0% found this document useful (0 votes)
108 views25 pages

LY COMP Syllabus Pattern 2021

Uploaded by

Sarthak Chordiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
108 views25 pages

LY COMP Syllabus Pattern 2021

Uploaded by

Sarthak Chordiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Faculty of Science & Technology

Programme Structure & Syllabus


For
Last Year
Bachelor of Technology
Computer Engineering
Programme Code: BTECCE
Pattern 2021
< With Effect from Academic Year 2024-25>

Authority Date
Proposed by Board of Studies in Computer Engineering
Approved by Academic Council, Vishwakarma University, Pune

Issued by

Chairman – BoS Dean of Faculty Director, IQAC


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

Title: Programme Structure and Syllabus Form No: IQAC-101

Vision of the University

Emerge as a Premier University Recognized Internationally for Excellence in Education, Research and
Innovation

Mission of the University

VU-M1 To impart contemporary transformative education through research and innovation

VU-M2 To develop competent leaders-professionals for life and livelihood

VU-M3 To co-create human and socio-economic capital par excellence

VU-M4 To inculcate life skills and holistic culture appreciating morals and ethics

Values of the University

Excellence Transparency

Innovation Sustainability

Diversity Responsibility

Adaptability Compassion

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

Vision of the Department of Computer Engineering

To create an intellectual and academically rich environment for careers in Computing Education and Research
to fulfill global needs.

Mission of the Department of Computer Engineering

M1 To impart modern computing education through novel methods and research.

M2 To prepare the students for life-long learning in pursuit of excellence.

M3 To create technically competent human in socio-economic domain.

M4 To promote aspiring ethically conscious engineers demonstrating sustainable entrepreneurship and


professional maturity in social context.
Values of the Department of Computer Engineering

Pursuing Excellence Ethics & Social Responsibility

Nurturing Talent Collaborative Approach

Career Architect Sustainable Growth Transparency & Accountability

Innovative Outlook Freedom of Expression

Mapping of Mission Statement of Department to University Mission Statement

Mission Statement VU-M1 VU-M2 VU-M3 VU-M4


M1 3 3 2 2
M2 1 2 2 3
M3 2 3 2 2
M4 1 1 2 3

Affinity Level: 1- Slight, 2- Moderate, 3-Substantial

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

Programme Educational Objectives (PEOs)

PEO No. Statement


PEO1 To prepare the students to evolve into a professional and committed technology workforce, by
providing them with a global educational platform with innovative practices.
PEO2 To provide a sufficient mathematical and computing theory knowledge base, leading to practical
and long lasting computer engineering solutions.
PEO3 To ingrain problem solving skills and sound engineering principles in students with the help of
modern tools and techniques.
PEO4 To impart in the students professional and ethical practices based on standard guidelines to acquire
the right attitude and aptitude for the benefit of society.
PEO5 To guide ambitious students for higher education and lead them to avenues of entrepreneurship in
emerging areas of computing.

Mapping of Mission Statement of Department to PEOs

Mission Statement PEO1 PEO2 PEO3 PEO4 PEO5


M1 3 3 3 1 2
M2 2 2 3 3 2
M3 3 3 2 2 1
M4 2 1 2 3 2

Affinity Level: 1- Slight, 2- Moderate, 3-Substantial

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

Programme Outcomes (POs)

PO No. Statement
PO1 Apply the knowledge of engineering and science fundamentals to the solution of complex engineering
problems.
PO2 Identify, formulate and analyze complex engineering problems to create solutions using the
First principles of engineering sciences and mathematics.
PO3 Design solutions for design system components that meet the specified needs for the benefit of
society.
PO4 Apply research methods including design of experiments, analysis and interpretation of data,
And synthesis of the information to provide valid conclusions.
PO5 Create appropriate techniques and IT tools including prediction and modeling to complex
engineering activities with an understanding of the limitations.
PO6 Apply reasoning using contextual knowledge to assess the needs of society and understand
The responsibilities relevant to the professional engineering practice.
PO7 Understand the impact of professional engineering solutions as applied to the environment,
And demonstrate the knowledge for sustainable development.
PO8 Adopt ethical practices as applied to the professional world to execute responsibilities and adhere
to norms of the engineering profession.
PO9 Execute professional functions effectively as an individual, as well as a leader or member in
Diverse multidisciplinary teams.
PO10 Communicate effectively with the engineering community and with society in solving
complex problems in terms of being able to comprehend and write effective reports, make
Effective presentations, as well as execute and receive clear instructions.
PO11 Demonstrate an ability to lead projects and build cost models in an interdisciplinary professional
Setting
PO12 Develop learning mechanisms and inculcate the ability to prepare for lifelong learning in the context
of technological change.

Mapping of PEOs to POs

PEO Number PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
PEO1 2 3 2 3 1 2 3 1 1 - - 2
PEO2 3 3 2 3 1 1 2 1 - 1 1 1
PEO3 2 2 2 2 3 1 3 1 - 1 - 2
PEO4 1 1 1 1 1 1 1 3 3 2 2 -
PEO5 2 2 2 2 1 1 1 1 1 - 2 1

Affinity Level: 1- Slight, 2- Moderate, 3-Substantial

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

Programme Specific Outcomes (PSOs)

PSO No. Statement


PSO1 Imbibe foundational knowledge of computing theory, algorithms and programming paradigms to
create innovative, scientific solutions for complex computing challenges.
PSO2 Prepare for the latest trends in industry by adapting to various computing platforms, architectures and
changing software paradigms.
PSO3 Evolve new design ideas for real world problems using appropriate mechanisms, design patterns,
modeling methods and modern tools.
PSO4 Inculcate research attitude and aptitude in students using techniques and standards as applied to
technology migration and evolution.

Mapping of PEOs to PSOs

PEO Number PSO1 PSO2 PSO3 PSO4


PEO1 2 3 1 2
PEO2 3 2 1 3
PEO3 3 2 3 2
PEO4 2 2 1 1
PEO5 2 2 1 2

Affinity Level: 1- Slight, 2- Moderate, 3-Substantial

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

Programme Structure

Faculty Science and Technology Pattern 2021


Department Computer Engineering Date (w.e.f.) 01/07/2024
Programme B.Tech. Computer Engineering

Semester VII Pattern 2021


Teaching Examination
Course Scheme Scheme and Marks
Course Code Course Name Credit
Type (Hours/Wee
k)
CIE ESE Total
L T P C
PEC * Elective 3 0 0 3 50 50 100
PEC ** Elective Lab 0 0 2 1 25 25 50
PEC # IBM Course 6 3 0 0 3 50 50 100
PEC ## IBM Course 6 Lab 0 0 2 1 25 25 50
PEC ### IBM Course 7 3 0 0 3 50 50 100
PEC #### IBM Course 7 Lab 0 0 2 1 25 25 50
OR
PROJ BTECCE21840 Internship 0 0 0 12 50 50 100

PROJ BTECCE21730 Major Project 0 0 4 16 50 50 100


TOTAL 9 0 10 28 275 275 550
Instructions, if any: 1 Theory/Tutorial Hour = 1 Credit, 2 Practical hours = 1 Credit
*# This course will be executed in online platform provided by Coursera

* Elective
BTECCE21701 *# Machine Learning
BTECCE21703 Internet of Things
** Elective Lab
BTECCE21702 *# Machine Learning Lab
BTECCE21704 Internet of Things Lab
# IBM Course 6 Elective
BTECCE21705 Big Data Analytics
BTECCE21707 Digital Forensics
## IBM Course 6 Elective Lab
BTECCE21706 Big Data Analytics Lab
BTECCE21708 Digital Forensics Lab
### IBM Course 7 Elective
BTECCE21709 Social, Web & Mobile Analytics
BTECCE21711 Ethical Hacking & Penetration Testing
#### IBM Course 7Elective Lab
BTECCE21710 Social, Web & Mobile Analytics Lab
BTECCE21712 Ethical Hacking & Penetration Testing Lab

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

Semester VIII Pattern 2021


Teaching Examination Scheme and
Course
Course Code Course Name Scheme Credit Marks
Type
(Hours/Week)
CI ESE Total
L T P C
E
PEC * Elective 3 0 0 3 50 50 100
PEC ** Elective Lab 0 0 2 1 25 25 50
PEC # IBM Course 6 3 0 0 3 50 50 100
PEC ## IBM Course 6 Lab 0 0 2 1 25 25 50
PEC ### IBM Course 7 3 0 0 3 50 50 100
PEC #### IBM Course 7 Lab 0 0 2 1 25 25 50
OR
PROJ BTECCE21840 Internship 0 0 0 12 50 50 100

PROJ BTECCE21735 Industry Immersion *# 0 0 0 4 50 50 100


TOTAL 9 0 6 12 225 225 450
Instructions, if any: 1 Theory/Tutorial Hour = 1 Credit, 2 Practical hours = 1 Credit

Note: Industry Immersion*#  Compulsory inclusion of IBM Course 6 Elective Theory


with Lab and IBM Course 7 Elective Theory with Lab
* Elective
BTECCE21801 Machine Learning
BTECCE21803 Internet of Things
** Elective Lab
BTECCE21802 Machine Learning Lab
BTECCE21804 Internet of Things Lab
# IBM Course 6 Elective
BTECCE21805 Big Data Analytics
BTECCE21807 Digital Forensics
## IBM Course 6 Elective Lab
BTECCE21806 Big Data Analytics Lab
BTECCE21808 Digital Forensics Lab
### IBM Course 7 Elective
BTECCE21809 Social, Web & Mobile Analytics
BTECCE21811 Ethical Hacking & Penetration Testing
#### IBM Course 7Elective Lab
BTECCE21810 Social, Web & Mobile Analytics Lab
BTECCE21812 Ethical Hacking & Penetration Testing Lab

Name of Head of Department Name of Dean


Sign: Sign:
Date: Date:
BTECH LY Comp ,Pattern-2021
Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

SEM VII

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

BTECCE21701:: Machine Learning

Course Type PEC Semester 7

Teaching Scheme Credits Examination Scheme


Lecture 3Hr./Week Lecture 3 CIE Marks 50
Tutorial --Hr./Week Tutorial - ESE Marks 50
Practical/Studio 0Hr./Week Practical/Studio 0 Total Marks 100
Total 3Hr./Week Total 3

Course Description

This course helps the student to identify the role of supervised, unsupervised and reinforcement algorithms. Illustrates
concept learning and decision tree learning algorithms and formulate research based problems based on Machine
learning techniques. Analyzes different algorithms used in machine learning as applied to generic datasets.

Course Outcomes

CO No. Statement
1 Demonstrate knowledge of supervised, unsupervised and reinforcement algorithms through
implementation for sustainable solutions of applications.
2 Evaluate different classification algorithms through implementation for sustainable solutions of
applications.
3 Apply different clustering algorithms used in machine learning to generic datasets and specific
multidisciplinary domains.
4 Analyze research based problems using neural networks and genetic algorithms.
5 Evaluation of different convolution neural network algorithms on well formulated problems along
with stating valid conclusions that the evaluation supports.

Mapping of COs to POs and PSOs

CO POs PSOs BTL


No PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1 PSO1 PSO2 PSO3 PSO4
0 1 2
CO1 3 UN
CO2 3 AP
CO3 2 AN
CO4 2 AP
CO5 3 AN
Affinity Level: 1- Slight, 2- Moderate, 3-Substantial, BTL: Bloom’s Taxonomy Level

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

Course Content

Unit No 1 Introduction Hours 9 CO BTL


What is Machine Learning? Types of learning: Supervised, Unsupervised, Reinforcement. 1 UN
Simple What is Machine Learning? Types of learning: Supervised, Unsupervised, Semi
supervised and Reinforcement. Simple regression- Types, Making predictions, Cost function,
Gradient descent, Training, Model evaluation.
Multivariable regression : Growing complexity, Normalization, Making predictions, Initialize
weights, Cost function, Gradient descent, Simplifying with matrices, Bias term, Model evaluation
Learning System: Well posed learning problems, Designing a Learning system, Applications of
machine learning, Perspective and Issues in Machine Learning
Unit No 2 Classification Methods Hours 9 2 AP
Support Vector Machine classification algorithm, hyper plane, optimal separating hyper planes,
kernel functions, kernel selection, applications
Introduction to ensemble and its techniques, Bagging and Bootstrap ensemble methods
Introduction to random forest, growing of random forest, random feature selection

Unit No 3 Clustering Methods Hours 9 3 AP


Overview of clustering and unsupervised learning, Introduction to clustering methods :Partitioning
methods K-Means algorithm, assessing quality and choose number of clusters, KNN (1 NN, K NN)
techniques, K-Medians, Density based method: Density-Based Spatial Clustering, Hierarchical clustering
methods: Agglomerative Hierarchical clustering technique, Roles of dendrograms and Choosing number
clusters in Hierarchical clustering, Divisive clustering techniques, Principal Component Analysis (PCA)

Unit No 4 Neural network and Genetic Algorithms Hours 9 4 AP


Neural Network Representation: Problems, Perceptrons, Multilayer Networks and Back Propagation
Algorithms, Deep neural networks, Genetic Algorithms: Hypothesis Space Search, Genetic Programming,
Models of Evaluation and Learning.
Unit No 5 Convolutional Neural Network Hours 9 5 AN
Convolutional Neural Network, Recursive Neural Network, Recurrent Neural Network, Long-short Term
Memory, Transfer learning with pre-trained CNNs

Textbooks

1 T. Mitchell, “Machine Learning”, McGraw-Hill, 1997.


2 Douglas Montgomery, Elizabeth A. Peck, and G. Geoffrey Vining, “Introduction to Linear Regression
Analysis”, 5th edition, Wiley publication
3 Charu C. Aggarwal, Chandan K. Reddy, “Data Clustering Algorithms and Applications”.

Reference Books / Journal Articles / Weblink

1 Ethem Alpaydin, "Introduction to Machine Learning", MIT press, 2004.


2 Jacek M. Zurada, “Introduction to Artificial neural System”, JAICO publishing house, 2002.

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

BTECCE21702:: Machine Learning Lab

Teaching Scheme Credits Examination Scheme


Lecture 0Hr./Week Lecture 0 CIE Marks 25
Tutorial --Hr./Week Tutorial - ESE Marks 25
Practical/Studio 2Hr./Week Practical/Studio 1 Total Marks 50
Total 2Hr./Week Total 1

List of Experiments

1 Create Regression model of your choice using suitable dataset.


2 Create Multi variable Regression model of your choice using suitable dataset.
3 Write a program to implement Support Vector Machine Algorithm to solve classification problem.
4 Write a program to implement Boosting and Bagging methods. Analyze using suitable dataset.
5 Write a program to implement K-means clustering algorithm.
6 Write a program implement backpropagation algorithm.
7 Write a program to implement CNN using image dataset.
8 Write a program to implement transfer learning algorithm. Analyze using suitable dataset

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

BTECCE21703:: Internet of Things

Course Type PEC Semester 7

Teaching Scheme Credits Examination Scheme


Lecture 3 Hr./Week Lecture 3 CIE Marks 50
Tutorial -- Hr./Week Tutorial - ESE Marks 50
Practical/Studio 0 Hr./Week Practical/Studio 0 Total Marks 100
Total 3 Hr./Week Total 3

Course Description
This course will help students to learn the concepts of IoT and different applications in IoT.

