B.Tech 5th Semester Computer Engineering Department - Cyber Security Mid Semester Exam Syllabus (June 2024 - December 2024) Subject Code Subject Name Syllabus Content Unit-1 Basics of Java: Features of Java, Byte Code and Java Virtual Machine, JDK, Data types, Operator, Control Statements – If, else, nested if, if-else ladders, Switch, while, do-while, for, for-each, break, continue. Unit-2 Array and String: Single and Multidimensional Array, String class, StringBuffer class, Operations on string, Command line argument, Use of Wrapper Class. Unit-3 Classes, Objects and Methods: Class, Object, Object reference, Constructor, Constructor Overloading, Method Overloading, Recursion, Passing and Returning object form Method, new operator, this and static keyword, finalize () method, Access control, modifiers, Nested class, Inner class, Anonymous inner class, Abstract class. Unit-4 Inheritance and Interfaces: Object Oriented Programming 1010073316 Use of Inheritance, Inheriting Data members and Methods, constructor in inheritance, Multilevel with Java Inheritance – method overriding Handle multilevel constructors – super keyword, Stop Inheritance - Final keywords, Creation and Implementation of an interface, Interface reference, instance of operator, Interface inheritance, Dynamic method dispatch, Understanding of Java Object Class, Comparison between Abstract Class and interface, Understanding of System.out.println statement. Unit-5 Package: Use of Package, naming convention, user defined package, inbuilt package, CLASSPATH, Import statement, Static import, Access control Unit-6 Exception Handling: Exception and Error, Use of try, catch, throw, throws and finally, Built in Exception, Custom exception, Throwable Class Unit-7 Multithreaded Programming: Use of Multithread programming, Thread class and Runnable interface, Thread priority, Thread synchronization, Thread communication, Deadlock Basics of Algorithms , Mathematics and Analysis of Algorithm : What is an algorithm?, Properties of Algorithm, Time and Space Complexity, detailed analysis of algorithm, Mathematics for Algorithmic Sets, Functions and Relations, Vectors and Matrices, Linear Inequalities and Linear Equations. The efficient algorithm, Average, Best and worst-case analysis, Amortized analysis , Asymptotic Notations(Big-O, Big-Ω and Big-Ө Notations their Geometrical Interpretation and Examples.), Recurrences: Recursive Algorithms and Recurrence Relations, Solving Recurrences, Analyzing control statement, Loop invariant and the correctness of the algorithm, Sorting Algorithms and analysis: Bubble sort, Selection sort, Insertion sort, Shell sort Heap sort, Sorting in linear time: Bucket sort, Radix sort and Counting sort Divide and Conquer Algorithm: Introduction, Recurrence and different methods to solve recurrence, Multiplying large Integers Problem, Problem Solving using divide and conquer algorithm - Binary Search, Max-Min Analysis and Design of problem, Sorting (Merge Sort, Quick Sort), Matrix Multiplication, Exponential 1010043316 Algorithms Problem solving using Dynamic Programming and Greedy Algorithm: Dynamic Programming : Introduction, The Principle of Optimality, Problem Solving using Dynamic Programming – Calculating the Binomial Coefficient, Making Change Problem, Assembly LineScheduling, Knapsack problem, All Points Shortest path, Matrix chain multiplication, Longest Common Subsequence. Greedy Algorithm : General Characteristics of greedy algorithms, Problem solving using Greedy Algorithm - Activity selection problem, Elements of Greedy Strategy, Minimum Spanning trees (Kruskal’s algorithm, Prim’s algorithm), Graphs: Shortest paths, The Knapsack Problem, Job Scheduling Problem, Huffman code Exploring Graphs: An introduction using graphs and games, Undirected Graph, Directed Graph, Traversing Graphs, Depth First Search, Breath First Search, Topological sort, Connected components Introduction to Cyber Crime Investigation & Cyber Forensics: Cyber Crime Investigation - Cyber Warfare, Terrorism, Social Networking - Cyber Forensics and Incident Handling- Case Study - Cyber Forensic Basics - Storage Fundamentals - File System Concepts
Investigating Real-World Cyber Crimes:
Investigating Social Media Profile Impersonation cases - Phishing Cases - Data Theft Cases - Corporate Espionage Cases - Email Fraud Cases - Credit Card Fraud Cases - Cyber Pornography Cyber Crime Investigation and 1010073317 Cases - Denial of Service Attacks Cases - Cyber defamation Cases Digital Forensics IT ACT, Offenses and Penalties: Offenses under the Information and Technology Act 2000 - Penalty and adjudication - Punishments for contraventions under the Information Technology Act 2000 (Case Laws, Rules and recent judicial pronouncements to be discussed) -Limitations of Cyber Law Data Recovery Tools, Process, and Ethics: Gathering Evidence- Precautions, Preserving and safely handling original media for its admissibility - Document a Chain of Custody and its importance Introduction to forensics: What are forensics? Evidence, types of evidence, proof, basic principles of forensics, securing evidence, documentation, and Chain of custody. Introduction to network forensics: Wireshark, PCAP files, Network forensics investigation methodology, source of network 1010073318 Network and Mobile Forensics evidence,CAMtable, different types of logs,packet types Introduction to mobile forensics: Fundamentals of mobile devices and cellular network technologies, mobile forensics process methods and techniques, collecting evidence Performing network forensics and analysis: Network intrusions and footprints, investigating ssh logs, web proxy logs, Unit-1:INTRODUCTION TO SOFTWARE ENGINEERING:Software Engineering: A Layered Technology, Process, Product and Process, Software Process Models, The Linear Sequential Model, Spiral model, The RAD Model, Agile Process Model, Scrum, XP, Component- Based Development Unit-2:SOFTWARE REQUIREMENT MODELLING,SPECIFICATION AND DESIGN: Understanding the Requirement, Requirement Modeling Requirement Specification (SRS), Software Engineering & Requirement Engineering and its tasks, Design Concepts and Design Principal, basic of types of 1010043342 Methodology Design. Unit-3:MANAGING SOFTWARE PROJECT:Introduction to Software Metrics (Process, Product and Project Metrics), Software Project Estimations, Software Project Planning, Project Scheduling & Tracking, Risk Analysis & Management (Risk Identification, Risk Projection, Risk Refinement, Risk Mitigation). Unit-4:SOFTWARE CODING & TESTING: Coding Standard and coding Guidelines, Code Review
DATA MINING and MACHINE LEARNING. PREDICTIVE TECHNIQUES: ENSEMBLE METHODS, BOOSTING, BAGGING, RANDOM FOREST, DECISION TREES and REGRESSION TREES.: Examples with MATLAB