Scheme 3 Year
Scheme 3 Year
Duration of Marks
Subject Hours
Sl. Part Title of the Subject Exam Credits
Code /Week Internal External Total
No. (hrs.)
THEORY
Artificial Intelligence
CE21501A
(DSE-1)
1 II 4 3 40 60 100 4
Principles of Information
CE21501B
Security (DSE-1)
Linux Administration
4 II CE21504 4 3 40 60 100 4
(Core-15)
Software Engineering
5 II CE21505 4 3 40 60 100 4
(Core-16)
Computer Networks
6 II BS18545 4 3 40 60 100 4
(Core-17)
PRACTICALS
10 II CE18508 Internship - - 40 - 40 3
71
Loyola Academy, Alwal, Secunderabad 500 010
ARTIFICIAL INTELLIGENCE
(Discipline Elective -1)
(NEW COURSE)
Credits :4 Semester: V
Course Code : CE21501A No. of Lecture Hours: 60
Objectives:
To understand the concepts of state space representation, exhaustive search, heuristic
search together with the time and space complexities.
To learn different knowledge representation techniques
To understand the applications of AI
Course Outcomes:
CO1: Explain basic concepts of AI and search techniques
CO2: Demonstrate various heuristic techniques and constraint satisfaction problem.
CO3: Develop proofs in first order and propositional logic using resolution and unification
CO4: Choose appropriate knowledge representation techniques
CO5: Design approaches to planning
UNIT-I 12Hrs
1. Introduction- Concept and definition, History and related concepts of AI 2
2. Comparison of Human & Computer skills, components of AI 1
PROBLEM SOLVING THROUGH AI
3. Introduction, representation of AI problems 2
4. Production system, Algorithm of Problem solving 2
5. Examples of AI problems-Water Jug Problem, Magic Square, TSP 2
6. Nature of AI problems 1
7. Search Techniques- Breadth first, Depth First, Depth limited, bidirectional 2
UNIT-II 12Hrs
HEURISTIC SEARCH
1. Basic concepts of Heuristic search, designing Heuristic function 1
2. Types of Heuristic search techniques- Generate and test, Best-first search,
Problem reduction, Hill Climbing search 3
3. Constraint satisfaction, Means Ends Analysis and Min-Max Search 4
INTRODUCTION TO KNOWLEDGE
4. Introduction, types of knowledge, knowledge representation, storage and acquisition,
organization and management 4
UNIT-III 12 Hrs
LOGIC
1. Introduction, Propositional calculus, predicate logic 5
2. Resolution, Unification 5
3. Limitations of Logic, Logic Programming 2
72
Loyola Academy, Alwal, Secunderabad 500 010
UNIT-IV 12Hrs
ADVANCED KNOWLEDGE REPRESENTATION TECHNIQUES
1. Introduction, frames, semantic network 3
2. Conceptual Graphs and dependencies, Script 2
REASONING WITH UNCERTAINITY
3. Introduction, representing and reasoning with uncertain knowledge 1
4. Probabilistic reasoning 6
UNIT-V 12Hrs
Learning, Planning and Understanding
1. Introduction, types of learning- rote learning, learning by taking advice, induction 3
2. Planning-components, block world planning, identifying solution, Goal stake
Planning 3
Expert Systems
3. Introduction, Experts and Expert Systems, Successive development of Expert
Systems, overview of Expert System, characteristics of Expert system 3
4. Expert System architecture, Inference Engine, Design and types of Expert system 3
ESSENTIAL READING
1. Kumar, Ela. 2019. Artificial Intelligence. 1st Edition. I.K International Publishing
House Pvt. Ltd. India: New Delhi
2. Russel J,Stuart. Norvig, Peter. 2015. Artificial Intelligence, A Modern Approach. 3rd
Edition. Pearson Education. New Delhi: India
SUGGESTED READING
73
Loyola Academy, Alwal, Secunderabad 500 010
Objectives:
To compile, analyze, and assess the applicability of best practices in addressing
information.
To address the issues relevant to the cyber security community
Course Outcomes:
CO1: Explain concepts of Security System Development Life Cycle, Need for Security
CO2: Identify the risk, assess and risk control strategies.
CO3: Demonstrate expertise in configuring host and network level technical security controls to
include host firewalls, user access controls, host logging, network filtering, intrusion detection
and prevention
CO4: Analyze systems, tools, methods, and techniques for securing digital information within
an organization
CO5: Explain the concepts of Security Considerations in Mobile and Wireless Computing.
UNIT –I 12Hrs
INTRODUCTION OF INFORMATION SECURITY
1. Introduction to Security, Critical Characteristics of Information 2
2. Balancing Information Security and Access, Approaches to Information Security 2
Implementation, System Development Life Cycle
3. Security System Development Life Cycle, Information Security :Art of Science 2
4. Need For Security: Business Needs, Threats, Attacks 3
5. Secure Software Development-software Assurance, Software Design Principles , 3
Software Development Security Problems
74
Loyola Academy, Alwal, Secunderabad 500 010
UNIT-IV 12 Hrs
SECURITY TECHNOLOGIES: INTRUSION DETECTION AND OTHER SECURITY TOOLS
1. IDPS :terminology, types of IDPS 3
2. IDPS Detection Methods, IDPS Response Behavior 2
3. Strengths and Limitations of IDPS 1
4. Honeypots, Honey nets and Padded Cell Systems 1
5. Port Scanners, Firewall Analysis Tools 1
6. Operating System Detection Tools, Vulnerability Scanners 2
7. Packet Sniffers , Wireless Security Tools 2
UNIT-V 12 Hrs
SECURITY CONSIDERATIONS IN MOBILE AND WIRELESS COMPUTING
1. Proliferation of Mobile and Wireless Computing Era 2
2. Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era 2
3. Security Challenges posed by Mobile Devices, Registry Settings for Mobile 2
Devices
4. Authentication Service Security 2
5. Organizational Security Policies and Measures in Mobile Computing Era 2
6. Use of RFID in Mobile Commerce nd Information Asset Protection 2
ESSENTIAL READING
1. Whitman Michael, E. and Mattord Herbert, J. 2011. Principles of Information
Security. 4th Edition. USA: Course Technology.
