C 20 5 6 Sem CSE
C 20 5 6 Sem CSE
Total contact
(including CIE
Hours per CIE
Total Marks
No
Department
Marks
Grade Point
/Semester
SGPA and
Assigned
Category /
Credits
Passing
marks)
Course Semester Marks
Grade
CGPA
Teaching
hrs
Pathway Title Theory Practical
Course
Code
L T P Max Min Max Min Max Min
Total Marks
Grade Point
/Semester
Category /
marks)
for Passing
CIE Marks SEE Marks (Theory)
Min Marks
Departme
(including
Assigned
Semester
Teaching
contact
Credits
Course
Grade
Total
hrs
Higher Education Pathway
Course
CIE
nt
BS/SC
20SC51T
Paper 1 – Applied
Specialization 52 26 0 78 6 50 20 50 20 100 40
Mathematics
pathway in
2 Science and 20SC52T Paper 2 – Applied Science 52 - 52 104 6 50 20 50 20 100 40
Research
20RM53T Paper 3 – Research
(Student need Methodology 52 - 52 104 6 50 20 50 20 100 40
to take all four
20TW54P Paper 4 – Technical Writing 39 13 52 104 6 60 24 40 16 100 40
papers in this
pathway) Total 195 39 156 390 24 210 84 190 76 400 160
Entrepreneurship and Start up Pathway
L:- Lecture T:- Tutorial P:- Practical BS- Basic Science:: ES-Engineering Science:: SC: Science , I: Integrated :: CS: Computer Science and Engineering
Note : In 5th Semester student need to select any one of the pathways consisting of 24 credits
Department of Collegiate & Technical Education Bengaluru-560001 Page 2
VI Semester Scheme of Studies - Diploma in Computer Science and Engineering [C-20]
Hours per CIE SEE
Departmen
for Passing
CIE marks)
contact hrs
Min Marks
(including
Category /
SGPA and
/Semester
Assigned
Semester Marks Marks
Pathway
Credits
Teaching
Marks
Grade
Grade
Course
Point
CGPA
Total
Course
Course
Code
Total
L T P Max Min Max Min
t
Internship/Project
CGPA
40 Hours / week
ES/CSE 20CS61P Internship / Project 640 16 240 96 160 64 400 160
p
Total 16 Weeks
P: Project/Internship
Welcome to the curriculum for the Artificial Intelligence and Machine Learning (AI&ML)
Specialisation. This specialisation course is taught in Bootcamp mode. Bootcamps are 12 weeks,
intense learning sessions designed to prepare you for the practical world – ready for either industry
or becoming an entrepreneur. You will be assisted through the course, with development-based
assessments to enable progressive learning. In this course, you’ll learn how to produce a computer-
assisted solution when data is too complex for humans to find answers as they combine both data
science and machine learning skills that are needed for today’s job market.
Some common examples include; Amazon Alexa - converting spoken audio into language; Google
Image Search – uses image recognition to return specific search results; Samsung Smart Fridges –
uses data and machine learning to produce intuitions about your behaviour. Leading to the
successful completion of this bootcamp, you shall be equipped to either do an internship at an
organization working in AI or do a project in AI. After the completion of your Diploma, you shall be
ready to take up roles like Machine Learning Engineer, Data Scientist, Data Analyst, and more.
This course will teach you Fundamentals of AI, Python and Python libraries, data visualization,
machine learning models, maths like linear algebra, data interpretation, deep learning, Version
control system, cloud deployment and more. Details of the curriculum is presented in the sections
below.
Pre-requisite
Before the start of this specialisation course, you would have completed the following courses;
In the 1st year of study, you would have studied Engineering Mathematics, Communication Skills,
Computer Aided Engineering Graphics, Statistics & Analysis, Basic IT Skills, Fundamentals of
Diploma in Computer Science & Engineering C 20 : 2020 - 21
Computer, Fundamentals of Electrical and Electronics Engineering, Project Management skills and
Multimedia & Animation.
In the 2nd year of study, you would have studied Python Programming, Computer Hardware,
Maintenance and Administration, Computer Networks, Database System Concepts and PL/SQL,
Data Structures with Python, Operating System and Administration, Object oriented programming
and Design with Java, Software Engineering principles and practices.
In this year of study, you shall be applying your previous years learning along with specialised field
of study into projects and real-world applications.
A Course Cohort Owner is a faculty from the core discipline, who is fully responsible for one
specialised field of study and the cohort of students who have chosen to study that specialised field
of study.
CO3 Evaluate, optimize, build and test an AI model for a given requirement
CO5 Select the appropriate tools, production environment and deploy the model.
GitHub
- Basics of distributed git
- Account creation and configuration Create repository – named mini project-1
Machine Learning
- Fundamentals
- Machine learning types
- Machine learning workflow
- Machine learning applications
- Challenges in ML
- Building a model – steps involved
- Pipelines
▪ Data engineering
▪ Machine learning
1 1 1 Peer Review 4 2 1
▪ Deployment
- What is Data Science?
2
- How Data Science works?
- Data Science uses
Group discussion - Examples of ML in everyday
life / Use of Machine Learning in Daily Life
Machine Leaning Terminologies - T
TOC - Machine Learning Fundamentals | Infosys
Springboard (onwingspan.com)
Prediction – continuous value
Introduction to Cloud Computing Introduction to Containers
Essentials of Cloud Computing Cloud Native application development
1,5 1,4 2 2 2 1 2
Cloud Deployment Models Explore AI (ML and DL) services across public
Cloud Service Models cloud platforms
5 CIE 1 – Written and Practice Test Assessment Review and corrective action 3
How to create project plan and product backlog
for AI project
Create Git Repository for following
1 4 6 2 3 Weekly Assignment
Regression Project - ML / deep learning
Classification Project – ML / deep learning
Clustering project – ML / deep learning
▪ Time series outlier detection Practice: Dealing with outliers with different
approaches
Data reduction
Data Integration - Distinction between data reduction and data
- Overview redundancy
- data integration challenges - Objectives
2,3 3 - Approaches - Methods
2,5 1 3 1 2
,4
- Adding attributes o numerosity data reduction
- Adding data objects o dimensionality data reduction
Practice: data integration Practice: Data reduction with numerosity data
reduction method
Data transformation
Need for data transformation.
