hours - 75 3 0 2 4
Prerequisite
Knowledge in JAVA programming is preferred
PURPOSE
Internet is part and parcel of everybody’s life today. Programming in web is every essential for any IT professional .The
subject provides knowledge to learn and Implement the various web programming technologies of current trend today.
INSTRUCTIONAL OBJECTIVES
1. Understand the current technologies in Internet world
2. Implement client side programming using java script ,CSS
3. Learn and implement advanced and current technologies like AJAX, JQuery
4. Understand the socket programming in Java, Node.JS, Angular JS
5. Learn and implement java server side programming
6. Learn and implement web services
7. Learn various web development frame works
REFERENCES
1. Paul J. Deitel, Harvey Deitel, Abbey Deitel, “Internet and World Wide Web How to Program”, Edition 5, ISBN
0132151006, 9780132151009,2011.
2. Chris Bates, “Web Programming – Building Intranet applications”, Wiley Publications, 3rdEdition,2009.
3. Node.js, MongoDB and Angular Web Development, Second Edition, 2018, Pearson Education.
4. Jeffrey C. Jackson, “Web Technologies A computer Science Perspective”, Pearson,2011.
5. Eilliote, Rusty Harold, “Java Network Programming”, 3/e, O'Reilly Media, Inc, 2004.
6. “Java server programming java JavaEE5 Black Book”, Kogent Solutions Inc, Dreamtech Press,2012.
7. AJAX, “black book”, new edition, Kogent Solutions Inc, Dreamtech Press,2008.
Web Resources:
1. https://www.tutorialspoint.com/angularjs/angularjs_tutorial.pdf
2. https://www.tutorialspoint.com/nodejs/nodejs_tutorial.pdf
CLOUD ARCHITECTURES L T P C
CC2022 Total Contact Hours - 75 3 0 2 4
Prerequisite
Nil
PURPOSE
This module gives students the skills and knowledge to understand how Cloud Computing Architecture enables
transformation, business development and agility in an organization.
INSTRUCTIONAL OBJECTIVES
1. Analyze the components of cloud computing showing how business agility in an organization can be created.
2. Evaluate the deployment of web services from cloud architecture
3. Critique the consistency of services deployed from a cloud architecture
4. Compare and contrast the economic benefits delivered by various cloud models based on application requirements,
economic constraints and business requirements.
5. Critically analyze case studies to derive the best practice model to apply when developing and deploying cloud based
applications
UNIT I - CLOUD COMPUTING FUNDAMENTALS (8 Hours)Cloud
Computing definition, Types of the cloud:private, public and hybrid cloud. Cloud services types; IaaS, PaaS, SaaS. Benefits and
challenges of cloud computing, public vs private clouds, role of virtualization in enabling the cloud; Business Agility: Benefits
and challenges to Cloud architecture. Application availability, performance, security and disaster recovery; next generation Cloud
Applications.
REFERENCES
1. Gautam Shroff, “Enterprise Cloud Computing Technology ArchitectureApplications”,Cambridge University Press; 1
edition,[ISBN: 978-0521137355],2010.
2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A PracticalApproach” McGraw-Hill Osborne Media;
1 edition [ISBN: 0071626948], 2009.
3. Dimitris N. Chorafas, “Cloud Computing Strategies” CRC Press; 1 edition [ISBN: 1439834539], 2010.
4. Bill Wilder, “Cloud Architecture Patterns”, O'Reilly Media, Inc., 2012 (ISBN: 9781449357979)
5. https://searchcloudcomputing.techtarget.com/essentialguide/Developing-cloud-applications-in-the-new-IT-era
6. https://searchcloudcomputing.techtarget.com/tip/Optimize-cloud-computing-costs-for-current-applications
7. https://www.e-zest.com/case-studies-cloud
CLOUD STORAGE INFRASTRUCTURES L T P C
CC2023 Total Contact Hours - 75 3 0 2 4
Pre-requisites
Nil
PURPOSE
This course provides a comprehensive view of storage and networking infrastructures for highly virtualized cloud
ready deployments. The course discusses the concepts and features related to Virtualized datacenter and cloud,
Information storage security and design, storage network design and cloud optimized storage.
INSTRUCTIONAL OBJECTIVES
1 Critically appraise the opportunities and challenges of information management in complex business
. environments
2 Evaluate information storage management design in a cloud environment and how it relates to the
. business objectives of an organization
3 Analyze the role technology plays in the design of a storage solution in a cloud architecture
.
