0% found this document useful (0 votes)
41 views84 pages

BSC Comp Sci Cyb Sec 2023 24

Uploaded by

manasabezawada04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views84 pages

BSC Comp Sci Cyb Sec 2023 24

Uploaded by

manasabezawada04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 84

B.Sc.

Computer Science with


Cyber Security

Syllabus

AFFILIATED COLLEGES

Program Code: ***

2023 – 2024 onwards

BHARATHIAR UNIVERSITY
(A State University, Accredited with “A++” Grade by NAAC,
Ranked 21st among Indian Universities by MHRD-NIRF)
Coimbatore - 641 046, Tamil Nadu, India
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Programme Educational Objectives (PEOs)

The B.Sc Computer Science with Cyber Security program describe accomplishments that
graduates are expected to attain within five to seven years after graduation

PEO1 Graduates may additionally have basics in Mathematics, Programming, Networks Network
Security, Big Data, Internet Of Things, Cyber laws, Cyber Security basics and advancements
to resolve technical troubles.
PEO2 Graduates may want to have the capability to apply their know-how and talents acquired to
treatment the problems in actual worldwide community and cyber safety areas and to boom
viable and reliable structures to save you and shield structures from safety attack.
PEO3 Provide solutions making use of the knowledge gained in Artificial Intelligence& machine
learning, Cloud Computing, Big Data and Cyber Security.

PEO4 Demonstrate comprehensive knowledge in IT solution development leading to excellence in


professional career and/or higher education including research.
PEO5 To systematically educate the necessity to understand the impact of cyber
crimes and threats with solutions in a global and societal context

Page 1 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Programme Specific Outcomes (PSOs)


After the successful completion of B.Sc. Computer Science with Cyber Security program the
students are expected to
Ability to analyze a problem, and identify and define the security related issues appropriate to its
PSO1
solution.
Ability to design, implement, and evaluate a security system that capable of identify, prevent and
PSO2 protect from malware attack.

To develop basic understandings of IOT structures and develop familiarity with basic security
PSO3
attacks and its measures.

PSO4 To code and execute python programming with a higher level of expertise
Expose the students to learn the important of Cyber Security such as Cyber laws, Web designing,

PSO5 intrusion detection and biometric security so that they can opportunity to be a part of industry 5.0
applications irrespective of domains.

Page 2 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Programme Outcomes (POs)


On successful completion of the B.Sc. Computer Science with Cyber Security

Develop knowledge in the field of cyber security courses necessary to qualify for the
PO1
degree.

Identify and address own educational needs in a changing world in ways sufficient to
PO2
maintain the competence and to allow them to contribute to the advancement of knowledge

PO3 Develop problem solving, decision making and communication skills.

Ability to critically analyze, categorizes, formulate and solve the problems that emerges in
PO4
the field of Cyber Security

Strengthen the critical thinking skills and develop professionalism with the state of art ICT
PO5
facilities.

Quality for higher education, government services, industry needs and start up units
PO6 through continuous practice of preparatory examinations.
.
PO7 Gain inter-disciplinary, multi-disciplinary competence as value additions

PO8 Evaluate the impact of cyber crimes and threats in a global and societal context
An ability to communicate effectively with diverse types of audience and also able to prepare
PO9
and present technical documents to different groups.

PO10 Apply ethical principles and commit to professional ethics and responsibilities.

Page 3 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

BHARATHIAR UNIVERSITY::COIMBATORE 641 046


B. Sc. Computer Science with Cyber Security (CBCS PATTERN)
(For the students admitted from the academic year 2023-2024 and
onwards)
Scheme of Examination
Examination
Hours/ Duration Maximum Marks
Part Title of the Course Credits
Week in Hours CIA CEE Total
Semester I
I Language - I 4 3 25 75 100 4
II English – I 4 3 25 75 100 4
III Core 1: Computer Programming 5 3 25 75 100 4
III Core 2: Computer Organization And 5 3 25 75 100 4
Architecture
III Core Lab 1: Programming Lab- C 5 3 20 30 50 2
and C++
III Allied 1: Numerical Methods 5 3 25 75 100 4
IV Environmental Studies* 2 3 - 50 50 2
Total 30 145 455 600 24
Semester II
I Language – II 4 3 25 75 100 4
II English – II 4 3 25 25 50@ 2
II Effective English: Language Proficiency 2 - 25 25 50# 2
for Employability
http://kb.naanmudhalvan.in/Special:Filepat
h/Cambridge_Course_Details.pdf
III Core 3: Python Programming 5 3 25 75 100 4
III Core Lab 2: Python Programming Lab 5 3 20 30 50 2
III Core Lab 3: Internet Basics 3 3 20 30 50 2
III Allied 2:Linear Algebra 5 3 25 75 100 4
IV Value Education – Human Rights* 2 3 - 50 50 2
Total 30 165 385 550 22
Semester III
I Language – III 4 3 25 75 100 4
II English – III 4 3 25 75 100 4
III Core 4: Java Programming 4 3 25 75 100 4
III Core 5: Cyber Law 4 3 25 75 100 4
III Core Lab 4: Java Programming -lab 4 3 20 30 50 2
III Allied 3: Malware Analysis and 5 3 25 75 100 4
Cyber ThreatIntelligence
IV Skill based Subject 1: Web Programming 3 3 20 30 50 2
IV Tamil** / Advanced Tamil* (OR) Non-
major elective - I (Yoga for 2 3 - 50 50 2
HumanExcellence)* /
Women’s Rights*
Total 30 165 485 650 26
Semester IV
I Language – IV 4 3 25 75 100 4
II English - IV 4 3 25 25 50 2
III Core 6: Linux and Shell Programming 4 3 25 75 100 4
III Core 7: Block Chain Technology 4 3 25 75 100 4
III Core Lab 5: Linux and Shell 3 3 20 30 50 2
Programming lab
III Allied 4:Software Engineering 5 3 25 75 100 4
Page 4 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
IV Skill based Subject 2 Lab : 2 3 25 25 50 2
Web Programming
IV Office Fundamentals :Digital Skills
for Employability 2 - 25 25 50# 2
http://kb.naanmudhalvan.in/Special:Filepath/M
icrosoft_Course_Details.xlsx
IV Tamil**/Advanced Tamil* (OR) 2 3 - 50 50 2
Non- major elective -II (General
Awareness*)
Total30 195 455 650 26
Semester V
III Core 8: Cyber Crime Investigation And 6 3 25 75 100 4
Digital Forensics
III Core 9: Relational Database Management 6 3 25 75 100 4
System
III Core Lab 6: RDBMS lab 6 3 20 30 50 2
III Elective–I: Ethical Hacking / 6 3 25 75 100 4
Data Communication And
Networking/
Biometric Security
IV Skill based Subject 3 : PHP & My SQL 6 3 20 55 75 3
Total 30 115 310 425 17
Semester VI
III Core10:Cyber Security 5 3 25 75 100 4
III Core 11:Project Work %% 4 - 25 75 100 4
III Core Practical 7:Cyber Security Lab 5 3 20 55 75 3
III Elective – II : / Artificial Intelligence 5 3 25 75 100 4
& Machine Learning / Cloud
Computing/
Big data Analytics
III Elective–III: Internet of Things/ 5 3 25 75 100 4
Intrusion Detection and Prevention
System / Network Security &
Cryptography
IV Skill Based Subject 4 lab : PHP & My 4 3 25 25 50 2
SQL
IV Naan Mudhalvan–Skill Course - Cyber
Security @
http://kb.naanmudhalvan.in/images/7/71/Cyber
s ecurity.pdf (or) Machine Learning #
25 25
http://kb.naanmudhalvan.in/images/1/19/PB 2 50# 2
L_Google.pdf (or) Android APP Development
$
http://kb.naanmudhalvan.in/images/0/08/Andr
oi d_App_Dev.pdf
V Extension Activities** - - 50 - 50 2
***Add-on Courses: Naan Mudhalvan
Scheme: Life Skills
Total 30 220 405 625 25
Grand Total 1005 2495 3500 140
 * No Continuous Internal Assessment (CIA). Only University Examinations.
 ** No University Examinations. Only Continuous Internal Assessment (CIA).
 # Govt – Non-Autonomous Colleges, $ Aided – Non-Autonomous Colleges, @ Self - Financing (Non – Autonomous)
 (For theory : CIA – 12, CEE – 38, For Practical : CIA – 20, CEE – 30)
Page 5 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Page 6 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

First
Semester

Page 7 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Course Code Computer Programming L P C


Core/Elective/Supportive Core: 1 5 0 4
 Basic knowledge of C and C++
Programming concepts 2023-24
Syllabus
Pre - requisite Onwards
Basic knowledge in Procedure Oriented version
and Object-Oriented Programming
concepts
Course Objectives
The main objectives of this course are to:
1. To impart knowledge about Computer fundamentals
2. To understand the concepts and techniques in C Programming
3. To equip and indulge themselves in problem solving using C AND C++
Course Outcomes
1 Understand the basic concepts of Programming Language for K1
Problem solving.
2 Illustrate C for decision making, branching and looping statements. K2

3 Apply the concepts of Arrays, Strings in „C‟ for user defined problems. K3

4 Understand the basic concepts of OOPS K2


5 Know the operator overloading & Pointers Concepts K2
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create

Unit I Introduction to C 15
Overview of C - Introduction - Character set - C tokens - keyword & Identifiers - Constants -
Variables - Data types - Declaration of variables - Assigning values to variables - Arithmetic, Relational,
Logical, Assignment, Conditional, Bitwise, Special, Increment and Decrement operators - Arithmetic
Expressions -
Unit II Expression, Decision Making , Looping and Arrays 12
Evaluation of expression - precedence of arithmetic operators - operator precedence & associativity
- Mathematical functions - Reading & Writing a character - Formatted input and output.
Decision Making and Branching: Introduction – if, if….else, nesting of if …else statements- else if
ladder – The switch statement, The ?: Operator – The goto Statement. Decision Making and Looping:
Introduction- The while statement- the do statement – the for statement-jumps in loops.
Arrays: one, two & multi dimensional Array -Character Arrays and Strings: Declare and initializing
-Reading and Writing-Comparison of two Strings.
Unit III Functions 15
User-Defined Functions: Introduction – Need and Elements of User-Defined Functions- Definition-
Return Values and their types - Function Calls – Declarations – Category of Functions- Nesting of
Functions - Recursion – Passing Arrays and Strings to Functions - The Scope, Visibility and Lifetime of
Variables.
Unit IV C++ 15
Introduction to C++ - key concepts of Object-Oriented Programming –Advantages – Object Oriented
Languages – I/O in C++ - C++ Declarations. Functionsin C++ - inline functions – Function Overloading.
Classes and Objects: Declaring Objects – Defining Member Functions – Static Member variables
and functions – array of objects –friend functions – Overloading member functions –Constructor and
destructor with static members.
Unit V Overloading , Inheritance & Pointers 15
Operator Overloading: Overloading unary, binary operators – Overloading Friend functions – type
conversion – Inheritance: Types of Inheritance – Single, Multilevel, Multiple, Hierarchal, Hybrid, Multi
path inheritance – Virtual base Classes – Abstract Classes.
Pointers – Declaration – Pointer to Class, Object – Pointers to derived classes and Base classes – Arrays

Page 8 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
– Characteristics – array of classes.
Unit VI Contemporary Issues 3
Problem Solving through C & C++ Programming – Online Coding
Total Lecture Hours 75 Hours
Text Book(s)
1. E Balagurusamy: Computing Fundamentals & C Programming – Tata McGraw-Hill, Second Reprint
2008
2. Ashok N Kamthane, Object-Oriented Programming with Ansi and Turbo C++, Pearson
Education, 2003.
Reference Books
1. Ashok N Kamthane: Programming with ANSI and Turbo C, Pearson, 2002.
2. E. Balagurusamy, Object-Oriented Programming with C++, TMH, 1998
3. Maria Litvin& Gray Litvin, C++ for you, Vikas publication, 2002.
4. John R Hubbard, Programming with C, 2nd Edition, TMH publication, 2002
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)
1. https://www.tutorialspoint.com/cplusplus/index.html
http://www.tutorialspoint.com/cprogramming/index.html
2.
http://www.w3schools.in/c
3.
https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
4.
Course Designed by :

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 M M M M M M M M M M

CO2 M M M M M M L M M L

CO3 S M M M M L M M M M

CO4 S M M M M M M M M M

CO5 S M M M M M M M M L

*S-Strong; M-Medium; L-Low

Page 9 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
Course Code SCAA
L
DATED: 18.05.2023
T P C
Programming Lab- C and C++
Core/Elective/Supportive Core Lab : 1 - - 5 2
Basic knowledge of Procedure And Object Oriented
Programming concepts Syllabus 2023-24
Pre – requisite  Basic knowledge in C AND C++ version Onwards
Programming
Course Objectives
 To introduce he concepts of Object-Oriented Programming Paradigm and programming
constructs of C++
Course Outcomes
1 Understand the logic for a given problem and to find factorial
value & Fibonacci Series K2

2 Apply the concept of Strings functions and array K3


3 Illustrate the concept of Virtual Classes, inline functions and friend functions K3,K5
4 Apply the various basic programming constructs like decision making statements.
Looping statements, functions, concepts like overloading, inheritance, polymorphism, K3
virtual functions , constructors and destructors
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create

1. Write C A Program to find the simple interest, inputs are amount, period in years and rate of interest.
2. Write a C program to find Factorial of given’ Numbers.
3. Write a C program to generate Fibonacci series.
4. Develop a C program to encrypt and decrypt a string
5. Write a C program to check whether a Number is a Palindrome.
6. Write a C program to merge two arrays to the third array.
7. Write C++ program to display address of each element of an array.
8. Write a C++ Program to create a class ARITHMETIC which consists of a FLOAT and an INTEGER
variable. Write member functions ADD (), SUB(), MUL(), DIV() to perform addition, subtraction,
multiplication, division respectively. Write a member function to get and display values.
9. Write a C++ Program to create a class SHAPE which consists of two virtual functions
10. Write a C++ Program to read an integer number and find the sum of all the digits until it reduces to a
single digit using constructors, destructors and inline member functions.
Total Lecture Hours 45
Hours
Text Book(s)
1. E Balagurusamy: Computing Fundamentals & C Programming – Tata McGraw-Hill, Second Reprint
2008
2. Ashok N Kamthane, Object-Oriented Programming with Ansi And Turbo C++, Pearson Education,
2003.
Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]
1. Introduction to Programming in C – NPTEL
2. Problem solving through Programming in C - SWAYAM
3. C for Everyone : Programming Fundamentals – Course
4. https://www.javatpoint.com/cpp-píogíams
5. https://www.w3schools.com/cpp/cpp_exeícises.asp
Course Designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

Page 10 of
81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 S S M M M M M M M M

