Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
I Semester
01 19UC1101 D Basic English 2
02 Fundamentals of
4 BACHELOR OF
19MT1105 D Mathematics
COMPUTER
03 19CA1101 D Programming in C 4 APPLICATIONS
04 19CA1102 D Operating Systems 4 (BCA)
05 Database Management
4
19CA1103 D System
06 19CA1104 D Digital Logic Design 3 I Semester
07 19UC0009 D 01 19UC1101 D 2 Basic English
Ecology & Environment 2
II Semester 02 Fundamentals of
01 19UC1202 D 4
19MT1105 D 2 Mathematics
English Proficiency
02 Object Oriented03 19CA1101 D Programming in C 4
4
19CA1201 D 04 19CA1102
Programming Using Java D Operating Systems 4
03 19CA1202 D Data Structures05 4 Database Management
04 19CA1203 D 4
Computer Networks 19CA1103 D 4 System
05 19CA1205 D Probability and06Statistics
19CA1104 D 3 Digital Logic Design 3
06 07 19UC0009
Computer Architecture & D Ecology & Environment 2
4
19CA1207 D Organization
07 Universal Human Values
2
19UC0010 D & Professional Ethics
III Semester
01 19CA2106 D Linux Administration 4
02 Information Storage and
19CA2116 D Management 3
03 Principles of
19CA2117 D Virtualization 3
04 Network & Information
19CA2118 D Security 4
05 Installation and BASIC
19CA2119 D Configuration of Server 4 ENGLISH
06 19CA2120 D Client Side Scripting 4
Credits 2 IV Semester
01 19CA2201
Contact HoursD Python
30 Programming 4
02 19CA2210 D Software Engineering 4
03 19CA2214 D Cloud Computing 3
04 19CA2219 D Ethical Hacking 3
05 19CA2220 D Cloud Web Services 3
06 19CA2221 D Powershell Scripting 4
Table 1.2. Course Outcomes
19UC1101
of
CO.. Course Outcome Mapped BTL
PO
CO 1 Apply the practical knowledge of using action words in PO5 1
sentence construction.
CO 4 Analyze the given conditions and finding out all the PO2 2
possible arrangements in linear & circular order.
Syllabus :
PART A
UNI NO . ASSESSME
TOPICS OF
T NT
NO HOUR
Interactive Grammar: Action Words-Modifiers,
Intensifiers, Connectives ---- 5 Passages- 5
Worksheets (Revision tests of Bridge Course topics)
1 -Parsing 16
Sentence Skills: Tense, Voice, Case, Gender,
Reported Speech, Syntax, Types of Sentences,
TEST-1
Syntactic Ordering.
Introduction to the Sounds of English: Basic
English Sounds, Distinctive Sounds of English,
2 Assimilation, Contraction, Elision, Twinning, 16
Stress, Syllables, Word- stress, Tone and Intonation-
Rising, Falling, Rise-fall and Fall-rise.
PART B
UNI TOPICS NO . ASSESSME
T OF NT
Language Laboratory Interactive: Esca talk,
JAM, Ranking, Shrinking Story, Desperate
3 15
Decision, Listening for Specifics, Pronunciation
Practice
TEST-2
Quantitative Aptitude: Permutations and
Combinations, Probability
4 13
Reasoning: Number and Letter Analogy, Odd Man
out, Analytical Reasoning-I
Total Contact hours 60
Tect Books:
1. Kerry Patterson, Joseph Grenny, Ron McMillan:Crucial Conversations:
Tools for Talking When Stakes Are High.Switzler: Paperback – Animated,
September 9, 2011.
2. Douglas Stone, Bruce Patton, Sheila Heen, and Roger Fisher :Difficult
Conversations: How to Have Conversations that Matter the Most
.Paperback – November 2, 2010
3. R.K. Bansal, J.B. Harrison: Spoken English. Delhi: Orient Black
Swan.2009.
4. Language LaboratoryTeacher Manual, KLEFU
19MT1105-FUNDAMENTALS OF MATHEMATICS
Credits 4
Contact Hours 60
CO
Verify the solution of problems through MATLAB. PO7 2
5
Syllabus:
PART A
UNI NO . ASSESSME
TOPICS
T OF NT
HOUR
Matrices : A quick review of the fundamental
concepts, Rank of a Matrix, Non-Singular and
Singular matrices, Elementary Transformations,
Inverse of a Non-Singular Matrix, Canonical form,
1 Normal form. Systems of Linear equations: 12
Homogeneous and Non Homogeneous Equations,
Characteristic equation of a matrix. (Relevant
sections of Text 1). (proof of all the theorems are to
be excluded.) TEST-1
Differential Calculus : A quick review of limits
of function, rules for finding limits, extensions of
limit concepts, derivative of a function,
2 11
differentiation rules, chain rule, rate of change and
simple applications of the rules. Extreme values of a
function Rolle’s Theorem, Mean Value Theorem .
PART B
UNI TOPICS NO . ASSESSME
T OF NT
3 Ordinary Differential Calculus: Introduction, 12 TEST-2
Formation of ODE by elimination of arbitrary
constants & functions. Solving first order ODE by
variable-separable method, linear equation &
Bernoulli’s equation for non-linear. Solving second
and higher order ODE with constant coefficient.
Complimentary functions and Particular Integrals
like e ax, sinax, x n. Solving by the method of
Variation of Parameters
Partial Differential Equations: Introduction,
formulation of Partial Differential Equation by
4 elimination of arbitrary constants and by 10
elimination of arbitrary function. Solution of the
first order equations using Lagrange’s method.
Total Contact hours 45
TEXT BOOKS:
REFERENCE BOOKS:
Virtual
Lab session List of Experiments
no
1 Introduction to MATLAB, Lab on matrix addition
Lab on matrix a)subtractionb) product.
2
19CA1101-PROGRAMMING IN C
Credits 4
Contact Hours 60
Reference Books:
Virtual LaB
S. No. Topic
1 Write a C Program to calculate Simple and Compound interest
12 string S2 from the terminal and check the given string S2 in the
string S1. If it does, remove string S2 from the string S1 and print the
updated string S1. ( For example S1 =Concatenate and S2 = cat , then
13 Program to read ten values to an array variable. Use pointers to locate
14 and display
Reverse the each value. using pointers ( i) String ( ii) N integer
following
Program to copyin contents
numbers stored any of one file to another file. Also find the
array.
15
number of characters, lines and words in the above file.