4 Investigate how a global storage solution can be optimized so that it can be delivered successfully from
. the cloud
5 Analyze how best to provide reliable access to information both locally and remotely using storage
. technologies
REFERENCES
1. Joseph F.Hair, William C.Black, Barry J.Babin, RolphE.Anderson and Ronald L.Tatham (2006). “Multivariate Data
Analysis, 6th Edition”, Pearson Education, Inc., (Chapters 1, 3 and 8 ), 2009.
2. Spyros Makridakis, Steven C.Wheelwright and Rob J. Hyndman. “Forecasting methods and Applications, Third
Edition”, John Wiley & Sons Inc., New York (Chapters 1, 4 and 7 ), 2005.
REFERENCES
1. Dinesh G. Dutt, “Cloud-Native Data Center Networking”. O’Reilly Media Inc. ISBN: 9781492045601
2. Nash Darukhanawalla, Patrice Bellagamba, “Interconnecting Data Centers Using VPLS” Cisco Press; 1 edition, [ISBN:
9781587059926],2009
3. SilvanoGai,TommiSalli,RogerAndersson,“CiscoUnifiedComputingSystem”
Cisco Press; 1 edition, [ISBN: 9781587141935], 2010.
4. Robert W. Kembel, Roger Cummings (Introduction), “The Fibre Channel Consultant” Northwest Learning Assoc;
3rd edition, [ISBN: 0931836840],1998.
5. Robert W Kembal“Fiber Channel Switched Fabric” Northwest Learning Associates, inc.[ISBN:
0931836719],2009.
6. John L. Hufferd, “ISCSI”, Addison-Wesley Boston [ISBN: 978-0201784190], 2003.
CLOUD SECURITY L T P C
Total Contact Hours - 75 3 0 2 4
CC2025
Pre-requisite
NIL
PURPOSE
The course on cloud security introduces the basic concepts of security systems andcryptographic protocols, which are
widely used in the design of cloud security. Theissues related multi tenancy operation, virtualized infrastructure security and
methodsto improve virtualization security are also dealt with in this course.
INSTRUCTIONAL OBJECTIVES
1. Compare modern security concepts as they are applied to cloud computing
2. Assess the security of virtual systems
3. Evaluate the security issues related to multi-tenancy
4. Appraise compliance issues that arise from cloud computing
GUIDELINES
1. Each student is expected to give a seminar on a topic of current relevance in IT/Related field with in a semester.
2. Students have to refer published papers from standard journals.
3. The seminar report must not be the reproduction of the original papers but it can be used as reference.
ASSESMENT:
The students are expected to give at least two presentations on their topics of interest which will be assessed by a committee
constituted for this purpose. This course is mandatory and a student has to pass the course to become eligible for the award of
degree. Marks will be awarded out of 100 and appropriate grades assigned as per the regulations.
Program Electives
CC2131 DESIGN & DEVELOPMENT OF CLOUD APPLICATIONS L T P C
Total Contact Hours - 60 2 0 2 3
Pre-requisite
Web Application Development
PURPOSE
This module is focused on developing web and mobile applications in the cloud. By the end of this module the student
will have a detailed overview of the design and development process involved in creating a cloud based application.
INSTRUCTIONAL OBJECTIVES
1 Design and develop elegant and flexible cloud software solutions.
2 Evaluate the security issues related to the development of cloud applications.
3 Manage and deploy a cloud based application.
4 Research and critique a topic related to Software development in the cloud.
5 Analyze a real world problem and develop a cloud based software solution.
REFERENCES
1. Jim Webber, SavasParastatidis, Ian Robinson, “REST in Practice” O'Reilly Media; 1 edition, [ISBN: 978-0596805821] 2010.
2. Eugenio Pace, Dominic Betts, Scott Densmore, Ryan Dunn, Masashi Narumoto, MatiasWoloski, “Developing Applications for
the Cloud on the Microsoft Windows Azure Platform” Microsoft Press; 1 edition, [ISBN: 9780735656062] 2010.