- Normalization
Data transformation with
- Standardization
2,3 - ranking transformation
2,5 4 1 3 3
,4 Data transformation with
- discretization
- binary coding
- ranking transformation
- discretization
5 CIE 2 – Written and Practice Test Assessment Review and corrective action 3
2,3
2,5 6 Feature engineering 2 3 Weekly Assignment
,4
Data Splitting
Importance of data splitting
- Training set
- Validation set
Peer review
- Testing set
2,3 2,3 Mini Project Activity – Status review
1 4 1 2
,5 ,4 Underfitting and overfitting
Practice : split training and testing data sets in
Python using train_test_split() of sci-kit learn.
Explore the options of train_test_split()
- Applications
Practice: build Logistic regression model in
python
Support Vector Machine
- Introduction to SVM
build Logistic regression model in python - How does it work?
2,3 2,3
2 2 2 2 1
,5 ,4 Evaluation and optimization of the model - Applications
Practice: Build a SVM Model in python for Fish
dataset from Kaggle
Ensemble Learning
Introduction
Basic Ensemble Techniques
- Max Voting
- Averaging
- Weighted Average
Advanced Ensemble Techniques
Build a SVM Model in python
2,3 2,3 4 - Stacking
3 3
,5 ,4 How to optimize SVM?
- Blending
- Bagging
- Boosting
Explore and list the Ensemble Algorithms - T
Random Forest
- Introduction
- How does it work?
- Hyper parameters
- Applications
Build Random Forest-based model in python for
2,3 2,3 Breast Cancer Wisconsin (diagnostic) dataset
4 4 Evaluation and optimization 3
,5 ,4
from sci-kit learn Or dataset from UCI , Kaggle
5 CIE 3 – Written and Practice Test Assessment Review and corrective action 3
Comparison of classification algorithms with real
2,3 2,3
6 2 3 Weekly Assignment
,5 ,4 world scenario
Unsupervised learning –
- What is unsupervised learning?
- Common approaches
Peer review
- Challenges
3 2,3 1 Mini Project Activity – Status review 4 2 1
- Clustering Types
Applications of unsupervised learning - T
K-means –
9
Working of K-means
How to Choose the Right Number of Clusters?
Implementation in python
Evaluation Metrics
2,3 2,3 - Inertia
2 1 3 Contd. 3
,5 ,4
- Dunn Index
Evaluate the model using mentioned metrics
Dimensionality Reduction
- Importance of Dimension Reduction in
Keras
- Callbacks
- Commonly used callbacks
Monitor neural network performance with
TensorBoard How to save trained model
3 3,4 4 1 3 3
- TensorBoard Basics Local deployment with TensorFlow ModelServer
- TensorBoard Setup
Understand Model Behavior During Training
Reduce overfitting with Dropout Layer
5 CIE 4 – Written and Practice Test Assessment Review and corrective action 3
Building deep learning model with TensorFlow
2,3 3,4 6 2 3 Weekly Assignment
and Keras for use cases
Peer Review Natural Language Processing
2,3, 4
11 1,5 1 2 1
4 Mini Project Activity – Status review Understanding natural language processing
Regular Expression 3
- Introduction
Peer review
2,3, - Simple patterns – matching characters,
1 1
4 Mini Project Activity – Status review
repetition
- Explore python ‘re’ module
NLP use case – Sentiment Analysis (SA) 3
What is sentiment analysis?
Why is SA important?
Business applications for SA
How does sentiment analysis work?
1,2, 2,3, Contd..
2 2 2
3 4 Transformers
3
5 CIE 5 – Written and Practice Test Assessment Review and corrective action
References
Sl. No Description
2 Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 2nd Edition, By Aurélien Géron
5 Deep Learning with TensorFlow2 and Keras , Antonio Gulli, Amita Kapoor,Sujith Pal
7 Khan Academy
10 Mathematics for Machine Learning, A. Aldo Faisal, Cheng Soon Ong, and Marc Peter Deisenroth
Duration
CIE Assessment Assessment Mode Max Marks
In hours
1 Case submission 20
2 Case presentation 20
3 Case innovation 20
4 Result 20
5 Viva voce 20
Total 100
Well documented,
Comments on reasoned and
effective solutions / pedagogically Appropriate, well
Little and/or
strategies (The appropriate thought out comments Superficial and / or
inappropriate No action to all
solution may be in comments on about solutions, or inappropriate solutions
solutions to all of the issues in the 2
the problem solutions, or proposals for solutions, to some of the issues in
issues in the problem problem statement
statement already proposals for to most of the issues in the problem statement
statement
or proposed by solutions, to all the problem statement
you) issues in the
problem statement
Excellent research
into the issues with Good research and
Links to course Limited research and Incomplete research
clearly documented documented links to No research or links
learning and documented links to and links to any 3
links to course the materials read to any reading
additional research any readings reading.
learnings and during the course
beyond.
Total 14/20
Evaluation Student
5 4 3 2 1
Parameters Score
Clear flow of Hard to
Most ideas flow No flow in
Very clear and concise flow of follow the
ideas but is lost at times the
ideas Demonstrates passionate flow of
Demonstrates Limited evidence presentation
Delivery & Enthusiasm interest in the topic and ideas Lack 4
interest in the of interest in and Poor
engagement with class / of
topic and engagement with presentation
examiner enthusiasm
engagement the topic skills
and interest
with class /
examiner
Limited
use of Poor visuals used
Visuals augmented and Use of visuals and some visuals
visuals
Visuals extended comprehension of related to the No use of visuals are not easy to 2
loosely
the issues in unique ways topic understand its
related to
relevance.
the topic
Uses stage
effects such as
props, sound Limited use of
Uses stage effects such as effects, and stage effects
props, sound effects, and speech and/or used in a
speech modulation in a modulation in manner that did
No use of stage Poor stage effects
Staging unique and dramatic manner an effective not enhance the 5
effects usage
that enhances the manner to understanding of
understanding of the issues extend the the issues in the
in the problem statement. understanding problem
of the issues in statement.
the problem
statement.
