0% found this document useful (0 votes)
23 views16 pages

02 Architecture & Network SEM 2

The document outlines the scheme and syllabus for the (B.Sc. + M.Sc.) IT Integrated program in Architecture and Network Security at Gujarat University, effective from 2024. It details the courses offered in Semester 2, including LINUX ESSENTIALS, VULNERABILITY ASSESSMENT & PENETRATION TESTING, IT SECURITY, and SERVER OPERATING SYSTEM, along with their objectives, prerequisites, and content structure. The total credits for the semester amount to 22, with a focus on practical skills and knowledge in IT security and system administration.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views16 pages

02 Architecture & Network SEM 2

The document outlines the scheme and syllabus for the (B.Sc. + M.Sc.) IT Integrated program in Architecture and Network Security at Gujarat University, effective from 2024. It details the courses offered in Semester 2, including LINUX ESSENTIALS, VULNERABILITY ASSESSMENT & PENETRATION TESTING, IT SECURITY, and SERVER OPERATING SYSTEM, along with their objectives, prerequisites, and content structure. The total credits for the semester amount to 22, with a focus on practical skills and knowledge in IT security and system administration.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Department of Mobile Application &

Technologies
Gujarat University

(B.Sc. + M.Sc.) IT Integrated


Architecture and Network Security
(5 Years Integrated)

Scheme & Syllabus


Effective From: 2024
SCHEME FOR (B.Sc. + M.Sc.) IT
M.Sc. IT Architecture and Network Security
(5 Years Integrated) COURSE

STRUCTURE FOR SEMESTER - 2


M.Sc. IT Architecture and Network Security
(5 Years Integrated)
GUJARAT UNIVERSITY
AS PER NEP 2024 - 2025
COURSE: M.Sc. IT Architecture and Network Security
MAJOR:
MINOR:
SEMESTER - 2
MAJOR
CODE COURSE CREDITS
DSC-C-ANS-121P LINUX ESSENTIALS 4

DSC-C-ANS-122P VULNERABILITY ASSESSMENT & PENETRATION TESTING 4


MINOR
CODE COURSE CREDITS
DSC-M-ANS-123T IT SECURITY 4
INTER DISCIPLINARY / MULTI DISCIPLINARY
CODE COURSE CREDITS
MDC-ANS-124P SERVER OPERATING SYSTEM 4
ABILITY ENHANCEMENT COURSE
CODE COURSE CREDITS
AEC-ENG-125 LANGUAGE AND LITERATURE-II 2
SKILL ENHANCEMENT COURSE (ANY ONE COURSE)
CODE COURSE CREDITS
SEC-126 IT PROGRAMING – II 2
COMMON VALUE ADDED COURSES
CODE COURSE CREDITS
127-A A ENVIROMENTAL STUDIES 2
TOTAL CREDITS 22
Course Name: LINUX ESSENTIALS
Course Code: DSC-C-ANS-121P
Credits: 4
Objective:
Students will be able to create effective shell scripts by applying the ideas of filters and
special commands found in the Linux operating system. Additionally, it provides information
on communication orders and process management.

Prerequisites: NIL
Contents at Glance:
No. Particulars Credit Tim
s e
1. Unit 1: Introduction to Linux Operating system 01 10
Hrs.
Unix Architecture, Features of Unix, Command
structure, General Purpose Utilities: Cal, date, echo,
bc, who, uname, tty, man, passwd, wc, Linux Files and
Directories: Files and its types, Unix file system,
absolute and relative file pathnames, Installing a new
virtual machine, Introduction to various Linux shells
and distributions.

2. Unit 2: Linux Files and Directories 01 10


Hrs.
Current Working Directory-pwd, Navigating the file
system-cd command, HOME variable and Home
directory, Listing Files and Directories-ls with
options, Methods to create a file- touch, cat, Showing
the contents of a file-cat, more, less, Creating
Directories-mkdir, Removing Empty Directories-
rmdir, Copying Files and Directories-cp, Removing
Files and Nonempty Directories-rm, Renaming Files
and Directories-mv.

3. Unit 3: Basics of Shell Scripting Programming 01 10


Hrs.
Interactive shell script using read and echo; Decision
Statements: if then fi, if then else fi, if then elif else
fi, case esac; Test command; Logical Operators;
Looping statements: for loop, while loop, until loop;
Break, continue command; expr, Positional
parameters and shift operator.

4. Unit 4: File permissions and Filters 01 10


Hrs.
File Permissions, changing file permissions-chmod,
Absolute and Relative file permissions, Directory
permissions, File ownership and changing file
ownership, Locating files-find. Escaping, quoting,
Piping, Redirection, tee, matching file names with
patterns (wildcard characters). Simple Filters:
Paginating files –pr, Comparing Two Files-cmp,
what is Common-comm, Converting One File to
Other-diff, head, tail, splitting a file vertically–cut,
pasting files-paste, ordering a file-sort, locate
repeated and non-repeated lines-uniq, Translating
characters–tr.

