0% found this document useful (0 votes)
58 views15 pages

Syllabus Semester III CBCS

This 3-credit course introduces students to technical writing and entrepreneurship development. It aims to provide conceptual understanding of developing strong writing foundations, technological writing skills, and innovation and entrepreneurship. The course covers writing articles, blogs, e-books, websites and other materials. It includes 4 units that address ethics in writing, collaboration, content creation, graphics, research, and proposal, report and recommendation writing. The course objectives are to develop technical documents to standards, write better quality content, evaluate social media pages, and understand innovation and entrepreneurship.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views15 pages

Syllabus Semester III CBCS

This 3-credit course introduces students to technical writing and entrepreneurship development. It aims to provide conceptual understanding of developing strong writing foundations, technological writing skills, and innovation and entrepreneurship. The course covers writing articles, blogs, e-books, websites and other materials. It includes 4 units that address ethics in writing, collaboration, content creation, graphics, research, and proposal, report and recommendation writing. The course objectives are to develop technical documents to standards, write better quality content, evaluate social media pages, and understand innovation and entrepreneurship.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

PSIT301: Technical Writing and Entrepreneurship Development

M. Sc (Information Technology) Semester – III


Course Name: Technical Writing and Entrepreneurship Course Code: PSIT301
Development
Periods per week (1 Period is 60 minutes) 4
Credits 4
Hours Marks
Evaluation System Theory Examination 2½ 60
Internal -- 40

Course Objectives:

 This course aims to provide conceptual understanding of developing strong


foundation in general writing, including research proposal and reports.
 It covers the technological developing skills for writing Article, Blog, E-Book,
Commercial web Page design, Business Listing Press Release, E-Listing and Product
Description.
 This course aims to provide conceptual understanding of innovation and
entrepreneurship development.

Unit Details Lectures Outcome


Introduction to Technical Communication:
What Is Technical Communication? The Challenges of
Producing Technical Communication, Characteristics of
a Technical Document, Measures of Excellence in
Technical Documents, Skills and Qualities Shared by
Successful Workplace Communicators, How
Communication Skills and Qualities Affect Your Career?
Understanding Ethical and Legal Considerations: A
Brief Introduction to Ethics, Your Ethical Obligations,
Your Legal Obligations, The Role of Corporate Culture
I in Ethical and Legal Conduct, Understanding Ethical and 12 CO1
Legal Issues Related to Social Media, Communicating
Ethically Across Cultures, Principles for Ethical
Communication Writing Technical Documents:
Planning, Drafting, Revising, Editing, Proofreading
Writing Collaboratively: Advantages and
Disadvantages of Collaboration, Managing Projects,
Conducting Meetings, Using Social Media and Other
Electronic Tools in Collaboration, Importance of Word
Press Website, Gender and Collaboration, Culture and
Collaboration.
Introduction to Content Writing: Types of Content
(Article, Blog, E-Books, Press Release, Newsletters Etc),
II Exploring Content Publication Channels. Distribution of 12 CO2
your content across various channels. Blog Creation:
Understand the psychology behind your web traffic,
Creating killing landing pages which attract users, Using
Landing Page Creators, Setting up Accelerated Mobile
Pages, Identifying UI UX Experience of your website or
blog. Organizing Your Information: Understanding
Three Principles for Organizing Technical Information,
Understanding Conventional Organizational Patterns,
Emphasizing Important Information: Writing Clear,
Informative Titles, Writing Clear, Informative Headings,
Writing Clear Informative Lists, Writing Clear
Informative Paragraphs.
Creating Graphics: The Functions of Graphics, The
Characteristics of an Effective Graphic, Understanding the
Process of Creating Graphics, Using Color Effectively,
Choosing the Appropriate Kind of Graphic, Creating
Effective Graphics for Multicultural Readers.
Researching Your Subject: Understanding the
Differences Between Academic and WorkplaceResearch,
Understanding the Research Process, Conducting
III 12 CO3
Secondary Research, Conducting Primary Research,
Research and Documentation: Literature Reviews,
Interviewing for Information, Documenting Sources,
Copyright, Paraphrasing, Questionnaires. Report
Components: Abstracts, Introductions, Tables of
Contents, Executive Summaries, Feasibility Reports,
Investigative Reports, Laboratory Reports, Test Reports,
Trip Reports, Trouble Reports
Writing Proposals: Understanding the Process of
Writing Proposals, The Logistics of Proposals, The
―Deliverables‖ of Proposals, Persuasion and Proposals,
Writing a Proposal, The Structure of the Proposal.
Writing Informational Reports: Understanding the
Process of Writing Informational Reports, Writing
Directives, Writing Field Reports, Writing Progress and
Status Reports, Writing Incident Reports, Writing
Meeting Minutes. Writing Recommendation Reports:
Understanding the Role of Recommendation Reports,
Using a Problem-Solving Model for Preparing
Recommendation Reports, Writing Recommendation
IV 12 CO4
Reports. Reviewing, Evaluating, and Testing
Documents and Websites: Understanding Reviewing,
Evaluating, and Testing, Reviewing Documents and
Websites, Conducting Usability Evaluations, Conducting
Usability Tests, Using Internet tools to check writing
Quality, Duplicate Content Detector, What isPlagiarism?,
How to avoid writing plagiarism content? Innovation
management: an introduction: The importance of
innovation, Models of innovation, Innovation as a
management process. Market adoption
and technology diffusion: Time lag between innovation
and useable product, Innovation and the market ,
Innovation and market vision ,Analysing internet search
data to help adoption and forecasting sales ,Innovative
new products and consumption patterns, Crowd sourcing
for new product ideas, Frugal innovation and ideas from
everywhere, Innovation diffusion theories.
Managing innovation within firms: Organisations and
innovation, The dilemma of innovation management,
Innovation dilemma in low technology sectors, Dynamic
capabilities, Managing uncertainty, Managing innovation
projects Operations and process innovation:
Operations management, The nature of design and
innovation in the context of operations, Process design,
Process design and innovation
Managing intellectual property: Intellectual property,
Trade secrets, An introduction to patents, Trademarks,
Brand names, Copyright Management of research and
V 12 CO5
development: What is research and development?, R&D
management and the industrial context, R&D investment
and company success, Classifying R&D, R&D
management and its link with business strategy, Strategic
pressures on R&D, Which business to support and how?,
Allocation of funds to R&D, Level of R&D expenditure
Managing R&D projects: Successful technology
management, The changing nature of R&D management,
The acquisition of external technology, Effective R&D
management, The link with the product innovation
process, Evaluating R&D projects.

