M.TECH COMPUTER SCIENCE AND ENGINEERING | |
Course Outcomes | |
Semester: 1 | |
Data Communication and Computer Networks (16CSE21C1) | |
16CSE21C1.1 | Describe the various data communication techniques and outline the need of computer network and the importance of computer network in our society. |
16CSE21C1.2 | Identify the different types of network topologies and protocols and enumerate the layers of the OSI model and TCP/IP. |
16CSE21C1.3 | Understand and Apply the skills of subnetting and routing mechanisms to establish data communication between different networks. |
16CSE21C1.4 | Understand and explain Data Communications System and its components. Examine different protocols which are used in Data Link Layer. |
16CSE21C1.5 | Distinguish different basic protocols of computer networks, and how they can support in network design and implementation. |
Advanced Operating Systems (16CSE21C2) | |
16CSE21C2.1 | Outline the potential methods of advanced operating system and generate document for classification of these methods. |
16CSE21C2.2 | Summarize and Review the major security issues associated with distributed systems along with the range of techniques available for increasing system security. |
16CSE21C2.3 | Interpret algorithm of distributed system considering process synchronization, memory management, reliability and concurrency control and design and write a report of finding efficient methods on these issues. |
16CSE21C2.4 | Differentiate different techniques of distributed systems and Examine significance of methods used in advanced operating system. Investigate deadlock problem in modern operating system and resolution of this issue. |
Advanced Database Management System (16CSE21C3) | |
16CSE21C3.1 | Define the basic concepts of ER model & its Enhanced Model and concept of Object Oriented database. |
16CSE21C3.2 | Discuss the architecture of Parallel, Distributed Database. |
16CSE21C3.3 | Apply different tools and technique in data warehouse design. |
16CSE21C3.4 | Compare Emerging Database technologies DB2, ORACLE, GIS. |
Data Warehouse and Mining (16CSE21C4) | |
16CSE21C4.1 | Describe the fundamental concepts, benefits and problem areas associated with data warehousing. |
16CSE21C4.2 | Discuss the various architectures and main components of a data warehouse. |
16CSE21C4.3 | Compare and contrast OLAP and data mining as technique for extracting knowledge from a data warehouse. |
16CSE21C4.4 | Evaluate different data mining techniques like classification, prediction, clustering and association rule mining. |
16CSE21C4.5 | Design a data warehouse and be able to address issues that arise when implementing a data warehouse. |
Mathematical Foundation of Computer Science (16CSE21C5) | |
16CSE21C5.1 | Recall different languages and grammars in automata theory. |
16CSE21C5.2 | Understand different computational models of automata theory. |
16CSE21C5.3 | Apply rigorously formal mathematical methods to prove properties of languages, grammars and automata. |
16CSE21C5.4 | Analyze the utility of automata theory for machine learning. |
Seminar (16CSE21C6) | |
16CSE21C6.1 | Identify relevant information, defining and explain topics under discussion. |
16CSE21C6.2 | Understand problem solving skills and apply theoretical knowledge. |
16CSE21C6.3 | Demonstrate the ability to learn and write both informal (scientific note taking) and formal (research paper) writing. |
16CSE21C6.4 | Calculate information, use and apply relevant theories. |
16CSE21C6.5 | Judge when to speak and how much to say, speak clearly and audible in a manner appropriate to the subject. |
16CSE21C6.6 | Develop ideas through creating work. |
Advanced Database Management System Lab (16CSE21CL2) | |
16CSE21CL2.1 | Define Basic PL/SQL Commands. |
16CSE21CL2.2 | Differentiate various PL/SQL Commands. |
16CSE21CL2.3 | Apply different queries using PL/SQL for creating and accessing database. |
16CSE21CL2.4 | Design and implement a database schema for a given problem-domain. |
Advanced Operating Systems Lab (16CSE21CL1) | |
16CSE21CL1.1 | List various commands of operating system and generate document with description of commands. |
16CSE21CL1.2 | Construct and Design various shell programs for real world problems. |
16CSE21CL1.3 | Develop programs for algorithm of distributed system considering process synchronization, memory management, reliability and concurrency control and design & write a report of finding. |
16CSE21CL1.4 | Differentiate different algorithms of distributed systems and compare deadlock handling techniques in modern operating system implementing practically. |
Semester: 2 | |
Soft Computing (16CSE22C1) | |
16CSE22C1.1 | Recall the basic concepts of neural and fuzzy logic to abstract and conceptualize to get domain knowledge and describe how Biological Neural Network and Artificial Neural Network are related to each other. |
16CSE22C1.2 | Identify and interpret the existing different neural network architectures, algorithms, applications and their limitations. |
16CSE22C1.3 | Demonstrate the concepts of fuzzy sets, knowledge representation using fuzzy rules, approximate reasoning, fuzzy inference systems, and fuzzy logic using MATLAB. |
16CSE22C1.4 | Examine appropriate learning rules for each of the architectures and provide software solution for improving the existing robots. |
16CSE22C1.5 | Evaluate different applications of ANN models to evaluate engineering and other problems in real world. |
Algorithm Design (16CSE22C2) | |
16CSE22C2.1 | Recognize the general principles and good algorithm design techniques for developing efficient computer algorithms. |
16CSE22C2.2 | Classify Execute sorting algorithms such as sorting, graph related and combinatorial algorithm in a high level language. |
16CSE22C2.3 | Demonstrate the performance of merge sort and quick sort algorithms using divide and conquer technique. |
16CSE22C2.4 | Design algorithms using divide and conquer, greedy and dynamic programming. |
16CSE22C2.5 | Construct the dynamic programming technique to solve real world problems such as knapsack and TSP. |
Seminar (16CSE22C3) | |
16CSE22C3.1 | Identify relevant information, defining and explain topics under discussion. |
16CSE22C3.2 | Understand problem solving skills and apply theoretical knowledge. |
16CSE22C3.3 | Demonstrate the ability to learn and write both informal (scientific note taking) and formal (research paper) writing. |
16CSE22C3.4 | Calculate information, use and apply relevant theories. |
16CSE22C3.5 | Judge when to speak and how much to say, speak clearly and audible in a manner appropriate to the subject. |
16CSE22C3.6 | Develop ideas through creating work. |
Soft Computing Lab (16CSE22CL1) | |
16CSE22CL1.1 | Recognize the feasibility of applying a soft computing methodology for a particular problem. |
16CSE22CL1.2 | Apply fuzzy logic and reasoning to handle uncertainty and solve engineering problems. |
16CSE22CL1.3 | Apply neural networks to pattern classification and regression problems. |
16CSE22CL1.4 | Effectively use existing software tools to solve real problems using a soft computing approach. |
Algorithm Design Lab (16CSE22CL2) | |
16CSE22CL2.1 | Identify the problem given and find its solution using various algorithm design techniques. |
16CSE22CL2.2 | Compute time and space complexities of various algorithms. |
16CSE22CL2.3 | Implement algorithm design techniques such as Greedy approach, Dynamic programming to solve shortest path problems. |
16CSE22CL2.4 | Implement string matching algorithm for various applications like search engine queries, matching DNA sequences etc. |
16CSE22CL2.5 | Compare and contrast the performance of various algorithms for same problem. |
Internet and Web Development (16CSE22D4) | |
16CSE22D4.1 | Identify the use of different routing protocols for networking purpose. |
16CSE22D4.2 | Illustrate routing algorithms for implanting solution for the real life problems. |
16CSE22D4.3 | Analyze the various web servers, browsers, crawlers and search engines for social application. |
16CSE22D4.4 | Design the web site using API and ASP for using various web services. |
Basics of Economics (16ECOO1) | |
16ECOO1.1 | Define economics and Indian economy. |
16ECOO1.2 | Explain the Indian economic development and planning exercise in India. |
16ECOO1.3 | Examine the different economic problems that exist in the Indian economy. |
16ECOO1.4 | Evaluate and discuss the global issues related to Economics. |
Basics of E Commerce (16COMF2) | |
16COMF2.1 | Recall and understanding of the foundation and importance of E-commerce. |
16COMF2.2 | Describe internal trading relationship including Business to consumer, Business-to-Business, intra organizational. |
16COMF2.3 | Analysis the impact of E- commerce on business models and strategy. |
16COMF2.4 | Evaluate and discuss the global E-commerce issues. |
16COMF2.5 | Deploy the key features of internet, intranets, and Extranets and explain how they relate to each other. |
16COMF2.6 | Study of Technology for online business – internet, IT infrastructure in Laboratory. |
Semester: 3 | |
Knowledge Based System (17CSE23C1) | |
17CSE23C1.1 | Define the use of AI in different real life problems. |
17CSE23C1.2 | Use the heuristic search techniques for AI related problems. |