Course Outcomes
CO No. Statement
1 Explain in a concise manner how the general Internet as well as IoT works.
2 Understand constraints and opportunities of wireless and mobile networks for Internet of Things.
3 Choose between available technologies and devices for stated IoT challenge.
4 Evaluation of IoT Security models
5 Analyze case studies of IoT systems

Mapping of COs to POs and PSOs


CO POs PSOs BTL
No PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1 PSO1 PSO2 PSO3 PSO4
0 1 2
CO1 2 UN
CO2 3 AP
CO3 2 AP
CO4 3 AP
CO5 3 UN
Affinity Level: 1- Slight, 2- Moderate, 3-Substantial, BTL: Bloom’s Taxonomy Level
Course Content

Unit No 1 Introduction to Internet of Things Hours9 CO BTL


Introduction, History of IOT, Definition and Characteristics of IoT, Objects in IOT, Identifier 1 UN
in the IOT, Sensing, Actuation, IoT functional blocks, IoT communication models, IoT
Communication APIs, Enabling Technologies in IOT, IoT Issues and Challenges, Applications.
Unit No 2 IoT Protocols Hours9 2 AP
Protocol Standardization for IoT, Efforts, M2M and WSN Protocols, SCADA and RFID
Protocols, Issues with IoT Standardization, Unified Data Standards, Protocols – IEEE 802.15.4,
BACNet Protocol, Modbus, KNX, Zigbee Architecture, Network layer, APS layer, Protocols -
MQTT, CoAP, REST Transferring data.
Unit No 3 Design and Development Hours 9 3 AP
Design Methodology – Embedded computing logic – Microcontroller, System on Chips – IoT
system building blocks – Arduino – Board details, IDE programming – Raspberry Pi –
Interfaces and Raspberry Pi with Python Programming.
Unit No 4 IoT Security Hours 9 4 AP
BTECH LY Comp ,Pattern-2021
Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

IoT Security: Vulnerabilities of IoT, Security Requirements, Challenges for Secure IoT, Threat
Modeling, Key elements of IoT Security: Identity establishment, Access control, Data and
message security, Non-repudiation and availability, Security model for IoT.
Unit No 5 Case Studies Hours 9 5 AN
Case Studies: Home Intrusion Detection, Weather Monitoring System, Connected Vehicles,
Smart Grid, Air Pollution Monitoring, Agriculture, Healthcare.

Textbooks
1 ArshdeepBahga, Vijay Madisett, “Internet of Things – A hands-on approach”, Universities Press, ISBN: 0:
0996025510, 13: 978-0996025515.
2 Honbo Zhou, “The Internet of Things in the Cloud: A Middleware Perspective”, CRC Press, 2012. ISBN:
9781439892992.
3 Dieter Uckelmann, Mark Harrison, Florian Michahelles, “Architecting the Internet of Things”, Springer,
2011. ISBN: 978-3-642-19156-5.
4 Lyla B. Das, “Embedded Systems: An Integrated Approach”, Pearson, ISBN: 9332511675,
9789332511675.

Reference Books / Journal Articles / Weblink


1 David Easley, Jon Kleinberg, “Networks, Crowds, and Markets: Reasoning About a Highly Connected
World”, Cambridge University Press, 2010, ISBN: 10: 0521195330.
2 Olivier Hersent, Omar Elloumi, David Boswarthick, “The Internet of Things: Applications to the Smart
Grid and Building Automation”, Wiley, 2012, 9781119958345.
3 Olivier Hersent, David Boswarthick, Omar Elloumi, “The Internet of Things – Key applications and
Protocols”, Wiley, 2012, ISBN: 978-1-119-99435-0.
4 Barrie Sosinsky, “Cloud Computing Bible”, Wiley-India, 2010.ISBN: 978-0-470-90356-8.
5 Adrian McEwen, Hakim Cassimally, “Designing the Internet of Things”, Wiley, 2014, ISBN: 978-1-118-
43063-7.
6 Christopher Hallinan, “Embedded Linux Primer”, Prentice Hall, ISBN: 13: 978-0-13-167984-9.

BTECCE21704:: Internet of Things Lab


Teaching Scheme Credits Examination Scheme
Lecture 0Hr./Week Lecture 0 CIE Marks 25
Tutorial --Hr./Week Tutorial - ESE Marks 25
Practical/Studio 2Hr./Week Practical/Studio 1 Total Marks 50
Total 2Hr./Week Total 1
Mini Project
Students have to implement mini project which should include following concepts:
1 Node Structure: Sensing, Processing, Communication, Powering
2 Networking: Topologies, Layer/Stack architecture
3 Communication Technologies: Introduction to ZigBee, BLE, WiFi, LTE, IEEE 802.11ah, Discuss data
rate, range, power, computations/bandwidth, QoS
4 Smartness - Signal Processing/Analytics: Impact on Power/Energy savings, dynamic networks, simple
case studies
5 IoT Fabricator: Introduction to Embedded electronics, fabricating electronics, Communication Network
requirements, Data processing challenges – recreation, IP/security, Challenges
6 Hands-on in IoT: Projects based on some Hardware (Raspberry pi, Arduino, Intel, IITH Mote,
Smartphone), Software (Contiki, TinyOS, Android), IoT Fabricator etc. can be used.
BTECH LY Comp ,Pattern-2021
Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

BTECCE21705:: Big Data Analytics

Course Type PEC Semester 7

Teaching Scheme Credits Examination Scheme


Lecture 3 Hr./Week Lecture 3 CIE Marks 50
Tutorial -- Hr./Week Tutorial - ESE Marks 50
Practical/Studio 0 Hr./Week Practical/Studio 0 Total Marks 100
Total 3 Hr./Week Total 3

Course Description

This course helps the student to understand the Big Data Concepts, Stream Processing techniques. Highlights
on Hadoop fundamentals.

