M.tech CyS Syllabus - Complete
M.tech CyS Syllabus - Complete
Eligibility: B.E. / B. Tech. (CSE/ IT/ Software Engg./ Computer Engg./ Software
Systems/ Information Security/ Cyber Security/ Computational Engg./ Machine learning)
with atleast 50% (45% in case of candidate belonging to reserved category).
SEMESTER - 1
Sem Course Code Course Name L T P Hrs Internal External Total Credits
Mathematical
1 MTCy-101-20 Foundations of 3 0 0 3 40 60 100 3
Computer Science
Advanced Data
1 MTCy-102-20 3 0 0 3 40 60 100 3
Structures
1 MTCy-PE * Program Elective – 1 3 0 0 3 40 60 100 3
1 MTCy-PE ** Program Elective – 2 3 0 0 3 40 60 100 3
Advanced Data
1 MTCy-111-20 0 0 4 4 60 40 100 2
Structures LAB
1 MTCy-112-20 Elective based LAB 0 0 4 4 60 40 100 2
Research
1 MTEC-RM1-20 Methodology and 2 0 0 2 40 60 100 2
IPR
1 MTEC-AU1-20 Audit Course 1 0 0 0 0 40 60 100 0
Total 14 0 8 22 360 440 800 18
SEMESTER - 2
Sem Course Code Course Name L T P Hrs Internal External Total Credits
SEMESTER-3
Sem Course Code Course Name L T P Hrs Internal External Total Credits
OPEN ELECTIVES:
MTAI-OE1-18 Cost Management of Engineering Projects
MTAI-OE2-18 Business Analytics
MTAI-OE3-18 Industrial Safety
MTAI-OE4-18 Operations Research
MTAI-OE5-18 Composite Materials
MTAI-OE6-18 Waste to Energy
AUDIT COURSES I & II
MTA101-18 English for Research Paper Writing
MTA102-18 Disaster Management
MTA103-18 Sanskrit for Technical Knowledge
MTA104-18 Value Education
MTA105-18 Constitution of India
I. K. Gujral Punjab Technical University, Jalandhar
MTA106-18 Pedagogy Studies
MTA107-18 Stress Management by Yoga
MTA108-18 Personality Development through Life Enlightenment Skills
FIRST SEMESTER
M. Tech (Cyber Security)
COURSE OBJECTIVE
To understand the mathematical fundamentals that is prerequisites for a variety of courses like
Data mining, Network protocols, analysis of Web traffic, Computer security, Software
engineering, Computer architecture, operating systems, distributed systems, Bioinformatics,
Machine learning.
To develop the understanding of the mathematical and logical basis to many modern techniques
in in for technology like machine learning, programming language design, and concurrency.
To study various sampling and classification problems.
COURSE OUTCOMES
Syllabus Contents:
Unit 1:
Probability mass, density, and cumulative distribution functions, Parametric families of distributions,
Expected value, variance, conditional expectation, Applications of the univariate and multivariate
Central Limit Theorem, Probabilistic inequalities, Markov chains
I. K. Gujral Punjab Technical University, Jalandhar
Unit 2:
Unit 3:
Unit 4:
Graph Theory: Isomorphism, Planar graphs, graph colouring, hamilton circuits and euler cycles.
Permutations and Combinations with and without repetition. Specialized techniques to solve
combinatorial enumeration problems.
Unit 5:
Computer science and engineering applications Data mining, Network protocols, analysis of Web
traffic, Computer security, Software engineering, Computer architecture, operating systems,
distributed systems, Bioinformatics, Machine learning.
Unit 6:
Recent Trands in various distribution functions in mathmatical field of computer science for varying
fields like bioinformatic, soft computing, and computer vision.
Text books:
1. Introduction to Automata Theory, Languages and Computations – J.E. Hopcroft, & J.D. Ullman ,
Pearson Education Asia.
2. Discrete Mathematical structures with application to Computer Science – J.P. Tremblay and R.
Manohar.
3. Cryptography and Network Security, William Stallings.(Second Edition)Pearson Education Asia.
Reference books:
1. Introduction to languages and theory of computation – John C. Martin (MGH)
2. Introduction to Theory of Computation – Michael Sipser (Thomson Nrools/Cole)
3. Cryptanalysis of number theoretic Cyphers, Samuel S. WagstaffJr.Champan& Hall/CRC Press
2003
4. Network Security: The Complete Reference by Roberta Bragg, Mark Phodes –Ousley, Keith
Strassberg Tata McGraw-Hill.
I. K. Gujral Punjab Technical University, Jalandhar
COURSE OBJECTIVE
1. To familiarize students with advanced paradigms and data structure used to solve algorithmic
problems.
2. Student should be able to come up with analysis of efficiency and proofs of correctness
3. The student should be able to choose appropriate data structures, understand the
ADT/libraries, and use it to design algorithms for a specific problem.
4. Students should be able to understand the necessary mathematical abstraction to solve
problems.
COURSE OUTCOMES
1. After completion of course, students would be able to:
2. Understand the implementation of symbol table using hashing techniques.
3. Develop and analyze algorithms for red-black trees, B-trees and Splay trees.
4. Develop algorithms for text processing applications.
5. Identify suitable data structures and develop algorithms for computational geometry problems
Unit 1
Dictionaries: Definition, Dictionary Abstract Data Type, Implementation of Dictionaries. Hashing:
Review of Hashing, Hash Function, Collision Resolution Techniques in Hashing, Separate Chaining,
Open Addressing, Linear Probing, Quadratic, Probing, Double Hashing, Rehashing, Extendible
Hashin
Unit 2
Skip Lists: Need for Randomizing Data Structures and Algorithms, Search and Update Operations on
Skip Lists, Probabilistic Analysis of Skip Lists, Deterministic Skip Lists
Unit 3
Trees: Binary Search Trees, AVL Trees, Red Black Trees, 2-3 Trees, B-Trees, Splay Trees
Unit 4
Text Processing: Sting Operations, Brute-Force Pattern Matching, The Boyer-Moore Algorithm, The
Knuth-Morris-Pratt Algorithm, Standard Tries, Compressed Tries, Suffix Tries, The Huffman Coding
Algorithm, The Longest Common Subsequence Problem (LCS), Applying Dynamic Programming to
the LCS Problem
I. K. Gujral Punjab Technical University, Jalandhar
Unit 5
Computational Geometry: One Dimensional Range Searching, Two-Dimensional Range Searching,
constructing a Priority Search Tree, Searching a Priority Search Tree, Priority Range Trees,
Quadtrees, k-D Trees.
Unit 6 Recent Trends in Hashing, Trees, and various computational geometry methods for efficiently
solving the new evolving problem.
References:
1. Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 2nd Edition, Pearson, 2004.
2. M T Goodrich, Roberto Tamassia, Algorithm Design, John Wiley, 2002.
COURSE OBJECTIVE
To enable student to acquire knowledge of research process: gather data, implement the proposed
work and collect the results and publish them.
COURSE OUTCOMES
Syllabus Contents:
Unit 1:
Meaning of research problem, Sources of research problem, Criteria Characteristics of a good
research problem, Errors in selecting a research problem, Scope and objectives of research problem.
