Professional Documents
Culture Documents
Final Year B.tech CSE
Final Year B.tech CSE
Final Year B.tech CSE
fo r
*Student working hrs: 20 hrs/ week and faculty contact hrs: 8 hrs/week per batch of 8-10
students.
1CS42* : Professional Elective VII
3CS 431 Computer forensics
The students opting for SPAI may use MOOCS for learning professional elective. The
blended learning strategy such as flipped classroom can be exercised by the course
teacher.
level Descriptor
CO1 interpret the basic issues in BIS and become familiar with the 2 Understanding
various BI processes
CO2 compare and contrast different emerging architectures for BI 4 Analyzing
systems
CO3 appraise or evaluate BI Techniques 5 Evaluating
CO4 design the BI models using different open source and commercial 6 Creating
BI tools
CO-PO Mapping :
a b c d e f g h i j k
CO1 3 2 1
CO2 3 2
CO3 3 2
CO4 3 2 1 3
Assessments :
Teacher Assessment:
Two components of In Semester Evaluation (ISE), One Mid Semester Examination (MSE) and one End
Semester Examination (ESE) having 20%, 30% and 50% weights respectively.
Assessment Marks
ISE 1 10
MSE 30
ISE 2 10
ESE 50
1. To learn what cybercrime is and get an overview of cybercrime scenario in India as well as the
overall global perspective.
2. To learn how attackers plan cyber offences against an individual and/or against an organization.
3. To develop a basic understanding of various types of cyber attacks through which attackers target
the computer system.
4. To understand the legal perspective of cyber crime including the Indian ITA 2000 and its latest
amendment.
5. To learn how cyber forensics can be used in cybercrime investigation.
6. To get an overview of Ethical Hacking.
Course Learning Outcomes:
CO After the completion of the course the student should be able to Bloom’s Cognitive
level Descriptor
CO-PO Mapping :
a b c d e f g h i j k
CO1 2 2 3
CO2 3 3 1
CO3 3 2 2
Assessments :
Teacher Assessment:
Two components of In Semester Evaluation (ISE), One Mid Semester Examination (MSE) and one End
Semester Examination (ESE) having 20%, 30% and 50% weights respectively.
Assessment Marks
ISE 1 10
MSE 30
1. To acquire knowledge in security services, goals and mechanism and understand the mathematical
foundation required for Cryptography.
2. To understand the basic concept of Cryptography and Network Security protocols.
3. To provide knowledge on Cryptographic hash functions, key Exchange Algorithms and system
security tools.
level Descriptor
a b c d e f g h i j k
CO1 3 2 2
CO2 3 2 3 1
CO3 2 3
Assessments :
Teacher Assessment:
Two components of In Semester Evaluation (ISE), One Mid Semester Examination (MSE) and one End
Semester Examination (ESE) having 20%, 30% and 50% weights respectively.
Assessment Marks
Module 6: System Security: Intrusion Detection System (IDS), Malicious softwares, 6Hrs.
Firewalls.
Course Objectives :
1. To perceive the basic concepts of Data Warehousing, Data mining – its architecture and
implementations.
2. To implement and analyze the data warehousing processes and data mining algorithms.
3. To evaluate the different data warehousing and data mining systems/tools.
level Descriptor
CO1 describe the data warehousing processes and data mining 2 Understanding
algorithms.
CO2 evaluate and analyze data warehousing systems and data 5 Evaluating
mining tools.
CO3 design the data warehousing systems and implement the 6 Creating
different data mining algorithms.
CO-PO Mapping :
a b c d e f g h i j k
CO1 3 2
CO2 3 1
CO3 1 3 2
Assessments :
Teacher Assessment:
Two components of In Semester Evaluation (ISE), One Mid Semester Examination (MSE) and one End
Semester Examination (ESE) having 20%, 30% and 50% weights respectively.
Assessment Marks
ISE 1 10
MSE 30
ISE 2 10
ESE 50
ISE 1 and ISE 2 are based on assignment/declared test/quiz/seminar etc.
MSE: Assessment is based on 50% of course content (Normally first three modules)
Module 1 : Explain the need of data warehouse in addition to traditional operational database systems and
develop a general framework for decision support within organizations.