Questions and Questions and
Excellent and salient discussions discussions
Involvement Little or no
discussion points that addressed addressed
of the class / attempt to Did not engage
elucidated material to important important
Examiners engage the the class /
develop a deep information superficial
class / examiner and 3
• Questions understanding Appropriate that issues of the
examiner in poor listening
• Discussions and imaginative activities developed problem
demonstrating skills
• Activities used to extend understanding understanding statement
their learning
in a creative manner Appropriate Limited use of
activities used activities to
to clarify clarify
understanding understanding
Total 14/20
Outcome achieved
beyond the problem
brief
Made effective use of Made good use of class 3
class principles, principles, models and
Made some use of Poorly applied
models and theories. theories Some creative
Application of class principles, Made limited use of class
Also used creativity ideas were explored to
class learning in models and theories class principles, principals,
to find effective find desired outcome
problem solving No creative ideas or models and theories models and
results appropriate but within the
models explored theories
to industry beyond framework of class
class learning. learning
Queries Excellent 2
Poor or no
response to Good response to Satisfactory response Limited response
Response to response to
comments and questions and to questions and to questions and
Class / questions and
discussion with discussions with some discussions with discussions with
Examiners did not
appropriate content connection made to limited reference to no reference to
Queries participate in
supported by theory/research theory/research theory/research
the discussions.
theory/research
Has not 4
Provides limited
Provides detailed and Provides adequate and provided
Provides appropriate and somewhat
appropriate mostly appropriate appropriate
Conclusions conclusion for the appropriate
conclusion for the conclusions for the conclusions for
problem statement conclusions for the
problem statement problem statement the problem
problem statement
statement.
Total 13/20
Assessment framework for SEE (Theory) – 100 Marks / 3 hours (Reduced to 60 marks)
9.a) 5
b)
10.a)
b)
Introduction:
Welcome to the curriculum for the Full Stack Development Specialisation. This specialisation
course is taught in Bootcamp mode. Bootcamps are 12 weeks, intense learning sessions designed to
prepare you for the practical world – ready for either industry or becoming an entrepreneur. You
will be assisted through the course, with development-based assessments to enable progressive
learning. In this course, you’ll learn a complete suite of software development skills to build
application like front-end, middleware, and back-end Java web developer technologies, test and
deploy code, store data using MongoDB, and much more.
This course will teach you Fundamentals of business process automation, React, Spring, MongoDB,
REST API, DevOps practices, cloud deployment and more. Details of the curriculum is presented in
the sections below.
Pre-requisite
Before the start of this specialisation course, you would have completed the following courses;
In the 1st year of study, you would have studied Engineering Mathematics, Communication Skills,
Computer Aided Engineering Graphics, Statistics & Analysis, Basic IT Skills, Fundamentals of
Computer, Fundamentals of Electrical and Electronics Engineering, Project Management skills and
Multimedia & Animation.
In the 2nd year of study, you would have studied Python Programming, Computer Hardware,
Maintenance and Administration, Computer Networks, Database System Concepts and PL/SQL,
Data Structures with Python, Operating System and Administration, Object oriented programming
and Design with Java, Software Engineering principles and practices.
In this year of study, you shall be applying your previous years learning along with specialised field
of study into projects and real-world applications.
A Course Cohort Owner is a faculty from the core discipline, who is fully responsible for one
specialised field of study and the cohort of students who have chosen to study that specialised field
of study.
CO4 Develop RESTful API’s and test functions as per the defined requirements.
Recap
- Design Thinking
1,2 2,3 4 1 3 Contd. 3
- Apply design thinking to automate the
observed activities in the industrial visit
5 CIE 1 – Written and Practice Test Assessment Review and corrective action 3
Comparison of cloud services
2,3, How to make full stack development efficient
2,3 6 2 3 Weekly Assignment
4
by using DevOps
Recap
HTML, CSS and JavaScript Fundamentals
Peer review
(Code structure – statements, comments,
2,3, 2,3, 1 Project status review
4 4 1 2
5 4 variables, Constants, Data types, Interaction,
Demonstration of artifacts of the project
Operators, Comparisons, Control flow,
Functions)
constructor injection
Property injection
Method injection
Spring IoC container – ApplicationContext
Autowiring
Autowiring dependencies
2,3, Contd..
3,4 2 4 Contd.. 3
4
8 2,3, Transaction management and compliance to
3,4 3 1 3 Contd.. 3
4 ACID principles
5 CIE 3 – Written and Practice Test Assessment Review and corrective action 3
2,3, Spring Transactions
3,4 6 Weekly Assignment
4
2,3, Peer review Introduction NoSQL - 1
9 3,4 1 4 1 2
4
5 CIE 4 – Written and Practice Test Assessment Review and corrective action 3
MongoDB implementation, administration and
2,3,
3,4 6 Weekly Assignment
4 deployment
Application Testing
- Manual
Peer review
- Automated
3,4, 2,3, Project status review 4
1 1 2
5 4 Application testing tools
Demonstration of artifacts of the project
Functional testing
UI testing
WebDriver Commands -
Get, Navigation, WebElement, Action, and
Result commands.
Working with WebDriver commands
Select Class and different select methods
Working with WebDriver commands
Acceptance testing
Acceptance tests and test plan
4 Automation testing with selenium web driver 4 1 2
User acceptance testing
Bug tracking – Jira
Containers 2
Why containers?
What is a docker?
How docker works?
Docker image
Components of docker
Docker file
- Docker container
Commands to create docker file.
3,4, 2,3, - Docker client
2 1 3 1
5 4 Build docker image with docker file
- Docker daemon
create docker container from docker image
- Docker image
Run the docker container
- Docker registry
Install docker on desktop and start the docker
tool.
Explore and try other containers.
Disaster recovery and their types 2
Container orchestration
How does it work?
What is orchestration?
Elements of disaster recovery plan
3,4, 2,3, Orchestration engine
3 1 3 1
5 4 Build a disaster recovery plan
Orchestration tools
Load Balancing
Docker swarm – components and features
Load balancer and its functions
Application monitoring Contd. 2
3,4, 2,3,
4 1 3 1
5 4 - Need for application monitoring Redundancy and mirroring
5 CIE 5 – Written and Practice Test Assessment Review and corrective action
6 Cloud orchestration 2 3
Project
Internship a) Identification of the problem statement
a) Secondary research on various
(from at least 3 known problems) the students
industries and their operations to identify at
would like to work as part of the project – either
least 3 companies along with the areas of work
interest and develop an internship plan that as provided by faculty or as identified by the
clearly highlights expectations from the student. Document the impact the project will
industry during the internship. have from a technical, social and business
b) Design and develop a cover letter for an perspective.
13 1
internship request to all 3 identified companies
b) Design and develop the project solution
and the resume to be submitted to potential
companies. or methodology to be used to solve at least one of
Prepare for an internship interview to highlight the problems identified.
your interests, areas of study, career Prepare a project plan that will include a
aspirations and personnel competence –
schedule, WBS, Budget and known risks along
including the areas of learning you expect to
with strategies to mitigate them to ensure the
learn during internship.
project achieves the desired outcome.
References
Sl. No Description
1 Hands-On Full Stack Development with Spring Boot 2.0 and React
Duration
CIE Assessment Assessment Mode Max Marks
In hours
Week 3 CIE 1– Written and practice test 4 30
Week 5 CIE 2– Written and practice test 4 30
Week 8 CIE 3– Written and practice test 4 30
Week 10 CIE 4– Written and practice test 4 30
Week 12 CIE 5– Written and practice test 4 30
Week 13 Assessment for Project or Internship 4 30
On line Course work (At least one related to the specialization) 30
Portfolio evaluation (Based on industrial assignments and weekly developmental assessment) * 30
TOTAL CIE MARKS (A) 240
SEE 1 - Theory exam (QP from BTE) Conducted for 100 marks 3 hour duration reduced to 60 marks 3 60
SEE 2 – Practical duration 3hr. Max marks 100 3 100
1 Case submission 20
2 Case presentation 20
3 Case innovation 20
4 Result 20
5 Viva voce 20
Total 100
Evaluation
5 4 3 2 1 Student Score
Parameters
Well documented,
Comments on reasoned and
Appropriate, well
effective solutions pedagogically
thought out Little and/or
/ strategies (The appropriate Superficial and / or
comments about inappropriate No action to all
solution may be in comments on inappropriate solutions
solutions, or proposals solutions to all of the issues in the 2
the problem solutions, or to some of the issues in
for solutions, to most issues in the problem problem statement
statement already proposals for the problem statement
of the issues in the statement
or proposed by solutions, to all
problem statement
you) issues in the
problem statement
Excellent research
Links to course into the issues with Good research and
Limited research and Incomplete research
learning and clearly documented documented links to No research or links
documented links to and links to any 3
additional links to course the materials read to any reading
any readings reading.
research learnings and during the course
beyond.
Total 14/20
Evaluation Student
5 4 3 2 1
Parameters Score
Clear flow of
ideas Most ideas flow Hard to
No flow in
Very clear and concise flow of but is lost at follow the
Demonstrates the
ideas Demonstrates times Limited flow of
interest in the presentation
Delivery & Enthusiasm passionate interest in the evidence of ideas Lack 4
topic and Poor
topic and engagement with interest in and of
class / examiner engagement presentation
engagement enthusiasm
with class / skills
with the topic and interest
examiner
Limited
use of Poor visuals used
Visuals augmented and
Use of visuals and some visuals
extended comprehension visuals
Visuals related to the No use of visuals are not easy to 2
of the issues in unique loosely
topic understand its
ways related to
relevance.
the topic
Uses stage
effects such as
props, sound Limited use of
Uses stage effects such as
effects, and stage effects
props, sound effects, and
speech and/or used in a
speech modulation in a
modulation in manner that did
unique and dramatic No use of stage Poor stage effects
Staging an effective not enhance the 5
manner that enhances the effects usage
manner to understanding
understanding of the
extend the of the issues in
issues in the problem
understanding the problem
statement.
of the issues in statement.
the problem
statement.
Total 14/20
reasoning beyond
the class learning.
Outcome achieved
beyond the problem
brief
Made effective use of Made good use of class 3
class principles, principles, models and
Made some use of Poorly applied
models and theories. theories Some creative
Application of class principles, Made limited use of class
Also used creativity ideas were explored to
class learning in models and theories class principles, principals,
to find effective find desired outcome
problem solving No creative ideas or models and theories models and
results appropriate but within the
models explored theories
to industry beyond framework of class
class learning. learning
Queries Excellent 2
Poor or no
response to Good response to Satisfactory response Limited response
Response to response to
comments and questions and to questions and to questions and
Class / questions and
discussion with discussions with some discussions with discussions with
Examiners did not
appropriate content connection made to limited reference to no reference to
Queries participate in
supported by theory/research theory/research theory/research
the discussions.
theory/research
Has not 4
Provides limited
Provides detailed and Provides adequate and provided
Provides appropriate and somewhat
appropriate mostly appropriate appropriate
Conclusions conclusion for the appropriate
conclusion for the conclusions for the conclusions for
problem statement conclusions for the
problem statement problem statement the problem
problem statement
statement.
Total 13/20
Finding new The newly The newly The newly discovered The newly No new 5
processes / discovered discovered processes processes / models / discovered processes /
models / processes / models / models / approaches have processes / models models /
approaches / approaches are of approaches are of limited application but / approaches has approaches
good quality and appropriate quality relevant to the restricted were identified
relevant but limited relevance problem application
Proposing ideas Various ideas and Various ideas and Some ideas or Few ideas have No ideas or 3
and innovative innovative solutions innovative solutions innovative solutions been proposed innovative
solutions in terms have been proposed have been proposed have been proposed solutions have
of processes / and their application as well as the outline but the process of been proposed
models / have been clearly of the process to applying them hasn't
approaches and outlined apply them been specified
how they can be
applied to solve
the problem on
hand
Using creativity Wherever necessary Creativity techniques Creativity techniques Creativity Creativity 2
techniques to creativity techniques are frequently are utilized at times in techniques are technique are
provide and are utilized to utilized in more than less than 50% of the used a few times not utilized to
reason good ideas analyse and solve the 50% of the occasions occasions only analyse and
which are original problem solve the
and problem
unconventional
Finding Constraints and weak Constraints and weak A critical analysis is Only a description No constraints 3
constraints and points are are identified undertaken of the working or weak points
weak points in understood process and have been
existing processes methods are identified.
/ models / provided
approaches or
methods
Total 13/20
Assessment framework for SEE (Theory) – 100 Marks / 3 hours (Reduced to 60 marks)
Section-4
7.a) 4
b)
8.a)
b)
Section-5
9.a) 5
b)
10.a)
b)
c)
Section-2 (Practical) - 20 marks
3)
4)
Introduction:
With technological advances, the future is set to be highly competitive and agility is the need of the
hour. With cloud computing, organizations can save money on storage, servers and management
services, as these services can be moved to the cloud with minimum cost, making your operations
more efficient. The cloud offers businesses more flexibility overall versus hosting on a local server.
And, for need of extra bandwidth, a cloud-based service can meet that demand instantly, rather than
undergoing a complex (and expensive) update to your IT infrastructure.
This specialisation course is taught in Bootcamp mode. Bootcamps are 12 weeks, intense learning
sessions designed to prepare you for the practical world – ready for either industry or becoming an
entrepreneur. You will be assisted through the course, with development-based assessments to
enable progressive learning.
This course will teach you Fundamentals of cloud computing Architecture, Compute instances, High
Availability and Scalability in Cloud, Databases, Cloud Storage Service, DNS Services and Content
Delivery, Serverless Computing, Container Services, Monitoring & Auditing and Cloud
Security. Details of the curriculum is presented in the sections below.