3. Dan Wellman, “jQuery UI 1.6” Packt Publishing [ISBN: 9781847195128] 2009.
4. Peter Lubbers, Brian Albers, Frank Salem, Ric Smith, “Pro HTML5 Programming” A press, [ISBN: 9781430227908] 2010.
5. Lee Babin, “Beginning Ajax with PHP” A press; 1 edition, [ISBN: 9781590596678] 2006.
6. Richard York, “Beginning JavaScript and CSS development with jQuery”, Wiley Pub. Indianapolis, IN [ISBN:
9780470227794] 2009.
7. Edward Benson, “The art of Rails”, Wiley Pub. Indianapolis, IN [ISBN: 9780470189481] 2008.
8. Kevin Hoffman, “Beyond the Twelve-Factor App”, O'Reilly Media, Inc. 2016, [ISBN: 9781492042631]
APPLICATION DEVELOPMENT FRAMEWORKS L T P C
CC2132 Total Contact Hours - 60 2 0 2 3
Pre-requisite
CC2021, CC2023
PURPOSE
This module has two distinct sections. In the first section students will learn about building applications using a
popular application development framework. After the first section is completed the module will focus on one of
the following areas: Enterprise Integration or Rich Web Applications.
INSTRUCTIONAL OBJECTIVES
1. Identify the key aspects of developing applications using a framework.
2. Write code to integrate frameworks to access relational databases
3. Evaluate framework technologies for remote communication.
Option 1 - Enterprise Integration: Design and build concurrent applications and schedule tasks using an
4. application framework. Assess the integration of serialization and remoting to call remote applications.
Option 2 - Rich Web Applications: Integrate an application framework to implement stateful interactions.
5. Compare rapid productivity tools such as Grails and Roo, etc.
REFERENCES
1. Hal Rottenberg, “Managing VMware Infrastructure with Windows PowerShell TFM”, Sapien Press 2009.
2. Justin Seitz, “Gray Hat Python”, NO STARCH PRESS [ISBN: 1593271921], 2009.
3. RytisSileika, “Pro Python System Administration” A press; 1 edition [ISBN: 978-1-4302-2605-5], 2010.
4. Noah Gift and Jeremy Jones, “Python for Unix and Linux system administration”, O'Reilly Farnham 2008.
5. Marty Alchin, “Pro Python” A press [ISBN: 978-1-4302-2757-1],2010.
6. Mark Lutz, “Learning Python” O'Reilly Media; 5 edition [ISBN: 978-0596158064], 2013.
7. Mark Summerfield, “Programming in Python 3: A Complete Introduction to the Python Language” Addison-Wesley
Professional; 2 edition, [ISBN: 978-0-321-68056-3], 2009.
8. David N. Blank-Edelman, “Automating system administration with Perl”, O'Reilly Media Sebastopol, CA 2009.
9. Website: “Command Line Kung Fu” http://blog.commandlinekungfu.com/.
10. Python Tutorial by Guido van Rossum, and Fred L. Drake, Jr., editor, Release 2.6.4
11. Practical Programming in Tcl and Tk by Brent Welch , Updated for Tcl 7.4 and Tk 4.0
12. Teach Yourself Perl 5 in 21 days by David Till.
13. Red Hat Enterprise Linux 4:System Administration Guide Copyright 2005 Red Hat, Inc
CC2134 DATA WAREHOUSING AND MINING L T P C
Total Contact Hours - 45 3 0 0 3
Pre-requisites
NIL
PURPOSE
This course focuses on the fundamentals of data warehousing and their associated problem areas. Data pre-
processing and preparation, outlier detection, data warehouse design, On-line analytical processing are the major
areas of coverage of this course. This course also deals with the fundamentals of data mining and algorithms
associated with the same.
INSTRUCTIONAL OBJECTIVES
1. Describe the fundamental concepts, benefits and problem areas associated with data warehousing
2. Describe the various architectures and main components of a data warehouse.
3. Design a data warehouse, and be able to address issues that arise when implementing a data
warehouse.
4. Compare and contrast OLAP and data mining as techniques for extracting knowledge from a data
warehouse.
5. Algorithms for Predictive modeling, link analysis and deviation detection and CRISP-DM
REFERENCES
1. Thomas M. Connolly, Carolyn E. Begg, “Database Systems: A Practical Approach to Design, Implementation and
Management”, 5th Ed., Addison Wesley [ISBN: 0321523067], 2010.
2. Jiawei Han and Micheline Kamber, Jian Pei, “Data Mining Concepts and Techniques”, Third Edition, Elsevier, 2012.
3. Anthony David Giordano, “Data Integration Blueprint and Modeling”, IBM Press; 1 edition [ISBN: 0137084935],
2011.