Module 2 : Describe the concepts, strategies, and methodologies related to the design and build data
warehouse and apply their ability to conduct dimensional modeling, data extraction, transformation and
loading (ETL) process.
Module 3 : Categorize and carefully differentiate between situations for applying different classification
algorithms.
CO-PO Mapping :
a b c d e f g h i j k
CO1 2 2
CO2 3 2
CO3 1 3
level Descriptor
CO-PO Mapping :
a b c d e f g h i j k
CO1 1 2 1
CO2 1 1
CO3 1 1
Assessments :
Teacher Assessment:
Two components of In Semester Evaluation (ISE), One Mid Semester Examination (MSE) and one End
Semester Examination (ESE) having 20%, 30% and 50% weights respectively.
Assessment Marks
ISE 1 10
MSE 30
ISE 2 10
ESE 50
ISE 1 and ISE 2 are based on assignment/declared test/quiz/seminar etc.
MSE: Assessment is based on 50% of course content (Normally first three modules)
ESE: Assessment is based on 100% course content with 60-70% weightage for course content (normally last
three modules) covered after MSE.
Course Contents:
Module 1 : Introduction 7 Hrs.
Introduction to Machine Learning, Concepts of Supervised and Unsupervised Learning, Statistical
Decision Theory : Linear and Multivariate Regression, Dimensionality Reduction
Textbooks:
1. SDN: Software Defined Networks, An Authoritative Review of Network
Programmability Technologies, By Thomas D. Nadeau, Ken Gray Publisher: O'Reilly Media,
August 2013, ISBN: 978-1-4493-4230-2, ISBN 10:1-4493-4230-2.
2. Software Defined Networks: A Comprehensive Approach, by Paul
Goransson and Chuck Black, Morgan Kaufmann, June 2014, Print Book
ISBN: 9780124166752, eBook ISBN : 9780124166844
References:
1. SDN and OpenFlow for Beginners by Vivek Tiwari, Sold by: Amazon
Digital Services, Inc., ASIN: , 2013.
2. Network Innovation through OpenFlow and SDN: Principles and Design,
Edited by Fei Hu, CRC Press, ISBN-10: 1466572094, 2014.
Course Objectives :
1. To understand SDN/NFV motivation and benefits
2. To describe how SDN/Openflow work
3. To describe OpenFlow operation and the OpenStack
Course Learning Outcomes:
level Descriptor
CO1 explain and discuss the basic concepts and architecture of SDN 2 Understanding
in particular benefits brought about by the separation of data
and control planes.
CO2 analyze and apply implementation of SDN through Open 3,4 Applying,
Flow Switches Analyzing
CO3 critically evaluate the pros and cons of applying SDN, API 5 Evaluating
approaches, Hypervisor overlays, and Data Center SDN
CO-PO Mapping :
a b c d e f g h i j k
CO1 2 3 2
CO2 2 3 1
CO3 3 1 1
Assessments :
Teacher Assessment:
Two components of In Semester Evaluation (ISE), One Mid Semester Examination (MSE) and one End
Semester Examination (ESE) having 20%, 30% and 50% weights respectively.
Assessment Marks
ISE 1 10
MSE 30
Module 2 Hrs.
Network Virtualization: Concepts, Applications, Existing Network Virtualization Framework
(VMWare and others), Mininet based examples. 6
Module 3 Hrs.
Control Plane: Overview, Existing SDN Controllers including Floodlight and OpenDaylight
projects. Customization of Control Plane: Switching and Firewall, Implementation using SDN
Concepts.
6
Module 4 Hrs.
Data Plane: Software-based and Hadrware-based; Programmable Network Hardware.
Programming SDNs: Northbound Application Programming Interface, Current Languages and
Tools, Composition of SDNs. 6
Module 5 Hrs.
Network Functions Virtualization (NFV) and Software Defined Networks: Network
architecture, NFV Infrastructure, NFV Management and Orchestration (MANO), NFV and SDN
6
Module 6 Hrs.
Data Center Networks: Packet, Optical and Wireless Architectures, Network Topologies.