Approaches of investigation of solutions for research problem, data collection, analysis,
interpretation, Necessary instrumentations
Unit 2:
Effective literature studies approaches, analysis Plagiarism, Research ethics
I. K. Gujral Punjab Technical University, Jalandhar
Unit 3:
Effective technical writing, how to write report, Paper Developing a Research Proposal, Format of
research proposal, a presentation and assessment by a review committee
Unit 4:
Nature of Intellectual Property: Patents, Designs, Trade and Copyright. Process of Patenting and
Development: technological research, innovation, patenting, development. International Scenario:
International cooperation on Intellectual Property. Procedure for grants of patents, Patenting under
PCT.
Unit 5:
Patent Rights: Scope of Patent Rights. Licensing and transfer of technology. Patent information and
databases. Geographical Indications.
Unit 6:
New Developments in IPR: Administration of Patent System. New developments in IPR; IPR of
Biological Systems, Computer Software etc. Traditional knowledge Case Studies, IPR and IITs.
References:
1. Stuart Melville and Wayne Goddard, “Research methodology: an introduction for science &
engineering students’”
2. Wayne Goddard and Stuart Melville, “Research Methodology: An Introduction”
3. Ranjit Kumar, 2nd Edition , “Research Methodology: A Step by Step Guide for beginners”.
4. Halbert, “Resisting Intellectual Property”, Taylor & Francis Ltd, 2007.
5. Mayall , “Industrial Design”, McGraw Hill, 1992.
6. Niebel , “Product Design”, McGraw Hill, 1974.
7. Asimov, “Introduction to Design”, Prentice Hall, 1962.
8. Robert P. Merges, Peter S. Menell, Mark A. Lemley, “ Intellectual Property in New
Technological Age”, 2016.
9. T. Ramappa, “Intellectual Property Rights Under WTO”, S. Chand, 2008
COURSE OBJECTIVE:
The purpose of this course is to provide understanding of the main issues related to security in modern
networked computer systems. This covers underlying concepts and foundations of computer security,
basic knowledge about security-relevant decisions in designing IT infrastructures, techniques to
secure complex systems and practical skills in managing a range of systems, from personal laptop to
large-scale infrastructures.
COURSE OUTCOMES:
I. K. Gujral Punjab Technical University, Jalandhar
On completion of this course, students should have gained a good
Syllabus Contents:
Unit 1:
Computer Security Concepts- Introduction to Information Security, Introduction to Data and Network
Security, Integrity, and Availability, NIST FIPS 199 Standard, Assets and Threat Models, Examples
Unit 2:
Control Hijacking– Attacks and defenses, Buffer overflow and control hijacking attacks. Exploitation
techniques and fuzzing- Finding vulnerabilities and exploits Dealing with Legacy code- Dealing with
bad (legacy) application code: Sandboxing and Isolation.
Unit 3:
Least privilege, access control, operating system security- The principle of least privilege, Access
control concepts, Operating system mechanisms, Unix, Windows, Qmail, Chromium, and Android
examples.
Unit 4:
Basic web security model- Browser content, Document object model (DOM), Same-origin policy.
Web Application Security- SQL injection, Cross-site request forgery, Cross-site scripting, Attacks and
Defenses, Generating and storing session tokens, Authenticating users, The SSL protocol, The lock
icon, User interface attacks, Pretty Good Privacy.
Unit 5:
Network Protocols and Vulnerabilities- Overview of basic networking infrastructure and network
protocols, IP, TCP, Routing protocols, DNS. Network Defenses- Network defense tools, Secure
protocols, Firewalls, VPNs, Tor, I2P, Intrusion Detection and filters, Host-Based IDS vs Network-
Based IDS, Dealing with unwanted traffic: Denial of service attacks, Malicious Software.
Unit 6:
Software Security- Malicious Web, Internet Security Issues, Types of Internet Security Issues,
Computer viruses, Spyware, Key-Loggers, Secure Coding, Electronic and Information Warfare.
Mobile platform security models- Android, iOSMobile platform security models, Detecting Android
malware in Android markets.
Unit 7:
Security Risk Management- How Much Security Do You Really Need, Risk Management,
Information. Security Risk Assessment: Introduction, Information Security Risk Assessment: Case
Studies, Risk Assessment in Practice.
Unit 8:
I. K. Gujral Punjab Technical University, Jalandhar
The Trusted Computing Architecture- Introduction to Trusted Computing, TPM Provisioning,
Exact Mechanics of TPM.
Course Objectives:
Introduces the concepts of Ethical Hacking. Gives the students the opportunity to learn about different
tools and techniques in Ethical hacking and security. Practically apply Ethical hacking tools to
perform various activities.
Course Outcomes:
After completion of course, students would be able to: Understand the core concepts related to
vulnerabilities and their causes. Understand ethics behind hacking and vulnerability disclosure.
Appreciate the impact of hacking. Exploit the vulnerabilities related to computer system and networks
using state of the art tools and technologies.
Syllabus Contents:
Unit 1:
Ethical hacking process, Hackers behaviour & mindset, Maintaining Anonymity, Hacking
Methodology, Information Gathering, Active and Passive Sniffing, Physical security vulnerabilities
and countermeasures. Internal and External testing. Preparation of Ethical Hacking and Penetration
Test Reports and Documents.
Unit 2:
Social Engineering attacks and countermeasures. Password attacks, Privilege Escalation and
Executing Applications, Network Infrastructure Vulnerabilities, IP spoofing, DNS spoofing, Wireless
I. K. Gujral Punjab Technical University, Jalandhar
Hacking: Wireless footprint, Wireless scanning and enumeration, Gaining access (hacking 802.11),
WEP, WPA, WPA2.
Unit 3:
DoS attacks. Web server and application vulnerabilities, SQL injection attacks, Vulnerability Analysis
and Reverse Engineering, Buffer overflow attacks. Client-side browser exploits, Exploiting Windows
Access Control Model for Local Elevation Privilege. Exploiting vulnerabilities in Mobile Application
Unit 4:
Introduction to Metasploit: Metasploit framework, Metasploit Console, Payloads, Metrpreter,
Introduction to Armitage, Installing and using Kali Linux Distribution, Introduction to penetration
testing tools in Kali Linux. Case Studies of recent vulnerabilities and attacks.
Unit 5:
Malware Analysis: Collecting Malware and Initial Analysis, Hacking Malware
Unit 6:
Case study of vulnerability of cloud platforms and mobile platforms & devices.
Books/References:
1. Shon Harris, Allen Harper, Chris Eagle and Jonathan Ness, Gray Hat Hacking: The Ethical
Hackers' Handbook, TMH Edition
2. Jon Erickson, Hacking: The Art of Exploitation, SPD
3. Baloch, R., Ethical Hacking and Penetration Testing Guide, CRC Press, 2015.
4. Beaver, K., Hacking for Dummies, 3rded. John Wiley & sons., 2013.
5. Council, Ec. , Computer Forensics: Investigating Network Intrusions and Cybercrime,
Cengage Learning, Second Edition, 2010
6. McClure S., Scambray J., and Kurtz G, Hacking Exposed. Tata McGraw-Hill Education, 6the
Edition, 2009 5. International Council of E-Commerce Consultants by Learning, Penetration
Testing Network and Perimeter Testing Ec-Council/ Certified Security Analyst Vol. 3 of
Penetration Testing, Cenage Learning, 2010
7. Davidoff, S. and Ham, J., Network Forensics Tracking Hackers through Cyberspace, Prentice
Hall, 2012. 7. Michael G. Solomon, K Rudolph, Ed Tittel, Broom N., and Barrett,
D.,Computer, Forensics Jump Start, Willey Publishing, Inc, 2011.