17CSE23C1.3 | Examine how knowledge is represented in computer system and different knowledge-representation scheme. |
17CSE23C1.4 | Design and evaluate intelligent expert models for perception and prediction from intelligent environment. |
Network Security (17CSE23C2) | |
17CSE23C2.1 | Identify the security issues in the network and resolve it. |
17CSE23C2.2 | Analyze the vulnerabilities in any computing system and hence be able to design a security solution. |
17CSE23C2.3 | Evaluate security mechanisms using rigorous approaches, including different ISP standards. |
17CSE23C2.4 | Design security system and identify the security issues in the system. |
Literature Survey (Dissertation Stage 1) (17CSE23C3) | |
17CSE23C3.1 | Identify the complex engineering problems. |
17CSE23C3.2 | Understand different methodologies for documentation as report. |
17CSE23C3.3 | Demonstrate systematic understanding and sound technical knowledge of their topic of research. |
17CSE23C3.4 | Examine the key stages to analize / develop the research. |
17CSE23C3.5 | Select the suitable method which leads to appropriate results. |
17CSE23C3.6 | Design engineering solutions to various problems used to benefit society. |
Seminar (17CSE23C4) | |
17CSE23C4.1 | Identify relevant information, defining and explain topics under discussion. |
17CSE23C4.2 | Understand problem solving skills and apply theoretical knowledge. |
17CSE23C4.3 | Demonstrate the ability to learn and write both informal (scientific note taking) and formal (research paper) writing. |
17CSE23C4.4 | Calculate information, use and apply relevant theories. |
17CSE23C4.5 | Judge when to speak and how much to say, speak clearly and audible in a manner appropriate to the subject. |
17CSE23C4.6 | Develop ideas through creating work. |
Knowledge Based System Lab (17CSE23CL1) | |
17CSE23CL1.1 | Recognize PROLOG syntax using programming. |
17CSE23CL1.2 | Apply PROLOG operations in programs |
17CSE23CL1.3 | Design and develop solutions for informed and uninformed search problems in AI. |
Project (17CSE23CL2) | |
17CSE23CL2.1 | Identify various technologies and fields for practical training. |
17CSE23CL2.2 | Understand the process to make reports and presentation. |
17CSE23CL2.3 | Applying engineering knowledge to solve industrial problems. |
17CSE23CL2.4 | Analyze ethical practices and tools used in different technologies. |
17CSE23CL2.5 | Evaluate the performance on parameters such as communication skills, technical knowledge. |
17CSE23CL2.6 | Design and develop the skills to make software/hardware, related to industrial training. |
Disaster Management (16ENVO2) | |
16ENVO2.1 | Describe the fundamental aspects of disaster management theory. |
16ENVO2.2 | Understand the mitigation efforts, policies for disaster management. |
16ENVO2.3 | Apply the method of disaster risk reduction for suitable measures like flood, cyclone and earthquake. |
16ENVO2.4 | Analyzing and processing the spatial data for better disaster risk management. |
Trends & Concerns of Teacher Education (16EDUO2) | |
16EDUO2.1 | Explain the meaning of teacher education. |
16EDUO2.2 | Discuss the nature of teacher education. |
16EDUO2.3 | Describe the scope of teacher education |
16EDUO2.4 | Explain the changing context of teacher education in the Indian scenario. |
16EDUO2.5 | Analyze the changing context of teacher education in the global scenario. |
Semester: 4 | |
Dissertation and Viva (17CSE24C1) | |
17CSE24C1.1 | Identify the research topic/area in the field of Computer Science and Engineering to carry out independent research. |
17CSE24C1.2 | Understand the process to carry out research in written format and report your result and conclusion with reference to existing literature. |
17CSE24C1.3 | Demonstrate appropriate reference and writing skills to report writing. |
17CSE24C1.4 | Analyze and synthesize research finding to the agreed area of research. |
17CSE24C1.5 | Evaluate the methods and knowledge to solve the specific research problem. |
17CSE24C1.6 | Develop result on the basis of evaluation and analysis undertake. |
M.TECH CYBER FORENSICS AND INFORMATION SECURITY | |
Course Outcomes | |
Semester: 1 | |
Mathematical Foundation of Information Security (MTCF 101) | |
MTCF 101.1 | Ability of solving equations using interactive methods, matrices and linear system of equations. |
MTCF 101.2 | Understanding of different curve fitting by approximation of functions. |
MTCF 101.3 | Discover cyber-attack scenarios to web browsers and web servers and to explain how to mitigate such threats. |
MTCF 101.4 | Articulate the well-known cyber-attack incidents, explain the attack scenarios, and explain mitigation techniques. |
Networks and Information Security (MTCF 102) | |
MTCF 102.1 | Understand the basics of computer security, security mechanism and most common type of cryptographic algorithm. |
MTCF 102.2 | Implement the various algorithms for encryption to avoid security problems. |
MTCF 102.3 | Understand the Public-Key Infrastructure and security protocols for protecting data on networks. |
MTCF 102.4 | Able to perform simple vulnerability assessments and password audits, digitally sign emails and files. |
MTCF 102.5 | Understand the implementation of various networking protocols. |
Operating Systems and Security (MTCF 103) | |
MTCF 103.1 | Become knowledgeable in the concepts of various functions of operating systems. |
MTCF 103.2 | Gain hands-on experience in the basic administration of a linux system. |
MTCF 103.3 | Understand the concepts of securing operating systems. |
Cyber Forensics (MTCF 104) | |
MTCF 104.1 | Make Use of forensics tools for security. |
MTCF 104.2 | Remember the security issues in network layer and transport layer. |
MTCF 104.3 | Know the security principles in the application layer. |
MTCF 104.4 | Understand computer forensics and cyber crimes. |
Advanced Computer Networks (MTCF 105) | |
MTCF 105.1 | To develop the understanding various IEEE standards for computer networks. |
MTCF 105.2 | Understanding the Internet protocol in multicasting routing protocols and routing algorithms. |
MTCF 105.3 | To know the multicasting and routing algorithms. |
MTCF 105.4 | To acquire the basic network security principle including encryption algorithms. |
MTCF 105.5 | Examine the issues related to security in computer networks. |
Information Security Lab (MTCF 109) | |
MTCF 109.1 | Study of Shell programming and administrative commands. |
MTCF 109.2 | Analyze Buffer Overflow attack, Race Condition Attack,Shell Shock Attack. |
MTCF 109.3 | Implementing access control policy,Logging, Auditing and log monitoring,VM Security. |
OS Security Lab (MTCF 110) | |
MTCF 110.1 | Study of Shell programming and administrative commands. |
MTCF 110.2 | Analyze Buffer Overflow attack, Race Condition Attack,Shell Shock Attack. |
MTCF 110.3 | Implementing access control policy,Logging, Auditing and log monitoring,VM Security. |
Semester: 2 | |
Ethical Hacking and Digital Forensics (MTCF 201) | |
MTCF 201.1 | Learn aspects of security, importance of data gathering, foot printing and system hacking. |
MTCF 201.2 | Summarize tools and techniques to carry out a penetration testing. |
MTCF 201.3 | Describe Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks,Buffer Overflows and Virus Creation. |
MTCF 201.4 | Compare different types of hacking tools. |
MTCF 201.5 | Apply the techniques for real world problems in the domain. |
Database Security (MTCF 202) | |
MTCF 202.1 | Understand and characterize modern techniques of database information security threats and techniques for database security assessment. |
MTCF 202.2 | Understand and identify database information security threats, critically evaluate and apply the potential countermeasures. |
MTCF 202.3 | Analyze information in a database to identify information security incidents. |
MTCF 202.4 | Create a plan for vulnerabilities detection and identification in databases. |
Steganography and Digital Watermarking (MTCF 203) | |
MTCF 203.1 | Understand and characterize modern techniques of database information security threats and techniques for database security assessment. |
MTCF 203.2 | Understand and identify database information security threats, critically evaluate and apply the potential countermeasures. |
MTCF 203.3 | Analyze information in a database to identify information security incidents. |
MTCF 203.4 | Create a plan for vulnerabilities detection and identification in databases. |
Mobile & Wireless Security (MTCF 204) | |
MTCF 204.1 | Gain in-depth knowledge on wireless and mobile network security and its relation to the new security based protocols. |
MTCF 204.2 | Apply proactive and defensive measures to counter potential threats, attacks and intrusions. |
MTCF 204.3 | Design secured wireless and mobile networks that optimise accessibility whilst minimising vulnerability to security risks. |
Multimedia Security (MTCF 207) | |
MTCF 207.1 | Identify multiple issues related to the protection of digital media, including audio, image, and video content. |
MTCF 207.2 | Analyzes techniques such as selective video encryption for real-time requirements, chaos-based encryption, key management, and streaming media protection. |