19CA1102-OPERATING SYSTEMS
Credits 4
Contact Hours 60
Text Books:
1. Silberschatz / Galvin / Gagne, Operating System,6thEdition,WSE (WILEY
Publication)
Reference Books:
1. William Stallings, Operating System, 4th Edition, Pearson Education.
2. Milan Milonkovic, Operating System Concepts and design, II Edition,
McGraw Hill 1992.
3. Tanenbaum, Operation System Concepts, 2nd Edition, Pearson Education.
4. H.M.Deitel, Operating systems, 2nd Edition ,Pearson Education
5. Nutt: Operating Systems, 3/e Pearson Education 2004
9. Write a c program that makes a copy of a file using standard I/O and
system calls
10. Implement in C the following UNIX commands using System calls
A. cat B.mv
12. Write a C program to list for every file in a directory, its inode number
and file name.
13. Write a C program to create a child process and allow the parent to
display “parent” and the child to display “child” on the screen.
Credits 4
Contact Hours 60
Table 1.6. Course
19CA1103
Outcomes of
CO. Course Outcome Mapped BTL
PO
PART A
UNI TOPICS NO . ASSESSME
T OF NT
Purpose of Database System, Views of data,
Database Languages, Database System
Architecture – Database users and Administrator,
E-R model, The relational Model, Domain
1 Relational Calculus, Tuple Relational Calculus , 12
Fundamental operations – Additional Operations,
SQL fundamentals, Constraints, working with TEST-1
Tables.
SQL : Integrity Constraints , Range Searching,
Pattern Matching, Grouping, Manipulation of data.
2 Joining tables ,Union, intersect & Minus Clause, 11
Views, , Granting Permissions, Creating Indexes,
Creating and managing User, Triggers – Security.
PART B
UNI TOPICS NO . ASSESSME
T OF NT
Embedded SQL– Dynamic SQL- Functional
Dependencies – First, Second, Third Normal
Forms, Dependency Preservation – Boyce/Codd
3 Normal Form-Multi-valued Dependencies and 12
Fourth Normal Form ,Fifth Normal Form.
Transactions : Transaction Concepts - Transaction TEST-2
Recovery – ACID Properties
Concurrency – Need for Concurrency – Locking
Protocols – Two Phase Locking – Intent Locking –
4 Recovery Isolation Levels – SQL Facilities for 6
Concurrency.
Total Contact hours 45
Text Books:
Reference Books:
1. RamezElmasri, Shamkant B. Navathe, “Fundamentals of Database
Systems”, Fourth Edition, Pearson/Addision Wesley
Lab Experiments:
Text Books:
1. Stephen Brown and ZvonkoVrane “Fundamentals of Digital Logic with
Verilog Design” Second Edition, McGraw-Hill.
2. M. Morris Mano, “Digital Logic and Computer Design”, Pearson
Reference Books:
1. R.P. Jain, “Modern digital Electronics”, Tata McGraw Hill, 4th edition,
2009
Credits 2
Contact Hours 30
Table 1.8. Course Outcomes of 19UC0009
Mapped
CO.. Course Outcome BTL
PO
Identify the importance of Environmental
CO 1 PO6,PSO2 1
education and conservation of natural resources.
Describe the importance of ecosystems and PO6,
CO 2 biodiversity. 1
PSO2
Apply the environmental science knowledge on
PO6,
CO 3 solid waste management, disaster management 2
PSO2
and EIA process.
Syllabus:
PART A
UNI NO . ASSESSME
TOPICS
T OF NT
II Semester
01 19UC1202 D English Proficiency 2
02 Object Oriented
4
19CA1201 D Programming Using Java
03 19CA1202 D Data Structures 4
04 19CA1203 D Computer Networks 4
05 19CA1205 D Probability and Statistics 3
06 Computer Architecture &
4
19CA1207 D Organization
07 Universal Human Values
2
19UC0010 D & Professional Ethics
19UC1202-ENGLISH PROFICIENCY
Credits 2
Contact Hours 30
Table Course Outcomes
19UC1202
2.2. of
Syllabus:
PART A
UNI NO . ASSESSME
TOPICS OF
T NT
NO HOUR
Writing Skills: How to Write a Definition, Defining
Technical Terms, Product and Process Description.
Advanced Grammar Skills: Transformation of
1 Sentences, Phrases, Clauses, Sentences—Simple, 16
Compound, Complex Sentences, Concord,Lexis
1:Synonyms, Antonyms, Analogies, Sentence TEST-1
Equivalence-One-Word Substitutes.
Language Laboratory Interactives: Debate,
2 Blind-fold, Role Play, Situation Reaction Test-- 15
Build an Island nation.
PART B
UNI TOPICS NO . ASSESSME
T OF NT
Quantitative Aptitude: Data Interpretation, Data
3 15
Sufficiency
TEST-2
Reasoning:Symbols and Notations, Clocks and
4 7
Calendars, Analytical Reasoning-II
Total Contact hours 60
Text Books:
Credits 4
Contact Hours 60
Syllabus:
PART A
UNI NO . ASSESSME
TOPICS
T OF NT
Reference Books:
1. Programming with Java, by E. Balagurusamy, McGraw Hill Education
2. SAMS teach yourself Java – 2: 3rd Edition by Rogers Cedenhead and
Leura Lemay Pub. Pearson Education.
1 Write Java program that defines a class and the class methods and
access variables through its objects.
2 Write a Java program demonstrating constructor overloading.
3 Write a java program that illustrates parameterized constructors
4 Write a java program that illustrates Default constructor.
5 Write a Java program demonstrating method overloading
6 Write a java program using inheritance with the help of 'super'
7 Write a java program using static methods.
8 Write a program where values of object variables are changed using
9 Write a java program that demonstrates the exception handling
10 Write a java program illustrating inter thread communication.
11 Demonstrate the usage of 'finally' keyword.
12 Write a java program that illustrates the multiple inheritance by using
13 Write a java program that copies contents of one file into another.
14 Write a program that creates a user interface to perform integer
15 java program that works as a simple calculator using grid layout.
16 Write a program that updates a table using JDBC connectivity.
19CA1202-DATA STRUCTURES
Credits 4
Contact Hours 60
Syllabus:
PART A
UNI NO . ASSESSME
TOPICS
T OF NT
Text Book:
Weiss, Data Structures and Algorithm Analysis in C, II Edition, Pearson
Education, 2001
Reference Books:
1. Lipschutz: Schaum’s outline series Data structures Tata McGraw-Hill
2. Data Structures by E. Balagurusamy, McGraw Hill Education
3. Tenenbaum, Data Structures. Pearson Education, 200
4. Kamthane: Introduction to Data Structures in C. Pearson Education 2005.
S. No. Topic
Credits 3
Contact 45
Hours
Syllabus:
PART A
UNI TOPICS NO . ASSESSME
T OF NT
Probability and Random variables: Definitions of
probability, Sample space, Axioms of probability,
1 Conditional probability, Addition, Multiplication 12
and Baye’s theorem. Random variables and its
properties.
TEST-1
Probability distributions: Binomial, Poisson,
Exponential and Normal distributions, Applications
2 of the above distributions.Correlation and 11
Regression: Correlation coefficient for ungrouped
data, Linear and Non-Linear Regression.
PART B
UNI TOPICS NO . ASSESSME
T OF NT
Tests of Hypothesis: Sampling distributions-Point
and Interval estimation. Confidence limits for
interval of mean and standard deviation. Large
3 12
sample and Small sample tests-for means. Chi-
square test for independence of attributes and TEST-2
goodness of fit
Analysis of Variance: General principles,
4 completely randomized designs, Randomized block 10
design and Latin square design.
Total Contact hours 45
Text books:
1. Ronald E. Walpole, Sharon L. Myers and Keying Ye, “Probability and
Statistics for Engineers and Scientists”, 8 th Edition, Pearson Pub.
Reference Books:
Credits 4
Contact Hours 60
Table:2.6 Course Outcomes of 19CA1207
Text Books:
1. Computer System Architecture by Morris Mano, PHI
2. Computer Organization and Architecture by William Stallings, PHI
Reference Books:
1. Digital Computer Electronics: An Introduction to Microcomputers by
Malvino, TMH
2. PC Hardware in a Nutshell by Barbara Fritchman Thompson, Robert Bruce
Thompson, O’Reilly, 2 nd Edition , 2010
3. Fundamentals of Computer Organization and Architecture by Mostafa AB-
EL-BARR and Hesham EL-REWNI, John Wiley and Sons
4. Fundamental Of computer Organization by Albert Zomaya, 2010
Credits 2
Contact 30
Hours
Syllabus:
PART A
UNI TOPICS NO . ASSESSME
T OF NT
Introduction to Value Education: Understanding
Value Education, Self-exploration as the Process for
Value Education, Continuous Happiness and
1 Prosperity - The Basic Human Aspirations, Right 12
Understanding, Relationship and Physical Facilities,
Happiness and Prosperity – Current Scenario,
Method to fulfill the Basic Human Aspirations.
TEST-1
Harmony in the Human Being: Understanding the
Human Being as Co-existence of Self (‘I’) and
Body, Discriminating between the Needs of the Self
2 and the Body, The Body as an Instrument of ‘I’, 11
Understand Harmony in the Self (‘I’), Harmony of
the Self (‘I’) with the Body, Program to Ensure
Sanyam and Svasthya.
PART B
UNI TOPICS NO . ASSESSME
T OF NT
Harmony in the Family and Society: Harmony in
the Family - the Basic Unit of Human Interaction,
Values in Human-to-Human Relationships, ‘Trust’ –
the Foundational Value in Relationships,
‘Respect’ – as the Right Evaluation,
Understand Harmony in the Society, Vision for the
3 12
Universal Human Order. Harmony in the Nature
(Existence): Understand Harmony in the Nature,
Interconnectedness, Self-regulation and Mutual
Fulfillment among the Four Orders of Nature,
Realizing ‘Existence is Co-existence’ at All Levels, TEST-2
The Holistic Perception of Harmony in Existence.
Implications of the Right Understanding – a
Look at Professional Ethics: Natural Acceptance
of Human Values, Definitiveness of (Ethical)
Human Conduct, A Basis for Humanistic Education,
4 Humanistic Constitution and Universal Human 10
Order, Competence in Professional Ethics, Holistic
Technologies, Production Systems and Management
Models - Typical Case Studies, Strategies for
Transition towards Value-based Life and Profession.
Total Contact hours 45
Text Book:
III Semester
Linux Administration 4
Information Storage and
Management 3
Principles of
Virtualization 3
Network & Information
Security 4
Installation and
Configuration of Server 4 19CA2106 -
LINUX
Client Side Scripting 4
ADMINISTRATION
Credits 4
Contact Hours 60
Syllabus:
PART A
UNI NO . ASSESSME
TOPICS OF
T NT
NO HOUR
INTRODUCTION TO LINUX AND UNIX : HISTORY OF
UNIX & LINUX , B ASIC CONCEPTS OF OPERATING
SYSTEMS, KERNEL, SHELL AND FILE SYSTEM
STRUCTURE
INSTALLATION OF LINUX : DIFFERENT TYPES OF
1 12
INSTALLATION METHODS , GUI ,TEXT
LINUX SYSTEM STRUCTURE : BASIC CONCEPTS OF
LINUX , DIFFERENCES BETWEEN RED HAT
ENTERPRISE LINUX & CENTOS , BASIC BASH
COMMANDS OF LINUX , E DITORS [GUI & CLI]
Reference Books :
Kirk Bauer.
Virtual LAB:
S. No. Topic
Installation of Red HAT Linux operating system.
a. Partitioning drives
1 b. Configuring boot loader (GRUB/LILO)
c. Network configuration
Setting time zones , Creating password and user accounts ,
2
Shutting down
3 Using gcc compiler (Programming using C).
Credits 3
Contact Hours 45
Text Books:
1. EMC Education Services, “Information Storage and Management: Storing,
Managing, and Protecting Digital Information”, Wiley Publishing Inc., 1st
edition, 2009.
2. Mauricio Arregoces, Maurizio Portolani, “Data Center Fundamentals”,
Cisco Press, 2003
Reference Books:
1. Robert Spalding , “Storage Networks: The Complete
Reference “, Tata McGraw Hill Publication, 2003
2. KailashJayaswal, “Administering Data Centers – Servers, Storage and
Voice over IP”, Wiley Publishing Inc., 2006.
19CA2117 - PRINCIPLES OF VIRTUALIZATION
Credits 3
Contact Hours 45
Syllabus:
PART A
UNI NO . ASSESSME
TOPICS OF
T NT
NO HOUR
Introduction
Text Books:
Reference Book:
3 Remote desktop
Operating connection
Systems.
