BSC Comp Sci Cyb Sec 2023 24
BSC Comp Sci Cyb Sec 2023 24
Syllabus
AFFILIATED COLLEGES
BHARATHIAR UNIVERSITY
(A State University, Accredited with “A++” Grade by NAAC,
Ranked 21st among Indian Universities by MHRD-NIRF)
Coimbatore - 641 046, Tamil Nadu, India
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
The B.Sc Computer Science with Cyber Security program describe accomplishments that
graduates are expected to attain within five to seven years after graduation
PEO1 Graduates may additionally have basics in Mathematics, Programming, Networks Network
Security, Big Data, Internet Of Things, Cyber laws, Cyber Security basics and advancements
to resolve technical troubles.
PEO2 Graduates may want to have the capability to apply their know-how and talents acquired to
treatment the problems in actual worldwide community and cyber safety areas and to boom
viable and reliable structures to save you and shield structures from safety attack.
PEO3 Provide solutions making use of the knowledge gained in Artificial Intelligence& machine
learning, Cloud Computing, Big Data and Cyber Security.
Page 1 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
To develop basic understandings of IOT structures and develop familiarity with basic security
PSO3
attacks and its measures.
PSO4 To code and execute python programming with a higher level of expertise
Expose the students to learn the important of Cyber Security such as Cyber laws, Web designing,
PSO5 intrusion detection and biometric security so that they can opportunity to be a part of industry 5.0
applications irrespective of domains.
Page 2 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Develop knowledge in the field of cyber security courses necessary to qualify for the
PO1
degree.
Identify and address own educational needs in a changing world in ways sufficient to
PO2
maintain the competence and to allow them to contribute to the advancement of knowledge
Ability to critically analyze, categorizes, formulate and solve the problems that emerges in
PO4
the field of Cyber Security
Strengthen the critical thinking skills and develop professionalism with the state of art ICT
PO5
facilities.
Quality for higher education, government services, industry needs and start up units
PO6 through continuous practice of preparatory examinations.
.
PO7 Gain inter-disciplinary, multi-disciplinary competence as value additions
PO8 Evaluate the impact of cyber crimes and threats in a global and societal context
An ability to communicate effectively with diverse types of audience and also able to prepare
PO9
and present technical documents to different groups.
PO10 Apply ethical principles and commit to professional ethics and responsibilities.
Page 3 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Page 6 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
First
Semester
Page 7 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
3 Apply the concepts of Arrays, Strings in „C‟ for user defined problems. K3
Unit I Introduction to C 15
Overview of C - Introduction - Character set - C tokens - keyword & Identifiers - Constants -
Variables - Data types - Declaration of variables - Assigning values to variables - Arithmetic, Relational,
Logical, Assignment, Conditional, Bitwise, Special, Increment and Decrement operators - Arithmetic
Expressions -
Unit II Expression, Decision Making , Looping and Arrays 12
Evaluation of expression - precedence of arithmetic operators - operator precedence & associativity
- Mathematical functions - Reading & Writing a character - Formatted input and output.
Decision Making and Branching: Introduction – if, if….else, nesting of if …else statements- else if
ladder – The switch statement, The ?: Operator – The goto Statement. Decision Making and Looping:
Introduction- The while statement- the do statement – the for statement-jumps in loops.
Arrays: one, two & multi dimensional Array -Character Arrays and Strings: Declare and initializing
-Reading and Writing-Comparison of two Strings.
Unit III Functions 15
User-Defined Functions: Introduction – Need and Elements of User-Defined Functions- Definition-
Return Values and their types - Function Calls – Declarations – Category of Functions- Nesting of
Functions - Recursion – Passing Arrays and Strings to Functions - The Scope, Visibility and Lifetime of
Variables.
Unit IV C++ 15
Introduction to C++ - key concepts of Object-Oriented Programming –Advantages – Object Oriented
Languages – I/O in C++ - C++ Declarations. Functionsin C++ - inline functions – Function Overloading.
Classes and Objects: Declaring Objects – Defining Member Functions – Static Member variables
and functions – array of objects –friend functions – Overloading member functions –Constructor and
destructor with static members.
Unit V Overloading , Inheritance & Pointers 15
Operator Overloading: Overloading unary, binary operators – Overloading Friend functions – type
conversion – Inheritance: Types of Inheritance – Single, Multilevel, Multiple, Hierarchal, Hybrid, Multi
path inheritance – Virtual base Classes – Abstract Classes.
Pointers – Declaration – Pointer to Class, Object – Pointers to derived classes and Base classes – Arrays
Page 8 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
– Characteristics – array of classes.
Unit VI Contemporary Issues 3
Problem Solving through C & C++ Programming – Online Coding
Total Lecture Hours 75 Hours
Text Book(s)
1. E Balagurusamy: Computing Fundamentals & C Programming – Tata McGraw-Hill, Second Reprint
2008
2. Ashok N Kamthane, Object-Oriented Programming with Ansi and Turbo C++, Pearson
Education, 2003.
Reference Books
1. Ashok N Kamthane: Programming with ANSI and Turbo C, Pearson, 2002.
2. E. Balagurusamy, Object-Oriented Programming with C++, TMH, 1998
3. Maria Litvin& Gray Litvin, C++ for you, Vikas publication, 2002.
4. John R Hubbard, Programming with C, 2nd Edition, TMH publication, 2002
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)
1. https://www.tutorialspoint.com/cplusplus/index.html
http://www.tutorialspoint.com/cprogramming/index.html
2.
http://www.w3schools.in/c
3.
https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
4.
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M
CO2 M M M M M M L M M L
CO3 S M M M M L M M M M
CO4 S M M M M M M M M M
CO5 S M M M M M M M M L
Page 9 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
Course Code SCAA
L
DATED: 18.05.2023
T P C
Programming Lab- C and C++
Core/Elective/Supportive Core Lab : 1 - - 5 2
Basic knowledge of Procedure And Object Oriented
Programming concepts Syllabus 2023-24
Pre – requisite Basic knowledge in C AND C++ version Onwards
Programming
Course Objectives
To introduce he concepts of Object-Oriented Programming Paradigm and programming
constructs of C++
Course Outcomes
1 Understand the logic for a given problem and to find factorial
value & Fibonacci Series K2
1. Write C A Program to find the simple interest, inputs are amount, period in years and rate of interest.
2. Write a C program to find Factorial of given’ Numbers.
3. Write a C program to generate Fibonacci series.
4. Develop a C program to encrypt and decrypt a string
5. Write a C program to check whether a Number is a Palindrome.
6. Write a C program to merge two arrays to the third array.
7. Write C++ program to display address of each element of an array.
8. Write a C++ Program to create a class ARITHMETIC which consists of a FLOAT and an INTEGER
variable. Write member functions ADD (), SUB(), MUL(), DIV() to perform addition, subtraction,
multiplication, division respectively. Write a member function to get and display values.
9. Write a C++ Program to create a class SHAPE which consists of two virtual functions
10. Write a C++ Program to read an integer number and find the sum of all the digits until it reduces to a
single digit using constructors, destructors and inline member functions.
Total Lecture Hours 45
Hours
Text Book(s)
1. E Balagurusamy: Computing Fundamentals & C Programming – Tata McGraw-Hill, Second Reprint
2008
2. Ashok N Kamthane, Object-Oriented Programming with Ansi And Turbo C++, Pearson Education,
2003.
Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]
1. Introduction to Programming in C – NPTEL
2. Problem solving through Programming in C - SWAYAM
3. C for Everyone : Programming Fundamentals – Course
4. https://www.javatpoint.com/cpp-píogíams
5. https://www.w3schools.com/cpp/cpp_exeícises.asp
Course Designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
Page 10 of
81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M M M M
CO2 S S M M L M M M M M
CO3 S S M M M M M L M M
CO4 S S M M M M M M L M
Page 11 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code Computer Organization and Architecture L P C
Core/Elective/Supportive Core: 2 5 0 4
Pre - requisite 2023-24
To learn about Computer Fundamentals and Syllabus
version Onwards
its Architecture
Course Objectives
To understand
1. On successful completion of this subject the students should have :
- Knowledge on digital circuits
- Interfacing of various components
Course Outcomes
1 On the successful completion of the course, student will be able to: K3
Learn the basic structure of number system methods like binary, octal and hexadecimal and
understand the arithmetic and logical operations are performed by computers.
