Course Structure Executive M.Tech Blockchain and Big Data - (122 Credits)
Course Structure Executive M.Tech Blockchain and Big Data - (122 Credits)
Tech in Blockchain
& Big Data
SEMESTER COURSE NAME L-T-P-C
Elective 1 3-0-0-6
Elective 2 3-0-0-6
Elective 3 3-0-0-6
ELECTIVE I
ELECTIVE III
Course No.: Name: Foundation of Computer Systems Credits: 3-0-0-6 Prerequisites: NIL
Course Objectives:
1. To provide an understanding of computer architecture, operating systems, and computer networks
2. To develop skills in assembly language programming, control unit design, and network configuration
3. To explore advanced concepts of distributed networked systems, such as virtualization and fault tolerance
Course Outcomes:
1. Understand the components and functions of a computer system, including CPU, memory, and I/O devices
2. Write and debug assembly language programs and design control units using hardwired and
microprogrammed methods
3. Understand the basics of computer networking and network protocols, and be able to configure a simple
network
● Processes & threads : Process creation & termination, Scheduling, synchronization , IPC, thread creation &
termination and thread synchronization.
● Concurrency : Critical sections & mutual exclusion, semaphores and monitors, deadlocks and livelocks,
Parallelism and concurrency control.
● Memory management : Allocation & deallocation, Paging & segmentation, VMM , Memory protection and
access control.
● File Management : File organization and access methods, Directory structures, File system implementation,
Input/output (I/O) operations & file sharing and protection.
TEXTBOOKS :
1. A. Silberschatz, P. B. Galvin and G. Gagne, Operating System Concepts, 7th Ed, John Wiley and Sons,
2004.
2. J. Kurose and K. W. Ross, Computer Networking: A Top down approach, 3rd Ed, Pearson India, 2004.
3. John L Hennessy, David A.Patterson , Computer architecture, A quantitative approach ,5th Edition
Morgan Kaupmann publications.
Course No.: Algorithms : Design & Implementation Credits: 2-0-2-6 Prerequisites : NIL
Course Objectives:
1. Develop a deeper understanding of the theoretical foundations of algorithm design and analysis, including
key concepts such as asymptotic analysis and NP-hardness.
2. Learn to apply various algorithmic design paradigms, including backtracking, dynamic programming, and
greedy algorithms, to solve a range of real-world problems.
3. Understand the basic principles of approximation algorithms and learn to apply them to a variety of
optimization problems.
4. Gain practical experience in implementing and analyzing algorithms through programming assignments and
projects.
Course Outcomes:
1. Students will be able to analyze the complexity of an algorithm and make decisions about which algorithms
are best suited for a given problem.
2. Students will be able to design algorithms using a variety of techniques, including backtracking, dynamic
programming, and greedy algorithms, and apply them to solve problems in various domains.
3. Students will be able to apply approximation algorithms to optimization problems, and understand the
tradeoffs between approximation quality and runtime.
4. Students will be able to implement and analyze algorithms using programming languages such as Python
and Java, and use this knowledge to develop and evaluate algorithms for real-world applications.
● Greedy algorithms: Scheduling classes, Huffman codes, Stable matching, Minimum spanning tree problem
● Introduction to approximation techniques
● Deterministic rounding algorithm and rounding a dual solution
● Constructing a dual solution-primal dual method and randomized rounding algorithm
TEXTBOOKS :
1. Thomas H Cormen, Charles E Lieserson, Ronald L Rivest and Clifford Stein,Introduction to Algorithms, MIT
Press, 2009.
2. Jon Kleinberg and Éva Tardos, Algorithm Design, Pearson, 2005.
3. David P. Williamson and David B. Shmoys, The Design of Approximation Algorithms, Cambridge University
Press, 2010.
4. Jeff Erickson, Algorithms, 2019.
Course No.: Foundations of Blockchain Credits: 3-0-0-6 Prerequisites : NIL
Course Objectives:
1. Understand the fundamentals of blockchain technology, including its architecture, functionality, and various
cryptographic elements.
2. Explore the potential applications of blockchain technology in different sectors such as finance,
e-governance, and healthcare.
3. Analyze the challenges and constraints of implementing blockchain technology and evaluate its implications
on privacy, security, and trust.
4. Develop a foundational knowledge of the consensus problem and different consensus mechanisms used in
blockchain technology.
Course Outcomes:
1. Demonstrate a working knowledge of blockchain technology, including its components, operation, and
cryptographic elements.
2. Evaluate the potential applications and limitations of blockchain technology in different sectors and
industries.
3. Analyze the challenges and constraints of implementing blockchain technology, including its impact on
privacy, security, and trust, and propose potential solutions.
4. Develop the ability to critically evaluate and compare different consensus mechanisms used in blockchain
technology and analyze their advantages and disadvantages.
● Introduction to Bitcoin
● Bitcoin Protocol and Architecture
● Byzantine Generals Problem and Fault Tolerance
● Mining Mechanism and Incentives
● Distributed Consensus and Merkle Trees
● Transactions, Fees, and Anonymity in Bitcoin
● Public and Private Blockchains
● Double Spending Problem and Solutions
● Privacy in Blockchains
● Legal Considerations for Bitcoin and Cryptocurrencies
Text Books
1. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven Goldfeder, Bitcoin and
Cryptocurrency Technologies: A Comprehensive Introduction, Princeton University Press, July 2016.
2. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology, decentralization, and smart contracts
explained”, 2nd Edition, Packt Publishing Ltd, March 2018.
3. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction by Arvind Narayanan, Joseph
Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder, Princeton University Press, 2016, ISBN
9780691171692
Course No.: Name: DBMS , Design & Implementation Credits: 2-0-2-6 Prerequisites: NIL
Course Objectives:
1. To emphasize the underlying principles of Relational Database Management System.
2. To model and design advanced data models to handle threat issues and countermeasures.
3. To implement and maintain the structured, semi-structured and unstructured data in an efficient
4. database system using emerging trends.
Course outcomes:
1. Design and implement database depending on the business requirements and considering various
2. design issues.
Select and construct appropriate parallel and distributed database architecture and formulate the
3. cost of queries accordingly.
4. Understand the requirements of data and transaction management in mobile and spatial database
5. and differentiate those with RDBMS.
Categorize and design the structured, semi-structured and unstructured databases.
6. Characterize the database threats and its countermeasures.
7. Review cloud, streaming and graph databases.
8. Comprehend, design and query the database management system.
Lab(14 hours)
Experiment 1: Modeling a scenario into ER/EER Model using ERD Plus, ER Win, or Oracle SQL developer.
Experiment 2: Creating applications with RDBMS
Experiment 3: Partitioning a database and comparing execution speed with/without parallelism.
Experiment 4: Creating an XML document and validating it against an XML Schema/DTD.
Experiment 5: Representing football games results in XML, DTD, and XQuery.
Experiment 6: Implementing parallel join and parallel sort algorithms.
Experiment 7: Creating a distributed database scenario and fragmenting the database.
Experiment 8: Importing a spatial dataset into Postgresql (PostGIS) and querying the database.
Experiment 9: Investigation of spatial analysis techniques using Toxic Release Inventory data.
Experiment 10: Visualizing and interpreting results of sample datasets from the healthcare domain.
TEXT BOOKS:
1. Avi Silberschatz, Hank Korth, and S.Sudarshan,”Database System Concepts”, 6th Ed.McGraw Hill, 2010.
2. Ramez Elmasri B.Navathe: “Fundamentals of database systems”, 7th edition,Addison Wesley,2014
REFERENCE BOOKS:
1. S.K.Singh, “Database Systems: Concepts, Design Applications”, 2nd edition,Pearson education, 2011.
2. Joe Fawcett, Danny Ayers, Liam R. E. Quin: “Beginning XML”, Wiley India Private Limited 5th Edition,
2012.
3. Thomas M. Connolly and Carolyn Begg “Database Systems: A Practical Approach to Design,
Implementation, and Management”, 6th edition, Pearson India, 2015
Course No.: Name: BigData Frameworks Credits: 2-0-2-6 Prerequisites: NIL
Course objectives:
Course outcomes:
1. Understand the concepts and principles of Big Data and its ecosystem.
2. Design and implement Big Data frameworks using distributed processing systems.
3. Apply various data storage and processing techniques for handling large-scale datasets.
Experiments
1. Install and configure Hadoop, and develop a simple MapReduce program for word count analysis.
2. Set up Apache Spark, create Resilient Distributed Datasets (RDDs), and write a Spark application for data
processing tasks.
3. Utilize Spark SQL and DataFrames to connect to databases, manipulate data, and run SQL queries.
4. Explore Spark MLlib, implement a basic machine learning algorithm, and evaluate its performance on a
dataset.
5. Integrate Spark with visualization libraries to create insightful data visualizations.
6. Set up a cloud-based Hadoop or Spark environment, and deploy a sample big data application.
7. Monitor and manage the deployed application using the cloud provider's management console.
8. Gain proficiency in various aspects of big data processing, analysis, and visualization using Hadoop and
Spark frameworks.
REFERENCE BOOKS:
1. Mike Frampton, “Mastering Apache Spark”, Packt Publishing, 2015.
2. Tom White, “Hadoop: The Definitive Guide”, O’Reilly, 4th Edition, 2015.
3. Nick Pentreath, Machine Learning with Spark, Packt Publishing, 2015.
4. Mohammed Guller, Big Data Analytics with Spark, Apress, 2015
5. Donald Miner, Adam Shook, “Map Reduce Design Pattern”, O’Reilly, 2012
Prerequisites:
Course No.: Name: Blockchain Components & Architecture Credits: 3-0-0-6 Fundamentals of
Blockchain (Sem 1)
Course Objectives:
1. To provide an in-depth understanding of the key concepts and components of blockchain technology.
2. To explore the different types of blockchain architectures and design considerations, including security and
consensus protocols.
3. To examine the use of blockchain in various sectors, such as financial software and systems, government,
and trade supply chains.
4. To provide students with the knowledge and skills to develop secure cryptographic protocols on blockchain
and analyze existing blockchain ecosystems.
Course Outcomes:
1. Students will be able to explain the core concepts and components of blockchain technology.
2. Students will be able to design and implement basic blockchain architectures and understand the security
and consensus mechanisms required for their development.
3. Students will be able to analyze the use of blockchain in various sectors and identify opportunities for its
implementation.
4. Students will be able to develop secure cryptographic protocols on blockchain and compare and contrast
different blockchain ecosystems, such as Bitcoin, Hyperledger, and Ethereum.
TEXT BOOKS:
1. "Blockchain Basics: A Non-Technical Introduction in 25 Steps" by Daniel Drescher, Apress.
2. "Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World"
by Don Tapscott and Alex Tapscott, Portfolio.
3. "The Basics of Bitcoins and Blockchains" by Antony Lewis, O'Reilly Media.
Course No.: Data virtualization & Dashboards Credits: 3-0-0-6 Prerequisites : NIL
Course Objectives:
1. To introduce students to the concept of data virtualization and its applications in the field of big data and
blockchain.
2. To provide students with hands-on experience using popular data virtualization tools to create a unified view
of data from multiple sources.
3. To teach students how to design effective dashboards that provide meaningful insights into complex data
sets.
4. To explore advanced topics in data virtualization and dashboards, such as real-time data integration,
self-service analytics, and integration with big data platforms and blockchain.
Course Outcomes:
1. Students will be able to describe the benefits and challenges of data virtualization and how it differs from
traditional data integration approaches.
2. Students will be able to create a virtual data layer using a popular data virtualization tool and connect to
various data sources, including relational databases, big data systems, and cloud applications.
3. Students will be able to design effective dashboards using popular dashboard tools and connect virtual data
sources to create interactive visualizations.
4. Students will be able to identify and apply advanced techniques in data virtualization and dashboard design,
such as real-time data processing, self-service analytics, and integration with big data platforms and
blockchain.
TEXTBOOKS:
1. Data Virtualization for Business Intelligence Systems: Revolutionizing Data Integration for Data
Warehouses (Rick van der Lans)
2. Data Visualization: A Practical Introduction (Kieran Healy)
3. The Big Book of Dashboards: Visualizing Your Data Using Real-World Business Scenarios (Steve Wexler,
Jeffrey Shaffer, and Andy Cotgreave)
4. Building a Modern Data Center: Principles and Strategies of Design (Scott D. Lowe and David M. Davis)
Course No.: Name: Cryptocurrency And Cyber Security Credits: 3-0-0-6 Prerequisites: NIL
COURSE OBJECTIVES:
1. To understand the fundamentals of network and symmetric ciphers.
2. To apply asymmetric ciphers and data integrity algorithms.
3. To explore the basics of cryptocurrencies and use Ethereum programming
COURSE OUTCOMES:
● Blockchain-based PKI
● 2-Factor authentication using blockchain
● Blockchain-based DNS
● Identity management
● Blockchain-based DDoS protection
Module 5: Security Aspects of Blockchain Applications (6 hours)
TEXT BOOKS
1. William Stallings, “Cryptography and Network security Principles and Practices”, Pearson/PHI,2017.
2. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven Goldfeder, “Bitcoin and
Cryptocurrency Technologies: A Comprehensive Introduction”, Princeton University Press, July, 2016.
REFERENCE BOOKS
1. William Stallings, Network Security Essentials (Applications and Standards), Pearson Education, India,2017
2. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology, Decentralization and Smart
3. Contracts Explained”, Second Edition, Packt Publishing, 2018.
E BOOKS
1. https://www.pearson.com/us/higher-education/product/Stallings-Cryptography-and-Network-Security-
2. Principles-and-Practice-5th-Edition/9780136097044.html
3. https://www.lopp.net/pdf/princeton_bitcoin_book.pdf
4. https://www.blockchainexpert.uk/book/blockchain-book.pdf
MOOC
1. http://nptel.ac.in/courses/106105031/
SEMESTER 3
Course No.: Name: Advanced Statistical Methods Credits: 3-0-0-6 Prerequisites: NIL
Course Objectives:
1. Develop a working knowledge of summary statistics, correlation, regression, and inference methods for
statistical analysis.
2. Use statistical software to analyze data, interpret results, and draw conclusions.
3. Apply modeling and forecasting techniques to real-world scenarios and make accurate predictions.
4. Design and execute experiments, analyze data, and draw valid conclusions based on statistical evidence.
● Summary Statistics
● Correlation and Regression
● Concept of R2 and Adjusted R2 and Partial and Multiple Correlation
● Fitting of simple and Multiple Linear regression, Explanation and Assumptions of Regression Diagnostics
● Basic Concepts
● Normal distribution-Area properties
● Steps in tests of significance –large sample tests-Z tests for Means and Proportions
● Small sample tests –t-test for Means, F test for Equality of Variances, Chi-square test for independence of
Attributes
REFERENCE BOOKS
1. Trevor Hastie and Robert Tibshirani , “The Elements of Statistical Learning: Data Mining,
2. Inference, and Prediction”, Second Edition -Springer Series in Statistics, (2017.
3. Applications for Engineering and the Computing Sciences” Mcgraw Hill education, 2017.
SOURCE: https://chennai.vit.ac.in/files/M.Tech(CSE)-BigData_2021_2022.pdf
BLOCKCHAIN ELECTIVES:
Course Objectives:
1. Articulate blockchain platforms that show promise in solving complex business problems
2. Examine the life cycle of a chain code and its components
3. Implement various blockchain-based enterprise applications
Course Outcomes:
1. Demonstrate an understanding of various blockchain platforms and their potential use cases in business
2. Develop and deploy smart contracts on the Ethereum platform using Solidity programming language
3. Configure and deploy a production network on the Hyperledger Fabric platform
TEXTBOOKS/LEARNING RESOURCES:
1. Tom Serres, Bill Wagner and Bettina Warburg, Basics of Blockchain (1 ed.), missing, 2019. ISBN
9781089919441.
Course Objectives:
1. Understand the basics of Blockchain Technology and its integration with Web Development
2. Gain hands-on experience in developing blockchain-based web applications using JavaScript and Python
3. Explore different server-side options and databases for building blockchain applications
4. Learn about web security, continuous integration, and deployment of blockchain applications on a
production server.
Course Outcomes:
1. Ability to build blockchain-based web applications using JavaScript and Python
2. Understanding of server-side options and databases for building blockchain applications
3. Proficiency in web security and deployment of blockchain applications on a production server
4. Acquiring skills in using various web development tools and technologies for building blockchain
applications.
Module 4 : Web Security and Development Organization for Blockchain Applications(11 hours)
● Web security basics for blockchain applications,Not trusting your clients for blockchain applications
● Why use HTTPS for blockchain applications,Integrating other software with the server for blockchain
applications
● Developing frontend with React for blockchain applications
● Concept of single-page applications for blockchain applications,Managing client-side application state
(Redux) for blockchain applications,Overview of other client JS frameworks for blockchain applications
● Development organization for blockchain applications
● Using Git for blockchain application development
● Concept of continuous integration for blockchain application development
● Configuring a production web server with Ubuntu for blockchain applications
TEXTBOOKS/LEARNING RESOURCES:
1. "Building Blockchain Projects: Building Decentralized Blockchain Applications with Ethereum and Solidity"
by Narayan Prusty, published by Packt Publishing.
2. "Blockchain Basics: A Non-Technical Introduction in 25 Steps" by Daniel Drescher, published by Apress.
3. "Mastering Blockchain: Distributed Ledger Technology, Decentralization, and Smart Contracts Explained"
by Imran Bashir, published by Packt Publishing.
Name: Blockchain Policy:
Course No.: Credits: 3-0-0-6 Prerequisites: NIL
Legal, Social And Economic Impact
Course Objectives:
1. Understand the importance and impact of blockchain policies, regulations, and guidelines.
2. Analyze the different stakeholders and communities affected by blockchain policies and their implications.
3. Develop skills for drafting and implementing blockchain policies to ensure sustainable infrastructure
investment and international trade.
4. Evaluate the potential unintended consequences of blockchain and apply effective strategies for mitigating
them.
Course Outcomes:
● Introduction to blockchain policies and their importance,Guidelines for blockchain applications and
infrastructures,International laws and regulations related to blockchain
● Dialogue on distributed ledger technology (DLT),Policies for preventing money laundering and terrorism
financing,FATF standards on virtual assets
● Stable coins and their policy implications,Issues related to trust and framework,Challenges and business
impact of blockchain
● Resources for blockchain policies,Smart securities and derivatives
TEXTBOOKS:
1. "Blockchain and the Law: The Rule of Code" by Primavera De Filippi and Aaron Wright, published by
Harvard University Press.
2. “The Age of Cryptocurrency: How Bitcoin and Digital Money are Challenging the Global Economic Order"
by Paul Vigna and Michael Casey (St. Martin's Press, 2015)
3. "Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and the World"
by Don Tapscott and Alex Tapscott (Portfolio, 2016)
Course No.: Name: Modern Cryptography Credits: 3-0-0-6 Prerequisites: NIL
Course Objectives:
1. To understand the fundamentals of modern cryptography, including symmetric and asymmetric ciphers,
hash functions, and digital signatures.
2. To explore the mathematics behind modern cryptography, including modular arithmetic, prime numbers,
and finite fields.
3. To gain knowledge of widely-used cryptographic algorithms, including RSA, AES, and SHA.
4. To learn about the practical application of cryptography in information security, authentication, and data
protection.
Course Outcomes:
1. Understand the fundamental principles of modern cryptography and its mathematical foundations.
2. Evaluate the security of cryptographic algorithms and design secure systems based on modern
cryptographic techniques.
3. Design and implement secure data encryption, authentication, and signature mechanisms using
cryptographic tools and algorithms.
4. Apply cryptography in various fields, including computer science, finance, and government, to achieve
secure and confidential communication.
Reference Textbooks:
1. "Applied Cryptography: Protocols, Algorithms, and Source Code in C" by Bruce Schneier, published by
Wiley.
2. "Cryptography and Network Security: Principles and Practice" by William Stallings, published by Prentice
Hall.
3. "Introduction to Modern Cryptography" by Jonathan Katz and Yehuda Lindell, published by CRC Press.
4. "Serious Cryptography: A Practical Introduction to Modern Encryption" by Jean-Philippe Aumasson,
published by No Starch Press.
Course No.: Name: Smart Contracts And Solidity Programming Credits: 3-0-0-6 Prerequisites: NIL
Course Objectives:
Course Outcomes:
1. Students will be able to understand the purpose and potential of smart contracts in various industries.
2. Students will be able to write smart contracts in Solidity and deploy them on the Ethereum blockchain.
3. Students will be able to design and implement secure smart contracts, and avoid common security issues.
4. Students will be able to apply best practices for auditing and testing smart contracts.
● Security issues in smart contracts,Common attacks on smart contracts,Error handling in smart contracts
● Best practices for secure smart contract development,Modifiers
● Mutex pattern and balance limit pattern,Smart contract security tools, including Smart Inspect, GasTap,
Smart Check, and Solgraph
● Advanced research topics in smart contracts
TEXTBOOKS:
1. "Mastering Blockchain: Distributed Ledger Technology, Decentralization, and Smart Contracts Explained"
by Imran Bashir. Packt Publishing, 2018.
2. "Building Ethereum Dapps: Decentralized Applications on the Ethereum Blockchain" by Roberto Infante.
Apress, 2018.
3. "Solidity Programming Essentials: A Beginner's Guide to Build Smart Contracts for Ethereum and
Blockchain" by Ritesh Modi. Packt Publishing, 2018.
BIGDATA ELECTIVES
Credits:
Course No.: Name: Security And Privacy For Big Data Analytics Prerequisites: NIL
Credits: 3-0-0-6
Course Objectives:
Course Outcomes:
● Introduction to cryptography and its relevance to big data,Symmetric and asymmetric encryption techniques
● Hash functions and message authentication codes (MACs)
● Public Key Infrastructure (PKI) and digital certificates
● Cryptographic protocols for secure communication in big data,Cryptographic tools and libraries for big data
security
● Threat modeling and risk assessment for big data,Access control and authentication mechanisms for big
data systems
● Data anonymization and privacy-preserving techniques for big data
● Network security and data protection in distributed big data systems
● Intrusion detection and prevention in big data environments,Best practices for securing big data and
compliance with data protection laws
● Data modeling and schema design for security analysis in big data,Machine learning and data mining
techniques for security analysis in big data
● Visualization and analytics tools for security analysis in big data,Data fusion and correlation for security
intelligence in big data
● Case studies of security analysis in big data environments
● Big data security testing and evaluation methodologies
Textbooks:
1. Big Data , Storage sharing and security , Fei Hu, CRC press
2. Privacy & Big data , by Mary E. Ludloff, Terence Craig. Released September 2011. Publisher(s): O'Reilly
Media, Inc.
Course No.: Name: Time Series Analysis Credits: 3-0-0-6 Prerequisites: NIL
Course Objectives:
● To provide an introduction to the fundamental concepts of time series analysis and their applications.
● To teach the students how to analyze and interpret time series data using different techniques.
● To enable the students to apply various time series methods for forecasting and modeling.
● To equip the students with the necessary statistical knowledge and tools to evaluate time series models.
Course Outcomes:
● Students will be able to understand the fundamental concepts of time series analysis and its applications.
● Students will be able to analyze and interpret time series data using different techniques.
● Students will be able to apply various time series methods for forecasting and modeling.
● Students will be able to evaluate time series models using statistical tests for stationarity and model
selection.
Textbooks:
1. "Time Series Analysis and Its Applications: With R Examples" by Robert H. Shumway and David S. Stoffer,
Springer Publication
2. "Forecasting: Principles and Practice" by Rob J. Hyndman and George Athanasopoulos, OTexts Publication
3. "Time Series Analysis: With Applications in R" by Jonathan D. Cryer and Kung-S
Prerequisites: Basic
understanding of
Course No.: Name: Exploratory data analytics Credits: 3-0-0-6
programming and
statistics
Course Objectives:
1. To understand the principles of exploratory data analysis and its importance in data-driven decision-making.
2. To learn various techniques of data cleaning, data wrangling, and data visualization.
3. To understand the statistical concepts required for EDA, including probability distributions, central limit
theorem, and hypothesis testing.
4. To learn how to use popular tools and platforms such as R, Python, and Tableau for EDA.
Course Outcomes:
1. Students will be able to understand the importance of exploratory data analysis and its role in data-driven
decision-making.
2. Students will be able to clean, wrangle, and visualize different types of data to make better data-driven
decisions.
3. Students will be able to apply statistical concepts to analyze data and make inferences from it.
4. Students will be able to use popular tools and platforms such as R, Python, and Tableau to perform
exploratory data analysis.
Course Outline:
● Introduction to EDA
● Importance of EDA in data-driven decision-making
● Types of data and data quality issues
● Data cleaning techniques
● Data wrangling techniques
Reference Textbooks:
Course Objectives:
1. To understand data engineering principles and practices, including data modeling, database design, and
data warehousing.
2. To develop skills in building efficient and scalable data pipelines for data processing and storage.
3. To learn how to manage and optimize data systems for performance and reliability.
4. To gain practical experience with data engineering tools and technologies, including SQL, ETL, and data
warehousing.
Course Outcomes:
● Students will apply data engineering concepts, principles, and tools to design and implement a data
pipeline and data warehousing solution for a real-world data problem.
Textbook References: