Engineering Minors: School of Computer Science and Engineering
Engineering Minors: School of Computer Science and Engineering
Engineering Minors: School of Computer Science and Engineering
School of Computer
Science and Engineering
What are Engineering
Software
Minors? Methodologies and
• A set of six courses in an engineering Testing
stream to develop a competency within or
outside the discipline area (e.g. a
Computer Science Engineering student Data Machine
choosing Cyber Security or Machine
Science Learning
Learning or a Mechanical Engineering
student taking courses from Computer
Science Engineering as his/her
Engineering Minor Area).
A student can chose an Engineering minor basket comprising of six courses from
his/her own school or multi-disciplinary area can also be chosen.
Engineering minors also provides the freedom to students for designing their
degree program, choose their course curriculum and decide their future career.
Additional Certificate as Minor
A student completing the set of six courses chosen as Engineering minor and earning 18 credits would be
eligible for an additional certificate as minor.
Students can study the specialized courses as per their interest/requirements of industry leading to
attaining of specialized skill set, and the additional minor certificate earned alongwith the degree would
give an edge to the students and would also be beneficial in enhancing employability opportunities.
Note: Link for the UMS pathway and LPU Touch App will be shared with the announcement
for Engineering Minor(s) polling in the near future.
1200
1190 1050
800 910
400 700
420
0
nce ng a ck ing rity
ti St n u
cie es ll ar ec
a
S
d
T
F u Le r S
at an ine be
D es h y
i ac C
log M
do
o
e th
M
e
ar
ft w
So
6 Courses Spanned across 4 semesters
5th Term 6th Term 7th Term 8th Term
AUG SEP OCT NOV JAN FEB MAR APR AUG SEP OCT NOV JAN FEB MAR APR
1st course
2nd course
3rd course
4th course
5th course
6th course
Data Science
Data Analytics (DA) refers to the set of quantitative
and qualitative approach in order to derive valuable
insights from data. It involves many processes that
include extracting data, categorizing it in order to
analyze the various patterns, relations, connections
and other such valuable insights from it. DA is the
key technology behind the success of Google,
Amazon and Flipkart.
INT217 INT232
Introduction to Data Data Science Toolbox
Management : R Programming
INT233 INT234
Data Visualization Predictive Analytics
INT312 INT315
Big Data Fundamentals Cluster Computing
Description of Courses
INT217 : INTRODUCTION TO DATA MANAGEMENT
This course introduces different ways by which an organization can manage, store and retrieve
data using different database management tools. This course will enhance the skills of using
spreadsheet by implementing various analytical functions and presenting in graphical way.
Course Outcome:
• Apply the various techniques and functions over spreadsheet for getting various insides of
data.
• Understand the data representation methods like pivot table and power pivoting.
• Understand the need of the graphical representation in the spreadsheet by using various
graphs and charts.
• Comprehend the concepts of multidimensional data and topics like OLAP, OLTP and data
cube.
Description of Courses
INT232 : DATA SCIENCE TOOLBOX : R PROGRAMMING
Covers the basics of data cleaning and how to make data presentable by using analysis
techniques. The course will also cover the components of a complete data set including raw
data, processing instructions, codebooks, and processed data.
Course Outcome:
• Analyze and configure R software for statistical programming environment and describe
generic programming language concepts implemented in a high-level statistical language.
• Establish Program in R environment to create custom analytical models to meet the dynamic
business needs evaluate and verify the analysis findings by conducting various statistical tests
used for hypothesis testing.
• Review advanced data science concepts using predictive analytics fundamentals.
• Visualize the various graphical packages for creating various types of graphs, plots and charts
Description of Courses
INT233 : DATA VISUALIZATION
This course is specifically focused on how data analysis is used in business and provide basic
grounding in concepts such as over fitting, and error rates, analyzing data of customer, product
and sales to make effective decision for business growth.
Course Outcome:
The course is about breaking down the data, assess trends over time, compare one
sector/measurement to another and even ask questions about the future.
Course Outcome:
• Review the art and science of predictive analytics to define clear actions that result in
improved decisions and business results.
• Evaluate the use of analytic tools and assist in the selection of industry standard analytics
tools.
• Construct and format data to be most effective to ensure the predictive model meets the
business goals.
Description of Courses
INT312 : BIG DATA FUNDAMENTALS
This course provides basic concepts and terminologies of Big Data and its real-life applications across
industries. One will gain insights on how to improve business productivity by processing large
volumes of data and extract valuable information from them.
Course Outcome:
• Recognize the need and importance of fundamental concepts and principles of Big Data
• Examine internal functioning of different modules of Big Data and Hadoop
• Conceptualize the big data ecosystem and appreciate its key components
• Review quantitative and qualitative understanding of methods and algorithms for processing big data
Description of Courses
INT315 : CLUSTER COMPUTING
This course provides an introduction to one of the most common frameworks, Spark that has
made big data analysis easier and more accessible -- increasing the potential for data to
transform our world!
Course Outcome:
Data Administrator
Database Manager
Data Modeller
Data Science is best tool for decision making. It is widely used in industries for targeted Advertising
and re-targeting, Recommender Systems, Image Recognition, Speech Recognition, Gaming, Price
Comparison Websites, Airline Route Planning, Fraud and Risk Detection and Self Driving Cars.
Special Requirements
Laptop
This is the first course of EM which includes the advance topics of software engineering. This
course palys an improtant role in making the students aware about advance concepts of
software engineering.
Course Outcome:
• Students will be able to learn and explain various advance concepts of software engineering.
Description of Courses
CSE375 : SOFTWARE TESTING
This is the second course of EM which includes the basic concepts of software testing and
various types of software testing. This course helps the students in understanding the testing
concepts which can be applied while testing the software.
Course Outcome:
• Students will be able to learn and explain the basics of software testing.
• Students will be capable of designing the test cases.
Description of Courses
CSE376 : AUTOMATED TESTING
This is the third course of EM which includes hands-on practices on various software testing tools
like Eclipse, Selinium etc. Students will test various applications using the tools.
Course Outcome:
• Students will be able to perform the software testing using Selinium and Eclipse.
Description of Courses
CSE377 : ADVANCE TESTING TECHNOLOGIES
This is the fourth course of EM which includes advance technologies related to software testing.
Course Outcome:
• Students will be able to understand various advance testing technologies and apply them for
testing the software.
Description of Courses
CSE378 : WEB SERVICES API AUTOMATION TESTING
This is the fifth course of EM which includes the techniques of webservices API testing. RESTful
API services will also be the main part of the course contents
Course Outcome:
This is the sixth course of EM in which techniques of mobile automated testing will be taught. The
testing will include both Android and IOS apps. Students will get hands-on practice on Appium.
Course Outcome:
QA Analyst
Software Tester
Laptop
Introduces an open source language for building and enhancing the performance of web applications
on the server side along with other client side technologies like HTML5, JAVASCRIPT, CSS and web
hosting.
Course Outcome:
Covers the concepts of Node.js for building web sites with better user interface and responsive web
pages. A hands on exposure on Node.js technology will be offered in a form of project.
Course Outcome:
• Understand the role of server side JavaScript in web application development.
• Explore, how Node.js is architectured to allow high scalability wth asynchronous code build
an HTTP Server using the core modules in Node.js.
• Create basic web based applications using Node.js.
• work with MongoDB database using Node.js.
Description of Courses
INT252 : WEB APP DEVELOPMENT WITH REACTJS
This course serves as an introduction to modern web application development with JavaScript. The main
focus is on building single page applications with ReactJS.
Course Outcome:
Through this course students should be able to
• understand advanced javascript concepts and create a pure react app
• develop JSX components and use props in React app
• compose and manipulate states and should develop an understanding of events & Hooks
• use forms with state and validating the form for errors and display errors
• make a react app by using HTTP methods and routing the pages
• validate or debug the react app and deploy app onto the server
Description of Courses
INT220 : SERVER SIDE SCRIPTING
Introduces basic concepts of PHP & MySQL technology for building and enhancing the performance
of web applications on server-side along with other client-side technologies like HTML5, JAVASCRIPT,
CSS etc.
Course Outcome:
Covers in depth knowledge of MVC framework which is an advanced framework based technology
with three components that are database components (Models), client-side frames (View) and
Server-Side components (Controller) which are used in web building.
Course Outcome:
Covers the Web Development in Python using Django. Python Django is a web framework that allows
to quickly create efficient web pages.
Course Outcomes:
Through this course students should be able to
• Describe Python Programming, Flask Framework And Django Framework
• Discuss the concepts of views, models and session for the framework.
• Use variables to store, retrieve and calculate information
• Explain the core programming tools such as functions and loops
• Assess and build a data model in Django and Flask, applying model query and template
tags/code
Career Opportunities
Web Developer
Web Designer
Entrepreneur
Industrial Applications
Publishing
Advertising
E-Commerce
Websites
Special Requirements
Laptop
Course Outcome:
describe the soft computing techniques in building the intelligent machines.
explain different neural networks for classification and clustering problems.
use fuzzy logic and reasoning to handle uncertainty and solve engineering problems.
compare and contrast genetic algorithms and swarm intelligence for optimization problems.
justify the performance and time complexity of hybrid systems.
develop the optimal models using available soft computing tools to solve real world problems.
Description of Courses
INT354 : MACHINE LEARNING-I
In this course, students will create classifiers such as like logistic regression, decision tree,
boosting, SVM that provide state-of-the-art performance on a variety of tasks. .This course is
hands-on, action-packed, and full of visualizations and illustrations of how these techniques will
behave on real data. Evaluate models using precision-recall metrics and tune hyper parameters of
the models. Also, various regression models will be discussed to predict continuous values.
Course Outcome:
Course Outcome:
Course Outcome:
• categorize the machine learning problems based on learning rules.
• apply the key concepts that form the core of machine learning.
• develop the key algorithms for the system that are intelligent enough to make the
decisions.
• contrast the statistical, computational and game-theoretic models for learning.
Description of Courses
INT345 :COMPUTER VISION
This course introduces computer vision, including fundamentals of image formation, camera imaging
geometry, feature detection and matching, stereo, motion estimation and tracking, image classification,
and scene understanding. Hands on experience will be done using python and openCV.
Course Outcome:
• understand models and methods in the field of computer vision
• solve problems in image processing and computer vision
• analysis of existing computer vision system
• design and development of a working computer vision-based system
Description of Courses
INT422 : DEEP LEARNING
The Deep Learning course provides a pathway for student's to take the definitive step in the world of AI
by helping them gain the knowledge and skills to level up their career. This course mainly focuses on
fundamental of deep learning, convolutional neural network, recurrent neural network, autoencoders,
generative adversial networks etc. Hands on experience will be done using Tensorflow and Keras.
Students will be able to build and train deep neural networks, identify key architecture parameters,
implement convolutional and recurrent neural networks and deep learning to applications
Course Outcome:
• describe the deep learning algorithms which are more appropriate for various types of learning
tasks in various domains.
• compare detection and recognition tasks using convolution and adversarial neural networks.
• use dropout regularization, gradient descent, Batch normalization, and optimization algorithms
with convergence
• examine recurrent neural networks for modelling sequential data.
• assess the different learning models and prioritize their appropriate hyper parameters
• construct artificial neural networks with Tensorflow and Keras
Career Opportunities
Machine Learning Engineer
AI Data Analyst
Data Scientist
Computational Linguist
Robotics Scientist
Industrial Applications
😊 ML in Finance
😊 ML in Healthcare
😊 Dynamic Price Control in Travel Industries
😊 Machine Learning in social media
😊 ML for language translation and text generation
😊 ML in Retail/Logistics
😊 ML in Automation/Robotics Systems
😊 ML in Pipelining/Production
😊 ML in Smart Agriculture/Forecasting
😊 ML in Academics/Personalized Recommendation
Special Requirements
Laptop
It covers the concepts of cyber security with its importance and identifies various vulnerabilities and
security flaws in the operating systems and networks. It helps to analyze risks, security threats,
implementing host/software/network security, understanding various types of network attacks and also
focuses on network security programming (using python).
Course Outcome:
CO1 :: outline the fundamental components of information security and analyze risk
CO2 :: examine various threats to information security and conduct security assessments to detect
vulnerabilities
CO3 :: develop security for hosts, software and networks
CO4 :: recommend identity and access for computer systems
CO5 :: enumerate cryptographic solutions in the organization and security at the operational level
CO6 :: identify security incidents and ensure the continuity of business operations in the event of an
incident
Description of Courses
INT249 : SYSTEM ADMINISTRATION
This course covers the in-depth practical administration of Windows and Linux server operating systems in
which the focus shall be on file and folders management, Disk management, resource management,
network management, user management, authentication management and software package
management. The tools used are Port scanners, Sniffers, Partitioning tools, Disk property tools etc.
