0% found this document useful (0 votes)
30 views104 pages

TER2019

The document outlines a revised curriculum for a Bachelor of Engineering in Computer Science and Engineering (Internet of Things and Cyber Security including Blockchain) at the University of Mumbai. It provides details on the program structure, implementation timeline, incorporation of online learning resources, and a preface by the Board of Studies team outlining the goals and process for revising the curriculum.

Uploaded by

momiviw689
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views104 pages

TER2019

The document outlines a revised curriculum for a Bachelor of Engineering in Computer Science and Engineering (Internet of Things and Cyber Security including Blockchain) at the University of Mumbai. It provides details on the program structure, implementation timeline, incorporation of online learning resources, and a preface by the Board of Studies team outlining the goals and process for revising the curriculum.

Uploaded by

momiviw689
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 104

AC:

Item No:

UNIVERSITY OF MUMBAI

Bachelor of Engineering
in

Computer Science and Engineering (Internet of Thing


and Cyber Security including Blockchain)

Second Year with Effect from AY 2021-22


Third Year with Effect from AY 2022-23
Final Year with Effect from AY 2023-24
(REV- 2019 ‘C’ Scheme) from Academic Year 2020 – 21

Under

FACULTY OF SCIENCE & TECHNOLOGY


(As per AICTE guidelines with effect from the academic year 2019–2020)
AC:

Item No:

UNIVERSITY OF MUMBAI

Sr. No. Heading Particulars


Third Year Engineering Computer Science
1 Title of the Course and Engineering ( Internet of Thing and
Cyber Security including Blockchain)

After Passing Second Year Engineering as per


2 Eligibility for Admission the Ordinance 0.6243

3 Passing Marks 40%


Ordinances /
4 Regulations ( if any) Ordinance 0.6243

5 No. of Years / Semesters 8 semesters

P.G. / U.G./ Diploma / Certificate


6 Level (Strike out which is not applicable)

Yearly / Semester
7 Pattern (Strike out which is not applicable )

New / Revised
8 Status (Strike out which is not applicable )

To be implemented from
9 Academic Year With effect from Academic Year: 2022-2023

Dr. S. K. Ukarande Dr Anuradha Muzumdar


Associate Dean Dean
Faculty of Science and Technology Faculty of Science and Technology
University of Mumbai University of Mumbai
Preamble

To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to
be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means
of quality assurance in higher education. The major emphasis of accreditation process is to measure
the outcomes of the program that is being accredited. In line with this Faculty of Science and
Technology (in particular Engineering) of University of Mumbai has taken a lead in incorporating
philosophy of outcome based education in the process of curriculum development.

Faculty resolved that course objectives and course outcomes are to be clearly defined for each course,
so that all faculty members in affiliated institutes understand the depth and approach of course to be
taught, which will enhance learner’s learning process. Choice based Credit and grading system enables
a much-required shift in focus from teacher-centric to learner-centric education since the workload
estimated is based on the investment of time in learning and not in teaching. It also focuses on
continuous evaluation which will enhance the quality of education. Credit assignment for courses is
based on 15 weeks teaching learning process, however content of courses is to be taught in 13 weeks
and remaining 2 weeks to be utilized for revision, guest lectures, coverage of content beyond syllabus
etc.

There was a concern that the earlier revised curriculum more focused on providing information and
knowledge across various domains of the said program, which led to heavily loading of students in
terms of direct contact hours. In this regard, faculty of science and technology resolved that to minimize
the burden of contact hours, total credits of entire program will be of 170, wherein focus is not only on
providing knowledge but also on building skills, attitude and self learning. Therefore in the present
curriculum skill based laboratories and mini projects are made mandatory across all disciplines of
engineering in second and third year of programs, which will definitely facilitate self learning of
students. The overall credits and approach of curriculum proposed in the present revision is in line with
AICTE model curriculum.

The present curriculum will be implemented for Second Year of Engineering from the academic year
2021-22. Subsequently this will be carried forward for Third Year and Final Year Engineering in the
academic years 2022-23, 2023-24, respectively.

Dr. S. K. Ukarande Dr Anuradha Muzumdar


Associate Dean Dean
Faculty of Science and Technology Faculty of Science and Technology
University of Mumbai University of Mumbai
Incorporation and Implementation of Online Contents
from NPTEL/ Swayam Platform

The curriculum revision is mainly focused on knowledge component, skill based activities and
project based activities. Self-learning opportunities are provided to learners. In the revision process
this time in particular Revised syllabus of ‘C’ scheme wherever possible additional resource links
of platforms such as NPTEL, Swayam are appropriately provided. In an earlier revision of
curriculum in the year 2012 and 2016 in Revised scheme ‘A' and ‘B' respectively, efforts were
made to use online contents more appropriately as additional learning materials to enhance
learning of students.

In the current revision based on the recommendation of AICTE model curriculum overall credits
are reduced to 171, to provide opportunity of self-learning to learner. Learners are now getting
sufficient time for self-learning either through online courses or additional projects for enhancing
their knowledge and skill sets.

The Principals/ HoD’s/ Faculties of all the institute are required to motivate and encourage learners
to use additional online resources available on platforms such as NPTEL/ Swayam. Learners can
be advised to take up online courses, on successful completion they are required to submit
certification for the same. This will definitely help learners to facilitate their enhanced learning
based on their interest.

Dr. S. K. Ukarande Dr Anuradha Muzumdar


Associate Dean Dean
Faculty of Science and Technology Faculty of Science and Technology
University of Mumbai University of Mumbai
Preface by Board of Studies Team
It is our honor and a privilege to present the Rev-2019 ‘C’ scheme syllabus of the Bachelor of Computer
Science and Engineering in the (Internet of Thing and Cyber Security including Blockchain) (effective
from the year 2021-22). AICTE has introduced Computer Science and Engineering in the (Internet of
Thing and Cyber Security including Blockchain) as one of the nine emerging technology and hence many
colleges affiliated with the University of Mumbai has started four years UG program for Computer
Science and Engineering in the (Internet of Thing and Cyber Security including Blockchain). As part of
the policy decision from the University end, the Board of IT got an opportunity to work on designing the
syllabus for this new branch. As the Computer Science and Engineering in the (Internet of Thing and
Cyber Security including Blockchain)is comparatively a young branch among other emerging
engineering disciplines in the University of Mumbai, and hence while designing the syllabus promotion
of an interdisciplinary approach has been considered.

The branch also provides multi-faceted scope like better placement and promotion of entrepreneurship
culture among students and increased Industry Institute Interactions. Industries' views are considered as
stakeholders while the design of the syllabus. As per Industry views only 16 % of graduates are directly
employable. One of the reasons is a syllabus that is not in line with the latest emerging technologies. Our
team of faculties has tried to include all the latest emerging technologies in the Computer Science and
Engineering in the (Internet of Thing and Cyber Security including Blockchain) syllabus. Also the first
time we are giving skill-based labs and Mini-project to students from the third semester onwards, which
will help students to work on the latest Computer Science and Engineering in the (Internet of Thing and
Cyber Security including Blockchain) technologies. Also the first time we are giving the choice of
elective from fifth semester such that students will be mastered in one of the Internet of Thing domain.
The syllabus is peer-reviewed by experts from reputed industries and as per their suggestions, it covers
future emerging trends in Computer Science and Engineering in the (Internet of Thing and Cyber Security
including Blockchain) technology and research opportunities available due to these trends. .

We would like to thank senior faculties of IT, Computer and Electronics Department, of all colleges
affiliated to University of Mumbai for significant contribution in framing the syllabus. Also on behalf
of all faculties we thank all the industry experts for their valuable feedback and suggestions. We
sincerely hope that the revised syllabus will help all graduate engineers to face the future challenges in
the field of Emerging Areas of Computer Science and Engineering in the (Internet of Thing and Cyber
Security including Blockchain).

Program Specific Outcome for graduate Program in Computer Science and Engineering (Internet
of Thing and Cyber Security including Blockchain)

1. Apply Core of IoT, Cyber Security & Blockchain knowledge to develop stable and secure
Application.
2. Identify the issues of IoT, Cyber Security including Blockchain in real time application and in all
three area of domain.
3. Ability to apply and develop IoT & Cyber Security including Blockchain multidisciplinary projects.
Board of Studies in Information Technology - Team
Dr. Deven Shah (Chairman)
Dr. Lata Ragha (Member)
Dr. Vaishali D. Khairnar (Member)
Dr. Sharvari Govilkar (Member)
Dr. Sunil B. Wankhade (Member)
Dr. Anil Kale (Member)
Dr. Vaibhav Narwade (Member)
Dr. GV Choudhary (Member)
Ad-hoc Board Information Technology
University of Mumbai
Curriculum Equivalence
TE-Internet of Thing, TE-Cyber Security and TE-Computer Science and Engineering (Internet of Thing and Cyber Security
including Blockchain) Sem-V all subjects are equivalent to TE-Computer Engineering Sem-V subjects.

Sr. Sem Name of Subject Equivalence Subject Equivalence Branch


No. Subject Code
1 VI Cryptography and Cryptography and CSC601 TE-Cyber Security, TE-
Network Security Network Security Computer Science and
IoTCSBCC601 Engineering(nternet of
Thing and Cyber Security
including Blockchain)
2 VI Application Security Application Security CSC602 TE-Cyber Security, TE-
and Secure Coding and Secure Coding Computer Science and
Principles Principles IoTCSBCDLO6012 Engineering(nternet of
Thing and Cyber Security
including Blockchain)
3 VI Ethical Hacking & Ethical Hacking & CSC603 TE-Cyber Security, TE-
Digital Forensic Digital Forensic Computer Science and
IoTCSBCDLO6013 Engineering(nternet of
Thing and Cyber Security
including Blockchain)
4 VI Web X.0 Web X.0 IoTC604 TE-Internet of Thing, TE-
Cyber Security,
CSC604 TE- Computer Science
and Engineering(nternet
IoTCSBCC604 of Thing and Cyber
Security including
Blockchain)
5 VI CNS Lab CNS Lab CSL601 TE-Cyber Security, TE-
Computer Science and
Engineering(nternet of
IoTCSBCL601 Thing and Cyber Security
including Blockchain)
6 VI IoT Architecture and IoT Architecture and IoTC601 TE-Internet of Thing, TE-
Protocols Protocols Computer Science and
Engineering(nternet of
IoTCSBCC602 Thing and Cyber Security
including Blockchain)
7 VI IoT Architecture and IoT Architecture and IoTL601 TE-Internet of Thing, TE-
Protocols Lab Protocols Lab Computer Science and
Engineering(nternet of
IoTCSBCL602 Thing and Cyber Security
including Blockchain)
8 VI Web Lab Web Lab IoTL604 TE-Internet of Thing, TE-
Cyber Security,
CSL604 TE- Computer Science
and Engineering(nternet
of Thing and Cyber
IoTCSBCL604 Security including
Blockchain)
9 VI Enterprise Network Enterprise Network IoTDLO6011 TE-Internet of Thing, TE-
Design Design Cyber Security,
CSDLO6011 TE- Computer Science
and Engineering(nternet
of Thing and Cyber
IoTCSBCDLO6011 Security including
Blockchain)
10 VI Blockchain Technology Blockchain IoTDLO6012 TE-Internet of Thing,
Technology TE-Cyber Security, TE-
CSDLO6012 Computer Science and
Engineering(nternet of
IoTCSBCC603 Thing and Cyber Security
including Blockchain)
11 VI Virtualization and Virtualization and CSDLO6013 TE-Cyber Security , TE-
cloud security cloud security Computer Science and
Engineering(nternet of
IoTCSBCDLO6014 Thing and Cyber Security
including Blockchain)

Board of Studies in Information Technology - Team

Dr. Deven Shah (Chairman)


Dr. Lata Ragha (Member)
Dr. Vaishali D. Khairnar (Member)
Dr. Sharvari Govilkar (Member)
Dr. Sunil B. Wankhade (Member)
Dr. Anil Kale (Member)
Dr. Vaibhav Narwade (Member)
Dr. GV Choudhary (Member)

Ad-hoc Board Information Technology


University of Mumbai
Program Structure for Third Year Computer Science and Engineering (Internet of Thing
and Cyber Security including Blockchain)

UNIVERSITY OF MUMBAI (With Effect from 2022-2023)


Semester V
Teaching Scheme
Course Credits Assigned
Course Name (Contact Hours)
Code
Theory Pract. Theory Pract. Total
IoTCSBCC501 Theoretical Computer
3 -- 3 -- 3
Science
IoTCSBCC502 Software Engineering 3 -- 3 3
IoTCSBCC503 Computer Network 3 -- 3 -- 3
IoTCSBCC504 Data Warehousing &
3 -- 3 -- 3
Mining
IoTCSBCDLO5 Department Level
3 -- 3 -- 3
01x Optional Course- 1
IoTCSBCL501 Software Engineering
-- 2 -- 1 1
Lab
IoTCSBCL502 Computer Network Lab -- 2 -- 1 1
IoTCSBCL503 Data Warehousing &
-- 2 -- 1 1
Mining Lab
IoTCSBCL504 Professional Comm. &
-- 2*+2 -- 2 2
Ethics II
IoTCSBCM501 Mini Project: 2 A -- 4$ -- 2 2
Total 15 14 15 07 22
Examination Scheme
Term Pract
Theory Total
Work &oral
Course End Exam.
Course Name Internal
Code Sem Duration
Assessment
Exam (in Hrs)
Test Test
Avg
1 2
IoTCSBCC50 Theoretical Computer
20 20 20 80 3 25 -- 125
1 Science
IoTCSBCC50 Software Engineering 20 20 20 80 3 -- -- 100
2
IoTCSBCC50 Computer Network 20 20 20 80 3 -- -- 100
3
IoTCSBCC50 Data Warehousing &
20 20 20 80 3 -- -- 100
4 Mining
IoTCSBCDL Department Level
20 20 20 80 3 -- -- 100
O501x Optional Course -1
IoTCSBCL50 Software Engineering Lab -- -- -- -- -- 25 25 50
1
IoTCSBCL50 Computer Network Lab -- -- -- -- -- 25 25 50
2
IoTCSBCL50 Data Warehousing &
-- -- -- -- -- 25 25 50
3 Mining Lab
IoTCSBCL50 Professional Comm. &
-- -- -- -- -- 50 -- 50
4 Ethics II
IoTCSBCM5 Mini Project : 2A -- -- -- -- -- 25 25 50
01
Total -- -- 100 400 -- 175 100 775
* Theory class to be conducted for full class and $ indicates workload of Learner (Not Faculty), students
can form groups with minimum 2(Two) and not more than 4(Four). Faculty Load: 1hour per week per
four groups.

IoTCSBCDLO501X Department Optional Course – 1

IoTCSBCDLO5011 Probabilistic Graphical Models


IoTCSBCDLO5012 Internet Programming
IoTCSBCDLO5013 Advance Database Management System
Program Structure for Third Year Computer Science and Engineering (Internet of Thing and
Cyber Security including Blockchain )
UNIVERSITY OF MUMBAI (With Effect from 2022-2023)
Semester VI
Teaching Scheme
Credits Assigned
Course (Contact Hours)
Course Name
Code Pract.
Theory Theory Pract. Total
Tut.
IoTCSBCC601 Cryptography and Network
3 -- 3 -- 3
Security
IoTCSBCC602 IoT Architecture and
3 -- 3 3
Protocols
IoTCSBCC603 Blockchain Technology 3 -- 3 -- 3
IoTCSBCC604 Web X.0 3 -- 3 -- 3
IoTCSBCDL Department Level Optional
3 -- 3 -- 3
O601x Course -2
IoTCSBCL601 CNS Lab
-- 2 -- 1 1
IoTCSBCL602 IoT Architecture and
Protocols Lab -- 2 -- 1 1
IoTCSBCL603 Blockchain Technologies -- 2 -- 1 1
Lab
IoTCSBCL604 Web Lab -- 2 -- 1 1
IoTCSBCL605 Mobile Application Security
and Penetration Testing Lab -- 4 -- 2 2
(SBL)
IoTCSBCM60 Mini Project Lab: 2B -- 4$ -- 2 2
1 Blockchain Security Model.
Total 15 16 15 08 23
Examination Scheme
Term Pract.
Theory Total
Work &oral
End
Course Exam.
Course Name Sem
Code Internal Assessment Duration
Exa
(in Hrs)
m
Test Test
Avg
1 2
IoTCSBCC601 Cryptography and Network
20 20 20 80 3 -- -- 100
Security
IoTCSBCC602 IoT Architecture and
20 20 20 80 3 -- -- 100
Protocols
IoTCSBCC603 Blockchain Technology 20 20 20 80 3 -- -- 100
IoTCSBCC604 Web X.0 20 20 20 80 3 -- -- 100
IoTCSBCDL Department Level Optional
20 20 20 80 3 -- -- 100
O601x Course -2
IoTCSBCL601 CNS Lab
-- -- -- -- -- 25 25 50
IoTCSBCL602 IoT Architecture and
Protocols Lab -- -- -- -- -- 25 -- 25
IoTCSBCL603 Blockchain Technologies -- -- -- -- -- 25 - 25
Lab
IoTCSBCL604 Web Lab 25 25 50
IoTCSBCL605 Mobile Application Security
and Penetration Testing Lab -- -- -- -- -- 50 25 75
(SBL)
IoTCSBCM60 Mini Project Lab: 2B -- -- -- -- -- 25 25 50
1 Blockchain Security Model.
Total -- -- 100 400 -- 175 100 775

$ indicates work load of Learner (Not Faculty), for Mini-Project. Students can form groups with minimum
2(Two) and not more than 4(Four). Faculty Load: 1hour per week per four groups.

IoTCSBCDLO601X Department Optional Course – 2


IoTCSBCDLO6011 Enterprise Network Design
IoTCSBCDLO6012 Application Security and Secure Coding Principles
IoTCSBCDLO6013 Ethical Hacking and Digital Forensic
IoTCSBCDLO6014 Virtualization and cloud security
Program Structure for Third Year Computer Science and Engineering (Internet of Thing
and Cyber Security including Blockchain)

UNIVERSITY OF MUMBAI (With Effect from 2022-2023)


Semester V
Teaching Scheme
Course Credits Assigned
Course Name (Contact Hours)
Code
Theory Pract. Theory Pract. Total
IoTCSBCC501 Theoretical Computer
3 -- 3 -- 3
Science
IoTCSBCC502 Software Engineering 3 -- 3 3
IoTCSBCC503 Computer Network 3 -- 3 -- 3
IoTCSBCC504 Data Warehousing &
3 -- 3 -- 3
Mining
IoTCSBCDLO5 Department Level
3 -- 3 -- 3
01x Optional Course- 1
IoTCSBCL501 Software Engineering
-- 2 -- 1 1
Lab
IoTCSBCL502 Computer Network Lab -- 2 -- 1 1
IoTCSBCL503 Data Warehousing &
-- 2 -- 1 1
Mining Lab
IoTCSBCL504 Professional Comm. &
-- 2*+2 -- 2 2
Ethics II
IoTCSBCM501 Mini Project: 2 A -- 4$ -- 2 2
Total 15 14 15 07 22
Examination Scheme
Term Pract
Theory Total
Work &oral
Course End Exam.
Course Name Internal
Code Sem Duration
Assessment
Exam (in Hrs)
Test Test
Avg
1 2
IoTCSBCC50 Theoretical Computer
20 20 20 80 3 25 -- 125
1 Science
IoTCSBCC50 Software Engineering 20 20 20 80 3 -- -- 100
2
IoTCSBCC50 Computer Network 20 20 20 80 3 -- -- 100
3
IoTCSBCC50 Data Warehousing &
20 20 20 80 3 -- -- 100
4 Mining
IoTCSBCDL Department Level
20 20 20 80 3 -- -- 100
O501x Optional Course -1
IoTCSBCL50 Software Engineering Lab -- -- -- -- -- 25 25 50
1
IoTCSBCL50 Computer Network Lab -- -- -- -- -- 25 25 50
2
IoTCSBCL50 Data Warehousing &
-- -- -- -- -- 25 25 50
3 Mining Lab
IoTCSBCL50 Professional Comm. &
-- -- -- -- -- 50 -- 50
4 Ethics II
IoTCSBCM5 Mini Project : 2A -- -- -- -- -- 25 25 50
01
Total -- -- 100 400 -- 175 100 775
* Theory class to be conducted for full class and $ indicates workload of Learner (Not Faculty), students
can form groups with minimum 2(Two) and not more than 4(Four). Faculty Load: 1hour per week per
four groups.

IoTCSBCDLO501X Department Optional Course – 1

IoTCSBCDLO5011 Probabilistic Graphical Models


IoTCSBCDLO5012 Internet Programming
IoTCSBCDLO5013 Advance Database Management System
Course Code Course Name Credits

IoTCSBCC50 Theoretical Computer Science 3


1

Prerequisite: Discrete Structures


Course Objectives:
1. Acquire conceptual understanding of fundamentals of grammars and languages.
2. Build concepts of theoretical design of deterministic and non-deterministic finite
automata and push down automata.
3. Develop understanding of different types of Turing machines and applications.
4. Understand the concept of Undecidability.
Course Outcomes: At the end of the course, the students will be able to
1. Understand concepts of Theoretical Computer Science, difference and equivalence
of DFA and NFA , languages described by finite automata and regular expressions.
2. Design Context free grammer, pushdown automata to recognize the language.
3. Develop an understanding of computation through Turing Machine.
4. Acquire fundamental understanding of decidability and undecidability.

Module Unit Topics Theory


No. No. Hrs.
1.0 Basic Concepts and Finite Automata 09
1.1 Importance of TCS, Alphabets, Strings, Languages, Closure
properties, Finite Automata (FA) and Finite State machine
(FSM).
1.2 Deterministic Finite Automata (DFA) and Nondeterministic Finite
Automata (NFA): Definitions, transition diagrams and Language
recognizers, Equivalence between NFA with and without ε-
transitions, NFA to DFA Conversion, Minimization of DFA, FSM
with output: Moore and Mealy machines,
Applications and limitations of FA.

2.0 Regular Expressions and Languages 07


2.1 Regular Expression (RE),Equivalence of RE and FA, Arden‘s
Theorem, RE Applications
2.2 Regular Language (RL), Closure properties of RLs, Decision
properties of RLs, Pumping lemma for RLs.
3.0 Grammars 08
3.1 Grammars and Chomsky hierarchy
3.2 Regular Grammar (RG), Equivalence of Left and Right
linear grammar, Equivalence of RG and FA.
3.3 Context Free Grammars (CFG)
Definition, Sentential forms, Leftmost and Rightmost
derivations, Parse tree, Ambiguity, Simplification and
Applications, Normal Forms: Chomsky Normal Forms (CNF)
and Greibach Normal Forms (GNF), Context Free
language (CFL) - Pumping lemma, Closure properties.

4.0 Pushdown Automata(PDA) 04


4.1 Definition, Language of PDA,PDA as generator, decider and
acceptor of CFG, Deterministic PDA , Non-Deterministic
PDA, Application of PDA.
5.0 Turing Machine (TM) 09
5.1 Definition, Design of TM as generator, decider and acceptor,
Variants of TM: Multitrack, Multitape, Universal TM,
Applications, Power and Limitations of TMs.
6.0 Undecidability 02
6.1 Decidability and Undecidability, Recursive and Recursively
Enumerable Languages, Halting Problem, Rice‘s Theorem, Post
Correspondence Problem.

Total 39

Text Books:
1. John E. Hopcroft, Rajeev Motwani, Jeffery D. Ullman, “Introduction to Automata Theory,
Languages and Computation”, 3rd Edition, Pearson Education, 2008.

2. Michael Sipser, “Theory of Computation”, 3rd Edition, Cengage learning. 2013.


3. Vivek Kulkarni, “Theory of Computation”, Illustrated Edition, Oxford University
Press, (12 April 2013) India.
Reference Books:
1. J. C. Martin, “Introduction to Languages and the Theory of Computation”, 4th Edition, Tata
McGraw Hill Publication, 2013.

2. Kavi Mahesh, “Theory of Computation: A Problem Solving Approach”, Kindle Edition,


Wiley-India, 2011.

Assessment:
Internal Assessment:
1. Assessment consists of two class tests of 20 marks each.
2. The first class test is to be conducted when approx. 40% syllabus is completed and
second class test when additional 40% syllabus is completed.

3. Duration of each test shall be one hour.


Term work:
1. Term Work should consist of at least 06 assignments (at least one assignment on
each module).
2. Assignment (best 5 assignments) 20 marks
Attendance 5 marks
3. It is recommended to use JFLAP software (www.jflap.org) for better teaching and
learning processes.

End Semester Theory Examination:

1. Question paper will comprise of 6 questions, each carrying 20 marks.

2. The students need to solve total 4 questions.

3. Question No.1 will be compulsory and based on entire syllabus.

4. Remaining questions (Q.2 to Q.6) will cover all the modules of syllabus.
Useful Links:
1. www.jflap.org
2. https://nptel.ac.in/courses/106/104/106104028/
3. https://nptel.ac.in/courses/106/104/106104148/
Course Code: Course Title Credit

IoTCSBCC502 Software Engineering 3

Prerequisite: Object Oriented Programming with Java , Python Programming


Course Objectives:
1 To provide the knowledge of software engineering discipline.
2 To apply analysis, design and testing principles to software project development.
3 To demonstrate and evaluate real world software projects.
Course Outcomes: On successful completion of course, learners will be able to:
1 Identify requirements & assess the process models.
2 Plan, schedule and track the progress of the projects.
3 Design the software projects.
4 Do testing of software project.
5 Identify risks, manage the change to assure quality in software projects.

Module Content Hrs


1 Introduction To Software Engineering and Process Models 7
1.1 Software Engineering-process framework, the Capability Maturity Model (CMM),
Advanced Trends in Software Engineering
1.2 Prescriptive Process Models: The Waterfall, Incremental Process
Models, Evolutionary Process Models: RAD & Spiral
1.3 Agile process model: Extreme Programming (XP), Scrum, Kanban
2 Software Requirements Analysis and Modeling 4
2.1 Requirement Engineering, Requirement Modeling, Data flow diagram, Scenario
based model
2.2 Software Requirement Specification document format(IEEE)
3 Software Estimation Metrics 7
3.1 Software Metrics, Software Project Estimation (LOC, FP, COCOMO II )
3.2 Project Scheduling & Tracking
4 Software Design 7
4.1 Design Principles & Concepts
4.2 Effective Modular Design, Cohesion and Coupling, Architectural design
5 Software Testing 7
5.1 Unit testing, Integration testing,Validation testing, System testing
5.2 Testing Techniques, white-box testing: Basis path, Control structure testing black-
box testing: Graph based, Equivalence, Boundary Value
5.3 Types of Software Maintenance, Re-Engineering, Reverse Engineering
6 Software Configuration Management, Quality Assurance and 7
Maintenance
6.1 Risk Analysis & Management: Risk Mitigation, Monitoring and Management Plan
(RMMM).
6.2 Quality Concepts and Software Quality assurance Metrics, Formal Technical
Reviews, Software Reliability
6.3 The Software Configuration Management (SCM) ,Version Control and
Change Control
39
Textbooks:
1 Roger Pressman, “Software Engineering: A Practitioner‘s Approach”, 9th edition ,
McGraw-Hill Publications, 2019
2 Ian Sommerville, “Software Engineering”, 9th edition, Pearson Education, 2011
3 Ali Behfrooz and Fredeick J. Hudson, "Software Engineering Fundamentals", Oxford University
Press, 1997
4 Grady Booch, James Rambaugh, Ivar Jacobson, “The unified modeling language user
guide”, 2nd edition, Pearson Education, 2005
References:
1 Pankaj Jalote, "An integrated approach to Software Engineering", 3rd edition, Springer,
2005
2 Rajib Mall, "Fundamentals of Software Engineering", 5th edition, Prentice Hall India, 2014
3 Jibitesh Mishra and Ashok Mohanty, “Software Engineering”, Pearson , 2011
4 Ugrasen Suman, “Software Engineering – Concepts and Practices”, Cengage Learning,
2013
5 Waman S Jawadekar, “Software Engineering principles and practice”, McGraw Hill
Education, 2004

Assessment:
Internal Assessment:
Assessment consists of two class tests of 20 marks each. The first-class test is to be conducted when approx.
40% syllabus is completed and the second-class test when an additional 40% syllabus is
completed. Duration of each test shall be one hour.
End Semester Theory Examination:
1 Question paper will comprise a total of six questions.
2 All question carries equal marks
3 Only Four questions need to be solved.
4 In question paper weightage of each module will be proportional to number of respective
lecture hours as mentioned in the syllabus.

Useful Links
1 https://nptel.ac.in/courses/106/105/106105182/
2 https://onlinecourses.nptel.ac.in/noc19_cs69/preview
3 https://www.mooc-list.com/course/software-engineering-introduction-edx
Course Code: Course Title Credit

IoTCSBCC503 Computer Network 3

Prerequisite: None
Course Objectives:
1 To introduce concepts and fundamentals of data communication and computer networks.
2 To explore the inter-working of various layers of OSI.
3 To explore the issues and challenges of protocols design while delving into TCP/IP protocol
suite.
4 To assess the strengths and weaknesses of various routing algorithms.
5 To understand various transport layer and application layer protocols.
Course Outcomes: On successful completion of course, learner will be able to
1 Demonstrate the concepts of data communication at physical layer and compare ISO - OSI
model with TCP/IP model.
2 Explore different design issues at data link layer.
3 Design the network using IP addressing and sub netting / supernetting schemes.
4 Analyze transport layer protocols and congestion control algorithms.
5 Explore protocols at application layer

Module Content Hrs


1 Introduction to Networking 4
1.1 Introduction to computer network, network application, network software and
hardware components (Interconnection networking devices), Network topology,
protocol hierarchies, design issues for the layers,
connection oriented and connectionless services
1.2 Reference models: Layer details of OSI, TCP/IP models. Communication between
layers.
2 Physical Layer 3
2.1 Introduction to Communication Electromagnetic Spectrum
2.2 Guided Transmission Media: Twisted pair, Coaxial, Fiber optics.
3 Data Link Layer 8
3.1 DLL Design Issues (Services, Framing, Error Control, Flow Control), Error
Detection and Correction(Hamming Code, CRC, Checksum) , Elementary Data
Link protocols , Stop and Wait, Sliding Window(Go Back N, Selective Repeat)

Medium Access Control sublayer


3.2
Channel Allocation problem, Multiple access Protocol( Aloha, Carrier Sense
Multiple Access (CSMA/CD)
4 Network layer 12
4.1 Network Layer design issues, Communication Primitives: Unicast, Multicast,
Broadcast. IPv4 Addressing (classfull and classless), Subnetting, Supernetting
design problems ,IPv4 Protocol, Network Address Translation (NAT), IPv6
4.2 Routing algorithms : Shortest Path (Dijkastra‘s), Link state routing, Distance
Vector Routing
4.3 Protocols - ARP,RARP, ICMP, IGMP
4.4 Congestion control algorithms: Open loop congestion control, Closed loop
congestion control, QoS parameters, Token & Leaky bucket algorithms
5 Transport Layer 6
5.1 The Transport Service: Transport service primitives, Berkeley Sockets,
Connection management (Handshake), UDP, TCP, TCP state transition, TCP
timers
5.2 TCP Flow control (sliding Window), TCP Congestion Control: Slow Start
6 Application Layer 6
6.1 DNS: Name Space, Resource Record and Types of Name Server. HTTP, SMTP,
Telnet, FTP, DHCP

Textbooks:
1 A.S. Tanenbaum, Computer Networks,4th edition Pearson Education
2 B.A. Forouzan, Data Communications and Networking, 5th edition, TMH
3 James F. Kurose, Keith W. Ross, Computer Networking, A Top-Down Approach
Featuring the Internet,6th edition, Addison Wesley
References:
1 S.Keshav,An Engineering Approach To Computer Networking, Pearson
2 Natalia Olifer & Victor Olifer,Computer Networks: Principles, Technologies &
Protocols for Network Design, Wiley India, 2011.
3 Larry L.Peterson, Bruce S.Davie, Computer Networks: A Systems Approach, Second
Edition ,The Morgan Kaufmann Series in Networking

Assessment:
Internal Assessment:
Assessment consists of two class tests of 20 marks each. The first class test is to be conducted
when approx. 40% syllabus is completed and second class test when additional 40% syllabus is
completed. Duration of each test shall be one hour.
End Semester Theory Examination:
1 Question paper will comprise of total six questions.
2 All question carries equal marks
3 Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3
then part (b) will be from any module other than module 3)
4 Only Four question need to be solved.
5 In question paper weightage of each module will be proportional to number of respective
lecture hours as mention in the syllabus.

Useful Links
1 https://www.netacad.com/courses/networking/networking-essentials
2 https://www.coursera.org/learn/computer-networking
3 https://nptel.ac.in/courses/106/105/106105081
4 https://www.edx.org/course/introduction-to-networking
Course Code: Course Title Credit

IoTCSBCC504 Data Warehousing and Mining 3

Prerequisite: Database Concepts


Course Objectives:
1. To identify the significance of Data Warehousing and Mining.
2. To analyze data, choose relevant models and algorithms for respective applications.
3. To study web data mining.
4. To develop research interest towards advances in data mining.
Course Outcomes: At the end of the course, the student will be able to
1. Understand data warehouse fundamentals and design data warehouse with dimensional modelling and
apply OLAP operations.
2. Understand data mining principles and perform Data preprocessing and Visualization.
3. Identify appropriate data mining algorithms to solve real world problems.
4. Compare and evaluate different data mining techniques like classification, prediction, clustering and
association rule mining
5. Describe complex information and social networks with respect to web mining.

Module Content Hrs


1 Data Warehousing Fundamentals 8
Introduction to Data Warehouse, Data warehouse architecture, Data warehouse versus
Data Marts, E-R Modeling versus Dimensional Modeling, Information Package Diagram,
Data Warehouse Schemas; Star Schema, Snowflake Schema, Factless Fact Table, Fact
Constellation Schema. Update to the dimension tables. Major steps in ETL process, OLTP
versus OLAP, OLAP operations: Slice, Dice,
Rollup, Drilldown and Pivot.

2 Introduction to Data Mining, Data Exploration and Data Pre-processing 8


Data Mining Task Primitives, Architecture, KDD process, Issues in Data Mining,
Applications of Data Mining, Data Exploration: Types of Attributes, Statistical
Description of Data, Data Visualization, Data Preprocessing: Descriptive data
summarization, Cleaning, Integration & transformation, Data reduction, Data
Discretization and Concept hierarchy generation.
3 Classification 6
Basic Concepts, Decision Tree Induction, Naïve Bayesian Classification,
Accuracy and Error measures, Evaluating the Accuracy of a Classifier: Holdout &
Random Subsampling, Cross Validation, Bootstrap.
4 Clustering 6
Types of data in Cluster analysis, Partitioning Methods (k-Means, k-Medoids),
Hierarchical Methods (Agglomerative, Divisive).
5 Mining frequent patterns and associations 6
Market Basket Analysis, Frequent Item sets, Closed Item sets, and Association Rule,
Frequent Pattern Mining, Apriori Algorithm, Association Rule Generation, Improving the
Efficiency of Apriori, Mining Frequent Itemsets without candidate generation,
Introduction to Mining Multilevel Association Rules and Mining
Multidimensional Association Rules.
6 Web Mining 5
Introduction, Web Content Mining: Crawlers, Harvest System, Virtual Web View,
Personalization, Web Structure Mining: Page Rank, Clever, Web Usage Mining.

Textbooks:
1 Paulraj Ponniah, “ Data Warehousing: Fundamentals for IT Professionals”, Wiley India.
2 Han, Kamber, “Data Mining Concepts and Techniques”, Morgan Kaufmann 2nd edition.
3 M.H. Dunham, “Data Mining Introductory and Advanced Topics”, Pearson Education.
References:
1 Reema Theraja, “Data warehousing”, Oxford University Press 2009.
2 Pang-Ning Tan, Michael Steinbach and Vipin Kumar, “Introduction to Data Mining”,
Pearson Publisher 2nd edition.
3 Ian H. Witten, Eibe Frank and Mark A. Hall, “Data Mining”, Morgan Kaufmann 3rd edition.

Assessment:
Internal Assessment:
Assessment consists of two class tests of 20 marks each. The first-class test is to be conducted when approx.
40% syllabus is completed and second-class test when additional 40% syllabus is
completed. Duration of each test shall be one hour.
End Semester Theory Examination:
1 Question paper will comprise of total six questions.
2 All question carries equal marks
3 Questions will be mixed in nature (for example, If Q.2 part (a) from module 3 then part (b)
can be from any module other than module 3)
4 Only Four questions need to be solved.
5 In question paper weightage of each module will be proportional to the number of respective
lecture hours as mentioned in the syllabus.
Useful Links
1 https://onlinecourses.nptel.ac.in/noc20_cs12/preview
2 https://www.coursera.org/specializations/data-mining
Course Code: Course Title Credit

IoTCSBCDLO Probabilistic Graphical Models 3


5011

Prerequisite: Engineering Mathematics, Discrete Structure


Course Objectives:
1 To give comprehensive introduction of probabilistic graphical models
2 To make inferences, learning, actions and decisions while applying these models
3 To introduce real-world trade-offs when using probabilistic graphical models in practice
4 To develop the knowledge and skills necessary to apply these models to solve real world
problems.
Course Outcomes: At the end of the course, the student will be able to
1 Understand basic concepts of probabilistic graphical modelling.
2 Model and extract inference from various graphical models like Bayesian Networks, Markov Models

3 Perform learning and take actions and decisions using probabilistic graphical models
4 Represent real world problems using graphical models; design inference algorithms; and learn the
structure of the graphical model from data.
5 Design real life applications using probabilistic graphical models.

Module Content Hrs

1. Introduction to Probabilistic Graphical Modeling 5

1.1 Introduction to Probability Theory:


Probability Theory, Basic Concepts in Probability, Random Variables and
Joint Distribution, Independence and Conditional Independence,
Continuous Spaces, Expectation and Variances

1.2 Introduction to Graphs: Nodes and Edges, Subgraphs, Paths and Trails,
Cycles and Loops

1.3 Introduction to Probabilistic Graph Models: Bayesian Network, Markov


Model, Hidden Markov Model

1.4 Applications of PGM

2. Bayesian Network Model and Inference 10

2.1 Directed Graph Model: Bayesian Network-Exploiting Independence


Properties, Naive Bayes Model, Bayesian Network Model, Reasoning
Patterns, Basic Independencies in Bayesian Networks, Bayesian Network
Semantics, Graphs and Distributions. Modelling: Picking variables, Picking
Structure, Picking Probabilities, D- separation
2.2 Local Probabilistic Models: Tabular CPDs, Deterministic CPDs, Context
Specific CPDs, Generalized Linear Models.
2.3 Exact inference variable elimination: Analysis of Complexity, Variable
Elimination, Conditioning, Inference with Structured CPDs.

3. Markov Network Model and Inference 8

3.1 Undirected Graph Model : Markov Model-Markov Network,


Parameterization of Markov Network, Gibb's distribution, Reduced Markov
Network, Markov Network Independencies, From Distributions to Graphs,
Fine Grained Parameterization, Over Parameterization

3.2 Exact inference variable elimination: Graph Theoretic Analysis for


Variable Elimination, Conditioning

4. Hidden Markov Model and Inference 6

4.1 Template Based Graph Model : HMM- Temporal Models, Template


Variables and Template Factors, Directed Probabilistic Models, Undirected
Representation, Structural Uncertainty.

5. Learning and Taking Actions and Decisions 6

5.1 Learning Graphical Models: Goals of Learning, Density Estimation,


Specific Prediction Tasks, Knowledge Discovery. Learning as
Optimization: Empirical Risk, over fitting, Generalization, Evaluating
Generalization Performance, Selecting a Learning Procedure, Goodness of
fit, Learning Tasks. Parameter Estimation: Maximum Likelihood
Estimation, MLE for Bayesian Networks

5.2 Causality: Conditioning and Intervention, Correlation and Causation,


Causal Models, Structural Causal Identifiability, Mechanisms and
Response Variables, Learning Causal Models. Utilities and Decisions:
Maximizing Expected Utility, Utility Curves, Utility Elicitation. Structured
Decision Problems: Decision Tree

6. Applications 4

6.1 Application of Bayesian Networks: Classification, Forecasting, Decision


Making

6.2 Application of Markov Models: Cost Effectiveness Analysis, Relational


Markov Model and its Applications, Application in Portfolio Optimization

6.3 Application of HMM: Speech Recognition, Part of Speech Tagging,


Bioinformatics.

Textbooks:

1. Daphne Koller and Nir Friedman, "Probabilistic Graphical Models: Principles and
Techniques”, Cambridge, MA: The MIT Press, 2009 (ISBN 978-0-262-0139- 2).
2. David Barber, "Bayesian Reasoning and Machine Learning", Cambridge
University Press, 1st edition, 2011.

References:
1. Finn Jensen and Thomas Nielsen, "Bayesian Networks and Decision Graphs
(Information Science and Statistics )", 2nd Edition, Springer, 2007.

2. Kevin P. Murphy, "Machine Learning: A Probabilistic Perspective", MIT Press,


2012.

3. Martin Wainwright and Michael Jordan, M., "Graphical Models, Exponential


Families, and Variational Inference", 2008.

Assessment:

Internal Assessment:

Assessment consists of two class tests of 20 marks each. The first class test is to be m onducted
when approx. 40% syllabus is completed and second class test when additional 40% syllabus is
completed. Duration of each test shall be one hour.

End Semester Theory Examination:

1. Question paper will comprise of total six questions.

2. All question carries equal marks

3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from
module 3 then part (b) will be from any module other than module 3)

4. Only Four question need to be solved.

5. In question paper weightage of each module will be proportional to number of


respective lecture hours as mention in the syllabus.

Useful Links

1. https://www.coursera.org/specializations/probabilistic-graphical-models

2. https://www.mooc-list.com/tags/probabilistic-graphical-models

3. https://scholarship.claremont.edu/cgi/viewcontent.cgi?referer=https://www.google.c
om/&httpsredir=1&article=2690&context=cmc_theses

4. https://www.upgrad.com/blog/bayesian-networks/

5. https://www.utas.edu.au/ data/assets/pdf_file/0009/588474/TR_14_BNs_a_resour
ce_guide.pdf

6. https://math.libretexts.org/Bookshelves/Applied_Mathematics/Book%3A_Applied_
Finite_Mathematics_(Sekhon_and_Bloom)/10%3A_Markov_Chains/10.02%3A_A
pplications_of_Markov_Chains/10.2.01%3A_Applications_of_Markov_Chains_(E
xercises)

7. https://link.springer.com/chapter/10.1007/978-3-319-43742-2_24

8. https://homes.cs.washington.edu/~pedrod/papers/kdd02a.pdf

9. https://core.ac.uk/download/pdf/191938826.pdf
10. https://cs.brown.edu/research/pubs/theses/ugrad/2005/dbooksta.pdf
11. https://web.ece.ucsb.edu/Faculty/Rabiner/ece259/Reprints/tutorial%20on%20hmm
%20and%20applications.pdf

12. https://mi.eng.cam.ac.uk/~mjfg/mjfg_NOW.pdf

13. http://bioinfo.au.tsinghua.edu.cn/member/jgu/pgm/materials/Chapter3-
LocalProbabilisticModels.pdf

Suggested List of Experiments:

Sr. No Experiment

1. Experiment on Probability Theory

2. Experiment on Graph Theory

3. Experiment on Bayesian Network Modelling

4. Experiment on Markov Chain Modeling

5. Experiment on HMM

6. Experiment on Maximum Likelihood Estimation

7. Decision Making using Decision Trees

8. Learning with Optimization

** Suggestion: Laboratory work based on above syllabus can be incorporated along with mini
project in CSM501: Mini-Project.
Course Code: Course Title Credit
IoTCSBCDLO50 Internet Programming 3
12

Prerequisite: Data Structures, Programming Languages- JAVA, Python


Course Objectives:
1 To get familiar with the basics of Internet Programming.
2 To acquire knowledge and skills for creation of web site considering both client and server-
side programming
3 To gain ability to develop responsive web applications and explore different web extensions
and web services standards
4 To learn characteristics of RIA and React Js
Course Outcomes:
1 Implement interactive web page(s) using HTML and CSS.
2 Design a responsive web site using JavaScript and demonstrate database connectivity using
JDBC
3 Demonstrate Rich Internet Application using Ajax and demonstrate and differentiate various
Web Extensions
4 Demonstrate web application using Reactive Js

Module Content Hrs


1 Introduction to Web Technology 10
1.1 Web Essentials: Clients, Servers and Communication, The Internet, Basic
Internet protocols, World wide web, HTTP Request Message, HTTP
Response Message, Web Clients, Web Servers
HTML5 – fundamental syntax and semantics, Tables, Lists, Image, HTML5
control elements, Semantic elements, Drag and Drop, Audio – Video controls
CSS3 – Inline, embedded and external style sheets – Rule cascading,
Inheritance, Backgrounds, Border Images, Colors, Shadows, Text,
Transformations, Transitions, Animation, Basics of Bootstrap.

2 Front End Development 7


2.1 Java Script: An introduction to JavaScript–JavaScript DOM Model- Date and
Objects-Regular Expressions- Exception Handling- Validation-Built-in
objects-Event Handling, DHTML with JavaScript-
JSON introduction – Syntax – Function Files – Http Request –SQL.
3. Back End Development 7
3.1 Servlets: Java Servlet Architecture, Servlet Life Cycle, Form GET and POST
actions, Session Handling, Understanding Cookies, Installing and
Configuring Apache Tomcat Web Server,
Database Connectivity: JDBC perspectives, JDBC program example JSP:
Understanding Java Server Pages, JSP Standard Tag Library (JSTL), Creating
HTML forms by embedding JSP code.
4 Rich Internet Application (RIA) 4
4.1 Characteristics of RIA,
Introduction to AJAX: AJAX design basics, AJAX vs Traditional Approach,
Rich User Interface using Ajax, jQuery framework with AJAX.

5 Web Extension: PHP and XML 6


5.1 XML –DTD (Document Type Definition), XML Schema, Document Object
Model, Presenting XML, Using XML Parsers: DOM and SAX,
XSL-eXtensible Stylesheet Language
5.2 Introduction to PHP- Data types, control structures, built in functions,
building web applications using PHP- tracking users, PHP and
MySQLdatabase connectivity with example.
6 React js 5
6.1 Introduction, React features, App “Hello World” Application,
Introduction to JSX, Simple Application using JSX.
39

Textbooks:
1 Ralph Moseley, M.T. Savliya, “Developing Web Applications”, Willy India, Second
Edition, ISBN: 978-81-265-3867-6
2 “Web Technology Black Book”, Dremtech Press, First Edition, 978-7722-997
3 Robin Nixon, "Learning PHP, MySQL, JavaScript, CSS & HTML5" Third Edition, O'REILLY,
2014.
(http://www.ebooksbucket.com/uploads/itprogramming/javascript/Learning_PHP_MySQ
L_Javascript_CSS_HTML5 Robin_Nixon_3e.pdf)
4 Dana Moore, Raymond Budd, Edward Benson,Professional Rich Internet Applications:
AJAX and Beyond Wiley publications. https://ebooks-it.org/0470082801-ebook.htm
5. Alex Banks and Eve Porcello, Learning React Functional Web Development with React
and Redux,OREILLY, First Edition
References:
1 Harvey & Paul Deitel& Associates, Harvey Deitel and Abbey Deitel, Internet and World
Wide Web - How To Program, Fifth Edition, Pearson Education, 2011.
2 Achyut S Godbole and AtulKahate, ―Web Technologies, Second Edition, Tata McGraw
Hill, 2012.
3 Thomas A Powell, Fritz Schneider, ―JavaScript: The Complete Reference, Third Edition,
Tata McGraw Hill, 2013
4 David Flanagan, ―JavaScript: The Definitive Guide, Sixth Edition, O'Reilly Media, 2011
5 Steven Holzner ―The Complete Reference - PHP, Tata McGraw Hill, 2008
6 Mike Mcgrath―PHP & MySQL in easy Steps, Tata McGraw Hill, 2012.

Assessment:
Internal Assessment:
Assessment consists of two class tests of 20 marks each. The firstclass test is to be conducted when
approx. 40% syllabus is completed and the secondclass test when an additional 40%
syllabus is completed. Duration of each test shall be one hour.
End Semester Theory Examination:
1 Question paper will comprise a total of six questions.
2 All question carries equal marks
3 Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3
then part (b) will be from any module other than module 3)
4 Only Four questions need to be solved.
5 In question paper weightage of each module will be proportional to number of respective
lecture hours as mentioned in the syllabus.

Useful Links
1 https://books.goalkicker.com/ReactJSBook/
2 https://www.guru99.com/reactjs-tutorial.html
3 www.nptelvideos.in
4 www.w3schools.com
5 https://spoken-tutorial.org/
6 www.coursera.org
The following list can be used as a guideline for mini project:
1 Create Simple web page using HTML5
2 Design and Implement web page using CSS3 and HTML5
3 Form Design and Client-Side Validation using: a. Javascript and HTML5, b. Javascript and
Jquery
4 Develop interactive web pages using HTML 5 with JDBC database connectivity
5 Develop simple web page using PHP
6 Develop interactive web pages using PHP with database connectivity MYSQL
7 Develop XML web page using DTD, XSL
8 Implement a web page using Ajax and PHP
9 Case study based on Reactive js
10 Installation of the React DOM library.
* Suggestion: Laboratory work based on above syllabus can be incorporated as mini project
in CSM501: Mini-Project.
Course Code: Course Title Credit
IoTCSBCDLO50 Advance Database Management System 3
13

Prerequisite: Database Management System


Course Objectives:
1 To provide insights into distributed database designing
2 To specify the various approaches used for using XML and JSON technologies.
3 To apply the concepts behind the various types of NoSQL databases and utilize it for Mongodb
4 To learn about the trends in advance databases
Course Outcomes: After the successful completion of this course learner will be able to:
1 Design distributed database using the various techniques for query processing
2 Measure query cost and perform distributed transaction management
3 Organize the data using XML and JSON database for better interoperability
4 Compare different types of NoSQL databases
5 Formulate NoSQL queries using Mongodb
6 Describe various trends in advance databases through temporal, graph based and spatial
based databases

Module Content Hrs


1 Distributed Databases 3
1.1 Introduction, Distributed DBMS Architecture, Data Fragmentation,
Replication and Allocation Techniques for Distributed Database Design.

2 Distributed Database Handling 8


2.1 Distributed Transaction Management – Definition, properties, types, architecture
Distributed Query Processing - Characterization of Query Processors, Layers/
phases of query processing.

2.2 Distributed Concurrency Control- Taxonomy, Locking based, Basic TO


algorithm,
Recovery in Distributed Databases: Failures in distributed database, 2PC and 3PC
protocol.

3 Data interoperability – XML and JSON 6


3.1 XML Databases: Document Type Definition, XML Schema, Querying and
Transformation: XPath and XQuery.
3.2 Basic JSON syntax, (Java Script Object Notation),JSON data types, Stringifying
and parsing the JSON for sending & receiving, JSON Object
retrieval using key-value pair and JQuery, XML Vs JSON

4 NoSQL Distribution Model 10


4.1 NoSQL database concepts: NoSQL data modeling, Benefits of NoSQL,
comparison between SQL and NoSQL database system.
4.2 Replication and sharding, Distribution Models Consistency in distributed data,
CAP theorem, Notion of ACID Vs BASE, handling Transactions,
consistency and eventual consistency
4.3 Types of NoSQL databases: Key-value data store, Document database and
Column Family Data store, Comparison of NoSQL databases w.r.t CAP
theorem and ACID properties.
5 NoSQL using MongoDB 6
5.1 NoSQL using MongoDB: Introduction to MongoDB Shell, Running the
MongoDB shell, MongoDB client, Basic operations with MongoDB shell,
Basic Data Types, Arrays, Embedded Documents
5.2 Querying MongoDB using find() functions, advanced queries using logical
operators and sorting, simple aggregate functions, saving and updating document.
MongoDB Distributed environment: Concepts of replication and horizonal scaling
through sharding in MongoDB

6 Trends in advance databases 6


6.1 Temporal database: Concepts, time representation, time dimension,
incorporating time in relational databases.
6.2 Graph Database: Introduction, Features, Transactions, consistency,
Availability, Querying, Case Study Neo4J
6.3 Spatial database: Introduction, data types, models, operators and queries
39

Textbooks:
1 Korth, Siberchatz,Sudarshan, “Database System Concepts”, 6 thEdition, McGraw Hill
2 Elmasri and Navathe, “Fundamentals of Database Systems”, 5 thEdition, Pearson Education
3 Ozsu, M. Tamer, Valduriez, Patrick, “Principles of distributed database systems”,3rd Edition,
Pearson Education, Inc.
4 PramodSadalge, Martin Fowler, NoSQL Distilled: A Brief Guide to the Emerging World of
Polyglot Persistence, Addison Wesely/ Pearson
5 Jeff Friesen , Java XML and JSON,Second Edition, 2019, après Inc.
References:
1 Peter Rob and Carlos Coronel,Database Systems Design, Implementation and Management,
Thomson Learning, 5thEdition.
2 Dr. P.S. Deshpande, SQL and PL/SQL for Oracle 10g, Black Book, Dreamtech Press.
3 Adam Fowler, NoSQL for dummies, John Wiley & Sons, Inc.
4 Shashank Tiwari, Professional NOSQL, John Willy & Sons. Inc
5 Raghu Ramkrishnan and Johannes Gehrke, Database Management Systems, TMH
6 MongoDB Manual : https://docs.mongodb.com/manual

Assessment:
Internal Assessment:
Assessment consists of two class tests of 20 marks each. The first-class test is to be conducted when
approx. 40% syllabus is completed and second class test when additional 40% syllabus is
completed. Duration of each test shall be one hour.
End Semester Theory Examination:
1 Question paper will comprise of total six questions.
2 All question carries equal marks
3 Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3
then part (b) will be from any module other than module 3)
4 Only Four question need to be solved.
5 In question paper weightage of each module will be proportional to number of respective
lecture hours as mention in the syllabus.
NOTE: Suggested that in Mini Projects (CSM501) can be included NoSQL databases for
implementation as a backend.
Useful Links
1 https://cassandra.apache.org
2 https://www.mongodb.com
3 https://riak.com
4 https://neo4j.com
5 https://martinfowler.com/articles/nosql-intro-original.pdf
Lab Code Lab Name Credit
IoTCSBCL501 Software Engineering Lab 1

Prerequisite: Object Oriented Programming with Java , Python Programming


Lab Objectives:
1 To solve real life problems by applying software engineering principles
2 To impart state-of-the-art knowledge on Software Engineering
Lab Outcomes: On successful completion of laboratory experiments, learners will be able to :
1 Identify requirements and apply software process model to selected case study.
2 Develop architectural models for the selected case study.
3 Use computer-aided software engineering (CASE) tools.

Suggested List of Experiments - Assign the case study/project as detail statement of problem to a
group of two/three students. Laboratory work will be based on course syllabus with
minimum 10 experiments. Open source computer-aided software engineering (CASE) tools can be used
for performing the experiment.
Sr. No. Title of Experiment
1 Application of at least two traditional process models.
2 Application of the Agile process models.
3 Preparation of software requirement specification (SRS) document in IEEE format.
4 Structured data flow analysis.
5 Use of metrics to estimate the cost.
6 Scheduling & tracking of the project.
7 Write test cases for black box testing.
8 Write test cases for white box testing.
9 Preparation of Risk Mitigation, Monitoring and Management Plan (RMMM).
10 Version controlling of the project.

Term Work:
1 Term work should consist of 10 experiments.
2 Journal must include at least 2 assignments on content of theory and practical of “Software
Engineering”
3 The final certification and acceptance of term work ensures that satisfactory performance of
laboratory work and minimum passing marks in term work.
4 Total 25 Marks (Experiments: 15-marks, Attendance Theory & Practical: 05-marks,
Assignments: 05-marks)
Oral & Practical exam
Based on the entire syllabus of CSC502 and CSL501 syllabus
Lab Code Lab Name Credit
IoTCSBCL502 Computer Network Lab 1

Prerequisite: None
Lab Objectives:
1 To practically explore OSI layers and understand the usage of simulation tools.
2 To analyze, specify and design the topological and routing strategies for an IP based
networking infrastructure.
3 To identify the various issues of a packet transfer from source to destination, and how they
are resolved by the various existing protocols
Lab Outcomes: On successful completion of lab, learner will be able to
1 Design and setup networking environment in Linux.
2 Use Network tools and simulators such as NS2, Wireshark etc. to explore networking
algorithms and protocols.
3 Implement programs using core programming APIs for understanding networking concepts.

Suggested List of Experiments


Sr. No. Title of Experiment
1. Study of RJ45 and CAT6 Cabling and connection using crimping tool.
2. Use basic networking commands in Linux (ping, tracert, nslookup, netstat, ARP, RARP, ip,
ifconfig, dig, route )
3. Build a simple network topology and configure it for static routing protocol using packet
tracer. Setup a network and configure IP addressing, subnetting, masking.
4. Perform network discovery using discovery tools (eg. Nmap, mrtg)
5. Use Wire shark to understand the operation of TCP/IP layers:
● Ethernet Layer: Frame header, Frame size etc.
● Data Link Layer: MAC address, ARP (IP and MAC address binding)
● Network Layer: IP Packet (header, fragmentation), ICMP (Query and Echo)
● Transport Layer: TCP Ports, TCP handshake segments etc.
● Application Layer: DHCP, FTP, HTTP header formats
6. Use simulator (Eg. NS2) to understand functioning of ALOHA, CSMA/CD.
7. Study and Installation of Network Simulator (NS3)
8. a. Set up multiple IP addresses on a single LAN.
b. Using nestat and route commands of Linux, do the following:
● View current routing table
● Add and delete routes
● Change default gateway
c. Perform packet filtering by enabling IP forwarding using IPtables in Linux.
9 Design VPN and Configure RIP/OSPF using Packet tracer.
10. Socket programming using TCP or UDP
11. Perform File Transfer and Access using FTP
12. Perform Remote login using Telnet server

Term Work:
1 Term work should consist of 10 experiments.
2 Journal must include at least 2 assignments on content of theory and practical of “Computer
Network”
3 The final certification and acceptance of term work ensures that satisfactory performance of
laboratory work and minimum passing marks in term work.
4 Total 25 Marks (Experiments: 15-marks, Attendance Theory& Practical: 05-marks,
Assignments: 05-marks)
Oral & Practical exam
Based on the entire syllabus of CSC503: Computer Network

Useful Links
1 https://www.netacad.com/courses/packet-tracer/introduction-packet-tracer
2 https://www.coursera.org/projects/data-forwarding-computer-networks
3 https://www.edx.org/course/ilabx-the-internet-masterclass
Lab Code Lab Name Credit
IoTCSBCL503 Data Warehousing and Mining Lab 1

Prerequisite: Database Concepts


Lab Objectives:
1. Learn how to build a data warehouse and query it.
2. Learn about the data sets and data preprocessing.
3. Demonstrate the working of algorithms for data mining tasks such Classification,
clustering, Association rule mining & Web mining
4. Apply the data mining techniques with varied input values for different parameters.
5. Explore open source software (like WEKA) to perform data mining tasks.
Lab Outcomes: At the end of the course, the student will be able to
1. Design data warehouse and perform various OLAP operations.
2. Implement data mining algorithms like classification.
3. Implement clustering algorithms on a given set of data sample.
4. Implement Association rule mining & web mining algorithm.

Suggested List of Experiments


Sr. Title of Experiment
No.
1 One case study on building Data warehouse/Data Mart
 Write Detailed Problem statement and design dimensional modelling (creation of star and
snowflake schema)
2 Implementation of all dimension table and fact table based on experiment 1 case study
3 Implementation of OLAP operations: Slice, Dice, Rollup, Drilldown and Pivot based on
experiment 1 case study
4 Implementation of Bayesian algorithm
5 Implementation of Data Discretization (any one) & Visualization (any one)
6 Perform data Pre-processing task and demonstrate Classification, Clustering, Association
algorithm on data sets using data mining tool (WEKA/R tool)
7 Implementation of Clustering algorithm (K-means/K-medoids)
8 Implementation of any one Hierarchical Clustering method
9 Implementation of Association Rule Mining algorithm (Apriori)
10 Implementation of Page rank/HITS algorithm

Term Work:
1 Term work should consist of 10 experiments.
2 Journal must include at least 1 assignment on content of theory and practical of “Data
Warehousing and Mining”
3 The final certification and acceptance of term work ensures that satisfactory performance
of laboratory work and minimum passing marks in term work.
4 Total 25 Marks (Experiments: 15-marks, Attendance (Theory & Practical): 05-marks,
Assignments: 05-marks)
Oral & Practical exam
Based on the entire syllabus of CSC504 : Data Warehousing and Mining
Course Code Course Name Credit
IoTCSBCL504 Professional Communication & Ethics II 02

Course Rationale: This curriculum is designed to build up a professional and ethical approach, effective oral
and written communication with enhanced soft skills. Through practical sessions, it augments student's
interactive competence and confidence to respond appropriately and creatively to
the implied challenges of the global Industrial and Corporate requirements. It further inculcates the social
responsibility of engineers as technical citizens.
Course Objectives
1 To discern and develop an effective style of writing important technical/business documents.
2 To investigate possible resources and plan a successful job campaign.
3 To understand the dynamics of professional communication in the form of group discussions,
meetings, etc. required for career enhancement.
4 To develop creative and impactful presentation skills.
5 To analyze personal traits, interests, values, aptitudes and skills.
6 To understand the importance of integrity and develop a personal code of ethics.
Course Outcomes: At the end of the course, the student will be able to
1 Plan and prepare effective business/ technical documents which will in turn provide solid
foundation for their future managerial roles.
2 Strategize their personal and professional skills to build a professional image and meet
the demands of the industry.
3 Emerge successful in group discussions, meetings and result-oriented agreeable solutions in
group communication situations.
4 Deliver persuasive and professional presentations.
5 Develop creative thinking and interpersonal skills required for effective professional
communication.
6 Apply codes of ethical conduct, personal integrity and norms of organizational behaviour.

Module Contents Hours


ADVANCED TECHNICAL WRITING: PROJECT/PROBLEM
1 06
BASED LEARNING (PBL)
Purpose and Classification of Reports:
Classification on the basis of: Subject Matter (Technology, Accounting,
Finance, Marketing, etc.), Time Interval (Periodic, One-time, Special),
Function (Informational, Analytical, etc.), Physical Factors (Memorandum,
Letter, Short & Long)
Parts of a Long Formal Report: Prefatory Parts (Front Matter), Report
Proper (Main Body), Appended Parts (Back Matter)
Language and Style of Reports: Tense, Person & Voice of Reports,
Numbering Style of Chapters, Sections, Figures, Tables and Equations,
Referencing Styles in APA & MLA Format, Proofreading through Plagiarism
Checkers
Definition, Purpose & Types of Proposals: Solicited (in conformance with
RFP) & Unsolicited Proposals, Types (Short and Long proposals)
Parts of a Proposal: Elements, Scope and Limitations, Conclusion
Technical Paper Writing: Parts of a Technical Paper (Abstract, Introduction,
Research Methods, Findings and Analysis, Discussion, Limitations, Future
Scope and References), Language and Formatting, Referencing in IEEE
Format
2 EMPLOYMENT SKILLS 06
Cover Letter & Resume: Parts and Content of a Cover Letter, Difference
between Bio-data, Resume & CV, Essential Parts of a Resume, Types of
Resume (Chronological, Functional & Combination)
Statement of Purpose: Importance of SOP, Tips for Writing an Effective SOP
Verbal Aptitude Test: Modelled on CAT, GRE, GMAT exams
Group Discussions: Purpose of a GD, Parameters of Evaluating a GD, Types
of GDs (Normal, Case-based & Role Plays), GD Etiquettes Personal
Interviews: Planning and Preparation, Types of Questions, Types of Interviews
(Structured, Stress, Behavioural, Problem Solving & Case-based), Modes of
Interviews: Face-to-face (One-to one and Panel) Telephonic, Virtual

3 BUSINESS MEETINGS 02
Conducting Business Meetings: Types of Meetings, Roles and Responsibilities
of Chairperson, Secretary and Members, Meeting Etiquette
Documentation: Notice, Agenda, Minutes

4 TECHNICAL/ BUSINESS PRESENTATIONS 02


Effective Presentation Strategies: Defining Purpose, Analyzing Audience,
Location and Event, Gathering, Selecting &Arranging Material, structuring a
Presentation, Making Effective Slides, Types of Presentations Aids, Closing
a Presentation, Platform skills
Group Presentations: Sharing Responsibility in a Team, Building the
contents and visuals together, Transition Phases
5 INTERPERSONAL SKILLS 08
Interpersonal Skills: Emotional Intelligence, Leadership & Motivation,
Conflict Management & Negotiation, Time Management, Assertiveness,
Decision Making
Start-up Skills: Financial Literacy, Risk Assessment, Data Analysis (e.g.
Consumer Behaviour, Market Trends, etc.)
6 CORPORATE ETHICS 02
Intellectual Property Rights: Copyrights, Trademarks, Patents, Industrial
Designs, Geographical Indications, Integrated Circuits, Trade Secrets
(Undisclosed Information)
Case Studies: Cases related to Business/ Corporate Ethics

List of assignments: (In the form of Short Notes, Questionnaire/ MCQ Test, Role Play, Case
Study, Quiz, etc.)
Sr. Title of Experiment
No.
1 Cover Letter and Resume
2 Short Proposal
3 Meeting Documentation
4 Writing a Technical Paper/ Analyzing a Published Technical Paper
5 Writing a SOP
6 IPR
7 Interpersonal Skills
Note:
1 The Main Body of the project/book report should contain minimum 25 pages (excluding Front
and Back matter).
2 The group size for the final report presentation should not be less than 5 students or exceed 7
students.
3 There will be an end–semester presentation based on the book report.
Assessment:
Term Work:
1 Term work shall consist of minimum 8 experiments.
2 The distribution of marks for term work shall be as follows:
Assignment : 10 Marks
Attendance : 5 Marks
Presentation slides : 5 Marks
Book Report (hard copy) : 5 Marks
3 The final certification and acceptance of term work ensures the satisfactory performance of
laboratory work and minimum passing in the term work.
Internal oral: Oral Examination will be based on a GD & the Project/Book Report presentation.
Group Discussion : 10 marks
Project Presentation : 10 Marks
Group Dynamics : 5 Marks
Books Recommended: Textbooks and Reference books
1 Arms, V. M. (2005). Humanities for the engineering curriculum: With selected chapters
from Olsen/Huckin: Technical writing and professional communication,
second edition. Boston, MA: McGraw-Hill.

2 Bovée, C. L., &Thill, J. V. (2021). Business communication today. Upper Saddle River, NJ:
Pearson.

3 Butterfield, J. (2017). Verbal communication: Soft skills for a digital workplace.


Boston, MA: Cengage Learning.
4 Masters, L. A., Wallace, H. R., & Harwood, L. (2011). Personal development for life and
work. Mason: South-Western Cengage Learning.
5 Robbins, S. P., Judge, T. A., & Campbell, T. T. (2017). Organizational behaviour.
Harlow, England: Pearson.
6 Meenakshi Raman, Sangeeta Sharma (2004) Technical Communication, Principles and
Practice. Oxford University Press
7 Archana Ram (2018) Place Mentor, Tests of Aptitude for Placement Readiness.
Oxford University Press
8 Sanjay Kumar &PushpLata (2018). Communication Skills a workbook, New Delhi: Oxford
University Press.
Course Code Course Name Credits
IoTCSBCM501 Mini Project 2A 02

Objectives
1 To understand and identify the problem
2 To apply basic engineering fundamentals and attempt to find solutions to the problems.
3 Identify, analyze, formulate and handle programming projects with a comprehensive and
systematic approach
4 To develop communication skills and improve teamwork amongst group members and
inculcate the process of self-learning and research.
Outcome: Learner will be able to…
1 Identify societal/research/innovation/entrepreneurship problems through appropriate
literature surveys
2 Identify Methodology for solving above problem and apply engineering knowledge and
skills to solve it
3 Validate, Verify the results using test cases/benchmark data/theoretical/
inferences/experiments/simulations
4 Analyze and evaluate the impact of solution/product/research/innovation
/entrepreneurship towards societal/environmental/sustainable development
5 Use standard norms of engineering practices and project management principles during
project work
6 Communicate through technical report writing and oral presentation.
● The work may result in research/white paper/ article/blog writing and publication
● The work may result in business plan for entrepreneurship product created
● The work may result in patent filing.
7 Gain technical competency towards participation in Competitions, Hackathons, etc.
8 Demonstrate capabilities of self-learning, leading to lifelong learning.
9 Develop interpersonal skills to work as a member of a group or as leader
Guidelines for Mini Project
1 Mini project may be carried out in one or more form of following:
Product preparations, prototype development model, fabrication of set-ups, laboratory
experiment development, process modification/development, simulation, software
development, integration of software (frontend-backend) and hardware, statistical data
analysis, creating awareness in society/environment etc.
2 Students shall form a group of 3 to 4 students, while forming a group shall not be
allowed less than three or more than four students, as it is a group activity.
3 Students should do survey and identify needs, which shall be converted into problem
statement for mini project in consultation with faculty supervisor or
head of department/internal committee of faculties.
4 Students shall submit an implementation plan in the form of Gantt/PERT/CPM chart,
which will cover weekly activity of mini projects.
5 A logbook may be prepared by each group, wherein the group can record weekly work
progress, guide/supervisor can verify and record notes/comments.
6 Faculty supervisors may give inputs to students during mini project activity; however,
focus shall be on self-learning.
7 Students under the guidance of faculty supervisor shall convert the best solution into a
working model using various components of their domain areas and demonstrate.
8 The solution to be validated with proper justification and report to be compiled in standard
format of University of Mumbai. Software requirement specification (SRS)
documents, research papers, competition certificates may be submitted as part of
annexure to the report.
9 With the focus on self-learning, innovation, addressing societal/research/innovation problems and
entrepreneurship quality development within the students through the Mini Projects, it is
preferable that a single project of appropriate level and quality be carried out in two semesters by
all the groups of the students. i.e. Mini Project 2 in semesters V
and VI.
10 However, based on the individual students or group capability, with the mentor’s
recommendations, if the proposed Mini Project adhering to the qualitative aspects mentioned
above, gets completed in odd semester, then that group can be allowed to work on the extension of
the Mini Project with suitable improvements/modifications or a completely new project idea in
even semester. This policy can be adopted on a case by
case basis.

Term Work
The review/ progress monitoring committee shall be constituted by the heads of departments of
each institute. The progress of the mini project to be evaluated on a continuous basis, based on the SRS
document submitted. minimum two reviews in each semester.
In continuous assessment focus shall also be on each individual student, assessment based on
individual’s contribution in group activity, their understanding and response to questions.
Distribution of Term work marks for both semesters shall be as below: Marks 25
1 Marks awarded by guide/supervisor based on logbook 10
2 Marks awarded by review committee 10
3 Quality of Project report 05
Review / progress monitoring committee may consider following points for assessment based on
either one year or half year project as mentioned in general guidelines
One-year project:
1 In one-year project (sem V and VI), first semester the entire theoretical solution shall be made
ready, including components/system selection and cost analysis. Two reviews will be conducted
based on a presentation given by a student group.
First shall be for finalization of problem
Second shall be on finalization of proposed solution of problem.

2 In the second semester expected work shall be procurement of component’s/systems, building of


working prototype, testing and validation of results based on work completed in an earlier
semester.
First review is based on readiness of building working prototype to be conducted.
Second review shall be based on poster presentation cum demonstration of working model
in the last month of the said semester.

Half-year project:
1 In this case in one semester students’ group shall complete project in all aspects including,
Identification of need/problem
Proposed final solution
Procurement of components/systems Building
prototype and testing

2 Two reviews will be conducted for continuous assessment,


First shall be for finalization of problem and proposed solution
Second shall be for implementation and testing of solution.
Mini Project shall be assessed based on following points

1 Clarity of problem and quality of literature Survey for problem identification

2 Requirement Gathering via SRS/ Feasibility Study

3 Completeness of methodology implemented

4 Design, Analysis and Further Plan

5 Novelty, Originality or Innovativeness of project

6 Societal / Research impact

7 Effective use of skill set : Standard engineering practices and Project management standard

8 Contribution of an individual’s as member or leader

9 Clarity in written and oral communication

10 Verification and validation of the solution/ Test Cases

11 Full functioning of working model as per stated requirements

12 Technical writing /competition/hackathon outcome being met

In one year project (sem V and VI), first semester evaluation may be based on first 10 criteria and
remaining may be used for second semester evaluation of performance of students in mini
projects.
In case of half year projects (completing in V sem) all criteria in generic may be considered for
evaluation of performance of students in mini projects.

Guidelines for Assessment of Mini Project Practical/Oral Examination:

1 Report should be prepared as per the guidelines issued by the University of Mumbai.

2 Mini Project shall be assessed through a presentation and demonstration of working model by the
student project group to a panel of Internal and External Examiners preferably from industry or
research organizations having experience of more than five years approved by the head of Institution.

3 Students shall be motivated to publish a paper/participate in competition based on the work in


Conferences/students competitions.
Program Structure for Third Year Internet of Thing and
Cyber Security including Blockchain
UNIVERSITY OF MUMBAI (With Effect from 2022-2023)
Semester VI
Teaching Scheme
Credits Assigned
Course (Contact Hours)
Course Name
Code Pract.
Theory Theory Pract. Total
Tut.
IoTCSBCC601 Cryptography and Network
3 -- 3 -- 3
Security
IoTCSBCC602 IoT Architecture and
3 -- 3 3
Protocols
IoTCSBCC603 Blockchain Technology 3 -- 3 -- 3
IoTCSBCC604 Web X.0 3 -- 3 -- 3
IoTCSBCDL Department Level Optional
3 -- 3 -- 3
O601x Course -2
IoTCSBCL601 CNS Lab
-- 2 -- 1 1
IoTCSBCL602 IoT Architecture and
Protocols Lab -- 2 -- 1 1
IoTCSBCL603 Blockchain Technologies -- 2 -- 1 1
Lab
IoTCSBCL604 Web Lab -- 2 -- 1 1
IoTCSBCL605 Mobile Application Security
and Penetration Testing Lab -- 4 -- 2 2
(SBL)
IoTCSBCM60 Mini Project Lab: 2B -- 4$ -- 2 2
1 Blockchain Security Model.
Total 15 16 15 08 23
Examination Scheme
Term Pract.
Theory Total
Work &oral
End
Course Exam.
Course Name Sem
Code Internal Assessment Duration
Exa
(in Hrs)
m
Test Test
Avg
1 2
IoTCSBCC601 Cryptography and Network
20 20 20 80 3 -- -- 100
Security
IoTCSBCC602 IoT Architecture and
20 20 20 80 3 -- -- 100
Protocols
IoTCSBCC603 Blockchain Technology 20 20 20 80 3 -- -- 100
IoTCSBCC604 Web X.0 20 20 20 80 3 -- -- 100
IoTCSBCDL Department Level Optional
20 20 20 80 3 -- -- 100
O601x Course -2
IoTCSBCL601 CNS Lab
-- -- -- -- -- 25 25 50
IoTCSBCL602 IoT Architecture and
Protocols Lab -- -- -- -- -- 25 -- 25
IoTCSBCL603 Blockchain Technologies -- -- -- -- -- 25 - 25
Lab
IoTCSBCL604 Web Lab 25 25 50
IoTCSBCL605 Mobile Application Security
and Penetration Testing Lab -- -- -- -- -- 50 25 75
(SBL)
IoTCSBCM60 Mini Project Lab: 2B -- -- -- -- -- 25 25 50
1 Blockchain Security Model.
Total -- -- 100 400 -- 175 100 775

$ indicates work load of Learner (Not Faculty), for Mini-Project. Students can form groups with minimum
2(Two) and not more than 4(Four). Faculty Load: 1hour per week per four groups.

IoTCSBCDLO601X Department Optional Course – 2


IoTCSBCDLO6011 Enterprise Network Design
IoTCSBCDLO6012 Application Security and Secure Coding Principles
IoTCSBCDLO6013 Ethical Hacking and Digital Forensic
IoTCSBCDLO6014 Virtualization and cloud security
Teaching Scheme
(Contact Hours) Credits Assigned
Course Code Course Name
Theory Practical Theory Practical Total

Cryptography &
IoTCSBCC601 Network 3 -- 3 -- 3
Security

Examination Scheme

Theory
Exam
Course Code Course Name End Durati Term Pract
Total
Internal Assessment Sem on Work / Oral
Exam (in
Hrs)
Test1 Test 2 Avg.
Cryptography &
IoTCSBCC601 Network 20 20 20 80 3 -- -- 100
Security

Course Objectives:

Sr. No. Course Objectives


The course aims:
1 The basic concepts of computer and Network Security
2 Various cryptographic algorithms including secret key management and different authentication techniques.
3 Different types of malicious Software and its effect on the security
4 Various secure communication standards including IPsec, SSL/TLS and email
5 The Network management Security and Network Access Control techniques in Computer Security
6 Different attacks on networks and infer the use of firewalls and security protocols.

Course Outcomes:

Sr. No. Course Outcomes Cognitive levels of


attainment as per
Bloom’s Taxonomy
On successful completion, of course, learner/student will be able to:
1 Explain the fundamentals concepts of computer security and network security L1,L2
2 Identify the basic cryptographic techniques using classical and block encryption L1
methods
3 Study and describe the system security malicious softwares L1,L2
4 Describe the Network layer security, Transport layer security and application L1,L2
layer security
5 Explain the need of network management security and illustrate the need for L1,L2
NAC
6 Identify the function of an IDS and firewall for the system security L1

Prerequisite: Basic concepts of Computer Networks & Network Design, Operating System

DETAILED SYLLABUS:
Sr. CO
Module Detailed Content Hours
No. Mapping
Basic concepts of Computer Networks
0 Prerequisite 02 -
& Network Design, Operating System
Computer security and Network
Security(Definition), CIA, Services,
Mechanisms and attacks,The OSI
security architecture, Network security
model
Classical Encryption techniques
(mono-alphabetic and poly-alphabetic
Introduction to substitution techniques: Vigenere
I Network Security & cipher, playfair cipher, transposition 07 CO1
cryptography techniques: keyed and keyless
transposition ciphers). Introduction to
steganography.
Self-Learning Topic: Study some
more classical encryption techniques
and solve more problems on all
techniques. Homomorphic encryption
in cloud computing
Block cipher modes of operation,Data
Encryption Standard, Advanced
Encryption Standard (AES). RC5
algorithm.
Public key cryptography: RSA
algorithm.
Cryptography: Key
Hashing Techniques: SHA256, SHA-
management,
II 512, HMAC and CMAC, 09 CO2
distribution and user
Digital Signature Schemes – RSA,
authentication
DSS. Remote user Authentication
Protocols, Kerberos, Digital Certificate:
X.509, PKI
Self-Learning Topic: Study working
of elliptical curve digital signature and
its benefits over RSA digital signature..
SPAM,Trojan horse, Viruses, Worms
,System Corruption, Attack Agents,
Information Theft, Trapdoor,
Keyloggers, Phishing, Backdoors,
Rootkits, Denial of Service Attacks,
III Malicious Software 04 CO3
Zombie
Self-Learning Topic: Study the recent
malicious softwares and their effects.
How quantum computing is a threat to
current security algorithms.
IP level Security: Introduction to
IPSec, IPSec Architecture, Protection
IP Security, Mechanism (AH and ESP), Transport
Transport level level security: VPN. Need Web
Security considerations, Secure Sockets
security and Email Layer (SSL)Architecture,Transport
IV 07 CO4
Layer Security (TLS),HTTPS, Secure
Security Shell (SSH) Protocol Stack. Email
Security: Secure Email S/MIME
Self-Learning Topic: Study gmail
security and privacy from gmail help

Network Management
Security:SNMPv3,
NAC:Principle elements of
Network
NAC,Principle NAC enforcement
Management
methods, How to implement NAC
V Security and 6 CO5
Solutions, Use cases for network access
Network Access
control
Control
Self-Learning Topic: Explore any
opensource network management
security tool
IDS, Firewall Design Principles,
Characteristics of Firewalls, Types of
VI System Security Firewalls 04 CO6
Self-Learning Topic: Study firewall
rules table

Text Books
1 William Stallings, Cryptography and Network Security, Principles and Practice, 6th
Edition, Pearson Education, March 2013.
2 Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill.
3 Mark Stamp’s Information Security Principles and Practice, Wiley
4 Bernard Menezes, “Cryptography & Network Security”, Cengage Learning.

References:
1 Applied Cryptography,Protocols,Algorithms and Source Code in C,Bruce
Schneier,Wiley.
2 Cryptography and Network Security, Atul Kahate, Tata Mc Graw Hill.
3 www.rsa.com

Online Resources
1. https://swayam.gov.in/
2. https://nptel.ac.in/
3. https://www.coursera.org/

Assessment:
Internal Assessment (IA) for 20 marks:
 IA will consist of Two Compulsory Internal Assessment Tests. Approximately 40% to 50% of
syllabus content must be covered in First IA Test and remaining 40% to 50% of syllabus content
must be covered in Second IA Test

 Question paper format


 Question Paper will comprise of a total of six questions each carrying 20 marksQ.1 will be
compulsory and should cover maximum contents of the syllabus

 Remaining questions will be mixed in nature (part (a) and part (b) of each question must be
from different modules. For example, if Q.2 has part (a) from Module 3 then part (b) must be
from any other Module randomly selected from all the modules)

 A total of four questions need to be answered.

Course Code Course Theory Practical Tutorial Theory Practical Tutorial Total
Name /Oral
IoTCSBCC602 IoT 03 -- -- 03 -- -- 03
Architecture
and Protocols

Course Course Name Examination Scheme


Code
Theory Marks

Internal assessment Term


End Practical Oral Total
Work
Test Avg. of 2 Sem.
Test 2 Exam
1 Tests

IoTCSBCC IoT
602 Architecture
20 20 20 80 -- -- -- 100
and Protocols

Course Objectives:

Sr. No. Course Objectives


The course aims:
1 To understand IoT Characteristics and Conceptual Framework.
2 To comprehend network architecture and design of IoT
3 To understand smart objects in IoT.
4 To correlate the connection of smart objects and IoT access technologies.
5 To explore network layer and application layer protocols for IoT.
6 To explore IoT security aspect.

Course Outcomes:

Sr. No. Course Outcomes Cognitive levels of


attainment as per
Bloom’s Taxonomy
On successful completion, of course, learner/student will be able to:
1 Describe the IoT Characteristics and Conceptual Framework. L1,L2
2 Differentiate between the levels of the IoT architectures. L1,L2
3 Interpret sensor network and its components. L1,L2
4 Analyze the IoT access technologies. L1,L2,L3,L4
5 Illustrate various protocols at network layer and application layer for IoT. L1,L2,L3
6 Analyze and evaluate security issues in IoT and risk analysis structure. L1,L2,L3,L4

Prerequisite:

1. Python programming
2. C programing language
3. Computer Networks

DETAILED SYLLABUS:

Sr. Module Detailed Content Hours CO


No. Mappin
g

0 Prerequisite ports, Timers ,Programming of controller , How to use IDE to write 02


code of microcontroller, TCP-IP protocol stack

I Introduction to 1.1 Introduction to IoT- Defining IoT, Characteristics of IoT, 04 CO1


IoT Conceptual Framework of IoT, Physical design of IoT, Logical
design of IoT, Functional blocks of IoT, Communication models &
APIs, Basics of networking Communication protocol, wireless
sensor networks.
1.2 Convergence of IT and OT , IoT Challenges, IoT protocol vs Web
Protocol stack
Self-learning Topics: Hardware and software development tools
for - Arduino, NodeMCU, ESP32, Raspberry Pi pico
II IoT Network 2.1 Drivers Behind New Network Architectures : 06 CO2
Architecture Scale,Security,Constrained Devices and Networks ,Data,Legacy
and Design Device Support
2.2 Architecture : The IoT World Forum (IoTWF) Standardized
Architecture :Layer 1-7, IT and OT Responsibilities in the IoT
Reference Model,Additional IoT Reference Models, A Simplified
IoT Architecture, The Core IoT Functional Stack ::Layer 1-3 ,
Analytics Versus Control Applications , Data Versus Network
Analytics Data Analytics Versus Business Benefits , Smart Services,
2.3 IoT Data Management and Compute Stack :Fog Computing
, Edge Computing ,The Hierarchy of Edge, Fog, and Cloud
III Smart Objects 3.1 Sensors, Actuators, and Smart Objects , Sensors , Actuators, 04 CO3
IoT 3.2 Micro-Electro-Mechanical Systems (MEMS) Smart Objects:
A Definition , Trends in Smart Objects,
3.3 Sensor Networks , Wireless Sensor Networks (WSNs) ,
Communication Protocols for WSN,RFID ,NFC
Self-learning Topics: RFID in Libraries

IV Connecting 4.1 Communications Criteria : Range , Frequency Bands , Power 08 CO4


Smart Objects Consumption , Topology , Constrained Devices , Constrained-Node
Networks , Data Rate and Throughput , Latency and Determinism ,
Overhead and Payload ,
4.2 IoT Access Technologies :
Standardization and Alliances , Physical Layer , MAC Layer ,
Topology ,Security and Conclusion of
IEEE 802.15.4 , IEEE 802.15.4g and 802.15.4e ,IEEE 1901.2a ,IEEE
802.11ah , LoRaWAN, and NB-IoT and Other LTE Variations , LTE
Cat 0 , LTE-M, NB-IoT
Self-learning Topics: case studies
V IoT Network 5.1 The Business Case for IP , The Key Advantages of Internet 08 CO5
Layer and Protocol ,Adoption or Adaptation of the Internet Protocol ,The Need
Application for Optimization ,Constrained Nodes , Constrained Networks IP
protocols Versions , Optimizing IP for IoT ,
5.2 From 6LoWPAN to 6Lo, Header Compression, Fragmentation ,
Mesh Addressing ,Mesh-Under Versus Mesh-Over Routing , 6Lo
Working Group , 6TiSCH , RPL , Objective Function Rank, RPL
Headers ,Metrics , Authentication and Encryption on Constrained
Nodes , ACE , DICE, Profiles and Compliances, Internet Protocol for
Smart Objects Alliance ,Wi-SUN Alliance, Thread, IPv6 Ready
Logo
5.3 The Transport Layer , IoT Application Transport
Methods,Generic Web-Based Protocols ,
5.4 IoT Application Layer Protocols , CoAP, MQTT, AMQP
Self-learning Topics: case studies
VI Securing IoT 6.1 A Brief History of OT Security Common Challenges in OT 06 CO6
Security : Erosion of Network Architecture,Pervasive Legacy
Systems,Insecure Operational Protocols like Modbus, DNP3 ,ICCP
,OPC , (IEC) Protocols,Device Insecurity
6.2 Security Knowledge: IT and OT Security Practices and Systems
Vary, The Purdue Model for Control Hierarchy, OT Network
Characteristics Impacting Security, Security Priorities: CIA, Security
Focus
6.3 Formal Risk Analysis Structures: OCTAVE and FAIR,
FAIRThe Phased Application of Security in an Operational
Environment , Secured Network Infrastructure and Assets,
Deploying Dedicated Security Appliances, Higher-Order Policy
Convergence and Network Monitoring
Self-learning Topics: OWASP IoT Top 10 attacks ,X.509, SSL &
TSL basics
Text Books:

1. Arsheep Bahga (Author), Vijay Madisetti, Internet Of Things: A Hands-On Approach Paperback, Universities Press,
Reprint 2020
2. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry, IoT Fundamentals Networking
Technologies, Protocols, and Use Cases for the Internet of Things CISCO.

References:
1. Pethuru Raj, Anupama C. Raman, The Internet of Things: Enabling Technologies, Platforms, and Use Cases by , CRC
Press.
2. Raj Kamal, Internet of Things, Architecture and Design Principles, McGraw Hill Education, Reprint 2018.
3. Perry Lea, Internet of Things for Architects: Architecting IoT solutions by implementing sensors, communication
infrastructure, edge computing, analytics, and security, Packt Publications, Reprint 2018.
4. Amita Kapoor, “Hands on Artificial intelligence for IoT”, 1st Edition, Packt Publishing, 2019.
5. Sheng-Lung Peng, Souvik Pal, Lianfen Huang Editors: Principles of Internet of Things (IoT)Ecosystem:Insight
Paradigm, Springer

Online References:

1. https://owasp.org/www-project-internet-of-things/
2. NPTEL: Sudip Misra, IIT Khargpur, Introduction to IoT: Part-1, https://nptel.ac.in/courses/106/105/106105166/
3. NPTEL: Prof. Prabhakar, IISc Bangalore, Design for Internet of Things,
https://onlinecourses.nptel.ac.in/noc21_ee85/preview

Assessment:
Internal Assessment (IA) for 20 marks:
 IA will consist of Two Compulsory Internal Assessment Tests. Approximately 40% to 50% of
syllabus content must be covered in First IA Test and remaining 40% to 50% of syllabus content
must be covered in Second IA Test
 Question paper format

 Question Paper will comprise of a total of six questions each carrying 20 marksQ.1 will be
compulsory and should cover maximum contents of the syllabus

 Remaining questions will be mixed in nature (part (a) and part (b) of each question must be
from different modules. For example, if Q.2 has part (a) from Module 3 then part (b) must be
from any other Module randomly selected from all the modules)
A total of four questions need to be answered.

Course Code Course Name Theory Practical Tutorial Theory Practical/ Tutorial Total
Oral
IoTCSBCDLO Blockchain 03 -- -- 03 -- -- 03
603 Technology

Course Code Course


Examination Scheme
Name
Theory Marks
Internal assessment End Term
Practical Oral Total
Avg. of 2 Sem. Work
Test1 Test 2
Tests Exam
IoTCSBCDLO6 Blockchain
03 Technology 20 20 20 80 -- -- -- 100

Course Objectives:
Sr.No Course Objectives
1 To get acquainted with the concept of Distributed ledger system and Blockchain.
2 To learn the concepts of consensus and mining in Blockchain through the Bitcoin network.
3 To understand Ethereum and develop-deploy smart contracts using different tools and frameworks.
4 To understand permissioned Blockchain and explore Hyperledger Fabric.
5 To understand different types of crypto assets.
6 To apply Blockchain for different domains IOT, AI and Cyber Security.

Course Outcomes:

Sr. No. Course Outcomes Cognitive levels of


attainment as per
Bloom’s Taxonomy
On successful completion, of course, learner/student will be able to:
1 Describe the basic concept of Blockchain and Distributed Ledger Technology. L1,L2
2 Interpret the knowledge of the Bitcoin network, nodes, keys, wallets and L1,L2,L3
transactions
3 Implement smart contracts in Ethereum using different development frameworks. L1,L2,L3
4 Develop applications in permissioned Hyperledger Fabric network. L1,L2,L3
5 Interpret different Crypto assets and Crypto currencies L1,L2,L3
6 Analyze the use of Blockchain with AI, IoT and Cyber Security using case studies. L4,

Prerequisite: Cryptography and Distributed Systems

DETAILED SYLLABUS:

Sr. Module Detailed Content Hours CO


No. Mapping

0 Cryptography and Hash functions, Public – Private keys, SHA, ECC, 02 —-


Distributed Systems Digital signatures, Fundamental concepts of Distributed
(prerequisite) systems
I Introduction to DLT Distributed Ledger Technologies (DLTs) Introduction, 04 CO1
and Blockchain Types of Blockchains
Blockchain: Origin, Phases, Components
Block in a Blockchain: Structure of a Block, Block
Header Hash and Block Height, The Genesis Block,
Linking Blocks in the Blockchain, Merkle Tree.
Self-learning Topics: Blockchain Demo
II Consensus and What is Bitcoin and the history of Bitcoin, Bitcoin 08 CO2
Mining Transactions, Bitcoin Concepts: keys, addresses and
wallets, Bitcoin Transactions, validation of transactions,
PoW consensus
Bitcoin Network: Peer-to-Peer Network Architecture,
Node Types and Roles, Incentive based Engineering,
The Extended Bitcoin Network, Bitcoin Relay Networks,
Network Discovery, Full Nodes, Exchanging
“Inventory”, Simplified Payment Verification (SPV)
Nodes, SPV Nodes and Privacy, Transaction Pools,
Blockchain Forks
Self-learning Topics: Study and compare different
consensus algorithms like PoA, PoS, pBFT
III Permissionless Components, Architecture of Ethereum, Miner and 10 CO3
Blockchain: mining node, Ethereum virtual machine, Ether, Gas,
Ethereum Transactions, Accounts, Patricia Merkle Tree, Swarm,
Whisper and IPFS, Ethash, End to end transaction in
Ethereum,
Smart Contracts: Smart Contract programming using
solidity, Metamask (Ethereum Wallet), Setting up
development environment, Use cases of Smart Contract,
Smart Contracts: Opportunities and Risk.
Smart Contract Deployment: Introduction to Truffle,
Use of Remix and test networks for deployment
Self-learning Topics: Smart contract development using
Java or Python
IV Permissioned Introduction to Framework, Tools and Architecture of 07 CO4
Blockchain : Hyperledger Fabric Blockchain.
Hyperledger Fabric Components: Certificate Authority, Nodes, Chain codes,
Channels, Consensus: Solo, Kafka, RAFT
Designing Hyperledger Blockchain
Self-learning Topics: Fundamentals of Hyperledger
Composer
V Crypto assets and ERC20 and ERC721 Tokens, comparison between 04 CO5
Cryptocurrencies ERC20 & ERC721, ICO, STO, Different Crypto
currencies
Self-learning Topics: Defi, Metaverse, Types of
cryptocurrencies
VI Blockchain Blockchain in IoT, AI , Cyber Security 04 CO6
Applications & case Self-learning Topics: Applications of Blockchain in
studies various domains Education, Energy, Healthcare, real-
estate, logistics, supply chain

Text Books:
1. “Mastering Bitcoin, PROGRAMMING THE OPEN BLOCKCHAIN”, 2nd Edition by Andreas M. Antonopoulos,
June 2017, Publisher(s): O'Reilly Media, Inc. ISBN: 9781491954386.
2. Mastering Ethereum, Building Smart Contract and Dapps, Andreas M. Antonopoulos Dr. Gavin Wood, O'reilly.
3. Blockchain Technology, Chandramouli Subramanian, Asha A George, Abhillash K. A and Meena Karthikeyen,
Universities press.
4. Hyperledger Fabric In-Depth: Learn, Build and Deploy Blockchain Applications Using Hyperledger Fabric,
Ashwani Kumar, BPB publications
5. Solidity Programming Essentials: A beginner's Guide to Build Smart Contracts for Ethereum and Blockchain,
Ritesh Modi, Packt publication
6. Cryptoassets: The Innovative Investor’s Guide to Bitcoin and Beyond, Chris Burniske & Jack Tatar.

Reference:
1. Mastering Blockchain, Imran Bashir, Packt Publishing 2. Mastering Bitcoin Unlocking Digital Cryptocurrencies,
Andreas M. Antonopoulos, O'Reilly Media
2. Blockchain Technology: Concepts and Applications, Kumar Saurabh and Ashutosh Saxena, Wiley.
3. The Basics of Bitcoins and Blockchains: An Introduction to Cryptocurrencies and the Technology that Powers
Them, Antony Lewis.for Ethereum and Blockchain, Ritesh Modi, Packt publication.
4. Mastering Bitcoin Unlocking Digital Cryptocurrencies, Andreas M. Antonopoulos, O'Reilly Media

Online References:
1. NPTEL courses:
a. Blockchain and its Applications,
b. Blockchain Architecture Design and Use Cases
2. www.swayam.gov.in/
3. www.coursera.org
4. https://ethereum.org/en/
5. https://www.trufflesuite.com/tutorials
6. https://hyperledger-fabric.readthedocs.io/en/release-2.2/whatis.h
7. Blockchain demo: https://andersbrownworth.com/blockchain/
8. Blockchain Demo: Public / Private Keys & Signing: https://andersbrownworth.com/blockchain/public-private-
keys/

Assessment:
Internal Assessment (IA) for 20 marks:
 IA will consist of Two Compulsory Internal Assessment Tests. Approximately 40% to 50% of
syllabus content must be covered in First IA Test and remaining 40% to 50% of syllabus content
must be covered in Second IA Test

 Question paper format

 Question Paper will comprise of a total of six questions each carrying 20 marksQ.1 will be
compulsory and should cover maximum contents of the syllabus

 Remaining questions will be mixed in nature (part (a) and part (b) of each question must be
from different modules. For example, if Q.2 has part (a) from Module 3 then part (b) must be
from any other Module randomly selected from all the modules)

 A total of four questions need to be answered.

Course Code Course Theory Practical Tutorial Theory Practical/ Tutorial Total
Name Oral
IoTCSBCC604 WEB X.0 03 -- -- 03 -- -- 03

Course Code Course


Examination Scheme
Name
Theory Marks
Internal assessment End Term
Practical Oral Total
Avg. of 2 Sem. Work
Test1 Test 2
Tests Exam
IoTCSBCC604 WEB X.0
20 20 20 80 -- -- -- 100

Course Objectives:

Sr. No. Course Objectives


The course aims:
1 To understand the digital evolution of web technology.
2 To learn TypeScript and understand how to use it in web applications.
3 To learn the fundamentals of Node.js.
4 To make Node.js applications using the express framework.
5 To enable the use of AngularJS to create web applications that depend on the Model-View-Controller
Architecture.
6 To gain expertise in a leading document-oriented NoSQL database, designed for speed, scalability, and
developer agility using MongoDB.

Course Outcomes:

Sr. No. Course Outcomes Cognitive levels of


attainment as per
Bloom’s Taxonomy
On successful completion, of course, learner/student will be able to:
1 Understand the basic concepts related to web analytics and semantic web. L1,L2
2 Understand how TypeScript can help you eliminate bugs in your code and enable L1,L2
you to scale your code.
3 Develop back-end applications using Node.js. L1,L2,L3
4 Construct web based Node.js applications using Express. L1,L2,L3
5 Understand AngularJs framework and build dynamic, responsive single-page L1,L2,L3
web applications.
6 Apply MongoDB for frontend and backend connectivity using REST API. L1,L2,L3

Prerequisite: HTML5, CSS3, JavaScript.

DETAILED SYLLABUS:
Sr. Module Detailed Content Hours CO
No. Mapping

0 Prerequisite Introduction to HTML5,CSS3, 02 -


Basics of JavaScript
I Introduction to Evolution of WebX.0; Web 04 CO1
WebX.0 Analytics 2.0: Introduction to Web
Analytics, Web Analytics 2.0,
Clickstream Analysis, Strategy to
choose your web analytics tool,
Measuring the success of a website;
Web3.0 and Semantic Web:
Characteristics of Semantic Web,
Components of Semantic Web,
Semantic Web Stack, N-Triples and
Turtle, Ontology, RDF and
SPARQL
Self-learning Topics: Semantic
Web Vs AI, SPARQL Vs SQL.

II TypeScript Overview, TypeScript Internal 06 CO2


Architecture, TypeScript
Environment Setup, TypeScript
Types, variables and operators,
Decision Making and loops,
TypeScript Functions, TypeScript
Classes and Objects, TypeScript
Inheritance and Modules
Self-learning Topics: Javascript Vs
TypeScript

III Node.js Introducing the Node.js-to-Angular 07 CO3


Stack (MEAN Stack), Environment
setup for Node.js , First app,
Asynchronous programming, Callback
concept, Event loops, REPL, NPM,
Event emitter, Buffers, Streams,
Networking module, File system, Web
module.
Self-learning Topics: Node.js with
MongoDB.
IV Express Introduction to Express ,Installing 06 CO4
Express,Creating First Express
application,The application, request,
and response objects,Configuring
Routes,Understanding
Middleware,cookies, Session,
Authentication
Self-learning Topics: ExpressJs
Templates

V Introduction to Overview of AngularJS, Need of 07 CO5


AngularJS AngularJS in real websites, AngularJS
modules, AngularJS built-in directives,
AngularJS custom directives,
AngularJS expressions,AngularJS Data
Binding, AngularJS filters, AngularJS
controllers, AngularJS scope,
AngularJS dependency injection,
AngularJS Services, Form Validation,
Routing.
Self-learning Topics: MVC model,
DOM model.
VI MongoDB and 07 CO6
Building REST API MongoDB: Understanding MongoDB,
using MongoDB MongoDB Data Types, Administering
User Accounts, Configuring Access
Control, Adding the MongoDB Driver
to Node.js, Connecting to MongoDB
from Node.js, Accessing and
Manipulating Databases, Manipulating
MongoDB Documents from Node.js,
Accessing MongoDB from Node.js,
Using Mongoose for Structured
Schema and Validation.

REST API: Examining the rules of


REST APIs, Evaluating API patterns,
Handling typical CRUD functions
(Create, Read, Update, Delete), Using
Express and Mongoose to interact with
MongoDB, Testing API endpoints.

Self-learning Topics: MongoDB vs


SQL Databases

Text & Reference Books:

1.Boris Cherny, “Programming TypeScript- Making Your Javascript Application Scale”, O’Reilly Media Inc.
2. Amos Q. Haviv, “MEAN Web Development” , PACKT Publishing
3.Brad Dayley, Brendan Dayley, Caleb Dayley, “Node.js, MongoDB and Angular Web Development:The definitive guide
to using the MEAN stack to build web applications”, 2nd Edition, Addison-Wesley Professional
5. Adam Bretz and Colin J. Ihrig, “Full Stack JavaScript Development with MEAN”, SitePoint.
4. Dr. Deven Shah, “Advanced Internet Programming”, StarEdu Solutions.
References:
1. Simon Holmes Clive Harber, “Getting MEAN with Mongo, Express, Angular, and Node”, Manning Publications.
2. Yakov Fain and Anton Moiseev, “TypeScript Quickly”, Manning Publications.

Online References:

1.https://www.coursera.org
2. https://udemy.com
3. https://www.tutorialspoint.com/meanjs/meanjs_overview.htm

Assessment:
Internal Assessment (IA) for 20 marks:
 IA will consist of Two Compulsory Internal Assessment Tests. Approximately 40% to 50% of
syllabus content must be covered in First IA Test and remaining 40% to 50% of syllabus content
must be covered in Second IA Test

 Question paper format

 Question Paper will comprise of a total of six questions each carrying 20 marksQ.1 will be
compulsory and should cover maximum contents of the syllabus

 Remaining questions will be mixed in nature (part (a) and part (b) of each question must be
from different modules. For example, if Q.2 has part (a) from Module 3 then part (b) must be
from any other Module randomly selected from all the modules)
A total of four questions need to be answered
Teaching Scheme Credits Assigned
Course Code Course Name (Contact Hours)
Theory Practical Theory Practical Total

IoTCSBCL601 CNS Lab -- 2 -- 1 1

Examination Scheme

Theory
Exam
Course Code Course Name End Durati Term Pract
Total
Internal Assessment Sem on Work / Oral
Exam (in
Hrs)
Test1 Test 2 Avg.

IoTCSBCL601 CNS Lab -- -- -- -- -- 25 25 50

Lab Objectives:

Sr No Lab Objectives
1 To apply the knowledge of symmetric cryptography to implement classical ciphers
2 To analyze and implement public key encryption algorithms, hashing and digital signature algorithms
3 To explore the different network reconnaissance tools to gather information about networks
4 To explore the tools like sniffers, port scanners and other related tools for analyzing
5 To Scan the network for vulnerabilities and simulate attacks
6 To set up intrusion detection systems using open source technologies
and to explore email security.

Lab Outcomes:

Sr. Lab Outcomes Cognitive Levels of


No. Attainment as per
Bloom’s Taxonomy

Upon Completion of the course the learner/student should be able to:

1 Illustrate symmetric cryptography by implementing classical ciphers L1,L2,L3

2 Demonstrate Key management,distribution and user authentication L1,L2,L3

3 Explore the different network reconnaissance tools to gather information L1,L2,L3


about networks

4 Use tools like sniffers, port scanners and other related tools for analyzing L1,L2,L3
packets in a network

5 Use open source tools to scan the network for vulnerabilities and simulate L1,L2,L3
attacks

6 Demonstrate the network security system using open source tools L1,L2,L3

Prerequisite: Basic concepts of Computer Networks & Network Design, Operating System

Hardware & Software requirements:

Hardware Specifications Software Specifications


PC with following Configuration GPG tool, WHOIS, dig,traceroute, nslookup, wireshark,
1. Intel Core i3/i5/i7 nmap, keylogger, kali lunix,
2. 4 GB RAM
3. 500 GB Hard disk

DETAILED SYLLABUS:
Sr.
Detailed Content Hours LO Mapping
No.

Classical Encryption techniques (mono-alphabetic and


I poly-alphabetic substitution techniques: Vigenere
cipher, playfair cipher) 04 LO1
1)Block cipher modes of operation using a)Data
Encryption Standard b)Advanced Encryption Standard
(AES).
II
2)Public key cryptography: RSA algorithm.
3)Hashing Techniques:HMAC using SHA
4)Digital Signature Schemes – RSA, DSS. 05 LO2
1) Study the use of network reconnaissance tools like
WHOIS, dig,traceroute, nslookup to gather
information about networks and domain
registrars.
III 2)Study of packet sniffer tools wireshark, :- a.
Observer performance in promiscuous as well as non-
promiscuous mode.
b. Show the packets can be traced based on different
04
filters. LO3
1) Download and install nmap.
2) Use it with different options to scan open ports,
IV
perform OS fingerprinting, ping scan, tcp port scan,
udp port scan, etc. 04 LO4
a)Keylogger attack using a keylogger tool.
b) Simulate DOS attack using Hping or other tools
V
c) Use the NESSUS/ISO Kali Linux tool to scan the
network for vulnerabilities. 05 LO5
1) Set up IPSec under Linux.
VI 2) Set up Snort and study the logs.
3) Explore the GPG tool to implement email security 04 LO6

Text Books
1 Build your own Security Lab, Michael Gregg, Wiley India.
2 CCNA Security, Study Guide, TIm Boyles, Sybex.
3 Hands-On Information Security Lab Manual, 4th edition, Andrew Green, Michael
Whitman, Herbert Mattord.
4 The Network Security Test Lab: A Step-by-Step Guide Kindle Edition, Michael Gregg.
References:
1 Network Security Bible, Eric Cole, Wiley India.
2 Network Defense and Countermeasures, William (Chuck) Easttom.
3 Principles of Information Security + Hands-on Information Security Lab Manual, 4th
Ed. , Michael E. Whitman , Herbert J. Mattord.

Online Resource:
1. http://cse29-iiith.vlabs.ac.in/
2. https://www.dcode.fr/en

List of Experiments.:

1. Breaking the Mono-alphabetic Substitution Cipher using Frequency analysis method.


2. Design and Implement a product cipher using Substitution ciphers.
3. Cryptanalysis or decoding Playfair, vigenere cipher.
4. Encrypt long messages using various modes of operation using AES or DES
5. Cryptographic Hash Functions and Applications (HMAC): to understand the need, design and applications of collision
resistant hash functions.
6. Implementation and analysis of RSA cryptosystem and Digital signature scheme using RSA
7. Study the use of network reconnaissance tools like WHOIS, dig, traceroute, nslookup to gather information about
networks and domain registrars.
8. Study of packet sniffer tools wireshark: -
a. Observer performance in promiscuous as well as non-promiscuous mode.
b. Show the packets can be traced based on different filters.
9. Download, install nmap and use it with different options to scan open ports, perform OS fingerprinting, ping scan, tcp
port scan, udp port scan, etc.
10. Study of malicious software using different tools:
a) Keylogger attack using a keylogger tool.
b) Simulate DOS attack using Hping or other tools
c) Use the NESSUS/ISO Kali Linux tool to scan the network for vulnerabilities.
11. Study of Network security by
a) Set up IPSec under Linux.
b) Set up Snort and study the logs.
c) Explore the GPG tool to implement email security

Term Work: Term Work shall consist of at least 10 to 12 practicals based on the above
list. Also Term work Journal must include at least 2 assignments.

Term Work Marks: 25 Marks (Total marks) = 15 Marks (Experiment) + 5 Marks


(Assignments) + 5 Marks (Attendance)

Oral Exam: An Oral exam will be held based on the above syllabus
Teaching Scheme
(Contact Hours) Credits Assigned
Course Code Course Name Theory Practical Tutorial Theory Practical Tutorial Total
/ Oral
IoTCSBCL602 IoT -- 2 -- -- 1 -- 01
Architecture
and Protocols
Lab

Course Course Name Examination Scheme


Code
Theory Marks

Internal assessment Practical/


End Term
Total
Avg. Sem. Work Oral
Test1 Test 2 of 2 Exam
Tests

IoTCSBCL IoT Architecture


602 and Protocols -- -- -- -- 25 25 50
Lab

Lab Objectives:

Sr. No. Lab Objectives


The Lab aims:
1 To Understand the definition and significance of the Internet of Things.
2 To Discuss the architecture, operation, and business benefits of an IoT solution.
3 To Examine the potential business opportunities that IoT can uncover.
4 To Explore the relationship between IoT, cloud computing, and Data Analytics.
5 To Identify how IoT differs from traditional data collection systems.
6 To Explore the interconnection and integration of the physical world and be able to design & develop IOT
applications.

Lab Outcomes:

Sr. No. Lab Outcomes Cognitive levels of


attainment as per
Bloom’s Taxonomy
On successful completion, of course, learner/student will be able to:
1 Adapt different techniques for data acquisition using various IoT sensors L1,L2,L3
for different applications.
2 Demonstrate the working of actuators based on the collected data. L1,L2,L3
3 Use different IoT simulators and correlate working of IoT protocols. L1,L2,L3
4 Adapt different techniques for Integrating IoT services to other third-party L1,L2,L3
Clouds.
5 Execute data analysis and encryption methodologies for deployment of IoT L1,L2,L3,L4
applications.
6 Implement IoT protocols for communication to realize the revolution of L1,L2,L3,L4
internet in mobile devices, cloud and sensor networks.

Prerequisite:
1. Python programming
2. C programing language
3. Computer Networks

Hardware & Software Requirements:

Hardware Requirement: Software requirement:

PC i3 processor and above. Contiki, Cooja or any other simulator. AWS/Azure


Arduino using Wifi/Raspberry Pi services. Internet Connection

DETAILED SYLLABUS:

Sr. Module Detailed Content Hours LO


No. Mapping

0 Prerequisite Experimentation with Microprocessor and 02


Microcontroller , Experimentation with python and c
I Arduino 05 LO1, LO2
Introduction to Arduino, Hardware requirements,
Software requirements, Arduino Programming Language,
Arduino Uno Wired & Wireless connectivity, LCD
commands, Serial Communication commands. Program
for blinking LED using Arduino. Traffic Light pattern
using Arduino. ESP8266 WiFi Module
II Raspberry Pi 05 LO1,LO2
Introduction to Raspberry Pi, Installation of NOOBS and
Raspbian on SD card, Libraries on Raspberry Pi, getting
static IP address of Raspberry Pi, Interfacing of Relay,
DHT11, DC Motor and LCD with Raspberry Pi.
III Contiki OS Contiki OS : History of Contiki OS,Applications, 05 LO3
Features, ,Communication Components in Contiki OS,
Cooja simulator ,Running Cooja Simulator,
IV Cooja Simulator Using the Contiki OS with the Cooja simulator to program 03 LO5,LO6
the IoT for broadcasting data from sensors

V Protocols and Understanding of 6LowPAN , COAP and protocol 03 LO5,LO6


Security with Cooja implementation in Cooja . Encryption Decryption
techniques for IoT
VI IoT data to Cloud 03 LO4,L06
Installing the Remote desktop server. Installation of Pi
camera, Face recognition, serial peripheral interface using
Raspberry Pi. . DHT11 data logger with ThingSpeak/
thingsboard/ AWS/ Azure server .
Text & Reference Books:

1. Jake VanderPlas,“ Python Data Science Handbook”, O’Reilly publication


2. Joakim Verona,” Practical DevOps”, PACKT publishing
3. Honbo Zhou,” The internet of things in the cloud”, CRC press, Taylor and Francis group
4. Perry Lea,” Internet of things for architects”, PACKT publishing

Online References:

1. https://spoken-tutorial.org/watch/Arduino/Introduction+to+Arduino/English/
2. https://pythonprogramming.net/introduction-raspberry-pi-tutorials/
3. https://iotbytes.wordpress.com/basic-iot-actuators/
4. http://www.contiki-os.org/
5. https://www.bevywise.com/iot-simulator/
6. https://mqtt.org/

List of Experiments.

1. To study and implement interfacing of different IoT sensors with Raspberry Pi pico/Arduino/ModeMCU.

2. To study and implement interfacing of actuators based on the data collected using IoT sensors. (like led switch
ON/OFF, stepper motor)

3. To study and demonstrate Contiki OS for RPL (like Create 2 border router and 10 REST clients, Access border
router from other network (Simulator))

4. To study and demonstrate working of 6LoWPAN in Contiki OS (simulator)

5. Write a program on Raspberry Pi to push and retrieve the data from cloud like
thingspeak/thingsboard/AWS/ Azure etc

6. To study and implement IoT Data processing using Pandas.

7. Write a program on Arduino / Raspberry Pi subscribe to MQTT broker for temperature data and print
it

8. Write a program to create TCP Server on Arduino/Raspberry Pi and respond with humidity data to
TCP client when Requested

9. Write a program for ESP8266 DHT11/DHT22 Temperature and Humidity Web Server with Arduino
IDE

10. Write a program to Control Your ESP8266 From Anywhere in the World

11. Write a program for Arduino / Raspberry Pi Publishing MQTT Messages to ESP8266

12 Write a program to collect data from sensor encrypt data send it to receiver (server) and decrypt is at receiving end
Ardino/Raspberry Pi/ Contiki OS (simulator)

Term Work: Term Work shall consist of at least 10 practicals based on the above list. Also Term work
Journal must include at least 2 assignments.

Term Work Marks: 25 Marks (Total marks) = 15 Marks (Experiment) + 5 Marks (Assignments) + 5 Marks
(Attendance)

Oral Exam: An Oral exam will be held based on the above syllabus

Teaching Scheme (Contact


Hours) Credits Assigned
Course Code Course Name Theory Practical Tutorial Theory Practical Tutorial Total
& Oral
IoTCSBCL603 Blockchain -- 2 -- -- 1 -- 01
Technologies Lab

Examination Scheme

Theory Marks
Course Code Course Name
Internal assessment End Term Practical/
Total
Avg. of Sem. Work Oral
Test1 Test 2
2 Tests Exam
IoTCSBCL603 Blockchain
Technologies -- -- -- -- 25 25 50
Lab

Lab Objectives:

Sr.No Lab Objectives


The Lab aims:
1 To develop and deploy smart contracts on local Blockchain.
2 To deploy the smart contract on test networks.
3 To develop and test smart contract using Remix IDE and Metamask.
4 To construct a permissioned Hyperledger fabric network.
5 To design and develop crypto currency.
6 To develop and test a DApp using Ethereum/Hyperledger

Lab Outcomes:
Sr.No Lab Outcomes Cognitive levels of
attainment as per
Bloom’s
Taxonomy
On successful completion, of course, learner/student will be able to:
1 Develop and test smart contract on local Blockchain. L3,L4
2 Develop and test smart contract on Ethereum test networks. L3,L4
3 Write and deploy smart contract using Remix IDE and Metamask. L4
4 Write and deploy chain code in Hyperledger Fabric. L4
5 Design and develop Cryptocurrency. L4
6 Develop a Full-fledged DApp using Ethereum/Hyperledger. L5

Prerequisite: Java, python, Javascript

DETAILED SYLLABUS:

Sr. Module Detailed Content Hours LO


No. Mapping

0 Prerequisite Java, Python, JavaScript 02 —

I Local Blockchain Introduction to Truffle, establishing 03 LO1


and smart contracts local Blockchain using Truffle,
Solidity programming language, chain
code(Java/JavaScript/Go), deployment
on Truffle local Blockchain

Mini Project: Allocation of the groups


II Deployment and Ethereum Test networks 03 LO2
publishing smart (Ropsten/Gorelli/Rinkeby),deployment
contracts on on test networks, Web3.js/Web3.py for
Ethereum test interaction with Ethereum smart
contract
network Mini Project: Topic validation and
finalizing software requirements
III Remix IDE and Smart contract development and 04 LO3
Metamask deployment using Metamask and
Remix
Mini Project: Study the required
programming language for smart
contract/chain code
IV Chain code Chain code deployment in Hyperledger 04 LO4
deployment in fabric
Hyperledger Fabric Mini project: Study required front end
tools
V Crypto currency Design and develop Crypto currency 04 LO5
Design Mini Project: Study Integration of
front end with smart contract/chain
code
VI Mini-project on Implementation of Mini Project 06 LO6
Design and 1. Design, configure and testing of
Development of a mini project
DApps using Report submission as per guidelines
Ethereum/Hyperledg
er Fabric
Mini project
1. Students should carry out mini-project in a group of three/four students with a subject In-charge
2. The group should meet with the concerned faculty during laboratory hours and the progress of work discussed
must be documented.
3. Each group should perform a detailed literature survey and formulate a problem statement.
4. Each group will identify the hardware and software requirement for their defined mini project problem statement.
5. Design, develop and test their smart contract/chain code.
6. Each group may present their work in various project competitions and paper presentations

Documentation of the Mini Project


The Mini Project Report can be made on following lines:
1. Abstract
2. Contents
3. List of figures and tables
4. Chapter-1 (Introduction, Literature survey, Problem definition, Objectives, Proposed Solution,
Technology/platform used)
5. Chapter-2 (System design/Block diagram, Flow chart, Software requirements, cost estimation)
6. Chapter-3 (Implementation snapshots/figures with explanation, code, future directions)
7. Chapter-4 (Conclusion)
8. References

Text Books:
1. Ethereum Smart Contract Development, Mayukh Mukhopadhyay, Packt publication.
2. Solidity Programming Essentials: A Beginner's Guide to Build Smart Contracts for Ethereum and Blockchain,
Ritesh Modi, Packt publication.
3. Hands-on Smart Contract Development with Hyperledger Fabric V2, Matt Zand, Xun Wu and Mark Anthony
Morris, O’Reilly.

References:
1. Mastering Blockchain, Imran Bashir, Packt Publishing
2. Introducing Ethereum and Solidity, Chris Dannen, APress.
3. Hands-on Blockchain with Hyperledger, Nitin Gaur, Packt Publishing.

Online References:
1. https://trufflesuite.com/
2. https://metamask.io/
3. https://remix.ethereum.org/
4. https://www.hyperledger.org/use/fabric

Term-Work: Term-Work shall consist of 5 experiments and Mini-Project on above guidelines/syllabus. Also Term-work
must include at least 2 assignments and Mini-Project report.
Term Work Marks: 25 Marks (Total marks) =15 Marks ( 5 Experiments + Mini Project) + 5 Marks (Assignments) +
5 Marks (Attendance)

Oral Exam: An Oral exam will be held based on the Mini Project and Presentation.
Teaching Scheme (Contact
Hours) Credits Assigned
Course Code Course Name Theory Practical Tutorial Theory Practical Tutorial Total
& Oral
IoTCSBCL604 Web Lab -- 2 -- -- 1 -- 01

Course Code Course


Examination Scheme
Name
Theory Marks
Internal assessment End Term Practical/
Total
Avg. of 2 Sem. Work Oral
Test1 Test 2
Tests Exam
IoTCSBCL604 Web Lab
-- -- -- -- 25 25 50

Lab Objectives:

Sr No Lab Objectives
1 To familiarize with Open Source Tools for Web Analytics and Semantic Web.
2 To familiarize with Programming in TypeScript for designing Web Applications.
3 To orient students for developing Node.js backend applications.
4 To orient students for developing Express applications.
5 To understand AngularJS Framework for Single Page Web Applications.
6 To use REST API and MongoDB for Frontend and Backend Connectivity.

Lab Outcomes:

Sr. Lab Outcomes Cognitive Levels of


No. Attainment as per
Bloom’s Taxonomy

Upon Completion of the course the learner/student should be able to:

1 Understand open source tools for web analytics and semantic web apps L1, L2
development and deployment.

2 Understand the basic concepts of TypeScript for designing web applications. L1, L2, L3

3 Construct back-end applications using Node.js. L1, L2,L3

4 Construct back end applications using Express. L1, L2,L3

5 Implement Single Page Applications using AngularJS Framework. L1, L2, L3

6 Develop REST web services using MongoDB. L1, L2, L3

Prerequisite: HTML5,CSS3 and Basics of JavaScript

Hardware & Software requirements:

Hardware Specifications Software Specifications


PC with following Configuration Angular IDE, Visual Studio Code, Notepad++,
1. Intel Core i3/i5/i7 Python Editors, MySQL, XAMPP, MongoDB,
2. 4 GB RAM JDK
3. 500 GB Hard disk

DETAILED SYLLABUS:

Sr. Module Detailed Content Hours LO


No. Mapping
I
Web Analytics & Study Any 1 tool in each 02 LO1
Semantic Web 1. Study web analytics using open source tools like
Matomo, Open Web Analytics, AWStats, Countly,
Plausible.
2. Study Semantic Web Open Source Tools like
Apache TinkerPop, RDFLib, Apache Jena, Protégé,
Sesame.

II
TypeScript Perform Any 2 from the following 04 LO2

1. Small code snippets for programs like Hello


World, Calculator using TypeScript.
2. Inheritance example using TypeScript
3. Access Modifiers example using TypeScript
4. Building a Simple Website with TypeScript

III Node.js Perform Any 2 from the following 06 LO3


1. Build Hello World App in Node.js

2. Stream and Buffer in Node.js

3. Modules in Node.js( Networking, File system,


Web module)

IV Express Perform Any 2 from the following 04 LO4


1. Configuring Express Settings and creating
Express application using request and response objects.
2. Build Express application by Sending and
Receiving Cookies.
3. Create an Express application to implement
sessions.
V AngularJs Perform Any 2 from the following 04 LO5
1.Create a simple HTML “Hello World” Project using
AngularJS Framework and apply ng-controller, ng-
model,expression and filters.
2.Implement a single page web application using
AngularJS Framework including Services,
Events,Validations (Create functions and add events,
add HTML validators, using $valid property of
Angular, etc.)
3.Create an application for like Students Record using
AngularJS.

VI 06 LO6
MongoDB and Perform Any 2 from the following
Building REST 1. Connect MongoDB withNode.js and perform CRUD
API using operations.
MongoDB 2. Build a RESTful API using MongoDB.
3. Build a TypeScript REST API using MongoDB.
Text Books:
1. Learning Node.js Development, Andrew Mead, Packt Publishing
2. John Hebeler, Matthew Fisher, Ryan Blace, Andrew Perez -Lopez, “Semantic Web Programming”, Wiley
Publishing, Inc, 1st Edition, 2009.
3. Boris Cherny, “Programming TypeScript- Making Your Javascript Application Scale”, O’Reilly Media Inc.,
2019 Edition.
4. Adam Bretz and Colin J. Ihrig, “Full Stack JavaScript Development with MEAN”, SitePoint Pty. Ltd., 2015
Edition.
5. Brad Dayley, Brendan Dayley, Caleb Dayley, “Node.js, MongoDB and Angular Web Development: The definitive
guide to using the MEAN stack to build web applications”, 2nd Edition, AddisonWesley Professional, 2018 Edition.

References:
1. Simon Holmes Clive Harber, “Getting MEAN with Mongo, Express, Angular, and Node”, Manning Publications,
2019 Edition.
2. Yakov Fain and Anton Moiseev, “TypeScript Quickly”, Manning Publications, 2020 Edition.
3. Dr. Deven Shah, “Advanced Internet Programming”, StarEdu Solutions, 2019 Edition.
4. Ethan Brown ,Web Development with Node and Express”,O’Reilly

Online Reference:

Sr. No. Website Name

1. https://www.w3schools.com/nodejs/

2. https://www.tutorialspoint.com/mongodb/index.htm

3. https://www.mongodb.com/basics

Term Work: Term Work shall consist of at least 10 to 12 practicals based on the above
list. Also Term work Journal must include at least 2 assignments.

Term Work Marks: 25 Marks (Total marks) = 15 Marks (Experiment) + 5 Marks


(Assignments) + 5 Marks (Attendance)

Oral Exam: An Oral exam will be held based on the above syllabus

Teaching Scheme
Credits assigned
(Contact Hours)
Course Code Course Name
Practical/
Theory Practical Tutorial Theory Tutorial Total
Oral
Mobile Application
IoTCSBCL60 Security &
-- 02 -- -- 01 -- 01
5 Penetration Testing
(SBL)

Examination Scheme
Theory Marks
Course Code Course Name
Internal assessment End Term
Practical Oral Total
Avg. of Sem. Work
Test1 Test 2
2 Tests Exam
Mobile
Application
IoTCSBCL60
Security & -- -- -- -- 25 25 – 50
5
Penetration
Testing (SBL)

Lab Objectives:

Sr No Lab Objectives
1 To get acquainted with the concept of Android application ecosystem and development tools
2 To learn the concepts of developing and deploying android based applications
3 To understand Android security models, tools and frameworks
4 To understand Mobile Penetration testing concepts and tools.
5 To understand modeling threats for an droid applications
6 To apply different attacks on android applications

Lab Outcomes:

Sr. Lab Outcomes Cognitive Levels of


No. Attainment as per
Bloom’s Taxonomy

Upon Completion of the course the learner/student should be able to:

1 Describe the basic concept of Mobile OS, architectures and development L1,L2
environments.

2 Interpret the android development process and develop android applications L1,L2,L3

3 Interpret different security concepts in Android applications L1,L2,L3

4 Understand the concepts of penetration testing in mobile environments L1,L2,L3

5 Analyze and develop attack plans and threat models for mobile application L1,L2,L3

6 Interpret and develop the different attacks on Android applications using case L1,L2,L3,L4
studies

Prerequisite: System Security basics, Network Security basics and Mobile Application Development.
DETAILED SYLLABUS

Sr. No. Module Detailed Content Hours LO


Mapping
0 Basics of security Security attacks, vulnerabilities and OS and 02 -
Network security
I Fundamentals of Different types of mobile applications 02 LO1
Android Application platforms, Introduction of Android, features
Development of Android, Android Application
Architecture, Android Development Tools,
Application packages (APK), Debug
Bridge, Application sandboxing and
signing, build process, and rooting,
Application Manifest File, Android
Application Lifecycle and Application
Class.

Self-Learning Topics:
iOS architecture
II Building android Android Activity: Creating activities, 04 LO2
applications Activity lifecycle and Android Activity
classes. User Interface: Fundamental
Android UI Design, Layouts, Fragments,
Designing UI with views, Adapters, Linking
Activities Using intents, Creating Intent
Filters, Displaying notifications, and
Broadcast Receivers, Content Providers and
Database Connectivity

Self-Learning Topics:
Android Firebase Connectivity and
various APIs
III Basics of Mobile Android permission model, key challenges 03 LO3
Application Security in mobile application security, impact of
mobile application security, Android
vulnerabilities, The need for mobile
application penetration testing, The mobile
application penetration testing methodology,
The OWASP mobile security project and
risks.

Self-Learning Topics:
Basic Security attack, threats, risks and
pentesting methods
IV Building test Android security tools: APKAnalyser, The 03 LO4
environments and drozer tool, APKTool, The dex2jar API,
Mobile Pentesting Androguard, QARK, MOBSF, Reversing
tools the application.
Mobile app penetration testing environment
setup, Monkeyrunner, Genymotion.

Self-Learning Topics:
Other vulnerable android apps like
AndroGoat, Damn Vulnerable Bank
V Building Attack Assets, Threats, Threat agents, 06 LO5
Paths – Threat Vulnerabilities, Risk, Approach to threat
Modeling an models.
Application Threat modeling a mobile application:
creating a threat model, Threat modeling
methodologies, Using STRIDE to classify
threats, A typical mobile application threat
model, Building attack plans and attack
trees, Threat model outcomes, Risk
assessment.

Self-Learning Topics:
Threat Modeling Methodologies like
OCTAVE, PASTA, VAST etc. , Risk
Analysis and Mobile Ransomware

VI Attacking Android Setting up the target app and analyzing the 06 LO6
Applications and app using drozer, attacking android
Case Studies components, Attacking WebViews, SQL
injection, Man-in-the-Middle (MitM)
attacks, Encryption and decryption on the
client side, Storage/archive analysis, Log
analysis, Assessing implementation
vulnerabilities, Binary patching. Attack case
studies.

Self-Learning Topics:
Various Case studies on Mobile attacks
and vulnerabilities

Text Books:
1. Mobile Application Penetration Testing, Vijay Kumar Velu, June 2017, Publisher(s): Packt publication, ISBN:
978-1-78588-337-8.
2. Mobile Application Hacker’s Handbook, Dominic Chell, Tyrone Erasmus, Shaun Colley and Ollie Whitehouse,
Wiley publication.
3. Learning Pentesting for Android Devices, Aditya Gupta, Packt Publication.

Reference:
1. Android Security Internals: An In-Depth Guide to Android’s Security Architecture, Nikolay Elenkov, No Starch
Press.

Online References:
1. https://nptel.ac.in/courses/106106147
2. Udemy courses:
a. https://www.udemy.com/course/mobile-application-security-and-penetration-testing-e/
b. https://www.udemy.com/course/android-penetration-testing-using-diva/
c. https://www.udemy.com/course/advanced-mobile-penetration-testing-of-android-applications/

3. https://www.eccouncil.org/programs/certified-penetration-testing-professional-cpent/
List of Experiments.

1. To install and configure Android Studio / Genymotion and Implement simple Android apk.

2. Building Android applications User interfaces using various Views and Layouts.

3. Developing Android applications using Receivers and Content Providers.

4. Developing user interactive Database applications (Using SQLite or other) in Android.

5. Deploying and Publishing Android application.

6. Reversing Android applications (APKs) APKTOOL, dex2jar and JD-GUI

7. Implementation of Android Rooting using tools like SRSroot/iRoot/ Root Genius/ Kingo etc.

8. Android Security Analysis for Hardcoding issues and Insecure Data Storage using DIVA

9. Android Security Analysis for Input Validation and Access Control using DIVA

10. Android Manifest File Analysis and SDK Misuse detection using MobSF tool

11. Android Application component detection using MobSF tool

12. Android Dynamic Code Analysis

13. Insecure logging and Client-side injection

14. Modeling Threats in android using STRIDE

15. Android Security Case Studies (minimum Two)

Term Work: Term Work shall consist of at least 10 to 12 practicals based on the above
list. Also Term work Journal must include at least 2 assignments.

Term Work Marks: 25 Marks (Total marks) = 15 Marks (Experiment) + 5 Marks


(Assignments) + 5 Marks (Attendance)

Oral Exam: An Oral exam will be held based on the above syllabus
Teaching Scheme Credits Assigned
Course Code Course (Contact Hours)
Name Theory Practical Tutorial Theory Practical Tutorial Total

IoTCSBCM601 Mini Project -- 04 -- -- 02 -- 02


:2B
Blockchain &
Security
Model.

Examination Scheme
Course Course
Code Name Theory Marks
Internal assessment End Pract.
Term Work Total
Sem. /Oral
Test1 Test 2 Avg.
Exam
IoTCSB Mini Project
CM601 :2B
Blockchain & -- -- -- -- 25 25 50
Security
Model.

Course Objectives
1. To acquaint with the process of identifying the needs and converting it into the problem.
2. To familiarize the process of solving the problem in a group.
3. To acquaint with the process of applying basic engineering fundamentals to attempt solutions to the problems.
4. To inculcate the process of self-learning and research.
Course Outcome: Learner will be able to…
1. Identify problems based on societal /research needs.
2. Apply Knowledge and skill to solve societal problems in a group.
3. Develop interpersonal skills to work as member of a group or leader.
4. Draw the proper inferences from available results through theoretical/ experimental/simulations.
5. Analyse the impact of solutions in societal and environmental context for sustainable development.
6. Use standard norms of engineering practices
7. Excel in written and oral communication.
8. Demonstrate capabilities of self-learning in a group, which leads to life long learning.
9. Demonstrate project management principles during project work.
Guidelines for Mini Project
 Students shall form a group of 3 to 4 students, while forming a group shall not be allowed less than three
or more than four students, as it is a group activity.
 Students should do survey and identify needs, which shall be converted into problem statement for mini
project in consultation with faculty supervisor/head of department/internal committee of faculties.
 Students hall submit implementation plan in the form of Gantt/PERT/CPM chart, which will cover
weekly activity of mini project.
 A log book to be prepared by each group, wherein group can record weekly work progress,
guide/supervisor can verify and record notes/comments.
 Faculty supervisor may give inputs to students during mini project activity;however, focus shall be on
self-learning.
 Students in a group shall understand problem effectively, propose multiple solution and select best
possible solution in consultation with guide/ supervisor.
 Students shall convert the best solution into working model using various components of their domain
areas and demonstrate.
 The solution to be validated with proper justification and report to be compiled in standard format of
University of Mumbai.
 With the focus on the self-learning, innovation, addressing societal problems and entrepreneurship quality
development within the students through the Mini Projects, it is preferable that a single project of
appropriate level and quality to be carried out in two semesters by all the groups of the students. i.e. Mini
Project 1 in semester III and IV. Similarly, Mini Project 2 in semesters V and VI.
 However, based on the individual students or group capability, with the mentor’s recommendations, if
the proposed Mini Project adhering to the qualitative aspects mentioned above gets completed in odd
semester, then that group can be allowed to work on the extension of the Mini Project with suitable
improvements/modifications or a completely new project idea in even semester. This policy can be
adopted on case by case basis.
Guidelines for Assessment of Mini Project:
Term Work
 The review/ progress monitoring committee shall be constituted by head of departments of each
institute. The progress of mini project to be evaluated on continuous basis, minimum two reviews
in each semester.
 In continuous assessment focus shall also be on each individual student, assessment based on
individual’s contribution in group activity, their understanding and response to questions.
 Distribution of Term work marks for both semesters shall be as below;
o Marks awarded by guide/supervisor based on log book : 10
o Marks awarded by review committee : 10
o Quality of Project report : 05
Review/progress monitoring committee may consider following points for
assessment based on either one year or half year project as mentioned in
general guidelines.
One-year project:
 In first semester entire theoretical solution shall be ready, including components/system selection
and cost analysis. Two reviews will be conducted based on presentation given by students group.
 First shall be for finalisation of problem
 Second shall be on finalisation of proposed solution of problem.
 In second semester expected work shall be procurement of component’s/systems, building of
working prototype, testing and validation of results based on work completed in an earlier semester.
 First review is based on readiness of building working prototype to be conducted.
 Second review shall be based on poster presentation cum demonstration of working model
in last month of the said semester.

Half-year project:
 In this case in one semester students’ group shall complete project in all aspects including,
o Identification of need/problem
o Proposed final solution
o Procurement of components/systems
o Building prototype and testing
 Two reviews will be conducted for continuous assessment,
 First shall be for finalisation of problem and proposed solution
 Second shall be for implementation and testing of solution.

Assessment criteria of Mini Project.

Mini Project shall be assessed based on following criteria;


1. Quality of survey/ need identification
2. Clarity of Problem definition based on need.
3. Innovativeness in solutions
4. Feasibility of proposed problem solutions and selection of best solution
5. Cost effectiveness
6. Societal impact
7. Innovativeness
8. Cost effectiveness and Societal impact
9. Full functioning of working model as per stated requirements
10. Effective use of skill sets
11. Effective use of standard engineering norms
12. Contribution of an individual’s as member or leader
13. Clarity in written and oral communication

 In one year, project, first semester evaluation may be based on first six criteria’s and remaining
may be used for second semester evaluation of performance of students in mini project.
 In case of half year project all criteria’s in generic may be considered for evaluation of
performance of students in mini project.
Guidelines for Assessment of Mini Project Practical/Oral Examination:
 Report should be prepared as per the guidelines issued by the University of Mumbai.
 Mini Project shall be assessed through a presentation and demonstration of working model by the student
project group to a panel of Internal and External Examiners preferably from industry or research
organisations having experience of more than five years approved by head of Institution.
 Students shall be motivated to publish a paper based on the work in Conferences/students competitions.

Mini Project shall be assessed based on following points;


1. Quality of problem and Clarity
2. Innovativeness in solutions
3. Cost effectiveness and Societal impact
4. Full functioning of working model as per stated requirements
5. Effective use of skill sets
6. Effective use of standard engineering norms
7. Contribution of an individual’s as member or leader
8. Clarity in written and oral communication

Course Code Course Theory Practical Tutorial Theory Practical Tutorial Total
Name /Oral
IoTCSBCDL Enterprise 04 -- 04 -- -- 04
O6011 Network
Design

Examination
Scheme
Theory Marks
Course Code Course Name
Practical/Oral
Internal assessment Term Total
End Work
Sem.
Avg. of
Test1 Test2 Exam
two Tests

IoTCSBCDL Enterprise
O6011 Network
20 20 20 80 - - 100
Design - -

Course Objectives:

Sr. No. Course Objectives


The course aims:
1 To be familiarized with the methodologies and approaches of the network design for an enterprise
network.
2 To understand the network hierarchy and use modular approach to network design for an enterprise
network.
3 To understand the campus design and data center design considerations for designing an enterprise
campus.
4 To study Enterprise Edge WAN Technologies and design a WAN using them.
5 Designing an IP addressing plan and selecting a Route protocol for an enterprise network.
6 To design enterprise network for given user requirements in an application.

