It Verticals
It Verticals
It Verticals
Vertical VI
Vertical II Vertical III
Vertical IV Vertical V Artificial
Vertical I Full Stack Cloud Computing
Cyber Security Creative Intelligence
Data Science Development and Data Centre
and Data Privacy Media and Machine
for IT Technologies
Learning
18IPE$31 - 18IPE$10 - 18IPE$10 - 18IPE$49 -Ethical 18IPE$20 - 18IPE$61 -
Exploratory Data Cloud Cloud Hacking Virtual and Knowledge
Analysis Computing Computing (Common to CSE Augmented Engineering
(Common to CSE & & IT) Reality
IT)
18IPE$32 - 18IPE$39 -App 18IPE$18 - 18IPE$50 -Digital 18IPE$55 - 18IPE$14 -Soft
Recommender Development Virtualization and Mobile Multimedia and Computing and
Systems (Common to Techniques Forensics Animation its Applications
(Common to CSE & CSE & IT) (Common to CSE
IT) & IT)
18IPE$33 - 18IPE$40 - 18IPE$40 - Cloud 18IPE$51 - 18IPE$56 - 18IPE$33 -
Neural Networks Cloud Services Services Social Video Creation Neural
and Deep Learning Management Management Network and Editing Networks and
Security Deep Learning
(Common to CSE
& IT)
18IPE$34 - 18IPE$41 - 18IPE$45 - 18IPE$52 -Modern 18IPE$41 - 18IPE$34 -
Text and Speech UI and UX Data Warehousing Cryptography UI and UX Text and
Analysis Design (Common to CSE Design Speech
(Common to & IT) (Common to Analysis
CSE & IT) CSE & IT)
18IPE$35 -Business 18IPE$03 - 18IPE$46 -Storage 18IPE$53 - 18IPE$57 - 18IPE$62 -
Analytics Software Technologies Engineering Secure Digital Optimization
Testing software systems marketing Techniques and
Applications
Verticals – I
DATA SCIENCE
End Hours/Week
Sl. Course CA Total
Course Title CAT Sem
No. Code Marks Marks L T P C
Marks
Exploratory Data
1 18IPE$31 Analysis PE 40 60 100 3 0 0 3
(Common to CSE & IT)
Recommender Systems
2 18IPE$32 PE 40 60 100 3 0 0 3
(Common to CSE & IT)
Neural Networks and
3 18IPE$33 PE 40 60 100 3 0 0 3
Deep Learning
Text and Speech
4 18IPE$34 PE 40 60 100 3 0 0 3
Analysis
5 18IPE$35 Business Analytics PE 40 60 100 3 0 0 3
Image and video
6 18IPE$36 PE 40 60 100 3 0 0 3
analytics
Computer Vision and
7 18IPE$37 PE 40 60 100 3 0 0 3
Applications
Big Data Science and
8 18IPE$38 PE 40 60 100 3 0 0 3
Analytics
Verticals – II
End Hours/Week
Sl. Course CA Total
Course Title CAT Sem
No. Code Marks Marks L T P C
Marks
1 18IPE$10 Cloud Computing PE 40 60 100 3 0 0 3
App Development
2 18IPE$39 PE 40 60 100 3 0 0 3
(Common to CSE & IT)
Cloud Services
3 18IPE$40 PE 40 60 100 3 0 0 3
Management
UI and UX Design
4 18IPE$41 PE 40 60 100 3 0 0 3
(Common to CSE & IT)
5 18IPE$03 Software Testing PE 40 60 100 3 0 0 3
Web Application Security
6 18IPE$42 PE 40 60 100 3 0 0 3
(Common to CSE & IT)
Dev-ops
7 18IPE$43 PE 40 60 100 3 0 0 3
(Common to CSE & IT)
Principles of
8 18IPE$44 Programming Languages PE 40 60 100 3 0 0 3
(Common to CSE & IT)
Verticals – III
Verticals – IV
CREATIVE MEDIA
End Hours/Week
Sl. Course CA Total
Course Title CAT Sem
No. Code Marks Marks L T P C
Marks
Virtual and
1 18IPE$20 PE 40 60 100 3 0 0 3
Augmented Reality
Multimedia and
2 18IPE$55 PE 40 60 100 3 0 0 3
Animation
Video Creation and
3 18IPE$56 PE 40 60 100 3 0 0 3
Editing
4 18IPE$41 UI and UX Design PE 40 60 100 3 0 0 3
5 18IPE$57 Digital marketing PE 40 60 100 3 0 0 3
6 18IPE$58 Visual Effects PE 40 60 100 3 0 0 3
7 18IPE$59 Game Development PE 40 60 100 3 0 0 3
8 18IPE$60 Multimedia Data
Compression and PE 40 60 100 3 0 0 3
Storage
Verticals – VI
DATA SCIENCE
EXPLORATORY DATA ANALYSIS
18IPE$31
(Common to CSE & IT)
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
TEXT BOOK:
1 Robert S. Witte and John S. Witte, “Statistics”, 11th Edition, Wiley Publications, 2017.
REFERENCES:
1 Allen B. Downey, “Think Stats: Exploratory Data Analysis in Python”, Green Tea Press,
2014
2 Peter Bruce, Andrew Bruce, and Peter Gedek, “Practical Statistics for Data Scientists”, 2nd
Edition, O’Reilly Publishers, 2020
3 Bradley Efron and Trevor Hastie, “Computer Age Statistical Inference”, Cambridge
University Press, 2016
4 Charles R. Severance, “Python for Everybody: Exploring Data in Python 3”, Shroff
Publishers, 2017
5 David Spiegelhalter, “The Art of Statistics: Learning from Data”, Pelican Books, 2019.
COURSE OUTCOMES:
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
TEXT BOOKS :
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1 Summarize various types of recommendation techniques. (Familiarize)
CO2 Compare content based recommendations and Knowledge based recommendations.
(Familiarize)
CO3 Identify appropriate hybrid recommendation models for specific underlying applications.
(Understand)
CO4 Assess the recommendations based on well-defined metrics. (Analyze)
CO5 Describe emerging applications based on Web 2.0 and Semantic Web technologies.
(Familiarize)
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
1 Ian Goodfellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2016
2 Francois Chollet, “Deep Learning with Python”, Second Edition, Manning Publications,
2021.
REFERENCES :
COURSE OUTCOMES:
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
TEXT BOOK :
1 Daniel Jurafsky and James H. Martin, “Speech and Language Processing: An Introduction
to Natural Language Processing, Computational Linguistics, and Speech Recognition”,
Third Edition, 2022.
REFERENCES:
P P P
PO P P P P P P P P PSO PSO
COs/POs O1 O1 O1
1 O2 O3 O4 O5 O6 O7 O8 O9 1 2
0 1 2
CO1 H M H L H L M L M H L
CO2 H L M L H M M L H H L
CO3 M M L H L H H L M H L
CO4 M L L L M M L M M H L
CO5 L H M M L H M L L H L
18IPE$34 M M M M M M M L M H L
L –Low, M- Medium, H- High
18IPE$35 BUSINESS ANALYTICS
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
TEXT BOOK :
1 James R. Evans, “Business Analytics - Methods, models and decisions”, Pearson Education,
3rd Edition, 2020.
REFERENCES:
COURSE OUTCOMES:
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
TEXT BOOK :
1 Rafael Gonzalez, Richard E. Woods, “Digital Image Processing”, Fourth Edition, Pearson
Education, 2018.
2 A. Murat Tekalp, “Digital Video Processing”, Second Edition, Prentice Hall, 2015.
REFERENCES:
1 Rafael C. Gonzalez, Richard E. Woods, Steven Eddins, “Digital Image Processing using
MATLA”, Pearson Education, Inc., 2011.
2 Milan Sonka, Vaclav Hlavac, Roger Boyle, “Image Processing, Analysis and Machine
Vision”, Second Edition, Thompson Learning, 2007
3 Oges Marques, “Practical Image and Video Processing Using MATLAB”, Wiley and Sons
(IEEE Press), 2011
4 Alan C. Bovik, “Handbook of Image and Video processing”, Second Edition, Academic
Press, 2005
5 Al Bovik (Alan C Bovik, “The Essential Guide to Video Processing”, Academic Press,
Second Edition, 2009
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1 understand the basics and fundamentals of digital image processing, such as digitization,
sampling, quantization, and 2D-transforms. (Understanding)
CO2 Analyze the various Image segmentation and feature extraction methods. (Analyze)
CO3 Analyze and implement the basic video processing algorithms in modern technologies.
(Familiarize)
CO4 Analyze the approaches for identifying and tracking objects and person with motion based
algorithms. (Analyze)
CO5 Segment video based on its features. (Familiarize)
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
TEXT BOOK:
COURSE OUTCOMES:
CO2 Apply object recognition techniques, feature detection techniques and matching.
(Familiarize)
CO3 Apply algorithms for motion estimation techniques and computational photography.
(Familiarize)
CO4 Apply techniques for 3D reconstruction and image based rendering. (Familiarize)
CO5 Analyze the application of computer vision algorithms in different domains. (Analyze)
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Course 1. To understand the basics and application areas of big data and analytics
Objectives 2. To learn different data storage and management models in big data
management.
3. To learn the HADOOP distributed file system and its input/output
interfacing
4. To familiarize map reduce technique and its application in processing big
data.
5. To learn different tools that support processing of big data.
TEXT BOOKS:
1 Michael Minelli, Michelle Chambers, and AmbigaDhiraj, "Big Data, Big Analytics:
Emerging Business Intelligence and Analytic Trends for Today's Businesses", Wiley, 2013
2 Lena Wiese,“Advanced data management: for SQL, NOSQL, cloud and distributed
databases”, walter-de-gruyter, 2015.
REFERENCES :
COURSE OUTCOMES:
PRE-REQUISITES CATEGORY L T P C
Data Communication and Networking PE 3 0 0 3
Course Upon completion of this course, the students will be familiar with,
Objectives Overview of computing Paradigm.
Cloud computing architecture and its service models.
Representation of virtualization concepts.
Intensive computation in Cloud computing.
Applications and management of cloud computing
TEXT BOOK:
1 Rajkumar Buyya, Christian Vecchiola, S Thamarai Selvi, “Mastering Cloud Computing”, Tata
McGraw Hill Education Private Limited, 2013.
1 Nikos Antonopoulos, Lee Gillam, “Cloud Computing: Principles, Systems and Applications”,
Springer, 2012.
2 Rajkumar Buyya, James Broberg, Andrzej M. Goscinski, “Cloud Computing: Principles and
Paradigms”, Wiley - India, 2011.