Course Outcomes

CO No. Statement
1 Understand challenges in Big Data processing
2 Design and Setup Hadoop cluster
3 Formulate Queries using Pig and Hive.
4 Understand big Data Access Technologies for Reporting and Analysis
5 Write Programs for Stream data Processing

Mapping of COs to POs and PSOs

CO POs PSOs BTL


No PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1 PSO1 PSO2 PSO3 PSO4
0 1 2
CO1 3 UN
CO2 3 AP
CO3 2 AN
CO4 3 AP
CO5 3 AN
Affinity Level: 1- Slight, 2- Moderate, 3-Substantial, BTL: Bloom’s Taxonomy Level
Course Content

Unit No 1 Big Data Concepts Hours6 CO BTL


What Is Big Data, Volume, Velocity, and Variety; Why Its Important, Risks Of Big Data, Need 1 UN
Of Big Data, Structure Of Big Data; Exploring Big Data, Filtering Big Data, The Need4 For
Standards; Big Data and Analytics, Adoption Architecture, Benefits & Barriers, Trends for Big
Data Analytics.
Unit No 2 Hadoop Fundamentals Hours9 2 AP
Hadoop Architecture, Hadoop File System (HDFS); HDFS Administration; Map / Reduce
concepts; Setup of an Hadoop Cluster; Managing Job Execution; move data into Hadoop using
Flume, Data Loading; Overview of workflow engine.
Unit No 3 Query languages for Hadoop Hours9 3 AP
BTECH LY Comp ,Pattern-2021
Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

Jaql basics, Jaql data types, Input/output with Jaql, working with operators and expressions, Use
of Pig & Hive.
Unit No 4 Hadoop Reporting and Analysis Approaches Hours9 4 AP
Big Data reporting and analysis, Big Data Access Technologies for Reporting and Analysis,
Business Intelligence and Hadoop Architecture, Direct Batch Reporting on Hadoop, Live
Exploration of Big Data, Indirect Batch Analysis on Hadoop.
Unit No 5 Analytics for Big Data at Rest & in Motion Hours 12 5 AN
Data Stream overview; Streams Processing Language Basics; Streams Processing Language
Development; SPL Programming Introduction; Adapter Operators; Relational and Utility
Operators - The Journey Begins. Relational and Utility Operators (continued); Windowing and
Joins; Punctuation, aggregation and Sorting; Timing and Coordination; Lists, Sets, and Maps;
Nodes and Partitions; Debugging; Adapters and Toolkits.

Textbooks

1 Hadoop & Big Data Analytics (IBM ICE Publication)

Reference Books / Journal Articles / Weblink

1 Hadoop: The Definitive Guide, 4th Edition, Publisher: O'Reilly Media, Inc., ISBN: 9781491901687
2 https://www.edureka.co/blog/mapreduce-tutorial/

BTECCE21706:: Big Data Analytics Lab

Teaching Scheme Credits Examination Scheme


Lecture 0Hr./Week Lecture 0 CIE Marks 25
Tutorial --Hr./Week Tutorial - ESE Marks 25
Practical/Studio 2Hr./Week Practical/Studio 1 Total Marks 50
Total 2Hr./Week Total 1

List of Experiments

1 Installation and configuration of Hadoop ecosystem


2 Implement word count/ frequency count programs using map reduce.
3 Implement MR program that processes a weather dataset.
4 Creating, deleting copying file/folder from local machine to HDFS system
5 Creating database and tables in Hive and also perform SQL operations
6 Implement an application that stores big data in hbase or pug using Hadoop

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

BTECCE21707:: Digital Forensics

Course Type PEC Semester 7

Teaching Scheme Credits Examination Scheme


Lecture 3 Hr./Week Lecture 3 CIE Marks 50
Tutorial -- Hr./Week Tutorial - ESE Marks 50
Practical/Studio 0 Hr./Week Practical/Studio 0 Total Marks 100
Total 3 Hr./Week Total 3

Course Description

This course helps the student to understand Ethical Hacking from a vendor-neutral perspective. Identifies
vulnerability assessment and penetration testing methodology and techniques. Focuses on concepts of VPN,
Network Security Policy Design and Implementation and wireless network defense mechanisms.

Course Outcomes

CO No. Statement
1 Understand general idea about computer forensics and risks involved in it.
2 Perform forensics and tracking at network and internet level.
3 Write and present investigation reports based on findings.
4 Perform forensics and tracking for mobile and various devices.
5 Understand ways for malware detection.

Mapping of COs to POs and PSOs


CO POs PSOs BTL
No PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1 PSO1 PSO2 PSO3 PSO4
0 1 2
CO1 2 UN
CO2 2 AP
CO3 2 AP
CO4 2 AP
CO5 3 AN
Affinity Level: 1- Slight, 2- Moderate, 3-Substantial, BTL: Bloom’s Taxonomy Level
Course Content

Unit No 1 Computer Forensics Hours 9 CO BTL


When and how computer forensics is used, Guidelines for successful computer forensics, the 1 UN
stages of a computer forensics examination, what issues do computer forensics examiners
face? Risks in Computer Forensics, Standard Procedure, Incident Verification, System
identification, Recovery of Erased and damaged data, Disk imaging and preservation, Data
encryption and compression, Forensic software.
Unit No 2 Network & Internet Forensics Hours 9 2 AP
Overview of OSI Model, Introduction to NAT, Network Information-Gathering Tools,
Monitoring User Activity, Investigating Routers, Hacking Routers, SNORT, Analysis using
Wireshark, tcpdump, Tracking Network Traffic, Reviewing Network Logs, Network Tracking
BTECH LY Comp ,Pattern-2021
Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

Tools, Live Acquisition of Network Traffic, Order of Volatility, Standard Procedure. Internet
& World wide web threats, Domain Name Ownership.Investigation, Reconstructing Past
Internet Activities and Events, Email Forensics: E-mail Analysis, Email Forensics: Email
Headers and Spoofing, Messenger Forensics: AOL, Yahoo, MSN, and Chats, Browser
Forensics: Analyzing Cache and Temporary Internet Files, Browser Forensics: Cookie Storage
and Analysis, Browser Forensics: Web Browsing Activity Reconstruction.
Unit No 3 Forensic Investigation, Evidence Presentation and Legal Hours 9 3 AP
aspects of Digital Forensics
Authorization to collect the evidence, Authentication of the evidence, Performing RAID
Acquisition, Remote Network Data Acquisition Tools, Validating Forensic Data, Analysis
of the evidence, Reporting on the findings, Testimony, Writing Investing Reports.
Definition of Cyber Crime in IT Act, Structure of IT Act, Adjudications and Criminal
Provisions, Tampering with computer source documents and Hacking, Online Obscenity &
Pornography, CyberStalking, Theft of Identity, Cyber Defamation, Admissibility of Digital
Evidence.
Unit No 4 Mobile & Memory Forensics, Steganography Hours 9 4 AP
Collecting and Analyzing Evidence, analyzing other Storage Devices, Digital Camera
Forensics, Recovering and Reconstructing Deleted Data, Introduction to Steganography,
Steganography Background, Steganography Functions, Robustness and Cryptography,
Steganalysis, ImageSteganalysis, Digital Image and Audio- Audio Steganalysis, Video
Steganalysis, Tools for Steganography, Data Hiding, Data Hiding -Generic, Data Hiding and
Steganography, Alternate DataStream (ADS), Data Recovery, Reasons for Data Recovery,
Data recovery Chances, Data Recovery Technique, Data Loss prevention, Specific Do’s and
Don’ts in extracting data from Memory Knowledge and usage of special and general purpose
tools for Memory Forensics.
Unit No 5 Malware Analysis Hours 9 5 AP
Different types of malware, Analyzing Live Windows System for Malware, Analyzing Live
Linux System for Malware, Analyzing Physical and Process Memory Dumps for Malware,
Discovering and Extracting Malware from Windows Systems, Technical Analysis of malware
from Digital Forensics perspective, Discovering and Extracting Malware from Linux Systems,
Root kits and Root kit Detection and Recovery, Reverse Engineering Tools and Techniques,
Reversing and Fuzzing of malware from Digital Forensics perspective.

Textbooks
1 IT Network Security (IBM ICE Publication)

Reference Books / Journal Articles / Weblink

1 Certified Computer Hacking Forensic Investigator (CHFI), EC-Council Study Guide


2 Rohit Tamma, Oleg Skulkin, Heather Mahalik, SatishBommisetty. “Practical Mobile Forensics”, Third
Edition, Packt Publications
3 Monnappa K A, “Learning Malware Analysis” Packt Publications

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

BTECCE21708:: Digital Forensics Lab


Teaching Scheme Credits Examination Scheme
Lecture 0Hr./Week Lecture 0 CIE Marks 25
Tutorial --Hr./Week Tutorial - ESE Marks 25
Practical/Studio 2Hr./Week Practical/Studio 1 Total Marks 50
Total 2Hr./Week Total 1

List of Experiments

1 Forensics with Autopsy


2 Packet Capturing with Wireshark
3 Packet Analysis with TCPDUMP
4 Reviewing Network logs
5 Analysis using Sysinternals Analysis using Knoppix
6 Live Acquisition Forensics
7 Data Recovery with Runtime Software (www.runtime.org) and R-Tools Technologies
8 Investigating the Reverse DNS
9 Investigating the Web server Owner
10 Finding Information in Cookies
11 Examining Artifacts with E-mail Examiner
12 Examining Artifacts with EnCase
13 Examine E-mail Headers
14 Web browsing analysis using Pasco
15 Packet Capture using ProDiscover Investigator
16 Hard drive diagnostics using HDDScan
17 Data Restoration with Office FIX
18 Simple LSB Steganalysis (LSB extraction) for bitmap images

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

BTECCE21709:: Social, Web & Mobile Analytics

Course Type PEC Semester 7

Teaching Scheme Credits Examination Scheme


Lecture 3 Hr./Week Lecture 3 CIE Marks 50
Tutorial -- Hr./Week Tutorial - ESE Marks 50
Practical/Studio 0 Hr./Week Practical/Studio 0 Total Marks 100
Total 3 Hr./Week Total 3

Course Description

This course provides students with comprehensive knowledge about social media analytics. It covers the fundamentals of
creating blogs and analyzing traffic on blogs, websites, social media platforms, and mobile applications. Students will
learn to identify issues in mobile analytics and gain an understanding of email marketing, data functionalities, and web
and social media analytics.

Course Outcomes

CO No. Statement
1 Understand the basics of Social, Web, and Mobile Analytics.
2 Identify social media data & its collection.
3 Evaluate the performance of Web & social media.
4 Understand issues and challenges in Mobile Analytics.
5 Analyze Email marketing data functionalities.