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Technical Mike Markel Bedford/St. 11 2014
Communication Martin's

2. Innovation Management Paul Trott Pearson 06 2017


and New Product
Development
3. Handbook of Technical Gerald J. Bedford/St. 09 2008
Writing Alred , Charles T. Martin's
Brusaw , Walter E.
Oliu
4. Technical Writing 101: A Alan S. Pringle and scriptorium 03 2009
Real-World Guide to Sarah S. O'Keefe
Planning and Writing
Technical Content
5. Innovation and Peter Drucker Harper 03 2009
Entrepreneurship Business
Course Outcomes:

After completion of the course, a student should be able to:

CO1: Develop technical documents that meet the requirements with standard guidelines.
Understanding the essentials and hands-on learning about effective Website Development.
CO2: Write Better Quality Content Which Ranks faster at Search Engines. Build effective
Social Media Pages.
CO3: Evaluate the essentials parameters of effective Social Media Pages.
CO4: Understand importance of innovation and entrepreneurship.
CO5: Analyze research and development projects.
PSIT303a: Machine Learning
M. Sc (Information Technology) Semester – III
Course Name: Machine Learning Course Code: PSIT303a
Periods per week (1 Period is 60 minutes) 4
Credits 4
Hours Marks
Evaluation System Theory Examination 2½ 60
Internal -- 40

Course Objectives:
 Understanding Human learning aspects.
 Understanding primitives in learning process by computer.
 Understanding nature of problems solved with Machine Learning

