LY COMP Syllabus Pattern 2021
LY COMP Syllabus Pattern 2021
Authority Date
Proposed by Board of Studies in Computer Engineering
Approved by Academic Council, Vishwakarma University, Pune
Issued by
Emerge as a Premier University Recognized Internationally for Excellence in Education, Research and
Innovation
VU-M4 To inculcate life skills and holistic culture appreciating morals and ethics
Excellence Transparency
Innovation Sustainability
Diversity Responsibility
Adaptability Compassion
To create an intellectual and academically rich environment for careers in Computing Education and Research
to fulfill global needs.
PO No. Statement
PO1 Apply the knowledge of engineering and science fundamentals to the solution of complex engineering
problems.
PO2 Identify, formulate and analyze complex engineering problems to create solutions using the
First principles of engineering sciences and mathematics.
PO3 Design solutions for design system components that meet the specified needs for the benefit of
society.
PO4 Apply research methods including design of experiments, analysis and interpretation of data,
And synthesis of the information to provide valid conclusions.
PO5 Create appropriate techniques and IT tools including prediction and modeling to complex
engineering activities with an understanding of the limitations.
PO6 Apply reasoning using contextual knowledge to assess the needs of society and understand
The responsibilities relevant to the professional engineering practice.
PO7 Understand the impact of professional engineering solutions as applied to the environment,
And demonstrate the knowledge for sustainable development.
PO8 Adopt ethical practices as applied to the professional world to execute responsibilities and adhere
to norms of the engineering profession.
PO9 Execute professional functions effectively as an individual, as well as a leader or member in
Diverse multidisciplinary teams.
PO10 Communicate effectively with the engineering community and with society in solving
complex problems in terms of being able to comprehend and write effective reports, make
Effective presentations, as well as execute and receive clear instructions.
PO11 Demonstrate an ability to lead projects and build cost models in an interdisciplinary professional
Setting
PO12 Develop learning mechanisms and inculcate the ability to prepare for lifelong learning in the context
of technological change.
PEO Number PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
PEO1 2 3 2 3 1 2 3 1 1 - - 2
PEO2 3 3 2 3 1 1 2 1 - 1 1 1
PEO3 2 2 2 2 3 1 3 1 - 1 - 2
PEO4 1 1 1 1 1 1 1 3 3 2 2 -
PEO5 2 2 2 2 1 1 1 1 1 - 2 1
Programme Structure
* Elective
BTECCE21701 *# Machine Learning
BTECCE21703 Internet of Things
** Elective Lab
BTECCE21702 *# Machine Learning Lab
BTECCE21704 Internet of Things Lab
# IBM Course 6 Elective
BTECCE21705 Big Data Analytics
BTECCE21707 Digital Forensics
## IBM Course 6 Elective Lab
BTECCE21706 Big Data Analytics Lab
BTECCE21708 Digital Forensics Lab
### IBM Course 7 Elective
BTECCE21709 Social, Web & Mobile Analytics
BTECCE21711 Ethical Hacking & Penetration Testing
#### IBM Course 7Elective Lab
BTECCE21710 Social, Web & Mobile Analytics Lab
BTECCE21712 Ethical Hacking & Penetration Testing Lab
SEM VII
Course Description
This course helps the student to identify the role of supervised, unsupervised and reinforcement algorithms. Illustrates
concept learning and decision tree learning algorithms and formulate research based problems based on Machine
learning techniques. Analyzes different algorithms used in machine learning as applied to generic datasets.
Course Outcomes
CO No. Statement
1 Demonstrate knowledge of supervised, unsupervised and reinforcement algorithms through
implementation for sustainable solutions of applications.
2 Evaluate different classification algorithms through implementation for sustainable solutions of
applications.
3 Apply different clustering algorithms used in machine learning to generic datasets and specific
multidisciplinary domains.
4 Analyze research based problems using neural networks and genetic algorithms.
5 Evaluation of different convolution neural network algorithms on well formulated problems along
with stating valid conclusions that the evaluation supports.