Note: Faculty and students are free to choose any two open public cloud available such as Amazon
Web Services (AWS), Microsoft Azure or Google Cloud Platform (GCP) etc. to implement the
activities as suggested in the detailed curriculum.
Pre-requisite
Before the start of this specialisation course, you would have completed the following courses;
In the 1st year of study, you would have studied Engineering Mathematics, Communication Skills,
Computer Aided Engineering Graphics, Statistics & Analysis, Basic IT Skills, Fundamentals of
In the 2nd year of study, you would have studied Python Programming, Computer Hardware,
Maintenance and Administration, Computer Networks, Database System Concepts and PL/SQL,
Data Structures with Python, Operating System and Administration, Object oriented programming
and Design with Java, Software Engineering principles and practices.
In this year of study, you shall be applying your previous years learning along with specialised field
of study into projects and real-world applications.
A Course Cohort Owner is a faculty from the core discipline, who is fully responsible for one
specialised field of study and the cohort of students who have chosen to study that specialised field
of study.
CO3 Design, build and deploy a cloud native application using public cloud services and APIs
CO4 Adopt Cloud security policies, Monitor and troubleshoot basic issues in Cloud services
- Lab - Role-based assignments (Reader Role, - Lab - Azure AD- Assigning a Azure AD role
Resource group level, Subscription level, - Azure AD Custom Domains
Contributor Role, User Access Administrator - Self Service Password Reset
Role) - Lab on self-service password reset
- MFA or 2FA
- Lab - MFA on per user basis
- Installing Powershell
- Conditional Access Policies
- Quick look at a couple of commands
- Lab - Conditional Access Policies
1,3, - Installing Azure Powershell
1 4 1 2
4 - Azure Powershell and Azure CLI
- Installing Azure CLI
- What is Powershell
- Azure CLI Hands on
- Create a EC2 instance with EC2 user data - EC2 Placement groups
- EC2 instance types basics - Lab - EC2 Placement groups
- Security groups and classic ports - Elastic Network Interface (ENI) Overview
- Lab - Security Groups - Lab - ENI
- How to SSH to EC2 Instance - EC2 Hibernate
- EC2 Instance Connect - Lab - EC2 Hibernate
- EC2 Instance Roles Demo - EC2 Advance concepts (Nitro, vCPU,
Capacity Reservations)
- EBS Overview
Azure Virtual Machines
- Lab - EBS
- The Virtual Machine Service
- EBS Snapshots
- Deploying a Virtual Machine
- Lab - EBS Snapshots
- Lab - Building a Windows Virtual Machine
- AMI Overview
- Connecting to the Virtual Machine
- Lab - AMI
- Lab - Installing IIS
2,3 - EC2 Instance Store
2,5 3 1 4 3
,4 - State of the Virtual Machine
- EBS Volume Types
- Lab - State of the Virtual Machine
- EBS Multi-Attach
- Lab - Building a Linux Virtual Machine
- EBS Encryption
- Lab - Deploying a web server on the Linux
- EFS
virtual machine
- Lab - EFS
- EFS vs EBS
5 CIE 1 – Written and Practice Test Assessment Review and corrective action 3
1 4 6 2 3 Weekly Assignment
Computing Instances
- Cloud Networking
- Introduction
2,3 Peer review
4 2 1 4 - CIDR, Private vs Public IP 2 1
,4
- Subnet Overview
- Networking - VPC
5 CIE 2 – Written and Practice Test Assessment Review and corrective action 3
2,3
2,5 6 High Availability and Scalability 2 3 Weekly Assignment
,4
Peer review Cloud Storage Service
2,3 2,3
6 1 4 1 2
,5 ,4 Mini Project Activity – Status review - AWS Storage Services
5 CIE 3 – Written and Practice Test Assessment Review and corrective action 3
2,3 2,3
6 Container Services 2 3 Weekly Assignment
,5 ,4
Monitoring and Auditing
- AWS Monitoring
12
Data Collection 2
- Frequency of data
- Flow characteristics of data (Streaming,
- Apache Hadoop
Transaction, Batch processing)
- HDFS
1,2, 2,3, - Data Cleaning or Data Cleansing
2 2 2 1
3 4 Install big data solution softwares like MangoDB,
1. Consider a local big-data source, identify
Hadoop Mapreduce or any other software
the frequency, flow of data.
2. Cleanse (eg: remove duplicates, formatting
mistakes, organize) the data based on
1,2, - Transformation 3
3,4, - Data Access
- Data acquisition
5
- Integration - update patterns (e.g. bulk, transactional,
in a big-data solution DB (like MangoDB) access patterns (e.g. sequential vs. random access,
continuous usage vs.ad hoc)
Storage and Data Management
2,3,
3 2 2 1. Calculate efficiency of different big-data
4,6 - Storage Solutions based on
solutions during a. bulk b. transactional c.
- cost and efficiency
micro-batch updates
- latency and durability characteristics 2. Calculate efficiency of different big-data
1. Compare multiple big-data solutions solutions during a. sequential vs. random
based on a. Cost and Efficiency b. Latency access b. continuous usage vs ad hoc
and durability
Project
a) Identification of the problem statement
Internship (from at least 3 known problems) the students
a) Secondary research on various
industries and their operations to identify would like to work as part of the project –
at least 3 companies along with the areas either as provided by faculty or as identified by
of work interest and develop an internship
plan that clearly highlights expectations the student. Document the impact the project
from the industry during the internship. will have from a technical, social and business
1 b) Design and develop a cover letter for
2,3, perspective. 4 11
13 to an internship request to all 3 identified 2 4 19
4,6
4 companies and the resume to be submitted b) Design and develop the project solution
to potential companies.
Prepare for an internship interview to or methodology to be used to solve at least one
highlight your interests, areas of study, of the problems identified.
career aspirations and personnel
competence – including the areas of Prepare a project plan that will include a
learning you expect to learn during schedule, WBS, Budget and known risks along
internship.
with strategies to mitigate them to ensure the
project achieves the desired outcome.
