Syllabus Affiliated ArtsScience NEP B.SC .Honors CyberandDigitalSciencesIIISem2023-24
Syllabus Affiliated ArtsScience NEP B.SC .Honors CyberandDigitalSciencesIIISem2023-24
(A CENTRAL UNIVERSITY)
SCHOOL OF ENGINEERING AND TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE
November 2023
Contents
1 PREAMBLE 4
2 PROGRAMME OUTCOMES 4
3 DEFINITIONS 6
4 AWARD OF UG DEGREE/DIPLOMA/CERTIFICATE 7
4.1. DEGREE AND NOMENCLATURE 7
4.2 DEGREE WITH SPECIALIZATION 7
4.2.1 EXIT OPTIONS 7
5 PEDAGOGICAL APPROACHES 8
6 ACADEMIC AUDIT OF COURSES 9
7 ADMISSIONS & LATERAL ENTRY 9
7.1. ADMISSIONS ELIGIBILITY 9
7.2. LATERAL ENTRY 9
8 EVALUATION (INTERNAL & END SEMESTER ASSESSMENT) AND 10
GRADES
8.1. INTERNAL ASSESSMENTS (FOR COURSES UPTO 6TH 10
SEMESTER)
8.1.1. IA FOR THEORY SUBJETCS 10
8.1.2. IA FOR PRACTICAL / INTERNSHIPS 10
8.1.3. IA FOR RESEARCH PROJECT 11
8.1.4. IA FOR THEORY WITH PRACTICAL COMPONENTS 11
8.1.5. MARKS FOR ATTENDANCE 11
8.2. END SEMESTER ASSESSMENT (FOR COURSES UPTO 6TH 12
SEMESTER)
8.3. CONSOLIDATION OF MARKS AND PASSING MINIMUM 13
8.4 INTERNAL ASSESSMENT / END-SEMESTER ASSESSMENT / 17
PASSING MINIMUM / GRADES (FOR 7TH & 8TH SEMESTERS)
9 MINIMUM CREDIT REQUIREMENTS 17
10 CURRICULUM 21
11 SYLLABUS 28
3
1. PREAMBLE
B.Sc. Cyber & Digital Science is an exceptional undergraduate degree program that caters to the
ever-increasing demand for cybersecurity experts in today’s digital era. This specialized course
aims to provide students with a comprehensive understanding of the complex world of
Cybersecurity and its application in safeguarding digital assets and information systems. As
technology continues to advance, the demand for Cybersecurity professionals is soaring, making
this degree program an attractive choice for individuals passionate about combating cyber threats
and making a meaningful impact in the digital age. The course highlights a well-structured
curriculum designed to equip students with in-depth knowledge and practical skills to address the
complex challenges of Cybersecurity and digital technologies. The main objectives of the course
are to:
● Develop technical proficiency in Cybersecurity, covering areas such as Network Essentials,
Open Source Intelligence, Network Traffic Analysis, Ethical Hacking, Fundamentals of
Cryptography, Cyber Law, and more.
● Nurture critical thinking, problem-solving, and innovation to empower the graduates to adapt
and thrive in the ever-changing Cybersecurity industry.
● Introduce students to the niche areas of Cybersecurity and keep them abreast of the
developments in the Cybersecurity industry.
● Prepare students for successful careers in Cybersecurity by offering practical hands-on
experiences and opportunities for professional growth.
● Cultivate an interest for lifelong learning to ensure that our graduates remain at the forefront
of technological advancements throughout their careers.
● Enable holistic, multidisciplinary, and skill-oriented knowledge development in the students.
2. PROGRAMME OUTCOMES:
Upon completion of the programme the following aspects would be inculcated in the
students in the field of Cyber and Digital Sciences:
4
4. Modern tool usage: Create, select, and apply appropriate techniques, resources, and
modern cybersecurity tools for handling cyberattacks.
5. Create New Solutions: Using the discipline knowledge, problem-solving, solution
designing and tools usage skill set to create novel and innovative Cyber and Digital Systems.
6. Communication: Develop effective communication skills, both in oral and written forms,
to facilitate clear and concise interaction.
7. Holistic, multidisciplinary, and skill-oriented knowledge development : enable students
to obtain knowledge and skills in a multidisciplinary flavor constituting for holistic
development.
8. Ethics on Profession, Environment, and Society: Exhibit professional ethics to maintain
integrity in a working environment and demonstrate concern for societal impacts resulting
from IT-based solutions for problems.
9. Commitment to Lifelong Learning: Cultivate the ability to become an independent learner
and nurture a "Learn-Unlearn-Relearn" mindset to adapt with the evolving technologies and
methodologies.
10. Motivation for Higher Studies: Develop inspiration and motivation to pursue higher
education in the field of Information Technology, advancing knowledge and expertise.
Upon completing the programme, student can expect a plethora of promising career prospects
and job opportunities in the cybersecurity domain. The cybersecurity industry is witnessing rapid
growth and offers diverse roles across various sectors, making it an attractive field for aspiring
professionals. Some of the prominent career paths and job opportunities for B. Sc. Cyber and
Digital Science graduates include:
● Cybersecurity Analyst
● Ethical Hacker
● Cybersecurity Consultant
● Etc.
5
3. DEFINITIONS
Terms used in the NEP Regulations shall have the meaning assigned to them as given below unless
the context otherwise requires:
A. Credit: A credit is the number of hours of instruction required per week for the given subject
in a given semester of 16-18 weeks. One credit is equivalent to 15 hours of teaching (lecture or
tutorial) or 30 hours of practice or field work or community engagement and service per Semester.
B. Academic Year: Means the year starting on 1st day of July and ends on the 30th day of June
succeeding year.
C. Residence time: Means the time a student spends for attending classes in the College/Institution
(either Online/Offline) as a full-time student and enrolled in any Academic programme of the
Institution.
D. Semester: Means 18 weeks (90 Working days) of teaching-learning session of which two weeks
shall be set apart for examinations and evaluation.
E. Grade: Means a letter grade assigned to a student in a course for his/her performance at academic
sessions as denoted in symbols of: O(Outstanding), A+(Excellent), A(Very good), B+(Good),
B(Above average), C(Average), P(Pass), F(Fail) and Ab( Absent) with a numeric value of O=10,
A+=9, A=8, B+=7, B=6, C=5, P=4, and F=0, Ab=0.
F. Grade Point Average (GPA): Means an average of the Grades secured by a student in all courses
in a given academic session duly weighted by the number of credits associated to each of the courses.
G. Cumulative GPA (CGPA): Means the weighted average of all courses the student has taken in
the entire programme of study.
H. Common courses: Means the set of courses that all students who are admitted are required to
study; these courses include, Languages (English- Modern Indian languages), NEP specific courses
viz. Understanding India, Environmental sciences/Education, Health and wellbeing/Yoga, and
Digital & Technological solutions.
I. Major Discipline Courses: Means the core subjects mandatory for the Computer Science
discipline. These courses are common across all specializations of Computer Science.
6
in Computer Science will be awarded. Eg: B.Sc. (Computer Science) with minor discipline courses
in Artificial Intelligence and Machine Learning will be awarded B.Sc. Computer Science with
Specialization in AI&ML.
L. Exit option: Means the option exercised by the student, to leave the Programme at the end of any
given Academic year.
M: Lateral entry: Means a student being admitted into an ongoing Programme of the University
otherwise than in the 1st year of the programme.
4. AWARD OF UG DEGREE/DIPLOMA/CERTIFICATE
Four years B.Sc. Degree Programme shall have options for earning a Certificate / Diploma / UG
Degree / UG Degree with Honors based on the exit option exercised by the candidates.
Out of the above said 160 credits the candidates shall earn 111 credits from the Hardcore courses and
the remaining 49 credits shall be earned from the subjects they choose to study from the list of softcore
courses. These 49 credits are assigned across 13 courses as listed below:
Credits
Courses Total Credits
per course
The 13 courses under the above said categories are chosen from the specialization of Cyber and
Digital Sciences.
Exit after 2nd Semester: Certificate in Cybersecurity Fundamentals will be awarded for candidates who
exit the course at the end of 2nd semester and earned a minimum of 40 credits and have completed a
Summer Internship of 4 credits for 4 - 6 weeks duration, during the summer vacation post 2nd
semester.
Exit after 4th Semester: Diploma in Cyber and Digital Sciences will be awarded for candidates who
exit the course at the end of 4th semester and earned a minimum of 80 credits and have completed a
Summer Internship of 4 credits for 4 – 6 weeks duration, during the summer vacation post 4th
semester.
8
Exit after 6th Semester: UG Degree in Cyber and Digital Sciences (B.Sc. (CDS)) will be awarded
for candidates who exit the course at the end of 6th semester and earned a minimum of 120 credits
and have completed a Summer Internship of 4 - 6 weeks duration, during the summer vacation post
4th semester.
2nd Semester Min: 40 Credits, Internship 4-6 weeks Certificate in Cybersecurity Fundamentals
4th Semester Min: 80 Credits, Internship 4-6weeks Diploma in Cyber and Digital Sciences
6th Semester Min: 120 Credits, Internship 4-6 weeks B.Sc. Cyber and Digital Sciences
5. PEDAGOGICAL APPROACHES
9
f) Research Project Students need to study and analyze the recent research publications
from indexed/peer reviewed journals in their area of specialization.
Outcome of the study and analysis need to be presented as a thesis or
research report with necessary experimental results.
Candidates seeking entry at the second, third and fourth year, should meet the necessary eligibility
criteria with respect to the certificate / diploma / degree they possess, with necessary minimum credits
banked in the Academic Bank of Credits (ABC). Such students who get admitted in later years, other
than first year will be guided by the following clauses:
• that the University shall notify the admission process and number of vacancies open for
lateral entry.
• that the Lateral entrants shall be admitted only after such transparent screening process
and such procedure that the University may prescribe from time to time. University may
prescribe different methods of screening for different programmes depending on the
circumstances prevailing in each case.
10
• Lateral entry shall be permissible only in the beginning of years 2, 3, 4 of the Under
Graduate / Honors programme; provided that the students seeking lateral entry shall have
obtained the minimum pass marks / grades fixed by the University in their previous
academic years.
Internal Test Scheme: Principal of the College schedules the Mid-Semester Exam for all courses
during 8/9th week of start of classes. Mid-Semester exam for 90 minutes’ duration need to be
conducted for all these theory courses. The evaluated marks need to be uploaded to Controller of
Examinations of University. The answer books of Mid-Semester exams need to be preserved until
the declaration of results by the University.
Total Internal Assessment mark for a theory subject is 25 marks. The breakup is as follows:
B. Percentage of Attendance 05
Total 25
Faculty member in-charge of Lab practical shall evaluate the practical subjects for 50 marks. The
breakup is as follows:
C. Percentage of Attendance 05
Total 50
11
8.1.3 Internal Assessment marks for Research Project Work
There shall be a faculty member assigned as a Project Guide for each candidate doing the Research
Project. Progress of the candidate can be assessed once in a month in a project review meeting. Three
project review meetings shall be conducted for Internal Assessment.
Project review committee may be constituted and the committee shall organize project review
meetings and evaluate the progress and to award the Internal Assessment marks. Internal Assessment
component for the Research Project is 50 Marks. The breakup is as follows:
8.1.4 Internal Assessment marks for Theory Subjects with Practical Components
Faculty member in-charge of Theory Subjects with Practical Component shall evaluate the candidates
both for their performance in theory and practical. Internal Assessment marks for Theory Subjects
with Practical Components is 25 marks. The break up is as follows:
Attendance % Marks
Below 75% 0
75% - 80% 1
80% - 85% 2
85% - 90% 3
90% - 95% 4
95% - 100% 5
12
8.2 END SEMESTER ASSESSMENT [ESA] ( for Courses upto 6th Semester )
Controller of Examinations (COE) of Pondicherry University schedules the End-Semester exams for
all theory and practical subjects based on university calendar. For Theory courses with Practical
components, End semester exams shall be conducted separately for Theory and Practical.
A detailed Exam Time Table shall be circulated at least 15 days before the start of exams, mostly
during 15/16th week of the Semester. Question Papers shall be set externally based on BoS approved
syllabus. All students who have a minimum of 70% attendance are eligible to attend the end-semester
exams. Attendance percentage shall be calculated for each course to decide the eligibility of the
candidate for writing the end-semester examination.
The question paper shall be set as per the Bloom’s Taxonomy. Various levels along with it’s
description and sample questions are as follows:
Application: Apply knowledge and concepts to solve problems in new situations. Use learned
information in a different context.
Example: Write a Python program to solve the deadlock problem.
Analysis: Break down information into parts and examine the relationships between the parts.
Identify motives or causes.
Example: Analyse the efficiency of two sorting algorithms and compare their advantages and
disadvantages.
13
Synthesis: Create a new whole by combining elements in novel ways. Use creativity to produce
something original.
Example: Design a web application that can generate a time table of a school.
--
Internship / Research Project Work:
Presentation of the work / Report / Viva-voce examinations
i. Theory Component:
14
Questions from all units of Syllabus equally distributed.
25 Marks 3 Hours
Controller of Examinations of the University consolidates the Internal Assessment marks uploaded
by the Colleges and marks secured by students in End-Semester examinations. The total marks will
be converted into letter grades. The passing minimum is 40% marks (Internal Assessment + End
Semester Assessment put together) and students who secure between 40% and 49% will be awarded
‘P’ (Pass Grade).
A student who secures less than 40% marks in aggregate is declared as Fail and that student is eligible
to take up supplementary examination by registering to the failed course in the following Semester.
All other candidates who failed due to shortage of attendance and those who are seeking to improve
the grade shall repeat the course.
Total marks secured by a student in each subject shall be converted into a letter grade. UGC
Framework has suggested a Country wide uniform letter grades for all UG courses. The following
table shows the seven letter grades and corresponding meaning and the grade points for calculation
of CGPA.
15
Equivalent Grade Points for
Meaning
Letter Grade Calculation of CGPA
O Outstanding 10
A+ Excellent 9
A Very Good 8
B+ Good 7
B Above Average 6
C Average 5
P Pass 4
F Fail 0
Ab Absent 0
In order to work out the above letter grades, the marks secured by a student (Total of Internal
Assessment and End Semester Assessment) would be categorized for relative grading.
(i) If K ≥ 5, then the grades shall be awarded as given in the following table .
(ii) If K< 5, then the grades shall be awarded as given in the following table.
16
80-100 O 10
71-79 A+ 9
66-70 A 8
61-65 B+ 7
56-60 B 6
50-55 C 5
40-49 P 4
Below 40 F 0
Absent (lack of attendance) Ab 0
8.3.3 Calculation of Semester Grade Point Average and Cumulative Grade Point Average
Semester Grade Point Average (SGPA) is calculated by taking a weighted average of all grade points
secured by a candidate from all subjects registered by him/her in the given Semester. The weights
being the number of credits that each subject carries.
Cumulative Grade Point Average (CGPA) shall be calculated as the weighted average of credits that
course carries and the value of Grade points averaged for all subjects.
The following procedure shall be followed to compute the Semester Grade Point Average (SGPA)
and Cumulative Grade Point Average (CGPA):
The SGPA is the ratio of the sum of the product of the number of credits with the grade points scored
by a student in all the courses taken by a student to the sum of the number of credits of all the courses
undergone by a student, i.e. SGPA (Si) = Σ(Ci x Gi) / ΣCi
where Ci is the number of credits of the ith course and Gi is the grade point scored by the student in
the ith course.
(i) Example for Computation of SGPA where candidate has not failed in any course
(ii) Example for Computation of SGPA where candidate has failed in one course
(iii) Example for Computation of SGPA where candidate has failed in two courses
The CGPA shall also be calculated in similar way as shown in examples (i), (ii) and (iii) of SGPA for
all subjects taken by the students in all the semesters. However, if any student fails more than once
in the same subject, then while calculating CGPA, the credit and grade point related to the subject in
which the student fails in multiple attempts will be restricted to one time only. The SGPA and CGPA
shall be rounded off to 2 decimal points and reported in the transcripts.
In case of audit courses offered, the students may be given (P) or (F) grade without any credits. This
may be indicated in the mark sheet. Audit courses will not be considered towards the calculation of
CGPA.
18
8.3.5 Declaration of Results
Controller of Examinations (COE) of the University shall declare the results of given UG programme
following the CGPA secured by students by the end of 6th Semester and 8th Semester.
# Distinction will be awarded ONLY to those who have cleared ALL subjects in the first attempt.
##Note: Honors students not undertaking research will do 3 courses for 12 credits in
lieu of a research project/Dissertation.
19
- MJD: Major Disciplinary (Compulsory – Hardcore Subjects)
- MID: Minor Disciplinary (Specialization Specific – Softcore Subjects)
- MLD: Multi-Disciplinary
- AEC: Ability Enhancement Courses
- SEC: Skill Enhancement Courses
- VAC: Value Added Courses
- SG: Specialization Group
- Course Code: CD1MJ01(E) (CD-B.Sc. Cyber and Digital Sciences, 1-Semester,
MJ-Component, 01-Course Number in the respective component, E - Elective)
20
ANNEXURE I – SPECIALIZATION IN CYBER AND DIGITAL SCIENCES
CURRICULUM
FIRST SEMESTER
Comp Hours/Week
S.No Course Code Title of the Course H/S Credits
onent
L T P
1 MJD 1 CD1MJ01 Digital Logic Fundamentals H 4 3 2
2 MID 1 CD1MI01 Networks Essentials S 4 3 2
One course from the MLD streams H
3 MLD 1 3 4
1 to 10 (Table 15)
4 AEC 1 CD1AE01 English I H 2 2 2
5 SEC 1 S.No. 1 or 2 from Table 7 S 3 2 2
6 VAC 1 CD1VA01 Understanding India H 2 4 0
Environmental Sciences/ H
7 VAC 2 CD1VA02 2 4 0
Education/ Higher Order Thinking
Total 20 30 Hours
SECOND SEMESTER
Comp Hours/Week
S.No Course Code Title of the Course H/S Credits
onent
L T P
Problem Solving & Programming
1 MJD 2 CD2MJ02 H 4 3 2
Fundamentals
2 MID 2 CD2MI02 Fundamentals of Cybersecurity S 4 3 2
One course from the MLD streams
3 MLD 2 1 to 10 except the stream chosen in H 3 4
MLD1(Table 15)
4 AEC 2 CD2AE02 Indian Language I H 2 2 2
5 SEC 2 S.No. 3 or 4 from Table 7 S 3 2 2
Health & Wellness/Yoga
6 VAC 3 CD2VA03 Education/ Universal Human H 2 4
Values
7 VAC 4 CD2VA04 Digital Technologies H 2 3
Total 20 29 Hours
THIRD SEMESTER
Comp Hours/Week
S.No Course Code Title of the Course H/S Credits
onent
L T P
1 MJD 3 CD3MJ03 Mathematical Foundations of CS H 4 4 1
2 MJD 4 CD3MJ04 Data Structures H 4 3 2
3 MID 3 CD3MI03 Ethical Hacking S 4 3 2
One course from the MLD streams
4 MLD 3 1 to 10 except the streams chosen H 3 4
in MLD1 and MLD2(Table 15)
5 AEC 3 CD3AE03 English II H 2 2 2
6 SEC 3 S.No. 5 or 6 from Table 7 S 3 2 2
Total 20 27 Hours
21
FOURTH SEMESTER
Compo Hours/Week
S.No Course Code Title of the Course H/S Credits
nent
L T P
1 MJD 5 CD4MJ05 Computer System Architecture H 4 3 2
2 MJD 6 CD4MJ06 Design and Analysis of Algorithms H 4 3 2
3 MJD 7 CD4MJ07 Object Oriented Programming H 4 3 2
4 MID 4 CD4MI04 Fundamentals of Cryptography S 4 3 2
5 AEC 4 CD4AE04 Indian Language II H 2 2 2
6 Project CD4CS01 Community Engagement and Service H 2 6
Total 20 30 Hours
FIFTH SEMESTER
Compo Hours/Week
S.No Course Code Title of the Course H/S Credits
nent
L T P
1 MJD 8 CD5MJ08 Operating Systems H 4 3 2
2 MJD 9 CD5MJ09 Database Management Systems H 4 3 2
3 MJD 10 CD5MJ10 Management Strategies & Concepts H 4 4
4 MID 5 CD5MI05 Network Security S 4 3 2
5 MJD 11 CD5MJ11 Summer Internship H 4 6
Total 20 25 Hours
SIXTH SEMESTER
Compo Hours/Week
S.No Course Code Title of the Course H/S Credits
nent
L T P
1 MJD 12 CD6MJ12 Computer Networks H 4 3 2
Software Engineering Theory and
2 MJD 13 CD6MJ13 H 4 3 2
Practise
3 MJD 14 CD6MJ14 System Modelling & Simulation H 4 3 2
4 MJD 15 CD6MJ15 Web Engineering H 4 3 2
5 MID 6 Any one course from Table 1 S 4 3 2
Total 20 25 Hours
SEVENTH SEMESTER
Compo Hours/Week
S.No Course Code Title of the Course H/S Credits
nent
L T P
1 MJD 16 CD7MJ16 Software Testing and Quality Assurance H 4 3 2
2 MJD 17 CD7MJ17 Distributed Systems H 4 3 2
3 MJD 18 CD7MJ18 Wireless Communication Networks (5G) H 4 3 2
4 MID 7 Any one course from Table 2 S 4 3 2
5 MID 8 Any one course from Table 3 S 4 3 2
22
Total 20 25 Hours
EIGHTH SEMESTER – B.Sc. Cyber and Digital Sciences (Honors with Research)
Compo Hours/Week
S.No Course Code Title of the Course H/S Credits
nent
L T P
1 MJD 19 Any one course from Table 4 S 4 3 2
2 MJD 20 Any one course from Table 5 S 4 3 2
3 MJD 21 CD8MJ24 Research Project H 4 5
4 MJD 22 CD8MJ25 Project Report H 4 5
5 MJD 23 CD8MJ26 Project Viva-voce H 4 5
Total 20 25 Hours
24
9. MJD 9 CD5MJ09 Database Management Systems H
10. MJD 10 CD5MJ10 Management Strategies & Concepts H
11. MJD 11 CD5MJ11 Summer Internship H
12. MJD 12 CD6MJ12 Computer Networks H
13. MJD 13 CD6MJ13 Software Engineering Theory and Practice H
14. MJD 14 CD6MJ14 System Modeling & Simulation H
15. MJD 15 CD6MJ15 Web Engineering H
16. MJD 16 CD7MJ16 Software Testing and Quality Assurance H
17. MJD 17 CD7MJ17 Distributed Systems H
18. MJD 18 CD7MJ18 Wireless Communication Networks (5G) H
19. MJD 19 Blockchain Technologies / Cyber Laws S
20. MJD 20 Database and Application Security / Data Privacy S
25
Table 12: List of Skill Enhancement Courses
1. Biology H
2. Botany H
Natural
3. Zoology H
Science
4. Biotechnology H
5. Biochemistry H
6. Chemistry H
7. Physics H
8. Physical Biophysics H
9. Sciences Astronomy H
10. Astrophysics H
11. Earth and Environmental Sciences H
12. Social Political Sciences H
13. Sciences History H
26
14. Social work H
15. Sociology H
16. Anthropology H
17. Psychology H
Humanities
18. Economics H
19. CD1SE01E1 Python Programming
Computer H
(ODD)
Science &
20. CD2MI02 H
Applications Fundamentals of Cybersecurity
(EVEN)
27
SYLLABUS
SEMESTER I
Year I Course Code: CD1MJ01 Credits 4
Sem. I Hours 75
Course Title: Digital Logic Fundamentals
Course
Prerequisites, if Nil
any
Internal End Semester Marks: 75 Duration of ESA (Theory): 03 hrs.
Assessment Duration of ESA (Practical): 03 hrs.
Marks: 25
Course • Understand the postulates of Boolean algebra.
Outcomes • Apply minimization techniques for combinational functions.
• Design and analyze combinational and sequential circuits.
• Analyze and apply techniques for the design of digital circuits.
• Create simple digital circuit designs and schematics.
Unit No. Course Content Hours
Theory Component
Digital Systems and Binary Numbers 9
Digital Systems - Binary Numbers - Number‐Base Conversions - Octal and
Hexadecimal Numbers - Complements of Numbers - Signed Binary
Numbers - Binary Codes - Binary Storage and Registers - Binary Logic -
Unit I
Axiomatic Definition of Boolean Algebra - Basic Theorems and Properties
of Boolean Algebra - Boolean Functions
Canonical and Standard Forms - Other Logic Operations - Digital Logic
Gates - Integrated Circuits
Gate‐Level Minimization 9
Introduction - The Map Method - Four‐Variable K-Map - Product‐of‐
Unit II Sums Simplification - Don’t‐Care Conditions - NAND and NOR
Implementation - Other Two‐Level Implementations - Exclusive‐OR
Function - Hardware Description Language
Combinational Logic 9
Introduction - Combinational Circuits - Analysis Procedure - Design
Unit III Procedure - Binary Adder–Subtractor - Decimal Adder - Binary Multiplier
- Magnitude Comparator – Decoders – Encoders – Multiplexers - HDL
Models of Combinational Circuits.
Synchronous Sequential Logic 9
Introduction - Sequential Circuits - Storage Elements: Latches - Storage
Unit IV Elements: Flip‐Flops - Analysis of Clocked Sequential Circuits -
Synthesizable HDL Models of Sequential Circuits - State Reduction and
Assignment - Design Procedure
Registers and Counters 9
Unit V Registers - Shift Registers - Ripple Counters - Synchronous Counters -
Other Counters - HDL for Registers and Counters
Practical Component
1. Binary to Decimal and vice-versa in Python 30
2. Decimal to Hexadecimal and Vice-Versa in Python
28
3. Digital Logic Gates in Python
4. Simplification of Boolean Functions in Python
5. Combinational Logic Circuits in Python
i. Code Converters
ii. Arithmetic (Adders, Subtractors,
Multipliers, Comparators)
iii. Data Handling (Multiplexers,
Exercises Demultiplexers, Encoders & Decoders)
6. Combinational Logic Circuit Design in Python
7. Binary Adder-Subtractor Simulation in Python
8. Decimal Adder Simulation in Python
9. Binary Multiplier Simulation in Python
10. Sequential Circuit Storage Elements: Flip-Flop Simulation in
Python
29
Year I Course Code: CD1MI01 Credits 4
Sem. I Hours 75
Course Title : NETWORK ESSENTIALS
Course NIL
Prerequisites, if
any
Internal End Semester Marks: 75 Duration of ESA (Theory) : 03 hrs.
Assessment Duration of ESA (Practical) : 03 hrs.
Marks: 25
Course ● Understanding the basics of digital communication, network models and
Outcomes internetworking devices
● Learning about LAN, Internet, Intranet and Extranet
● Applying encryption techniques for secure data transmission
● Analyzing and resolving connectivity problems
● Evaluating the potential impact of new technologies on network design.
30
Computing – Emerging 5G network, also discuss their Key benefits and
Applications.
Practical Component
30
1. Performing a study of the various transmission media and their
properties.
2. Demonstrating the configuration of the network settings of a
computer.
3. Demonstrating the creation of a LAN and configuring it.
4. Demonstrating the installation and configuration of an open
source VPN.
5. Performing a comparison of HDSL, ADSL, RADSL, VDSL.
6. Performing a study of WLAN, WMAN, WWAN, WPAN and do a
comparison of the same.
Exercises
7. Performing a study of commercial / industrial deployments of
SONET, Free Space Optical networks.
8. Performing a study of commercial / industrial deployments of
Wireless Sensor Networks.
9. Performing a study of blockchain use cases.
10. Performing a study of big data and IoT applications use cases in
the real world.
11. Performing a study of commercial / industrial deployment of
fog, edge computing
12. Performing a study of 5G network properties and
its advantages.
Recommended Learning Resources
1. Matthew N. O. Sadiku Cajetan M. Akujuobi, “Fundamentals of Computer
Networks”, Springer Publication, 2022.
2. Behrouz A. Forouzan, “Data communication and Networking”, 4th Edition,
Mc Graw-Hill, India, 2017.
3. Tanenbaum, A. S. “Computer networks”, Pearson Education India, 2022
Print Resources 4. Keiser, G. “Local area networks”, Information Gatekeepers Inc., 1989
5. Kurose, Ross, “Computer Networking: A top-down approach”,
Pearson Education, India, 2010
6. Pahlavan, K., & Krishnamurthy, P. “ Networking fundamentals: Wide,
local and personal area communications”, John Wiley & Sons, 2009.
7. Palmer, M., “Hands-on networking fundamentals”, Cengage learning,
2012
31
SKILL ENHANCEMENT COURSES
Year I Course Code: CD1SE01E1 Credits 3
Unit IV Packages 6
32
Unit V File Handling 6
Practical Component
33
Year I Course Code: CD1SE01E2 Credits 3
Sem. I Hours 60
Course Title : Linux Shell Programming
Course Prerequisites, Basic knowledge of computers and programming
if any
Internal Assessment End Semester Marks: 50 Duration of ESA (Theory) : 03 hrs.
Marks: 50 Duration of ESA (Practical) : 03 hrs.
Course Outcomes ● Learning commands of linux operating system
● Understanding the concepts of shell programming
● Understanding the use of quotes, backslash, command substitution and
passing arguments
● Learning to understand to work with decisions and loops
● Creating shell programs to Demonstrate the Reading and printing of data
Unit No. Course Content Hours
Theory Component
Unit I Introduction to Linux Commands and Shell 6
Basic commands, working with files, working with directories, file
name substitution, file name nuances, Standard input / Output
and I/O redirection, pipes, standard error, advanced commands
– kernel and the utilities, login shell, typing commands to the
shell, the shell’s responsibilities
Practical Component
1. Demonstrating the use of all linux commands 30
2. Demonstrating the use of typing commands to the shell.
34
3. Demonstrating the formation of regular expressions using
various options
4. Using cut, paste, sed, tr, grep, sort and uniq commands
5. Demonstrating the use of variables, and built-in arithmetic
6. Demonstrating the use of single, double quotes, backslash,
commands substitution
7. Demonstrating the passing of arguments
8. Creating shell programs to demonstrate the use of decision
commands
9. Creating shell programs to demonstrate various kinds of
Exercises loops
10. Creating shell programs to Demonstrate the Reading and
printing of data
11. Demonstration of Command-Line editing, command history,
vi and emacs line edit mode, history command, alias command,
etc.
35
SEMESTER II
Year I Course Code: CD2MJ02 Credits 4
Sem. II Course Title: Problem Solving & Programming Fundamentals Hours 75
Course NIL
Prerequisites, if
any
Internal End Semester Marks: 75 Duration of ESA (Theory) : 03 hrs.
Assessment Duration of ESA (Practical) : 03 hrs.
Marks: 25
Course Outcomes • Understand the basic concepts of programming languages, including syntax
and semantics.
• Apply programming constructs like loops, conditionals, and functions in
practical scenarios.
• Analyse code to identify and fix errors using debugging techniques.
• Create modular programs using functions and procedures, emphasizing good
programming practices.
Unit No. Course Content Hours
Theory Component
Introduction to Computer Problem-Solving 9
The Problem-solving Aspect - Top-down Design - Implementation
Unit I
of Algorithms - Program Verification - The Efficiency of Algorithms
- The Analysis of Algorithms
Basic programming constructs 9
Unit II Basic Data types (Numerical, String) – Variables – Expressions – I/O
statements – Compile and Run - Debugging.
Decision Making – Branching & Looping 9
Decision making – Relational Operators - Conditional statement,
Unit III
Looping statement - Nested loops - Infinite loops - Switch
statements.
Array Techniques 9
Array Manipulation - Different operations - one dimensional array
Unit IV
- two-dimensional array - multi-dimensional array - Character
Arrays and Strings.
Modular solutions 9
Introduction to functions – Importance of design of functions –
Unit V
Arguments – Parameters – return values – local and global scope –
Recursion.
Practical Component
1. Program to array counting, array order reversal & find the 30
maximum number in a set.
2. Program for removal of duplicates from an ordered array
& to partition an array.
3. Program to find the kth smallest element.
4. Program to exchange the values of two variables without
using a third variable.
Exercises
5. Program that takes a list of numbers as input and counts
the total number of elements in the list.
6. Program to calculate the sum of a set of numbers entered
by the user.
7. Program to compute the factorial of a given integer.
8. Program to compute the sine of an angle (in degrees) using
a series expansion.
36
9. Program to generate the Fibonacci sequence up to a
specified limit.
10. Program that takes an integer as input and reverses its
digits.
11. Program that converts a number from one base to another
(e.g., binary to decimal, decimal to binary).
Recommended Learning Resources
1. R. G. Dromey, “How to solve it by Computer”, Pearson Education, 2007.
2. E. Balaguruswamy, “Programming In ANSI C”, 4th edition, TMH
Publications, 2007.
Print Resources 3. Yashwant Kanetkar, “Let Us C”, 13th Edition, PHP, 2013.
4. Allen B. Downey, “Think Python: How to Think like a Computer Scientist”,
2nd Edition, O’Reilly Publishers, 2016.
37
Year I Course Code: CD2MI02 Credits 4
Sem. II Hours 75
Course Title: Fundamentals of Cybersecurity
Course Computer Networks
Prerequisites, if
any
Internal End Semester Marks: 75 Duration of ESA (Theory) : 03 hrs.
Assessment Duration of ESA (Practical) : 03 hrs.
Marks: 25
Course ● Learning the basic concepts of cybersecurity
Outcomes ● Understanding user authentication and access control
● Comprehending the basics of cryptography
● Obtaining a basic knowledge of cyber laws and regulations
● Understanding operating system and network security principles
Unit No. Course Content Hours
Theory Component
Unit I Introduction to Computer and Information Security 9
Foundation of Computer and Information Security: Definition and its
needs, Triad and Parkerian Hexad security models and issues- Attacks
and its types – Threats, vulnerabilities and Risk - risk management –
Incident response and Defense in depth.
Practical Component
1. Performing a survey of various malware attacks that have 30
happened in the last 3 years.
2. Identifying some open source malware creation tools (virus,
worms, etc. creation tools) and creating the malware.
3. Studying the various authentication methods and comparing
them.
4. Providing use case scenarios of the various authentication
methods that are used in real life.
5. Using online cryptography tools, create ciphers using symmetric
Exercises and symmetric cryptography.
6. Create message digest using online hash function, create a digital
certificate online
7. Performing a study of cybersecurity laws in India, USA and UK
and compare them.
8. Performing a study of open source firewall and IDS tools
9. Installing and working with tcpdump commands in linux
10. Demonstrating OS hardening.
11. Prepare a list of instructions for creating security awareness to
the common public.
Recommended Learning Resources
1. Jason Andress, “Foundations of Information Security - A Straightforward
Introduction” , William Pollock Publisher, 2019.
2. Atul Kahate, , “Cryptography and Network Security”, McGraw Hill Education,
Print Resources 2019’
3. Harish Chander and Gagandeep Kaur, “Cyber Laws and IT Protection”, PHI
Publication, 2022
4. Alan Calder, “Implementing Information security based on ISO 27001/ISO
27002 (Best Practice)”, Van Haren Publishing, 2009.
39
Skill Enhancement Courses
Year I Course Code: CD2SE02E1 Credits 3
Sem. II Hours 60
Course Title : Network Traffic Analysis
Course Basic understanding of Computers and Networks
Prerequisites, if
any
Internal End Semester Marks: 50 Duration of ESA (Theory) : 03 hrs.
Assessment Duration of ESA (Practical) : 03 hrs.
Marks: 50
Course ● Understanding the basics of network traffic capture and filtered view of
Outcomes packets
● Being able to install and configure network traffic analysis tool
● Learning to interpret network traffic from packets
● Obtaining knowledge of display filters and packet reassembling
● Analyzing TCP/IP protocols traffic viz., DNS, ARP, ICMP, DHCP, TCP, UDP,
HTTP and Email traffic
Practical Component
30
1.Perform hands-on exercises relating to IP addressing,
subnetting, supernetting,
40
2. Perform hands-on exercises relating to capturing traffic,
packet filters
3. Perform hands-on exercises on setting preferences colorizing
traffic and defining time values
4. Perform hands-on exercises on interpreting summaries
and interpreting basic trace file statistics
5. Perform hands-on exercises relating to Creating and and
applying display filters,
6 .Perform hands-on exercises on Following streams and
reassembling data
7. Perform hands-on exercises on customizing wireshark
Exercises profiles, customizing profiles
8. Perform hands-on exercises relating to Analyzing DNS traffic,
ARP traffic ,IPV4 traffic, ICMP traffic
9. Perform hands-on exercises relating to Analyzing UDP traffic
10. Perform hands-on exercises relating to Analyzing TCP traffic
11. Perform hands-on exercises relating to Analyzing DHCP
traffic, HTTP traffic
12. Perform hands-on exercises relating to Analyzing Email
traffic
41
Year I Course Code: CD2SE02E2 Credits 3
Sem. II Hours 60
Course Title: Open Source Intelligence
Course Basic knowledge of computer networks
Prerequisites, if
any
Internal End Semester Marks: 50 Duration of ESA (Theory) : 03 hrs.
Assessment Duration of ESA (Practical) : 03 hrs.
Marks: 50
Course ● Understanding the basics of Open Source Intelligence, Online Threats and its
Outcomes Countermeasures
● Gaining knowledge on underground Internet and using search engine
techniques to gather required information
● Being able to perform social medial intelligence, using people search engines,
and searching public records
● Analyzing possible information from online maps
● Creating Technical footprinting
Unit No. Course Content Hours
Theory Component
Unit I Introduction to Open Source Intelligence, Online Threats and 6
Countermeasures
Open Source information categories, OSINT Types, OSINT
organizations, parties interested in OSINT, Information Gathering
types, Benefits of OSINT, challenges of OSINT, legal and ethical
constraints - Online Threats, security software, securing the operating
system, General privacy settings, Online tracking techniques, Secure
online browsing, Secure online communication, online anonymity,
encryption techniques
Unit III Social Media intelligence, people search engines and public records 6
Social media intelligence, social media content types, classification of
social media platforms, popular social networking sites, investigating
social media sites, general resources for locating information on social
media sites, other social media sites, Pastebin sites, social media
psychological analysis, people search engine, public records, examples,
searching for personal details – general, online registries, vital records,
criminal and court search, property records, tax and financial records,
SSN search, username check, email search, data compromised
repositories, phone number search, employee profiles and job
websites, other public records.
Unit IV Online Maps 6
The basics of geolocation tracking, finding GPS coordinates of any
location on a map, finding geo coordinates from a mailing address –
general geospatial research tools – commercial satellites, date/time
42
around the world, location based social media, YouTube, Facebook,
Twitter, other social media platforms, conducting location searches on
social media, country profile information, transport tracking, package
tracking, webcams, digital file metadata
Practical Component
1. Demonstrating securing of operating system 30
2. Demonstrating privacy settings and online tracking
3. Demonstrating secure online browsing, secure online
communication and online anonymity
4. Demonstrating the use encryption techniques
5. Demonstrating with suitable examples the use of searching the Tor
network, Key discovery and research,
6. Demonstrating the Use of search engine to locate information,
7. Demonstrating the Use of search engine to locate Web
directories, Translation services, website history and website capture
8. Demonstrating the website monitoring services, news search,
searching for digital files.
43
13. Demonstrating the use of web scraping tools to investigate the
target website’s File metadata, performing website certification
search
44
Year I Course Code: CD2VA04 Credits 2
Sem. II Course Title: Digital Technologies Hours 45
Course
Prerequisites, -NIL-
if any
Internal
Duration of ESA (Theory) : 03 hrs.
Assessment End Semester Marks: 75
Duration of ESA (Practical) : 03 hrs.
Marks: 25
• Understand the importance of digital technology, digital financial tools, e-
commerce.
Course • Analyse the concepts of communication and networks.
Outcomes • Understand the e-governance and Digital India initiatives.
• Understand the use & applications of digital technology.
• Explore the applications of machine learning and big data.
Unit No. Course Content Hours
Theory Component
Introduction & Evolution of Digital Systems. Role & Significance of
Digital Technology. Information & Communication Technology & Tools.
Unit I Computer System & its working, Software and its types. Operating 7
Systems: Types and Functions. Problem Solving: Algorithms and
Flowcharts.
Communication Systems: Principles, Model & Transmission Media.
Computer Networks & Internet: Concepts & Applications, WWW, Web
Unit II Browsers, Search Engines, Messaging, Email, Social Networking. 7
Computer Based Information System: Significance & Types. E-
commerce & Digital Marketing: Basic Concepts, Benefits & Challenges.
Digital India & e-Governance: Initiatives, Infrastructure, Services and
Empowerment. Digital Financial Tools: Unified Payment Interface,
Aadhar Enabled Payment System, USSD, Credit / Debit Cards, e-Wallets,
Unit III 7
Internet Banking, NEFT/RTGS and IMPS, Online Bill Payments and PoS.
Cyber Security: Threats, Significance, Challenges, Precautions, Safety
Measures, & Tools, legal and ethical perspectives.
Emerging Technologies & their applications: Overview of Cloud
Unit IV 7
Computing, Big Data, Internet of Things, Virtual Reality,
45
Emerging Technologies & their applications: Blockchain &
Unit V Cryptocurrency, Robotics, Machine Learning & Artificial Intelligence, 3- 7
D Printing. Digital Signatures.
Practical Component
1. Operating System Installation and configuration
2. Application Software Installation and configuration
Exercise 3. Hardware understanding and minor troubleshooting 10
46