0% found this document useful (0 votes)
154 views10 pages

MScIT-Sem3 Syllabus

Uploaded by

6b7ocj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
154 views10 pages

MScIT-Sem3 Syllabus

Uploaded by

6b7ocj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Semester - III

Major NTITPMJ301 Course I - Applied Artificial Intelligence


Credits 04 No. of Hours 60 No. of Lectures Per week 4

Course Objective:
1. To relate the existing expert systems and introduce the concept of probability
2. To describe fuzzy logic operations and machine learning
3. To illustrate the soft computing and intelligent systems techniques
4. To explain about knowledge representation and phases of natural language processing
5. To observe the classification and clustering techniques
6. To build simple application
Unit Course Detail No. of Lectures
I Review of AI: History, foundation and Applications, Expert System 15
and Applications: Phases in Building Expert System, Expert System
Architecture, Expert System versus Traditional Systems, Rule based
Expert Systems, Blackboard Systems, Truth Maintenance System,
Application of Expert Systems, Shells and Tools
Probability Theory: joint probability, conditional probability, Bayes’s
theorem, probabilities in rules and facts of rule based system,
cumulative probabilities, rule based system and Bayesian method
II Fuzzy Sets and Fuzzy Logic: Fuzzy Sets, Fuzzy set operations, Types 15
of Membership Functions, Multivalued Logic, Fuzzy Logic, Linguistic
variables and Hedges, Fuzzy propositions, inference rules for fuzzy
propositions, fuzzy systems, possibility theory and other enhancement
to Logic
Machine Learning Paradigms: Machine Learning systems,
supervised and unsupervised learning, inductive learning, deductive
learning, clustering, support vector machines, cased based reasoning
and learning.
III Artificial Neural Networks: Artificial Neural Networks, Single-Layer 15
feedforward networks, multi-layer feedforward networks, radial basis
function networks, design issues of artificial neural networks and
recurrent networks
Evolutionary Computation: Soft computing, genetic algorithms,
genetic programming concepts, evolutionary programming, swarm
intelligence, ant colony paradigm, particle swarm optimization and
applications of evolutionary algorithms.
Intelligent Agents: Agents vs software programs, classification of
agents, working of an agent, single agent and multiagent systems,
performance evaluation, architecture, agent communication language,
applications
IV Advanced Knowledge Representation Techniques: Conceptual 15
dependency theory, script structures, CYC theory, script structure, CYC
theory, case grammars, semantic web
Natural Language Processing: Sentence Analysis phases, grammars
and parsers, types of parsers, semantic analysis, universal networking
language, dictionary

Course Outcome:
The learners will be able to
1. list the components of the expert system and the techniques in probability.
2. describe fuzzification, defuzzification and learning techniques
3. solve problems related to soft computing techniques
4. explain about knowledge representation and natural language processing
5. compare the various classification and clustering techniques
6. simulate a simple application
References:

1) Artificial Intelligence Saroj Kaushik Cengage 1st edition 2019


2) Artificial Intelligence: A Modern Approach by A. Russel, Peter Norvig 1st edition
3) Artificial Intelligence by Elaine Rich, Kevin Knight & Shivashankar B. Nair - Tata
McGrawhill 3rd edition
Major NTITPMJ3P1 INFORMATION TECHNOLOGY MAJOR PRACTICAL
Credits 02 No. of Hours 60 No. of Lectures Per week 4
Teacher Student Ratio 1 : 25
Course Objective:
1. To relate the existing expert systems and introduce the concept of probability
2. To describe fuzzy logic operations and machine learning
3. To illustrate the soft computing and intelligent systems techniques
4. To explain about knowledge representation and phases of natural language processing
5. To observe the classification and clustering techniques
6. To build simple application
Practical Practical Detail
No (Python)
1 Design an Expert system using AIML
E.g: An expert system for responding to patient queries for identifying the flu.
2 Design a bot using AIML.
3 Implement Bayes Theorem using Python
4 Implement Conditional Probability and joint probability using Python
5 Write a program to implement a Rule based system.
6 Design a Fuzzy based application using Python / R.
7 Write an application to simulate supervised and unsupervised learning models.
8 Write an application to implement a clustering algorithm.
9 Write an application to implement a support vector machine algorithm.
10 Simulate artificial neural network model with both feedforward and backpropagation
approach. [You can add some functionalities to enhance the model].
11 Simulate genetic algorithms with suitable examples using Python / R or any other
platform.
12 Design an Artificial Intelligence application to implement intelligent agents.
13 Design an application to simulate language parser.
14 Design an application to simulate semantic web.

Course Outcome:
The learners will be able to
1. list the components of the expert system and the techniques in probability.
2. describe fuzzification, defuzzification and learning techniques
3. solve problems related to soft computing techniques
4. explain about knowledge representation and natural language processing
5. compare the various classification and clustering techniques
6. simulate a simple application
References:
1) Beginning Blockchain A Beginner’s Guide to Building Blockchain Solutions by
Bikramaditya Singhal, Gautam Dhameja and Priyansu Sekhar Panda Apress Publisher 2018
2) Introducing Ethereum and Solidity Chris Dannen - Apress (2017)
Major NTITPMJ302 Course II - Security Breaches and Countermeasures
Credits 04 No. of Hours 60 No. of Lectures Per week 4

Course Objective:
1. To list the security laws and network scanning techniques
2. To discuss on threats
3. To demonstrate social engineering and attacks
4. To analyze the attacks on web server, web application and wireless network
5. To compare the mobile, IOT attacks and cryptography techniques
6. To simulate the attacks and countermeasures
Unit Course Detail No. of Lectures
I Introduction to Security Breaching: Overview of Information 15
Security, Threats and Attack vectors, Concepts of Hacking - Ethical and
Unethical, Information Security Controls, Concepts of penetration
Testing, Information Security Laws and Standards.
Evaluation Security of IT Organization: Concepts, Methodology,
Tools, Countermeasures, Penetration Testing. Network Scanning:
Concepts, Scanning beyond IDS and firewalls, Tools, Banner Grabbing,
Scanning Techniques, Network Diagrams, penetration testing.
Enumeration: Concepts, Different types of enumeration: Netbios,
SNMP, LDAP, NTP, SMTP, DNS, other enumeration techniques,
Countermeasures, Penetration Testing
Analysis of Vulnerability: Concepts, Assessment Solutions, Scoring
Systems, Assessment Tools, Assessment Reports. Breaching System
Security: Concepts, Cracking passwords, Escalating privileges,
Executing Applications, Hiding files, covering tracks, penetration
testing.
II Threats due to malware: Concepts, Malware Analysis, Trojan 15
concepts, countermeasures, Virus and worm concepts, anti-malware
software, penetration testing. Network Sniffing: Concepts,
countermeasures, sniffing techniques, detection techniques, tools,
penetration testing.
Social Engineering: Concepts, Impersonation on networking sites,
Techniques, Identity theft, Insider threats, countermeasures, Pen testing.
Denial of Service and Distributed Denial of service:
Concepts, techniques, botnets, attack tools, countermeasures, protection
tools, penetration testing.
Hijacking an active session: Concepts, tools, application level session
hijacking, countermeasures, network level session hijacking,
penetration testing. Evasion of IDS, Firewalls and Honeypots:
Introduction and concepts, detecting honeypots, evading IDS, IDS and
Firewall evasion countermeasures, evading firewalls, penetration
testing.
III Compromising Web Servers: Concepts, attacks, attack methodology, 15
attack tools, countermeasures, patch management, web server security
tools, penetration testing. Compromising Web Applications:
Concepts, threats, methods, tools, countermeasures, testing tools,
penetration testing. Performing SQL Injection: Concepts, types,
methodology, tools, techniques, countermeasures. Compromising
Wireless Networks: Concepts, wireless encryption, threats,
methodology, tools, compromising Bluetooth, countermeasures,
wireless security tools, penetration testing.
IV Compromising Mobile Platforms: Attack vectors, Compromising 15
Android OS, Compromising iOS, Mobile spyware, Mobile Device
Management, Mobile security, penetration testing.
Compromising IoT: Concepts, attacks, compromising methodology,
tools, countermeasures, penetration testing.
Cloud Security: Concepts, Security, threats, attacks, tools, penetration
testing.
Cryptography: Concepts, email encryption, algorithms, disk
encryption, tools, cryptanalysis, Public key infrastructure,
countermeasures

Course Outcome:
The learners will be able to
1. name the laws, standards, network scanning and enumeration techniques
2. describe the role of virus and worms, Denial of Service and Honeypots and IDS
3. demonstrate social engineering, denial of service attack
4. compare the HTTP attacks
5. summarize about network scanning, enumeration, session hijacking, web server and
application attacks, sql injection
6. simulate the different tools
References:

1) CEHv10, Certified Ethical Hacker Study Guide by Ric Messier Sybex - Wiley - 2019
2) All in One, Certified Ethical Hacker by Matt Walker Tata McGraw Hill - 2012
3) CEH V10: EC-Council Certified Ethical Hacker Complete Training Guide by I.P. Specialist
IPSPECIALIST - 2018
Major NTITPMJ3P2 INFORMATION TECHNOLOGY MAJOR PRACTICAL
Credits 02 No. of Hours 60 No. of Lectures Per week 4
Teacher Student Ratio 1 : 25
Course Objective:
1. To list the security laws and network scanning techniques
2. To discuss on threats
3. To demonstrate social engineering and attacks
4. To analyze the attacks on web server, web application and wireless network
5. To compare the mobile, IOT attacks and cryptography techniques
6. To simulate the attacks and countermeasures
Practica Practical Detail
l No (Linux)
1 Perform footprinting and reconnaissance
2 Proxy Workbench to see the data passing through it and save the data to file.
Perform Network Discovery
Censorship circumvention tools
Scanning Tools for Mobile
3 Enumeration
Vulnerability analysis
4 Mobile network scanning using NESSUS.
System Hacking
5 Wireshark to sniff the network.
SMAC for MAC Spoofing
Caspa Network Analyser
Omnipeek Network Analyzer
6 Social Engineering Toolkit on Kali Linux to perform Social Engineering using
Kali Linux.
DDOS attack
7 Web App Scanning using OWASP Zed Proxy
Session hijacking
Zonealarm and analyze using Firewall Analyzer.
Comodo Firewall
HoneyBOT to capture malicious network traffic
tools to protect attacks on the web servers
8 Protect the Web Application using dotDefender
SQL Injection
9 Wireless hacking and countermeasures
10 Tools for cryptography

Course Outcome:
The learners will be able to
1. name the laws, standards, network scanning and enumeration techniques
2. describe the role of virus and worms, Denial of Service and Honeypots and IDS
3. demonstrate social engineering, denial of service attack
4. compare the HTTP attacks
5. summarize about network scanning, enumeration, session hijacking, web server and
application attacks, sql injection
6. simulate the different tools
References:

1) CEHv10, Certified Ethical Hacker Study Guide by Ric Messier Sybex - Wiley - 2019
2) All in One, Certified Ethical Hacker by Matt Walker Tata McGraw Hill - 2012
3) CEH V10: EC-Council Certified Ethical Hacker Complete Training Guide by I.P. Specialist
IPSPECIALIST - 2018
Elective NTITPEL301 Elective Course I - Big Data Analytics
Credits 04 No. of Hours 60 No. of Lectures Per week 4