2 Define the functions to simplify the Boolean equations using logic gates. K1
3 Understand various data transfer techniques in digital computer and control unit K2
operation and Understand technical literature on computer systems.
4 Compare the functions of the memory organization & K4
Page 12 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Text Book(s)
1. Digital Electronics Circuits and Systems, V.K. PURI, TATA McGRAW-HILL Pub. Company
2. Computer System Architecture, M. MORRIS MANO, PHI.
Reference Books
1. ISRD group – Tata McGrawHill.
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)
1. https://www.javatpoint.com/computer-organization-and-architecture-tutorial
2. https://archive.nptel.ac.in/courses/106/105/106105163/
3. http://www.nitttrc.edu.in/nptel/courses/video/106106092/L01.ht
Coures designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S M M M S M M M
CO2 S S S M M M M M L M
CO3 S S S M S M M M S S
CO4 S S S M S S S L M M
C05 S S S M L L S M L S
Page 13 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code L T P C
Numerical Methods
Core/Elective/Supportive Core 5 - -- 4
Pre - requisite Knowledge In Higher Secondary Syllabus 2023-24
LevelMathematics version Onwards+
Course Objectives
To equip the learners with the powerful tool for numerical differentiation, numerical
integration ,difference equation, numerical solution to O.D.E.
Expected Course Outcomes:
On the successful completion of the course, student will be able to:
1 K1
Obtain numerical solutions of algebraic and transcendental equations.
2 Distinguish methods of Taylor series, Euler’s, Modified Euler’s and Runge Kutta K2
methods to find solutions of differential equations.
3 Apply the techniques for enormous application in the field of Science and some K3
fields of Engineering.
4 Compute the derivatives by using the appropriate technique. K4
5 Find the numerical solution of second order O.D.E by finite difference method. K4
K1 - Remember; K2 - Understand; K3 - Apply; K4 - Analyze; K5 - Evaluate; K6 - Create
2. https://www.britannica.com/science/difference-equation
Page 14 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M
CO2 M M M M M M M M M M
CO3 S M L M M M L M M M
CO4 S S M M L M M M M M
CO5 S S S M M M M M L M
Page 15 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Second
Semester
Page 16 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code Python Programming L T P C
Core/elective/Supportive Core : 3 5 0 0 4
Course Objectives
To introduce the concepts of the various programming constructs of Python programming
Expected Course Outcomes
1 Apply the various basic programming constructs like operators, expressions, decision K2
making statements and Looping statements
2 Summarize the concept of lists, tuples , functions and error handling K2
3 Apply the concept of Decision making statements, looping constructs , functions for K3
solving basic programs
4 Analyze the concepts of Lists, tuples and error handling mechanisms K4
5 Evaluate a program incorporating all the python language constructs K5
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create
UNIT I BASICS 15
Python - Variables - Executing Python from the Command Line - Editing Python Files -Python
Reserved Words - Basic Syntax-Comments - Standard Data Types – Relational Operators -Logical
Operators - Bit Wise Operators - Simple Input and Output.
UNIT II CONTROL STATEMENTS, LISTS, TUPLES 15
CONTROL STATEMENTS: Control Flow and Syntax - Indenting - if Statement - statements and
expressions- string operations- Boolean Expressions -while Loop - break and continue - for Loop.
LISTS: List-list slices - list methods - list loop–mutability–aliasing - cloning lists - list parameters.
TUPLES: Tuple assignment, tuple as return value -Sets–Dictionaries.
Page 17 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Matches – Grouping - Matching at Beginning or End - Match Objects – Substituting - Splitting a
String - Compiling Regular Expressions.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M
CO2 M M L M M M M M M M
CO3 S M L M M M M M L M
CO4 S S M M M M M M M M
CO5 S S S M M M M M M M
Page 18 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
PROGRAM 1 4
Display the given integer in reverse manner
PROGRAM 2 4
Find the square root of a number (Newton’s method)
PROGRAM 3 4
Display the multiplication table
PROGRAM 4 4
Find the sum of number digits in list
PROGRAM 5 4
Write a python program to find the largest three integers using if-else and conditional operator.
PROGRAM 6 6
Write a python program to make a simple calculator.
PROGRAM 7 6
Merge sort
PROGRAM 8 6
Write a python program for Linear Search and Binary Search.
PROGRAM 9 6
Multiply matrices
PROGRAM 10 6
Programs that take command line arguments (word count)
Page 19 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S M L M M M M M
CO2 S S S M M M M M L L
CO3 S S S M M M L M M M
CO4 M M S S M M M M M M
*S-Strong; M-Medium; L-Low
Page 20 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code Internet Basics L T P C
Core/Elective/Supportive Core Lab: 3 - 0 3 2
Pre-requisite Basic knowledge in Computers Syllabus 2023-24
Version Onwards
Course Objectives
1. Introduce the fundamentals of Internet and the Web functions.
2. Impart knowledge and essential skills necessary to use the internet and its various components.
3. Find, evaluate, and use online information resources.
4. Use Google Apps for education effectively.
PROGRAM - 1 3
Create an email account in Gmail. Using the account created compose a mail to invite other college
students for your college fest, enclose the invitation as attachment and send the mail to at least 10
recipients. Use CC and BCC options accordingly
PROGRAM - 2 3
Open your inbox in the Gmail account created, check the mail received from your peer from other
college inviting you for his college fest, and download the invitation. Reply to the mail with a thank
you note for the invite and forward the mail to other friends
PROGRAM - 3 3
Assume that you are studying in final year of your graduation and are eagerly looking for a job. Visit
any job portal and upload your resume.
PROGRAM - 4 3
Create a label and upload bulk contacts using import option in Google Contacts
PROGRAM - 5 3
Create one-page story in your mother tongue by using voice recognition facility of Google Docs
PROGRAM -6 3
Create your own Google classroom and invite all your friends through email id. Post study material in
Google classroom using Google drive. Create a separate folder for every subject and upload all unit
wise E-Content Materials.
PROGRAM -7 3
Create and share a folder in Google Drive using ‗share a link‘ option and set the permission to access
that folder by your friends only.
PROGRAM -8 3
Create a meet using Google Calendar and record the meet using Google Meet.
Page 21 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
PROGRAM -9 3
Create a registration form for your Department Seminar or Conference using Google Forms.
PROGRAM -10 3
Create a question paper with multiple choice types of questions for a subject of your choice, using
Google Forms.
Total Lecture Hours 30 Hours
Text Book(s)
1 Ian Lamont, Google Drive & Docs in 30 Minutes, 2nd Edition.
Reference Book(s)
1 Sherry Kinkoph Gunter, My Google Apps, 2014.
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M M M M M M M M M
CO2 S M M M M L M M M M
CO3 S S M M M M M M L M
*S-Strong; M-Medium; L-Low
Page 22 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code L T P C
Linear Algebra
Core/Elective/Supportive Allied :2 5 - -- 4
Pre - requisite Basic knowledge in Mathematics Syllabus 2023-24
version Onwards
Course Objectives
1. To introduce the computational techniques and algebraic skills essential for the study of systems of
linear equations, matrix algebra, and vector spaces
2. To introduce the concepts of neural networks and fuzzy systems
3. To explain the basic mathematical elements of the theory of fuzzy sets.
Course Outcomes
1 Explain the concept/theory in linear algebra, to develop dynamic and graphical views to K1
the related issues of the chosen topics as outlined in course content and to formally prove
theorems.
2 Recognize the basic applications of the chosen topics and their importance in the modern K2
science.
3 Develop simple mathematical models and apply basic linear algebra techniques learned K3
from the chosen topics to solve simple problems
4 Report and communicate effectively with others and present mathematical results in a K4
logical and coherent fashion
5 Analyze the applications of fuzzy logic and neural network for various applications. K5
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create
Unit I Matrix 15
Introduction-Determination-Inverse of a Matrix-Rank of a Matrix-Eigen Value Problem-
Transpose-Properties of Transpose- Solving Simultaneous linear equations by matrix method.
Unit II System of Simultaneous Linear Algebraic Equation 15
Gauss Elimination Method-Gauss Jordan Method-Simple Problems-Gauss Seidel Method-Simple
Problems.
Unit III Numerical Differentiation & Integration 15
Numerical Differentiation: Newton’s Forward Difference-Newton’s Backward Difference
Formula. Numerical Integration: Trapezoidal Rule-Simpson’s Rule.
