HEAD
Apply knowledge of computing and mathematics to machine learning problems, models and algorithms.
Analyze a problem and identify the computing requirements appropriate for its solution.
Design, implement, and evaluate an algorithm to meet desired needs.
Apply mathematical foundations, algorithmic principles, and computer science theory to the modeling and design of computer-based systems in a way that demonstrates comprehension of the trade-offs involved in design choices.
Introduction to machine learning, scope and limitations, regression, probability, statistics and linear algebra for machine learning, convex optimization, data visualization, hypothesis function and testing, data distributions, data preprocessing, data augmentation, normalizing data sets, machine learning models, supervised and unsupervised learning.
Linearity vs non linearity, activation functions like sigmoid, ReLU, etc., weights and bias, loss function, gradient descent, multilayer network, back propagation, weight initialization, training, testing, unstable gradient problem, auto encoders, batch normalization, dropout, L1 and L2 regularization, momentum, tuning hyper parameters.
Convolutional neural network, flattening, subsampling, padding, stride, convolution layer, pooling layer, loss layer, dance layer 1x1 convolution, inception network, input channels, transfer learning, one shot learning, dimension reductions, implementation of CNN like tensor flow, keras etc.
Recurrent neural network, Long short-term memory, gated recurrent unit, translation, beam search and width, Bleu score, attention model, Reinforcement Learning, RL-framework, MDP, Bellman equations, Value Iteration and Policy Iteration, , Actor-critic model, Q-learning, SARSA.
Support Vector Machines, Bayesian learning, application of machine learning in computer vision, speech processing, natural language processing etc, Case Study: ImageNet Competition.
Christopher M. Bishop, “Pattern Recognition and Machine Learning”, Springer-VerlagNew York Inc., 2nd Edition, 2011.
Tom M. Mitchell, “Machine Learning”, McGraw Hill Education, First edition, 2017.
Ian Goodfellow and Yoshua Bengio and Aaron Courville, “Deep Learning”, MIT Press,2016
Aurelien Geon, “Hands-On Machine Learning with Scikit-Learn and Tensorflow:Concepts, Tools, and Techniques to Build Intelligent Systems”, Shroff/O'Reilly; Firstedition (2017).
Francois Chollet, "Deep Learning with Python", Manning Publications, 1 edition (10January 2018).
Andreas Muller, "Introduction to Machine Learning with Python: A Guide for DataScientists", Shroff/O'Reilly; First edition (2016).
Russell, S. and Norvig, N. “Artificial Intelligence: A Modern Approach”, Prentice HallSeries in Artificial Intelligence. 2003
Different problems to be framed to enable students to understand the concept learnt and get handsonon various tools and software related to the subject. Such assignments are to be framed for ten to twelve lab sessions.
Dafydd Stuttard and Marcus Pinto, "The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws", Wiley Publication Year: 2011 (2nd edition).
David Kennedy, Jim O'Gorman, Devon Kearns, and Mati Aharoni., “Metasploit: The Penetration Tester's Guide".
Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy".
Michal Zalewski, “The Tangled Web: A Guide to Securing Modern Web Applications".
Mark Dowd, John McDonald, and Justin Schuh, “The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities".
Learn how to use tools like Nmap, Nessus, or OpenVAS to perform network scans and identify open ports, services, and potential vulnerabilities.
Implement Practice scanning a target network and analysing the results to identify potential attack vectors.
Implement Set up a vulnerable web application (e.g., OWASP Juice Shop or Damn Vulnerable Web Application) and practice identifying and exploiting security flaws.
Understand wireless network security concepts such as WEP, WPA, and WPA2 encryption.
Practice writing comprehensive penetration testing reports that highlight identified vulnerabilities, their impact, and recommended remediation steps.