CO2 S S M M L M M M M M

CO3 S S M M M M M L M M

CO4 S S M M M M M M L M

*S-Strong; M-Medium; L-Low

Page 11 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code Computer Organization and Architecture L P C
Core/Elective/Supportive Core: 2 5 0 4
Pre - requisite 2023-24
To learn about Computer Fundamentals and Syllabus
version Onwards
its Architecture
Course Objectives
To understand
1. On successful completion of this subject the students should have :
- Knowledge on digital circuits
- Interfacing of various components

Course Outcomes
1 On the successful completion of the course, student will be able to: K3
Learn the basic structure of number system methods like binary, octal and hexadecimal and
understand the arithmetic and logical operations are performed by computers.
2 Define the functions to simplify the Boolean equations using logic gates. K1
3 Understand various data transfer techniques in digital computer and control unit K2
operation and Understand technical literature on computer systems.
4 Compare the functions of the memory organization & K4

5 Analyze architectures and computational designs concepts related to architecture organization K4


and addressing modes
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create

Unit I NUMBER SYSTEM 12


Number System and Binary Codes: Decimal, Binary, Octal, Hexadecimal – Binary addition,
Multiplication, Division – Floating point representation, Complements, BCD, Excess3, Gray Code.
Arithmetic Circuits: Half adder, Full adder, Parallel binary adder, BCD adder, Half subtractor, Full
subtractor, Parallel binary subtractor - Digital Logic: the Basic Gates – NOR, NAND, XOR Gates.
.
Unit II COMBINATIONAL LOGIC CIRCUITS 11
Boolean algebra –Karnaugh map – Canonical form 1 – Construction and properties –
Implicants – Don’t care combinations - Product of sum, Sum of products, simplifications.
Sequential circuits: Flip-Flops : RS, D, JK, T - Multiplexers – Demultiplexers – Decoder –
Encoder
Unit III CENTRAL PROCESSING UNIT
10
General Register Organization - Control word – Examples of Micro operations - Stack organization -
Instruction formats - Addressing modes - Data Transfer and manipulation program control.
Unit IV INPUT – OUTPUT ORGANIZATION
12
Input – output interface – I/O Bus and Interface – I/O Bus Versus Memory Bus – Isolated Versus
Memory – Mapped I/O .Asynchronous data transfer: Strobe Control and Handshaking – Priority Interrupt:
Daisy Chaining Priority, Parallel Priority Interrupt. Direct Memory Access: DMA Controller, DMA
Transfer. Input – Output Processor: CPU-IOP Communication
Unit V MEMORY ORGANIZATION
12
Memory Hierarchy – Main Memory- Associative memory: Hardware Organization, Match Logic, Read
Operation, Write Operation. Cache Memory: Associative, Direct, Set-associative Mapping – Writing Into
Cache Initialization.
Unit VI Contemporary Issues 3
Expert lectures, online seminars - webinars
Total Lecture Hours 60 Hours

Page 12 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Text Book(s)
1. Digital Electronics Circuits and Systems, V.K. PURI, TATA McGRAW-HILL Pub. Company
2. Computer System Architecture, M. MORRIS MANO, PHI.
Reference Books
1. ISRD group – Tata McGrawHill.
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)
1. https://www.javatpoint.com/computer-organization-and-architecture-tutorial
2. https://archive.nptel.ac.in/courses/106/105/106105163/
3. http://www.nitttrc.edu.in/nptel/courses/video/106106092/L01.ht

Coures designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 S S S M M M S M M M

CO2 S S S M M M M M L M

CO3 S S S M S M M M S S

CO4 S S S M S S S L M M

C05 S S S M L L S M L S

*S-Strong; M-Medium; L-Low

Page 13 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code L T P C
Numerical Methods
Core/Elective/Supportive Core 5 - -- 4
Pre - requisite Knowledge In Higher Secondary Syllabus 2023-24
LevelMathematics version Onwards+
Course Objectives
To equip the learners with the powerful tool for numerical differentiation, numerical
integration ,difference equation, numerical solution to O.D.E.
Expected Course Outcomes:
On the successful completion of the course, student will be able to:
1 K1
Obtain numerical solutions of algebraic and transcendental equations.
2 Distinguish methods of Taylor series, Euler’s, Modified Euler’s and Runge Kutta K2
methods to find solutions of differential equations.
3 Apply the techniques for enormous application in the field of Science and some K3
fields of Engineering.
4 Compute the derivatives by using the appropriate technique. K4
5 Find the numerical solution of second order O.D.E by finite difference method. K4
K1 - Remember; K2 - Understand; K3 - Apply; K4 - Analyze; K5 - Evaluate; K6 - Create

Unit I The Solution Of Numerical Algebraic And 12


Transcendental Equations
Bisection method – Iteration Method – Convergence condition – Newton – Raphson Method - Order of
Convergence.
Unit II Numerical Integration 12
Differences – operators – forward and backward difference tables – Differences of a polynomial – Factorial
polynomial .
Unit III Difference Equation 12
Order and degree of a difference equation – solving homogeneous and non – homogeneous
linear difference equations..
Unit IV Numerical Solution Of O.D.E 12
Taylor series method – Euler’s method – improved and modified Euler method – Runge
Kuttamethod (Second Order method only)
Unit V Multi Step Methods 12
Milne’s predictor corrector formulae – Adam-Bashforth predictor corrector formulae
.
Total Lecture Hours 75 Hours
Reference Books
1. Numerical Methods in Science and Engineering -Venkataraman M. K.(
National Publishing company V Edition 1999. )
2. Numerical Methods for Scientists and Engineers -Sankara Rao K. (Prentice Hall India , 2nd
Edition2004 )
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)
1 http://nptel.ac.in/courses/104101002/downloads/lecturenotes/module1/chapter6.pdf

2. https://www.britannica.com/science/difference-equation

Page 14 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 M M M M M M M M M M
CO2 M M M M M M M M M M
CO3 S M L M M M L M M M
CO4 S S M M L M M M M M
CO5 S S S M M M M M L M

*S-Strong; M-Medium; L-Low

Page 15 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Second
Semester

Page 16 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code Python Programming L T P C

Core/elective/Supportive Core : 3 5 0 0 4

Pre - requisite Knowledge in Basics of Object Oriented Syllabus 2023-24


Programming version Onwards

Course Objectives
To introduce the concepts of the various programming constructs of Python programming
Expected Course Outcomes
1 Apply the various basic programming constructs like operators, expressions, decision K2
making statements and Looping statements
2 Summarize the concept of lists, tuples , functions and error handling K2
3 Apply the concept of Decision making statements, looping constructs , functions for K3
solving basic programs
4 Analyze the concepts of Lists, tuples and error handling mechanisms K4
5 Evaluate a program incorporating all the python language constructs K5
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create

UNIT I BASICS 15

Python - Variables - Executing Python from the Command Line - Editing Python Files -Python
Reserved Words - Basic Syntax-Comments - Standard Data Types – Relational Operators -Logical
Operators - Bit Wise Operators - Simple Input and Output.
UNIT II CONTROL STATEMENTS, LISTS, TUPLES 15
CONTROL STATEMENTS: Control Flow and Syntax - Indenting - if Statement - statements and
expressions- string operations- Boolean Expressions -while Loop - break and continue - for Loop.
LISTS: List-list slices - list methods - list loop–mutability–aliasing - cloning lists - list parameters.
TUPLES: Tuple assignment, tuple as return value -Sets–Dictionaries.

UNIT III FUNCTIONS: 14


Definition - Passing parameters to a Function - Built-in functions- Variable Number of Arguments -
Scope – Type conversion-Type coercion-Passing Functions to a Function – Mapping Functions in a
Dictionary – Lambda - Modules - Standard Modules – sys – math – time - dir – help Function.

UNIT IV ERROR HANDLING: 13


Run Time Errors - Exception Model - Exception Hierarchy - Handling Multiple Exceptions - Data
Streams - Access Modes Writing - Data to a File Reading - Data From a File - Additional File Methods
- Using Pipes as Data Streams - Handling IO Exceptions - Working with Directories.

UNIT V OBJECT ORIENTED FEATURES: 15


Classes Principles of Object Orientation - Creating Classes -Instance Methods - File Organization -
Special Methods - Class Variables – Inheritance – Polymorphism - Type Identification - Simple
Character Matches - Special Characters – Character Classes – Quantifiers - Dot Character - Greedy

Page 17 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Matches – Grouping - Matching at Beginning or End - Match Objects – Substituting - Splitting a
String - Compiling Regular Expressions.

UNIT VI Contemporary Issues

Expert lectures, online seminars - webinars 3

Total Lecture Hours 75 Hours


Text Book(s)
1 Mark Summerfield. ―Programming in Python 3: A Complete introduction to the Python
Language, Addison-Wesley Professional, 2009.
2 Martin C. Brown, ―PYTHON: The Complete Reference‖, McGraw-Hill, 2001
Reference Book(s)
1 Allen B. Downey, ``Think Python: How to Think Like a Computer Scientist„„, 2nd
edition, Updated for Python 3, Shroff/O„Reilly Publishers, 2016
2 Guido van Rossum and Fred L. Drake Jr, ―An Introduction to Python – Revised and updated
for Python 3.2, Network Theory Ltd., 2011.
Course Designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M

CO2 M M L M M M M M M M

CO3 S M L M M M M M L M

CO4 S S M M M M M M M M

CO5 S S S M M M M M M M

*S-Strong; M-Medium; L-Low

Page 18 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Course Code Programming Lab - Python L T P C


Programming
Core/Elective/Supportive Core Lab: 2 - - 5 2
Pre - requisite  Basic knowledge of Programming
Constructs 2023-24
Syllabus
 Knowledge on Object Oriented Onwards
version
Programming Concepts
Course Objectives
1. To write, test, and debug simple Python programs.
2. To implement Python programs with conditionals and loops.
3. Use functions for structuring Python programs.
4. Represent compound data using Python lists, tuples and dictionaries.
5. Read and write data from/to files in Python.
Course Outcomes
1 Write, test, and debug simple Python programs. Read and write data from/to files in Python K2
2 Implement Python programs with conditionals and loops. K3
3 Develop Python programs step-wise by defining functions and calling them. K4
4 Use Python lists, tuples, dictionaries for representing compound data. K5
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create

PROGRAM 1 4
Display the given integer in reverse manner
PROGRAM 2 4
Find the square root of a number (Newton’s method)
PROGRAM 3 4
Display the multiplication table
PROGRAM 4 4
Find the sum of number digits in list
PROGRAM 5 4
Write a python program to find the largest three integers using if-else and conditional operator.
PROGRAM 6 6
Write a python program to make a simple calculator.
PROGRAM 7 6
Merge sort
PROGRAM 8 6
Write a python program for Linear Search and Binary Search.
PROGRAM 9 6
Multiply matrices
PROGRAM 10 6
Programs that take command line arguments (word count)

Page 19 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Total Lecture Hours 50 Hours


Text Book(s)
1 Mark Summerfield. ―Programming in Python 3: A Complete introduction to the Python
Language, Addison-Wesley Professional, 2009.
Reference Book(s)
1 Martin C. Brown, ―PYTHON: The Complete Reference‖, McGraw-Hill, 2001

Course Designed by : M.SUBHA M.Sc.,M.Phil., MCA.,Head & Assistant Professor, Department of


Computer Science ,Shree Venkateshwara Arts and Science(Co-ed) College, Gobichettipalayam.

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 S S S M L M M M M M
CO2 S S S M M M M M L L
CO3 S S S M M M L M M M
CO4 M M S S M M M M M M
*S-Strong; M-Medium; L-Low

Page 20 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code Internet Basics L T P C
Core/Elective/Supportive Core Lab: 3 - 0 3 2
Pre-requisite  Basic knowledge in Computers Syllabus 2023-24
Version Onwards
Course Objectives
1. Introduce the fundamentals of Internet and the Web functions.
2. Impart knowledge and essential skills necessary to use the internet and its various components.
3. Find, evaluate, and use online information resources.
4. Use Google Apps for education effectively.

Expected Course Outcomes


1 Apply the predefined procedures to create Gmail account, check and receive messages K3
2 Apply the predefined procedures to perform various basic operations on internet K3
3 Utilize various Google applications like docs, Google classroom, Google drive, Google K3
forms, Google meet and slides
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create

PROGRAM - 1 3
Create an email account in Gmail. Using the account created compose a mail to invite other college
students for your college fest, enclose the invitation as attachment and send the mail to at least 10
recipients. Use CC and BCC options accordingly
PROGRAM - 2 3
Open your inbox in the Gmail account created, check the mail received from your peer from other
college inviting you for his college fest, and download the invitation. Reply to the mail with a thank
you note for the invite and forward the mail to other friends
PROGRAM - 3 3
Assume that you are studying in final year of your graduation and are eagerly looking for a job. Visit
any job portal and upload your resume.
PROGRAM - 4 3
Create a label and upload bulk contacts using import option in Google Contacts
PROGRAM - 5 3
Create one-page story in your mother tongue by using voice recognition facility of Google Docs
PROGRAM -6 3
Create your own Google classroom and invite all your friends through email id. Post study material in
Google classroom using Google drive. Create a separate folder for every subject and upload all unit
wise E-Content Materials.
PROGRAM -7 3
Create and share a folder in Google Drive using ‗share a link‘ option and set the permission to access
that folder by your friends only.
PROGRAM -8 3
Create a meet using Google Calendar and record the meet using Google Meet.

