0% found this document useful (0 votes)
115 views151 pages

C 20 5 6 Sem CSE

Uploaded by

apurvap447
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views151 pages

C 20 5 6 Sem CSE

Uploaded by

apurvap447
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 151

SCHEME OF STUDIES

DIPLOMA IN COMPUTER SCIENCE &


ENGINEERING
(C-20)

Department of Collegiate & Technical Education Bengaluru-560001 Page 1


CURRICULUM STRUCTURE
V Semester Scheme of Studies - Diploma in Computer Science and Engineering [C-20]
Sl. SEE

Total contact

Min Marks for

(including CIE
Hours per CIE

Total Marks
No

Department
Marks

Grade Point
/Semester

SGPA and
Assigned
Category /

Credits

Passing

marks)
Course Semester Marks

Grade

CGPA
Teaching

hrs
Pathway Title Theory Practical

Course
Code
L T P Max Min Max Min Max Min

Programme Specialization Pathway


20CS51I 1. Artificial Intelligence and
CSE 104 52 312 468 24 240 96 60 24 100 40 400 160
Machine Learning
Specialization
pathways in 20CS52I 2. Full Stack Development
emerging areas 104 52 312 468 24 240 96 60 24 100 40 400 160
1
Student may
20CS53I 3. Cloud Computing
select any one 104 52 312 468 24 240 96 60 24 100 40 400 160
of the
20CS54I 4. Cyber Security
specializations 104 52 312 468 24 240 96 60 24 100 40 400 160

Both SGPA & CGPA


Science and Research Pathway
Hours per

Total Marks

Grade Point
/Semester
Category /

marks)
for Passing
CIE Marks SEE Marks (Theory)

Min Marks
Departme

(including
Assigned
Semester
Teaching

contact
Credits
Course

Grade
Total

hrs
Higher Education Pathway
Course

Code L T P Max Min Max Min

CIE
nt

BS/SC
20SC51T
Paper 1 – Applied
Specialization 52 26 0 78 6 50 20 50 20 100 40
Mathematics
pathway in
2 Science and 20SC52T Paper 2 – Applied Science 52 - 52 104 6 50 20 50 20 100 40
Research
20RM53T Paper 3 – Research
(Student need Methodology 52 - 52 104 6 50 20 50 20 100 40
to take all four
20TW54P Paper 4 – Technical Writing 39 13 52 104 6 60 24 40 16 100 40
papers in this
pathway) Total 195 39 156 390 24 210 84 190 76 400 160
Entrepreneurship and Start up Pathway

20ET51I Entrepreneurship and Start-


3 ES/ CSE up 104 52 312 468 24 240 96 160 64 400 160

L:- Lecture T:- Tutorial P:- Practical BS- Basic Science:: ES-Engineering Science:: SC: Science , I: Integrated :: CS: Computer Science and Engineering

Note : In 5th Semester student need to select any one of the pathways consisting of 24 credits
Department of Collegiate & Technical Education Bengaluru-560001 Page 2
VI Semester Scheme of Studies - Diploma in Computer Science and Engineering [C-20]
Hours per CIE SEE

Departmen

for Passing

CIE marks)
contact hrs

Min Marks

(including
Category /

SGPA and
/Semester

Assigned
Semester Marks Marks

Pathway

Credits
Teaching

Marks

Grade
Grade
Course

Point

CGPA
Total
Course

Course
Code

Total
L T P Max Min Max Min

t
Internship/Project

Both SGPA &


Internshi

CGPA
40 Hours / week
ES/CSE 20CS61P Internship / Project 640 16 240 96 160 64 400 160
p

Total 16 Weeks

P: Project/Internship

Department of Collegiate & Technical Education Bengaluru-560001 Page 3


Artificial Intelligence
and
Machine Learning

Department of Collegiate & Technical Education Bengaluru-560001 Page 4


Diploma in Computer Science & Engineering
Program Computer Science & Semester 5
Engineering
Course Code 20CS51I Type of Course L:T:P (104:52:312)
Course Name Artificial Intelligence and Credits 24
Machine Learning
CIE Marks 240 SEE Marks 160
Introduction:

Welcome to the curriculum for the Artificial Intelligence and Machine Learning (AI&ML)
Specialisation. This specialisation course is taught in Bootcamp mode. Bootcamps are 12 weeks,
intense learning sessions designed to prepare you for the practical world – ready for either industry
or becoming an entrepreneur. You will be assisted through the course, with development-based
assessments to enable progressive learning. In this course, you’ll learn how to produce a computer-
assisted solution when data is too complex for humans to find answers as they combine both data
science and machine learning skills that are needed for today’s job market.

Some common examples include; Amazon Alexa - converting spoken audio into language; Google
Image Search – uses image recognition to return specific search results; Samsung Smart Fridges –
uses data and machine learning to produce intuitions about your behaviour. Leading to the
successful completion of this bootcamp, you shall be equipped to either do an internship at an
organization working in AI or do a project in AI. After the completion of your Diploma, you shall be
ready to take up roles like Machine Learning Engineer, Data Scientist, Data Analyst, and more.

This course will teach you Fundamentals of AI, Python and Python libraries, data visualization,
machine learning models, maths like linear algebra, data interpretation, deep learning, Version
control system, cloud deployment and more. Details of the curriculum is presented in the sections
below.

Pre-requisite

Before the start of this specialisation course, you would have completed the following courses;

In the 1st year of study, you would have studied Engineering Mathematics, Communication Skills,
Computer Aided Engineering Graphics, Statistics & Analysis, Basic IT Skills, Fundamentals of
Diploma in Computer Science & Engineering C 20 : 2020 - 21

Computer, Fundamentals of Electrical and Electronics Engineering, Project Management skills and
Multimedia & Animation.

In the 2nd year of study, you would have studied Python Programming, Computer Hardware,
Maintenance and Administration, Computer Networks, Database System Concepts and PL/SQL,
Data Structures with Python, Operating System and Administration, Object oriented programming
and Design with Java, Software Engineering principles and practices.

In this year of study, you shall be applying your previous years learning along with specialised field
of study into projects and real-world applications.

Course Cohort Owner

A Course Cohort Owner is a faculty from the core discipline, who is fully responsible for one
specialised field of study and the cohort of students who have chosen to study that specialised field
of study.

Guidelines for Cohort Owner


1. Each Specialized field of study is restricted to a Cohort of 20 students which could include
students from other relevant programs.
2. One faculty from the Core Discipline shall be the Cohort Owner, who for teaching and
learning in allied disciplines can work with faculty from other disciplines or industry experts.
3. The course shall be delivered in boot camp mode spanning over 12 weeks of study, weekly
developmental assessments and culminating in a mini capstone.
4. The industry session shall be addressed by industry subject experts in the discipline only.
5. The cohort owner shall be responsible to identify experts from the relevant field and
organize industry session as per schedule.
6. Cohort owner shall plan and accompany the cohort for any industrial visits.
7. Cohort owner shall maintain and document industrial assignments, weekly assessments,
practices and mini project.
8. The cohort owner shall coordinate with faculties across programs needed for their course to
ensure seamless delivery as per time table
9. The cohort owner along with classroom sessions can augment or use supplementally
teaching and learning opportunities including good quality online courses available on
platforms like Karnataka LMS, Infosys Springboard, NPTEL, Unacademy, SWAYAM , etc.

Department of Collegiate & Technical Education Bengaluru-560001 Page 6


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Course outcome: A student should be able to


CO1 Explain the concept of AI, its applications, constituents and challenges of ethics in AI.

CO2 Analyze and visualize any given dataset

CO3 Evaluate, optimize, build and test an AI model for a given requirement

CO4 Perform comparative analysis of methods or algorithms for a given requirement

CO5 Select the appropriate tools, production environment and deploy the model.

Department of Collegiate & Technical Education Bengaluru-560001 Page 7


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Detailed course plan


Wee Da
CO PO 1st session (9am to 1 pm) L T P 2ND session (1.30pm to 4.30pm) L T P
k ys
- AI influence in companies viz, Amazon,
Microsoft, Google, IBM
- Latest developments in AI domain
- Google's DeepMind AI Just Taught Itself To
Walk - YouTube
- Introducing Amazon Go and the world’s
most advanced shopping technology -
1. AI based movie (Screening)
1 1 1 4 2 1
YouTube
- IBM Watson
- Understanding the evolution of AI and HMI
1
(human machine interface)
- Discussion on how AI will Impact of daily life,
work life, work force, jobs, products and
services – T
Fundamentals of AI
- What is artificial intelligence? - Significance of data in AI

- How AI works - AI Software Development life cycle


1 1 2 3 1 - Compare traditional software development 2 1
- Purpose of AI
- Types of Artificial Intelligence with AI Software Development

- Goals of AI - Example – Game rules (Chess)

Department of Collegiate & Technical Education Bengaluru-560001 Page 8


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Applications of AI Explore and prepare a report on all popular AI


- Ethics in AI cloud services (ML & DL) offered by vendors - T
Examples of AI in real world - T
Why Do We Need a Version Control System?
Fundamentals of Git
Git installation and setup
Git Branching and merging
basic local Git operations
Basic
▪ creating a repository,
▪ Creating and switching to new branches
5 4 3 ▪ cloning a repository, 1 3 3
▪ Switching between branches
▪ making and recording changes
▪ Merging local branches together
▪ staging and committing changes,
▪ viewing the history of all the changes
▪ undoing changes

GitHub
- Basics of distributed git
- Account creation and configuration Create repository – named mini project-1

- Create and push to repositories Push the same to GitHub


5 4 4 1 3 3
- versioning TOC - Git Essentials: Become a Git and GitHub Ninja
| Infosys Springboard (onwingspan.com)
- Collaboration
- Migration

5 Developmental Assessment Assessment Review and corrective action 3

1 1,5 6 Real industry experience of AI 2 3 Weekly Assignment(1PM-2PM)

Department of Collegiate & Technical Education Bengaluru-560001 Page 9


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Machine Learning
- Fundamentals
- Machine learning types
- Machine learning workflow
- Machine learning applications
- Challenges in ML
- Building a model – steps involved
- Pipelines
▪ Data engineering
▪ Machine learning
1 1 1 Peer Review 4 2 1
▪ Deployment
- What is Data Science?
2
- How Data Science works?
- Data Science uses
Group discussion - Examples of ML in everyday
life / Use of Machine Learning in Daily Life
Machine Leaning Terminologies - T
TOC - Machine Learning Fundamentals | Infosys
Springboard (onwingspan.com)
Prediction – continuous value
Introduction to Cloud Computing Introduction to Containers
Essentials of Cloud Computing Cloud Native application development
1,5 1,4 2 2 2 1 2
Cloud Deployment Models Explore AI (ML and DL) services across public
Cloud Service Models cloud platforms

Department of Collegiate & Technical Education Bengaluru-560001 Page 10


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Serverless Services Note : teacher has to choose a public cloud


Major Cloud service Providers platform to perform the fallowing activities
Virtualization - Getting to know cloud platform
Explore the cloud service providers and services - Creating an account
offered by them - T

Walking through the administrative console and Essentials of cloud billing

Cloud SDK Cloud VPN

Explore Virtual machines (PaaS, Iaas and SaaS) SLA


1,5 4 3 1 3 Deploy one simple web app on web server using 1 2
and storage options
Deploy a simple application on the cloud cloud platform

AI Platform overview TOC - Essentials of Cloud Computing | Infosys


Springboard (onwingspan.com)
Big Data Python recap
- What is Big Data? Database connectivity
- Vs of Big Data
- Sources of data
- Role of Big Data in AI&ML
Python Packages for Machine Learning and Deep
1,3,
1 4 Learning 1 3 1 2
4
- Scientifics computing libraries
- Visualization Libraries
- Algorithmic libraries
Environment setup: install required packages
Explore above listed packages

Department of Collegiate & Technical Education Bengaluru-560001 Page 11


Diploma in Computer Science & Engineering C 20 : 2020 - 21

5 Developmental Assessment Assessment Review and corrective action 3


2,3 Build applications using AI cloud services
1,5 6 2 3 Weekly Assignment
,4
Explore NumPy Module
- Array Aggregation Functions
- Vectorized Operations
2,3 Peer review - Use Map, Filter, Reduce and Lambda
3 1,5 1 4 3
,4
Functions with NumPy
-
TOC - Pandas and NumPy Tips, Tricks, and
Techniques | Infosys Springboard (onwingspan.com)
Explore Pandas modules
- Aggregation and Grouping
- Time Series Operations
- Pivot and melt function
2,3
1,5 2 - Use Map, Filter, Reduce and Lambda 1 3 Contd. 3
,4
Functions with Pandas dataframes
-
TOC - Unpacking NumPy and Pandas | Infosys
Springboard (onwingspan.com)

Data visualization with python


- Visualization fundamentals - Visualizing Amounts
2,3 - Why visualization - Visualizing distributions
2,5 3 2 2 3
,4
- Coordinate Systems and Axes - Visualizing proportions

- Directory of Visualizations - Visualizing associations

Department of Collegiate & Technical Education Bengaluru-560001 Page 12


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Amounts, Distributions, Proportions, x-y - Visualizing time series


Relationships, Uncertainty
Basics of python visualization with Matplotlib
- Understand the anatomy of a figure
- Plot creation
- Plotting routines
- Basic plot customizations
- Saving plots
- Visualizing trends
- Visualizing uncertainty
- Visualizing categorical data
Basics of python visualization with Seaborn
2,3, - visualize proportions
2,5 4 1 3 The Course Overview - Viewer Page | Infosys 3
4 - visualize data on multi-plot grid
Springboard (onwingspan.com)
- Composite views for informative summaries
of data

5 CIE 1 – Written and Practice Test Assessment Review and corrective action 3
How to create project plan and product backlog
for AI project
Create Git Repository for following
1 4 6 2 3 Weekly Assignment
Regression Project - ML / deep learning
Classification Project – ML / deep learning
Clustering project – ML / deep learning

Department of Collegiate & Technical Education Bengaluru-560001 Page 13


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Natural Language Processing – ML / deep


learning
Data engineering pipeline
Peer review Data Collection
Mini Project Activity (2) - Population and sample
- Regression - Types of data
- Classification ▪ Data type (type 1 (cross sectional, time
(Individual/ Team of 2) series), type 2 (univariate,
2,3 1 - Define Problem statement (solution to be multivariate))
2 4 2 1
,4
presented at the semester end) ▪ Variable types (categorical, ordinal,
- Create project plan and product backlog ratio, interval)
- Create git repository for the project - Data Collection

4 - Work progress should be monitored Key terminologies in Statistics – T


weekly Mini Project Activity
- Data collection for the stated problem
Probability Exploratory data analysis
- Basic concepts - overview
- Conditional and Joint probability - EDA goals and benefits
- Bayes’ Theorem Univariate data analysis
2 1,3 2 2 2 1 2
Probability Distributions - Characterizing data with descriptive statistics
- Discrete - Univariate distribution plots
- Continuous - Univariate comparison plots
- Central Limit Theorem - Univariate composition plots

Department of Collegiate & Technical Education Bengaluru-560001 Page 14


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Infosys Springboard (onwingspan.com) Mini Project Activity


TOC - Probability Distribution using Python | Infosys Data Exploration and analysis for the stated problem
Springboard (onwingspan.com)
Univariate analysis tests Multivariate analysis
Hypothesis testing Finding relationship in data
2,3 Error, Test statistic, type, interpreting test
2 3 1 3 - Covariance 1 2
,4
statistics. - Correlation
Understanding p-value
Linear algebra using python
- Multivariate distribution plot
- Scalars
Multivariate comparison plot
- Vectors
Multivariate relationship plot
- Matrices
Multivariate composition plot
- Tensors
- TOC - Exploratory Data Analysis with Pandas
2,3 Gradients
2 4 4 1 2
,4 and Python 3.x | Infosys Springboard
- Eigen values and eigen vectors
(onwingspan.com)
- Norms and Eigen decomposition
Mini Project Activity – Status review
(Data Exploration and analysis for the stated TOC - Basics of Linear Algebra using Python | Infosys
Springboard (onwingspan.com)
problem) Interactive Scenario: Introduction to Vector Algebra
Using Python (oreilly.com)
5 Developmental Assessment Assessment Review and corrective action 3
2,3
2 6 Statistics and Linear algebra 2 3 Weekly assignment
,4
2,3 Peer review Data Preprocessing
5 2,5 1 4 1 2
,4

Department of Collegiate & Technical Education Bengaluru-560001 Page 15


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Importance of data preprocessing


Mini Project Activity – Status review Data cleaning
- Assess Data quality
- Data anomalies
- Detect missing values with pandas dataframe
functions: .info() and .isna()
- Diagnose type of missing values with visual
and statistical methods (eg. chi-squared test of
independence)
Approaches to deal with missing values
▪ Keep the missing value as is
▪ Remove data objects with missing values
▪ Remove the attributes with missing values
▪ Estimate and impute missing values
Practice: Dealing with missing values with Dealing with outliers
different approaches
- Do nothing

Outliers - Replace with the upper cap or lower

Detecting outliers cap


2,3
2,5 2 1 3 3
,4 ▪ univariate outlier detection - Perform a log transformation

▪ bivariate outlier detection - Remove data objects with outliers

▪ Time series outlier detection Practice: Dealing with outliers with different
approaches

Department of Collegiate & Technical Education Bengaluru-560001 Page 16


Diploma in Computer Science & Engineering C 20 : 2020 - 21

TOC - Data Preprocessing | Infosys Springboard


(onwingspan.com)
TOC - Data Cleaning and Transformation | Infosys
Springboard (onwingspan.com)

Data reduction
Data Integration - Distinction between data reduction and data
- Overview redundancy
- data integration challenges - Objectives
2,3 3 - Approaches - Methods
2,5 1 3 1 2
,4
- Adding attributes o numerosity data reduction
- Adding data objects o dimensionality data reduction
Practice: data integration Practice: Data reduction with numerosity data
reduction method
Data transformation
Need for data transformation.
- Normalization
Data transformation with
- Standardization
2,3 - ranking transformation
2,5 4 1 3 3
,4 Data transformation with
- discretization
- binary coding
- ranking transformation
- discretization

5 CIE 2 – Written and Practice Test Assessment Review and corrective action 3

Department of Collegiate & Technical Education Bengaluru-560001 Page 17


Diploma in Computer Science & Engineering C 20 : 2020 - 21

2,3
2,5 6 Feature engineering 2 3 Weekly Assignment
,4
Data Splitting
Importance of data splitting
- Training set
- Validation set
Peer review
- Testing set
2,3 2,3 Mini Project Activity – Status review
1 4 1 2
,5 ,4 Underfitting and overfitting
Practice : split training and testing data sets in
Python using train_test_split() of sci-kit learn.
Explore the options of train_test_split()

Machine Learning pipeline: Understanding Simple linear regression


6
Model training - Regression equation
- Supervised Learning: Regression - Assumptions
- What is Regression? - Gradient descent
- Types of regression - Setting up the regression problem
- Regularization in ML Practice: student score based on study hours
2,3 2,3
2 2 2 1 2
,5 ,4 - Real-Life Applications - T Problem statement:
- Linear regression • Create a model to analyses the relation
Overview between CIE and SEE result
Types • Create a model to analyze the relation
- simple linear regression between crop yield and rain fall rate
- Multiple linear regression Build linear regression model using

Department of Collegiate & Technical Education Bengaluru-560001 Page 18


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Polynomial linear regression - Stats model


Applications of Linear Regression - T - Scikit learn

Model Evaluation & testing


Evaluate regression model: Cross-validation
Evaluation Metric Why do we need Cross-Validation?
- Coefficient of Determination or R-Squared Techniques
2,3 2,3
3 2 2 1 2
,5 ,4 (R2) - Hold out method
- Root Mean Squared Error (RSME) - Leave One Out Cross-Validation
- Optimize regression model - K-Fold Cross-Validation
- Gradient descent
Multiple Linear Regression
- Overview
- Assumptions
- Normal Equation
Implementation in python
- Applications
- Build regression model
Identification and collection of regression
2,3 2,3
4 2 2 - Evaluate the model 3
,5 ,4 dataset - T
- To minimize the cost function
Perform data exploration, preprocessing and
splitting on datasets like
- Boston housing price from sci-kit learn
datasets
- Cricket match result - past data

Department of Collegiate & Technical Education Bengaluru-560001 Page 19


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Performance of a cricket player - past data


- Crop yield - past data

5 Developmental Assessment Assessment Review and corrective action 3


Optimization and performance matrices for
2,3 2,3
6 2 3 Weekly Assignment
,5 ,4 regression
Explore other regression algorithms - T
Rebuild the model with other regression
algorithms such as
Peer Review
2,3 2,3 - Random Forest Regressor
1 Mini Project Activity – Status review 4 3
,5 ,4 - Support Vector Regression
- Lasso regression
Evaluate and compare the performance of each.

