Bca Syllabus
Bca Syllabus
SEMESTER - VI
SL. COURSE COURS
NAME OF THE COURSE L T P C S TC
NO CATEGO E
H
RY CODE
1 PC BCB2316 Computer Graphics 3 0 0 3 0 3
2 PC BCB2317 Data Warehousing and Data Mining 3 0 0 3 0 3
3 DE ****** E3 Elective – III 3 0 0 3 0 3
4 DE ****** E4 Elective – IV 3 0 0 3 0 3
5 DE ****** E5 Elective – V 3 0 0 3 0 3
PRACTICAL
6 PC BCB2346 Project Work 0 0 8 4 0 8
15 0 8 19 0 23
Total
L – Lecture ; T – Tutorial ; P – Practical ; S- Self Study; C – Credit; TCH -Total Contact
Hour
Specialization in Cyber Security
LIST OF ELECTIVES
COURSE COURS
TC
SEM CATEGOR E NAME OF THE COURSE L T P C S
H
Y CODE
CO-2 1 1 1 1 2 1 - 1 2
CO-3 1 1 1 2 2 2 1 - -
CO-4 1 2 2 2 2 2 2 2 2
CO-5 1 1 1 2 2 2 1 2 -
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: INTRODUCTION TO JAVA
(9L)
Feaeri tures of java ‐ JDK Environment & tools like (java, javac, appletviewer, javadoc,
jdb) ‐ OOPs Concepts Class, Abstraction, Encapsulation, Inheritance, Polymorphism ‐
Difference between C++ and JAVA ‐ Structure of java program ‐Data types, Variables, CO-1
Operators, Keywords, Naming Convention. BTL-
Practical component: Inh tance, Polymorphism, Structure of java program ‐Data types, 3
Variables, Operators
Suggested Readings: OOPs Concepts Class
MODULE 2: CONTROL STRUCTURES, ARRAYS AND STRINGS
(9L)
Decision Making (if, switch), Looping (for, while)‐ Type Casting ‐ Array Creating an
array Types of Array ‐ One Dimensional arrays ‐ Two Dimensional array ‐ String ‐
CO-2
Arrays , Methods. ‐ StringBuffer class.
BTL-
Practical component:
4
One Dimensional and Two Dimensional array ‐ String ‐ Methods. ‐ StringBuffer class
Suggested Readings: Decision Making (if, switch), Looping(for, while)
MODULE 3: CLASSES AND OBJECTS
(9L)
Creating Classes and objects ‐ Memory allocation for objects – Constructor –Simple
CO-3
programs using classes and objects
BTL-
Practical component: Constructor –Simple programs using classes and objects.
4
Suggested Readings: Creating Classes and objects
MODULE 4: INHERITANCE
(9L)
Inheritance – introduction, types of inheritance, implementation of inheritance – uses of
extends keyword – implementation of types of inheritance‐ simple programs using
CO-4
inheritance
BTL-
Practical component: Implementation of inheritance, implementation of types of
4
inheritance
Suggested Readings: Uses of extends keyword
MODULE 5: INTERFACE AND PACKAGE
(9L)
Interfaces – introduction, Abstract classes and methods ‐ Implementation of
Polymorphism ‐ Method Overloading, Method Overriding ‐ Nested and Inner classes ‐
Packages Packages Concept Creating user defined packages ‐ Java Built in packages
java.lang, java.math, java.util, Random, Date, Hashtable , Wrapper classes. CO-5
Practical component: Method Overloading, Method Overriding ‐ Nested and Inner BTL-4
classes ‐ Packages and interfaces
Suggested Readings: Wrapper classes
LAB / MINI PROJECT/FIELD WORK
TEXT BOOKS
1 th
E Balagurusamy, (2014). Programming with JAVA , 5 edition,Tata McGraw Hill
REFERENCE BOOKS
Surbhi Kakar(2017), A Textbook of Java Programming, IK International Publishing
1
House first edition
E BOOKS
1. https://www.pdfdrive.net/java‐the‐complete‐reference‐7th‐edition‐e3625514.html
MOOC
1. https://www.coursera.org/specializations/object‐oriented‐programming
INTRODUCTION TO PYTHON
COURSE TITLE CREDITS 3
PROGRAMMING
COURSE CODE BCB2303 COURSE CATEGORY PC L-T-P-S 3- 0- 0 -0
26th ACM LEARNING
Version 1.0 Approval Details BTL-3
23-03-2019 LEVEL
ASSESSMENT SCHEME
First Second Seminar/
Surprise
Periodical Periodical Assignments/ Attendance ESE
Test / Quiz
Assessment Assessment Project
15% 15% 10% 5% 5% 50%
This course explains about the concepts of programming language, strings, lists,
Course
tuples, functions, files and directories. It starts from theoretical concepts along
Description
with syntax to understand and implement.