COURSE OBJECTIVE:
I. K. Gujral Punjab Technical University, Jalandhar
Compare alternative tools and approaches for Intrusion Detection through quantitative
analysis to determine the best tool or approach to reduce risk from intrusion.
Identify and describe the parts of all intrusion detection systems and characterize new and
emerging IDS technologies according to the basic capabilities all intrusion detection systems
share.
COURSE OUTCOMES:
Syllabus Contents:
Unit 1:
The state of threats against computers, and networked systems-Overview of computer security
solutions and why they fail-Vulnerability assessment, firewalls, VPN’s -Overview of Intrusion
Detection and Intrusion Prevention- Network and Host-based IDS
Unit 2:
Classes of attacks - Network layer: scans, denial of service, penetration- Application layer:
software exploits, code injection-Human layer: identity theft, root access-Classes of attackers-
Kids/hackers/sop. Hesitated groups-Automated: Drones, Worms, Viruses
Unit 3:
A General IDS model and taxonomy, Signature-based Solutions, Snort, Snort rules, Evaluation of
IDS, Cost sensitive IDS.
Unit 4:
Anomaly Detection Systems and Algorithms-Network Behavior Based Anomaly Detectors (rate
based)-Host-based Anomaly Detectors-Software Vulnerabilities- State transition, Immunology,
Payload Anomaly Detection.
Unit 5:
Attack trees and Correlation of alerts-Autopsy of Worms and Botnets-Malware detection-
Obfuscation, polymorphism-Document vectors.
Unit 6:
Email/IM security issues-Viruses/Spam-From signatures to thumbprints to zero- day detection-Insider
Threat issues-Taxonomy-Masquerade and Impersonation- Traitors, Decoys and Deception-Future:
Collaborative Security.
References:
I. K. Gujral Punjab Technical University, Jalandhar
1. The Art of Computer Virus Research and Defense, Peter Szor, Symantec Press ISBN
0-321- 30545-3.
2. Crimeware, Understanding New Attacks and Defenses, Markus Jakobsson and Zulfikar
Ramzan, Symantec Press, ISBN: 978-0-321-50195-0 2008
COURSE OBJECTIVE:
Describe the concepts of risk management. Define and differentiate various Contingency Planning
components. Integrate the IRP, DRP, and BCP plans into a coherent strategy to support sustained
organizational operations. Define and be able to discuss incident response options, and design an
Incident Response Plan for sustained organizational operations.
COURSE OUTCOMES:
1. Capable of recommending contingency strategies including data backup and recovery and
alternate site selection for business resumption planning.
2. Skilled to be able to describe the escalation process from incident to disaster in case of
security disaster.
3. Capable of Designing a Disaster Recovery Plan for sustained organizational operations.
4. Capable of Designing a Business Continuity Plan for sustained organizational operations.
Syllabus Contents:
Unit 1:
SECURITY BASICS: Information Security (INFOSEC) Overview: critical information
characteristics – availability information states – processing security Countermeasureseducation,
training and awareness, critical information characteristics – confidentiality critical information
characteristics – integrity, information states – storage, information states – transmission, security
countermeasures-policy, procedures and practices, threats, vulnerabilities.
Unit 2:
Threats to and Vulnerabilities of Systems: definition of terms (e.g., threats, vulnerabilities, risk),
major categories of threats (e.g., fraud, Hostile Intelligence Service (HOIS), malicious logic, hackers,
environmental and technological hazards, disgruntled employees, careless employees, HUMINT, and
monitoring), threat impact areas.
Unit 3:
I. K. Gujral Punjab Technical University, Jalandhar
Countermeasures: assessments (e.g., surveys, inspections), Concepts of Risk Management:
consequences (e.g., corrective action, risk assessment), cost/benefit analysis of controls,
implementation of cost-effective controls, monitoring the efficiency and effectiveness of controls
(e.g., unauthorized or inadvertent disclosure of information), threat and vulnerability assessment.
Unit 4:
Security Planning: directives and procedures for policy mechanism, Risk Management: acceptance of
risk (accreditation), corrective actions information identification, risk analysis and/or vulnerability
assessment components, risk analysis results evaluation, roles and responsibilities of all the players in
the risk analysis process.
Unit 5:
Contingency Planning/Disaster Recovery: agency response procedures and continuity of operations,
contingency plan components, determination of backup requirements, development of plans for
recovery actions after a disruptive event, development of procedures for off-site processing,
emergency destruction procedures, guidelines for determining critical and essential workload, team
member responsibilities in responding to an emergency situation
Unit 6:
Policies and Procedures Physical Security Measures: alarms, building construction, cabling,
communications centre, environmental controls (humidity and air conditioning), filtered power,
physical access control systems (key cards, locks and alarms)
Unit 7:
Personnel Security Practices and Procedures: access authorization/verification (need-to-know),
contractors, employee clearances, position sensitivity, security training and awareness, systems
maintenance personnel, Administrative Security Procedural Controls: attribution, copyright protection
and licensing, Auditing and Monitoring: conducting security reviews, effectiveness of security
programs, investigation of security breaches, privacy review of accountability controls, review of
audit trails and logs.
Unit 8:
Operations Security (OPSEC): OPSEC surveys/OPSEC planning INFOSEC: computer security –
audit, cryptography-encryption (e.g., point-to-point, network, link), cryptography-key management (to
include electronic key), Cryptography-strength (e.g., complexity, secrecy, characteristics of the key).
Case study of threat and vulnerability assessment
Books/References:
1. Whitman & Mattord, Principles of Incident Response and Disaster Recovery, Course
Technology, ISBN: 141883663X
I. K. Gujral Punjab Technical University, Jalandhar
2. (Web Link) http://www.cnss.gov/Assets/pdf/nstissi_4011.pdf
COURSE OBJECTIVE
COURSE OUTCOMES
Syllabus Contents:
Unit 1:
Secure Software Design: Identify software vulnerabilities and perform software security analysis,
Master security programming practices, Master fundamental software security design concepts,
Perform security testing and quality assurance.
Unit 2:
Enterprise Application Development : Describe the nature and scope of enterprise software
applications, Design distributed N-tier software application, Research technologies available
for the presentation, business and data tiers of an enterprise software application, Design and
build a database using an enterprise database system, Develop components at the different
tiers in an enterprise system, Design and develop a multi-tier solution to a problem using
technologies used in enterprise system, Present software solution
Unit 3:
I. K. Gujral Punjab Technical University, Jalandhar
Enterprise Systems Administration: Design, implement and maintain a directory-based server
infrastructure in a heterogeneous systems environment, Monitor server resource utilization
for system reliability and availability, Install and administer network services
(DNS/DHCP/TerminalServices/Clustering/Web/Email).
Unit 4:
Obtain the ability to manage and troubleshoot a network running multiple services,
Understand the requirements of an enterprise network and how to go about managing them.
Unit 5:
Handle insecure exceptions and command/SQL injection, Defend web and mobile
applications against attackers, software containing minimum vulnerabilities and flaws.
Unit 6:
Case study of DNS server, DHCP configuration and SQL injection attack.
References:
1. Theodor Richardson, Charles N Thies, Secure Software Design, Jones & Bartlett
2. Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley,
Enterprise Software Security, Addison Wesley.
COURSE OBJECTIVE
To learn the concept of how to learn patterns and concepts from data without being explicitly
programmed in various IOT nodes.
To design and analyze various machine learning algorithms and techniques with a modern
outlook focusing on recent advances.
Explore supervised and unsupervised learning paradigms of machine learning.
To explore Deep learning technique and various feature extraction strategies.
COURSE OUTCOMES
Extract features that can be used for a particular machine learning approach in various IOT
applications.
To compare and contrast pros and cons of various machine learning techniques and to get an
insight of when to apply a particular machine learning approach.
I. K. Gujral Punjab Technical University, Jalandhar
Syllabus Contents:
Unit 1:
Unit 2:
Unit 3:
Evaluating Machine Learning algorithms and Model Selection, Introduction to Statistical Learning
Theory, Ensemble Methods (Boosting, Bagging, Random Forests)
Unit 4:
Sparse Modeling and Estimation, Modeling Sequence/Time-Series Data, Deep Learning and Feature
Representation Learning
Unit 5:
Scalable Machine Learning (Online and Distributed Learning) A selection from some other advanced
topics, e.g., Semi-supervised Learning, Active Learning, Reinforcement Learning, Inference in
Graphical Models, Introduction to Bayesian Learning and Inference
Unit 6:
Recent trends in various learning techniques of machine learning and classification methods for IOT
applications. Various models for IOT applications.
References:
Audit Courses:
I. K. Gujral Punjab Technical University, Jalandhar
Course Code MTEC-AU1-18
Course Name English for research paper writing
Credits 0
COURSE OBJECTIVE
This course is to develop skills in effective English writing to communicate the research work
COURSE OUTCOMES
Syllabus Contents:
Unit 1
Planning and Preparation, Word Order, breaking up long sentences, Structuring Paragraphs and
Sentences, Being Concise and Removing Redundancy, Avoiding Ambiguity and Vagueness
Unit 2
Clarifying Who Did What, Highlighting Your Findings, Hedging and Criticising, Paraphrasing and
Plagiarism, Sections of a Paper, Abstracts. Introduction
Unit 3
Review of the Literature, Methods, Results, Discussion, Conclusions, The Final Check.
Unit 4
Key skills are needed when writing a Title, key skills are needed when writing an Abstract, key skills
are needed when writing an Introduction, skills needed when writing a Review of the Literature.
Unit 5
Skills are needed when writing the Methods, skills needed when writing the Results, skills are needed
when writing the Discussion, skills are needed when writing the Conclusions
Unit 6
Useful phrases, how to ensure paper is as good as it could possibly be the first- time submission
Recommended Books :
1. Goldbort R (2006) Writing for Science, Yale University Press (available on Google Books)
2. Day R (2006) How to Write and Publish a Scientific Paper, Cambridge University Press
3. Highman N (1998), Handbook of Writing for the Mathematical Sciences, SIAM. Highman’s
book.
4. Adrian Wallwork , English for Writing Research Papers, Springer New York Dordrecht
Heidelberg London, 2011.
COURSE OBJECTIVE
This course is to develop skills in helping society during natural disasters and how to manage.
COURSE OUTCOMES
Syllabus Contents:
Unit 1
Introduction: Disaster: Definition, Factors And Significance; Difference Between Hazard And
Disaster; Natural And Manmade Disasters: Difference, Nature, Types And Magnitude.
Unit 2
Repercussions Of Disasters And Hazards: Economic Damage, Loss Of Human And Animal Life,
Destruction Of Ecosystem. Natural Disasters: Earthquakes, Volcanisms, Cyclones, Tsunamis, Floods,
Droughts And Famines, Landslides And Avalanches, Man-made disaster: Nuclear Reactor Meltdown,
Industrial Accidents, Oil Slicks And Spills, Outbreaks Of Disease And Epidemics, War And
Conflicts.
Unit 3
Disaster Prone Areas In India Study Of Seismic Zones; Areas Prone To Floods and Droughts,
Landslides And Avalanches; Areas Prone To Cyclonic And Coastal Hazards With Special Reference
To Tsunami; Post-Disaster Diseases And Epidemics.
Unit 4
Disaster Preparedness And Management Preparedness: Monitoring Of Phenomena Triggering A
Disaster Or Hazard; Evaluation Of Risk: Application of Remote Sensing, Data From Meteorological
And Other Agencies, Media Reports: Governmental And Community Preparedness.
Unit 5
Risk Assessment Disaster Risk: Concept And Elements, Disaster Risk Reduction, Global And
National Disaster Risk Situation. Techniques Of Risk Assessment, Global Co-Operation In Risk
Assessment And Warning, People’s Participation In Risk Assessment. Strategies for Survival.
Unit 6
I. K. Gujral Punjab Technical University, Jalandhar
Disaster Mitigation Meaning, Concept And Strategies Of Disaster Mitigation, Emerging Trends In
Mitigation. Structural Mitigation And Non-Structural Mitigation, Programs Of Disaster Mitigation In
India.
Recommended Books :
1. R. Nishith, Singh AK, “Disaster Management in India: Perspectives, issues and
strategies” New Royal book Company.
2. Sahni, Pardeep Et.Al. (Eds.),” Disaster Mitigation Experiences And Reflections”,
Prentice Hall Of India, New Delhi.
3. Goel S. L. , Disaster Administration And Management Text And Case Studies” ,Deep &
Deep Publication Pvt. Ltd., New Delhi.
COURSE OBJECTIVE
COURSE OUTCOMES
Syllabus Contents:
Unit 1
Alphabets in Sanskrit, Past/Present/Future Tense, Simple Sentences.
Unit 2
Order, Introduction of roots, Technical information about Sanskrit Literature.
Unit 3
Technical concepts of Engineering-Electrical, Mechanical, Architecture, Mathematics
Recommended Books :
1. “Abhyaspustakam” – Dr.Vishwas, Samskrita-Bharti Publication, New Delhi
2. “Teach Yourself Sanskrit” Prathama Deeksha-Vempati Kutumbshastri, Rashtriya Sanskrit
Sansthanam, New Delhi Publication
3. “India’s Glorious Scientific Tradition” Suresh Soni, Ocean books (P) Ltd., New Delhi.
I. K. Gujral Punjab Technical University, Jalandhar
COURSE OBJECTIVE
COURSE OUTCOMES
Syllabus Contents:
Unit 1
Values and self-development –Social values and individual attitudes. Work ethics, Indian vision of
humanism, Moral and non- moral valuation. Standards and principles, Value judgements.
Unit 2
Unit 3
Personality and Behavior Development - Soul and Scientific attitude, Positive Thinking. Integrity and
discipline, Punctuality, Love and Kindness, Avoid fault Thinking, Free from anger, Dignity of labour,
Universal brotherhood and religious tolerance, True friendship, Happiness Vs suffering, love for truth,
Aware of self-destructive habits, Association and Cooperation, Doing best for saving nature.
Unit 4
Character and Competence –Holy books vs Blind faith, Self-management and Good health, Science of
reincarnation, Equality, Nonviolence ,Humility, Role of Women, All religions and same message,
Mind your Mind, Self-control, Honesty, Studying effectively.
