0% found this document useful (0 votes)
28 views33 pages

Scheme 3 Year

1. The document provides the course details for Artificial Intelligence and Principles of Information Security subjects for the 5th semester of B.Sc. (Computer Systems & Engineering) program. 2. It lists the course objectives, outcomes, units of study, topics covered in each unit, essential and suggested reading materials for both subjects. 3. The document also provides the semester-wise and year-wise distribution of various core, elective and practical subjects along with their course codes, credit hours and assessment details for the 5th semester of 2020-23 batch of B.Sc. (CSE) program as per the CBCS pattern.

Uploaded by

Shwetta Bajpai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views33 pages

Scheme 3 Year

1. The document provides the course details for Artificial Intelligence and Principles of Information Security subjects for the 5th semester of B.Sc. (Computer Systems & Engineering) program. 2. It lists the course objectives, outcomes, units of study, topics covered in each unit, essential and suggested reading materials for both subjects. 3. The document also provides the semester-wise and year-wise distribution of various core, elective and practical subjects along with their course codes, credit hours and assessment details for the 5th semester of 2020-23 batch of B.Sc. (CSE) program as per the CBCS pattern.

Uploaded by

Shwetta Bajpai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Loyola Academy, Alwal, Secunderabad 500 010

YEAR-WISE AND SEMESTER-WISE DISTRIBUTION OF SUBJECTS


DEPARTMENT OF COMPUTER SCIENCE
B.Sc. (COMPUTER SYSTEMS & ENGINEERING)
FIFTH SEMESTER
ACADEMIC YEAR 2022-23 OF 2020-23 BATCH (CBCS)

Duration of Marks
Subject Hours
Sl. Part Title of the Subject Exam Credits
Code /Week Internal External Total
No. (hrs.)
THEORY
Artificial Intelligence
CE21501A
(DSE-1)
1 II 4 3 40 60 100 4
Principles of Information
CE21501B
Security (DSE-1)

2 II CE21502 Ethical Hacking (SEC-4) 3 3 40 60 100 3

Data Base Management


3 II CE18503 4 3 40 60 100 4
Systems (Core-14)

Linux Administration
4 II CE21504 4 3 40 60 100 4
(Core-15)
Software Engineering
5 II CE21505 4 3 40 60 100 4
(Core-16)

Computer Networks
6 II BS18545 4 3 40 60 100 4
(Core-17)

PRACTICALS

Data Base Management


7 II CE18506 2 3 40 60 100 1
Systems- Lab (Core-14)

Ethical Hacking - Lab


8 II CE21507 2 3 40 60 100 1
(SEC-4)

Linux Administration - Lab


9 II CE21509 2 3 40 60 100 1
(Core-15)

10 II CE18508 Internship - - 40 - 40 3

Total 29 - 400 540 940 26


*Discipline-Specific Elective (DSE) *Skill Enhancement Course (SEC)

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

71
Loyola Academy, Alwal, Secunderabad 500 010

ARTIFICIAL INTELLIGENCE
(Discipline Elective -1)
(NEW COURSE)
Credits :4 Semester: V
Course Code : CE21501A No. of Lecture Hours: 60
Objectives:
 To understand the concepts of state space representation, exhaustive search, heuristic
search together with the time and space complexities.
 To learn different knowledge representation techniques
 To understand the applications of AI
Course Outcomes:
CO1: Explain basic concepts of AI and search techniques
CO2: Demonstrate various heuristic techniques and constraint satisfaction problem.
CO3: Develop proofs in first order and propositional logic using resolution and unification
CO4: Choose appropriate knowledge representation techniques
CO5: Design approaches to planning

UNIT-I 12Hrs
1. Introduction- Concept and definition, History and related concepts of AI 2
2. Comparison of Human & Computer skills, components of AI 1
PROBLEM SOLVING THROUGH AI
3. Introduction, representation of AI problems 2
4. Production system, Algorithm of Problem solving 2
5. Examples of AI problems-Water Jug Problem, Magic Square, TSP 2
6. Nature of AI problems 1
7. Search Techniques- Breadth first, Depth First, Depth limited, bidirectional 2

UNIT-II 12Hrs
HEURISTIC SEARCH
1. Basic concepts of Heuristic search, designing Heuristic function 1
2. Types of Heuristic search techniques- Generate and test, Best-first search,
Problem reduction, Hill Climbing search 3
3. Constraint satisfaction, Means Ends Analysis and Min-Max Search 4
INTRODUCTION TO KNOWLEDGE
4. Introduction, types of knowledge, knowledge representation, storage and acquisition,
organization and management 4

UNIT-III 12 Hrs
LOGIC
1. Introduction, Propositional calculus, predicate logic 5
2. Resolution, Unification 5
3. Limitations of Logic, Logic Programming 2

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

72
Loyola Academy, Alwal, Secunderabad 500 010

UNIT-IV 12Hrs
ADVANCED KNOWLEDGE REPRESENTATION TECHNIQUES
1. Introduction, frames, semantic network 3
2. Conceptual Graphs and dependencies, Script 2
REASONING WITH UNCERTAINITY
3. Introduction, representing and reasoning with uncertain knowledge 1
4. Probabilistic reasoning 6

UNIT-V 12Hrs
Learning, Planning and Understanding
1. Introduction, types of learning- rote learning, learning by taking advice, induction 3
2. Planning-components, block world planning, identifying solution, Goal stake
Planning 3
Expert Systems
3. Introduction, Experts and Expert Systems, Successive development of Expert
Systems, overview of Expert System, characteristics of Expert system 3
4. Expert System architecture, Inference Engine, Design and types of Expert system 3

ESSENTIAL READING

1. Kumar, Ela. 2019. Artificial Intelligence. 1st Edition. I.K International Publishing
House Pvt. Ltd. India: New Delhi
2. Russel J,Stuart. Norvig, Peter. 2015. Artificial Intelligence, A Modern Approach. 3rd
Edition. Pearson Education. New Delhi: India

SUGGESTED READING

1. Kaushik, Saroj. 2019. Artificial Intelligence. First Edition. CENGAGE LEARNING.


India: New Delhi
2. Rich, Eliane. , Knight, Kevin, Nair. Shiv Shanker. 2008. Artificial Intelligence. 3rd
Edition. TMH. India: New Delhi

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

73
Loyola Academy, Alwal, Secunderabad 500 010

PRINCIPLES OF INFORMATION SECURITY


(Discipline Elective -1)
(NEW SYLLABUS)
Credits :4 Semester : V
Course Code: CE21501B No. of Lecture Hours: 60

Objectives:
 To compile, analyze, and assess the applicability of best practices in addressing
information.
 To address the issues relevant to the cyber security community

Course Outcomes:
CO1: Explain concepts of Security System Development Life Cycle, Need for Security
CO2: Identify the risk, assess and risk control strategies.
CO3: Demonstrate expertise in configuring host and network level technical security controls to
include host firewalls, user access controls, host logging, network filtering, intrusion detection
and prevention
CO4: Analyze systems, tools, methods, and techniques for securing digital information within
an organization
CO5: Explain the concepts of Security Considerations in Mobile and Wireless Computing.

UNIT –I 12Hrs
INTRODUCTION OF INFORMATION SECURITY
1. Introduction to Security, Critical Characteristics of Information 2
2. Balancing Information Security and Access, Approaches to Information Security 2
Implementation, System Development Life Cycle
3. Security System Development Life Cycle, Information Security :Art of Science 2
4. Need For Security: Business Needs, Threats, Attacks 3
5. Secure Software Development-software Assurance, Software Design Principles , 3
Software Development Security Problems

UNIT –II 12 Hrs


RISK MANAGEMENT
1. Overview of Risk Management 2
2. Risk Identification 2
3. Risk Assessment 2
4. Risk Control Strategies 3
5. Selecting a Risk Control Strategy 3

UNIT –III 12 Hrs


SECURITY TECHNOLOGY: FIREWALLS AND VPNS
1. Firewalls: Processing modes, categorizations 2

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

74
Loyola Academy, Alwal, Secunderabad 500 010

2. Firewall Architecture, Choosing a Firewall 2


3. Configuring and Managing a Firewall 2
4. Firewall Rules 2
5. Protecting Remote Connections: Securing Authentication with Kerberos 2
6. VPN: Transport and Tunnel Mode 2

UNIT-IV 12 Hrs
SECURITY TECHNOLOGIES: INTRUSION DETECTION AND OTHER SECURITY TOOLS
1. IDPS :terminology, types of IDPS 3
2. IDPS Detection Methods, IDPS Response Behavior 2
3. Strengths and Limitations of IDPS 1
4. Honeypots, Honey nets and Padded Cell Systems 1
5. Port Scanners, Firewall Analysis Tools 1
6. Operating System Detection Tools, Vulnerability Scanners 2
7. Packet Sniffers , Wireless Security Tools 2

UNIT-V 12 Hrs
SECURITY CONSIDERATIONS IN MOBILE AND WIRELESS COMPUTING
1. Proliferation of Mobile and Wireless Computing Era 2
2. Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era 2
3. Security Challenges posed by Mobile Devices, Registry Settings for Mobile 2
Devices
4. Authentication Service Security 2
5. Organizational Security Policies and Measures in Mobile Computing Era 2
6. Use of RFID in Mobile Commerce nd Information Asset Protection 2

ESSENTIAL READING
1. Whitman Michael, E. and Mattord Herbert, J. 2011. Principles of Information
Security. 4th Edition. USA: Course Technology.
2. Nina Godbole. Information Systems Security: Security Management, Metrics,
Frameworks and Best Practices. 2nd Edition Wiley Publications

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

75
Loyola Academy, Alwal, Secunderabad 500 010

ETHICAL HACKING
(NEW SYLLABUS)
Credits :3 Semester: V
Course Code : CE21502 No. of Lecture Hours: 45

Objectives:
 To get familiarize with the essential terms in Hacking and Various phases of attacks
 To provide the details on Law and Punishment for Hacking.
 To explain the maintenance of access gained through hacking and the techniques used to
avoid the traces of attacks in order to escape from the legal Punishment by a malicious
hacker

Course Outcomes:
CO1: Explain essential terminology and phases of hacking
CO2: Analyze how to perform reconnaissance in various organizations
CO3: Identify different types of scanning methods
CO4: Explain the maintenance of access gained through hacking
CO5: Design techniques used to avoid the traces of attacks in order to escape from the legal
Punishment by a malicious hacker.

UNIT – I 9Hrs
1. Ethical Hacking concepts and essential terminology 2
2. Different phases involved in an exploit by a Hacker 2
3. Overview of Attacks and Identification of Exploit Categories 2
4. Legal implications of Hacking. 1
5. Hacking, Law and Punishment 2

UNIT-II 9Hrs
1. Essential Terms : Threat, Vulnerability and Attack 2
2. Elements of Security : Reconnaissance, Active & Passive reconnaissance 2
3. Foot printing, Internet Foot printing: Determining the scope of your activities 2
4. Get Proper Authorization and Publicly Available Information 1
5. DNS Interrogation and Network Reconnaissance 2

UNIT-III 9Hrs
1. Scanning :Network Ping Sweeps, Determine which services are running,
Scan types 2
2. Identifying TCP and UDP services Running, Unix/Linux-based
Port Scanning Strobe 2
3. UDP_scan , Netcat Windows-based port scanners WUPS 2
4. Detecting the Operating system, Active stack Fingerprinting,
Passive stack fingerprinting 2
5. Passive Signatures, Basic Banner Grabbing: Telnet and Netcat 1

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

76
Loyola Academy, Alwal, Secunderabad 500 010

UNIT-IV 9Hrs
1. Gaining Access, Hacking Windows, Privilege Escalation 2
2. Extracting and Cracking Passwords, Grabbing the Password Hashes 2
3. Dumping Cached Passwords, Remote Control and Back doors, 1
4. Command-line Remote control Tools, Port Redirection:Fpipe 2
5. Data-Driven Attacks, Buffer Overflow Attacks, DNS Cache Poisoning 2

UNIT-V 9Hrs
1. Trojans, Social Engineering and Maintaining Access 1
2. Rootkits and Back Doors, Kernel Modification, File/Directory hiding 2
3. Process Hiding, port hiding, Registry Key/value Hiding, User/group hiding 2
4. Keystroke Loggers ,service hiding and hacker defender, Bots and Zombies 2
5. Covering Tracks, Disabling Auditing, Clearing Event Log,
Log clearing in UNIX 2

ESSENTIAL READING
1. Mc Clure, Stuart, Scambray, Joel and Kurtz, George. 2009. Hacking
Exposed.7thEdition.New Delhi: McGraw Hill.

SUGGESTED READING
1. Engerbrestson, Patrick. 2011.Basics of Hacking and Penetration.Syngress
2. Walker, Matt.2012. Certified Ethical Hacker All-in-One.McGraw Hill.

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

77
Loyola Academy, Alwal, Secunderabad 500 010

DATABASE MANAGEMENT SYSTEMS

Credits :4 Semester : V
Course Code : CE18503 No of Lecture Hours: 60

Objectives:
 To design a database and enforce Integrity Constraints to keep database consistent.
 To normalize tables to eliminate redundancies.
 To query relational data using Structured Query Language.
 To understand storage strategies for easy retrieval of data through index.
 To understand PL/SQL and transaction management.