4 Type1 and type2 hypervisor
5 ESXI Installation
6 ESXI Installation
Credits 4
Contact Hours 60
Syllabus:
PART A
UNI NO . ASSESSME
TOPICS OF
T NT
NO HOUR
Introduction : Security Definition, Why Security,
Security and its need, Current Trends and Statistics,
Basic Terminology, The C I A of Security
1 User identity and Access Management: 12
Authentication, Account Authorization, Validation,
Access Control and Privilege management.
Encryption and Decryption.. TEST-1
System and Server Security : System Security,
Desktop & Server Security, Firewalls, Password
cracking Techniques, Key-logger, viruses and
2 11
worms, Malwares & Spy wares, Windows Registry,
Vulnerability Assessment, Penetration Testing, Risk
Assessment, Threat, Vulnerability.
PART B
UNI TOPICS NO . ASSESSME
T OF NT
Network Security: Overview of Network Security,
Access Control, Security features on Switches,
Firewall, Types of firewall, Access Management,
Authentication, NAC.Network Intrusion Prevention
3 12
– Overview of Intrusion Prevention System (IPS),
Intrusion Detection System (IDS), Deploying IPS
and IPS high Availability; host Intrusion Prevention; TEST-2
Anomaly Detection and Mitigation.
Network Management : Security Monitoring
and correlation; Security Management - Security
4 and Policy Management and Security Framework 10
and Regulatory Compliance; Best Practices
Framework, Case Studie
Total Contact hours 45
Text Book:
1. Information Systems Security: Security Management, Metrics,
Frameworks And Best Practices - Nina Godbole, ISC2 Press, 2010
2. Network Security Bible by Eric Cole, Wiley; Second edition (2009)
Reference Books:
1. Principles of Information Security by Michael E. Whitman, Cengage
Learning India Private Limited; 5 edition (2015)
2. Network Security. Principles And Practice. Fifth Edition. William
Stallings. Prentice Hall.
Credits 4
Contact Hours 60
Syllabus:
PART A
UNI NO . ASSESSME
TOPICS OF
T NT
NO HOUR
Installing and Configuring Windows Server 2012
Introduction, Selecting&Installing a Windows
Server ,Server Roles and Features, Licensing,
Server Core : Defaults, Capabilities, Completing
1 Post-Installation Tasks, Converting Between GUI 12
and Server Core, Upgrade paths, Installing Windows
Server Migration Tools, Configuring NIC Teaming,
Configuring local storage, Configuring WDS to
install OS through networking.
TEST-1
Securing Files and Disks : How to Securing Files,
Encryption files with EFS, Configuring EFS, Using
the Cipher Command, Sharing Files Protected with
EFS with others, Configuring EFS with Group
Policies, Configuring EFS Recovery Agent,
2 11
Managing EFS Certificates, Encrypting Files with
BitLocker, Configuring BitLocker Encryption,
configuring BitLocker to Go, Configuring
BitLocker Policies, Managing BitLocker
Certificates.
PART B
UNI TOPICS NO . ASSESSME
T OF NT
3 Configuring DNS Zones and Records 12 TEST-2
Text Books:
Reference Book:
1. Administering Widows Server 2012 by Patrick Regan
2. Mastering Windows Server 2012 R2 by Mark Minasi, Kevin Greene,
Christian Booth, and Robert Butler.
Credits 4
Contact Hours 60
-
Text Books:
1. HTML5: Up and Running by Mark Pilgrim, O’Reilly, August 2010
Reference Books:
1. HTML5 For Web Designers by Jeremy Keith, June 2010
3.
1)HOME PAGE
2)Books Page
3)Details Page
DESCRIPTION:
1. HOME PAGE
Top frame : Logo and the college name and links to Home page, Login page,
Registration page, Catalogue page and Cart page (the description of these pages
will be given below).
Left frame : At least four links for navigation, which will display the catalogue
of respective links. For e.g.: When you click the link “CSE” the catalogue for
CSE Books should be displayed in the Right frame.
Right frame: The pages to the links in the left frame must be loaded here.
Initially this page contains description of the web site.
The catalogue page should contain the details of all the books available in the
web site in a table. The details should contain the following:
9. Draw line, rectangle, circle, polygon(star) and rounded rectangle using HTML5
13. Insert audio and video using all audio/video tags and attributes.
14. Develop a page that uses canvas to draw a line, triangle and a circle.
Develop following animation using canvas. Horizontal motion of an object1,
15. vertical motion of object2 and diagonal motion of object3.
19CA2201-PYTHON PROGRAMMING
Credits 4
Contact Hours 60
Text Books:
Reference Books:
1. FLUENT PYTHON: CLEAR, CONCISE, AND EFFECTIVE PROGRAMMING
2. PYTHON COOKBOOK, THIRD EDITION BY DAVID BEAZLEY AND BRIAN K.
JONES.
3. HOW TO THINK LIKE A COMPUTER SCIENTIST: LEARNING WITH
PYTHON, BY ALLEN DOWNEY , JEFF ELKNER AND CHRIS MEYERS
Lab Experiments:
S. No. Topic
1 Write programs to use the basic data types and operators of python.
Credits 4
Contact Hours 60
Reference Book:
1. Roger S. Pressman, “Software Engineering – A practitioner’s Approach”,
Sixth Edition, McGraw-Hill International Edition, 2005
Credits 3
Contact Hours 45
Syllabus:
PART A
UNI NO. ASSESSME
TOPICS OF
T NT
NO HOUR
Fundamentals of Cloud Computing : Cloud
Computing Basics – History of Cloud Computing,
Characteristics of Cloud Computing, Need for Cloud
computing, Advantages and Possible Disadvantages
of cloud computing, Cloud Deployment Models –
Public, Private, Hybrid, Community, Other
1 8
deployment Models. Evolving Data Center into
Private Cloud, Datacenter Components, Extracting
Business value in Cloud Computing – Cloud
Security, Cloud Scalability, Time to Market,
Distribution over the Internet, Cloud Computing
Case Studies.
TEST-1
Cloud Delivery Models : Introduction to Cloud
Services, Infrastructure as a Service (IaaS) –
Overview, Virtualization, Container, Pricing Models,
Service Level Agreements, Migrating to the Cloud,
IaaS Networking options, Virtual Private
Cloud(VPC), IaaS Storage – File and Object storage,
Data Protection, IaaS security, Benefits, Risks and
2 8
Examples of IaaS. Platform as a Service (PaaS) –
Overview, IaaSvsPaaS, PaaS Examples, benefits and
risks. Software as a Service (SaaS) – Introducing
SaaS, SaaS Examples – Office 365, Google G Suite,
Salesforce.com , Evaluating SaaS – user and vendor
perspective, Impact of SaaS, Benefits and risks of
SaaS.
PART B
UNI TOPICS NO. ASSESSME
T OF NT
Cloud Platforms : Introducing Cloud
Platforms, Evaluating cloud platforms, Cloud
Platform technologies – Amazon Web
Services, Microsoft Azure, Google Cloud
Platform, Salesforce.com, and Impact of
Cloud platforms. Private Cloud Platforms –
3 8
Introducing Private clouds – Microsoft Azure
stack, Open stack, AWS Greengrass, Impact
of Private clouds.. Cloud Computing - TEST-2
Challenges, Risk and Mitigation : Cloud
Storage, Application performance, Data
Integration, Security
Ensuring Successful Cloud Adoption:
Designing a Cloud Proof of Concept, Vendor
roles and capabilities, moving to the Cloud.
4 Impact of Cloud on IT Service Management 6
Risks and Consequences of Cloud
Computing – Legal Issues, Compliance
Issues, Privacy and Security.
Text Books:
1. Kirk Hausman, Susan L. Cook, TelmoSampaio, “ CLOUD ESSENTIALS
CompTIA® Authorized Courseware for Exam CLO-001”, John Wiley &
Sons Inc., 2013
2. Judith Hurwitz , Robin Bloor , Marcia Kaufman , Fern Halper, “Cloud
Computing for Dummies”, Wiley Publishing Inc., 2010
Reference Books:
1. Erl,” Cloud Computing: Concepts, Technology & Architecture”, Pearson
Education, 2014
2. Srinivasan, “Cloud Computing: A Practical Approach for Learning and
Implementation
“Pearson Education, 2014
LAB Experiments:
S. No. Topic
1 Cloud Computing & Architecture Types of Cloud Computing
2 Creating and running virtual machines on open source OS.
3 Installing OpenStack and use it as Infrastructure as a Service
4 Installation and understanding features of ownCloud as SaaS.
5 Installing and using identity management feature of OpenStack
6 Write a program for web feed
7 installing and using JOSSO
8 Installing and using security feature of ownCloud
9 Installing and using Administrative features of ownCloud
10 Case study on Amazon EC2.
11 Case study on Microsoft azure.
12 creating a cloud like social site for institute.
13 Cloud Computing & Architecture Types of Cloud Computing
14 Creating and running virtual machines on open source OS.
15 Installing OpenStack and use it as Infrastructure as a Service
Credits 3
Contact Hours 45
Syllabus:
PART A
UNI NO. ASSESSME
TOPICS OF
T NT
NO HOUR
Introduction to Ethical Hacking: Hacking
Methodology, Process of Malicious Hacking, and
Foot printing and scanning: Foot printing, scanning.
1 Enumeration: Enumeration. System Hacking and 8
Trojans: System Hacking, Trojans and Black Box Vs.
White Box Techniques
TEST-1
Hacking Methodology: Denial of Service, Sniffers,
Session Hijacking and Hacking Web Servers: Session
Hijacking, Hacking Web Servers. Web Application
2 Vulnerabilities and Web Techniques Based Password 8
Cracking: Web Application Vulnerabilities, Web
Based Password Cracking Techniques
PART B
UNI TOPICS NO. ASSESSME
T OF NT
Web and Network Hacking : SQL Injection,
Hacking Wireless Networking, Viruses, Worms and
3 Physical Security: Viruses and Worms, Physical 8
Security. Linux Hacking: Linux Hacking. Evading
IDS and Firewalls: Evading IDS and Firewalls
TEST-2
Report writing & Mitigation : Introduction to
Report Writing & Mitigation, requirements for low
4 level reporting & high level reporting of Penetration 6
testing results, Demonstration of vulnerabilities and
Mitigation of issues identified including tracking
Text Books:
1. Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition Paperback
– 1 Jul 2017 by Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle,
McGraw Hill Education; 3 ed (1 July 2017)
2. CEH v9: Certified Ethical Hacker Version 9 Study Guide by Sean-Philip
Oriyano, Sybex; Stg edition (17 June 2016)
Reference Books :
1. Hacking for Beginners: Ultimate 7 Hour Hacking Course for Beginners.
Learn Wireless Hacking, Basic Security, Penetration Testing by Anthony
Reynolds, CreateSpace Independent Publishing Platform (10 April 2017)
2. An Ethical Guide To WI-FI Hacking and Security by SwaroopYermalkar,
BecomeShakespeare.com; First edition (15 August 2014) Hands-On
Ethical Hacking and Network
LAB:
S. No. Topic
1 Installing kali linux, windows 7, windows 10
2 Phishing Attacks
3 The real time practice of Injections which mainly includes SQL
4 TCP/IP High
Injection, Jacking
Server Side Injection, Command Injection and HTML
5 Social Engineering
6 Administrative password cracking.
7 Hacking windows 7, windows 8, windows 10 using metasploit.
8 Hacking windows 7, 8, 10 using backdoor.
9 Website hacking with Cross Site Scripting
10 Creating trojans in windows operating System
11 Using cryptors to encrypt a virus file.
12 Bypassing anti-virus using kali linux
13 Creating wordlists using crunch.
14 Experiment on DDOS attack
Contact Hours 45
PO4,8, 2
CO 4 To explain the method of fault tolerance in cloud
PSO1
SYLLABUS:
PART A
UNI NO. ASSESSME
TOPICS OF
T NT
NO HOUR
Cloud Computing As A Service : Cloud Computing,
Software-as-a-service: SaaS, Platform-as-a-service:
PaaS, Hardware-as-a-service: HaaS, Infrastructure-
as-a-service: IaaS, Google Cloud Infrastructure,
Google File System, Search engine, Apache Hadoop,
1 12
Grid Computing, Amazon Web Services, REST APIs,
SOAP API, Query API, User Authentication,
Connecting to the Cloud, Open SSH Keys, Tunneling
TEST-1
/ Port Forwarding, Image (glance), Object Storage
(swift), ACL,Logging,Signed URI, Compute (nova).
Networking Basics : Overview, Keypairs, Network
Types, LAN, Gateways and Router, IP Classes and
Subnets, CIDR, Utilities, Instances Management,
2 11
Image Management, Security groups, Block Storage
(cinder), Ubuntu in the Cloud, Installation, Utilities,
File system, Shell.
PART B
UNI TOPICS NO. ASSESSME
T OF NT
Programming and ControlStructures : Business
context, aligning business objectives with security
architecture, operational risk and impact assessment,
influence of business processes, workflow,
3 12
organizational structure on security architecture,
location and time dependencies, security
architectural layering, entity model and trust TEST-2
framework, security domain model, case studies
Backup and Recovery : Backup and Recovery,
Database Sharding, Compute (nova) Applications,
Web application design, Focus on Search Engine,
4 10
Security, Firewall, Data, Network and Host Compute
(nova) Capacity Planning, Apache Servers, Mysql
Servers.
Total Contact hours 45
Text Books:
1. Cloud Computing: Principles and Paradigms, Editors: RajkumarBuyya,
James Broberg, Andrzej M. Goscinski, Wiley, 2011
2. OpenStack Essentials by Dan Radez (Author)
Reference Books:
1. OpenStack Cloud Computing Cookbook - Third Edition by Egle Sigler,
Cody Bunch, Kevin Jackson
2. Cloud Computing Explained: Implementation Handbook for Enterprises,
John Roton, Recursive Press (November 2, 2009).
Credits 4
Contact Hours 60
PO 1,4,6, 2
CO 1 Understanding command syntax
PSO1
Text Book:
1. Windows Powershell Cookbook By Leeholmes& Dean Tsaltas, Published
By Shroff Publishers & Distribution.
Reference Books:
LAB:
S. No. Topic
1 Exploring Windows PowerShell
2 View object metadata
3 Creating and manipulating variables
4 Iteration Statements
5 Working with strings
6 Creating a script file
7 Creating functions
8 Working with providers
9 Working with Windows PowerShell ISE
10 Active directory administration
11 Create an Interactive Session with a Remote Machine
12 Create a Session Configuration
13 Execute Remote Commands
14 Exploring Windows PowerShell
15 View object metadata
V Semester
01 19BL42C3 D Cyber Law 4
02 Virtualization and Cloud
19CA3119 D Security 4
03 19CA3120 D Cloud Deployment 4
19BL42C3-CYBER
04 19CA3121 D Digital Forensics 4 LAWS
05 19CA3123 D Hybrid Cloud Computing 4
06 Administrating Cloud
Credits 4
Services(Elec-I)/ Google
App Engine (Elec-I) 4
19CA3124
Contact HoursD 60
/19CA3125 D (Select any one subject)
PART B
UNI TOPICS NO. ASSESSME
T OF NT
E Commerce, Salient Features, Online approaches
like B2B, B2C & C2C, Online contracts Click Wrap
Contracts, Applicability of Indian Contract Act,
1872.
3 Intellectual Property Issues in Cyber Space, Interface 15 TEST-3
with Copyright Law, Patent Law, Trademarks &
Domain Names, Dispute Resolution in Cyberspace,
Jurisdictional problems etc.,
International Perspectives UN & International
Telecommunication Union (ITU) Initiatives, Council
of Europe, Budapest Convention on Cybercrime,
Asia-Pacific Economic Cooperation (APEC),
4 Organization for Economic Co-operation and 8
Development (OECD), World Bank, Commonwealth
of Nations
Text Books:
1. Sudhir Naib, The Information Technology Act, 2005: A Handbook, OUP, New
York, (2011)
2. S. R. Bhansali, Information Technology Act, 2000, University Book House
Pvt. Ltd., Jaipur (2003).
Reference Books:
1. Chris Reed & John Angel, Computer Law, OUP, New York, (2007).
2. Justice Yatindra Singh, Cyber Laws, Universal Law Publishing Co, New Delhi,
(2012).
3. Verma S, K, Mittal Raman, Legal Dimensions of Cyber Space, Indian Law
Institute, New Delhi, (2004)
4. Jonthan Rosenoer, Cyber Law, Springer, New York, (1997).
Credits 4
Contact Hours 60
Syllabus:
PART A
UNI NO. ASSESSME
TOPICS OF
T NT
NO HOUR
Introduction to Virtualization & Cloud :
Virtualization and Cloud computing concepts,
Private cloud Vs Public cloud, IAAS, PAAS & SAAS
1 concepts, Virtualization security concerns, 8
Hypervisor Security, Host/Platform Security,
Security communications, Security between Guest
instances, Security between Hosts and Guests TEST-1
Cloud Controls Matrix &Top Cloud
Threats :Introduction to Cloud Controls Matrix &
Top Cloud Threats, Cloud Controls Matrix, Trusted
2 8
Cloud Initiative architecture and reference model,
requirements of Security as a Service (Secaas) model
and Top Security threats to the cloud model
PART B
UNI TOPICS NO. ASSESSME
T OF NT
Cloud Security :Cloud Security vulnerabilities and
mitigating controls, Cloud Trust Protocol, Cloud
3 8
Controls Matrix. Complete Certificate of Cloud
Security Knowledge (CCSK)
Cloud Trust Protocol &Transparency :Introduction TEST-2
to Cloud Trust Protocol & Transparency, Cloud Trust
4 Protocol and Transparency, Transparency as a 6
Service, Concepts, Security, Privacy & Compliance
aspects of cloud
Total Contact hours 30
LAB:
S. No. Topic
1 Security Design and Architecture for Cloud Computing
2 Secure Isolation o Comprehensive data protection
3 End-to-end access control o Monitoring and auditing
4 Quick look at CSA, NIST and ENISA guidelines for Cloud
5 Security
Common attack vectors and threats
6 Secure Isolation of Physical & Logical Infrastructure
7 Data Protection for Cloud Infrastructure and Services
8 Monitoring, Auditing and Management
9 Cloud Design Patterns
10 Identity Management in Cloud Computing
11 Cloud VM Platform Encryption
12 Security Patterns for Cloud Computing – Network Security,
13 Identity & Access Management
Policy, Compliance & Trust in Cloud Computing
& Risk Management
14 Security Design and Architecture for Cloud Computing
15 Secure Isolation o Comprehensive data protection
Text Book:
Reference Books:
1. Visible Ops Private Cloud – Andi Mann, Kurt Miline and Jeanne Morain,
IT Process Institute, Inc.; first edition (April 8, 2011)
2. Cloud Computing Explained – John Rhoton 2009
3. 19CA3120 - CLOUD DEPLOYMENT
4.
Credits 4
Contact Hours 60
5.
6. Table:5.4 Course Outcomes of 19CA3120
CO. Course Outcome Mapped BTL
No PO
Introduction to EC2
Introduction To EC2, Instance Types And Uses,
Autoscaling Instances, Amazon Machine Images
(AMIS), Modifying Existing Images, Creating New
2 Images Off Of Running Instances, Converting An 11
Instance Store AMI To An EBS AMI, Instances
Backed By Storage Types, Creating A Web Server
Using Ec2, Elastics Block Storage (EBS), Elastic
IPS, Route 53 DNS System, Cloudfront SNS Pricing.