Mapping of COs to POs and PSOs

CO POs PSOs BTL


No PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1 PSO1 PSO2 PSO3 PSO4
0 1 2
CO1 2 UN
CO2 2 AP
CO3 2 AN
CO4 3 AP
CO5 3 AN
Affinity Level: 1- Slight, 2- Moderate, 3-Substantial, BTL: Bloom’s Taxonomy Level
Course Content
Unit No 1 Introduction to Web & Social Analytics Hours 9 CO BTL
Overview of web & social media. Need of using analytics, Web analytics technical 1 UN
requirements. Social media environment, Impact of social media on business, how to leverage
social media for better services, current analytics platforms, Open source vs. licensed
platform, choosing right specifications & optimal solution.

Unit No 2 Relevant Data & its Collection Hours 9 2 AP


Participating with a people-centric approach, organizing for social media, choosing focused
Data sources & Social networks, collecting and understanding social media data, leverage
qualitative data by understanding what, why, and how much, usability alternatives, web-
BTECH LY Comp ,Pattern-2021
Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

enabled emerging user research, and online surveys.Understand the discipline of social
analytics, aligning social objectives with business goals, identify common social business
objectives, developing KPIs; Standard vs. Critical metrics. Bounce rate, exit rate, conversion
rate, engagement, strategically aligned KPIs, Tactics to find out best web and social media
metrics; Moving from strategy to execution, build scorecards & dashboards to track KPIs.
Measuring Macro & micro conversions, Quantify Economic value, measuring success for
non- ecommerce and B2B websites.
Unit No 3 Manage Web & social media with Analytics Hours 9 3 AN
Explore & evaluate - Dashboard, Relationships, Sentiments, Evolving Topics, Reports, Content
creation & tracking, Competitive Intelligence analysis, website traffic analysis, search & keyword
analysis, audience identification & segment analysis, optimizing social media strategy, Social media
enablement audit, Understand signals and potential. Mashing Up Data from Disparate Sources;
Integrate solutions to share outcomes with others.
Unit No 4 Mobile Analytics Hours 9 4 AP
Introduction: Web Analytics Vs Mobile Analytics, Social media Analytics Vs Mobile analytics,
need of mobile analytics, Basics of mobile computing – Smart phones, mobile browsers, Mobile
applications, Bandwidth, transactions, sessions, handset types & operating systems, mobile operators
& their services,
Mobile Customer Experience Management: Mobile as next customer experience frontier,
Customers’ expectations, business impact & criticality, Core metrics for deeper behavior analysis,
Mobile Analytics for Content Publishers & Operators: Mobile Handset Analysis, Mobile Handset
Screen Resolution - supported screen resolutions of mobile handsets browsing site in terms of page
views, visits and visitors, Mobile Operator Analysis - operator names and countries of subscribers
browsing your site in terms of page views, visits and visitors. The types of statistics & reports --
Bandwidth (total, average per visit, total per file type), Transactions (average per visit, number of
downloads, page view breakdown), Sessions (entry page, average duration, click paths, referring
search engine), Subscribers (browser type, user agent, operating system), Operating system (iOS,
Android, Blackberry, etc.), Mobile applications (YouTube, Facebook, Twitter, etc.), Content
categorization (Adult, Video, Social, Ad Networks, etc.), Handsets (make, model, screen resolution),
Mobile Operator (country of origin, operator name), Geo-Location.
Unit No 5 Email marketing Hours 9 5 AN
What is Emil Marketing? Is email marketing still important in the Current Year? Importance of Email
Marketing, How to start email marketing? How to launch your first email marketing campaign? How
to Automate Email Marketing? Logs of user’s email address, Cold callers report, Page views per
annum, Data recording timeframe, Data archiving timeframe, Historic comparison, Integration to
client platforms through API, HTTPS Support.

Textbooks
1 Social, Web and Mobile Analytics (IBM ICE Publication)
2 Dr. Saroj Kumar, Tripti Singh Chowdhury, “Social Media and Web Analytics”, Thakur Publication Pvt. Ltd.,
2022.

Reference Books / Journal Articles / Weblink


1 Julian Harty and Julian Harty, “The Mobile Analytics Playbook:A practical guide to better testing”, Jan.
2016.
2 Aditya Kumar, “Social Media & Web Analytics”, R. Narain & CO., ISBN: 978-93-88783-14-1.
3 Matthew Ganis and Avinash Kohirkar, “Social Media Analytics: Techniques and Insights for Extracting Business
Value out of Social Media”, Sept. 2016.
4 Wolfgang Beer, “Mobile App Analytics”, O'Reilly Media, Inc., ISBN: 9781491957059, Sept. 2016.

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

BTECCE21710:: Social, Web & Mobile Analytics Lab

Teaching Scheme Credits Examination Scheme


Lecture 0Hr./Week Lecture 0 CIE Marks 25
Tutorial --Hr./Week Tutorial - ESE Marks 25
Practical/Studio 2Hr./Week Practical/Studio 1 Total Marks 50
Total 2Hr./Week Total 1

List of Experiments

1 Extract and Analyze Web site data using free analytical tools. [BuzzSumo, AppRadar etc.]
2 Twitter mining.
3 Create your blog using free open-source CMS.
4 Web Analytics :a. Installation and Configuration of Google Analytics
b. To analyze website traffic using Google Analytics
c. Analyze the blog created in assignment 3 using any free analytical tool.
5 Create rules to filter to manage your mail using Gmail (send email to a label, archive, delete, star, or
automatically forward your mail, etc.)
6 Sentiment Analysis of a social networking site using free software.
7 Sentiment Analysis using any programming language.
8 Mobile Analytics using open-source software.
9 Analyze data of Mobile Applications using a programming language.

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

BTECCE21711:: Ethical Hacking and Penetration Testing

Course Type PEC Semester 7

Teaching Scheme Credits Examination Scheme


Lecture 3 Hr./Week Lecture 3 CIE Marks 50
Tutorial -- Hr./Week Tutorial - ESE Marks 50
Practical/Studio 0 Hr./Week Practical/Studio 0 Total Marks 100
Total 3 Hr./Week Total 3

Course Description

This course helps the student to gain the knowledge of Ethical Hacking from a vendor-neutral perspective.
Identifies vulnerability assessment and penetration testing methodology and techniques.Understand concepts
of VPN, Network Security Policy Design and Implementation and wireless network defense mechanisms

Course Outcomes

CO No. Statement
1 Able to identify vulnerabilities and weakness.
2 Able to perform penetration testing.
3 Able to perform wireless network attacks and vulnerabilities identification.
4 Able to perform firewall, IDS evasion.
5 Able to identify vulnerabilities and attacks in web servers.

Mapping of COs to POs and PSOs

CO POs PSOs BTL


No PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1 PSO1 PSO2 PSO3 PSO4
0 1 2
CO1 2 UN
CO2 2 AP
CO3 3 AP
CO4 3 AP
CO5 3 AN
Affinity Level: 1- Slight, 2- Moderate, 3-Substantial, BTL: Bloom’s Taxonomy Level

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

Course Content

Unit No 1 Introduction to Ethical Hacking Hours5 CO BTL


Information Security Threats and Attack Vectors, Hacking Concepts, Types, and Phases, 1 UN
Ethical Hacking Concepts and Scope, Vulnerability Assessment, Penetration Testing,
Information Security Laws and Standards. Foot printing Concepts, Overview of Network
Scanning, Scanning Methodology, Enumeration Concepts,NetBIOS Enumeration, SNMP
Enumeration, SMTP Enumeration, Enumeration Countermeasures
Unit No 2 Vulnerability Assessment and Penetration Testing (VAPT) Hours9
Vulnerability Assessment Concept, Vulnerability Assessment Life-Cycle, Vulnerability 2 AP
Scanning, CERT and potential threats for resources, Vulnerability scanners, Differences in
vulnerability scanning and penetration tests, Automated web application security scanner.
Setting Up a Web Application with Exploits: Introduction to web application with security
issues, identifying attack surface, Ability to identify vulnerability, planning the tools and
attacking the site, Identifying the logical vulnerability, Hacking demonstration and reporting
attacks and vulnerability.
Unit No 3 Malware Threats and Social Engineering Hours8 3 AP
Malware, Trojan, Viruses, Malware Reverse Engineering, Social Engineering Concepts,
Social Engineering Techniques, Impersonation on Social Networking Sites, Identity Theft
Session Hijacking: Session Hijacking Techniques, Types of Session Hijacking
Unit No 4 Evading IDS, Firewall and Honeypots Hours 5 4 AP
IDS, Firewall and Honeypot Concepts, Evading IDS, Evading Firewalls, IDS/Firewall
Evasion Counter-measures
Unit No 5 Hacking Web Servers and Wireless Network Penetration Hours8 5 AN
Testing
Web server Concepts: Web Server Security Issue, Open Source Web server Architecture,
Web server Attacks, Attack Methodology, Countermeasures Wireless Threats, Wi-Fi testing,
Wireless Hacking Methodology, Wireless Security Tools, Countermeasures.

Textbooks
1 IT Network Security (IBM ICE Publication).

Reference Books / Journal Articles / Weblink

1 Certified Ethical Hacking, EC-Council Study Guide.


2 Ninad Godbole, “Information Systems Security”, Wiley India Pvt. Ltd, ISBN -978-81-265-1692-6.
3 Mark Merkow, “Information Security-Principles and Practices”, Pearson Ed. 978-81-317-1288-7.
4 William Stallings, “CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE”,
FIFTH EDITION, PEARSON, 2011, ISBN 10:0-13-609704-9
5 BehrouzForouzan, “Cryptography and Network Security”, McGraw
6 https://github.com/patilkr?tab=repositories

BTECH LY Comp ,Pattern-2021


Vishwakarma University, Pune Issue 01: Rev No. 03 : Dt. 01/07/2022

BTECCE21712:: Ethical Hacking and Penetration Testing Lab

Teaching Scheme Credits Examination Scheme


Lecture 0Hr./Week Lecture 0 CIE Marks 25
Tutorial --Hr./Week Tutorial - ESE Marks 25
Practical/Studio 2Hr./Week Practical/Studio 1 Total Marks 50
Total 2Hr./Week Total 1

List of Experiments
1 Foot printing a target network
2 Network Scanning
3 Enumeration Tools
4 Social Engineering using Kali Linux
5 Vulnerability Scanning using Nessus Vulnerability Scanning Tool
6 Password Cracking
7 Hacking web Server/Web server auditing
8 Introduction to Burp Suite, Covering Tracks: Clearing Logs
9 Hacking Wi-Fi Protected Access Network
10 Evading IDS, Firewall and honeypots

BTECH LY Comp ,Pattern-2021

You might also like