Unit Details Lectures Outcome


Introduction: Machine learning, Examples of Machine
Learning Problems, Structure of Learning, learning versus
Designing, Training versus Testing, Characteristics of
Machine learning tasks, Predictive and descriptive tasks,
I 12
Machine learning Models: Geometric Models, Logical CO1
Models, Probabilistic Models. Features: Feature types,
Feature Construction and Transformation, Feature
Selection.
Classification and Regression: Classification: Binary
Classification- Assessing Classification performance, Class
probability Estimation Assessing class probability
Estimates, Multiclass Classification. Regression:Assessing
II performance of Regression- Error measures, Overfitting- 12 CO2
Catalysts for Overfitting, Case study of Polynomial
Regression. Theory of Generalization: Effective number
of hypothesis, Bounding the Growth
function, VC Dimensions, Regularization theory.
Linear Models: Least Squares method, MultivariateLinear
Regression, Regularized Regression, Using Least Square
regression for Classification. Perceptron, Support Vector CO2
III 12
Machines, Soft Margin SVM, Obtaining CO3
probabilities from Linear classifiers, Kernel methods for
non-Linearity.
Logic Based and Algebraic Model: Distance Based
Models: Neighbours and Examples, Nearest Neighbours
Classification, Distance based clustering-K means
Algorithm, Hierarchical clustering, Rule Based Models:
CO2
Rule learning for subgroup discovery, Association rule
IV 12 CO3
mining. Tree Based Models: Decision Trees, Ranking and
CO4
Probability estimation Trees, Regression trees, Clustering
Trees.
Probabilistic Model:
Normal Distribution and Its Geometric Interpretations,
Naïve Bayes Classifier, Discriminative learning with
Maximum likelihood, Probabilistic Models with Hidden
variables: Estimation-Maximization Methods, Gaussian
V 12 CO5
Mixtures, and Compression based Models.
Trends In Machine Learning : Model and Symbols-
Bagging and Boosting, Multitask learning, Online learning
and Sequence Prediction, Data Streams and Active
Learning, Deep Learning, Reinforcement Learning.

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Machine Learning: The Art Peter Flach Cambridge 2012
and Science of Algorithms University
that Make Sense of Data Press
2. Introduction to Statistical Hastie, Tibshirani, Springer 2nd 2012
Machine Learning with Friedman
Applications in R
3. Introduction to Machine Ethem Alpaydin PHI 2nd 2013
Learning

M. Sc (Information Technology) Semester – III


Course Name: Machine Learning Practical Course Code: PSIT3P3a
Periods per week (1 Period is 60 minutes) 4
Credits 2
Hours Marks
Evaluation System Practical Examination 2 50
Internal -- -

List of Practical:
10 practicals covering the entire syllabus must be performed. The detailed list of
practical will be circulated later in the official workshop.

Course Outcomes:
After completion of the course, a student should be able to:
CO1: Understand the key issues in Machine Learning and its associated applications in
intelligent business and scientific computing.
CO2: Acquire the knowledge about classification and regression techniques where a learner
will be able to explore his skill to generate data base knowledge using the prescribed
techniques.
CO3: Understand and implement the techniques for extracting the knowledge using machine
learning methods.
CO4: Achieve adequate perspectives of big data analytics in various applications like
recommender systems, social media applications etc.
CO5: Understand the statistical approach related to machine learning. He will also Apply the
algorithms to a real-world problem, optimize the models learned and report on the expected
accuracy that can be achieved by applying the models.
PSIT302c: Cloud Application Development
M. Sc (Information Technology) Semester – III
Course Name: Cloud Application Development Course Code: PSIT302c
Periods per week (1 Period is 60 minutes) 4
Credits 4
Hours Marks
Evaluation System Theory Examination 2½ 60
Internal -- 40

Course Objectives:
 To develop and deploy Microservices for cloud
 To understand Kubernetes and deploy applications on Azure Kubernetes Service
 To understand DevOps for Azure
 To follow the DevOps practices for software development
 To build APIs for Azure and AWS

Unit Details Lectures Outcomes


Implementing Microservices: Client to microservices
communication, Interservice communication, data
considerations, security, monitoring, microservices hosting
platform options.
Azure Service Fabric: Introduction, core concepts,
supported programming models, service fabric clusters,
I 12 CO1
develop and deploy applications of service fabric.
Monitoring Azure Service Fabric Clusters: Azure
application, resource manager template, Adding Application
Monitoring to a Stateless Service Using Application
Insights, Cluster monitoring, Infrastructure
monitoring.
Azure Kubernetes Service (AKS): Introduction to
kubernetes and AKS, AKS development tools, Deploy
applications on AKS.
Monitoring AKS: Monitoring, Azure monitor and analytics,
monitoring AKS clusters, native kubernetes dashboard,
Prometheus and Grafana.
Securing Microservices: Authentication in microservices,
II Implenting security using API gateway pattern, Creating 12 CO2
application using Ocrlot and securing APIs with Azure AD.
Database Design for Microservices: Data stores,
monolithic approach, Microservices approach, harnessing
cloud computing, dataase options on MS Azure, overcoming
application development challenges.
Building Microservices on Azure Stack: Azure stack,
Offering IaaS, PaaS on-premises simplified, SaaS on Azure
stack.
.NET DevOps for Azure: DevOps introduction, Problem
and solution.
Professional Grade DevOps Environment: The state of
DevOps, professional grade DevOps vision, DevOps
architecture, tools for professional DevOps environment,
III DevOps centered application. 12 CO3
Tracking work: Process template, Types of work items,
Customizing the process, Working with the process.
Tracking code: Number of repositories, Git repository,
structure, branching pattern, Azure repos configuration, Git
and Azure.
Building the code: Structure of build, using builds with
.NET core and Azure pipelines,
Validating the code: Strategy for defect detection,
Implementing defect detection.
Release candidate creation: Designing release candidate
IV architecture, Azure artifacts workflow for release candidates, 12 CO4
Deploying the release: Designing deployment pipeline,
Implementing deployment in Azure pipelines.
Operating and monitoring release: Principles,
Architectures for observability, Jumpstarting observability.