Course 1. To understand preliminary concepts of programming language and
Objective fundamentals
2. To understand about strings
3. To explain about lists concepts
4. To understand the tuples and functions
5. To understand the files and directories
Upon completion of this course, the students will be able to
1. Describe the Preliminary Concepts of Programming Language & syntax and
Semantics methods
Course
2. Perform string manipulation
Outcome
3. Define the Lists concept
4. Implement the Tuples and functions
5. Implement file and Directories
Prerequisites: Programming skills
CO, PO AND PSO MAPPING
CO PO -1 PO-2 PO-3 PO-4 PO-5 PO-6 PSO-1 PSO-2 PSO-3
CO-1 1 1 1 2 2 2 3 2 2
CO-2 1 1 1 1 2 1 3 2 2
CO-3 1 1 1 2 2 2 3 2 2
CO-4 1 2 2 2 2 2 3 2 2
CO-5 1 1 1 2 2 2 3 2 2
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: INTRODUCTION
(9L)
Python Introduction, History of Python, Python features, Python Installation, Python
Environment Variables, Running Python, Simple Programs, Python Identifiers,
Reserved words, Lines and Indentation, Multi line statements, Quotation in Python,
Comments in Python, Command line arguments, Assigning values to the variables, CO-1
Multiple assignment, Standard data types, Type Conversion, Operators in Python. BTL-3
Practical component: Simple Programs, Python Identifiers, Reserved words, Lines
and Indentation, Multi line statements, Quotation in Python, Comments in Python
Suggested Readings: History of Python, Python features
MODULE 2: STRINGS
(9L)
Assigning values in strings, String manipulations, String special operators, String
formatting operators. CO-2
Practical component: String special operators, String formatting operators BTL-4
Suggested Readings: Assigning values in strings
MODULE 3: LISTS
(9L)
Lists‐ Introduction, accessing values in list, List manipulations, List Operations,
Indexing, slicing & matrices. CO-3
Practical componentList manipulations, List Operations, Indexing, slicing & matrices. BTL-4
Suggested Readings: Accessing values in list:
MODULE 4: TUPLES AND FUNCTIONS
(9L)
Built –in Functions and methods, Tuples‐ introduction, accessing values, Tuple
functions, Dictionary Introduction, Accessing values, Functions
CO-4
Practical component: Accessing values, Tuple functions, Dictionary Introduction,
BTL- 4
Accessing values, Functions
Suggested Readings: Built –in Functions and methods
MODULE 5: FILES AND DIRECTORIES
(9L)
I/O function, Opening and closing files, file object attribute, manipulations of the files,
Directories in python, File and Directory related methods. CO-5
Practical component: Manipulations of the files BTL-4
Suggested Readings: I/O function
LAB / MINI PROJECT/FIELD WORK
TEXT BOOKS
1 PovelSolin, Martin Novak, (2012), Introduction to Python Programming, NCLab Public
Computing
REFERENCE BOOKS
1 John C. Lusth, (2012), An Introduction to Python , The University of Alabama
E BOOKS
1. https://users‐cs.au.dk/chili/PBI/python_tutorial_jakobfredslund.pdf
MOOC
1. https://www.coursera.org/learn/interactive‐python‐1
COURSE TITLE CYBER SECURITY AND SIEM CREDITS 3
COURSE COURSE
CODE BCB2304 CATEGORY PC L-T-P-S 3-0-0-0
LEARNING
Version 1.0 Approval Details LEVEL BTL-3
ASSESSMENT SCHEME
Second Seminar/
First Surprise
Periodical Assignments/ Attendance ESE
Periodical Test
Assessment Assessment Project / Quiz
15% 15% 10% 5% 5% 50%
A SIEM and Log Management exposes the relevance of various types of
Course
Description logs generated from different systems and also exposes the concept of
SIEM which is used for Log correlation and alerts.