2. Nina Godbole. Information Systems Security: Security Management, Metrics,
Frameworks and Best Practices. 2nd Edition Wiley Publications
75
Loyola Academy, Alwal, Secunderabad 500 010
ETHICAL HACKING
(NEW SYLLABUS)
Credits :3 Semester: V
Course Code : CE21502 No. of Lecture Hours: 45
Objectives:
To get familiarize with the essential terms in Hacking and Various phases of attacks
To provide the details on Law and Punishment for Hacking.
To explain the maintenance of access gained through hacking and the techniques used to
avoid the traces of attacks in order to escape from the legal Punishment by a malicious
hacker
Course Outcomes:
CO1: Explain essential terminology and phases of hacking
CO2: Analyze how to perform reconnaissance in various organizations
CO3: Identify different types of scanning methods
CO4: Explain the maintenance of access gained through hacking
CO5: Design techniques used to avoid the traces of attacks in order to escape from the legal
Punishment by a malicious hacker.
UNIT – I 9Hrs
1. Ethical Hacking concepts and essential terminology 2
2. Different phases involved in an exploit by a Hacker 2
3. Overview of Attacks and Identification of Exploit Categories 2
4. Legal implications of Hacking. 1
5. Hacking, Law and Punishment 2
UNIT-II 9Hrs
1. Essential Terms : Threat, Vulnerability and Attack 2
2. Elements of Security : Reconnaissance, Active & Passive reconnaissance 2
3. Foot printing, Internet Foot printing: Determining the scope of your activities 2
4. Get Proper Authorization and Publicly Available Information 1
5. DNS Interrogation and Network Reconnaissance 2
UNIT-III 9Hrs
1. Scanning :Network Ping Sweeps, Determine which services are running,
Scan types 2
2. Identifying TCP and UDP services Running, Unix/Linux-based
Port Scanning Strobe 2
3. UDP_scan , Netcat Windows-based port scanners WUPS 2
4. Detecting the Operating system, Active stack Fingerprinting,
Passive stack fingerprinting 2
5. Passive Signatures, Basic Banner Grabbing: Telnet and Netcat 1
76
Loyola Academy, Alwal, Secunderabad 500 010
UNIT-IV 9Hrs
1. Gaining Access, Hacking Windows, Privilege Escalation 2
2. Extracting and Cracking Passwords, Grabbing the Password Hashes 2
3. Dumping Cached Passwords, Remote Control and Back doors, 1
4. Command-line Remote control Tools, Port Redirection:Fpipe 2
5. Data-Driven Attacks, Buffer Overflow Attacks, DNS Cache Poisoning 2
UNIT-V 9Hrs
1. Trojans, Social Engineering and Maintaining Access 1
2. Rootkits and Back Doors, Kernel Modification, File/Directory hiding 2
3. Process Hiding, port hiding, Registry Key/value Hiding, User/group hiding 2
4. Keystroke Loggers ,service hiding and hacker defender, Bots and Zombies 2
5. Covering Tracks, Disabling Auditing, Clearing Event Log,
Log clearing in UNIX 2
ESSENTIAL READING
1. Mc Clure, Stuart, Scambray, Joel and Kurtz, George. 2009. Hacking
Exposed.7thEdition.New Delhi: McGraw Hill.
SUGGESTED READING
1. Engerbrestson, Patrick. 2011.Basics of Hacking and Penetration.Syngress
2. Walker, Matt.2012. Certified Ethical Hacker All-in-One.McGraw Hill.
77
Loyola Academy, Alwal, Secunderabad 500 010
Credits :4 Semester : V
Course Code : CE18503 No of Lecture Hours: 60
Objectives:
To design a database and enforce Integrity Constraints to keep database consistent.
To normalize tables to eliminate redundancies.
To query relational data using Structured Query Language.
To understand storage strategies for easy retrieval of data through index.
To understand PL/SQL and transaction management.
Course Outcomes:
CO1: Represent logical database using Entity Relationship and Enhanced ER model.
CO2: Formulate database using relational algebra and organize relation using normalization.
CO3: Design SQL queries and implements PL/SQL.
CO4: Classify the storage and file structure, storage access, indexing and hashing techniques of
the database.
CO5: Explain the concept of Transactions, recovery system and concurrency control.