3 Ronald L. Krutz, Russell Dean Vines, “Cloud Security: A Comprehensive Guide to Secure Cloud
Computing”, Wiley-India, 2010.
COURSE OUTCOMES:
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Course 1.Apply the basic concepts of DART programming language to solve simple problems
Objectives 2.Understand the development process of mobile application framework and develop
simple mobile application using Flutterthat provide a smooth, seamless user
experience, using techniques such as user interface (UI) design, user testing, and
iterative design
3. Collect and analyze data from mobile applications, using tools such as Google
Analytics and Firebase, and use the insights to improve the app's performance,
usability, and user engagement.
4. To understand the major mobile platforms, such as Android and iOS, and their
respective development environments, including programming languages, tools, and
APIs
5. To deploy mobile applications to the target platform, following best practices for
distribution, monetization, and app store optimization.
UNIT – I PROGRAMMING DART (9 periods)
Creating a DART project - main function – variables – data types – conditionals – loops – functions –
object-oriented programming – objects – classes – constructors - inheritance – abstract class - DART
project structure and libraries
UNIT – II INTRODUCTION TO FLUTTER (9 periods)
Flutter framework – Installing Android Studio – Installing and Configuring Flutter SDK – Run flutter
app on android virtual device and mobile phone – Flutter widgets – Scaffold – Image – Container –
Row and column – Card – Icon - Layouts – State management – Form validation - Data structures and
Collections – Lists – Maps - Exception handling
UNIT – III FLUTTER NAVIGATION AND ROUTING (9 periods)
Button Widget – Types – App Structure and navigation – Navigate with Named routes – Navigate to
new screen and back - Send and return data among screens – Animate a widget – WebView widget –
Introduction to Material design – Elements - Scrolling – Inputs and Selections – Dialogs – Alerts –
Panels – MVC pattern - Provider – Consumer - Selector
UNIT – IV FIREBASE, GPS AND GOOGLE MAPS (9 periods)
JSON – Adding firebase to app - Firebase authentication – signup and login to Flutter app –
Configuring Firebase authentication – Firebase database – Real time database – cloud Firestore –
Location aware apps – Adding Google maps to Flutter app – Google map marker
UNIT – V APP TESTING AND PUBLISHING (9 periods)
Debugging tools – Dart analyzer – Flutter performance and optimizing - profiling – best practices –
Deployment – code obfuscation – Build and release Android app – Build and release iOS app –
Continuous delivery
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK:
1 Sanjib Sinha, “Beginning Flutter with Dart”, Lean publishing, First Edition, 2021
2 Thomas Bailey, Alessandro Biessek, “Flutter for Beginners”, Packt Publishing, Second
Edition, 2021
REFERENCES:
1 Sufyan bin Uzayr, “Mastering Flutter – A Beginner’s Guide”, Taylor and Francis, First
Edition, 2022
2 Simone Alessandria, Brian Kayfitz, “Flutter Cookbook”, Packt Publishing, First Edition,
2021
3 Rap Payne, “Beginning App Development with Flutter: Create cross platform mobile
apps”, Apress, First Edition, 2019
4 Marco L Napoli, “Beginning Flutter – A hands on guide to App Development”, John Wiley
& Sons, First Edition, 2020
5 https://docs.flutter.dev/
6 https://firebase.google.com/
COURSE OUTCOMES:
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
REFERENCES:
COURSEOUTCOMES:
Oncompletion ofthe course, thestudents will beable to:
COURSEARTICULATIONMATRIX:
CO3 M L H M L L M L M M
CO4 M L M H L L M L M M
CO5 M L M M L L M L M M
18IPE$40 M L M M L L M L M M
L –Low, M- Medium, H- High
UI AND UX DESIGN
18IPE$41
(Common to CSE & IT)
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Course Upon completion of this course, the students will be familiar with,
Objectives Principles of UX design, such as user research, user personas and user journey
mapping
Importance of color theory, typography, layout, and visual hierarchy
Usage of design tools and software, such as Sketch, Figma, Adobe XD and
Invision
Usage of wireframes and prototypes using design software to communicate design
ideas
Methods for evaluating user interfaces
UNIT – I INTRODUCTION TO UI DESIGN (9Periods)
Basics of HCI - Design process- HCI in software process – Basics of interaction design - UI Design
and Why it matters – UI disasters – Case studies – Design Process – Introduction – Usability
Engineering – Task centered approaches – Use cases – Personas – Tasks – Scenarios –Design
centered approaches – Psychology and human factors for UI Design – Fitts Law – Short-term – long-
term – attention – perception – conceptual models – Design principles – visibility – feedback –
mappings – constraints – High-level models – distributed cognition – activity theory – situated action
UNIT – II USER RESEARCH (9Periods)
UserCentered Approaches to Interaction Design -User Research methods – Interview and Focus
groups – Observations – Contextual inquiry – Ethics and Consent – User Research Protocol – Log
Analysis – Surveys and Questionnaires – Translating User Research to Support design – Qualitative
analysis – Quantitative analysis – Examples - Implications for Design – From Research to Ideas –
Ideation – Selection – Communicating to Stakeholders
UNIT – III PROTOTYPING (9Periods)
Introduction – Sensory and Cognitive Impairments – Physical limitations – tools and standards –
Design for older adults and children – Socio-economic differences – Design for different platforms
and contexts – Mobile UI design – Wearable – Automotive User Interfaces – IoT and Physical
Computing
UNIT – V EVALUATING USER INTERFACES AND TOOLS (9Periods)
Introduction to Evaluating User interfaces and Evaluation in UI Design process – Evaluation without
users – Action Analysis – Cognitive Walkthroughs – Heuristic Evaluation – Nielsen’s heuristics –
Evaluation with Users – User Testing – Goals – Formative and Summative Evaluation – Ethics in
evaluation – Tools – Adobe XD – Figma –Invision -Sketch
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK:
1 Rex Hartson, Pardha S Pyla, “The UX Book: Agile UX Design for a Quality User
Experience”, Morgan Kaufmann, Second Edition, 2018
2 Joel Marsh, “UX for beginners”, O’Reilly Media, 2015
REFERENCES:
1 Alan Cooper, Robert Riemann, David Cronin, Christopher Noessel, “About Face: The
Essentials of Interaction Design”, Wiley, Fourth Edition, 2014
2 Ben Coleman, and Dan Goodwin, “Designing UX: Prototyping: Because Modern Design is
Never Static”, SitePoint , 2017
3 Westley Knight, “UX for Developers: How to Integrate User-Centered Design Principles
Into Your Day-to-Day Development Work”, Apress, 2018
4 https://in.coursera.org/specializations/user-interface-design
5 Helen Sharp, Yvonne Rogers, Jenny Preece, “Interaction design – beyond human computer
interaction”, Wiley, Fifth Edition, 2019
6 Elizabeth Goodman, Mike Kuniavsky, Andrea Moed, “Observing the User Experience – A
Practitioner’s Guide to User Research”, Morgan Kaufmann, Second Edition, 2012
COURSE OUTCOMES:
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 M L L L H M
CO2 H L L L L H M
CO3 L H L H L L H M
CO4 H L H L H M
CO5 L H L H M L H M
18IPE$41 L H L H L L H M
L –Low, M- Medium, H- High
18IPE$03 SOFTWARE TESTING
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Course Upon completion of this course, the students will be familiar with,
Objectives
Significance of software testing
Test case design
Types and levels of Software testing
Test management
Monitoring and controlling
REFERENCES:
1 Borris Benzer , “Software Testing Techniques”, International Thomson Computer Press, USA,
2006
2 RenuRajani, Pradeep Oak, “Software Testing – Effective Methods, Tools and Techniques”, Tata
McGraw Hill, 2003.
3 Sandeep Desai, AbhisekSrivastava, “Software testing: A Practical approach”, Prentice Hall of
India, 2012.
4 Ron Patton, “Software Testing”, Second Edition, Sams Publishing, Pearson Education, 2004.
5 Aditya P. Mathur, “Foundations of Software Testing – Fundamental algorithms and
techniques”, Dorling Kindersley (India) Pvt. Ltd., Pearson Education, 2011.
COURSE OUTCOMES:
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 L H M H H
CO2 M M H L H M
CO3 L M M L H H
CO4 L M M L L H L
CO5 M H H M M L L M H H M
18IPE$03 M M M L H L L L L H L
L –Low, M- Medium, H- High
WEB APPLICATION SECURITY
18IPE$42
(Common to CSE & IT)
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Course 1. To Equip students with common security threats faced by web applications, such as
Objectives SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), and man-
in-the-middle attacks
2. To Respond effectively to security threats and incidents
3. To Design secure web applications from the ground up, including secure
authentication and authorization, secure communication protocols, firewalls, intrusion
detection systems
4. To Apply industry standards and regulations, such as OWASP Top 10, and PCI
DSS, that outline best practices for web application security
5. To Understand the principles of web security, browser security and database
security and prevent security vulnerabilities
UNIT – I INTRODUCTION (9 Periods)
Structure of a Modern Web Application – REST APIs – Javascript – SPA Frameworks – Web Servers
– Sever side databases – Client-side data stores – Network Security vs Application Security –
Thinking like a defender – OWASP Top Ten List – Security Fundamentals – Input Validation –
Attack surface reduction – Classifying and Prioritizing threats
UNIT – II WEB SECURITY PRINCIPLES (9 Periods)
Authentication– Two factor and Three factor authentication – Web application authentication –
Securing Password based authentication – Best Practices – Authorization –Access Control – Session
management fundamentals – Securing web application session management
UNIT – III BROWSER SECURITY (9 Periods)
Same origin policy – Definition – Client-side vs Server-side - Exceptions – Cross site Scripting – XSS
Discovery and Exploitation – Stored XSS – Reflected XSS – DOM-based XSS – Mutation-based XSS
- Cross site Request Forgery – Query parameter tampering – Alternate GET payloads – CSRF against
POST endpoints
UNIT – IV DATABASE AND FILE SECURITY (9 Periods)
SQL Injection –Code injection – Command injection – Setting database permissions – Stored
procedure security – Insecure direct object references –File Security principles – Keeping source code
secure – Security through Obscurity – Forceful browsing – Directory traversal
UNIT – V SECURE DEVELOPMENT AND DEPLOYMENT (9 Periods)
Securing modern web applications – Secure application architecture – Reviewing Code –
Vulnerability discovery and management – Defending against XSS, CSRF, XXE, Injection and DoS
attacks – Industry standards – Maturity models – Securing third party dependencies
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK:
1 Mike Shema, “Hacking Web Apps – Detecting and Preventing Web Application Security
Problems”, Elsevier, 2012
2 Ron Lepofsky, “The Manager’s Guide to Web Application Security – A Concise guide to
Web Application Security”, Apress, 2014
3 Dafydd Stuttard, Marcus Pinto, “The Web Application Hacker’s Handbook – Finding and
Exploiting Security flaws”, John Wiley & Sons, Second Edition, 2011
COURSE OUTCOMES:
CO1 H M H L M H L L H L
CO2 H M H L M H L L H L
CO3 H M H L M H L L H L
CO4 H M H L M H L L H L
CO5 H M H L M H L L H L
18IPE$42 H M H L M H L L H L
L –Low, M- Medium, H- High
DEV-OPS
18IPE$43
(Common to CSE & IT)
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
2. Familiar with a range of DevOps tools and technologies, such as Git, Jenkins,
Docker, Kubernetes, and Ansible
5. Understand Monitoring and Logging tools, such as Prometheus and Grafana, and
the ability to use them to monitor and analyze system performance
UNIT – I INTRODUCTION (9 Periods)
What is DevOps – Roles and responsibilities of DevOps engineer – DevOps and SDLC –
Virtualization – Shell scripting – SSH – Git for DevOps–Branches – Merge requests – Commits –
Resolving Conflicts – Deletions – Build tools and Package managers – Artifact Repository manager
UNIT – II CONTAINERS (9 Periods)
What is container – Docker components and architecture – Docker vs. Virtual machine – Main docker
commands – Docker compose – running multiple services – Dockerfile – Building a docker image -
Deploy containerized app – Docker volumes
UNIT – III ORCHESTRATION (9 Periods)
What is Container orchestration - Introduction to Kubernetes – Components – Architecture –
Commands – YAML configuration – Namespaces – Service types – Persisting data – Deploying
Kubernetes Cluster – Stateful app deployment using Helm
UNIT – IV CI/CDPIPELINE (9 Periods)
What is Build Automation –Continuous Integration and Continuous Delivery Principles -Introduction
to Jenkins – Install Jenkins on Cloud Server – Plugins – Build tools – Docker in Jenkins –
Configuring Jenkins pipeline –Multi-branch pipeline Job– Webhooks
UNIT – V MONITORING (9 Periods)
Docker container monitoring – statistics – metrics – events – Performance monitoring – Container
monitoring – Container administration – Auditing and Analyzing Vulnerabilities in Kubernetes –
Enhancing observability and monitoring in Kubernetes with Prometheus and Grafana
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK:
1 Mikael Krief, “Learning DevOps - The complete guide to accelerate collaboration with
Jenkins, Kubernetes, Terraform and Azure DevOps”, Packt Publishing, 2019
2 Jose Manuel Ortega Candel, “Implementing DevSecOps with Docker and Kubernetes”,
BPB Publications, First Edition, 2022
REFERENCES:
COURSE OUTCOMES:
CO1 M H H M M M H L M M H H M
CO2 M H H H H H H L M M M H H M
CO3 M H H H H H H L M M M H H M
CO4 M H H H H H H L M M M M H M
CO5 M H H H H H H L M M M H H M
18IPE$43 M H H H H H H L M M M H H M
L –Low, M- Medium, H- High
PRINCIPLES OF PROGRAMMING LANGUAGES
18IPE$44
(Common to CSE & IT)
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
5.Explain the design concepts and issues behind programming languages like C, Java,
Scala, Lisp, Prolog, or any new language
UNIT – I FOUNDATIONS (9 Periods)
Evolution of Major Programming Languages –Overview of Compilation – Describing Syntax and
Semantics – Lexical and Syntax analysis - Names, Scopes and Bindings – Data Types – Expressions
and Assignment Statements –Type Systems
UNIT – II CORE ISSUES IN LANGUAGE DESIGN (9 Periods)
Control Flow – Structured and Unstructured Flow – Sequencing – Selection – Iteration – Recursion –
Subroutines and Control Abstraction – Stack layout – Calling Sequences – Parameter Passing –
Blocks – Dynamic Scoping - Exception Handling – Coroutines – Events
UNIT – III OBJECT ORIENTED PARADIGM (9 Periods)
Abstract Data Types and Encapsulation Concepts – Design Issues – Namespaces - Inheritance - Inner
Classes – Type Extensions – Dynamic Method Binding – Mix-in Inheritance – True Multiple
Inheritance - Examples – Object Models – Smalltalk, C++, Java, Scala
UNIT – IV FUNCTIONAL AND LOGIC PROGRAMMING (9 Periods)
Functional Programming – Programs as Functions – Delayed Evaluation – Lambda Calculus –
Examples from Lisp - Introduction to Haskell Programming – Comparison of Functional and
Imperative languages – Logic Programming - Predicate Calculus – Proving theorems – Resolution
and Unification - Elements of Prolog – Applications
UNIT – V CONCURRENT PROGRAMMING (9 Periods)
Parallel Processing and Programming Languages – Threads – Semaphores – Monitors – Message
Passing – Parallelism in Non-Imperative Languages – Java threads – Haskell concurrency primitives
and abstractions
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK:
COURSE OUTCOMES:
PRE-REQUISITES CATEGORY L T P C
Data Communication and Networking PE 3 0 0 3
Course Upon completion of this course, the students will be familiar with,
Objectives Overview of computing Paradigm.
Cloud computing architecture and its service models.
Representation of virtualization concepts.
Intensive computation in Cloud computing.
Applications and management of cloud computing
TEXT BOOK:
1 Rajkumar Buyya, Christian Vecchiola, S Thamarai Selvi, “Mastering Cloud Computing”, Tata
McGraw Hill Education Private Limited, 2013.
1 Nikos Antonopoulos, Lee Gillam, “Cloud Computing: Principles, Systems and Applications”,
Springer, 2012.
2 Rajkumar Buyya, James Broberg, Andrzej M. Goscinski, “Cloud Computing: Principles and
Paradigms”, Wiley - India, 2011.
3 Ronald L. Krutz, Russell Dean Vines, “Cloud Security: A Comprehensive Guide to Secure Cloud
Computing”, Wiley-India, 2010.
COURSE OUTCOMES:
PRE-REQUISITES CATEGORY L T P C
Operating Systems PE 3 0 0 3
Data Communication and Networking
Course Upon completion of this course, the students will be familiar with,
Objectives Virtualization concepts
Virtualized infrastructure design
Operating system virtualization
Storage virtualization
Network virtualization
TEXT BOOK:
1 Matthew portnoy, “Virtualization Essentials”, SYBEX (Wiley Brand) 2nd Edition, 2016.
2 Yang Yu, “OS-level Virtualization and Its Applications”, ProQuest LLC, 2009.
3 Frank Bunn, Nik Simpson, Robert Peglar, Gene Nagle, “Technical Tutorial – Storage
Virtualization”, Storage Networking Association (SNIA), 2004.
REFERENCES:
COURSE OUTCOMES:
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
REFERENCES:
COURSEOUTCOMES:
Oncompletion ofthe course, thestudents will beable to:
COURSEARTICULATIONMATRIX:
CO3 M L H M L L M L M M
CO4 M L M H L L M L M M
CO5 M L M M L L M L M M
18IPE$40 M L M M L L M L M M
L –Low, M- Medium, H- High
18IPE$45 DATA WAREHOUSING
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Course 1. To understand the basic concepts, planning and requirements for data
Objectives warehousing.
2. To understand the architecture and infrastructure of warehouses.
3. To learn various techniques for data modelling, extraction, transformation and
Loading.
4. To learn concepts about information access and delivery.
5. To learn various techniques on physical storage implementation and
maintenance.
TEXT BOOK :
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1 Understand the basic concepts, planning and requirements for data warehousing.
(Understand)
CO2 Understand the architecture and infrastructure of warehouses. (Understand)
CO3 Apply various techniques for data modelling, extraction, transformation and Loading
(Familiarize)
CO4 Demonstrate information access and delivery in data warehouses. (Analyze)
CO5 Apply various techniques for physical storage implementation and maintenance. (Analyze)
PRE-REQUISITES CATEGORY L T P C
Cloud Computing PE 3 0 0 3
Course Upon completion of this course, the students will be familiar with,
Objectives 1. Detailed knowledge insight into the implementation and management of
various storage technologies.
2. Focus towards applying these technologies in an information lifecycle
paradigm.
3. Evolution of storage and implementation models.
4. Storage devices principles, Storage classes (SAN, NAS. CAS) and
Backup
5. Business Continuity, and Disaster Recovery principles
UNIT– I INTRODUCTION TO STORAGE TECHNOLOGY (9Periods)
Information Storage -Data, Types of Data, Information, Storage, Evolution of Storage Technology and
Architecture, Data Center Infrastructure, Key Challenges in Managing Information, Information
Lifecycle -Information Lifecycle Management, ILM Implementation, ILM Benefits.
UNIT– II DATA PROTECTION AND INTELLIGET STORAGE (9Periods)
SYSTEM
Components of a Storage System Environment, RAID -Implementation of RAID, RAID Array
Components, RAID levels, RAID Impact on Disk Performance, Components of an Intelligent Storage
System, Intelligent StorageArray-High-end Storage Systems, Midrange Storage System.
UNIT– III STORAGE NETWORKING TECHNOLOGIES AND (9Periods)
VIRTUALIZATION
Direct-Attached Storage and Introduction to SCSI-Types of DAS, DAS Benefits and Limitations, Disk
Drive Interfaces, Introduction to Parallel SCSI, Storage Area Networks-Fibre Channel: Overview, SAN
and its evolution, Components of SAN, Network-Attached Storage-General Purpose Servers vs. NAS
Devices, Benefits of NAS, Components of NAS.
UNIT– IV CAS AND BUSINESS CONTINUITY (9Periods)
CAS -Fixed Content and Archives, Types of Archives, Features and Benefits of CAS, CAS
Architecture, Object Storage and Retrieval in CAS. Introduction to Business Continuity- Information
Availability, BC Terminology, BC Planning Lifecycle, Failure Analysis.
UNIT– V BACKUP RECOVERY AND REPLICATION (9Periods)
Backup and Recovery: Backup Purpose, Backup Considerations, Backup Granularity, Recovery
Considerations, Backup Methods, Backup Process, Backup and Restore Operations, Backup Topologies,
Backup Technologies. Replication: Local Replication-Uses of Local Replicas, Data Consistency, Local
Replication Technologies, Remote Replication-Modes of Remote Replication, Remote Replication
Technologies.
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXTBOOKS:
1 Marc Farley, "Building Storage Networks", Tata McGraw Hill, Osborne, 2001.
2 Robert Spalding, "Storage Networks: The Complete Reference", Tata McGraw Hill, Osborne, 2001.
3 Silvangai, RogerAndersson,DiegoCrupnicoffandVipinJain, “Buildingafuture-
proofcloudinfrastructure:AunifiedArchforNetwork,SecurityandStorageServices”,
PearsonAddison– Wesley 2020
COURSEOUTCOMES:
Oncompletion ofthe course,the studentswill beable to:
COURSEARTICULATIONMATRIX:
PRE-REQUISITES CATEGORY L T P C
Data Communication and Networking PE 3 0 0 3
Course Upon completion of this course, the students will be familiar with,
Objectives Fundamentals of Software Defined Networks.
Seperation of the data Plane and Control Plane.
Principles of Software Defined Network Programming.
Various Applications of Software Defined Networks
TEXTBOOKS:
1 Siamak Azodolmolky, “Software Defined Networking with Open Flow”, Packet Publishing,
2013.
2 Vivek Tiwari, “SDN and Open Flow for Beginners‖, Amazon Digital Services”, Inc., 2013.
3 Fei Hu, Editor, “Network Innovation through Open Flow and SDN: Principles and
Design”, CRC Press, 2014.
COURSEOUTCOMES:
Oncompletion ofthe course,the studentswill beable to:
COURSEARTICULATIONMATRIX:
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Modularity and Extensibility- types, functions, primitive operators, composition and custom operators,
distributed programming- logical Vs physical flow graphs, placement, transport, visualization –
topology, metrics, status, data, debugging – semantic, user-defined operator, deployment, performances.
TEXT BOOKS:
1 Henrique C.M.Andrade,BugraGedikandDeepakS.Turaga,
“FundamentalsofStreamProcessing:ApplicationDesign,SystemsandAnalytics”,
CambridgeUniversitypress., 2014.
REFERENCES:
COURSEARTICULATIONMATRIX:
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK :
1 Tim Mather, Subra Kumaraswamy, and Shahed LatifCopyright, “Cloud Security and Privacy”,
O’Reilly Media, 2009.
REFERENCES:
1 John R. Vacca, “Cloud Computing Security Foundations and Challenges”, CRC Press, 2nd
Edition, 2020.
2 Siani Pearson, George Yee "Privacy and Security for Cloud Computing" Computer
Communications and Networks, Springer, 2013.
3 Ronald L. Krutz, Russell Dean Vines, "Cloud Security: A Comprehensive Guide to Secure
Cloud Computing", Wiley Publishing, 2010
4 Ben Halper, “Auditing Cloud Computing: A Security and Privacy Guide” John Wiley & Sons,
Inc. Publications, 2011.
COURSE OUTCOMES:
PRE-REQUISITES CATEGORY L T P C
Knowledge on Computer networks and Web technology PE 3 0 0 3
Course 1. To explore the concepts of security testing and the knowledge required to protect
Objectives against the hacker and attackers.
2. To understand reconnaissance and the publicly available tools used to gather
information on potential targets.
3. To discover the scanning techniques used to identify network systems open ports.
4. To identify network system vulnerabilities and confirm their exploitability.
5. To explore techniques for identifying web application vulnerabilities and attacks.
UNIT – I INTRODUCTION (9 Periods)
Introduction to Hacking –Important Terminologies – Hacktivism – Computer Crimes and
Implications. Penetration Test – Vulnerability Assessments versus Penetration Test – Pre-Engagement
– Rules of Engagement–Penetration Testing Methodologies: OSSTMM–NIST –OWASP – Categories
of Penetration Test – Types of Penetration Tests – Vulnerability Assessment Summary – Reports
UNIT – II INFORMATION GATHERING AND SCANNING (9 Periods)
Information Gathering Techniques: Active Information Gathering – Passive Information Gathering –
Sources of Information Gathering – Tracing the Location – Traceroute: ICMP, TCP and UDP
Traceroute – Enumerating and Fingerprinting the Webservers – Google Hacking – Enumerating
SNMP – SMTP Enumeration – Target Enumeration and Port Scanning Techniques – Advanced
Firewall/IDS Evading Techniques.
UNIT – III NETWORK ATTACKS (9 Periods)
Network Sniffing – Types of Sniffing – Promiscuous versus Nonpromiscuous Mode – MITM Attacks
– ARP Attacks –MAC flooding - Denial of Service Attacks – Hijacking Session with MITM Attack –
SSL Strip: Stripping HTTPS Traffic –DNS Spoofing – ARP Spoofing Attack Manipulating the DNS
Records – DHCP Spoofing – Remote Exploitation –Attacking Network Remote Services – Attacking
SMTP – Attacking SQL Servers – Testing for Weak Authentication.
UNIT – IV EXPLOITATION (9 Periods)
Introduction to Metasploit – Reconnaissance with Metasploit – Port Scanning with Metasploit –
Compromising a Windows Host with Metasploit – Client Side Exploitation Methods – E–Mails with
Malicious Attachments – PDF Hacking – Social Engineering Toolkit – Browser Exploitation – Post–
Exploitation – Cracking the Hashes: Brute force Dictionary Attacks – Password Salts – Rainbow
Tables – John the Ripper – Gathering OS Information – Harvesting Stored Credentials.
UNIT – V WIRELESS AND WEB HACKING (9 Periods)
Wireless Hacking – Introducing Aircrack– Cracking the WEP – Cracking a WPA/WPA2 Wireless
Network Using Aircrack-ng – Evil Twin Attack – Causing Denial of Service on the Original AP –
Web Hacking – Attacking the Authentication – Brute Force and Dictionary Attacks – Log-In
Protection Mechanisms – Captcha Validation Flaw –Captcha RESET Flaw – Manipulating User-
Agents to Bypass Captcha and Other Protection – Authentication Bypass Attacks – Testing for the
Vulnerability– Session Attacks – SQL Injection Attacks.
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOKS:
1 RafayBaloch, “Ethical Hacking and Penetration Testing Guide”, CRC Press, 2014.
REFERENCES:
1 Kevin Beaver, “Ethical Hacking for Dummies”, Sixth Edition, Wiley, 2018.
2 Kimberly Graves, “Certified Ethical Hacker STUDY GUIDE, Wiley publication, 2010.
3 Michael Gregg, Certified Ethical Hacker, Pearson publication, 2014.
4 Matt Walker, “All-in-one Certified Ethical Hacker Exam Guide, McGraw Hill Edition, 2012.
5 Jon Erickson, “Hacking: The Art of Exploitation”, Second Edition, Rogunix, 2007.
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1 Use the various security tools to assess and to predict the vulnerabilities across any
computing system using penetration testing. (Familiarize)
CO2 Identify prediction mechanism to prevent any kind of attacks using information gathering
mechanisms. (Understand)
CO3 Protect the system using scanning techniques from malicious software and worms.
(Understand)
CO4 Evaluate the wireless network flaws and able to apply security patches with different
exploitations. (Analyze)
CO5 Analyze the risk and support the organization for effective security measures. (Analyze)
PRE-REQUISITES CATEGORY L T P C
Knowledge on Digital Data, concepts of Operating systems and
PE 3 0 0 3
functionalities of Network layers.
Course Upon completion of this course, the students will be familiar with:
Objectives ★ Aspects and principles of digital data as evidence.
★ Cybercrime laws and duties of experts.
★ Techniques to conduct/report a digital forensics investigation.
★ Recovery of digital evidence using a variety of software utilities.
★ Role of internet in cyber crime investigation.
UNIT – I DIGITAL EVIDENCE (9 Periods)
Digital Evidence- Increasing Awareness of Digital Evidence- Principles of Digital Forensics-
Challenging Aspects of Digital Evidence- Following the Cybertrail- Language of Computer Crime
Investigation - Role of Computers in Crime.
UNIT – II CYBER CRIME AND LAWS (9 Periods)
Duty of Experts- Admissibility - Levels of Certainty in Digital Forensics- Direct versus
Circumstantial Evidence- Scientific Evidence- Presenting Digital Evidence- Federal Cybercrime Law-
Constitutional Law- Specific Cybercrime Offenses- Computer-Integrity Crimes- Computer-Assisted
Crimes- Content-Related Cybercrimes.
UNIT – III DIGITAL INVESTIGATIONS (9 Periods)
Digital Investigation Process Models- Scaffolding- Applying the Scientific Method- Guidelines for
Handling Digital Crime Scenes- Fundamental Principles- Authorization- Digital Crime Scene:
Preparing to Handle, Surveying, Preserving- Equivocal Forensic Analysis- Crime Scene
Characteristics - Threshold Assessments- Modus Operandi- Motive and Technology.
UNIT – IV COMPUTER AND MOBILE FORENSICS (9 Periods)
Representation of Data- Storage Media and Data Hiding- File Systems and Location of Data- Dealing
with Password Protection and Encryption- Applying Forensic Science to Computers- Digital
Evidence: Windows Systems, UNIX Systems, Macintosh Systems- Understanding Mobile Device
Security - Analyzing SIM Cards - Analyzing Android, BlackBerry and iOS devices.
UNIT – V NETWORK FORENSICS (9 Periods)
Role of the Internet in Criminal Investigations- Connecting Networks Using Internet Protocols-
Legitimate versus Criminal Uses- Using the Internet as an Investigative Tool- Online Anonymity and
Self-Protection- Forgery and Tracking: E-mail, Usenet- Linking the Data-Link and Network Layers:
Encapsulation- Documentation, Collection, and Preservation- Analysis Tools and Techniques-
TCP/IP-Related Digital Evidence.
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK:
1 Eoghan Casey, “Digital Evidence and Computer Crime: Forensic Science, Computers and the
Internet”, Elsevier, Third Edition, 2011.
2 Reiber Lee, “Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and
Presentation”, McGraw Hill LLC, Second Edition, 2018.
REFERENCES:
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1 Define the terminologies involved in digital evidence and different aspects of computer
crime investigations. (Familiarize)
CO2 Recite legal issues that arise in computer-related investigations and cyber laws.
(Familiarize)
CO3 Demonstrate the usage of digital evidence in reconstructing a crime or incident, identify
suspects and understand criminal motivations. (Understand)
CO4 Analyze the role of computers and digital devices in crime investigations. (Understand)
CO5 Examine the underlying complexity of computer networks in digital investigation
mechanism. (Analyze)
PRE-REQUISITES CATEGORY L T P C
Knowledge on Cryptography, Information Security and Network
PE 3 0 0 3
Security
Course Upon completion of this course, the students will be familiar with:
Objectives The need for security and privacy in online social networks.
Understand issues and challenges associated with securing social
networks.
Crowdsourcing and its effects
Trust management and context aware resource discovery in online social
networks.
Understand the behavioral characteristics of end users.
UNIT – I INTRODUCTION (9 Periods)
Structure and Evolution of Online Social Networks – Diffusion of Information - Security and Privacy
in Social Networks –Privacy and anonymization in Social Networks - Interdisciplinary Impact
Analysis of Privacy in Social Networks.
UNIT – II SECURITY ISSUES AND TECHNICAL CHALLENGES (9 Periods)
Risks of Social Networking – False information and information leakage – Retention – Backup – Loss
of data – Risk Management – Policies and privacy – Handling fake account, passwords, privacy and
information sharing – content security.
UNIT – III CROWDSOURCING AND ITS MEASURES (9 Periods)
Recognizing Your Digital Friends - Encryption and Decryption for Peer-to-Peer Social Networks -
Crowdsourcing and Ethics - The Effect of Social Status on Decision-Making - Applications of k-
Anonymity and ℓ-Diversity in Publishing Online Social Networks.
UNIT – IV CONTROLLED INFORMATION SHARING (9 Periods)
Managing security issues in social networks –Trust Management – Types of trust – Controlled
Information Sharing – Secure resource discovery –Context Awareness - Access Control and Inference
for Social Networks.
UNIT – V PROFILING ONLINE USERS (9 Periods)
Profiling Online Users: Emerging Approaches and Challenges - Securing Mobile Social Networks-
Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access
Point: Limitations and Countermeasures- Cross-Site Scripting Attack – Defense against Online Social
Networks
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK:
1 Yaniv Altshuler, Yuval Elovici, Armin B.Cremers, Nadav Aharony, Alex Pentland, “Security and
Privacy in Social Networks”, Springer , 2012
2 Michael Cross, “Social Media Security: Leveraging Social Networking While Mitigating Risk”,
Syngress, 2013.
REFERENCES :
1 Barbara Carminati , Elena Ferrari , Marco Viviani, “Securityand Trust in Online Social
Networks” , Springer, 2014.
2 Al-Sakib Khan Pathan, “ Securing Social Networks in Cyberspace” ,CRC Press, 2022
3 Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav
Khadilkar, Latifur Khan, “Analyzing and Securing Social Networks”, Auerbach Publications,
2020.
4 Brij B. Gupta, Somya Ranjan Sahoo, “Online Social Networks Security Principles,
Algorithm, Applications, and Perspectives”, CRC Press, 2021.
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1 Recite the need for security and privacy in Social Networks.(Familiarize)
CO2 Argue Risk Management, Policies and Decision making in Social Networks.
(Familiarize)
CO3 Describe Crowdsourcing and its countermeasures for Online Social
Networks.(Familiarize)
CO4 Examine trust, privacy and access control mechanisms for Social Networks.
(Understand)
CO5 Determine and analyze attacks on Social Networks. (Understand)
PRE-REQUISITES CATEGORY L T P C
Knowledge on number theory and basic cryptography PE 3 0 0 3
Course Upon completion of this course, the students will be familiar with,
Objectives ★ Principles and concepts of modern cryptography.
★ Modern public key cryptographic algorithms.
★ Number Theory and private key cryptography.
★ Identity based encryption mechanism.
★ Post quantum cryptographic algorithms.
UNIT – I INTRODUCTION (9 Periods)
Cryptography and Modern Cryptography- Basic Principles of Modern Cryptography - Perfectly-
Secret Encryption - Computational Complexity - Zero-knowledge Properties - Zero-knowledge
Argument - Protocols with Two-sided-error - Round Efficiency - Non-interactive Zero-knowledge.
UNIT – II SYMMETRIC CRYPTOGRAPHY (9 Periods)
Computational Approach to Cryptography - Defining Computationally-Secure Encryption – Secure
Communication and Message Integrity-Collision-Resistant Hash Functions - NMAC and HMAC -
One-Way Functions -Limitations of Private-Key Cryptography.
UNIT – III ASYMMETRIC CRYPTOGRAPHY (9 Periods)
Primes and Divisibility - Modular Arithmetic - Cyclic Groups - Algorithms for Factoring -,
Computing Discrete Logarithms - Goldwasser-Micali Encryption Scheme - Rabin Encryption Scheme
- Paillier Encryption Scheme - Digital Signature Schemes - Lamport's One-Time Signature Scheme -
Signatures from Collision-Resistant Hashing.
UNIT – IV IDENTITY BASED ENCRYPTION (9 Periods)
Bilinear map – Security Model- Hardness Assumptions - Boneh-Franklin Identity based Encryption
(IBE) – Gentry's IBE- Dual System Encryption – Waters’ IBE - Boneh-Boyen IBE – Security Model
for Hierarchical IBE - Waters' Realization – Generic Group Model.
UNIT – V POST QUANTUM CRYPTOGRAPHY (9 Periods)
Lattice Problems – NTRU Cryptosystem - Lattice-Based Cryptography – Ring Variants of Learning
with Errors (LWE) & Learning with Rounding (LWR) - (LWE+LWR)-Based Public-Key Encryption
– Ring Variant of Lizard- Code based Cryptography: McEliece & Niederreiter Cryptosystem, Security
Analysis.
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK:
1 Jonathan Katz and Yehuda Lindell, “lntroduction to Modern Cryptography”, CRC press, 2008.
2 Intae Kim, Wai Kong Lee, Seong Oun Hwang, “Modern Cryptography with Proof Techniques
and Implementations”, CRC press, 2021
REFERENCES:
1 William Stallings, “Cryptography and Network security Principles and Practices”, Pearson/PHI,
2016.
2 Wade Trappe, Lawrence C Washington, “Introduction to Cryptography with coding theory”,
Pearson, 2020.
3 W. Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, 2003.
4 Song Y. Yan , “Computational Number Theory and Modern Cryptography”, Wiley, 2013.
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1 Realize the modern cryptographic principles and concepts. (Familiarize)
CO2 Apply a symmetric cryptography mechanism for encryption using hash functions.
(Understand)
CO3 Apply asymmetric cryptography mechanism for public key encryption.(Understand)
CO4 Demonstrate identity based encryption using hardness assumption and security models.
(Understand)
CO5 Use post-quantum standardization algorithms. .(Understand)
PREREQUISITES CATEGORY L T P C
Knowledge on Software Development life cycle and software
PE 3 0 0 3
testing
Course Upon completion of this course, the students will be familiar with,
Objectives ★ Identify and mitigate potential security risks in software systems.
★ Touchpoints for software security in different stages of software development,
including requirements gathering, design, implementation, and testing.
★ Identification and assess risks associated with different software architectures.
★ Knowledge of risk-based security testing, identify security risks, prioritize
them and develop testing strategies to mitigate them.
★ Use testing tools and techniques to identify vulnerabilities and ensure the
security of software systems.
UNIT – I SOFTWARE SECURITY FUNDAMENTALS (9 Periods)
Security Problems in Software - Pillars of Software Security - Rise of Security Engineering - Risk
Management into Practice - Five Stages of Activity - Risk Management Framework (RMF):
Multilevel Loop, Applying the RMF, Software Security - Importance of Measurement.
UNIT – II TOUCHPOINTS FOR SOFTWARE SECURITY (9 Periods)
Flyover- Black and White - Moving Left - Touchpoints as Best Practices - Who Should Do Software
Security? - Multidisciplinary Effort - Touchpoints to Success - Catching Implementation Bugs Early -
Approaches to Static Analysis - Commercial Tool Vendors - Touchpoint Process - Use a Tool to Find
Security Bugs.
UNIT – III ARCHITECTURAL RISK ANALYSIS (9 Periods)
Security Risk Analysis Approaches - Traditional Risk Analysis Terminology - Knowledge
Requirement - Forest-Level View - Example of a Risk Calculation - Traditional Vs. Modern Risk
Analysis - Architectural Risk Analysis using Touchpoint - Penetration Testing - Incorporating
Findings Back into Development - Using Penetration Tests to Assess the Application Landscape -
Proper Penetration Testing.
UNIT – IV RISK-BASED SECURITY TESTING (9 Periods)
Risk Management and Security Testing - How to Approach Security Testing - Thinking about
(Malicious) Input - Getting Over Input - Leapfrogging the Penetration Test - Security Is Not a Set of
Features - Creating Useful Abuse Cases - Abuse Case Development using Touchpoint - Abuse Cases
Are Useful – Kumbaya.
UNIT – V KNOWLEDGE FOR SOFTWARE SECURITY (9 Periods)
Business Climate - Building Blocks of Change - Building an Improvement Program - Establishing a
Metrics Program - Continuous Improvement – COTS - Adopting a Secure Development Lifecycle -
Experience, Expertise, and Security - Security Knowledge: A Unified View - Security Knowledge and
the Touchpoints - Department of Homeland Security Build Security In Portal - Taxonomy of Coding
Errors - Phyla - Lists, Piles, and Collections.
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK:
1 John Viega, Gary McGraw , “Building Secure Software: How to Avoid Security Problems the
Right Way”, Addison-Wesley, 2011.
2 Raimundas Matulevicius, “Fundamentals of Secure System Modelling”, Springer International
Publishing, 2017.
3 Charles Antony Richard Hoare , “Software System Reliability and Security”, IOS Press , 2007.
4 Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea, Adam
Stubblefield, “Building Secure and Reliable Systems Best Practices for Designing,
Implementing, and Maintaining Systems”, O'Reilly Media, 2020.
COURSE OUTCOMES:
On completion of the course, the students will be able to:
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 M L L L
CO2 M M M M M L
CO3 M M M M L M M L
CO4 M M M M M L M M L
CO5 M M M M M M M M M L
18IPE$53 M M M M L L L L L L M L
L –Low, M- Medium, H- High
CRYPTOCURRENCY AND BLOCKCHAIN TECHNOLOGIES
18IPE$54
(Common to CSE & IT)
PRE-REQUISITES CATEGORY L T P C
Knowledge on Cryptography and Computer Networks PE 3 0 0 3
Course Upon completion of this course, the students will be familiar with,
Objectives ★ Blockchain concepts and its types.
★ Blockchain networks and Block synchronization.
★ Basics of bitcoins in cryptocurrency.
★ Smart contracts and Ethereum networks.
★ Applications of Blockchain in financial and non financial projects.
UNIT – I INTRODUCTION (9 Periods)
Blockchain definitions- Database vs. Blockchain- History, motivations & Characteristics -
Background of Distributed Ledger Technology- Different types of Blockchain- Building blocks-
Moore’s Law & Blockchain - Cryptography in Blockchain- Cryptographic hashing- Digital signatures
in Blockchain.
UNIT – II NETWORKS IN BLOCKCHAIN (9 Periods)
P2P networking architecture- Network discovery - Block synchronization - Building a simple
blockchain in a P2P network - Blockchain structure - Blockchain networks - Bitcoin hard forks and
altcoins - Cryptocurrency application.
UNIT – III BITCOIN & CRYPTOCURRENCY (9 Periods)
Tokens in Cryptocurrency - Non-Fungible Tokens: Types, Extrinsic Elements, Creating and Minting,
Buying and Selling - Fungible Tokens: Bitcoin basics, Keys and addresses, Transactions - Mining and
consensus – Bitcoin Network and Payments- Bitcoin Clients and APIs - Alternative Coins-
MultiChain platform - Setting up a blockchain environment.
UNIT – IV SMART CONTRACTS & ETHEREUM (9 Periods)
Proof of Existence architecture - Building the Proof of Existence application - Digital assets and
identity - Proof of ownership- Smart contracts- NEO blockchain - Choosing the smart contract
platform – Ethereum network - Components of the Ethereum ecosystem- Test networks – Setting and
Starting up a private network.
UNIT – V BLOCKCHAIN APPLICATIONS (9 Periods)
Financial blockchain projects- Non-financial blockchain projects- Blockchain optimizations -
Blockchain enhancements - Transaction security model- Decentralized security model - Attacks on
the blockchain – Block in Financial system and crowdfunding.
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK:
1 Fortnow Matt, Terry QuHarrison, “The NFT Handbook: How to Create, Sell and Buy Non-
Fungible Tokens”, Wiley, 2021.
2 Chris Dannen, “Introducing Ethereum and Solidity: Foundations of Cryptocurrency and
Blockchain Programming for Beginners”, Apress publisher, 2017.
3 S. Shukla, M. Dhawan, S. Sharma and S. Venkatesan, “Blockchain Technology: Cryptocurrency
and Applications”, Oxford University Press, 2019.
4 Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder, “Bitcoin
and Cryptocurrency Technologies: A Comprehensive Introduction”, Princeton University Press,
2016.
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1 Understand the basics and apply cryptographic concepts in blockchain. (Familiarize)
CO2 Apply the concepts of P2P to achieve decentralization in the blockchain network.
(Understand)
CO3 Demonstrate the concepts of Tokens and decentralized application development using
MultiChain blockchain framework. (Understand)
CO4 Apply proof of existence and ownership through smart contracts. (Understand)
CO5 Examine blockchain concepts for various financial and Non-financial applications.
(Analyze)
PREREQUISITES CATEGORY L T P C
Knowledge on Information processing, Network Layers, PE 3 0 0 3
Operating System and Cryptography.
Course Upon completion of this course, the students will be familiar with,
Objectives ★ Threats, attacks and issues in a security model.
★ Cryptography to secure data.
★ Firewalls, wireless security and intrusions.
★ Security of operating systems, servers and mobile devices.
★ Ensuring availability of data.
UNIT – I INTRODUCTION (9 Periods)
The History of Information Security - CNSS Security Model -Components of an Information System -
Security Professionals and the Organization – the need for security – threats – attacks – Secure
software development – Legal, Ethical, and Professional Issues in Information Security- Risk
Analysis.
UNIT – II DATA SECURITY (9 Periods)
Securing Unstructured Data – Overview of Information Rights Management – Encryption –
Symmetric key cryptography – Public key cryptography – Public key Infrastructure - Modern Storage
Security – Database security.
UNIT – III NETWORK SECURITY (9 Periods)
Secure Network Design - Network Device Security – Firewalls – Virtual Private Network – Wireless
Network Security - Intrusion Detection and Prevention Systems - Voice Over IP (Voip) And PBX
Security.
UNIT – IV COMPUTER SECURITY (9 Periods)
Operating System Security Models – Unix Security – Windows Security – Securing E-mail, Web
servers, DNS servers, Proxy Servers – Protecting Virtual Storage and Networks - Securing Mobile
Devices.
UNIT – V SECURITY OPERATIONS AND PHYSICAL SECURITY (9 Periods)
Security Operations Management - Disaster Recovery - Business Continuity – Backups - High
Availability - Incident Response - Forensic Analysis. Physical security: Physical Vulnerability
Assessment - Choosing Site Location for Security - Locks and Entry Controls - Physical Intrusion
Detection.
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK:
1 Mark Rhodes-Ousley “Information Security The Complete Reference” 2nd edition, McGraw Hill
Professional, 2013.
REFERENCES:
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1 Identify threats and attacks to the information within systems. (Familiarize)
CO2 Secure information stored in servers, storage networks and databases using cryptography.
(Understand)
CO3 Secure the network using proper design, firewalls and intrusion detection and prevention
systems. (Understand)
CO4 Apply proper access control mechanisms to protect operating systems, e-mail, servers and
mobile devices. (Understand)
CO5 Apply appropriate disaster recovery plan and backup to ensure high availability of data.
(Understand)
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK :
1 Tim Mather, Subra Kumaraswamy, and Shahed LatifCopyright, “Cloud Security and Privacy”,
O’Reilly Media, 2009.
REFERENCES:
1 John R. Vacca, “Cloud Computing Security Foundations and Challenges”, CRC Press, 2nd
Edition, 2020.
2 Siani Pearson, George Yee "Privacy and Security for Cloud Computing" Computer
Communications and Networks, Springer, 2013.
3 Ronald L. Krutz, Russell Dean Vines, "Cloud Security: A Comprehensive Guide to Secure
Cloud Computing", Wiley Publishing, 2010
4 Ben Halper, “Auditing Cloud Computing: A Security and Privacy Guide” John Wiley & Sons,
Inc. Publications, 2011.
COURSE OUTCOMES:
CREATIVE MEDIA
18IPE$20 VIRTUAL AND AUGMENTED REALITY
PREREQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Course Upon completion of this course, the students will be familiar with,
Objectives Basic components, input devices and output devices of Virtual Reality
systems.
Computing architecture, Modeling and programming toolkits of VR systems.
Various applications of VR systems.
Basics and functional components of AR systems.
Content, Interaction and applications of AR systems.
TEXT BOOK :
1 Grigore C.Burdea, Philippe coiffet, “Virtual Reality: Technology”, Wiley India, 2nd edition, 2003.
2 Alan B.Craig, “Understanding Augmented Reality: Concepts and Applications”, Morgan
Kaufmann publications, 1st edition, 2013.
REFERENCES :
COURSE OUTCOMES:
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 H M L L L L L L M L
CO2 H H H M L L L L H L
CO3 H M L L L L L L
CO4 H M L L L L L L M L
CO5 H M H L L L L L L L M L
18IPE$20 H L M L L L L L L L M L
L –Low, M- Medium, H- High
18IPE$55 MULTIMEDIA AND ANIMATION
CATEGORY L T P C
PREREQUISITES
NIL PE 3 0 0 3
4. To provide a holistic view about the core and advanced animation principles
5. To explore the application avenues for the Multimedia and Animation concepts.
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK :
1 Prabhat K Andleigh, Kiran Thakrar, “Multimedia systems design”, PHI, 1 st edition, 1996
2 Sreeparna Banerjee, “Elements of Multimedia”, CRC Press, 2019
3 Jennifer Coleman Dowling, "Multimedia Demystified", McGraw Hill LLC,2011
4 Tay Vaughan, “Multimedia: Making it Work”, McGraw Hill Publication, Eighth Edition, 2010
COURSE OUTCOMES:
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 L L L L M L L L L L L L L
CO2 L L L L M L L L L L L L L
CO3 M M M M H L M H M L L L L
CO4 M M M M M L L H M L L L L
CO5 M M M M H L L H M L L L L
18IPE$55 M M M M H L L H M L L L L
L –Low, M- Medium, H- High
18IPE$56 VIDEO CREATION AND EDITING
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Course 1. To introduce students to the principles and techniques of video creation and
Objectives editing.
2. To provide hands-on experience with video production equipment and
software.
3. To teach students the basics of visual storytelling and video production.
4. To give students practical experience with planning, executing, and editing
video projects.
5. To foster critical thinking and creativity in developing and executing video
projects.
UNIT – I INTRODUCTION TO VIDEO CREATION AND EDITING (9 Periods)
Overview of video creation and editing -Brief history of video and film production -Understanding
visual storytelling: developing documentary and dramatic projects- introduction to digital systems
UNIT – II PRE-PRODUCTION (9 Periods)
Developing a concept and idea - Scriptwriting and storytelling -The Digital image - Film systems and
cameras -The film image
UNIT – III PRODUCTION (9 Periods)
Camera operation and techniques: The video camcorder- The Lens - Lighting and sound recording
techniques - Directing actors and crew -Conducting interviews -Shooting the movie
UNIT – IV POST-PRODUCTION (9 Periods)
Picture and Dialogue editing - Editing digital video -sound editing and mixing -Color grading and
correction-Sound editing and mixing
UNIT – V DISTRIBUTION AND PROMOTION (9 Periods)
Presenting the project - funding sources - budgets- business arrangements- legal and copyright issues-
distribution and marketing - publicity and the marketing campaigns-building and sustaining a career
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK :
1 Steven Ascher and Edward Pincus,The Filmmaker's Handbook: A Comprehensive Guide for the
Digital Age,Fifth edition Penguin Publishing Group, 2012
REFERENCES :
1 Walter Murch, “In the Blink of an Eye: A Perspective on Film Editing", Silman-James
Press,2001
2 Karel Reisz and Gavin Millar, “The Technique of Film Editing", second edition ,Taylor and
Francis Group 2017
3 Ken Dancyger, “The technique of film and video editing”, fifth edition , Elsevier 2011.
4 Chris Kenworthy, “Digital video production cookbook”, OReillyMedia , 2006
5 Mark Brindle, “The Digital Filmmaking Handbook”, Quercus Publishing, 2014
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1 Demonstrate an understanding of the history and evolution of video production and editing.
(Understand)
CO2 Develop and execute a concept, script, and storyboard for a video project. (Analyze)
CO3 Plan and prepare for a video shoot, including casting, location scouting, and budgeting.
(Analyze)
CO4 Edit and assemble video footage using basic and advanced editing techniques. (Understand)
CO5 Promote and distribute the final video on various platforms. (Familiarize)
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 L L L L L L L L L L L M L
CO2 L L L L M L H H H M L M M
CO3 M M M M M M H H M H L M H
CO4 M M M M H M H H M M L M H
CO5 M M M M H M H H H H L M H
18IPE$56 M M M M H M H H M M L M H
L –Low, M- Medium, H- High
UI AND UX DESIGN
18IPE$41
(Common to CSE & IT)
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Course Upon completion of this course, the students will be familiar with,
Objectives Principles of UX design, such as user research, user personas and user journey
mapping
Importance of color theory, typography, layout, and visual hierarchy
Usage of design tools and software, such as Sketch, Figma, Adobe XD and
Invision
Usage of wireframes and prototypes using design software to communicate design
ideas
Methods for evaluating user interfaces
UNIT – I INTRODUCTION TO UI DESIGN (9Periods)
Basics of HCI - Design process- HCI in software process – Basics of interaction design - UI Design
and Why it matters – UI disasters – Case studies – Design Process – Introduction – Usability
Engineering – Task centered approaches – Use cases – Personas – Tasks – Scenarios –Design
centered approaches – Psychology and human factors for UI Design – Fitts Law – Short-term – long-
term – attention – perception – conceptual models – Design principles – visibility – feedback –
mappings – constraints – High-level models – distributed cognition – activity theory – situated action
UNIT – II USER RESEARCH (9Periods)
UserCentered Approaches to Interaction Design -User Research methods – Interview and Focus
groups – Observations – Contextual inquiry – Ethics and Consent – User Research Protocol – Log
Analysis – Surveys and Questionnaires – Translating User Research to Support design – Qualitative
analysis – Quantitative analysis – Examples - Implications for Design – From Research to Ideas –
Ideation – Selection – Communicating to Stakeholders
UNIT – III PROTOTYPING (9Periods)
Introduction – Sensory and Cognitive Impairments – Physical limitations – tools and standards –
Design for older adults and children – Socio-economic differences – Design for different platforms
and contexts – Mobile UI design – Wearable – Automotive User Interfaces – IoT and Physical
Computing
UNIT – V EVALUATING USER INTERFACES AND TOOLS (9Periods)
Introduction to Evaluating User interfaces and Evaluation in UI Design process – Evaluation without
users – Action Analysis – Cognitive Walkthroughs – Heuristic Evaluation – Nielsen’s heuristics –
Evaluation with Users – User Testing – Goals – Formative and Summative Evaluation – Ethics in
evaluation – Tools – Adobe XD – Figma –Invision -Sketch
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK:
1 Rex Hartson, Pardha S Pyla, “The UX Book: Agile UX Design for a Quality User
Experience”, Morgan Kaufmann, Second Edition, 2018
2 Joel Marsh, “UX for beginners”, O’Reilly Media, 2015
REFERENCES:
1 Alan Cooper, Robert Riemann, David Cronin, Christopher Noessel, “About Face: The
Essentials of Interaction Design”, Wiley, Fourth Edition, 2014
2 Ben Coleman, and Dan Goodwin, “Designing UX: Prototyping: Because Modern Design is
Never Static”, SitePoint , 2017
3 Westley Knight, “UX for Developers: How to Integrate User-Centered Design Principles
Into Your Day-to-Day Development Work”, Apress, 2018
4 https://in.coursera.org/specializations/user-interface-design
5 Helen Sharp, Yvonne Rogers, Jenny Preece, “Interaction design – beyond human computer
interaction”, Wiley, Fifth Edition, 2019
6 Elizabeth Goodman, Mike Kuniavsky, Andrea Moed, “Observing the User Experience – A
Practitioner’s Guide to User Research”, Morgan Kaufmann, Second Edition, 2012
COURSE OUTCOMES:
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 M L L L H M
CO2 H L L L L H M
CO3 L H L H L L H M
CO4 H L H L H M
CO5 L H L H M L H M
18IPE$41 L H L H L L H M
L –Low, M- Medium, H- High
18IPE$57 DIGITAL MARKETING
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Digital marketing strategy - The impact of digital media and technology on the marketing mix:
product- price-place-promotion -people, process and physical evidence - relationship marketing using
digital platforms: the challenge of customer engagement - customer lifecycle management
UNIT – III DIGITAL MARKETING IMPLEMENTATION AND (9 Periods)
PRACTICE
Delivering the online customer experience: planning website design and redesign projects - initiation
of the website project - defining site or app requirement - designing the user experience - development
and testing of content - site promotion or traffic building - campaign planning for digital media
UNIT – IV MARKETING COMMUNICATIONS USING DIGITAL (9 Periods)
MEDIA CHANNELS
Search engine marketing - online public relations - affiliated marketing - interactive display
advertising -email marketing and mobile text messaging- social media and viral marketing - offline
promotion techniques
UNIT – V EVALUATION OF DIGITAL CHANNEL PERFORMANCE (9 Periods)
Create a performance management system - performance metric framework - tools and techniques for
collecting metrics -customer experience and content management - online consumer behavior- online
retailing - customer acquisition in B2B marketing -online inter- organizational trading
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK :
1 Puneet singh Bhatia, Fundamentals of Digital Marketing , Pearson India Education services,2017
2 Mathur, Vibha, Arora, Saloni,"Digital Marketing",PHI Learning Pvt. Ltd.,2020
3 Ian Dodson, The Art of Digital Marketing: The Definitive Guide to Creating Strategic, Targeted,
and Measurable Online Compaigns, Wiley 2016
4 Dr.Shakti Kundu, Digital Marketing Trends and Prospects:Develop an effective Digital
Marketing strategy with SEO, SEM, PPC, Digital Display Ads & Email Marketing
techniques,BPB PUBN,2021
5 Seema Gupta, Digital Marketing,Third Edition, McGraw Hill 2022
6. Simon Kingsnorth, Digital Marketing Strategy:An Integrated Approach to Online Marketing,
Kogan page, 2022
COURSE OUTCOMES:
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 L L L L L L L L L L L M L
CO2 M M H L H L L M L L L M L
CO3 M M H L H L L M L L L M H
CO4 M M H L H L M M L L L M M
CO5 M M H L H L M M L L L M H
18IPE$57 M M H L H L M M L L L M M
L –Low, M- Medium, H- High
18IPE$58 VISUAL EFFECTS
PREREQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Course 1. To introduce the principles and techniques of visual effects used in film,
Objectives television, and other media.
2. To provide an understanding of the visual effects pipeline, including industry-
standard software and processes.
3. To teach the basics of compositing, 3D modeling and animation, special
effects, and advanced techniques.
4. To give hands-on experience with industry-standard software and tools for
visual effects production.
5. To foster critical thinking and creativity in developing and executing visual
effects projects.
UNIT – I INTRODUCTION TO VISUAL EFFECTS (9 Periods)
History and evolution of visual effects - visual effects pipeline- Different types of visual effects :
matte painting, compositing and 3D modeling - VFX cues - Digital formats -VFX concepts
Introduction to industry-standard software (e.g. Adobe After Effects, Nuke, Maya)
UNIT – II COMPOSITING (9 Periods)
Photoshop selection methods -Grime maps- cloning - 2D VFX - compositing - Rotoscoping -2D
motion tracking - 2D Matchmoving -2D motion tracking and CG integration
UNIT – III 3D MODELING AND ANIMATION (9 Periods)
Introduction to 3D modeling software: Maya, 3dsMax and Blender -Basic 3D tracking and match
moving CG- -Card Trick VFX- Bread and Butter VFX-
UNIT – IV SPECIAL EFFECTS (9 Periods)
Particle systems - Dynamics - -2.5D Vs 3D particle based crowd Replications - Digital matte painting
and environment- Beauty and restoration VFX
UNIT – V ADVANCED TECHNIQUES (9 Periods)
3D particle based debris systems - Digital destruction -Stereoscopic 3D- 2D to 3D stereoscopic
conversion -advanced 3D and Photoshop Magic - Displacement modeling
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK :
REFERENCES :
1 Steve Wright, Digital compositing for film and video, Taylor and Francis , 2013
2 Luke Ahearn , 3D Game Textures Create Professional Game Art Using Photoshop, CRC Press,
Taylor & Francis Group, 2019
3 Mitch Mittel, Visual effects for film and television, Taylor and Francis, 2013
4 Sam vila, Blender for visual effects, CRC press,2015
5. Brie Gynclid & Lisa fridsma, Adobe after effects, Adobe release, 2020
6 Ron Brinkkman, The Art and science of Digital compositing , Elsevier science , 2008
COURSE OUTCOMES:
CO5 Create and execute visual effects projects using techniques learned. (Analyze)
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 L L L L L L L L L L L M L
CO2 L L L L M L H H H M L M M
CO3 M M M M M M H H M H L M H
CO4 M M M M H M H H M M L M H
CO5 M M M M H M H H H H L M H
18IPE$58 M M M M H M H H M M L M H
L –Low, M- Medium, H- High
18IPE$59 GAME DEVELOPMENT
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
TEXT BOOK :
1 Steve Rabin, "Introduction to Game Development", Second edition ,Cengage Learning ,2010
2 Will Goldstone, Unity Game development Essentials, PACKT Publishing ,2009
REFERENCES :
1 Kenneth C. Finney, 3D Game Programming: All in One, 3rd Ed, Course Technology,2013
2 Adam Lake, Game Programming Gems 8, Course Technology, Cengage Learning,2011
3 Eric Lengyel, Mathematics for 3D Game Programming and Computer Graphics, 3rd Edition,
Course Technology, Cengage Learning, 2012
4 Michelle Menard, Game Development with unity, Course Technology ,2012
5 Paris Buttfield-Addison, Jon Manning, Tim Nugent, Unity Game Development Cookbook
Essentials for Every Game, O'Reilly Media,2019
COURSE OUTCOMES:
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 M M M M H M L M M L M M M
CO2 M M M M H M L M M L M M M
CO3 M M M M H M L M M L M M M
CO4 M M M M H M L M M L M M M
CO5 M M M M H M L M M L M M M
18IPE$59 M M M M H M L M M L M M M
L –Low, M- Medium, H- High
18IPE$60 MULTIMEDIA DATA COMPRESSION AND STORAGE
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Course 1. learn the principles and algorithms behind various compression and storage
Objectives methods for images, data
2. learn the principles and algorithms behind various compression and storage
methods for video data
3. learn the principles and algorithms behind various compression and storage
methods for audio data
4. comprehend the challenges associated with multimedia data storage and
retrieval
5. learn the principles about MPEG system..
UNIT – I MULTIMEDIA COMPRESSION FUNDAMENTALS (9 Periods)
Needs for image and video compression - Feasibility of image and video compression : statistical
redundancy, psychovisual redundancy, visual quality measurement - information theory - uniform
quantization -non uniform quantization -adaptive quantization
UNIT – II IMAGE COMPRESSION AND STORAGE (9 Periods)
Still image coding : standard JPEG - Wavelet transform for image coding: JPEG 2000: a review of
wavelet transform - digital wavelet transform for image compression Non standard still image coding
: vector quantization - fractal image coding -model based coding - image storage and retrieval systems
UNIT – III VIDEO COMPRESSION AND STORAGE (9 Periods)
Digital video representation - Digital video formats - digital video coding standards : MPEG1
features- MPEG2 enhancements -MPEG2 video encoding -rate control - optimum mode decision -
ITUT video coding standards: H.261 -H.263 -streaming video and adaptive bit rate technologies -
video storage and retrieval systems
UNIT – IV AUDIO COMPRESSION AND STORAGE (9 Periods)
Audio file formats and standards - MP3 and AAC audio compression - audio metadata and ID3 tags -
perceptual audio coding - audio storage and retrieval systems- transform based audio coding
UNIT – V ADVANCED COMPRESSION STANDARDS AND MPEG (9 Periods)
SYSTEM
MPEG 4 Requirements and functionalities - technical description of MPEG4 video - MPEG4 visual
bitstream syntax and semantics - MPEG4 video verification model - overview of H.264 codec
structure -MPEG2 system - MPEG4 system.
Contact Periods:
Lecture: 45 Periods Tutorial: 0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK :
1 Yun Q. Shi, Huifang Sun , Image and Video Compression for Multimedia Engineering
Fundamentals, Algorithms, and Standards, Second Edition, CRC Press,2008
2 Khalid sayood , Introduction to Data Compression, Elsevier science ,2006
REFERENCES :
1 Huifang Sun, Tihao Chiang, Xuemin Chen , Digital Video Transcoding for Transmission and
Storage, CRC Press,2018
2 Marina Bosi, Richard E. Goldberg, Introduction to Digital Audio Coding and Standards, Springer
US,2012
3 Ida Mengyi Pu, Fundamental Data Compression, Elsevier Science,2005
4 Jerry D. Gibson, Toby Berger, Tom Lookabaugh, Rich Baker, David Lindbergh, Digital
Compression for Multimedia Principles and Standards, Elsevier Science,1998
COURSE OUTCOMES:
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 L L L L M L L L L L L M L
CO2 M M M L M L L L L L L M L
CO3 M M M L M L L L L L L M L
CO4 M M M L M L L L L L L M L
CO5 M M M L M L L L L L L M L
18IPE$60 M M M L M L L L L L L M L
L –Low, M- Medium, H- High
VERTICAL – VI
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
REFERENCES :
COURSE OUTCOMES:
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 H H H H H
CO2 H H H H H
CO3 H H H H H
CO4 H H H H H
CO5 H H H H H
18IPE$61 H H H H H
L –Low, M- Medium, H- High
18IPE$14 SOFT COMPUTING AND ITS APPLICATIONS
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Course Upon completion of this course, the students will be familiar with,
Objectives Learn the various soft computing frame works
Be familiar with design of various neural networks
Be exposed to fuzzy logic
Learn genetic programming
Learn the Hybrid soft computing techniques and applications
UNIT – I INTRODUCTION (9 Periods)
Artificial neural network: Introduction, characteristics- learning methods – taxonomy – Evolution of
neural networks- basic models – important technologies – applications. Fuzzy logic: Introduction –
crisp sets- fuzzy sets – crisp relations and fuzzy relations: cartesian product of relation – classical
relation, fuzzy relations, tolerance and equivalence relations, non-iterative fuzzy sets. Genetic
algorithm- Introduction – biological background – traditional optimization and search techniques –
Genetic basic concepts.
UNIT – II NEURAL NETWORKS (9 Periods)
McCulloch-Pitts neuron – linear separability – hebb network – supervised learning network:
perceptron networks – adaptive linear neuron, multiple adaptive linear neuron, BPN, RBF, TDNN-
associative memory network: auto-associative memory network, hetero-associative memory network,
BAM, hopfield networks, iterative autoassociative memory network & iterative associative memory
network –unsupervised learning networks: Kohonenself organizing feature maps, LVQ – CP
networks, ART network.
UNIT – III FUZZY LOGIC (9 Periods)
Membership functions: features, fuzzification, methods of membership value assignments-
Defuzzification: lambda cuts – methods – fuzzy arithmetic and fuzzy measures: fuzzy arithmetic –
extension principle – fuzzy measures – measures of fuzziness -fuzzy integrals – fuzzy rule base and
approximate reasoning : truth values and tables, fuzzy propositions, formation of rules-decomposition
of rules, aggregation of fuzzy rules, fuzzy reasoning-fuzzy inference systems-overview of fuzzy
expert system-fuzzy decision making
UNIT – IV GENETIC ALGORITHM (9 Periods)
Genetic algorithm and search space – general genetic algorithm – operators – Generational cycle –
stopping condition – constraints – classification – genetic programming – multilevel optimization –
real life problem- advances in GA.
UNIT – V HYBRID SOFT COMPUTING TECHNIQUES & (9 Periods)
APPLICATIONS
Neuro-fuzzy hybrid systems – genetic neuro hybrid systems – genetic fuzzy hybrid and fuzzy genetic
hybrid systems – simplified fuzzy ARTMAP – Applications: A fusion approach of multispectral
images with SAR, optimization of traveling salesman problem using genetic algorithm approach, soft
computing based hybrid fuzzy controllers.
Contact Periods:
Lecture: 45 Periods Tutorial:0 Periods Practical: 0 Periods Total: 45 Periods
TEXT BOOK:
1 J.S.R.Jang, C.T. Sun and E.Mizutani, “Neuro-Fuzzy and Soft Computing”, PHI /
Pearson Education 2015.
2 S.N.Sivanandam and S.N.Deepa, “Principles of Soft Computing”, Wiley India Pvt Ltd, 2011.
REFERENCES :
COURSE OUTCOMES:
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 H H H H H H L H H L
CO2 H H H H H H L H H L
CO3 H H H H H H L H H L
CO4 H H H H H H L H H L
CO5 H H H H H H L H H L
18IPE$14 H H H H H H L H H L
L –Low, M- Medium, H- High
18IPE$33 NEURAL NETWORKS AND DEEP LEARNING
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
TEXT BOOK :
1 Ian Goodfellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2016
2 Francois Chollet, “Deep Learning with Python”, Second Edition, Manning Publications, 2021.
REFERENCES :
1 Aurélien Géron, “Hands-On Machine Learning with Scikit-Learn and TensorFlow”, Oreilly,
2018
2 Josh Patterson, Adam Gibson, “Deep Learning: A Practitioner’s Approach”, O’Reilly Media,
2017.
3 Charu C. Aggarwal, “Neural Networks and Deep Learning: A Textbook”, Springer International
Publishing, 1st Edition, 2018.
4 Jojo Moolayil ,“Learn Keras for Deep Neural Networks”, Apress,2018
5 Vinita Silaparasetty , “Deep Learning Projects Using TensorFlow 2”, Apress, 2020
COURSE OUTCOMES:
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
TEXT BOOK :
1 Daniel Jurafsky and James H. Martin, “Speech and Language Processing: An Introduction to
Natural Language Processing, Computational Linguistics, and Speech Recognition”, Third
Edition, 2022.
REFERENCES:
1 Dipanjan Sarkar, “Text Analytics with Python: A Practical Real-World approach to Gaining
Actionable insights from your data”, APress,2018
2 Tanveer Siddiqui, Tiwary U S, “Natural Language Processing and Information Retrieval”,
Oxford University Press, 2008
3 .Lawrence Rabiner, Biing-Hwang Juang, B. Yegnanarayana, “Fundamentals of Speech
Recognition” , 1st Edition, Pearson, 2009.
4 . Steven Bird, Ewan Klein, and Edward Loper, “Natural language processing with Python”,
O’REILLY.
COURSE OUTCOMES:
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 H M H L H L M L M H L
CO2 H L M L H M M L H H L
CO3 M M L H L H H L M H L
CO4 M L L L M M L M M H L
CO5 L H M M L H M L L H L
18IPE$34 M M M M M M M L M H L
L –Low, M- Medium, H- High
18IPE$62 OPTIMIZATION TECHNIQUES AND APPLICATIONS
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
TEXT BOOK:
1 S.S.Rao, “Engineering optimization: Theory and practice”, New Age International (P) Limited.
2 H A Taha ,“Operations Research: An Introduction" , 5th Edition, Macmillan, New York.
REFERENCES :
1 K.V. Mittal and C. Mohan, “Optimization Methods in Operations Research and systems
Analysis” New Age, International (P) Limited, Publishers
2 by S.D.Sharma, KedarnathRamanath& Co , “Operations Research “
3 G. Hadley, “Linear programming “, Narosa Publishing House, New Delhi.
4 M. Mahajan, DhanpatRai& co, “ Industrial Engineering and Production Management”.
5 by NVR Naidu, G Rajendra, T Krishna Rao, “Operations Research” , I K International
Publishing house, New Delhi.
COURSE OUTCOMES:
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 H H H H H
CO2 H H H H H
CO3 H H H H H
CO4 H H H H H
CO5 H H H H H
18IPE$62
L –Low, M- Medium, H- High
GAME THEORY
18IPE$63
(Common to CSE & IT)
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
TEXT BOOK :
COURSE OUTCOMES:
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 L M L M M M M M
CO2 L M L M M L M L M M M
CO3 L M M M H M M L M M
CO4 L M M M H L M M L M M
CO5 L M M M H L M M M M M M
18IPE$63 L M M M H L M M M M M
L –Low, M- Medium, H- High
COGNITIVE SCIENCE
18IPE$64
(Common to CSE & IT)
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
Course
Objectives 1. To know the theoretical background of cognition.
2.To understand the link between cognition and computational intelligence.
3.To explore probabilistic programming language.
4. To study the computational inference models of cognition.
5. To study the computational learning models of cognition.
TEXT BOOK:
1 Robert A. Wilson, Frank C. Keil, “The MIT Encyclopedia of the Cognitive Sciences”, The MIT
Press, 1999.
REFERENCES:
PO PO PO PSO PSO
COs/POs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9
10 11 12 1 2
CO1 H H L
CO2 H H H M
CO3 H H L
CO4 H H L
CO5 H H H H H
CO6 H H H H H
18IPE$64
L –Low, M- Medium, H- High
ETHICS AND AI
18IPE$65
(Common to CSE & IT)
PRE-REQUISITES CATEGORY L T P C
NIL PE 3 0 0 3
TEXT BOOK :
1 Markus D Dubber, Frank Pasquale, Sunil Das, “The Oxford Handbook of Ethics of AI”, Oxford
University Press, 2020.
2 Paula Beddington, “Towards a Code of Ethics for Artificial Intelligence”, Springer, 2017.
REFERENCES :
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
COs/POs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 H H M
CO2 H H M
CO3 H H M
CO4 H H M
CO5 H H M
18IPE$65 H H M
L –Low, M- Medium, H- High