Course Outcome:
CO1 :: install and configure the server operating systems
CO2 :: manage users, groups permissions and ownerships
CO3 :: manage and implement storage solutions and networking
CO4 :: manage server operating systems’ boot process and system components
Description of Courses
INT250 : DIGITAL EVIDENCE ANALYSIS
This course covers the in-depth understanding and practical demonstrations of digital forensic and incident
response methods. The course includes incident response handling, forensic duplication, live data
collection, network evidence collection and evidence handling. The course also focuses on data analysis
from system memory and network-based evidence. The tools used are the FBI toolkit, Netcat, Cryptcat,
RAM dump, Encase, TCPdump, FTK imager, FTK, Autopsy etc.
Course Outcome:
CO1 :: describe the fundamentals of incident response handling process.
CO2 :: discuss the methodology of detecting an incident and responding to it in case of a security breach.
CO3 :: examine the process of live data collection and forensic duplication during forensic investigations.
CO4 :: outline the network and host-based evidence collection during the evidence handling process.
CO5 :: classify various data analysis techniques for network and system evidence data.
CO6 :: evaluate the process of extracting critical data from windows systems and routers
Description of Courses
INT244 : SECURING COMPUTING SYSTEMS
The course covers the basic concepts of penetration testing along with the analysis of various vulnerabilities
and security flaws exist in the operating systems, web servers, and network equipment through the
techniques used by hackers. The course provides the understanding about cryptography, footprinting,
scanning, enumeration, system hacking, malware, sniffers, social engineering, DoS, session hijacking, SQL
injection, mobile & cloud device security. It also helps to clarify & learn log management for information
assurance and manage information security.
Course Outcome:
CO1 :: describe the fundamental concepts of operating systems, cryptography and penetration testing
CO2 :: discuss the methodology of performing footprinting and scanning the target systems
CO3 :: illustrate the process of enumerating and compromising a target
CO4 :: examine the usage of sniffers, social engineering and denial of service for compromising the targets
CO5 :: analyze the functionality of session hijacking, web applications and SQL injection in testing the
security of targets
CO6 :: outline the process of identifying the threats to WiFi, Bluetooth, mobile devices and cloud
Description of Courses
INT245 : PENETRATION TESTING
It covers the tools and technologies used by ethical hackers in order to identify weaknesses in
information system and recommend mitigation measures to increase the resistance of the information
technology (IT) infrastructure to unauthorized access.
Course Outcome:
CO1 :: recognize how to analyze the outcome from the tools and technologies used by security analyst
CO2 :: examine intensive assessments required to effectively identify and mitigate risks to the information
security of the infrastructure
CO3 :: summarize weaknesses in information system and recommend mitigation measures to increase the
resistance of the information technology (IT) infrastructure to unauthorized access
CO4 :: analyze the outcomes of vulnerability assessments in the form of penetration testing reports
CO5 :: recommend various regulatory compliances related to penetration testing responsibilities
CO6 :: summarize testing deliverables out of penetration testing reports and identify post corrective
actions
Description of Courses
INT251 : MALWARE ANALYSIS AND CYBER DEFENCE
This course will provide a depth understanding of different types of malwares, like viruses, worms, and
Trojans. Students will gain hands-on experience in analyzing malicious files, identifying malicious
processes, and more. It also covers new techniques and tools of malware analysis which help speed up
analysis and transition students from malware analyst to reverse engineer and how to perform dynamic
and static analysis. The tools used are Pestudio, Process Monitor, Wireshark, Autoruns, Cuckoo Sandbox
etc.
Course Outcome:
CO1 :: understand the tools and techniques to extract metadata information from the malicious binary
CO2 :: analyze the behavior of the malware and its interaction with the system
CO3 :: understand basics of assembly Language and the necessary skills required to perform code
analysis
CO4 :: analyze the stealth techniques used by advanced malware to hide from Forensic tools
Career Opportunities
Cyber Security Consultant
Penetration Tester
Malware Analyst
Freelancer
Industrial Applications
😊 Intelligence agencies
😊 Defense
😊 Automation systems
😊 Retail
😊 Banking
😊 Internet of Things
😊 Automotive sector
😊 E-commerce
Special Requirements
Laptop
7 Hardware Security – 72
Mandatory Feedback
Dear Students,
Provide the feedback for this session on Myclass as well as on UMS at
below given link: