LecturePlan CS224 22CST-337
LecturePlan CS224 22CST-337
LecturePlan CS224 22CST-337
LECTURE PLAN
Mission of the M1: To provide relevant, rigorous and contemporary curriculum and aligned assessment system to ensure effective learning
Department outcomes for engineering technologies.
M2: To provide platform for industry engagement aimed at providing hands-on training on advanced technological and business
skills to our students.
M3: To provide opportunities for collaborative, interdisciplinary and cutting-edge research aimed at developing solutions to real life
problems
M4: To imbibe quest for innovation, continuous learning and zeal to pursue excellence through hard work and problem-solving
approach
M5: To foster skills of leadership, management, communication, team spirit and strong professional ethics in all academic and
societal endeavours of our students
Vision of the To be recognized as a centre of excellence for Computer Science & Engineering education and research, through effective
Department teaching practices, hands-on training on cutting edge computing technologies and excellence in innovation, for creating globally
aware competent professionals with strong work ethics whom would be proficient in implementing modern technology solutions
and shall have entrepreneurial zeal to solve problems of organizations and society at large.
Program OutComes(POs)
PO1 Apply the knowledge of mathematics, science, engineering fundamentals and an engineering specialization to the solution of
complex engineering problems.
PO2 Identify, formulate, review research literature and analyze complex engineering problems reaching substantiated conclusions
using first principles of mathematics, natural sciences and engineering sciences.
PO3 Design solutions for complex engineering problems and design system components or processes that meet the specified needs
with appropriate consideration for the public health and safety and the cultural, societal, and environmental considerations.
PO4 Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data and
synthesis of the information to provide valid conclusions.
PO5 Create, select, and apply appropriate techniques, resources and modern engineering and IT tools including prediction and
modelling to complex engineering activities with an understanding of the limitations.
PO6 Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal and cultural issues and the
consequent responsibilities relevant to the professional engineering practice.
PO7 Understand the impact of the professional engineering solutions in societal and environmental contexts, and demonstrate the
knowledge of, and need for sustainable development.
PO8 Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering practice.
PO9 Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings.
PO10 Communicate effectively on complex engineering activities with the engineering community and with society at large, such as,
being able to comprehend and write effective reports and design documentation, make effective presentations, and give and
receive clear instructions.
PO11 Demonstrate knowledge and understanding of the engineering and management principles and apply these to one’s own work, as
member and leader in a team, to manage projects and in multidisciplinary environments.
PO12 Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest
context to technological change.
Text Books
Sr No Title of the Book Author Name Volume/Edition Publish Hours Years
1 Network Defense: Security Policy William Stallings and Lawrie Third PEARSON 2015
and Threats Brown
2 Principles of Computer Security: Wm. Arthur Conklin, Greg White, Second MC GRAW HILL 2011
CompTIA Security+ and Beyond Chuck Cothren, Rog
Reference Books
Sr No Title of the Book Author Name Volume/Edition Publish Hours Years
1 Computer Networking: Principles, Olivier Bonaventure First Saylor Foundation 2011
Protocols and Practice"
2 Cybersecurity Essentials Charles J. Brooks, Christopher illustrated John Wiley & Sons 2018
Grow, and Philip Cr
Course OutCome
SrNo OutCome
CO1 **Apply** network reconnaissance techniques to identify potential vulnerabilities.
CO2 **Analyze** network traffic patterns using advanced tools and methodologies.
CO3 **Configure** and **deploy** intrusion detection and prevention systems effectively.
CO4 **Design** and **implement** firewall policies to enhance network security posture.
CO5 **Demonstrate** proficiency in incident response procedures through simulated scenarios.
1 4 Introduction to Case Studies: Notable Network ,T- Network Defense: Security Instructor CO2
Network Security Breaches Pol,R- Computer Networking: Lead
Security Principl WorkShop,P
PT
1 5 Introduction to ,T- Network Defense: Security Instructor CO3
Network Setting Up a Secure Network Pol,R- Computer Networking: Lead
Security Environment Principl WorkShop,P
PT
1 6 Network Techniques for Network ,T- Network Defense: Security Instructor CO2
Reconnaissanc Reconnaissance Pol,R- Computer Networking: Lead
e and Principl WorkShop,P
Vulnerability PT
Assessment
1 7 Network ,T- Network Defense: Security Instructor CO1
Reconnaissanc Scanning Tools and Methodologies Pol,R- Computer Networking: Lead
e and Principl WorkShop,P
Vulnerability PT
Assessment
1 8 Network ,T- Network Defense: Security Instructor CO4
