Professional Documents
Culture Documents
KNC301 CSS
KNC301 CSS
Course Objective
1 Student will able to understand about the computer security and about control Hijacking or its
types.
2 Student will able to discuss about the confidentiality policies of the information and How to
prevent the information from intrusions.
3 Student will able to discuss about the web securities methods to transfer the data or
information from one end to another end.
4 Student will able to understand discuss cryptography and its methods for transferring the data
in a secure manner.
5 Student will able to explanation of infrastructure of internet with the help of TCP/IP ,
Firewall etc.
Course Outcomes
Bloom’s
CO’s Statement Knowledge
Level (KL)
To discover software bugs that pose cyber security threats and to explain
KNC301.1 K2
how to fix the bugs to mitigate such threats.
To discover cyber-attack scenarios to web browsers and web servers and
KNC301.2 K2
to explain how to mitigate such threats.
To discover and explain mobile software bugs posing cyber security
KNC301.3 threats, explain and recreate exploits, and to explain mitigation K2
techniques.
To articulate the urgent need for cyber security in critical computer
KNC301.4 systems, networks, and world wide web, and to explain various threat K2
scenarios.
To articulate the well-known cyber-attack incidents, explain the attack
KNC301.5 K2
scenarios, and explain mitigation techniques.
CO Mapping with PO & PSO
Course PO PO PO PO
PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
Outcomes 1 2 3 4
KNC301.1 1 - - - - 2 - 1 1 2 - 2 1 -
KNC301.2 1 - 1 - - 1 - 1 1 1 - 2 1 -
KNC301.3 1 - 1 - - 1 - 1 1 1 - 2 1 -
KNC301.4 2 - 1 - - 2 - 1 1 1 - 2 1 -
KNC301.5 2 - 1 - - 2 - 1 1 1 - 2 1 -
Average 1.4 - 0.8 - - 1.6 - 1 1 1.2 - 2 1 -
3: Highly Correlated
2: Moderately Correlated
1: Weakly Correlated
Blank : No Correlation
KNC301.2-PSO1 L Become ability to isolate the system to prevent from unauthorized users.
KNC301.3-PO6 Able to know about several methods to keep secure information and data
L
from Defenses and protections against XSS.
KNC301.3-PO8 Able to become responsible to secure information from Cross site
L
request forgery.
KNC301.3-PO9 L Able to become responsible to prevent information in web.
KNC301.3-PO10 L Able to communicate about Access Control and Web security goals.
KNC301.4-PSO1 Able to learn the process of Public key cryptography and Public key
L
distribution.
Able to understand about the Internet Infrastructure and weaknesses of
KNC301.5-PO1 M
internet security.
KNC301.5-PO3 L Able to define processPacket filtering firewall.