Supervised learning – classification Decision trees


7 What is classification? - What is decision tree?
Types: - Understanding Entropy, information gain
- Binary classification - How to stop overfitting
- Multi-Label Classification - Pruning
2,3 2,3
2 2 2 3
,5 ,4 - Multi-Class Classification DecisionTreeClassifier
- Imbalanced Classification - How it works?
Classification models - Understanding the parameters
Applications - T - Applications
Practice: Iris dataset from sci-kit learn

Department of Collegiate & Technical Education Bengaluru-560001 Page 20


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Perform data exploration, preprocessing and


splitting
Evaluation Metrics for Classification
- confusion matrix,
- Accuracy
Build decision tree-based model in python for
- Precision and Recall
like
- Specificity
2,3 2,3 Breast Cancer Wisconsin (diagnostic) dataset
3 4 1 2
,5 ,4 - F1-score
from sci-kit learn Or any classification dataset
- AUC-ROC
from UCI , Kaggle
▪ How to compute
▪ How does it work
▪ When to use
Hyper parameter tuning for
Evaluation Metrics for Classification- contd.
2,3 2,3 DecisionTreeClassifier
4 Evaluation of decision tree model with different 4 3
,5 ,4
metrics

5 Development Assessment Assessment Review and corrective action 3


2,3 2,3
6 Hyper parameter tuning for classification 2 3 Weekly Assignment
,5 ,4
Logistic regression
- Overview
Peer review
- Types
2,3 2,3 Mini Project Activity – Status review
8 1 4 1 2
,5 ,4 - How does logistic regression work?
- Assumptions
- Understanding sigmoid function

Department of Collegiate & Technical Education Bengaluru-560001 Page 21


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Applications
Practice: build Logistic regression model in
python
Support Vector Machine
- Introduction to SVM
build Logistic regression model in python - How does it work?
2,3 2,3
2 2 2 2 1
,5 ,4 Evaluation and optimization of the model - Applications
Practice: Build a SVM Model in python for Fish
dataset from Kaggle
Ensemble Learning
Introduction
Basic Ensemble Techniques
- Max Voting
- Averaging
- Weighted Average
Advanced Ensemble Techniques
Build a SVM Model in python
2,3 2,3 4 - Stacking
3 3
,5 ,4 How to optimize SVM?
- Blending
- Bagging
- Boosting
Explore and list the Ensemble Algorithms - T
Random Forest
- Introduction
- How does it work?

Department of Collegiate & Technical Education Bengaluru-560001 Page 22


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Hyper parameters
- Applications
Build Random Forest-based model in python for
2,3 2,3 Breast Cancer Wisconsin (diagnostic) dataset
4 4 Evaluation and optimization 3
,5 ,4
from sci-kit learn Or dataset from UCI , Kaggle

5 CIE 3 – Written and Practice Test Assessment Review and corrective action 3
Comparison of classification algorithms with real
2,3 2,3
6 2 3 Weekly Assignment
,5 ,4 world scenario

Unsupervised learning –
- What is unsupervised learning?
- Common approaches
Peer review
- Challenges
3 2,3 1 Mini Project Activity – Status review 4 2 1
- Clustering Types
Applications of unsupervised learning - T
K-means –
9
Working of K-means
How to Choose the Right Number of Clusters?
Implementation in python
Evaluation Metrics
2,3 2,3 - Inertia
2 1 3 Contd. 3
,5 ,4
- Dunn Index
Evaluate the model using mentioned metrics

Department of Collegiate & Technical Education Bengaluru-560001 Page 23


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Dimensionality Reduction
- Importance of Dimension Reduction in

2,3 2,3 machine learning


3 2 2 Dimensionality Reduction using PCA in python 3
,5 ,4 Common methods to perform Dimension
Reduction - T
Dimensionality Reduction using PCA in python
Deployment Process
5 3,4 4 - Local 2 2 Contd. 3

5 Development Assessment Assessment Review and corrective action 3

4 2,3 6 Compare various clustering techniques 2 3 Weekly Assignment


Peer review
Deep learning
Mini Project Activity (2)
- Limitations of Machine Learning
- Regression - Rebuild with deep learning
- What is deep learning?
model
- Deep learning models
- Classification - Rebuild with deep learning
- Deep Learning Applications
model
- Deep learning frameworks
10 1 3,4 1 - Analyze the performance of ML and DL 4 2 1
Group discussion – T
(Individual/ Team of 2)
Future -Impact deep learning will likely to have on
- Define Problem statement (solution to be
a variety of industries in the next few years.
presented in the 13th week CIE – 6)
Environment setup
- Create project plan and product backlog
- Local
- Create git repository for the project
- Cloud
Work progress should be monitored weekly

Department of Collegiate & Technical Education Bengaluru-560001 Page 24


Diploma in Computer Science & Engineering C 20 : 2020 - 21

TOC - Deep Learning with TensorFlow | Infosys


Springboard (onwingspan.com)
Introduction to Neural Networks
▪ Understanding Introduction to TensorFlow
- Biological Neurons - What is TensorFlow?
- Artificial neuron /Perceptron - Why TensorFlow?
- Working of perceptron - TensorFlow ecosystem
▪ Neural network - TensorFlow architecture
- Architecture - Program Elements in TensorFlow
- Working of NN Keras
- Forward propagation - What is Keras?
- Back propagation - Keras APIs – three programming models
2,3 3,4 2 2 2 - Sequential Model 1 2
▪ Activation function
- Sigmoid - Functional API and
- Tanh - Model Subclassing
- ReLU - Keras layers
- LeakyReLU - Custom Keras Layers
▪ Cost function TOC - Deep Learning with TensorFlow | Infosys
- How to measure loss? Springboard (onwingspan.com)
- How to reduce Loss? TOC - TensorFlow for Beginners | Infosys
- Gradient Descent Springboard (onwingspan.com)
Get data, and explore

Department of Collegiate & Technical Education Bengaluru-560001 Page 25


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Eg. Stroke Prediction Dataset | Kaggle or dataset


from any other source
Prepare data: Dealing with
- missing values
- Categorical values
- Labeled encoding
- One hot coding
Prepare data : Feature scaling with
StandardScalar() or other method
Dropping unnecessary features
Data splitting
Dealing with imbalanced dataset
- Why do we have to flatten the input data?
Keras optimizers
- Understand Keras Dense Layer
Keras Metrics
- Overview
Keras Losses
- Parameters
Create a complete end to end neural network –
2,3, -
3 3 Operation 1 3 Contd. 1 2
4
- Building Shallow Neural Network with Keras
TOC - Learning TensorFlow 2.0 | Infosys Springboard
Dense Layer
(onwingspan.com)
- Building Deep Neural Network with Keras
Dense Layers

Department of Collegiate & Technical Education Bengaluru-560001 Page 26


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Create a complete end to end neural network


model using Keras Sequential Model and
Keras Layer API
Eg.
MNIST dataset (classify handwritten numerals)
or fashion-MNIST dataset or dataset from other
source

Keras
- Callbacks
- Commonly used callbacks
Monitor neural network performance with
TensorBoard How to save trained model
3 3,4 4 1 3 3
- TensorBoard Basics Local deployment with TensorFlow ModelServer
- TensorBoard Setup
Understand Model Behavior During Training
Reduce overfitting with Dropout Layer

5 CIE 4 – Written and Practice Test Assessment Review and corrective action 3
Building deep learning model with TensorFlow
2,3 3,4 6 2 3 Weekly Assignment
and Keras for use cases
Peer Review Natural Language Processing
2,3, 4
11 1,5 1 2 1
4 Mini Project Activity – Status review Understanding natural language processing

Department of Collegiate & Technical Education Bengaluru-560001 Page 27


Diploma in Computer Science & Engineering C 20 : 2020 - 21

NLP approaches – rule based, statistical


NLP use cases
How to use dictionary?
Commonly used NLP tools & libraries
Setup environment
(spaCy or similar nlp package)
Text processing tasks (Processing Words)
Document Assembler
Annotation
Tokenization Spell Correction
- Sentence tokenization Normalization
2,3, - Word tokenization 1 - Stemming
2,3 2 1 2
4 3
- Visualize frequency distribution of words - Lemmatization
- Visualize with word cloud
Stop word
- Dropping stop words
- Dropping punctuations
Parts of speech tagging Vectorizer
2,3 3 3 1 3 1 2
Named Entity Recognition N-Gram
TF-IDF Contd.
2.3, 1 3
2,3 4 3
4 Build a pipeline for text processing

5 Development Assessment Assessment Review and corrective action 3

3 2,3 6 NLP – text summarization 2 3 Weekly Assignment

Department of Collegiate & Technical Education Bengaluru-560001 Page 28


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Regular Expression 3
- Introduction
Peer review
2,3, - Simple patterns – matching characters,
1 1
4 Mini Project Activity – Status review
repetition
- Explore python ‘re’ module
NLP use case – Sentiment Analysis (SA) 3
What is sentiment analysis?
Why is SA important?
Business applications for SA
How does sentiment analysis work?
1,2, 2,3, Contd..
2 2 2
3 4 Transformers

12 Conduct Sentiment analysis to classify movie


reviews with
- spaCy
TensorFlow and keras
1,2, Ethics in AI 3
3,4, Deployment pipeline
- Importance of AI ethics
5 - Model Serving
- Ethical challenges of AI
- Model Performance Monitoring
2,3, - AI code of ethics
3 4
4,6 - Model Performance logging
Group Discussion: Discussion on the Ethics of AI
Deployment strategies
Ethics of AI: Safeguarding Humanity |
Deploying ML Models as Docker Containers
Professional Education (mit.edu)

2,3 3,4 4 Deploying ML Models as Serverless Functions 4 Contd. 3

Department of Collegiate & Technical Education Bengaluru-560001 Page 29


Diploma in Computer Science & Engineering C 20 : 2020 - 21

3
5 CIE 5 – Written and Practice Test Assessment Review and corrective action

1,3 5 6 Natural Language Generation / web scrapping 2 3 Weekly Assignment


Project
Internship a) Identification of the problem statement
a) Secondary research on various (from at least 3 known problems) the students
industries and their operations to identify
would like to work as part of the project –
at least 3 companies along with the areas
of work interest and develop an internship either as provided by faculty or as identified by
plan that clearly highlights expectations the student. Document the impact the project
from the industry during the internship.
will have from a technical, social and business
1 b) Design and develop a cover letter for an
2,3, perspective. 4 11
13 to internship request to all 3 identified 2 4 19
4,6
4 companies and the resume to be submitted b) Design and develop the project solution
to potential companies.
or methodology to be used to solve at least one
Prepare for an internship interview to
highlight your interests, areas of study, of the problems identified.
career aspirations and personnel Prepare a project plan that will include a
competence – including the areas of schedule, WBS, Budget and known risks along
learning you expect to learn during
internship. with strategies to mitigate them to ensure the
project achieves the desired outcome.
**Note: Saturday session from 9 AM -2 PM

References
Sl. No Description

1 Hands-On Artificial Intelligence for Beginners By Patrick D. Smith

Department of Collegiate & Technical Education Bengaluru-560001 Page 30


Diploma in Computer Science & Engineering C 20 : 2020 - 21

2 Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 2nd Edition, By Aurélien Géron

3 Machine Learning with Python for everyone, Mark E Fenner

4 Hands on Data processing in Python , Joy Jafari

5 Deep Learning with TensorFlow2 and Keras , Antonio Gulli, Amita Kapoor,Sujith Pal

6 Cloud Computing, Concepts, Technology and Architecture by Thomas Erl

7 Khan Academy

8 Fundamentals of Data Visualization, Claus O. Wilke

9 Pro Git ,Scott Chacon, Ben Straub

10 Mathematics for Machine Learning, A. Aldo Faisal, Cheng Soon Ong, and Marc Peter Deisenroth

CIE and SEE Assessment Methodologies

Duration
CIE Assessment Assessment Mode Max Marks
In hours

Week 3 CIE 1– Written and practice test 4 30


Week 5 CIE 2– Written and practice test 4 30
Week 8 CIE 3– Written and practice test 4 30
Week 10 CIE 4– Written and practice test 4 30
Week 12 CIE 5– Written and practice test 4 30
Week 13 Assessment for Project or Internship 4 30
On line Course work (At least one related to the specialization) 30
Portfolio evaluation (Based on industrial assignments and weekly developmental assessment) * 30
TOTAL CIE MARKS (A) 240
SEE 1 - Theory exam (QP from BTE) Conducted for 100 marks 3 hour duration reduced to 60 marks 3 60

Department of Collegiate & Technical Education Bengaluru-560001 Page 31


Diploma in Computer Science & Engineering C 20 : 2020 - 21

SEE 2 – Practical 3 100


TOTAL SEE MARKS (B) 160
TOTAL MARKS (A+B) 400
* The industrial assignment shall be based on peer-to-peer assessment for a total of 10 marks (on a scale of 1 to 10) and in the event of a group assignment
the marks awarded will be the same for the entire group, the developmental assessment will be for a total of 20 marks and based on MCQ/case
study/demonstration and such other assignment methods

Scheme of Evaluation for SEE 2

Sl. No Description Marks

1 Case submission 20

2 Case presentation 20

3 Case innovation 20

4 Result 20

5 Viva voce 20

Total 100

Case Submission / Content Evaluation Rubrics


Evaluation
5 4 3 2 1 Student Score
Parameters
Identifies and Identifies and
Identifies and Identifies and Identifies limited
Identification of understands all understands most of
understands some of understands a few of issues
the main the main issues in the main issues in 5
the issues in the the issues in the in the problem
issues / problem the problem the problem
problem statement problem statement statement
statemen statement

Department of Collegiate & Technical Education Bengaluru-560001 Page 32


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Insightful and Superficial analysis of


Analysis of the Thorough analysis of Incomplete analysis of No analysis of the
thorough analysis of some of the issues in the 4
issues most of the issues the issues issue
all the issues problem statement

Well documented,
Comments on reasoned and
effective solutions / pedagogically Appropriate, well
Little and/or
strategies (The appropriate thought out comments Superficial and / or
inappropriate No action to all
solution may be in comments on about solutions, or inappropriate solutions
solutions to all of the issues in the 2
the problem solutions, or proposals for solutions, to some of the issues in
issues in the problem problem statement
statement already proposals for to most of the issues in the problem statement
statement
or proposed by solutions, to all the problem statement
you) issues in the
problem statement
Excellent research
into the issues with Good research and
Links to course Limited research and Incomplete research
clearly documented documented links to No research or links
learning and documented links to and links to any 3
links to course the materials read to any reading
additional research any readings reading.
learnings and during the course
beyond.

Total 14/20

Case Presentation Evaluation Rubrics

Evaluation Student
5 4 3 2 1
Parameters Score
Clear flow of Hard to
Most ideas flow No flow in
Very clear and concise flow of follow the
ideas but is lost at times the
ideas Demonstrates passionate flow of
Demonstrates Limited evidence presentation
Delivery & Enthusiasm interest in the topic and ideas Lack 4
interest in the of interest in and Poor
engagement with class / of
topic and engagement with presentation
examiner enthusiasm
engagement the topic skills
and interest

Department of Collegiate & Technical Education Bengaluru-560001 Page 33


Diploma in Computer Science & Engineering C 20 : 2020 - 21

with class /
examiner

Limited
use of Poor visuals used
Visuals augmented and Use of visuals and some visuals
visuals
Visuals extended comprehension of related to the No use of visuals are not easy to 2
loosely
the issues in unique ways topic understand its
related to
relevance.
the topic
Uses stage
effects such as
props, sound Limited use of
Uses stage effects such as effects, and stage effects
props, sound effects, and speech and/or used in a
speech modulation in a modulation in manner that did
No use of stage Poor stage effects
Staging unique and dramatic manner an effective not enhance the 5
effects usage
that enhances the manner to understanding of
understanding of the issues extend the the issues in the
in the problem statement. understanding problem
of the issues in statement.
the problem
statement.
Questions and Questions and
Excellent and salient discussions discussions
Involvement Little or no
discussion points that addressed addressed
of the class / attempt to Did not engage
elucidated material to important important
Examiners engage the the class /
develop a deep information superficial
class / examiner and 3
• Questions understanding Appropriate that issues of the
examiner in poor listening
• Discussions and imaginative activities developed problem
demonstrating skills
• Activities used to extend understanding understanding statement
their learning
in a creative manner Appropriate Limited use of
activities used activities to

Department of Collegiate & Technical Education Bengaluru-560001 Page 34


Diploma in Computer Science & Engineering C 20 : 2020 - 21

to clarify clarify
understanding understanding

Total 14/20

Case Results Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score
The topic was well 4
researched and all The topic was
The topic was The topic was
information and researched but
researched and researched and data
data included are information and data Desired results
most information were not from
accurate and from were only partly from not obtained,
and data were from reliable sources.
reliable sources of reliable sources of but some
reliable sources of The proof was not
information like information. relevant
Problem information. The backed up with
high impact journals The proof was not fully research was
outcome proof was backed data, analysis or
standards, etc. backed up with good done. Outcome
up with good data reasoning as taught
The proof was data or reasoning as not obtained as
and reasoning as in the class.
enough backed up taught in the class. per the
taught in the class. Some outcome
with accurate data, Partial outcome problem brief
Outcome achieved as obtained as per the
analysis and achieved as per the
per the problem brief problem brief
reasoning beyond problem brief
the class learning.

Department of Collegiate & Technical Education Bengaluru-560001 Page 35


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Outcome achieved
beyond the problem
brief
Made effective use of Made good use of class 3
class principles, principles, models and
Made some use of Poorly applied
models and theories. theories Some creative
Application of class principles, Made limited use of class
Also used creativity ideas were explored to
class learning in models and theories class principles, principals,
to find effective find desired outcome
problem solving No creative ideas or models and theories models and
results appropriate but within the
models explored theories
to industry beyond framework of class
class learning. learning
Queries Excellent 2
Poor or no
response to Good response to Satisfactory response Limited response
Response to response to
comments and questions and to questions and to questions and
Class / questions and
discussion with discussions with some discussions with discussions with
Examiners did not
appropriate content connection made to limited reference to no reference to
Queries participate in
supported by theory/research theory/research theory/research
the discussions.
theory/research
Has not 4
Provides limited
Provides detailed and Provides adequate and provided
Provides appropriate and somewhat
appropriate mostly appropriate appropriate
Conclusions conclusion for the appropriate
conclusion for the conclusions for the conclusions for
problem statement conclusions for the
problem statement problem statement the problem
problem statement
statement.
Total 13/20

Case Innovation Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score
Finding new The newly The newly The newly discovered The newly No new 5
processes / discovered discovered processes processes / models / discovered processes /
models / processes / models / models / approaches have processes / models models /
approaches / approaches are of approaches are of limited application but / approaches has

Department of Collegiate & Technical Education Bengaluru-560001 Page 36


Diploma in Computer Science & Engineering C 20 : 2020 - 21

good quality and appropriate quality relevant to the restricted approaches


relevant but limited relevance problem application were identified
Proposing ideas Various ideas and Various ideas and Some ideas or Few ideas have No ideas or 3
and innovative innovative solutions innovative solutions innovative solutions been proposed innovative
solutions in terms have been proposed have been proposed have been proposed solutions have
of processes / and their application as well as the outline but the process of been proposed
models / have been clearly of the process to applying them hasn't
approaches and outlined apply them been specified
how they can be
applied to solve
the problem on
hand
Using creativity Wherever necessary Creativity techniques Creativity techniques Creativity Creativity 2
techniques to creativity techniques are frequently are utilized at times in techniques are technique are
provide and are utilized to utilized in more than less than 50% of the used a few times not utilized to
reason good ideas analyse and solve the 50% of the occasions occasions only analyse and
which are original problem solve the
and problem
unconventional
Finding Constraints and weak Constraints and weak A critical analysis is Only a description No constraints 3
constraints and points are are identified undertaken of the working or weak points
weak points in understood process and have been
existing processes methods are identified.
/ models / provided
approaches or
methods
Total 13/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 37


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Assessment framework for SEE (Theory) – 100 Marks / 3 hours (Reduced to 60 marks)

Programme: Computer Science & Engineering Semester: V


Course: Artificial Intelligence & Machine Learning Max Marks: 100
Course Code: 20CS51I Duration: 3 Hrs
Instruction to the Candidate: Answer one full question from each section.
Qn.No Question CL CO Marks
Section-1
1.a) 1
b)
2.a)
b)
Section-2
3.a) 2
b)
4.a)
b)
Section- 3
5.a) 3
b)
6.a)
b)
Section-4
7.a) 4
b)
8.a)
b)
Section-5

Department of Collegiate & Technical Education Bengaluru-560001 Page 38


Diploma in Computer Science & Engineering C 20 : 2020 - 21

9.a) 5
b)
10.a)
b)

Assessment framework for CIE


Note : Theory to be conducted for 1 hour and practice for 3 hours, total duration of exam – 4 hours
Programme Computer Science & Engineering Semester V
Course Artificial Intelligence & Machine Learning Max Marks 30
Course Code 20CS51I Duration 4 hours
Name of the course coordinator
Note: Answer one full question from each section.
Qn.No Question CL CO PO Marks
L3/L4
Section-1 (Theory) – 10 marks
1.a)
b)
2.a)
b)
c)
Section-2 (Practical) - 20 marks
3)
4)

Department of Collegiate & Technical Education Bengaluru-560001 Page 39


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Equipment/software list with Specification for a batch of 20 students

Sl. No. Particulars Specification Quantity


1. Intel i7, 4GB RAM,
Computers 20
500GB SSD
2.
Python (Anaconda Distribution), Git, Jira, Jenkins, TensorFlow or similar tools
3.
Cloud – AWS/AZURE/GCB or any similar cloud environment
4.
Broadband connection

Department of Collegiate & Technical Education Bengaluru-560001 Page 40


Full Stack Development
Diploma in Computer Science & Engineering C 20 : 2020 - 21

Diploma in Computer Science & Engineering


Computer Science &
Program Semester 5
Engineering

Course Code 20CS52I Type of Course L:T:P (104:52:312)

Course Name Full Stack Development Credits 24

CIE Marks 240 SEE Marks 160

Introduction:

Welcome to the curriculum for the Full Stack Development Specialisation. This specialisation
course is taught in Bootcamp mode. Bootcamps are 12 weeks, intense learning sessions designed to
prepare you for the practical world – ready for either industry or becoming an entrepreneur. You
will be assisted through the course, with development-based assessments to enable progressive
learning. In this course, you’ll learn a complete suite of software development skills to build
application like front-end, middleware, and back-end Java web developer technologies, test and
deploy code, store data using MongoDB, and much more.

