Dip Syllabus
Dip Syllabus
IN
MONTESSORI EDUCATION
Diploma in Montessori Education
OBJECTIVE
To enable the X standard and XII standard students to understand the Montessori Education related to
Philosophy, Psychology, Sociology and Educational bodies.
Philosophy Education, meaning - Definition Meaning, Definition Montessori Philosophy and Education;
Relationship between philosophy and education; Education for modification of behaviour; Epistemological approach
of Education- Educare and Educere.
Rabindranath Tagore- Mahatma Gandhi, Radhakrishnan, Vivekananda, Dayanand, Dr. Zahir Hussain,
Thiruvalluvar- Bharathiar and Bharathidasan and their contributions related to Montessori Education.
Thorndikes Trial and Error; Pavlov’s Classical Conditioning; BF Skinner’s Operant conditioning; Jean Piaget’s
cognitive development; Deniel Coleman – Emotional Intelligence.
Max Webers’s view on Social / human behaviorism - Ottaway’s view on Social relations- Durkhiem’s view of
Methodological socialization- Brom’s Group behavior-John Madge’s view on social interaction.
REFERENCES
1. Agarwal, J.C. (1999). Theory and Principles of Education. New Delhi: Vikas Publications House Pvt. Ltd.
2. Biswal, U.N. (2005). Philosophy of Education. New Delhi: Dominant Publishers and Distributors.
3. Chandra, S.S. (1996). Principles of Education. New Delhi: Atlantic Publishers.
4. Ghanta, R. and Dash, B.N. (2005). Foundations of Education. Hyderabad: Neelkamal Publications.
5. Mathur, S.S. (1997). Sociological and Philosophical Foundations of Education. Agra: Vinod Pustak Mandir.
6. Patel, M.S. (1953). The Educational Philosophy of Mahatma Gandhi. Ahmedabad: Navjeevan Pub. House. 8
7. Sharma, R.A. (2008). Development of Educational System in India. Meerut: R.Lall books depot.
8. Sharma, R.N. (2008). Education in the Emerging Indian Society. Delhi: Surjeet Publications. 9. Saraswathi, T.S.
(1999). Culture, Socialisation and Human Development. New Delhi: Sage Publications.
Course Code Title of the Course
516 12 Principles of Montessori Education
OBJECTIVE
Objective
To enable the learners to get awareness on methods and approaches in Montessori education
REFERENCES
1. Francis Soundararaj, F. (1995). Teaching Spoken English and Communication Skills.Chennai:
2. Joyce., & Well., (2004). Models of Teaching. U.K: Prentice hall of India.
3. Kohli, A. L. (2006). Techniques of Teaching English. New Delhi: Dhanpat Rai pub.co
4. Fletcher F.G Some lessions in mathematics OUP.
5. Hogben Lancelot, Mathematics for the Million George Allen and Unwin Ltd., London.
6. Joseph Crescimbeni teaching of New Mathematics Parker publishing Co. New York.
7. NCERT Brochure on themes relating to Mathematics Education.
8. NCTMS year Books 15. Siddhu R.S teaching of Secondary Mathematics Sterling publishers 21 S.M.S.G Books
Yale University.
Course Title of the Course
Code
516 14 Developing Life Work Skill (School
based Practicum)
SCHOOL BASED PRACTICUM – 100 marks (2 credits)
OBJECTIVE
To enable the learners to have familiarity with teaching competency
UNIT I: Motivation
Level of Motivation; Motivational environment; Dynamic classroom activity; Effective involvement and effective
teaching is pursued in class room - simplification, enthusiastic participation and sensibility to children’s needs.
Objective
To enable students to get awareness on psychological practices in child hood stage and maintain their
health
Unit –I Understanding the Child
Learning parents role to understand the child; effective guidance and nurturing the child - growth and
mature; child and unique personality traits (consistent throughout the life); professional advantage of
teachers in Montessori school-observing child activities.
Objective
To enable the learners to develop good character / personality and to provide good moral spiritual life for conducive
to healthy living.
