Mid Sem Syllabus

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Silver Oak University

Silver Oak College of Engineering and Technology


B.Tech 5th Semester Computer Engineering Department - Cyber Security
Mid Semester Exam Syllabus (June 2024 - December 2024)
Subject Code Subject Name Syllabus Content
Unit-1 Basics of Java:
Features of Java, Byte Code and Java Virtual Machine, JDK, Data types, Operator, Control
Statements – If, else, nested if, if-else ladders, Switch, while, do-while, for, for-each, break,
continue.
Unit-2 Array and String:
Single and Multidimensional Array, String class, StringBuffer class, Operations on string,
Command line argument, Use of Wrapper Class.
Unit-3 Classes, Objects and Methods:
Class, Object, Object reference, Constructor, Constructor Overloading, Method Overloading,
Recursion, Passing and Returning object form Method, new operator, this and static keyword,
finalize () method, Access control, modifiers, Nested class, Inner class, Anonymous inner class,
Abstract class.
Unit-4 Inheritance and Interfaces:
Object Oriented Programming
1010073316 Use of Inheritance, Inheriting Data members and Methods, constructor in inheritance, Multilevel
with Java
Inheritance – method overriding Handle multilevel constructors – super keyword, Stop Inheritance
- Final keywords, Creation and Implementation of an interface, Interface reference, instance of
operator, Interface inheritance, Dynamic method dispatch, Understanding of Java Object Class,
Comparison between Abstract Class and interface, Understanding of System.out.println statement.
Unit-5 Package:
Use of Package, naming convention, user defined package, inbuilt package, CLASSPATH, Import
statement, Static import, Access control
Unit-6 Exception Handling:
Exception and Error, Use of try, catch, throw, throws and finally, Built in Exception, Custom
exception, Throwable Class
Unit-7 Multithreaded Programming:
Use of Multithread programming, Thread class and Runnable interface, Thread priority, Thread
synchronization, Thread communication, Deadlock
Basics of Algorithms , Mathematics and Analysis of Algorithm : What is an algorithm?,
Properties of Algorithm, Time and Space Complexity, detailed analysis of algorithm, Mathematics
for Algorithmic Sets, Functions and Relations, Vectors and Matrices, Linear Inequalities and
Linear Equations. The efficient algorithm, Average, Best and worst-case analysis, Amortized
analysis , Asymptotic Notations(Big-O, Big-Ω and Big-Ө Notations their Geometrical
Interpretation and Examples.), Recurrences: Recursive Algorithms and Recurrence Relations,
Solving Recurrences, Analyzing control statement, Loop invariant and the correctness of the
algorithm, Sorting Algorithms and analysis: Bubble sort, Selection sort, Insertion sort, Shell sort
Heap sort, Sorting in linear time: Bucket sort, Radix sort and Counting sort
Divide and Conquer Algorithm:
Introduction, Recurrence and different methods to solve recurrence, Multiplying large Integers
Problem, Problem Solving using divide and conquer algorithm - Binary Search, Max-Min
Analysis and Design of problem, Sorting (Merge Sort, Quick Sort), Matrix Multiplication, Exponential
1010043316
Algorithms Problem solving using Dynamic Programming and Greedy
Algorithm:
Dynamic Programming : Introduction, The Principle of Optimality, Problem Solving using
Dynamic Programming – Calculating the Binomial Coefficient, Making Change Problem,
Assembly LineScheduling, Knapsack problem, All Points Shortest path, Matrix chain
multiplication, Longest Common Subsequence.
Greedy Algorithm : General Characteristics of greedy algorithms, Problem solving using Greedy
Algorithm - Activity selection problem, Elements of Greedy Strategy, Minimum Spanning trees
(Kruskal’s algorithm, Prim’s algorithm), Graphs: Shortest paths, The Knapsack Problem, Job
Scheduling Problem, Huffman code
Exploring Graphs:
An introduction using graphs and games, Undirected Graph, Directed Graph, Traversing Graphs,
Depth First Search, Breath First Search, Topological sort, Connected components
Introduction to Cyber Crime Investigation & Cyber Forensics: Cyber Crime Investigation -
Cyber Warfare, Terrorism, Social Networking - Cyber Forensics and Incident Handling- Case
Study - Cyber Forensic Basics - Storage Fundamentals - File System Concepts

Investigating Real-World Cyber Crimes:


Investigating Social Media Profile Impersonation cases - Phishing Cases - Data Theft Cases -
Corporate Espionage Cases - Email Fraud Cases - Credit Card Fraud Cases - Cyber Pornography
Cyber Crime Investigation and
1010073317 Cases - Denial of Service Attacks Cases - Cyber defamation Cases
Digital Forensics
IT ACT, Offenses and Penalties:
Offenses under the Information and Technology Act 2000 - Penalty and adjudication -
Punishments for contraventions under the Information Technology Act 2000 (Case Laws, Rules
and recent judicial pronouncements to be discussed) -Limitations of Cyber Law
Data Recovery Tools, Process, and Ethics:
Gathering Evidence- Precautions, Preserving and safely handling original media for its
admissibility - Document a Chain of Custody and its importance
Introduction to forensics:
What are forensics? Evidence, types of evidence, proof, basic principles of forensics, securing
evidence, documentation, and Chain of custody.
Introduction to network forensics:
Wireshark, PCAP files, Network forensics investigation methodology, source of network
1010073318 Network and Mobile Forensics evidence,CAMtable, different types of logs,packet types
Introduction to mobile forensics:
Fundamentals of mobile devices and cellular network technologies, mobile forensics process
methods and techniques, collecting evidence
Performing network forensics and analysis:
Network intrusions and footprints, investigating ssh logs, web proxy logs,
Unit-1:INTRODUCTION TO SOFTWARE ENGINEERING:Software Engineering: A Layered
Technology, Process, Product and Process, Software Process Models, The Linear Sequential
Model, Spiral model, The RAD Model, Agile Process Model, Scrum, XP, Component- Based
Development
Unit-2:SOFTWARE REQUIREMENT MODELLING,SPECIFICATION AND DESIGN:
Understanding the Requirement, Requirement Modeling Requirement Specification (SRS),
Software Engineering & Requirement Engineering and its tasks, Design Concepts and Design Principal, basic of types of
1010043342
Methodology Design.
Unit-3:MANAGING SOFTWARE PROJECT:Introduction to Software Metrics (Process, Product
and Project Metrics), Software Project Estimations, Software Project Planning, Project Scheduling
& Tracking, Risk Analysis & Management (Risk Identification, Risk Projection, Risk Refinement,
Risk Mitigation).
Unit-4:SOFTWARE CODING & TESTING: Coding Standard and coding Guidelines, Code
Review

-s/d
Dr. Satvik Khara
HOD, CE

You might also like