Course Content
Textbooks
List of Experiments
Course Description
This course will help students to learn the concepts of IoT and different applications in IoT.
Course Outcomes
CO No. Statement
1 Explain in a concise manner how the general Internet as well as IoT works.
2 Understand constraints and opportunities of wireless and mobile networks for Internet of Things.
3 Choose between available technologies and devices for stated IoT challenge.
4 Evaluation of IoT Security models
5 Analyze case studies of IoT systems
IoT Security: Vulnerabilities of IoT, Security Requirements, Challenges for Secure IoT, Threat
Modeling, Key elements of IoT Security: Identity establishment, Access control, Data and
message security, Non-repudiation and availability, Security model for IoT.
Unit No 5 Case Studies Hours 9 5 AN
Case Studies: Home Intrusion Detection, Weather Monitoring System, Connected Vehicles,
Smart Grid, Air Pollution Monitoring, Agriculture, Healthcare.
Textbooks
1 ArshdeepBahga, Vijay Madisett, “Internet of Things – A hands-on approach”, Universities Press, ISBN: 0:
0996025510, 13: 978-0996025515.
2 Honbo Zhou, “The Internet of Things in the Cloud: A Middleware Perspective”, CRC Press, 2012. ISBN:
9781439892992.
3 Dieter Uckelmann, Mark Harrison, Florian Michahelles, “Architecting the Internet of Things”, Springer,
2011. ISBN: 978-3-642-19156-5.
4 Lyla B. Das, “Embedded Systems: An Integrated Approach”, Pearson, ISBN: 9332511675,
9789332511675.
Course Description
This course helps the student to understand the Big Data Concepts, Stream Processing techniques. Highlights
on Hadoop fundamentals.
Course Outcomes
CO No. Statement
1 Understand challenges in Big Data processing
2 Design and Setup Hadoop cluster
3 Formulate Queries using Pig and Hive.
4 Understand big Data Access Technologies for Reporting and Analysis
5 Write Programs for Stream data Processing
Jaql basics, Jaql data types, Input/output with Jaql, working with operators and expressions, Use
of Pig & Hive.
Unit No 4 Hadoop Reporting and Analysis Approaches Hours9 4 AP
Big Data reporting and analysis, Big Data Access Technologies for Reporting and Analysis,
Business Intelligence and Hadoop Architecture, Direct Batch Reporting on Hadoop, Live
Exploration of Big Data, Indirect Batch Analysis on Hadoop.
Unit No 5 Analytics for Big Data at Rest & in Motion Hours 12 5 AN
Data Stream overview; Streams Processing Language Basics; Streams Processing Language
Development; SPL Programming Introduction; Adapter Operators; Relational and Utility
Operators - The Journey Begins. Relational and Utility Operators (continued); Windowing and
Joins; Punctuation, aggregation and Sorting; Timing and Coordination; Lists, Sets, and Maps;
Nodes and Partitions; Debugging; Adapters and Toolkits.
Textbooks
1 Hadoop: The Definitive Guide, 4th Edition, Publisher: O'Reilly Media, Inc., ISBN: 9781491901687
2 https://www.edureka.co/blog/mapreduce-tutorial/
List of Experiments
Course Description
This course helps the student to understand Ethical Hacking from a vendor-neutral perspective. Identifies
vulnerability assessment and penetration testing methodology and techniques. Focuses on concepts of VPN,
Network Security Policy Design and Implementation and wireless network defense mechanisms.
Course Outcomes
CO No. Statement
1 Understand general idea about computer forensics and risks involved in it.
2 Perform forensics and tracking at network and internet level.
3 Write and present investigation reports based on findings.
4 Perform forensics and tracking for mobile and various devices.
5 Understand ways for malware detection.
Tools, Live Acquisition of Network Traffic, Order of Volatility, Standard Procedure. Internet
& World wide web threats, Domain Name Ownership.Investigation, Reconstructing Past
Internet Activities and Events, Email Forensics: E-mail Analysis, Email Forensics: Email
Headers and Spoofing, Messenger Forensics: AOL, Yahoo, MSN, and Chats, Browser
Forensics: Analyzing Cache and Temporary Internet Files, Browser Forensics: Cookie Storage
and Analysis, Browser Forensics: Web Browsing Activity Reconstruction.
