Download as pdf or txt
Download as pdf or txt
You are on page 1of 38

P.O. Limda Ta. Waghodia, Dist. Vadodara.

Pin – 391 760

PARUL I NSTITUTE OF E NGINEERING &


TECHNOLOGY

STUDENT
INFORMATION
HANDBOOK

DEPTMENT OF COMPUTERSCIENCE&ENGINEERING
SEMESTER 5

2023-24

P.O.LIMDA,TA.WAGHODIA,DISTVADODARA
PH.02668 -260338
ACADEMIC CALENDAR FOR ODD TERM - YEAR : 2023 - 24
Bachelor of Engineering/DiplomaEngineering/D2D/Master of Engineering/IEDP (Semester III, V, VII)
Teach.
Week No.
Week No.
Week Beginning Monday Tuesday Wednesday Thursday Friday Saturday

1 1 June 05 - Teaching Start 06 07 08 09 10

2 2 June 12 13 14 15 16 17

3 3 June 19 20 21 22 23 24

4 4 June/July 26 27 28 29 30 01 - Weekly 1

5 5 July 03 04 05 06 07 08 - Weekly 2

10 - Remedial
6 6 July MidTerm 11 12 13 14 15 - Weekly 3

7 7 July 17 18 19 20 21 22 - Weekly 4

8 8 July 24 25 26 27 28 29 - Weekly 5

9 9 July/Aug 31 01 02 03 04 05 - Weekly 6

10 Exam Aug 07 - Mid Sem Exam 08 - Mid Sem Exam 09 - Mid Sem Exam 10 - Mid Sem Exam 11 - Mid Sem Exam 12 - Mid Sem Exam

15 - Independence
11 10 Aug 14 Day 16 17 18 19

12 11 Aug 21 22 23 24 25 26

30 - Raksha Bandhan
13 12 Aug/Sept 28 29 31 01 02

14 13 Sept 04 05 06 07 - Janmashtmi 08 09

15 14 Sept 11 12 13 14 15 16

19 - Ganesh
16 15 Sept 18 Chaturthi 20 21 22 23

17 16 Sept 25 26 27 28 29 30

02 - Mahatma 03 - T/W 04 - T/W Submission 05 - T/W 06 - T/W 07 - T/W


18 17 Oct Gandhi Birthday Submission Submission Submission Submission

19 18 Oct 09 10 11 12 13 14 - Teaching End

20 PL Oct 16 17 18 19 20 21

23 - End Sem Theory 25 - End Sem Theory 26 - End Sem Theory 27 - End Sem Theory 28 - End Sem Theory
21 Exam Oct 24 - Dusshera

30 - End Sem Theory 31 - Sardar Patel 01 - End Sem Theory 02 - - End Sem 03 - End Sem Theory 04 - End Sem Theory
22 Exam Oct/Nov Birthday Theory

06 - Diwali Vacation 07 - Diwali Vacation 08 - Diwali Vacation 09 - Diwali Vacation 10 - Diwali Vacation 11- Diwali Vacation
23 VL Nov

13 - Diwali Vacation 14 - Diwali Vacation 15 - Diwali Vacationk 16 - Diwali Vacation 17 - Diwali Vacation 18 - Diwali Vacation
24 VL Nov

20 - End Sem 21 - End Sem 22 - End Sem 23 - End Sem 24 - End Sem 25 - End Sem
25 Exam Nov Practical Practical Practical Practical Practical Practical

* Diwali Vacation is from 06th Nov to 18th Nov, 2023


* Last date for internal marks entry and locking by HOD is 12th October, 2023.
* Last date for internal marks locking by HOI and Dean is 14th October, 2023.
* End semester theory examination will start from 23rd October, 2023 onwards. Dean - Faculty of Engg& Tech
* End semester practical examination will start from 20th Nov, 2023 onwards.
PARUL UNIVERSITY
PARUL INSTITUTE OF ENGINEERING & TECHNOLOGY, LIMDA

Subject Coordinators:

Sr No. Name of Faculty M. NO Subject Name Subject Code

1. Rajdipsinh Vaghela Software Engineering


(RV)

2. Quants Reasoning, 203105371

3. MASTERING KALI LINUX AND 203105362


OSINT

4. Digital Forensic 203105364 - LECT


203105365 - LAB

5. Information .Security 203105366 - LECT


Management

6. Azure - ELECTIVE 203105376 - LECT

Faculty Representatives

Sr. Name of Div


no. Mobile No E-mail ID
No Faculty

GAURAV 5B18 8979747750 gaurav.varshney19340@paruluniversity.ac.in


VARSHNEY

2 KISHORI 5B19 9909502123 kishori.shekokar20174@paruluniversity.ac.in


SHEKOKAR

3 ABHISHEK 5B20 8340192818 abhishek.kumar19495@paruluniversity.ac.in


KUMAR
Subject Syllabus
03105401 - Software Engineering

Course: BTech Semester: 7


Prerequisite: Basic knowledge of software applications. |
Rationale: This course provides a broad introduction to software engineering. The various process models required to develop
software is also being described. Moreover the functional and non-functional requirements are also described

Teaching and Examination Scheme


Teaching Scheme Examination Scheme

Lecture Tutorial Lab Internal Marks External Marks Total


Credit
Hrs/Week Hrs/Week Hrs/Week Hrs/ T CE P T P
4 0 2 - 5 20 20 20 60 30 150
SEE - Semester End Examination, CIA - Continuous Internal Assessment (It consists of Assignments/Seminars/Presentations/MCQ Tests, etc.)

Course Content W - Weightage (%) , T - Teaching hours


Sr. Topics W T
1 Introduction 10 6
Study of Different Models, Software Characteristics, Components, Applications, Layered Technologies, Processes,
Methods and Tools, Generic View Of Software Engineering, Process Models- Waterfall model, Incremental,
Evolutionary process models- Prototype, Spiral And Concurrent Development Model
2 Requirements Engineering 15 9
Problem Recognition, Requirement Engineering tasks, Processes, Requirements Specification, Use cases and
Functional specification, Requirements validation, Requirements Analysis
3 Structured System Design 12 7
Design Concepts, Design Model, Software Architecture, Data Design, Architectural Styles and Patterns, Architectural
Design, Alternative architectural designs, Modeling Component level design and its modeling, Procedural Design,
Object Oriented Design
4 Data Oriented Analysis & Design 12 7
Difference between Data and Information, E-R Diagram, Dataflow Model, Control Flow Model, Control and Process
Specification, Data Dictionary
5 Agile Development 6 4
Agility and Agile Process model, Extreme Programming, Other process models of Agile Development and Tools.
6 Planning a Software Project 10 6
Scope and Feasibility, Effort Estimation, Schedule and staffing, Quality Planning, Risk management-
identification, assessment, control, project monitoring plan, Detailed Scheduling
7 Quality Assurance 10 6
Quality Control, Assurance, Cost, Reviews, Software Quality Assurance, Approaches to SQA, Reliability
8 Coding and Unit Testing 10 6
Programming principles and guidelines, Programming practices, Coding standards, Incremental development of
code, Management of code evaluation, Unit testing- procedural units, classes, Code Inspection, Metrics- size
measure, complexity metrics, Cyclomatic Complexity, Halstead measure, Knot Count, Comparison Of Different
Metrics
9 Testing 15 9
Concepts, Psychology of testing, Levels of testing, Testing Process- test plan, test case design, Execution, Black-Box
testing ʹBoundary value analysis ʹPair wise testing- state based testing, White-Box testing ʹcriteria and test case
generation and tool support

Printed on : 02-06-2023 11:43 AM Page 1 of 2


Subject Syllabus
03105401 - Software Engineering

Reference Books
1. Software Engineering
By R. Pressmen | 6th
2. Software Engineering
By Sommerville
3. Software Engineering
By Rajiv Mall | PHI
4. Software Engineering
By PankajJalote | Wiley India

Course Outcome
After Learning the Course the students shall be able to:
1. Analyze, design, verify, validate, implement and maintain software systems.
2. Define a Project Management Plan, tabulate Testing Plans and Reproduce effective procedures.
3. Manage the development of software systems.

List of Practical
1. Project Definition and objective of the specified module.

2. Design and Implementation of different software engineering models.

3. Design of Software Requirement Specification (SRS) for the module.

4. Documentation of Software project management planning (SPMP) for the specified module.

5. Design of different Software Cost Estimation models.

Designing SA/SD including Requirement specification, DFD with data dictionary and Structure chart for the specific
6.
module.

Designing the module using Object Oriented approach including Use case Diagram with scenarios, Class Diagram and State
7.
Diagram

Designing the module using Object Oriented approach including Collaboration Diagram, Sequence Diagram and Activity
8.
Diagram

9. Defining Coding Standards and walk through

10. Use of different Testing Tools with comparison.

Printed on : 02-06-2023 11:43 AM Page 2 of 2


Subject Syllabus
203105304 - Software Engineering Laboratory

Course: BTech Semester: 5


Prerequisite: Basic knowledge of software applications. |
Rationale: This course provides a broad introduction to software engineering. The various process models required to develop
software is also being described. Moreover the functional and non-functional requirements are also described.

Teaching and Examination Scheme


Teaching Scheme Examination Scheme

Lecture Tutorial Lab Internal Marks External Marks Total


Credit
Hrs/ Hrs/ Hrs/Week Hrs/ T CE P T P
0 0 2 - 1 - - 20 - 30 50
SEE - Semester End Examination, CIA - Continuous Internal Assessment (It consists of Assignments/Seminars/Presentations/MCQ Tests, etc.)

Course Outcome
After Learning the Course the students shall be able to:
After learning the course the students shall be able to:
1. Prepare and do Software Requirement Specification and Software Project Management Plan.
2. To ensure the quality of software product, different quality standards and software review techniques
3. Apply the concept of Functional Oriented and Object Oriented Approach for Software Design.
4. Understand modern Agile Development and Service Oriented Architecture Concept of Industry
5. Analyze, design, verify, validate, implement and maintain software systems.
6. Execute a Project Management Plan, tabulate Testing Plans and Reproduce effective procedures.

Printed on : 02-06-2023 11:47 AM Page 1 of 2


Subject Syllabus
203105304 - Software Engineering Laboratory

List of Practical
1. Project Definition and objective of the specified module and Perform Requirement Engineering Process.

2. Identify Suitable Design and Implementation model from the different software engineering models.

3. Prepare Software Requirement Specification (SRS) for the selected module.

4. Develop Software project management planning (SPMP) for the specified module.

5. Do Cost and Effort Estimation using different Software Cost Estimation models.

Prepare System Analysis and System Design of identified Requirement specification using structure design as DFD with
6.
data dictionary and Structure chart for the specific module.

Designing the module using Object Oriented approach including Use case Diagram with scenarios, Class Diagram and State
7.
Diagram, Collaboration Diagram, Sequence Diagram and Activity Diagram.

8. Defining Coding Standards and walk through.

9. Write the test cases for the identified module.

10. Demonstrate the use of different Testing Tools with comparison.

11. Define security and quality aspects of the identified module.

Printed on : 02-06-2023 11:47 AM Page 2 of 2


Subject Syllabus
203105364 - Digital Forensics and Incident Response

Course: BTech Semester: 5


Prerequisite: Basic knowledge of operating systems, Social Networking platforms, ,Types of web application functionality |
Rationale: This course focuses on areas of digital crime investigation, evidence collection techniques, evidence analysis tools,
analyzing windows, network, WIFI and web applications for cyber-crime. Understanding the technicalities of crime, reporting and
presenting it in the court of law.

Teaching and Examination Scheme


Teaching Scheme Examination Scheme

Lecture Tutorial Lab Internal Marks External Marks Total


Credit
Hrs/Week Hrs/Week Hrs/Week Hrs/Week T CE P T P
3 - - - 3 20 20 - 60 - 100
SEE - Semester End Examination, CIA - Continuous Internal Assessment (It consists of Assignments/Seminars/Presentations/MCQ Tests, etc.)

Course Content W - Weightage (%) , T - Teaching hours


Sr. Topics W T
1 Basics of Computer: 20 8
History of Computers, components of computer- input and output devices, CPU, Memory hierarchy, types of
memory, storage devices, system softwares, application softwares.
Cyber Crime and types:
Definition and types of cybercrimes, electronic evidence and handling, electronic media, collection, searching and
storage of electronic media, introduction to internet crimes, hacking, credit card and ATM frauds, emerging digital
crimes and modules.
2 Digital Forensics and Investigation Process: 20 12
Introduction to Digital forensics- Evolution of Digital forensics- Stages of Digital forensic process- Benefits of Digital
forensics-uses of Digital forensics ʹobjectives of Digital forensics ʹRole of Forensic Investigator- Forensic
Readiness.
Introduction to Cyber Crime Investigation ʹAssess the situation ʹAquire the data ʹAnalyze the data ʹReport the
investigation
Definition and Cardinal Rules, Data Acquisition and Authentication Process, Windows Systems-FAT12, FAT16, FAT32
and NTFS, mac file systems, computer evidence, Internet evidence, OS evidence and their forensic applications
Challenges in Digital Forensic Investigations
3 Forensic Tools and Processing of Electronic Evidence: 20 12
Introduction to Forensic Tools, tools for Disk Imaging, Data Recovery, Autopsy and FTK tools,
Anti Forensics and probable counters measures, Steganography, retrieving information, process of computer
forensics and digital investigations, processing of digital evidence, digital images, data recovery, multimedia
evidence.
Retrieving deleted data: desktops, laptops and mobiles, retrieving data from slack space, renamed file, compressed
files.
4 Email Investigations and Report Writing: 20 5
Email, Types of Email, Email Protocols, Email Attacks, Privacy in Emails, Email Forensics, Email Forensic Tools.
Report Preparation ʹGathering Data, analyzing results, Outlining and organizing the report, writing and revising the
rough draft, Expert witness ʹLegal aspects of computing
5 Case Studies with IT Act 2000 and Penalties: 20 5
Offences under the Information and Technology Act 2000 - Penalty and adjudication - Punishments for
contraventions under the Information Technology Act 2000 (Case Laws, Rules and recent judicial pronouncements
to be discussed) - Limitations of Cyber Law.
Case Studies:
Blackmailing, credit card fraud, phishing, Hosting Obscene Profiles, Illegal Money Transfers, Intellectual property
Theft, Email Forensics, data theft , Hacking, Morphed Photographs, etc.

Printed on : 02-06-2023 12:01 PM Page 1 of 2


Subject Syllabus
203105364 - Digital Forensics and Incident Response

Reference Books
1. B. Nelson, A. Phillips, and C. Steuart, Guide to Computer Forensics and Investigations, 4th Edition, Course Technology,
2010

2. John Sammons, The Basics of Digital Forensics, 2nd Edition, Elsevier, 2014

3. John Vacca, Computer Forensics: Computer Crime Scene Investigation, 2nd Edition, Laxmi Publications, 2005.

Course Outcome
After Learning the Course the students shall be able to:
After Learning the Course, the students shall be able to:
1. Perform the steps included in a digital investigation from the initial recognition of an incident through the steps of evidence
gathering, preservation and analysis, and the completion of legal proceedings;
2. Identify important file metadata and apply their use in a forensic investigation;
3. Perform a forensic investigation on a forensic image, using various tools to recover evidence, resulting in a report documenting
the investigation;
4. Write professional quality reports that include both analysis and investigation.

Printed on : 02-06-2023 12:01 PM Page 2 of 2


Subject Syllabus
203105365 - Digital Forensics and Incident Response
Laboratory

Course: BTech Semester: 5


Prerequisite: Basic knowledge of networking. |
Rationale: This course focuses on areas of digital crime investigation, evidence collection techniques, evidence analysis tools,
analyzing windows, network, WIFI and web applications for cyber-crime. Understanding the technicalities of crime, reporting and
presenting it in the court of law.

Teaching and Examination Scheme


Teaching Scheme Examination Scheme

Lecture Tutorial Lab Internal Marks External Marks Total


Credit
Hrs/Week Hrs/Week Hrs/Week Hrs/Week T CE P T P
- - 2 - 1 - - - - 30 50
SEE - Semester End Examination, CIA - Continuous Internal Assessment (It consists of Assignments/Seminars/Presentations/MCQ Tests, etc.)

Course Outcome
After Learning the Course the students shall be able to:
After Learning the Course, the students shall be able to:
1. Perform the steps included in a digital investigation from the initial recognition of an incident through the steps of evidence
gathering, preservation and analysis, and the completion of legal proceedings.
2. Identify important file metadata and apply their use in a forensic investigation.
3. Perform a forensic investigation on a forensic image, using various tools to recover evidence, resulting in a report documenting
the investigation.
4. Write professional quality reports that include both analysis and investigation.

List of Practical
1.
Setting up a DFIR lab.
2.
Non-Volatile Disk imaging using FTK Imager
In a digital forensics investigation, a company suspects that an employee has leaked
confidential information to a competitor. As a digital forensic analyst, how would you use FTK
Imager to conduct a non-volatile disk imaging process on the employee's computer to search for
evidence of the leak?

3.
Analyzing the Physical image using Autopsy to extract evidence
A cybercrime investigation team has seized a suspect's hard drive, which is believed to contain
evidence related to a recent hacking incident. As a digital forensic analyst, you are tasked with
analyzing the physical image of the hard drive to extract evidence. How would you use Autopsy
to analyze the physical image and identify any relevant evidence?

4.
Analyzing the Live running OS using Autopsy to extract evidence without Imaging.
A company suspects that an employee has been using a company laptop to engage in illegal
activities during business hours. As a digital forensic analyst, you are tasked with analyzing the
Printed on : 02-06-2023 12:02 PM Page 1 of 3
Subject Syllabus
203105365 - Digital Forensics and Incident Response
Laboratory

live running OS of the laptop to extract evidence without imaging the device. How would you
use Autopsy to analyze the live running OS and identify any relevant evidence while ensuring
the employee's privacy is respected?

5.
Creating RAM dumps using Dump-IT and FTK
A company suspects that a cyber attack has occurred on their network and they suspect that the
attacker might still be active in their system's memory. As a digital forensic analyst, you are
tasked with creating a RAM dump to investigate the incident. How would you use Dump-IT and
FTK to create a RAM dump and analyze it for any evidence of the attack?

6.
Analyzing the RAM Dump using Volatility Framework to extract evidence
A company has experienced a security breach, and the attacker is believed to have used a
rootkit to hide their presence in the system's memory. As a digital forensic analyst, you are
tasked with analyzing a RAM dump to identify any evidence of the attack. How would you use
the Volatility Framework to analyze the RAM dump and identify any evidence of the rootkit and
the attacker's activity?