1. To identify the different types of logs and log formats.
2. To make use of the Python and SHELL scripting for log analysis.
3. To acquire knowledge about SIEM Tools and apply for log
Course
analysis.
Objective
4. To acquire knowledge on log Management Policies for audits.
5. To apply the concepts of service management in Ticketing.
Upon completion of this course, the students will be able to
1. Understand the log management policies.
Course 2. Differentiate between the log formats.
Outcome 3. Understand the configuration of Syslog server
4. Understand the workflow of Ticketing.
Prerequisites:
CO, PO AND PSO MAPPING
CO PO-1 PO-2 PO-3 PO-4 PO-5 PO-6 PSO-1 PSO-2 PSO-3
CO-1 3 2 3 - 1 - 3 2 1
CO-2 3 2 3 - - - 3 2 1
CO-3 3 2 3 1 - 1 3 2 1
CO-4 3 2 3 - - - 3 1 1
CO-5 3 3 3 - - - 3 1 1
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: INTRODUCTION (9L)
Concepts of Log, What Should the Logs Log? Everything - The 5 Ws (Who, CO-1
What, When, Where, and Why) - Unix Logs – Windows Logs - Windows BTL-3
Event ID - Events and Event Lifecycle - Linux Logs - Types of logs -
Security logs - Application logs – System Logs
Practical component:Run an application on Linux to see the Linux logs.
Export log to text files. Script for searching logs.
Suggested Readings: Syslog help documents.
REFERENCE BOOKS
1 Patrick Engebretson(2011), The Basics of Hacking and Penetration Testing: Ethical
Hacking and Penetration Testing Made Easy , Syngress Basics Series
E BOOKS
1 https://www.nationalcyberwatch.org/resource/ethical-hacking-systems-defense-
national-cyberwatch-center-edition/
MOOC
1. https://www.coursera.org/courses?query=ethical%20hacking
COURSE TITLE NETWORK SECURITY CREDITS 3
COURSE
COURSE CODE BCC2375 DE L-T-P-S 3-0-0-0
CATEGORY
26th ACM LEARNIN
Version 1.0 Approval Details BTL-3
23-03-2019 G LEVEL
ASSESSMENT SCHEME
First Second Seminar/
Surprise
Periodical Periodical Assignments/ Attendance ESE
Test / Quiz
Assessment Assessment Project
15% 15% 10% 5% 5% 50%
Network security is a broad term that covers a multitude of technologies, devices
Course and processes. The goal of this course is to set of rules and configurations
Description designed to protect the integrity. Students will learn the network architecture is
complex and is faced with a threat environment.
1. To understand the concept of network security management.
2. To understand the concept of network security tools.
Course
3. To understand the concept of threat environment
Objective
4. To exploit vulnerabilities.
5. To understand confidentiality and accessibility of computer networks
Upon completion of this course, the students will be able to
1. Describe the Basic concepts of Network Security
Course 2. Identify the attacks on WWW
Outcome 3. Describe the Internet Security Protocols
4. Identify and explore the authentication mechanisms over internet
5. Describe wireless security.
Prerequisites: Basics of Cyber Security
CO, PO AND PSO MAPPING
CO PO -1 PO-2 PO-3 PO-4 PO-5 PO-6 PSO -1 PSO-2 PSO-3
CO-1 3 2 2 1 1 1 3 2 1
CO-2 2 - 2 1 - 1 3 - 1
CO-3 1 2 2 - 1 - - 2 -
CO-4 3 2 - 1 1 - 3 2 1
CO-5 3 2 2 1 - 1 3 2 -
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: INTRODUCTION TO CYBER SECURITY
(9L)
Introduction to Cyber Security, Need for security, Concept of Cyber Space, Cyber
Crimes and Cyber-attack. Fundamental security principles – threats, attacks and
CO-1
vulnerability. Key Security triad – Confidentiality, Integrity and Availability.
BTL-2
Practical component: Detection of various cyber-attacks using Wireshark.
Suggested Readings: Evolution of cyber security
MODULE 2: SECURITY ATTACKS, PRINCIPLES AND MANAGEMENT
(9L)
Introduction to different classes of security attacks - active and passive. Impact of
attacks on an organization and individuals. Principles of Cybersecurity - Apply
cybersecurity architecture principles. Cybersecurity models (the CIA triad, the star
CO-2
model, the Parkerian hexad).
BTL-2
Practical component: Packet sniffing using Wireshark.
Suggested Readings: Advances in Cyber Security: Principles, Techniques, and
Applications
MODULE 3: SECURITY PLANS, POLICIES AND PROCEDURES
(9L)
Defining a Cyber Security policy, General security expectations, roles and
responsibilities in the organization – Stakeholders.
CO-3
Practical component:
BTL-3
Managing securing policies using tcpdump, dumpcap using Wireshark.
Suggested Readings: Best practices for Cyber security standards
MODULE 4: OVERVIEW OF SECURITY COUNTERMEASURE TOOLS
(9L)
Introduction to key security tools including firewalls, anti-virus and cryptography –
Identify security tools and hardening techniques – Prevention of cyber-attacks. Security
CO-4
Countermeasure tools and techniques - Encryption standards.
BTL-2
Practical component: Security analysis and reporting using Wireshark.
Suggested Readings: Cyber-attacks, countermeasures and protection schemes
MODULE 5: TESTING, DIGITAL FORENSICS AND NEXT GENERATION SECURITY
(9L)
Cyber security testing – Penetration testing. System Level Solutions - Intrusion
Detection System (IDS) and Intrusion Protection System (IPS). Basic Concept of
Ethical Hacking. Protecting against Cyber Crime – Identity Theft, Cyber Stalking and CO-5
Investment fraud. BTL-2
Practical component: PenTest (Penetration Testing) using Wireshark.
Suggested Readings: Next-generation digital forensics
TEXT BOOKS
William Stallings, (2016)“Principle of Computer Security”, McGraw Hill Education, Fourth
1.
Edition
REFERENCE BOOKS
William, Stallings. (2018). Effective Cyber security: A Guide to Using Best Practices and
1
Standards, Addison - Wesley Professional Publishers, 1st Edition.
E BOOKS
1. https://bookauthority.org/books/best-network-security-ebooks
MOOC
1. https://www.coursera.org/specializations/computer-security-systems-management
2. https://www.coursera.org/specializations/computer-network-security
CYBER SECURITY TECHNIQUES AND
COURSE TITLE CREDITS 3
TOOLS
COURSE D L-T-P-S 2-0-2-0
COURSE CODE BCC2385
CATEGORY E
26th ACM LEARNIN
Version 1.0 Approval Details BTL-4
23-03-2019 G LEVEL
ASSESSMENT SCHEME
Second Seminar/
First Periodical Surprise
Periodical Assignments/ Attendance ESE
Assessment Test / Quiz
Assessment Project
15% 15% 10% 5% 5% 50%
This course gives you the background needed to understand basic
Cybersecurity. You will learn the history of Cybersecurity, types and
motives of cyber-attacks to further your knowledge of current threats to
Course
organizations and individuals. Key terminology, basic system concepts and
Description
tools will be examined as an introduction to the Cybersecurity field. You will
learn about critical thinking and its importance to anyone looking to pursue a
career in Cybersecurity.
1. Assess the current security landscape, including the nature of the threat,
the general status of common vulnerabilities, and the likely
consequences of security failures;
Course 2. Assess how all domains of security interact to achieve effective system-
Objective wide security at the enterprise level.
3. Appraise the interrelationships among elements that comprise a modern
security system, including hardware, software, policies, and people;
Compare and contrast logical and physical security;
Upon completion of this course, the students will be able to
1. Outline the Cyber Issues in Real World.
2. Describe the Installation of VMware and can Inspect Kali Linux
Course
3. Evaluate the trends and patterns that will determine the future state of
Outcome
cybersecurity.
4. Describe the Metasploit framework for hacking
5. Assess the security in mobile devices
Prerequisites: Introduction to Cyber Security
CO, PO AND PSO MAPPING
CO PO -1 PO-2 PO-3 PO-4 PO-5 PO-6 PSO-1 PSO-2 PSO-3
CO-1 3 2 - - 1 - 2 - 2
CO-2 - 3 2 - - - 2 - 2
CO-3 - 2 3 1 - 1 1 - -
CO-4 2 2 1 - - - 1 - 2
CO-5 - 2 2 1 - 1 1 1 3
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1 – CYBER ISSUES
( 6L+6P)
Window Password Hacking and Cracking – Steganography - Data frauds - data
diddling - scavenging - data theft - data leakage – squatting - Id theft - Password theft
– key logger - Job Racketing - Marketing and Advertisement Rackets - Nigerian
CO-1
frauds- pay per click scams – web defacement - ATM frauds - IP spoofing - email & ip
BTL-3
address – Software piracy - software license - commercial piracy.
Practical Component: Implementation of Steganography
Suggested Readings: Steganography
MODULE 2 – VIRTUAL LAB SET UP
( 6L+6P)
Installing VMware -Setting Up Kali Linux - Target Virtual Machines - Creating the
Windows XP Target - Setting Up the Ubuntu 8.10 Target - Creating the Windows 7
CO-2
Target.
BTL-3
Practical Component: Implementation of Symmetric and Asymmetric cryptography.
Suggested Readings: VMware, Kali Linux
MODULE 3 – KALI LINUX
( 6L+6P)
Linux Command Line - The Linux Filesystem - User Privileges - File Permissions -
Editing Files- Data Manipulation - Managing Installed Packages - Processes and
Services - Managing Networking - Netcat: The Swiss Army Knife of TCP/IP
CO-3
Connections - Automating Tasks.
BTL-3
Practical Component: Implementation of Windows security using firewall and other
tools
Suggested Readings: The Linux Filesystem, Netcat
MODULE 4– METASPLOIT FRAMEWORK
( 6L+6P)
Starting Metasploit - Finding Metasploit Modules - Setting Module Options - Payloads
- Types of Shells - Setting a Payload Manually - Msfcli - Creating Standalone Payloads
CO-4
with Msfvenom - Using an Auxiliary Module.
BTL-3
Practical Component: Implementation to identify web vulnerabilities
Suggested Readings: Metasploit, Msfcli
MODULE 5– MOBILE HACKING
( 6L+6P)
Mobile Attack Vectors - The Smartphone Pentest Framework - Remote Attacks -
Client-Side Attacks - Malicious Apps - Mobile Post Exploitation CO-5
Practical Component: Implementation of Mobile Audit and generate the report of the BTL-3
existing Artiacts Suggested Readings: Pentest Framework
TEXT BOOKS
1. Gautam Kumawat(2017), Ethical Hacking & Cyber Security Course: A Complete
Package, Udemy Course (First Unit)
2. Georgia Weidman(2014) , Penetration testing A Hands- On Introduction to Hacking,
no starch press II-V unit)
REFERENCE BOOKS
1. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies (2015), Security in
Computing, 5th Edition , Pearson Education .