Course Outcomes:
CO1: Represent logical database using Entity Relationship and Enhanced ER model.
CO2: Formulate database using relational algebra and organize relation using normalization.
CO3: Design SQL queries and implements PL/SQL.
CO4: Classify the storage and file structure, storage access, indexing and hashing techniques of
the database.
CO5: Explain the concept of Transactions, recovery system and concurrency control.

UNIT-I 12Hrs
1. Introduction, data base applications and purpose 2
2. View of data, data base languages-DDL,DML 2
3. Data base architecture, users and administrators 2
4. Design process overview, Entity relational ship model, Constraints 2
5. ER diagrams, design issues, weak entity sets 2
6. Extended ER features 2

UNIT-II 12Hrs
1. Structure of Relational model, Reduction to schema 1
2. Relational algebra- union, project, select and other operations 3
3. SQL- data definition, structure, set operations, Aggregate functions 2
4. Modification of data base, Nested sub queries, views, Joins and Null values 3
5. Introduction to Normalization, 1NF, 2NF and 3NF, BCNF 3

UNIT-III 12Hrs
1. Introduction, Programming, Functions and Procedures 2
2. Triggers, Cursors-implicit, explicit, cursor for loops 3
3. Error handling in PL/SQL, Authorization, granting, revoking privileges 3
4. Roles, Authorization on views, functions and procedures 2
5. Application security 2

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

78
Loyola Academy, Alwal, Secunderabad 500 010

UNIT-IV 12Hrs
1. Overview of physical storage media 1
2. Magnetic disks- physical characteristics and performance measures 1
3. Buffer manager, replacement policies, File organization 3
4. Organization of records in files 2
5. Ordered indices, Index sequential-B+ trees 2
6. Static hash function, Dynamic hash function, comparison 3

UNIT-V 12Hrs
1. Transactions- concepts, states 1
2. Implementation of Atomicity and durability, Concurrent executions 1
3. Serializability, Recoverability, Testing for Serializability 1
4. Concurrency control, lock based protocols, locks and granting locks 1
5. Two Phase locking and dead lock handling 2
6. Recovery system, failure 1
7. Storage structure- storage types, data access 1
8. Recovery and Atomicity, log based recovery, Check points 2
9. Distributed Databases- Homogenous &Heterogeneous, Distributed data storage 2

ESSENTIAL READING
1. Korth Henry, F. SilberSchatz Avi. And Sudarshan, S. 2008. Database System
Concepts. 5th Edition. New Delhi: Tata McGraw-Hill.
2. Bayross Ivan. 2010. SQL, PL/SQL- The Programming Language for Oracle. 4th
Edition. New Delhi: BPB Publications.

SUGGESTED READING
1. McFadden Fred, R. Hoffer Jeffery, A and Prescott Mary, B. 2007. Modern Database
Management. 8th Edition. New Delhi: Pearson.
2. Elmasri Ramez, Navathe and Shamkant , B. 2008. Fundamentals of Database
Systems. 5th Edition. New Delhi: Pearson Education.

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

79
Loyola Academy, Alwal, Secunderabad 500 010

LINUX ADMINISTRATION

Credits :4 Semester : V
Course Code : CE21504 No. of Lecture Hours: 60

Objective: To learn the basics of Unix/Linux and different Services of Linux

Course Outcomes:
CO1: Describe Installation of Linux and User, Group Administration, ACL
CO2: Explain the configuration NFS, FTP and Send mail server
CO3: Explain configuration DHCP and SElinux
CO4: Explain configuration SAMBA and DNS server
CO5: Explain the configuration Apache server, disk quotas

UNIT-I 12Hrs
1. History of Linux & GNU- LINUX, Features and Overview of Linux. 1
2. ifference between Fedora/RHEL , 1
3. Compressing & Archiving files(bzip2 , b2cat, bunzip 2, tar). 1
4. Permissions, setuid, setgid and sticky bit. Access control lists(getfacl, setfacl) 2
5. Links, Hard Links, Symbolic link, removing a link. 1
6. User Administration & group Administration. 2
7. Backing up file, choosing a backup medium, backup utilities, Performing simple
backup. 1
8. The init Demon, Start & Stop System & server, Run levels. 1
9. Scheduling task using at &crond. 1
10. Working with nmtui command. 1

UNIT-II 12Hrs
1. Introduction to FTP,security,FTP Connections,FTP Clients. 1
2. Running FTP and SFTP clients
Basic commands:hostname, get, put, open, prompt, mget. 1
3. Configuring a vsftpd server description of directives logging in, anonymous users,
uploading & downloading files messages. 1
4. Introduction to sendmail, outbound-Email, Inbound email alternatives to send
mail 1
5. Setting up send mail server Configuring sendmail on a client, mail logs 1
6. Additional Email tools, Squirrelmail, difference b/w SMPT, POP3, IMAP 1
7. Software Package Administration, Installation/uninstallation/ querying
And updating software packages 3
8. Introduction to NFS, NFS Client/Server setup , Running an NFS Client 1
9. Mounting a remote directory configuring NFS using system-config-nfs 2

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

80
Loyola Academy, Alwal, Secunderabad 500 010

UNIT-III 12Hrs
1. Securing a system, SELinux config: The SELinux configuration file 2
2. Getenforce, Setenforce and setstatuscommands 2
3. Introduction to DHCP , working of DHCP , DHCP client 2
4. dhcpd:the DHCP Daemon , Static IP address, 2
5. Virtualization with Xen 2
6. RAID levels, LVM 1
7. Intro to Web Based administration 1

UNIT-IV 12Hrs
1. Introduction to SAMBA, Samba utilities & daemons , Samba Users 2
2. user Maps ,Passwords , running Samba Clients 2
3. Working with Shares from Linux , Working with shares from windows 2
4. Setting up Samba Server ,Configuring Samba Server using System-config-Samba, 2
5. Samba config-manually configuring a Samba server parameters in smbd.conf.file 1
6. Intro to DNS nodes , domains and subdomains , Zones 1
7. Queries , servers , Resource Records DNS working 1
8. Setting up a domain using System-config-bind, Setting up a Domain server
9. Adding resource records 1

UNIT-V 12Hrs
1. Introduction to Firewall, Firewall configuration window 2
2. Building a firewall using system-config-firewall . Introduction to Iptables,
Filtering a packet in kernel,Anotomy of iptables command. 3
3. Apache server introduction , Running apache web server
modifyinghttpd.conf configuration file testing apache 3
4. Configuring directives , listen, server Admin, DocumentRoot, Servername ,
DirectoryIndex,Contexts& Containers 2
5. Disk Quota, Enabling Quota’s on partition, Creating Quota’s for user. 2

ESSENTIAL READING
1. Christopher Negus, Eric Foster-Johnson. 2009. Fedora10 and Red Hat Enterprise
Linux Bible. New Delhi: Wiley.
2. Sobell Mark, G. 2014. A Practical Guide to Fedora and Red Hat Enterprise Linux.
7th Edition. New Delhi: Prentice Hall of India.
3. Vugt Sander van. 2013. Red Hat Enterprise Linux 6 Administration: Real World
Skills for Red Hat Administrators. USA: SYBEX Inc.
4. Fox Tammy. 2007. Red Hat Enterprise Linux 5 Administration UNLEASHED.
SAMS Publishers

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

81
Loyola Academy, Alwal, Secunderabad 500 010

SOFTWARE ENGINEERING
(NEW SYLLABUS)

Credits :4 Semester: V
Course code: CE21505 No. of Lecture Hours: 60
Objectives:
 To enable students learn software engineering principles
 To learn the theoretical foundation from the view of object oriented concept.

Course Outcomes:
CO1: Design software through various process models.
CO2: Analyze Object Oriented concepts and various Models.
CO3: Choose different designs and architectures.
CO4: Explain components, golden rules and design evaluation.
CO5: Select testing techniques and determine its quality.

UNIT - I 12Hrs
1. The evolving role of software, software, changing nature of software 2
2. Legacy Software, Software Myths 2
3. Software engineering-layered technology, Process Framework 2
4. CMMI, Process patterns, Personal and Team Process models 1
5. Process Models: waterfall, incremental, evolutionary process models 2
6. Agile process models 3

UNIT- II 12Hrs
1. Requirements Engineering tasks, Initiating requirements engineering process 2
2. Eliciting requirements, 1
3. Developing Use Cases, Building analysis model 2
4. Negotiating and validating requirements 1
5. Requirements analysis, analysis modeling approaches, Data modeling Concepts 2
6. Object oriented analysis, Scenario based modeling, Flow oriented modeling 2
7. Class based modeling, creating behavioral model, Case Study 2

UNIT- III 12Hrs


1. Design Process and Quality 2
2. Design concepts and Design model 2
3. Pattern Based software design 2
4. Software architecture, Data design Architectural styles and Patterns 2
5. Architectural design, Assessing alternative architectural design 2
6. Managing Data flow into Software architecture 2

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

82
Loyola Academy, Alwal, Secunderabad 500 010

UNIT- IV 12Hrs
1. Introduction to Component, Designing class based components 2
2. Conducting component level design, Object constraint language 2
3. Design conventional components 2
4. Golden rules, User Interface Analysis and Design 2
5. Interface analysis, Interface design steps 2
6. Design Evaluation 2

UNIT- V 12Hrs
1. A Single approach to Software testing 1
2. Strategic issues, Test strategies for Conventional Software 1
3. Validation testing, System Testing 1
4. Testing fundamentals, Black box and White Box Testing 2
5. Basis Path Testing, Control Structure Testing 2
6. Software quality 1
7. Metrics for analysis model 2
8. Metrics for design model, Metrics for source code 1
9. Metrics for testing, Metrics for maintenance. 1

ESSENTIAL READING
1. Pressman, Rogers S. 2015. Software Engineering, A practitioner’s Approach. 6th
Edition. McGraw Hill Education

SUGGESTED READING
1. Deepak Jain. 2009. Software Engineering. New Delhi: Oxford University Press.
2. Rajib Mall. 2009. Fundamentals of Software Engineering. 3rd Edition. New Delhi:
PHI.
3. Sommerville. 2007. Software Engineering. 7thEdition.New Delhi: Pearson Education.

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

83
Loyola Academy, Alwal, Secunderabad 500 010

COMPUTER NETWORKS
Credits :4 Semester: V
Course Code : BS18545 No. of Lecture Hours: 60

Objectives:
 To get familiarize with fundamental concepts of computer network.
 To gain expertise in various layers of the TCP/IP model.

Course Outcomes:
CO1: Identify basic computer network topologies and protocols and explain Data
Communication System components
CO2: Classify different error detecting techniques.
CO3: Construct sub-netting and routing mechanisms.
CO4: Sketch the routing protocols and analyze how to assign the IP addresses for the given
network
CO5: Develop network design and implementation

UNIT-I 12 Hrs
1. Introduction: Data Communications, networks, Protocols and Standards 2
2. OSI Model, layers in the OSI model, TCP/IP Protocol suite 2
3. Analog and Digital, Transmission impairments 2
4. Transmission Media-Guided media, Connecting Devices 2
5. Digital Transmission- digital-to-digital conversion 2
6. Multiplexing: Frequency-division, Wavelength and Time Division 2

UNIT-II 12 Hrs
DATA LINK LAYER
1. Error detection and correction-Parity, check sum, CRC, Hamming code 3
2. Data Link Control: Framing, flow and error control 2
3. Stop-and-wait ARQ, Go-Back-N ARQ, Selective Repeat ARQ, Piggybacking 2
4. HDLC, Random Access- ALOHA, CSMA, CSMA/CD, CSMA/CA 3
5. Wired LANs- Ethernet 2

UNIT-III 12 Hrs
NETWORK LAYER
1. IP address space- Introduction 1
2. Class full and Classless addressing, subnetting and supernetting 2
3. IPv4- datagram, Fragmentation, checksum, options 2
4. Internet Control Protocols- ICMP, IGMP, ARP and RARP 3
5. Delivery, Forwarding, Unicast routing protocols- RIP, OSPF, BGP 4

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

84
Loyola Academy, Alwal, Secunderabad 500 010

UNIT-IV 12 Hrs
TRANSPORT LAYER
1. Process-to-Process Delivery, UDP-well known ports, user datagram, checksum 2
2. UDP Operation, use of UDP 2
3. TCP- process to process communication, Numbering bytes, TCP services 2
4. Flow control- silly window syndrome, Error Control 3
5. TCP connection, State transition diagram, Congestion control, Timers, Options 3

UNIT-V 12 Hrs
APPLICATION LAYER
1. DNS- Namespace, domain name space, distribution of name space 2
2. DNS in internet, resolution, DNS messages, types of records 2
3. TELNET, E-mail- architecture, message transfer agent: SMTP 3
4. Message Access Agent: POP, FTP 2
5. WWW and HTTP- architecture, web documents, HTTP 3

ESSENTIAL READING
1. Forouzan, Beharouz A. 2011. Data Communications and Networking. 3rd Edition.
New Delhi: Tata Mc Graw Hill.(UNIT-I,II)
2. Forouzan, Beharouz A. 2005. TCP/IP Protocol Suite. 3rd Edition. New Delhi: Tata
Mc Graw Hill.(UNIT-III-V)

SUGGESTED READING
1. Tanenbaum, Andrew S. 2008. Computer Networks. 4th Edition. New Delhi: Pearson
Education.

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

85
Loyola Academy, Alwal, Secunderabad 500 010

DATABASE MANAGEMENT SYSTEMS LAB

Credits :1 Semester: V
Course Code : CE18506 No. of Practical Hours: 30

Objectives:
 To present the concepts and techniques relating to query processing by SQL engines.
 To present SQL and procedural interfaces to SQL comprehensively.
Outcome: Students will be able to use commercial relational database system (Oracle) by
writing Queries using SQL and implement PL/SQL.

No. of Hours TOPICS


1 Data definition language commands
2 Data manipulation language commands
3 Simple to complex condition query creation using SQL Plus
4 Queries involving set operators, aggregate functions
5-6 Queries involving scalar function: String, Numeric, Conversion and Date
7 Queries involving group-by and having clause, order by clause
8 Queries involving sub-queries and views
9 Queries involving types of joins-inner, outer joins
10 Queries involving forms and reports
11 Queries involving Data control and transactional commands
12 Creating simple PL/SQL programs involving loop and decision
13 Creating PLSQL cursors, triggers
14 Creating PL/SQL procedures and functions
15 Creating PL/SQL programs for error handling

NOTE:
1. Creation of sample Database consisting of Employee, Department and Grade tables.
2. Creation of other databases suitable for the course.

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

86
Loyola Academy, Alwal, Secunderabad 500 010

ETHICAL HACKING LAB


(NEW SYLLABUS FOR LAB COURSE)

Credits :1 Semester: V
Course Code : CE21507 No. of Practical Hours: 30

Objective: To get hands on experience with popular hacking tools and understand various
hacking techniques in brief.

Outcome: Students will be able to learn some of the skills that you would require to become an
expert in Ethical Hacking.

Topics to be covered
1. Installation of Operating System Using VMware.
2. Exploring Internet Options for a Browser, Examination and configuring the
Contents of Security and Privacy Tabs.
3. Setting up a Simple network using Simulation Tools(Packet tracer)
4. Perform an experiment to Grab a Banner with Telnet
5. Using Nmap
 Find open ports on a System
 Find the machines which are active
 Find the version of Remote OS on other systems
 Find the version of Software installed on other system.
6. Program to implement Virus.
7. Demonstrate Intrusion Detection System
8. Exploring Wireless Security Tools (Air snare)
9. Implementation of Stenography–Hiding a Text File within a Image File using WinRar
10. Digital Signing a word document, PDF document and Email
11. Creating Public Key, Private Key and Digital Certificate
12. Create SSL Certificate Using XCA Software
13. Demonstration of Hash Function using Cry tool
14. Study of Hardware and Software Firewalls and Case Study on Man-In-Middle
Phishing and harming Attacks
15. Hacking tools and skills.
16. Foot printing and Reconnaissance
17. Finger printing.
18. System Hacking
19. Wireless Hacking.
20. Sniffing & their tools

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

87
Loyola Academy, Alwal, Secunderabad 500 010

LINUX ADMINISTRATION LAB

Credits :1 Semester : V
Course Code : CE21509 No. of Practical Hours: 30

Objective: To get hands on experience on installations, configuration of server service roles and
email servers and clients.

Outcome: Students will be able to demonstrate the core system-administration skills required
in Red Hat Enterprise Linux environments.

No. of Hours TOPICS


1. Installation of Red hat Enterprise Linux and Fedora.
2. Creating, deleting and modifying users and group using commands and
Graphical tool.
3. Assigning advanced files permissions, Creating, modifying and deleting
ACL’s, usage of rpm, tar.
4. Creating Quotas for users, using dump and restore.Automation of tasks using at
and crond.
5. Configuring FTP Client and Server for uploading and downloading files
6. Configuring of Postfix mail Server
7. Configuration of Squirrel Mail to compose the mail on GUI mode
8. Configuration of NFS server
9. Configuration of DHCP
10. GUI Based application to manage n/w via browser webmin administration
11. Configuration of SAMBA
12-13 Configurations of DNS
14-15 Configuration of Apache Server

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

88
Loyola Academy, Alwal, Secunderabad 500 010

INTERNSHIP

Credits: 3 Semester :V
Course Code: CE18508

Third year students take up an On Job Training in the domain of Networking, PC Hardware
Installation and Trouble Shooting, or Network Administration during summer for 4 weeks
which carries a total of 40 marks evaluated internally during 5th Semester.

The Criteria for the Internal Evaluation of On Job Training (OJT) Work for 40 marks is as
follows:

1. Attendance 5 marks
2. Internal Presentation (Presentation and Communication skills) 10 marks
3. Internal OJT presentation /Practical demonstration(Objectives, work submission, 15 marks
methodology, results, Practical relevance evaluated by the faculty)
4. OJT Report 10 marks

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

89
Loyola Academy, Alwal, Secunderabad 500 010

YEAR-WISE AND SEMESTER-WISE DISTRIBUTION OF SUBJECTS


DEPARTMENT OF COMPUTER SCIENCE
B.Sc. (COMPUTER SYSTEMS AND ENGINEERING)
SIXTH SEMESTER
ACADEMIC YEAR 2022-23 OF 2020-23 BATCH (CBCS)

Duration Marks
Sl. Subject Hours
Part Title of the Subject of Exam Credits
No. Code /Week Internal External Total
(hrs.)
THEORY
Cloud Computing
CE21601A
(DSE-2)
1 II 4 3 40 60 100 4
Internet of Things
CE21601B
(DSE-2)
Web Application
CE21602A
Testing (DSE-3)
2 II 4 3 40 60 100 4
Big Data Analytics
CE21602B
(DSE-3)
Cryptography and
3 II CE21603 Network Security 4 3 40 60 100 4
(Core-18)

PRACTICALS
Web Application
CE21604A
Testing- Lab (DSE-3)
4 II 2 3 40 60 100 1
Big Data Analytics -
CE21604B
Lab(DSE-3)
Major Project
5 II CE18605 15 3 40 60 100 6
(DSE-4)

Total 29 - 240 360 600 19

*Discipline-Specific Elective (DSE)

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

90
Loyola Academy, Alwal, Secunderabad 500 010

CLOUD COMPUTING
(Discipline Specific Elective-2)
(NEW SYLLABUS)

Credits :4 Semester: VI
Course Code: CE21601A No. of Lecture Hours: 60

Objectives:
 To implement Basics, techniques and tools for Cloud Computing.
 To understand any kind of heterogeneous resources over a network using open standards.

Course Outcomes:
CO1: Explain differences of system models.
CO2: Identify different types of clouds
CO3: Analyze virtualization and data centre working procedure
CO4: Classify public cloud platforms
CO5: Choose a particular data security in the cloud

UNIT-I 12 Hrs
Principles of Parallel and Distributed Computing
1. Eras of Computing, parallel vs distributed computing 1
2. Elements of parallel computing 3
3. Elements of distributed computing 5
4. Technologies for distributed computing-RPC, distributed object frameworks 3

UNIT-II 12 Hrs
1. Cloud Computing Overview - Introduction, Cloud Components
Infrastructure Services 2
2. Benefits – Scalability, Simplicity, Knowledgeable Vendors ,
More Internal Resources, Security 3
3. Limitations - Your Sensitive Information, Applications Not Ready,
Developing Your Own Applications, Features of cloud platform 4
4. System models for advanced computing –clusters of cooperative computing, grid
computing and Cloud computing 3

UNIT-III 12 Hrs
1. Introduction, The cloud reference model: Architecture, Infrastructure-and
Hardware-as-a-service, Platform as a service, Software as a service. 4
2. Types of clouds: Public clouds, Private clouds, Hybrid clouds, Community clouds,
Economics of Cloud 4
3. Open challenges: Cloud definition, Cloud interoperability and standards, Scalability and
fault tolerance, Security, trust, and privacy, Organizational aspects 4

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

91
Loyola Academy, Alwal, Secunderabad 500 010

UNIT-IV 12 Hrs
VIRTUALIZATION
1. Introduction and characteristics of virtualized environments: Increased Security,
Managed Execution, Portability 3
2. Taxonomy of Virtualization techniques: Execution virtualization, other types of
Virtualization 3
3. Virtualization and Cloud Computing 2
4. Pros and Cons of Virtualization 1
5. Technology examples- Xen: para virtualization, VMware: full virtualization,
Microsoft Hyper V 3

UNIT-V 12 Hrs
1. Risks, consequences for cloud computing 2
2. Cloud Certifications and Audit, SLA with Cloud Service providers 2
3. Host security for SAAS,IAAS,PAAS 2
4. Data security in the cloud. 2
5. Application Security in the cloud 2
6. Security as a service :benefits, concerns ,providers 2

ESSENTIAL READING
1. Buyya, Raj Kumar, Vecchiola, Christian. And Selvi, Thamarai S. 2012. Mastering
Cloud Computing. New Delhi:TMH. (Unit I,II, III,IV)
2. Cloud Computing, The Black book, Dream Tech Press (Unit V)

SUGGESTED READING
1. Geoffrey, Kaittwang, Fox C and Jack J, Elsevier, Dongarra. 2012. Distributed and
loud Computing. India.
2. House, Ritting ,Ramsome, John W., James F. 2012. Cloud Computing. CRC Press.

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

92
Loyola Academy, Alwal, Secunderabad 500 010

INTERNET OF THINGS
(Discipline Specific Elective- 2)
(NEW SYLLABUS)
Credits :4 Semester: VI
Course Code: CE21601B No. of Lecture Hours: 60

Objectives:
 To introduce the terminology, technology and its applications
 To introduce the concept of M2M (machine to machine) with necessary protocols
 To introduce the Raspberry PI platform, that is widely used in IoT applications
 To introduce the implementation of web based services on IoT devices

Course Outcomes:
CO1: Identify the importance of IOT and its applications
CO2: Differentiate between IOT and M2M, SDN and NFV
CO3: Understand building of IOT devices and Raspberry PI
CO4: Explain working of WAMP server and AWS
CO5: Understand applications and analytics of IoT

UNIT - I 12 Hrs
INTRODUCTION AND CONCEPTS
1. Introduction to Internet of Things –Definition and Characteristics of IoT 3
2. Physical Design of IoT , Logical Design of IoT 3
3. IoT Enabling Technologies 3
4. IoT Levels and Deployment Templates, Domain Specific IoTs – Home Automation
Cities, Environment, Agriculture, Industry, health and Lifestyle 3

UNIT – II 12 Hrs
IoT and M2M
1. IoT and M2M- Introduction to M2M, Difference between IoT and M2M 2
2. SDN and NFV for IoT 3
IoT SYSTEM MANAGEMENT WITH NETCONF-YANG
3. Need for IoT Systems Management, SNMP 2
4. Network Operator requirements, NETCONF, YANG 2
5. IoT Systems Management with NETCONF-YANG 1
6. IoT Platforms Design Methodology: Introduction, IoT Design Methodology 2

UNIT - III 12Hrs


IoT PHYSICAL DEVICES AND ENDPOINTS
1. Building blocks of IoT device 2
2. Raspberry Pi, About the Board, Linux on Raspberry Pi, Raspberry Pi Interfaces 3
3. Programming Raspberry Pi with Python 5
4. Other IoT devices 2

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

93
Loyola Academy, Alwal, Secunderabad 500 010

UNIT - IV 12Hrs
IoT PHYSICAL SERVERS AND CLOUD OFFERINGS
1. Introduction to Cloud Storage models and Communication API 1
2. WAMP-AutoBahn for IoT, Xively Cloud for IoT 3
3. Python web application framework-Django 3
4. Designing a RESTful web API 3
5. Amazon Web Services for IoT 2

UNIT - V (SOURCE CODE EXCLUDED) 12 Hrs


1. Python packages of Interest for IoT - JSON, XML, HTTPLib,
URLLib, SMTPLib 3
Case Studies Illustrating IoT Design
2. Home Automation- Smart Lighting, Home Intrusion Detection 2
3. Cities- Smart Parking 2
Data Analytics for IoT
4. Introduction, Apache Hadoop 3
5. Using Hadoop MapReduce for Batch Data Analysis 2
6. Apache Spark 2

ESSENTIAL READING
1. Bahga, Arshdeep and Madisetti, Vijay. 2015. Internet of Things - A Hands-on
Approach. Universities Press ISBN: 9788173719547
2. Richardson, Matt and Wallace, Shawn. 2014. Getting Started with Raspberry Pi.
O'Reilly (SPD). ISBN: 9789350239759

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

94
Loyola Academy, Alwal, Secunderabad 500 010

WEB APPLICATION TESTING


(Discipline Specific Elective-3)
(SYLLABUS FOR NEW COURSE)
Credits : 4 Semester: VI
Course Code: CE21602A No. of Lecture Hours: 60

Objectives:
 To study the concepts of web application testing
 To learn different testing methods on server side and client side
Outcomes:
CO1: Identify Web application technologies
CO2: Experiment using Client-Side Controls
CO3: Explain authentication and authorization
CO4: Implement SQL injection
CO5: Develop Cross-Site Scripting

UNIT – I 12Hrs
1. Introduction of Web Applications, Benefits and Security of Web Applications 2
2. The New Security Perimeter and The Future of Web Application Security 3
3. Core Defence Mechanisms: Handling User Access, Handling User Input 3
4. Approaches to Input Handling Sanitization 1
5. Web Application Technologies : The HTTP Protocol and Web Functionality 3

UNIT -II 12Hrs


1. Mapping the Application, Enumerating Content and Functionality 2
2. Analyzing the Application identifying Entry Points for User Input 3
3. Bypassing Client-Side Controls, Transmitting Data Via the Client 3
4. Capturing User Data: HTML Forms and Browser Extensions 1
5. Handling Client-Side Data Securely 3

UNIT-III 12Hrs
1. Attacking Authentication ,Authentication Technologies 2
2. Design Flaws in Authentication 3
3. Implementation Flaws in Authentication 3
4. Attacking Session Management, Weaknesses in Token Generation 1
5. Weaknesses in Session Token Handling and Securing Session Management 3

UNIT-IV 12Hrs
1. Attacking Data Stores: Bypassing a Login ,Injecting into SQL 2
2. Exploiting a Basic Vulnerability, Injecting into Different Statement Types 3
3. Finding SQL Injection Bugs, Finger printing the Database 3
4. Injecting into NoSQL (MongoDB) and Injecting into XPath 1
5. Subverting Application Logic, Informed And Preventing XPath Injection 3

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

95
Loyola Academy, Alwal, Secunderabad 500 010

UNIT-V 12Hrs
1. Attacking Application Logic: The Nature of Logic Flaws 2
2. Real-World Logic Flaws, Avoiding Logic Flaws 3
3. Attacking Users: Cross-Site Scripting 3
4. Varieties of XSS, Reflected XSS Vulnerabilities 1
5. Stored XSS Vulnerabilities and DOM-Based XSS Vulnerabilities 2

ESSENTIAL READING
1. Dafydd Stuttard, Marcus Pinto. 2011. The Web Application Hacker’s Handbook
Finding and Exploiting Security Flaws. 2nd Edition. John Wiley & Sons Inc.
2. Gupta, Richa. 2021. Hands-on Penetration Testing for Web Applications. 1st
Edition. BPB Publications. India: New Delhi

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

96
Loyola Academy, Alwal, Secunderabad 500 010

BIG DATA ANALYTICS


(Discipline Specific Elective-3)
(SYLLABUS FOR NEW COURSE)

Credits: 4 Semester: VI
Course code: CE21602B No. of lecture hours: 60
Objectives:
 To understand and learn about Big Data.
 To learn the analytics of Big Data.
 To understand MapReduce fundamentals.

Course Outcomes:
CO1: Explain Big Data concepts and various technologies to handle it.
CO2: Use Hadoop Ecosystem and Map Reduce to process Big Data.
CO3: Analyze data processing through MapReduce
CO4: Choose YARN for resource management and Hive for data storage.
CO5: Develop Map Reduce Programming using Pig and data management using NoSQL.

UNIT-I
Getting an Overview of Big Data: 12 Hrs
1. Introduction, History of Data Management-Evolution of Big Data 1
2. Structuring Big Data, Elements of Big Data 1
3. Big Data Analytics, Careers and Future of Big Data 1
Exploring the Use of Big Data in Business Context:
4. Use of Big Data in Social Networking 1
5. Preventing Fraudulent Activities 1
Introducing Technologies for Handling Big Data:
6. Distributed and Parallel Computing for Big Data 2
7. Introducing Hadoop, Cloud Computing and Big Data 2
Understanding Big Data Technology Foundations:
8. Exploring the Big Data Stack, Virtualization and Big Data 2
9. Virtualization Approaches 1

UNIT-II 12 Hrs
Understanding Hadoop EcoSystem
1. Hadoop Ecosystem 2
2. Hadoop Distributed File System 4
3. HBase -Architecture, Regions 2
Understanding MapReduce Fundamentals and HBase
4. The Map Reduce Framework, Uses of MapReduce 2
5. Role of HBase in Big Data Processing 2

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

97
Loyola Academy, Alwal, Secunderabad 500 010

UNIT – III 12hrs


Processing your Data with MapReduce
1. Developing Simple MapReduce Application 2
Customizing MapReduce Execution and Implementing MapReduce program
2. Controlling MapReduce Execution with InputFormat 1
3. Reading Data with Custom RecordReader 2
4. Organizing Output Data with OutputFormat 2
5. Customizing Data with RecordWriter 2
6. Optimizing MapReduce Execution with Combiner 2
7. Controlling Reducer Execution with Partitioner 1

UNIT – IV 12hrs
Understanding Hadoop YARN Architecture:
1. Background and Advantages of YARN 2
2. YARN Architecture,Working of YARN, YARN Schedulers 2
3. YARN Configurations,YARN Commands,YARN Containers 2
Exploring HIVE:
4. Introducing Hive, Getting started with Hive 2
5. Data Types and Built-in functions in Hive,Hive DDL 2
6. Data manipulation in Hive,Data Retrieval Queries,Using Joins in Hive 2

UNIT – V 12hrs
Analyzing Data with Pig
1. Introducing Pig, Running Pig 1
2. Getting Started with Pig Latin 1
3. Working with Operators in Pig 2
4. Working with Functions in Pig 2
5. Debugging Pig, Error Handling in Pig 1
NoSQL Data Management:
6. Introduction to NoSQL 1
7. Types of NoSQL Data Models 2
8. Schema-Less Databases, Materialized Views 1
9. Distribution Models, Sharding 1

ESSENTIAL READING
1. DT Editorial Services. 2016. Big Data Black Book. Dreamtech Press.
SUGGESTED READING
1. White, Tom. 2012. Hadoop: The Definitive Guide. 3rd Edition. O’Reilly Media.

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

98
Loyola Academy, Alwal, Secunderabad 500 010

CRYPTOGRAPHY AND NETWORK SECURITY


(NEW SYLLABUS)
Credits :4 Semester: VI
Course Code : CE21603 No. of Lecture Hours: 60

Objective: To provide issues related to security in modern Networked Computer Systems.