7.
Setup SIEM tool and upload the extracted logs from windows system.

A company wants to improve their cybersecurity posture by implementing a Security Information


and Event Management (SIEM) tool to monitor their network and systems for any suspicious
activity. As a cybersecurity analyst, you are tasked with setting up the SIEM tool and configuring
it to receive and analyze logs from a Windows system. How would you set up the SIEM tool and
upload the logs from the Windows system to ensure that the tool is properly configured and able
to detect any security incidents?

8.
Installing wireshark and creating PCAP files for analysis. Application of wireshark search filters.
A network administrator needs to analyze network traffic to troubleshoot a network issue. As a
cybersecurity analyst, you are tasked with installing Wireshark on the administrator's computer
and showing them how to create PCAP files for analysis. You will also need to demonstrate the
use of Wireshark's search filters to help the administrator find the root cause of the network
issue. How would you install Wireshark, create and analyze PCAP files, and apply search filters
to identify the source of the network problem?

9.
Network malware logs analysis CTF (using Wireshark)
A company's network has been infected by a malware attack, resulting in the loss of sensitive
data. As a forensic analyst, you have been tasked with analyzing the network logs to identify the
source and type of malware. Using Wireshark, can you walk us through the steps you would
take to extract and analyze the relevant logs?

10.
Printed on : 02-06-2023 12:02 PM Page 2 of 3
Subject Syllabus
203105365 - Digital Forensics and Incident Response
Laboratory

10.
Windows security logs analysis (using SPLUNK)

A company has experienced a data breach and has requested a forensic investigation to
identify the cause of the breach. The company uses Windows servers and workstations, and the
security logs have been collected for analysis. The forensic team is tasked with analyzing the
security logs using SPLUNK to identify any suspicious activities that may have led to the data
breach.

Question:
What are the steps involved in setting up and configuring SPLUNK to analyze Windows security
logs? How can SPLUNK be used to identify potential security threats in the collected logs? Can
the forensic team identify the cause of the data breach by analyzing the security logs? If so,
what are the indicators of compromise that they have discovered?

11.
Digital Forensic Report Writing

You are a digital forensic analyst who has just completed an investigation of a cyber attack on a
company's network. Your client is a legal team representing the company and they require a
comprehensive report of your findings. What information should you include in your report, and
what should be the structure and format of the report? How will you ensure that the report is
accurate, clear, and concise while avoiding technical jargon? What are the best practices for
presenting complex technical information to non-technical stakeholders in a way that is easily
understandable?

Printed on : 02-06-2023 12:02 PM Page 3 of 3


Subject Syllabus
203105362 - Mastering Kali Linux and OSINT

Course: BTech Semester: 5


Prerequisite: N.A. |
Rationale: Kali Linux is to be used by those who are professional penetration testers, cybersecurity experts, ethical hackers, or
those who know how to operate it. In simple words, if you know how to use Linux and its terminal commands, architecture, system,
and file management then you are good to go with Kali Linux.

Teaching and Examination Scheme


Teaching Scheme Examination Scheme

Lecture Tutorial Lab Internal Marks External Marks Total


Credit
Hrs/Week Hrs/Week Hrs/Week Hrs/Week T CE P T P
3 - - - 3 20 20 - 60 - 100
SEE - Semester End Examination, CIA - Continuous Internal Assessment (It consists of Assignments/Seminars/Presentations/MCQ Tests, etc.)

Course Content W - Weightage (%) , T - Teaching hours


Sr. Topics W T
1 Getting Comfortable with Kali Linux: 20 10
Booting Up Kali Linux, The Kali Menu,Kali Documentation, The Kali Linux Official Documentation
The Kali Linux Support ForumThe Kali Linux Tools Site
Finding Your Way Around Kali:
The Linux Filesystem, Basic Linux Commands, Finding Files in Kali Linux, Managing Kali Linux Services:SSH Service,
HTTP Service
2 Searching, Installing, and Removing Tools: 20 9
apt update, apt upgrade, apt-cache search and apt show ,apt install, apt remove ʹpurge, dpkg
The Bash Environment , Environment Variables
Passive Information Gathering:
Website Recon, Whois Enumeration, Google Hacking ,Netcraft,Recon-ng ,Open-Source Code Shodan , Security
Headers Scanner, SSL Server Test, Pastebin, User Information Gathering, Email Harvesting, Password Dumps, Social
Media Tools ,Site-Specific Tools
3 Foundations of OSINT: 20 10
Overview of OSINT, The Intelligence Process of OSINT, Creating and Understanding, the OSINT Process Stages, Goals
of OSINT Collection, Setting Up an OSINT Platform, Documentation, Sock Puppets, Data Analysis
4 OSINT: 20 6
Leveraging Search Engines- Harvesting Web Data, File Metadata Analysis, Reverse Image Searching, Image Analysis,
Imagery and Maps, Language Translation
The Dark Web OSINT:
Business OSINT, Surface, Deep, and Dark Webs, Overview of Several Dark Webs, Tor, OSINT Automation, Breach
Data, Report Generation, Reporting.
5 OSINT Investigations: 20 10
Email Addresses, Usernames, Avatars and Image Searching, Addresses and Phone Numbers, People Search Engines,
Introduction to social media, Facebook, Twitter, Geolocation, Website Investigations, WHOIS, DNS, IP Addresses,
Computer Infrastructure, Wireless OSINT

Printed on : 02-06-2023 12:00 PM Page 1 of 2


Subject Syllabus
203105362 - Mastering Kali Linux and OSINT

Reference Books
1. Kali Linux Revealed: Mastering the Penetration Testing Distribution" by Raphael Hertzog, Jim O'Gorman, and Mati Aharoni

2. Open-Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

3. Open-Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence

4. Automating Open-Source Intelligence: Algorithms for OSINT

5. Open Source Intelligence Investigation: From Strategy to Implementation

Course Outcome
After Learning the Course the students shall be able to:
After studying this course, you should be able to:
1. Identify some of the factors driving the need for network security.
2. Identify and classify examples of attacks.
3. Define the terms vulnerability, threat and attack.
4. Identify physical points of vulnerability in simple networks

Printed on : 02-06-2023 12:00 PM Page 2 of 2


Subject Syllabus
203105363 - Mastering Kali Linux and OSINT Laboratory

Course: BTech Semester: 5


Prerequisite: Basic knowledge of networking. |
Rationale: Kali Linux is to be used by those who are professional penetration testers, cybersecurity experts, ethical hackers, or
those who know how to operate it. In simple words, if you know how to use Linux and its terminal commands, architecture, system,
and file management then you are good to go with Kali Linux.

Teaching and Examination Scheme


Teaching Scheme Examination Scheme

Lecture Tutorial Lab Internal Marks External Marks Total


Credit
Hrs/Week Hrs/Week Hrs/Week Hrs/Week T CE P T P
- - 2 - 1 - - 20 - 30 50
SEE - Semester End Examination, CIA - Continuous Internal Assessment (It consists of Assignments/Seminars/Presentations/MCQ Tests, etc.)

Course Outcome
After Learning the Course the students shall be able to:
After Learning the Course, the students shall be able to:
1. Identify some of the factors driving the need for network security.
2. Identify and classify examples of attacks.
3. Define the terms vulnerability, threat and attack.
4. Identify physical points of vulnerability in simple networks

List of Practical
1.
Setting Up KALI linux VM using vmware on windows host

A cybersecurity analyst needs to perform penetration testing on a client's network using Kali Linux. As
the IT support specialist, you are tasked with setting up a Kali Linux virtual machine (VM) using VMware
on a Windows host. You need to ensure that the Kali Linux VM is properly configured and connected to
the network so that the analyst can perform the necessary security testing. How would you set up the
Kali Linux VM, configure it, and ensure that it's connected to the network for penetration testing
purposes?

2.
Exercise: Basic Command Line Usage

Familiarize yourself with basic command-line operations in Kali Linux.

Practice commands like navigating directories, creating and deleting files, and managing permissions.

3.
Exercise: Network Scanning

Use tools like Nmap or Netdiscover to scan a local network for live hosts and open ports.

Learn how to identify network services running on those ports.

4.

Printed on : 02-06-2023 11:59 AM Page 1 of 3


Subject Syllabus
203105363 - Mastering Kali Linux and OSINT Laboratory

Exercise: Gathering Target Information

Identify the organization being targeted and gather publicly available information about its infrastructure,
employees, and online presence using OSINT techniques.

Utilize tools such as Maltego, theHarvester, and Shodan to gather information.

5.
Exercise: Social Media Profiling

Choose a target individual or organization and conduct a comprehensive search on their social media platforms.

Gather information such as personal details, connections, interests, or potential security risks.

6.
Exercise: Website and Domain Analysis

Select a website or domain of interest and analyze its structure, content, and metadata.

Identify the hosting provider, IP addresses, domain ownership details, and any potential vulnerabilities.

7.
Exercise: Email Header Analysis

Obtain an email header from a sample email and analyze it to extract valuable information.

Identify the source IP address, mail servers, and investigate any signs of email spoofing or malicious activity

8.
Exercise: People Search and Background Checks

Choose an individual and perform a thorough people search using online search engines, public records, and
directories.