To understand the basics of Blockchain
To learn Different protocols and consensus algorithms in Blockchain
To learn the Blockchain implementation frameworks
To understand the Blockchain Applications
To experiment the Hyper ledger Fabric, Ethereum networks
Basics of Blockchain: Introduction, Concept of Blockchain, Fundamentals of Blockchain, Characteristics of Blockchain, Consensus in Trust-Building Exercise, Public, Private, and Hybrid Block chains, Distributed Ledger Technologies, Architecture of Blockchain, Transactions, Chaining Blocks, Value Proposition of Blockchain, Permissioned Model of Blockchain.
Hash Functions, Hashing, Message Authentication Code, Secure Hash Algorithms (SHA-1), Distributed Hash Tables, Hashing in Blockchain Mining Consensus, Consensus Algorithm, Byzantine Agreement Methods.
Blockchain Components, Ethereum Virtual Machine, Working of Ethereum, Ethereum Clients, Ethereum Transactions, , Ethereum Development Tools, Introduction of Cryptography, Cryptography Primitives, Symmetric Cryptography, Asymmetric Cryptography, Architecture of Hyper ledger.
Smart Contracts, Absolute and Immutable, Contractual Confidentiality, Supply Chain Management, Darknet, The Future Bit coins, Working of Bitcoin, Merkle Trees, Bitcoin Block Structure, Bitcoin Address, Bitcoin Transactions Bitcoin Payments, Mining in Blockchain.
Blockchain Vertical Solutions and Use Cases, Blockchain in Different domain like Insurance, Assets Management, healthcare etc., Smart Assets, Electronic Currency, Manufacturing Blockchain and Allied Technologies, Blockchain and Cloud Computing, Characteristics of Blockchain Cloud.
Blockchain Technology: Concepts and Applications by Kumar Saurabh, Ashutosh Saxena - John Wiley Publication.
Blockchain for Enterprise Application Developers by Ambadas Choudhari - John Wiley Publication
Bashir and Imran, Mastering Blockchain: Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks, 2017.
Andreas Antonopoulos, “Mastering Bitcoin: Unlocking Digital Cryptocurrencies”, O’Reilly, 2014.
Daniel Drescher, “Blockchain Basics”, First Edition, Apress, 2017.
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder. Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press, 2016.
Melanie Swan, “Blockchain: Blueprint for a New Economy”, O’Reilly, 2015.
Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts for Ethereum and Blockchain”, Packt Publishing.
Handbook of Research on Blockchain Technology published by Elsevier Inc. ISBN: 9780128198162, 2020.
Install and understand Docker container, Node.js, Java and Hyperledger Fabric, Ethereum and perform necessary software installation on local machine/create instance on cloud to run.
Create and deploy a blockchain network using Hyperledger Fabric SDK for Java Set up and initialize the channel, install and instantiate chain code, and perform invoke and query on your blockchain network.
Interact with a blockchain network. Execute transactions and requests against a blockchain network by creating an app to test the network and its rules.
Deploy an asset-transfer app using blockchain. Learn app development within a Hyperledger Fabric network.
Use blockchain to track fitness club rewards. Build a web app that uses Hyperledger Fabric to track and trace member rewards.
To gain knowledge on mobile phone evidence extraction process
To understand the practical mobile forensic approaches
To engage students in forensic acquisition and analysis of mobile computing devices, specifically Android device
To gain an understanding of mobile device identification
Understand what data is able to be acquire from mobile devices and be able to acquire and investigate data from mobile devices using forensically sound and industry standard tools.
Comprehend the relationship between mobile and desktop devices in relationship to criminal and corporate investigations.
Analyse mobile devices, their backup files, and artifacts for forensic evidence.
Cyber Security by Nina Godbole - John Wiley Publication.
Digital Forensic by Dr. Nilakshi Jain - John Wiley Publication
Aditya Gupta, “Learning Pentesting for Android Devices”, Packt Pub Ltd; Illustrated edition, 2014.
SwaroopYermalkar, “Learning iOS Penetration Testing Paperback”, Packt Publishing, 2004.
RohitTamma, Oleg Skulkin, Heather Mahalik, SatishBommisetty, “Practical Mobile Forensics - Third Edition”, Packt Publishing, 2018.
Igor Mikhaylov and Oleg Skulkin, “"Mobile Forensics Cookbook", Packt Publishing Limited, 2017.
Setup of memory forensic environment and extract various artifacts from memory dump and analyze the memory dump, using different tools like Volatility, LiME, etc.
Windows artifact analysis using different forensic tools, which includes MRU, link file, USB analysis, Prefetch analysis, shell bag, web cache etc.,
Using APKTool to reverse an Android application, Auditing Android applications.
Perform the following on different Android Image files: • Using a custom recovery android image. • Using AFLogical to extract contacts, calls, and text messages. • Dumping application databases manually. • Logging the logcat and using backup to extract an application's data.
Developing your first iOS app and running apps on iDevice.
Introduce multimedia, its application areas, data encoding and compression techniques.
Develop understanding of Quality of Service and its constraints.
Understand synchronization concepts.
Discuss multimedia security attacks and defense techniques.
To introduce multimedia forensic concepts.
Demonstrate how quality of service can be ensured in multimedia applications.
Apply different synchronization techniques on multimedia.
Ensure security of multimedia applications.
Perform forensic on multimedia data.
Ralf Steinmetz, Klara Nahrstedt. Multimedia Systems, Springer International Edition
Ho, Anthony TS, and Shujun Li, eds. Handbook of digital forensics of multimedia data and devices. John Wiley & Sons, 2015.
John. F. Koegel Buford. Multimedia Systems. Pearson Education.
Digital Watermarking and Steganography by Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica.
The aim of the course is to introduce the methodologies framework tools of ethical hacking to get awareness in enhancing the security.
2 .To gain knowledge about Ethical hacking and penetration testing.
To learn about various types of attacks, attackers and security threats and vulnerabilities present in the computer system.
To examine how social engineering can be done by attacker to gain access of useful & sensitive information about the confidential data.
To gain knowledge of the tools, techniques and ethical issues likely to face the domain of ethical hacking and ethical responsibilities.
Describe and understand the basics of the ethical hacking and Gain the knowledge of the use and availability of tools to support an ethical hack.
Gain the knowledge of interpreting the results of a controlled attack.
Understand the role of politics, inherent and imposed limitations and metrics forplanning of a test.
Perform the foot printing and scanning.
Demonstrate the techniques for system hacking and Detect and prevent the security attacks in different environments.
James S. Tiller, “The Ethical Hack: A Framework for Business Value Penetration Testing”, Auerbach Publications, CRC Press
EC-Council, “Ethical Hacking and Countermeasures Attack Phases”, Cengage Learning
Michael Simpson, Kent Backman, James Corley, “Hands-On Ethical Hacking and Network Defense”, Cengage Learning.
Hacking For Dummies, 6ed by Kevin Beaver - John Wiley Publication
Digital Forensic by Dr. Nilakshi Jain - John Wiley Publication
Certified Ethical Hacker, Version 9, Second Edition, Michael Gregg, Pearson IT Certification.
Hacking the Hacker, Roger Grimes, Wiley.
The Unofficial Guide to Ethical Hacking, AnkitFadia, Premier Press.
List the tools for Ethical Hacking.
Implement Foot-printing and Reconnaissance using tools.
Setup a honey pot and monitor the honey pot on network.
Create a social networking website login page using phishing techniques.
Write a code to demonstrate DoSattacks.
Install rootkits and study variety of options.
Study of Techniques uses for Web Based Password Capturing.
Implement passive scanning, active scanning, session hijacking, cookies extraction using Burp suit tool.
Understand the fundamental s of cyber security and cyber crimes.
Understand the tools and methods in cybercrimes and understanding computer forensics.
Analyze cyber-attacks, types of cybercrimes, cyber laws and also how to protect them self and ultimately the entire Internet community from such attacks.
Interpret and forensically investigate security incidents.
Apply security policies and procedures to manage Privacy issues and cyber laws.
Design and develop secure software modules.
Nina Godbole and SunitBelpure, Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Wiley
B.B.Gupta,D.P.Agrawal,HaoxiangWang, Computer andCyberSecurity:Principles, Algorithm, Applications, and Perspectives, CRC Press, ISBN 9780815371335, 2018.
Dr. Surya PrakashTripathi, RitendraGoyal, Praveen Kumar Shukla, KLSI. “Introduction to information security and cyber laws”. Dreamtech Press. ISBN: 9789351194736, 2015.
Cyber Security and Cyber Laws by Dr. Nilakshi Jain - John Wiley Publication.
Digital Forensic by Dr. Nilakshi Jain - John Wiley Publication.
Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRCPress.
Introduction to Cyber Security, Chwan-Hwa (john) Wu,J. David Irwin, CRC Press T&FGroup.
Cybercrime: Examples and Mini-Cases (Case Study)
Examples: Official Website of Maharashtra Government Hacked, Indian Banks Lose Millions of Rupees, Parliament Attack, Pune City Police Bust Nigerian Racket, e-mail spoofing instances.
Mini-Cases: The Indian Case of online Gambling, An Indian Case of Intellectual Property Crime, Financial Frauds in Cyber Domain.
Fundamentals of Data Engineering by Joe Reis, Matt Housley Released June 2022, and Publisher: O'Reilly Media, Inc. NISBN: 9781098108304.
Data Engineering with Python: Work with Massive Datasets to Design Data Models and Automate Data Pipelines Using Python by Paul Crickard.
Explain the core concepts of the cloud computing paradigm
Demonstrate knowledge of virtualization
Explain the core issues of cloud computing such as security, privacy, and interoperability.
Choose the appropriate technologies, algorithms, and approaches for the related issues.
Identify problems, and explain, analyze, and evaluate various cloud computing solutions
Dr.Kumar Saurabh, “Cloud Computing”, Wiley India.
Ronald Krutz and Russell Dean Vines, “Cloud Security”, Wiley-India.
Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper, “Computing for Dummies”, Wiley India Edition.
Anthony T.Velte Toby J.Velte, “Cloud Computing – A Practical Approach”, TMH.
Barrie Sosinsky, ‘Cloud Computing Bible”, Wiley India.
Apply knowledge of computing and mathematics to machine learning problems, models and algorithms.
Analyze a problem and identify the computing requirements appropriate for its solution.
Design, implement, and evaluate an algorithm to meet desired needs.
Apply mathematical foundations, algorithmic principles, and computer science theory to the modeling and design of computer-based systems in a way that demonstrates comprehension of the trade-offs involved in design choices.
Introduction to machine learning, scope and limitations, regression, probability, statistics and linear algebra for machine learning, convex optimization, data visualization, hypothesis function and testing, data distributions, data preprocessing, data augmentation, normalizing data sets, machine learning models, supervised and unsupervised learning.
Linearity vs non linearity, activation functions like sigmoid, ReLU, etc., weights and bias, loss function, gradient descent, multilayer network, back propagation, weight initialization, training, testing, unstable gradient problem, auto encoders, batch normalization, dropout, L1 and L2 regularization, momentum, tuning hyper parameters.
Convolutional neural network, flattening, subsampling, padding, stride, convolution layer, pooling layer, loss layer, dance layer 1x1 convolution, inception network, input channels, transfer learning, one shot learning, dimension reductions, implementation of CNN like tensor flow, keras etc.
Recurrent neural network, Long short-term memory, gated recurrent unit, translation, beam search and width, Bleu score, attention model, Reinforcement Learning, RL-framework, MDP, Bellman equations, Value Iteration and Policy Iteration, , Actor-critic model, Q-learning, SARSA.
Support Vector Machines, Bayesian learning, application of machine learning in computer vision, speech processing, natural language processing etc, Case Study: ImageNet Competition.
Christopher M. Bishop, “Pattern Recognition and Machine Learning”, Springer-VerlagNew York Inc., 2nd Edition, 2011.
Tom M. Mitchell, “Machine Learning”, McGraw Hill Education, First edition, 2017.
Ian Goodfellow and Yoshua Bengio and Aaron Courville, “Deep Learning”, MIT Press,2016
Aurelien Geon, “Hands-On Machine Learning with Scikit-Learn and Tensorflow:Concepts, Tools, and Techniques to Build Intelligent Systems”, Shroff/O'Reilly; Firstedition (2017).
Francois Chollet, "Deep Learning with Python", Manning Publications, 1 edition (10January 2018).
Andreas Muller, "Introduction to Machine Learning with Python: A Guide for DataScientists", Shroff/O'Reilly; First edition (2016).
Russell, S. and Norvig, N. “Artificial Intelligence: A Modern Approach”, Prentice HallSeries in Artificial Intelligence. 2003
Different problems to be framed to enable students to understand the concept learnt and get handsonon various tools and software related to the subject. Such assignments are to be framed for ten to twelve lab sessions.
Dafydd Stuttard and Marcus Pinto, "The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws", Wiley Publication Year: 2011 (2nd edition).
David Kennedy, Jim O'Gorman, Devon Kearns, and Mati Aharoni., “Metasploit: The Penetration Tester's Guide".
Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy".
Michal Zalewski, “The Tangled Web: A Guide to Securing Modern Web Applications".
Mark Dowd, John McDonald, and Justin Schuh, “The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities".
Learn how to use tools like Nmap, Nessus, or OpenVAS to perform network scans and identify open ports, services, and potential vulnerabilities.
Implement Practice scanning a target network and analysing the results to identify potential attack vectors.
Implement Set up a vulnerable web application (e.g., OWASP Juice Shop or Damn Vulnerable Web Application) and practice identifying and exploiting security flaws.
Understand wireless network security concepts such as WEP, WPA, and WPA2 encryption.
Practice writing comprehensive penetration testing reports that highlight identified vulnerabilities, their impact, and recommended remediation steps.
To understand the basics of Blockchain
To learn Different protocols and consensus algorithms in Blockchain
To learn the Blockchain implementation frameworks
To understand the Blockchain Applications
To experiment the Hyper ledger Fabric, Ethereum networks
Basics of Blockchain: Introduction, Concept of Blockchain, Fundamentals of Blockchain, Characteristics of Blockchain, Consensus in Trust-Building Exercise, Public, Private, and Hybrid Block chains, Distributed Ledger Technologies, Architecture of Blockchain, Transactions, Chaining Blocks, Value Proposition of Blockchain, Permissioned Model of Blockchain.
Hash Functions, Hashing, Message Authentication Code, Secure Hash Algorithms (SHA-1), Distributed Hash Tables, Hashing in Blockchain Mining Consensus, Consensus Algorithm, Byzantine Agreement Methods.
Blockchain Components, Ethereum Virtual Machine, Working of Ethereum, Ethereum Clients, Ethereum Transactions, , Ethereum Development Tools, Introduction of Cryptography, Cryptography Primitives, Symmetric Cryptography, Asymmetric Cryptography, Architecture of Hyper ledger.
Smart Contracts, Absolute and Immutable, Contractual Confidentiality, Supply Chain Management, Darknet, The Future Bit coins, Working of Bitcoin, Merkle Trees, Bitcoin Block Structure, Bitcoin Address, Bitcoin Transactions Bitcoin Payments, Mining in Blockchain.
Blockchain Vertical Solutions and Use Cases, Blockchain in Different domain like Insurance, Assets Management, healthcare etc., Smart Assets, Electronic Currency, Manufacturing Blockchain and Allied Technologies, Blockchain and Cloud Computing, Characteristics of Blockchain Cloud.
Blockchain Technology: Concepts and Applications by Kumar Saurabh, Ashutosh Saxena - John Wiley Publication.
Blockchain for Enterprise Application Developers by Ambadas Choudhari - John Wiley Publication
Bashir and Imran, Mastering Blockchain: Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks, 2017.
Andreas Antonopoulos, “Mastering Bitcoin: Unlocking Digital Cryptocurrencies”, O’Reilly, 2014.
Daniel Drescher, “Blockchain Basics”, First Edition, Apress, 2017.
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder. Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press, 2016.
Melanie Swan, “Blockchain: Blueprint for a New Economy”, O’Reilly, 2015.
Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts for Ethereum and Blockchain”, Packt Publishing.
Handbook of Research on Blockchain Technology published by Elsevier Inc. ISBN: 9780128198162, 2020.
Install and understand Docker container, Node.js, Java and Hyperledger Fabric, Ethereum and perform necessary software installation on local machine/create instance on cloud to run.
Create and deploy a blockchain network using Hyperledger Fabric SDK for Java Set up and initialize the channel, install and instantiate chain code, and perform invoke and query on your blockchain network.
Interact with a blockchain network. Execute transactions and requests against a blockchain network by creating an app to test the network and its rules.
Deploy an asset-transfer app using blockchain. Learn app development within a Hyperledger Fabric network.
Use blockchain to track fitness club rewards. Build a web app that uses Hyperledger Fabric to track and trace member rewards.
To gain knowledge on mobile phone evidence extraction process
To understand the practical mobile forensic approaches
To engage students in forensic acquisition and analysis of mobile computing devices, specifically Android device
To gain an understanding of mobile device identification
Understand what data is able to be acquire from mobile devices and be able to acquire and investigate data from mobile devices using forensically sound and industry standard tools.
Comprehend the relationship between mobile and desktop devices in relationship to criminal and corporate investigations.
Analyse mobile devices, their backup files, and artifacts for forensic evidence.
Cyber Security by Nina Godbole - John Wiley Publication.
Digital Forensic by Dr. Nilakshi Jain - John Wiley Publication
Aditya Gupta, “Learning Pentesting for Android Devices”, Packt Pub Ltd; Illustrated edition, 2014.
SwaroopYermalkar, “Learning iOS Penetration Testing Paperback”, Packt Publishing, 2004.
RohitTamma, Oleg Skulkin, Heather Mahalik, SatishBommisetty, “Practical Mobile Forensics - Third Edition”, Packt Publishing, 2018.
Igor Mikhaylov and Oleg Skulkin, “"Mobile Forensics Cookbook", Packt Publishing Limited, 2017.
Setup of memory forensic environment and extract various artifacts from memory dump and analyze the memory dump, using different tools like Volatility, LiME, etc.
Windows artifact analysis using different forensic tools, which includes MRU, link file, USB analysis, Prefetch analysis, shell bag, web cache etc.,
Using APKTool to reverse an Android application, Auditing Android applications.
Perform the following on different Android Image files: • Using a custom recovery android image. • Using AFLogical to extract contacts, calls, and text messages. • Dumping application databases manually. • Logging the logcat and using backup to extract an application's data.
Developing your first iOS app and running apps on iDevice.
Introduce multimedia, its application areas, data encoding and compression techniques.
Develop understanding of Quality of Service and its constraints.
Understand synchronization concepts.
Discuss multimedia security attacks and defense techniques.
To introduce multimedia forensic concepts.
Demonstrate how quality of service can be ensured in multimedia applications.
Apply different synchronization techniques on multimedia.
Ensure security of multimedia applications.
Perform forensic on multimedia data.
Ralf Steinmetz, Klara Nahrstedt. Multimedia Systems, Springer International Edition
Ho, Anthony TS, and Shujun Li, eds. Handbook of digital forensics of multimedia data and devices. John Wiley & Sons, 2015.
John. F. Koegel Buford. Multimedia Systems. Pearson Education.
Digital Watermarking and Steganography by Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica.
The aim of the course is to introduce the methodologies framework tools of ethical hacking to get awareness in enhancing the security.
2 .To gain knowledge about Ethical hacking and penetration testing.
To learn about various types of attacks, attackers and security threats and vulnerabilities present in the computer system.
To examine how social engineering can be done by attacker to gain access of useful & sensitive information about the confidential data.
To gain knowledge of the tools, techniques and ethical issues likely to face the domain of ethical hacking and ethical responsibilities.
Describe and understand the basics of the ethical hacking and Gain the knowledge of the use and availability of tools to support an ethical hack.
Gain the knowledge of interpreting the results of a controlled attack.