REFERENCES:
1. African Books Collective Ltd., The Jam Factory, 27 Park End Street, Oxford OX1 1HU, United Kingdom
(paperback: ISBN-9966-846-42-5, $18)
2. S.K. Mangal & Uma Manga (l2012) Essentials of Educational Management, PHI Learning, Private Limited , New
Delhi-110001
3. National College for School Leadership (2006) First Corporate Plan , Launch Year 2001-2002, Nottingham.
4. Carlo& Olson 1979 innovations in teaching –learning process, new delhi: vikas publishing house.
5. Gillies, & Robyn. M (2007) Cooperative Learning, Integrating Theory and Practice, Los Angels: Sage Publication
PRACTICAL COURSE
SEMESTER I
1 51711 Principles of 25 75 100 2
Information Technology
2 51712 Open Source Software 25 75 100 2
3 51713 Office Automation 25 75 100 2
4 51714 Office Automation Lab 25 75 100 2
TOTAL 100 300 400 8
SEMESTER II
5 51721 Digital Logic 25 75 100 2
Fundamentals
6 51722 Programming in C 25 75 100 2
7 51723 Data Structures and 25 75 100 2
Algorithms
8 51724 C and Data Structure 25 75 100 2
Lab
TOTAL 100 300 400 8
GRAND TOTAL 200 600 800 16
CIA : Continuous Internal Assessment ESE : End semester Examination
SEMESTER I
Course Objectives
Course Outcome
Unit I :
Unit II:
Unit III:
Software- Kinds of Software - The five types of Applications software - Word processing – Spreadsheets
- Database software, Presentation graphics software - Communications software- System Software –
Operating system - functions.
Unit IV :
Computer Networks: Introduction – Definition Computer Networks - Types of Networks – Local Area
Network – Metropolitan Area Network - Wide Area Network – Personal Area Network - internet –
Intranet – firewalls - Network Topology – Bus – Ring – Hybrid – Star.
Unit V:
Basic Internet Concepts: – Analog and Digital Signals - modems and communication Software, ISDN
lines, and Cable Modems - Definition of Internet - The World Wide Web - Connecting to the Internet –
Browsing the web – Web browser – Uniform Resource Locator (URL) – E-mail communication.
Unit VI :
Internet address - Domain Name System(DNS) – Locating information on the net – Internet Search
Engines – Chatting and conferencing on the Internet Online Chatting –Messaging – Usenet Newsgroup.
References:
1. Dennis P.Curtin, Kim dolwy, KunL AWN, Xrhleen morin, Information Technology, the
breaking wave, TMH 2000.
2. Stacey C Sawyer, Brain K Williams, Sarah E Hutchinson Using Information Technology
– Brief Version A Practical Introduction to Computer and Communications Third
Edition, McGraw Hill Companies 2011
3. James O’Brien – Introduction to Information systems. 16th edition, 2005.
*****
51712 OPEN SOURCE SOFTWARE
Course Objectives:
To understand the need, advantages and applications of open source software in web
designing.
To know the use of mySQL in database management.
To be able to create web pages using PHP
Course Outcome
Attained to know and work with open source software like Linux, MySql,PHP etc in
designing web pages.
Unit I :
Unit II:
Open source operating systems: LINUX: Introduction– General Overview–Kernel Mode and user mode–
Process– Advanced Concepts–Scheduling – Personalities – Cloning – Signals – Development with Linux.
Unit III:
MySQL: Introduction Setting up account Starting, terminating and writing your own SQL programs -
Record selection Technology– Working with strings – Date and Time
Unit IV:
MySQL: Sorting Query Results – Generating Summary – Working with metadata –Using sequences –
MySQL and Web.
Unit V:
Unit VI:
PHP and SQL database – PHP and LDAP – PHP Connectivity –Sending and receiving E-mails –
Debugging and error handling – Security – Templates.
Text Books:
1. Remy Card, Eric Dumas and Frank Mevel, “The Linux Kernel Book”, Wiley
Publications, 2003
****
51713 OFFICE AUTOMATION
To help the students to understand how to format, edit, and print text documents and
prepare for desktop publishing.
Students will be able to create various documents newsletters, brochures, making
document using photographs, charts, presentation, documents, drawings and other
graphic images.
To work with the worksheet and presentation software.
Learning Outcomes:
know the basics of computers and prepare documents, spreadsheets, make small
presentations with audio, video and graphs and would be acquainted with internet.
create, edit, save and print documents with list tables, header, footer, graphic,
spellchecker, mail merge and grammar checker
attain the knowledge about spreadsheet with formula, macros spell checker etc.
go for higher studies such as diploma, bachelors or master’s degree in related discipline.
Unit I :
MS-Word: Working with Files – Working with Text – Formatting, Moving, copying and pasting text
Styles – Lists – Bulleted and numbered lists, Nested lists, Formatting lists. Table Manipulations. Graphics
– Adding clip Art, add an image from a file, editing graphics, Spelling and Grammar, AutoCorrect - Page
formatting, Header and footers, page numbers, Mail Merge, Macros - Creating & Saving web pages,
Hyperlinks.
Unit II:
MS-Excel- Modifying a Worksheet – Moving through cells, Adding worksheets, rows and columns
Resizing rows and columns, Selecting cells, Moving and copying cells, Freezing panes - Macros –
recording and running. Formatting cells – Formatting toolbar, Dates and times, Auto formatting. Formula
and Functions. Linking worksheets.
