Savitribai Phule Pune University Pune Choice Based Credit System
Savitribai Phule Pune University Pune Choice Based Credit System
For
B.Sc.
2. Introduction:
Digital and Cyber Forensics is a niche subject of modern studies which shall prepare
students for professional work in business and industry, as well as government and law
enforcement. Since Cybercrime has been on the rise in recent years, this course offers a
special impetus and an excellent launch pad for those who are interested in becoming
professionals’ crime-fighters with rewarding career options.
Digital infrastructures and information networks have become crucial in any business
activity. The information residing on these computers, networks, and in the cloud is a
critical asset and should be secured. The impact of data loss or any downtime of the
infrastructure is quite high. Hence, there is a need for heightened security measures to
protect both infrastructure and data. The student shall learn the techniques to collect,
preserve, analyze, and report digital evidence. It also opens a new avenue for research
opportunities into forensics and security issues.
In the information era, digital technologies have opened up immense possibilities for
economic and social change that is inclusive and sustainable. Designing and deploying
digital technologies, analyzing human-computer interaction or big data will produce
technological expertise as well as a nuanced understanding of the social, cultural, and
economic aspects of the digital society. Students will gain insights into the design of
digital technologies, and the policy challenges of deploying such technologies, with a
broad-based training that will draw from computer science, engineering, research
methods, management, economics and other social sciences, which will equip them
with a rigorous
The Program is of Three Years duration with six semesters. It is a Full-Time Degree
Program. The program will be based on the Choice-based credit system comprising 140
credit points.
3. Objectives:
To strengthen the basics of the subject useful in selecting various career options.
To make students aware of cybercrime and learn ways to handle them.
To produce entrepreneurs who can work in the area of Cyber and Digital
Forensics.
4. Eligibility:
• Higher secondary school certificate (10+2) or its equivalent examination withEnglish
OR
• Three-year diploma course from the board of technical education conducted by
Government of Maharashtra or its equivalent
OR
• Higher secondary school certificate (10+2) Examination with English and a
vocational subject of +2 level(MCVC)
PO No. PO Outcomes
Level:-5.0(Second Year)Sem:-IV
Level:-5.5(Third Year)Sem:-VI
Course Contents
Unit 1 C fundamentals 8 Lectures
History of ‘C’ language, Features of C, Structure of C Program, C Character Set, Identifiers and
Keywords, Variables and constants.
Data types- Basic data types, enumerated types, Type casting, Declarations, Expressions
Operators and Expressions Unary and Binary arithmetic operators, Increment Decrement
operators, Relational and logical operators, Bit wise operators, Assignment operators, Comma
operator, size of operator, Ternary conditional operator, Precedence and associatively.
Reference Books:
1. Computer Fundamentals by P.K. Sinha &Priti Sinha, 3rd edition, BPB pub.
2.Fundamental of Computers – By V. Rajaraman B.P.B. Publications
3. Computer Networks – By Tennenbum Tata MacGrow Hill Publication
4. How to solve it by Computer – R. G. Dromy
5. Introduction to algorithms – Cormen, Leiserson, Rivest, Stein
Course Objectives: -
To analyze fundamentals of the Linux operating system.
To analyses a problem and devise an algorithm to solve it.
Course Contents
Linux System Administration
Assignment 1: Introduction to Linux System Administration
1. Install a Linux distribution of your choice.
2. Explore and explain the file system hierarchy using basic shell Commands.
3. Create a new user and group, demonstrating user and group management.
Reference Books:
1. Linux System Administration, by Tom Adelstein, Bill Lubanovic, Released March
2007 Publisher(s): O'Reilly Media,ISBN: 9780596009526.
2. Pro Linux System Administration,by James Turnbull, Dennis Matotek,
PeterLieverdink,publisher(s): Apress, 2009,ISBN: 1430219130,9781430219132.
3. The Complete Guide to Linux System Administration by James S Walker, Released
December 1,2004
4. Publisher(s):Course Technology Inc,ISBN: 0619216166,9780619216160
Savitribai Phule Pune University
F.Y.B.Sc.(Cyber and Digital Science) Title:
Practical based on CDS 102MJ
Fundamentals of C Programming (CDS105MJP)
Examination
Teaching Scheme 4 No. of Credits 2 Scheme
hours / week CE: 15 marks
EE: 35 marks
Course Objectives: -
1. To analyze fundamentals of the Basic C Programming.
2. To learn flow chart and algorithms
3. To develop the basic concepts and terminology of programming in general.
Course Outcomes: - Student will be able to: -
1. Explore algorithmic approaches to problem solving
2. Develop modular programs using control structures and arrays in ‘C’.
Reference Books:
3. Write down the steps of creating a new file in Windows Operating System.
4. Write down the steps of creating a new file in Linux Operating System
5. Write down the steps for User Account and Group Management in Linux Operating System.
6. Write down the steps for User Account and Group Management in Windows Operating System.
7. Write down the steps to Hide the file and unhide the file in Windows Operating System.
11. Study about any five physical equipment used for networking.
15. Write the steps to Assigning IP address to the PC and Connect to the computer.
16. Write the steps to connect the computer in Local Area Network.
17. Write the steps How to connect a network printer in Windows.
18. Write the steps How to setting to Local Area Network proxy Server.
Reference Books:
Number of Credits: 2
Pre-requisites:
None
Objectives:
Discuss the rich heritage of mathematical temper of Ancient India
Promote joyful learning of HISTORY
Contents:
Total No Text
Unit No Unit Contents of Books
Lectures
1 Introduction and Overview of Ancient Science 5 T1
Outcomes:
With successful completion of this course, students will:
1. Improved critical thinking
2. New learning from Ancient India
Textbooks:
1. T.R.N. Rao, Subhash Kak, Computing in Ancient India, The Centre for Advanced
ComputerStudies, University of Southwestern Louisiana, 1998, ISBN 0 -9666512-0-0
Savitribai Phule Pune University
BSc(Cyber and Digital Science)
Skill Enhancement Course
SEC 101 CDS Fundamentals of Digital
Communication (Practical)
Prerequisite: Students are expected to know the concepts studied in following course:
1. Analogue and Digital Communication
2. Electronics Devices and circuits
3. Mobile communication
Course Objectives:
● To make the student familiar with electronic components
● To learn the steps in electronic circuits through simulation and hardware
implementation.
● To learn about various wireless & cellular communication networks.
● To make students familiar with mathematical interpretation related to the fundamentals
of analog and digital communication systems.
● To impart knowledge regarding concepts of AM, FM modulation and detection.
Course Outcomes:
● On completion of the course, students will be able to interpret and summarize the
specifications of different passive, active and Integrated components required to build
electronic circuits.
● To solve problems on Number systems and their representation
● To familiarize with logic gates and applications in combinational and sequential
circuits.
● To identify the importance of different blocks in electronic communication systems.
● Understand the working principles of mobile networks and Contrast different types of
telecommunication networks.
Title: SEC 101 CDS Fundamentals of Digital Communication
1. Difference between device and components, Different electronics measurement devices CRO ,
Function Generator, DMM and its functions.
Assignment :3 Study of Logic Gates (Verification of Truth tables)
1. Introduction, Logic Gates: AND, OR, NOT, NOR, NAND gates, symbols and their Truth tables.
Assignments :4 Study of Half Adder and Full Adder using Logic Gates.
1. Number Systems: Decimal, Binary, Octal, Hexadecimal, Binary Coded Decimal number,inter-
conversions.
Assignment :6 Study of read and write action of RAM
1. Introduction to memory, types Volatile , non volatile , RAM, ROM, Implementation of RAM
Assignment:7 Study of Amplitude Modulation
1. Elements of Communication system, Types of communication: simplex, half duplex, full duplex,
baseband and broadband, Serial communication: asynchronous and synchronous, Modulation
,types(AM)
Text Books:
1. Modern Digital and Analog Communication Systems, B.P. Lathi and Z. Ding (adapted by H. M.
Gupta) Oxford University Press 4th Edition.
2. Communication Systems, Simon Haykin, John Wiley and Sons, 4th Edition
3. Principles of Communication Systems, Herbut Taub, Donald L. Schilling and Goutam Saha, Tata
McGraw Hill, 4th Edition.
Reference Books:
1. Digital Communications: Fundamentals and Applications, Bernard Sklar, PHPTR NJ.
2. Analog and Digital Communication, T.L. Singal, McGraw Hill Education.
3. Modern Digital Electronics | 5th Edition. R P Jain
Semester -II
Savitribai Phule Pune University
F.Y.B.Sc.(Cyber and Digital Science)
Subject Code : CDS151MJ
Subject :Fundamentals of Cyber Security
Teaching Scheme No. of Credits 2 Examination Scheme
2 hours / week CE: 15 marks
EE: 35 marks
Prerequisites
1. Computers Basics
2. Basics of networking
Course Objectives: -
To prepare students with the technical knowledge and skills needed to protect and defend
computer systems and networks.
To develop students can identify the current Computer security and breaches
Course Outcomes: - Student will be able to: -
Analyze and evaluate the cyber security needs of an organization.
Measure the performance and troubleshoot cyber security systems.
To introduce the current cyber related activities
Course Contents
Chapter 1 Introduction to Cybersecurity 5 hours
Overview of Cybersecurity
Definition and significance of cyber
securityEvolution and historical context
of cyber security
Cyber Threat Landscape
Understanding the current threat landscape
Types of cyber threats: malware, phishing, ransomware, etc.