Compile information about their employment history, education, associations, or any notable events.

9.
Exercise: Geolocation and Mapping

Utilize geolocation tools to track the location of an IP address or a mobile device.

Practice mapping techniques to visualize data and identify connections or patterns.

Exercise: Image and Video Analysis

Analyze images or videos found online to extract useful information.

Utilize reverse image search engines and metadata analysis to identify the source, location, or context of the
media.

10.
Exercise: Online Forum and Discussion Monitoring

Printed on : 02-06-2023 11:59 AM Page 2 of 3


Subject Syllabus
203105363 - Mastering Kali Linux and OSINT Laboratory

Monitor and analyze discussions on online forums, social media groups, or public platforms related to a specific
topic.

Identify trends, opinions, or potential security threats by monitoring user conversations and interactions.

11.
Exercise: Open Database Research

Explore publicly available databases and repositories to gather information on specific topics or industries.

Practice querying databases and extracting relevant data for analysis.

12.
Exercise: Deep Web Exploration

Familiarize yourself with tools like Tor and explore hidden services and websites on the dark web.

Practice navigating through Tor networks and understanding the unique challenges of gathering OSINT in this
environment.

13.
Exercise: OSINT Automation

Learn to leverage OSINT automation tools like Maltego, Recon-ng, or SpiderFoot for efficient data gathering and
analysis.

Explore the capabilities of these tools and customize them for specific OSINT tasks.

Exercise: Public Records Research

Dive into public records databases and government websites to collect information on individuals or organizations.

Practice searching for property records, court cases, business registrations, or other publicly accessible data
sources.

Printed on : 02-06-2023 11:59 AM Page 3 of 3


Subject Syllabus
203193304 - Professionalism & Corporate Ethics

Course: BTech Semester: 5


Prerequisite:
Rationale: -

Teaching and Examination Scheme


Teaching Scheme Examination Scheme

Lecture Tutorial Lab Internal Marks External Marks Total


Credit
Hrs/Week Hrs/Week Hrs/Week Hrs/Week T CE P T P
- 1 - - 1 - 100 - 0 0 100
SEE - Semester End Examination, CIA - Continuous Internal Assessment (It consists of Assignments/Seminars/Presentations/MCQ Tests, etc.)

Printed on : 02-06-2023 11:46 AM Page 1 of 1


Subject Syllabus
203105366 - Information Security Management System

Course: BTech Semester: 5


Prerequisite: Basic knowledge of cyber security |
Rationale: It makes you aware of the information security principles and introduces an approach to managing information security
within an organization by implementing an information security management system (ISMS) based on the ISO 27001: 2013
standard. It provides information on the necessary terms and concepts; explains the important clauses of the ISMS 27001 standard
and highlights how they are mapped with the Plan-Do-Check-Act approach.

Teaching and Examination Scheme


Teaching Scheme Examination Scheme

Lecture Tutorial Lab Internal Marks External Marks Total


Credit
Hrs/Week Hrs/Week Hrs/Week Hrs/Week T CE P T P
2 - - - 2 20 20 - 60 - 100
SEE - Semester End Examination, CIA - Continuous Internal Assessment (It consists of Assignments/Seminars/Presentations/MCQ Tests, etc.)

Course Content W - Weightage (%) , T - Teaching hours


Sr. Topics W T
1 IT Security Assessment and Auditing : 20 4
What is an IT security assessment, what is an IT security audit, what is compliance, how does and audit differs from
assessment, case study: Enron, WorldCom, TJX Credit Card Breach, Organization do to be in compliance, Auditing
within IT infrastructure, managing IT compliance, process during auditing, specific audit, Internal audit, third party
security, Auditing standards and frameworks, COSO, COBIT, ISO/IEC 27001 standard, ISO/IEC 27002 standard, NIST
800-53, Post audit improvement, industrial case study
2 ISMS ʹISO27001 & Audit Planning: 20 6
Introduction to ISO27001, Fundamental principles of information security, ISO/IEC 27001 certification process,
Information Security Management System (ISMS), Fundamental audit concepts and principles, Audit approach
based on evidence and on risk, Preparation of an ISO/IEC 27001 certification audit, ISMS documentation audit,
Conducting an opening meeting
3 ISMS Audit ʹImplementation: 20 8
Communication during the audit, Audit procedures: observation, document review, interview, sampling techniques,
technical verification, corroboration and evaluation, Audit test plans, Formulation of audit findings, Documenting
nonconformities
ISMS Audit ʹAssurance
Audit documentation, Quality review, Conducting a closing meeting and conclusion of an ISO/IEC 27001 audit,
Evaluation of corrective action plans, internal audit management program.
4 The 12 requirements of PCI DSS: 20 6
Install and maintain a firewall configuration to protect cardholder data
Do not use vendor-supplied defaults for system passwords and other security parameters
Protect stored cardholder data.
Encrypt transmission of cardholder data across open, public networks
Use and regularly update anti-virus software or programs.
Develop and maintain secure systems and applications.
Restrict access to cardholder data by business need to know.
Assign a unique ID to each person with computer access.
Restrict physical access to cardholder data.
Track and monitor all access to network resources and cardholder data.
Regularly test security systems and processes
Maintain a policy that addresses information security for all personnel
5 Conducting an ISO 27001:2013 Audit: 20 6
Communication during Audit.
Audit procedures include observation, document review, interview, sampling techniques, technical verification,
corroboration and evaluation. How to draft Audit plans. Evaluating of audit findings, drafting of nonconformity
reports.
Printed on : 02-06-2023 12:03 PM Page 1 of 2
Subject Syllabus
5 Conducting an ISO 27001:2013 Audit: 20 6
Communication during Audit. 203105366 - Information Security Management System
Audit procedures include observation, document review, interview, sampling techniques, technical verification,
corroboration and evaluation. How to draft Audit plans. Evaluating of audit findings, drafting of nonconformity
reports.

Reference Books
1. ISO/IEC 27001:2013 - A Pocket Guide" by Alan Calder

2. Information Security Management Principles" by David Alexander, Amanda Finch, and David Sutton

3. Implementing ISO 27001:2013: A Practical Guide" by Alan Calder and Steve Watkins

4. Information Security Management Handbook" by Harold F. Tipton and Micki Krause

5. IT Governance: An International Guide to Data Security and ISO27001/ISO27002" by Alan Calder and Steve Watkins

Course Outcome
After Learning the Course the students shall be able to:
After Learning the Course, the students shall be able to:
1. Plan, Design, and Implementing Auditing procedures.
2. Handle Audit Interviews.
3. Manage Audit Program and Draft Audit Reports.
4. Draft Non-Conformity reports. Perform an On-Site Audit.
5. Lead a team of Auditors
6. Real-time scenarios of challenges faced in Audit.

Printed on : 02-06-2023 12:03 PM Page 2 of 2


Subject Syllabus
203105371 - Quant, and Reasoning

Course: BTech Semester: 5


Prerequisite: Good fundamentals in calculations and ability to think logically |
Rationale: The course aims on exploring the fundamentals of Aptitude & reasoning, which involves the ability to analyze and
evaluate information logically. Students will learn essential skills such as critical thinking, problem-solving, and decision-making.
These skills are vital for software engineers as they navigate complex problems and make sound judgments throughout the
development process.

Teaching and Examination Scheme


Teaching Scheme Examination Scheme

Lecture Tutorial Lab Internal Marks External Marks Total


Credit
Hrs/Week Hrs/Week Hrs/Week Hrs/Week T CE P T P
3 - - - 3 20 20 - 60 - 100
SEE - Semester End Examination, CIA - Continuous Internal Assessment (It consists of Assignments/Seminars/Presentations/MCQ Tests, etc.)

Course Content W - Weightage (%) , T - Teaching hours


Sr. Topics W T
1 Unit-1Number system , LCM & HCF simplifications and approximations 9 4
2 Unit-2Averages , progessions, 9 4
3 Unit-3Ratio and proportion,Problems on Ages, Percentages 12 5
4 Unit-4Profit & loss, partnerships, S.I & C.I 12 5
5 Unit-5 18 8
Time & work , pipes and Cisterns, Time speed and distance , Problems on train crossings, Boats & streams ,
6 Unit-6Permutations & combinations, probability 11 5
7 Unit-7Directions, seating arrangements 4 2
8 Unit-8Clocks, calenders 6 3
9 Unit-9Cubes & Dice, syllogisms 9 4
10 Unit-10Blood Relations 5 2
11 Unit-11Series ,Analogy, odd man out, coding and Decoding 5 3

Reference Books
1. Quantitative Aptitude for CAT by Arun Sharma

2. Logical reasoning for CAT by Arun Sharma

3. Quantitative Aptitude by Abhijit Guha

Course Outcome
After Learning the Course the students shall be able to:
After learning the course the students shall be able to:
1.Apply Logic & critical thinking skills to analyze information and draw logical conclusions. 2.Solve complex problems by breaking
them down into manageable parts & develop effective solutions.
3. Demonstrate the ability to approach problem-solving from various perspectives

Printed on : 02-06-2023 11:44 AM Page 1 of 1


Subject Syllabus
203105376 - Azure Fundamentals

Course: BTech Semester: 5


Prerequisite: Basic understanding of computer concepts and basic programming |
Rationale: This course provides a broad introduction to Azure cloud , infrastructure , services, security and compliance ,also billing ,
pricing and support plans.

Teaching and Examination Scheme


Teaching Scheme Examination Scheme

Lecture Tutorial Lab Internal Marks External Marks Total


Credit
Hrs/Week Hrs/Week Hrs/Week Hrs/Week T CE P T P
2 - - - 2 20 20 - 60 - 100
SEE - Semester End Examination, CIA - Continuous Internal Assessment (It consists of Assignments/Seminars/Presentations/MCQ Tests, etc.)

Course Content W - Weightage (%) , T - Teaching hours


Sr. Topics W T
1 Cloud Concepts: 15 6
Understanding cloud computing principles, such as the different types of cloud models (public, private, hybrid),
infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS).
2 Azure Services: 20 7
Familiarity with the various Azure services and their common use cases. This includes services like Azure Virtual
Machines, Azure App Services, Azure Storage, Azure Functions, Azure SQL Database, and more
3 Security, Privacy, Compliance, and Trust: 25 5
Knowledge of Azure security features, identity and access management, Azure Active Directory, data protection,
compliance frameworks, and Azure governance methodologies.
4 Azure Pricing and Support: 15 5
Understanding Azure subscription options, cost management, pricing models, and the different support options
available to Azure customers
5 Azure SLA and Service Lifecycles: 25 7
Familiarity with Azure Service Level Agreements (SLAs) and the Azure service lifecycle, including planned
maintenance, updates, and deprecation policies.

Reference Books
1. Microsoft Azure Fundamentals: Understanding Azure" by Michael Collier and Robin Shahan - 3rd Edition

2. Azure for Architects: Implementing cloud design, DevOps, containers, IoT, and serverless solutions on your public cloud"
by Ritesh Modi - 2nd Edition

3. Exam Ref AZ-900 Microsoft Azure Fundamentals" by Jim Cheshire - 2nd Edition

Course Outcome
After Learning the Course the students shall be able to:
After learning the course the students shall be able to:
1. Understand the principles Cloud computing. 2 Familiarity with the various Azure services
3. Understanding the Azure security features,
4. Understanding Azure Service Level Agreements (SLAs) and the Azure service lifecycle

Printed on : 02-06-2023 12:04 PM Page 1 of 1


FACULTY OF ENGINEERING AND TECHNOLOGY
PARUL INSTITUTE OF ENGINEERING AND TECHNOLOGY
ACADEMIC YEAR 2023-2024
Course: COMPUTER SCIENCE AND FACULTY REPRESENTATIVE / MFT
ENGINEERING DIVISION: 5B18 Name: GAURAV VARSHNEY
Branch: CSE CS Email ID: gaurav.varshney19340@paruluni
EFFECTIVE FROM: 05-06-2023

TIME MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY SATURDAY


DFI
09:45 - 10:45 (Anmol Sir) 5B18:SE:KD: N-610 DFI (Anmol Sir) A-204 LIBRARY
N-609
LIBRARY
VQR VQR MKLO A-316
10:45 - 11:45 LIBRARY
(Akhand sir)N-609 (Akhand sir) N-610 (Tina ma'am)

11:45 - 12:45 LUNCH BREAK

A-227 OE(CS/IOT) A-316


12:45 - 01:35 DFI - A-227
MKLO -LAB LIBRARY LIBRARY (Dharmesh Sir)
(Anmol Sir)
(Tina ma'am)
01:35 - 02:25 LIBRARY
02:25 - 02:45 RECESS
OE(CS/IOT) MKLO ISMS A-316
02:45 - 03:45 ISMS (Santosh Sir)N-610 5B181:SE:D
(Dharmesh Sir) N-609 (Tina ma'am) N-506 (Santosh Sir)
M:(A-225)
DFI 5B182:SE:A
03:45 - 04:45 5B18:PCE:N-610 PP DFI MKLO
(Anmol Sir) N-609 UR:(A-225)
(Anmol Sir) N-506 (Tina ma'am)
SUBJECT_COD FACULTY
SUBJECT_NAME SHORT_NAME FACULTY FULL_NAME EMAIL ID MIS ID
E SHORT NAME

203105362 Mastering Kali Linux and OSI MKLO A3


Mastering Kali Linux and
203105363 OSINT Laboratory MKLO LAB A3

203105364 Digital Forensics and IR DFI Anmol Sir


Digital Forensics and IR
203105365 Laboratory DFI LAB Anmol Sir
INFORMATION
SECURITY
203105366 MANAGMENT
Open Elective 01SYSTEM ISMS A2
(Complsory Subjects :1)
203105376 Cyber Security / IOT Dharmesh Sir
203105371 VQR VQR Akhand Sir
203105303 Software Engineering DM DIGVIJAYMAHIDA
203105304 Software Engineering Laborat AUR AURGDIP SIR
203193304 Professionalism & Corporate Et PCE Dr. Parthiv Patel PP parthivkumar.patel@parulu
4254
FACULTY OF ENGINEERING AND TECHNOLOGY
PARUL INSTITUTE OF ENGINEERING AND TECHNOLOGY
ACADEMIC YEAR 2023-2024
Course: COMPUTER
FACULTY REPRESENTATIVE / MFT
SCIENCE AND
DIVISION: 5B19 Name: KISHORI SHEKOKAR
ENGINEERING
Branch: CSE CS Email ID: kishori.shekokar20174@paruluniver
EFFECTIVE FROM: 05-06-2023

SATUR
TIME MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY
DAY

DFI
09:45 - 10:45 5B191:SE:P N-609 (Anmol Sir) N-
OE(CS/IOT)
A:(A-227) 610
DFI -N-611 (Dharmesh Sir) N-609
5B192:SE:S
(Anmol Sir)
PM:(A-227) OE(CS/IOT) MKLO
10:45 - 11:45 (Dharmesh Sir) N- (Tina ma'am) N-
OE(CS/IOT)
609 610
(Dharmesh Sir) N-609
11:45 - 12:45 LUNCH BREAK
VQR VQR DFI
ISMS
12:45 - 01:35 (Akhand sir) (Akhand sir) (Anmol Sir) N- Library
(A2) N-609
N-609 N-610 609
DFI MKLO MKLO
01:35 - 02:25 (Anmol Sir) (Tina ma'am) N- (Tina ma'am) N- 5B19:PCE:N-609 AN
N-609 R (Akhand sir) N-610 609 610
02:25 - 02:45 RECESS

MKLO -
02:45 - 03:45 Library
LAB
Library Library Library
(Tina ma'am)
5B19:SE:KD: N-
03:45 - 04:45 N-509
609
SUBJECT_NA FACULTY FACULTY SHORT
SUBJECT_CODE SHORT_NAME EMAIL ID MIS ID
ME FULL_NAME NAME

203105362 Mastering Kal MKLO


Mastering
203105363 Kali Linux
Digital MKLO LAB
Forensics
203105364 and IR DFI
Digital
203105365 Forensics DFI LAB
INFORMAT
203105366 ION ISMS
Open
203105376 Elective 01 ISMS LAB
203105371 VQR VQR
203105303 Software Engi KD
203105304 Software Engi PA, SPM sachin.malviya29016@paruluniversity.ac.in
203193304 Professionalism PCE AMRITHA NAIR AN amritha.nair21543@paruluniversity.ac.in21543
FACULTY OF ENGINEERING AND TECHNOLOGY
PARUL INSTITUTE OF ENGINEERING AND TECHNOLOGY
ACADEMIC YEAR 2023-2024
Course: COMPUTER SCIENCE FACULTY REPRESENTATIVE / MFT
AND ENGINEERING DIVISION: 5B20 Name: ABHISHEK KUMAR
Branch: CSE CS Email ID: abhishek.kumar19495@paruluni

EFFECTIVE FROM: 05-06-2023

THURSD SATURDA
TIME MONDAY TUESDAY WEDNESDAY FRIDAY
AY Y

09:45 - 10:45 LIBRARY 5B20:SE:KD: N-610


DFI - LAB
LIBRARY (Santosh Sir) LIBRARY
VQR N-610
10:45 - 11:45 LIBRARY
(Akhand sir) A-316