Reconnaissanc Vulnerability Assessment Process Pol,R- Computer Networking: Lead
e and Principl WorkShop,P
Vulnerability PT
Assessment
1 9 Network ,T- Network Defense: Security Instructor CO3
Reconnaissanc Vulnerability Scanning Pol,R- Computer Networking: Lead
e and Principl WorkShop,P
Vulnerability PT
Assessment
1 10 Network ,T- Network Defense: Security Instructor CO2
Reconnaissanc Threat Modeling and Risk Assessment Pol,R- Computer Networking: Lead
e and Principl WorkShop,P
Vulnerability PT
Assessment
1 11 Review and ,T- Network Defense: Security Instructor CO2
Hands-on Review of Network Reconnaissance Pol,R- Computer Networking: Lead
Practice and Vulnerability Assessment Principl WorkShop,P
PT
1 12 Review and Vulnerability Scanning and Assessment ,T- Network Defense: Security Instructor CO2
Hands-on Practice Pol,R- Computer Networking: Lead
Practice Principl WorkShop,P
PT
1 14 Review and Case Study: Developing a Network ,T- Network Defense: Security Instructor CO1
Hands-on Security Policy Pol,R- Computer Networking: Lead
Practice Principl WorkShop,P
PT
1 15 Review and Q&A Session and Review of Unit 1 ,T- Network Defense: Security Instructor CO1
Hands-on Pol,R- Computer Networking: Lead
Practice Principl WorkShop,P
PT
2 16 Intrusion ,T- Network Defense: Security Instructor CO3
Detection and Understanding IDPS Components and Pol,R- Computer Networking: Lead
Prevention Functionality Principl WorkShop,P
Systems PT
(IDPS)
2 17 Intrusion ,T- Network Defense: Security Instructor CO2
Detection and Types of Intrusion Detection Systems Pol,R- Computer Networking: Lead
Prevention Principl WorkShop,P
Systems PT
(IDPS)
2 18 Intrusion Configuring and Deploying IDPS ,T- Network Defense: Security Instructor CO2
Detection and Solutions Pol,R- Computer Networking: Lead
Prevention Principl WorkShop,P
Systems PT
(IDPS)
2 19 Intrusion Intrusion Detection Lab Exercise ,T- Network Defense: Security Instructor CO2
Detection and Pol,R- Computer Networking: Lead
Prevention Principl WorkShop,P
Systems PT
(IDPS)
2 20 Intrusion ,T- Network Defense: Security Instructor CO3
Detection and Real-time Threat Detection and Pol,R- Computer Networking: Lead
Prevention Response Strategies Principl WorkShop,P
Systems PT
(IDPS)
2 21 Firewall Introduction to Firewalls and Access ,T- Network Defense: Security Instructor CO2
Configuration Control Pol,R- Computer Networking: Lead
and Access Principl WorkShop,P
Control PT
2 22 Firewall Types of Firewalls and Their ,T- Network Defense: Security Instructor CO4
Configuration Architectures Pol,R- Computer Networking: Lead
and Access Principl WorkShop,P
Control PT
2 23 Firewall ,T- Network Defense: Security Instructor CO4
Configuration Designing Effective Firewall Policies Pol,T-Principles of Computer Lead
and Access Securit,R- Computer Networking: WorkShop,P
Control Principl,R-Cybersecurity Essentials PT
2 24 Firewall Firewall Configuration Lab Exercise ,T- Network Defense: Security Instructor CO1
Configuration Pol,T-Principles of Computer Lead
and Access Securit,R-Cybersecurity Essentials WorkShop,P
Control PT
2 25 Firewall Access Control Best Practices for ,T-Principles of Computer Securit,R- Instructor CO2
Configuration Network Security Cybersecurity Essentials Lead
and Access WorkShop,P
Control PT
2 26 Review and ,T-Principles of Computer Securit,R- Instructor CO3
Hands-on Review of IDPS Deployment and Cybersecurity Essentials Lead
Practice Firewall Configuration WorkShop,P
PT
3 33 Incident Roles and Responsibilities in Incident ,T-Principles of Computer Securit,R- Instructor CO1
Response Response Teams Cybersecurity Essentials Lead
Planning WorkShop,P
PT
3 34 Incident Roles and Responsibilities in Incident ,T-Principles of Computer Securit,R- Instructor CO2
Response Response Teams Cybersecurity Essentials Lead
Planning WorkShop,P
PT
3 35 Incident ,T-Principles of Computer Securit,R- Instructor CO3
Response Incident Response Tabletop Exercise Cybersecurity Essentials Lead
Planning WorkShop,P
PT
3 36 Incident T-Principles of Computer Securit Instructor CO4
Handling and Incident Detection and Analysis Lead
Mitigation Techniques WorkShop,P
PT
3 38 Incident Post-Incident Recovery and Lessons ,T-Principles of Computer Securit,R- Instructor CO2
Handling and Learned Cybersecurity Essentials Lead
Mitigation WorkShop,P
PT
3 39 Incident ,T-Principles of Computer Securit,R- Instructor CO3
Handling and Incident Handling Lab Exercise Cybersecurity Essentials Lead
Mitigation WorkShop,P
PT
3 40 Incident T-Principles of Computer Securit Instructor CO1
Handling and Post-Incident Analysis and Reporting Lead
Mitigation WorkShop,P
PT
3 41 Review and ,T-Principles of Computer Securit,R- Instructor CO3
Final Project Review of Incident Response Cybersecurity Essentials Lead
Presentation Strategies and Mitigation Techniques WorkShop,P
PT
Assessment Model
Sr No Assessment Name Exam Name Max Marks
1 20EU01 External Theory 60
2 20EU01 Assignment/PBL 10
3 20EU01 Attendance Marks 2
4 20EU01 Mid-Semester Test-1 20
5 20EU01 Quiz 4
6 20EU01 Surprise Test 12
7 20EU01 Mid-Semester Test-2 20
CO vs PO/PSO PSO3 PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 NA 1 NA 1 NA NA NA NA NA NA 1 NA 1 1 NA
CO2 NA 1 2 1 NA 1 1 NA 1 1 1 NA 2 NA 1
CO3 1 1 3 2 1 2 2 NA 1 1 1 NA 1 1 NA
CO4 1 2 3 NA 1 2 2 NA 1 1 1 NA 1 1 NA
CO5 NA 1 3 3 2 2 2 NA 2 2 2 2 2 NA 1
Target 1 1.2 2.75 1.75 1.33 1.75 1.75 NA 1.25 1.25 1.2 2 1.4 1 1