References books:
 The Complete Reference: Linux by Richard Peterson
 Linux Pocket Guide by Daniel Barrett
 Linux Bible publication Wiley by Christopher Negus Publisher

Accomplishments of the student after completing the Course:


Course Name: VULNERABILITY ASSESSMENT & PENETRATION
TESTING
Course Code: DSC-C-ANS-122P
Objective:
The students shall have hand on experience on various tools & techniques of vulnerability
assessment & penetration testing used in Linux and shall pursue a career in penetration testing
domain.

Prerequisites: NIL
Contents at Glance:
No. Particulars Credits Time
1. Unit 1: Introduction to VAPT 01 10
Hrs.
Overview of VAPT

 Definition, objectives, and importance


 Difference between vulnerability assessment and
penetration testing
 Types of penetration testing
 Tools and techniques used in penetration testing

Understanding Cyber security Basics

 Types of cyber threats and attacks


 Security vulnerabilities and their impact
 CIA Triad (Confidentiality, Integrity, Availability)

2. Unit 2: Network Scanning with Nmap and Zenmap 01 10


Scanning Techniques Hrs.

Understanding the Command Syntax

 Structure of Nmap commands.


 Nmap and live scanning on ports and networks
 Netcat usage on TCP/UDP ports

Basic Scanning

 Host discovery (-sn, ping scans).


 Port scanning (-sS, -sT, -sU).
 Service version detection (-sV).

Zenmap Basics

 GUI walkthrough.
 Executing basic scans using Zenmap.

3. Unit 3: Wireshark in Penetration Testing 01 10


Hrs.
What is Wireshark?

 Overview of Wireshark.
 Use cases in network analysis and penetration testing.
 Installing Wireshark on Windows, Linux, and macOS.
 Configuring permissions for packet capturing.

Capturing Network Traffic

 Selecting network interfaces.


 Starting and stopping packet captures.

Capturing Sensitive Data

 Identifying unencrypted traffic.


 Extracting credentials from HTTP, FTP, and Telnet
sessions.

Analyzing Malicious Traffic

 Detecting port scans, DDoS attacks, and malware


communications.
 Recognizing patterns in phishing attempts.

4. Unit 4: Vulnerability Assessment (VA) 01 10


Hrs.
Understanding Vulnerabilities

 Common types (SQL injection, XSS, CSRF, buffer


overflow, etc.)
 Vulnerability life cycle

Tools for Vulnerability Scanning

 Overview of popular tools (Nessus, Qualys, OpenVAS,


etc.)
 Vulnerability scanning with Nessus
 Web application assessment with nikto & burp suite
 Vulnerability analysis with Metasploit framework
 Configuration and usage
 Interpreting scan results

References books:
 The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws" Authors:
Dafydd Stuttard and Marcus Pinto Publisher: Wiley ISBN-13: 978-1118026472
 "Penetration Testing: A Hands-On Introduction to Hacking" by Georgia Weidman.
 "Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and
Security Scanning" by Gordon Fyodor Lyon

Accomplishments of the student after completing the Course:


After completing the Vulnerability Assessment and Penetration Testing subject, the student will be
able to effectively identify, analyze, and mitigate security vulnerabilities, conduct ethical penetration
testing to evaluate system defenses, utilize advanced tools such as Nmap, Wireshark, and Metasploit,
and implement best practices to enhance organizational cybersecurity while adhering to legal and
ethical standards.
Course Name: IT SECURITY
Course Code: DSC-M-ANS-123T

Objective:
At the end of the subject students will be able to install and configure systems to secure
applications, networks, and devices; perform threat analysis and respond with appropriate
mitigation techniques; participate in risk mitigation activities; and operate with an awareness of
applicable policies, laws, and regulations. The successful candidate will perform these tasks to
support the principles of confidentiality, integrity, and availability

Prerequisites: Students must have the knowledge of basic networking concepts, protocols,
monitoring the network traffic and various security model understanding.