11:45 - 12:45 LUNCH BREAK


ISMS
DFI
(Pioosh Sir)
12:45 - 01:35 (Santosh Sir) A- MKLO - LIBRARY
N-610 LAB
LIBRARY 316
DFI OE(CS/IOT) (Manthan
01:35 - 02:25 (Santosh Sir) (Akhand Sir) A- Sir) N-611 OE(CS/IOT)
316 (Akhand sir) N-610
02:25 - 02:45 RECESS
5B201:SE:SPM:(N- VQR DFI ISMS
MKLO 609)
02:45 - 03:45 (Akhand sir) N- (Santosh (Pioosh Sir)
(Manthan Sir) N-610 5B202:SE:SPM:(N- 610 Sir) N-611 N-610
609)
DFI DFI 5B20:PCE: MKLO
03:45 - 04:45
(Santosh Sir) N-610 (A2) N-610 N-611 AN (Manthan Sir) N-610
FACULT
SUBJECT_C FACULTY
SUBJECT_NAME SHORT_NAME Y SHORT EMAIL ID MIS ID
ODE FULL_NAME
NAME
Mastering Kali Linux and O
203105362 MKLO
Mastering Kali Linux
203105363 MKLO LAB
and OSINT Laboratory
Digital Forensics and
203105364 DFI
IR
Digital Forensics and
203105365 IR Laboratory DFI LAB
INFORMATION
203105366 SECURITY ISMS
MANAGMENT
Open Elective 01
203105376 (Complsory Subjects ISMS LAB
:1) Cyber Security /
VQR
203105371 VQR
Professionalism & Corpor
203105303 PCE ARUL PILLAI AP arul.pillai24682@paruluniversity.ac 24682
Software Engineering
203105303
203105304 Software Engineering Labor SPM
Lab
EnrollmentNo StudentName StudentProgram DivisionCode Batch
Sr.No No
DARJI HETVIBEN PIET-1 - BTech - Cyber
1 210303126001 SUBHASHBHAI Security 5B18_CYB_202324 1
FULTARIYA KHUSH PIET-1 - BTech - Cyber
2 210303126002 VINODBHAI Security 5B18_CYB_202324 1
GAMIT KARANSING PIET-1 - BTech - Cyber
3 210303126003 KUMUDBHAI Security 5B18_CYB_202324 1
JAISWAR YASH PIET-1 - BTech - Cyber
4 210303126004 RAMESHKUMAR Security 5B18_CYB_202324 1
PIET-1 - BTech - Cyber
5 210303126005 ARYA KARAN Security 5B18_CYB_202324 1
MISTRY
CHIRAGKUMAR PIET-1 - BTech - Cyber
6 210303126006 AMITBHAI Security 5B18_CYB_202324 1
PAREKH MOHIL PIET-1 - BTech - Cyber
7 210303126007 DHANESHKUMAR Security 5B18_CYB_202324 1
PATEL DIV PIET-1 - BTech - Cyber
8 210303126008 VINODKUMAR Security 5B18_CYB_202324 1
PIET-1 - BTech - Cyber
9 210303126009 PATEL MAHAK NILESH Security 5B18_CYB_202324 1
RAJ KRENIL PIET-1 - BTech - Cyber
10 210303126010 VYOMESHBHAI Security 5B18_CYB_202324 1
DEVANI RUTVIK PIET-1 - BTech - Cyber
11 210303126011 JITENDRABHAI Security 5B18_CYB_202324 1
JOLIYA HITESH PIET-1 - BTech - Cyber
12 210303126012 MANSUKHBHAI Security 5B18_CYB_202324 1
KANETIYA RAHUL PIET-1 - BTech - Cyber
13 210303126013 RAMESHBHAI Security 5B18_CYB_202324 1
NANERA SAGAR PIET-1 - BTech - Cyber
14 210303126014 VIPULBHAI Security 5B18_CYB_202324 1
PIET-1 - BTech - Cyber
15 210303126015 PADSALA TUSHAL Security 5B18_CYB_202324 1

PRAJAPATI KRISHNA PIET-1 - BTech - Cyber


16 210303126016 ATULKUMAR Security 5B18_CYB_202324 1
SOJITRA GOKUL PIET-1 - BTech - Cyber
17 210303126017 VIPULBHAI Security 5B18_CYB_202324 1
SOLANKI
MITESHKUMAR PIET-1 - BTech - Cyber
18 210303126018 YOGESHBHAI Security 5B18_CYB_202324 1
UTTWANI PAWAN PIET-1 - BTech - Cyber
19 210303126019 NARESHKUMAR Security 5B18_CYB_202324 1
VEMULA MOHAN PIET-1 - BTech - Cyber
20 210303126020 KRISHNA SANJAY Security 5B18_CYB_202324 1
VIRANI PRASHANT PIET-1 - BTech - Cyber
21 210303126021 CHIMANBHAI Security 5B18_CYB_202324 1
PIET-1 - BTech - Cyber
22 210303126022 AMAN Security 5B18_CYB_202324 1
KHALID AHMED PIET-1 - BTech - Cyber
23 210303126023 ANSARI Security 5B18_CYB_202324 1
PIET-1 - BTech - Cyber
24 210303126024 SHIBANI BARAL Security 5B18_CYB_202324 1
PIET-1 - BTech - Cyber
25 210303126025 BILLA AJITHKUMAR Security 5B18_CYB_202324 1
PIET-1 - BTech - Cyber
26 210303126026 RAJIV KUMAR BISWAS Security 5B18_CYB_202324 1
PIET-1 - BTech - Cyber
27 210303126027 BOBBILI ROHITH Security 5B18_CYB_202324 1
JASRAJ KAMAL PIET-1 - BTech - Cyber
28 210303126028 CHOUDHARY Security 5B18_CYB_202324 1
DESAI DHRUV PIET-1 - BTech - Cyber
29 210303126029 AMITKUMAR Security 5B18_CYB_202324 1
PIET-1 - BTech - Cyber
30 210303126030 DOREPALLY JAIRAM Security 5B18_CYB_202324 1
JADHAV RUDRA PIET-1 - BTech - Cyber
31 210303126031 KIRANKUMAR Security 5B18_CYB_202324 1
KONA NAGA
VENKATA GANESH PIET-1 - BTech - Cyber
32 210303126033 RAJA SAI KRISHNA Security 5B18_CYB_202324 1
BHUVAN CHANDRA
DURGA PRASAD PIET-1 - BTech - Cyber
33 210303126034 MAILAPALLI Security 5B18_CYB_202324 1
MAKWANA JEEL PIET-1 - BTech - Cyber
34 210303126035 JAYANTILAL Security 5B18_CYB_202324 1
MAROJU RISHI PIET-1 - BTech - Cyber
35 210303126036 KUMAR Security 5B18_CYB_202324 1
PIET-1 - BTech - Cyber
36 210303126037 MAROJU SHRESHTA Security 5B18_CYB_202324 1
MORI MALAY PIET-1 - BTech - Cyber
37 210303126038 MUKESHBHAI Security 5B18_CYB_202324 2
PANDYA
MAYURKUMAR PIET-1 - BTech - Cyber
38 210303126039 SANJAYBHAI Security 5B18_CYB_202324 2
PATEL JAYKUMAR PIET-1 - BTech - Cyber
39 210303126040 SANJAYKUMAR Security 5B18_CYB_202324 2

PATEL KISHANKUMAR PIET-1 - BTech - Cyber


40 210303126041 DAXESHKUMAR Security 5B18_CYB_202324 2

PATEL SHUBHKUMAR PIET-1 - BTech - Cyber


41 210303126042 DIVYESHBHAI Security 5B18_CYB_202324 2
PATEL UTSAV PIET-1 - BTech - Cyber
42 210303126043 PARESHKUMAR Security 5B18_CYB_202324 2
PIET-1 - BTech - Cyber
43 210303126044 PATEL VIDHYA Security 5B18_CYB_202324 2
PEDDIREDDI HARI
HARA SRI PIET-1 - BTech - Cyber
44 210303126045 MANIKANTA Security 5B18_CYB_202324 2
RAJGOR SHIVAM PIET-1 - BTech - Cyber
45 210303126046 TEJASKUMAR Security 5B18_CYB_202324 2
RAMAWAT KIRTI PIET-1 - BTech - Cyber
46 210303126047 VIMALKUMAR Security 5B18_CYB_202324 2

RAVULAPALLI PIET-1 - BTech - Cyber


47 210303126048 YACHANDRA YADAV Security 5B18_CYB_202324 2
REDDYGARI VENKATA
LAKSHMI NARAYANA PIET-1 - BTech - Cyber
48 210303126049 REDDY Security 5B18_CYB_202324 2
AJAYKUMAR
DHARMENDAR PIET-1 - BTech - Cyber
49 210303126050 SAHANI Security 5B18_CYB_202324 2
PIET-1 - BTech - Cyber
50 210303126051 AMAN SINGH Security 5B18_CYB_202324 2
SOLANKI DHRUV PIET-1 - BTech - Cyber
51 210303126052 NATVARLAL Security 5B18_CYB_202324 2
SOLANKI PRATYAX PIET-1 - BTech - Cyber
52 210303126053 KUMAR Security 5B18_CYB_202324 2
THAKUR MANIKANTA PIET-1 - BTech - Cyber
53 210303126054 SINGH Security 5B18_CYB_202324 2
PIET-1 - BTech - Cyber
54 210303126055 YASHRAJ THAKUR Security 5B18_CYB_202324 2
VASANI HARSHIL PIET-1 - BTech - Cyber
55 210303126056 HIREN Security 5B18_CYB_202324 2
BARIA HARSH PIET-1 - BTech - Cyber
56 210303126057 KAMESHKUMAR Security 5B18_CYB_202324 2
CHRISTIAN
PRARTHANKUMAR PIET-1 - BTech - Cyber
57 210303126058 ALPESH Security 5B18_CYB_202324 2
PIET-1 - BTech - Cyber
58 210303126059 JAINIL MAHESHWARI Security 5B18_CYB_202324 2
MISTRY KARTIKAY PIET-1 - BTech - Cyber
59 210303126060 BHARATBHAI Security 5B18_CYB_202324 2
PATEL AAYUSHIBEN PIET-1 - BTech - Cyber
60 210303126061 GIRISHBHAI Security 5B18_CYB_202324 2