Unit IV Graph Theory 15
Graph Theory: Basic Terminology-Paths, Cycle & Connectivity-Subgraphs and Types of Graphs-
Representation of Graphs in Computer Memory. Trees: Properties of Trees and Binary Trees-
Traversing Binary Trees and Computer Representation of General Trees
Unit V Fundamentals of Neural Networks 15
Basic concepts of neural networks – Human brain- Model of an Artificial neuron- Neural network
architecture: Single layer Feedforward network - Multilayer Feedforward network – Recurrent neural
network – Characteristics of neural networks – Learning Methods- Taxonomy of neural network
Architecture-History of neural network research
Total Lecture Hours 75 Hours
Text Book(s)
1. Navanitham, P.A., “Business Mathematics & Statistics”, Jai Publishers, Trichy (Unit I)
2. Venkataraman M. K., “Numerical Methods in Science & Engineering”, National Publishing
Company, Chennai. (Unit II & III)
3. Sharma J.K., “Discrete Mathematics”,Second Edition, MacMillan Publishers India Limited,
Chennai, 2005 (Unit IV)
Page 23 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
4. Rajasekaran S. and Vijayalakshmi Pai G.A., “Neural Networks, Fuzzy Logic, and Genetic
Algorithms : Synthesis And Applications” Prentice Hall of India (Unit V)
Reference Book(s)
1. Fuzzy logic & Neural Networks/ Chennakesava R. Alavala/ New Age International, 2008
2. Neural Networks for control, Millon W. T, Sutton R.S and Werbos P. J, MIT Press 1992
3. Fuzzy sets Fuzzy logic, Klir, G. J anfd Yuan B.B Prentice Hall oif India Pvt. Ltd.,, New Delhi
4. Introduction to Fuzzy control, Dirankov D. Hellendoorn H, Reinfrank M., Narosa Publications
House, New Delhi 1996
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M
CO2 M M M M M M M M M L
CO3 S M L M M L M M M M
CO4 S S M M M M M L M M
CO5 S S S M M M M M M M
Page 24 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Third
Semester
Page 25 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code Java Programming L T P C
Core/elective/Supportive Core : 4 4 0 - 4
Pre - requisite Basic knowledge of Syllabus 2023-24
ProgrammingConstructs. version Onwards
Knowledge on Object
OrientedProgramming Concepts.
Course Objectives
To introduce the concepts of Object Oriented Programming Paradigm and the
programming constructs of JAVA
Expected Course Outcomes
1 Recite the history of JAVA and its evolution K1
2 Explain the various programming language constructs, object oriented concepts like K2
overloading, inheritance, polymorphism, Interfaces , threads, exception handling
andpackages
3 Illustrate the concepts of Applets, files and the concept of stream classes. K3
4 Outline the benefits and applications of objects oriented programming concepts and K3
defend how JAVA differs from other programming languages
5 Judge the pros and cons of other object oriented language with the concepts of JAVA K4
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create
UNIT I 12
Fundamentals of OOPS
Fundamentals of Object-Oriented Programming: Object-Oriented Paradigm – Basic Concepts of
Object-Oriented Programming – Benefits of Object-Oriented Programming – Application of Object-
Oriented Programming. Java Evolution: History – Features – How Java differs from C and C++ –
Java
and Internet – Java and www –Web Browsers. Overview of Java: simple Java program – Structure –
Java Tokens – Statements – Java Virtual Machine.
UNIT II 10
Variables & Control Structures
Constants, Variables, Data Types - Operators and Expressions – Decision Making and Branching: if,
if...else, nested if, switch? : Operator - Decision Making and Looping: while, do, for – Jumps in
Loops
- Labeled Loops – Classes, Objects and Methods.
UNIT III Arrays & Classes 12
Arrays, Strings and Vectors – Interfaces: Multiple Inheritance – Packages: Putting Classes together –
Multithreaded Programming.
UNIT IV Error Handling & Graphics 13
Managing Errors and Exceptions – Applet Programming – Graphics Programming.
UNIT V I/O Streams 13
Managing Input / Output Files in Java: Concepts of Streams- Stream Classes – Byte Stream classes –
Character stream classes – Using streams – I/O Classes – File Class – I/O exceptions – Creation of
files – Reading / Writing characters, Byte-Handling Primitive Data Types – Random Access Files.
Total Hours 60 Hours
Page 26 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Text Book(s)
1 PROGRAMMING WITH JAVA – A PRIMER - E. Balagurusamy, 3 rd Edition, TMH.
Reference Book(s)
1 Herbert Schildt, “The complete Reference – Java 2”, Fifth Edition, Tata McGraw Hill Publishing
Company, Delhi, 2002.
2 The Complete Reference Java 2 - Patrick Naughton & Hebert Schildt, 3rd Edition, TMH
3 Programming with Java – John R. Hubbard, 2nd Edition, TMH.
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)
1. https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2. https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M
CO2 M L M M M M M M M M
CO3 S M M M M L M M M M
CO4 S M M M M M M L M M
CO5 S S M M L M M M M M
Page 27 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code CYBER LAWS L T P C
Core/Elective/Supportive Core 5 4 - - 4
Pre - requisite None Syllabus 2023-24
version Onwards
Course Objectives
To explain about the various facets of cyber crimes
To enhance the understanding of problems arising out of online transactions and provoke them to find
solutions
Course Outcomes
1 Give Learners In Depth Knowledge Of Information Technology Act And Legal K3
Frame Work Of Right To Privacy, cyber conflict investigation ,Data Security And
Data Protection.
2 Make Learner Conversant With The Social And Intellectual K2
Property Issues Emerging From ‘Cyberspace.
3 Explore The Legal And Policy Developments In Various Countries To Regulate K6
Cyberspace
4 Develop The Understanding Of Relationship Between Commerce And Cyberspace; K2
K1 – Remember K2 – Understand K3 – Apply K4- Analyze K5 – Evaluate K6- Create
Unit I INTRODUCTION 10
Introduction to cyber space -UNCITRAL Model Law – Information Technology Act, 2000 with recent
amendments - Jurisdictional issues - Digital signatures – regulation of - certifying authorities - Cyber
Regulation Appellate Tribunal – Human Rights Issues.
Page 28 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Total Lecture Hours 60 Hours
Reference Book(s)
1. Karnika Seth, “ Computers, Internet and New Technology Laws” ,Cyber Lawyer and Expert and is The
Managing Partner of Seth Associates, Edition 2012.
2. S.K.Verma, Raman mittal , “Legal dimensions of cyber space” ,Indian Law Institute, New Delhi:
Indian Institute,2004.
3. Law Relating to Computers Internet & E-commerce – “A Guide to Cyber laws & the
Information Technology Act, Rules, Regulations and Notifications along with Latest Case Laws”,
2012.
4. Jeff Kosseff , “Cyber security Law”, Wiley Publications, 2017.
5. Ian. J. Lyod , “Information technology law” , Information Technology Act 2000, its amendment and
IT Rules, 2014.
6. Yee fen Lim , “Cyber space law commentaries and Materials”, second edition, Galexia Consulting Pty
Ltd, Australia
Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M M M M M M M M M
CO2 M M M M M M M M M M
CO3 S M M M M M M M M M
CO4 S M M M M M M M M M
*S-Strong; M-Medium; L-Low
Page 29 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code Java Programming- Lab L T P C
Core/Elective/Supportive Core Lab : 4 0 0 4 2
Pre - requisite Basic knowledge of Programming Syllabus 2023-24
Knowledge on Object Oriented version Onwards
Programming Concepts
Course Objectives
To introduce the concepts of Object Oriented Programming Paradigm and the
programming constructs of JAVA
Course Outcomes
1 Apply the various basic programming constructs of JAVA like decision making K3
statements. Looping statements, overloading, inheritance, polymorphism, constructors
and destructors
2 Illustrate the concepts of threading and multi-threading K4
3 Design programs using various file stream classes; file types, and frames K4
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create
PROGRAM - 1 4
Write a Java Applications to extract a portion of a character string and print the extracted string.
PROGRAM - 2 4
Write a Java Program to implement the concept of multiple inheritance using Interfaces.
PROGRAM - 3 4
Write a Java Program to create an Exception called payout-of-bounds and throw the exception
PROGRAM - 4 4
Write a Java Program to implement the concept of multithreading with the use of any threemultiplication
tables and assign three different priorities to them.