**Note: Saturday session from 9 AM -2 PM
Duration
CIE Assessment Assessment Mode Max Marks
In hours
1 Case submission 20
2 Case presentation 20
3 Case innovation 20
4 Result 20
5 Viva voce 20
Total 100
Well documented,
Comments on reasoned and Appropriate, well
effective solutions pedagogically thought out
Superficial and / or Little and/or
/ strategies (The appropriate comments about
inappropriate solutions inappropriate No action to all
solution may be in comments on solutions, or
to some of the issues solutions to all of the issues in the 2
the problem solutions, or proposals for
in the problem issues in the problem problem statement
statement already proposals for solutions, to most of
statement statement
or proposed by solutions, to all the issues in the
you) issues in the problem statement
problem statement
Excellent research
Links to course into the issues with Good research and
Limited research and Incomplete research
learning and clearly documented documented links to No research or links
documented links to and links to any 3
additional links to course the materials read to any reading
any readings reading.
research learnings and during the course
beyond.
Total 14/20
Evaluation Student
5 4 3 2 1
Parameters Score
Clear flow of
ideas Most ideas flow Hard to
Very clear and concise No flow in
but is lost at follow the
flow of ideas Demonstrates the
times Limited flow of
Demonstrates passionate interest in the presentation
Delivery & Enthusiasm evidence of ideas Lack 4
interest in the topic and topic and Poor
interest in and of
engagement with class / engagement presentation
examiner engagement enthusiasm
with class / skills
with the topic and interest
examiner
Limited
use of Poor visuals used
Visuals augmented
Use of visuals and some visuals
and extended visuals
Visuals related to the No use of visuals are not easy to 2
comprehension of the loosely
topic understand its
issues in unique ways related to
relevance.
the topic
Uses stage
effects such as
Uses stage effects props, sound Limited use of
such as props, sound effects, and stage effects
effects, and speech speech and/or used in a
modulation in a modulation in manner that did
No use of stage Poor stage effects
Staging unique and dramatic an effective not enhance the 5
effects usage
manner that enhances manner to understanding
the understanding of extend the of the issues in
the issues in the understanding the problem
problem statement. of the issues in statement.
the problem
statement.
Total 14/20
supported by participate in
theory/research the discussions.
Has not 4
Provides limited
Provides detailed and Provides adequate and provided
Provides appropriate and somewhat
appropriate mostly appropriate appropriate
Conclusions conclusion for the appropriate
conclusion for the conclusions for the conclusions for
problem statement conclusions for the
problem statement problem statement the problem
problem statement
statement.
Total 13/20
Assessment framework for SEE (Theory) – 100 Marks / 3 hours (Reduced to 60 marks)
5.a) 3
b)
6.a)
b)
Section-4
7.a) 4
b)
8.a)
b)
Section-5
9.a) 5
b)
10.a)
b)
Introduction:
Welcome to the curriculum for the Artificial Intelligence and Machine Learning (AI&ML)
Specialisation. This specialisation course is taught in Bootcamp mode. Bootcamps are 13 weeks,
intense learning sessions designed to prepare you for the practical world – ready for either industry
or becoming an entrepreneur. You will be assisted through the course, with development-based
assessments to enable progressive learning.
In the era of connected computing devices, securing the personal data, application, system, network
and organization becomes the challenging task in the field of Computer science and Engineering.
The specialization prepare students to take up job or to become entrepreneur in the challenging
area of Cyber security
Pre-requisite
Before the start of this specialisation course, you would have completed the following courses;
In the 1st year of study, you would have studied Engineering Mathematics, Communication Skills,
Computer Aided Engineering Graphics, Statistics & Analysis, Basic IT Skills, Fundamentals of
Computer, Fundamentals of Electrical and Electronics Engineering, Project Management skills and
Multimedia & Animation.
In the 2nd year of study, you would have studied Python Programming, Computer Hardware,
Maintenance and Administration, Computer Networks, Database System Concepts and PL/SQL,
Data Structures with Python, Operating System and Administration, Object oriented programming
and Design with Java, Software Engineering principles and practices.
In this year of study, you shall be applying your previous years learning along with specialised field
of study into projects and real-world applications.
A Course Cohort Owner is a faculty from the core discipline, who is fully responsible for one
specialised field of study and the cohort of students who have chosen to study that specialised field
of study.
Test, implement, deploy, maintain and review the infrastructure to effectively manage the
CO4
network and resources.
Recap –
Topology Hackers
OSI Model Who are they?
TCP/IP Model What is not hacking
Cryptanalysis (brute force over keys, birthday - Design a toy crypto algorithm like key
attacks on hash functions, hardness of generation + encryption + decryption / digital
factoring integers, discrete log problem, side- signature / hash function
channel attacks – high level overview)
• https://nptel.ac.in/courses/106105031/ : Cryptography and Network Security by Prof. Debdeep Mukhopadhyay, IIT Kharagpur
Network Security : Concepts- Firewall, IDS, IPS, Protocols : IPSec, SSL, TLS (versions and
2,3,
2,3 2 2 2 1 2
4 VPN vulnerabilities)
Web Security : Concepts-HTTP, HTML, Frames, Attacks and vulnerabilities: Injection attacks :
5 1,4 3 2 2 SQL, HTTP header, OS command 1 2
browser design
5 CIE 1 : Written and practice test Assessment Review and corrective action 3
Industrial class : High availability and load
2,3,
2,3 6 2 3 Weekly Assignment
4 balancing
References :
1. https://www.cisco.com/c/en_in/products/security/what-is-network-security.html
2. https://purplesec.us/firewall-penetration-testing/
3. How hackers do it: Tricks, Tools, and Techniques
4. https://cse29-iiith.vlabs.ac.in/
5. https://nptel.ac.in/courses/106105031/ : Cryptography and Network Security by Prof. Debdeep Mukhopadhyay, IIT Kharagpur.
6. https://wiki.apnictraining.net/netsec-20220627-bdnog14/agenda
Windows Security
Peer review
Windows Security Infrastructure
2,3, 2,3, 1 Project status review
4 4 2 1
5 4 Windows Family of Products
Demonstration of artifacts of the project
Windows Workgroups and Accounts
5 CIE 2 – Written and Practice Test Assessment Review and corrective action 3
Industrial class : Source Code Scan using a
2,3, 2,3,
6 commercial tool like Microfocus Fortify or 2 3 Weekly Assignment
5 4
Checkmarz.
Peer review Application Security – Verification.
2,3, 2,3,
6 1 4 3
5 4 Project status review
References:
1. https://www.synopsys.com/glossary/what-is-sdlc.html
2. https://www.synopsys.com/blogs/software-security/secure-sdlc/
3. https://www.microsoft.com/en-us/securityengineering/sdl
4. https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
5. https://www.microsoft.com/en-in/download/details.aspx?id=49168
6. https://medium.com/@melsatar/software-development-life-cycle-models-and-methodologies-297cfe616a3a
7. https://owasp.org/www-project-application-security-verification-standard/
8. https://resources.infosecinstitute.com/topic/application-architecture-review/
9. https://owasp.org/www-community/controls/Static_Code_Analysis
10. https://owasp.org/www-project-web-security-testing-guide/
11. https://owasp.org/www-project-zap/
12. https://owasp.org/www-project-dependency-check/
13. https://www.synopsys.com/glossary/what-is-software-composition-analysis.html
14. https://owasp.org/www-project-samm/
15. https://github.com/tillson/git-hound
16. https://owasp.org/www-project-security-qualitative-metrics/
17. https://www.qualys.com/apps/web-app-scanning/
18. https://www.veracode.com/security/interactive-application-security-testing-iast
19. https://en.wikipedia.org/wiki/Runtime_application_self-protection
20. https://en.wikipedia.org/wiki/ModSecurity
21. https://github.com/WebGoat/WebGoat
22. https://spectralops.io/resources/how-to-choose-a-secret-scanning-solution-to-protect-credentials-in-your-code/
23. https://www.geeksforgeeks.org/functional-vs-non-functional-requirements/
24. https://owaspsamm.org/model/design/threat-assessment/stream-a/
25. https://docs.42crunch.com/latest/content/concepts/security_quality_gates.htm
Basics of cloud computing
Why is cloud computing necessary?
Introduction to key cloud services (Compute,
storage, networking)
Cloud delivery models
Peer review IaaS v/s PaaS v/s SaaS
2,3, Project status review Introduction to cloud vendors(Azure,AWS, GCP)
7 3,4 1 4 3
4
Key Cloud Security Principles
Shared responsibility model
Principle of least privilege
Defense in depth
Threat actors, diagrams & trust boundaries
Practice :
Intro to VAPT
Peer review Developing a Hacker Mindset
2,3, Project status review • Ethics of Penetration Testing
3,4 1 4 1 2
4
• Goal of Penetration Testing
• Thinking like a Hacker
ATT&CK Framework Overview
Introduction to the framework
Deep dive into the key topics
○ Reconnaissance
2,3,
3,4 2 4 Contd.. 3
4 ○ Initial Access
○ Privilege Escalation
8
○ Lateral Movement
○ Exfiltration
Web Application Penetration Testing
● Basics of Web
2,3, ○ HTTP Methods 4 Contd..
3,4 3 3
4
○ HTTP Requests & Response
Session management & Cookies
5 CIE 3 – Written and Practice Test Assessment Review and corrective action 3
Industrial class :
How penetration testing is used in
2,3, companies to improve their Security
3,4 6 Weekly Assignment
4
posture
Fundamentals
· CIA
· Threat Actors
· Different kinds of hackers Network
· Different kinds of teams – Blue, Red,
Purple · Quick revision of OSI model,
· Criminal Groups encapsulation, IP, Subnets, TCP/UDP, well
· Hactivist Groups
· APT known ports, TCP/IP, Layer 2
· Attack Vectors Network Protocols
· Protect/Prevent
· Detect/Respond · Quick revision of SMTP, HTTP,
2,3, · Trust Positive vs False Positive HTRPS/TLS, DNS
3,4 2 1 3 1 2
4
Data Web technologies
· Bits and Bytes · Quick revision of DOM, CSS, Javascript,
· Charter Encoding (ASCII, UTF-
8,Base64) Ajax, MVC, Databases, SQL
· File Magic Bytes, Hashes Authentical protocols
· Imphash
· Ssdeep · Quick revision of Kerberos, SAML,
OpenID, OAuth
Windows & Linux
- · Quick revision on basic commands,
important files and directories, windows
registry and processes, Audit in Linux
Understanding the tools and products used in
any organization
2,3, · Firewall, load balancers, proxy, email Continued..
3,4 3 1 3 3
4
infrastructure, IDS, DNS, Ani-virus, Content
Delivery Solutions, Malware Protection System,
· Virus total
· Dynamic File analysis
5 CIE 4 – Written and Practice Test Assessment Review and corrective action 3
Industrial class : Handling Internal and
external incidents Complexity of Incident
2,3,
3,4 6 Weekly Assignment
4 management
Demo of real world SOC
References :
1. https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf
2. https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management
https://www.infotech.com/research/ss/develop-and-implement-a-security-incident-management-program
Lab : https://letsdefend.io
GRC
(a) 1) Definition of GRC, introduction to IT
governance
Peer review
(b) 2) Importance of GRC in cyber security
3,4, 2,3, Project status review 4
11 1 1 2
5 4 (c) 3) Policies, processes and procedures
(d) 4) Importance of checklists, templates and
guidelines
Enterprise risk management
Introduction to standards/best
(a) Security organization, Responsibilities
practices/framework and its primary
and authority, Management/Board
4 objective, 4 1 2
responsibilities on cyber security,
Resource allocation and cyber security budget
ISO 27001, COBIT, PCI-DSS, Hi-Tech (HIPAA),
management, Security Education, training and
NIST, IT Act 2000 (amendment in 2008), CERT-
awareness, Cyber metrics, KRI/KPIs
IN Guidelines.