Unit III:
MS-Excel : Sorting and Filling, Alternating text and numbers with Auto fill, Auto filling functions.
Graphics – Adding clip art, add an image from a file, Charts – Using chart Wizard, Copy a chart to
Microsoft Word.
Unit IV
MS-Power Point -Create a Presentation from a template- Working with Slides – Insert a new slide,
Applying a design template, Changing slide layouts -Slides: Reordering slides, Hide slides, Create a
Custom slide show. Adding Content – Resizing a text box, Text box properties, Delete a text box. Video
and Audio effects, Color Schemes & Backgrounds Adding clip art, Adding an image from a file, Save as
a web page.
UNIT V
MS-Access - Using Access database wizard, pages and projects. Creating Tables – Create a Table in
design view. Datasheet Records – Adding, Editing, deleting records, Adding and deleting columns
Resizing rows and columns, finding data in a table & replacing, Print a datasheet. Queries.
UNIT VI
MS-Access Forms - Forms – Create a form using the wizard, Create a form in Design View. Form
Controls. Sub forms-Create a form and sub form at once, Sub form wizard, Drag and drop method.
Reports – Using the wizard, Create in Design View, Printing reports. Importing, Exporting, Linking.
REFERENCE BOOKS:
1. Sanjay Saxena, A First Course in Computers (Based on Windows 8 and MS Office 2013) Vikas
Publishing 2015.
2. Jennifer fulton, Sherri Kinkoph, and Joe Kraynak, The Big Basics Book of Microsoft Office 1997, PHI,
1998.
3. Laura Acklen et al, Microsoft Office 97 Professional Essentials,EEE Que E&T, PHI (1998).
********
51714 OFFICE AUTOMATION LAB
To help the students to understand how to format, edit, and print text documents and
prepare for desktop publishing.
Students will be able to create various documents newsletters, brochures, making
document using photographs, charts, presentation, documents, drawings and other
graphic images.
To work with the worksheet and presentation software.
Learning Outcomes:
Integrate both graphs and tables created in Microsoft Excel into a laboratory report in
Microsoft Word.
Generate equations, sample calculations, and basic diagrams in Microsoft Word.
Input experimental data into Microsoft Excel.
Perform calculations in Microsoft Excel using both manually inputting formulas and
built-in
functions.
Generate simple and effective tables and graphs to describe experimental data in MS
Excel.
Properly format and organize a formal laboratory report in Microsoft Word.
Exercises based on MS-Word
Table manipulation
REFERENCE BOOKS:
1. Sanjay Saxena, A First Course in Computers (Based on Windows 8 and MS Office 2013) Vikas
Publishing 2015.
2. Jennifer fulton, Sherri Kinkoph, and Joe Kraynak, The Big Basics Book of Microsoft Office
1997, PHI, 1998.
3. Laura Acklen et al, Microsoft Office 97 Professional Essentials,EEE Que E&T, PHI (1998).
SEMESTER II
Course Objectives:
Course Outcome:
Number Systems: Binary, Octal, Decimal and Hexadecimal number systems – Conversion from one base
to another base – Use of complements – binary arithmetic – Numeric and Character codes.
Unit II:
Boolean algebra and Combinational Circuits: Fundamental concepts of Boolean Algebra – DeMorgan’s
theorems.
Unit III:
Simplification of expressions – Sum of products and products of sums – Karnaugh map simplification –
Quine - McKluskey method – two level implementation of Combinational Circuits.
Unit IV:
Combinational Circuits: Half Adder – Full Adder – Subtractors – Decoders – Encoders – Multiplexers –
Demultiplexer.
Unit V:
Sequential Circuits: Flip flops – Registers – Shift Registers – Binary Counters – BCD Counters –
Memory Unit.
Unit VI:
Data Representation : Data Types – Complements – Fixed Point Representations – Floating Point
Representations – Other Binary Codes – Error detection codes.
Reference Books:
1. Digital Computer Fundamentals, 6th Edition, Thomas C. Bartee, Tata McGraw Hill, 2008.
2. Digital Logic and Computer Design, M. Morris Mano, Pearson Education, 2008.
3. Digital fundamentals, Floyd & Jain, eighth edition, 2005, Pearson Education.
4. Digital Principles and applications, Donald P leach, Albert Paul Malvino, Goutam saha, Sixth
edition, Tata McGraw Hill,2006.
******
51722 PROGRAMMING IN C
Course Objectives:
Unit I:
Introduction and Features: History of C, Importance of C, Basic Structure of C program, character set,
Tokens, keywords and identifiers - Constants and variables and data types - declaration of variables,
defining symbolic constants, declaring a variable as a constant - Operators and expressions:
Evaluation of expressions, precedence of arithmetic operators.