PROGRAM - 5 4
Write a Java Program to draw several shapes in the created windows
PROGRAM -6 5
Write a Java Program to demonstrate the Multiple Selection List-box.
PROGRAM -7 5
Write a Java Program to create a frame with three text fields for name, age and qualification and a text
field for multiple line for address
PROGRAM -8 5
Write a Java Program to create Menu Bars and pull-down menus.
PROGRAM -9 5
Write a Java Program to create frames which respond to the mouse clicks.
PROGRAM -10 5
Write a Java Program to draw circle, square, ellipse and rectangle at the mouse click positions.
Total Hours 45
Hours
Page 30 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Text Book(s)
1 Programming with Java – A Primer - E. Balagurusamy, 5th Edition, TMH.
Reference Book(s)
2 The Complete Reference Java 2 - Patrick Naughton& Hebert Schildt, 3rd Edition, TMH
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S M M M M M M M
CO2 S S S M M M M M M M
CO3 S S S M M M M S M M
Page 31 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
UNIT I INTRODUCTION 15
INTRODUCTION: Computer Infection Program- Life cycle of malware- Virus nomenclature- Worm
nomenclature- Tools used in computer virology.
UNIT II IMPLEMENTATION OF COVERT CHANNEL 15
IMPLEMENTATION OF COVERT CHANNEL: Non self-reproducing Malware- Working principle
of Trojan Horse- implementation of Remote access and file transfer- Working principle of Logical
Bomb: CaseStudy: Conflicker C worm.
Page 32 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Reference Book(s)
1 Monnappa KA by Learning Malware Analysis: Explore the concepts, tools, and techniques
to analyze and investigate Windows malware.
2 JesseyBullock ,Wireshark for Security Professionals: Using Wireshark and the
Metasploit Framework 1st Edition.
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)
1 https://onlinecourses.swayam2.ac.in/aic20 sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
Course Designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M L L L L L L L L
Page 33 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code WEB PROGRAMMING L T P C
Core/Elective/Supportive Skill based Subject : 1 3 0 0 2
Pre - requisite Basics of web pages, server Syllabus 2023-24
and browser version Onwards
Course Objectives
1. To understand the graphic design principles that relate to web design and learn how to implement
theories into practice.
2. To develop skills in analyzing the usability of a web site.
3. To develop how to plan and conduct user research related to web usability.
4. To learn the language of the web: HTML and CSS.
5. To develop skills in DHTML
Expected Course Outcomes On the successful completion of the course,
student will be able to:
1 Develop a web page using HTML simple tags. K2
2 Implement the various use of cascading style sheet K4
3 Analyze and write the functions using scripting language K4
4 Evaluate the website using event handling mechanism K5
5 Analyze the use of DHTML K4
K1 – Remember K2 – Understand K3 – Apply K4- Analyze K5 – Evaluate K6- Create
Page 34 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Text Book(s)
1. Thomas Powell(2017), HTML & CSS: The complete Reference, Fifth Edition McGraw Hill
Education
2. Laura Lemay, Jennifer Kymin(2016) Mastering HTML,CSS & JavaScript, Web
Reference Book(s)
Joshua Johaman, Richard Zea, Talha Khan(2016), Web Developers Reference Guide, Packet
Publishing.
Related Online Contents (MOOC, SWAYAM,NPTEL, Websites etc)
1 https://www.creativebloq.com/web‐design/free‐ebooks‐web‐designers‐5132836
2 https://www.coursera.org/specializations/web‐design
Course Designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M L M M M
CO2 S S M M M M M M M M
CO3 S S M M L M M M M M
CO4 S S M M M M M L M M
CO5 S S M M M M M M M M
Page 35 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Fourth
Semester
Page 36 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
DATED: 18.05.2023
Course Code SCAA L T P C
Linux and Shell Programming
Core/elective/Supportive Core : 6 4 0 0 4
Pre - requisite Basic knowledge about Operating Systems Syllabus 2023-24
Version Onwards
Course Objectives
To introduce the concepts of Linux operating system
To explain the various constructs associated with
Linux
Expected Course Outcomes
1 Illustrate the various directory and fie commands in LINUX K2
2 Apply the methods of securing files in Linux K3
3 Explain the various kernel components of Linux K2
4 Apply the various commands of Linux to perform several operations K3
5 Solve various network administrative issues by writing Linux shell scripts K4
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create
Page 37 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
Course Designed by : SCAA DATED: 18.05.2023
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L M M M M M M M M
CO2 M L M M M M M M M M
CO3 S M M M M M L M M M
CO4 S S M M L M M M M M
CO5 S S S M M M M L M M
Page 38 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Outcomes
1 Demonstrate the basics of Block chain concepts using modern tools/technologies. K1,K2
2 Analyze the role of block chain applications in different domains including cyber K4
security.
3 To interact with a block chain system by sending and reading transactions K3-K5
4 Analyze the application of specific block chain architecture for a given problem K4
K1 – Remember K2 – Understand K3 – Apply K4- Analyze K5 – Evaluate K6- Create
Page 39 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
1. Dr. Gavin Wood, “ETHEREUM: A Secure Decentralized Transaction Ledger”, Yellow paper, 2014.
2. Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli, “A survey of attacks on Ethereum
smart contracts”, 2016.
Related documents(MOOC,SWAYAM,Websites etc.,)
1. https://onlinecourses.nptel.ac.in/noc22_cs44/preview
2. https://onlinecourses.swayam2.ac.in/aic21_ge01/preview
Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S M S M S M M
CO2 S S S S S M M M M M
CO3 S M S S M M M M M M
CO4 S M S S S M M M M M
*S-Strong;M-Medium;L-Low
Page 40 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
EXERCISE 1 5
1. Write a Shell script that displays list of all the files in the current directory to which the
userhas read, write and execute permissions.
EXERCISE 2 5
1. Write an awk script to find the number of characters, words and lines in a file?
EXERCISE 3 5
Write a Shell script that accepts a filename, starting and ending line numbers as arguments
and displays all the lines between the given line numbers?
EXERCISE 4 4
Write a shell script to sort number in ascending order.
EXERCISE 5 5
Write a shell script (small calculator) that adds, subtracts, multiplies and divides the two
given numbers.
EXERCISE 6 4
Write a shell script to determine whether a given number is a prime number or not.
EXERCISE 7 4
Write a shell script to print the first n Fibonacci numbers.
EXERCISE 8 4
Write a shell script to find the GCD of two given numbers.
EXERCISE 9 4
Write a shell script to check whether given string is palindrome or not.
EXERCISE 10
5
Page 41 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Text Book(s)
1 Operating System LINUX, NIIT, PHI, 2006, Eastern Economy Edition.
Reference Book(S)
1 Richard Petersen, Linux: The Complete Reference, Sixth Edition, Tata McGraw-Hill
Publishing Company Limited, New Delhi, Edition 2008.
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M L M M M M M M M
CO2 S S M M M L M M M M
CO3 S S S M M M M L M M
Page 42 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Software Engineering
Course code L T P C
Core/Elective/
Supportive ALLIED :4 5 0 0 4
Gain knowledge on the Software Development Syllabus 2023-24
Pre-requisite Onwards
Life Cycle. Version
Course Objectives:
The main objectives of this course are to:
1. To enhance the basic software engineering methods and practices.
2. To learn the techniques for developing software systems.
3. Apply their foundations in software engineering to adapt to readily changing environments using the
appropriate theory, principles and processes.
Page 43 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Unit:6 Contemporary Issues 3 hours
Expert lectures, online seminars - webinars
Total Lecture hours 75 hours
Text Book(s)
1 Software Engineering Concepts – Richard Fairley, 1997, TMH.
2 Roger S. Pressman: Software Engineering, Tata McGraw Hill, V Edition.
3 Gopalaswamy Ramesh, Managing Global Software Projects, Tata McGraw Hill, New Delhi,
2002.
Reference Books
1 Software Engineering for Internet Applications – Eve Anderson, Philip Greenspun, Andrew Grumet, 2006, PHI
2 Fundamentals of Software Engineering – Rajib Mall, 2nd edition, PHI
3 Software Engineering – Stephen Schach, 7th edition, TMH.
Course Designed By:Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
Page 44 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
Course Code SCAA DATED: 18.05.2023
L T P C
Skill Based Lab : Web
Core/elective/Supportive 0 0 2 2
Programming
Pre- requisite Skill based subject 2 Syllabus 2023-24
version Onwards
Course Objectives
The main objectives of this course are :
1. This course gives training in web design and applications.
2. To give practical experience on web technology concepts.
3. To design interactive web sites with all the features given in Web programming.
Course Outcomes
On the successful completion of the course, student will be able to
1 Understand the concepts of HTML TAGS K2
2 Attain a good practical skill of managing and retrieving of List and Frames K1
3 Understand the knowledge of handling websites K3
4 Ability to create program using cookies. Ability to create Event handling in JavaScript. K4
K1 –Understand K2 -Analyze K3- Evaluate K4 - Apply
List of Programs
1. Use table tag to format web page. Also create the Time Table of your class using table tag.
2. Create your profile page i.e. educational details, Hobbies, Achievement, My Ideals etc
3. Create Style sheet to set formatting for text tags and embed that style sheet on web pages Created
for your site.
4. Design a web page and embed various multimedia features in the page
5. Write a script to create an array of 10 elements and display its contents
6. Design signup form to validate username, password, and phone numbers etc using Java script
7. Write a JavaScript program to determine whether a given year is a leap year in the Gregorian calendar
8. Create a website with the help of Installation of Word press and designing the word press site
9. Develop a HTML document to display a Registration Form for an inter-collegiate function
10. Develop a HTML document to design Alumni Registration form of your college
Total Lecture Hours 45
Hours
TextBook(s)
1 Internet and Web Design, ITL Education, Macmillan India Ltd
2 The World of Scripting Languages - David Barron
Reference Book(s)
1 World Wide Web Design with HTML, C. Xavier, 2007, TMH
Course Designed By: Mr. V. Suresh Kumar MCA., M.Phil.,
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M L S M M M M M S
CO2 S M M S M M M M M S
CO3 S M M S M M M M M S
CO4 S S S S M M M M M S
CO5 M M M M M M M M M M
Page 45 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Fifth
Semester
Page 46 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA
SC L DATED: 18.05.2023
Course Code T P C
CYBER CRIME
INVESTIGATION AND DIGITAL
FORENSICS
Core/elective/Supportive Core 8: 6 0 0 4
Pre-requisite None Syllabus 2023-24
version Onwards
Course Objectives
1. To understand the basic concepts of cybercrime and forensics,
2. To create the awareness through
simple practical tips and tricks.
3. To learn how to avoid becoming victims of cybercrimes.
4. To familiar with forensics tools and learn to analyze and validate forensics data.
Course Outcomes
1 Understand the types of cybercrime and fundamentals. K2
2 Describe the types of cybercrime offenses and attacks. K4
3 Explain computer forensics and use forensics tools. K3
4 Demonstrate the Digital Forensics. K5
5 To know the laws and discuss about existing case studies. K2
K1–Remember K2 –Understand K3–Apply K4-Analyze K5–Evaluate K6-Create
Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M
CO2 M M M M M M M M M M
CO3 S M M M M M M M M M
CO4 S S S M M M M M M M
CO5 S S S M M M M M M M
*S-Strong;M-Medium;L-Low
Page 48 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
Course Code SCAA
L
DATED: 18.05.2023
T P C
RELATIONAL DATABASE
MANAGEMENT SYSTEM
Core/Elective/Supportive Core:9 6 0 0 4
Pre- requisite None Syllabus 2023-24
version Onwards
Course Objectives
1. The course describes the data, organizing the data in database, database administration.
2. To grasp the different issues involved in the design of a database system.
3. To study the physical and logical database designs and database modeling like relational,
Hierarchical, network models, database security, integrity and normalization.
4. It also gives introduction to SQL language to retrieve the data from the database with
suitable application development.
5. Provide strong foundation of database concepts and to introduce students to application development in
DBMS
Course Outcomes
1 Understand the basic concepts of Relational Data Model, EntityRelationship Model and K2
process of Normalization
2 Understand and construct database using Structured Query Language (SQL) in Oracle9i K1-K3
environment.
3 Learn basics of PL/SQL and develop programs using Cursors, Exceptions, Procedures and K2
Functions.
4 Understand and use built-in functions and enhance the knowledge of handling multiple tables K1-K3
5 Attain a good practical skill of managing and retrieving of data using Data Manipulation K2-K4
Language (DML)
K1–Remember K2 –Understand K3–ApplyK4-Analyze K5– Evaluate K6-Create
Page 49 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Attributes – Cursor FOR loops – SELECT…FOR UPDATE – WHERE CURRENT OF clause –
Cursor with Parameters – Cursor Variables – Exceptions – Types of Exceptions
Text books
2 E-Book : Diana Lorentz, “Oracle® Database SQL Reference”, ORACLE, Dec, 2005.
3 E-Book : Bill Pribyl, Steven Feuerstein, “Oracle PL/SQL Programming”, O'Reilly Media,
Inc.,6th Edition, February 2014.
Reference books
2 https://www.tutorialspoint.com/oracle_sql/index.htm
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M
CO2 M M M M M L M M M M
CO3 S M M M M M L M M L
CO4 S S M M M M M L M M
CO5 S S S M M M M M M M
*S-Strong;M-Medium;L-Low
Page 50 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code Relational Database Management L T P C
System LAB
Core/elective/Supportive Core Lab :6 0 0 6 2
Pre- requisite None Syllabus 2023-24
version Onwards
Course Objectives
The main objectives of this course are :
1. To understand and use data definition language to write query for a database.
2. To understand and use data manipulation language to query, update, and manage a
database
3. To learn the concept of sorting and group functions and to implement different types of joins.
4. To learn the PL/SQL development tool in oracle database
Course Outcomes
On the successful completion of the course, student will be able to
1 Understand the concepts of Data Definition Language(DDL). K2
2 Attain a good practical skill of managing and retrieving of data using Data K3,K4
Manipulation Language (DML)
3 Understand and use built-in functions and enhance the knowledge of handling K3
multiple tables
4 Create PL/ SQL programs using Cursors, Exceptions, Procedures, Functions and K6
Packages.
K1–Remember K2 –Understand K3–Apply K4-Analyze K5–Evaluate K6-Create
List of Programs
1. Create a table for Student details with Student Register Number as primary key and following
fields: Name, Class, Gender, Age, Date of Admission and Course. Implement DDL commands
to Displaying Table Information, Altering an Existing Table, Dropping, Renaming and
Truncating Table.
2. Create Customer_Details with the following fields(CustomerNO, Name, Address, City, State,
Balance, Interest)
( a ) Insert five records
( b ) Find the names of clients whose Balance > 5000 .
( c ) Update the Balance of CustomerNO “ C123” to Rs. 5100
( d ) Update the Interest column whose balance >= 10000 at interest rate @ 10 %. And balance
<10000 at interest rate @ 5%
( e ) Display the balance heading as “BALANCE AMOUNT”
( f ) Delete interest amount of specific customer.
3. Create table for Mark list with student regno, name, mark1, mark2, mark3 , Total, average and
perform various queries using Arithmetic, Comparison and logical operators.
4. Write SQL queries using built in functions.
5. Create an EMPLOYEE with following fields (Employee_Id, First_Name, Last_Name, Email,
Phone_Number, Hire_Date, Job_Id, Salary, Commission_Pct, Manager_Id, Department_Id)
and implement the concept of sorting and grouping.
6. Create tables sailors with fields sid, sname, rating, age and Boats with fields bid, bname, color and
Reserves with fields sid, bid, date. Implement different types of joins and set operations.
7. Write a PL/SQL to update the rate field by 20% more than the current rate in inventory table
which has the following fields: Prono, ProName and Rate. After updating the table a new field
Page 51 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
(Alter) called for Number of item and place for values for the new field without using PL/SQL
block.
8. Write a PL/SQL program to implement the concept of Triggers
9. Write a PL/SQL program to implement the concept “Procedures”.
10. Write a PL/SQL program to implement the concept “Packages”.
Total Lecture Hours 90 Hours
TextBook(s)
1 Database Systems using Oracle, Nilesh Shah, 2nd edition, PHI
2 E-Book : Diana Lorentz, “Oracle® Database SQL Reference”, ORACLE, Dec, 2005.
3 E-Book : Bill Pribyl, Steven Feuerstein, “Oracle PL/SQL Programming”, O'Reilly Media, Inc.,6th
Edition, February 2014.
Reference Book(s)
1 Database Management Systems, Majumdar & Bhattacharya, 2007, TMH
2 Database Management Systems, Gerald V. Post, 3rd edition, TMH
Related Online Contents (MOOC,SWAYAM,NPTEL,Websitesetc)
Course Designed By :Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M L M M M M M M M
CO2 S M M M M M L M M M
CO3 S M M M M L M M M M
CO4 S S S M M M M M M M
*S-Strong;M-Medium;L-Low
Page 52 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code ETHICAL HACKING L T P C
Core/Elective/Supportive Elective I 6 0 0 4
Pre- requisite Syllabus 2023-24
version Onwards
Course Objectives
1. To understand the theory and practices of finding the vulnerabilities
2. To understand the different attacks and then defining the appropriate security policy
3. To understand the action to detect or prevent the attacks and thus reduce the damages
Course Outcomes
1 To Describe and understand the basics of the ethical hacking. K2
2 Able to perform the foot printing and scanning. K1
3 Characterize the malware and their attacks and detect and prevent them K3
4 To Understand the concepts of web server hacking and attacks K4
5 Able to analyze Intrusion Detection Systems and physical security K4
K1–Remember K2 –Understand K3– Apply K4 –Analyze K5–Evaluate K6 -Create
Page 53 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
TextBook(s)
1. Michael Gregg,”Certified Ethical Hacker”, Version 10, Third Edition, Pearson IT
Certification, 2019.
Reference Book(s)
1. Roger Grimes ,”Hacking the Hacker” , 1st Edition, Wiley, 2017.
2. Ankit Fadia, “The Unofficial Guide to Ethical Hacking”, Laxmi Publications, 2nd Edition,
2006.
Related Online Contents(MOOC, SWAYAM, NPTEL,Websites etc)
1 https://onlinecourses.nptel.ac.in/noc22_cs13/preview
2 https://www.simplilearn.com/learn-ethical-hacking-online-free-course-skillup
Course Designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M S M S M M
CO2 S S M M M S M S M M
CO3 S M M M M S M S M M
CO4 S S M M M S M S M M
CO5 S S M S M S M S M M
*S-Strong;M-Medium;L-Low
Page 54 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
Course Code SCAAL
DATED: 18.05.2023
T P C
DATA COMMUNICATION AND
NETWORKING
Core/Elective/Supportive Elective: I 6 0 0 4
Syllabus 2023-24
Pre- requisite None Onwards
version
Course Objectives
1. To familiarize the students with networking concepts.
2. To understand OSI reference model for networking protocols, TCP/IP
implementation, LANs/WANs, internetworking technologies, Routing and
Addressing.
Course Outcomes
1 Understand the concept of Computer networks and Data Transmission. K2
2 Understand different types of protocols used for transmission of data. K3
3 Understanding about routing and addressing. K3
4 Analyze media access control techniques and data flow. K4
5 Model the LAN configuration using different media. K5
K1–Remember K2 –Understand K3–ApplyK4-AnalyzeK5–EvaluateK6-Create
Page 56 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
UnitVI Contemporary Issues 3
Expert lectures/ Online seminars/Webinars
Total Lecture Hours 90 Hours
TextBook(s)
1. Behrouz Forouzan, “Data Communications and Networking”, Edition 5, Tata McGraw-
Hill.,
2012.
ReferenceBook(s)
1. Andrews S. Tanenbaum, David J Wetherall, “Computer Networks”, Edition 5, Pearson
Education, 2012.
2. William Stallings, “Data & Computer Communications”, PHI, Edition 6, 2012.
3. Jerry Fitzgerald, Alan Dennis, “Business Data Communications & Networking” , John Wiley
& Sons Inc, 2010.
Related Online Contents (MOOC, SWAYAM, NPTEL, Websitesetc)
1 https://archive.nptel.ac.in/courses/106/105/106105082/
2 https://www.tutorialspoint.com/data_communication_computer_network/index.htm
Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M L M M M M M M M M
CO2 M L M M M M M L M M
CO3 S M M M M M L M M M
CO4 S M M M M M M M M M
CO5 S S M S M M M M M M
*S-Strong; M-Medium; L-Low
Page 57 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
Course Code SCAAL
DATED: 18.05.2023
T P C
BIOMETRIC SECURITY
Core/Elective/Supportive Elective: I 6 0 0 4
Syllabus 2023-24
Pre- requisite None Onwards
version
Course Objectives
To provide students with understanding of biometrics, biometric equipment and standards
applied to security
Course Outcomes
1 Demonstrate knowledge of the basic physical and biological science and engineering K2
principles underlying biometric systems.
2 Understand the key biometric standards and process K2
3 Understand and analyze biometric systems at the component level K3
4 To be able to analyze and design basic biometric system applications. K2,
K4
5 K6
Design of biometric recognition for the organization and Identify the sociological and
acceptance issues associated with the design and implementation of biometric
systems.
K1–Remember K2 –Understand K3–Apply K4-Analyze K5–Evaluate K6-Create
Unit I INTRODUCTION TO BIOMETRICS 18
Biometrics– Introduction- benefits of biometrics over traditional authentication systems –benefits
of biometrics in identification systems–selecting a biometric for a system–Applications – Key
biometric terms and processes – biometric matching methods – Accuracy in biometric systems.
Unit II PHYSIOLOGICAL BIOMETRIC 20
TECHNOLOGIES
Fingerprints – Technical description –characteristics – Competing technologies – strengths
–weaknesses – deployment – Facial scan – Technical description – characteristics – weaknesses–
deployment – Iris scan – Technical description – characteristics – strengths – weaknesses –
deployment – Retina vascular pattern.
Unit III BEHAVIORAL BIOMETRIC TECHNOLOGIES 17
Technical description – characteristics – strengths – weaknesses –deployment – Hand scan – Technical
description–characteristics – strengths – weaknesses deployment – DNA biometrics. Behavioral
Biometric Technologies: Handprint Biometrics – DNA Biometrics
Page 58 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Eastern Publication, 2005.
3. John Berger: “Biometrics for Network Security”, 1st Edition, Prentice Hall, 2004.
ReferenceBook(s)
1. James wayman,Anil k.Jain,Arun A.Ross,Karthik Nandakumar, ―Introduction to
Biometrics, Springer, 2011.
2. Benjamin Muller, Security, Risk and the Biometric State: Governing Borders and Bodies,
1st Edition, Routledge, 2010.
3. Khalid saeed with Marcin Adamski, Tapalina Bhattasali, Mohammed K. Nammous, Piotr
panasiuk, mariusz Rybnik and soharab H.Sgaikh, ―New Directions in Behavioral Biometrics,
CRC Press 2017.
Related Online Contents (MOOC, SWAYAM, NPTEL, Websitesetc)
1 https://www.tutorialspoint.com/biometrics/index.htm
2 https://www.javatpoint.com/biometrics-tutorial
Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M
CO2 M M M M M M M M L M
CO3 S M M M M M L M M M
CO4 S M M M L M M M M M
CO5 S S S M M M M M M M
*S-Strong; M-Medium; L-Low
Page 59 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code PHP & MySQL L T P C
Core/Elective/Supportive Skill based subject 3 6 0 0 3
Pre- requisite None Syllabus 2023-24
version Onwards
Course Objectives
This course gives an exposure to PHP and its applications.
To understand PHP variables, functions, and operators in a PHP program.
To utilize PHP in web forms to access form variables.
Expected Course Outcomes
1 Understand process of executing a PHP-based script on a webserver K2
2 Be able to develop a form containing several fields and be able to process the data K2
provided on the form by a user in a PHP-based script
3 Understand basic PHP syntax for variable use, and standard language constructs, K2
such as conditionals and loops.
4 Apply the syntax and functions available to deal with file processing for files K3
on the server as well as processing web URLs.
5 Understand the paradigm for dealing with form-based data, both from the syntax K4
of HTML forms, and how they are accessed inside a PHP-based script
K1–Remember K2 –Understand K3–applyK4-AnalyzeK5–evaluateK6-Create
Page 60 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
90 Hours
Total Lecture Hours
Text Book(s)
1 Steven Holzner ― PHP : The Complete Reference.
2 Dave W.Mercer, Allan Kent, Steven D. Nowicki ,“Beginning PHP5”,Edition,
Wiley Publication,2004.
