Syllabus
Syllabus
Under Graduate
1
`
SEMESTER II
SL. COURSE COURSE TITLE CATEGO
CONTACT
L T P C
NO. CODE PERIODS
RY
THEORY
1. EN3211 Professional English - II HSMC 3 3 0 0 3
2. MA3222 Statistics and Numerical Methods BSC 4 3 1 0 4
3. PH3222 Physics for Information Science BSC 3 3 0 0 3
4. CH3222 Chemistry for Information Science BSC 3 3 0 0 3
5. GE3231 Problem Solving and Python Programming ESC 3 3 0 0 3
தமிழரும் ததொழில் நுட்பமும் /Tamils and
6. GE3211 HSMC 1 1 0 0 1
Technology
THEORY CUM PRACTICALS
GE3233
7. Engineering Graphics and Design ESC 5 1 0 4 3
PRACTICALS
8. GE3221 Engineering Sciences Laboratory BSC 4 0 0 4 2
Problem Solving and Python Programming
9. GE3232 Laboratory ESC 4 0 0 4 2
NSS / YRC / NSO / Club Activities#
10. GE3251 PCD 0# 0 0 0 0#
2
`
SEMESTER III
SL. COURS CONTACT
COURSE TITLE CATEG L T P C
NO. E PERIODS
ORY
CODE
THEORY
1. MA3322 Discrete Mathematics BSC 3 3 0 0 3
2. AD3363 Digital Principles and Computer Organization PCC 3 3 0 0 3
3. IT3361 Programming and Data Structures PCC 3 3 0 0 3
4. CS3361 Object Oriented Programming PCC 3 3 0 0 3
Fundamentals of Computer Networks and
5. CY3361 PCC 2 3 0 0 3
Communication
6. CY3362 Introduction to Cyber Security PCC 3 3 0 0 3
PRACTICALS
7. IT3363 Programming and Data Structures Laboratory PCC 3 0 0 3 1.5
8. CS3364 Object Oriented Programming Laboratory PCC 3 0 0 3 1.5
Computer Networks and Communication
9. CY3363 PCC 3 0 0 3 1.5
Laboratory
TOTAL 26 18 0 9 22.5
SEMESTER IV
SL. COURSE CONTACT
COURSE TITLE CATEG L T P C
NO. CODE PERIODS
ORY
THEORY
1. MA3422 Applied Mathematics for Information Science BSC 2 2 0 0 2
2. CS3463 Database Management Systems PCC 3 3 0 0 3
3. IT3461 Operating Systems PCC 3 3 0 0 3
4. CY3461 Basics of Cyber Forensics PCC 3 3 0 0 3
5. CY3462 Secure Software Engineering PCC 3 3 0 0 3
6. CY3463 Cyber Laws and Ethics PCC 3 3 0 0 3
7. GE3451 NCC Credit Course Level – I * PCD 3* 3* 0 0 3*
PRACTICALS
8. CS3466 Database Management Systems Laboratory PCC 3 0 0 3 1.5
9. IT3464 Operating Systems Laboratory PCC 3 0 0 3 1.5
10. CY3464 Open Source Software Laboratory PCC 3 0 0 3 1.5
TOTAL 26 20 0 9 21.5
3
`
SEMESTER V
SEMESTER VI
4
`
SEMESTER VII
SL. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
THEORY
1. BA3711 Human Values and Ethics HSMC 2 2 0 0 2
2. CY3761 Security in Mobile Exploitation PCC 3 3 0 0 3
3. CY3762 Artificial Intelligence in Cyber Security PCC 3 3 0 0 3
4. PCYXXX Professional Elective – V PEC 3 3 0 0 3
5. PCYXXX Professional Elective – VI PEC 3 3 0 0 3
6. OCYXXX Open Elective OEC 3 3 0 0 3
7. MCYXXX Mandatory Course-II MCC 3 3 0 0 0
PRACTICALS
8 CY3763 Security in Mobile Exploitation PCC 4 0 0 4 1.5
Laboratory
9 Artificial Intelligence in Cyber
CY3764 PCC 4 0 0 4 1.5
Security Laboratory
10 CY3741 Internship EEC 0 0 0 0 1
TOTAL 28 20 0 8 21
* Mandatory Course- II is a Non-credit Course (Student shall select one course from the list given under Mandatory Course- II)
SEMESTER VIII
SL. COURSE
COURSE TITLE CATEGORY CONTACT L T P C
NO. CODE PERIODS
PRACTICALS
1. CY3841 Project Work EEC 12 0 0 20 10
TOTAL 12 0 0 20 10
Mandatory Course II
SL. COURSE
COURSE TITLE CATEGORY CONTACT L T P C
NO. CODE PERIODS
PRACTICALS
1. MCY201 Awareness Of Cyber Security and Cyber PCC 3 3 0 0 3
Law
5
`
VERTICAL II
VERTICAL I VERTICAL V
CLOUD VERTICAL III VERTICAL IV VERTICAL VI
DATA COMPUTATIONAL
COMPUTING CYBER CREATIVE INDUSTRY
SCIENCE INTELLIGENCE
AND DATA SECURITY AND MEDIA 4.0
CENTRE DATA PRIVACY
TECHNOLOGIES
Fundamentals of Multimedia Data
Modern Knowledge Introduction to
Text and Speech Data Warehousing Compression and
Cryptography Engineering Industry 4.0
Analysis Storage
Crypto Currency
Image and video Storage Video Creation 3D Printing and
and Block Chain Soft Computing
Analytics Technologies and Editing Design
Technologies
Augmented
Introduction to Multimedia and Reality, Virtual
Virtualization Ethical Hacking Cognitive Science
Deep Learning Animation Reality and Mixed
Reality
Augmented
Business Cloud Services and Optimization
Social Engineering Reality and Virtual Neural Networks
Analytics Management Techniques
Reality
Exploratory Data Security and Game Internet of
Big Data Security Computer Vision
Analysis Privacy in Cloud Development Everything
6
`
SL. COURSE
COURSE TITLE CATEGORY CONTACT L T P C
NO. CODE PERIODS
THEORY
1. PAD102 Fundamentals of Text and Speech Analysis PEC 3 0 0 3 3
VERTICAL II
CLOUD COMPUTING AND DATA CENTRE TECHNOLOGIES
SL. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
THEORY
1. PIT201 Data Warehousing PEC 3 0 0 3 3
2. PIT202 Storage Technologies PEC 3 0 0 3 3
3. PIT203 Virtualization PEC 3 0 0 3 3
VERTICAL III
CYBER SECURITY AND DATA PRIVACY
SL. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
THEORY
1. PCY301 Modern Cryptography PEC 3 3 0 0 3
PCY302
2. Crypto Currency and Block Chain PEC 3 3 0 0 3
Technologies
3. PCY303 Ethical Hacking PEC 3 3 0 0 3
7
`
VERTICAL IV
CREATIVE MEDIA
VERTICAL V
COMPUTATIONAL INTELLIGENCE
SL. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
THEORY
1. PCS501 Knowledge Engineering PEC 3 0 0 3 3
VERTICAL VI
INDUSTRY 4.0
8
`
SUMMARY
Name of the
Programme: B.E.
Cyber Security
SL. SUBJECT TOTAL
CREDITS PER SEMESTER
NO. CREDITS
AREA I II III IV V VI VII VIII
1. HSMC 4 4 2 2 12
2. BSC 12 12 3 2 2 31
3. ESC 5 8 13
4. PCC 19.5 19.5 16.5 10.5 9 75
5. PEC 6 6 6 18
6. OEC 3 3
7. EEC 1 3 1 10 15
Non–Credit
1# 3# 3# √ √ 7#
/(Mandatory)
9
`
SEMESTER I
EN3111 PROFESSIONAL ENGLISH – I L T P C
3 0 0 3
COURSE OBJECTIVES:
• To upgrade the English language skills of students by introducing communication techniques,
speaking and grammar learning activities which are relevant to authentic contexts.
• To improve the basic reading and writing skills of the learners.
• To enhance the communicative competence of the first-year engineering students.
• To enable learners to use language effectively in academic/work contexts.
• To help learners understand content- context in relevant situations.
SRMVEC R2023
1
`
COURSE OUTCOMES:
At the end of the course, learners will be able
• CO1: To strengthen the basics of grammar.
• CO2: To narrate informal and informal situations.
• CO3: To describe a process/product and express opinion.
• CO4: To interpret and analyse the content/information given.
• CO5: To write short essays, personal letters and emails in English.
TEXT BOOKS:
1. English for Science and Technology Cambridge University Press,2021. Dr.Veena Selvam,
Dr.Sujatha Priyadarshini, Dr. Deep Mary Francis, Dr.K.N.Shoba and Dr.Lourdes Joevani,
Department of English, Anna University.
2. Technical Communication – Principles and Practice by Meenakshi Raman & Sangeeta Sharma,
Oxford Univ.Press, 2016, New Delhi.
REFERENCE BOOKS:
1.Effective Communication Skill, Kulbhusan Kumar, R.S.Salaria, Khanna Publishing House.
2.Wings of Fire - An Autobiography by A.P.J Abdul Kalam with Arun Tiwari, Sangam Books Ltd ,
Edition: 50, 1999
3.World's Most Popular Short Stories Saki Maupassant, Anton Chekhov, O Henry Paperback
4.Professional Speaking skills, Aruna Koneru, Oxford University Press.
5.English For Engineers and Technologists, Orient Blackswan Private Ltd. Department of
English,Anna University,2020.
SRMVEC R2023
2
`
COURSE OUTCOMES:
On Completion of the course, the students should be able to have:
• To apply the idea of reducing complex problems into simple form using matrix technique.
• Basic application of calculus in engineering problems and to tackle for different geometries.
• This course equips the students to have basic knowledge and understanding the Partial derivatives
and maxima and minima by Lagrange’s method.
• Basic application of Double and Triple integrals used in Engineering real life problems
• To study the vector differentiation and vector integration by using standard theorems.
TEXT BOOKS:
1. Baloch, R., Ethical Hacking and Penetration Testing Guide, CRC Press, 2019.
SRMVEC R2023
3
`
REFERENCE BOOKS:
1.McClure S., Scam bray J., and Kurtz G, Hacking Exposed. Tata McGraw– Hill Education, 6th Edition
2019
2.Davidoff, S. and Ham, J., Network Forensics Tracking Hackers through Cyber space, Prentice Hall,
2012.
SRMVEC R2023
4
`
SRMVEC R2023
5
`
COURSE OUTCOMES:
At the end of the course, learners will be able to:
• To understand the crystalline material, crystal defects and growth techniques.
• To understand the basics, generation and application of ultrasonics.
• To acquire knowledge on the concepts of lasers and their applications in industry and medical field.
• To conversant on principle behind the fibres and their applications in communication and devices
made out of optical fibre.
• To get knowledge on advanced physics concepts of quantum theory and its applications
TEXT BOOKS:
1. Bhattacharya, D.K. & Poonam, T. “Engineering Physics”. Oxford University Press, 2015.
2. Gaur, R.K. & Gupta, S.L. “Engineering Physics”. Dhanpat Rai Publishers, 2012.
3. Pandey, B.K. & Chaturvedi, S. “Engineering Physics”. Cengage Learning India, 2012.
4. Brijlal and Subramanyam, “Properties of Matter”, S .Chand publishing, 2002.
5. M.N.Avadhanulu & P.G.Kshirasagar, “A Text Book of Engineering Physics” – IX Edition, S.Chand
Publications, 2014.
6. V.Rajendiran, Engineering Physics, Tata McGraw-Hill, New Delhi. 2011.
REFERENCE BOOKS:
1. Halliday, D., Resnick, R. & Walker, J. “Principles of Physics”. Wiley, 2015.
2. Serway, R.A. & Jewett, J.W. “Physics for Scientists and Engineers”. Cengage Learning, 2010.
3. Shatendra Sharma & Jyotsna Sharma, “Engineering Physics”. Pearson, 2018.
SRMVEC R2023
6
`
• To make the students familiar with boiler feed water requirements, related problems and domestic
water treatment techniques.
• To introduce the basic concepts and applications of chemical thermodynamics.
• To acquaint the student with the principles of chemical kinetics and its applications towards
engineering.
• To make the student conversant with the basics of surface chemistry and catalysis.
• To inculcate the students with the basics principles and preparatory methods of nanomaterials.
SRMVEC R2023
7
`
COURSE OUTCOMES:
At the end of the course, learners will be able to:
• To infer the quality of water from quality parameter data and propose suitable treatment.
• To apply the knowledge of chemical thermodynamics for material design and aspects
• To recommend the proper chemical kinetics for engineering processes and applications.
• To recognize the surface morphology and its engineering applications.
• To identify and apply basic concepts of nanoscience and nanotechnology in designing the synthesis
of nanomaterials for engineering and technology applications
TEXT BOOKS:
1. Payal B. Joshi and Shashank Deep, “Engineering Chemistry”, Oxford University Press, New
Delhi, 2019.
2. Shikha Agarwal, “Engineering Chemistry”-Fundamentals and Applications, 2nd Edition,
Cambridge University Press, New Delhi, 2019.
3. P. C. Jain and Monica Jain, “Engineering Chemistry”, 18th Edition, DhanpatRaiPublishing
Company (P) Ltd, New Delhi, 2021.
REFERENCE BOOKS:
1. R. V. Gadag and A. Nithyananda Shetty, “Engineering Chemistry”, 3rd Edition, Wiley & I.K.
International (P), LTD, New Delhi, 2019.
2. S.S. Dara and S.S. Umare, “A Text Book of Engineering Chemistry”, 12th Edition, S. Chand &
Company LTD, New Delhi, 2018.
3. B. Sivasankar, “Engineering Chemistry”, Tata McGraw-Hill Publishing Company LTD, 2023.
4. B. S. Murty, P. Shankar, Baldev Raj, B. B. Rath and James Murday, “Text book of nanoscience and
nanotechnology”, Universities Press-IIM Series in Metallurgy and Materials Science, 2018.
SRMVEC R2023
8
`
COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Ability to compute the electric circuit parameters for simple problems
• Ability to explain the working principle and applications of electrical machines
• Ability to analyze the characteristics of analog electronic devices
• Ability to explain the basic concepts of digital electronics
• Ability to explain the operating principles of measuring instruments
SRMVEC R2023
9
`
TEXT BOOKS:
1. Kothari DP and I.J Nagrath, “Basic Electrical and Electronics Engineering”, Second Edition,
McGraw Hill Education, 2020
2. S.K. Bhattacharya “Basic Electrical and Electronics Engineering”, Pearson Education, Second
Edition, 2017.
3. Sedha R.S., “A textbook book of Applied Electronics”, S. Chand & Co., 2008
4. James A. Svoboda, Richard C. Dorf, “Dorf’s Introduction to Electric Circuits”, Wiley, 2018.
5. A.K. Sawhney, Puneet Sawhney ‘A Course in Electrical & Electronic Measurements &
Instrumentation’, Dhanpat Rai and Co, 2015.
REFERENCE BOOKS:
1. Thomas L. Floyd, ‘Digital Fundamentals’, 11th Edition, Pearson Education, 2017.
2. Albert Malvino, David Bates, ‘Electronic Principles, McGraw Hill Education; 7th edition, 2017.
3. Mahmood Nahvi and Joseph A. Edminister, “Electric Circuits”, Schaum’ Outline Series, McGraw
Hill, 2002.
4. H.S. Kalsi, ‘Electronic Instrumentation’, Tata McGraw-Hill, New Delhi, 2010
SRMVEC R2023
10
`
GE3111 தமிழர்மரபு L T P C
1 0 0 1
இந்திய ம ொழிக் குடும்பங்கள் - திரொவிட ம ொழிகள்- த ிழ் ஒரு மெம்ம ொழி- த ிழ் மெவ்விலக்தியங்கள்- ெங்க
இலக்கியத்தின் ெ யச் ெொர்பற்ற தன்ம - ெங்க இலக்கியத்தில் பதிர்தல் அறம்- திருக்குறளில் ம லொண்ம க்
கருத்துகள்- த ிழ்க் கொப்பியங்கள், த ிழகத்தில் ெ ண மபளத்த ெ யங்களின் தொக்கம் - பக்தி இலக்கியம்,
ஆழ்வொர்கள் ற்றும் நொயன் ொர்கள்- ெிற்றிலக்கியங்கள்- த ிழில் நவன
ீ இலக்கியத்தின் வளர்ச்ெி - த ிழ் இலக்கிய
வளர்ச்ெியில் பொரதியொர் ற்றும் பொரதிதொென் ஆகிமயொரின் பங்களிப்பு
த ிழகத்தின் தொவரங்களும், விலங்குகளும் - மதொல்கொப்பியம் ற்றும் ெங்க இலக்கியத்தில் அகம் ற்றும் புறக்
மகொட்பொடுகள்- த ிழர்கள் மபொற்றிய அறக்மகொட்பொடு -த ிழ் ெங்கம்-ெங்கம் வளர்த்த த ிழ்- ெங்ககொலத்தில்
த ிழகத்தில் எழுத்தறிவும், கல்வியும்- ெங்ககொல நகரங்களும் துமறமுகங்களும் - ெங்ககொலத்தில் ஏற்று தி ற்றும்
இறக்கு தி கடல்கடந்த நொடுகளில் மெொழர்களின் மவற்றி
இந்திய விடுதமலப்மபொரில் த ிழர்களின் பங்கு இந்தியொ ற்றும் மவளிநொட்டின் பிற பகுதிகளின் த ிழ்ப்
பண்பொட்டின் தொக்கம். சுய ரியொமத இயக்கம் - இந்திய ருத்துவத்தில், ெித்த ருத்துவத்தின் பங்கு- கல்மவட்டுகள்,
மகமயழுத்துப்படிகள் - த ிழ்ப் புத்தகங்களின் அச்சு வரலொறு
TOTAL: 15 PERIODS
SRMVEC R2023
11
`
SRMVEC R2023
12
`
SRMVEC R2023
13
`
9. Keeladi - ‘Sangam City Civilization on the banks of river Vaigai’ (Jointly Published by:
Department of Archaeology & Tamil Nadu Text Book and Educational Services
Corporation, Tamil Nadu)
10. Studies in the History of India with Special Reference to Tamil Nadu (Dr.K.K.Pillay)
(Published by: The Author)
11. Porunai Civilization (Jointly Published by: Department of Archaeology & Tamil Nadu Text
Book and Educational Services Corporation, Tamil Nadu)
12. Journey of Civilization Indus to Vaigai (R.Balakrishnan) (Published by: RMRL) – Reference
Book.
SRMVEC R2023
14
`
TOTAL : 30 PERIODS
COURSE OUTCOMES:
At the end of the course, the students should be able
• Understand the functioning of various physics laboratory equipment.
• Use graphical models to analyze laboratory data.
• Use mathematical models as a medium for quantitative reasoning and describing physical
reality.
• Access, process and analyze scientific information.
• Solve problems individually and collaboratively.
REFERENCE:
1. Wilson J.D. and Hernaandez Hall C.A.,― Physics Laboratory Experiments, Houghton Mifflin Company,
New York, 2005.
2. S. Srinivasan, A Text Book of Practical Physics, S. Sultan Chand publications. 2005
3. R. Sasikumar, Practical Physics, PHI Learning Pvt. Ltd, New Delhi, 2011.
SRMVEC R2023
15
`
COURSE OBJECTIVES:
• To inculcate experimental skills to test basic understanding of water quality parameters, such as
acidity, alkalinity, hardness, DO, TDS, chloride, and chlorine.
• To familiarise the students with electroanalytical techniques like conductometry and flame
photometry to determine the impurities in aqueous solution.
• To find the various characteristics of domestic water.
• To understand the Pseudo first-order kinetics reaction.
• To make the students know the synthesis of nanoparticles.
LIST OF EXPERIMENTS:
SRMVEC R2023
16
`
COURSE OBJECTIVES:
• To provide exposure to the students with hands on experience on various basic engineering
practices in Civil, Mechanical, Electrical and Electronics Engineering.
• To provide hands on training for fabrication of components using carpentry, sheet metal and
welding equipment / tools
• To gain the skills for making fitting joints and assembling air conditioner
• To develop the skills for making simple electrical wiring connections using suitable tools
• To provide hands on experience for soldering and gain knowledge about the behavior of
electronics components
GROUP A (CIVIL & MECHANICAL)
Basic Machining:
a) Facing
b) Simple Turning
c) Step Turning
SRMVEC R2023
17
`
TOTAL: 60 PERIODS
SRMVEC R2023
18
`
UNIT – I: PRONUNCIATION 6
Tone- Pronunciation – Intonation- Reading Aloud and Addressing- Syllable- Rhythm-Accent- Wrongly Pronounced
words -Poetry Reading
UNIT – II: NON VERBAL COMMUNICATION 6
Non Verbal Communication - Facial expressions- Eye contact - Subtle (and not so subtle) gestures -Tone of voice –
Touch- Posture -Personal space.
UNIT – III: SELF INTRODUCTION AND PRESENTATION 6
Self Introduction- Introducing oneself to the audience- Introducing the Topic – answering questions – Individual
Presentation Practice – Presenting Visuals effectively -5 Minute Presentations.
UNIT – IV: BASICS OF SOFT SKILLS 6
Recognizing differences between groups and teams – managing time – networking professionally – Respecting social
protocols- understanding career management – Developing a long - term career plan- making career changes.
UNIT – V: GROUP DISCUSSION 6
Introduction to Group Discussion – Participating in Group discussions – Understanding group dynamics –
Brainstorming the Topic – Questioning and Clarifying – GD Strategies – activities to improve GD Skills.
TOTAL: 30 PERIODS
COURSE OUTCOMES:
At the end of the course, the student should be able to:
• Pronounce the words correctly.
• Understand the nonverbal clues.
• Make an effective presentation.
• Adequate soft skills required for the workplace.
• Participate confidently in Group Discussions.
REFERENCE BOOKS:
1. Professional Communication by Meenakshi Raman & Sangeeta Sharma, Oxford Univ.Press, 2014.
2. Soft Skills by S. Hariharan , N. Soundarajaran and S.P. Shanmugapriya MJP Publishers, Edition:
2013
3. Soft Skills for Everyone by Butterfield , Jeff, Cengage Learning India Pvt. Ltd.,2015. New Delhi.
SRMVEC R2023
19
`
SRMVEC R2023
20
`
SEMESTER II
EN3211 PROFESSIONAL ENGLISH – II L T P C
3 0 0 3
COURSE OBJECTIVES:
• To develop strategies and techniques to enhance their reading skills.
• To engage them in meaningful activities in order to improve their listening, speaking, reading and
writing skills.
• To improve their ability to write effective job application, resumes and draft impressive reports.
• To develop analytical thinking skills for problem solving in communicative contexts.
• To participate in group discussions.
UNIT – I: MAKING COMPARISON 9
Listening: Clippings of Ted talk, cartoon and interviews of sports personalities for listening and discussion.
Speaking: Descriptions and discussions based on newspaper.
Reading: Learning shades of meaning (using Thesaurus) and inferring the context from general passages.
Writing: Compare & Contrast essays and Jumbled Sentences.
Language and Vocabulary development: Prepositional phrases, contextual meaning of words. Verbal Analogy,
Same word used as Noun and Verb.
UNIT – II: EXPRESSING CAUSAL RELATIONS IN SPEAKING AND WRITING 9
Listening: Anecdotes to be read from books like Chicken Soup books. Evaluative listening – Advertisement and
Product description.
Speaking: Marketing a product, persuasive speech
Reading: Description of any product / jewellery, Brochures and Manual.
Writing: Formal letters- letters of complaint, appreciation, and suggestion, Comprehension and E-mail (formal)
Language and Vocabulary development: Active & Passive, Infinitive, Gerund, Purpose Statements, Adverbs and
Word formation
UNIT – III: ABILITY TO PUT IDEAS OR INFORMATION COGENTLY 9
Listening: Listen to English songs and find the lyrics/new words
Speaking: Role play and Interviews
Reading: Reading magazine articles, Excerpts from literary texts
Writing: Job Application, Resume, Cover letter, SWOC Analysis and Recommendations.
Language and Vocabulary development: Correction of errors, If conditional, Sentence completion and
Connotations.
UNIT – IV: ANALYZING PROBLEMS AND EXPRESSING SOLUTIONS 9
Listening: Watching Stand-up comedies and comprehending ideas expressed there.
Speaking: Speak about the Stand-up comedies viewed and express personal views about the same
Reading: Reading different types of books (novels, short stories, biographies, magazines etc. and speaking about
the same.
Writing: Dialogue Writing, Checklist and Problem Solving essays.
Language and Vocabulary development: Reported Speech, Modals, Slogan writing and Conjunctions.
UNIT – V: REPORTING EVENTS 9
Listening: Listening to spot errors, listening to varied dialects and accents of English.
Speaking: Group discussion- Expression of opinions, assertion, coercion etc.
Reading: Reading life experiences of common man from magazines.
Writing: Accident Report / Survey Report and Letters to the Editor.
Language and Vocabulary development: Numerical Adjective, Idioms, Vocabulary – Shades of Meaning.
TOTAL: 45 PERIODS
SRMVEC R2023
21
`
COURSE OUTCOMES:
At the end of the course, the student should be able to:
• To compare and contrast ideas and information from technical texts.
• To incorporate basic grammar structures to express appreciation, suggestion and complaint in
writing.
• To draft effective resumes using appropriate vocabulary and to avoid common errors.
• To analyse problems so as to arrive at appropriate solutions and to communicate relevantly.
• To draft technical reports, letters and to express ideas creatively.
TEXT BOOKS:
1.English for Science and Technology Cambridge University Press,2021. Dr.Veena Selvam,
Dr.Sujatha Priyadarshini, Dr. Deep Mary Francis, Dr.K.N.Shoba and Dr.Lourdes Joevani,
Department of English, Anna University.
2.Technical Communication – Principles and Practice by Meenakshi Raman & Sangeeta Sharma,
Oxford Univ.Press, 2016, New Delhi.
3.Technical English for Professional – Advanced by C. Gangalakshmi, B. Rathika and L. Saranraj,
Cengage Learning India Pvt. Ltd.,2022.
REFERENCE BOOKS:
1.Learning to communicate – Dr. V. Chellammal, Oxford Univ.Press,2001 New Delhi.
2.Business Correspondence and Report Writing by Prof. R. C. Sharma & Krishna Mohan, Tata
McGraw Hill & Co. Ltd., 2001, New Delhi.
3.Developing Communication Skills by Krishna Mohan, Meera Bannerji- Macmillan India Ltd. 1990,
Delhi.
4.Improve Your Writing ed. V.N Arora Laxmi Chandra, Oxford Univ. Press, 2001, New Delhi.
5.English For Engineers and Technologists, Orient Blackswan Private Ltd. Department of English,
Anna University,2020.
SRMVEC R2023
22
`
• This course aims at providing the necessary basic concepts of statistical and Numerical Methods
for solving numerically different problems of engineering and Technology.
• To acquaint the knowledge of testing of hypothesis for small and large samples which plays an
important role in real life problems.
• To introduce the basic concepts of solving algebraic and transcendental equations.
• To introduce the numerical techniques of interpolation in various intervals and differentiation and
integration in engineering and technology disciplines.
• To acquaint the knowledge of various techniques and methods of solving ordinary differential
equations.
COURSE OUTCOMES:
On Completion of the course, the students should be able to have:
• Apply the concept of testing of hypothesis for small and large samples in real life problems.
• Apply the basic concepts of classifications design of experiments in the field of agriculture.
• Appreciate the numerical techniques of interpolation in various intervals and apply the numerical
techniques of differentiation and integration for engineering problems.
• Understand the knowledge of various techniques and methods for solving first and second order
ordinary differential equations.
• Solve the ordinary differential equations with initial and boundary conditions by using certain
techniques with engineering application.
SRMVEC R2023
23
`
TEXT BOOKS:
1. Grewal. B.S. and Grewal. J.S., “Numerical Methods in Engineering and Science ", 10th
2. Edition, Khanna Publishers, New Delhi,2015.
3. Johnson, R.A., Miller, I and Freund J., “Miller and Freund’s Probability and Statistics for Engineers",
Pearson Education, Asia, 8th Edition,2015.
REFERENCE BOOKS:
1. Burden, R.L and Faires, J.D, "Numerical Analysis”, 9th Edition, Cengage Learning,2016.
2. Devore. J.L., "Probability and Statistics for Engineering and the Sciences”, Cengage Learning, New
Delhi, 8th Edition, 2014.
3. Gerald.C.F., Wheatley. P.O. "Applied Numerical Analysis” Pearson Education, Asia, New Delhi,
2006.
SRMVEC R2023
24
`
• To provide information on the free electron theories and to understand the electrical properties of
conducting material.
• To teach the basic knowledge of semiconductors and their applications.
• To enhance the idea of magnetic materials in storage devices and also to enrich the basic
knowledge of superconductors and their applications.
• To gain knowledge about the interaction of photons with materials and optoelectronic devices.
• To understand the fundamental concepts of nanomaterials and quantum computing.
SRMVEC R2023
25
`
COURSE OUTCOMES:
At the end of the course, the student should be able to:
• To understand the classical and quantum-free electron theories, and energy bands in solids.
• To apply the concepts of semiconductor Physics and its applications in various devices.
• To apply the properties of magnetic materials and superconductors in various fields.
• To understand the basics of optical materials and apply knowledge to develop materials for
optoelectronic devices.
• To know the concepts and applications of quantum structures and the basics of quantum computing.
TEXT BOOKS:
1. Kasap, S.O., “Principles of Electronic Materials and Devices”, McGraw-Hill Education,2007.
2. M. Arumugam, “Semiconductor Physics and optoelectronics”, Anuradha agencies,2003.
3. Kittel, C., “Introduction to Solid State Physics”, Wiley, 2005.
4. Wahab, M.A. “Solid State Physics: Structure and Properties of Materials”.Narosa Publishing House,
2009.
5. B. K. Pandey., S. Chaturvedi., “Engineering Physics”, Cengage Learning, 2012.
6. V.Rajendiran, Engineering Physics, Tata McGraw-Hill, New Delhi. 2011.
REFERENCE BOOKS:
1. B. N. Sankar., S. O. Pillai., “Engineering Physics” New age international publishers, 2007.
2. Donald .A.Neamen., “Semiconductor Physics and devices” Tata Mc Graw-Hill, New Delhi. 2007
3. Rogers, B., Adams, J. & Pennathur, S. “Nanotechnology: Understanding small systems”, CRC
Press, 2014.
ONLINE RESOURCES:
1. “Optoelectronics - An introduction” -Jhon Wilson and Jhon Hawkes- Prentice Hall Europe- ISBN
0-13-1039M-X
2. “Quantum Computing -A Gentle Introduction”- Eleanor Rieffel and Wolfgang Polak - ISBN 978-
0-262-01506-6
3. “An introduction to Quantum Computing” -NPTEL - https://nptel.ac.in/courses/106106232
SRMVEC R2023
26
`
• To make the students acquainted with various energy sources, storage devices, and battery
technology.
• To acquaint the student with the principles of photochemistry, application of spectroscopy, and
sample analyzing techniques.
• To understand the preparation, properties, and engineering applications of functional materials,
nanoreactors, nanoelectronics, and sensors.
• To make the student conversant with the basics of composites, their properties, and applications in
memory devices.
• To acquaint the students with the basics of biomolecule networks, metabolic pathways, drug
design applications, drawing tools, and structure visualizations.
SRMVEC R2023
27
`
COURSE OUTCOMES:
At the end of the course, the student should be able to:
• To apply the gained knowledge on different energy sources and storage devices.
• To recognize the principle and concepts in photochemistry and spectroscopy.
• To recommend smart materials and sensors for the development of innovative materials.
• To utilize the different composites and memory devices.
• To identify the structural information about different materials with help of software.
TEXT BOOKS:
1.Shikha Agarwal, “Engineering Chemistry”-Fundamentals and Applications, 2nd Edition, Cambridge
University Press, New Delhi, 2019.
2.P. C. Jain and Monika Jain, “Engineering Chemistry”, 17th Edition, Dhanpat Rai Publishing
Company (P) LTD, New Delhi, 2019.
3.S. Vairam, P. Kalyani and Suba Ramesh, “Engineering Chemistry”, Wiley India PVT, LTD, New
Delhi, 2013.
REFERENCE BOOKS:
1.Friedrich Emich, “Engineering Chemistry”, Scientific International PVT, LTD, New Delhi, 2014.
2.S.S. Dara and S.S. Umare, “A Text Book of Engineering Chemistry”, 12th Edition, S. Chand &
Company LTD, New Delhi, 2018.
3.B. Sivasankar, “Engineering Chemistry”, Tata McGraw-Hill Publishing Company LTD, 2023.
4.O. G. Palanna, Engineering Chemistry, McGraw Hill Education (India) Pvt, Ltd, New Delhi, 2017.
SRMVEC R2023
28
`
COURSE OUTCOMES:
At the end of the course, the student should be able to:
• Develop simple computational problems using control flow statements.
• Decompose a Python program into functions, Modules and Packages.
• Represent compound data using Python lists, tuples, Strings, Set and dictionaries.
• Read and write data from/to files and Exception handling in Python Programs.
• Understand the concepts of Object Oriented Programming and to develop real time applications.
SRMVEC R2023
29
`
TEXT BOOKS:
1.Reema Thareja, “Python Programming using Problem solving Approach”, Oxford Higher
Education,2018.
2.Allen B. Downey, “Think Python: How to Think Like a Computer Scientist”, 2nd edition, Updated for
Python 3, Shroff/O’Reilly Publishers, 2016 (http://greenteapress.com/wp/think- python/)
3.Guido van Rossum and Fred L. Drake Jr, “An Introduction to Python” – Revised and updated for
Python 3.2, Network Theory Ltd., 2011.
REFERENCE BOOKS:
1.Charles Dierbach, “Introduction to Computer Science using Python: A Computational Problem-
Solving Focus”, Wiley India Edition, 2013.
2.John V Guttag, “Introduction to Computation and Programming Using Python’’, Revised and
expanded Edition, MIT Press , 2013
3.Kenneth A. Lambert, “Fundamentals of Python: First Programs”, CENGAGE Learning, 2012.
4.Paul Gries, Jennifer Campbell and Jason Montojo, “Practical Programming: An Introduction to
Computer Science using Python 3”, Second edition, Pragmatic Programmers,LLC,2013.
5.Robert Sedgewick, Kevin Wayne, Robert Dondero, “Introduction to Programming in Python: An
Inter-disciplinary Approach”, Pearson India Education Services Pvt. Ltd., 2016.
WEB REFERENCES:
1.http://greenteapress.com/wp/think-python/
2.www.docs.python.org
SRMVEC R2023
30
`
ெங்க கொலத்தில் மநெவுத் மதொழில் - பொமனத் மதொழில்நுட்பம் - கருப்பு ெிவப்பு பொண்டங்கள் - பொண்டங்களில் கீ றல்
குறியீடுகள்.
ெங்ககொலத்தில் வடிவம ப்பு ற்றும் கட்டு ொனங்கள் & ெங்க கொலத்தில் வட்டு
ீ மபொருட்களில் வடிவம ப்பு -
ெங்ககொலத்தில் கட்டு ொன மபொருட்களும் நடுகல்லும் - ெிலப்பதிகொரத்தில் ம மட அம ப்பு பற்றிய விவரங்கள் -
ொ ல்லபுரம் ெிற்பங்களும் மகொவில்களும் - மெொழர் கொலத்துப் மபருங்மகொயில்கள் ற்றும் பிற வழிபொட்டு தலங்கள்
- நொயக்கர் கொல மகொவில்கள் - ொதிரி கட்டம ப்புகள் பற்றி அறிதல், துமர ீ னொட்ெி அம் ன் ஆலயம் ற்றும்
திரு மல நொயக்கர் ஹொல் - மெட்டிநொடு வடுகள்
ீ - பிரிட்டிஷ் கொலத்தில் மென்மனயில் இந்மதொ-ெொமரொமெனிக்
கட்டிடக்கமல.
கப்பல் கட்டும் கமல – உமலொகவியல் - இரும்புத் மதொழிற்ெொமல - இரும்மப உருக்குதல், எஃகு - ஃப் வரலொற்று
ெொன்றுகளொக மெம்பு ற்றும் தங்க நொணயங்கள் - நொணயங்கமள அச்ெடித்தல் - ணி உருவொக்கும்
மதொழிற்ெொமலகள் – கல் ணிகள், கண்ணொடி ணிகள் - சுடு ண் ணிகள் - ெங்கு ணிகள் - எழும்பு துண்டுகள்
- மதொல்லியல் ெொன்றுகள் - ெிலப்பதிகொரத்தில் ணிகளின் வமககள்.
அமண, குளம், குளங்கள், தகு, மெொழர் கொல கு ிழி தூம்புவின் முக்கியத்துவம், விலங்கு கொல்நமட - கொல்நமட
பயன்பொட்டிற்கொக வடிவம க்கப்பட்ட கிணறுகள் - மவளொண்ம ற்றும் மவளொண்ம ெொர்ந்த மெயல்பொடுகள் -
கடல்ெொர் அறிவு - ீ ன்வளம் – முத்துக்குளித்தல் - மபருங்கடல் குறித்த பண்மடய அறிவு - அறிவு ெொர்ந்த ெமூகம்.
அறிவியல் த ிழின் வளர்ச்ெி - கணித்த ிழ் வளர்ச்ெி - த ிழ் நூல்கமள ின்பதிப்பு மெய்தல் - த ிழ்
ம ன்மபொருட்கள் உருவொக்கம் - த ிழ் இமணயக் கல்விக்கழகம் - த ிழ் ின்நூலகம் - இமணயத்தில் த ிழ்
அகரொதிகள் - மெொற்குமவ திட்டம்.
TOTAL: 15 PERIODS
SRMVEC R2023
32
`
SRMVEC R2023
33
`
Department of Archaeology & Tamil Nadu Text Book and Educational Services
Corporation, Tamil Nadu)
10. Studies in the History of India with Special Reference to Tamil Nadu (Dr.K.K.Pillay)
(Published by: The Author)
11. Porunai Civilization (Jointly Published by: Department of Archaeology & Tamil Nadu Text
Book and Educational Services Corporation, Tamil Nadu)
12. Journey of Civilization Indus to Vaigai (R.Balakrishnan) (Published by: RMRL) – Reference
Book.
SRMVEC R2023
34
`
• To draw the conics curves and special curves, use BIS conventions, and specifications for
engineering drawing.
• To draw the orthographic projection of lines and plane surfaces.
• To draw the projections and solids and Isometric projection of simple solids.
• To draw the section of solids and the development of surfaces.
• To draw free hand sketching of basic geometrical constructions, multipleviews of objects and
Perspective Projection of simple solids.
SRMVEC R2023
35
`
COURSE OUTCOMES:
At the end of the course, the student should be able to:
• To construct the conics curves & special curves, use BIS conventions, and specifications for
engineering drawing.
• To construct the orthographic projection of lines and plane surfaces.
• To construct the projections and solids and Isometric projection of simple solids.
• To construct projections of section of solids and development of surfaces.
• To construct free hand sketching of basic geometrical constructions, multiple views of objects and
Perspective Projection of simple solids
TEXT BOOKS:
1. N.D.Bhatt, “Engineering Drawing (Plane and Solid Geometry)”, Charotar Publishing House PVT.
LTD. 53rd Edition 2019 (Fifth Reprint)
2. Venugopal K. and Prabhu Raja V., “Engineering Graphics”, New Age International (P) Limited,
15th Edition 2018.
REFERENCE BOOKS:
1. T. Jeyapoovan, “Engineering Graphics Using Auto CAD”, Vikas Publishing House Pvt. LTD,
seventh Edition, 2015.
2. Luzzader, Warren.J. and Duff, John M., “Fundamentals of Engineering Drawing with an
introduction to Interactive Computer Graphics for Design and Production”, Eastern Economy
Edition, Prentice Hall of India Pvt. Ltd, New Delhi, 2005.
3. Shah M.B., and Rana B.C., “Engineering Drawing”, Pearson, 2nd Edition, 2011.
4. Basant Agarwal and Agarwal C.M., “Engineering Drawing”, Tata McGraw Hill Publishing
Company Limited, New Delhi, 2013
SRMVEC R2023
36
`
TOTAL : 30 PERIODS
COURSE OUTCOMES:
At the end of the course, the students should be able
• To understand the functioning of various physics laboratory equipment.
• To use graphical models to analyze the laboratory data and to solve problems individually and
collaboratively.
• Use mathematical models as a medium for quantitative reasoning and describing physical
reality.
• Access, process and analyze scientific information.
• Solve problems individually and collaboratively.
REFERENCE:
1. Wilson J.D. and Hernaandez Hall C.A.,― Physics Laboratory Experiments, Houghton Mifflin Company,
New York, 2005.
2. S. Srinivasan, A Text Book of Practical Physics, S. Sultan Chand publications. 2005
3. R. Sasikumar, Practical Physics, PHI Learning Pvt. Ltd, New Delhi, 2011.
SRMVEC R2023
37
`
COURSE OBJECTIVES:
• To train the students in basic experimental skills in water contaminants such as copper and
chromium.
• To familiarise the students with electroanalytical techniques such as pH metry, potentiometry, and
conductometry to determine impurities in aqueous solutions.
• To familiarize the students with the determination of the molecular weight of a polymer by a
viscometer.
• To make the student up-to-date with the properties and nature of alloys experimentally.
• To demonstrate the analysis of coal.
LIST OF EXPERIMENTS:
1. Estimation of copper content of the given solution by Iodometry.
2. Determination of strength and amount of acids in a mixture of acids using a conductivity meter.
3. Determination of strength and amount of HCl present in the whole of the given solution using a
conductivity meter.
4. Estimation of the iron content of the given solution using a potentiometer.
5. Determination of chromium by EDTA titration.
6. Determination of strength of given hydrochloric acid using a pH meter.
7. Determine the molecular weight of the polyvinyl alcohol using an Ostwald viscometer.
8. Estimation of Nickel in steel.
9. Proximate Analysis of Coal.
10. Corrosion experiment-weight loss method.
11. Determination of COD value of industrial effluents.
TOTAL : 30 PERIODS
COURSE OUTCOMES:
At the end of the course, the students should be able
• To find the quality of water samples for copper and chromium present in water.
• To recognize the amount of various ions present in the water sample through volumetric and
instrumentation techniques.
• To identify the molecular weight of the polymer using an Ostwald viscometer.
• To recognize an environmental hazardous and threshold limit for industrial effluents.
• To recommend quality of coal and steel when it is exposed to various environment.
TEXTBOOKS:
1. Vogel’s Textbook of Quantitative Chemical Analysis (8th Edition, 2014).
2. Suchi Tiwari, Engineering Chemistry Lab Manual, Scitech Publications (India) Pvt. Ltd. (2nd
Edition, 2013).
3. Pushpendra Kumar, Laboratory Manual for Engineering Chemistry, Reyansh Authortopic Pvt. Ltd.,
(1st Edition, 2022).
CO-PO and PSO MAPPING:
Programme Outcomes (PO) PSO
Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 2 3 1 1 - 1 - - - - - - - - -
CO 2 3 3 2 1 1 - - - - - - - - - - -
CO 3 3 2 3 1 1 - - - - - - - - - - -
CO 4 3 3 2 1 2 - - - - - - 1 - 2 - -
CO 5 3 2 3 1 1 - - - - - - - - - - -
AVG 3 2.4 2.6 1 1.2 - 0.2 - - - - 0.2 - 0.4 - -
SRMVEC R2023
38
`
LIST OF EXPERIMENTS:
1. Compute the GCD of two numbers.
2. Find the square root of a number. (Newton’s method)
3. Find exponentiation of a number. (power of a number)
4. Find the maximum of a list of numbers.
5. Program for basic calculator operations using functions.
6. Generate Fibonacci series using function.
7. Program for Armstrong number.
8. Program for check the number is Palindrome or Not.
9. Program for sum of array of numbers.
10. How to create, slice, change, add, delete and index elements using list.
11. Linear search and Binary search.
12. Find First n prime numbers.
13. Program to remove duplicate elements from a list.
14. Program for addition and transpose of a matrix.
15. How to create, slice, change, delete and index elements using Tuple.
16. Write a program to reverse the string.
17. How to change, delete, add and remove elements in Dictionary.
18. Create a dictionary of radius of circle and its circumference.
19. Program for count the number of words in a file.
20. Find the most frequent words in a text read from a file.
21. Program for student information system using class and objects.
22. Program for Employee Payroll Processing using class and objects.
TOTAL : 60 PERIODS
PLATFORM NEEDED:
Python 3 interpreter for Windows/Linux
COURSE OUTCOMES:
At the end of the course, the students should be able
• Develop simple computational problems using control flow statements.
• Decompose a Python program into functions, Modules and Packages.
• Represent compound data using Python lists, tuples, Strings, Set and dictionaries.
• Read and write data from/to files and Exception handling in Python Programs.
• Understand the concepts of Object Oriented Programming and to develop real time
applications.
SRMVEC R2023
39
`
TEXT BOOKS:
1.Reema Thareja, “Python Programming using Problem solving Approach”, Oxford Higher
Education,2018.
2.Allen B. Downey, “Think Python: How to Think Like a Computer Scientist”, 2nd edition, Updated
for Python 3, Shroff/O’Reilly Publishers, 2016 (http://greenteapress.com/wp/think- python/)
3.Guido van Rossum and Fred L. Drake Jr, “An Introduction to Python” – Revised and updated for
Python 3.2, Network Theory Ltd., 2011.
REFERENCE:
1.Charles Dierbach, “Introduction to Computer Science using Python: A Computational Problem-
Solving Focus”, Wiley India Edition, 2013.
2.John V Guttag, “Introduction to Computation and Programming Using Python’’, Revised and
expanded Edition, MIT Press , 2013
3.Kenneth A. Lambert, “Fundamentals of Python: First Programs”, CENGAGE Learning, 2012.
4.Paul Gries, Jennifer Campbell and Jason Montojo, “Practical Programming: An Introduction to
Computer Science using Python 3”, Second edition, Pragmatic Programmers,LLC,2013.
5.Robert Sedgewick, Kevin Wayne, Robert Dondero, “Introduction to Programming in Python: An
Inter-disciplinary Approach”, Pearson India Education Services Pvt. Ltd., 2016.
WEB REFERENCES:
1. http://greenteapress.com/wp/think-python/
2. www.docs.python.org
3. https://nptel.ac.in/courses/106/106/106106182/
SRMVEC R2023
40
`
ACTIVITIES:
2. Building Vocabulary - Using relevant set of words for different contexts (2)
COURSE OUTCOMES:
At the end of the course, the students should be able
• To enable students to express themselves easily and coherently.
• To help students to speak the language using the right words and pronouncing them
correctly.
REFERENCE:
1.https://www.cambridgeenglish.org/learning-english/activities-for- learners/?skill=pronunciation
2.https://www.quillsandquotes.ca/post/12-fun-games-to-get-students-public-speaking
SRMVEC R2023
41
`
• To enhance the inbuilt talents in arts and crafts and fine arts activities.
• To explore and exhibit theirs qualities in cultural activities as well as in the leadership.
ACTIVITIES:
1. ARTS & CRAFTS - The students will be given with innovative Theme, (1)
they have to Show their talents in one hour time with basic facilities
provided.
2. SINGING & DANCING - The students are expected to present their (2)
talents on spot or With given Theme, either solo or group performance.
3. MIME & DRAMA - Students will be given 5 - 7 minutes of time to present (2)
their variety Entertainments in way of Mono acting or Drama .
COURSE OUTCOMES:
At the end of the course, the students should be able
• To enable students to explore their inbuilt talents in fine arts activities.
• To motivate the students to show case their cultural and leadership qualities.
REFERENCE:
1.https://www.youtube.com/watch?v=1mkESRWiSKc – Teach your own crafts.
2.https://www.youtube.com/watch?v=YHqwrDGywH4 – How to teach Arts & Crafts
SRMVEC R2023
42
`
• To enhance the Logical reasoning of the first-year engineering students by means of creating
opportunity to improve the aptitude skill.
• To explore the applications of Mathematics in the field of Engineering, Science and Technology and
to utilize this skill for their academic activities.
ACTIVITIES:
COURSE OUTCOMES:
At the end of the course, the students should be able
• To enable students to explore their mathematical reasoning skills.
• To motivate the students to apply Mathematics in Engineering and Technology and demonstrate
their work by means of Physical model and present their research article.
REFERENCE:
1.Advanced Engineering Mathematics , Erwin Kreyszig, 10th Edition, Wiely India Pvt Ltd.
2.https://www.stewartcalculus.com/
SRMVEC R2023
43
`
ACTIVITIES:
COURSE OUTCOMES:
At the end of the course, the students should be able
• Recollect the general principles of Physics.
• To explore the topics in the current trends in Physics.
• Develop practical expertise in various areas of Physics.
REFERENCE:
1.Principles of Physics, 10Ed, Isv by Robert Resnick Jearl Walker, David Halliday (2015)
2.‘The Feynman Lectures on Physics’ (Volume I, II and III) , Matthew Sands, Richard Feynman, and
Robert B. Leighton.
3.https://www.science-sparks.com/top-5-physics-experiments-you-can-try-at-home
4.https://www.electronicsforu.com/category/electronics-projects/hardware-diy.
SRMVEC R2023
44
`
ACTIVITIES:
COURSE OUTCOMES:
At the end of the course, the students should be able
• To promote inquisitiveness among the students and inculcate Scientific mind mapping.
• To develop students, interest and participation in the practical applications of the knowledge
related to environmental sciences.
• Take part in practical, hands-on science activities close to nature.
REFERENCE:
1.M. Senapati, Advanced Engineering Chemistry, Infinity science press, New Delhi, 2007.
2.https://www.sciencedirect.com/topics/agricultural-and-biological- sciences/environmental-
sustainability
3.https://www.indiabix.com/general-knowledge/chemistry/
SRMVEC R2023
45
`
ACTIVITIES:
1. INTRODUCTION - Introduction of NSO & Physical Fitness and games Skills (1)
Test
COURSE OUTCOMES:
At the end of the course, the students should be able
• Get basic knowledge about physical and mental fitness
• NSO create self-esteem and self confidence
• NSO provide opportunity get social interaction
• Development of character and personality through participation
REFERENCE:
1.www.google.com
2.https://scholar.google.com/
3.https://www.medindia.net/patients/lifestyleandwellness/five-essential-components-of- physical-
fitness-references.htm
4.https://pubmed.ncbi.nlm.nih.gov/
SRMVEC R2023
46
`
தமிழ் மன்ைம் 0 0 0 1
பொடத்திட்டத்தின் கநொக்கங்கள்:
பயிற்சி திட்டம்:
1.மபச்சுகமல பயிற்ெி
2.கவிமத ற்றும் கட்டுமரகள் எழுதும் பயிற்ெி
3.அறிவியல் மபொறியியல் மதொழில்நுட்பங்கமள த ிழில் எழுதுதல்
4.பட்டி ன்ற ம மடகளில் மபசும் பயிற்ெி
5.நொட்டுப்புற பொடல்கள் பொடுதல் ற்றும் கமதகள் எழுதும் பயிற்ெி
கற்ைல் முடிவு:
• மபச்சுகமலத் மதர்ச்ெி
• நொட்டுப்புற பொடல்கள் பற்றிய புரிதல்
கமற்ககொள்கள்:
1.https://eegarai.darkbb.com/t63483-topic
2.https://poriyari.in/
SRMVEC R2023
47
`
ACTIVITIES:
COURSE OUTCOMES:
At the end of the course, the students should be able
• Enhanced Social Awareness
• Personality development of the individual
REFERENCE:
1.IRCS/YRC Handbook
2.https://www.indianredcross.org/youth/Guidelines-for-JYRC-LR.pdf
SRMVEC R2023
48
`
• To help learners know about NSS in the context of youth, community and voluntary service.
• To teach the importance of health, hygiene and sanitation for a healthy Nation.
• To understand the community in which they work.
• To identify the problems of the community and involve them in problem-solving.
• To develop the capacity to meet emergencies and natural disasters.
• To practice the National integration and social harmony.
• To utilize their knowledge in finding practical solutions to individual and community
CREDIT:
6 0 18 1*
COURSE OUTCOMES:
Learners will have the knowledge about NSS and its role in the fields of health, hygiene, emergencies
& natural disasters and involve them in problem-solving of the nearest community so as to build a
strong country.
SYLLABUS:
Topic - I : Introduction and Basic Concepts of NSS [8]
a) History – Aim – Objectives of NSS
b) Emblem – Motto – Badge - Song
c) Organizational structure - Roles and Responsibilities of NSS
d) Regular activities
e) Any approved indoor / outdoor programs by the Principal
Topic - III : Health, Hygiene and Sanitation and Youth Health [8]
a) Definition, Needs and Scope of Health Education
b) Swachh Bharat Abhiyan
c) Healthy Lifestyles
d) HIV, AIDS, Drugs abuse
e) Any approved indoor / outdoor programs by the Principal
SRMVEC R2023
49
`
REFERENCE:
1.National Service Scheme Manual (Revised) 2006, Government of India, Ministry ofYouth Affairs
and Sports, New Delhi.
2.National Youth Policy, Government of India, Ministry of Youth Affairs and Sports, New Delhi.
3.https://nss.gov.in/
SRMVEC R2023
50
`
SEMESTER III
MA3322 DISCRETE MATHEMATICS L T P C
3 0 0 3
COURSE OBJECTIVES:
• To extend student‘s logical and mathematical maturity and ability to deal with abstraction.
• To introduce most of the basic terminologies used in computer science courses and application of
ideas to solve practical problems.
• To understand the basic concepts of Combinatorics and graph theory.
• To familiarize the applications of algebraic structures.
• To understand the concepts and significance of lattices and Boolean algebra which are widely
used in computer science and engineering.
UNIT – I: LOGICS 9L
Propositional logic – Propositional equivalences – Normal Forms – Rules of inference.
UNIT – II: ADVANCED COUNTING PRINCIPLE 9L
Mathematical induction – Strong induction and well ordering – The basics of counting – The pigeonhole principle –
Permutations and combinations - Inclusion and exclusion principle and its applications.
UNIT – III: GRAPH THEORY 9L
Graphs and graph models – Graph terminology and special types of graphs – Matrix representation of graphs and
graph isomorphism – Connectivity –Euler and Hamilton Graphs Definition.
UNIT – IV: GROUP THEORY 9L
Algebraic systems - Groups – Subgroups – Homomorphism‘s – Cosets – Lagrange‘s theorem.
UNIT – V: LATTICES AND BOOLEAN ALGEBRA 9L
Partial ordering – Posets – Lattices as Posets – Properties of lattices – Some special lattices – Boolean algebra
definition.
TOTAL: 45L PERIODS
COURSE OUTCOMES:
At the end of the course, the student should be able to:
• Have knowledge of the concepts needed to test the logic of a program.
• Have an understanding in counting principle on many levels.
• To understand the concepts of graphs and its applications in computer science.
• Be exposed to concepts and properties of algebraic structures like groups, subgroups and cosets.
• To understand the concepts of Lattices and Boolean algebra.
TEXT BOOKS:
1.Kenneth H. Rosen . Dr. Kamala Krithivasan, "Discrete Mathematics and Its Applications (SIE) | 8th
Edition, McGraw Hill, Special Indian Edition, 2021.
2.Tremblay, J.P. and Manohar.R, “Discrete Mathematical Structures with Applications to Computer
Science”, McGraw Hill Pub. .Co. Ltd, New Delhi 2017.
SRMVEC R2023
51
`
REFERENCE BOOKS:
1. Grimaldi, R.P. "Discrete and Combinatorial Mathematics: An Applied Introduction", 4thEdition,
Pearson Education Asia, Delhi, 2007.
2. Veerarajan. T, “Discrete Mathematics with graph theory and Combinatorics”, McGraw Hill Publication
Pvt Ltd. 2018.
3. Sivarama Krishna Dass.P & Vijayakumari. C “Discrete Mathematics” Person Education, 2020.
SRMVEC R2023
52
`
COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Design various combinational digital circuits using logic gates
• Design sequential circuits and analyze the design procedures
• State the fundamentals of computer systems and analyze the execution of an instruction
• Analyze different types of control design and identify hazards
• Identify the characteristics of various memory systems and I/O communication.
TEXT BOOKS:
1. M. Morris Mano, Michael D. Ciletti, “Digital Design: With an Introduction to the Verilog HDL, VHDL,
and System Verilog”, Sixth Edition, Pearson Education, 2018.
2. David A. Patterson, John L. Hennessy, “Computer Organization and Design, The Hardware/Software
Interface”, Sixth Edition, Morgan Kaufmann/Elsevier, 2020.
SRMVEC R2023
53
`
REFERENCE BOOKS:
1.Carl Hamacher, Zvonko Vranesic, Safwat Zaky, Naraig Manjikian, “Computer Organization and
Embedded Systems”, Sixth Edition, Tata McGraw-Hill, 2012.
2.William Stallings, “Computer Organization and Architecture – Designing for
Performance”, Tenth Edition, Pearson Education, 2016.
3.M. Morris Mano, “Digital Logic and Computer Design”, Pearson Education, 2016.
SRMVEC R2023
54
`
COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Develop C programs for any real world or technical problem.
• Apply the advanced features of C in problem solving.
• Apply the different linear data structures to problem solutions.
• Apply the different non-linear data structures to problem solutions.
• Suggest and use appropriate linear/non–linear data structure operations for solving a given problem.
TEXT BOOKS:
1. E. Balaguruswamy, “Programming in ANSI C”, 8th Edition, 2019, McGraw Hill Education, ISBN: 978-
93-5316-513-0. (Unit-I and Unit-II)
2. Reema Thareja, ―Data Structures Using C, Second Edition , Oxford University Press, 2011 (Unit-
III, IV and V)
SRMVEC R2023
55
`
REFERENCE BOOKS:
1.Pradip Dey, Manas Ghosh, “Programming in C”, 2nd Edition, 2018, Oxford University Press, ISBN:
978-01-9949-147-6. (Unit-I and Unit-II)
2.Aho, Hopcroft and Ullman, ―Data Structures and Algorithms, Pearson Education, 1983. (Unit- III,
IV and V)
3.Byron Gottfried, Jitender Chhabra, “Programming with C” (Schaum’s Outlines Series), Mcgraw Hill
Higher Ed., III Edition, 2010. (Unit-I and Unit-II)
4.Ellis Horowitz, Sartaj Sahni, Susan Anderson-Freed, ―Fundamentals of Data Structures in C,
Second Edition, University Press, 2008. (Unit-III, IV and V)
5.Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein, “Introduction to
Algorithms”, Second Edition, McGraw Hill, 2002 (Unit-III)
SRMVEC R2023
56
`
• To understand Object Oriented Programming concepts and basics of Java programming language
• To know the principles of packages, inheritance and interfaces
• To develop a java application with threads and generics classes
• To define exceptions and use I/O streams
• To design and build Graphical User Interface Application using JAVAFX
COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Apply the concepts of classes and objects to solve simple problems
• Develop programs using inheritance, packages and interfaces
• Make use of exception handling mechanisms and multithreaded model to solve real world problems
• Build Java applications with I/O packages, string classes, Collections and generics concepts
• Integrate the concepts of event handling and JavaFX components and controls for developing GUI
based applications.
SRMVEC R2023
57
`
TEXT BOOKS:
1. Herbert Schildt, “Java: The Complete Reference”, 11 th Edition, McGraw Hill Education, New Delhi,
2019
2. Herbert Schildt, “Introducing JavaFX 8 Programming”, 1 st Edition, McGraw Hill Education, New
Delhi, 2015
SRMVEC R2023
58
`
• To understand the data communication models, protocol layering and physical level communication.
• To understand the various components required to build different networks.
• To understand the basic concepts of networking devices.
• To understand the concept of IP security.
• To understand the various methods and protocols to maintain E–mail security.
• To understand the various methods and protocols to maintain web security.
• To understand security measures for wireless and cell phone communications.
COURSE OUTCOMES:
At the end of the course, learners will be able to:
• The Protocol layering and physical leel communication
• The various components required to build different networks.
• Basic concepts of networking devices
• Concept of IP security
• The various methods and protocols
TEXT BOOKS:
1. Behrouz A. Forouzan Data Communications and Networking, Fifth Edition TMH, 2013.(Units: 1-5)
REFERENCE BOOKS:
1.Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security, Prentice Hall of India,2002.
2.Bernard Menezes–Network security and Cryptography–Cengage Learning 2010.
SRMVEC R2023
59
`
SRMVEC R2023
60
`
UNIT – I: INTRODUCTION 9
Cyber Security – History of Internet – Impact of Internet – CIA Triad; Reason for CyberCrime – Need for Cyber
Security – History of Cyber Crime; Cybercriminals – Classification of Cybercrimes – A Global Perspective on Cyber
Crimes; Cyber Laws – The Indian IT Act – Cybercrime and Punishment.
UNIT – II: ATTACKS AND COUNTERMEASURES 9
OSWAP; Malicious Attack Threats and Vulnerabilities: Scope of Cyber-Attacks – Security Breach – Types of Malicious
Attacks – Malicious Software – Common Attack Vectors – Social engineering Attack – Wireless Network Attack – Web
Application Attack – Attack Tools – Countermeasures.
UNIT – III: RECONNAISSANCE 9
Harvester – Whois – Netcraft – Host – Extracting Information from DNS – Extracting Information from E-mail Servers
– Social Engineering Reconnaissance; Scanning – PortScanning – Network Scanning and Vulnerability Scanning
– Scanning Methodology – Ping Sweer Techniques – Nmap Command Switches.
UNIT – IV: INTRUSION DETECTION 9
Host -Based Intrusion Detection – Network -Based Intrusion Detection – Distributed orHybrid Intrusion Detection –
Intrusion Detection Exchange Format – Honeypots – Example System Snort.
UNIT – V: INTRUSION PREVENTION 9
Firewalls and Intrusion Prevention Systems: Need for Firewalls – Firewall Characteristics and Access Policy – Types
of Firewalls – Firewall Basing – Firewall Location and Configurations –Intrusion Prevention Systems – Example Unified
Threat Management Products.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Explain the basics of cyber security, cybercrime and cyber law
• Classify various types of attacks and learn the tools to launch the attacks
• Apply various tools to perform information gathering
• Apply intrusion techniques to detect intrusion
• Apply intrusion prevention techniques to prevent intrusion
TEXT BOOKS:
1. Anand Shinde, “Introduction to Cyber Security Guide to the World of CyberSecurity”, Notion
Press, 2021. (Unit-1 &2)
2. William Stallings, Lawrie Brown, “Computer Security Principles and Practice”,Third Edition,
Pearson Education, 2015. (Unit-4 & 5)
SRMVEC R2023
61
`
REFERENCE BOOKS:
1.Patrick Engebretson, “The Basics of Hacking and Penetration Testing: EthicalHacking and
Penetration Testing Made easy”, Elsevier, 2011. (Unit-3)
2.David Kim, Michael G. Solomon, “Fundamentals of Information SystemsSecurity”, Jones & Bartlett
Learning Publishers, 2013.
3.Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes,Computer Forensics
and Legal Perspectives”, Wiley Publishers, 2011.
SRMVEC R2023
62
`
LIST OF EXPERIMENTS:
1. Implement C program using I/O Statements, Operators and Expressions
2. a) Decision-making constructs: if-else, goto, switch-case, break-continue
b) Loops: for, while, do-while
3. Arrays: 1D and 2D, Multi-dimensional arrays, traversal
4. Array implementation of Stack, Queue and Circular Queue ADTs
5. Implementation of Singly Linked List
6. Linked list implementation of Stack and Linear Queue ADTs
7. Implementation of Polynomial Manipulation using Linked list
8. Implementation of Evaluating Postfix Expressions, Infix to Postfix conversion
9. Implementation of Binary Search Trees
10. Implementation of Tree Traversal Algorithms
11. Implementation Graph Traversal Algorithms
12. Implementation of Dijkstra’s Algorithm
TOTAL : 45 PERIODS
COURSE OUTCOMES:
• Develop C programs for real world problems
• Implement Linear Data Structures and its applications.
• Implement Non-Linear Data Structures and its applications.
• Implement Binary Search tree operations.
• Implement graph algorithms.
SRMVEC R2023
63
`
• To build software development skills using java programming for real-world applications.
• To understand and apply the concepts of classes, packages, interfaces, inheritance, exception
handling and file processing.
• To develop applications using generic programming and event handling
LIST OF EXPERIMENTS:
1. Solve problems by using sequential search, binary search, and quadratic sorting algorithms
(selection, insertion)
2. Develop stack and queue data structures using classes and objects.
3. Develop a java application with an Employee class with Emp_name, Emp_id, Address, Mail_id,
Mobile_no as members. Inherit the classes, Programmer, Assistant Professor, Associate
Professor and Professor from employee class. Add Basic Pay (BP) as the member of all the
inherited classes with 97% of BP as DA, 10 % of BP as HRA, 12% of BP as PF, 0.1% of BP for
staff club funds. Generate pay slips for the employees with their gross and net salary.
4. Write a Java Program to create an abstract class named Shape that contains two integers and an
empty method named printArea(). Provide three classes named Rectangle, Triangle and Circle
such that each one of the classes extends the class Shape. Each one of the classes contains only
the method printArea( ) that prints the area of the given shape.
5. Solve the above problem using an interface.
6. Implement exception handling and creation of user defined exceptions.
7. Write a java program that implements a multi-threaded application that has three threads. First
thread generates a random integer every 1 second and if the value is even, the second thread
computes the square of the number and prints. If the value is odd, the third thread will print the
value of the cube of the number.
8. Write a program to perform file operations.
9. Develop applications to demonstrate the features of generics classes.
10. Develop applications using Swing and JavaFX controls, layouts and menus.
11. Develop a mini project for any application using Java concepts.
TOTAL : 45 PERIODS
COURSE OUTCOMES:
• Design and develop java programs using object oriented programming concepts
• Develop simple applications using object oriented concepts such as package, exceptions
• Implement multithreading, and generics concepts
• Create GUIs and event driven programming applications for real world problems
• Implement and deploy web applications using Java
SRMVEC R2023
64
`
SRMVEC R2023
65
`
LIST OF EXPERIMENTS:
1. Learn to use commands like tcpdump, netstat, ifconfig, nslookup,ping andtraceroute.
2. Write a code simulating Socket Programming and Client – Server model
3. Write a code simulating Stop and Wait protocol.
4. Write a code simulating ARP /RARP protocols.
5. Develop a TCP daytime server and client.
6. Applications using TCP sockets like:
• Echo client and echo server
• Chat
• File Transfer
7. Write a HTTP web client program to download a web page using TCP sockets.
8. Simulation of DNS using UDP sockets.
9. Simulation of Distance Vector/ Link State Routing algorithm.
10. Study of TCP/UDP performance using Simulation tool.
TOTAL : 45 PERIODS
COURSE OUTCOMES:
• Implement various network commands.
• Develop applications using socket programming.
• Implement applications using TCP and UDP protocols.
• Use simulation tools to analyze the performance of various network protocols.
• Analyze various routing algorithms.
SRMVEC R2023
66
`
SEMESTER IV
MA3422 APPLIED MATHEMATICS FOR INFORMATION SCIENCE L T P C
2 0 0 2
COURSE OBJECTIVES:
• To introduce the basic notions of groups, rings, fields which will then be used to solve related
problems.
• To introduce and apply the concepts of rings, finite fields and polynomials.
• To understand the basic concepts in number theory
• To examine the key questions in the Theory of Numbers.
• To give an integrated approach to number theory and abstract algebra, and provide a firm basis
for further reading and study in the subject.
COURSE OUTCOMES:
At the end of the course, the student should be able to:
• Apply the basic notions of groups, rings, fields which will then be used to solve related problems.
• Explain the fundamental concepts of advanced algebra and their role in modern mathematics and
applied contexts.
• Demonstrate accurate and efficient use of advanced algebraic techniques.
• Demonstrate their mastery by solving non - trivial problems related to the concepts, and by proving
simple theorems about the, statements proven by the text.
• Apply integrated approach to number theory and abstract algebra, and provide a firm basis for further
reading and study in the subject.
TEXT BOOKS:
1.Grimaldi, R.P and Ramana, B.V., "Discrete and Combinatorial Mathematics", Pearson Education,
5th Edition, New Delhi, 2007.
2.Koshy, T., ―Elementary Number Theory with Applications‖, Elsevier Publications, New Delhi, 2002.
SRMVEC R2023
67
`
REFERENCE BOOKS:
1. Lidl, R. and Pitz, G, "Applied Abstract Algebra", Springer Verlag, New Delhi, 2nd Edition, 2006.
2. Niven, I., Zuckerman.H.S., and Montgomery, H.L., ―An Introduction to Theory of Numbers‖, John
Wiley and Sons , Singapore, 2004.
3. San Ling and Chaoping Xing, ―Coding Theory – A first Course‖, Cambridge Publications,
Cambridge, 2004.
SRMVEC R2023
68
`
COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Classify the modern and futuristic database applications based on size and complexity
• Map ER model to Relational model to perform database design effectively
• Compare and contrast various indexing strategies in different database systems
• Appraise how advanced databases differ from traditional databases.
SRMVEC R2023
69
`
TEXT BOOKS:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, Database System Concepts, Sixth Edition,
Tata McGraw Hill, 2016
2. Ramez Elmasri, Shamkant B. Navathe,– Fundamentals of Database Systems, Sixth Edition,
Pearson, 2016.
REFERENCE BOOKS:
1.C. J. Date, A.Kannan, S. Swamynathan, – An Introduction to Database Systems, Eighth Edition,
Pearson Education, 2006.
2.Raghu Ramakrishnan, ―Database Management Systems, Fourth Edition,
McGraw– Hill College Publications, 2015.
3.G.K.Gupta, "Database Management Systems, Tata McGraw Hill, 2011.
SRMVEC R2023
70
`
UNIT – I: INTRODUCTION 9
Introduction to Operating System: Operating System Operations- Operating System Structures : Operating System-
Services - User Operating System Interface - System Calls – System programs – Operating System Structure
(monolithic, layered, modular, micro- kernel models).
UNIT – II: PROCESS MANAGEMENT 9
Processes - Process Concept - Process Scheduling - Operations on Processes - Inter- process Communication; CPU
Scheduling - Scheduling criteria - Scheduling algorithms: Process Synchronization - The Critical-Section problem –
Semaphores, Deadlock - Methods for handling deadlocks, Deadlock prevention, Deadlock avoidance, Deadlock
detection, Recovery from deadlock.
UNIT – III: MEMORY MANAGEMENT 9
Main Memory: Swapping- Contiguous Memory Allocation – Paging - Structure of the Page Table - Segmentation,
Virtual Memory - Demand Paging – Copy on Write – Page Replacement - Allocation of Frames –Thrashing.
UNIT – IV: STORAGE MANAGEMENT 9
File-System Interface -File concept - Access methods - Directory Structure – Protection. - File System Implementation
- File System Structure – File System Operations - Directory implementation - Allocation Methods - Free Space
Management; Mass Storage system – Disk Structure - Disk Scheduling –Disk Management- Swap-Space
Management.
UNIT – V: MOBILE OS AND CASE STUDIES 9
Mobile OS - iOS and Android. The Linux System: Design Principles-Kernel Modules- Process Management-
Scheduling-Memory Management-File Systems - Input and Output- Inter process communication.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Analyze various main concepts, key ideas, strengths and limitations of operating systems.
• Design various scheduling algorithms.
• Design and implement memory management schemes
• Understand various file management systems
• Understand the Mobile OS and Linux.
TEXT BOOKS:
1. Silberschatz Abraham, Greg Gagne, Peter B. Galvin. “Operating System Concepts”, Ninth Edition,
Wiley, 2014.(Unit-I-V)
2. Andrew S Tanenbaum, "Modern Operating Systems", Pearson, 5th Edition,2022 New Delhi.(Unit-
II,III,IV).
SRMVEC R2023
71
`
REFERENCE BOOKS:
1.Ramaz Elmasri, A. Gil Carrick, David Levine, “ Operating Systems – A Spiral Approach”, Tata
McGraw Hill Edition, 2010.
2.William Stallings, "Operating Systems: Internals and Design Principles", 7th Edition, Prentice Hall,
2018
3.Achyut S.Godbole, Atul Kahate, “Operating Systems”, McGraw Hill Education, 2016.
SRMVEC R2023
72
`
COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Understand the basics of computer forensics
• Apply a number of different computer forensic tools to a given scenario
• Analyse and validate forensics data
• Understand the basics of Email and Social Media Investigations
TEXT BOOKS:
1. Bill Nelson, Amelia Phillips, Frank Enfinger, Christopher Steuart, ―Computer Forensics and
Investigations‖, Cengage Learning, Sixth Edition, 2019. (Units 1-5)
REFERENCE BOOKS:
1.John R.Vacca, ―Computer Forensics‖, Cengage Learning, 2005
2.MarjieT.Britz, ―Computer Forensics and Cyber Crime‖: An Introduction‖, 3rd Edition,Prentice Hall,
2013.
3.AnkitFadia ― Ethical Hacking‖ Second Edition, Macmillan India Ltd, 2006
4.Kenneth C.Brancik ―Insider Computer Fraud‖ Auerbach Publications Taylor & FrancisGroup–2008.
SRMVEC R2023
73
`
SRMVEC R2023
74
`
COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Identify the key activities in managing a software project.
• Concepts of requirements engineering and Analysis Modeling.
• Apply systematic procedure for software design and deployment.
• Compare and contrast the various testing and maintenance.
• Manage project schedule, estimate project cost and effort required.
TEXT BOOKS:
1. Ian Sommerville - “Software engineering”, Seventh Edition, Pearson Education Asia, 2007.
REFERENCE BOOKS:
1.Developing Secure Software: Jason Grembi, Cengage Learning
2.Software Security : Richard Sinn, Cengage Learning
SRMVEC R2023
75
`
SRMVEC R2023
76
`
COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Make learner conversant with the social and intellectual property issues emerging from cyber space.
• Explore the legal and policy developments in various countries to regulate cyberspace;
• Develop the understanding of relationship between commerce and cyberspace;
• Give learners in depth knowledge of information technology act and legal frame work of right to
privacy, data security and data protection.
• Make Study On Various Case Studies On Real Time Crimes.
SRMVEC R2023
77
`
TEXT BOOKS:
1. K.Kumar,” Cyber Laws: Intellectual property & E Commerce, Security”,1st Edition,
DominantPublisher,2011. (Units 1-2)
2. 2. Rodney D. Ryder, “ Guide To Cyber Laws”, Second Edition, Wadhwa And Company, NewDelhi,
2007. 3. Information Security policy &implementation Issues, NIIT, PHI. (Units 3-5)
REFERENCE BOOKS:
1.Vakul Sharma, "Handbook Of Cyber Laws" Macmillan India Ltd, 2 nd Edition,PHI,2003.
2.Justice Yatindra Singh, " Cyber Laws", Universal Law Publishing, 1 st Edition,New Delhi,2003.
3.Sharma, S.R., “Dimensions Of Cyber Crime”, Annual Publications Pvt. Ltd., 1st Edition,2004.
4.Augastine, Paul T.,” Cyber Crimes And Legal Issues”, Crecent Publishing Corporation, 2007.
SRMVEC R2023
78
`
COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Understand their roles and responsibilities
• Demonstrate the knowledge of human values and morals
• Actively participate in social service and development activities
• Understand the importance of disaster management
• Analyse the issues related to war and its effects.
TEXT BOOKS:
1. R. Gupta’s NCC Handbook of NCC Cadets ‘A’, ‘B’ and ‘C’ certificate Examinations
SRMVEC R2023
79
`
REFERENCE BOOKS:
1.V. B. RAO, Personality Development and Soft Skills, BS Publications
2.Harish K. Gupta, Disaster Management, Universities press
SRMVEC R2023
80
`
LIST OF EXPERIMENTS:
1. Create a database table, add constraints (primary key, unique, check, Not null), insert rows,
update and delete rows using SQL DDL and DML commands.
2. Create a set of tables, add foreign key constraints and incorporate referential integrity.
3. Query the database tables using different ‘where’ clause conditions and also implement aggregate
functions.
4. Query the database tables and explore sub queries and simple join operations.
5. Query the database tables and explore natural, equi and outer joins.
6. Write user defined functions and stored procedures in SQL.
7. Execute complex transactions and realize DCL and TCL commands.
8. Write SQL Triggers for insert, delete, and update operations in a database table.
9. Create View and index for database tables with a large number of records.
10. Case Study using any of the real life database applications from the following list
a) Inventory Management for a EMart Grocery Shop
b) Society Financial Management
c) Cop Friendly App – Eseva
d) Property Management – eMall
e) Star Small and Medium Banking and Finance
• Build Entity Model diagram. The diagram should align with the business and functional goals stated
in the application.
• Apply Normalization rules in designing the tables in scope.
• Prepared applicable views, triggers (for auditing purposes), and functions for enabling enterprise
grade features.
TOTAL : 45 PERIODS
COURSE OUTCOMES:
• Create databases with different types of key constraints.
• Construct simple and complex SQL queries using DML and DCL commands.
• Use advanced features such as stored procedures
• Create a trigger for the database.
• Create and manipulate database application.
SRMVEC R2023
81
`
SRMVEC R2023
82
`
LIST OF EXPERIMENTS:
1. UNIX commands and Basic Shell Programming
2. Process Management using System Calls : Fork, Exit, Getpid, Wait, Close
3. Write C programs to implement the various CPU Scheduling Algorithms
4. Implement mutual exclusion by Semaphore
5. Write C programs to avoid Deadlock using Banker's Algorithm
6. Write a C program to Implement Deadlock Detection Algorithm
7. Write C program to implement Threading
8. Write C program to Implement the paging Technique.
9. Write C programs to implement the following Memory Allocation Methods
a) First Fit
b) Worst Fit
c) Best Fit
10. Write C programs to implement the various Page Replacement Algorithms
11. Write C programs to Implement the various File Organization Techniques
12. Implement the following File Allocation Strategies using C programs
a) Sequential
b) Indexed
c) Linked
13. Write C programs for the implementation of various disk scheduling algorithms
TOTAL : 45 PERIODS
COURSE OUTCOMES:
• Define and implement UNIX Commands.
• Compare the performance of various CPU Scheduling Algorithms.
• Compare and contrast various Memory Allocation Methods.
• Define File Organization and File Allocation Strategies.
• Implement various Disk Scheduling Algorithms
SRMVEC R2023
83
`
SRMVEC R2023
84
`
LIST OF EXPERIMENTS:
COURSE OUTCOMES:
• Design and implement projects using OO concepts.
• Use the UML analysis and design diagrams.
• Apply appropriate design patterns.
• Create code from design.
• Compare and contrast various testing techniques
SRMVEC R2023
85
`
SRMVEC R2023
86
`
SEMESTER V
UNIT – I: INTRODUCTION 9
Introduction and Definitions of bio–metrics, Traditional authenticated methods and
technologies. Introduction to Image Processing, Image Enhancement Techniques: Spatial
Domain Methods: Smoothing, sharpening filters, Laplacian filters, Frequency domain filters,
Smoothing and sharpening filters.
TOTAL: 45 PERIODS
10
`
COURSE OUTCOMES:
At the end of the course, the student should be able to:
A good understanding of the various modules constituting a bio–metric system.
Familiarity with different bio–metric traits and to appreciate their relative significance.
A good knowledge of the feature sets used to represent some of the popular bio– metric traits.
Evaluate and design security systems incorporating bio–metrics.
Understand the Law and the use of multi bio–metrics systems.
TEXT BOOKS:
1. Gonzalez, R.C. and Woods, R.E., Digital Image Processing. 2nd ed. India: Person
Education, 2017.
2. Anil Jain, Arun A. Ross, Karthik Nandakumar, Introduction to biometric, Springer, 2011.
REFERENCE BOOKS:
1. Kennesaw State University, Big Data Security and Privacy Group (2018). Privacy and
Security in
Big Data, 1st Edition, Springer
2. J. Wayman, A.K. Jain, D. Maltoni, and D. Maio (Eds.), Biometric Systems: Technology,
Design and Performance Evaluation, Springer, 2013.
3. A. K. Jain, R. Bolle, S. Pankanti (Eds.), BIOMETRICS: Personal Identification in
Networked Society, Kluwer Academic Publishers, 2013.
4. Paul Reid, Biometrics for network security, Hand book of Pearson, 2004.
CO 2 - 2 2 - 2 - 1 - - - 3 - - 2 - -
CO 3 2 - - 2 - 1 - - 2 - - - 2 - 2
CO 4 - 2 2 - 1 - - - - 2 - - 1 - 1 -
CO 5 2 - 1 2 - - - - - - - - - 2 1 -
11
`
UNIT – I : INTRODUCTION 9
Ethical hacking process-Hackers behavior & mindset-Vulnerability versus
Penetration test- Penetration Test. Categories of Penetration test–Black box–
White box–Grey box– Types of Penetration Test.
UNIT – V : EXPLOITATION 9
Remote Exploitation–Attacking Network Remote Services–Overview of Brute Force
Attacks– Common Target Protocols–Client Side Exploitation–Methods–
Postexploitation–Escalating Privileges–Installing a Backdoor–MSFVenom– Cracking
the Hashes–Rainbow Crack– Identifying and Exploiting Further Targets
TOTAL: 45 PERIODS
12
`
COURSE OUTCOMES:
On Completion of the course, the students should be able to have:
Apply the theory of data, information and knowledge as they pertain to
Ethical Hacking.
Understand ethics behind hacking and vulnerability disclosure.
Appreciate the impact of hacking.
Exploit the vulnerabilities related to computer system and
networks using state of the art tools and technologies.
Exploit the challenges and limitations associated with hacking.
TEXT BOOKS:
1. Baloch, R., Ethical Hacking and Penetration Testing Guide, CRC Press, 2019.
REFERENCES:
1. McClure S., Scam bray J., and Kurtz G, Hacking Exposed. Tata McGraw– Hill Education,
6th Edition 2019
2. Davidoff, S. and Ham, J., Network Forensics Tracking Hackers through Cyber space,
Prentice Hall, 2012.
CO 1 - 3 - 3 - - 2 - - - - - 2 - - -
CO 2 3 2 - - 3 - - 2 - - - - - 3 2 -
CO 3 3 2 - - 2 - - 2 - - 2 - 3 - - 1
CO 4 2 - - 1 3 - - - - 1 2 - - 3 2 3
CO 5 1 3 2 1 2 - - - 2 2 3 1 - 2 3 1
AVG 2.2 2.5 2 1.6 2.5 - - 2 2 1.5 2.3 1 2.5 2.6 2.3 1.6
13
`
OBJECTIVES:
TOTAL: 45 PERIODS
14
`
COURSE OUTCOMES:
Apply the theory of data, information and knowledge as they pertain to information
Warfare
Apply strategies of using information as a weapon and a target
Apply the principles of offensive and defensive information warfare for a given
Context
Discuss the social, legal and ethical implications of information warfare
Evaluate contemporary information warfare concepts for their application
In a corporate environment.
TEXT BOOKS:
1. Rahul Pandit, “Information Warfare: Battleground of the Digital Age”, 1st Edition,
Notion Press,2024.
2. Tamara Schwartz, “Information Warfare”, 1st Edition, Kendall Hunt Publishing,2023
REFERENCE BOOKS:
1. Jim Ridolfo and William Hart-Davidson, “Rhetoric and Information Warfare”, 1st Edition,
University of Pittsburgh Press, 2023.
2. Dr. Steve Tatham, “Information Operations: Facts, Fakes, Conspiracists”, 1st Edition,
Universal Defence,2023.
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 3 - - - 2 1 - - 1 1 2 2 - -
CO 2 2 3 3 3 - - - - - - - - 3 1 - -
CO 3 2 - - - - 2 - - 2 - - - - - - -
CO 4 - - - - - - - - 2 2 - - - 2 - -
CO 5 3 3 1 3 2 - - - - - - - - - 1
AVG 2.5 3 3 2 3 2 2 1 2 2 1 1 2.5 1.6 - 1
15
`
OBJECTIVES:
• To learn about the Image transformation
• To know about the Image enhancement
• To learn about the Image segmentation
• To learn about the Morphological image processing
• To know about the Feature extraction and recognition
LIST OF EXPERIMENTS:
1. Write a program to perform Image transformation
2. Write a program to perform Image enhancement
3. Simulate Image segmentation
4. Simulate Morphological image processing
5. Implement the Feature extraction and recognition
6. Simulate Hand Geometry
7. Mini Project
COURSE OUTCOMES:
• learn about the Image transformation
• know about the Image enhancement
• learn about the Image segmentation
• learn about the Morphological image processing
• know about the Feature extraction and recognition
TOTAL: 45 PERIODS
LIST OF EQUIPMENTS FOR A BATCH OF 30 STUDENTS:
SOFTWARE: MATLAB with Image Processing Toolbox, OpenCV (Python/C++),
MATLAB Biometric Datasets & GUI Tools
HARDWARE: High-Resolution Cameras, Workstations with GPU, Standalone
desktops - 30 Nos. (or) Server supporting 30 terminals or more.
CO 1 1 2 - 3 - 2 - 1 - 2 - - 3 1 -
CO 2 - 2 - 3 - - 2 - - - 3 - 2 2 - -
CO 3 1 - 2 - - - - - 2 - - - 3 - 1 -
CO 4 2 1 - 3 - 3 - 2 - - - - 3 - - -
CO 5 2 - 3 3 - - - - - 1 - - 1 - 3 -
16
`
LIST OF EXPERIMENTS:
1. Study the use of network reconnaissance tools like WHOIS, dig, traceroute,
nslookup To gather information about networks and domain registrars
2. Study of packet sniffer tools like Wireshark, ethereal, tcpdump etc.
Use the tools to do the following
3. Observer performance in promiscuous as well as non–promiscuous mode. ii.
Show that packets can be traced based on different filters
4. Download and install nmap. Use it with different options to scan Open ports, perform
OS fingerprinting, do a ping scan, tcp port scan, udp port scan, etc.
5. Detect ARP spoofing using open source tool ARP WATCH 5. Use the
Nessus tool to scan the network for vulnerabilities.
6. Implement a code to simulate buffer overflow attack.
7. Set up IPSEC under LINUX
8. Install IDS (e.g. SNORT) and study the logs.
9. Use of iptables in linux to create firewalls
10. Mini project.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
At the end of the course, the student should be able to:
• Use different network reconnaissance tools to solve real time problems.
• Build packet sniffer tools like wireshark, ethereal, tcpdump.
• Construct Detect ARP spoofing using open source tool ARPWATCH
• Use the Nessus tool to scan the network.
• Demonstrate the ethical hacking using mini project.
17
`
SEMESTER VI
CY3661 INTRUSION DETECTION AND PREVENTION SYSTEMS LT PC
30 03
OBJECTIVES:
To provide an in–depth introduction to the science and art of intrusion detection.
To study the methodology- Techniques- and tools for monitoring events in
Computer network.
To provide the study of preventing and detecting unwanted process
activity and recovering from malicious behavior.
To compare alternative tools and approaches for Intrusion Detection through
Quantitative analysis.
To Identify and describe the parts of all intrusion detection systems
and characterize new and emerging IDS technologies
UNIT – I: INTRODUCTION 9
Network Attacks- Attack Taxonomies- Probes - IPSweep and PortSweep- NMap-
MScan- SAINT- Satan- Privilege Escalation Attacks- Denial of Service (DoS) and
Distributed Denial of Service (DDoS) Attacks- Worms Attacks - Routing Attacks
TOTAL: 45 PERIODS
18
`
TEXT BOOK:
1. Monowar H. Bhuyan, Dhruba K. Bhattacharyya,” Network Traffic Anomaly Detection and
Prevention Concepts, Techniques, and Tools” Springer 2017.
2. Kishan G. Mehrotra , Chilukuri K. Mohan,” Anomaly Detection Principles and Algorithms”
springer ,2017
3. Ali A. Ghorbani, Network Intrusion Detection and prevention concepts and techniques,
Springer,2010.
REFERENCES:
1. Syed Ali, L. L. M. S. Zegura (2019). Intrusion Detection and Prevention Systems: Concepts
and Practice, 1st Edition, Wiley.
2. William Stallings (2017). Network Security Essentials: Applications and Standards, 6th
Edition, Pearson.
3. Peter Szor, The Art of Computer Virus Research and Defense, Symantec Press, 2010,
ISBN 0–321–30545–3.
4. Markus Jakobsson and Zulfikar Ramzan, Crimeware, Understanding NewAttacks and
Defenses, Symantec Press, 2008, ISBN: 978–0–321–50195–0.
5. Roberto Di Pietro, Luigi V. Mancini, Intrusion Detection System, Springer, 2008.
CO 1 3 3 - - - - 2 1 -
- - 2 - -
CO 2 3 2 - 3 - - - - 3 -
- - - 2 - 2
CO 3 3 2 - - 2 - 2 - 3 - - 1
- - 2 -
CO 4 2 - 1 3 2 1 2 - - 3 2 3
- - - -
CO 5 1 3 2 1 2 2 2 3 1 - 2 3 1
- - -
AVG 2.2 2.5 2 1.6 2.5 2 2 2 2 1.5 2.3 1 2.5 2.6 2 1.6
19
`
OBJECTIVES:
To understand basics of Cryptography and Network Security
To understand the number theory used for network security
To understand Cryptography Theories, Algorithms and Systems.
To understand the design concept of cryptography and authentication
To understand necessary Approaches and Techniques to build
protection mechanisms in order to secure computer networks.
TOTAL: 45 PERIODS
20
`
COURSE OUTCOMES:
At the end of the course, learners will be able to:
Understand the fundamentals of networks security, security architecture,
threats and vulnerabilities
Apply the different cryptographic operations of symmetric cryptographic algorithms
Apply the different cryptographic operations of public key cryptography
Apply the various Authentication and hash algorithms to simulate different applications.
Understand various Security practices and System security standards
TEXT BOOKS:
REFERENCE BOOKS:
1. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill, 2018.
2. Charlie Kaufman and Radia Perlman, Mike Speciner, “Network Security, Second
Edition, Private Communication in Public World”, PHI 2016.
CO 1 2 - 2 - - - - - - - 2 - - - 2 -
CO 2 - 2 2 1 2 - - - - - - 2 2 - - 1
CO 3 - 2 2 2 - - - - - - - 2 - 2 - 1
CO 4 2 - - 2 - - 1 - - 1 2 - - - 1 -
CO 5 3 - 2 2 2 - - - - 1 - - 2 - 1 -
21
`
11
`
COURSE OUTCOMES:
On completion of the course, the students will be able to:
Have knowledge on digital forensics.
Know about digital crime and investigations.
Be forensic ready.
Investigate, identify and extract digital evidence from iOS devices.
Investigate, identify and extract digital evidence from Android devices.
TEXT BOOK
1. Andre Arnes, “Digital Forensics”, Wiley, 2018.
2. Chuck Easttom, “An In-depth Guide to Mobile Device Forensics”,
FirstEdition, CRC Press, 2022.
REFERENCES
1. Eoghan Casey (2019). Digital Evidence and Computer Crime:
Forensic Science, Computers, and the Internet, 4th Edition, Academic
Press.
2. Vacca, J, Computer Forensics, Computer Crime Scene Investigation,
2nd Ed, Charles River Media, 2005, ISBN: 1 58450-389.
11
`
COURSE OUTCOMES:
CO1: Develop a code for classical encryption techniques.
CO2: Build a symmetric and asymmetric algorithms.
CO3: Construct a code for various Authentication schemes.
CO4: Apply the principles of digital signature.
CO5: Apply necessary Approaches and Techniques to build protection
mechanisms in order to secure computer networks.
112
`
CO 1 3 - 3 - 3 - - - - - 2 - - 3 3 -
CO 2 3 - 3 - 3 - - - - - 2 - 3 - 3 2
CO 3 3 - 3 - 3 - - - - - 2 - 3 3 - -
CO 4 3 - 3 - 3 - - - - - 2 - 3 3 - -
CO 5 3 - 3 - 3 2 - - - 2 2 - 3 3 - -
AVG 3 - 3 - 3 2 - - - 2 2 - 3 3 3 2
113
`
SEMESTER - VII
OBJECTIVES:
2. To support students to understand the need, basic guidelines, content and process
of value education.
3. To facilitate the students to understand harmony at all the levels of human living.
TOTAL HOURS: 30
114
`
OUTCOMES:
5. Students will be able to Distinguish between ethical and unethical practices and start
working out the strategy to actualize a harmonious environment wherever they work.
TEXTBOOKS:
1. Jonathan Ham, Michael G. Gannon (2019). Digital Forensics and Cyber Crime: 11th International
Conference, ICDF2C 2019, 1st Edition, Springer.
2. Gary Palmer (2018). Guide to Computer Forensics and Investigations, 5th Edition, Cengage
Learning.
REFERENCES:
1. R. Subramanian, ‘Professional Ethics’ Oxford University Press, 2nd Edition 2017
2. Mike Martin and Roland Schinzinger, “Ethics in Engineering”, McGraw Hill, New
York, 3rd edition (2017).
3. Mike Martin and Roland Schinzinger, “Ethics in Engineering”, McGraw Hill, New
York, 3rd edition (2017).
115
`
and Professional Ethics, Excel Books First Edition 2009.
12. Ethics in Engineering by Mike W. Martin and Roland Schinzinger - Tata McGraw-Hill - 2003.
13. Langford, Duncan (EDT): Internet Ethics, London, Macmillan Press Ltd., 2000.
14. Erwann, M. David, Michele S. Shauf, Computers, Ethics and Society, Oxford University
Press, 2003.
15. Suresh Jayshree, 2003, Human Values and Professional Ethics, ,S. Chand Publishing,
Third Revised Edition.
E-BOOK :
1. Gary Palmer (2018). Guide to Computer Forensics and Investigations, 5th Edition, Cengage
Learning.
2. R. S. Nagarazan, ‘A Textbook on Professional Ethics and Human Values’ New Age
International Publishers, 2015.
3. R R Gaur, R Sangal, G P Bagaria, 2009, A Foundation Course in Human Values and
Professional Ethics, Excel Books First Edition 2009.
CO-PO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8
Mapping
CO1 1
CO2 1
CO3 1
CO4 1
CO5 2
Avg 1 2 1
116
`
TOTAL : 45 PERIODS
117
`
TEXT BOOKS:
1. J. P. Anderson (2018). Mobile Security and Privacy: Protection Against Threats to the Mobile World,
1st Edition, Wiley.
2. "The Mobile Application Hacker's Handbook" by Dominic Chell, Tyrone
Erasmus,Shaun Colley, Ollie Whitehouse.2011
3. "Mobile Application Security" by Himanshu Dwivedi, Chris Clark, David Thiel.2010
REFERENCE BOOKS:
1. Vijayakumar V, S. S. (Sundar) (2019). Mobile Security: A Guide for Users and Developers, 1st
Edition, CRC Press.
2. "Mobile Malware Attacks and Defense" by Ken Dunham, Rohit Dhamankar.2011
3. "Mobile Security and Privacy: Advances, Challenges and Future Research
Directions" edited by Man Ho Au, Raymond Choo.2015
COURSE OUTCOMES:
CO 1 2 2 2
CO 2 2 2 1 2 2 2 1
CO 3 2 2 2 2 2 1
CO 4 2 2 1 1 2 1
CO 5 3 2 2 2 1 2 1
118
`
COURSE OBJECTIVES:
To understand the basics of Artificial Intelligence
To understand the various AI techniques
To understand the basic concepts detecting cyber threats
To understand the techniques to detect the cyber threats
To understand the various methods of machine learning to prevent fraudulent access.
TOTAL : 45 PERIODS
119
`
TEXT BOOKS
1. Dr. Nilakshi Jain (2019). Artificial Intelligence, As per AICTE: Making a System
Intelligent, Wiley Publication.
2. Alessandro Parisi (2019). Hands-On Artificial Intelligence for Cybersecurity: Implement
Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network
Anomalies, Packt Publication.
REFERENCE BOOKS
1. "AI in Cybersecurity" by Leslie F. Sikos Publisher: Springer, 2019
2. " Jalil Boudjerda (2020). Artificial Intelligence in Cybersecurity, Springer.
COURSE OUTCOMES:
At the end of the course, the student should be able to:
Understanding the basics of AI
Learn the AI techniques
Cyber security threats and detection
Authentication techniques
Unauthorized access prevention
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO1 3 2 1 - - - - - - - - - 1 - - -
CO2 3 3 2 1 - - - - - - - - 2 1 - -
CO3 3 3 2 - - - - - - - - - 2 1 - -
CO4 3 3 1 - - - - - - - - - 2 1 - -
CO5 3 1 2 - - - - - - - - - 1 - - -
AVG 3 2.4 1.6 1 - - - - - - - - 1.6 1 - -
120
`
List of Experiments
COURSE OUTCOMES:
At the end of the course, the student should be able to:
• Use Python to extract the contents of an APK file.
• Use tools like Androguard to decompile APKs. Use adb (Android Debug
Bridge) commands in Python to interact with an Android device.
• Set up a proxy (e.g., mitmproxy) to capture network traffic.Write a Python script
to extract and analyze APKs for known malware indicators.
• Use Appium or Selenium with Python to automate UI testing.
• Integrate the lab exercises into a single Python tool. Create a user
interface (CLI or GUI) for the tool.
121
`
122
`
COURSE OBJECTIVES:
List of Experiments
1. Intrusion Detection System (IDS) using Machine Learning
2. Malware Classification using Deep Learning
3. Phishing Email Detection using Natural Language Processing (NLP)
4. Anomaly Detection in Network Traffic using Autoencoders
5. User Behavior Analytics for Insider Threat Detection
6. Ransomware Detection using Behavioral Analysis
7. Spam Detection using Machine Learning
8. Predicting Cyber Attacks using Time Series Analysis
9. Network Traffic Classification using Deep Learning
10. Building a Secure Chat Application with AI-based Anomaly Detection.
TOTAL : 60 PERIODS
COURSE OUTCOMES:
At the end of the course, the student should be able to:
Build deep learning neural network models
Use appropriate search algorithms for problem
solving Predicting cyber attacks using ML
algorithms
Anomaly detection using AI techniques
To know about various machine learning models
123
`
124
`
TOTAL : 45 PERIODS
125
`
COURSE OUTCOMES:
Upon completion of the course, the student should be able to:
Understand the fundamentals of networks security, security architecture,
threats and vulnerabilitieS.Apply the different cryptographic operations of
symmetric cryptographic algorithms.
Apply the different cryptographic operations of public key cryptography.
Gain knowledge on the nature of threats and cyber security management goals
and framework.
Knowledge on the landscape of hacking and perimeter defense mechanisms.
TEXT BOOKS:
1. Bernard Menezes (2019). Cryptography and Network Security, 6th Edition, Wiley.
2. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in
Computing, 5th Edition, Pearson Education, 2015.
3. William Stallings, Cryptography and Network Security: Principles and
Practice, PHI 4th Edition,2006.
REFERENCE BOOKS:
1. Daphne Yao, Moti Yung (2017). Cyber Security: Cryptography and Digital Forensics,
1st Edition, Springer.
2. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill, 2007.
3. Charlie Kaufman and Radia Perlman, Mike Speciner, “Network Security,
Second Edition, Private Communication in Public World”, PHI 2002.
4. The Cyber Security Management System: A Conceptual Mapping, John
Dexter,SANS Institute Information Security Reading Room 2002.
CO 2 2 2 1 2 2 2 1
CO 3 2 2 2 2 2 1
CO 4 2 2 1 1 2 1
CO 5 3 2 2 2 1 2 1
126
`
COURSE OUTCOMES:
At the end of the course, the student should be able to:
Develop code for classical Encryption Techniques to solve the problems.
Build cryptosystems by applying symmetric and public key encryption algorithms.
Use different network reconnaissance tools to solve real time problems.
Build packet sniffer tools like wire shark, ethereal, tcpdump.
Implement and install HEX Editor and Use Encase Forensics.
LIST OF EQUIPMENT FOR A BATCH OF 30 STUDENTS:
SOFTWARE: C / C++ / Java or equivalent compiler GnuPG, Snort, N–Stalker or
Equivalent.
HARDWARE: Standalone desktops –30 Nos. (or) Server supporting 30 terminals
or more.
127
`
CO 2 3 3 3 2 3 3 2
CO 3 3 3 3 2 3 3
CO 4 3 3 3 2 3 3
CO 5 3 3 3 2 2 2 3 3
Avg 3 3 3 2 2 2 3 3 3 2
128
`
VERTICALS- III
PCY301 MODERN CRYPTOGRAPHY L T P C
3 0 0 3
COURSE OBJECTIVES:
To learn about Modern Cryptography.
To focus on how cryptographic algorithms and protocols work and how to use
them.
To build a pseudorandom permutation.
To construct Basic cryptanalytic techniques.
To provide instruction on how to use the concepts of block ciphers and
message authentication codes.
UNIT I INTRODUCTION 9
Basics of Symmetric Key Cryptography- Basics of Asymmetric Key Cryptography-
Hardness of Functions. Notions of Semantic Security (SS) and Message
Indistinguishability (MI): Proof of Equivalence of SS and MI- Hard Core Predicate- Trap-
door permutation- Goldwasser-Micali Encryption. Goldreich-Levin Theorem: Relation
between Hardcore Predicates and Trap-door permutations.
COURSE OUTCOMES:
CO1: Interpret the basic principles of cryptography and general cryptanalysis.
CO2: Determine the concepts of symmetric encryption and authentication.
CO3 Identify the use of public key encryption, digital signatures, and key establishment.
CO4: Articulate the cryptographic algorithms to compose, build and analyze simple
cryptographic solutions.
CO5: Express the use of Message Authentication Codes.
TEXT BOOKS:
1. Jonathan Katz, Yehuda Lindell (2020). Introduction to Modern Cryptography,
3rd Edition,Springer.
2. Prof. Dr. Hans Delfs and Helmut Knebl, Introduction to Cryptography: Principles and
Applications, Springer Verlag second edition 2007.
3. Wenbo Mao, Modern Cryptography, Theory and Practice, Pearson Education (Low Priced
Edition).2003
REFERENCES:
1. Sanjay Kumar, Dinesh Goyal (2019). Modern Cryptography: Theory and
Practice, 1st Edition, Wiley.
2. William Stallings, “Cryptography and Network Security: Principles and Practice”,PHI
sixth Edition, 2014.
3. Czesław Koscielny , Mirosław Kurkowski ,”Modern Cryptography Primer Theoretical
Foundations and Practical Application”, Springer 2013.
4. ShaffiGoldwasser and MihirBellare, Lecture Notes on Cryptography, Available at
http://citeseerx.ist.psu.edu/.(2004)
CO-PO MAPPING:
Program Outcomes (POs) Program Specific
COs Outcomes
(PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3 PSO4
1 - 2 - - - 1 - - - 1 - - - - - -
2 2 - - - 2 - - 1 - - - 2 - 2 - -
3 - - - - - - - - 2 - - - - - 1 -
4 - - 2 - 1 - 2 - - - 2 - 3 - 2 -
5 - - - 2 - - - - - - - - - - - 2
AVG 2 2 2 2 1.5 1 2 1 2 1 2 2 3 2 1.5 2
130
`
3 0 0 3
COURSE OBJECTIVES:
To learn about Bit coin, Cryptocurrency.
To understand the concepts of block chain
To explore the concepts of Ethereum.
To learn about Hyper ledger Fabric model and its architecture.
To integrate ideas from block chain technology into projects.
131
`
COURSE OUTCOMES
After completion of the course, the students will be able to
CO1 - Explain the functional /operational aspects of Cryptocurrency Ecosystem
CO2 -. Understand the basic concepts of Block Chain Technologies.
CO3 - Develop application using Ethereum.
CO4 -Compute models for Block Chain Technology.
CO5 - Illustrate Blockchain with IoT and track the emerging trends in Blockchain.
Text Books
1. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology, Decentralization
andSmart Contracts Explained”, Second Edition, Packt Publishing, 2018.
2. A. Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder, “Bitcoin and
CryptocurrencyTechnologies: A Comprehensive Introduction”, Princeton University
Press, 2016.
Reference Books
1. Mastering Ethereum: Building Smart Contracts and DApps by Andreas M. Antonopoulos,
1stEdition, 2018.
2. Building Blockchain Projects by Narayan Prusty, 2017.
3. Mastering Bitcoin: Unlocking Digital Cryptocurrencies by Andreas M. Antonopoulos, 2015
Web References
1. https://developer.ibm.com/technologies/blockchain/
2. https://www.edx.org/course/introduction-to-hyperledger-blockchain-technologie/
4. https://blockgeeks.com/
COs/POs/PSOs Mapping
Program Outcomes (POs) Program Specific
COs Outcomes (PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3 PSO4
1 - 2 - - - 1 - - - 1 - - - - - -
2 2 - 2 - 2 - - 1 - - - 2 - 2 - -
3 - - - - - - - - 2 2 - - - - 1 -
4 1 - 2 - 1 - 2 - - - 2 - 3 - 2 -
5 - 3 - 2 - - - 2 - - - - - - - 2
AVG 1.5 2.5 2 2 1.5 1 2 1.5 2 1.5 2 2 3 2 1.5 2
132
`
UNIT – V : EXPLOITATION 9
Remote Exploitation–Attacking Network Remote Services–Overview of Brute Force Attacks–
Common Target Protocols–Client Side Exploitation–Methods–Post exploitation–Escalating
Privileges–Installing a Backdoor–MSFVenom–Crackingthe Hashes–Rainbow Crack–
Identifying and Exploiting Further Targets
TOTAL : 45 PERIODS
133
`
COURSE OUTCOMES:
TEXT BOOKS:
1. Tushar Sharma (2019). Ethical Hacking: A Hands-on Introduction to Breaking In, 1st Edition, Packt
Publishing.
2. Baloch, R., Ethical Hacking and Penetration Testing Guide, CRC Press, 2015.
REFERENCES:
1. Rafay Baloch (2020). Mastering Ethical Hacking, 1st Edition, Packt Publishing.
2. Davidoff, S. and Ham, J., Network Forensics Tracking Hackers through Cyberspace, Prentice
Hall, 2012.
3. McClure S., Scam bray J., and Kurtz G, Hacking Exposed. Tata McGraw–Hill Education, 6TH Edition,
2009
CO 1 3 3 2 2
CO 2 3 2 3 2 3 2
CO 3 3 2 2 2 2 3 1
CO 4 2 1 3 1 2 3 2 3
CO 5 1 3 2 1 2 2 2 3 1 2 3 1
AVG 2.2 2.5 2 1.6 2.5 2 2 2 1.5 2.3 1 2.5 2.6 2.3 1.3
134
`
Course Objectives:
• To understand the concept of Social Engineering attacks and related applications.
• To learn knowledge representation using Social Engineering.
• To understand human behaviour in social web and related communities.
• To learn visualization of social networks.
• To understand the applications of Social Entrepreneurship
UNIT I INTRODUCTION 9
Introduction to Social Engineering – Importance – Social Ethics – Vision & Mission towards
Society- Individual Social Responsibility (ISR) UNSDGs- Relevance & impactof SDGs.
` TOTAL : 45 PERIODS
135
`
Textbook:
1. Christopher Hadnagy, Social Engineering: The Art of Human Hacking, Wiley Publications,2nd
Edition, 2018.
Reference Books:
1. Joe Navarro, “Social Engineering: A Guide to Manipulation and Influence”,edition1st, 2019.
2. Christopher Hadnagy and Michele Fincher, Phishing Dark Waters: The Offensive and Defensive
Sides of Malicious Emails, Wiley Publications 1st edition 2015.
3. Kevin D. Mitnick and William L. Simo, The Art of Deception: Controlling the Human Element of
Security, Wiley Publications, 1st edition 2007.
OUTCOMES:
Upon completion of the course, the students should be able to:
• Develop web related applications and attacks.
• Represent knowledge using Social Engineering.
` 136
`
TOTAL : 45 PERIODS
137
`
Course Outcomes
After completion of the course, the students will be able to
CO1 - Explain the fundamental concepts of Big Data and Big Data Analytics with its
CO2 - Identify about the Hadoop Framework and the Map Reduce procedure
CO3 - Illustrate the operational aspects of Hadoop Distributed File System
and examine the process of MapReduce paradigm
CO4 - Demonstrate the different versions of Map Reduce model to process the big
data along with Hadooptools
CO5 - Apply tools like HIVE, HIVEQL and HBase on real time
applications and buildapplications usingZookeeper.
Text Books
1. Vangelis K. Iliadis, Rania Kora, and Konstantinos G. Vamvoudakis (2019). Big Data
Security and Privacy, 1st Edition, Springer.
2. Boris lublinsky, Kevin t. Smith, Alexey Yakubovich, “Professional Hadoop Solutions”,Wiley,
ISBN:9788126551071, 2015.
3. Chris Eaton, Dirk deroos et al., “Understanding Big data”, McGraw Hill, 2012.
4. Vignesh Prajapati,“Big Data Analytics with R and Haoop”, Packet Publishing 2013.
Reference Books
1. Kennesaw State University, Big Data Security and Privacy Group (2018). Privacy and Security
in Big Data, 1st Edition, Springer.
2. TomWhite, “HADOOP: The definitive Guide”, O Reilly 2012.
3. Tom Plunkett, Brian Macdonald et al, “Oracle Big Data Handbook”, Oracle Press, 2014.
4. Jy Liebowitz, “Big Data and Business analytics”, CRC press, 2013.
Web References
1. http://www.bigdatauniversity.com/
CO – PO and PSO MAPPING:
CO 1 - 2 1 - - 1 - - - 3 - - - - - -
CO 2 2 - - - 2 - - 3 - - - 2 - 2 - -
CO 3 - 2 - - - - - - 2 - - - - - 1 -
CO 4 - - 2 - 1 - 2 - - - 2 - 3 - - -
CO 5 - - - 2 - - - - - - - - - - - 2
AVG 2 2 2 2 1.5 1 2 3 2 3 2 2 3 2 1 2
138
`
PCY306 DATAPRIVACY L T P C
3 0 0 3
OBJECTIVES :
TOTAL: 45 PERIODS
`
COURSE OUTCOMES:
At the end of the course, learners will be able to:
Will develop advanced theoretical or practical research skills in the area of privacy.
Students will make original research contributions.
Become familiar with the basics of privacy.
Understand how privacy is formalized.
Understand the common data privacy techniques.
TEXT BOOKS
1. Gerardus Blokdyk, “Data Privacy and Security: A Complete Guide”,
First Edition, 5STARCooks, 2024.
2. Katharine Jarmul, “Practical Data Privacy”, First Edition, O'Reilly Media,2023.
REFERENCES
1. Shikha Ahuja, “Data Privacy and Protection”, First Edition, Wiley India, 2024.
2. Nishant Bhajaria, “Data Privacy: A Runbook for Engineers”, 1st
Edition, Manning Publications, 2022.
CO 2 - 2 2 1 2 - - - - - - 2 2 - - 1
CO 3 - 3 2 2 - - - - - - - 2 - 3 - 1
CO 4 2 - - 1 - - 1 - - 1 3 - - - 1 -
CO 5 3 - 2 2 2 - - - - 2 - - 2 - 1 -
AVG 2.3 2.5 2 1.5 2 - 1 - - 1.5 2.5 2 2 3 1.3 1
`
UNIT – IV : INVESTIGATION 9
Arsenal – Surveillance Tools – Hackers and Theft of Components – Contemporary
Computer Crime- Identity Theft and Identity Fraud – Organized Crime &Terrorism
– Avenues Prosecution and Government Efforts – Applying the First Amendment
to Computer Related Crime-The Fourth Amendment and other Legal Issues.
TOTAL : 45 PERIODS
143
`
COURSE OUTCOMES:
To demonstrate proficiency in using forensic tools and techniques for digital
evidence analysis.
To critically evaluate and interpret digital artifacts to reconstruct cyber incident timelines.
To apply legal and ethical principles to ensure compliance in cyber forensic investigations.
To formulate and implement incident response strategies to mitigate cyber threats
effectively. To prepare clear and comprehensive forensic reports and presentations
for stakeholders.
TEXT BOOKS
1. Albert J. Marcella (2022). Cyber Forensics: Examining Emerging and Hybrid Technologies, 1st
Edition, CRC Press.
2. Marjie T Britz, “Computer Forensics and Cyber Crime: An Introduction”, PearsonEducation, 2nd
Edition, 2008. (CHAPTERS 3 – 13). (UNIT IV – V)
3. John R. Vacca, “Computer Forensics: Computer Crime Scene Investigation”, Cengage Learning,
2nd Edition, 2005. (CHAPTERS 1 – 18). (UNIT I – IV)
REFERENCE BOOKS
1. Eoghan Casey (2019). Digital Evidence and Computer Crime: Forensic Science, Computers, and
the Internet, 4th Edition, Academic Press.
2. MariE-Helen Maras, “Computer Forensics: Cybercriminals, Laws, and Evidence”, Jones & Bartlett
Learning; 2nd Edition, 2014.
3. Majid Yar, “Cybercrime and Society”, SAGE Publications Ltd, Hardcover,2nd Edition, 2013.
4. Chad Steel, “Windows Forensics”, Wiley, 1st Edition, 2006.
5. Robert M Slade, “Software Forensics: Collecting Evidence from the Scene of a Digital Crime”,
Tata McGraw Hill, Paperback, 1st Edition, 2004.
CO 1 3 2 3
CO 2 3 3 2
CO 3 3 2 3 3
CO 4 2 2 2
CO 5 3 2 2 2
Avg 2. 2.5 2 2.5 2.5 3 2 2.
7 5
144
`
145
`
TEXT BOOK:
1. Kennesaw State University, Big Data Security and Privacy Group (2019). Social Media Security:
Threats, Countermeasures, and Best Practices, 1st Edition, Springer.
2. "The Social Media Handbook: Rules, Policies, and Best Practices to
Successfully Manage Your Organization's Social Media Presence, Posts, and
Potential Legal Issues" by Nancy Flynn.2013
3. "Social Media Security: Leveraging Social Networking While Mitigating Risk" by Michael Cross.2010.
REFERENCE:
4. Natasha L. Miller (2022). Social Media Risk and Governance: Preventing Fraud, Cybercrime, and Other
Threats, 1st Edition, Wiley.
5. The Ethical Hack: A Framework for Business Value Penetration Testing" by James S. Tiller.2020
6. "Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails" byChristopher
Hadnagy and Michele Fincher.2015
CO 1 1 2 3 3 2
CO 2 1 2 3 1
CO 3 1 2 3 3 1
CO 4 1 2 3 2
CO 5 1 1 2 2 3 1 2
avg 1 1.2 1 2.2 2.5 3 1 1.6
146
`
MANDATORY COURSE - II
Course Objectives
To understand the basics of cyber security and cyber law,
To understand the problems and issues associated with it,
To understand the various act or regulations,
To understand the various approaches for incident analysis and response.
To understand the ethical laws of computer for different countries.
TOTAL: 45 PERIODS
Course Outcomes
After completion of the course, the students will be able to
CO1 - Understand key terms and concepts in cyber security and cyber law, intellectual
property and cyber– crimes,trademarks and domain theft.
CO2 -. Determine computer technologies, digital evidence collection.
CO3 - Determine evidentiary reporting in forensic acquisition.
CO4 - Secure both clean and corrupted systems, protecting personal data,securing
simple computer networks, and safe Internet usage.
CO5 – Incorporate approaches for incident analysis and response.
147
`
Text Books
1. Kennesaw State University, Big Data Security and Privacy Group (2020). Cyber
Security and Cyber Law: A Comprehensive Guide to Legal Aspects of Cyber
Security, 1st Edition, Wiley.
2. Sunit Belapure and Nina Godbole, Cyber Security: UnderstandingCyber
Crimes, Computer Forensics and Legal Perspectives, WileyIndia Pvt. Ltd, 2011.
3. Jonathan Rosenoer, “Cyber Law: The law of the Internet”, Springer–Verla..1997
Reference Books
1. Michael J. Kearns, Aaron K. B. P. (2022). Cyber Security Law: A Practical
Guide to Emerging Legal Issues, 1st Edition, Oxford University Press
2. Dr. Farooq Ahmad, Cyber Law in India, Allahbad Law Agency– Faridabad.2012
3. Mark F Grady, Fransesco Parisi, “The Law andEconomics of Cyber Security”,
Cambridge University Press, 2006.
COs/POs/PSOs Mapping
Program Specific
Program Outcomes (POs)
Outcomes(PSOs)
COs
PO1 PO2 PO 3 PO4 PO 5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO PSO PSO PSO
1 2 3 4
1 2 2 1
2 2 2 2 2 2
3 2 1
4 3 2 2 2 2 1
5 2 2 2
148