Introduction to APIs: Introduction, API economy, APIs in


public sector.
API Strategy and Architecture: API Strategy, API value
chain, API architecture, API management.
API Development: Considerations, Standards, kick-start
V 12 CO5
API development, team orientation.
API Gateways: API Gateways in public cloud, Azure API
management, AWS API gateway.
API Security: Request-based security, Authentication and
authorization.

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Building Microservices Harsh Chawla Apress -- 2019
Applications on Microsoft Hemant Kathuria
Azure- Designing,
Developing, Deploying, and
Monitoring
2. .NET DevOps for Azure Jeffrey Palermo Apress -- 2019
A Developer’s Guide to
DevOps Architecture the
Right Way
3. Practical API Architecture Thurupathan Apress -- 2018
and Development with Vijayakumar
Azure and AWS - Design
and Implementation of APIs
for the Cloud
M. Sc (Information Technology) Semester – III
Course Name: Cloud Application Development Course Code: PSIT3P2c
Practical
Periods per week (1 Period is 60 minutes) 4
Credits 2
Hours Marks
Evaluation System Practical Examination 2 50
Internal -- --

List of Practical:
10 practical covering the entire syllabus must be performed. The detailed list of
practical will be circulated later in the official workshop.

Course Outcomes:
After completion of the course, a student should be able to:

CO01: Develop the Microservices for cloud and deploy them on Microsoft Azure.

CO02: Build and deploy services to Azure Kubernetes service.

CO03: Understand and build the DevOps way.

CO04: Thoroughly build the applications in the DevOps way.

CO05: Build the APIs for Microsoft Azure and AWS.


PSIT304d: Offensive Security
M. Sc (Information Technology) Semester – III
Course Name: Offensive Security Course Code: PSIT304d
Periods per week (1 Period is 60 minutes) 4
Credits 4
Hours Marks
Evaluation System Theory Examination 2½ 60
Internal -- 40

Course Objectives:

 Understanding of security requirements within an organization


 How to inspect, protect assets from technical and managerial perspectives
 To Learn various offensive strategies to penetrate the organizations security.
 To learn various tools that aid in offensive security testing.