Understand the role of politics, inherent and imposed limitations and metrics forplanning of a test.
Perform the foot printing and scanning.
Demonstrate the techniques for system hacking and Detect and prevent the security attacks in different environments.
James S. Tiller, “The Ethical Hack: A Framework for Business Value Penetration Testing”, Auerbach Publications, CRC Press
EC-Council, “Ethical Hacking and Countermeasures Attack Phases”, Cengage Learning
Michael Simpson, Kent Backman, James Corley, “Hands-On Ethical Hacking and Network Defense”, Cengage Learning.
Hacking For Dummies, 6ed by Kevin Beaver - John Wiley Publication
Digital Forensic by Dr. Nilakshi Jain - John Wiley Publication
Certified Ethical Hacker, Version 9, Second Edition, Michael Gregg, Pearson IT Certification.
Hacking the Hacker, Roger Grimes, Wiley.
The Unofficial Guide to Ethical Hacking, AnkitFadia, Premier Press.
List the tools for Ethical Hacking.
Implement Foot-printing and Reconnaissance using tools.
Setup a honey pot and monitor the honey pot on network.
Create a social networking website login page using phishing techniques.
Write a code to demonstrate DoSattacks.
Install rootkits and study variety of options.
Study of Techniques uses for Web Based Password Capturing.
Implement passive scanning, active scanning, session hijacking, cookies extraction using Burp suit tool.
Understand the fundamental s of cyber security and cyber crimes.
Understand the tools and methods in cybercrimes and understanding computer forensics.
Analyze cyber-attacks, types of cybercrimes, cyber laws and also how to protect them self and ultimately the entire Internet community from such attacks.
Interpret and forensically investigate security incidents.
Apply security policies and procedures to manage Privacy issues and cyber laws.
Design and develop secure software modules.
Nina Godbole and SunitBelpure, Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Wiley
B.B.Gupta,D.P.Agrawal,HaoxiangWang, Computer andCyberSecurity:Principles, Algorithm, Applications, and Perspectives, CRC Press, ISBN 9780815371335, 2018.
Dr. Surya PrakashTripathi, RitendraGoyal, Praveen Kumar Shukla, KLSI. “Introduction to information security and cyber laws”. Dreamtech Press. ISBN: 9789351194736, 2015.
Cyber Security and Cyber Laws by Dr. Nilakshi Jain - John Wiley Publication.
Digital Forensic by Dr. Nilakshi Jain - John Wiley Publication.
Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRCPress.
Introduction to Cyber Security, Chwan-Hwa (john) Wu,J. David Irwin, CRC Press T&FGroup.
Cybercrime: Examples and Mini-Cases (Case Study)
Examples: Official Website of Maharashtra Government Hacked, Indian Banks Lose Millions of Rupees, Parliament Attack, Pune City Police Bust Nigerian Racket, e-mail spoofing instances.
Mini-Cases: The Indian Case of online Gambling, An Indian Case of Intellectual Property Crime, Financial Frauds in Cyber Domain.
Fundamentals of Data Engineering by Joe Reis, Matt Housley Released June 2022, and Publisher: O'Reilly Media, Inc. NISBN: 9781098108304.
Data Engineering with Python: Work with Massive Datasets to Design Data Models and Automate Data Pipelines Using Python by Paul Crickard.
Explain the core concepts of the cloud computing paradigm
Demonstrate knowledge of virtualization
Explain the core issues of cloud computing such as security, privacy, and interoperability.
Choose the appropriate technologies, algorithms, and approaches for the related issues.
Identify problems, and explain, analyze, and evaluate various cloud computing solutions
Dr.Kumar Saurabh, “Cloud Computing”, Wiley India.
Ronald Krutz and Russell Dean Vines, “Cloud Security”, Wiley-India.
Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper, “Computing for Dummies”, Wiley India Edition.
Anthony T.Velte Toby J.Velte, “Cloud Computing – A Practical Approach”, TMH.
Barrie Sosinsky, ‘Cloud Computing Bible”, Wiley India.