PATEL NIKULKUMAR PIET-1 - BTech - Cyber


61 210303126063 JIGNESHBHAI Security 5B18_CYB_202324 2

SAVALIYA DARSHAN PIET-1 - BTech - Cyber


62 210303126064 JAYANTIBHAI Security 5B18_CYB_202324 2
PIET-1 - BTech - Cyber
63 210303126066 WASIM AKRAM Security 5B18_CYB_202324 2
AKULETI DILEEP PIET-1 - BTech - Cyber
64 210303126067 KUMAR Security 5B18_CYB_202324 2
ALLADA PHANI SRI PIET-1 - BTech - Cyber
65 210303126068 HARSHA Security 5B18_CYB_202324 2
PIET-1 - BTech - Cyber
66 210303126069 ALLAM SANJAY VIVEK Security 5B18_CYB_202324 2
AMMISETTY PIET-1 - BTech - Cyber
67 210303126071 MOKSHITA Security 5B18_CYB_202324 2
ANDUGULAPATI PIET-1 - BTech - Cyber
68 210303126072 KOTESWARA RAO Security 5B18_CYB_202324 2
PIET-1 - BTech - Cyber
69 210303126073 ANNAMANENI SRIJA Security 5B18_CYB_202324 2
ATCHI TEJA SRI PIET-1 - BTech - Cyber
70 210303126074 KAMAL REDDY Security 5B18_CYB_202324 2
BAIRAPURAM PIET-1 - BTech - Cyber
71 210303126075 MOUNIKA Security 5B18_CYB_202324 2
BALAGONI PREM PIET-1 - BTech - Cyber
72 210303126076 GOUD Security 5B18_CYB_202324 2
PIET-1 - BTech - Cyber
73 210303126077 BALNE VAMSHI Security 5B18_CYB_202324 2
BALUSUPATI NAGA PIET-1 - BTech - Cyber
74 210303126078 SAI SATHWIK Security 5B18_CYB_202324 2
BANDARU BHANU PIET-1 - BTech - Cyber
75 210303126079 VARA PRASAD Security 5B18_CYB_202324 2
BANDI THIRUPATHI PIET-1 - BTech - Cyber
76 210303126080 REDDY Security 5B18_CYB_202324 2
BAREDDY SURENDRA PIET-1 - BTech - Cyber
77 210303126081 REDDY Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
78 210303126082 BATHINI ABHIRAM Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
79 210303126083 BEJUGAM VISHAL Security 5B19_CYB_202324 1
BELLAM ADITHYA SRI PIET-1 - BTech - Cyber
80 210303126084 KOUSHIK Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
81 210303126085 BIYALA TRUSHAN Security 5B19_CYB_202324 1
BODA ABHINAV PIET-1 - BTech - Cyber
82 210303126086 REDDY Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
83 210303126087 BODDUPALLI GANESH Security 5B19_CYB_202324 1
BODHA ARAVIND PIET-1 - BTech - Cyber
84 210303126088 REDDY Security 5B19_CYB_202324 1
BURLLA SRI CHANDAN PIET-1 - BTech - Cyber
85 210303126089 REDDY Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
86 210303126090 CHAVA DEEPAK Security 5B19_CYB_202324 1
CHEDELLA HARSHITH PIET-1 - BTech - Cyber
87 210303126091 SAI Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
88 210303126092 CHERUKURI JAYANTH Security 5B19_CYB_202324 1
CHIGURUPATI PIET-1 - BTech - Cyber
89 210303126093 JAYANTH Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
90 210303126094 CHILUKURI RAJESH Security 5B19_CYB_202324 1
CHINTHAMALLA PIET-1 - BTech - Cyber
91 210303126095 PRABHAS Security 5B19_CYB_202324 1
CHITTE CHANDRA PIET-1 - BTech - Cyber
92 210303126096 KEERTHI NARAYANA Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
93 210303126097 DANDA THARUN TEJA Security 5B19_CYB_202324 1
DEGA NARASIMHA PIET-1 - BTech - Cyber
94 210303126098 RAO Security 5B19_CYB_202324 1

DOKRA JAI VENKATA PIET-1 - BTech - Cyber


95 210303126099 VARDHAN Security 5B19_CYB_202324 1
DONTHA VISHNU PIET-1 - BTech - Cyber
96 210303126100 VARDHAN Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
97 210303126101 DULLA RAMANA Security 5B19_CYB_202324 1
DUMPA KRISHNA PIET-1 - BTech - Cyber
98 210303126102 REDDY Security 5B19_CYB_202324 1
DUNGAVATH PIET-1 - BTech - Cyber
99 210303126103 KEERTHAN SINGH Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
100 210303126104 EDAMAKANTI BALAJI Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
101 210303126105 EGURLA KARTHIK Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
99 210303126106 GAMIDI RAVEENDRA Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
99 210303126107 GANDI MUKESH Security 5B19_CYB_202324 1
GANUGULA SANDEEP PIET-1 - BTech - Cyber
104 210303126108 KUMAR Security 5B19_CYB_202324 1
GARIKAPATI DINESH PIET-1 - BTech - Cyber
105 210303126109 NAIDU Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
106 210303126110 GEMBALI SAI KIRAN Security 5B19_CYB_202324 1

GOGIREDDY MURALI PIET-1 - BTech - Cyber


107 210303126111 MANOHAR REDDY Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
108 210303126112 GOLLAPUDI GOPI Security 5B19_CYB_202324 1
PIET-1 - BTech - Cyber
109 210303126113 GOSU KRISHNA KIRITI Security 5B19_CYB_202324 1
GOURISHETTY PIET-1 - BTech - Cyber
110 210303126114 RUTHVEEK Security 5B19_CYB_202324 1
GULLIPALLI NITHYA PIET-1 - BTech - Cyber
111 210303126115 SRI Security 5B19_CYB_202324 1
GURAVASALA ASHOK PIET-1 - BTech - Cyber
112 210303126116 KUMAR Security 5B19_CYB_202324 1
IPPALA VENKATA
PRASANNA KUMAR PIET-1 - BTech - Cyber
113 210303126117 REDDY Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
114 210303126119 KAKI VEDAVYAS Security 5B19_CYB_202324 2
KANALA SAI PIET-1 - BTech - Cyber
115 210303126120 GOWTHAM REDDY Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
116 210303126121 KARIPE SRIKAR Security 5B19_CYB_202324 2
KASANI VIGNESH PIET-1 - BTech - Cyber
117 210303126122 KUMAR Security 5B19_CYB_202324 2
KATTA ASHISH PIET-1 - BTech - Cyber
118 210303126123 KUMAR Security 5B19_CYB_202324 2
KOMMULA SRI DATTA PIET-1 - BTech - Cyber
119 210303126124 SAIKRISHNA Security 5B19_CYB_202324 2
KOOKATATI SHREE PIET-1 - BTech - Cyber
120 210303126125 VARUN CHANDRA Security 5B19_CYB_202324 2
KOPPALA THRISHANK PIET-1 - BTech - Cyber
121 210303126126 REDDY Security 5B19_CYB_202324 2
KOPPULA NAVEEN PIET-1 - BTech - Cyber
122 210303126127 REDDY Security 5B19_CYB_202324 2

KORRAPATI HARSHA PIET-1 - BTech - Cyber


123 210303126128 VENKATA ARJUN Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
124 210303126129 KOTRA PRANAV RAM Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
125 210303126130 KOYIDALA TRIDEV Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
126 210303126132 LAMBU NITHIN Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
127 210303126133 M VISHNUVARDHAN Security 5B19_CYB_202324 2
MADDINENI SRI SAI PIET-1 - BTech - Cyber
128 210303126134 NIKHIL Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
129 210303126135 MAGULURI AMULYA Security 5B19_CYB_202324 2
MALAGUNDLA PIET-1 - BTech - Cyber
130 210303126136 MANJUNATH Security 5B19_CYB_202324 2
MANCHEKAR
SHRAVANI PIET-1 - BTech - Cyber
131 210303126137 BALKRISHNA Security 5B19_CYB_202324 2
MANDALA SAI PIET-1 - BTech - Cyber
132 210303126138 KUMAR Security 5B19_CYB_202324 2
MANDAVA AJAY PIET-1 - BTech - Cyber
133 210303126139 KUMAR Security 5B19_CYB_202324 2
MANNAVA SAI PIET-1 - BTech - Cyber
134 210303126140 BHAVANA Security 5B19_CYB_202324 2
MEESALA REVANTH PIET-1 - BTech - Cyber
135 210303126141 KUMAR NAIDU Security 5B19_CYB_202324 2
MEKALA PRANEETH PIET-1 - BTech - Cyber
136 210303126142 REDDY Security 5B19_CYB_202324 2
MEKAPOTHULA PIET-1 - BTech - Cyber
137 210303126143 RAJESH REDDY Security 5B19_CYB_202324 2
MIRTHIPATI PIET-1 - BTech - Cyber
138 210303126144 GUNAVARDHAN Security 5B19_CYB_202324 2
MOHAMMAD NASUR PIET-1 - BTech - Cyber
139 210303126145 PASHA Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
140 210303126146 MOKKSH A PAREKH Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
141 210303126147 MOPURI PRANEETH Security 5B19_CYB_202324 2
MUKTHI PRUDHVI SAI PIET-1 - BTech - Cyber
142 210303126148 GANESH Security 5B19_CYB_202324 2
MULLAMURI HARSHA PIET-1 - BTech - Cyber
143 210303126149 VARDHAN Security 5B19_CYB_202324 2
MULPURI RAGHU PIET-1 - BTech - Cyber
144 210303126150 VARAN Security 5B19_CYB_202324 2
NAGAM SATYA SAI PIET-1 - BTech - Cyber
145 210303126151 RAJA Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
146 210303126152 NAISHA DEKATE Security 5B19_CYB_202324 2