Unit II:
Managing I/O operations: reading and writing a character, formatted input, output - Decision making and
branching: IF statement, If..else statement, nesting if else statement, else if ladder, switch statement, goto
statement, while statement, do statement, for statement.
Unit III:
Unit IV:
Functions basics: Elements of user defined functions, definitions, return values and their types, function
calls, declaration, nesting of functions, recursion.
Unit V
Structures and Unions: Defining a structure, declaring a structure variable, accessing structure members,
array of structures, array within structures, structures within structures, structures and functions.
Unit VI:
Pointers: Basics, declaring, initialization of pointer variables, address of variable, accessing a variable
through its pointer - Files: Introduction, Defining, opening and closing files, I/O operations on files.
Course Objectives:
The learner should be well versed with the fundamentals of Algorithms, learn
various data structures, should be able to use them appropriately as per need during
development of programs.
Also, the learner should know different sorting and searching techniques so that
correct techniques can be used in different programs so that the complexity of the
program does not increase due the sorting/ search technique employed.
Course Outcome
After the completion of this course, the student will able to;
• Write programs using structures, strings, arrays, pointers and strings for solving
complex computational problem using the data structures real time applications
• Able to analyze the efficiency of Data Structures
Unit I :
Introduction to Data Structure : Types of Data Structure , Primitive data types -Algorithms –Time and
space Complexity of algorithms.
Unit II:
Arrays: Array initialization, Definition of Array, Characteristic of Array ,One- dimensional Array, Two-
dimensional array and Multi-dimensional array
Unit III:
Stack : Stack related terms, Operations on a stack - Representation of Stack: Implementation of a stack –
application of Stack. Expression Evaluation Polish notation. Queues: Operations on queue Circular
Queue, Representation of Queues, Application of Queues.
Unit IV:
List: Merging lists, Linked list, Single linked list, Double Linked List, Header - Linked list - Operation on
Linked List : Insertion and Deletion of linked list -Traversal: Traversing a linked list , Representation of
linked list.
Unit V:
Trees: Binary Trees, Types of Binary trees, Binary Tree Representation - Binary Tree operations /
Applications : Traversing Binary Trees, Binary Search tree -Operations on Binary Tree: Insertion and
Deletion operations, Hashing Techniques.
Unit VI:
Searching Techniques : Introduction, Searching, Types of searching, Linear Search, Binary search
technique.
Books for reference:
1. Fundamentals of data structures, Second edition,Ellis Horowitz and Sartaj Sahini,
Universities press, 2007.
2. Data Structures, Seymour Lipschutz, G.A.Vijayalakshmi Pai, Second Edition,
Schaum’s Outlines, Tata Mc-Graw Hill Private Ltd., 2006.
*********
Course Outcome
Contents
Simple C Programs
Using if and switch constructs Programs
Looping statements Problems
Functions and Recursive programs
Arrays, Strings and Matrices Programs
File Handling Programs
Pointers and Arrays Programs
Programs using structure and union
Programs based on file handling
Exercises using Stacks
Exercises using queues, expression evaluation programs
Infix to postfix conversion Program
Linked List programs: Single linked list, Double Linked List, Insertion and
Deletion of linked list
REFERENCE BOOKS:
*****
DIPLOMA PROGRAMME
IN
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Course of Study and Scheme of Examinations
Course objectives
Course outcome
Unit 1:
AI - Problems and Search: Introduction: The Artificial Intelligence (AI) Problem – What is an
AI technique - Criteria for success. Problems, Problem Spaces, Search: Defining Problems,
Problem Spaces, Search State space search - Production Systems – Problem characteristics -
Production system characteristics – Application areas.
Unit 2 :
Heuristic Search techniques: Generate and Test - Hill Climbing- Best-First search – Problem
reduction – constraint satisfaction - Means-end analysis.
Unit 3:
Unit 4 :
Using Predicate logic: Representing simple facts in logic – Representing Instance and ISA
relationships - Computable functions and predicates -Resolution. Representing knowledge
using rules: Procedural Vs Declarative knowledge –Logic programming - Forward Vs
Backward reasoning - Matching – Control knowledge.
Unit 5 :
Unit 6 :
*****
Course Objectives:
Course Requirements:
Design a database using ER diagrams and map ER into Relations and normalize the relations
Acquire the knowledge of query evaluation to monitor the performance of the DBMS.
Develop a simple database application using normalization.
Unit 1 :
Data base System Applications, data base System VS file System – View of Data – Data
Abstraction –Instances and Schemas – data Models – the ER Model - Relational Model – Other
Models – Database Languages – DDL – DML – database Access for applications Programs –
data base Users and Administrator – Transaction Management – data base System Structure –
Storage Manager – the Query Processor.
\Unit 2
History of Data base Systems - Data base design and ER diagrams – Beyond ER Design Entities,
Attributes and Entity sets – Relationships and Relationship sets – Additional features of ER
Model – Concept Design with the ER Model – Conceptual Design for Large enterprises.
Unit 3 :
Unit 4 :
Relational Algebra – Selection and projection set operations – renaming – Joins – Division –
Examples of Algebra overviews - Relational calculus – Tuple relational Calculus – Domain
relational calculus – Expressive Power of Algebra and calculus.
Unit 5 :
Form of Basic SQL Query – Examples of Basic SQL Queries – Introduction to Nested Queries –
Correlated Nested Queries Set – Comparison Operators – Aggregative Operators – NULL values
– Logical connectivity’s – AND, OR and NOT – Impact on SQL Constructs – joins- Outer Joins
– Disallowing NULL values – Complex Integrity Constraints in SQL Triggers and Active Data
bases. Schema refinement.
Unit 6 :
Normal forms:Problems Caused by redundancy – Decompositions – Problem related to
decomposition – reasoning about FDS – FIRST, SECOND, THIRD Normal forms – BCNF.
Reference and text Books:
********
Course objectives
Course outcome
Unit 2
Unit 4
Working with files: CSV file – input CSV, read CSV, analyzing CSV, writing into CSV,
Excel file: install, load, input, read excel files - Binary files: reading and writing – XML
files: input and read XML files. mySQL package – connection R with mySQL – querying
the table – table manipulation: create, insert, drop and update.
Unit 6
Visualizing: R charts and Graphs: R Pie charts: Pie chart title, color- slice percentages and
chart legend – 3D Pie chart - Bar charts – Histograms – Line graphs – Scatter plots –
creating scatterplot – scatterplot matrices.
*****
Course objectives
Course outcome
Simple R Programs
Programs using conditional control statements
Programs using functions and recursion.
Problems based on Vectors, List, Arrays, Matrices, Factors and Frames.
Experiments using packages.
Problems using files and database.
Experiments using charts and graphs.
Experiments to perform statistics(mean, mode, median, normal distribution,
binomial distribution) in R.
Experiments for forecasting numeric data: Regression Methods.
Experiments for data Visualizations.
Reference books:
*****
SEMESTER II
Course Objectives:
To discover patterns in your data and then make predictions based on often complex
patterns to answer business questions, detect and analyze trends and help solve problems.
To introduce students to the state-of-the-art concepts and techniques of Machine
Learning.
Course Outcome:
Unit 1
Unit 2:
Unit 3
Unit 4
Unit 5
Reinforcement Learning and ELM: Introduction: Markov Decision process - Monte Carlo
Prediction - case studies – Applications. Introduction to Extreme Learning Machine (ELM) -
Software Tools: Introduction to Weka, Matlab, Rapidminer, tensorflow and keras –case studies.
Unit 6
******
Course Objective:
Course Outcome:
Unit 1
Unit 2
Unit 4
Fuzzy Sets: Basic Concept – Crisp Set Vs Fuzzy Set - Operations on Fuzzy Set –
Properties of Fuzzy Sets. Fuzzy Relations: Concept – Fuzzy Composition – Fuzzy
Equivalence and Tolerance Relation. Membership Functions: Features – Fuzzification –
Methods of Membership value assignments – Defuzzification – Methods
Unit 5
Fuzzy Arithmetic – Extension Principle – Fuzzy Measures - Fuzzy Rules and Fuzzy
Reasoning: Fuzzy Propositions – Formation of Rules – Decomposition of Rules –
Aggregation of Rules – Approximate Reasoning - Fuzzy Inference and Expert Systems –
Fuzzy Decision Making – Fuzzy Logic Control Systems.
Unit 6
Course Objectives:
Course Requirements:
Before studying this course, the student has knowledge about basic principles of
programming
Experience with a high-level language (C/C++, Java, MATLAB) is suggested. Prior
knowledge of a scripting language (Perl, UNIX/Linux shells) and Object-Oriented
concepts is helpful but not mandatory.
Course Outcome:
After the completion of this course, the student will able to;
To write programs using structures, strings, arrays, pointers and strings for solving
complex computational problem.
Use if-else statements and switch-case statements to write programs in Python to tackle
any decision-making scenario
Master Object-oriented programming to create an entire Python project using objects and
classes
Store and retrieve information using variables
Develop cost-effective robust applications using the latest Python trends and technologies
Unit 1
Unit 2
Unit 3
Functions: Introduction – Syntax and basics of function – use of function – parameters and
arguments in function – local and global variables – return statement. Strings: Introduction – The
str class – built in functions for string – index[] operator - traversing string – immutable strings –
string operators – string operations.
Unit 4
Lists : Introduction – creating lists – accessing the elements of a list – negative list indices – list
slicing – built-in functions for list – list operator – list methods – passing list to a function –
returning list from function.Introduction to tuples - creating – tuple() function – built-in
functions for tuples - indexing -slicing – operators – list and tuples – sorting -traversing.
Unit 5
Introduction to tuples - creating – tuple() function – built-in functions for tuples - indexing -
slicing – operators – list and tuples – sorting -traversing. Sets – creating – set in and not in
operator – set classes - operations. Dictionaries: Introduction – creating, adding, replacing,
retrieving values – formatting – deletion of items – comparing dictionaries – methods of
dictionary class – nested dictionaries - traversing dictionaries
Unit 6
File Handling: Introduction – Need for file handling – Text input and output using file – seek()
function. Introduction to Scientific computing with Scipy, Mathematical computing with
Numpy, Scikit learn, Data visualization using Matplotlib, Data manipulation with pandas and
sympy – Case studies.
Reference and text books:
***
Semester Course Title of the Course Credits Hours
Code
II 24 MACHINE LEARNING USING PYTHON 2 60
LAB
Course Objectives:
Course Requirements:
Before studying this course, the student has knowledge about basic principles of
programming.
Experience with a high-level language (C/C++, Java, MATLAB) is suggested. Prior
knowledge of a scripting language (Perl, UNIX/Linux shells) and Object-Oriented
concepts is helpful but not mandatory.
Course Outcome:
After the completion of this course, the student will able to;
To write programs using structures, strings, arrays, pointers and strings for solving
complex computational problem.
Use if-else statements and switch-case statements to write programs in Python to tackle
any decision-making scenario.
Master Object-oriented programming to create an entire Python project using objects and
classes.
Store and retrieve information using variables.
Develop cost-effective robust applications using the latest Python trends and
technologies.
Write program to solve real-world machine learning problems.
Reference Books:
******
DIPLOMA PROGRAMME
IN
CYBER SECURITY
Course of Study and Scheme of Examinations
I SEMESTER
1 51911 Cryptography 25 75 100 2
and Network
Security
2 51912 Fundamentals 25 75 100 2
of Cyber
Security
3 51913 Cyber 25 75 100 2
Security Law
& Practice
4 51914 Cryptography 25 75 100 2
– LAB
II SEMESTER
5 51921 Web 25 75 100 2
Application
Security
6 51922 Malware 25 75 100 2
Analysis and
Network
Security
7 51923 Mobile 25 75 100 2
Security
8 51924 Cyber 25 75 100 2
Security -
LAB
TOTAL 200 600 800 16
CIA: Continuous Internal Assessment ESE: End semester Examination
Detailed Syllabi
Course Objectives
Course Outcome
UNIT 1:
Introduction: The OSI security architecture, security attacks, Security Services, Security
mechanism, A model for network security, classical Encryption techniques, Symmetric cipher
model, Substitution techniques.
UNIT 2:
Block cipher principle, the data encryption standard, The strength of DES, Differential and
Linear cryptanalysis, Block cipher design principles,Advanced Encryption Standard: Finite
Field arithmetic, AES structure, AEStransformation function, Implementation
UNIT 3:
Principles of public-key cryptosystems, The RSA algorithms, Other public key cryptosystems:
Diffie-Helman key Exchange, Elgamelcryptographic system, Elliptic curve cryptography,
pseudorandom number generation based onasymmetric cipher
UNIT 4:
Message authentication requirements, functions, message authenticationCodes, Security of
MACs, MAC based Hash functions, MAC based ciphers
UNIT 5:
Digital Signatures: ElGamal Digital Signature scheme, schnorr digital signature schemes,
digital signature standard
UNIT 6:
Web security considerations, Socket layer and transport layer and transport layer security
Electronic mail security: pretty good privacy, IP security overview, IP security policy,
encapsulating security payload
Text Book:
1. William Stallings, “Cryptography and Network Security Principles and Practice”, Pearson,
5th
Edition.
*******
Course Objectives
To understand the Basic Concepts in Cyber Security
To know about Classification of Cyber Security
To understand the Present and Future Cyber Security
Course Outcome
At the end of the course, students will be able to;
To know the latest trends in Ethical Hacking
To understand the fundamentals of computer forensics, Evidence Collection Etc.
UNIT-1:
Introduction to Cyber Crime – Types of Cyber Crime – Classification of Cyber Criminals – Tools used in
Cyber Crime – Challenges – Strategies – Cryptocurrency – Bitcoin – Blockchain - Ransomware.
UNIT-2:
Cyber Forensics Definition – Disk Forensics – Network Forensics – Wireless Forensics – Database
Forensics – Malware Forensics – Mobile Forensics – Email Forensics
UNIT-3:
Ethical Hacking: Essential Terminology, Hacking windows – Network hacking – Web hacking –
Password hacking, Malware, Scanning, Cracking.
UNIT-4:
Digital Evidence in Criminal Investigations: The Analog and Digital World, Training and Education in
digital evidence, Evidence Collection and Data Seizure: Why Collect Evidence, Collection Options
Obstacles, Types of Evidence, The Rules of Evidence, Volatile Evidence,
UNIT-5:
Intrusion, Physical Theft, Abuse of Privileges, Unauthorized Access by Outsider, Malware infection,
Intrusion detection and Prevention Techniques, Anti-Malware software, Network based Intrusion
detection Systems, Network based Intrusion Prevention Systems, Host based Intrusion prevention
Systems,Security Information Management, Network Session Analysis, System Integrity Validation.
UNIT-6:
Reference Books:
2. William Stallings and Lawrie Brown, “Computer Security: Principles and Practice”, Prentice Hall.
6. Earnest A. Kallman, J.P Grillo, “Ethical Decision making and IT: An Introduction with Cases”,
McGraw
Hill Publication.
*****
Learning Outcomes:
UNIT-2:
Impact on other related Acts (Amendments) - Amendments to Indian Penal Code, Indian Evidence Act,
Bankers Book Evidence Act, Reserve Bank of India Act - Cyber Space Jurisdiction.
UNIT-3:
E – commerce and Laws in India - Digital / Electronic Signature in Indian Laws - E – Commerce Issues
and provisions in Indian Law - E – Governance concept and practicality in India - E – Taxation issues in
Cyberspace - E – Contracts and its validity in India (f) Cyber Tribunal & Appellate Tribunal.
UNIT-4:
Intellectual Property Rights - Domain Names and Trademark Disputes - Concept of Trademarks / in
Internet Era - Cyber Squatting - Reverse Hijacking - Jurisdiction in Trademark Disputes - Copyright in
the Digital Medium - Copyright in Computer Programmes.
UNIT-5:
Cyber Laws in India – Crime against Individual – Crime against Property – Crime against Nation – Indian
Case Laws.
UNIT-6:
International Cyber Laws Introduction – Cybercrime Legislation in the Netherlands – Cyber Laws in
Malaysia – Cyber Laws in UK – Cyber Laws in United States – Australian Law related to Privacy.
TEXT BOOK:
REFERENCE BOOKS:
1. Harish Chander, Cyber Law and IT Protection, PHI Publication, 2012.
2. Philips, Computer Forensics and Investigations, Cengage Learning India Edition.
****
14 -CRYPTOGRAPHY - LAB
List of Experiments:
1. Write a C program that contains a string (char pointer) with a value \Hello World’. The
program should XOR each character in this string with 0 and displays the result.
2. Implementation of Diffie-Hellman algorithm
3. Write a C program that contains a string (char pointer) with a value \Hello World’. The
program should AND or and XOR each character in this string with 127 and display the
result.
4. Write a Java program to perform encryption and decryption using the following
algorithms: a) Ceaser Cipher b) Substitution Cipher c) Hill Cipher
5. Write a Java program to implement the DES algorithm logic.
6. Write a C/JAVA program to implement the BlowFish algorithm logic.
7. Write a C/JAVA program to implement the Rijndael algorithm logic.
8. Implementation of RSA based signature system
9. Write a Java program to implement RSA Algorithm
10. Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
****
II SEMESTER
Course Objectives
To understand the web basics, HTML commands
To know about various Web Penetration Testing methods
To understand the Web Application Technologies and Attacks
Course Outcome
At the end of the course, students will be able to;
To know the latest trends in Web Application Security Methods
To understand the various Web Attacks and other techniques.
UNIT-1:
Web Fundamentals – HTML, HTTP 1.0 and 1.1- Client-side scripting, Server-side scripting- Web server
architecture - Windows & Linux, IIS and LAMP servers- Network topologies and DMZ
UNIT-2:
Web Penetration Testing Methodology - Types of Web Penetration Testing - Web Pen Testing Approach
– Core Defense Mechanisms
UNIT-3:
Web Application Technologies – Mapping the Application – Bypassing the Client-side Controls
UNIT-4:
Attacking the Authentication – Attacking the Session Management – Attacking access Controls
UNIT-5:
Attacking Back-End Components – Attacking Users: Cross-Site Scripting – Attacking Users: Other
Techniques.
UNIT-6:
Automating Customized Attacks – Attacking Application Architecture – Attacking the Application Server
Text Books:
1. Shostack, Adam. Threat modeling: Designing for security. John Wiley & Sons, 2014.
2. DafyddStuttard, and Marcus Pinto, The Web Application Hacker's Handbook: Finding and Exploiting
Security Flaws, 2nd Edition, John Wiley & Sons, 2011.
References:
1. Wenliang Du, Computer Security – A hands-on Approach, First Edition, Createspace Independent Pub,
2017 4. https://www.owasp.org
*****
Course Objectives
To protect the network itself;
To reduce the susceptibility of computer systems and applications to threats originating
from the network; and,
To protect data during transmission across the network.
Course Outcome
At the end of the course, students will be able to;
To know the latest trends in malware attacks, monitoring and execution methods
To understand the fundamentals of firewall, LAN attacks and Network Sniffing.
Unit I
Live malware analysis, dead malware analysis, analyzing traces of malware, system calls,
api calls, registries, network activities. Anti-dynamic analysis techniques, VM detection
techniques, Evasion techniques, Malware Sandbox, Monitoring with Process Monitor,
Packet Sniffing with Wireshark, Kernel vs. User-Mode Debugging, OllyDbg, Breakpoints,
Tracing, Exception Handling, Patching
Unit IV
Techniques for Network Protection: Firewalls, packet filter and stateful firewalls,
application aware firewalls, personal firewalls-iptables, Proxies, NAT, Intrusion Detection
System-Snort, Signature and Anomaly based detection, Honeypots and Honeynets, Network
Log management-syslog or SPLUNK
Unit V
LAN attacks: ARP Cache poisoning, MAC flooding, Man in the middle attacks, Port Stealing,
DHCP attacks, 10 VLAN hopping; Network Sniffing-wireshark and Password Cracking-John the
Ripper;
Unit VI
Secure Network Communication: SCP, SSH, SSL3.0, TLS 1.2, STARTTLS, IPSec, VPN and Secure
HTTP; Understanding the dark web, TOR traffic, Attacks on SSL/TLS: SSL stripping, Drown and
Poodle attack; Encrypting and Signing Emails: PGP- GPG/openPGP,DKIM and SPF; Single Sign
On (SSO)-OAUTH and OPENID; Network packet creation and Manipulation using scapy and dpkt
libraries.
Text Books:
1. Michael Sikorski, Andrew Honig, Practical Malware Analysis: TheHands-On Guide to
DissectingMalicious Software.
References:
1. Mike Shema, Anti-hacker toolkit, Tata McGraw Hill Publications, 2014.
*****
23- MOBILE SECURITY
Course Objectives
To understand the Android Architecture and Framework
To know about various Android Permission management
To understand the information systems and software development
Course Outcome
At the end of the course, students will be able to;
To know the latest trends in Android Application Package, Installation Process
To understand the Android Device Security
UNIT-1:
UNIT-2:
UNIT-3:
Android Application Package Format – Code Signing – APK Install Process – Package
Verification
UNIT-4:
Android User Management – Types of Users – User Management – User Metadata – Per user
Application Management – External Storage
UNIT-5:
UNIT-6:
Network Security and PKI – Credential Storage – Device Security – Enterprise Security
Text Book:
1. Nikolay Elenkov, Android Security Internals, No Starch Press, 2015.
References:
1. Karim Yaghmour, Embedded Android, O’Reilly Publications, 2013.
*****
24 - CYBER SECURITY - LAB
Course Objectives
To understand the TCP, Port Scanning using NMAP Tool
To know about various SQL Injection methods
To understand the information about Sniffing and E-mail Security
Course Outcome
At the end of the course, students will be able to;
To know the latest trends in Cyber Security Tools.
To understand the fundamentals of configuring your E-mail account against threats.
List of Experiments:
1. TCP Scanning using NMAP.
2. Port Scanning using NMAP
3. TCP/UDP Connectivity using Netcat
4. Network Vulnerability using OpenVAS
5. Web Application Testing using DVWA
6. Manual SQL Injection using DVWA
7. XSS using DVWA
8. Automated SQL Injection with SQLMAP
9. Demonstrate Sniffing using packet tool i.e. snort.
10. Configure your e-mail account against various threats. i.e. spam attack, phishing,
spoofing etc.
References:
1. http://www.pearsonhighered.com/assets/hip/us/hip_us_pearsonhighered/samplechapte
r/013 1407333.pdf
2. http://www.cs.nyu.edu/courses/fall04/G22.2262-
01/assignments/assignment4_files/Ethereal_TCP.pdf
3. http://www.snort.org/docs
4. http://manual.snort.org/node27.html
*****