Regulatory requirements
(e) GDPR
5) https://www.pcisecuritystandards.org/documents/PCI_DSS-QRG-v3_2_1.pdf
6) https://www.nist.gov/
7) https://www.isaca.org/resources/cobit
8) https://www.meity.gov.in/writereaddata/files/itact2000/it_amendment_act2008.pdf
9) https://www.coso.org/SitePages/Guidance-on-Enterprise-Risk-Management.aspx?web=1
10) https://rbidocs.rbi.org.in/rdocs/notification/PDFs/NT41893F697BC1D57443BB76AFC7AB56272EB.PDF
11) https://rbidocs.rbi.org.in/rdocs/notification/PDFs/LBS300411F.pdf
1) https://rbidocs.rbi.org.in/rdocs/notification/PDFs/NOTI129BB26DEA3F5C54198BF24774E1222E61A.PDF
14) https://www.sebi.gov.in/legal/circulars/dec-2018/cyber-security-and-cyber-resilience-framework-for-stock-brokers-depository-
participants_41215.html
15) https://www.sebi.gov.in/sebiweb/home/HomeAction.do?doListing=yes&sid=1&ssid=6&smid=0
16) https://www.aicofindia.com/AICEng/General_Documents/Notices%20And%20Tenders/IRDAI-GUIDELINES.pdf
17) https://www.irdai.gov.in/ADMINCMS/cms/whatsNew_Layout.aspx?page=PageNo4315&flag=1
18) https://www.rapid7.com/fundamentals/patch-management/
19) https://www.rapid7.com/fundamentals/vulnerability-management-and-scanning/
1)18. https://www.techtarget.com/searchsecurity/tip/IT-security-frameworks-and-standards-Choosing-the-right-one
21) https://www.irdai.gov.in/ADMINCMS/cms/Uploadedfiles/07.04.2017-
Guidelines%20on%20Information%20and%20Cyber%20Security%20for%20insurers.pdf
https://www.trai.gov.in/sites/default/files/RecommendationDataPrivacy16072018_0.pdf
Peer review 2
3,4, 2,3, 4 DevOps and Security Challenges
12 1 1
5 4 Project status review
5 CIE 5 – Written and Practice Test Assessment Review and corrective action
6 Industry Class : 2 3
13 1 Internship Project
Duration
CIE Assessment Assessment Mode Max Marks
In hours
Week 3 CIE 1– Written and practice test 4 30
Week 5 CIE 2– Written and practice test 4 30
Week 8 CIE 3– Written and practice test 4 30
Week 10 CIE 4– Written and practice test 4 30
Week 12 CIE 5– Written and practice test 4 30
Week 13 Assessment for Project or Internship 4 30
On line Course work (At least one related to the specialization) 30
Department of Collegiate & Technical Education Bengaluru-560001 Page 140
Diploma in Computer Science & Engineering C 20 : 2020 - 21
1 Case submission 20
2 Case presentation 20
3 Case innovation 20
4 Result 20
5 Viva voce 20
Total 100
Evaluation
5 4 3 2 1 Student Score
Parameters
Identifies and Identifies and
Identifies and Identifies and Identifies limited
Identification of understands all understands most of
understands some of understands a few issues
the main the main issues in the main issues in 5
the issues in the of the issues in the in the problem
issues / problem the problem the problem
problem statement problem statement statement
statemen statement
Well documented,
Comments on reasoned and
Appropriate, well
effective solutions pedagogically
thought out Little and/or
/ strategies (The appropriate Superficial and / or
comments about inappropriate No action to all
solution may be in comments on inappropriate solutions
solutions, or proposals solutions to all of the issues in the 2
the problem solutions, or to some of the issues in
for solutions, to most issues in the problem problem statement
statement already proposals for the problem statement
of the issues in the statement
or proposed by solutions, to all
problem statement
you) issues in the
problem statement
Excellent research
Links to course into the issues with Good research and
Limited research and Incomplete research
learning and clearly documented documented links to No research or links
documented links to and links to any 3
additional links to course the materials read to any reading
any readings reading.
research learnings and during the course
beyond.
Total 14/20
Evaluation Student
5 4 3 2 1
Parameters Score
Clear flow of
ideas Most ideas flow Hard to
No flow in
Very clear and concise flow of but is lost at follow the
Demonstrates the
ideas Demonstrates times Limited flow of
interest in the presentation
Delivery & Enthusiasm passionate interest in the evidence of ideas Lack 4
topic and Poor
topic and engagement with interest in and of
class / examiner engagement presentation
engagement enthusiasm
with class / skills
with the topic and interest
examiner
Limited
use of Poor visuals used
Visuals augmented and
Use of visuals and some visuals
extended comprehension visuals
Visuals related to the No use of visuals are not easy to 2
of the issues in unique loosely
topic understand its
ways related to
relevance.
the topic
Uses stage
effects such as
props, sound Limited use of
Uses stage effects such as
effects, and stage effects
props, sound effects, and
speech and/or used in a
speech modulation in a
modulation in manner that did
unique and dramatic No use of stage Poor stage effects
Staging an effective not enhance the 5
manner that enhances the effects usage
manner to understanding
understanding of the
extend the of the issues in
issues in the problem
understanding the problem
statement.
of the issues in statement.
the problem
statement.
Total 14/20
reasoning beyond
the class learning.
Outcome achieved
beyond the problem
brief
Made effective use of Made good use of class 3
class principles, principles, models and
Made some use of Poorly applied
models and theories. theories Some creative
Application of class principles, Made limited use of class
Also used creativity ideas were explored to
class learning in models and theories class principles, principals,
to find effective find desired outcome
problem solving No creative ideas or models and theories models and
results appropriate but within the
models explored theories
to industry beyond framework of class
class learning. learning
Queries Excellent 2
Poor or no
response to Good response to Satisfactory response Limited response
Response to response to
comments and questions and to questions and to questions and
Class / questions and
discussion with discussions with some discussions with discussions with
Examiners did not
appropriate content connection made to limited reference to no reference to
Queries participate in
supported by theory/research theory/research theory/research
the discussions.
theory/research
Has not 4
Provides limited
Provides detailed and Provides adequate and provided
Provides appropriate and somewhat
appropriate mostly appropriate appropriate
Conclusions conclusion for the appropriate
conclusion for the conclusions for the conclusions for
problem statement conclusions for the
problem statement problem statement the problem
problem statement
statement.
Total 13/20
Finding new The newly The newly The newly discovered The newly No new 5
processes / discovered discovered processes processes / models / discovered processes /
models / processes / models / models / approaches have processes / models models /
approaches / approaches are of approaches are of limited application but / approaches has approaches
good quality and appropriate quality relevant to the restricted were identified
relevant but limited relevance problem application
Proposing ideas Various ideas and Various ideas and Some ideas or Few ideas have No ideas or 3
and innovative innovative solutions innovative solutions innovative solutions been proposed innovative
solutions in terms have been proposed have been proposed have been proposed solutions have
of processes / and their application as well as the outline but the process of been proposed
models / have been clearly of the process to applying them hasn't
approaches and outlined apply them been specified
how they can be
applied to solve
the problem on
hand
Using creativity Wherever necessary Creativity techniques Creativity techniques Creativity Creativity 2
techniques to creativity techniques are frequently are utilized at times in techniques are technique are
provide and are utilized to utilized in more than less than 50% of the used a few times not utilized to
reason good ideas analyse and solve the 50% of the occasions occasions only analyse and
which are original problem solve the
and problem
unconventional
Finding Constraints and weak Constraints and weak A critical analysis is Only a description No constraints 3
constraints and points are are identified undertaken of the working or weak points
weak points in understood process and have been
existing processes methods are identified.
/ models / provided
approaches or
methods
Total 13/20
Assessment framework for SEE (Theory) – 100 Marks / 3 hours (Reduced to 60 marks)
Section-4
7.a) 4
b)
8.a)
b)
Section-5
9.a) 5
b)
10.a)
b)
c)
Section-2 (Practical) - 20 marks
3)
4)