E BOOKS
1 https://www.newhorizons.com/promotions/cybersecurity-ebooks
MOOC
1 https://www.udemy.com/course/hands-on-penetration-testing-labs-30/
COURSE
SECURE CODING PRACTICES CREDITS 3
TITLE
L-T-P-
COURSE CODE DE 3-0-0-0
S
LEAR
26th ACM NING
Version BTL-3
23-03-2019 LEVE
L
ASSESSMENT SCHEME
First Periodical Surprise Test Attend
ESE
Assessment / Quiz ance
15% 5% 5% 50%
The course gives the insights of coding practices to ensure any
Course Description software developed has checks and system in place that helps
strengthen the software and get rid of any security issues like
vulnerabilities.
Course Objective 1. To understand the basic concepts of programming errors
2. To identify and analyze the security problems
3. To understand and correct and incorrect use of formatted output
functions
4. To understand the common vulnerabilities
5. To recommend the specific development practices
Upon completion of this course, the students will be able to
1. Identify the most frequent programming errors leading to
software vulnerabilities.
2. Analyze security problems in software and integral security
issues
Course Outcome 3. Implement the correct and incorrect use of formatted output
functions.
4. Apply their knowledge to the common vulnerabilities associated
with file I/O
5. Develop practices for improving the overall security of your C /
C++ application.
Prerequisites: Basics of Security
CO, PO AND PSO MAPPING
PSO- PSO- PSO-
CO PO-3 PO-4 PO-6
1 2 3
CO-1 - 2 2 2 - 1
CO-2 2 1 1 1 1 1
CO-3 3 1 1 1 - -
CO-4 1 1 1 1 - 2
CO-5 3 1 1 1 1 3
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: SOFTWARE SECURITY CONCEPTS (9L)
Gauging the Threat - CO-1
Security Concepts - C BTL-2
and C++ - Development
Platforms - Strings -
Character Strings -
Common String
manipulation Errors -
String Vulnerabilities
and Exploits -
Mitigation Strategies -
String handling
functions - runtime
protection strategies -
notable vulnerabilities
Suggested Readings:
Evolution of Software
security
MODULE 2: POINTER SUBTERFUGE AND INTEGER SECURITY
(9L)
Data Locations - Function Pointers - Object Pointers - Modifying the
Instruction Pointer - Global Offset Table - The. dtors Section - Virtual
Pointers - The atexit() and on_exit() Functions - The longjmp() Function
- Exception Handling - Mitigation Strategies - Integer Security - Integer
Conversions - Integer Operations - Integer Vulnerabilities -BTL-2
Mitigation
Strategies.
Suggested Readings:
Security algorithms
MODULE 3: FORMATTED OUTPUT FUNCTIONS
(9L)
Variadic Functions -
Exploiting Formatted
Output Functions -
Stack Randomization- CO-3
Mitigation Strategies - BTL-3
Notable Vulnerabilities
Suggested Readings:
Vulnerabilities
MODULE 4: FILE I/O
(9L)
File I/O Basics - File I/O
Interfaces - Access
Control - File
Identification - Race CO-4
Conditions - Mitigation BTL-2
Strategies Suggested
Readings: File
Handling
MODULE 5: RECOMMENDED PRACTICES
(9L)
The Security
Development Lifecycle CO-5
- Security Training - BTL-2
Requirements -Design-
Implementation –
Verification Suggested
Readings: Security
Development Model
TEXT BOOKS
Seacord, R. C.(2013), Secure Coding in C and C++, Addison
1. Wisley for Software Engineering Institute, 2nd edition.
REFERENCE BOOKS
Daswani N., Kern C., Kesavan A(2007)., Foundations of Security,
1.
Apress.
E BOOKS
1. https://www.newhorizons.com/promotions/cybersecurity-ebooks
MOOC
https://www.coursera.org/learn/secure-coding-principles?
1.
specialization=secure-coding-practices