Course Objective:
1. To describe about Data Products
2. To outline on Data Mining, Ingestion and Analytics
3. To demonstrate MapReduce programs
4. To compare analytics with higher-level APIs
5. To explain about importing and exporting data
6. To with simple HQLs and programs
Unit Course Detail No. of Lectures
I Introduction to Big Data, Characteristics of Data, and Big Data 15
Evolution of Big Data, Definition of Big Data, Challenges with big data,
Why Big data? Data Warehouse environment, Traditional Business
Intelligence versus Big Data. State of Practice in Analytics, Key roles
for New Big Data Ecosystems, Examples of big Data Analytics. Big
Data Analytics, Introduction to big data analytics, Classification of
Analytics, Challenges of Big Data, Importance of Big Data, Big Data
Technologies, Data Science, Responsibilities, Soft state eventual
consistency. Data Analytics Life Cycle
Analytical Theory and Methods: Clustering and Associated Algorithms,
Association Rules, Apriori Algorithm, Candidate Rules, Applications
of Association Rules, Validation and Testing, Diagnostics, Regression,
Linear Regression, Logistic Regression, Additional Regression Models.
II Analytical Theory and Methods: Classification, Decision Trees, Naïve 15
Bayes, Diagnostics of Classifiers, Additional Classification Methods,
Time Series Analysis, Box Jenkins methodology, ARIMA Model,
Additional methods. Text Analysis, Steps, Text Analysis Example,
Collecting Raw Text, Representing Text, Term Frequency-Inverse
Document Frequency (TFIDF), Categorizing Documents by Topics,
Determining Sentiments
III Data Product, Building Data Products at Scale with Hadoop, Data 15
Science Pipeline and Hadoop Ecosystem, Operating System for Big
Data, Concepts, Hadoop Architecture, Working with Distributed file
system, Working with Distributed Computation, Framework for Python
and Hadoop Streaming, Hadoop Streaming, MapReduce with Python,
Advanced MapReduce. In-Memory Computing with Spark, Spark
Basics, Interactive Spark with PySpark, Writing Spark Applications
IV Distributed Analysis and Patterns, Computing with Keys, Design 15
Patterns, Last-Mile Analytics, Data Mining and Warehousing,
Structured Data Queries with Hive, HBase, Data Ingestion, Importing
Relational data with Sqoop, Injesting stream data with flume. Analytics
with higher level APIs, Pig, Spark’s higher level APIs
Course Outcome:
The learners will be able to
1. name the models, operating system and framework that fit in distributed computing
2. summarize on data mining, warehousing, ingestion and analytics
3. demonstrate classification and clustering
4. compare python, R related APIs in data analytics
5. assess data importing and exporting using various DBs
6. build simple programs
References:

1) Data Analytics with Hadoop An Introduction for Data Scientists by Benjamin Bengfort and
Jenny Kim O’Reilly 2016
2) Big Data Analytics with R and Hadoop by Vignesh Prajapati First Edition
3) Big Data and Analytics by Subhashini Chellappan Seema Acharya WileyFirst
4) Big Data and Hadoop V.K Jain Khanna Publishing First 2018
Major NTITPMJ303 Major Course III - Information Security Auditing - I
Credits 02 No. of Hours 30 No. of Lectures Per week 2

Course Objective:
1. To describe about audit, policies and standards
2. To outline on information system acquisition and development
3. To demonstrate the audit reports
Unit Course Detail No. of Lectures
I Secrets of a Successful Auditor Understanding the Demand for IS 15
Audits Understanding Policies, Standards, Guidelines, and Procedures
Understanding Professional Ethics Understanding the Purpose of an
Audit Differentiating between Auditor and Auditee Roles Implementing
Audit Standards Auditor Is an Executive Position Understanding the
Corporate Organizational Structure Governance Strategy Planning for
Organizational Control Overview of Tactical Management Planning
and Performance Overview of Business Process Reengineering
Operations Management Summary Audit Process Understanding the
Audit Program Establishing and Approving an Audit Charter
Preplanning Specific Audits Performing an Audit Risk Assessment
Determining Whether an Audit Is Possible Performing the Audit
Gathering Audit Evidence Conducting Audit Evidence Testing
Generating Audit Findings Report Findings Conducting Follow-up
(Closing Meeting)
II Information Systems Acquisition and Development Project Governance 15
and Management Business Case and Feasibility Analysis
System Development Methodologies Control Identification and Design
Testing Methodologies Configuration and Release Management System
Migration, Infrastructure Deployment and Data Conversion Post-
implementation Review

Course Outcome:
The learners will be able to
1. summarize the role of auditor, audit process
2. outline on project governance and testing methodologies
3. observe the technical document related to audit
4. compare the audit process
References:

1) CISA: Certified Information Systems Auditor by David Cannon SYBEX 4th Edition 2016
2) CISA Review Manual 27th Edition ISACA 2019
3) CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition,
O’Reilly 4th Edition 2019

You might also like