Reference Book(s)
1 Ashok Appu ,“PHP- A Beginner’s Guide”, Wiley Publication,2006
Course Designed by :
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M S M M M M M M M M
CO2 M S M M M M M M M M
CO3 S M M M M M L M M M
CO4 S M M M M M M M M M
CO5 S S M M M M M M L M
Page 61 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Sixth
Semester
Page 62 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Privacy Concepts -Privacy Principles and Policies -Authentication and Privacy - DataMining -
Privacy on the Web - Email Security - Privacy Impacts of Emerging Technologies- Where the Field Is
Headed.
Unit V MANAGEMENT AND INCIDENTS 20
Security Planning - Business Continuity Planning - Handling Incidents - Risk Analysis - Dealing
with Disaster - Emerging Technologies - The Internet of Things - Economics - Electronic Voting -
Cyber Warfare- Cyberspace and the Law - International Laws - Cyber
crime - Cyber Warfare and Home Land Security.
UnitVI Contemporary Issues 3
Webinar/Seminar/Guest Lecture
Total Lecture Hours 90 Hours
Reference Book(s)
1. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in
Page 63 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Computing, 5th Edition , Pearson Education , 2015
2. George K.Kostopoulous, Cyber Space and Cyber Security, CRC Press, 2013.
3. Martti Lehto, Pekka Neittaanmäki, Cyber Security: Analytics, Technology andAutomation
edited, Springer International Publishing Switzerland 2015
4. Nelson Phillips and Enfinger Steuart, ―Computer Forensics and Investigations‖,
Cengage Learning, New Delhi, 2009
Course Designed BY: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S S M M M M M
CO2 S S S S S M M L M M
CO3 S S S S S M M M M M
CO4 S S M L M M M M M M
Page 64 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code Project Work Lab L T P C
Core/Elective/Supportive Core - 11 0 0 4 4
Pre - requisite Students should have the strong knowledge in
Syllabus 2023-24
any one of the programming languages in Onwards
this course. version
Course Objectives
To understand and select the task based on their core skills.
To get the knowledge about analytical skill for solving the selected task.
To get confidence for implementing the task and solving the real time problems.
Express technical and behavioral ideas and thought in oral settings.
Prepare and conduct oral presentations
Course Outcomes
On the successful completion of the course, student will be able to:
1 Formulate a real world problem and develop its requirements develop a design solution K3
for a set of requirements
2 Test and validate the conformance of the developed prototype against the original K5
requirements of the problem
3 Work as a responsible member and possibly a leader of a team in developing software K3
solutions
4 Express technical ideas, strategies and methodologies in written form. Self-learn new K1-
tools, algorithms and techniques that contribute to the software solution of the K4
project
5 Generate alternative solutions, compare them and select the optimum one K6
K1 – Remember K2 – Understand K3 – apply K4- Analyze K5 – evaluate K6- Create
Page 65 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
TITLE OF THE
DISSERTATION
College Logo
Page 66 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S M M M M M M
CO2 S S S S M M M M M M
CO3 S S S S M M M L M M
CO4 S S S S M M M M M M
CO5 S S S S M M M M L M
*S-Strong; M-Medium; L-Low
Page 67 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code CYBER SECURITY LAB L T P C
Core/elective/Supportive Core Lab :7 0 0 5 3
Pre- requisite None Syllabus 2023-24
version Onwards
Course Objectives
1. Understand the Programming Language.
2. To prepare data for data analysis through understanding its distribution.
3. Exposure on data processing using excel
4. To acquire knowledge in plotting using visualization tools.
5. To understand and implement classification and regression model.
Course Outcomes
1 Understand the basic concepts and techniques of cyber security. K2
2 Explain the regression methods,classification methods,clustering methods. K1
3 Apply the inference and learning algorithms for the hidden Mark of model. K3
4 Demonstrate Dimensionality re eduction Techniques K4
5 Appreciate the underlying mathematical relationship swith in and across cyber security K5
algorithms and the paradigms of supervised and un-supervised learning.
K1–Remember K2 –Understand K3–Apply K4-Analyze K5– Evaluate K6-Create
List of Programs
1. Perform encryption, decryption using the following substitution techniques i. Ceaser cipher
ii Vigenere cipher
2. Perform encryption and decryption using following transposition techniques i. Rail fence ii. Row
& Column Transformation
3.Write a C program that contains a string (char pointer) with a value \Hello World’. The program should
AND or and XOR 2 each character in this string with 127 and display the result
4. Apply DES algorithm for practical applications.
5. Apply AES algorithm for practical applications.
6. Implement the Diffie-Hellman Key Exchange algorithm for a given problem.
7. Implement the SIGNATURE SCHEME - Digital Signature Standard.
8. Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other s/w.
9. Automated Attack and Penetration Tools Exploring N-Stalker, a Vulnerability Assessment Tool
10. Defeating Malware i. Building Trojans ii. Rootkit Hunter
Course Designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
Page 68 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M S S L M M M M
CO2 S S S M S M M M M M
CO3 S S S M S M M L M M
CO4 S S M M M L M M M M
CO4 S S M M L L M M M M
*S-Strong;M-Medium;L-Low
Page 69 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
Course Code SCAAL
DATED: 18.05.2023
T P C
ARTIFICIAL INTELLIGENCE &
MACHINE LEARNING
Core/Elective/Supportive ELECTIVE II 5 0 0 4
Pre – requisite None Syllabus 2023-24
version Onwards
Course Objectives
The main objectives of this course are to:
1. Enable the students to learn the basic functions of AI, Heuristic Search Techniques.
2. Provide knowledge on concepts of Representations and Mappings and Predicate Logic.
3. Introduce Machine Learning with respect Data Mining, Big Data and
Cloud. Study about Applications & Impact of ML..
Course Outcomes
1 Demonstrate AI problems and techniques K1,K2
2 Apply basic principles of AI in solutions that require problem solving,inference, K3
perception, knowledge representation, and learning
3 Understand machine learning concepts K2
4 Demonstrate agents that can reason under uncertainty Analyze the impact of machine K3
learning on applications
5 Analyze and design a real world problem for implementation and understandthe K4
dynamic behavior of a system
K1 – Remember K2 – Understand K3 – Apply K4- Analyze K5 – Evaluate K6- Create
Unit I INTRODUCTION 15
Introduction: AI Problems -Al techniques – The level of the model- Criteria for success.
Problems, Problem Spaces, Search: State space search - Production Systems - Problem
Characteristics - Issues in design of Search.
Unit II SEARCH TECHNIQUES 15
Heuristic Search techniques: Generate and Test - Hill Climbing- Best-First, Problem
Reduction, Constraint Satisfaction, Means-end analysis. Knowledge representation issues:
Representations and mappings -Approaches to Knowledge representations -Issues in Knowledge
representations - Frame Problem.
Unit III PREDICATE LOGIC 12
Representing knowledge using rules: Procedural Vs Declarative knowledge - Logic
programming - Forward Vs Backward reasoning - Matching - Control knowledge. Symbolic
reasoning under uncertainty: introduction non monotonic reasoning –logics for non monotonic
reasoning –implementation issues –Augmenting a problem solver- Implantation: Depth&
Breadth first Search . Planning
Unit IV MACHINE LEARNING 15
Understanding Machine Learning: What Is Machine Learning?-Defining Big Data-Big Data
in Context with Machine Learning- -Leveraging the Power of Machine Learning-The Roles of
Statistics and Data Mining with Machine Learning-Putting Machine Learning in Context-
Approaches to Machine Learning.
Unit V IMPACT & FUTURE OF MACHINE 15
LEARNING
Applying Machine learning: understanding machine learning techniques – Tying Machine
Learning Methods to Outcomes- Business needs- Looking Inside Machine Learning: The
Impact of Machine Learning on Applications - Data Preparation-The Machine Learning
Cycle. Executing a Pilot Project-Ten Predictions on the Future of Machine Learning
Page 70 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Unit VI Contemporary Issues 3
Wbinar/Seminar/Guest Lecture
Total Lecture Hours 75
Hours
Text Book(s)
1. Elaine Rich and Kevin Knight, Shivasahankar B Nair " Artificial Intelligence", Tata McGraw
Hill Publisherscompany Pvt Ltd, Third Edition, 2009
2. Machine Learning For Dummies®, IBM Limited Edition by Judith Hurwitz, Daniel
Kirsch
Reference Book(s)
1. Patrick H. Winston, "Artificial Intelligence", Third edition, Pearson Edition, 2006
2. George F Luger, "Artificial Intelligence",4th Edition, Pearson Education Publ,2002.
Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]
https://www.ibm.com/downloads/cas/GB8ZMQZ3
https://www.javatpoint.com/artificial-intelligence-tutorial
https://nptel.ac.in/courses/106/105/106105077/
Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S S M M M M M
CO2 S S S S S M M M M M
CO3 S S S S S M M M M M
CO4 S S M M M M M M M M
Page 71 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Unit:III CLOUDSERVICES 15
Cloud Computing for the Corporation: Collaborating on Reports, Marketing Materials, Expense
Reports, Budgets, Financial Statements, Presentations, Presenting on the Road Collaborating on
calendars. Schedules and task management: Exploring Online Calendar Applications, exploring on line
scheduling, planning and Task Management.
Page 72 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Expert lectures, online seminars –webinars
Total Lecture hours 75 Hours
TextBooks
1 MichaelMiller,“Cloud Computing”,PearsonEducation,NewDelhi,2009.
ReferenceBooks
AnthonyT.Velte,“CloudComputing:APracticalApproach”,1stEdition,TataMcGrawHill Education
1 Private Limited, 2009.
RelatedOnlineContents[MOOC,SWAYAM,NPTEL,Websitesetc.]
1 https://nptel.ac.in/courses/106/105/106105167/
2 https://www.tutorialspoint.com/cloud_computing/index.html
3 https://www.javatpoint.com/cloud-computing-tutorial
Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S S M M M M M
CO2 S S S S S M M M M M
CO3 S S S S S M M M M M
CO4 S S M M M M M M M M
*S-Strong;M-Medium;L-Low
Page 73 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Page 74 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Expert lectures, online seminars –webinars
Total Lecture hours 60 hours
Text Books
1 “BIG DATA ANALYTICS “ A Practitioner’s Approach Dr. V.Bhuvaneswari & Dr. T. Devi
Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S M S M M M M M
CO2 S S S M M M M M M M
CO3 S S M S S M M M M M
*S-Strong;M-Medium;L-Low
Page 75 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code INTERNET OF THINGS(IOT) L T P C
Core/Elective/Supportive Elective : III 5 0 0 4
Pre- requisite None Syllabus 2023-24
version Onwards
Course Objectives
To explain about the definition and usage of Internet of things
To explain the key components of IoT system
Expected Course Outcomes
1 Explain the definition and usage of the term ―Internet of Things‖in different contexts K2
2 Understand the key components that makeup an IoT system K2
3 Differentiate between the levels of the IoT stack and be familiar with the key K3
Technologies and protocols employed a teach layer of the stack
4 Apply the knowledge and skills acquired during the course to build and test a K3
complete, working IoT system involving prototyping, programming and data analysis
5 Discover where the IoT concept fits within the broader ICT industry and possible K4
Future trends
K1–Remember K2 –Understand K3–apply K4-Analyze K5–evaluate K6-Create
Page 76 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
23
SCAA DATED: 18.05.20
TextBook(s)
1 VijayMadisetti and Arsh deep Bahga,―Internet of Things (A Hands-on-Approach)‖, 1st
Edition,VPT, 2014.
ReferenceBook(s)
1 Margolis, Michael. ―Arduino CooK book: Receipes to begin, Expand and Enhance Your
Projects‖.O‘ReillyMediaInc.2011.
2 Monk,Simon.Raspberry Pi Cook book:Software and hardware problems and Solutions.
O‘ReillyMedia,Inc.201 6.
Related Online Contents(MOOC,SWAYAM,NPTEL,Websitesetc)
1 https://onlinecourses.nptel.ac.in/noc19_cs65/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap52/preview
Course Designed by : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer
Science, Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M M M M M M M M M M
CO2 M M M L M M M M M M
CO3 S M L M M M L M M M
CO4 S M M M S M M M M M
CO5 S S S M M M S M M M
*S-Strong;M-Medium;L-Low
Page 77 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Code INTRUSION DETECTION AND L T P C
PREVENTION SYSTEMS
Core/Elective/Supportive Elective: III 5 0 0 4
Pre- requisite None Syllabus
2023-24
Onwards
version
Course Objectives
To prepare students to know regarding the common threats faced today and the necessity of intrusion
detection systems for securing the systems. To understand the essential concepts of intrusion detection and
prevention.
Unit I INTRODUCTION 15
Understanding Intrusion Detection –Intrusion detection and prevention basics –IDS and IPS analysis
schemes, Attacks, Detection approaches –Misuse detection – anomaly detection –specification-based
detection – hybrid detection.
Unit II THEORETICAL FOUNDATIONS OF 15
DETECTION
Taxonomy of anomaly detection system –fuzzy logic –Bayes theory –Artificial Neural networks Support
vector machine –Evolutionary computation –Association rules –Clustering.
Unit III ARCHITECTURE AND IMPLEMENTATION 12
Centralized – Distributed –Cooperative Intrusion Detection -Tiered architecture
Page 78 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Total Lecture Hours 75 Hours
Text Book(s)
1 PeterMika, ―Social networks and the SemanticWeb‖, Springer, 2007.
2 BorkoFurht,―HandbookofSocialNetworkTechnologiesandApplications‖,Springer,2010.
Reference Book(s)
1. Ali A. Ghorbani, Wei Lu, “Network Intrusion Detection and Prevention: Concepts and
Techniques”, Springer, 2010.
2. Carl Enrolf, Eugene Schultz, Jim Mellander, “Intrusion detection and Prevention”, McGraw Hill, 2004.
3. Paul E. Proctor, “The Practical Intrusion Detection Handbook “, Prentice Hall, 2001.
4. Ankit Fadia and Mnu Zacharia, “Intrusion Alert”, Vikas Publishing house Pvt., Ltd, 2007. 5. Earl
Carter, Jonathan Hogue, “Intrusion Prevention Fundamentals”, Pearson Education, 2006.
Course designed By : Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M M M M
CO2 M S M M S M M M M M
CO3 S S M M L M M M M M
CO4 S M M M M M M L M M
CO5 S M S M M M M M M M
*S-Strong;M-Medium;L-Low
Page 79 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Attacks on computers and computer security: Introduction –Need for security – Security approaches -
Principles of Security –Types of attacks. Cryptography Techniques: Basic terms- Plain text and Cipher
text –Substitution techniques – Transposition techniques – Encryption and decryption – Symmetric and
Asymmetric key cryptography.
Unit:II SYMMETRIC KEY ALGORITHMS AND AES 12
Symmetric Key Algorithms and AES : Introduction - Algorithm Types and modes – An overview of
Symmetric key Cryptography – Data Encryption Standard (DES) – Blowfish – Advanced Encryption
Standard (AES). Asymmetric Key Algorithms: Digital Signature and RSA: Introduction – Brief history of
Asymmetric Key cryptography – An Overview of Asymmetric Cryptography - The RSA algorithm –
Symmetric and Symmetric Cryptography together – Digital Signatures.
Unit:III PUBLIC KEY INFRASTRUCTURE (PKI) 15
Public Key Infrastructure (PKI): Introduction– Private key Management- the PKIX Model – Public key
Cryptography standards – XML, PKI and Security –Internet Security Protocols : Introduction – Basic
Concepts – Secure Socket Layer – (SSL) – Transport Layer Security(TLS) –3-D secure Protocol –
Electronic Money - Email Security.
Unit:IV USER AUTHENTICATION AND KERBEROS 15
Text Books
1 Atul Kahate, Cryptograpy and Network Security, Edition, Tata McGraw-Hill
Publishing, 2003
Reference Books
Computer Networks, Andrew S. Tanenbaum, 4th edition, PHI.
1
Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M M M M
CO2 M S M M S M M M M M
CO3 S S M M L M M M M M
CO4 S M M M M M M L M M
CO5 S M S M M M M M M M
Page 81 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
Course Designed By: Mrs. M. SUBHA Head & Assistant Professor, Department of Computer Science,
Shree Venkateshwara Arts and Science (Co-Education) College, Gobichettipalayam
Page 82 of 81
B.Sc. Comp. Sci. with Cyber Security - w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33H(2)
SCAA DATED: 18.05.2023
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M M M M M M
CO2 M S M M S M M M M M
CO3 S S M M L M M M M M
CO4 S M M M M M M L M M
CO5 S M S M M M M M M M
Page 83 of 81