Use Cases of SDNs: Data Centers, Internet Exchange Points, Backbone Networks, Home
Networks, Traffic Engineering. 7
Module 1: explain the basic concepts and architecture of SDN in particular benefits brought about by
the separation of data and control planes.
Module 2: describe network virtualization.
Module 3: explain in detail the operation of the SDN control plane.
Module 4: describe the SDN data plane.
Module 5: describe Network Functions Virtualization components and how they work together.
Module 6: understand Data center networks and use cases of SDNs.
References:
1. Applied Software Architecture ,Christine Hofmeister, Robert Nord, Deli Soni, Addison-Wesley
Professional; 1st edition (November 4, 1999)
2. Enterprise Patterns and MDA: Building Better Software with Archetype Patterns and UML, Jim
Arlow, Ila Neustadt ,Addison-Wesley Professional, 2004.
3. Kai Qian, Xiang Fu, Lixin Tao, "Software Architecture and Design Illuminated", Jones & Bartlett
Learning, 2009.
Course Objectives :
1. To discuss concepts, processes and practices in Software Design
2. To explain technologies and components of business intelligence systems
3. To model and analyze multidimensional data
4. To apply business intelligence in specific application domains
5. To have hands-on with BI implementation using open source / commercial tools
Course Learning Outcomes:
CO After the completion of the course the student should be able to Bloom’s Cognitive
level Descriptor
CO1 explain the methods for designing new software solutions. 2 Understanding
CO2 recognize major software architectural styles, design patterns, and 4 Analyzing
frameworks.
CO3 evaluate the scenarios in object oriented software architecture. 5 Evaluating
CO4 design architecture for large-scale software systems. 6 Creating
CO-PO Mapping :
a b c d e f g h i j k
CO1 3 3
CO2 3 2
CO3 2 3
CO4 3 2
Assessments :
Teacher Assessment:
Two components of In Semester Evaluation (ISE), One Mid Semester Examination (MSE) and one End
Semester Examination (ESE) having 20%, 30% and 50% weights respectively.
Assessment Marks
ISE 1 10
MSE 30
ISE 2 10
ESE 50
level Descriptor
a b c d e f g h i j k
CO1 1 3 2
CO2 3 1
CO3 3 1
Assessments :
Teacher Assessment:
Two components of In Semester Evaluation (ISE), One Mid Semester Examination (MSE) and one End
Semester Examination (ESE) having 20%, 30% and 50% weights respectively.
Assessment Marks
ISE 1 10
MSE 30
ISE 2 10
ESE 50
ISE 1 and ISE 2 are based on assignment/declared test/quiz/seminar etc.
References: Nil
Course Objectives :
1. To understand project identification process and carryout literature survey for real world problem
2. To use latest design, development tools and technologies.
3. To undergo project management techniques.
4. To acquire ability to map technical skills to real life applications through modeling.
Course Learning Outcomes:
CO After the completion of the course the student should be able to Bloom’s Cognitive
Level Descriptor
CO-PO Mapping :
a b c d e f g h i j k
CO1 3 2 1
CO2 3 1
CO3 1 3
Assessment:
In Semester Evaluation (ISE), and End Semester Examination (ESE) having 50% weightageeach.
Assessment Marks
ISE 50
ESE 50
ISE is based on performance of student in laboratory, experimental write-up, presentation, oral, and test
(surprise/declared/quiz). The course teacher shall use at least two assessment tools as mentioned above for ISE.
ESE: Assessment is based on performance and oral.
Course Contents:
1. Project work is to be carried out in two semesters with group size of maximum three to
four students
2. In first semester project group will select a project topic with consent from guide and
approval from department and submit the brief document discussing the outline of the
project with clear objectives.
4. At the end of the semester project group should complete the system design, Algorithm
design and present with suitable model. (CFD, DFD & Data structure layout, SRS &
UML diagram using project management tool)
5. Project report should be prepared using Latex and submitted in soft and hard form
References:
1. “Network Security”, Private Communication in a Public World”, Kaufman, Perlman, Speciner, 2nd
Ed. (LPE)
2. “Handbook of Applied Cryptography”, Menezes, A. J., P. C. Van Oorschot, and S. A. Vanstone.
