Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
116 views3 pages

Minor Computer Science Syllabus

The Minor Computer Science Syllabus covers five main units: Basics of Computer Science, Data Representation & Networking, Memory & Storage, Cyber Security, and Intrusion Detection & Firewalls. Each unit includes topics such as computer components, data communication, memory hierarchy, cyber threats, and types of firewalls. The syllabus provides a comprehensive overview of essential computer science concepts and security measures.

Uploaded by

Pravendra Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views3 pages

Minor Computer Science Syllabus

The Minor Computer Science Syllabus covers five main units: Basics of Computer Science, Data Representation & Networking, Memory & Storage, Cyber Security, and Intrusion Detection & Firewalls. Each unit includes topics such as computer components, data communication, memory hierarchy, cyber threats, and types of firewalls. The syllabus provides a comprehensive overview of essential computer science concepts and security measures.

Uploaded by

Pravendra Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Minor Computer Science Syllabus

UNIT 1: Basics of Computer Science


1.1 Introduction to Computers
1.1.1 Basic components of a digital computer
1.1.2 Generation of computers

1.2 Classification of Computers


1.2.1 Analog, Digital, and Hybrid Computers
1.2.2 Classification based on size:
1.2.2.1 Supercomputers
1.2.2.2 Mainframe Computers
1.2.2.3 Personal Computers

1.3 Computer System Overview


1.3.1 Components of a computer system
1.3.2 Advantages and disadvantages of a computer system
1.3.3 Block diagram of a digital computer

1.4 Input and Output Devices


1.4.1 Basic introduction to input and output devices

UNIT 2: Data Representation & Networking


2.1 Number Systems & Conversions
2.1.1 Decimal, Binary, Octal, Hexadecimal
2.1.2 Conversions between number systems

2.2 Data Communication & Computer Networks


2.2.1 Introduction to data communication
2.2.2 Network architecture and devices
2.2.3 Network topology
2.2.4 Types of computer networks

2.3 Internet & Web Services


2.3.1 Internet basics
2.3.2 Email services
2.3.3 World Wide Web (WWW)
2.3.4 Browsers and search engines

2.4 Software & Operating Systems


2.4.1 Application software vs. System software
2.4.2 Introduction to operating systems and their services
UNIT 3: Memory & Storage
3.1 Memory Hierarchy
3.1.1 Primary Memory: RAM, DRAM, SRAM
3.1.2 ROM: BIOS, Firmware

3.2 Secondary Storage


3.2.1 Hard disk: Structure (tracks, sectors, clusters, cylinders)

3.3 Various Storage Devices


3.3.1 Magnetic Tape
3.3.2 Floppy Disks
3.3.3 Optical Disks
3.3.4 SD/MMC cards
3.3.5 USB Pen Drive

UNIT 4: Cyber Security


4.1 Introduction to Cyber Security
4.1.1 Definition and importance of cyber security
4.1.2 CIA Triad: Confidentiality, Integrity, Availability

4.2 Cyber Threats & Attacks


4.2.1 Types of cyber threats:
4.2.1.1 Nation-state attacks
4.2.1.2 Terrorist organizations
4.2.1.3 Criminal groups
4.2.1.4 Hackers
4.2.1.5 Malicious insiders

4.3 Malware & Social Engineering


4.3.1 Malware types:
4.3.1.1 Viruses, Worms, Trojans, Ransomware
4.3.1.2 Spyware, Adware, Rootkits
4.3.2 Social engineering attacks:
4.3.2.1 Phishing
4.3.2.2 Smishing
4.3.2.3 Tailgating
4.3.2.4 Piggybacking

4.4 Network & System Attacks


4.4.1 SQL Injection
4.4.2 Man-in-the-Middle Attack
4.4.3 Password Attacks
4.4.4 Denial of Service (DoS) & Distributed Denial of Service (DDoS)

UNIT 5: Intrusion Detection & Firewalls


5.1 Types of Intruders
5.1.1 Script Kiddies
5.1.2 Hacktivists
5.1.3 Cybercriminals
5.1.4 Advanced Persistent Threats (APTs)

5.2 Firewalls & Security Systems


5.2.1 Features and types of firewalls
5.2.2 Introduction to Intrusion Detection Systems (IDS)

You might also like