Unit Details Lectures Outcome


Fault Tolerance and Resilience in Cloud Computing
Environments, Securing Web Applications, Services, and
Servers, Wireless Network Security, Wireless Sensor
I 12 CO1
Network Security: The Internet of Things,
Security for the Internet of Things, Cellular Network
Security
Social Engineering Deceptions and Defenses, What Is
Vulnerability Assessment, Risk Management, Insider
II 12 CO2
Threat, Disaster Recovery, Security Policies and Plans
Development
Introduction to Metasploit and Supporting Tools
The importance of penetration testing
Vulnerability assessment versus penetration testing
The need for a penetration testing framework
Introduction to Metasploit
When to use Metasploit?
III Making Metasploit effective and powerful using 12 CO3
supplementary tools
Nessus NMAP w3af Armitage
Setting up Your Environment
Using the Kali Linux virtual machine - the easiest way
Installing Metasploit on Windows Installing Metasploit
on Linux Setting up exploitable targets in a virtual
environment
Metasploit Components and Environment
Configuration
Anatomy and structure of Metasploit
Metasploit components
Auxiliaries Exploits Encoders Payloads
Post, Playing around with msfconsole
Variables in Metasploit
Updating the Metasploit Framework 55
Information Gathering with Metasploit
Information gathering and enumeration
Transmission Control Protocol User Datagram
Protocol File Transfer Protocol
Server Message Block Hypertext Transfer Protocol
Simple Mail Transfer Protocol
Secure Shell Domain Name System
Remote Desktop Protocol
Password sniffing
Advanced search with shodan
Vulnerability Hunting with Metasploit Managing the
database
Work spaces Importing scans
Backing up the database NMAP
NMAP scanning approach Nessus
Scanning using Nessus from msfconsole
IV 12 CO4
Vulnerability detection with Metasploit auxiliaries
Auto exploitation with db_autopwn
Post exploitation What is meterpreter?
Searching for content Screen capture
Keystroke logging Dumping the hashes and cracking
with JTR Shell command
Privilege escalation
Client-side Attacks with Metasploit
Need of client-side attacks
What are client-side attacks?
What is a Shellcode? What is a reverse shell? What is a
bind shell? What is an encoder? The msfvenom utility
Generating a payload with msfvenom
Social Engineering with Metasploit
Generating malicious PDF
Creating infectious media drives
Approaching a Penetration Test Using Metasploit
Organizing a penetration test
Preinteractions
Intelligence gathering/reconnaissance phase Predicting
V the test grounds 12 CO5
Modeling threats Vulnerability analysis
Exploitation and post-exploitation
Reporting Mounting the environment
Setting up Kali Linux in virtual environment
The fundamentals of Metasploit
Conducting a penetration test with Metasploit Recalling
the basics of Metasploit
Benefits of penetration testing using Metasploit Open
source
Support for testing large networks and easy naming
conventions
Smart payload generation and switching mechanism
Cleaner exits The GUI environment
Penetration testing an unknown network Assumptions
Gathering intelligence Using databases in Metasploit
Modeling threats
Vulnerability analysis of VSFTPD backdoor The attack
procedure
The procedure of exploiting the vulnerability
Exploitation and post exploitation
Vulnerability analysis of PHP-CGI query string
parameter vulnerability
Exploitation and post exploitation
Vulnerability analysis of HFS
Exploitation and post exploitation
Maintaining access
Clearing tracks
Revising the approach
Reinventing Metasploit Ruby – the heart of Metasploit
Creating your first Ruby program
Interacting with the Ruby shell
Defining methods in the shell
Variables and data types in Ruby
Working with strings Concatenating strings The
substring function The split function Numbers and
conversions in Ruby Conversions in Ruby Ranges in
Ruby Arrays in Ruby Methods in Ruby
Decision-making operators Loops in Ruby
Regular expressions Wrapping up with Ruby basics
Developing custom modules Building a module in a
nutshell
The architecture of the Metasploit framework
Understanding the file structure The libraries layout
Understanding the existing modules
The format of a Metasploit module
Disassembling existing HTTP server scanner module
Libraries and the function
Writing out a custom FTP scanner module
Libraries and the function Using msftidy
Writing out a custom SSH authentication brute forcer
Rephrasing the equation
Writing a drive disabler post exploitation module
Writing a credential harvester post exploitation module
Breakthrough meterpreter scripting
Essentials of meterpreter scripting
Pivoting the target network Setting up persistent access
API calls and mixins
Fabricating custom meterpreter scripts
Working with RailGun
Interactive Ruby shell basics
Understanding RailGun and its scripting
Manipulating Windows API calls
Fabricating sophisticated RailGun scripts
The Exploit Formulation Process
The absolute basics of exploitation
The basics The architecture System organization basics
Registers
Exploiting stack-based buffer overflows with
Metasploit
Crashing the vulnerable application
Building the exploit base Calculating the offset Using
the pattern_create tool
Using the pattern_offset tool Finding the JMP ESP
address Using Immunity Debugger to find executable
modules
Using msfbinscan Stuffing the space
Relevance of NOPs Determining bad characters
Determining space limitations
Writing the Metasploit exploit module
Exploiting SEH-based buffer overflows with Metasploit
Building the exploit base Calculating the offset Using
pattern_create tool Using pattern_offset tool Table of
Contents
Finding the POP/POP/RET address
The Mona script Using msfbinscan
Writing the Metasploit SEH exploit module Using
NASM shell for writing assembly instructions
Bypassing DEP in Metasploit modules Using msfrop
to find ROP gadgets Using Mona to create ROP chains
Writing the Metasploit exploit module for DEP bypass

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Computer and Information John R. Vacca Morgan 3rd 2017
Security Handbook Kaufmann
Publisher
2. Metasploit Revealed: Secrets Sagar Rahalkar Packt 2017
of the Expert Pentester Publishing

You might also like