Syllabus Sem-VIII PDF
Syllabus Sem-VIII PDF
Course Outcomes: On completion of the course, students will have the ability to:
1. Discuss the basics of information security
2. Illustrate the legal, ethical and professional issues in information security
3. Understand Information Security Policies.
4. Become aware of various security threats.
5. Design and implementation of security in OS and web applications.
6. Understand current trends in information security.
Web Application Security: OWASP, Common Issues in Web Apps, What is XSS,
SQL injection, CSRF, Password Vulnerabilities, SSL, CAPTCHA, Session Hijacking,
Local and Remote File Inclusion, Audit Trails, Web Server Issues, etc
Textbooks
1. Michael E Whitman and Herbert J Mattord, “Principles of Information Security”,
Vikas Publishing House, New Delhi, 2003
2. William Stallings and Lawrie Brown, “Computer Security: Principles and Practice”,
Prentice Hall, 2008.
Reference Books
1. Nina Godbole, Information Systems Security-Security Management, Metrics,
Frameworks and Best Practices, Wiley, 2009
2. Swiderski, Frank and Syndex, “Threat Modeling”, Microsoft Press, 2004.
List of Experiments
Prerequisite:
1. Computer networking, Embedded systems, Cloud Computing.
Course Outcomes: On completion of the course, students will have the ability:
1. To understand the fundamentals about IoT.
2. To understand the working of Embedded IoT devices.
3. To use IoT protocol to upload sensor data and to control devices.
4. To study the basics of Cloud Platforms for IOT and supporting services.
5. To apply Security concepts/techniques for IoT applications.
6. To design and implement IoT system for real time applications.
Unit I 08 Hours
Introduction to Internet of and Things (IoT):
Understanding IoT fundamentals, IOT Architecture and protocols, IoT World
Forum (IoTWF) standardized Architecture, Physical design of IoT, Logical Design
of IoT, Various Platforms for IoT, Overview of IoT components and IoT
Communication Technologies and Models, IoT Communication API‟s, IoT Issues
and Challenges- Planning, Costs and Quality ,Security and Privacy, Risks,
Interdependencies of IoT and cloud computing, Web of things.
Unit II 08 Hours
Embedded IoT devices:
Sensors and actuators for IoT applications, IoT components and implementation,
oT system building blocks ,Programming of NodeMCU and Raspberry PI,
Implementation of IoT with Edge devices, Reading sensor data and transmit to
cloud, Controlling devices through cloud using mobile application and web
application, Types and configurations of gatways, Specifications of IoT gateways.
Unit III 08 Hours
IoT PROTOCOLS:
IoT Access Technologies: Physical and MAC layers, topology and Security of
IEEE 802.15.4, 802.11ah, Network Layer/ Internet layer: IP versions, Constrained
Nodes and Constrained Networks, Transport layer protocols, Application Layer
Protocols: Hypertext transfer protocol (HTTP), Systematic HTTP access
methodology, Web Socket, Constrained application protocol CoAP), Message
Queue Telemetry Transport Protocol (MQTT), XMPP, DDS, AMQP CoAP and
MQTT.
Unit IV 08 Hours
Cloud Platforms for IOT:
Virtualization concepts and Cloud Architecture,Cloud computing, benefits,Cloud
services — SaaS, PaaS, IaaS, Cloud providers & offerings, Study of IOT Cloud
platforms, ThingSpeak API and MQTT, Interfacing ESP8266 with Web services.
Computing Using a Cloud Platform for IoT/M2M Applications/Services,
Everything as a service and Cloud Service Models.
Unit V 08 Hours
IoT Security:
Vulnerabilities Security Requirements and Threat Analysis, Misuse Cases, IoT
Security Components, Key Management, Update Management, Challenges in IoT
security, Tomography, and Layered Attacker Model, Identity Management and
Establishment, Access Control, and Secure Message Communication, Security
Models, IoT Security Protocols. Security in Service Management,
Unit VI 08 Hours
IoT Applications and case study
Broad categories of IoT applications: Consumer IoT, Commercial IoT, Industrial
IoT, Infrastructure IoT, Military Things (IoMT), IoT applications in home,
infrastructures, other IoT electronic equipments, Industry 4.0 concepts.