Course Outcomes:

Sr. No. Course Outcomes Cognitive levels of


attainment as per
Bloom’s Taxonomy
On successful completion, of course, learner/student will be able to:
1 Understand the customer requirements and Apply a Methodology to design a L1,L2,L3
Network.
2 Structure and Modularize the design for an enterprise network. L6
3 Design Basic Campus and Data Center for an enterprise network. L6
4 Design Remote Connectivity for an enterprise network. L6
5 Design IP Addressing and Select suitable Routing Protocols for an enterprise L6
network.
6 Explain SDN and its functioning. L4,L5
Pre-requisite: Computer Networks

DETAIL SYLLABUS:

Sr. Module Detailed Content Hours CO


No. Mappin
g
0 Pre-requisite 1. OSI Reference Model and TCP/IP
Protocol Suite
2. Routing IP Addresses 02
3. Internetworking Devices

I Applying a The Service Oriented CO1


Methodology to Network Architecture, Network Design
Network Design: Methodology, Identifying Customer
requirements, Characterizing the Existing
Network and Sites, Using the Top- Down
Approach to Network Design,
The Design Implementation Process. 06
Self-Learning Topics: Study the basic concepts
of Top-down network design approach with real
time application.
II Structuring and Network Hierarchy, Using a CO2
Modularizing the Modular Approach to Network Design, Services
Network: Within Modular Networks, Network
05
Management Protocol: SNMP.
Self-Learning Topics: Study different type of
NMP protocols.
III Designing Basic Campus Design Considerations, CO3
Campus and Data Enterprise Campus Design, Enterprise Data
Center Networks Center Design Considerations.
Self-Learning Topics: Real time case study on 06
Enterprise Data Center.

IV Designing Remote Enterprise Edge WAN CO4


Connectivity Technologies, WAN Transport Technologies,
WAN Design, Using WAN Technologies,
06
Enterprise Edge WAN and MAN
Considerations, Enterprise Branch and
Teleworker Design
. Self-Learning Topics: Case study on WAN
design.

V Designing IP Designing an IP Addressing Plan, CO5


Addressing in the Introduction to IPv6, Routing Protocol Features,
Network and 10
Routing Protocols for the Enterprise, Routing
Selecting Routing
Protocol Deployment, Route Redistribution,
Protocols
Route Filtering, Route Summarization

Self-Learning Topics: Study of different


routing protocols for Enterprise design.

VI Software Defined Understanding SDN and Open 04 CO6


Network Flow : SDN Architecture – SDN Building
Blocks, OpenFlow messages – Controller to
Switch, Symmetric and Asynchronous
messages, Implementing OpenFlow Switch,
OpenFlow controllers , POX and NOX.

Self-Learning Topics: Case study on SDN.

Text Books:
1. Authorized Self-Study Guide, Designing for Cisco Internetwork Solutions (DESGN), Second
Edition, Cisco Press-Diane Teare.
2. Network Analysis, Architecture, and Design 3rd Edition, Morgan Kaufman, James D.
3. CCDA Cisco official Guide
4. Software Defined Networking with Open Flow : PACKT Publishing Siamak Azodolmolky
References Books:
1. Top-Down Network Design (Networking Technology) 3rd Edition, Priscilla
Oppenheimer ,Cisco Press Book
2. Network Planning and Design Guide Paperback – 2000,Shaun Hummel

Online References:

1. www.cisco.com
2. https://buildings.honeywell.com

Assessment:
Internal Assessment (IA) for 20 marks:
 IA will consist of Two Compulsory Internal Assessment Tests. Approximately 40% to 50% of
syllabus content must be covered in First IA Test and remaining 40% to 50% of syllabus content
must be covered in Second IA Test

 Question paper format

 Question Paper will comprise of a total of six questions each carrying 20 marksQ.1 will be
compulsory and should cover maximum contents of the syllabus

 Remaining questions will be mixed in nature (part (a) and part (b) of each question must be
from different modules. For example, if Q.2 has part (a) from Module 3 then part (b) must be
from any other Module randomly selected from all the modules)

 A total of four questions need to be answered.

Course Code Course Theory Practical Tutorial Theory Practical Tutorial Total
Name /Oral
IoTCSBCDL Application 03 -- -- 03 -- -- 03
O6012 Security and
Secure
Coding
Principles

Course Course Name


Examination Scheme
Code
Theory Marks
Internal assessment End Term
Practical Oral Total
Avg. of 2 Sem. Work
Test1 Test 2
Tests Exam
IoTCSBC Application
DLO6012 Security and
20 20 20 80 -- -- -- 100
Secure Coding
Principles

Course Objectives:

Sr. No. Course Objectives


The course aims:
1 To introduce the basic concepts of application security
2 To understand Security related to Operating Systems, Internet and Social Networking Sites
3 To Understand Email Communication & Mobile Device Security
4 To Understand Cloud and Network Security
5 To introduce the basic concepts of secure coding practices
6 To apply the knowledge of application security to safeguard an application

Course Outcomes:

Sr. No. Course Outcomes Cognitive levels of


attainment as per
Bloom’s Taxonomy
On successful completion, of course, learner/student will be able to:
1 Understand & identify different application security threats. L1,L2
2 Analyze the Security related to Operating Systems, Internet and Social L1,L2,L3,L4
Networking Sites
3 Understand the security aspects related to Email Communication & Mobile L1,L2
Device
4 Understand Cloud and Network Security L1,L2
5 Evaluate the different Secure Coding Practices L1,L2,L3,L4,L5
6 Apply application security testing concepts to safeguard L1,L2,L3

Prerequisite: Data Security and Crytography

DETAILED SYLLABUS:

Sr. Module Detailed Content Hours CO


No. Mapping

0 Prerequisite Data Security Fundamentals and 02 --


cryptography

I Application Web Application Security ,SQL Injection 08 CO1


Security ,Forms and Scripts ,Cookies and Session
Management ,General Attacks, Regular
Application Security ,Running Privileges
,Application Administration ,Integration with
OS Security ,Application Updates ,Spyware
and Adware ,Network Access.
Self-learning Topics:
Remote Administration Security

II Security related Security Recommendations for Windows 08 CO2


to Operating Operating Systems, Mac OS, Studying Web
Systems, Internet Browser Concepts, Immediate Messaging
and Social Security, Child Online Safety,
Networking Sites Self-learning Topics: Understanding Social
Networking Concepts, and Facebook and
Twitter Security Settings
III Email Understanding Email Security Concepts, 06 CO3
Communication Email Security Procedures, Knowing Mobile
& Mobile Device Device Security Concepts, Mobile Security
Security Procedures, Understanding How to Secure
iPhone, iPad, Android, and Windows
Devices
Self-learning Topics: How to Secure
iPhone, iPad, Android, and Windows
Devices
IV Embedded Embedded Applications Security, Security of 07 CO4
Application and Embedded Applications Security
Cloud Security Conclusions, Remote Administration
Security, Reasons for Remote
Administration, Remote Administration
Using a Web Interface, Authenticating Web-
Based Remote Administration, Custom
Remote Administration

Understanding Cloud Concepts, Securing


Against Cloud Security Threats, Addressing
Cloud Privacy Issues

Self-learning Topics: Understanding


Various Networking Concepts & Setting Up
a Wireless Network in Windows and Mac.
Understanding Wireless Network Security
Countermeasures
V Secure Coding Input Validation, Authentication and 04 CO5
Practices Authorization, Cryptography, Session
Management,
Self-learning Topics: Error Handling
VI Application Introduction Application Security Testing, 04 CO6
Security Testing Different Application Security Testing –
SAST, DAST, IAST, MAST.

Self-learning Topics: Cross-Site Scripting


Issues ,SQL Injection Attacks
Text Books:
1. Nina Godbole, “Information Systems Security”, Wiley Publication
2. Robert Bragg,Mark Rhodes-ousley,Keith Strasssberg “The complete reference Network Security” TMH , 2004

References Books:
1. Mark G. Graff, Kenneth R. van Wyk, “Secure Coding: Principles and Practices”, O'Reilly Media, Inc
2. William (Chuck) Easttom II, “Computer Security Fundamentals, 4th Edition”, Pearson publication

Online References:
1. https://nptel.ac.in/courses/106106146
2. https://www.coursera.org/specializations/secure-coding-practices?
3. https://www.coursera.org/learn/systems-application-security-sscp

Assessment:
Internal Assessment (IA) for 20 marks:
 IA will consist of Two Compulsory Internal Assessment Tests. Approximately 40% to 50% of
syllabus content must be covered in First IA Test and remaining 40% to 50% of syllabus content
must be covered in Second IA Test

 Question paper format

 Question Paper will comprise of a total of six questions each carrying 20 marksQ.1 will be
compulsory and should cover maximum contents of the syllabus

 Remaining questions will be mixed in nature (part (a) and part (b) of each question must be
from different modules. For example, if Q.2 has part (a) from Module 3 then part (b) must be
from any other Module randomly selected from all the modules)

 A total of four questions need to be answered.


Course Code Course Theory Practical Tutorial Theory Practical/ Tutorial Total
Name Oral
IoTCSBCDLO601 Ethical 03 -- -- 03 -- -- 03
3 hacking and
digital
forensics

Course Course Name


Examination Scheme
Code
Theory Marks
Internal assessment End Term
Practical Oral Total
Avg. of 2 Sem. Work
Test1 Test 2
Tests Exam
IoTCSBCD Ethical
LO6013 hacking and
digital 20 20 20 80 -- -- -- 100
forensics

Course Objectives:

Sr. No. Course Objectives


The course aims:
1 To understand ethical hacking and different phases of an attack
2 To learn various tools used for hacking
3 To understand various steps involved in the Digital Forensics Methodology
4 To learn about the Digital Forensic Data Acquisition
5 To learn about Digital Forensic Investigation and Analysis
6 To learn about the steps involved in creating an investigation report

Course Outcomes:

Sr. No. Course Outcomes Cognitive levels of


attainment as per
Bloom’s Taxonomy
On successful completion, of course, learner/student will be able to:
1 Define the concept of ethical hacking and explore different phases in ethical L1,L2
hacking
2 Examine different tools for hacking and penetration testing L1,L2,L3
3 Understand the need for Digital Forensics and its Life Cycle L1,L2
4 Implement various Digital Forensic techniques to acquire a forensically sound L1,L2,L3
copy of evidence
5 Analyze the various pieces of evidence acquired after applying various forensic L1,L2,L3,L4
tools
6 Compile a detailed Forensic report after completing a forensic investigation L6

Prerequisite:
1) Computer Networks
2) Cryptography and System Security
DETAILED SYLLABUS:

Sr. Module Detailed Content Hours CO


No. Mapping

0 Prerequisite Computer Networks, cryptography and system security 02

I Computer Introduction to Ethical Hacking: Introduction to Ethical 06 CO1


Networks Hacking. Hacker Classifications: The Hats. Phases of Hacking.
Introduction to footprinting, footprinting tools. Scanning
methodology and tools. Enumeration techniques and
enumeration tools.
Self-learning Topics:
OWASP top 10 Attacks
II Computer Introduction to penetration testing: System hacking, hacking 04 CO2
Networks tools, Introduction to penetration testing and social
engineering, Phases of penetration testing.
Self-learning Topics:
Google Hacking (GHDB) and Doxing
III Digital Forensics and Incident 07 CO3
Response:

Introduction to Digital Forensics and Digital Evidence, The


Need for Digital Forensics, Types of Digital Forensics, Digital
Forensics Life Cycle.

Incident and Initial Response: Introduction to Computer


Security Incident, Goals of Incident response, Incident
Response Methodology, Initial Response, Formulating
Response Strategy.

Self-learning Topics:

New Challenges of Digital Forensic Investigations

IV Forensic Duplication and Acquisition: 07 CO4


Forensic Duplication: Introduction to Forensic Duplication,
Types of Forensic Duplicates, Introduction to Forensic
Duplication Tools.
Data Acquisition: Introduction to Static and Live/Volatile
Data, Static Data Acquisition from Windows (FTK Imager),
Static Data Acquisition from Linux (dd/dcfldd), Live Data
Acquisition from Windows (FTK Imager). Network Forensics
(wireshark)
Self-learning Topics: Open and Proprietary Tools for Digital
Forensics, Network Forensic Tools

V Forensic Investigation and Analysis: 07 CO5


Investigating Registry Files, Investigating Log Files, Data
Carving (Bulk Extractor), Introduction to Forensic Analysis,
Live Forensic Analysis, Forensic Analysis of acquired data in
Linux, Forensic Analysis of acquired data in Windows
Self-learning Topics: Open and Proprietary Tools for
Forensics Investigation

VI Evidence Handling and Forensic Reporting: 06 CO6


Evidence Handling: Faraday’s Bag, Characteristics of an
Evidence, Types of Evidence, Evidence Handling Methodology,
Chain of Custody.
Forensic Reporting: Goals of a Report, Layout of an
Investigative Report, Guidelines for writing a report, Sample
Forensic Report
Self-learning Topics: Case Study on Real Life Incidents.

Text Books:
1. EC-Council “Ethical Hacking and Countermeasures Attack Phases”, Cengage Learning
2. Computer Security Principles and Practice, William Stallings, Sixth Edition, Pearson Education
3. Build your own Security Lab, Michael Gregg, Wiley India

References:
1. Kevin Smith, “Hacking How to Hack - The ultimate Hacking Guide”, Hacking Intelligence
2. Kevin Beaver, “Hacking for dummies” Wiley publication
3. Incident Response & Computer Forensics by Kevin Mandia, Chris Prosise, Wiley
4. Digital Forensics by Nilakshi Jain & Kalbande, Wiley

Online References:
2. https://freevideolectures.com/course/4070/nptel-ethical-hacking
3. https://owasp.org/www-project-top-ten/
4. https://www.computersecuritystudent.com/
5. http://www.opentechinfo.com/learn-use-kali-linux/
6. https://pentesterlab.com
7. https://www.exploit-db.com/google-hacking-database

Assessment:
Internal Assessment (IA) for 20 marks:
 IA will consist of Two Compulsory Internal Assessment Tests. Approximately 40% to 50% of
syllabus content must be covered in First IA Test and remaining 40% to 50% of syllabus content
must be covered in Second IA Test

 Question paper format

 Question Paper will comprise of a total of six questions each carrying 20 marksQ.1 will be
compulsory and should cover maximum contents of the syllabus

 Remaining questions will be mixed in nature (part (a) and part (b) of each question must be
from different modules. For example, if Q.2 has part (a) from Module 3 then part (b) must be
from any other Module randomly selected from all the modules)

 A total of four questions need to be answered.


Course Code Course Theory Practical Tutorial Theory Practical/ Tutorial Total
Name Oral
IoTCSBCDLO601 Virtualization 03 -- -- 03 -- -- 03
4 and Cloud
Security

Examination Scheme
Course Theory Marks
Course Name
Code Internal assessment End Term
Practical Oral Total
Test Avg. of 2 Sem. Work
Test 2
1 Tests Exam
IoTCSBCD Virtualization
LO6014 and Cloud
Security 20 20 20 80 -- -- -- 100

Course Objectives:

Sr. No. Course Objectives


The course aims:
1 To understand Virtualization
2 To learn various tools used for Virtualization
3 To understand various steps involved in the Virtualization
4 To learn about different trends in cloud computing
5 To learn about Data Security in Cloud
6 To learn about Identity and Access Management in Cloud

Course Outcomes:

Sr. No. Course Outcomes Cognitive levels of


attainment as per
Bloom’s Taxonomy
On successful completion, of course, learner/student will be able to:
1 Define the concept of Virtualization and explore different tools in Virtualization L1,L2,L3
2 Examine different types for Virtualization L1,L2
3 Understand the need for Cloud Security L1,L2
4 Implement various Data security techniques in cloud security L1,L2,L3
5 Implement various Access Management techniques in cloud security L1,L2,L3
6 Understand different trends in cloud computing L1,L2

Prerequisite: Computer Networks, Cryptography and System Security

DETAILED SYLLABUS:

Sr. Module Detailed Content Hours CO


No. Mapping

0 Prerequisite Computer Networks, cryptography and 02


system security
I Introduction to Definition, Characteristics, Components, 04 CO1
Cloud Cloud Deployment Models, NIST
Computing Architecture of Cloud Computing,
Advantages of Cloud Computing, Cloud
Computing Challenges. Identification of
frames in cloud. Public, Private, Hybrid,

Self-Learning Topics: Case study on


different types of cloud ie private, public
etc.

II Introduction to 06 CO1
Virtualization Introduction, Characteristics of
Virtualization, Full Virtualization, Para
virtualization, Hardware-Assisted
Virtualization, Operating System
Virtualization, Application Server
Virtualization, Application Virtualization,
Network Virtualization, Storage
Virtualization, Service Virtualization

Computing Platforms: Amazon Web


Services (AWS) EC2 ,S3, Google App
Engine, Microsoft Azure etc.

Self-Learning Topics: Study different


AWS services.

III Virtualization Hypervisors: Hosted Structure (Type II 08 CO2


Hypervisor)
Bare-metal Structure (Type I Hypervisor)
Implementation Levels of Virtualization
Resource Virtualization

CPU Virtualization, Memory


Virtualization, Device and I/O
Virtualization Technology Examples

KVM Architecture, Xen Architecture,


VMWare, Hyper-V

Self-Learning Topics: Case study on


virtualization
IV Risks in Cloud Computing: 06 CO3
Cloud Security Introduction, Risk
Management, Cloud Impact,
Enterprise-Wide, Risk
Management, Risks internal
and external in Cloud
Computing

Cloud Security Services: Security


Authorization Challenges in the Cloud,
Secure Cloud Software Requirements,
Content level security. Cloud Hosting risks,

Self-Learning Topics: Case study on


Cloud Secuirty.

V Data Security 07 CO4


in Cloud Introduction, Current state, Data Security. CO5
Application Security in Cloud, Security in
IaaS Environment, Security in PaaS
Environment, Security in SaaS
Environment, Cloud Service Reports by
CPS, Security for Virtualization Software,
Host Security in PasS, SaaS and IaaS,
Security as a Service, Benefits of SaaS,
Challenges with SaaS, Identity
Management as a Service (Id MaaS).
Security related to storage.

Self-Learning Topics: Study various


benefits of Maas, SaaS, PaaS and Iaas

VI Future Cloud Mobile Cloud Computing 06 CO6


Computing
Autonomic Cloud Computing
Multimedia Cloud
Energy aware Cloud computing
Jungle Computing. Case study on upcoming
cloud computing area
Self-Learning Topics: Case study on
future in cloud computing.

Text Books:

1 ) Cloud Computing and Services ,Arup Vithal | Bhushan Jadhav, StarEdu Solutions, SYBGEN Learning India Pvt. Ltd
2) Cloud Computing: A Practical Approach for Learning and Implementation, A. Srinivasan, J. ,Suresh, Pearson.
3) Cloud Computing and Virtualization , Dac-Nhuong Le,Raghvendra Kumar, Wiley & Sons
4) Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Ronald L. Krutz
Russell Dean Vines , Wiley & Sons.

Reference Books:

1. Cloud Computing Black Book , Kailash Jayaswal , Dreamtech Publication.


2. MASTERING CLOUD COMPUTING, “BUYYA” Tata Mcgraw Hill publication
3. CLOUD COMPUTING A PRACTICAL APPROACH, “VELTE”, Tata Mcgraw Hill publication

Online References:
1. https://docs.aws.amazon.com/
2. https://docs.microsoft.com/en-us/azure
3. https://docs.docker.com/get-started/

Assessment:
Internal Assessment (IA) for 20 marks:
 IA will consist of Two Compulsory Internal Assessment Tests. Approximately 40% to 50% of
syllabus content must be covered in First IA Test and remaining 40% to 50% of syllabus content
must be covered in Second IA Test

 Question paper format

 Question Paper will comprise of a total of six questions each carrying 20 marksQ.1 will be
compulsory and should cover maximum contents of the syllabus

 Remaining questions will be mixed in nature (part (a) and part (b) of each question must be
from different modules. For example, if Q.2 has part (a) from Module 3 then part (b) must be
from any other Module randomly selected from all the modules)

 A total of four questions need to be answered.

You might also like