PART B
UNI TOPICS NO. ASSESSME
T OF NT
S3, Cloudwatch, Elastic Beanstalk And Security
Introduction To S3, Buckets And Objects, Security,
Creating A Web Server Using S3 Endpoints,
Introduction To Cloudwatch, Creating Alarm
Notifications, Autoscaling Instances, Deploying
3 Scalable Application On AWS, Selecting And 12
Launching An Application Environment,
Provisioning Application Resources with Cloud
formation.
Describe Amazon Dynamo, Understand key aspects TEST-2
of Amazon RDS, Launch an Amazon RDS instance.
Credits 3
Contact Hours 45
Syllabus:
SYLLABUS:
PART A
UNI NO. ASSESSME
TOPICS OF
T NT
NO HOUR
Computer Forensics : Introduction to Computer
Forensics, Forms of Cyber Crime, First Responder
Procedure- Non-technical staff, Technical Staff,
Forensics Expert and Computer Investigation
1 procedure, Case Studies 8
Storage Devices & Data Recover Methods : Data
Acquisition, Data deletion and data recovery method
and techniques, volatile data analysis, Case Studies
Forensics Techniques I : Windows forensic, Linux
Forensics, Network forensics – sources of network- TEST-1
based evidence, other basic technical fundamentals,
Network forensic investigative strategies, technical
aspects, statistical flow analysis, packet analysis,
2 forensics of wireless networks, network intrusion 8
detection analysis, event log aggregation and
correlation analysis, switches, routers and firewalls,
Case Studies, Mobile Forensics – data extraction &
analysis, Steganography, Password cracking, Case
Studies
PART B
UNI TOPICS NO. ASSESSME
T OF NT
Forensics Techniques II : Cross-drive analysis, Live
analysis, deleted files, stochastic forensics,
3 Dictionary attack, Rainbow attack, Email Tacking – 8
Header option of SMTP, POP3, IMAP, examining
browsers, Case Studies TEST-2
Cyber Law : Corporate espionage, digital evidences
handling procedure, Chain of custody, Main features
4 6
of Indian IT Act 2008 (Amendment), Case Studies,
Incident specific procedures
Total Contact hours 30
Text Books:
1. Computer Forensics: Computer Crime Scene Investigation by John Vacca,
Laxmi Publications, 1 st ed; 2015
2. Digital Forensic: The Fascinating World of Digital Evidences by Nilakshi
Jain, et.al, Wiley, 1 st ed; 2016
Reference Books:
1. Hacking Exposed Computer Forensics by Aaron Philipp, David Cowen,
McGraw Hill, 2 nd ed; 2009
2. Mastering Mobile Forensics by SoufianeTahiri, Packt Publishing, 1 st ed;
2016
3. Computer Forensics: A Beginners Guide by David Cowen, McGraw Hill,
1 st ed; 2013
LAB Experiments:
S. No. Topic
1 Generate Hashes using MD5 calculator.
2 Store digital evidences in database using Autopsy.
3 Recover deleted files with Foremost.
4 Extracting information about processer using Process Explorer.
5 Observe the recent activities done by the USER.
6 Encrypting and compressing a file with FTK Tool.
7 Observe the devices connected through USB.
8 Cracking passwords using Rainbow Crack.
9 Finding details of Domain using SmartWhois.
10 Crack a password of zip file in Kali Linux.
11 File Recover using Quick Recovery Tool.
12 Generate Hashes using MD5 calculator.
13 Store digital evidences in database using Autopsy.
19CA3123 - HYBRID CLOUD COMPUTING
Credits 3
Contact Hours 45
Syllabus:
PART A
UNI NO. ASSESSME
TOPICS OF
T NT
NO HOUR
The Hybrid Cloud : Explaining Hybrid Cloud,
Services for Hybrid Cloud environment,
Requirements for cloud Integration, Hybrid Cloud
Management – Cloud Service management, Impact
of Virtualization in Hybrid Cloud, Hybrid Cloud
1 12
service Management Plan.Managing Hybrid Cloud
Environment : Managing and Integrating Data,
Managing Hybrid Workloads, Architectural
Considerations, Development and Deployment in a
Hybrid Cloud, Virtualization and the Hybrid Cloud.
TEST-1
Hybrid Cloud Strategy : Planning Hybrid
Cloud Strategy – Identifying Starting points,
Plan for providing resources, supporting
dynamic lifecycle, Complexity in cloud,
Balancing costs and benefits, managing data
2 11
storage in cloud – Hybrid cloud storage
considerations, Support for storage growth
and changes, Hybrid Cloud Resources, Hybrid
Cloud Best Practices, Do’s and Don’ts of
Hybrid Cloud.
PART B
UNI TOPICS NO. ASSESSME
T OF NT
3 Azure as a Platform for Hybrid Cloud : 12 TEST-2
Execution Models – Websites, cloud services,
Virtual machines, Data Management – SQL
database, Storage Tables, Blobs, CDN,
Bigdata, Messaging and Integration
Components – Service Bus, Virtual Network,
Traffic Manager, BizTalk services, Media and
Mobile services, Supporting services –
Caching, Identity Management, Private Cloud
Components and services to build Hybrid
Cloud.
Hybrid Options in Windows Azure : On-
Premises Service Integrated with cloud
4 service – Using Windows azure services bus 10
and virtual networks, Cloud services
integrated with On-Premise service.
Total Contact hours 45
Text Books:
1. Judith Hurwitz , Marcia Kaufman , Fern Halper , Daniel Kirsch, “ Hybrid
Cloud for Dummies“, John Wiley & Sons Inc., 2 nd Edition, 2012
Reference Books:
1. Danny Garber, “Windows Azure Hybrid Cloud”, “,
John Wiley & Sons Inc., 2013
Elective – I
Credits 4
Contact Hours 60
Syllabus:
SYLLABUS:
PART A
UNI NO. ASSESSME
TOPICS OF
T NT
NO HOUR
CLOUD APPLICATIONS: Technologies and the
processes required when deploying web services;
1 12
Deploying a web service from inside and outside a
cloud architecture, advantages and disadvantages
MANAGEMENT OF CLOUD SERVICES TEST-1
Reliability, availability and security of services
2 deployed from the cloud. Performance and 11
scalability of services, tools and technologies used to
manage cloud services deployment;
PART B
UNI TOPICS NO. ASSESSME
T OF NT
Cloud Economics : Cloud Computing infrastructures
available for implementing cloud based services.
Economics of choosing a Cloud platform for an
3 organization, based on application requirements, 12
economic constraints and business needs (e.g
Amazon, Microsoft and Google, Salesforce.com, TEST-2
Ubuntu and Redhat)
APPLICATION DEVELOPMENT Service creation
environments to develop cloud based applications.
4 10
Development environments for service development;
Amazon, Azure, Google App.
Total Contact hours 45
Text Books:
1. Gautam Shroff, “Enterprise Cloud Computing Technology Architecture
Applications”, Cambridge University Press; 1 edition, [ISBN: 978- 0521137355],
2010.
Reference Books:
1. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A
Practical Approach” McGraw-Hill Osborne Media; 1 edition [ISBN:
0071626948], 2009.
2. Dimitris N. Chorafas, “Cloud Computing Strategies” CRC Press; 1 edition
[ISBN: 1439834539],2010.
LAB Experiments:
S. No. Topic
1 Implementation Of Infrastructure As A Service.
2 Cloud Computing & Architecture
3 Installation And Configuration Of Virtualization Using KVM.
4 Implementation Of Infrastructure As A Service
5 Implementation Of Storage As A Service
6 Implementation Of Identity Management
7 Cloud Security Management
8 Write A Program For Web Feed.
9 Implementation Of Single-Sing-On.
10 User Management In Cloud.
11 Case Study On Amazon EC2/Microsoft Azure/Google Cloud
Platform
Elective – I
Credits 4
Contact Hours 60
Text Books:
Reference Books :
1. Beginning Java Google App EngineBook by Jeff
Douglas and Kyle Roche
LAB:
S. No. Topic
1 Introducing Google Cloud Platform
2 Create a project using the Cloud Platform Console
3 Deploy a LAMP stack using Google Cloud Launcher
4 Deploy a sample Python application called Bookshelf to the App
5 Engine
Test thestandard runtime
Bookshelf environment
application and inspect data saved to Cloud
6 Datastore
Create a Google Cloud Storage bucket to store images
7 Deploy an App Engine application that uses Cloud Storage
8 Create a Google Compute Engine instance
9 Deploy the Bookshelf application using a startup script
10 Add a firewall rule to allow HTTP traffic to the application
11 Create a container cluster using the Cloud SDK
12 Build and push a Bookshelf image to Container Registry
13 Use kubectl to deploy the Bookshelf container
14 Load a CSV file into a BigQuery table using the web UI
15 Query the data using the BigQuery web UI
VI Semester
VI Semester
Intellectual Property
Rights (Elec-II)/ IT
Governance, Risk, &
4
Information Security
Management (Elec-II)
(Select any one subject)
14 Elective-II
Major Project
Credits 4
Contact Hours 60
S. No. Topic
Case Studies on the following
1 Agencies And Treaties
7 Patent Law
17 False Advertising
TEXT BOOKS
REFERENCES:
Elective – II
Syllabus:
PART A
UNI NO. ASSESSME
TOPICS OF
T NT
NO HOUR
IT Governance : Introduction & Concepts, Role of
Governance in Information Security, Best Practices
1 for IT Governance. Role of IT Strategy Committee, 8
Standard IT Balanced Scorecard. Val-IT framework
TEST-1
of ISACA
Information Systems Strategy : Role of Strategic
2 Planning for IT, Role of Steering committee, Policies 8
and Procedures
PART B
UNI TOPICS NO. ASSESSME
T OF NT
Risk Management Program : Develop a Risk
Management Program. Risk Management Process
3 8
Risk Analysis methods. Risk-IT Framework of
ISACA
TEST-2
Information Security Management :
Introduction, Performance Optimization, IT Security
4 6
roles & responsibilities, Segregation of Duties,
Description of COBIT and other Frameworks
Total Contact hours 30
Text Books:
1. Information Security Governance by S.H. Solms, RossouwSolms,
Springer; 1st Edition. 2nd Printing, 2008 edition (12 December 2008)
Reference Books:
1. IT Governance: An International Guide to Data Security and
ISO27001/ISO27002 by Alan Calder, Steve Watkins, Kogan Page; 6
edition (3 September 2015)
2. ISACA publications on COBIT, RiskIT and ValIT
3. Information Security Governance: Guidance for Information Security
Managers by W. KragBrotby and IT Governance Institute, Isaca (2 June
2008)
4. COBIT 5 Framework Perfect by Isaca, (10 April 2012)
Credits 14
The students will undertake a project as part of their final semester . The students
can do independent projects or can take up projects in groups of two or more
depending on the complexity of the project. The maximum group size will be
four and in case of team projects there should be a clear delineation of the
responsibilities and work done by each project member. The projects must be
approved by the mentor assigned to the student. The mentors will counsel the
students for choosing the topic for the projects and together they will come up
with the objectives and the process of the project. From there, the student takes
over and works on the project.
If the student chooses to undertake an industry project, then the topic should be
informed to the mentor, and the student should appear for intermediate
valuations. Prior to undertaking this project the students undergo a bridge course.
Bridge Course:
The bridge course ensures that all the students have the correct prerequisite
knowledge before their industry interface. The purpose of a bridge course is to
prepare for a healthy interaction with industry and to meet their expectations. It
would be difficult to establish standards without appropriate backgrounds and
therefore to bridge this gap, students are put through a week mandatory
classroom participation where faculty and other experts will give adequate inputs
in application based subjects, IT and soft skills.
The Project:
Each student will be allotted a Faculty Guide and an Industry Guide during the
internship/project work. Students need to maintain a Project Diary and update the
project progress, work reports in the project diary. Every student must submit a
detailed project report as per the provided template. In the case of team projects,
a single copy of these items must be submitted but each team member will be
required to submit an individual report detailing their own contribution to the
project.
The Project evaluator(s) verify and validate the information presented in the
project report.
1. Internal Evaluation
2. External Assessment
3. Viva Voce
Internal Evaluation:
Internal Evaluator of project needs to evaluate Internal Project work based on the
following criteria:
External Evaluation:
The Project evaluator(s) perform the External Assessment based on the following
criteria.
Understanding of the Project Concept
Delivery Skill
The Final Project Report
Originality and Novelty
Marking Scheme:
For e.g., if the total mark for the project is 100, then
The Project evaluator(s) verifies and validates the information presented in the
sheet.