Key Principles of Cybersecurity
Confidentiality, integrity, availability (CIA
Triad)Defense-in-depth and layered security
Risk Management in Cybersecurity
Identifying and assessing cyber security
risks Strategies for risk mitigation and
management
Legal and Ethical Considerations
Overview of cyber security laws and
regulations Ethical responsibilities in
cybersecurity
Chapter 2 Basics of Networking and Security 8 hours
Networking Fundamentals
Introduction to networking
concepts Basics of TCP/IP and
network protocols
Common Network Attacks
Types of network attacks: eavesdropping, man-in-the-middle,
DoSReal-world examples and case studies
Network Security Technologies
Firewalls, intrusion detection/prevention systems
(IDS/IPS)Virtual Private Networks (VPNs) for secure
communication
Wireless Network Security
Risks associated with wireless networks
Securing Wi-Fi networks against unauthorized access
Securing Network Devices
Best practices for securing routers, switches, and other
devicesImplementing access controls and monitoring
Chapter 3 Operating System Security 8 hours
Basics of Operating System Security Key
security features in operating systems User
account management and access controls
Patch Management
Importance of software updates
Strategies for effective patch management
Antivirus and Anti-malware Protection
Role of antivirus software in
Cybersecurity Evaluating and selecting
antivirus solutions
Encryption and Secure Boot
Securing data through
encryption Ensuring a secure
boot process
Endpoint Security
Chapter 4 Web Security 5 hours
Web Application Security Basics
Common vulnerabilities in web
applicationsBest practices for secure
coding
Secure Web Browsing
Safe browsing habits and precautions
Recognizing and avoiding phishing
attacks
HTTPS and SSL/TLS
Importance of encrypted communication on the web
Configuring and implementing SSL/TLS for
websites
Web Security Tools and Testing
Introduction to web security tools (e.g., OWASP ZAP)
Conducting security assessments and penetration testing
Course Outcomes:
On completion of the course, student will be able to -
1. Devise algorithms, implement, test, debug and execute programs in the Python language.
2. Demonstrate Python programming skills for problems that require the writing of well
documented programs including use of the logical constructs of the language.
3. Apply the problem-solving skills using different data structures in Python.
4. Develop an application using functions, classes and built-in modules of Python.
Course Contents
Chapter 1 Fundamentals of Python Programming 6 hours
Introduction to Python
Features and Applications of Python
Comments, identifiers and reserved words in Python
Data types in Python, Data type conversion
Python print function and input function
Python operators (arithmetic, comparison, assignment, bitwise, logical,
Membership,identity), operator precedence
Indentation in Python
Conditional Statements, loop statements, control statements (break, continue, pass)
Assignment No 3:Study the following Network Devices in Detail and write their functions:
1. Repeater
2. Hub
3. \Switch
4. Bridge
5. Router
6. Gateway
Reference Books:
1. Behrouz A Forouzan, Cryptography and Network Security , McGraw-Hill Education, 2011
2. Network Security and Cryptography: Bernard Menezes, CENGAGE Learning
3. William Stallings, Network Security Essentials: Applications and Standards, Prentice HallIndia,
4th Edition
4. Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud” William Stallings
Publisher: Addison-Wesley 2015
5. William Stallings, Cryptography and Network Security: Principles and Standards, PrenticeHall
India, 3rd Edition, 2003
Savitribai Phule Pune University
F.Y. B.Sc.(Cyber and Digital Science)
Practical course based on CDS153MJ
Python Programming (CDS156 MJP)
Examination
Teaching Scheme 4 No. of Credits 2 Scheme
hours / week CE: 15 marks
EE: 35 marks
Course Contents
Course Objectives:
1. To define the structure and components of a Python program.
2. To learn how to use Lists, Tuples, Sets and Dictionaries in Python programs.
3. To design object oriented programs using classes in Python.
Course Outcomes:
On completion of the course, student will be able to -
1. Devise algorithms, implement, test, debug and execute programs in the Python language.
2. Apply the problem-solving skills using different data structures in Python.
3. Develop an application using functions, classes and built-in modules of Python.
Course Contents
Chapter 1 Data Condensation and Presentation of Data 7 hours
Raw data, variable, discrete variable, continuous variable, constant, attribute with
illustration. Classification, methods of classification.
Frequency Distribution - Discrete and Continuous frequency distribution.
Graphs & Diagrams - Histogram, Frequency polygon, Frequency curve, Pie-Diagram,
Bar Diagram, Multiple bar Diagram, Sub-divided bar diagram, Percentage bar diagram.
Construction of frequency distribution, diagrams and graphs using MS Excel/python.
Chapter 2 Measures of Central Tendency 8 hours
Concept and meaning of Measure of Central Tendency, Requirements of good Measure
of Central Tendency.
Arithmetic Mean (A.M) for discrete and continuous frequency distribution, Merits &
Demerits
Median for discrete and continuous frequency distribution, Merits & Demerits
Mode for discrete and continuous frequency distribution, Merits & Demerits
Empirical Relation between mean, median and mode.
Measures of central tendency using MS Excel/python.
Numerical Problems.
Chapter 3 Measures of Dispersion 7 hours
Concept and meaning of Measure of dispersion, Requirements of good Measure of dispersion.
Types of Measure of Dispersion- Absolute & Relative Measure dispersion
Range, Coefficient of Range
Standard Deviation (S.D.), Variance, Coefficient of Variation (C.V)
Measures of dispersion using MS Excel/Python
Numerical Problems
Course Contents
Chapter 1 Advanced Functions and Formulas 5 hours