4. Ralph Kimball, Margy Ross, Warren Thornthwaite (Contributor), Joy Mundy (Contributor), Bob Becker (Contributor)
“The Kimball Group Reader”, Wiley [ISBN: 9780470563106], 2010.
5. Daniel T. Larose “Discovering knowledge in data”, Wiley-Interscience Hoboken, N.J. [ISBN: 978-0-471-66657-8],
2005.
6. Richard Roiger, Michael Geatz, “Data mining”, Addison Wesley Boston [ISBN: 0201741288], 2002.
CONVERGED NETWORKS L T P C
CC2135 Total Contact Hours - 45 3 0 0 3
Prerequisite
Knowledge of basic networking concepts, routing protocols and IP addressing
mechanisms.
PURPOSE
This course focuses on the overview of convergence, benefits, types, technology and Architecture. This course
provides knowledge on various convergence protocols and Real-Time applications. This course aims at providing an
in depth knowledge to the learners in the field of Multiprotocol label switching and Voice over IP. QoS details of
converged network shall be dealt in a detailed manner in this course.
INSTRUCTIONAL OBJECTIVES
1. Implement Real-Time applications enabled by a convergent network and its Protocols.
2. Explain how Quality of Service is achieved in a Converged Network
3. Design Multiprotocol Label Switching
4. Engineer voice over IP and convergence.
REFERENCES
1. Oliver C. Ibe,(2002) “Converged Network Architectures, Delivering Voice and Data over IP, ATM, and Frame Relay”,
John Wiley & Sons
2. Scott Firestone, ThiyaRamalingam, Steve Fry, “Voice and Video Conferencing Fundamentals”, 1st Ed. Ed., Cisco Press
[ISBN: 978-1-58705-268-7], 2007
3. Luc De Ghein, “MPLS Fundamentals”, 1st Ed. Ed., Cisco Press [ISBN: 978-1- 58705-197-5] 2006.
4. Christina Hattingh, Darryl Sladden, ATM ZakariaSwapan, “SIP Trunking”, Cisco Press [ISBN: 978-1-58705-944-4]
2010.
5. Eric Osborne, Ajay Simha, “Traffic engineering with MPLS”, Cisco Press [ISBN: 978-1587050312], 2003. 5. Amir
Ranjbar, “CCNP ONT Official Exam Certification Guide”, Cisco Press [ISBN: 978-1-58720-176-3], 2007.
6. Website: Cisco Systems Inc., “Voice/Data Integration Technologies”. 2006.
7. http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/voicdata.htm
NETWORK SECURITY L T P C
CC2136 Total Contact Hours - 45 3 0 0 3
Prerequisite
PURPOSE
This course will explore the aspects of IPSec, Virtual Private Networks and SSH tunneling in addition to the cloud
security issues. The course covers the details of wireless security including WEP and WPA. Different types of firewalls
including packet filters, application level gateway and NAT are also the topics of discussion in this course. This course
provides the learners with the details on IDS/IPS, sniffers and, packet capturing tools and mechanisms.
INSTRUCTIONAL OBJECTIVES
1. Identify and evaluate threats to network security and data loss.
2. Install, configure, and evaluate firewalls
3. Configure and appraise Intrusion Detection and Response Systems.
4. Install, configure, and evaluate VPN (Virtual Private Network) Technology.
5. Evaluate the security of a wireless network system.
6. Create and evaluate packet captures
UNIT I - INTERNET SECURITY & ENCRYPTION (10 Hours)
Encryption of static data, IPSec, AH, ESP, IKE, ISAKMP/Oakley, Tunnel mode, Transport mode, Virtual Private
Networks (VPNs), SSH Tunneling, IP6 issues, Cloud Security Issues.
REFERENCES
1.Eric Cole, Ronald L. Krutz, James Conley, “Network Security Bible”, Wiley [ISBN: 0764573977], 2005.
2.John R. Vacca, “Guide to Wireless Network Security”, Springer [ISBN: 0387954252], 2006.
3.Johnny Long, Chris Hurley, SensePost, Mark Wolfgang, Mike Petruzzi,“Penetration Tester's Open Source
Toolkit”, Syngress [ISBN: 1597490210] 2005.
4.BarrieDempster, James Eaton-Lee, “Configuring IPCop Firewalls: Closing Borders with Open Source”, Packet
Publishing [ISBN: 1-904811-36-1], 2006.
5.Lucian Gheorghe, “Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT, and L7-
filter”, Packt Publishing [ISBN: 1-904811-65-5] 2006.
6.Mark Rhodes-Ousley, Roberta Bragg, Keith Strassberg “Network Security: The Complete Reference”, McGraw-
Hill [ISBN: 0072226978], 2003,.
7.ChuckEasttom , “Network Defense and Countermeasures: Principles and Practices” [ISBN: 978-0131711266],
2005.
8.Charlie Kaufman, Radia Perlman, Mike Speciner, “Network Security”, Prentice Hall, 2 ndedition, 2002,ISBN-10:
0130460192, ISBN-13: 978-0130460196.
9.CharlesPfleeger,” Security in Computing”, Prentice Hall, 4th Edition, 2006, ISBN10: 0132390779, ISBN-13: 978-
01323907744.
10.Ulysess Black, “Internet Security Protocols: Protecting IP Traffic”, Prentice Hall PTR; 1 st edition, 2000,ISBN-10:
0130142492, ISBN-13: 978-0130142498.
11.William Stallings, “Cryptography and Network Security”, Pearson Education, 6th Edition, 2013, ISBN
10:0133354695.
12.Juniper Networks, “VPN Decision Guide: IPSec vs. SSL VPN Decision Criteria” 2007.
13.http://www.juniper.net/solutions/literature/white_papers/200232.pdf.
ENTERPRISE STORAGE SYSTEMS L T P C
CC2137 Total Contact Hours - 45 3 0 0 3
Pre-requisites
Nil
PURPOSE
This course provides a comprehensive introduction to storage technology in an increasingly complex IT
environment. It builds a strong understanding of underlying storage technologies and prepares you to learn
advanced concepts and technologies. The course also deals with architectures, comprehensive understanding of
the various storage infrastructure ,features and benefits of Intelligent Storage Systems; networked storage
technologies such as FC-SAN, NAS and IP-SAN; long-term archiving solutions, the increasingly critical area
of information security and the emerging field of storage virtualization technologies.
INSTRUCTIONAL OBJECTIVES
1. Evaluate various storage classifications and technologies.
2. Analyze storage architectures, processes, components and how they relate to virtualization.
3. Justify the implementation of a range of storage solutions to enable business
continuity.
4. Analyze storage security design, implementation, monitoring and management.
REFERENCES
1. EMC, “Information Storage and Management” Wiley; 2 edition [ISBN: 978- 0470294215], 2012.
2. Richard Barker, Paul Massiglia, “Storage area network essentials”, Wiley New York [ISBN: 978-0471034452] 2002.
3. Ulf Troppens, Rainer Erkens, Wolfgang Mueller-Friedt, Rainer Wolafka, Nils Haustein, “Storage Networks Explained”
Wiley; 2 edition, [ISBN: 978- 0470741436], 2009.
4. W. Curtis Preston, “Using SANs and NAS”, O'Reilly & Associates Sebastopol, Calif. [ISBN: 978-0596001537], 2002.
5. HimanshuDwivedi, “Securing storage”, Addison-Wesley Upper Saddle River, NJ [ISBN: 978-0321349958], 2006.
OBJECT ORIENTED SOFTWARE ENGINEERING L T P C
CC2138 Total Contact Hours - 60 2 0 2 3
Prerequisite
Nil
PURPOSE
To learn the advanced software engineering principles and methodologies for effective software development
INSTRUCTIONAL OBJECTIVES
1. To learn about software prototyping, analysis and design
2. To learn UML and its usage
3. Case studies to apply the principles
UNIT III –THE CLOUD AND THE DEVOPS with AWS (12 Hours)
What is Devops – The origin of DevOps - The developers versus operations dilemma - Key characteristics of a DevOps culture -
Deploying Your First Web Application - Creating and configuring your account - Creating our first web server - Managing your
infrastructure with CloudFormation - Adding a configuration management system
REFERENCES
1. Mickey Iqbal, “IT Virtualization Best Practices: A Lean, Green Virtualized Data Center Approach”, MC Press [ISBN:
978-1583473542] 2010.
2. Nathaniel Felsen, “Effective DevOps with AWS”, Packt Publishing, [ISBN:9781786466815], 2017
CLOUD APPLICATION DEVELOPMENT L T P C
CC2140 Total Contact Hours - 60 2 0 2 3
Pre-requisites
Nil
PURPOSE
This module introduces students to developing web and cloud based applications. By the end of the module the student
will be able to build and deploy real-time cloud-based application and Cloud Automation Framework.
INSTRUCTIONAL OBJECTIVES
1. Use best practices in the design and development of elegant and flexible cloud software solutions.
2. Create, implement and deploy a cloud Automation based application.
3. Analyze a real world problem and develop a cloud Automation Framework includes Terraform/Chef/Ansible.
4. Contrast software development in the web, cloud and others
INSTRUCTIONAL OBJECTIVES
1. Strategically assess how cloud computing enables IT Transformation andbusiness value in an
organization.
2. Analyze the role that cloud computing can play in the business process.
3. Critically appraise how the incorporation of cloud computing in an IT strategycan deliver on
strategic business objectives.
4. Evaluate how cloud computing and Service Oriented Architecture (SOA) candeliver business
agility.
5. Implement IT governance to manage business realization from cloud ITservices.
This course provides practical foundation level training that enables immediate and effective participation in big
data and other analytics projects. It includes an introduction to big data and the Data Analytics Lifecycle to
address business challenges that leverage big data. The course provides grounding in basic and advanced analytic
methods and an introduction to big data analytics technology and tools, including MapReduce, Hadoop, Mongodb
with Mongoose, Cloud Analytics, Birt, Knimeetc
INSTRUCTIONAL OBJECTIVES
1. Deploy the Data Analytics Lifecycle to address big data analytics projects
2. Apply appropriate analytic techniques and tools to analyze big data, create statistical models, and
identify insights that can lead to actionable results
3. Select appropriate data visualizations to clearly communicate analytic insights to business sponsors
and analytic audiences
4. Use tools such as: R and RStudio, MapReduce/Hadoop, in-database analytics, Window and MADlib
functions
5. Explain how advanced analytics can be leveraged to create competitive advantage and how the data
scientist role and skills differ from those of a traditional business intelligence analyst. Use Mongodb
with Mongoose to interact with data on the backend. Learn Cloud Analytics with BI using tools like
Birt,Knime.
UNIT IV - ADVANCED ANALYTICS AND STATISTICAL MODELING FOR BIG DATA (7 Hours)
Naïve Bayseian Classifier, K-means Clustering, Association Rules, Decision Trees, Linear and Logistic Regression, Time Series
Analysis, Text Analytics;
L T P C
CC2059 Project Phase-I 0 0 12 6
CC2060 Project Phase-II 0 0 32 16
PURPOSE
To undertake research in an area related to the program of study
INSTRUCTIONAL OBJECTIVES
1. The student shall be capable of identifying a problem related to the
program of study and carry out wholesome research on it leading to
findings which will facilitate development of a new/improved product,
process for the benefit of the society.
M.Tech projects should be socially relevant and research oriented ones. Each student is expected to do an individual project. The
project work is carried out in two phases – Phase I in III semester and Phase II in IV semester. Phase II of the project work shall
be in continuation of Phase I only. At the completion of a project the student will submit a project report, which will be evaluated
(end semester assessment) by duly appointed examiner(s). This evaluation will be based on the project report and a viva voce
examination on the project. The method of assessment for both Phase I and Phase II is shown in the following table:
Student will be allowed to appear in the final viva voce examination only if he / she has submitted his / her project work in the
form of paper for presentation / publication in a conference / journal and produced the proof of acknowledgement of receipt of
paper from the organizers / publish
Industry Supportive Elective and Certification courses
https://www.hashicorp.com/training
One Cloud Red Hat Certificate https://www.redhat.com/en/services/training/ex407-red-
specialized of expertise in hat-certified-specialist-in-ansible-automation-
certification Ansible Automation exam?extIdCarryOver=true&sc_cid=701f2000001OH7YA
CC2148 course in II AW
semester
(Pass/Fail
Course)
One Cloud Salesforce Certified https://trailhead.salesforce.com/en/credentials/platformdeve
specialized Platform Developer loperi
certification I Udemy
CC2149 course in III
semester
(Pass/Fail
Course)
Note: Students will be asked to register for certification courses and earn a certificate to be awarded
the required credits.