3. “Applied Cryptography: Protocols & Algorithms”, BruceSchneier, (Wiley)
Course Objectives :
1. To study currently available security services, mechanisms and algorithms.
2. To practice already implemented algorithms and their revised versions as the countermeasures
against the incidental and intentional attacks while handling information in the communication
networks
3. To obtain some hands on experience with open source information security tools like Snort,
Wireshark and Nessus etc.
Course Learning Outcomes:
CO After the completion of the course the student should be able to Bloom’s Cognitive
level Descriptor
a b c d e f g h i j k
CO1 3 1 3 3 2
CO2 3 1 3 2
CO3 1 3 2
Assessment:
In Semester Evaluation (ISE), and End Semester Examination (ESE) having 50% weightage each.
Assessment Marks
ISE 50
ESE 50
ISE is based on performance of student in laboratory, experimental write-up, presentation, oral, and test
(surprise/declared/quiz). The course teacher shall use at least two assessment tools as mentioned above for ISE.
ESE: Assessment is based on performance and oral.
Course Contents:
Laboratory Experiences:
Minimum 8 experiments will be performed to have through understanding and practice of the
theory covered in the subject. Some of the topics are listed below:
The lab assignments can be implemented using C / C++ / Java / any other suitable programming
The lab work assignments will be periodically assessed by the concerned batch teacher. The
performance of individual student in a batch undergoing the lab assignments will be considered in
determining term work marks.
1. To have the hands-on and practicing the concepts/techniques studied in theory course.
2. To build the data warehouses for real world problems and apply the data mining techniques.
3. To evaluate the different commercial / open source data warehousing and data mining tools.
Course Learning Outcomes:
CO After the completion of the course the student should be Bloom’s Cognitive
able to
Level Descriptor
CO1 interpret the details of different algorithms made available by 2 Understanding
popular commercial, open source data mining / data
warehousing systems.
CO2 compare, evaluate different data warehousing/data mining 5 Evaluating
tools/system.
CO3 solve the complex problems individually or in groups, develop 3 Applying
and demonstrate the data warehousing and data mining systems.
CO-PO Mapping :
a b c d e f g h i j k
CO1 3 1
CO2 3 3
CO3 2 1 3
Assessment:
In Semester Evaluation (ISE), and End Semester Examination (ESE) having 50% weightageeach.
Assessment Marks
ISE 50
ESE 50
ISE is based on performance of student in laboratory, experimental write-up, presentation, oral, and test
(surprise/declared/quiz). The course teacher shall use at least two assessment tools as mentioned above for ISE.
ESE: Assessment is based on performance and oral.
Course Contents:
Laboratory Experiences:
x It should consist of 8-10 experiments based on syllabus, applied/real world
References:
1. Network Forensics: Tracking Hackers Through Cyberspace, Sherri Davidoff, Jonathan Ham
Prentice Hall, 2012
2. Guide to Computer Forensics and Investigations (4th edition). By B. Nelson, A. Phillips, F.
Enfinger, C. Steuart. ISBN 0-619-21706-5, Thomson, 2009.
3. Computer Forensics: Hard Disk and Operating Systems, EC Council, September 17, 2009
Course Objectives :
1. To provide an understanding of Computer forensics fundamentals.
2. To describe the implementation of computer file systems in at least two operating systems.
3. Handle evidence without compromising it, and analyze it for presentation in a court of law.
Course Learning Outcomes:
level Descriptor
CO-PO Mapping :
a b c d e f g h i j k
CO1 3 3 2 1
CO2 2 1 3
CO3 3 1 2 1
Assessments :
Teacher Assessment:
Two components of In Semester Evaluation (ISE), One Mid Semester Examination (MSE) and one End
Semester Examination (ESE) having 20%, 30% and 50% weights respectively.
Assessment Marks
ISE 1 10
MSE 30
ISE 2 10
ESE 50
ISE 1 and ISE 2 are based on assignment/declared test/quiz/seminar etc.
MSE: Assessment is based on 50% of course content (Normally first three modules)
ESE: Assessment is based on 100% course content with 60-70% weightage for course content (normally last
Final Year B.Tech CSE Page 31
three modules) covered after MSE.
Course Contents:
Module 1 Hrs.
Introduction to Computer Forensics: Computer crimes, evidence, extraction,
preservation, etc. Overview of hardware and operating systems: structure of storage
media/devices; windows/ Macintosh/ Linux -- registry, boot process, file systems, file 7
metadata.
Module 2 Hrs.
Data recovery: identifying hidden data, Encryption/Decryption, Steganography,
recovering deleted files. Digital evidence controls: uncovering attacks that evade
detection by Event Viewer, Task Manager, and other Windows GUI tools, data 7
acquisition, disk imaging, recovering swap files, temporary &cache files
Module 3 Hrs.
Computer Forensic tools: Encase, Helix, FTK, Autopsy, Sleuth kit Forensic Browser,
FIRE, Found stone Forensic ToolKit, WinHex, Linux dd and other open source tools. 7
Module 4 Hrs.
Network Forensic: Collecting and analyzing network-based evidence, reconstructing
web browsing, email activity, and windows registry changes, intrusion detection, tracking
6
offenders, etc.
Module 5 Hrs.
Software Reverse Engineering: defend against software targets for viruses, worms and
other malware, improving third-party software library, identifying hostile codes-buffer
6
overflow, provision of unexpected inputs, etc.
Module 6 Hrs.
Computer crime and Legal issues: Intellectual property, privacy issues, Criminal Justice
system for forensic, audit/investigative situations and digital crime scene, investigative
procedure/standards for extraction, preservation, and deposition of legal evidence in a 7
court of law, Case Studies in Computer Forensics.
Textbooks:
1. Moz, The Beginners Guide to SEO (Web Down Loadable)
2. AARON MATTHEW WAL L “Search Engine Optimization Book” (Web Down Loadable)
References:
1. Ricardo Baiza Yates “ Modern Information Retrieval” Addison-Wesley ACM Press
2. https://www.tutorialspoint.com/seo/seo_tutorial.pdf
3. W.Bruce Croft, Donald Metzler, Trevor Strohman “Search Engines Information Retrieval in
Practice”
Course Objectives :
1. To understand detailed functions of search engines.
2. To evaluate the different search engine designs.
3. To emphasize on optimizing design of search engines.
4. To study the measurements on search results.
Course Learning Outcomes:
level Descriptor
CO-PO Mapping :
a b c d e f g h i j k
CO1 1 2 1
CO2 1 1
CO3 1 1
Assessments :
Teacher Assessment:
Two components of In Semester Evaluation (ISE), One Mid Semester Examination (MSE) and one End
Semester Examination (ESE) having 20%, 30% and 50% weights respectively.
Assessment Marks
ISE 1 10
MSE 30
ISE 2 10
ESE 50
ISE 1 and ISE 2 are based on assignment/declared test/quiz/seminar etc.
MSE: Assessment is based on 50% of course content (Normally first three modules)
ESE: Assessment is based on 100% course content with 60-70% weightage for course content
(normally last three modules) covered after MSE.
Course Contents:
Module 1 : Introduction H r s.
How Search Engine Operates: Crawling and Indexing, Providing Answers, Examples 7
References: Nil
Course Objectives :
1. To undergo project management techniques
2. To apply project design principles using latest tools and technologies
3. To develop analytical vision and skills to analyse, compare the outcome with other techniques
4. To write and publish deliverable technical artifacts for the project
Course Learning Outcomes:
CO After the completion of the course the student should be able to Bloom’s Cognitive
level Descriptor
a b c d e f g h i j k
CO1 3 2
CO2 3 3 2 3
CO3 2 3 2
CO4 2 2
Assessment:
In Semester Evaluation (ISE), and End Semester Examination (ESE) having 50% weightageeach.
Assessment Marks
ISE 50
ESE 50
ISE is based on performance of student in laboratory, experimental write-up, presentation, oral, and test
(surprise/declared/quiz). The course teacher shall use at least two assessment tools as mentioned above for ISE.
ESE: Assessment is based on performance and oral.
Course Contents:
1. Preferably project work is to be continued from Project-I
2. Students should maintain a project log book containing weekly progress of the project
3. At the end of the semester project group should achieve all the proposed objectives of the
problem statement.
4. The work should be completed in all aspects of design, implementation and testing.