MTCF 207.3 | Illustrates lossless data hiding, scalable image and video authentication, and signature-based media authentication. |
MTCF 207.4 | Assess the applications, parameters, and requirements of the digital watermarking framework. |
MTCF 207.5 | Summarize the vulnerabilities of protection schemes in multimedia content. |
Ethical Hacking Lab (MTCF 209) | |
MTCF 209.1 | Identify footprinting techniques and tools. |
MTCF 209.2 | Recognize the characteristics of the enumeration phase of an attack and effective countermeasures. |
MTCF 209.3 | Gain exposure to the latest technologies, such as OT Technology, Container Technology. |
Steganography Lab (MTCF 210) | |
MTCF 210.1 | Understand to implement the symbol table using hashing techniques. |
MTCF 210.2 | Analyzes techniques such as selective video encryption for real-time requirements, chaos-based encryption, key management, and streaming media protection. |
MTCF 210.3 | Illustrates lossless data hiding, scalable image and video authentication, and signature-based media authentication. |
MTCF 210.4 | Assess the applications, parameters, and requirements of the digital watermarking framework. |
MTCF 210.5 | Summarize the vulnerabilities of protection schemes in multimedia content. |
Semester: 3 | |
Preserving & Recovering Digital Evidence (MTCF 301) | |
MTCF 301.1 | Summarize Digital evidence and computer crime and Laws. |
MTCF 301.2 | Illustrate the Computer basics for digital investigators w.r.t Unix and Macintosh systems. |
MTCF 301.3 | Illustrate the Networks basics for digital investigators. |
MTCF 301.4 | Investigate computer intrusions and cyber stalking. |
MTCF 301.5 | Interpret the basic concepts how to Handling the digital crime scene, digital evidence examination guidelines. |
Cyber Laws & Security Policy (MTCF 302) | |
MTCF 302.1 | Understand the fundamentals of Cyber Crime. |
MTCF 302.2 | Analyze the nature and effect of cybercrime in society. |
MTCF 302.3 | Demonstrate Accounting Forensics. |
MTCF 302.4 | Analyze Computer Crime and Criminals and Liturgical Procedures |
MTCF 302.5 | Apply the laws and regulations to the applications. |
Distributed Systems Security (MTCF 305) | |
MTCF 305.1 | Explain the design and development of distributed systems and distributed systems applications. |
MTCF 305.2 | Use the application of fundamental Computer Science methods and algorithms in the development of distributed systems and distributed systems applications. |
MTCF 305.3 | Discuss the design and testing of a large software system, and to be able to communicate that design to others. |
MTCF 305.4 | Apply knowledge of distributed systems techniques and methodologies related to security. |
Dissertation Phase 1 (MTCF 307) | |
MTCF 307.1 | Identify the complex engineering problems. |
MTCF 307.2 | Understand different methodologies for documentation as report. |
MTCF 307.3 | Demonstrate systematic understanding and sound technical knowledge of their topic of research. |
MTCF 307.4 | Examine the key stages to analize / develop the research. |
MTCF 307.5 | Select the suitable method which leads to appropriate results. |
MTCF 307.6 | Design engineering solutions to various problems used to benefit society. |
Seminar & Technical Writing (MTCF 308) | |
MTCF 308.1 | Identify relevant information, defining and explain topics under discussion. |
MTCF 308.2 | Understand problem solving skills and apply theoretical knowledge. |
MTCF 308.3 | Demonstrate the ability to learn and write both informal (scientific note taking) and formal (research paper) writing. |
MTCF 308.4 | Calculate information, use and apply relevant theories. |
MTCF 308.5 | Judge when to speak and how much to say, speak clearly and audible in a manner appropriate to the subject. |
MTCF 308.6 | Develop ideas through creating work. |
Semester: 4 | |
Dissertation Phase-II (MTCF 401) | |
MTCF 401.1 | Identify the research topic/area in the field of Cyber Forensics and Information Security to carry out independent research. |
MTCF 401.2 | Understand the process to carry out research in written format and report your result and conclusion with reference to existing literature. |
MTCF 401.3 | Demonstrate appropriate reference and writing skills to report writing. |
MTCF 401.4 | Analyze and synthesize research finding to the agreed area of research. |
MTCF 401.5 | Evaluate the methods and knowledge to solve the specific research problem. |
MTCF 401.6 | Develop result on the basis of evaluation and analysis undertake. |
- Home
- Admissions
- Academics
- Departments
- Why Us
- Facilities
- Placements
- Research
- Events
- Scholarship Test
- Mega Job Fair-24
- Contact Us