Page 21 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

PROGRAM -9 3
Create a registration form for your Department Seminar or Conference using Google Forms.
PROGRAM -10 3
Create a question paper with multiple choice types of questions for a subject of your choice, using
Google Forms.
Total Lecture Hours 30 Hours
Text Book(s)
1 Ian Lamont, Google Drive & Docs in 30 Minutes, 2nd Edition.
Reference Book(s)
1 Sherry Kinkoph Gunter, My Google Apps, 2014.
Course Designed by :

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M M M M M M M M M
CO2 S M M M M L M M M M
CO3 S S M M M M M M L M
*S-Strong; M-Medium; L-Low

Page 22 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code L T P C
Linear Algebra
Core/Elective/Supportive Allied :2 5 - -- 4
Pre - requisite Basic knowledge in Mathematics Syllabus 2023-24
version Onwards
Course Objectives
1. To introduce the computational techniques and algebraic skills essential for the study of systems of
linear equations, matrix algebra, and vector spaces
2. To introduce the concepts of neural networks and fuzzy systems
3. To explain the basic mathematical elements of the theory of fuzzy sets.
Course Outcomes
1 Explain the concept/theory in linear algebra, to develop dynamic and graphical views to K1
the related issues of the chosen topics as outlined in course content and to formally prove
theorems.
2 Recognize the basic applications of the chosen topics and their importance in the modern K2
science.
3 Develop simple mathematical models and apply basic linear algebra techniques learned K3
from the chosen topics to solve simple problems
4 Report and communicate effectively with others and present mathematical results in a K4
logical and coherent fashion
5 Analyze the applications of fuzzy logic and neural network for various applications. K5
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create

Unit I Matrix 15
Introduction-Determination-Inverse of a Matrix-Rank of a Matrix-Eigen Value Problem-
Transpose-Properties of Transpose- Solving Simultaneous linear equations by matrix method.
Unit II System of Simultaneous Linear Algebraic Equation 15
Gauss Elimination Method-Gauss Jordan Method-Simple Problems-Gauss Seidel Method-Simple
Problems.
Unit III Numerical Differentiation & Integration 15
Numerical Differentiation: Newton’s Forward Difference-Newton’s Backward Difference
Formula. Numerical Integration: Trapezoidal Rule-Simpson’s Rule.
Unit IV Graph Theory 15
Graph Theory: Basic Terminology-Paths, Cycle & Connectivity-Subgraphs and Types of Graphs-
Representation of Graphs in Computer Memory. Trees: Properties of Trees and Binary Trees-
Traversing Binary Trees and Computer Representation of General Trees
Unit V Fundamentals of Neural Networks 15
Basic concepts of neural networks – Human brain- Model of an Artificial neuron- Neural network
architecture: Single layer Feedforward network - Multilayer Feedforward network – Recurrent neural
network – Characteristics of neural networks – Learning Methods- Taxonomy of neural network
Architecture-History of neural network research
Total Lecture Hours 75 Hours
Text Book(s)
1. Navanitham, P.A., “Business Mathematics & Statistics”, Jai Publishers, Trichy (Unit I)
2. Venkataraman M. K., “Numerical Methods in Science & Engineering”, National Publishing
Company, Chennai. (Unit II & III)
3. Sharma J.K., “Discrete Mathematics”,Second Edition, MacMillan Publishers India Limited,
Chennai, 2005 (Unit IV)

Page 23 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
4. Rajasekaran S. and Vijayalakshmi Pai G.A., “Neural Networks, Fuzzy Logic, and Genetic
Algorithms : Synthesis And Applications” Prentice Hall of India (Unit V)
Reference Book(s)
1. Fuzzy logic & Neural Networks/ Chennakesava R. Alavala/ New Age International, 2008
2. Neural Networks for control, Millon W. T, Sutton R.S and Werbos P. J, MIT Press 1992
3. Fuzzy sets Fuzzy logic, Klir, G. J anfd Yuan B.B Prentice Hall oif India Pvt. Ltd.,, New Delhi
4. Introduction to Fuzzy control, Dirankov D. Hellendoorn H, Reinfrank M., Narosa Publications
House, New Delhi 1996
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)

Course Designed by :

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M
CO2 M M M M M M M M M L
CO3 S M L M M L M M M M
CO4 S S M M M M M L M M
CO5 S S S M M M M M M M

*S-Strong; M-Medium; L-Low

Page 24 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Third
Semester

Page 25 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code Java Programming L T P C

Core/elective/Supportive Core : 4 4 0 - 4
Pre - requisite  Basic knowledge of Syllabus 2023-24
ProgrammingConstructs. version Onwards
 Knowledge on Object
OrientedProgramming Concepts.
Course Objectives
 To introduce the concepts of Object Oriented Programming Paradigm and the
programming constructs of JAVA
Expected Course Outcomes
1 Recite the history of JAVA and its evolution K1
2 Explain the various programming language constructs, object oriented concepts like K2
overloading, inheritance, polymorphism, Interfaces , threads, exception handling
andpackages
3 Illustrate the concepts of Applets, files and the concept of stream classes. K3
4 Outline the benefits and applications of objects oriented programming concepts and K3
defend how JAVA differs from other programming languages
5 Judge the pros and cons of other object oriented language with the concepts of JAVA K4
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create

UNIT I 12
Fundamentals of OOPS
Fundamentals of Object-Oriented Programming: Object-Oriented Paradigm – Basic Concepts of
Object-Oriented Programming – Benefits of Object-Oriented Programming – Application of Object-
Oriented Programming. Java Evolution: History – Features – How Java differs from C and C++ –
Java
and Internet – Java and www –Web Browsers. Overview of Java: simple Java program – Structure –
Java Tokens – Statements – Java Virtual Machine.
UNIT II 10
Variables & Control Structures
Constants, Variables, Data Types - Operators and Expressions – Decision Making and Branching: if,
if...else, nested if, switch? : Operator - Decision Making and Looping: while, do, for – Jumps in
Loops
- Labeled Loops – Classes, Objects and Methods.
UNIT III Arrays & Classes 12
Arrays, Strings and Vectors – Interfaces: Multiple Inheritance – Packages: Putting Classes together –
Multithreaded Programming.
UNIT IV Error Handling & Graphics 13
Managing Errors and Exceptions – Applet Programming – Graphics Programming.
UNIT V I/O Streams 13
Managing Input / Output Files in Java: Concepts of Streams- Stream Classes – Byte Stream classes –
Character stream classes – Using streams – I/O Classes – File Class – I/O exceptions – Creation of
files – Reading / Writing characters, Byte-Handling Primitive Data Types – Random Access Files.
Total Hours 60 Hours

Page 26 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Text Book(s)
1 PROGRAMMING WITH JAVA – A PRIMER - E. Balagurusamy, 3 rd Edition, TMH.

Reference Book(s)
1 Herbert Schildt, “The complete Reference – Java 2”, Fifth Edition, Tata McGraw Hill Publishing
Company, Delhi, 2002.
2 The Complete Reference Java 2 - Patrick Naughton & Hebert Schildt, 3rd Edition, TMH
3 Programming with Java – John R. Hubbard, 2nd Edition, TMH.
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)
1. https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2. https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
Course Designed by :

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M
CO2 M L M M M M M M M M
CO3 S M M M M L M M M M
CO4 S M M M M M M L M M
CO5 S S M M L M M M M M

*S-Strong; M-Medium; L-Low

Page 27 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code CYBER LAWS L T P C
Core/Elective/Supportive Core 5 4 - - 4
Pre - requisite None Syllabus 2023-24
version Onwards
Course Objectives
To explain about the various facets of cyber crimes
To enhance the understanding of problems arising out of online transactions and provoke them to find
solutions
Course Outcomes
1 Give Learners In Depth Knowledge Of Information Technology Act And Legal K3
Frame Work Of Right To Privacy, cyber conflict investigation ,Data Security And
Data Protection.
2 Make Learner Conversant With The Social And Intellectual K2
Property Issues Emerging From ‘Cyberspace.
3 Explore The Legal And Policy Developments In Various Countries To Regulate K6
Cyberspace
4 Develop The Understanding Of Relationship Between Commerce And Cyberspace; K2
K1 – Remember K2 – Understand K3 – Apply K4- Analyze K5 – Evaluate K6- Create

Unit I INTRODUCTION 10
Introduction to cyber space -UNCITRAL Model Law – Information Technology Act, 2000 with recent
amendments - Jurisdictional issues - Digital signatures – regulation of - certifying authorities - Cyber
Regulation Appellate Tribunal – Human Rights Issues.

Unit II ONLINE CONTRACTS 12


Formation of online contracts - E banking transactions, online payment options, online advertising -
Electronic and digital signatures - Taxation issues in cyber space- indirect tax, tax evasion, double tax,
international tax, permanent establishment – Protection of trade secrets and deceptive trade practices.

Unit III CYBER CRIMES 12


Understanding cybercrimes - Identifying Theft and Frauds - Types of crimes in the internet: Against
person, against property, against government - Digital evidence- investigation and adjudication of
cybercrimes in India- cyber arbitration, cyber conflict investigation- cyber Terrorism
Unit IV INTELLECTUAL PROPERTY RIGHTS (IPR) AND CYBER SPACE 12
Copyright issues in the internet- protection of computer software, caching, international regime-OSS,
DMCA, Data Protection Directive - Trademark issues in the internet – Domain Name Registration, Domain
Name Registration, Domain Name Dispute, ICANN, UDRP policy, linking, framing, tagging - Database
issues in the internet.
Unit V THE INDIAN EVIDENCE ACT OF 1872 14
INFORMATION TECHNOLOGY ACT, 2000
Status of Electronic Records as Evidence, Proof and Management of Electronic Records; Relevancy,
Admissibility and Probative Value of E-Evidence, Proving Digital Signatures, Proof of Electronic
Agreements, Proving Electronic Messages.
CASE STUDY- PROTECTION OF CYBER CONSUMERS IN INDIA: Are Cyber Consumers Covered
Under the Consumer Protection Act? Goods and Services, Consumer Complaint, Defect in Goods and
Deficiency in Services, Restrictive and Unfair Trade Practices, Instances of Unfair Trade Practices, Reliefs
Under CPA, Beware Consumers.

Page 28 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Total Lecture Hours 60 Hours

Reference Book(s)
1. Karnika Seth, “ Computers, Internet and New Technology Laws” ,Cyber Lawyer and Expert and is The
Managing Partner of Seth Associates, Edition 2012.
2. S.K.Verma, Raman mittal , “Legal dimensions of cyber space” ,Indian Law Institute, New Delhi:
Indian Institute,2004.
3. Law Relating to Computers Internet & E-commerce – “A Guide to Cyber laws & the
Information Technology Act, Rules, Regulations and Notifications along with Latest Case Laws”,
2012.
4. Jeff Kosseff , “Cyber security Law”, Wiley Publications, 2017.
5. Ian. J. Lyod , “Information technology law” , Information Technology Act 2000, its amendment and
IT Rules, 2014.
6. Yee fen Lim , “Cyber space law commentaries and Materials”, second edition, Galexia Consulting Pty
Ltd, Australia

Related Documents(Mooc,Swayam,Website etc)


1. https://onlinecourses.nptel.ac.in/noc19_cs65/preview

Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M M M M M M M M M
CO2 M M M M M M M M M M
CO3 S M M M M M M M M M
CO4 S M M M M M M M M M
*S-Strong; M-Medium; L-Low

Page 29 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code Java Programming- Lab L T P C
Core/Elective/Supportive Core Lab : 4 0 0 4 2
Pre - requisite  Basic knowledge of Programming Syllabus 2023-24
 Knowledge on Object Oriented version Onwards
Programming Concepts
Course Objectives
To introduce the concepts of Object Oriented Programming Paradigm and the
programming constructs of JAVA

Course Outcomes
1 Apply the various basic programming constructs of JAVA like decision making K3
statements. Looping statements, overloading, inheritance, polymorphism, constructors
and destructors
2 Illustrate the concepts of threading and multi-threading K4
3 Design programs using various file stream classes; file types, and frames K4
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create

PROGRAM - 1 4
Write a Java Applications to extract a portion of a character string and print the extracted string.
PROGRAM - 2 4
Write a Java Program to implement the concept of multiple inheritance using Interfaces.
PROGRAM - 3 4
Write a Java Program to create an Exception called payout-of-bounds and throw the exception
PROGRAM - 4 4
Write a Java Program to implement the concept of multithreading with the use of any threemultiplication
tables and assign three different priorities to them.
PROGRAM - 5 4
Write a Java Program to draw several shapes in the created windows
PROGRAM -6 5
Write a Java Program to demonstrate the Multiple Selection List-box.
PROGRAM -7 5
Write a Java Program to create a frame with three text fields for name, age and qualification and a text
field for multiple line for address
PROGRAM -8 5
Write a Java Program to create Menu Bars and pull-down menus.
PROGRAM -9 5
Write a Java Program to create frames which respond to the mouse clicks.
PROGRAM -10 5
Write a Java Program to draw circle, square, ellipse and rectangle at the mouse click positions.
Total Hours 45
Hours

Page 30 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Text Book(s)
1 Programming with Java – A Primer - E. Balagurusamy, 5th Edition, TMH.

Reference Book(s)
2 The Complete Reference Java 2 - Patrick Naughton& Hebert Schildt, 3rd Edition, TMH
Course Designed by :

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 S S S M M M M M M M

CO2 S S S M M M M M M M

CO3 S S S M M M M S M M

*S-Strong; M-Medium; L-Low

Page 31 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Course Code Malware Analysis and Cyber L T P C


Threat Intelligence
Core/elective/Supportive ALLIED : III 5 0 0 4
Pre - requisite None
Course Objectives
 To explain about the concept of Malware analysis
 To describe the concepts associated with cyber threat intelligence

Expected Course Outcomes


1 Explain about the lifecycle of malware and virus nomenclature K2
2 Understand the working principle of viruses and worms K2
3 Choose the virus and malware designs to perform case studies K3
4 Analyze the various types of worms and viruses K3
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create

UNIT I INTRODUCTION 15
INTRODUCTION: Computer Infection Program- Life cycle of malware- Virus nomenclature- Worm
nomenclature- Tools used in computer virology.
UNIT II IMPLEMENTATION OF COVERT CHANNEL 15
IMPLEMENTATION OF COVERT CHANNEL: Non self-reproducing Malware- Working principle
of Trojan Horse- implementation of Remote access and file transfer- Working principle of Logical
Bomb: CaseStudy: Conflicker C worm.

UNIT III VIRUS DESIGN AND ITS IMPLICATIONS 14


VIRUS DESIGN AND ITS IMPLICATIONS: Virus components- Function of replicator, concealer
and dispatcher- Trigger -Mechanisms- Testing virus codes- Case Study: Brute force logical bomb.

UNIT IV MALWARE DESIGN USING OPEN SOURCE 16


MALWARE DESIGN USING OPEN SOURCE: Computer Virus in Interpreted programming
language- Designing Shell bash virus - under Linux- Fighting over infection- Anti -antiviral fighting -
Polymorphism- Casestudy: Companion virus.

UNIT V VIRUS AND WORM ANALYSYS 15


VIRUS AND WORM ANALYSYS: Klez Virus- Clone Virus- Doom Virus- Black wolf worm- Sassar
worm- Happy worm 99
Total Lecture Hours 75 Hours
Text Book(s)
1 ErciFiliol, "Computer Viruses: from theory to applications", Springer, 15tedition, ISBN 1 O: 2-
287-23939-1, 2005.
2 Mark.A .Ludwig, "The Giant black book of computer viruses, Create Space
Independent Publishing Platform, 2nd edition, ISBN 10: 144140712X, 2009.

Page 32 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Reference Book(s)
1 Monnappa KA by Learning Malware Analysis: Explore the concepts, tools, and techniques
to analyze and investigate Windows malware.
2 JesseyBullock ,Wireshark for Security Professionals: Using Wireshark and the
Metasploit Framework 1st Edition.
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)
1 https://onlinecourses.swayam2.ac.in/aic20 sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
Course Designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L

CO2 M L L L L L L L L L

CO3 S M L L L L L L L L

CO4 S M L L L L L L L L

S-Strong; M-Medium; L-Low

Page 33 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code WEB PROGRAMMING L T P C
Core/Elective/Supportive Skill based Subject : 1 3 0 0 2
Pre - requisite Basics of web pages, server Syllabus 2023-24
and browser version Onwards
Course Objectives
1. To understand the graphic design principles that relate to web design and learn how to implement
theories into practice.
2. To develop skills in analyzing the usability of a web site.
3. To develop how to plan and conduct user research related to web usability.
4. To learn the language of the web: HTML and CSS.
5. To develop skills in DHTML
Expected Course Outcomes On the successful completion of the course,
student will be able to:
1 Develop a web page using HTML simple tags. K2
2 Implement the various use of cascading style sheet K4
3 Analyze and write the functions using scripting language K4
4 Evaluate the website using event handling mechanism K5
5 Analyze the use of DHTML K4
K1 – Remember K2 – Understand K3 – Apply K4- Analyze K5 – Evaluate K6- Create

UNIT I INTERNET BASICS 06


Internet basics, introduction to HTML, list, creating tables, linking documents, frames, graphics to HTML
documents, style sheet basics, adding styles to documents
UNIT II CASECADING STYLE SHEET. 06
. Creating style sheet tools, style sheet properties, font, text, list, color and background color, box, display
properties. Suggested Readings: CSS Tools

UNIT III SCRIPTING LANGUAGES 06


Introduction to JavaScript, Advantages of JavaScript, JavaScript Syntax, data types, variables, arrays.

UNIT IV OPERATORS AND EXPRESSIONS 06


Operators and Expressions, Looping constructors, functions, dialog box, JavaScript, document object model.
Suggested Readings: Introduction to JavaScript
UNIT V DHTML 06
DHTML, cascading style sheets, class, external style sheets, working with JavaScript style sheet.
Suggested Readings: DHTML

Total Lecture Hours 30 Hours

Page 34 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Text Book(s)
1. Thomas Powell(2017), HTML & CSS: The complete Reference, Fifth Edition McGraw Hill
Education
2. Laura Lemay, Jennifer Kymin(2016) Mastering HTML,CSS & JavaScript, Web

Reference Book(s)
Joshua Johaman, Richard Zea, Talha Khan(2016), Web Developers Reference Guide, Packet
Publishing.
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)
1 https://www.creativebloq.com/web‐design/free‐ebooks‐web‐designers‐5132836
2 https://www.coursera.org/specializations/web‐design
Course Designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 S S M M M M L M M M

CO2 S S M M M M M M M M

CO3 S S M M L M M M M M

CO4 S S M M M M M L M M

CO5 S S M M M M M M M M

*S-Strong; M-Medium; L-Low

Page 35 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Fourth
Semester

Page 36 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
DATED: 18.05.2023
Course Code SCAA L T P C
Linux and Shell Programming
Core/elective/Supportive Core : 6 4 0 0 4
Pre - requisite Basic knowledge about Operating Systems Syllabus 2023-24
Version Onwards

Course Objectives
To introduce the concepts of Linux operating system
To explain the various constructs associated with
Linux
Expected Course Outcomes
1 Illustrate the various directory and fie commands in LINUX K2
2 Apply the methods of securing files in Linux K3
3 Explain the various kernel components of Linux K2
4 Apply the various commands of Linux to perform several operations K3
5 Solve various network administrative issues by writing Linux shell scripts K4
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create

UNIT I Introduction to Linux 10


UNIT I:
Introduction to LINUX Operating System: Introduction - The LINUX Operating System - Basic
commands in Linux
UNIT II Managing Files & Directories 15
Managing Files and Directories: Introduction – Directory Commands in LINUX – File Commands in
LINUX. Creating files using the vi editor: Text editors – The vi editor. Managing Documents:
Locating files in LINUX – Standard files – Redirection – Filters – Pipes.
UNIT III Shell script 10
Securing files in LINUX: File access permissions – viewing File access permissions – Changing File
access permissions. Automating Tasks using Shell Scripts: Introduction – Variables- Local and
Global Shell variables – Command Substitution.
UNIT IV Conditional & Looping Statements 10
Using Conditional Execution in Shell Scripts: Conditional Execution – The case…esac Construct.
Managing repetitive tasks using Shell Scripts: Using Iteration in Shell Scripts – The while construct –
until construct – for construct – break and continue commands – Simple Programs using Shell
Scripts.
UNIT V Kernel & System Recovery 12
Linux Kernel- Kernel Components- compiling a kernel- Customizing a kernel – system startup-
Customizing the boot process-System Recovery
UNIT VI Contemporary Issues 3
Webinar,seminar ,online coding
Total Lecture Hours 60 Hours
Text Book(s)
1 Operating System LINUX, NIIT, PHI, 2006, Eastern Economy Edition.
Reference Book(S)
1 Richard Petersen, Linux: The Complete Reference, Sixth Edition, Tata McGraw-Hill
Publishing Company Limited, New Delhi, Edition 2008.
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)
1
2

Page 37 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
Course Designed by : SCAA DATED: 18.05.2023

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L M M M M M M M M

CO2 M L M M M M M M M M

CO3 S M M M M M L M M M

CO4 S S M M L M M M M M

CO5 S S S M M M M L M M

*S-Strong; M-Medium; L-Low

Page 38 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Course Code BLOCK CHAIN TECHNOLOGY L T P C


Core/Elective/Supportive Core 7 4 0 0 4
Pre – requisite None Syllabus 2023-24
version Onwards
Course Objectives
To understand how block chain systems work, where they are used, their limitations, and how they affect
organizations and society now and in the future.

Course Outcomes
1 Demonstrate the basics of Block chain concepts using modern tools/technologies. K1,K2
2 Analyze the role of block chain applications in different domains including cyber K4
security.
3 To interact with a block chain system by sending and reading transactions K3-K5
4 Analyze the application of specific block chain architecture for a given problem K4
K1 – Remember K2 – Understand K3 – Apply K4- Analyze K5 – Evaluate K6- Create

Unit I BLOCKCHAIN CONCEPTS 09


Blockchain -Blockchain Application Example: Escrow -Blockchain Stack -From Web 2.0 to the Next
Generation Decentralized Web Domain Specific Blockchain Applications - Blockchain Benefits &
Challenges.
Unit II BLOCK CHAIN COMPONENTS & APPLICATION TEMPLATES 09
Blockchain Application Templates: Blockchain Application Components- Design Methodology for
Blockchain Applications- Blockchain Application Templates.

Blockchain Components & Applications-Setting up Ethereum Development Tools -Ethereum Clients -


Ethereum Languages - TestRPC -Mist Ethereum Wallet-MetaMask -Web3 JavaScript API -Truffle -
Ethereum Accounts - Keypairs - Working with EOA Accounts - Working with Contract Accounts
Unit III Smart Contracts 09
Structure of a Contract - Setting up and Interacting with a Contract using Geth Client - Setting up and
Interacting with a Contract using Mist Wallet - Smart Contract Examples - Smart Contract Patterns
Unit IV DECENTRALIZED & CASE STUDIES 09
Implementing Dapps -Case Studies- Crowdfunding- Event Registration- Document Verification- Call
Option- Interest Rate Swap - Industrial loT - Machine MaintenancE- Solar Charging Stations.

Unit V CONCEPT OF MINING & SWARM 09


Mining -Consensus on Blockchain Network - Block Validation -Setting up Mining Node -State Storage in
Ethereum . Swarm - Swarm Architecture and Concepts -Incentive Mechanisms in Swarm -Swarm Setup-
Working with Swarm.
45 Hours
Total Lecture Hours
Text Book(s)
1.Block chain Applications -A Hands-On Approach Arshdeep Bahga • Vijay Madisetti
Reference Book(s)

Page 39 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
1. Dr. Gavin Wood, “ETHEREUM: A Secure Decentralized Transaction Ledger”, Yellow paper, 2014.
2. Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli, “A survey of attacks on Ethereum
smart contracts”, 2016.
Related documents(MOOC,SWAYAM,Websites etc.,)
1. https://onlinecourses.nptel.ac.in/noc22_cs44/preview
2. https://onlinecourses.swayam2.ac.in/aic21_ge01/preview
Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 S S S S M S M S M M

CO2 S S S S S M M M M M

CO3 S M S S M M M M M M

CO4 S M S S S M M M M M

*S-Strong;M-Medium;L-Low

Page 40 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Course Code Linux and Shell Programming -lab L T P C

Core/elective/Supportive Core Lab: 5 0 0 3 2


Pre - requisite Basic knowledge Linux commands Syllabus 2023-24
version Onwards
Course Objectives
To introduce he concepts of Linux operating system commands execution and various programming
construction in Linux shell script.

Expected Course Outcomes


1 To create the directory, how to change and remove the directory. K1
2 To evaluate the concept of shell scripting programs by using an AWK and SED K2
commands
3 To demonstrate the basic knowledge of Linux commands and file handling utilities by K3
using Linux shell environment.
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create

EXERCISE 1 5
1. Write a Shell script that displays list of all the files in the current directory to which the
userhas read, write and execute permissions.
EXERCISE 2 5
1. Write an awk script to find the number of characters, words and lines in a file?
EXERCISE 3 5
Write a Shell script that accepts a filename, starting and ending line numbers as arguments
and displays all the lines between the given line numbers?
EXERCISE 4 4
Write a shell script to sort number in ascending order.
EXERCISE 5 5
Write a shell script (small calculator) that adds, subtracts, multiplies and divides the two
given numbers.
EXERCISE 6 4
Write a shell script to determine whether a given number is a prime number or not.
EXERCISE 7 4
Write a shell script to print the first n Fibonacci numbers.
EXERCISE 8 4
Write a shell script to find the GCD of two given numbers.
EXERCISE 9 4
Write a shell script to check whether given string is palindrome or not.
EXERCISE 10
5

Write a shell script to find the factorial of given integer.


Total Lecture Hours 45 Hours

Page 41 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Text Book(s)
1 Operating System LINUX, NIIT, PHI, 2006, Eastern Economy Edition.

Reference Book(S)
1 Richard Petersen, Linux: The Complete Reference, Sixth Edition, Tata McGraw-Hill
Publishing Company Limited, New Delhi, Edition 2008.

Course Designed by :

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M L M M M M M M M
CO2 S S M M M L M M M M
CO3 S S S M M M M L M M

*S-Strong; M-Medium; L-Low

Page 42 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Software Engineering
Course code L T P C
Core/Elective/
Supportive ALLIED :4 5 0 0 4
Gain knowledge on the Software Development Syllabus 2023-24
Pre-requisite Onwards
Life Cycle. Version
Course Objectives:
The main objectives of this course are to:
1. To enhance the basic software engineering methods and practices.
2. To learn the techniques for developing software systems.
3. Apply their foundations in software engineering to adapt to readily changing environments using the
appropriate theory, principles and processes.

Expected Course Outcomes:


On the successful completion of the course, student will be able to:
1 Understand the basic concepts of software engineering K1-K2
2 Apply the software cost estimation in developing software applications K3
3 Analyze appropriate requirements elicitation techniques to identify requirements. K4
4 Knowledge on how to do a software project with in-depth analysis. K3
5 Describe and apply the concepts and theory related to software verification K3-K4
and validation.
K1 - Remember; K2 - Understand; K3 - Apply; K4 - Analyze; K5 - Evaluate; K6 - Create

Unit:1 SOFTWARE ENGINEERING 15 hours


Introduction to Software Engineering: Definitions – Size Factors – Quality and
Productivity Factors. Planning a Software Project: Planning the Development Process –
Planning an Organizational Structure.

Unit:2 SOFTWARE COST ESTIMATION 12 hours


Software Cost Estimation: Software cost Factors – Software Cost Estimation
Techniques – Staffing-Level Estimation – Estimating Software Estimation Costs.

Unit:3 SOFTWARE REQUIREMENTS 15 hours


Software Requirements Definition: The Software Requirements specification –
Formal Specification Techniques. Software Design: Fundamental Design Concepts -Modules and
Modularization Criteria.

Unit:4 VERIFICATION AND VALIDATION 15 hours


Verification and Validation Techniques: Quality Assurance – Walkthroughs and
Inspections – Unit Testing and Debugging – System Testing. Software Maintenance:
Enhancing Maintainability during Development – Managerial Aspects of Software
Maintenance.

Unit:5 SOFTWARE CONFIGURATION 15 hours


MANAGEMENT
Software Configuration Management: Definitions and terminology – processes and activities.
Software Quality assurance: Definitions – Quality control and Quality assurance – Organization
of Structures. Risk Management: Risk Identification – quantification - Monitoring - Mitigation.
Software requirements gathering: Steps to be followed – Outputs and Quality Records - Skill sets
required – Challenges

Page 43 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Unit:6 Contemporary Issues 3 hours
Expert lectures, online seminars - webinars
Total Lecture hours 75 hours

Text Book(s)
1 Software Engineering Concepts – Richard Fairley, 1997, TMH.
2 Roger S. Pressman: Software Engineering, Tata McGraw Hill, V Edition.
3 Gopalaswamy Ramesh, Managing Global Software Projects, Tata McGraw Hill, New Delhi,
2002.
Reference Books
1 Software Engineering for Internet Applications – Eve Anderson, Philip Greenspun, Andrew Grumet, 2006, PHI
2 Fundamentals of Software Engineering – Rajib Mall, 2nd edition, PHI
3 Software Engineering – Stephen Schach, 7th edition, TMH.

Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]


1 https://www.javatpoint.com/software-engineering
2 https://www.cs.auckland.ac.nz/courses/compsci230s1c/lectures/clark/ch22_4up.pdf
3 https://www.geeksforgeeks.org/software-requirement-specification-srs-format/

Course Designed By:Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

Mapping with Programme Outcomes


COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M L L L L L S L L
CO2 S L L L L M L L M L
CO3 M S L M S L L L L L
CO4 L L L M M L M L L L
CO5 L L L L L M M M L L

Page 44 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
Course Code SCAA DATED: 18.05.2023
L T P C
Skill Based Lab : Web
Core/elective/Supportive 0 0 2 2
Programming
Pre- requisite Skill based subject 2 Syllabus 2023-24
version Onwards
Course Objectives
The main objectives of this course are :
1. This course gives training in web design and applications.
2. To give practical experience on web technology concepts.
3. To design interactive web sites with all the features given in Web programming.
Course Outcomes
On the successful completion of the course, student will be able to
1 Understand the concepts of HTML TAGS K2
2 Attain a good practical skill of managing and retrieving of List and Frames K1
3 Understand the knowledge of handling websites K3
4 Ability to create program using cookies. Ability to create Event handling in JavaScript. K4
K1 –Understand K2 -Analyze K3- Evaluate K4 - Apply

List of Programs
1. Use table tag to format web page. Also create the Time Table of your class using table tag.
2. Create your profile page i.e. educational details, Hobbies, Achievement, My Ideals etc
3. Create Style sheet to set formatting for text tags and embed that style sheet on web pages Created
for your site.
4. Design a web page and embed various multimedia features in the page
5. Write a script to create an array of 10 elements and display its contents
6. Design signup form to validate username, password, and phone numbers etc using Java script
7. Write a JavaScript program to determine whether a given year is a leap year in the Gregorian calendar
8. Create a website with the help of Installation of Word press and designing the word press site
9. Develop a HTML document to display a Registration Form for an inter-collegiate function
10. Develop a HTML document to design Alumni Registration form of your college
Total Lecture Hours 45
Hours
TextBook(s)
1 Internet and Web Design, ITL Education, Macmillan India Ltd
2 The World of Scripting Languages - David Barron
Reference Book(s)
1 World Wide Web Design with HTML, C. Xavier, 2007, TMH
Course Designed By: Mr. V. Suresh Kumar MCA., M.Phil.,

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M L S M M M M M S
CO2 S M M S M M M M M S
CO3 S M M S M M M M M S
CO4 S S S S M M M M M S
CO5 M M M M M M M M M M

Page 45 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Fifth
Semester

Page 46 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA
SC L DATED: 18.05.2023
Course Code T P C
CYBER CRIME
INVESTIGATION AND DIGITAL
FORENSICS
Core/elective/Supportive Core 8: 6 0 0 4
Pre-requisite None Syllabus 2023-24
version Onwards
Course Objectives
1. To understand the basic concepts of cybercrime and forensics,
2. To create the awareness through
simple practical tips and tricks.
3. To learn how to avoid becoming victims of cybercrimes.
4. To familiar with forensics tools and learn to analyze and validate forensics data.
Course Outcomes
1 Understand the types of cybercrime and fundamentals. K2
2 Describe the types of cybercrime offenses and attacks. K4
3 Explain computer forensics and use forensics tools. K3
4 Demonstrate the Digital Forensics. K5
5 To know the laws and discuss about existing case studies. K2
K1–Remember K2 –Understand K3–Apply K4-Analyze K5–Evaluate K6-Create

Unit I INTRODUCTION TO CYBERCRIME 20


Introduction-Classifications of Cybercrimes: E-Mail Spoofing-Spamming-Cyber defamation-
Internet Time Theft-Newsgroup Spam-Crimes from Usenet Newsgroup-Industrial Spying-Industrial
Espionage-Hacking-OnlineFrauds-PornographicOffenses-SoftwarePiracy-Password Sniffing-Credit
Card Frauds and Identity Theft
Unit II CYBER OFFENSES 15
Cyber offenses: How Criminals Plan that attack-Categories of Cybercrime, Passive Attack, Active
Attacks-Scanning/Scrutinizing gathered Information-Attack on Gaining and Maintaining the System
Access-Social Engineering-cyber stalking-Cyber cafe and Cybercrimes. Bottleneck: The Fuel for
Cybercrime-Attack Vector and Cloud Computing
Unit III INTRODUCTION TO COMPUTER FORENSICS 20
Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime.
Introduction to Identity Theft & Identity Fraud. Types of CF techniques – Incident and incident
response methodology – Forensic duplication and investigation. Preparation for IR: Creating response 40
tool kit and IR team. – Forensics Technology and Systems – Understanding Computer Investigation –
Data Acquisition.
Unit IV DIGITAL FORENSICS 20
Introduction to Digital Forensics - Forensic Software and Hardware - Analysis and Advanced
Tools - Forensic Technology and Practices -Forensic Ballistics and Photography - Face, Iris and
Fingerprint Recognition - Audio Video Analysis - Windows System Forensics - Linux System
Forensics-Network Forensics.
Unit V LAWS AND CASE STUDY 12
Laws and Ethics - Digital Evidence Controls - Evidence Handling Procedures - Basics of Indian
Evidence ACT IPC and CrPC - Electronic Communication Privacy ACT - Legal Policies. Case Studies
- Cyber Attack on Cosmos Bank- Nasscom Internet fraud- crime using E-Mail in Tamilnadu- call
centre fraud- BSNL unauthorized access- SMS fraud- Phishing in people’s account-credit card fraud.
UnitVI Contemporary Issues 3
Webinar/Seminar/Guest Lectures
Total Lecture Hours 90 Hours
Text Book(s)
Page 47 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
1. Nina Godbole, Sunit Belapur, “Cyber Security Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley India Publications, April, 2011.
2. James Graham, Richar Howard,Ryan Olson, “Cyber Security Essentials”, CRC Press, Tailor and
Francis Group, 2011.
Reference Book(s)
1. Robert Jones, “Internet Forensics: Using Digital Evidence to Solve Computer Crime”, O’Reilly
Media, October, 2005.
2. Chad Steel, “Windows Forensics: The field guide for conducting corporate computer
investigations”, Wiley India Publications, December, 2006.
3. Nelson Phillips and Enfinger Steuart, “Computer Forensics and Investigations”, Cengage
Learning, New Delhi, 2009.
Related Online Contents (MOOC,SWAYAM,NPTEL,Websites etc)
1. https://www.cyberralegalservices.com/detail-casestudies.php.
2. https://www.futurelearn.com/courses/investigating-cybercrime-concepts

Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M
CO2 M M M M M M M M M M
CO3 S M M M M M M M M M
CO4 S S S M M M M M M M
CO5 S S S M M M M M M M
*S-Strong;M-Medium;L-Low

Page 48 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
Course Code SCAA
L
DATED: 18.05.2023
T P C
RELATIONAL DATABASE
MANAGEMENT SYSTEM
Core/Elective/Supportive Core:9 6 0 0 4
Pre- requisite None Syllabus 2023-24
version Onwards
Course Objectives
1. The course describes the data, organizing the data in database, database administration.
2. To grasp the different issues involved in the design of a database system.
3. To study the physical and logical database designs and database modeling like relational,
Hierarchical, network models, database security, integrity and normalization.
4. It also gives introduction to SQL language to retrieve the data from the database with
suitable application development.
5. Provide strong foundation of database concepts and to introduce students to application development in
DBMS
Course Outcomes
1 Understand the basic concepts of Relational Data Model, EntityRelationship Model and K2
process of Normalization
2 Understand and construct database using Structured Query Language (SQL) in Oracle9i K1-K3
environment.
3 Learn basics of PL/SQL and develop programs using Cursors, Exceptions, Procedures and K2
Functions.
4 Understand and use built-in functions and enhance the knowledge of handling multiple tables K1-K3
5 Attain a good practical skill of managing and retrieving of data using Data Manipulation K2-K4
Language (DML)
K1–Remember K2 –Understand K3–ApplyK4-Analyze K5– Evaluate K6-Create

Unit I DATABASE CONCEPTS 15


Database Concepts: A Relational approach: Database – Relationships – DBMS – Relational Data Model
– Integrity Rules – Theoretical Relational Languages. Database Design: Data Modeling and Normalization:
Data Modeling – Dependency – Database Design – Normal forms – Dependency Diagrams – De -
normalization.
Unit II ORACLE 9i 20
Oracle9i: Overview: Personal Databases – Client/Server Databases – Oracle9i an introduction –
SQL *Plus Environment – SQL – Logging into SQL *Plus - SQL *Plus Commands – Errors &
Help – Alternate Text Editors - SQL *Plus Worksheet - iSQL *Plus. Oracle Tables: DDL:
Naming Rules and conventions – Data Types – Constraints – Creating Oracle Table – Displaying
Table Information – Altering an Existing Table – Dropping, Renaming, Truncating Table – Table
Types – Spooling – Error codes
Unit III WORKING WITH TABLE 20
Working with Table: Data Management and Retrieval: DML – adding a new Row/Record – Customized
Prompts – Updating and Deleting an Existing Rows/Records – retrieving Data from Table – Arithmetic
Operations – restricting Data with WHERE clause – Sorting – Revisiting Substitution Variables – DEFINE
command – CASE structure. Functions and Grouping: Built-in functions –Grouping Data. Multiple Tables:
Joins and Set operations: Join – Set operations.
Unit IV PL/SQL 20
PL/SQL: A Programming Language: History – Fundamentals – Block Structure – Comments
– Data Types – Other Data Types – Declaration – Assignment operation – Bind variables –
Substitution Variables – Printing – Arithmetic Operators. Control Structures and Embedded SQL:
Control Structures – Nested Blocks – SQ L in PL/SQL – Data Manipulation – Transaction Control
statements. PL/SQL Cursors and Exceptions: Cursors – Implicit & Explicit Cursors and

Page 49 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Attributes – Cursor FOR loops – SELECT…FOR UPDATE – WHERE CURRENT OF clause –
Cursor with Parameters – Cursor Variables – Exceptions – Types of Exceptions

UnitV PL/SQL COMPOSITE DATA TYPES 12


PL/SQL Composite Data Types: Records – Tables – arrays. Named Blocks: Procedures –
Functions – Packages –Triggers –Data Dictionary Views
UnitVI Contemporary Issues 3
Expert lectures, online seminars - webinars

Total Lecture Hours 90 Hours

Text books

1 Database Systems using Oracle, Nilesh Shah, 2nd edition, PHI

2 E-Book : Diana Lorentz, “Oracle® Database SQL Reference”, ORACLE, Dec, 2005.

3 E-Book : Bill Pribyl, Steven Feuerstein, “Oracle PL/SQL Programming”, O'Reilly Media,
Inc.,6th Edition, February 2014.
Reference books

1 Database Management Systems, Majumdar & Bhattacharya, 2007, TMH

2 Database Management Systems, Gerald V. Post, 3rd edition, TMH

Related Online Contents [MOOC, SWAYAM, NPTEL,Websites etc.]


1 http://www.digimat.in/nptel/courses/video/106105175/L01.html

2 https://www.tutorialspoint.com/oracle_sql/index.htm

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 M M M M M M M M M M

CO2 M M M M M L M M M M
CO3 S M M M M M L M M L

CO4 S S M M M M M L M M
CO5 S S S M M M M M M M

*S-Strong;M-Medium;L-Low

Page 50 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code Relational Database Management L T P C
System LAB
Core/elective/Supportive Core Lab :6 0 0 6 2
Pre- requisite None Syllabus 2023-24
version Onwards
Course Objectives
The main objectives of this course are :
1. To understand and use data definition language to write query for a database.
2. To understand and use data manipulation language to query, update, and manage a
database
3. To learn the concept of sorting and group functions and to implement different types of joins.
4. To learn the PL/SQL development tool in oracle database
Course Outcomes
On the successful completion of the course, student will be able to
1 Understand the concepts of Data Definition Language(DDL). K2
2 Attain a good practical skill of managing and retrieving of data using Data K3,K4
Manipulation Language (DML)
3 Understand and use built-in functions and enhance the knowledge of handling K3
multiple tables
4 Create PL/ SQL programs using Cursors, Exceptions, Procedures, Functions and K6
Packages.
K1–Remember K2 –Understand K3–Apply K4-Analyze K5–Evaluate K6-Create

List of Programs
1. Create a table for Student details with Student Register Number as primary key and following
fields: Name, Class, Gender, Age, Date of Admission and Course. Implement DDL commands
to Displaying Table Information, Altering an Existing Table, Dropping, Renaming and
Truncating Table.
2. Create Customer_Details with the following fields(CustomerNO, Name, Address, City, State,
Balance, Interest)
( a ) Insert five records
( b ) Find the names of clients whose Balance > 5000 .
( c ) Update the Balance of CustomerNO “ C123” to Rs. 5100
( d ) Update the Interest column whose balance >= 10000 at interest rate @ 10 %. And balance
<10000 at interest rate @ 5%
( e ) Display the balance heading as “BALANCE AMOUNT”
( f ) Delete interest amount of specific customer.
3. Create table for Mark list with student regno, name, mark1, mark2, mark3 , Total, average and
perform various queries using Arithmetic, Comparison and logical operators.
4. Write SQL queries using built in functions.
5. Create an EMPLOYEE with following fields (Employee_Id, First_Name, Last_Name, Email,
Phone_Number, Hire_Date, Job_Id, Salary, Commission_Pct, Manager_Id, Department_Id)
and implement the concept of sorting and grouping.
6. Create tables sailors with fields sid, sname, rating, age and Boats with fields bid, bname, color and
Reserves with fields sid, bid, date. Implement different types of joins and set operations.
7. Write a PL/SQL to update the rate field by 20% more than the current rate in inventory table
which has the following fields: Prono, ProName and Rate. After updating the table a new field

Page 51 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
(Alter) called for Number of item and place for values for the new field without using PL/SQL
block.
8. Write a PL/SQL program to implement the concept of Triggers
9. Write a PL/SQL program to implement the concept “Procedures”.
10. Write a PL/SQL program to implement the concept “Packages”.
Total Lecture Hours 90 Hours
TextBook(s)
1 Database Systems using Oracle, Nilesh Shah, 2nd edition, PHI
2 E-Book : Diana Lorentz, “Oracle® Database SQL Reference”, ORACLE, Dec, 2005.
3 E-Book : Bill Pribyl, Steven Feuerstein, “Oracle PL/SQL Programming”, O'Reilly Media, Inc.,6th
Edition, February 2014.
Reference Book(s)
1 Database Management Systems, Majumdar & Bhattacharya, 2007, TMH
2 Database Management Systems, Gerald V. Post, 3rd edition, TMH
Related Online Contents (MOOC,SWAYAM,NPTEL,Websitesetc)

Course Designed By :Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M L M M M M M M M
CO2 S M M M M M L M M M
CO3 S M M M M L M M M M
CO4 S S S M M M M M M M
*S-Strong;M-Medium;L-Low

Page 52 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code ETHICAL HACKING L T P C
Core/Elective/Supportive Elective I 6 0 0 4
Pre- requisite Syllabus 2023-24
version Onwards
Course Objectives
1. To understand the theory and practices of finding the vulnerabilities
2. To understand the different attacks and then defining the appropriate security policy
3. To understand the action to detect or prevent the attacks and thus reduce the damages
Course Outcomes
1 To Describe and understand the basics of the ethical hacking. K2
2 Able to perform the foot printing and scanning. K1
3 Characterize the malware and their attacks and detect and prevent them K3
4 To Understand the concepts of web server hacking and attacks K4
5 Able to analyze Intrusion Detection Systems and physical security K4
K1–Remember K2 –Understand K3– Apply K4 –Analyze K5–Evaluate K6 -Create

Unit I INTRODUCTION TO ETHICAL HACKING 15


Security Fundamental - Security Testing - Hacker and Cracker – Descriptions - Test Plans- keeping
it legal - Ethical and Legality-Technical Foundations of Hacking: The Attacker’s Process - The Ethical
Hacker’s Process- Security and the Stack.
Unit II FOOTPRINTING AND SCANNING 17
AI Governance by Human-right centered design, Normative models, Role of professional
norms, Teaching Machines to be Moral.
Unit III MALWARE THREATS AND SESSION 20
HIJACKING
Viruses and Worms- Trojans - Covert Communication - Keystroke Logging and Spyware –
Malware Counter Measures- Sniffers - Session Hijacking - Denial of Service - Distributed Denial of
Service.
Unit IV WEB SERVER HACKING AND ATTACKS 20
Web Server Hacking - Web Application Hacking - Database Hacking - Wireless Technologies –
Mobile Security and Attacks: Wireless Technologies - Mobile Device Operation and Security –
Wireless LANs.
Unit V CASE STUDY 15
Intrusion Detection Systems - Firewalls - Honeypots - Physical Security - Social Engineering – Case
Studies: Intrusion detection Real Secure Tripwire Dragon Snort ,Packet sniffing Leave the sniffer
running, Passwords in procedures & documents.
Unit VI Contemporary Issues 3
Webinar/Seminar/Guest Lectures
Total Lecture Hours 90
Hours

Page 53 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

TextBook(s)
1. Michael Gregg,”Certified Ethical Hacker”, Version 10, Third Edition, Pearson IT
Certification, 2019.

Reference Book(s)
1. Roger Grimes ,”Hacking the Hacker” , 1st Edition, Wiley, 2017.
2. Ankit Fadia, “The Unofficial Guide to Ethical Hacking”, Laxmi Publications, 2nd Edition,
2006.
Related Online Contents(MOOC, SWAYAM, NPTEL,Websites etc)
1 https://onlinecourses.nptel.ac.in/noc22_cs13/preview
2 https://www.simplilearn.com/learn-ethical-hacking-online-free-course-skillup
Course Designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M S M S M M
CO2 S S M M M S M S M M
CO3 S M M M M S M S M M
CO4 S S M M M S M S M M
CO5 S S M S M S M S M M
*S-Strong;M-Medium;L-Low

Page 54 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
Course Code SCAAL
DATED: 18.05.2023
T P C
DATA COMMUNICATION AND
NETWORKING
Core/Elective/Supportive Elective: I 6 0 0 4
Syllabus 2023-24
Pre- requisite None Onwards
version
Course Objectives
1. To familiarize the students with networking concepts.
2. To understand OSI reference model for networking protocols, TCP/IP
implementation, LANs/WANs, internetworking technologies, Routing and
Addressing.

Course Outcomes
1 Understand the concept of Computer networks and Data Transmission. K2
2 Understand different types of protocols used for transmission of data. K3
3 Understanding about routing and addressing. K3
4 Analyze media access control techniques and data flow. K4
5 Model the LAN configuration using different media. K5
K1–Remember K2 –Understand K3–ApplyK4-AnalyzeK5–EvaluateK6-Create

Unit I INTRODUCTION TO DATA 20


COMMUNICATION
Computer Network- Advantages and Disadvantages of Computer Network- Communication
system-Analog and digital data-Network as platform- The Elements of Network- Converged
network-The Architecture of Internet- Trends in Networking- Data Transmission- Analog
Transmission-Digital Transmission-Transmission impairment- Introduction to LANs, WANs
and Internetworks.
Unit II APPLICATION LAYER AND TRANSPORT 20
LAYER
Application Layer Functionality and Protocols- Introduction, making provision for
applications and services- Application layer protocols and services- OSI Transport Layer- The
TCP protocol – communicating with reliability, Managing TCP sessions-The UDP protocol
communicating with low overheads.
Unit III NETWORK LAYER AND ADDRESSING 20
OSI Network Layer- Introduction, Networks-dividing host into groups, Routing –How our data
packets are handled- Routing process- Congestion Control Algorithm-Addressing the Network -
IPv4,Introduction-Address for different purpose- Assigning address- Calculating address- testing the
Network layer, Subnetting.
Unit IV DATA LINK LAYER AND PHYSICAL LAYER 15
Introduction-Data Link Layer-Accessing the media -Media Access Control Techniques-
Media Access Control Addressing and Framing Data- Flow Control- Stop and Wait-Sliding
Window- Error Detection-Error Control-HDLC Physical Layer-Data Encoding-Digital data-
digital signals-Analog signals- Analog data- Synchronous and Asynchronous transfer-
Multiplexing- Frequency division multiplexing- Time division multiplexing Transmission-
Twisted pair-Coaxial cable- Optical Fibers- Wireless transmission- Microwaves- Radio waves-
Infrared
Unit V ETHERNET AND CASE STUDY 12
Overview of Ethernet, Ethernet Communication through the LAN- The Ethernet Frame-
Ethernet Media Access Control- Ethernet Physical Layer- Hubs and Switches-Address
Resolution Protocol(ARP)- Case Study on Planning and Cabling Networks - LANs-Making
the Physical connections- Device Selection Factors- Device Interconnecting.
Page 55 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
AA DATED: 18.05.2023

Page 56 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
UnitVI Contemporary Issues 3
Expert lectures/ Online seminars/Webinars
Total Lecture Hours 90 Hours

TextBook(s)
1. Behrouz Forouzan, “Data Communications and Networking”, Edition 5, Tata McGraw-
Hill.,
2012.
ReferenceBook(s)
1. Andrews S. Tanenbaum, David J Wetherall, “Computer Networks”, Edition 5, Pearson
Education, 2012.
2. William Stallings, “Data & Computer Communications”, PHI, Edition 6, 2012.
3. Jerry Fitzgerald, Alan Dennis, “Business Data Communications & Networking” , John Wiley
& Sons Inc, 2010.
Related Online Contents (MOOC, SWAYAM, NPTEL, Websitesetc)
1 https://archive.nptel.ac.in/courses/106/105/106105082/
2 https://www.tutorialspoint.com/data_communication_computer_network/index.htm
Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M L M M M M M M M M
CO2 M L M M M M M L M M
CO3 S M M M M M L M M M
CO4 S M M M M M M M M M
CO5 S S M S M M M M M M
*S-Strong; M-Medium; L-Low

Page 57 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
Course Code SCAAL
DATED: 18.05.2023
T P C
BIOMETRIC SECURITY
Core/Elective/Supportive Elective: I 6 0 0 4
Syllabus 2023-24
Pre- requisite None Onwards
version
Course Objectives
To provide students with understanding of biometrics, biometric equipment and standards
applied to security

Course Outcomes
1 Demonstrate knowledge of the basic physical and biological science and engineering K2
principles underlying biometric systems.
2 Understand the key biometric standards and process K2
3 Understand and analyze biometric systems at the component level K3
4 To be able to analyze and design basic biometric system applications. K2,
K4
5 K6
Design of biometric recognition for the organization and Identify the sociological and
acceptance issues associated with the design and implementation of biometric
systems.
K1–Remember K2 –Understand K3–Apply K4-Analyze K5–Evaluate K6-Create
Unit I INTRODUCTION TO BIOMETRICS 18
Biometrics– Introduction- benefits of biometrics over traditional authentication systems –benefits
of biometrics in identification systems–selecting a biometric for a system–Applications – Key
biometric terms and processes – biometric matching methods – Accuracy in biometric systems.
Unit II PHYSIOLOGICAL BIOMETRIC 20
TECHNOLOGIES
Fingerprints – Technical description –characteristics – Competing technologies – strengths
–weaknesses – deployment – Facial scan – Technical description – characteristics – weaknesses–
deployment – Iris scan – Technical description – characteristics – strengths – weaknesses –
deployment – Retina vascular pattern.
Unit III BEHAVIORAL BIOMETRIC TECHNOLOGIES 17
Technical description – characteristics – strengths – weaknesses –deployment – Hand scan – Technical
description–characteristics – strengths – weaknesses deployment – DNA biometrics. Behavioral
Biometric Technologies: Handprint Biometrics – DNA Biometrics

Unit IV FEATURE EXTRACTION 20


Signature and handwriting technology – Technical description –classification – keyboard /
keystroke dynamics – Voice – data acquisition – feature extraction – characteristics – strengths –
weaknesses– deployment.

Unit V MULTI BIOMETRICS & CASE STUDY 12


Multi biometrics and multi factor biometrics – two–factor authentication with passwords –
tickets and tokens – executive decision – implementation plan. Case study: Biometrics for
banking security – Biometric for Education – implementation of multi biometrics system.
Unit VI Contemporary Issues 3
Webinar/Seminar/Guest Lectures
Total Lecture Hours 90 Hours
TextBook(s)
1. Samir Nanavathi, Michel Thieme, and Raj Nanavathi: “Biometrics –Identity verification in
a network”, 1st Edition, Wiley Eastern, 2002
2. John Chirillo and Scott Blaul: “Implementing Biometric Security”, 1st Edition, Wiley

Page 58 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Eastern Publication, 2005.
3. John Berger: “Biometrics for Network Security”, 1st Edition, Prentice Hall, 2004.

ReferenceBook(s)
1. James wayman,Anil k.Jain,Arun A.Ross,Karthik Nandakumar, ―Introduction to
Biometrics, Springer, 2011.
2. Benjamin Muller, Security, Risk and the Biometric State: Governing Borders and Bodies,
1st Edition, Routledge, 2010.
3. Khalid saeed with Marcin Adamski, Tapalina Bhattasali, Mohammed K. Nammous, Piotr
panasiuk, mariusz Rybnik and soharab H.Sgaikh, ―New Directions in Behavioral Biometrics,
CRC Press 2017.
Related Online Contents (MOOC, SWAYAM, NPTEL, Websitesetc)
1 https://www.tutorialspoint.com/biometrics/index.htm
2 https://www.javatpoint.com/biometrics-tutorial
Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M
CO2 M M M M M M M M L M
CO3 S M M M M M L M M M
CO4 S M M M L M M M M M
CO5 S S S M M M M M M M
*S-Strong; M-Medium; L-Low

Page 59 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code PHP & MySQL L T P C
Core/Elective/Supportive Skill based subject 3 6 0 0 3
Pre- requisite None Syllabus 2023-24
version Onwards
Course Objectives
 This course gives an exposure to PHP and its applications.
 To understand PHP variables, functions, and operators in a PHP program.
 To utilize PHP in web forms to access form variables.
Expected Course Outcomes
1 Understand process of executing a PHP-based script on a webserver K2
2 Be able to develop a form containing several fields and be able to process the data K2
provided on the form by a user in a PHP-based script
3 Understand basic PHP syntax for variable use, and standard language constructs, K2
such as conditionals and loops.
4 Apply the syntax and functions available to deal with file processing for files K3
on the server as well as processing web URLs.
5 Understand the paradigm for dealing with form-based data, both from the syntax K4
of HTML forms, and how they are accessed inside a PHP-based script
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create

Unit I Introduction to PHP 15


Introduction – Basic features of PHP – Evolution of PHP – Printing – Command Line PHP – Creating
Variables – Constants.

Unit II Operators, & Looping 15


Types:- Math - Assignment - String – Bitwise – Execution – Comparison – Logical. Introduction to
Control Structures: if, if..Else, switch, Looping: For, While, do..While, foreach. Using Loops inPHP –
Introduction to Functions
Unit III String & Arrays & Creating functions 20
Strings: String functions – Formatting text strings – Handling arrays with loops – PHP Array functions –
Extracting data from arrays – Sorting arrays – Handling multi dimensional arrays- Splitting and merging
arrays. Creating functions : Creating functions – Passing functions – Passing arrays to functions – Passing
by reference – Default arguments – Returning arrays – Returning List – Accessing Local & Global data-
PHP Conditional functions – Variable functions – Nesting functions.
Unit IV Reading Data in Web Pages & Object Oriented 20
Programming
Reading Data in Web Pages: Handling Text fields – Text areas – Check boxes – Radio buttons – List
boxes – Password controls – Hidden controls – Image maps – File uploads – Object Oriented
Programming: Creating classes – Objects – Setting access to properties and methods – Constructor –
Destructor – Overriding – Overloading methods – Static methods – Abstract classes – Inheritance.
Unit V Working with Database & Session, Cookies and FTP 17
Working with Database: Database – Creating MsSQL Database – Putting data into the database – Access
the Database in PHP – Update – Delete – Create a new table and Database – Sorting the data – Session,
Cookies and FTP.
Unit VI Contemporary Issues 3

Page 60 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
90 Hours
Total Lecture Hours

Text Book(s)
1 Steven Holzner ― PHP : The Complete Reference.
2 Dave W.Mercer, Allan Kent, Steven D. Nowicki ,“Beginning PHP5”,Edition,
Wiley Publication,2004.
Reference Book(s)
1 Ashok Appu ,“PHP- A Beginner’s Guide”, Wiley Publication,2006

2 Programming PHP Rasmus Lerdorf and Levin Tatroe O’Reilly Publications,


2002
Related Online Contents (MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.swayam2.ac.in/aic20_sp32/preview

Course Designed by :

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M S M M M M M M M M
CO2 M S M M M M M M M M
CO3 S M M M M M L M M M
CO4 S M M M M M M M M M
CO5 S S M M M M M M L M

*S-Strong; M-Medium; L-Low

Page 61 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Sixth
Semester

Page 62 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Course Code CYBER SECURITY L T P C

Core/elective/Supportive Core :10 5 0 0 4


Pre- requisite Basic knowledge in Internet and Syllabus
2023-24
data crimes. Onwards
version
Course Objectives
 Students should be able to understand.
 The transformation between threat, risk, attack and vulnerability.
 How threats materialize into attacks.
 To find information about threats, vulnerabilities and attacks.
.
Course Outcomes
1 Understand the broad set of technical, social & Cyber Security K2
2 Understand the security design of operating system K3
3 Recognize & analyze the importance of Data mining & Big data concepts K1-K4
4 To improve the Problem-solving skills, Research, Innovation/creativity K5
K1–Remember K2 –Understand K3–Apply K4-Analyze K5–Evaluate K6-Create

Unit I INTRODUCTION TO CYBER SECURITY


17
Introduction -Computer Security - Threats -Harm - Vulnerabilities - Controls - Authenticat Access
Control and Cryptography - Web—User Side - Browser Attacks - Web Att Targeting Users - Obtaining
User or Website Data - Email Attacks
Unit II SECURITY IN OPERATING SYSTEM & 17
NETWORKS
Security in Operating Systems - Security in the Design of Operating Systems -Rootkit - Network
security attack- Threats to Network Communications - Wireless Network Security - Denial of
Service - Distributed Denial-of-Service.
Unit III DEFENCES: SECURITY 16
COUNTERMEASURES
Cryptography in Network Security - Firewalls - Intrusion Detection and Prevention Systems - Network
Management - Databases - Security Requirements of Databases - Reliability and Integrity - Database
Disclosure - Data Mining and Big Data.
Unit IV PRIVACY IN CYBERSPACE 17

Privacy Concepts -Privacy Principles and Policies -Authentication and Privacy - DataMining -
Privacy on the Web - Email Security - Privacy Impacts of Emerging Technologies- Where the Field Is
Headed.
Unit V MANAGEMENT AND INCIDENTS 20
Security Planning - Business Continuity Planning - Handling Incidents - Risk Analysis - Dealing
with Disaster - Emerging Technologies - The Internet of Things - Economics - Electronic Voting -
Cyber Warfare- Cyberspace and the Law - International Laws - Cyber
crime - Cyber Warfare and Home Land Security.
UnitVI Contemporary Issues 3
Webinar/Seminar/Guest Lecture
Total Lecture Hours 90 Hours
Reference Book(s)
1. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in

Page 63 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Computing, 5th Edition , Pearson Education , 2015
2. George K.Kostopoulous, Cyber Space and Cyber Security, CRC Press, 2013.
3. Martti Lehto, Pekka Neittaanmäki, Cyber Security: Analytics, Technology andAutomation
edited, Springer International Publishing Switzerland 2015
4. Nelson Phillips and Enfinger Steuart, ―Computer Forensics and Investigations‖,
Cengage Learning, New Delhi, 2009

Course Designed BY: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S S M M M M M
CO2 S S S S S M M L M M
CO3 S S S S S M M M M M
CO4 S S M L M M M M M M

*S-Strong; M-Medium; L-Low

Page 64 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code Project Work Lab L T P C
Core/Elective/Supportive Core - 11 0 0 4 4
Pre - requisite Students should have the strong knowledge in
Syllabus 2023-24
any one of the programming languages in Onwards
this course. version
Course Objectives
 To understand and select the task based on their core skills.
 To get the knowledge about analytical skill for solving the selected task.
 To get confidence for implementing the task and solving the real time problems.
 Express technical and behavioral ideas and thought in oral settings.
 Prepare and conduct oral presentations
Course Outcomes
On the successful completion of the course, student will be able to:
1 Formulate a real world problem and develop its requirements develop a design solution K3
for a set of requirements
2 Test and validate the conformance of the developed prototype against the original K5
requirements of the problem
3 Work as a responsible member and possibly a leader of a team in developing software K3
solutions
4 Express technical ideas, strategies and methodologies in written form. Self-learn new K1-
tools, algorithms and techniques that contribute to the software solution of the K4
project
5 Generate alternative solutions, compare them and select the optimum one K6
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create

Aim of the project work


1. The aim of the project work is to acquire practical knowledge on the implementation of
the programming concepts studied.
2. Each student should carry out individually one project work and it may be a work using the
software packages that they have learned or the implementation of concepts from the papers
studied or implementation of any innovative idea focusing on application oriented concepts.
3. The project work should be compulsorily done in the college only under the supervision of
the department staff concerned.
Viva Voce
1. Viva-Voce will be conducted at the end of the year by both Internal (Respective Guides) and
External Examiners, after duly verifying the Annexure Report available in the College, for a total
of 100 marks at the last day of the practical session.
2. Out of 100marks, 70 marks for project report and 30 marks for Viva Voce.

Page 65 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Project Work Format


PROJECT WORK

TITLE OF THE

DISSERTATION

Bonafide Work Done


by STUDENT NAME
REG. NO.

Dissertation submitted in partial fulfillment of the requirements for the award of


<Name of the Degree>
of Bharathiar University, Coimbatore-46.

College Logo

Signature of the Guide Signature of the HOD


Submitted for the Viva-Voce Examination held on

Internal Examiner External Examiner


Month – Year
CONTENTS
Acknowledgement
Contents
Synopsis
1. Introduction
1.1 Organization Profile
1.2 System Specification
1.2.1 Hardware Configuration
1.2.2 Software Specification
2. System Study
2.1 Existing System
2.1.1 Drawbacks
2.2 Proposed System
2.2.1 Features

Page 66 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

3. System Design and Development


3.1 File Design
3.2 Input Design
3.3 Output Design
3.4 Database Design
3.5 System Development
3.5.1 Description of Modules (Detailed explanation about the project work)
4. Testing and Implementation
5. Conclusion Bibliography Appendices
A. Data Flow Diagram
B. Table Structure
C. Sample Coding
D. Sample Input
E. Sample Output

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S M M M M M M
CO2 S S S S M M M M M M
CO3 S S S S M M M L M M
CO4 S S S S M M M M M M
CO5 S S S S M M M M L M
*S-Strong; M-Medium; L-Low

Page 67 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code CYBER SECURITY LAB L T P C
Core/elective/Supportive Core Lab :7 0 0 5 3
Pre- requisite None Syllabus 2023-24
version Onwards
Course Objectives
1. Understand the Programming Language.
2. To prepare data for data analysis through understanding its distribution.
3. Exposure on data processing using excel
4. To acquire knowledge in plotting using visualization tools.
5. To understand and implement classification and regression model.
Course Outcomes
1 Understand the basic concepts and techniques of cyber security. K2
2 Explain the regression methods,classification methods,clustering methods. K1
3 Apply the inference and learning algorithms for the hidden Mark of model. K3
4 Demonstrate Dimensionality re eduction Techniques K4
5 Appreciate the underlying mathematical relationship swith in and across cyber security K5
algorithms and the paradigms of supervised and un-supervised learning.
K1–Remember K2 –Understand K3–Apply K4-Analyze K5– Evaluate K6-Create
List of Programs
1. Perform encryption, decryption using the following substitution techniques i. Ceaser cipher
ii Vigenere cipher
2. Perform encryption and decryption using following transposition techniques i. Rail fence ii. Row
&amp; Column Transformation
3.Write a C program that contains a string (char pointer) with a value \Hello World’. The program should
AND or and XOR 2 each character in this string with 127 and display the result
4. Apply DES algorithm for practical applications.
5. Apply AES algorithm for practical applications.
6. Implement the Diffie-Hellman Key Exchange algorithm for a given problem.
7. Implement the SIGNATURE SCHEME - Digital Signature Standard.
8. Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other s/w.
9. Automated Attack and Penetration Tools Exploring N-Stalker, a Vulnerability Assessment Tool
10. Defeating Malware i. Building Trojans ii. Rootkit Hunter

Total Lecture Hours 30 Hours


Reference
Visual Studio Code: https://code.visualstudio.com/download
Snort - https://www.snort.org/downloads
N-Stalker - https://www.nstalker.com/products/editions/free/download/

Course Designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

Page 68 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M S S L M M M M
CO2 S S S M S M M M M M
CO3 S S S M S M M L M M
CO4 S S M M M L M M M M
CO4 S S M M L L M M M M
*S-Strong;M-Medium;L-Low

Page 69 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
Course Code SCAAL
DATED: 18.05.2023
T P C
ARTIFICIAL INTELLIGENCE &
MACHINE LEARNING
Core/Elective/Supportive ELECTIVE II 5 0 0 4
Pre – requisite None Syllabus 2023-24
version Onwards
Course Objectives
The main objectives of this course are to:
1. Enable the students to learn the basic functions of AI, Heuristic Search Techniques.
2. Provide knowledge on concepts of Representations and Mappings and Predicate Logic.
3. Introduce Machine Learning with respect Data Mining, Big Data and
Cloud. Study about Applications & Impact of ML..
Course Outcomes
1 Demonstrate AI problems and techniques K1,K2
2 Apply basic principles of AI in solutions that require problem solving,inference, K3
perception, knowledge representation, and learning
3 Understand machine learning concepts K2
4 Demonstrate agents that can reason under uncertainty Analyze the impact of machine K3
learning on applications
5 Analyze and design a real world problem for implementation and understandthe K4
dynamic behavior of a system
K1 – Remember K2 – Understand K3 – Apply K4- Analyze K5 – Evaluate K6- Create
Unit I INTRODUCTION 15
Introduction: AI Problems -Al techniques – The level of the model- Criteria for success.
Problems, Problem Spaces, Search: State space search - Production Systems - Problem
Characteristics - Issues in design of Search.
Unit II SEARCH TECHNIQUES 15
Heuristic Search techniques: Generate and Test - Hill Climbing- Best-First, Problem
Reduction, Constraint Satisfaction, Means-end analysis. Knowledge representation issues:
Representations and mappings -Approaches to Knowledge representations -Issues in Knowledge
representations - Frame Problem.
Unit III PREDICATE LOGIC 12
Representing knowledge using rules: Procedural Vs Declarative knowledge - Logic
programming - Forward Vs Backward reasoning - Matching - Control knowledge. Symbolic
reasoning under uncertainty: introduction non monotonic reasoning –logics for non monotonic
reasoning –implementation issues –Augmenting a problem solver- Implantation: Depth&
Breadth first Search . Planning
Unit IV MACHINE LEARNING 15
Understanding Machine Learning: What Is Machine Learning?-Defining Big Data-Big Data
in Context with Machine Learning- -Leveraging the Power of Machine Learning-The Roles of
Statistics and Data Mining with Machine Learning-Putting Machine Learning in Context-
Approaches to Machine Learning.
Unit V IMPACT & FUTURE OF MACHINE 15
LEARNING
Applying Machine learning: understanding machine learning techniques – Tying Machine
Learning Methods to Outcomes- Business needs- Looking Inside Machine Learning: The
Impact of Machine Learning on Applications - Data Preparation-The Machine Learning
Cycle. Executing a Pilot Project-Ten Predictions on the Future of Machine Learning

Page 70 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Unit VI Contemporary Issues 3
Wbinar/Seminar/Guest Lecture
Total Lecture Hours 75
Hours
Text Book(s)
1. Elaine Rich and Kevin Knight, Shivasahankar B Nair " Artificial Intelligence", Tata McGraw
Hill Publisherscompany Pvt Ltd, Third Edition, 2009
2. Machine Learning For Dummies®, IBM Limited Edition by Judith Hurwitz, Daniel
Kirsch
Reference Book(s)
1. Patrick H. Winston, "Artificial Intelligence", Third edition, Pearson Edition, 2006
2. George F Luger, "Artificial Intelligence",4th Edition, Pearson Education Publ,2002.
Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]
https://www.ibm.com/downloads/cas/GB8ZMQZ3
https://www.javatpoint.com/artificial-intelligence-tutorial
https://nptel.ac.in/courses/106/105/106105077/
Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam.

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 S S S S S M M M M M

CO2 S S S S S M M M M M

CO3 S S S S S M M M M M

CO4 S S M M M M M M M M

Page 71 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Course code CLOUD COMPUTING L T P C


Core/Elective/Supportive Core 5 4
Syllabus 2023-24
Pre-requisite Basics of Cloud & Its Applications Onwards
Course Objectives:
The main objectives of this course are to:
1. Gain knowledge on cloud computing, cloud services, architectures and applications.
2. Enable the students to learn the basics of cloud computing with real-time usage.

Expected Course Outcomes:


On the successful completion of the course, student will be able to:
1 Understand the concepts of Cloud and its services, pros and cons K1,K2
2 Collaborate Cloud for Event & Project Management and day to day applications K3
3 Collaborate on Corporation & Schedules and task management K2,K3
4 Analyze oncloud in – WordProcessing, SpreadSheets, Presentations Analyze K2,K4
cloud in social networks
5 Explore Web-Based Communication Tools, collaborating via blogs and wikis K5
K1-Remember; K2-Understand; K3-Apply;K4-Analyze;K5 -Evaluate; K6 -Create
Unit:I INTRODUCTION 15
Understanding Cloud Computing: An introduction to Cloud Computing, History, Working of Cloud
Computing, Companies in the Cloud, pros and cons, benefits. Developing Cloud services: Pros and
Cons of Cloud Service Development, Types of Cloud Service Development, Discovering Cloud
Services Development Services and Tools.

Unit:II CLOUDCOMPUTING FOR EVERY ONE 15


Cloud Computing for the Family: Centralizing email communications, Centralizing email
communications, collaborating on schedules, Grocery lists, To-Do lists, Budgets, contact lists projects
and sharing family photos. Cloud Computing for the Community: Communicating Across the
Community, Collaborating on Schedules, Collaborating on Group Projects and Events.

Unit:III CLOUDSERVICES 15
Cloud Computing for the Corporation: Collaborating on Reports, Marketing Materials, Expense
Reports, Budgets, Financial Statements, Presentations, Presenting on the Road Collaborating on
calendars. Schedules and task management: Exploring Online Calendar Applications, exploring on line
scheduling, planning and Task Management.

Unit:IV USING CLOUD SERVICES 15


Collaborating on event management: Understanding Event Management Applications, Exploring Event
Management Applications. Collaborating on word processing: Working of web-based word processing,
exploring web based word processors. Collaborating on spreadsheets: Working of web-based
spreadsheets, exploring web based spreadsheets. Collaborating on presentations: preparing presentation
online, Evaluating web-based presentation applications.
Unit:V CLOUD COMPUTING 13
Collaborating via Web-Based Communication Tools: Evaluating web mail services, Evaluating instant
messaging services, Evaluating web conference tools. Collaborating via Social Networks and
Groupware: Creating groups on social networks, Evaluating online groupware, collaborating via blogs
and wikis: Evaluating Blogs for collaboration, Evaluating Wikis for collaboration.
Unit:VI Contemporary Issues 2

Page 72 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Expert lectures, online seminars –webinars
Total Lecture hours 75 Hours
TextBooks
1 MichaelMiller,“Cloud Computing”,PearsonEducation,NewDelhi,2009.
ReferenceBooks
AnthonyT.Velte,“CloudComputing:APracticalApproach”,1stEdition,TataMcGrawHill Education
1 Private Limited, 2009.

RelatedOnlineContents[MOOC,SWAYAM,NPTEL,Websitesetc.]
1 https://nptel.ac.in/courses/106/105/106105167/
2 https://www.tutorialspoint.com/cloud_computing/index.html
3 https://www.javatpoint.com/cloud-computing-tutorial

Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 S S S S S M M M M M

CO2 S S S S S M M M M M

CO3 S S S S S M M M M M

CO4 S S M M M M M M M M

*S-Strong;M-Medium;L-Low

Page 73 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Course code BIG DATA ANALYTICS L T P C


Core/Elective/Supportive Elective II 5 4
Syllabus 2023-24
Pre-requisite Basics of Big data & its Applications Onwards
Version
Course Objectives:
The main objectives of this course are to:
1. Gain knowledge on Data Analytics, Data Science, architectures and applications.
2. Enable the students to learn the basics of Data Analytics with real time usage
3. How to store and share, in and from Hadoop?

Expected Course Outcomes:


On the successful completion of the course, student will be able to:
1 Understand the concepts of Data Analytics, Data Science K1,K2
2 Collaborate Hadoop ,Spark, Scala K3,K4
3 Analyze on Data Analytics K4,K5
K1-Remember; K2-Understand; K3-Apply;K4-Analyze;K5 -Evaluate;

Unit:I DATA EVOLUTION 12


Data Development -Timeline- ICT Advancements- A perspective-Data Growth- IT components-
business process-Landscape-Data to Data Science. Data Science- A Discipline-Data Analytics-Relation
: Data science, Analytics & Big data Analytics- Data Science Components-Data Science-Big Data
Technology- Data Science Ontology-Data Science User- Roles and Skills –Data science Use cases.

Unit:II BIG DATA ROAD MAP 12


Digital data –An imprint-Characteristics of big data –Data discovery-Traditional approach –Big data
Technology- Platform for discovery-Applications of Big Data. Hadoop: Why Hadoop- Hadoop
milestones- Hadoop architecture-Overview-Why HDFS- Archicture- Why Map Reduce –Applications-
real time- Hadoop Yarn- Beyond Map Reduce- YARN Infrastructure-Applications in Yarn

Unit:III HADOOP ECOSYSTEM 12


Components of HADOOP Ecosytem - Hadoop Installations-PIG Installation-HIVE Installations.
Spark and Scala: Why Spark-Spark Ecosystem-Apache Spark Usecase-Scala Programming-Scala
REPL-Scala vs Java

Unit:IV NOSQL DATABASE-HBase 12


Why NoSQL- Types of NOSQL database Advantage of NOSQL- SQL vs NOSQL- HBase- HBase
Architecture- HBase vs RDBMS.
Unit:V DATA ANALYTICS , Big data tools-a State 10
R Programming-Why R+ Hadoop- R Hadoop Architecture- R Big data Integration package-SAS-SAS
Program Components-SAS support for Hadoop-SAS Functions- KNIME –KNIME components-
KNIME Big data Analytics- Big data connector- Installation- Use cases.

Unit:VI Contemporary Issues 2

Page 74 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Expert lectures, online seminars –webinars
Total Lecture hours 60 hours

Text Books
1 “BIG DATA ANALYTICS “ A Practitioner’s Approach Dr. V.Bhuvaneswari & Dr. T. Devi

Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 S S S M S M M M M M

CO2 S S S M M M M M M M

CO3 S S M S S M M M M M

*S-Strong;M-Medium;L-Low

Page 75 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code INTERNET OF THINGS(IOT) L T P C
Core/Elective/Supportive Elective : III 5 0 0 4
Pre- requisite None Syllabus 2023-24
version Onwards
Course Objectives
 To explain about the definition and usage of Internet of things
 To explain the key components of IoT system
Expected Course Outcomes
1 Explain the definition and usage of the term ―Internet of Things‖in different contexts K2
2 Understand the key components that makeup an IoT system K2
3 Differentiate between the levels of the IoT stack and be familiar with the key K3
Technologies and protocols employed a teach layer of the stack
4 Apply the knowledge and skills acquired during the course to build and test a K3
complete, working IoT system involving prototyping, programming and data analysis
5 Discover where the IoT concept fits within the broader ICT industry and possible K4
Future trends
K1–Remember K2 –Understand K3–apply K4-Analyze K5–evaluate K6-Create

Unit : I INTRODUCTION TO INTERNET OF THINGS 15


Introduction - Definition & characteristics of IoT - physical design of IoT - logical design of IoT -
IoT enabling Technologies - IoT levels & Deployment templates.

Unit : II DOMAIN SPECIFIC IoTs 12


Domain specific IoTs : Home Automation- cities - Environment - Energy - retail - logistics - Agriculture
- Industry - Health and life style.

Unit : III IOT SYSTEM MANAGEMENT WITH 15


NETCONF-YANG
Need for IoT Systems Management –Simple Network Management Protocol(SNMP)-NETCONF-
YANG -IoT platforms design Methodology – Introduction-IoT Design Methodology-Case Study on
IoT System for Weather Monitoring-Motivation for Using Python- IoT Systems Logical Design using
Python-Introduction –Installing Python-Python Data Types & Data Structures-Control Flow.
Unit : IV IoT PHYSICAL DEVICES & ENDPOINTS 15
What is an IoT Device-Exemplary Device : Raspberry Pi-About the Board-Linux on Raspberry Pi-
Raspberry Pi interfaces-Programming Raspberry Pi with Python-Other IoT Devices.Case Studies
Illustrating IoT Design-Introduction-Home Automation-Cites-Environmnet-Agriculture-Productivity
Applications.
UNIT : V HADOOP 15
Data Analytics for IoT –Introduction-Apache Hadoop-Using Hadoop Map Reduce for Batch Data
Analysis-Apache Spark-Apache Storm-Using Apache Storm for Real-time Data Analysis-
NETCONF-YANG Case Studies.
Unit VI Contemporary Issues 3
Webinar/Seminar/Guest Lectures
Total Lecture Hours 75 Hours

Page 76 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
23
SCAA DATED: 18.05.20
TextBook(s)
1 VijayMadisetti and Arsh deep Bahga,―Internet of Things (A Hands-on-Approach)‖, 1st
Edition,VPT, 2014.
ReferenceBook(s)
1 Margolis, Michael. ―Arduino CooK book: Receipes to begin, Expand and Enhance Your
Projects‖.O‘ReillyMediaInc.2011.
2 Monk,Simon.Raspberry Pi Cook book:Software and hardware problems and Solutions.
O‘ReillyMedia,Inc.201 6.
Related Online Contents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.nptel.ac.in/noc19_cs65/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap52/preview
Course Designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M
CO2 M M M L M M M M M M
CO3 S M L M M M L M M M
CO4 S M M M S M M M M M
CO5 S S S M M M S M M M
*S-Strong;M-Medium;L-Low

Page 77 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code INTRUSION DETECTION AND L T P C
PREVENTION SYSTEMS
Core/Elective/Supportive Elective: III 5 0 0 4
Pre- requisite None Syllabus
2023-24
Onwards
version
Course Objectives
To prepare students to know regarding the common threats faced today and the necessity of intrusion
detection systems for securing the systems. To understand the essential concepts of intrusion detection and
prevention.

Expected Course Outcomes


1 Understand the physical location, the operational characteristics and the various K2
functions performed by the intrusion detection and prevention system.
2 Describe the detection approaches K2
3 Understand the taxonomy of the anomaly detections using fuzzy logic. K3
4 How to detect network attacks and troubleshoot network problems. K3
5 To understand the concepts of Prior strong experience in operating system and prior K5
hands-on experience.
K1–Remember K2 –Understand K3–apply K4-Analyze K5–evaluate K6-Create

Unit I INTRODUCTION 15
Understanding Intrusion Detection –Intrusion detection and prevention basics –IDS and IPS analysis
schemes, Attacks, Detection approaches –Misuse detection – anomaly detection –specification-based
detection – hybrid detection.
Unit II THEORETICAL FOUNDATIONS OF 15
DETECTION
Taxonomy of anomaly detection system –fuzzy logic –Bayes theory –Artificial Neural networks Support
vector machine –Evolutionary computation –Association rules –Clustering.
Unit III ARCHITECTURE AND IMPLEMENTATION 12
Centralized – Distributed –Cooperative Intrusion Detection -Tiered architecture

Unit IV JUSTIFYING INTRUSION DETECTION 12


Intrusion detection in security –Threat Briefing –Quantifying risk –Return on Investment (ROI).
Unit V CASE STUDY 18
Tool Selection and Acquisition Process - Bro Intrusion Detection – Prelude Intrusion Detection - Cisco
Security IDS -Snorts Intrusion Detection –NFR security Legal Issues And Organizations Standards:
Law Enforcement / Criminal Prosecutions –Standard of Due Care –Evidentiary Issues, Organizations
and Standardizations..
Unit VI Contemporary Issues 3
Webinar/Seminar/Guest Lectures

Page 78 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Total Lecture Hours 75 Hours
Text Book(s)
1 PeterMika, ―Social networks and the SemanticWeb‖, Springer, 2007.
2 BorkoFurht,―HandbookofSocialNetworkTechnologiesandApplications‖,Springer,2010.
Reference Book(s)
1. Ali A. Ghorbani, Wei Lu, “Network Intrusion Detection and Prevention: Concepts and
Techniques”, Springer, 2010.
2. Carl Enrolf, Eugene Schultz, Jim Mellander, “Intrusion detection and Prevention”, McGraw Hill, 2004.
3. Paul E. Proctor, “The Practical Intrusion Detection Handbook “, Prentice Hall, 2001.
4. Ankit Fadia and Mnu Zacharia, “Intrusion Alert”, Vikas Publishing house Pvt., Ltd, 2007. 5. Earl
Carter, Jonathan Hogue, “Intrusion Prevention Fundamentals”, Pearson Education, 2006.

Course designed By : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M M M M
CO2 M S M M S M M M M M
CO3 S S M M L M M M M M
CO4 S M M M M M M L M M
CO5 S M S M M M M M M M
*S-Strong;M-Medium;L-Low

Page 79 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Course code NETWORK SECURITY & L T P C


CRYPTOGRAPHY
Core/Elective/Supportive Elective :II 5 0 0 4
Syllabus 2023-24
Pre-requisite Basics of Computer Networks
Version Onwards
Course Objectives:
The main objectives of this course are to:
1. To enable the students to learn attacks on computers and how to handle the security issues.
2. To study about the digital certificate and public key infrastructure protocols.
3. To gain knowledge in firewalls in network securities.
Expected Course Outcomes:
On the successful completion of the course, student will be able to:
1 Understand the basics of attacks on computers and computer security and K2
cryptography encryption and decryption.
2 Understand cryptography algorithm types and modes: asymmetric and symmetric K2-K3
key algorithms.
Understand the concept of digital certificate and public key infrastructure
3 K3
and internet security protocols.
4 Understand the user authentication and keberos, cryptography in java, .NET and K4
operating system
5 K3-K4
Knowledge in firewalls in network security, VPN and case studies in cryptography
and security
K1-Remember; K2-Understand; K3-Apply;K4-Analyze;K5 -Evaluate; K6 -Create
Unit:I ATTACKS ON COMPUTERS AND COMPUTER SECURITY 15

Attacks on computers and computer security: Introduction –Need for security – Security approaches -
Principles of Security –Types of attacks. Cryptography Techniques: Basic terms- Plain text and Cipher
text –Substitution techniques – Transposition techniques – Encryption and decryption – Symmetric and
Asymmetric key cryptography.
Unit:II SYMMETRIC KEY ALGORITHMS AND AES 12

Symmetric Key Algorithms and AES : Introduction - Algorithm Types and modes – An overview of
Symmetric key Cryptography – Data Encryption Standard (DES) – Blowfish – Advanced Encryption
Standard (AES). Asymmetric Key Algorithms: Digital Signature and RSA: Introduction – Brief history of
Asymmetric Key cryptography – An Overview of Asymmetric Cryptography - The RSA algorithm –
Symmetric and Symmetric Cryptography together – Digital Signatures.
Unit:III PUBLIC KEY INFRASTRUCTURE (PKI) 15
Public Key Infrastructure (PKI): Introduction– Private key Management- the PKIX Model – Public key
Cryptography standards – XML, PKI and Security –Internet Security Protocols : Introduction – Basic
Concepts – Secure Socket Layer – (SSL) – Transport Layer Security(TLS) –3-D secure Protocol –
Electronic Money - Email Security.
Unit:IV USER AUTHENTICATION AND KERBEROS 15

User Authentication and Kerberos: Introduction – Authentication basics - Passwords – Authentication


Tokens– biometric authentication – Kerberos – Key distribution centre – Security Handshake Pitfalls.
Cryptography in JAVA,.NET, and Operating System: Introduction – Cryptographic Solution using JAVA –
Cryptographic Solutions using Microsoft .NET Framework – Cryptographic Toolkits – Security and
Operating Systems – Database Security.
Page 80 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
NETWORK SECURITY FIREWALLS AND 15
Unit:V VIRTUAL PRIVATE NETWORKS (VPN)
Network Security Firewalls and Virtual Private Networks (VPN) : Introduction – Brief introduction to
TCP/IP – Fire walls-Types of firewall-Firewall Configuration-Limitation of Firewall – IP security-IPSec
Overview-IPSec Key Management – Virtual Private networks (VPN) – Intrusion.

Unit:VI Contemporary Issues 3


Expert lectures, online seminars –webinars

Total Lecture hours 75hours

Text Books
1 Atul Kahate, Cryptograpy and Network Security, Edition, Tata McGraw-Hill
Publishing, 2003

Reference Books
Computer Networks, Andrew S. Tanenbaum, 4th edition, PHI.
1

Related Online Contents[MOOC, SWAYAM, NPTEL, Websites etc.]


1 https://nptel.ac.in/courses/106/105/106105167/
2 https://www.tutorialspoint.com/computer networks/index.htm
3 https://www.javatpoint.com/computer networks-tutorial

Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M M M M
CO2 M S M M S M M M M M
CO3 S S M M L M M M M M
CO4 S M M M M M M L M M
CO5 S M S M M M M M M M

Page 81 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

Course Code PHP &MySQL L T P C


Core/elective/Supportive Skill based subject 4: 0 0 4 2
Pre- requisite None Syllabus 2023-24
version Onwards
Course Objectives
1. Analyze the basic structure of a PHP web application and be able to install and maintain the
web server, compile, and run a simple web application.
2. To provide the necessary knowledge to design and develop dynamic, database-driven web
applications using PHP version 5.
3. Analyze PHP scripts and determine their behavior.
4. Demonstrates a working knowledge of Dynamic Web Site Design and Publishing.
5. Modern object oriented programming principles and practice.
Course Outcomes
1 List the major elements of the PHP & MySQL work and explain why PHP is good for web K2
development.
2 Offers a career differentiator, with enhanced credibility and marketability K1
3 Takes you beyond basic user's knowledge to the IT Pros who know how to create web sites K3
4 Personal Home Page (PHP) is the most prominent scripting language for web improvement. K4
5 PHP and MySQL are the most vital developers used in the website. K5

K1–Remember K2 –Understand K3–Apply K4-Analyze K5– Evaluate K6-Create


List of Programs

1. Write a Mathematical calculator program.


2. Write a PHP program to check whether given number is String palindrome or not.
3. Write a PHP program using function.
4. Write a PHP program to Array manipulation.
5. Write a PHP program to design personal information
6. Create a PHP page for login page with sql connection.
7. Write a PHP program to design Curriculum Vitae.
8. Create a web page for Travel agency.
9.Create a web page for software company websites.
10. Create a web page to advertise a product of the company using images and audio.

Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam

Related Online Contents(MOOC,SWAYAM,NPTEL,Websitesetc)

Page 82 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M M M M
CO2 M S M M S M M M M M
CO3 S S M M L M M M M M
CO4 S M M M M M M L M M
CO5 S M S M M M M M M M

Page 83 of 81

You might also like