Contents at Glance:
No. Particulars Credits Time
1. Unit 1: Fundamentals of IT Security and 01 10
Cryptography Hrs.
 What is IT security, CIA property of security, what is threat?
What is bug? What is vulnerability? Basics of security, types
of attacks, authentication and authorization, basics of hash,
authentication mechanism, digital signature and certificate,
what is cryptography

2. Unit 2: Risk Management and Secure Network 01 10


Architecture Hrs.
 What is risk, Computing Risk assessment, Risk Associated
with cloud computing and virtualization, Deploying policy,
Standards and guidelines, Secure network architecture
concept, Secure system design, network designing with
security in mind (Firewalls, VPNs, Intrusion detection
system, router, switch, proxy, load balancer, access point,
NAC, Mail gateway, Security information and event
management, data loss prevention, SSL, Hardware security
module)

3. Unit 3: Network Tools, Security Issues, and Secure 01 10


Programming Hrs.
 Using tools to access network, Troubleshooting common
security issues, security technologies, identity and access
management concept, install and configure identity and
access services, file and database and security, wireless
vulnerability, wireless attacks analogy, working with cloud
computing, working with virtualization, security and cloud,
host, data and application security, use of open source
intelligence, types of vulnerabilities, application
vulnerabilities, secure programming, code issues
4. Unit 4: Modern Cryptography and Security 01 10
Practices Hrs.
 Modern cryptography, using cryptographic system,
understanding cryptographic standards and protocol, Public
key infrastructure, Authentication, viruses, malware and
crypto-malware, types of application/services attacks,
Understanding social engineering, understanding physical
security, control types, data security and privacy practice,
security administration of different connection types, account
management concept, Disaster recovery and incident
response.

References books:
 Fundamentals of Cyber Security and Laws By, Bali Sharma
 Information Security Management By, Harold Tripton
 Cyber Security By, John G. Voeller Willy Publication
 Cryptography and information security By pachghare, v. K. Phi publication

Accomplishments of the student after completing the Course:


Course Name: SERVER OPERATING SYSTEM
Course Code: MDC-ANS-124P

Objective:
To equip students with a comprehensive understanding of Linux fundamentals, system
administration, network services, security, advanced server configurations, and troubleshooting
techniques. The course aims to develop proficiency in managing Linux-based systems,
configuring network services, implementing security protocols, and resolving system issues to
prepare learners for real-world IT infrastructure and system administration roles.

Prerequisites: Basic knowledge of computer systems, operating systems, and networking


concepts is required. Familiarity with command-line interfaces and an interest in system
administration and network management will be beneficial. Prior exposure to scripting or
programming and a willingness to work with Linux environments and virtualization tools are
recommended.

Contents at Glance:
No. Particulars Credits Time
1. Unit 1: Fundamentals of Linux: 01 10

 Introduction of Linux, Installation of RHEL-7 in VMWARE. Hrs.


Basic command of Linux, running command & getting help,
File system, user administration, Standard I/O PIPE VIM:
editor, create user & group, Manage user & group

2. Unit 2: Administration of Linux 01 10

 Linux Permission, Suid, sgid, sticky bit, mask, user Hrs.


administration, Textprocessingtools, services management,
Networking in RHEL7, ssh, scp, sftp, creating partition in
RHEL7 ftab, LVM, creating swap partition, Schedule task at,
cron tab & find command, RPM. ACL in RHEL7, process
in RHEL7

3. Unit 3: Network Services & Security 01 10

 Password break, Basic of Linux, IP tables, Firewall, ACL, Hrs.


Booting process, sudo, chattar command, Firewall rules,
SElinux mode, SElinux security, SELinux policy, SElinux
port base security

4. Unit 4: Advance Network Services & server 01 10


configuration and Troubleshooting Hrs.
 RPM basic, yum server, Basic of File server NFS server,
HTTP server, wcbserver using port no., Samba server, VNC
server/viewer, Link, lpv6, DHCP server, Scope option,
 Reservation of IP Address using MAC, Forward lookup
one, Reverse looks up zone, DNS server, FTP server,
authentication. Introduction to the Boot Procedure,
Configuring Booting with GRUB, Using the GRUB
command line, Reinstalling GRUB, Common Kernel
Management Tasks, Loading & Unloading Kernel Modules,
Booting in Minimal Mode, Resetting the root Password
Using a Rescue Environment to Recover System Access

References books:
 RHCSA/RHCE Red Hat Linux Certification Study Guide
 Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7(by Sander van
Vugt (Author)
 Red Hat Enterprise Linux 7: Desktops and Administration

Accomplishments of the student after completing the Course:


Course Name: Literature and Language - II
Course Code: AEC-ENG-125

Objective:
To acquaint the students with the types of sentences and the use of articles and the question tags.
To familiarize the students with the English syntax to form correct sentences in English. To train
the students to use appropriate words and expressions in the given context.

Pre-requisite:
The students must possess a basic understanding of English grammar and the ability to use the
language correctly and appropriately in different contexts.

Course Outcomes:
The students will be able to use articles, question tags and types of sentences appropriately to
communicate in English in everyday situations. The students will be able to identify errors in English
sentence structures and use appropriate words and expressions depending upon the context.

Contents at Glance:
No. Particulars Credits Time
1. Unit 1: Macmillan Publication 01 15

 Text: Sparkles Hrs.


 (Macmillan Publication)
 Section – II Unit-1:
 Prose and Poetry

2. Unit 2: GRAMMAR 01 15

 A) Articles Hrs.
 B) Types of Sentences
 C) Question Tags

References books:
 Oxford Practice Grammar (Advanced) - George Yule – OUP
 Advanced Grammar in Use - Martin Hewings - Cambridge University Press
 English Grammar for Students - Anne Seaton and Y H Mew - Learner’s Publishing
 A Practical English Grammar - A J Thomson and A V Martinet – OUP
 Better English - Betty Kirkpatrick - Geddes and Grosset
 Contemporary English Grammar Structures and Composition - David Green - Trinity
Press
 Success with Grammar and Composition - K R Narayanaswamy - Orient Longman
Accomplishments of the student after completing the Course:
Course Name: WEB DEVELOPMENT
Course Code: SEC-WDV-126

Objective:
At the end of the course, the student will be able
CO1: This course provides an introduction to the fundamental concepts of web development.
CO2: Participants will learn the basics of front-end and back-end development,
.

Prerequisites:
Contents at Glance:
No. Particulars Credits Time
1. Unit 1: Understanding Front-End Development 01 10

 Structure of HTML documents Hrs.


 Styling with CSS: selectors, properties, and layout
 Media queries for responsive design
 Introduction to popular CSS frameworks (Bootstrap)

2. Unit 2: Introduction to Back-End Development 01 10

 Basics of JavaScript: variables, data types, control structures Hrs.


 Basics of server-side scripting (PHP)
 Handling user input and form submissions
 Basics of database management systems
 Connecting to databases from the server side

References books:
 "Web Development and Design Foundations with HTML5" by Terry FelkeMorris,
9th Edition, Pearson

Accomplishments of the student after completing the Course:


After completion of this course, students will be able to:
 Create and style static web pages using HTML and CSS
 Implement responsive design principles
 Use JavaScript for interactive front-end development
 Develop basic server-side scripts to handle user input
 Connect to and interact with databases for data storage
Course Name: ENVIROMENTAL STUDIES
Course Code: 127-A

Objective:
Demonstrate mastery of core ecological and physical science concepts and methods as they
pertain to environmental problem-solving. Demonstrate mastery of core social science concepts
and methods as they pertain to environmental problem-solving. Recognize and integrate the
international, cross-cultural, and transdisciplinary nature of environmental problems in analyses
and solutions. Produce a culminating/multi-scale piece of work demonstrating the ability to
synthesize concepts and methods to make a contribution to environmental solutions. Apply
proficiency in analytical methods, critical thinking, communication, and leadership skills
sufficient to make a contribution in environmental and related fields.

Pre-requisite:
12th Pass

Course Outcomes:
The students will be able to understand the critical environmental concerns as well as enable them to
cope with related developmental needs. The course on Environmental Studies reinforces this basic
education needs for integrating ecological values of development with curricular environmental
education.

Contents at Glance:
No. Particulars Credits Time
1. Unit 1: Environment 01 15

 Environment – An Introduction, Our Environment, Linkages Hrs.


in Nature, Biomes of the Worlds, Communities in Nature
 Environment and Conservation Ethics -Conservation through
Ages, Environmental Parameters and Tourism, Indian
Philosophy and Environment

2. Unit 2: Environmental Issues and Tourism 01 15


Development Hrs.
 Environment and Development, Concepts and Development,
Responsible Tourism- Benefits
 Environment, Community and Tourism- Access,
Infrastructure and Land Use- Basic Issues, Community and
Regional Assets, Multiplier Effect: Benefits and
Consequences.
 Tourism as a Tool for Conservation- Practice and Potential,
Site and Locational Planning , Regional Planning ,
Alternatives
References books:
 Environmental Science: Toward A Sustainable Future by Dorothy F. Bourse and
Richard T. Wright
 Social Learning in Environmental Management: Towards a Sustainable Future by
Meg Keen, Valerie A. Brown, Rob Dyball
 Principles of Environmental Science by William P. Cunningham and Mary Ann
Cunningham
 Visualizing Environmental Science by Linda R. Berg, Mary Catherine Hager and
David M. Hassenzahl
 Environmental Studies From Crisis to Cure by R. Rajagopalan
 Environmental Science: Systems and Solutions by Michael L. McKinney, Robert M.
Schoch, Logan Yonavjack and Grant A. Mincy
 Environmental Science: A Global Concern by William P. Cunningham and Mary
Ann Cunningham

Accomplishments of the student after completing the Course:

You might also like