This course will teach you Fundamentals of business process automation, React, Spring, MongoDB,
REST API, DevOps practices, cloud deployment and more. Details of the curriculum is presented in
the sections below.

Pre-requisite

Before the start of this specialisation course, you would have completed the following courses;

In the 1st year of study, you would have studied Engineering Mathematics, Communication Skills,
Computer Aided Engineering Graphics, Statistics & Analysis, Basic IT Skills, Fundamentals of
Computer, Fundamentals of Electrical and Electronics Engineering, Project Management skills and
Multimedia & Animation.

In the 2nd year of study, you would have studied Python Programming, Computer Hardware,
Maintenance and Administration, Computer Networks, Database System Concepts and PL/SQL,
Data Structures with Python, Operating System and Administration, Object oriented programming
and Design with Java, Software Engineering principles and practices.

Department of Collegiate & Technical Education Bengaluru-560001 Page 41


Diploma in Computer Science & Engineering C 20 : 2020 - 21

In this year of study, you shall be applying your previous years learning along with specialised field
of study into projects and real-world applications.

Course Cohort Owner

A Course Cohort Owner is a faculty from the core discipline, who is fully responsible for one
specialised field of study and the cohort of students who have chosen to study that specialised field
of study.

Guidelines for Cohort Owner


1. Each Specialized field of study is restricted to a Cohort of 20 students which could include
students from other relevant programs.
2. One faculty from the Core Discipline shall be the Cohort Owner, who for teaching and
learning in allied disciplines can work with faculty from other disciplines or industry experts.
3. The course shall be delivered in boot camp mode spanning over 12 weeks of study, weekly
developmental assessments and culminating in a mini capstone.
4. The industry session shall be addressed by industry subject experts in the discipline only.
5. The cohort owner shall be responsible to identify experts from the relevant field and
organize industry session as per schedule.
6. Cohort owner shall plan and accompany the cohort for any industrial visits.
7. Cohort owner shall maintain and document industrial assignments, weekly assessments,
practices and mini project.
8. The cohort owner shall coordinate with faculties across programs needed for their course to
ensure seamless delivery as per time table
9. The cohort owner along with classroom sessions can augment or use supplementally
teaching and learning opportunities including good quality online courses available on
platforms like Karnataka LMS, Infosys Springboard, NPTEL, Unacademy, SWAYAM , etc.
Course outcome: A student should be able to
Explain typical business process in an organization and identify opportunities for digital
CO1
transformation.
CO2 Document system requirements and write an appropriate development plan.

CO3 Design, develop and test an automated business process.

CO4 Develop RESTful API’s and test functions as per the defined requirements.

CO5 Select an appropriate production environment, UI and deploy the application.

Department of Collegiate & Technical Education Bengaluru-560001 Page 42


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Department of Collegiate & Technical Education Bengaluru-560001 Page 43


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Detailed course plan


We Da
CO PO 1st session (9am to 1 pm) L T P 2ND session (1.30pm to 4.30pm) L T P
ek ys
- Digital transformation through
- What is an Enterprise? Convergence of IT & OT
- Organizing the Enterprise - process - Digital Transformation Success Stories
- Understanding /Types of business - How technology has impacted digital
1 1 1 4 1 2
activities transformation
- What is business process? - Case study: Digital transformation through
- Why to automate business process? IT/OT convergence

Industrial visit: Map the relationship between various


Visit small or medium scale nearby industry divisions of business entity both vertical and
1
and know the business entity and activities. horizontal relationships
1 1,5 2 4 3
Understand the different work divisions with Understanding the business process and
a business entity. workflow within a business entity

- Identify the typical processes and


Report of industrial visit.
workflows that can be automated.
- Document the major business divisions
- Introduction to Full stack development, its
1 2,3 3 and their activities. 4 3
components, tools used, etc.
- Draw the workflow for each identified
- Understanding Full stack framework both
division.
within firewall and on the cloud

Department of Collegiate & Technical Education Bengaluru-560001 Page 44


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Create a map of workflows to represent


interaction among divisions and the entire
business process as well.

Recap
- Design Thinking
1,2 2,3 4 1 3 Contd. 3
- Apply design thinking to automate the
observed activities in the industrial visit

5 Developmental Assessment Assessment Review and corrective action 3


Full stack development – industrial
perspective
2,3,
1,2 6 2 3 Weekly Assignment(1PM-2PM)
4 How to create project plan and product
backlog for project and User story creation
peer review Recap – software development (Agile
project activity: methodology)
Make student teams (2 -3 students per team), Project Inception
each team is responsible for automating - Define goal of product
2,3,
2,3 1 4 2 1
4 activities of an identified business entity. - Define epic /requirements
2
Integration of each team’s work must lead to - Creating user stories for the epic
an enterprise application. - Creating test plan
- Creating testcase – test bed, test data
2,3, - Scope of product 2 2 Design principles
2,3 2 2 1
4

Department of Collegiate & Technical Education Bengaluru-560001 Page 45


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Planning iterations / sprint planning - Availability


- Schedule of the project - Performance
- Cost estimation - Consistency
- Burn down charts - Scalability

- Risk management - Manageability

Prepare the project environment by selecting - cost

tools Architectural patterns


- Monolithic
Create and manage product backlog using
- Layered
appropriate tool like Jira
- Service oriented architecture
- Microservice architecture
Step 01 - Need for Architecture - Viewer Page |
Infosys Springboard (onwingspan.com)
Design methods for security
- Application security
- Authentication and authorization
Design principles for – UI / UX
methods and their usage and
Create UI/UX design - for created user stories
considerations
2,3, 2 2 (wireframing)
2,3 3 2 1
4 o Token based
Technology, tools and frameworks for
o Cookie based
application development
o OpenID
o Third party access
o SAML

Department of Collegiate & Technical Education Bengaluru-560001 Page 46


Diploma in Computer Science & Engineering C 20 : 2020 - 21

o Multi factor authentication


- Encryption
Design methods for Datastores
- Structured
- Semi structured
- Unstructured
Recap of
Data base design
Configuration management
DevOps engineering practices Why Do We Need a Version Control System?
- Configuration management Fundamentals of Git
- Continuous integration Git installation and setup
- Automated testing basic local Git operations
2,3, - Infrastructure as code ▪ creating a repository,
2,3 4 2 2 1 2
4
- Continuous delivery ▪ cloning a repository,
- Continuous deployment ▪ making and recording changes
- Continuous monitoring ▪ staging and committing changes,
Explore the various tools used - T ▪ viewing the history of all the changes
undoing changes

5 Developmental Assessment Assessment Review and corrective action 3

Department of Collegiate & Technical Education Bengaluru-560001 Page 47


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Comparison of various enterprise application


development technology stacks (development,

6 engineering, deployment, Monitoring) 2 3 Weekly Assignment


Security architecture and best practices in
enterprise application programming.
Git Branching and merging
Peer review Basic
2,3, Project status review ▪ Creating and switching to new branches
3 2,3 1 4 1 2
4
Demonstration of artifacts of the project ▪ Switching between branches
Merging local branches together
Continuous integration with Jenkins
GitHub
What is Jenkins?
- Basics of distributed git
How does it work?
Account creation and configuration
Architecture of Jenkins
- Create and push to repositories
Jenkins pipeline
- versioning
Install and configure Jenkins
2,3, - Collaboration
2 2,3 2 1 3 1 2
4 Perform user management
- Migration
Assign roles to users
Create repository – named mini project-1
Create build pipeline with Jenkins
Push the same to GitHub
TOC - Continuous Integration with Jenkins 2 |
TOC - Git Essentials: Become a Git and GitHub
Infosys Springboard (onwingspan.com)
Ninja | Infosys Springboard (onwingspan.com)

Department of Collegiate & Technical Education Bengaluru-560001 Page 48


Diploma in Computer Science & Engineering C 20 : 2020 - 21

5 1,4 3 Continuous integration with Jenkins 4 Contd. 3


Cloud basics
- Service models
- Create cloud account (AWS, GCB or any
- Deployment models
other service provider) and explore the
- Cloud Infrastructure Overview
features
- Cloud computing architecture and its
- Create and setup a virtual machine.
2,3, components
2,3 4 2 2 3
4 - Create a simple webapp using cloud
- Virtualization
services
o Characteristics and benefits
- Build a Basic Web Application on AWS
o Virtual Machines
(amazon.com)
o Hypervisors
o Types

5 CIE 1 – Written and Practice Test Assessment Review and corrective action 3
Comparison of cloud services
2,3, How to make full stack development efficient
2,3 6 2 3 Weekly Assignment
4
by using DevOps
Recap
HTML, CSS and JavaScript Fundamentals
Peer review
(Code structure – statements, comments,
2,3, 2,3, 1 Project status review
4 4 1 2
5 4 variables, Constants, Data types, Interaction,
Demonstration of artifacts of the project
Operators, Comparisons, Control flow,
Functions)

Department of Collegiate & Technical Education Bengaluru-560001 Page 49


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Setting Up the Environment and Tools for


front end development
- Installing Node.js
- Installing VS Code
- VS Code extensions
JS objects
ES6
Methods, Constructors,
- Arrow functions
Object properties
2,3, 2,3, - Template strings
2 1 3 1 2
5 4 - Data properties
- Prototype methods
- Accessor properties
- Spread operator
- Prototype
Introduction to TypeScript
Why TypeScript?
ES6 Setting up development environment for
- Map TypeScript
2,3, 2,3,
3 - Set 1 3 1 2
5 4 - Install TypeScript compiler
- Install Live server
Create and run first program in TypeScript
TypeScript "Hello, World!" (typescripttutorial.net)
Basic Types Contd.
2,3, 2,3, Control flow statement JSON- T
4 2 2 3
5 4
Functions

Department of Collegiate & Technical Education Bengaluru-560001 Page 50


Diploma in Computer Science & Engineering C 20 : 2020 - 21

5 Development Assessment Assessment Review and corrective action 3


2,3, 2,3, Modern UI technologies
6 2 3 Weekly Assignment
5 4
Introduction to React
- What is React?
Peer review - Setting up React development
2,3, 2,3, Project status review environment
1 4 1 2
5 4
Demonstration of artifacts of the project - Anatomy of React app
- Configuring react app
- Creating and running a React.js app
React Components

Introduction to JSX What is a component?

What is JSX? Types


5 2,3, 2,3, - Functional
2 DOM 2 2 1 2
5 4
React DOM - Class

Implementing JSX Create your first React Component.


Understanding Component life cycle

State and Props


React components
Component life cycle methods
- Presentational and Container
- Mounting phase
2,3, 2,3, 3 Components 1 3 1 2
5 4 - Updating phase
- Functional components
- Unmounting phase
- Communication between components
- Error Handling

Department of Collegiate & Technical Education Bengaluru-560001 Page 51


Diploma in Computer Science & Engineering C 20 : 2020 - 21

JSX for React components


How to crate JSX elements?
Props & State
- Understanding Props
How to test components
Understanding React Virtual DOM
MVC architecture
React Router

2,3, 2,3, - React router – parameters


4 2 2 Building Single page application 1 2
5 4 - React router key components
- Implement navigation using react
router
Building Single page application
5 CIE 2 – Written and Practice Test Assessment Review and corrective action 3
Testing single page application - manual and
2,3, 2,3,
6 2 3 Weekly Assignment
5 4 automation testing
Recap
- Object oriented concepts and design
Peer review principles
2,3, 2,3, Project status review - Data Structures
6 1 4 2 1
5 4
Demonstration of artifacts of the project - Database Concepts
- java
Setting up the environment and tools

Department of Collegiate & Technical Education Bengaluru-560001 Page 52


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Install java (latest stable version) and add


environment variable
Install java editor (such as IntelliJ, Eclipse or
any other)
Install DBMS (MySQL, PostgreSQL or any other)
- Java Collections (List, Set, Map) Introduction to Spring Framework
Basics of Apache Maven or Gradle – project What is Spring?
management tool - Why Spring Framework?
2,3, 2,3,
2 1 3 1 2
5 4 Understanding pom.xml - Spring Framework Architecture
XML – tutorial - Key components of Spring Framework
-
Inversion of Control and Dependency Injection
What is inversion of control?
What is dependency injection?
understanding the spring initializer
Type of classes
interface
- Client class
- Spring Annotations
- Service class
2,3, 2,3, Create Spring application with Spring
3 1 3 1 2
5 4 - Injector class
Initializer using dependencies like Spring
Types of DI
Web, Spring Data JPI
- Constructor
How to run the project
- Property
- Method
Practice :

Department of Collegiate & Technical Education Bengaluru-560001 Page 53


Diploma in Computer Science & Engineering C 20 : 2020 - 21

constructor injection
Property injection
Method injection
Spring IoC container – ApplicationContext

AutoScanning – package scanning


DI in spring Boot
2,3, 2,3, - Constructor injection Contd..
4 2 2 3
5 4
- Setter injection

Autowiring
Autowiring dependencies

5 Development assessment Assessment Review and corrective action 3


2,3, 2,3, Java and Frameworks
6
5 4
Application Programming Interface (API)
- What is an API?
- How API works?
Peer review
- Why we need APIs?
2,3, Project status review
3,4 1 4 2 1
4 - API types (Open APIs, Partner APIs, Internal
7 Demonstration of artifacts of the project
APIs, Composite APIs)
- Types of API Protocols (SOAP, REST)
Common API examples
2,3, API endpoints Basics of REST
3,4 2 2 2 3
4

Department of Collegiate & Technical Education Bengaluru-560001 Page 54


Diploma in Computer Science & Engineering C 20 : 2020 - 21

What is API endpoint? - Evolution of distributed API


Why are API endpoints important? - Overview of REST
API endpoint examples - REST architectural style, components,
How to Test API Endpoints views,
HTTP Concepts - REST constraints
- HTTP working - Properties of REST API
- HTTP Method (GET, POST, PUT, DELETE) - REST API Design Principles
Understanding of JSON structure for API How to create RESTful service
request and response data
Spring REST – creating Spring REST controller
Controller Layer –
- Create REST controller for CRUD
operations Spring Data JPA configuration
- Handling URI data Create ORM entity class
Service Layer – build business logic Create database and configure using
Limitations of JDBC API application.property file
2,3,
3,4 3 2 2 3
4 Object relational Mapping – features and - **Note – Hibernate or any other ORM
benefits framework can be used
- ORM Framework About Hibernate Framework - Viewer Page |
- ORM Architecture Infosys Springboard (onwingspan.com)
- ORM Mapping
- ORM Annotations
- ORM Configuration

Department of Collegiate & Technical Education Bengaluru-560001 Page 55


Diploma in Computer Science & Engineering C 20 : 2020 - 21

JPA – Java Persistent API


Model/ Repository layer – construct entity/
model object and communicate with DB using
2,3, Spring Data JPI Creating CRUD repositories
3,4 4 1 3 3
4
Install Postman
Test created APIs with the help of Postman

5 Developmental Assessment Assessment Review and corrective action 3


Converting monolithic application to
2,3,
3,4 6 2 3 Weekly Assignment
4 microservices architecture
Versioning Spring REST APIs
Peer review
Make RESTful service functional using Spring
2,3, Project status review
3,4 1 4 1 2
4 Data REST - CRUD operations using Spring Data
Demonstration of artifacts of the project
JPA

2,3, Contd..
3,4 2 4 Contd.. 3
4
8 2,3, Transaction management and compliance to
3,4 3 1 3 Contd.. 3
4 ACID principles

Securing REST APIs with Spring Security


2,3,
3,4 4 1 3 Creating unit tests with Spring Boot 1 2
4 API security configuration

5 CIE 3 – Written and Practice Test Assessment Review and corrective action 3
2,3, Spring Transactions
3,4 6 Weekly Assignment
4
2,3, Peer review Introduction NoSQL - 1
9 3,4 1 4 1 2
4

Department of Collegiate & Technical Education Bengaluru-560001 Page 56


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Project status review - Brief history


Demonstration of artifacts of the project - Features & Benefits
- Types
- Cap theorem
- BASE
Getting started with MongoDB
- MongoDB overview
- features
- key components of Architecture
- data modelling
Working with MongoDB
- MongoDB Shell – mongosh
Mongo Compass GUI
Setup CRUD Operations
- Download and Install MongoDB - Create and Drop database
Community Server - Create and Drop Collections
Or - CRUD Operations on document
2,3, - MongoDB Atlas Setup
3,4 2 1 3 1 2
4
- Create an Atlas account and get ready to
use MongoDB Atlas
- Configure MongoDB Atlas
- Explore Compass (MongoDB’s GUI tool)

Department of Collegiate & Technical Education Bengaluru-560001 Page 57


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Create and Manage MongoDB


Data types and operators – T
Limit and Sort Records
2,3, - CRUD Operations on document 4
3,4 3 1 2
4 Cursor
Indexing Replication
2,3,
3,4 4 1 3 1 2
4 Aggregation Sharding

5 Development Assessment Assessment Review and corrective action 3


2,3, API Gateway
3,4 6 Weekly Assignment
4
Peer review Administration
2,3, Project status review - Create and manage users and roles
3,4 1 4 1 2
4
Demonstration of artifacts of the project - Migration to MongoDB
Monitoring
Why Monitor MongoDB?
Areas to monitor
Backup in MongoDB
- Instance status and health
10 Types: Logical backups and physical backups.
- MongoDB cluster’s operations and
Back Up and Restore a MongoDB Database
2,3, connections metrics
3,4 2 1 3 1 2
4 using
- Instance hardware metrics
- MongoDB Atlas
- Replication metrics
- MongoDB Backup and Restore Tools
Monitor above areas with
• MongoDB Atlas
• self-managed MongoDB instances

Department of Collegiate & Technical Education Bengaluru-560001 Page 58


Diploma in Computer Science & Engineering C 20 : 2020 - 21

performance monitoring tools


ACID transactions in MongoDB
2,3, How to run MongoDB on cloud?
3,4 3 1 3 3
4 Best practices for transactions in MongoDB
Perform CRUD Operations on MongoDB
2,3, through REST API using Spring Boot Starter Contd.
3,4 4 1 3 3
4
Data MongoDB

5 CIE 4 – Written and Practice Test Assessment Review and corrective action 3
MongoDB implementation, administration and
2,3,
3,4 6 Weekly Assignment
4 deployment
Application Testing
- Manual
Peer review
- Automated
3,4, 2,3, Project status review 4
1 1 2
5 4 Application testing tools
Demonstration of artifacts of the project
Functional testing
UI testing

11 Automation testing with selenium (widely used)


Integration testing - Jenkins
Components of selenium
System testing
3,4, 2,3, 1 3 Features and limitations of selenium - T
2 1 2
5 4 Integrate the work of each group and carry out
Components of WebDriver architecture
integration testing
Selenium WebDriver - Installation and setup
WebDriver Script
3,4, 2,3, 1 3 Contd..
3 3
5 4 How WebDriver works?

Department of Collegiate & Technical Education Bengaluru-560001 Page 59


Diploma in Computer Science & Engineering C 20 : 2020 - 21

WebDriver Commands -
Get, Navigation, WebElement, Action, and
Result commands.
Working with WebDriver commands
Select Class and different select methods
Working with WebDriver commands
Acceptance testing
Acceptance tests and test plan
4 Automation testing with selenium web driver 4 1 2
User acceptance testing
Bug tracking – Jira

5 Development Assessment Assessment Review and corrective action 3


2,3, Automation and cloud application testing
3,4 6
4
Deployment process 2
- Manual deployment
- Automated deployment
How to implement automated deployment?
Peer review
Top Deployment tools and their features
3,4, 2,3, Project status review 4
12 1 1
5 4 Best Deployment practices
Demonstration of artifacts of the project
Setup deployment pipeline
Continuous deployment
Static code analysis
Automated review and peer review

Department of Collegiate & Technical Education Bengaluru-560001 Page 60


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Practice – code analysis using tools

Containers 2
Why containers?
What is a docker?
How docker works?
Docker image
Components of docker
Docker file
- Docker container
Commands to create docker file.
3,4, 2,3, - Docker client
2 1 3 1
5 4 Build docker image with docker file
- Docker daemon
create docker container from docker image
- Docker image
Run the docker container
- Docker registry
Install docker on desktop and start the docker
tool.
Explore and try other containers.
Disaster recovery and their types 2
Container orchestration
How does it work?
What is orchestration?
Elements of disaster recovery plan
3,4, 2,3, Orchestration engine
3 1 3 1
5 4 Build a disaster recovery plan
Orchestration tools
Load Balancing
Docker swarm – components and features
Load balancer and its functions
Application monitoring Contd. 2
3,4, 2,3,
4 1 3 1
5 4 - Need for application monitoring Redundancy and mirroring

Department of Collegiate & Technical Education Bengaluru-560001 Page 61


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Components of application performance


management.
- How to select application monitoring tools?
Explore and compare APM tools

5 CIE 5 – Written and Practice Test Assessment Review and corrective action

6 Cloud orchestration 2 3
Project
Internship a) Identification of the problem statement
a) Secondary research on various
(from at least 3 known problems) the students
industries and their operations to identify at
would like to work as part of the project – either
least 3 companies along with the areas of work
interest and develop an internship plan that as provided by faculty or as identified by the
clearly highlights expectations from the student. Document the impact the project will
industry during the internship. have from a technical, social and business
b) Design and develop a cover letter for an perspective.
13 1
internship request to all 3 identified companies
b) Design and develop the project solution
and the resume to be submitted to potential
companies. or methodology to be used to solve at least one of
Prepare for an internship interview to highlight the problems identified.
your interests, areas of study, career Prepare a project plan that will include a
aspirations and personnel competence –
schedule, WBS, Budget and known risks along
including the areas of learning you expect to
with strategies to mitigate them to ensure the
learn during internship.
project achieves the desired outcome.

**Note: Saturday session from 9 AM -2 PM

Department of Collegiate & Technical Education Bengaluru-560001 Page 62


Diploma in Computer Science & Engineering C 20 : 2020 - 21

References

Sl. No Description

1 Hands-On Full Stack Development with Spring Boot 2.0 and React

2 React Cookbook , David Griffiths and Dawn Griffiths

3 Build a Basic Web Application on AWS (amazon.com)

4 A Docker Tutorial for Beginners (docker-curriculum.com)

5 Spring Boot 2.0 Projects By Mohamed Shazin Sadakath

CIE and SEE Assessment Methodologies

Duration
CIE Assessment Assessment Mode Max Marks
In hours
Week 3 CIE 1– Written and practice test 4 30
Week 5 CIE 2– Written and practice test 4 30
Week 8 CIE 3– Written and practice test 4 30
Week 10 CIE 4– Written and practice test 4 30
Week 12 CIE 5– Written and practice test 4 30
Week 13 Assessment for Project or Internship 4 30
On line Course work (At least one related to the specialization) 30
Portfolio evaluation (Based on industrial assignments and weekly developmental assessment) * 30
TOTAL CIE MARKS (A) 240
SEE 1 - Theory exam (QP from BTE) Conducted for 100 marks 3 hour duration reduced to 60 marks 3 60
SEE 2 – Practical duration 3hr. Max marks 100 3 100

Department of Collegiate & Technical Education Bengaluru-560001 Page 63


Diploma in Computer Science & Engineering C 20 : 2020 - 21

TOTAL SEE MARKS (B) 160


TOTAL MARKS (A+B) 400
* The industrial assignment shall be based on peer-to-peer assessment for a total of 10 marks (on a scale of 1 to 10) and in the event of a group assignment
the marks awarded will be the same for the entire group, the developmental assessment will be for a total of 20 marks and based on MCQ/case
study/demonstration and such other assignment methods

Scheme of Evaluation for SEE 2

Sl. No Description Marks

1 Case submission 20

2 Case presentation 20

3 Case innovation 20

4 Result 20

5 Viva voce 20

Total 100

Case Submission / Content Evaluation Rubrics

Evaluation
5 4 3 2 1 Student Score
Parameters

Department of Collegiate & Technical Education Bengaluru-560001 Page 64


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Identifies and Identifies and


Identifies and Identifies and Identifies limited
Identification of understands all understands most of
understands some of understands a few issues
the main the main issues in the main issues in 5
the issues in the of the issues in the in the problem
issues / problem the problem the problem
problem statement problem statement statement
statemen statement

Insightful and Superficial analysis of


Analysis of the Thorough analysis of Incomplete analysis of No analysis of the
thorough analysis of some of the issues in 4
issues most of the issues the issues issue
all the issues the problem statement

Well documented,
Comments on reasoned and
Appropriate, well
effective solutions pedagogically
thought out Little and/or
/ strategies (The appropriate Superficial and / or
comments about inappropriate No action to all
solution may be in comments on inappropriate solutions
solutions, or proposals solutions to all of the issues in the 2
the problem solutions, or to some of the issues in
for solutions, to most issues in the problem problem statement
statement already proposals for the problem statement
of the issues in the statement
or proposed by solutions, to all
problem statement
you) issues in the
problem statement
Excellent research
Links to course into the issues with Good research and
Limited research and Incomplete research
learning and clearly documented documented links to No research or links
documented links to and links to any 3
additional links to course the materials read to any reading
any readings reading.
research learnings and during the course
beyond.

Total 14/20

Case Presentation Evaluation Rubrics

Department of Collegiate & Technical Education Bengaluru-560001 Page 65


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Evaluation Student
5 4 3 2 1
Parameters Score
Clear flow of
ideas Most ideas flow Hard to
No flow in
Very clear and concise flow of but is lost at follow the
Demonstrates the
ideas Demonstrates times Limited flow of
interest in the presentation
Delivery & Enthusiasm passionate interest in the evidence of ideas Lack 4
topic and Poor
topic and engagement with interest in and of
class / examiner engagement presentation
engagement enthusiasm
with class / skills
with the topic and interest
examiner
Limited
use of Poor visuals used
Visuals augmented and
Use of visuals and some visuals
extended comprehension visuals
Visuals related to the No use of visuals are not easy to 2
of the issues in unique loosely
topic understand its
ways related to
relevance.
the topic
Uses stage
effects such as
props, sound Limited use of
Uses stage effects such as
effects, and stage effects
props, sound effects, and
speech and/or used in a
speech modulation in a
modulation in manner that did
unique and dramatic No use of stage Poor stage effects
Staging an effective not enhance the 5
manner that enhances the effects usage
manner to understanding
understanding of the
extend the of the issues in
issues in the problem
understanding the problem
statement.
of the issues in statement.
the problem
statement.

Department of Collegiate & Technical Education Bengaluru-560001 Page 66


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Questions and Questions and


discussions discussions
Excellent and salient
addressed addressed
Involvement discussion points that Little or no
important important
of the class / elucidated material to attempt to Did not engage
information superficial
Examiners develop a deep engage the the class /
that issues of the
understanding class / examiner and 3
• Questions developed problem
Appropriate and examiner in poor listening
• Discussions understanding statement
imaginative activities used demonstrating skills
• Activities Appropriate Limited use of
to extend understanding their learning
activities used activities to
in a creative manner
to clarify clarify
understanding understanding

Total 14/20

Case Results Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score
The topic was well The topic was 4
The topic was The topic was
researched and all researched but
researched and researched and data
information and information and data Desired results
most information were not from
data included are were only partly from not obtained,
and data were from reliable sources.
accurate and from reliable sources of but some
reliable sources of The proof was not
reliable sources of information. relevant
Problem information. The backed up with
information like The proof was not fully research was
outcome proof was backed data, analysis or
high impact journals backed up with good done. Outcome
up with good data reasoning as taught
standards, etc. data or reasoning as not obtained as
and reasoning as in the class.
The proof was taught in the class. per the
taught in the class. Some outcome
enough backed up Partial outcome problem brief
Outcome achieved as obtained as per the
with accurate data, achieved as per the
per the problem brief problem brief
analysis and problem brief
Department of Collegiate & Technical Education Bengaluru-560001 Page 67
Diploma in Computer Science & Engineering C 20 : 2020 - 21

reasoning beyond
the class learning.
Outcome achieved
beyond the problem
brief
Made effective use of Made good use of class 3
class principles, principles, models and
Made some use of Poorly applied
models and theories. theories Some creative
Application of class principles, Made limited use of class
Also used creativity ideas were explored to
class learning in models and theories class principles, principals,
to find effective find desired outcome
problem solving No creative ideas or models and theories models and
results appropriate but within the
models explored theories
to industry beyond framework of class
class learning. learning
Queries Excellent 2
Poor or no
response to Good response to Satisfactory response Limited response
Response to response to
comments and questions and to questions and to questions and
Class / questions and
discussion with discussions with some discussions with discussions with
Examiners did not
appropriate content connection made to limited reference to no reference to
Queries participate in
supported by theory/research theory/research theory/research
the discussions.
theory/research
Has not 4
Provides limited
Provides detailed and Provides adequate and provided
Provides appropriate and somewhat
appropriate mostly appropriate appropriate
Conclusions conclusion for the appropriate
conclusion for the conclusions for the conclusions for
problem statement conclusions for the
problem statement problem statement the problem
problem statement
statement.
Total 13/20

Case Innovation Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score

Department of Collegiate & Technical Education Bengaluru-560001 Page 68


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Finding new The newly The newly The newly discovered The newly No new 5
processes / discovered discovered processes processes / models / discovered processes /
models / processes / models / models / approaches have processes / models models /
approaches / approaches are of approaches are of limited application but / approaches has approaches
good quality and appropriate quality relevant to the restricted were identified
relevant but limited relevance problem application
Proposing ideas Various ideas and Various ideas and Some ideas or Few ideas have No ideas or 3
and innovative innovative solutions innovative solutions innovative solutions been proposed innovative
solutions in terms have been proposed have been proposed have been proposed solutions have
of processes / and their application as well as the outline but the process of been proposed
models / have been clearly of the process to applying them hasn't
approaches and outlined apply them been specified
how they can be
applied to solve
the problem on
hand
Using creativity Wherever necessary Creativity techniques Creativity techniques Creativity Creativity 2
techniques to creativity techniques are frequently are utilized at times in techniques are technique are
provide and are utilized to utilized in more than less than 50% of the used a few times not utilized to
reason good ideas analyse and solve the 50% of the occasions occasions only analyse and
which are original problem solve the
and problem
unconventional
Finding Constraints and weak Constraints and weak A critical analysis is Only a description No constraints 3
constraints and points are are identified undertaken of the working or weak points
weak points in understood process and have been
existing processes methods are identified.
/ models / provided
approaches or
methods
Total 13/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 69


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Assessment framework for SEE (Theory) – 100 Marks / 3 hours (Reduced to 60 marks)

Programme: Computer Science & Engineering Semester: V


Course: Full Stack Web Development Max Marks: 100
Course Code: 20CS52I Duration: 3 Hrs
Instruction to the Candidate:
Answer one full question from each section.
Qn.No Question CL CO Marks
Section-1
1.a) 1
b)
2.a)
b)
Section-2
3.a) 2
b)
4.a)
b)
Section- 3
5.a) 3
b)
6.a)
b)

Department of Collegiate & Technical Education Bengaluru-560001 Page 70


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Section-4
7.a) 4
b)
8.a)
b)
Section-5
9.a) 5
b)
10.a)
b)

Assessment framework for CIE


Note : Theory to be conducted for 1 hour and practice for 3 hours, total duration of exam – 4 hours
Programme Computer Science & Engineering Semester V
Course Full Stack Development Max Marks 30
Course Code 20CS52I Duration 4 hours
Name of the course coordinator
Note: Answer one full question from each section.
Qn.No Question CL CO PO Marks
L3/L4
Section-1 (Theory) – 10 marks
1.a)
b)
2.a)
b)

Department of Collegiate & Technical Education Bengaluru-560001 Page 71


Diploma in Computer Science & Engineering C 20 : 2020 - 21

c)
Section-2 (Practical) - 20 marks
3)
4)

Equipment/software list with Specification for a batch of 20 students

Sl. No. Particulars Specification Quantity


1. Intel i7, 4GB RAM,
Computers 20
500GB SSD
2. Eclipse/InteliJ , Apache Maven, Spring 5.0, MongoDB, MySQL,React, Selenium WebDrive,
Jira,Git,Jenkins
3.
Cloud – AWS/AZURE/GCB or any similar cloud environment
4.
Broadband connection

Department of Collegiate & Technical Education Bengaluru-560001 Page 72


Cloud Computing

Department of Collegiate & Technical Education Bengaluru-560001 Page 73


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Diploma in Computer Science & Engineering


Program Computer Science & Semester 5
Engineering
Course Code 20CS53I Type of Course L:T:P (104:52:312)
Course Name Cloud Computing Credits 24
CIE Marks 240 SEE Marks 160

Introduction:

With technological advances, the future is set to be highly competitive and agility is the need of the
hour. With cloud computing, organizations can save money on storage, servers and management
services, as these services can be moved to the cloud with minimum cost, making your operations
more efficient. The cloud offers businesses more flexibility overall versus hosting on a local server.
And, for need of extra bandwidth, a cloud-based service can meet that demand instantly, rather than
undergoing a complex (and expensive) update to your IT infrastructure.

This specialisation course is taught in Bootcamp mode. Bootcamps are 12 weeks, intense learning
sessions designed to prepare you for the practical world – ready for either industry or becoming an
entrepreneur. You will be assisted through the course, with development-based assessments to
enable progressive learning.

This course will teach you Fundamentals of cloud computing Architecture, Compute instances, High
Availability and Scalability in Cloud, Databases, Cloud Storage Service, DNS Services and Content
Delivery, Serverless Computing, Container Services, Monitoring & Auditing and Cloud
Security. Details of the curriculum is presented in the sections below.

Note: Faculty and students are free to choose any two open public cloud available such as Amazon
Web Services (AWS), Microsoft Azure or Google Cloud Platform (GCP) etc. to implement the
activities as suggested in the detailed curriculum.

Pre-requisite

Before the start of this specialisation course, you would have completed the following courses;

In the 1st year of study, you would have studied Engineering Mathematics, Communication Skills,
Computer Aided Engineering Graphics, Statistics & Analysis, Basic IT Skills, Fundamentals of

Department of Collegiate & Technical Education Bengaluru-560001 Page 74


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Computer, Fundamentals of Electrical Electronics Engineering, Project Management skills and


Multimedia & Animation.

In the 2nd year of study, you would have studied Python Programming, Computer Hardware,
Maintenance and Administration, Computer Networks, Database System Concepts and PL/SQL,
Data Structures with Python, Operating System and Administration, Object oriented programming
and Design with Java, Software Engineering principles and practices.

In this year of study, you shall be applying your previous years learning along with specialised field
of study into projects and real-world applications.

Course Cohort Owner

A Course Cohort Owner is a faculty from the core discipline, who is fully responsible for one
specialised field of study and the cohort of students who have chosen to study that specialised field
of study.

Guidelines for Cohort Owner


1. Each Specialized field of study is restricted to a Cohort of 20 students which could include
students from other relevant programs.
2. One faculty from the Core Discipline shall be the Cohort Owner, who for teaching and
learning in allied disciplines can work with faculty from other disciplines or industry experts.
3. The course shall be delivered in boot camp mode spanning over 12 weeks of study, weekly
developmental assessments and culminating in a mini capstone.
4. The industry session shall be addressed by industry subject experts in the discipline only.
5. The cohort owner shall be responsible to identify experts from the relevant field and
organize industry session as per schedule.
6. Cohort owner shall plan and accompany the cohort for any industrial visits.
7. Cohort owner shall maintain and document industrial assignments, weekly assessments,
practices and mini project.
8. The cohort owner shall coordinate with faculties across programs needed for their course to
ensure seamless delivery as per time table
9. The cohort owner along with classroom sessions can augment or use supplementally
teaching and learning opportunities including good quality online courses available on
platforms like Karnataka LMS, Infosys Springboard, NPTEL, Unacademy, SWAYAM , etc.

Department of Collegiate & Technical Education Bengaluru-560001 Page 75


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Course outcome: A student should be able to


Work in cloud environment to demonstrate various aspects of Cloud computing and leverage
CO1
them for project needs
Demonstrate the Public cloud services like compute, storage, networking, IAM, databases and
CO2
configure them for given specification

CO3 Design, build and deploy a cloud native application using public cloud services and APIs

CO4 Adopt Cloud security policies, Monitor and troubleshoot basic issues in Cloud services

CO5 Administer cost, privileges and manage an existing deployed network

Department of Collegiate & Technical Education Bengaluru-560001 Page 76


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Detailed course plan


Wee Da
CO PO 1st session (9am to 1 pm) L T P 2ND session (1.30pm to 4.30pm) L T P
k ys
Building blocks of cloud computing - IP addressing
- Introduction
- Networking - Routers and Switches
- Basic Architecture of Computer
- Networking - Firewalls
- Servers vs Desktop and laptops
1 1 1 4 - Databases 2 1
- Client-Server Computing
- Server virtualization
- Hard Drives - HDDs and SDDs
- Docker Containers
- Storage - block vs file vs object
- Application Programming Interfaces (API)
-
Introduction to cloud computing
- Introduction
- From Mainframes to Clouds Evolution –
1
How to host an application in traditional - Cloud Deployment Models - Public,
IT Infra Private, Hybrid, and Community.
- What is Cloud Computing - List out the examples for each cloud
1 1 2 3 1 2 1
- Example Cloud Application deployment models
- Cloud Computing Service Models - Benefits of Cloud
- Software as a Service (SaaS)
- Platform as a Service (PaaS)
- Infrastructure as a Service (IaaS)
-

5 4 3 Cloud Architecture 3 1 - Event-driven Architecture 2 1

Department of Collegiate & Technical Education Bengaluru-560001 Page 77


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Introduction - List out the Popular Cloud service


- Stateful vs Stateless Service providers along with their features (AWS,
- Scaling up vs Scaling out Azure, GCP)
- Load Balancing - Open Source cloud computing platforms
- Fault Tolerance
- Loose coupling
- Monolithic and Microservices
Architectures
Azure
- Regions, Region Pairs, Sovereign Regions
- Availability Zones and Data Centers
Cloud Overview
- Resources, Resource Groups,
Subscriptions, Management Groups
AWS
- Overview of Azure Services
- Regions and AZ
- VM and App Services
5 4 4 - Tour of AWS Console and Services in 4 3
- Azure Storage and Data Services
AWS
- Azure Networking Services and
- Creating an AWS Account
Microservices
- Shared Responsibility Model and AWS
- Tour of the Azure Portal
Acceptable Policy
- Azure Free Account
- Creating an Azure Free Account
- Shared Responsibility Model

5 Developmental Assessment Assessment Review and corrective action 3

Department of Collegiate & Technical Education Bengaluru-560001 Page 78


Diploma in Computer Science & Engineering C 20 : 2020 - 21

1 1,5 6 Build blocks of Cloud Computing 2 3 Weekly Assignment(1PM-2PM)


Cloud IAM Services
- What is IAM ?
- What is IAM used for ?
- Principle of least privilege
- AWS IAM
1 1 1 Peer Review 4 2 1
- IAM Introduction: Users, Groups, Policies
- IAM Users & Groups Hands on
- IAM Policies
- IAM Policies Hands On

- IAM MFA Overview

2 - IAM MFA Hands On


- AWS Access Keys, CLI & SDK Azure Active Directory
- AWS CLI Setup - Introduction to Azure Active Directory
- AWS CLI Hands On - Azure Active Directory Features

1,5 1,4 2 - AWS Cloud Shell 4 - Azure Subscriptions 1 2


- IAM Roles for AWS Services - Creating an Azure subscription
- IAM Roles Hands On - Trust between Azure Subscription and Azure
- IAM Security Tools AD
- IAM Security Tools Hands On
- IAM Best Practices
- Creating a user in Azure AD - Lab - Azure AD - Creating a group
1,5 4 3 2 2 1 2
- Introduction to Role Based Access Control - Azure AD Roles

Department of Collegiate & Technical Education Bengaluru-560001 Page 79


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Lab - Role-based assignments (Reader Role, - Lab - Azure AD- Assigning a Azure AD role
Resource group level, Subscription level, - Azure AD Custom Domains
Contributor Role, User Access Administrator - Self Service Password Reset
Role) - Lab on self-service password reset
- MFA or 2FA
- Lab - MFA on per user basis
- Installing Powershell
- Conditional Access Policies
- Quick look at a couple of commands
- Lab - Conditional Access Policies
1,3, - Installing Azure Powershell
1 4 1 2
4 - Azure Powershell and Azure CLI
- Installing Azure CLI
- What is Powershell
- Azure CLI Hands on

5 Developmental Assessment Assessment Review and corrective action 3


2,3
1,5 6 IAM services 2 3 Weekly Assignment
,4
Cloud Computing Instances
- Virtualization in Cloud Computing
- What is Virtualization ?
- Virtualization as a Concept of Cloud
2,3 Peer review
3 1,5 1 4 2 1
,4 Computing
- Architecture of Virtualization
- Types of Virtualization

AWS EC2 Instance - Private vs Public vs Elastic IP


2,3
1,5 2 1 3 3
,4 - EC2 Basics - Lab - Private vs Public vs Elastic IP

Department of Collegiate & Technical Education Bengaluru-560001 Page 80


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Create a EC2 instance with EC2 user data - EC2 Placement groups
- EC2 instance types basics - Lab - EC2 Placement groups
- Security groups and classic ports - Elastic Network Interface (ENI) Overview
- Lab - Security Groups - Lab - ENI
- How to SSH to EC2 Instance - EC2 Hibernate
- EC2 Instance Connect - Lab - EC2 Hibernate
- EC2 Instance Roles Demo - EC2 Advance concepts (Nitro, vCPU,
Capacity Reservations)

- EBS Overview
Azure Virtual Machines
- Lab - EBS
- The Virtual Machine Service
- EBS Snapshots
- Deploying a Virtual Machine
- Lab - EBS Snapshots
- Lab - Building a Windows Virtual Machine
- AMI Overview
- Connecting to the Virtual Machine
- Lab - AMI
- Lab - Installing IIS
2,3 - EC2 Instance Store
2,5 3 1 4 3
,4 - State of the Virtual Machine
- EBS Volume Types
- Lab - State of the Virtual Machine
- EBS Multi-Attach
- Lab - Building a Linux Virtual Machine
- EBS Encryption
- Lab - Deploying a web server on the Linux
- EFS
virtual machine
- Lab - EFS
- EFS vs EBS

Department of Collegiate & Technical Education Bengaluru-560001 Page 81


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Lab - Deploying a Linux machine - SSH


keys
- The network interface - Lab - Data Disks Snapshot
- Network Security Groups - Azure Shared Disks
- Lab - Network Security Groups - Lab - Un-managed disks
- Azure Virtual Machines - Data Disks - Lab - Custom Script Extensions
- Lab - Adding data disks - Lab - Linux Virtual Machines - Cloud init
2,3,
2,5 4 1 3 3
4 - Server-side encryption - Azure Disk - Virtual Machine - Boot Diagnostics
Storage - Lab - Virtual Machine - Serial Console and
- Encryption with customer managed keys Run command
- Lab - Azure Disk Encryption - Azure Dedicated Host
- Disks - Understanding IOPS and
Throughput
-

5 CIE 1 – Written and Practice Test Assessment Review and corrective action 3

1 4 6 2 3 Weekly Assignment
Computing Instances
- Cloud Networking
- Introduction
2,3 Peer review
4 2 1 4 - CIDR, Private vs Public IP 2 1
,4
- Subnet Overview
- Networking - VPC

Department of Collegiate & Technical Education Bengaluru-560001 Page 82


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Default VPC Overview


- VPC Overview
- Lab - VPC
- Lab – Subnet
- Internet Gateways & Route Tables
- Lab - Internet Gateways & Route Tables
- Bastion Hosts
- Lab - Bastion Hosts
- NAT Instances
- Lab - NAT Instances
- NAT Gateways
- Lab - NAT Gateways
- Direct Connect & Direct Connect Gateway
- NACL & Security Groups
- AWS PrivateLink - VPC Endpoint Services
- Lab - NACL & Security Groups
- AWS ClassicLink
- VPC Reachability Analyzer
- Transit Gateway
- Lab - VPC Reachability Analyzer
- VPC Traffic Mirroring
- VPC Peering
2 1,3 2 1 3 - IPv6 for VPC 1 2
- Lab - VPC Peering
- Lab - IPv6 for VPC
- VPC Endpoints
- Egress Only Internet Gateway
- Lab - VPC Endpoints
- Lab - Egress Only Internet Gateway
- VPC Flow Logs
- Networking Costs in AWS
- Lab - VPC Flow Logs

Department of Collegiate & Technical Education Bengaluru-560001 Page 83


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Site to Site VPN, Virtual Private Gateway


& Customer Gateway
- Lab - Site to Site VPN, Virtual Private
Gateway & Customer Gateway
- Attaching a secondary network interface
- Virtual Networks in Azure - Lab - Adding a secondary network
- Introduction interface
- The network interface - Network Security Groups
- Lab - Working with Azure virtual - Lab - Network Security Groups (Working
2,3
2 3 1 3 3
,4 networks with rules, Priority setting, Subnets)
- Lab - Deploying a machine to the virtual - Virtual Network Peering
network - Lab - Virtual Network Peering - Setup and
Implementation

- Virtual private network - Connection Troubleshoot


- Point-to-Site VPN Connections - Connection Monitor
- Lab - Point-to-Site VPN Connections - IP Flow Verify
- Site to Site VPN Connection - Next hop
- Lab - Site to Site VPN Connection - NSG Diagnostic
2,3
2 4 2 2 1 2
,4 - Azure VPN Gateway - High Availability - Lab - Network Watcher - NSG Flow logs
- Azure ExpressRoute - User Defined Routes
- Azure ExpressRoute peering - Lab - User Defined Routes (Setup, Route
- Network Watcher table and Enable forwarding)
- Azure Firewall

Department of Collegiate & Technical Education Bengaluru-560001 Page 84


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Lab - Azure Firewall

5 Developmental Assessment Assessment Review and corrective action 3


2,3 Cloud Networking
2 6 2 3 Weekly assignment
,4
High Availability and Scalability in Cloud
- High Availability and Scalability
- Elastic Load Balancer (ELB) and Auto
Scaling Groups (ASG)
- Classic Load Balancer (CLB)
- Lab - CLB
- Application Load Balancer (ALB)
- Lab - ALB
Peer review
- Network Load Balancer (NLB)
2,3 - Lab - NLB
5 2,5 1 4 1 2
,4 Mini Project Activity – Status review
- Gateway Load Balancer (GWLB)
- Elastic Load Balancer - Sticky Sessions
- Elastic Load Balancer - Cross Zone Load
Balancing
- Elastic Load Balancer - SSL Certificates
- Elastic Load Balancer - Connection
Draining
- Auto Scaling Groups (ASG) Overview
- Lab - ASG

Department of Collegiate & Technical Education Bengaluru-560001 Page 85


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Auto Scaling Groups - Scaling Policies


- Lab - Auto Scaling Groups - Scaling Policies

The Azure Load Balancer Service


Explore Availability and Scalability in Azure - Azure Basic Load Balancer
- Availability Sets - Azure Load Balancer and SKU's
- Lab - Availability Sets - Lab - Basic Load Balancer - Setup and
- Use case scenario - Availability sets Implementation
- Availability Zones - Basic Load Balancer - NAT rules
2,3 - Lab - Availability Zones - Lab - Basic Load Balancer - Scale Set
2,5 2 1 3 3
,4
- Azure virtual machine scale sets - Setting up the scale set,Setting up the scale
- Lab - Azure Virtual Machine Scale Sets, set - Resources, Load Balancer Setup,
Scaling conditions and Flexible Scaling
Orchestration Mode - Lab - Azure Load Balancer - Standard SKU
- - Setup
-
- Lab - Azure Load Balancer - Standard SKU
Azure Application Gateway
- Implementation
- Open Systems Interconnection Model
- Lab - Azure Load Balancer - Multiple
- Azure Application Gateway - Components
2,3 3 Backend Pools
2,5 4 1 2
,4 - Lab - Azure Application Gateway - URL
- Lab - NAT Rules - Same port number
Routing
- Lab - Standard Load Balancer - Outbound
- Setup and Implementation
Connectivity

Department of Collegiate & Technical Education Bengaluru-560001 Page 86


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Load Balancer - Session Persistence - Lab - Azure Application Gateway -


Multiple Sites
- Setup and Implementation
Azure Database Service
- Major Database Features
Databases in Cloud
- Database on VM
- Introduction
- Azure SQL
- RDS, Aurora, ElasticCache
- Which Azure SQL to Choose?
- Amazon RDS Overview
- Creating and Connecting to Azure SQL
- RDS Read Replicas vs Multi AZ
- Connecting the Catalog to the Database
- Lab - Amazon RDS
- Securing the Database Connection
2,3 - RDS Encryption + Security
2,5 4 1 3 3
,4 - Connecting the Inventory to the Database
- Amazon Aurora
- Cosmos DB
- Lab - Amazon Aurora
- SQL vs NoSQL Databases
- Aurora - Advanced Concepts
- Cosmos DB Consistency Levels
- ElasticCache Overview
- Creating and Using Cosmos DB
- Lab - ElasticCache
- Connecting the Orders Function to Cosmos
DB
Azure MySQL and Azure PostgreSQL Overview

5 CIE 2 – Written and Practice Test Assessment Review and corrective action 3
2,3
2,5 6 High Availability and Scalability 2 3 Weekly Assignment
,4
Peer review Cloud Storage Service
2,3 2,3
6 1 4 1 2
,5 ,4 Mini Project Activity – Status review - AWS Storage Services

Department of Collegiate & Technical Education Bengaluru-560001 Page 87


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Amazon S3 - Section Introduction


- S3 Buckets and Objects
- Lab - S3 Buckets and Objects
- S3 Versioning
- Lab - S3 Versioning
- S3 Encryption
- Lab- S3 Encryption
- S3 Security & Bucket Policies
- Lab - S3 Security & Bucket Policies
- S3 Websites
- S3 CORS
- Lab - S3 CORS
- S3 Consistency Model
- Lab - S3 Pre-signed URLs
- S3 MFA Delete
- S3 Storage Classes + Glacier
- Lab - S3 MFA Delete
- Lab - S3 Storage Classes + Glacier
- S3 Default Encryption
- S3 Lifecycle Rules
- S3 Access Logs
2,3 2,3 - Lab - S3 Lifecycle Rules
2 1 3 1 2
,5 ,4 - Lab - S3 Access Logs
- S3 Analytics
- S3 Replication (Cross Region and Same
- S3 Performance
Region)
- S3 Event Notifications
- Lab - S3 Replication
- S3 Pre-signed URLs
2,3 2,3 - Athena Overview Azure Storage Data Services
3 2 2 1 2
,5 ,4

Department of Collegiate & Technical Education Bengaluru-560001 Page 88


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Lab - Athena - Introduction


- AWS Snow Family Overview - Benefits of Azure Storage
- Lab - AWS Snow Family - What are storage accounts
- Amazon FSx - Different types of storage accounts
- Lab - Amazon FSx - Lab - Creating an Azure storage account
- Storage Gateway Overview - Azure Blob service
- Lab - Storage Gateway - Lab - Blob service - Uploading a blob,
- AWS Transfer Family Accessing the blob
- Compare AWS Storage options

- Azure Storage Accounts - Different - Azure Storage Accounts - Data


authorization techniques Redundancy
- Lab - Using Azure Storage Explorer, - Configuring Storage Redundancy
Using Access keys - Storage Accounts - Access Tiers
- Lab - Shared Access Signatures - Blob - Lab - Storage Accounts - Hot and Cool
Level, At the Storage Account Level Access Tier, Archive Access Tier
2,3 2,3
4 4 3
,5 ,4 - Lab - Azure Storage Accounts - Stored - Azure Storage Accounts - Lifecycle policies
Access Policy - Lab - Azure Storage Accounts - Object
- Lab - Azure Storage Accounts - Active Replication
Directory Authentication - Azure File shares
- Azure Storage Accounts - Different - Lab - Working with File shares
authorization techniques - Azure File Sync

Department of Collegiate & Technical Education Bengaluru-560001 Page 89


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Lab - Azure File Sync Service - Setup and


Configuration

5 Developmental Assessment Assessment Review and corrective action 3


2,3 2,3 Storage Service - Weekly Assignment
6 2 3
,5 ,4
DNS Services and Content Delivery
- What is DNS ?
- Route 53
- Overview
- Route 53 - Registering a domain
- Route 53 - Creating our first records
- Route 53 - EC2 Setup
- Route 53 - TTL
Peer Review - Route 53 CNAME vs Alias
2,3 2,3 Mini Project Activity – Status review - Routing Policy - Simple, Weighted
7 1 4 3
,5 ,4
- Routing Policy - Latency
- Route 53 - Health Checks
- Lab - Route 53 - Health Checks
- Routing Policy - Failover, GeoLocation,
Geoproximity
- Lab - Routing Policy - Traffic Flow &
Geoproximity hands On
- Routing Policy - Multi Value
- 3rd Party Domains & Route 53

Department of Collegiate & Technical Education Bengaluru-560001 Page 90


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Azure Private DNS


- What is CDN ?
- Lab- Azure Private DNS
- Advantages of CDN
- Azure Public DNS
- CloudFront & AWS Global Accelerator
- Azure CDN
- CloudFront Overview
2,3 2,3 - Azure CDN Features
2 - Lab - CloudFront with S3 2 2 1 2
,5 ,4 - How to use Azure CDN ?
- CloudFront Signed URL / Cookies
- Lab - Create Azure CDN
- CloudFront Advanced Concepts
- Create a storage account
- AWS Global Accelerator - Overview
- Enabling CDN for storage account
- Lab - AWS Global Accelerator

Serverless Computing in Cloud


Amazon DynamoDB
- What is Serverless computing?
- Lab - Amazon DynamoDB
- Benefits of serverless computing
- API Gateway Overview
- Serverless application patterns
2,3 2,3 - Lab - API Gateway Overview
3 - Serverless computing in AWS 1 3 1 2
,5 ,4 - API Gateway Security
- Lambda Overview
- AWS Cognito Overview
- Lab - Lambda
- Serverless Application Model (SAM)
- Lambda Limits
Overview
- Lambda@Edge
Lab - Creating a Testing a Logic App
Azure Serverless
2,3 2,3 - Azure Serverless Storage and Data
4 - How Azure Does Serverless 1 3 3
,5 ,4 - Using Azure Storage with Functions
- Overview of Azure Functions
- Using Cosmos DB with Functions

Department of Collegiate & Technical Education Bengaluru-560001 Page 91


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Lab - Creating and Testing a Azure - Securing Azure Functions


Function - Serverless Solutions Architecture
- Logic Apps

5 Development Assessment Assessment Review and corrective action 3


2,3 2,3 DNS Services and Content Delivery
6 2 3 Weekly Assignment
,5 ,4
Container Services
- The need for containers
- Introduction to Docker

Peer review - Lab - Deploying Docker on a virtual


2,3 2,3 Mini Project Activity – Status review machine
1 4 1 2
,5 ,4
- Lab - Running the nginx container on the
Linux VM
- Lab - Practice Docker commands
- The need for an image registry
8
Azure Container Registry
Amazon ECR - Lab - Azure Container Registry
2,3 2,3 - Lab - Amazon ECR - Publishing to the Azure Container Registry
2 4 2 1
,5 ,4
- Publishing to Amazon ECR - Publishing to the Azure Container Registry
- Resources
Amazon ECS Azure Container Instances
2,3 2,3 - Lab - Creating ECS Cluster 4 - Lab - Azure Container Instances and Azure
3 3
,5 ,4
- Lab - Creating ECS Service Container Groups

Department of Collegiate & Technical Education Bengaluru-560001 Page 92


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Amazon ECS - Auto Scaling, Rolling


Updated and Solutions Architectures
Kubernetes
- What is Kubernetes ?
- Kubernetes components
Azure Kubernetes Services (AKS) Overview
- Learn Kubernetes Basics
- Lab - Deploying an Azure Kubernetes
- Create a Cluster
2,3 2,3 cluster
4 1 3 3
,5 ,4 - Deploy an App
- Lab - Deploying our application
- Explore your App
Amazon EKS Overview
- Expose your App Publicly
- Scaling your App

5 CIE 3 – Written and Practice Test Assessment Review and corrective action 3
2,3 2,3
6 Container Services 2 3 Weekly Assignment
,5 ,4
Monitoring and Auditing
- AWS Monitoring

Peer review - CloudWatch Metrics

Mini Project Activity – Status review - CloudWatch Custom Metrics and


3 2,3 1 4 2 1
Dashboards
9
- CloudWatch Logs
- Lab - CloudWatch Logs
- CloudWatch Agent & CloudWatch Logs - CloudTrail Overview
2,3 2,3
2 1 3 3
,5 ,4 Agent - Lab - CloudTrail

Department of Collegiate & Technical Education Bengaluru-560001 Page 93


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- CloudWatch Alarms - AWS Config - Overview


- Lab - CloudWatch Alarms - Lab - AWS Config
- AWS CloudWatch Events - CloudTrail vs CloudWatch vs Config
- Amazon EventBridge

Azure Monitoring - Lab - Azure Monitor - Alerts


2,3 2,3 - Azure Monitor Service - What is a Log Analytics Workspace?
3 2 2 3
,5 ,4
- Quick look at Azure Monitor - Lab - Creating a Log Analytics workspace
- Lab - Connecting virtual machine to the - Log Analytics - Alerts
workspace - What is Application Insights
5 3,4 4 4 3
- Log Analytics Queries - Quick Look at Application Insights
- Lab - Log Analytics Queries - Application Insights Tips and Tricks

5 Development Assessment Assessment Review and corrective action 3

4 2,3 6 Monitoring and Auditing 2 3 Weekly Assignment


Cloud Security
- Introduction
Defense in depth in security
Peer review
1 3,4 1 4 - AWS Security & Encryption 1 2
Mini Project Activity (2)
- KMS Overview
10
- Lab - KMS with CLI
- KMS Key Rotation
- AWS Secrets Manager - Overview
- SSM Parameter Store Overview
2,3 3,4 2 4 - Lab - AWS Secrets Manager 1 2
- Lab - SSM Parameter Store (CLI)
- CloudHSM

Department of Collegiate & Technical Education Bengaluru-560001 Page 94


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Lab - SSM Parameter Store (AWS - Shield - DDoS Protection


Lambda)
- Amazon Inspector
- Web Application Firewall (WAF)
- Macie
- Lab - WAF & Shield
2,3, - AWS Well Architected Framework with
3 3 1 3 1 2
4 - Amazon GuardDuty
more focus on Security

- Azure Key Vault


- VM Security Best Practices
- Azure Monitor
- Networking Security Best Practices
3 3,4 4 1 3 - Azure Sentinel (SIEM and SOAR) 3
- Database Security Best Practices
- Azure Policy
- Zero Trust security
Azure Security Center
5 CIE 4 – Written and Practice Test Assessment Review and corrective action 3

2,3 3,4 6 Defense in depth in security 2 3 Weekly Assignment


Cloud Migration
- How to plan a cloud migration?
Peer Review - Cloud migration process
2,3, Mini Project Activity – Status review 4 - Cloud Migration strategies
1,5 1 2 1
4
11 Prepare a report that, how will it helpful to small
scale industry moving from its own data center to
cloud?
Use any cloud migration tool and migrate a
2,3, - Cloud migration tools 1 3
2,3 2 1 2
4 service.

Department of Collegiate & Technical Education Bengaluru-560001 Page 95


Diploma in Computer Science & Engineering C 20 : 2020 - 21

2,3 3 3 - AWS Tools 1 3 Cntd. 3


2.3, - Azure tools 1 3 Cntd.
2,3 4 3
4
5 Development Assessment Assessment Review and corrective action 3

3 2,3 6 Cloud Migration 2 3 Weekly Assignment


Big Data 1
- Big data examples BSE(5L orders/sec),jet
engine, Bank transactions, Social Media
Peer Review - What is Big Data?
2,3, Mini Project Activity – Status review - Types of Big data
1 1 2
4
- V’s of Big Data
- Sources of data
- Role of Big Data in AI&ML

12
Data Collection 2
- Frequency of data
- Flow characteristics of data (Streaming,
- Apache Hadoop
Transaction, Batch processing)
- HDFS
1,2, 2,3, - Data Cleaning or Data Cleansing
2 2 2 1
3 4 Install big data solution softwares like MangoDB,
1. Consider a local big-data source, identify
Hadoop Mapreduce or any other software
the frequency, flow of data.
2. Cleanse (eg: remove duplicates, formatting
mistakes, organize) the data based on

Department of Collegiate & Technical Education Bengaluru-560001 Page 96


Diploma in Computer Science & Engineering C 20 : 2020 - 21

requirements given by owner of data


(create your own rules)

1,2, - Transformation 3
3,4, - Data Access
- Data acquisition
5
- Integration - update patterns (e.g. bulk, transactional,

Transfer the data using an ETL tool and store it batch/micro-batch)

in a big-data solution DB (like MangoDB) access patterns (e.g. sequential vs. random access,
continuous usage vs.ad hoc)
Storage and Data Management
2,3,
3 2 2 1. Calculate efficiency of different big-data
4,6 - Storage Solutions based on
solutions during a. bulk b. transactional c.
- cost and efficiency
micro-batch updates
- latency and durability characteristics 2. Calculate efficiency of different big-data
1. Compare multiple big-data solutions solutions during a. sequential vs. random
based on a. Cost and Efficiency b. Latency access b. continuous usage vs ad hoc
and durability

- searching and retrieving data catalogs and 3


Managing Metadata
metadata
- creating and updating data catalogs and
2,3 3,4 4 4 Create or update a standard or custom
metadata
metadata using AWS S3 or any other cloud
service
3
5 CIE 5 – Written and Practice Test Assessment Review and corrective action

1,3 5 6 Apache Hadoop 2 3 Weekly Assignment

Department of Collegiate & Technical Education Bengaluru-560001 Page 97


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Project
a) Identification of the problem statement
Internship (from at least 3 known problems) the students
a) Secondary research on various
industries and their operations to identify would like to work as part of the project –
at least 3 companies along with the areas either as provided by faculty or as identified by
of work interest and develop an internship
plan that clearly highlights expectations the student. Document the impact the project
from the industry during the internship. will have from a technical, social and business
1 b) Design and develop a cover letter for
2,3, perspective. 4 11
13 to an internship request to all 3 identified 2 4 19
4,6
4 companies and the resume to be submitted b) Design and develop the project solution
to potential companies.
Prepare for an internship interview to or methodology to be used to solve at least one
highlight your interests, areas of study, of the problems identified.
career aspirations and personnel
competence – including the areas of Prepare a project plan that will include a
learning you expect to learn during schedule, WBS, Budget and known risks along
internship.
with strategies to mitigate them to ensure the
project achieves the desired outcome.
**Note: Saturday session from 9 AM -2 PM

Department of Collegiate & Technical Education Bengaluru-560001 Page 98


Diploma in Computer Science & Engineering C 20 : 2020 - 21

CIE and SEE Assessment Methodologies

Duration
CIE Assessment Assessment Mode Max Marks
In hours

Week 3 CIE 1– Written and practice test 4 30


Week 5 CIE 2– Written and practice test 4 30
Week 8 CIE 3– Written and practice test 4 30
Week 10 CIE 4– Written and practice test 4 30
Week 12 CIE 5– Written and practice test 4 30
Week 13 Assessment for Project or Internship 4 30
On line Course work (At least one related to the specialization) 30
Portfolio evaluation (Based on industrial assignments and weekly developmental assessment) * 30
TOTAL CIE MARKS (A) 240
SEE 1 - Theory exam (QP from BTE) Conducted for 100 marks 3 hour duration reduced to 60 marks 3 60
SEE 2 – Practical 3 100
TOTAL SEE MARKS (B) 160
TOTAL MARKS (A+B) 400
* The industrial assignment shall be based on peer-to-peer assessment for a total of 10 marks (on a scale of 1 to 10) and in the event of a group
assignment the marks awarded will be the same for the entire group, the developmental assessment will be for a total of 20 marks and based on
MCQ/case study/demonstration and such other assignment methods

Department of Collegiate & Technical Education Bengaluru-560001 Page 99


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Scheme of Evaluation for SEE 2

Sl. No Description Marks

1 Case submission 20

2 Case presentation 20

3 Case innovation 20

4 Result 20

5 Viva voce 20

Total 100

Department of Collegiate & Technical Education Bengaluru-560001 Page 100


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Submission / Content Evaluation Rubrics


Evaluation
5 4 3 2 1 Student Score
Parameters
Identifies and Identifies and
Identifies and Identifies and Identifies limited
Identification of understands all understands most
understands some of understands a few issues
the main the main issues of the main issues 5
the issues in the of the issues in the in the problem
issues / problem in the problem in the problem
problem statement problem statement statement
statemen statement

Insightful and Superficial analysis of


Analysis of the Thorough analysis of Incomplete analysis of No analysis of the
thorough analysis some of the issues in 4
issues most of the issues the issues issue
of all the issues the problem statement

Well documented,
Comments on reasoned and Appropriate, well
effective solutions pedagogically thought out
Superficial and / or Little and/or
/ strategies (The appropriate comments about
inappropriate solutions inappropriate No action to all
solution may be in comments on solutions, or
to some of the issues solutions to all of the issues in the 2
the problem solutions, or proposals for
in the problem issues in the problem problem statement
statement already proposals for solutions, to most of
statement statement
or proposed by solutions, to all the issues in the
you) issues in the problem statement
problem statement
Excellent research
Links to course into the issues with Good research and
Limited research and Incomplete research
learning and clearly documented documented links to No research or links
documented links to and links to any 3
additional links to course the materials read to any reading
any readings reading.
research learnings and during the course
beyond.

Total 14/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 101


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Presentation Evaluation Rubrics

Evaluation Student
5 4 3 2 1
Parameters Score
Clear flow of
ideas Most ideas flow Hard to
Very clear and concise No flow in
but is lost at follow the
flow of ideas Demonstrates the
times Limited flow of
Demonstrates passionate interest in the presentation
Delivery & Enthusiasm evidence of ideas Lack 4
interest in the topic and topic and Poor
interest in and of
engagement with class / engagement presentation
examiner engagement enthusiasm
with class / skills
with the topic and interest
examiner
Limited
use of Poor visuals used
Visuals augmented
Use of visuals and some visuals
and extended visuals
Visuals related to the No use of visuals are not easy to 2
comprehension of the loosely
topic understand its
issues in unique ways related to
relevance.
the topic
Uses stage
effects such as
Uses stage effects props, sound Limited use of
such as props, sound effects, and stage effects
effects, and speech speech and/or used in a
modulation in a modulation in manner that did
No use of stage Poor stage effects
Staging unique and dramatic an effective not enhance the 5
effects usage
manner that enhances manner to understanding
the understanding of extend the of the issues in
the issues in the understanding the problem
problem statement. of the issues in statement.
the problem
statement.

Department of Collegiate & Technical Education Bengaluru-560001 Page 102


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Questions and Questions and


Excellent and salient discussions discussions
discussion points that addressed addressed
Involvement Little or no
elucidated material to important important
of the class / attempt to Did not engage
develop a deep information superficial
Examiners engage the the class /
understanding that issues of the
class / examiner and 3
• Questions Appropriate and developed problem
examiner in poor listening
• Discussions imaginative activities understanding statement
demonstrating skills
• Activities used to extend Appropriate Limited use of
their learning
understanding in a activities used activities to
creative manner to clarify clarify
understanding understanding

Total 14/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 103


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Results Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score
The topic was well 4
researched and all
information and
The topic was
data included are The topic was The topic was
researched but
accurate and from researched and researched and data
information and data Desired results
reliable sources of most information were not from
were only partly from not obtained,
information like and data were from reliable sources.
reliable sources of but some
high impact journals reliable sources of The proof was not
information. relevant
Problem standards, etc. information. The backed up with
The proof was not fully research was
outcome The proof was proof was backed data, analysis or
backed up with good done. Outcome
enough backed up up with good data reasoning as taught
data or reasoning as not obtained as
with accurate data, and reasoning as in the class.
taught in the class. per the
analysis and taught in the class. Some outcome
Partial outcome problem brief
reasoning beyond Outcome achieved as obtained as per the
achieved as per the
the class learning. per the problem brief problem brief
problem brief
Outcome achieved
beyond the problem
brief
Made effective use of Made good use of class 3
class principles, principles, models and
Made some use of Poorly applied
models and theories. theories Some creative
Application of class principles, Made limited use of class
Also used creativity ideas were explored to
class learning in models and theories class principles, principals,
to find effective find desired outcome
problem solving No creative ideas or models and theories models and
results appropriate but within the
models explored theories
to industry beyond framework of class
class learning. learning
Queries Excellent Good response to Satisfactory response Limited response 2
Response to Poor or no
response to questions and to questions and to questions and
Class / response to
comments and discussions with some discussions with discussions with
Examiners questions and
discussion with connection made to limited reference to no reference to
Queries did not
appropriate content theory/research theory/research theory/research

Department of Collegiate & Technical Education Bengaluru-560001 Page 104


Diploma in Computer Science & Engineering C 20 : 2020 - 21

supported by participate in
theory/research the discussions.
Has not 4
Provides limited
Provides detailed and Provides adequate and provided
Provides appropriate and somewhat
appropriate mostly appropriate appropriate
Conclusions conclusion for the appropriate
conclusion for the conclusions for the conclusions for
problem statement conclusions for the
problem statement problem statement the problem
problem statement
statement.
Total 13/20

Case Innovation Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score
Finding new The newly The newly The newly discovered The newly No new 5
processes / discovered discovered processes processes / models / discovered processes /
models / processes / models / models / approaches have processes / models models /
approaches / approaches are of approaches are of limited application but / approaches has approaches
good quality and appropriate quality relevant to the restricted were identified
relevant but limited relevance problem application
Proposing ideas Various ideas and Various ideas and Some ideas or Few ideas have No ideas or 3
and innovative innovative solutions innovative solutions innovative solutions been proposed innovative
solutions in terms have been proposed have been proposed have been proposed solutions have
of processes / and their application as well as the outline but the process of been proposed
models / have been clearly of the process to applying them hasn't
approaches and outlined apply them been specified
how they can be
applied to solve
the problem on
hand
Using creativity Wherever necessary Creativity techniques Creativity techniques Creativity Creativity 2
techniques to creativity techniques are frequently are utilized at times in techniques are technique are
provide and are utilized to utilized in more than less than 50% of the used a few times not utilized to
reason good ideas 50% of the occasions occasions only analyse and

Department of Collegiate & Technical Education Bengaluru-560001 Page 105


Diploma in Computer Science & Engineering C 20 : 2020 - 21

which are original analyse and solve the solve the


and problem problem
unconventional
Finding Constraints and weak Constraints and weak A critical analysis is Only a description No constraints 3
constraints and points are are identified undertaken of the working or weak points
weak points in understood process and have been
existing processes methods are identified.
/ models / provided
approaches or
methods
Total 13/20

Assessment framework for SEE (Theory) – 100 Marks / 3 hours (Reduced to 60 marks)

Programme: Computer Science & Engineering Semester: V


Course: Cloud Computing Max Marks: 100
Course Code: 20CS53I Duration: 3 Hrs
Instruction to the Candidate: Answer one full question from each section.
Qn.No Question CL CO Marks
Section-1
1.a) 1
b)
2.a)
b)
Section-2
3.a) 2
b)
4.a)
b)
Section- 3

Department of Collegiate & Technical Education Bengaluru-560001 Page 106


Diploma in Computer Science & Engineering C 20 : 2020 - 21

5.a) 3
b)
6.a)
b)
Section-4
7.a) 4
b)
8.a)
b)
Section-5
9.a) 5
b)
10.a)
b)

Assessment framework for CIE


Note : Theory to be conducted for 1 hour and practice for 3 hours, total duration of exam – 4 hours
Programme Computer Science & Engineering Semester V
Course Cloud Computing Max Marks 30
Course Code 20CS53I Duration 4 hours
Name of the course coordinator
Note: Answer one full question from each section.
Qn.No Question CL CO PO Marks
L3/L4

Department of Collegiate & Technical Education Bengaluru-560001 Page 107


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Section-1 (Theory) – 10 marks


1.a)
b)
2.a)
b)
c)
Section-2 (Practical) - 20 marks
3)
4)

Equipment/software list with Specification for a batch of 20 students

Sl. No. Particulars Specification Quantity


1. Intel i5, 4GB RAM,
Computers 20
500GB SSD
2.
Cloud – AWS/AZURE/GCP or any similar public cloud environment 20
3.
Broadband connection Atleast 50MBPS 1

Department of Collegiate & Technical Education Bengaluru-560001 Page 108


Cyber Security
Diploma in Computer Science & Engineering C 20 : 2020 - 21

Diploma in Computer Science & Engineering


Computer Science &
Program Semester 5
Engineering

Course Code 20CS54I Type of Course L:T:P (104:52:312)

Course Name Cyber Security Credits 24

CIE Marks 240 SEE Marks 160

Introduction:
Welcome to the curriculum for the Artificial Intelligence and Machine Learning (AI&ML)
Specialisation. This specialisation course is taught in Bootcamp mode. Bootcamps are 13 weeks,
intense learning sessions designed to prepare you for the practical world – ready for either industry
or becoming an entrepreneur. You will be assisted through the course, with development-based
assessments to enable progressive learning.

In the era of connected computing devices, securing the personal data, application, system, network
and organization becomes the challenging task in the field of Computer science and Engineering.
The specialization prepare students to take up job or to become entrepreneur in the challenging
area of Cyber security

Pre-requisite

Before the start of this specialisation course, you would have completed the following courses;

In the 1st year of study, you would have studied Engineering Mathematics, Communication Skills,
Computer Aided Engineering Graphics, Statistics & Analysis, Basic IT Skills, Fundamentals of
Computer, Fundamentals of Electrical and Electronics Engineering, Project Management skills and
Multimedia & Animation.

In the 2nd year of study, you would have studied Python Programming, Computer Hardware,
Maintenance and Administration, Computer Networks, Database System Concepts and PL/SQL,
Data Structures with Python, Operating System and Administration, Object oriented programming
and Design with Java, Software Engineering principles and practices.

In this year of study, you shall be applying your previous years learning along with specialised field
of study into projects and real-world applications.

Course Cohort Owner

Department of Collegiate & Technical Education Bengaluru-560001 Page 109


Diploma in Computer Science & Engineering C 20 : 2020 - 21

A Course Cohort Owner is a faculty from the core discipline, who is fully responsible for one
specialised field of study and the cohort of students who have chosen to study that specialised field
of study.

Guidelines for Cohort Owner


1. Each Specialized field of study is restricted to a Cohort of 20 students which could include
students from other relevant programs.
2. One faculty from the Core Discipline shall be the Cohort Owner, who for teaching and
learning in allied disciplines can work with faculty from other disciplines or industry experts.
3. The course shall be delivered in boot camp mode spanning over 12 weeks of study, weekly
developmental assessments and culminating in a mini capstone.
4. The industry session shall be addressed by industry subject experts in the discipline only.
5. The cohort owner shall be responsible to identify experts from the relevant field and
organize industry session as per schedule.
6. Cohort owner shall plan and accompany the cohort for any industrial visits.
7. Cohort owner shall maintain and document industrial assignments, weekly assessments,
practices and mini project.
8. The cohort owner shall coordinate with faculties across programs needed for their course to
ensure seamless delivery as per time table
9. The cohort owner along with classroom sessions can augment or use supplementally
teaching and learning opportunities including good quality online courses available on
platforms like Karnataka LMS, Infosys Springboard, NPTEL, Unacademy, SWAYAM , etc.

Course outcome: A student should be able to


Design, optimize, operate and maintain a secure network/system/application/cloud and data
CO1
resources for given requirements
CO2 Apply cryptography to secure a cyber system.

CO3 Respond to incidents to mitigate immediate and potential threats .

Test, implement, deploy, maintain and review the infrastructure to effectively manage the
CO4
network and resources.

CO5 Monitor network to actively remediate unauthorized activities.

Department of Collegiate & Technical Education Bengaluru-560001 Page 110


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Detailed course plan


We Da
CO PO 1st session (9am to 1 pm) L T P 2ND session (1.30pm to 4.30pm) L T P
ek ys
- Protecting your personal data
- Online identity Introduction and Basic concepts of cyber
- Where is your data ? security
- Smart devices What is Cyber security, Security
- What do attackers want ? principles
- Identity theft CIA, AAA
- Protecting your organization data Vulnerability, Threat, Risk, attack and
- Traditional data Impact
- Cloud; IoT; Big data People, Process and Technology
- Types of data McCumbers Cube
1 1 1 1 4 - - 3
- Sensitive and non sensitive data Cyber Security
- Personal data, PII data - Brief history and types
- Data classification - Infrastructure, network, cloud, IOT,
- Ex: Govt. of India classification of data application.
- Unclassified - Purpose and Importance
- Restricted - Challenges
- Confidential - Applications
- Secret How does cyber security work?
- Top secret
-

Department of Collegiate & Technical Education Bengaluru-560001 Page 111


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Recap –
Topology Hackers
OSI Model Who are they?
TCP/IP Model What is not hacking

1 1,5 2 Internet protocols 3 1 Types of hackers 1 2


Network resources Hacking methodologies
Router and Firewall, Hub, switch – security Purpose
issues Activity: Stuxnet - a case study
Basic Network terminologies
Analysing a Cyber Attack
Types of Malwares
- Defence in depth
Spyware
Malware - What is defence in depth
Backdoor
- Layers
Ransomware
Scareware - Needs for Defence in depth
Rootkit
- Examples
Virus
Trojan horse - Host encryption
1 2,3 3 Worms 3 1 3
- Anti-virus
Symptoms of attack
- Firewall
Methods of Infiltration
- E-Mail gateway
Social Engineering
Pretexting - Password management
Tailgating
- Honeypot
Something for something (quid
pro quo) - Multi Factor Auth
Denial-of-Service and DDoS
Botnet

Department of Collegiate & Technical Education Bengaluru-560001 Page 112


Diploma in Computer Science & Engineering C 20 : 2020 - 21

On the Path attack


SEO Poisoning
Wi-Fi Password Cracking
Password Attacks
Password spraying
Dictionary attack
Brute force
Password Cracking Times
Rainbow
Traffic interception

Advanced Persistent Threats


Security Vulnerability and Exploits
Hardware Vulnerabilities
Meltdown and Spectre
Software Vulnerabilities
Categorizing Software
Vulnerabilities
Software updates
Data Maintenance
Using free tools
Back Up Your Data
How Do You Delete Your Data Protecting Your Computing Devices
Permanently?
turn the firewall on
Tools
Who owns your data? install antivirus and antispyware
1,2 2,3 4 Terms of service 2 1 1 3
manage your operating system and
Understand the term; what are you
agreeing to? browser
The data use policy
set up password protection.
Privacy settings
Before you sign up protect your data
Activity: Check terms of service of the
popular application you use on your phone and

Department of Collegiate & Technical Education Bengaluru-560001 Page 113


Diploma in Computer Science & Engineering C 20 : 2020 - 21

check their data sharing policy, access to device


etc.
Safeguarding Your Online Privacy
Two Factor Authentication
Open Authorization
Social Sharing
Email and Web Browser Privacy
Activity: Discover your own risky online
behaviour
Scenario 1: posting private info on
social media
Scenario 2: What password you choose
when creating new account for social service
Scenario 3: Using public Wi-Fi
- Scenario 4: Using trial version of the
software
Activity: Check if your password is
compromised
Note :Use Have I been pwned
-

5 Developmental Assessment Assessment Review and corrective action 3


2,3, class: Cyber security at workplace
1,2 6 2 3 Weekly Assignment(1PM-2PM)
4
Reference materials : skillsforall.com – Introduction to Cyber security
Peer review Why Do We Need a Version Control System?
2,3, Project / activity Fundamentals of Git
2 2,3 1 4 1 2
4
Propose problem statement Git installation and setup

Department of Collegiate & Technical Education Bengaluru-560001 Page 114


Diploma in Computer Science & Engineering C 20 : 2020 - 21

basic local Git operations


▪ creating a repository,
▪ cloning a repository,
▪ making and recording changes
▪ staging and committing changes,
▪ viewing the history of all the changes
undoing changes
History of cryptography (overview: Caesar Algebra: groups, rings, fields - definitions +
cipher, enigma cipher) examples
Introduction (high level overview only) AES (SPN structure, rounds, modes of operation
2,3, Enc (sym - stream + block ciphers, asym) 2 2 - high level overview with diagram)
2,3 2 1 2
4
Hashing MAC + SHA2/3 (high level + security
Digital signature, MAC requirements))
- PRNG

RSA (with numerical examples) Number theory - primes, modular arithmetic,


2,3, 2 2
2,3 3 1 2
4 Digital signature (RSA) gcd, Euler totient function - definitions +
examples
Practice sessions/ student activities: Practice sessions/ student activities:
- Numerical/programming exercises: subset of Inspect digital certificates using a web browser
2,3,
2,3 4 1 3 3
4 math / Caesar cipher / one time pad / RSA / and visiting popular websites
GCD / primality - Identify the crypto algorithms in TLS

Department of Collegiate & Technical Education Bengaluru-560001 Page 115


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Cryptanalysis (brute force over keys, birthday - Design a toy crypto algorithm like key
attacks on hash functions, hardness of generation + encryption + decryption / digital
factoring integers, discrete log problem, side- signature / hash function
channel attacks – high level overview)

Applied crypto (PKI, Full disk encryption,


blockchain: overview

5 Developmental Assessment Assessment Review and corrective action 3


Industrial class : Application of
6 2 3 Weekly Assignment
cryptography
References :

• https://www.youtube.com/user/Computerphile - YouTube channel by Dr. Mike Pound

• https://nptel.ac.in/courses/106105031/ : Cryptography and Network Security by Prof. Debdeep Mukhopadhyay, IIT Kharagpur

• https://www.coursera.org/learn/crypto and https://www.coursera.org/learn/crypto2 : by Prof. Dan Boneh, Stanford University

• http://williamstallings.com/Cryptography/ - student resources by Prof. William Stallings


How Internet/Application works (Security
Peer review aspects – end-to-end packet path)
Project / activity
2,3, Propose problem statement and network Network architecture concepts
3 2,3 1 4 3
4
design requirements Understanding vulnerabilities in different OSI
layers and protocols (TCP, UDP, IP, ICMP)

Department of Collegiate & Technical Education Bengaluru-560001 Page 116


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Network Security : Concepts- Firewall, IDS, IPS, Protocols : IPSec, SSL, TLS (versions and
2,3,
2,3 2 2 2 1 2
4 VPN vulnerabilities)

Web Security : Concepts-HTTP, HTML, Frames, Attacks and vulnerabilities: Injection attacks :
5 1,4 3 2 2 SQL, HTTP header, OS command 1 2
browser design

o Wireless Security : Introduction to


- DOS attacks, countermeasures (in
2,3, security issues in cellular networks,
2,3 4 2 2 1 2
4 relation to wireless networks)
WIFI, LAN systems, RFID systems

5 CIE 1 : Written and practice test Assessment Review and corrective action 3
Industrial class : High availability and load
2,3,
2,3 6 2 3 Weekly Assignment
4 balancing
References :
1. https://www.cisco.com/c/en_in/products/security/what-is-network-security.html
2. https://purplesec.us/firewall-penetration-testing/
3. How hackers do it: Tricks, Tools, and Techniques
4. https://cse29-iiith.vlabs.ac.in/
5. https://nptel.ac.in/courses/106105031/ : Cryptography and Network Security by Prof. Debdeep Mukhopadhyay, IIT Kharagpur.
6. https://wiki.apnictraining.net/netsec-20220627-bdnog14/agenda
Windows Security
Peer review
Windows Security Infrastructure
2,3, 2,3, 1 Project status review
4 4 2 1
5 4 Windows Family of Products
Demonstration of artifacts of the project
Windows Workgroups and Accounts

Department of Collegiate & Technical Education Bengaluru-560001 Page 117


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Windows Active Directory and Group Policy

Windows Access Controls

Windows as a Service NTFS Permissions


Shared Folder Permissions
End of Support
Servicing Channels Registry Key Permissions
Windows Update Active Directory Permissions
2,3, 2,3,
2 Windows Server Update Services 2 2 1 2
5 4 Privileges
Windows Autopilot
Windows Virtual Desktop BitLocker Drive Encryption
Third-Party Patch Management Secure Boot
Practice : Process observation and analysis - Practice : NTFS file system practical
with Process Hacker using NTFS Permissions Reporter
Enforcing Security Policy Linux Security
Applying Security Templates Linux Fundamentals
Employing the Security Configuration and Operating System Comparison
Analysis Snap-in Linux Vulnerabilities
Understanding Local Group Policy Objects Linux Operating System
2,3, 2,3, Understanding Domain Group Policy Objects Shell
3 2 2 1 2
5 4
Administrative Users Kernel
Privileged Account Management Filesystem
Reduction of Administrative Privileges Linux Unified Key Setup
AppLocker Linux Security Permissions
User Account Control Linux User Accounts

Department of Collegiate & Technical Education Bengaluru-560001 Page 118


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Windows Firewall Pluggable Authentication Modules


IPsec Authentication and Encryption Built-in Command-Line Capability
Remote Desktop Services Service Hardening
Recommended GPO Settings. Package Management
Practice :
Auditing and enforcement of system baseline
configurations with security templates
PowerShell scripting and automation
techniques

Linux Security Enhancements and


Log Files
Infrastructure
○ Key Log Files
Operating System Enhancements
○ Syslog
○ SE Linux
○ Syslog Security
○ App Armor
○ Log Rotation
2,3, 2,3, Linux Hardening
4 2 2 1 2
5 4 ○ Centralized
○ Address Space Layout Randomization
○ Logging
○ Kernel Module Security
○ Audit id
○ SSH Hardening
○ Firewalls: Network and Endpoint
○ Open SCAP
○ Rootkit Detection
○ CIS Hardening Guides and Utilities
Development Assessment
5 (Hardening the image win and linux Assessment Review and corrective action 3
CIS controls)
2,3, 2,3, Industrial Class : System Security
6 2 3 Weekly Assignment
5 4
Department of Collegiate & Technical Education Bengaluru-560001 Page 119
Diploma in Computer Science & Engineering C 20 : 2020 - 21

Introduction to Application Security


Secure SDLC
Provide a use case – Microsoft Secure SDLC
Practice and Security controls covered in each
Peer review
stage at a higher level.
Project status review
Requirements (Determine Application Risk
Introduction to Software Application
Profile based on Security Requirements,
Development – How was it created, Why is it
Determine Control Requirements, Establish
important? How does it work.
Quality Gates)
Types of Application Software – Thick Client,
b. Design (Architecture Design Review and
Web Applications, Web Services, RESTFul
Threat Modeling)
2,3, 2,3, Services, Middle Ware, Mobile Applications etc
5 1 4 2 1
5 4 c. Implementation (Static Analysis, Software
(Give an example of each).
Composition Analysis, Secret Detection,
Explain Software Development Lifecycle –
Deprecate unsafe functions, use of plugins in
Requirements, Design, Develop, Deploy,
IDE, Safe Commit and Change Management in
Operate and Purge.
Repositories)
Life Cycle Models – Waterfall, Agile, Iterative
d. Verification (Dynamic Analysis, Interactive
etc.
Application Security Testing, Fuzz Testing,
SDLC Best Practices
Abuse use case Testing, Architecture
Verification).
e. Release (Run Time Application Self
Protection, Web Application Firewall, SOP for

Department of Collegiate & Technical Education Bengaluru-560001 Page 120


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Operations, Secure Provisioning, Deployment


and De commissioning)
- f. Response (Incident Response).
Application Security – Requirements

1. Functional and Non Functional


Requirements for an application

2. Security Requirements for an


Application Security Design:
application
Secure Architecture Review – For a given use
2,3, 2,3, case, with examples; conduct security
2 3. Determining Application Risk Profile 1 3 1 2
5 4
architecture review using the OWASP standard.
Based on the security requirements.

4. Determining Control Requirements


Based on Application Risk Profile and
Eligibility Criteria for an application to
undergo a certain security control.
Establish Security Toll Gates
Application Security Design – Threat Modelling.
- Using the Microsoft Threat Modeling
1. Why Threat Modelling
methodology, execute a threat model for
2,3, 2,3, 3 2. What is Threat Modelling 1 3 3
5 4 a given application architecture using
3. Threat Modelling Methodologies –
Microsoft threat modeling tool.
STRIDE, PASTA, OCTAVE, TRIKE, VAST.

Department of Collegiate & Technical Education Bengaluru-560001 Page 121


Diploma in Computer Science & Engineering C 20 : 2020 - 21

4. Threat Model Ranking – DREAD, CVSS,


CWSS etc.
Threat Model Execution Phases: - Planning,
Scoping, Deep Dive Discussions, Drawing a
Threat Model, Identifying Threats, Threat
Objects, Security Controls, Threat Actors,
Threat Traceability Matrix, Reporting and
Debrief.
Application Security – Implementation
- Explain use of Security Tools within Explain Secret Detection using tools like
IDE. Githound.
- Static Code Analysis Tools – Explain - Change Management during pre-commit
with examples. and post-commit in repositories.
2,3, 2,3,
4 1 3 3
5 4 - Explain Software Composition - Safe SCM practices (Take Github as an
Analysis, Identifying Software example).
Dependencies and CVE in underlying - Highlight deprecated unsafe functions in
libraries. Demonstrate a tool like common programming languages.
OWASP Dependency Check.

5 CIE 2 – Written and Practice Test Assessment Review and corrective action 3
Industrial class : Source Code Scan using a
2,3, 2,3,
6 commercial tool like Microfocus Fortify or 2 3 Weekly Assignment
5 4
Checkmarz.
Peer review Application Security – Verification.
2,3, 2,3,
6 1 4 3
5 4 Project status review

Department of Collegiate & Technical Education Bengaluru-560001 Page 122


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Explain Dynamic Analysis using an example –


owasp zap.
Interactive Application Security Testing –
Demonstrate using Contrast Security Tool.
- For a given site (local), conduct a dynamic Introduce Manual Security Testing using OWASP
2,3, 2,3, analysis scan using OWASP ZAP, Check for Testing Guide. Add Misuse case testing to the
2 4 1 2
5 4
False positives and create a report framework in addition
Conduct a manual security testing for a local
web application or an API using proxy tools
like burp suite/paros etc and provide a
report. Compare the results of both manual
and automated scans.
Application Security – Release
- 1. Cover OWASP ASVS and its aid as a tool
1. Explain Run Time Application Self in architecture verification.
2,3, 2,3,
3 1 3 Introduce OWASP SAMM – to attain software 1 2
5 4 Protection – Contrast Security or Microfocus
Fortify Software can be used as an example. assurance maturity.

2. Define Web Application Firewall.


Demonstrate using a tool.
Elaborate on Standard Operating Procedure
for Operations, Secure Provisioning,
deployment and decommissioning

Department of Collegiate & Technical Education Bengaluru-560001 Page 123


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Measurement of Application Security –


Define Metrics, Type of Metrics (Operations,
For the previous run scans, define metrics and
2,3, 2,3, Efficiency, Quality etc).
4 1 3 evaluate the values at operational level. 3
5 4
Example Application Security Metrics from
OWASP.

5 Development assessment Assessment Review and corrective action 3


Weekly Assignment
Weekly Assignment (Suggestive Student
Activities)

1. Install Web Goat and do an automated


Industrial class : Dynamic Analysis using scan using one of the dynamic analysis tools.
2,3, 2,3,
6
5 4 Qualys
2. Follow up with a manual security testing
with OWASP Testing guide as an aid and
compare the results of automated and
dynamic scan.

References:
1. https://www.synopsys.com/glossary/what-is-sdlc.html
2. https://www.synopsys.com/blogs/software-security/secure-sdlc/
3. https://www.microsoft.com/en-us/securityengineering/sdl
4. https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
5. https://www.microsoft.com/en-in/download/details.aspx?id=49168
6. https://medium.com/@melsatar/software-development-life-cycle-models-and-methodologies-297cfe616a3a
7. https://owasp.org/www-project-application-security-verification-standard/
8. https://resources.infosecinstitute.com/topic/application-architecture-review/
9. https://owasp.org/www-community/controls/Static_Code_Analysis
10. https://owasp.org/www-project-web-security-testing-guide/
11. https://owasp.org/www-project-zap/

Department of Collegiate & Technical Education Bengaluru-560001 Page 124


Diploma in Computer Science & Engineering C 20 : 2020 - 21

12. https://owasp.org/www-project-dependency-check/
13. https://www.synopsys.com/glossary/what-is-software-composition-analysis.html
14. https://owasp.org/www-project-samm/
15. https://github.com/tillson/git-hound
16. https://owasp.org/www-project-security-qualitative-metrics/
17. https://www.qualys.com/apps/web-app-scanning/
18. https://www.veracode.com/security/interactive-application-security-testing-iast
19. https://en.wikipedia.org/wiki/Runtime_application_self-protection
20. https://en.wikipedia.org/wiki/ModSecurity
21. https://github.com/WebGoat/WebGoat
22. https://spectralops.io/resources/how-to-choose-a-secret-scanning-solution-to-protect-credentials-in-your-code/
23. https://www.geeksforgeeks.org/functional-vs-non-functional-requirements/
24. https://owaspsamm.org/model/design/threat-assessment/stream-a/
25. https://docs.42crunch.com/latest/content/concepts/security_quality_gates.htm
Basics of cloud computing
Why is cloud computing necessary?
Introduction to key cloud services (Compute,
storage, networking)
Cloud delivery models
Peer review IaaS v/s PaaS v/s SaaS
2,3, Project status review Introduction to cloud vendors(Azure,AWS, GCP)
7 3,4 1 4 3
4
Key Cloud Security Principles
Shared responsibility model
Principle of least privilege
Defense in depth
Threat actors, diagrams & trust boundaries
Practice :

Department of Collegiate & Technical Education Bengaluru-560001 Page 125


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Create a cloud account


Create 2 accounts
Setup 2FA on both account
Identity & Access management in the cloud
Introduction to IAM

2,3, Introduction to Federal Identity Management


3,4 2 Cloud asset management 1 3 3
4 IAM Best Practices
IAM Audit
Intro to AWS/Azure clint and Web Portal
Vulnerability management
Network security
Discovering cloud misconfiguration
Security groups
2,3, Remediating vulnerabilities
3,4 3 1 3 1 2
4 VPC
Tracking open vulnerabilities using cloud
WAF
native tools
Data protection in the cloud
Incident response
• Data protection at rest and at transit
- Log analysis
2,3, • Cloud data storage - AWS EBS, S3 / Azure
3,4 4 1 3 3
4 - Events & alerts
SAS
- Key metrics (MTTD & MTTR)
• Secrets Management
CIE 3 – Written and Practice Test
5 Assessment Review and corrective action 3
Secure a vulnerable cloud env
Industrial class :
2,3, 1. Preventing DDoS in a cloud native
3,4 6 env 2 3 Weekly Assignment
4
Hybrid cloud env

Department of Collegiate & Technical Education Bengaluru-560001 Page 126


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Intro to VAPT
Peer review Developing a Hacker Mindset
2,3, Project status review • Ethics of Penetration Testing
3,4 1 4 1 2
4
• Goal of Penetration Testing
• Thinking like a Hacker
ATT&CK Framework Overview
Introduction to the framework
Deep dive into the key topics
○ Reconnaissance
2,3,
3,4 2 4 Contd.. 3
4 ○ Initial Access
○ Privilege Escalation
8
○ Lateral Movement
○ Exfiltration
Web Application Penetration Testing
● Basics of Web
2,3, ○ HTTP Methods 4 Contd..
3,4 3 3
4
○ HTTP Requests & Response
Session management & Cookies

Web Application Penetration Testing


Finding common web vulnerabilities
2,3,
3,4 4 1 3 Contd.. 1 2
4 (OWASP top 10)
Burp Suite Essentials

Department of Collegiate & Technical Education Bengaluru-560001 Page 127


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Practical: Setup Burp Suite on local machine


and observe traffic of 1 website

5 CIE 3 – Written and Practice Test Assessment Review and corrective action 3
Industrial class :
How penetration testing is used in
2,3, companies to improve their Security
3,4 6 Weekly Assignment
4
posture

Peer review Cloud Penetration Testing


2,3, Project status review Finding common cloud vulnerabilities
3,4 1 4 1 2
4
Introduction to tools: Nessus, NMAP, Prowler
Introduction to OSINT: - Contd..
Scanning the internet (example: Shodan)
2,3,
3,4 2 1 3 1 2
4 Google dorking
Subdomain enumeration & asset monitoring
9
- Hands-on exercise 1: Complete 3 server-
side and 3 client-side topic from Burp - Contd..
2,3, Suite academy: 4
3,4 3 1 2
4 https://portswigger.net/web-
security/learning-path

Hands-on exercise 2: Complete either the


- Contd..
2,3, attacker or defender track in
3,4 4 1 3 1 2
4
http://flaws2.cloud

Department of Collegiate & Technical Education Bengaluru-560001 Page 128


Diploma in Computer Science & Engineering C 20 : 2020 - 21

5 Development Assessment Assessment Review and corrective action 3


Industrial class :
2,3,
3,4 6 Weekly Assignment
4 Bug bounty hunting
References :
1. Basics of Web: https://www.hacker101.com/sessions/web_in_depth.html
2. NMAP Basics: https://www.freecodecamp.org/news/what-is-nmap-and-how-to-use-it-a-tutorial-for-the-greatest-scanning-tool-of-all-
time/
3. HTTP Proxy:
a. Burp Suite Essentials: https://www.youtube.com/playlist?list=PLoX0sUafNGbH9bmbIANk3D50FNUmuJIF3\
b. OWASP Zed Attack Proxy: https://www.zaproxy.org/getting-started/
4. Vulnerability Scanning with Nessus: https://www.tenable.com/blog/how-to-run-your-first-vulnerability-scan-with-nessus
5. How to think like a Hacker: https://www.darkreading.com/vulnerabilities-threats/how-to-think-like-a-hacker
The Cuckoo’s egg (book)
Incident management introduction and
objectives
Stages and life cycle of incident management
Tracking incidents
Peer review Incident remediation
2,3, Project status review Reporting and documentation
10 3,4 1 4 1 2
4
Incident Closure
Incident management teams and models
Incident management services and integration
tools
- Best practices of Incident Management

Department of Collegiate & Technical Education Bengaluru-560001 Page 129


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Fundamentals
· CIA
· Threat Actors
· Different kinds of hackers Network
· Different kinds of teams – Blue, Red,
Purple · Quick revision of OSI model,
· Criminal Groups encapsulation, IP, Subnets, TCP/UDP, well
· Hactivist Groups
· APT known ports, TCP/IP, Layer 2
· Attack Vectors Network Protocols
· Protect/Prevent
· Detect/Respond · Quick revision of SMTP, HTTP,
2,3, · Trust Positive vs False Positive HTRPS/TLS, DNS
3,4 2 1 3 1 2
4
Data Web technologies
· Bits and Bytes · Quick revision of DOM, CSS, Javascript,
· Charter Encoding (ASCII, UTF-
8,Base64) Ajax, MVC, Databases, SQL
· File Magic Bytes, Hashes Authentical protocols
· Imphash
· Ssdeep · Quick revision of Kerberos, SAML,
OpenID, OAuth
Windows & Linux
- · Quick revision on basic commands,
important files and directories, windows
registry and processes, Audit in Linux
Understanding the tools and products used in
any organization
2,3, · Firewall, load balancers, proxy, email Continued..
3,4 3 1 3 3
4
infrastructure, IDS, DNS, Ani-virus, Content
Delivery Solutions, Malware Protection System,

Department of Collegiate & Technical Education Bengaluru-560001 Page 130


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Endpoint Detection and Response, Netowrk


Access Control, Placement of all devices in the
organization – Tier1, Tier 2, Tier 3, DMZ
Basics of Incident Response
· Alert processing
· Procedures, runbooks and reference
· Response options
SIEM · Escalations
· Understanding logs · Incident categories
· Email, Proxy, DNS, IDS, Firewall, AV, · Incident Resolution Codes
EDR, Web application, Unix, Windows
Attack Types/Vectors Data Analysis
· Phishing, Malware, Distributed Denial · Data vs Intelligence
2,3,
3,4 4 1 3 3
4 of Service, Vulnerabilities (Infrastructure, · Indicators of compromise (IoCs)
Application, third party), Web attacks, · Malware analysis
Misconfigurations, Brute force · Accessing IoCs
Attack Models · Contacting threat intelligence
· The cyber kill chain, MITRE ATT&CK
Framework, Pyramid of Pain Analysis tools
· Anomaly
· Domain tools
· WhoIS
· Passive DNS

Department of Collegiate & Technical Education Bengaluru-560001 Page 131


Diploma in Computer Science & Engineering C 20 : 2020 - 21

· Virus total
· Dynamic File analysis

5 CIE 4 – Written and Practice Test Assessment Review and corrective action 3
Industrial class : Handling Internal and
external incidents Complexity of Incident
2,3,
3,4 6 Weekly Assignment
4 management
Demo of real world SOC
References :
1. https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf

2. https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management
https://www.infotech.com/research/ss/develop-and-implement-a-security-incident-management-program

Lab : https://letsdefend.io

GRC
(a) 1) Definition of GRC, introduction to IT
governance
Peer review
(b) 2) Importance of GRC in cyber security
3,4, 2,3, Project status review 4
11 1 1 2
5 4 (c) 3) Policies, processes and procedures
(d) 4) Importance of checklists, templates and
guidelines
Enterprise risk management

Department of Collegiate & Technical Education Bengaluru-560001 Page 132


Diploma in Computer Science & Engineering C 20 : 2020 - 21

(a) Understanding risks that enterprises face –


Operational Risks, Strategy Risks, Credit risks,
Reputational risk, Market risks, Cyber risk
(b) Cyber risk integration with Operational risk
management
Patch management

Importance of patch management; pre-requisites


and sample patch management process
- Introduction to basics of risk management
Probability, Impact:-- [Financial, Legal, Vulnerability Management
Regulatory, Reputational ], Threat, Risk
Assessment, Risk Treatment:-- [Accept, Vulnerability management lifecycle
3,4, 2,3, 1 3
2 understanding – Identify, Evaluate, Remediate, 1 2
5 4 Mitigate, Transfer, Avoid ], Residual risk, risk
acceptance, Control objective, Controls:-- Report

Preventive control, detective control and


Types of vulnerabilities – Hardware, Network,
corrective control
Operating systems, Application, Human and
Process related vulnerabilities

Vulnerability Management process


ITIL Process overview –
Incident Management, Problem Management,
3,4, 2,3, Practice Session: 4
3 3
5 4 Change Management, Configuration
Management, Release Management, Supplier

Department of Collegiate & Technical Education Bengaluru-560001 Page 133


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Management, IT Security Management, Service


(a) Define one control statement each for
level management, Capacity Management,
access control, physical security and
Availability Management, Service continuity
backup management
Management

(b) Explain one human vulnerability with


example and how it can be exploited
including remedial measures

(c) Design IT asset register template with


5 sample rows populated with data
Give examples for each category of classified
information in an organization – do a
combination of government organization and
private organisation
Security frameworks and Compliances
Cyber Security Governance:

Introduction to standards/best
(a) Security organization, Responsibilities
practices/framework and its primary
and authority, Management/Board
4 objective, 4 1 2
responsibilities on cyber security,
Resource allocation and cyber security budget
ISO 27001, COBIT, PCI-DSS, Hi-Tech (HIPAA),
management, Security Education, training and
NIST, IT Act 2000 (amendment in 2008), CERT-
awareness, Cyber metrics, KRI/KPIs
IN Guidelines.

Department of Collegiate & Technical Education Bengaluru-560001 Page 134


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Regulatory requirements

(a) RBI framework for banking (Cyber


security framework, Gopalakrishna
committee, UCB tiered framework)

(b) SEBI framework for Securities market

(c) Guidelines on Information and cyber


security for insurers from IRDAI

(d) TRAI requirements on security for


telecom sector

(e) GDPR

5 Development Assessment Assessment Review and corrective action 3


Weekly Assignment (Suggestive Student
Activities)
Industrial class :
1. An industry perspective of GRC, VM
2,3, (a) Identify use case of how changes or
3,4 6
4 and Security frameworks
configuration in IT systems impacts security
Demo of a GRC tool
configuration resulting in cyber risk
exposure

Department of Collegiate & Technical Education Bengaluru-560001 Page 135


Diploma in Computer Science & Engineering C 20 : 2020 - 21

(b) Design a sample cyber security


dashboard for reporting to top management

(c) Give two KRI examples each for the


following domains:
a. Patch Management
b. Anti-virus management
c. Change Management
References :
1) https://www.armosec.io/blog/kubernetes-security-frameworks-and-guidance - Security Frameworks table
2) https://www.cybersaint.io/blog/what-is-grc
3) https://www.ibm.com/cloud/learn/grc
4) https://unece.org/fileadmin/DAM/trade/Publications/WP6_ECE_TRADE_390.pdf

5) https://www.pcisecuritystandards.org/documents/PCI_DSS-QRG-v3_2_1.pdf

6) https://www.nist.gov/

7) https://www.isaca.org/resources/cobit

8) https://www.meity.gov.in/writereaddata/files/itact2000/it_amendment_act2008.pdf

9) https://www.coso.org/SitePages/Guidance-on-Enterprise-Risk-Management.aspx?web=1

Department of Collegiate & Technical Education Bengaluru-560001 Page 136


Diploma in Computer Science & Engineering C 20 : 2020 - 21

10) https://rbidocs.rbi.org.in/rdocs/notification/PDFs/NT41893F697BC1D57443BB76AFC7AB56272EB.PDF

11) https://rbidocs.rbi.org.in/rdocs/notification/PDFs/LBS300411F.pdf

1) https://rbidocs.rbi.org.in/rdocs/notification/PDFs/NOTI129BB26DEA3F5C54198BF24774E1222E61A.PDF

14) https://www.sebi.gov.in/legal/circulars/dec-2018/cyber-security-and-cyber-resilience-framework-for-stock-brokers-depository-
participants_41215.html

15) https://www.sebi.gov.in/sebiweb/home/HomeAction.do?doListing=yes&sid=1&ssid=6&smid=0

16) https://www.aicofindia.com/AICEng/General_Documents/Notices%20And%20Tenders/IRDAI-GUIDELINES.pdf

17) https://www.irdai.gov.in/ADMINCMS/cms/whatsNew_Layout.aspx?page=PageNo4315&flag=1

18) https://www.rapid7.com/fundamentals/patch-management/

19) https://www.rapid7.com/fundamentals/vulnerability-management-and-scanning/

1)18. https://www.techtarget.com/searchsecurity/tip/IT-security-frameworks-and-standards-Choosing-the-right-one

21) https://www.irdai.gov.in/ADMINCMS/cms/Uploadedfiles/07.04.2017-
Guidelines%20on%20Information%20and%20Cyber%20Security%20for%20insurers.pdf

https://www.trai.gov.in/sites/default/files/RecommendationDataPrivacy16072018_0.pdf
Peer review 2
3,4, 2,3, 4 DevOps and Security Challenges
12 1 1
5 4 Project status review

Department of Collegiate & Technical Education Bengaluru-560001 Page 137


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Understand the Core Principles and Patterns


behind DevOps
Recognize how DevOps works and identify keys
to success
Secure DevOps tools and workflows 2
Conduct effective risk assessments and threat Pre-Commit Security Controls
modeling in a rapidly changing environment Rapid Risk Assessment
Design and write automated security tests and Git Hook Security
checks in CI/CD Code Editor Extensions
Understand the strengths and weaknesses of Branch Protections
3,4, 2,3,
2 1 3 1
5 4 different automated testing approaches in CodeOwners
Continuous Delivery Peer Reviews
Inventory and patch your software Commit Security Controls
dependencies Static Analysis Security Testing
Wire security scanning into Jenkins, Code Component Analysis
Pipeline, and Azure DevOps workflows
3
Secrets Management Cloud Infrastructure as Code

3,4, 2,3, Managing secrets in CI / CD Introduction to Cloud Infrastructure as


3 4
5 4 Azure Key Vault Code
AWS SSM Parameter Store AWS Cloud Formation
AWS Secrets Manager Terraform
HashiCorp Vault Deploying

Department of Collegiate & Technical Education Bengaluru-560001 Page 138


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Cloud Infrastructure as Code security analysis


2
Container Security

Dockerfile and BuildKit Security


Base Image Hardening with Hadolint and
Conftest
Container Image Security
Configuration Management as Code Scanning Container Images with Docker
Scan and Trivy
Automating Configuration Management Container Registry Security
in CI / CD Container Scanning with AWS ECR and
3,4, 2,3, Azure ACR
4 Using Ansible to Configure Virtual 1 3 1
5 4 Container Runtime Security
Machines
Building Gold Images with Vagrant and
Packer Exercises
Certifying Gold Images with InSpec Attacking the DevOps Toolchain
Version Control Security
Automating Static Analysis
Protecting Secrets with Vault
Infrastructure as Code Network
Hardening
Gold Image Creation
Container Security Hardening

5 CIE 5 – Written and Practice Test Assessment Review and corrective action

6 Industry Class : 2 3

13 1 Internship Project

Department of Collegiate & Technical Education Bengaluru-560001 Page 139


Diploma in Computer Science & Engineering C 20 : 2020 - 21

a) Secondary research on various a) Identification of the problem statement


industries and their operations to identify at (from at least 3 known problems) the students
least 3 companies along with the areas of work would like to work as part of the project – either
interest and develop an internship plan that as provided by faculty or as identified by the
clearly highlights expectations from the student. Document the impact the project will
industry during the internship. have from a technical, social and business
b) Design and develop a cover letter for an
perspective.
internship request to all 3 identified companies
and the resume to be submitted to potential b) Design and develop the project solution
companies. or methodology to be used to solve at least one of
Prepare for an internship interview to highlight the problems identified.
your interests, areas of study, career
aspirations and personnel competence – Prepare a project plan that will include a
including the areas of learning you expect to schedule, WBS, Budget and known risks along
learn during internship. with strategies to mitigate them to ensure the
project achieves the desired outcome.

**Note: Saturday session from 9 AM -2 PM

CIE and SEE Assessment Methodologies

Duration
CIE Assessment Assessment Mode Max Marks
In hours
Week 3 CIE 1– Written and practice test 4 30
Week 5 CIE 2– Written and practice test 4 30
Week 8 CIE 3– Written and practice test 4 30
Week 10 CIE 4– Written and practice test 4 30
Week 12 CIE 5– Written and practice test 4 30
Week 13 Assessment for Project or Internship 4 30
On line Course work (At least one related to the specialization) 30
Department of Collegiate & Technical Education Bengaluru-560001 Page 140
Diploma in Computer Science & Engineering C 20 : 2020 - 21

Portfolio evaluation (Based on industrial assignments and weekly developmental assessment) * 30


TOTAL CIE MARKS (A) 240
SEE 1 - Theory exam (QP from BTE) Conducted for 100 marks 3 hour duration reduced to 60 marks 3 60
SEE 2 – Practical duration 3hr. Max marks 100 3 100
TOTAL SEE MARKS (B) 160
TOTAL MARKS (A+B) 400
* The industrial assignment shall be based on peer-to-peer assessment for a total of 10 marks (on a scale of 1 to 10) and in the event of a group assignment
the marks awarded will be the same for the entire group, the developmental assessment will be for a total of 20 marks and based on MCQ/case
study/demonstration and such other assignment methods

Scheme of Evaluation for SEE 2

Sl. No Description Marks

1 Case submission 20

2 Case presentation 20

3 Case innovation 20

4 Result 20

5 Viva voce 20

Total 100

Case Submission / Content Evaluation Rubrics

Department of Collegiate & Technical Education Bengaluru-560001 Page 141


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Evaluation
5 4 3 2 1 Student Score
Parameters
Identifies and Identifies and
Identifies and Identifies and Identifies limited
Identification of understands all understands most of
understands some of understands a few issues
the main the main issues in the main issues in 5
the issues in the of the issues in the in the problem
issues / problem the problem the problem
problem statement problem statement statement
statemen statement

Insightful and Superficial analysis of


Analysis of the Thorough analysis of Incomplete analysis of No analysis of the
thorough analysis of some of the issues in 4
issues most of the issues the issues issue
all the issues the problem statement

Well documented,
Comments on reasoned and
Appropriate, well
effective solutions pedagogically
thought out Little and/or
/ strategies (The appropriate Superficial and / or
comments about inappropriate No action to all
solution may be in comments on inappropriate solutions
solutions, or proposals solutions to all of the issues in the 2
the problem solutions, or to some of the issues in
for solutions, to most issues in the problem problem statement
statement already proposals for the problem statement
of the issues in the statement
or proposed by solutions, to all
problem statement
you) issues in the
problem statement
Excellent research
Links to course into the issues with Good research and
Limited research and Incomplete research
learning and clearly documented documented links to No research or links
documented links to and links to any 3
additional links to course the materials read to any reading
any readings reading.
research learnings and during the course
beyond.

Total 14/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 142


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Presentation Evaluation Rubrics

Evaluation Student
5 4 3 2 1
Parameters Score
Clear flow of
ideas Most ideas flow Hard to
No flow in
Very clear and concise flow of but is lost at follow the
Demonstrates the
ideas Demonstrates times Limited flow of
interest in the presentation
Delivery & Enthusiasm passionate interest in the evidence of ideas Lack 4
topic and Poor
topic and engagement with interest in and of
class / examiner engagement presentation
engagement enthusiasm
with class / skills
with the topic and interest
examiner
Limited
use of Poor visuals used
Visuals augmented and
Use of visuals and some visuals
extended comprehension visuals
Visuals related to the No use of visuals are not easy to 2
of the issues in unique loosely
topic understand its
ways related to
relevance.
the topic
Uses stage
effects such as
props, sound Limited use of
Uses stage effects such as
effects, and stage effects
props, sound effects, and
speech and/or used in a
speech modulation in a
modulation in manner that did
unique and dramatic No use of stage Poor stage effects
Staging an effective not enhance the 5
manner that enhances the effects usage
manner to understanding
understanding of the
extend the of the issues in
issues in the problem
understanding the problem
statement.
of the issues in statement.
the problem
statement.

Department of Collegiate & Technical Education Bengaluru-560001 Page 143


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Questions and Questions and


discussions discussions
Excellent and salient
addressed addressed
Involvement discussion points that Little or no
important important
of the class / elucidated material to attempt to Did not engage
information superficial
Examiners develop a deep engage the the class /
that issues of the
understanding class / examiner and 3
• Questions developed problem
Appropriate and examiner in poor listening
• Discussions understanding statement
imaginative activities used demonstrating skills
• Activities Appropriate Limited use of
to extend understanding their learning
activities used activities to
in a creative manner
to clarify clarify
understanding understanding

Total 14/20

Case Results Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score
The topic was well The topic was 4
The topic was The topic was
researched and all researched but
researched and researched and data
information and information and data Desired results
most information were not from
data included are were only partly from not obtained,
and data were from reliable sources.
accurate and from reliable sources of but some
reliable sources of The proof was not
reliable sources of information. relevant
Problem information. The backed up with
information like The proof was not fully research was
outcome proof was backed data, analysis or
high impact journals backed up with good done. Outcome
up with good data reasoning as taught
standards, etc. data or reasoning as not obtained as
and reasoning as in the class.
The proof was taught in the class. per the
taught in the class. Some outcome
enough backed up Partial outcome problem brief
Outcome achieved as obtained as per the
with accurate data, achieved as per the
per the problem brief problem brief
analysis and problem brief
Department of Collegiate & Technical Education Bengaluru-560001 Page 144
Diploma in Computer Science & Engineering C 20 : 2020 - 21

reasoning beyond
the class learning.
Outcome achieved
beyond the problem
brief
Made effective use of Made good use of class 3
class principles, principles, models and
Made some use of Poorly applied
models and theories. theories Some creative
Application of class principles, Made limited use of class
Also used creativity ideas were explored to
class learning in models and theories class principles, principals,
to find effective find desired outcome
problem solving No creative ideas or models and theories models and
results appropriate but within the
models explored theories
to industry beyond framework of class
class learning. learning
Queries Excellent 2
Poor or no
response to Good response to Satisfactory response Limited response
Response to response to
comments and questions and to questions and to questions and
Class / questions and
discussion with discussions with some discussions with discussions with
Examiners did not
appropriate content connection made to limited reference to no reference to
Queries participate in
supported by theory/research theory/research theory/research
the discussions.
theory/research
Has not 4
Provides limited
Provides detailed and Provides adequate and provided
Provides appropriate and somewhat
appropriate mostly appropriate appropriate
Conclusions conclusion for the appropriate
conclusion for the conclusions for the conclusions for
problem statement conclusions for the
problem statement problem statement the problem
problem statement
statement.
Total 13/20

Case Innovation Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score

Department of Collegiate & Technical Education Bengaluru-560001 Page 145


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Finding new The newly The newly The newly discovered The newly No new 5
processes / discovered discovered processes processes / models / discovered processes /
models / processes / models / models / approaches have processes / models models /
approaches / approaches are of approaches are of limited application but / approaches has approaches
good quality and appropriate quality relevant to the restricted were identified
relevant but limited relevance problem application
Proposing ideas Various ideas and Various ideas and Some ideas or Few ideas have No ideas or 3
and innovative innovative solutions innovative solutions innovative solutions been proposed innovative
solutions in terms have been proposed have been proposed have been proposed solutions have
of processes / and their application as well as the outline but the process of been proposed
models / have been clearly of the process to applying them hasn't
approaches and outlined apply them been specified
how they can be
applied to solve
the problem on
hand
Using creativity Wherever necessary Creativity techniques Creativity techniques Creativity Creativity 2
techniques to creativity techniques are frequently are utilized at times in techniques are technique are
provide and are utilized to utilized in more than less than 50% of the used a few times not utilized to
reason good ideas analyse and solve the 50% of the occasions occasions only analyse and
which are original problem solve the
and problem
unconventional
Finding Constraints and weak Constraints and weak A critical analysis is Only a description No constraints 3
constraints and points are are identified undertaken of the working or weak points
weak points in understood process and have been
existing processes methods are identified.
/ models / provided
approaches or
methods
Total 13/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 146


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Assessment framework for SEE (Theory) – 100 Marks / 3 hours (Reduced to 60 marks)

Programme: Computer Science & Engineering Semester: V


Course: Cyber Security Max Marks: 100
Course Code: 20CS54I Duration: 3 Hrs
Instruction to the Candidate:
Answer one full question from each section.
Qn.No Question CL CO Marks
Section-1
1.a) 1
b)
2.a)
b)
Section-2
3.a) 2
b)
4.a)
b)
Section- 3
5.a) 3
b)
6.a)
b)

Department of Collegiate & Technical Education Bengaluru-560001 Page 147


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Section-4
7.a) 4
b)
8.a)
b)
Section-5
9.a) 5
b)
10.a)
b)

Assessment framework for CIE


Note : Theory to be conducted for 1 hour and practice for 3 hours, total duration of exam – 4 hours
Programme Computer Science & Engineering Semester V
Course Cyber Security Max Marks 30
Course Code 20CS54I Duration 4 hours
Name of the course coordinator
Note: Answer one full question from each section.
Qn.No Question CL CO PO Marks
L3/L4
Section-1 (Theory) – 10 marks
1.a)
b)
2.a)
b)

Department of Collegiate & Technical Education Bengaluru-560001 Page 148


Diploma in Computer Science & Engineering C 20 : 2020 - 21

c)
Section-2 (Practical) - 20 marks
3)
4)

Equipment/software list with Specification for a batch of 20 students

Sl. No. Particulars Specification Quantity


1. Intel i7, 4GB RAM,
Computers 20
500GB SSD
2.
Broadband connection

Department of Collegiate & Technical Education Bengaluru-560001 Page 149

You might also like