NANDYALA VENKATA
DEVI VARA PRASAD PIET-1 - BTech - Cyber
147 210303126154 REDDY Security 5B19_CYB_202324 2
NARAGANI SIVA PIET-1 - BTech - Cyber
148 210303126155 NAGA SAI Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
149 210303126156 NARAM SRI SAI Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
150 210303126157 NARRA JEEVITHA Security 5B19_CYB_202324 2
NARRA PIET-1 - BTech - Cyber
151 210303126158 VENUBHASKAR Security 5B19_CYB_202324 2
NAVUNDLA PREM PIET-1 - BTech - Cyber
152 210303126159 CHARAN Security 5B19_CYB_202324 2
PIET-1 - BTech - Cyber
153 210303126160 NIDIMAMIDI BHAVYA Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
154 210303126161 NISANKARA TEJ NADH Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
155 210303126162 ORSU GANESH Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
156 210303126164 PALLAPU SAI GEETHA Security 5B20_CYB_202324 1
PAMIDI NITHISH PIET-1 - BTech - Cyber
157 210303126165 KUMAR Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
158 210303126166 ADITYA PANDEY Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
159 210303126167 PANIGRAHI RAJESH Security 5B20_CYB_202324 1
PAPANABOINA SAI PIET-1 - BTech - Cyber
160 210303126168 GOPI Security 5B20_CYB_202324 1
PEDDINTI LALITH PIET-1 - BTech - Cyber
161 210303126169 NAIDU Security 5B20_CYB_202324 1
PEETHA
VENKATESWARA PIET-1 - BTech - Cyber
162 210303126170 RAJU Security 5B20_CYB_202324 1
PILLALA SUDHEER PIET-1 - BTech - Cyber
163 210303126171 KUMAR Security 5B20_CYB_202324 1
PINJARI SAMEER PIET-1 - BTech - Cyber
164 210303126172 BASHA Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
165 210303126174 POLOJU MANISH Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
166 210303126175 PORLA KIRAN KUMAR Security 5B20_CYB_202324 1
POTTHURI CHARAN PIET-1 - BTech - Cyber
167 210303126176 PADMA SRIKHAR Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
168 210303126177 DEVASENAN R Security 5B20_CYB_202324 1
RACHARLA VARUN PIET-1 - BTech - Cyber
169 210303126178 VARMA Security 5B20_CYB_202324 1

RAJPUROHITH PIET-1 - BTech - Cyber


170 210303126179 RAMESWAR SINGSH Security 5B20_CYB_202324 1

RANGARI VUKKALKER PIET-1 - BTech - Cyber


171 210303126180 SAI SANKETH Security 5B20_CYB_202324 1
RAPETI SAI SRINIVASA PIET-1 - BTech - Cyber
172 210303126181 RAO Security 5B20_CYB_202324 1
RAVIPALLI POORNA PIET-1 - BTech - Cyber
173 210303126182 SADHVIK Security 5B20_CYB_202324 1
RAYAPUDI MITHRA PIET-1 - BTech - Cyber
174 210303126183 AVINASH Security 5B20_CYB_202324 1

REDLAPLLI VENKATA PIET-1 - BTech - Cyber


175 210303126184 LAKSHMI NARASIMHA Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
176 210303126185 SAI KIRAN SOMANI Security 5B20_CYB_202324 1

SAMINENI SHARATH PIET-1 - BTech - Cyber


177 210303126186 CHANDRA Security 5B20_CYB_202324 1
SANE BHANU PIET-1 - BTech - Cyber
178 210303126187 PRAKSHA Security 5B20_CYB_202324 1
SAYYAD RAMEEZ PIET-1 - BTech - Cyber
179 210303126188 SUFIYAN Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
180 210303126189 SHAIK REHMAN Security 5B20_CYB_202324 1
SRINIVASA RAO PIET-1 - BTech - Cyber
181 210303126190 THOKALA Security 5B20_CYB_202324 1
SRIRAM MANNI PIET-1 - BTech - Cyber
182 210303126191 VENKATA SAKETH Security 5B20_CYB_202324 1
SUNKARA VARUN PIET-1 - BTech - Cyber
183 210303126192 KUMAR Security 5B20_CYB_202324 1
SURAKANTI BHANU PIET-1 - BTech - Cyber
184 210303126193 PRAKASH REDDY Security 5B20_CYB_202324 1
SURLA YASWANTH PIET-1 - BTech - Cyber
185 210303126194 SAI VARAHA Security 5B20_CYB_202324 1
TAMMISETTI PHANI PIET-1 - BTech - Cyber
186 210303126195 CHANDRA Security 5B20_CYB_202324 1
PIET-1 - BTech - Cyber
187 210303126197 TELUKULA SAHITH Security 5B20_CYB_202324 1
THAMMA GOPI PIET-1 - BTech - Cyber
188 210303126198 KRISHNA REDDY Security 5B20_CYB_202324 1
THAMMANAMPUDI
CHARAN PADMA PIET-1 - BTech - Cyber
189 210303126199 GANESH REDDY Security 5B20_CYB_202324 2
THANGUDU PIET-1 - BTech - Cyber
190 210303126201 BHUVANCHAND Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
191 210303126202 THATAVARTHI TEJA Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
192 210303126204 UDUMULA BHAVANA Security 5B20_CYB_202324 2
UTTARAPALLY SAI PIET-1 - BTech - Cyber
193 210303126205 VARSHIT Security 5B20_CYB_202324 2
VADICHARLA PIET-1 - BTech - Cyber
194 210303126206 SANDEEP REDDY Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
195 210303126207 VADISALA SUMITHRA Security 5B20_CYB_202324 2

VATHSAVAI JITENDRA PIET-1 - BTech - Cyber


196 210303126208 MANOBIRAM Security 5B20_CYB_202324 2
VATTIKUNTA PIET-1 - BTech - Cyber
197 210303126209 RAVITEJA Security 5B20_CYB_202324 2
VEERAGANDHAPU PIET-1 - BTech - Cyber
198 210303126210 MAHEEP Security 5B20_CYB_202324 2
VEJENDLA BHANU PIET-1 - BTech - Cyber
199 210303126212 TEJA Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
200 210303126213 VENKATA LIKHITHA Security 5B20_CYB_202324 2
VENNAPUSA VEERA PIET-1 - BTech - Cyber
201 210303126214 VENKATA Security 5B20_CYB_202324 2
VISWANADHAPALLI PIET-1 - BTech - Cyber
202 210303126215 DHARMA TEJA Security 5B20_CYB_202324 2
VISWANADHAPALLI PIET-1 - BTech - Cyber
203 210303126216 KUSHVANTH Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
204 210303126217 VOORA UDAYKIRAN Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
205 210303126218 Y RAMAKOTI REDDY Security 5B20_CYB_202324 2
YARAMALA NARSI PIET-1 - BTech - Cyber
206 210303126219 REDDY Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
207 210303126220 YENDLURI NITHISH Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
208 210303126221 YENUMULA SAI TEJA Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
209 210303126222 PRIYANSHU BHANA Security 5B20_CYB_202324 2
CHIPLUNKAR PIET-1 - BTech - Cyber
210 210303126223 SHARADA ANIL Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
211 210303126224 KESHAV DUBEY Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
212 210303126225 ANUBHAV GAIN Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
213 210303126226 VIRAL JAIN Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
214 210303126227 KHATRI AMAR PRAVIN Security 5B20_CYB_202324 2
NAIR VISHNU PIET-1 - BTech - Cyber
215 210303126228 MANIKANDAN Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
216 210303126229 DHRUV PATHAK Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
217 210303126230 AMIT KUMAR SINGH Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
218 210303126231 RITIKA SONI Security 5B20_CYB_202324 2
OBILI YASWANTH PIET-1 - BTech - Cyber
219 210303126232 REDDY Security 5B20_CYB_202324 2

SHINAGAM PIET-1 - BTech - Cyber


220 210303126233 CHAITANYA KUMAR Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
221 210303126234 JEENAL MALVIYA Security 5B20_CYB_202324 2
BHARTI AMAN PIET-1 - BTech - Cyber
222 2203031267001 SURESH Security 5B20_CYB_202324 2
KADAKIA HITANSH PIET-1 - BTech - Cyber
223 2203031267002 CHIRAG Security 5B20_CYB_202324 2
MAHALE MIHIR PIET-1 - BTech - Cyber
224 2203031267003 SANTOSHBHAI Security 5B20_CYB_202324 2
MALYALA PIET-1 - BTech - Cyber
225 2203031267004 SASYAREETH Security 5B20_CYB_202324 2
MARU ANISH PIET-1 - BTech - Cyber
226 2203031267005 JAYESHBHAI Security 5B20_CYB_202324 2
PANCHAL ADITI PIET-1 - BTech - Cyber
227 2203031267006 KETAN Security 5B20_CYB_202324 2
TANAYAA
DILIPKUMAR PIET-1 - BTech - Cyber
228 2203031267007 MARATHE Security 5B20_CYB_202324 2
UPPILI BHARATH SAI PIET-1 - BTech - Cyber
229 2203031267008 TEJA Security 5B20_CYB_202324 2
PIET-1 - BTech - Cyber
230 2203031267009 VOHRA PARTH AJAY Security 5B20_CYB_202324 2

You might also like