UNIT-I 12Hrs
1. Introduction, data base applications and purpose 2
2. View of data, data base languages-DDL,DML 2
3. Data base architecture, users and administrators 2
4. Design process overview, Entity relational ship model, Constraints 2
5. ER diagrams, design issues, weak entity sets 2
6. Extended ER features 2
UNIT-II 12Hrs
1. Structure of Relational model, Reduction to schema 1
2. Relational algebra- union, project, select and other operations 3
3. SQL- data definition, structure, set operations, Aggregate functions 2
4. Modification of data base, Nested sub queries, views, Joins and Null values 3
5. Introduction to Normalization, 1NF, 2NF and 3NF, BCNF 3
UNIT-III 12Hrs
1. Introduction, Programming, Functions and Procedures 2
2. Triggers, Cursors-implicit, explicit, cursor for loops 3
3. Error handling in PL/SQL, Authorization, granting, revoking privileges 3
4. Roles, Authorization on views, functions and procedures 2
5. Application security 2
78
Loyola Academy, Alwal, Secunderabad 500 010
UNIT-IV 12Hrs
1. Overview of physical storage media 1
2. Magnetic disks- physical characteristics and performance measures 1
3. Buffer manager, replacement policies, File organization 3
4. Organization of records in files 2
5. Ordered indices, Index sequential-B+ trees 2
6. Static hash function, Dynamic hash function, comparison 3
UNIT-V 12Hrs
1. Transactions- concepts, states 1
2. Implementation of Atomicity and durability, Concurrent executions 1
3. Serializability, Recoverability, Testing for Serializability 1
4. Concurrency control, lock based protocols, locks and granting locks 1
5. Two Phase locking and dead lock handling 2
6. Recovery system, failure 1
7. Storage structure- storage types, data access 1
8. Recovery and Atomicity, log based recovery, Check points 2
9. Distributed Databases- Homogenous &Heterogeneous, Distributed data storage 2
ESSENTIAL READING
1. Korth Henry, F. SilberSchatz Avi. And Sudarshan, S. 2008. Database System
Concepts. 5th Edition. New Delhi: Tata McGraw-Hill.
2. Bayross Ivan. 2010. SQL, PL/SQL- The Programming Language for Oracle. 4th
Edition. New Delhi: BPB Publications.
SUGGESTED READING
1. McFadden Fred, R. Hoffer Jeffery, A and Prescott Mary, B. 2007. Modern Database
Management. 8th Edition. New Delhi: Pearson.
2. Elmasri Ramez, Navathe and Shamkant , B. 2008. Fundamentals of Database
Systems. 5th Edition. New Delhi: Pearson Education.
79
Loyola Academy, Alwal, Secunderabad 500 010
LINUX ADMINISTRATION
Credits :4 Semester : V
Course Code : CE21504 No. of Lecture Hours: 60
Course Outcomes:
CO1: Describe Installation of Linux and User, Group Administration, ACL
CO2: Explain the configuration NFS, FTP and Send mail server
CO3: Explain configuration DHCP and SElinux
CO4: Explain configuration SAMBA and DNS server
CO5: Explain the configuration Apache server, disk quotas
UNIT-I 12Hrs
1. History of Linux & GNU- LINUX, Features and Overview of Linux. 1
2. ifference between Fedora/RHEL , 1
3. Compressing & Archiving files(bzip2 , b2cat, bunzip 2, tar). 1
4. Permissions, setuid, setgid and sticky bit. Access control lists(getfacl, setfacl) 2
5. Links, Hard Links, Symbolic link, removing a link. 1
6. User Administration & group Administration. 2
7. Backing up file, choosing a backup medium, backup utilities, Performing simple
backup. 1
8. The init Demon, Start & Stop System & server, Run levels. 1
9. Scheduling task using at &crond. 1
10. Working with nmtui command. 1
UNIT-II 12Hrs
1. Introduction to FTP,security,FTP Connections,FTP Clients. 1
2. Running FTP and SFTP clients
Basic commands:hostname, get, put, open, prompt, mget. 1
3. Configuring a vsftpd server description of directives logging in, anonymous users,
uploading & downloading files messages. 1
4. Introduction to sendmail, outbound-Email, Inbound email alternatives to send
mail 1
5. Setting up send mail server Configuring sendmail on a client, mail logs 1
6. Additional Email tools, Squirrelmail, difference b/w SMPT, POP3, IMAP 1
7. Software Package Administration, Installation/uninstallation/ querying
And updating software packages 3
8. Introduction to NFS, NFS Client/Server setup , Running an NFS Client 1
9. Mounting a remote directory configuring NFS using system-config-nfs 2
80
Loyola Academy, Alwal, Secunderabad 500 010
UNIT-III 12Hrs
1. Securing a system, SELinux config: The SELinux configuration file 2
2. Getenforce, Setenforce and setstatuscommands 2
3. Introduction to DHCP , working of DHCP , DHCP client 2
4. dhcpd:the DHCP Daemon , Static IP address, 2
5. Virtualization with Xen 2
6. RAID levels, LVM 1
7. Intro to Web Based administration 1
UNIT-IV 12Hrs
1. Introduction to SAMBA, Samba utilities & daemons , Samba Users 2
2. user Maps ,Passwords , running Samba Clients 2
3. Working with Shares from Linux , Working with shares from windows 2
4. Setting up Samba Server ,Configuring Samba Server using System-config-Samba, 2
5. Samba config-manually configuring a Samba server parameters in smbd.conf.file 1
6. Intro to DNS nodes , domains and subdomains , Zones 1
7. Queries , servers , Resource Records DNS working 1
8. Setting up a domain using System-config-bind, Setting up a Domain server
9. Adding resource records 1
UNIT-V 12Hrs
1. Introduction to Firewall, Firewall configuration window 2
2. Building a firewall using system-config-firewall . Introduction to Iptables,
Filtering a packet in kernel,Anotomy of iptables command. 3
3. Apache server introduction , Running apache web server
modifyinghttpd.conf configuration file testing apache 3
4. Configuring directives , listen, server Admin, DocumentRoot, Servername ,
DirectoryIndex,Contexts& Containers 2
5. Disk Quota, Enabling Quota’s on partition, Creating Quota’s for user. 2
ESSENTIAL READING
1. Christopher Negus, Eric Foster-Johnson. 2009. Fedora10 and Red Hat Enterprise
Linux Bible. New Delhi: Wiley.
2. Sobell Mark, G. 2014. A Practical Guide to Fedora and Red Hat Enterprise Linux.
7th Edition. New Delhi: Prentice Hall of India.
3. Vugt Sander van. 2013. Red Hat Enterprise Linux 6 Administration: Real World
Skills for Red Hat Administrators. USA: SYBEX Inc.
4. Fox Tammy. 2007. Red Hat Enterprise Linux 5 Administration UNLEASHED.
SAMS Publishers
81
Loyola Academy, Alwal, Secunderabad 500 010
SOFTWARE ENGINEERING
(NEW SYLLABUS)
Credits :4 Semester: V
Course code: CE21505 No. of Lecture Hours: 60
Objectives:
To enable students learn software engineering principles
To learn the theoretical foundation from the view of object oriented concept.
Course Outcomes:
CO1: Design software through various process models.
CO2: Analyze Object Oriented concepts and various Models.
CO3: Choose different designs and architectures.
CO4: Explain components, golden rules and design evaluation.
CO5: Select testing techniques and determine its quality.
UNIT - I 12Hrs
1. The evolving role of software, software, changing nature of software 2
2. Legacy Software, Software Myths 2
3. Software engineering-layered technology, Process Framework 2
4. CMMI, Process patterns, Personal and Team Process models 1
5. Process Models: waterfall, incremental, evolutionary process models 2
6. Agile process models 3
UNIT- II 12Hrs
1. Requirements Engineering tasks, Initiating requirements engineering process 2
2. Eliciting requirements, 1
3. Developing Use Cases, Building analysis model 2
4. Negotiating and validating requirements 1
5. Requirements analysis, analysis modeling approaches, Data modeling Concepts 2
6. Object oriented analysis, Scenario based modeling, Flow oriented modeling 2
7. Class based modeling, creating behavioral model, Case Study 2
82
Loyola Academy, Alwal, Secunderabad 500 010
UNIT- IV 12Hrs
1. Introduction to Component, Designing class based components 2
2. Conducting component level design, Object constraint language 2
3. Design conventional components 2
4. Golden rules, User Interface Analysis and Design 2
5. Interface analysis, Interface design steps 2
6. Design Evaluation 2
UNIT- V 12Hrs
1. A Single approach to Software testing 1
2. Strategic issues, Test strategies for Conventional Software 1
3. Validation testing, System Testing 1
4. Testing fundamentals, Black box and White Box Testing 2
5. Basis Path Testing, Control Structure Testing 2
6. Software quality 1
7. Metrics for analysis model 2
8. Metrics for design model, Metrics for source code 1
9. Metrics for testing, Metrics for maintenance. 1
ESSENTIAL READING
1. Pressman, Rogers S. 2015. Software Engineering, A practitioner’s Approach. 6th
Edition. McGraw Hill Education
SUGGESTED READING
1. Deepak Jain. 2009. Software Engineering. New Delhi: Oxford University Press.
2. Rajib Mall. 2009. Fundamentals of Software Engineering. 3rd Edition. New Delhi:
PHI.
3. Sommerville. 2007. Software Engineering. 7thEdition.New Delhi: Pearson Education.
83
Loyola Academy, Alwal, Secunderabad 500 010
COMPUTER NETWORKS
Credits :4 Semester: V
Course Code : BS18545 No. of Lecture Hours: 60
Objectives:
To get familiarize with fundamental concepts of computer network.
To gain expertise in various layers of the TCP/IP model.
Course Outcomes:
CO1: Identify basic computer network topologies and protocols and explain Data
Communication System components
CO2: Classify different error detecting techniques.
CO3: Construct sub-netting and routing mechanisms.
CO4: Sketch the routing protocols and analyze how to assign the IP addresses for the given
network
CO5: Develop network design and implementation
UNIT-I 12 Hrs
1. Introduction: Data Communications, networks, Protocols and Standards 2
2. OSI Model, layers in the OSI model, TCP/IP Protocol suite 2
3. Analog and Digital, Transmission impairments 2
4. Transmission Media-Guided media, Connecting Devices 2
5. Digital Transmission- digital-to-digital conversion 2
6. Multiplexing: Frequency-division, Wavelength and Time Division 2
UNIT-II 12 Hrs
DATA LINK LAYER
1. Error detection and correction-Parity, check sum, CRC, Hamming code 3
2. Data Link Control: Framing, flow and error control 2
3. Stop-and-wait ARQ, Go-Back-N ARQ, Selective Repeat ARQ, Piggybacking 2
4. HDLC, Random Access- ALOHA, CSMA, CSMA/CD, CSMA/CA 3
5. Wired LANs- Ethernet 2
UNIT-III 12 Hrs
NETWORK LAYER
1. IP address space- Introduction 1
2. Class full and Classless addressing, subnetting and supernetting 2
3. IPv4- datagram, Fragmentation, checksum, options 2
4. Internet Control Protocols- ICMP, IGMP, ARP and RARP 3
5. Delivery, Forwarding, Unicast routing protocols- RIP, OSPF, BGP 4
84
Loyola Academy, Alwal, Secunderabad 500 010
UNIT-IV 12 Hrs
TRANSPORT LAYER
1. Process-to-Process Delivery, UDP-well known ports, user datagram, checksum 2
2. UDP Operation, use of UDP 2
3. TCP- process to process communication, Numbering bytes, TCP services 2
4. Flow control- silly window syndrome, Error Control 3
5. TCP connection, State transition diagram, Congestion control, Timers, Options 3
UNIT-V 12 Hrs
APPLICATION LAYER
1. DNS- Namespace, domain name space, distribution of name space 2
2. DNS in internet, resolution, DNS messages, types of records 2
3. TELNET, E-mail- architecture, message transfer agent: SMTP 3
4. Message Access Agent: POP, FTP 2
5. WWW and HTTP- architecture, web documents, HTTP 3
ESSENTIAL READING
1. Forouzan, Beharouz A. 2011. Data Communications and Networking. 3rd Edition.
New Delhi: Tata Mc Graw Hill.(UNIT-I,II)
2. Forouzan, Beharouz A. 2005. TCP/IP Protocol Suite. 3rd Edition. New Delhi: Tata
Mc Graw Hill.(UNIT-III-V)
SUGGESTED READING
1. Tanenbaum, Andrew S. 2008. Computer Networks. 4th Edition. New Delhi: Pearson
Education.
85
Loyola Academy, Alwal, Secunderabad 500 010
Credits :1 Semester: V
Course Code : CE18506 No. of Practical Hours: 30
Objectives:
To present the concepts and techniques relating to query processing by SQL engines.
To present SQL and procedural interfaces to SQL comprehensively.
Outcome: Students will be able to use commercial relational database system (Oracle) by
writing Queries using SQL and implement PL/SQL.
NOTE:
1. Creation of sample Database consisting of Employee, Department and Grade tables.
2. Creation of other databases suitable for the course.
86
Loyola Academy, Alwal, Secunderabad 500 010
Credits :1 Semester: V
Course Code : CE21507 No. of Practical Hours: 30
Objective: To get hands on experience with popular hacking tools and understand various
hacking techniques in brief.
Outcome: Students will be able to learn some of the skills that you would require to become an
expert in Ethical Hacking.
Topics to be covered
1. Installation of Operating System Using VMware.
2. Exploring Internet Options for a Browser, Examination and configuring the
Contents of Security and Privacy Tabs.
3. Setting up a Simple network using Simulation Tools(Packet tracer)
4. Perform an experiment to Grab a Banner with Telnet
5. Using Nmap
Find open ports on a System
Find the machines which are active
Find the version of Remote OS on other systems
Find the version of Software installed on other system.
6. Program to implement Virus.
7. Demonstrate Intrusion Detection System
8. Exploring Wireless Security Tools (Air snare)
9. Implementation of Stenography–Hiding a Text File within a Image File using WinRar
10. Digital Signing a word document, PDF document and Email
11. Creating Public Key, Private Key and Digital Certificate
12. Create SSL Certificate Using XCA Software
13. Demonstration of Hash Function using Cry tool
14. Study of Hardware and Software Firewalls and Case Study on Man-In-Middle
Phishing and harming Attacks
15. Hacking tools and skills.
16. Foot printing and Reconnaissance
17. Finger printing.
18. System Hacking
19. Wireless Hacking.
20. Sniffing & their tools
87
Loyola Academy, Alwal, Secunderabad 500 010
Credits :1 Semester : V
Course Code : CE21509 No. of Practical Hours: 30
Objective: To get hands on experience on installations, configuration of server service roles and
email servers and clients.
Outcome: Students will be able to demonstrate the core system-administration skills required
in Red Hat Enterprise Linux environments.
88
Loyola Academy, Alwal, Secunderabad 500 010
INTERNSHIP
Credits: 3 Semester :V
Course Code: CE18508
Third year students take up an On Job Training in the domain of Networking, PC Hardware
Installation and Trouble Shooting, or Network Administration during summer for 4 weeks
which carries a total of 40 marks evaluated internally during 5th Semester.
The Criteria for the Internal Evaluation of On Job Training (OJT) Work for 40 marks is as
follows:
1. Attendance 5 marks
2. Internal Presentation (Presentation and Communication skills) 10 marks
3. Internal OJT presentation /Practical demonstration(Objectives, work submission, 15 marks
methodology, results, Practical relevance evaluated by the faculty)
4. OJT Report 10 marks
89
Loyola Academy, Alwal, Secunderabad 500 010
Duration Marks
Sl. Subject Hours
Part Title of the Subject of Exam Credits
No. Code /Week Internal External Total
(hrs.)
THEORY
Cloud Computing
CE21601A
(DSE-2)
1 II 4 3 40 60 100 4
Internet of Things
CE21601B
(DSE-2)
Web Application
CE21602A
Testing (DSE-3)
2 II 4 3 40 60 100 4
Big Data Analytics
CE21602B
(DSE-3)
Cryptography and
3 II CE21603 Network Security 4 3 40 60 100 4
(Core-18)
PRACTICALS
Web Application
CE21604A
Testing- Lab (DSE-3)
4 II 2 3 40 60 100 1
Big Data Analytics -
CE21604B
Lab(DSE-3)
Major Project
5 II CE18605 15 3 40 60 100 6
(DSE-4)
90
Loyola Academy, Alwal, Secunderabad 500 010
CLOUD COMPUTING
(Discipline Specific Elective-2)
(NEW SYLLABUS)
Credits :4 Semester: VI
Course Code: CE21601A No. of Lecture Hours: 60
Objectives:
To implement Basics, techniques and tools for Cloud Computing.
To understand any kind of heterogeneous resources over a network using open standards.
Course Outcomes:
CO1: Explain differences of system models.
CO2: Identify different types of clouds
CO3: Analyze virtualization and data centre working procedure
CO4: Classify public cloud platforms
CO5: Choose a particular data security in the cloud
UNIT-I 12 Hrs
Principles of Parallel and Distributed Computing
1. Eras of Computing, parallel vs distributed computing 1
2. Elements of parallel computing 3
3. Elements of distributed computing 5
4. Technologies for distributed computing-RPC, distributed object frameworks 3
UNIT-II 12 Hrs
1. Cloud Computing Overview - Introduction, Cloud Components
Infrastructure Services 2
2. Benefits – Scalability, Simplicity, Knowledgeable Vendors ,
More Internal Resources, Security 3
3. Limitations - Your Sensitive Information, Applications Not Ready,
Developing Your Own Applications, Features of cloud platform 4
4. System models for advanced computing –clusters of cooperative computing, grid
computing and Cloud computing 3
UNIT-III 12 Hrs
1. Introduction, The cloud reference model: Architecture, Infrastructure-and
Hardware-as-a-service, Platform as a service, Software as a service. 4
2. Types of clouds: Public clouds, Private clouds, Hybrid clouds, Community clouds,
Economics of Cloud 4
3. Open challenges: Cloud definition, Cloud interoperability and standards, Scalability and
fault tolerance, Security, trust, and privacy, Organizational aspects 4
91
Loyola Academy, Alwal, Secunderabad 500 010
UNIT-IV 12 Hrs
VIRTUALIZATION
1. Introduction and characteristics of virtualized environments: Increased Security,
Managed Execution, Portability 3
2. Taxonomy of Virtualization techniques: Execution virtualization, other types of
Virtualization 3
3. Virtualization and Cloud Computing 2
4. Pros and Cons of Virtualization 1
5. Technology examples- Xen: para virtualization, VMware: full virtualization,
Microsoft Hyper V 3
UNIT-V 12 Hrs
1. Risks, consequences for cloud computing 2
2. Cloud Certifications and Audit, SLA with Cloud Service providers 2
3. Host security for SAAS,IAAS,PAAS 2
4. Data security in the cloud. 2
5. Application Security in the cloud 2
6. Security as a service :benefits, concerns ,providers 2
ESSENTIAL READING
1. Buyya, Raj Kumar, Vecchiola, Christian. And Selvi, Thamarai S. 2012. Mastering
Cloud Computing. New Delhi:TMH. (Unit I,II, III,IV)
2. Cloud Computing, The Black book, Dream Tech Press (Unit V)
SUGGESTED READING
1. Geoffrey, Kaittwang, Fox C and Jack J, Elsevier, Dongarra. 2012. Distributed and
loud Computing. India.
2. House, Ritting ,Ramsome, John W., James F. 2012. Cloud Computing. CRC Press.
92
Loyola Academy, Alwal, Secunderabad 500 010
INTERNET OF THINGS
(Discipline Specific Elective- 2)
(NEW SYLLABUS)
Credits :4 Semester: VI
Course Code: CE21601B No. of Lecture Hours: 60
Objectives:
To introduce the terminology, technology and its applications
To introduce the concept of M2M (machine to machine) with necessary protocols
To introduce the Raspberry PI platform, that is widely used in IoT applications
To introduce the implementation of web based services on IoT devices
Course Outcomes:
CO1: Identify the importance of IOT and its applications
CO2: Differentiate between IOT and M2M, SDN and NFV
CO3: Understand building of IOT devices and Raspberry PI
CO4: Explain working of WAMP server and AWS
CO5: Understand applications and analytics of IoT
UNIT - I 12 Hrs
INTRODUCTION AND CONCEPTS
1. Introduction to Internet of Things –Definition and Characteristics of IoT 3
2. Physical Design of IoT , Logical Design of IoT 3
3. IoT Enabling Technologies 3
4. IoT Levels and Deployment Templates, Domain Specific IoTs – Home Automation
Cities, Environment, Agriculture, Industry, health and Lifestyle 3
UNIT – II 12 Hrs
IoT and M2M
1. IoT and M2M- Introduction to M2M, Difference between IoT and M2M 2
2. SDN and NFV for IoT 3
IoT SYSTEM MANAGEMENT WITH NETCONF-YANG
3. Need for IoT Systems Management, SNMP 2
4. Network Operator requirements, NETCONF, YANG 2
5. IoT Systems Management with NETCONF-YANG 1
6. IoT Platforms Design Methodology: Introduction, IoT Design Methodology 2
93
Loyola Academy, Alwal, Secunderabad 500 010
UNIT - IV 12Hrs
IoT PHYSICAL SERVERS AND CLOUD OFFERINGS
1. Introduction to Cloud Storage models and Communication API 1
2. WAMP-AutoBahn for IoT, Xively Cloud for IoT 3
3. Python web application framework-Django 3
4. Designing a RESTful web API 3
5. Amazon Web Services for IoT 2
ESSENTIAL READING
1. Bahga, Arshdeep and Madisetti, Vijay. 2015. Internet of Things - A Hands-on
Approach. Universities Press ISBN: 9788173719547
2. Richardson, Matt and Wallace, Shawn. 2014. Getting Started with Raspberry Pi.
O'Reilly (SPD). ISBN: 9789350239759
94
Loyola Academy, Alwal, Secunderabad 500 010
Objectives:
To study the concepts of web application testing
To learn different testing methods on server side and client side
Outcomes:
CO1: Identify Web application technologies
CO2: Experiment using Client-Side Controls
CO3: Explain authentication and authorization
CO4: Implement SQL injection
CO5: Develop Cross-Site Scripting
UNIT – I 12Hrs
1. Introduction of Web Applications, Benefits and Security of Web Applications 2
2. The New Security Perimeter and The Future of Web Application Security 3
3. Core Defence Mechanisms: Handling User Access, Handling User Input 3
4. Approaches to Input Handling Sanitization 1
5. Web Application Technologies : The HTTP Protocol and Web Functionality 3
UNIT-III 12Hrs
1. Attacking Authentication ,Authentication Technologies 2
2. Design Flaws in Authentication 3
3. Implementation Flaws in Authentication 3
4. Attacking Session Management, Weaknesses in Token Generation 1
5. Weaknesses in Session Token Handling and Securing Session Management 3
UNIT-IV 12Hrs
1. Attacking Data Stores: Bypassing a Login ,Injecting into SQL 2
2. Exploiting a Basic Vulnerability, Injecting into Different Statement Types 3
3. Finding SQL Injection Bugs, Finger printing the Database 3
4. Injecting into NoSQL (MongoDB) and Injecting into XPath 1
5. Subverting Application Logic, Informed And Preventing XPath Injection 3
95
Loyola Academy, Alwal, Secunderabad 500 010
UNIT-V 12Hrs
1. Attacking Application Logic: The Nature of Logic Flaws 2
2. Real-World Logic Flaws, Avoiding Logic Flaws 3
3. Attacking Users: Cross-Site Scripting 3
4. Varieties of XSS, Reflected XSS Vulnerabilities 1
5. Stored XSS Vulnerabilities and DOM-Based XSS Vulnerabilities 2
ESSENTIAL READING
1. Dafydd Stuttard, Marcus Pinto. 2011. The Web Application Hacker’s Handbook
Finding and Exploiting Security Flaws. 2nd Edition. John Wiley & Sons Inc.
2. Gupta, Richa. 2021. Hands-on Penetration Testing for Web Applications. 1st
Edition. BPB Publications. India: New Delhi
96
Loyola Academy, Alwal, Secunderabad 500 010
Credits: 4 Semester: VI
Course code: CE21602B No. of lecture hours: 60
Objectives:
To understand and learn about Big Data.
To learn the analytics of Big Data.
To understand MapReduce fundamentals.
Course Outcomes:
CO1: Explain Big Data concepts and various technologies to handle it.
CO2: Use Hadoop Ecosystem and Map Reduce to process Big Data.
CO3: Analyze data processing through MapReduce
CO4: Choose YARN for resource management and Hive for data storage.
CO5: Develop Map Reduce Programming using Pig and data management using NoSQL.
UNIT-I
Getting an Overview of Big Data: 12 Hrs
1. Introduction, History of Data Management-Evolution of Big Data 1
2. Structuring Big Data, Elements of Big Data 1
3. Big Data Analytics, Careers and Future of Big Data 1
Exploring the Use of Big Data in Business Context:
4. Use of Big Data in Social Networking 1
5. Preventing Fraudulent Activities 1
Introducing Technologies for Handling Big Data:
6. Distributed and Parallel Computing for Big Data 2
7. Introducing Hadoop, Cloud Computing and Big Data 2
Understanding Big Data Technology Foundations:
8. Exploring the Big Data Stack, Virtualization and Big Data 2
9. Virtualization Approaches 1
UNIT-II 12 Hrs
Understanding Hadoop EcoSystem
1. Hadoop Ecosystem 2
2. Hadoop Distributed File System 4
3. HBase -Architecture, Regions 2
Understanding MapReduce Fundamentals and HBase
4. The Map Reduce Framework, Uses of MapReduce 2
5. Role of HBase in Big Data Processing 2
97
Loyola Academy, Alwal, Secunderabad 500 010
UNIT – IV 12hrs
Understanding Hadoop YARN Architecture:
1. Background and Advantages of YARN 2
2. YARN Architecture,Working of YARN, YARN Schedulers 2
3. YARN Configurations,YARN Commands,YARN Containers 2
Exploring HIVE:
4. Introducing Hive, Getting started with Hive 2
5. Data Types and Built-in functions in Hive,Hive DDL 2
6. Data manipulation in Hive,Data Retrieval Queries,Using Joins in Hive 2
UNIT – V 12hrs
Analyzing Data with Pig
1. Introducing Pig, Running Pig 1
2. Getting Started with Pig Latin 1
3. Working with Operators in Pig 2
4. Working with Functions in Pig 2
5. Debugging Pig, Error Handling in Pig 1
NoSQL Data Management:
6. Introduction to NoSQL 1
7. Types of NoSQL Data Models 2
8. Schema-Less Databases, Materialized Views 1
9. Distribution Models, Sharding 1
ESSENTIAL READING
1. DT Editorial Services. 2016. Big Data Black Book. Dreamtech Press.
SUGGESTED READING
1. White, Tom. 2012. Hadoop: The Definitive Guide. 3rd Edition. O’Reilly Media.
98
Loyola Academy, Alwal, Secunderabad 500 010
Course Outcomes:
CO1: Identify information security goals, classical encryption techniques and acquire
fundamental knowledge on the concepts of finite fields and number theory.
CO2: Apply Public Key Cryptographic Technique for securing messages
CO3: Use an appropriate message authentication code.
CO4: Compare the performance of different message digest algorithms for verifying the
integrity of varying message sizes
CO5: Compare different IEEE standards and electronic mail security
UNIT-I 12Hrs
INTRODUCTION
1. Introduction to Security , Critical Characteristics of Information, The OSI 2
Security Architecture, Security Attacks
2. Security Services and Mechanisms 1
3. A model for Network Security 1
4. NSTISSC Security Model, Components of Information Security 2
CLASSICAL ENCRYPTION TECHNIQUES
4. Symmetric cipher model 1
5. Substitution Techniques-Caesar Cipher, Mono alphabetic cipher 1
6. Play fair cipher, Hill cipher, Polyalphabetic cipher, Transposition Techniques 2
7. The DES encryption, Details of Single Round, Key Generation 1
8. DES Decryption, The Avalanche Effect, The Strengths of DES 1
UNIT-II 12Hrs
MORE ON SYMMETRIC CIPHERS
1. Multiple Encryption and Triple DES 2
2. Key Distribution, Random Number Generation 2
PUBLIC-KEY CRYPTOGRAPHY AND RSA
1. The principles of public-key cryptosystems and essential steps of Public key 3
Crypto systems, Public key encryption to provide Authentication, Applications of
Public key cryptosystems, Requirements for public-key cryptography, Public-key
cryptanalysis
2. The RSA algorithm-Description of algorithm, computational Aspects, Key 2
generation and Security of RSA
99
Loyola Academy, Alwal, Secunderabad 500 010
3. RC4Stream Cipher 3
UNIT-III 12 Hrs
KEY MANAGEMENT
1. Distribution of public keys, public announcement of Public keys, publicly 3
available directory, public-key Authority, public-key Certificates, Distribution of
secret keys using public-key cryptography
2. Diffie-Hellman key exchange 3
MESSAGE AUTHENTICATION
3. Authentication Requirements, Authentication Functions-Message Encryption, 3
Message Authentication code, Hash Functions-Requirements for a hash function,
Simple Hash Functions, Birthday Attacks, Block Chaining Techniques
4. Security of Hash functions and MACS-Brute-force attacks, Message 3
Authentication codes
UNIT-IV 12Hrs
1. Secure Hash Algorithm (SHA), MD5 Algorithm. 3
2. Kerberos, X.509 Authentication Services 3
3. Digital Signatures 3
4. Whirlpool 3
UNIT-V 12Hrs
E-MAIL SECURITY
1. E –Mail System 1
2 Pretty Good Privacy, S/MIME. 3
IP SECURITY
2. Overview, Architecture, Authentication Header, Encapsulating security payload, 3
combining security associations, key management
3. Modes of IPSEC 2
WEB SECURITY
4. Web Security Considerations , Secure Socket Layer (SSL) and Transport Layer 3
Security (TLS), Secure Electronic Transaction
ESSENTIAL READING
1. Stallings, William. 2005. Cryptography and Network Security Principles and
Practices. 4th Edition. New Delhi: Prentice Hall of India.
SUGGESTED READING
1. Forouzan, Behrouz A. 2008. Cryptography and Network Security. Special Indian
Edition. New Delhi: Tata McGraw-Hill.
100
Loyola Academy, Alwal, Secunderabad 500 010
Credits :1 Semester: VI
Course Code : CE21604A No. of Practical Hours: 30
Objective: To get hands on experience on installation and configuration of burp suite and also to
identify different vulnerabilities present in web applications.
Outcome: Students will be able to test for different vulnerabilities present in web applications
101
Loyola Academy, Alwal, Secunderabad 500 010
Credits :1 Semester: VI
Course Code: CE21604B No. of Practical Hours: 30
S.No. Program
102
Loyola Academy, Alwal, Secunderabad 500 010
MAJOR PROJECT
Credits :6 Semester : VI
Course Code: CE18605 No. of Practical Hours: 15
Third year students in the Sixth Semester are required to take up a project work which carries a
total of 100 marks i.e. internal 40 marks and external 60 marks.
The criteria for the Internal Evaluation of Project for 40 marks are as follows:
1. Attendance 5 marks
2. Review of weekly report 5 marks
3. Internal Project Presentation–every week end (Presentation & communication 10 marks
skills, objectives, Work submission, methodology, results, and Practical
relevance.)
4. Final internal presentation- at the end of semester (50% marks Evaluation 15 marks
done by the internal guide, and 50% marks evaluated by other internal
lecturers guiding the projects)
5. Project Report 5 marks
External Evaluation of the Project (60 marks): The Controller of Examination sends the
Project Reports to the External Examiner in advance. The External Examiner evaluates the
project for 60 marks based on project work done by the student. (The Project Report is evaluated
for 40 marks and Viva-voce for 20 marks.)
103