Course Outcomes:
CO1: Identify information security goals, classical encryption techniques and acquire
fundamental knowledge on the concepts of finite fields and number theory.
CO2: Apply Public Key Cryptographic Technique for securing messages
CO3: Use an appropriate message authentication code.
CO4: Compare the performance of different message digest algorithms for verifying the
integrity of varying message sizes
CO5: Compare different IEEE standards and electronic mail security

UNIT-I 12Hrs
INTRODUCTION
1. Introduction to Security , Critical Characteristics of Information, The OSI 2
Security Architecture, Security Attacks
2. Security Services and Mechanisms 1
3. A model for Network Security 1
4. NSTISSC Security Model, Components of Information Security 2
CLASSICAL ENCRYPTION TECHNIQUES
4. Symmetric cipher model 1
5. Substitution Techniques-Caesar Cipher, Mono alphabetic cipher 1
6. Play fair cipher, Hill cipher, Polyalphabetic cipher, Transposition Techniques 2
7. The DES encryption, Details of Single Round, Key Generation 1
8. DES Decryption, The Avalanche Effect, The Strengths of DES 1

UNIT-II 12Hrs
MORE ON SYMMETRIC CIPHERS
1. Multiple Encryption and Triple DES 2
2. Key Distribution, Random Number Generation 2
PUBLIC-KEY CRYPTOGRAPHY AND RSA
1. The principles of public-key cryptosystems and essential steps of Public key 3
Crypto systems, Public key encryption to provide Authentication, Applications of
Public key cryptosystems, Requirements for public-key cryptography, Public-key
cryptanalysis
2. The RSA algorithm-Description of algorithm, computational Aspects, Key 2
generation and Security of RSA

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

99
Loyola Academy, Alwal, Secunderabad 500 010

3. RC4Stream Cipher 3
UNIT-III 12 Hrs
KEY MANAGEMENT
1. Distribution of public keys, public announcement of Public keys, publicly 3
available directory, public-key Authority, public-key Certificates, Distribution of
secret keys using public-key cryptography
2. Diffie-Hellman key exchange 3
MESSAGE AUTHENTICATION
3. Authentication Requirements, Authentication Functions-Message Encryption, 3
Message Authentication code, Hash Functions-Requirements for a hash function,
Simple Hash Functions, Birthday Attacks, Block Chaining Techniques
4. Security of Hash functions and MACS-Brute-force attacks, Message 3
Authentication codes

UNIT-IV 12Hrs
1. Secure Hash Algorithm (SHA), MD5 Algorithm. 3
2. Kerberos, X.509 Authentication Services 3
3. Digital Signatures 3
4. Whirlpool 3

UNIT-V 12Hrs
E-MAIL SECURITY
1. E –Mail System 1
2 Pretty Good Privacy, S/MIME. 3
IP SECURITY
2. Overview, Architecture, Authentication Header, Encapsulating security payload, 3
combining security associations, key management
3. Modes of IPSEC 2
WEB SECURITY
4. Web Security Considerations , Secure Socket Layer (SSL) and Transport Layer 3
Security (TLS), Secure Electronic Transaction

ESSENTIAL READING
1. Stallings, William. 2005. Cryptography and Network Security Principles and
Practices. 4th Edition. New Delhi: Prentice Hall of India.

SUGGESTED READING
1. Forouzan, Behrouz A. 2008. Cryptography and Network Security. Special Indian
Edition. New Delhi: Tata McGraw-Hill.

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

100
Loyola Academy, Alwal, Secunderabad 500 010

WEB APPLICATION TESTING LAB


(Discipline Specific Elective-3)
(LAB SYLLABUS FOR NEW COURSE)

Credits :1 Semester: VI
Course Code : CE21604A No. of Practical Hours: 30

Objective: To get hands on experience on installation and configuration of burp suite and also to
identify different vulnerabilities present in web applications.

Outcome: Students will be able to test for different vulnerabilities present in web applications

No. of Hours Topics


1. Learn the top 10 vulnerabilities from OWASP
2 Installation of burp suite and configuring burp suite to browser.
3. Testing for account enumeration and guessable user accounts
4. Testing for weak password policy
5. Testing for privilege escalation
6. Testing for insecure direct object references
7. Testing for session fixation
8. Testing for cross site request forgery (CSRF)
9. Testing for reflected cross site scripting
10. Testing for stored cross site scripting
11. Testing for SQL injection
12. Testing for http verb tampering
13. Testing for SSL/TLS
14. Testing for click jacking
15. Testing for cross origin resource sharing

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

101
Loyola Academy, Alwal, Secunderabad 500 010

BIG DATA ANALYTICS LAB


(Discipline Specific Elective-3)
(SYLLABUS FOR THE NEW LAB COURSE)

Credits :1 Semester: VI
Course Code: CE21604B No. of Practical Hours: 30

Objectives: To understand Hadoop Ecosystem


Outcomes: Students will be able to demonstrate Hadoop commands, develop map reduce
applications using Pig, Hive and Map Reduce Programming model.

S.No. Program

1. Implement the following file management tasks in Hadoop:


a) Adding file and directories
b) Creating file, Retrieving file and deleting files
2. Map Reduce program for basic word count.
3. Map Reduce program for sorting text data.
4. Map Reduce program for weather data.
5. Using Hive to implement DDL Commands
6. Using Hive to implement DML commands
7. Using Hive to retrieve data.
8. Using Hive to implement bucketing and partitioning.
9. Using Hive to implement built-in functions
10. Pig Latin script to work with operators
11. Pig Latin scripts using eval functions to analyze your data.
12. Pig Latin scripts using math functions to analyze your data.
13. Pig Latin scripts using string functions to analyze your data.
14. Pig Latin scripts to create user defined function.
15. Simple script to understand the using NoSQL in Hadoop systems

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

102
Loyola Academy, Alwal, Secunderabad 500 010

MAJOR PROJECT

(Discipline Specific Elective-4)

EVALUATION CRITERIA FOR MAJOR PROJECT

Credits :6 Semester : VI
Course Code: CE18605 No. of Practical Hours: 15

Third year students in the Sixth Semester are required to take up a project work which carries a
total of 100 marks i.e. internal 40 marks and external 60 marks.

The criteria for the Internal Evaluation of Project for 40 marks are as follows:

1. Attendance 5 marks
2. Review of weekly report 5 marks
3. Internal Project Presentation–every week end (Presentation & communication 10 marks
skills, objectives, Work submission, methodology, results, and Practical
relevance.)
4. Final internal presentation- at the end of semester (50% marks Evaluation 15 marks
done by the internal guide, and 50% marks evaluated by other internal
lecturers guiding the projects)
5. Project Report 5 marks

External Evaluation of the Project (60 marks): The Controller of Examination sends the
Project Reports to the External Examiner in advance. The External Examiner evaluates the
project for 60 marks based on project work done by the student. (The Project Report is evaluated
for 40 marks and Viva-voce for 20 marks.)

B.Sc. (Computer Systems & Engineering) Academic Year 2022-23 (CBCS)

103

You might also like