SRINIVAS INSTITUTE OF TECHNOLOGY
(Accredited by NAAC)
Valachil, Mangaluru-574143
Department of Computer Science and Engineering
COURSE OUTCOMES
Semester: I/II
Course Title: Introduction to Cyber Security Course Code: BETCK105I/205I
CIE Marks: 50 SEE Marks: 50 Total Marks: 100
Credits: 03 L-T-P: 3-0-0 Exam Hours: 3
Course Outcomes: At the end of the course the student will be able to:
RBT
COs STATEMENTS
Level
CO 1 Explain the Cybercrime terminologies L2
Describe Cyber offenses and Botnets
CO 2 L2
Illustrate Tools and Methods used on Cybercrime
CO 3 L2
CO 4 Justify the need of computer forensics in cybercrimes L3
CO-PO/PSO MAPPING
CO PO1 PO1 PO1 PSO PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9
0 1 2 01 02
Comm
Cmplx
EnggS
Prjctm
DsgnS
Ethics
Sustbt
Team
Mdrn
Prbm
Indvl
ngmt
Knw
Anls
Tool
Life
Eng
Env
lrng
Prb
oln
cty
CO1 2 1 - - - - - - - - - - - -
CO2 2 1 1 - - - - - - - - - - -
CO3 2 1 1 1 - - - - - - - - - -
CO4 2 1 1 1 - - - 1 1 1 - 1 - -
Avg. 2 1 1 1 - - - 1 1 1 - 1 - -
Note: Correlation levels are entered as defined below:
1: Slight (low) 2: Moderate (Medium) 3: Substantial (High) If there is no correlation put “ –“
Course Instructor/s Course Coordinator ModuleCoordinator
(AN,RB,SJ,SS) (AN) (AR)
PAQIC HOD and
Coordinator PAQIC Chair
(PN)
SRINIVAS INSTITUTE OF TECHNOLOGY
(Accredited by NAAC)
Valachil, Mangaluru-574143
Department of Computer Science and Engineering
Course Title: Introduction to Cyber Security Course Code: BETCK105I/205I
JUSTIFICATIONS FOR CO-PO/PSO MAPPING LEVELS
CO1 - PO1 2 Students will be able to demonstrate the cyber terminologies
and its needs.
CO1-PO2 1 Students will be able to identify cyber terminologies
and its needs.
CO2-PO1 2 Students will be able to apply suitable techniques for Cyber
offenses and Botnets.
CO2-PO2 1 Students will be able to identify and analyze problems in Cyber
offenses and Botnets.
CO2-PO3 1 Students will be able to design solutions to problem related
Cyber offenses and Botnets.
CO3-PO1 2 Students will be able to apply knowledge of Tools and
Methods used on Cybercrime.
CO3-PO2 1 Students will be able to identify the problems related to Tools
and Methods used on Cybercrime.
CO3-PO3 1 Students will be able to analyze and develop the solutions for
identified problems related to Tools and Methods used on
Cybercrime.
CO3-PO4 1 Students will be able to resolve issues in Tools and
Methods used on Cybercrime.
CO4-PO1 2 Students will be able to apply the need of computer forensics
CO4-PO2 1 Students will be able to identify problems related to
computer forensics.
CO4-PO3 1 Students will be able to find solutions to problems related
tocomputer forensics.
CO4-PO4 1 Students will be able to design and develop solutions to
problems related to computer forensics
CO4-P08 1 Students will be able to follow rules and guidelines that
engineers adhere to as a moral obligation to their
Professional life.
CO4-PO9 1 Students will be able to take responsibility to solve the
Problems incomputer forensics as a team.
CO4-PO10 1 Students will be able to demonstrate the concept of computer
forensics.
CO4-PO12 1 Students will be able to recognize the need of computer
forensics and its functionality in their life.
*1: Slight (low) 2: Moderate (Medium) 3: Substantial (High)
Page 2 of 3
SRINIVAS INSTITUTE OF TECHNOLOGY
(Accredited by NAAC)
Valachil, Mangaluru-574143
Department of Computer Science and Engineering
Course Title: Introduction to Cyber Security Course Code: BETCK105I/205I
Minutes of the Meeting
Following course outcomes as per the syllabus framed by Visveswaraya Technological
University, as per the 2022 scheme.
COURSE OUTCOMES:
COs Statements
CO1 Explain the cybercrime terminologies
CO2 Describe Cyber offenses and Botnets
CO3 Illustrate Tools and Methods used on Cybercrime
CO4 Explain Phishing and Identity Theft
CO5 Justify the need of computer forensics
To suit the IQAC requirements of the institute, the course instructors, in due consultation
with the PAQIC coordinator, the HoD& other concerned, the course outcomes have been
restructured and the following outcomes have been framed with the relevant reasons:
CO Content Reasons
1 Explain the Cybercrime terminologies The course outcomes of
the university are
2 Describe Cyber offenses and Botnets
module based. The new
3 Illustrate Tools and Methods used on Cybercrime COs are formed in such
a way that each module
4 Justify the need of computer forensics in cybercrimes addresses all the COs.
Course Instructor/s Course Coordinator Module Coordinator
(AN,RB,SJ,SS) (AN) (AR)
PAQIC HOD and
Coordinator PAQIC Chair
(PN)
Page 3 of 3