Cseit - All
Cseit - All
School of Computer
Science and Engineering
What are Engineering
Minors? Software
Methodology
and Testing
• A set of six courses in an engineering
stream to develop a competency within or Machine
outside the discipline area (e.g. a Data Science Learning
Computer Science Engineering student
choosing Cyber Security or Machine
Engineering
Learning or a Mechanical Engineering Minors
student taking courses from Computer
Science Engineering as his/her Full Stack
Cyber
Engineering Minor Area). Web
Security
Development
• These Engineering Minors are being
Cloud
offered so that each student would have at Computing
least one major skills by the end of 7th
term.
How Engineering Minors can help the students?
A student can chose an Engineering minor basket comprising of six courses from
his/her own school or multi-disciplinary area can also be chosen.
Engineering minors also provides the freedom to students for designing their
degree program, choose their course curriculum and decide their future career.
Program wise Engineering Minor Areas
offered
P Code-Batch-Program name Engineering Minor Area
Students can study the specialized courses as per their interest/requirements of industry leading to
attaining of specialized skill set, and the additional minor certificate earned along with the degree would
give an edge to the students and would also be beneficial in enhancing employability opportunities.
Note: Link for the UMS pathway and LPU Touch App will be shared with the announcement
for Engineering Minor(s) polling in the near future.
2000
1600 1768 1836
1200
1292
800 1020
400 544 612
0 340
6 Courses Spanned across 4 semesters
1st course
2nd course
3rd course
4th course
5th course
6th course
Data Science
Data Analytics (DA) refers to the set of quantitative
and qualitative approach in order to derive valuable
insights from data. It involves many processes that
include extracting data, categorizing it in order to
analyze the various patterns, relations, connections
and other such valuable insights from it. DA is the
key technology behind the success of Google,
Amazon and Flipkart.
INT217 INT232
Introduction to Data Data Science
Management Toolbox : R
Programming
INT233 INT234
Data Visualization Predictive Analytics
INT312 INT315
Big Data Fundamentals Cluster Computing
About the Area
Brief description
Data science combines math and statistics, specialized programming,
advanced analytics, artificial intelligence (AI), and machine learning with
specific subject matter expertise to uncover actionable insights hidden in
an organization’s data.
The course is about breaking down the data, assess trends over time,
Course Description compare one sector/measurement to another and even ask questions
about the future.
Data Administrator
Database Manager
Data Modeller
Data Science is best tool for decision making. It is widely used in industries for targeted Advertising
and re-targeting, Recommender Systems, Image Recognition, Speech Recognition, Gaming, Price
Comparison Websites, Airline Route Planning, Fraud and Risk Detection and Self Driving Cars.
Special Requirements
Laptop
The courses of this minor emphasis on providing the training in testing of the
Outcome software's. After completing all the courses of this minor, students can start
their carrier in the field of software testing.
Selection Criteria
Preferences + CGPA
(Code+Description)
Description of Courses
CSE374: ADVANCE SOFTWARE ENGINEERING
Course Outcome Students will be able to learn and explain various advance concepts
of software engineering.
Course Outcome Students will be able to learn and explain the basics of software testing.
Students will be capable of designing the test cases.
Laptop, Software Engineering course
Special Requirement
Description of Courses
CSE376 : AUTOMATED TESTING
Course Outcome Students will be able to perform the software testing using Selenium and
Eclipse.
Course Outcome Students will be able to understand various advance testing technologies
and apply them for testing the software.
Course Outcome Students will be able to perform web services API testing.
Course Outcome Students will be able to perform mobile automated testing using Appium.
QA Analyst
Software Tester
Laptop
This minor completion results in students becoming proficient full stack web
developers, the students will possess the skills and knowledge required to create
Outcome
dynamic and fully functional websites, utilizing a broad spectrum of tools and
frameworks to meet diverse industry demands.