IoT Case studies: Home automation with IoT, River water pollution monitoring,
Smart city street light control and monitoring, Health care monitoring, Voice Apps
on IoT device.
Textbooks
1. Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A hands-on approach”,
Universities Press, ISBN: 0: 0996025510, 13: 978-0996025515.
2. Raj Kamal, Internet of Things: Architecture and Design Principle” , ISBN-13: 978-93-
5260-522-4, McGraw Hill Education (India) 2017.
3. Lyla B. Das, “Embedded Systems: An Integrated Approach” Pearson , ISBN:
9332511675, 9789332511675
4. Orchestrating and Automating Security for the Internet of Things: Delivering Advanced
Security Capabilities from Edge to Cloud for IoT, by Anthony Sabella, Rik
IronsMclean, Marcelo Yannuzzi, Publisher: Cisco Press, Release Date: June 2018,ISBN:
9780134756936
5. Securing the Internet of Things, Shancang Li Li Da Xu, Syngress, 2017, Elsevier,
ISBN: 978-0-12-804458-2
6. IoT Fundamentals: Networking Technologies, Protocols and Use Cases for Internet of
Things, David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and Jerome
Henry, Cisco Press, 2017.
Reference Books
1. Internet of Things: A Hands-on Approach, By Arshdeep Bahga and Vijay Madisetti Lee,
Heather Schneider, Robbie Schell, Mobile Applications: Architecture,
Design, and Development, Prentice Hall, April 2004, ISBN-13: 978-0131172630
2. Lyla B. Das, “Embedded Systems: An Integrated Approach” Pearson , ISBN:
9332511675, 9789332511675
3. Internet of Things: Architecture, Design Principles And Applications, Rajkamal,
McGraw Hill HigherEducation.
4. Fei Hu, “Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and
Implementations “, ISBN: 9781498723183, CRC Press, 2016. 6.
5. The Internet of Things – Key applications and Protocols, Olivier Hersent, David
Boswarthick, Omar Elloumi and Wiley, 2012.
6. Olivier Hersent, David Boswarthick, Omar Elloumi , “The Internet of Things – Key
applications and Protocols”, Wiley, 2012, ISBN:978-1-119-99435-0.
7. David Hanes, IoT Fundamentals: Networking Technologies, Protocols, and Use Cases
for the Internet of Things, Cisco Press, ISBN-13: 978-1-58714-456-1, ISBN-10: 1-
58714-456-5, 2017.
List of Assignments
1. With neat diagram, explain simplified IOT architecture.
2. Getting started with NodeMCU, Arduino with ESP8266 and ESP32 in the Arduino IDE.
3. Familiarization with the concept of IOT, Arduino / Raspberry Pi and perform necessary
software installation.
4. Explain with neat diagram, The oneM2M IoT Standardized Architecture.
5. Identify and analyse the security and privacy issues in IoT, particularly the issue of
securing its wireless system.
6. List out the different IOT applications and importance of IOT in present scenario.
Course Outcomes: On completion of the course, students will have the ability to:
1. Understand the data architecture and data engineering life cycle
2. Understand the source systems
3. Deduce various data storage systems for data engineering
4. Understand the ingestion phase of data engineering life cycle
5. Interpret the transformation and serving phase of data engineering life cycle
6. Recognise the future of data engineering
Textbooks
1. Joe Reis, Matt Housely, “Fundamentals of Data Engineeing: Plan and Build Robust
Data Systems”, O’Reilly publication, 1st Edition, 2022
Reference Books
1.
2.
List of Assignments
Course Outcomes: On completion of the course, students will have the ability to:
1. Understand Information security and it’s threats.
2. Understand cyber vulnerability and network security
3. Discuss authentication tools and information security models
4. Implement various security methods for web and mobiles.
5. Understand cyber crimes
6. Understand cyber security laws
Unit III User Authentication Tools and Information Security Models 08 Hours
User Authentication Methods, Information Security Models and Security
Mechanisms, Biometric Systems and Biometric Authentication Processes.
Textbooks
1. William Stallings, Computer Security: Principles and Practices, Pearson 6 Ed, ISBN
978-0-13-335469-0
2. Nina Godbole, Sunit Belapure , Cyber Security- Understanding Cyber Crimes,
Computer Forensics and Legal Perspectives, Wiely India Pvt.Ltd, ISBN- 978-81-265-
2179-1
Reference Books
1. Bruice Schneier , Applied Cryptography- Protocols, Algorithms and Source code in
C, Algorithms, Wiely India Pvt Ltd, 2nd Edition, ISBN 978-81-265-1368-0.
2. CK Shyamala et el., Cryptography and Security, Wiley India Pvt. Ltd, ISBN-978-81-
265-2285-9.
List of Experiments
1. Keylogging
2. Packet Sniffing
3. Breaking Caesar Cipher
4. SQL Injection
5. Hacking an Offline Device
6. Encrypting Images
7. Online Fund Transfers with DES Encryption
8. Detection and Intimation of Theft
9. Card Payment Security Using RSA
10. Detecting Data Leaks via Sql Injection Prevention on an E-Commerce
Textbooks:
1. Management Information Systems: Managing the Digital Firm" by Kenneth C Laudon.
2. "Management Information System: Conceptual Foundations - Structure and Development" by
Gordon Davis and Margrethe Olson
3. "Management Information Systems: Managerial Perspectives" by D P Goyal
Reference Books:
1. Jawadekar, W.S., “Management Information Systems”, Tata McGraw Hill Private
Limited, New Delhi, 2009
2. Mahadeo Jaiswal, Monika Mital: “Management Information System”, Oxford University
Press, New Delhi, 2008.
Prerequisite:
Basic knowledge of Social media sites/ apps
Basic knowledge of Digital Marketing tools
Course Outcomes: On completion of the course, students will have the ability to:
1. Understand the Concept of Social media
2. Understand the concept of Social media analytics
3. Analyse various types of social media platforms.
4. Understanding the concept of Digital marketing
5. Analyse and understanding use of social media analytics in digital marketing
6. Understanding the effectiveness of different social media tools/apps in social
media analytics
Unit I 06 Hours
Introduction to Social Media Analytics (SMA):
The social media landscape, Need for SMA; SMA in Small organizations; SMA
in large organizations; Application of SMA in different areas
Unit II 06 Hours
Network fundamentals and models:
The social networks perspective - nodes, ties and influencers, Social network
and web data and methods. Graphs and Matrices- Basic measures for
individuals and networks. Information visualization
Unit V 06 Hours
Processing and Visualizing Data, Influence Maximization, Link Prediction,
Collective Classification. Applications in Advertising and Game Analytics
(Use of tools like Unity30 / PyCharm). Introduction to Python Programming,
Collecting and analyzing social media data; visualization and exploration
Unit VI 06 Hours
Analyzing Social media campaign:
Analyzing the social media of any ongoing campaigns and present the
findings.
Textbooks
1. Mathew Ganis, Avinash Koihrkar :Social Media Analytics IBM Press
2. Jim Sterne Social Media Metrics Wiley
Reference Books
1. Oliver Blanchard Social Media ROI Que Publishing Latest 4
2. Marshall Sponder, Gorah F. Khan Digital Analytics for Marketing Routledge
2017 / 1st 5
3. Marshall Sponder Social Media Analytics McGraw Hill Latest 6
4. Tracy L. Tuten, Michael R. Solomon Social Media Marketing Sage 2
List of Assignments
Prerequisite:
1. Concepts of data mining, Concepts of Web Technology/Web Engineering
Course Outcomes: On completion of the course, students will have the ability:
1. Build a sample search engine using available open source tools.
2. Identify the different components of a web page that can be used for mining
3. Apply machine learning concepts to web content mining.
4. Implement Page Ranking algorithm and modify the algorithm for mining information.
5. Design a system to harvest information available on the web to build recommender
systems.
6. Analyse social media data using appropriate data/web mining techniques and modify an
existing search engine to make it personalized.
6. Semantic Web Programming, by John Hebeler, Matthew Fisher, Ryan Blace, Andrew
Perez-Lopez, and Mike Dean (Foreword). Publisher: Wiley; 1 edition (April 13, 2009).
Reference Books
1. Zdravko Markov, Daniel T. Larose, “Data Mining the Web: Uncovering Patterns in
Web Content, Structure, and Usage”, John Wiley & Sons, Inc., 2007.
2. SoumenChakrabarti, “Mining the Web: Discovering Knowledge from Hypertext Data”,
Morgan Kaufmann; edition 2002.
3. Adam Schenker, “Graph-Theoretic Techniques for Web Content Mining”, World
Scientific Pub Co Inc , 2005.
4. Min Song, Yi Fang and Brook Wu, “Handbook of research on Text and Web mining
technologies”, IGI global, information Science Reference – imprint of :IGI publishing,
2008.
Journals
1. Journal of Web Semantics,
Elsevier, http://www.elsevier.com/wps/find/journaldescription.cws_home/671322/descri
ption
2. International Journal On Semantic Web and Information Systems,IGI
Global, https://www.igi-global.com/journal/international-journal-semantic-web-
information/1092
3. Semantic Web – Interoperability, Usability, Applicability, http://www.semantic-web-
journal.net/
Resources
1. W3C Semantic Web Activity, http://www.w3.org/2001/sw/
2. semanticweb.org, http://semanticweb.org
3. SemWebCentral, http://www.semwebcentral.org/
4. W3Schools, http://www.w3schools.com/
5. John F. Sowa's Ontology pages: http://www.jfsowa.com/ontology/
6. The Semantic Web in Ten Passages, http://www.dfki.uni-kl.de/~boley/sw10pass/sw10pass-
en.htm
Course Objectives:
1) Design solution to deploy the application.
2) Apply the configuration management mechanisms.
Course Prerequisites:
Students should have knowledge of
Agile methodology, Basic Linux
Course Outcome:
Students will be able to:
1) Understand the Agile using DevOps
2) Apply Amazon AWS for containerization.
3) Analyze monitoring and logging using Kibana
4) Implement the CICD approach.
5) Perform the configuration management with Ansible.
6) Apply the kubernetics for Orchestration.
…
UNIT-I Dev Ops Essentials (08 Hours)
Introduction to advances in Dev Ops, Linux commands and bash scripting which are
frequently used by DevOps engineers.
UNIT-II Containerization (08 Hours)
Introduction to Containerization, concepts of docker and the di-erence between docker
and VM. commands in docker and deployment of a monolithic application using Docker
with AWS VM using AWS ECS service. setup and configure jobs on Jenkins
UNIT-III Monitoring and logging (08 Hours)
containerise applications at scale. Handling scalability issues with web applications
by configuring load balancers, deciding server's geographical location, Application
Monitoring using Kibana/ELK cluster. Site Reliability.
UNIT-IV CICD (08 Hours)
Automated Testing using Selenium and Jetkins, continuous integration, Tool,
Applications using Maven, SonarQube. Continuous deployment using
Amazon AWS.
UNIT-V System Provisioning and Configuration Management (08 Hours)
Introduction to Configuration Management via tools like Ansible and Terraform.
Text Books:
1) DevOps Tools from Practitioner's Viewpoint
Deepak Gaikwad, Willey.
2) Docker for Developers: Develop and run your application with Docker containers using
DevOps tools for continuous delivery
Richard Mcguire, Pact.
3) Hands-on DevOps with Linux, Mitesh Soni, bpb.
Reference Books:
1) AWS Certified DevOps Engineer - Professional Certification and Beyond: Pass the DOP-C01
exam and prepare for the real world using case studies and real-life examples, Adam Book.
2) Automated Deep Learning Using Neural Network Intelligence: Develop and Design PyTorch
and TensorFlow Models Using Python, Ivan Gridin.
3) Agile Model-Based Systems Engineering Cookbook: Improve system development by applying
proven recipes for effective agile systems engineering
, Dr. Bruce, Pacto