Unit No 3 Forensic Investigation, Evidence Presentation and Legal Hours 9 3 AP
aspects of Digital Forensics
Authorization to collect the evidence, Authentication of the evidence, Performing RAID
Acquisition, Remote Network Data Acquisition Tools, Validating Forensic Data, Analysis
of the evidence, Reporting on the findings, Testimony, Writing Investing Reports.
Definition of Cyber Crime in IT Act, Structure of IT Act, Adjudications and Criminal
Provisions, Tampering with computer source documents and Hacking, Online Obscenity &
Pornography, CyberStalking, Theft of Identity, Cyber Defamation, Admissibility of Digital
Evidence.
Unit No 4 Mobile & Memory Forensics, Steganography Hours 9 4 AP
Collecting and Analyzing Evidence, analyzing other Storage Devices, Digital Camera
Forensics, Recovering and Reconstructing Deleted Data, Introduction to Steganography,
Steganography Background, Steganography Functions, Robustness and Cryptography,
Steganalysis, ImageSteganalysis, Digital Image and Audio- Audio Steganalysis, Video
Steganalysis, Tools for Steganography, Data Hiding, Data Hiding -Generic, Data Hiding and
Steganography, Alternate DataStream (ADS), Data Recovery, Reasons for Data Recovery,
Data recovery Chances, Data Recovery Technique, Data Loss prevention, Specific Do’s and
Don’ts in extracting data from Memory Knowledge and usage of special and general purpose
tools for Memory Forensics.
Unit No 5 Malware Analysis Hours 9 5 AP
Different types of malware, Analyzing Live Windows System for Malware, Analyzing Live
Linux System for Malware, Analyzing Physical and Process Memory Dumps for Malware,
Discovering and Extracting Malware from Windows Systems, Technical Analysis of malware
from Digital Forensics perspective, Discovering and Extracting Malware from Linux Systems,
Root kits and Root kit Detection and Recovery, Reverse Engineering Tools and Techniques,
Reversing and Fuzzing of malware from Digital Forensics perspective.
Textbooks
1 IT Network Security (IBM ICE Publication)
List of Experiments
Course Description
This course provides students with comprehensive knowledge about social media analytics. It covers the fundamentals of
creating blogs and analyzing traffic on blogs, websites, social media platforms, and mobile applications. Students will
learn to identify issues in mobile analytics and gain an understanding of email marketing, data functionalities, and web
and social media analytics.
Course Outcomes
CO No. Statement
1 Understand the basics of Social, Web, and Mobile Analytics.
2 Identify social media data & its collection.
3 Evaluate the performance of Web & social media.
4 Understand issues and challenges in Mobile Analytics.
5 Analyze Email marketing data functionalities.
enabled emerging user research, and online surveys.Understand the discipline of social
analytics, aligning social objectives with business goals, identify common social business
objectives, developing KPIs; Standard vs. Critical metrics. Bounce rate, exit rate, conversion
rate, engagement, strategically aligned KPIs, Tactics to find out best web and social media
metrics; Moving from strategy to execution, build scorecards & dashboards to track KPIs.
Measuring Macro & micro conversions, Quantify Economic value, measuring success for
non- ecommerce and B2B websites.
Unit No 3 Manage Web & social media with Analytics Hours 9 3 AN
Explore & evaluate - Dashboard, Relationships, Sentiments, Evolving Topics, Reports, Content
creation & tracking, Competitive Intelligence analysis, website traffic analysis, search & keyword
analysis, audience identification & segment analysis, optimizing social media strategy, Social media
enablement audit, Understand signals and potential. Mashing Up Data from Disparate Sources;
Integrate solutions to share outcomes with others.
Unit No 4 Mobile Analytics Hours 9 4 AP
Introduction: Web Analytics Vs Mobile Analytics, Social media Analytics Vs Mobile analytics,
need of mobile analytics, Basics of mobile computing – Smart phones, mobile browsers, Mobile
applications, Bandwidth, transactions, sessions, handset types & operating systems, mobile operators
& their services,
Mobile Customer Experience Management: Mobile as next customer experience frontier,
Customers’ expectations, business impact & criticality, Core metrics for deeper behavior analysis,
Mobile Analytics for Content Publishers & Operators: Mobile Handset Analysis, Mobile Handset
Screen Resolution - supported screen resolutions of mobile handsets browsing site in terms of page
views, visits and visitors, Mobile Operator Analysis - operator names and countries of subscribers
browsing your site in terms of page views, visits and visitors. The types of statistics & reports --
Bandwidth (total, average per visit, total per file type), Transactions (average per visit, number of
downloads, page view breakdown), Sessions (entry page, average duration, click paths, referring
search engine), Subscribers (browser type, user agent, operating system), Operating system (iOS,
Android, Blackberry, etc.), Mobile applications (YouTube, Facebook, Twitter, etc.), Content
categorization (Adult, Video, Social, Ad Networks, etc.), Handsets (make, model, screen resolution),
Mobile Operator (country of origin, operator name), Geo-Location.
Unit No 5 Email marketing Hours 9 5 AN
What is Emil Marketing? Is email marketing still important in the Current Year? Importance of Email
Marketing, How to start email marketing? How to launch your first email marketing campaign? How
to Automate Email Marketing? Logs of user’s email address, Cold callers report, Page views per
annum, Data recording timeframe, Data archiving timeframe, Historic comparison, Integration to
client platforms through API, HTTPS Support.
Textbooks
1 Social, Web and Mobile Analytics (IBM ICE Publication)
2 Dr. Saroj Kumar, Tripti Singh Chowdhury, “Social Media and Web Analytics”, Thakur Publication Pvt. Ltd.,
2022.
List of Experiments
1 Extract and Analyze Web site data using free analytical tools. [BuzzSumo, AppRadar etc.]
2 Twitter mining.
3 Create your blog using free open-source CMS.
4 Web Analytics :a. Installation and Configuration of Google Analytics
b. To analyze website traffic using Google Analytics
c. Analyze the blog created in assignment 3 using any free analytical tool.
5 Create rules to filter to manage your mail using Gmail (send email to a label, archive, delete, star, or
automatically forward your mail, etc.)
6 Sentiment Analysis of a social networking site using free software.
7 Sentiment Analysis using any programming language.
8 Mobile Analytics using open-source software.
9 Analyze data of Mobile Applications using a programming language.
Course Description
This course helps the student to gain the knowledge of Ethical Hacking from a vendor-neutral perspective.
Identifies vulnerability assessment and penetration testing methodology and techniques.Understand concepts
of VPN, Network Security Policy Design and Implementation and wireless network defense mechanisms
Course Outcomes
CO No. Statement
1 Able to identify vulnerabilities and weakness.
2 Able to perform penetration testing.
3 Able to perform wireless network attacks and vulnerabilities identification.
4 Able to perform firewall, IDS evasion.
5 Able to identify vulnerabilities and attacks in web servers.
Course Content
Textbooks
1 IT Network Security (IBM ICE Publication).
List of Experiments
1 Foot printing a target network
2 Network Scanning
3 Enumeration Tools
4 Social Engineering using Kali Linux
5 Vulnerability Scanning using Nessus Vulnerability Scanning Tool
6 Password Cracking
7 Hacking web Server/Web server auditing
8 Introduction to Burp Suite, Covering Tracks: Clearing Logs
9 Hacking Wi-Fi Protected Access Network
10 Evading IDS, Firewall and honeypots