I. K. Gujral Punjab Technical University, Jalandhar
Recommended Books:
1. Chakroborty, S.K. “Values and Ethics for organizations Theory and practice”, Oxford
University Press, New Delhi
Laboratories
Syllabus Contents:
ELECTIVE – I
Objectives:
The main objective is to get knowledge in Configuring DNS Server ,Detecting malicious codes and
analysing networks through tools ,implementing various Encryption algorithms
Outcomes:
Students will get the knowledge in detection ,protection of Intrusions ,malicious codes
It gives an opportunity to students to get awareness on DNS server, webcrawler, encryption
the level of security required for a system in Intranet ,Internet ,cellular networks
List of Experiments:
1. Write a procedure to Logon and Logoff to linux in both Text mode and graphical mode.
2. Configure a DNS Server with a domain name of your choice.
3. Configure FTP on Linux Server. Transfer files to demonstrate the working of the same.
4. Detection of Malicious Code in Registry and Task Manager
5. Checking for rootkits existence in windows.
6. Extracting website map using sam spade (any web crawler)
7. Techniques to stop web crawler
8. Sniff the network traffic while performing port scanning using Nmap.
9. Perform port scanning on Metasploitable 2 vulnerable VM
I. K. Gujral Punjab Technical University, Jalandhar
10. Install JCrypt tool (or any other equivalent) and demonstrate Asymmetric, Symmetric crypto
algorithm, Hash and Digital/PKI signatures studied in theory Network Security and Management.
11.Write a client-server program where client sends a text message to server and server sends the text
message to client by changing the case(uppercase and lowercase) of each character in the message.
12. Write a client-server program to implement following classical encryption techniques: (I) Ceaser
cipher (II) Transposition cipher (III) Row substitution cipher (IV) Hill cipher
Intrusion Detection
List of experiments will be decided by the instructor based on current research trends / ongoing
projects.
ELECTIVE – II
List of Experiments:
Expt. 1:
Study of platform for Implementation of Assignments. Download the open source software of your
interest. Document the distinct features and functionality of the software platform.
Expt. 2:
Supervised Learning – Regression Generate a proper 2-D data set of N points. Split the data set into
Training Data set and Test Data set.
Expt. 3:
Supervised Learning – Classification Implement Naïve Bayes Classifier and K-Nearest Neighbour
Classifier on Data set of your choice. Test and Compare for Accuracy and Precision.
Expt. 4:
Unsupervised Learning Implement K-Means Clustering and Hierarchical clustering on proper data set
of your choice. Compare their Convergence.
I. K. Gujral Punjab Technical University, Jalandhar
Expt. 5:
Expt. 6:
Supervised Learning and Kernel Methods Design, Implement SVM for classification with proper data
set of your choice. Comment on Design and Implementation for Linearly non-separable Dataset.
Mini Project:
Student has to do a project assigned from course contents in a group of two or three students. The
team will have to demonstrate as well as have to give a presentation of the same.
List of experiments will be decided by the instructor based on current research trends / ongoing
projects.
SECOND SEMESTER
M. Tech (Cyber Security)
Unit 1: Unit 1: Fundamentals of Malware Analysis (MA), Reverse Engineering Malware (REM)
Methodology, Brief Overview of Malware analysis lab setup and configuration, Introduction to key
MA tools and techniques, Behavioral Analysis vs. Code Analysis, Resources for Reverse-Engineering
Malware (REM) Understanding Malware Threats, Malware indicators, Malware Classification,
I. K. Gujral Punjab Technical University, Jalandhar
Examining ClamAVSignatures, Creating Custom ClamAV Databases, Using YARA to Detect Malware
Capabilities, Creating a Controlled and Isolated Laboratory, Introduction to MA Sandboxes, Ubuntu,
Zeltser’sREMnux, SANS SIFT, Sandbox Setup and Configuration New Course Form, Routing TCP/IP
Connections, Capturing and Analyzing Network Traffic, Internet simulation using INetSim, Using
Deep Freeze to Preserve Physical Systems, Using FOG for Cloning and Imaging Disks, Using MySQL
Database to Automate FOG Tasks, Introduction to Python ,Introduction to x86 Intel assembly
language, Scanners: Virus Total, Jotti, and NoVirus Thanks, Analyzers: Threat Expert, CWSandbox,
Anubis, Joebox, Dynamic Analysis Tools: Process Monitor, Regshot, HandleDiff, Analysis Automation
Tools: Virtual Box, VM Ware, Python , Other Analysis Tools
Unit 2:
Malware Forensics Using TSK for Network and Host Discoveries, Using Microsoft Offline API to
Registry Discoveries , Identifying Packers using PEiD, Registry Forensics with Reg Ripper Plu-gins:,
Bypassing Poison Ivy’s Locked Files, Bypassing Conficker’s File System ACL Restrictions, Detecting
Rogue PKI Certificates
Unit 3: Malware and Kernel Debugging Opening and Attaching to Processes, Configuration of JIT
Debugger for Shellcode Analysis, Controlling Program Execution, Setting and Catching Breakpoints,
Debugging with Python Scripts and Py Commands, DLL Export Enumeration, Execution, and
Debugging, Debugging a VMware Workstation Guest (on Windows), Debugging a Parallels Guest
(on Mac OS X). Introduction to WinDbg Commands and Controls, Detecting Rootkits with
WinDbgScripts, Kernel Debugging with IDA Pro.
Unit 4:
Memory Forensics and Volatility Memory Dumping with MoonSols Windows Memory Toolkit,
Accessing VM Memory Files Overview of Volatility, Investigating Processes in Memory Dumps,
Code Injection and Extraction, Detecting and Capturing Suspicious Loaded DLLs, Finding Artifacts
in Process Memory, Identifying Injected Code with Malfind and YARA..
Unit 5:
:Researching and Mapping Source Domains/IPs Using WHOIS to Research Domains, DNS Hostname
Resolution, Querying Passive DNS, Checking DNS Records, Reverse IP Search New Course Form,
Creating Static Maps, Creating Interactive Maps.
Unit 6:
Case study of Finding Artifacts in Process Memory, Identifying Injected Code with Malfind and
YARA
References: Michael Sikorski, Andrew Honig “Practical Malware Analysis: The Hands-On Guide to
Dissecting Malicious Software” publisher Williampollock
COURSE OBJECTIVE:
Identify and describe soft computing techniques and their roles in building intelligent
machines.
Apply fuzzy logic and reasoning to handle uncertainty and solve various engineering
problems.
COURSE OUTCOMES:
Identify and describe soft computing techniques and their roles in building intelligent
machines.
Apply fuzzy logic and reasoning to handle uncertainty and solve various engineering
problems.
Apply genetic algorithms to combinatorial optimization problems.
Evaluate and compare solutions by various soft computing approaches for a given problem.
Syllabus Contents:
Unit 1:
Unit 2:
FUZZY LOGIC: Fuzzy Sets, Operations on Fuzzy Sets, Fuzzy Relations, Membership Functions:
Fuzzy Rules and Fuzzy Reasoning, Fuzzy Inference Systems, Fuzzy Expert Systems, Fuzzy Decision
Making.
Unit 3:
NEURAL NETWORKS: Machine Learning Using Neural Network, Adaptive Networks, Feed
forward Networks, Supervised Learning Neural Networks, Radial Basis Function Networks :
Reinforcement Learning, Unsupervised Learning Neural Networks, Adaptive Resonance
architectures, Advances in Neural networks.
I. K. Gujral Punjab Technical University, Jalandhar
Unit 4:
Unit 5:
Matlab/Python Lib: Introduction to Matlab/Python, Arrays and array operations, Functions and Files,
Study of neural network toolbox and fuzzy logic toolbox, Simple implementation of Artificial Neural
Network and Fuzzy Logic.
Unit 6:
Recent Trands in deep learning, various classifiers, neural networks and genetic algorithm.
Implementation of recently proposed soft computing techniques.
References:
1. Jyh:Shing Roger Jang, Chuen:Tsai Sun, EijiMizutani, Neuro:Fuzzy and Soft Computing17,
Prentice:Hall of India, 2003.
2. George J. Klir and Bo Yuan, Fuzzy Sets and Fuzzy Logic:Theory and Applications17, Prentice
Hall, 1995.
3. MATLAB Toolkit Manual
COURSE OBJECTIVE
The objective of the course is to make Understand protocol goals and Familiarize protocols for key
establishment, authentication etc.
COURSE OUTCOMES
Unit1:
I. K. Gujral Punjab Technical University, Jalandhar
Goals for authentication and Key Establishment: Basic Goals , Enhanced Goals, Goals concerning
compromised Keys, Formal Verification of Protocols, Complexity Theoretic Proofs of Security.
Unit 2:
Unit 3:
Unit 4:
Protocols Using Public Key Cryptography: Key Transport Protocols: Needham-Schroeder Public Key
Protocol, TLS Protocol. Key Agreement Protocols: Key Control, Unknown Key-Share Attacks.
Unit 5:
Unit 6:
References:
1. Collin Boyd and AnishMathuria, "Protocols for Authentication and Key Establishment",
Springer; 2010.
2. Abhijith Das and C.E. VeniMadhavan, "Public-key Cryptography, Theory and Practice",
Pearson Education, 2004.
3. Alfred J. Menezes, Paul C. Van Oorschot and Scott A. Vanstone, "Handbook of Applied
Cryptography", CRC Press, 1996
List of experiments will be decided by the instructor based on current research trends /
ongoing projects.
I. K. Gujral Punjab Technical University, Jalandhar
Course Code MTCyS-PE8-20
Course Name Steganography & Digital Watermarking
Credits 3
COURSE OBJECTIVES:
COURSE OUTCOMES
Syllabus Contents:
Unit 1:
Unit 2:
Unit 3:
Unit 4:
I. K. Gujral Punjab Technical University, Jalandhar
WATERMARK SECURITY & AUTHENTICATION: Security requirements – Watermark security
and cryptography – Attacks – Exact authentication – Selective authentication – Localization –
Restoration.
Unit 5:
References:
1. Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, Ton Kalker, “Digital
Watermarking and Steganography”, Margan Kaufmann Publishers, New York, 2008.
2. Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, “Digital Watermarking”, Margan
Kaufmann Publishers, New York, 2003.
3. Michael Arnold, Martin Schmucker, Stephen D. Wolthusen, “Techniques and Applications of
Digital Watermarking and Contest Protection”, Artech House, London, 2003.
4. Juergen Seits, “Digital Watermarking for Digital Media”, IDEA Group Publisher, New York,
2005.
5. Peter Wayner, “Disappearing Cryptography – Information Hiding: Steganography &
Watermarking”, Morgan Kaufmann Publishers, New York, 2002.
List of experiments will be decided by the instructor based on current research trends / ongoing
projects
COURSE OUTCOMES
After completion of course, students would be:
Apply information theory and linear algebra in source coding and channel coding
Analyze the performance of error control codes
Implement various error control techniques for Convolution codes
Syllabus Contents:
Unit 1:
I. K. Gujral Punjab Technical University, Jalandhar
Coding for Reliable Digital Transmission and storage:Mathematical model of Information, A
Logarithmic Measure of Information, Average and Mutual Information and Entropy, Types of Errors,
Error Control Strategies. Linear Block Codes: Introduction to Linear Block Codes, Syndrome and
Error Detection, Minimum Distance of a Block code, Error-Detecting and Error-correcting
Capabilities of a Block code, Standard array and Syndrome Decoding, Probability of an undetected
error for Linear Codes over a BSC, Hamming Codes. Applications of Block codes for Error control in
data storage system
Unit 2:
Cyclic Codes :Description, Generator and Parity-check Matrices, Encoding, Syndrome Computation
and Error Detection, Decoding ,Cyclic Hamming Codes, Shortened cyclic codes, Error-trapping
decoding for cyclic codes, Majority logic decoding for cyclic codes.
Unit 3:
Unit 4:
Turbo Codes:LDPC Codes- Codes based on sparse graphs, Decoding for binary erasure channel, Log-
likelihood algebra, Brief propagation, Product codes, Iterative decoding of product codes,
Concatenated convolutional codes- Parallel concatenation, The UMTS Turbo code, Serial
concatenation, Parallel concatenation, Turbo decoding
Unit 5:
Space-Time Codes: Introduction, Digital modulation schemes, Diversity, Orthogonal space- Time
Block codes, Alamouti’s schemes, Extension to more than Two Transmit Antennas, Simulation
Results, Spatial Multiplexing : General Concept, Iterative APP Preprocessing and Per-layer Decoding,
Linear Multilayer Detection, Original BLAST Detection, QL Decomposition and Interface
Cancellation, Performance of Multi – Layer Detection Schemes, Unified Description by Linear
Dispersion Codes.
Text Books:
1. Shu Lin, Daniel J.Costello,Jr, “Error Control Coding- Fundamentals and Applications”,
Prentice Hall, Inc.
2. Man Young Rhee, “Error Correcting Coding Theory”, 1989, McGraw-Hill
Reference Books:
I. K. Gujral Punjab Technical University, Jalandhar
3. Bernard Sklar, “Digital Communications-Fundamental and Application”, PE.
4. John G. Proakis, “Digital Communications”, 5 th Edition, 2008, TMH.
5. Salvatore Gravano, “Introduction to Error Control Codes”, Oxford
6. Todd K.Moon, “Error Correction Coding – Mathematical Methods and Algorithms”, 2006,
Wiley India.
7. Ranjan Bose, “Information Theory, Coding and Cryptography”, 2nd Edition, 2009, TMH.
List of experiments will be decided by the instructor based on current research trends /
ongoing projects
Course Objectives:
Understand the most frequent programming errors leading to software vulnerabilities. Identify and
analyse security problems in software. Understand and protect against security threats and software
vulnerabilities. Effectively apply their knowledge to the construction of secure software systems.
Course Outcomes:
After completion of course, students would be able to:
Unit 1:
Software Security: Security Concepts, Security Policy, Security Flaws, Vulnerabilities, Exploitation
and Mitigations. Software Security problems, Classification of Vulnerabilities. Security Analysis:
Problem Solving with static analysis: Type Checking, Style Checking, Program understanding,
verifications and property checking, Bug finding and Security Review.
Unit 2:
Strings: Common String manipulating Errors, String Vulnerabilities and Exploits, Mitigation
Strategies for strings, String handling functions, Runtime protecting strategies, Notable
Vulnerabilities. Integer Security: Integer data Type, Integer Conversions, Integer Operations, Integer
Vulnerabilities, Mitigation Strategies.
Unit 3:
Handling Inputs: What to validate, How to validate, Preventing metadata Vulnerabilities, Buffer
Overflow: Introduction, Exploiting buffer overflow vulnerabilities, Buffer allocation strategies,
Tracking buffer sizes, buffer overflow in strings, Buffer overflow in Integers Runtime Protections.
Errors and Exceptions: Handling Error with return code, Managing exceptions, Preventing Resource
leaks, Logging and debugging
I. K. Gujral Punjab Technical University, Jalandhar
Unit 4:
Web Applications: Input and Output Validation for the Web: Expect That the Browser Has Been
Subverted, HTTP Considerations: Use POST, Not GET, Request Ordering, Error Handling, Request
Provenance Maintaining Session State: Use Strong Session Identifiers, Enforce a Session Idle
Timeout and a Maximum Session Lifetime, Begin a New Session upon Authentication.
Books/References:
1. Seacord, R. C., Secure Coding in C and C++, Addison Wisley for Software
Engineering Institute, 2nd edition, 2013.
2. Chess, B., and West, J., Secure Programming with static Analysis, Addison Wisley
Software Security Series, 2007.
3. Seacord, R. C., The CERT C Secure Coding Standard, Pearson Education, 2009. 4.
Howard, M., LeBlanc, D., Writing Secure Code, 2nd Edition. Pearson Education,
2002.
List of experiments will be decided by the instructor based on current research trends / ongoing
projects
COURSE OBJECTIVE:
This course will cover the concept of security, types of attack experienced, encryption and
authentication for deal with attacks, what is data compression, need and techniques of data
compression
COURSE OUTCOMES:
Unit 1:
Introduction to Security: Need for security, Security approaches, Principles of security, Types of
attacks. Encryption Techniques: Plaintext, Cipher text, Substitution & Transposition techniques,
Encryption & Decryption, Types of attacks, Key range & Size.
Unit 2:
Symmetric & Asymmetric Key Cryptography: Algorithm types & Modes, DES, IDEA, Differential &
Linear Cryptanalysis, RSA, Symmetric & Asymmetric key together, Digital signature, Knapsack
I. K. Gujral Punjab Technical University, Jalandhar
algorithm. User Authentication Mechanism: Authentication basics, Passwords, Authentication tokens,
Certificate based & Biometric authentication, Firewall
Unit 3:
Case Studies Of Cryptography: Denial of service attacks, IP spoofing attacks, Secure inter branch
payment transactions, Conventional Encryption and Message Confidentiality, Conventional
Encryption Principles, Conventional Encryption Algorithms, Location of Encryption Devices, Key
Distribution. Public Key Cryptography and Message Authentication: Approaches to Message
Authentication, SHA-1, MD5, Public-Key Cryptography Principles, RSA, Digital, Signatures, Key
Management.
Unit 4:
Introduction: Need for data compression, Fundamental concept of data compression & coding,
Communication model, Compression ratio, Requirements of data compression, Classification.
Methods of Data Compression: Data compression-- Loss less &Lossy.
Unit 5:
Entropy encoding-- Repetitive character encoding, Run length encoding, Zero/Blank encoding;
Statistical encoding-- Huffman, Arithmetic & Lempel-Ziv coding; Source encoding-- Vector
quantization (Simple vector quantization & with error term); Differential encoding—Predictive
coding, Differential pulse code modulation, Delta modulation, Adaptive differential pulse code
modulation; Transform based coding: Discrete cosine transform & JPEG standards; Fractal
compression.
Unit 6:
References:
List of experiments will be decided by the instructor based on current research trends / ongoing
projects
COURSE OBJECTIVE:
I. K. Gujral Punjab Technical University, Jalandhar
The objective of this course is to introduce Bio-metric and traditional authentication methods.
Application of bio-metric systems in government sector and various face recognition and finger print
recognition methods are included.
COURSE OUTCOMES:
Syllabus Contents:
Unit 1:
Unit 2:
Bio-metric technologies: Fingerprint, Face, Iris, Hand Geometry, Gait Recognition, Ear, Voice, Palm
print, On-Line Signature Verification, 3D Face Recognition, Dental Identification and DNA.
Unit 3:
Unit 4:
Unit 5:
Unit 6:
Recent trends in Bio-metric technologies and applications in various domains. Case study of 3D face
recognition and DNA matching.
References:
List of experiments will be decided by the instructor based on current research trends /
ongoing projects
Syllabus Contents:
Expt 1.
Build an isolated, controlled laboratory environment for analyzing the code and
behavior of malicious programs.
Expt 2.
Employ network and system-monitoring tools to examine how malware interacts with the
file system, registry, network, and other processes in a Windows environment.
Expt 3.
Uncover and analyze malicious JavaScript and VBScript components of web pages,
which are often used by exploit kits for drive-by attacks.
Expt 4.
Control relevant aspects of the malicious program's behavior through network traffic
interception and code patching to perform effective malware analysis.
Expt 5.
Use a disassembler and a debugger to examine the inner workings of malicious
Windows executables.
Expt 6.
Bypass a variety of packers and other defensive mechanisms designed by malware
authors to misdirect, confuse, and otherwise slow down the analyst.
Expt 7.
Recognize and understand common assembly-level patterns in malicious code, such as
DLL injection and anti-analysis measures.
Expt 8.
Assess the threat associated with malicious documents, such as PDF and Microsoft
Office files, in the context of targeted attacks.
Expt 9.
Derive Indicators of Compromise from malicious executables to perform incident
response triage.
Expt 10.
I. K. Gujral Punjab Technical University, Jalandhar
Utilize practical memory forensics techniques to examine the capabilities of rootkits and
other malicious program types.
Expt 11.
Analyzing protected malicious browser scripts written in JavaScript and VBScript.
Expt 12.
Write a Reverse-engineering malicious Flash program for given drive-by attacks.
Syllabus Contents:
Expt. 1:
Write a program to simulate a perceptron network for pattern classification and function
approximation.
Expt. 2:
Write a program to solve a XOR function using feed-forward neural network trained using back-
propagation algorithm.
Expt. 3:
Write a program to implement adaptive noise cancellation using ADALINE neural network.
Expt. 4:
Given the region to be de-fuzzified, write programs to discuss the various methods that might be
chosen.
Expt. 5:
Expt. 6:
Simulation and comparison of fuzzy PID controller with conventional PID controller for a given
plant.
Expt. 7:
Solve optimal relay coordination as a linear programming problem using Genetic Algorithm.
Expt. 8:
Solve optimal relay coordination as a non-Linear programming problem using Genetic algorithm.
I. K. Gujral Punjab Technical University, Jalandhar
Expt. 9:
Expt. 10:
Write a program to simulate a perceptron network for pattern classification and function
approximation.
THIRD SEMESTER
M. Tech (Cyber Security)
Course Objectives:
To introduce blockchain technology.
To discuss about bit coin cryptocurrency system.
To impart knowledge about building and deploying blockchain applications.
To facilitate learning of using blockchain for applications other than cryptocurrency.
To explore platforms such as Ethereum, Hyperledger Fabric to build applications on
blockchain.
Course Outcome:
Upon completing this course, students will be able to:
I. K. Gujral Punjab Technical University, Jalandhar
Understand the fundamentals of Blockchain technology.
Describe the working of bit coin cryptocurrency and models of blockchain.
Build and deploy blockchain application for on premise and cloud based architecture.
Integrate ideas from various domains and implement them using blockchain technology in
different perspectives.
Design smart contract using Ethereum and Hyperledger Fabric frameworks.
Syllabus Contents:
Unit 1
Introduction: Overview of Blockchain, Public Ledgers, Bitcoin, Smart Contracts, Block in a
Blockchain, Transactions, Distributed Consensus, Public vs Private Blockchain, Understanding
Cryptocurrency to Blockchain, Permissioned Model of Blockchain, Overview of Security aspects of
Blockchain,
Basic Crypto Terminologies: Cryptographic Hash Function, Properties of a hash function, Hash
pointer and Merkle tree, Digital Signature, Public Key Cryptography. Need for Distributed Record
Keeping, Modelling faults and adversaries, Byzantine Generals problem, Consensus algorithms and
their scalability problems, Why Nakamoto Came up with Blockchain based cryptocurrency?
Unit 2
Bitcoin and Blockchain: Creation of coins, Payments and double spending, Bitcoin Scripts, Bitcoin
P2P Network, Transaction in Bitcoin Network, Block Mining, Block propagation and block relay.
Mathematical analysis for properties of Bitcoin. Challenges, and solutions
Consensus in Bitcoin: Distributed consensus in open environments, Consensus in a Bitcoin network,
Hashcash PoW, Bitcoin PoW, Attacks on PoW and the monopoly problem, Proof of Stake, Proof of
Burn and Proof of Elapsed Time, The life of a Bitcoin Miner, Mining Difficulty, Mining Pool.
Unit 3
Permissioned Blockchain: Permissioned model and use cases, Design issues for Permissioned
blockchains, Execute contracts, State machine replication, Overview of Consensus models for
permissioned blockchain - Distributed consensus in closed environment, Paxos, RAFT Consensus,
Byzantine general problem, Byzantine fault tolerant system, Lamport-Shostak-Pease BFT Algorithm,
BFT over Asynchronous systems.
Unit 4
Enterprise Application of Blockchain: Cross border payments, Know Your Customer (KYC), Food
Security, Mortgage over Blockchain, Blockchain enabled Trade, We Trade — Trade Finance
Network, Supply Chain Financing, Identity on Blockchain
Unit 5
Hyperledger Fabric: Architecture, Identities and Policies, Membership and Access Control,
Channels, Transaction Validation, Writing smart contract using Hyperledger Fabric, Writing smart
contract using Ethereum, Overview of Ripple and Corda, Applications of Blockchain in cyber
I. K. Gujral Punjab Technical University, Jalandhar
security, E-Governance, etc. Limitations of Blockchain as a technology, myths vs. reality of
Blockchain technology.
COURSE OBJECTIVE
The objective of the course is to provide fundamentals of database security. Various access control
techniques mechanisms were introduced along with application areas of access control techniques.
COURSE OUTCOMES
In this course, the students will be enabled to understand and implement classical models and
algorithms
They will learn how to analyse the data, identify the problems, and choose the relevant
models and algorithms to apply.
They will further be able to assess the strengths and weaknesses of various access control
models and to analyse their behaviour.
Syllabus Contents:
Unit1:
Introduction to Access Control, Purpose and fundamentals of access control, brief history, Policies of
Access Control, Models of Access Control, and Mechanisms, Discretionary Access Control (DAC),
I. K. Gujral Punjab Technical University, Jalandhar
Non- Discretionary Access Control, Mandatory Access Control (MAC). Capabilities and Limitations
of Access Control Mechanisms: Access Control List (ACL) and Limitations, Capability List and
Limitations.
Unit 2:
Role-Based Access Control (RBAC) and Limitations, Core RBAC, Hierarchical RBAC, Statically
Constrained RBAC, Dynamically Constrained RBAC, Limitations of RBAC. Comparing RBAC to
DAC and MAC Access control policy.
Unit 3:
Biba’sintrigity model, Clark-Wilson model, Domain type enforcement model, mapping the enterprise
view to the system view, Role hierarchies- inheritance schemes, hierarchy structures and inheritance
forms, using SoD in real system Temporal Constraints in RBAC, MAC AND DAC. Integrating
RBAC with enterprise IT infrastructures: RBAC for WFMSs, RBAC for UNIX and JAVA
environments Case study: Multi line Insurance Company
Unit 4:
Smart Card based Information Security, Smart card operating systemfundamentals, design and
implantation principles, memory organization, smart card files, file management, atomic operation,
smart card data transmission ATR, PPS Security techniques- user identification, smart card security,
quality assurance and testing, smart card life cycle-5 phases, smart card terminals.
Unit 5:
Recent trends in Database security and access control mechanisms. Case study of Role-Based Access
Control (RBAC) systems.
Unit 6:
References:
COURSE OBJECTIVE:
COURSE OUTCOMES:
Syllabus Contents:
Unit 1:
What is big data, why big data, convergence of key trends, unstructured data, industry examples of
big data, web analytics, big data and marketing, fraud and big data, risk and big data, credit risk
management, big data and algorithmic trading, big data and healthcare, big data in medicine,
advertising and big data, big data technologies, introduction to Hadoop, open source technologies,
cloud and big data, mobile business intelligence, Crowd sourcing analytics, inter and trans firewall
analytics
Unit 2:
Introduction to NoSQL, aggregate data models, aggregates, key-value and document data models,
relationships, graph databases, schemaless databases, materialized views, distribution models,
sharding, master-slave replication, peerpeer replication, sharding and replication, consistency,
relaxing consistency, version stamps, map-reduce, partitioning and combining, composing map-
reduce calculations.
Unit 3: Data format, analyzing data with Hadoop, scaling out, Hadoop streaming, Hadoop pipes,
design of Hadoop distributed file system (HDFS), HDFS concepts, Java interface, data flow, Hadoop
I/O, data integrity, compression, serialization, Avro, file-based data structure
Unit 4:
MapReduce workflows, unit tests with MRUnit, test data and local tests, anatomy of MapReduce job
run, classic Map-reduce, YARN, failures in classic Map-reduce and YARN, job scheduling, shuffle
and sort, task execution, MapReduce types, input formats, output format.
Unit 5:
Hbase, data model and implementations, Hbase clients, Hbase examples, praxis.Cassandra, Cassandra
data model, Cassandra examples, Cassandra clients, Hadoop integration.
Unit 6:
Pig, Grunt, pig data model, Pig Latin, developing and testing Pig Latin scripts. Hive, data types and
file formats, HiveQL data definition, HiveQL data manipulation, HiveQL queries.
References:
I. K. Gujral Punjab Technical University, Jalandhar
1. Michael Minelli, Michelle Chambers, and AmbigaDhiraj, "Big Data, Big Analytics:
Emerging Business Intelligence and Analytic Trends for Today's Businesses", Wiley, 2013.
2. P. J. Sadalage and M. Fowler, "NoSQL Distilled: A Brief Guide to the Emerging World of
Polyglot Persistence", Addison-Wesley Professional, 2012.
3. Tom White, "Hadoop: The Definitive Guide", Third Edition, O'Reilley, 2012.
4. Eric Sammer, "Hadoop Operations", O'Reilley, 2012.
5. E. Capriolo, D. Wampler, and J. Rutherglen, "Programming Hive", O'Reilley, 2012.
6. Lars George, "HBase: The Definitive Guide", O'Reilley, 2011.
7. Eben Hewitt, "Cassandra: The Definitive Guide", O'Reilley, 2010.
8. Alan Gates, "Programming Pig", O'Reilley, 2011.