Total Seats 1836
Selection Criteria
Preferences + CGPA
(Code+Description)
Description of Courses
INT219 : FRONT END WEB DEVELOPER
By the end of this course, you will be equipped with the skills and knowledge necessary
to embark on a successful career in web development. Whether you're a beginner or an
Course Description aspiring web developer looking to expand your skill set, this course will provide you with
the expertise to build modern, responsive, and interactive web applications.
This course covers the application of fundamental web development skills, including
HTML, CSS, Bootstrap, JavaScript, jQuery, JSON, and Angular, to create visually
Course Outcome appealing and interactive web pages, forms, and dynamic content while efficiently
handling data exchange and enhancing user interactivity.
Upon completion of this course, you will have the expertise to develop full-stack web
applications, from server-side logic with Node.js to database management with
Course Outcome PostgreSQL and MongoDB.
You will also gain essential debugging, testing, and deployment skills, making you well-
equipped for a successful career in web development.
This comprehensive course in modern web development with React covers JavaScript
ES6, React fundamentals, state management, form handling, data retrieval, routing,
Course Description Redux, debugging, and deployment, ensuring students are well-prepared to create
dynamic and interactive web applications.
By the end of this course, you'll be equipped with the skills and knowledge needed to
build robust and interactive web applications using React,
Course Outcome
implement efficient state management with Redux, and confidently debug and deploy
your projects, making you a proficient modern web developer.
Upon completing this course, you'll have a solid foundation in PHP and MySQL web
Course Outcome development, enabling you to build dynamic websites, interact with databases, and
create secure and efficient web applications.
This is a comprehensive course on Laravel MVC web development, where students' will
learn everything from installation, routing, and form handling to database management
Course Description and advanced features, equipping them to create dynamic and feature-rich web
applications.
By the end of this course, you'll have a solid understanding of Laravel's MVC
Course Outcome architecture and its myriad features, enabling you to build dynamic and data-driven
web applications with confidence and efficiency.
This course is a comprehensive journey into Python web development with Flask and
Django, where students will master Python programming fundamentals, explore the
Course Description intricacies of Flask and Django frameworks, and gain expertise in core web development
concepts, enabling them to build dynamic and interactive web applications.
By the end of this course, students will have the skills and knowledge needed to
create web applications using Python, Flask, and Django,
Course Outcome
from designing data models to implementing views and sessions, making them a
proficient web developer in the Python ecosystem.
UI/UX Designer
Web Developer
Web Designer
Entrepreneur
Industrial Applications
Advertising
E-Commerce
Websites
Laptop
Brief description Machine learning (ML) is a subset of artificial intelligence (AI) that focuses on
the development of algorithms and models that enable computers to learn
and make predictions or decisions without being explicitly programmed for
every task. It's a data-driven approach where machines learn from patterns,
trends, and examples in data to improve their performance over time.
Outcome Machine learning leads to expertise in creating predictive models, data
analysis, and pattern recognition, enabling informed decision-making and
innovation across industries, from healthcare to finance, automation, and
beyond.
Total Seats 1020
Selection Criteria Preferences + CGPA
(Code+Description)
Description of Courses
INT254 : FUNDAMENTALS OF MACHINE LEARNING ALGORITHMS
LTP & Credits 2 0 2 (Credits 3)
This course focuses on mathematical concepts of ML such as how linear algebra relates to data and
Multivariate Calculus optimizes fitting functions to get good fits to data. Hands on practice will be
done using python libraries for analyzing and visualization of the data and performing feature
Course Description engineering so that ML models can be applied over it. It also covers different swarm intelligence
algorithms that are inspired by natural systems and genetic algorithms.
In this course, students will create classifiers such as logistic regression, decision tree,
boosting, SVM that provide state-of-the-art performance on a variety of tasks. Also,
Course Description students will get hands-on experience, and full of visualizations and illustrations of how
these techniques will behave on real data.
This course introduces Natural Language Processing through the use of python and the
Natural Language Tool Kit. It mainly focuses on text classification, language modelling,
sequence tagging, word embeddings etc. Through a practical approach, students will get
Course Description hands on experience working with and analyzing text. Students will be able to formulate
solutions to text-based problems.
This course focuses on various clustering techniques such as K-Means, hierarchal clustering and
density-based clustering. Through a practical approach, students will get hands on experience using
Course Description python on real world dataset. This course also introduces the concept of reinforcement learning and
formalizes the problems as Markov decision processes. The students will learn and implement value
functions concepts for optimizing decision making processes.
The Deep Learning course provides a pathway for student's to take the definitive step in the world of
AI by helping them gain the knowledge and skills to level up their career. This course mainly focuses
on fundamental of deep learning, convolutional neural network, recurrent neural network, auto
Course Description encoders, generative adversial networks etc. Hands on experience will be done using Tensorflow and
Keras. Students will be able to build and train deep neural networks, identify key architecture
parameters, implement convolutional and recurrent neural networks and deep learning to
applications
Describe the deep learning algorithms which are more appropriate for various types of learning
tasks in various domains.
Compare detection and recognition tasks using convolution and adversarial neural networks.
Course Outcome Use dropout regularization, gradient descent, Batch normalization, and optimization algorithms
with convergence
Examine recurrent neural networks for modelling sequential data.
Assess the different learning models and prioritize their appropriate hyper parameters
Construct artificial neural networks with Tensorflow and Keras
AI Specialist
Data Scientist
NLP Engineer
Industrial Applications
😊 ML in Finance
😊 ML in Healthcare
😊 Dynamic Price Control in Travel Industries
😊 Machine Learning in social media
😊 ML for language translation and text generation
😊 ML in Retail/Logistics
😊 ML in Automation/Robotics Systems
😊 ML in Pipelining/Production
😊 ML in Smart Agriculture/Forecasting
😊 ML in Academics/Personalized Recommendation
Special Requirements
Laptop
It covers the concepts of cyber security with its importance and identifies various vulnerabilities and
security flaws in the operating systems and networks. It helps to analyze risks, security threats,
Course Description implementing host/software/network security, understanding various types of network attacks and
also focuses on network security programming (using python).
Core knowledge of Computer Networks, Operating Systems basics (Linux), Basic Python Programming
Special Requirement
Description of Courses
INT249 : SYSTEM ADMINISTRATION
2 0 2 (Credits 3)
LTP & Credits
This course covers the in-depth practical administration of Windows and Linux server operating systems in
which the focus shall be on file and folders management, Disk management, resource management,
Course Description network management, user management, authentication management and software package
management. The tools used are Port scanners, Sniffers, Partitioning tools, Disk property tools etc.
Special Requirement Core knowledge of Computer Networks, Operating Systems basics (Linux)
Description of Courses
INT250 : DIGITAL EVIDENCE ANALYSIS
2 0 2 (Credits 3)
LTP & Credits
This course covers the in-depth understanding and practical demonstrations of digital forensic and
incident response methods. The course includes incident response handling, forensic duplication, live
Course Description data collection, network evidence collection and evidence handling. The course also focuses on data
analysis from system memory and network-based evidence. The tools used are the FBI toolkit, Netcat,
Cryptcat, RAM dump, Encase, TCPdump, FTK imager, FTK, Autopsy etc.
Special Requirement Core knowledge of Computer Networks, Operating Systems basics (Linux)
Description of Courses
INT244 : SECURING COMPUTING SYSTEMS
2 0 2 (Credits 3)
LTP & Credits
The course covers the basic concepts of ethical hacking along with the analysis of various vulnerabilities
and security flaws that exist in the operating systems, web servers, and network equipment through the
Course Description techniques used by hackers. The course provides the understanding about cryptography, footprinting,
scanning, enumeration, system hacking, malware, sniffers, social engineering, DoS, session hijacking,
SQL injection, mobile & cloud device security. It also helps to clarify & learn SIEM and SOC solutions.
Define the basic concepts of operating systems, cryptography and ethical hacking
Demonstrate various methods of performing footprinting and scanning the target systems
Illustrate the process of enumerating and compromising a target system
Examine the usage of sniffers, social engineering techniques and denial of service attacks for
compromising the target
Course Outcome
Analyze the functionality of session hijacking, web applications and SQL injection in testing the
security of target
List the process of identifying the threats to WiFi, Bluetooth, mobile devices, cloud services and
implementing SOC and SIEM solutions
Special Requirement Core knowledge of Computer Networks, Operating Systems basics (Linux)
Description of Courses
INT245 : PENETRATION TESTING
2 0 2 (Credits 3)
LTP & Credits
It covers the tools and technologies used by penetration testers in order to identify weaknesses in
Course Description information system and recommend mitigation measures to increase the resistance of the
information technology (IT) infrastructure to unauthorized access.
Understand rules of engagement for safely conducting the penetration Testing exercise within an
organization
Identify various foot printing techniques to enumerate a target
Enumerate a vulnerability scan strategy in-line with organizational in-scope requirements
Course Outcome Demonstrate web application and mobile device exploitation using different attacks
Determine techniques used to conduct system hacking and launch exploit code for remote access
of a target
Illustrate different testing deliverables out of penetration testing reports and suggest post
corrective actions
Special Requirement Core knowledge of Computer Networks, Operating Systems basics (Linux)
Description of Courses
INT251 : MALWARE ANALYSIS AND CYBER DEFENCE
2 0 2 (Credits 3)
LTP & Credits
This course will provide a depth understanding of different types of malwares, like viruses, worms,
and Trojans. Students will gain hands-on experience in analyzing malicious files, identifying malicious
processes, and more. It also covers new techniques and tools of malware analysis which help speed
Course Description up analysis and transition students from malware analyst to reverse engineer and how to perform
dynamic and static analysis. The tools used are Pestudio, Process Monitor, Wireshark, Autoruns,
Cuckoo Sandbox etc.
Understand the tools and techniques to extract metadata information from the malicious binary
Analyze the behavior of the malware and its interaction with the system
Course Outcome Understand basics of assembly Language and the necessary skills required to perform code
analysis
Analyze the stealth techniques used by advanced malware to hide from Forensic tools
Special Requirement Core knowledge of Computer Networks, Operating Systems basics (Linux)
Career Opportunities
Cyber Security Consultant
Penetration Tester
Malware Analyst
Freelancer
Industrial Applications
😊 Intelligence agencies
😊 Defense
😊 Automation systems
😊 Retail
😊 Banking
😊 Internet of Things
😊 Automotive sector
😊 E-commerce
Special Requirements
Laptop
Brief description This specialization empowers them to contribute effectively to the design,
development, and management of cloud-based solutions, which are
increasingly integral to a wide range of industries and applications.
This course is to teach advantages and working with public cloud infrastructure, A public
cloud is an IT model where public cloud service providers make computing services—
Course Description including compute and storage, develop-and-deploy environments, and applications—
available on-demand to organizations and individuals over the public internet.
This course will give you the core skills needed to build and operate your
CloudStack private cloud. The course is a combination of instructor led
learning and hands-on labs. Using hands-on labs, participants will be guided
Course Description through the process of creating a new zone, system VM’s, configuring service
Offerings, domains, accounts and virtual private clouds. The instructor will also
share extensive knowledge on CloudStack deployments, offering advice on
best practices and tips on how to design their own deployment.
classify the key technologies and capabilities required for working with
virtualization and cloud computing infrastructure
Course Outcome
measure the need of cloud based infrastructure using VMware virtualized
platforms
This course you will learn the fundamentals of cloud computing and understand
the standard of expertise for cloud security; this gives you a cohesive and
Course Description vendor-neutral understanding of how to secure data in the cloud. I also allows
you to understand the better practices implemented in preserving privacy and
coping with other security based issues in cloud.
Cloud Administrator
Cloud Consultant
Industrial Applications
Industry Automation
EDucation
Dear Students,
Provide the feedback for this session on Myclass as well as on UMS at
below given link: