0% found this document useful (0 votes)
28 views

Syllabus Sem-VIII PDF

The document outlines the curriculum for courses in Information Security, Internet of Things (IoT), and Data Engineering, detailing teaching and examination schemes, course objectives, prerequisites, and outcomes. Each course consists of various units covering fundamental concepts, practical applications, and current trends in their respective fields. Additionally, it includes lists of textbooks, assignments, laboratory exercises, and project-based learning opportunities to enhance student understanding and skills.

Uploaded by

ek.sadaphuli7982
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

Syllabus Sem-VIII PDF

The document outlines the curriculum for courses in Information Security, Internet of Things (IoT), and Data Engineering, detailing teaching and examination schemes, course objectives, prerequisites, and outcomes. Each course consists of various units covering fundamental concepts, practical applications, and current trends in their respective fields. Additionally, it includes lists of textbooks, assignments, laboratory exercises, and project-based learning opportunities to enhance student understanding and skills.

Uploaded by

ek.sadaphuli7982
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Information Security

Teaching Scheme Examination Scheme Credit Scheme


Hours/Week Marks Credits
Lecture: 04 60 Marks
University Examination:
Hours/Week
Practical: 02 40 Marks Lecture 04
Internal Assessment:
Hours/Week
Term Work & Practical 50 Marks Practical 01

Total 150 Marks Total 05


Course Objective:
1. To understand the basics of Information Security
2. To know the legal, ethical, and professional issues in Information Security
3. To know the aspects of risk management
4. To become aware of various standards in this area
5. To know the technological aspects of Information Security
Prerequisite:
Fundamentals of Computer Networks

Course Outcomes: On completion of the course, students will have the ability to:
1. Discuss the basics of information security
2. Illustrate the legal, ethical and professional issues in information security
3. Understand Information Security Policies.
4. Become aware of various security threats.
5. Design and implementation of security in OS and web applications.
6. Understand current trends in information security.

Unit I INTRODUCTION 08 Hours


Introduction to Information Security: Attacks, Vulnerability, Security Goals,
Security Services and mechanisms. Critical Characteristics of Information,
Components of an Information System, Securing the Components, Balancing
Security and Access. Need of Information Security, Basic Principles of
Confidentiality, Integrity, Policies, Procedures, Guidelines, Standards
Administrative Measures and Technical Measures, People, Process,
Technology

Unit II SECURITY ELEMENTS 08 Hours


Authorization and Authentication - Types, Policies and techniques, Security
Certification, Security Monitoring and Auditing, Security Requirements
Specifications, Security Policies and Procedures, Firewalls, IDS, Log Files,
Access Control, Trusted Computing and multilevel security, Security models,
Trusted Systems, Software security issues, Physical and infrastructure security,
Human factors, Security awareness, training , Email and Internet use policies.

Unit III INFORMATION SECURITY POLICIES 08 Hours


Introduction to Information Security Policies, Importance and need of Policies,
Data security consideration, Backups, Archival storage and disposal of data,
Intellectual Property rights and Policies, Incident Response and Forensics,
Management Responsibilities.
Unit IV SECURITY THREATS 08 Hours
Threat Management: Threat Modelling, Sources of security threats, Threat
identification, Threat Analysis, Target Assets and vulnerabilities,
Consequences of threats, E-mail threats, Web threats, Threat awareness
Intruders and Hackers, Insider threats, Risk Assessment, Forensic Analysis,
Vulnerability sources and assessment tools.

Unit V SECURITY IN OS and WEB APPLICATIONS 08 Hours


Windows and Linux security: Types of Audits in Windows Environment, Server
Security, Active Directory (Group Policy), Anti-Virus, Mails, Malware, End point
protection, Shadow Passwords, SUDO users, etc.

Web Application Security: OWASP, Common Issues in Web Apps, What is XSS,
SQL injection, CSRF, Password Vulnerabilities, SSL, CAPTCHA, Session Hijacking,
Local and Remote File Inclusion, Audit Trails, Web Server Issues, etc

Unit VI CURRENT TRENDS 08 Hours


Current Trends in information Security, Cloud Computing: benefits and Issues
related to info Sec. Standards available for InfoSec: Cobit, Cadbury, ISO 27001,
OWASP, OSSTMM, etc - An Overview, Certifiable Standards

Textbooks
1. Michael E Whitman and Herbert J Mattord, “Principles of Information Security”,
Vikas Publishing House, New Delhi, 2003
2. William Stallings and Lawrie Brown, “Computer Security: Principles and Practice”,
Prentice Hall, 2008.
Reference Books
1. Nina Godbole, Information Systems Security-Security Management, Metrics,
Frameworks and Best Practices, Wiley, 2009
2. Swiderski, Frank and Syndex, “Threat Modeling”, Microsoft Press, 2004.

List of Experiments

1. Write a program to Analyze Cyber Threats and Attacks in Data Traffic


2. Write a program to examine Security Attack Impact on User Privacy
3. Write a program for Assessing Correlation of multi-layered Security Approaches and
Protocols
4. Write a program for Network visualization Strategies for Attack Detection
5. Write a program for analysis of Normal and Abnormal Network Pattern in Traffic
6. Write a program to implement SQL injection
7. A case study on security in web application
8. A case study on latest trends in information security

Project Based Learning

1. Graphical Password Authentication System using Intuitive Approach


2. Online Transaction Fraud Detection using Backlogging on E-Commerce Website
3. Secure File Sharing Using Access Control
4. Blockchain-based Transaction and Settlement System
5. Blockchain based Personal Identity Security System
6. Signature verification System using Python
7. Electronic Voting System using Blockchain
8. Three Level Image Password Authentication
9. Android Text Encryption Using Various Algorithms
10. E Authentication System Using QR Code & OTP
11. Detecting Phishing Websites Using Machine Learning
12. Card Payment Security Using RSA
13. Detecting Data Leaks via Sql Injection Prevention on an E-Commerce
14. School Security System (SSS) using RFID

Syllabus for Unit Tests:


Unit Test -1 Unit – I, Unit – II, Unit - III
Unit Test -2 Unit – IV, Unit – V, Unit - VI
INTERNET OF THINGS
Teaching Scheme Examination Scheme Credit Scheme
Hours/Week Marks Credits
Lecture 04 University Examination 60 Lecture 04
Practical 02 Internal Assessment 40
Term Work 25 Practical 01
Practical 25
Total 06 Total 150 Total 05
Course Objective:
The aim of this course is to help the students to attain the following industry identified
competency through various teaching learning experience-
1. To Provide a strong foundation of fundamentals of Internet of Things and need of IoT
Security.
2. To design and implement application of IoT using various sensors.
3. To detailed understanding of present scope of Internet of Things with case studies.

Prerequisite:
1. Computer networking, Embedded systems, Cloud Computing.

Course Outcomes: On completion of the course, students will have the ability:
1. To understand the fundamentals about IoT.
2. To understand the working of Embedded IoT devices.
3. To use IoT protocol to upload sensor data and to control devices.
4. To study the basics of Cloud Platforms for IOT and supporting services.
5. To apply Security concepts/techniques for IoT applications.
6. To design and implement IoT system for real time applications.

Unit I 08 Hours
Introduction to Internet of and Things (IoT):
Understanding IoT fundamentals, IOT Architecture and protocols, IoT World
Forum (IoTWF) standardized Architecture, Physical design of IoT, Logical Design
of IoT, Various Platforms for IoT, Overview of IoT components and IoT
Communication Technologies and Models, IoT Communication API‟s, IoT Issues
and Challenges- Planning, Costs and Quality ,Security and Privacy, Risks,
Interdependencies of IoT and cloud computing, Web of things.

Unit II 08 Hours
Embedded IoT devices:
Sensors and actuators for IoT applications, IoT components and implementation,
oT system building blocks ,Programming of NodeMCU and Raspberry PI,
Implementation of IoT with Edge devices, Reading sensor data and transmit to
cloud, Controlling devices through cloud using mobile application and web
application, Types and configurations of gatways, Specifications of IoT gateways.
Unit III 08 Hours
IoT PROTOCOLS:
IoT Access Technologies: Physical and MAC layers, topology and Security of
IEEE 802.15.4, 802.11ah, Network Layer/ Internet layer: IP versions, Constrained
Nodes and Constrained Networks, Transport layer protocols, Application Layer
Protocols: Hypertext transfer protocol (HTTP), Systematic HTTP access
methodology, Web Socket, Constrained application protocol CoAP), Message
Queue Telemetry Transport Protocol (MQTT), XMPP, DDS, AMQP CoAP and
MQTT.

Unit IV 08 Hours
Cloud Platforms for IOT:
Virtualization concepts and Cloud Architecture,Cloud computing, benefits,Cloud
services — SaaS, PaaS, IaaS, Cloud providers & offerings, Study of IOT Cloud
platforms, ThingSpeak API and MQTT, Interfacing ESP8266 with Web services.
Computing Using a Cloud Platform for IoT/M2M Applications/Services,
Everything as a service and Cloud Service Models.

Unit V 08 Hours
IoT Security:
Vulnerabilities Security Requirements and Threat Analysis, Misuse Cases, IoT
Security Components, Key Management, Update Management, Challenges in IoT
security, Tomography, and Layered Attacker Model, Identity Management and
Establishment, Access Control, and Secure Message Communication, Security
Models, IoT Security Protocols. Security in Service Management,

Unit VI 08 Hours
IoT Applications and case study
Broad categories of IoT applications: Consumer IoT, Commercial IoT, Industrial
IoT, Infrastructure IoT, Military Things (IoMT), IoT applications in home,
infrastructures, other IoT electronic equipments, Industry 4.0 concepts.
IoT Case studies: Home automation with IoT, River water pollution monitoring,
Smart city street light control and monitoring, Health care monitoring, Voice Apps
on IoT device.

Textbooks
1. Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A hands-on approach”,
Universities Press, ISBN: 0: 0996025510, 13: 978-0996025515.
2. Raj Kamal, Internet of Things: Architecture and Design Principle” , ISBN-13: 978-93-
5260-522-4, McGraw Hill Education (India) 2017.
3. Lyla B. Das, “Embedded Systems: An Integrated Approach” Pearson , ISBN:
9332511675, 9789332511675
4. Orchestrating and Automating Security for the Internet of Things: Delivering Advanced
Security Capabilities from Edge to Cloud for IoT, by Anthony Sabella, Rik
IronsMclean, Marcelo Yannuzzi, Publisher: Cisco Press, Release Date: June 2018,ISBN:
9780134756936
5. Securing the Internet of Things, Shancang Li Li Da Xu, Syngress, 2017, Elsevier,
ISBN: 978-0-12-804458-2
6. IoT Fundamentals: Networking Technologies, Protocols and Use Cases for Internet of
Things, David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and Jerome
Henry, Cisco Press, 2017.

Reference Books
1. Internet of Things: A Hands-on Approach, By Arshdeep Bahga and Vijay Madisetti Lee,
Heather Schneider, Robbie Schell, Mobile Applications: Architecture,
Design, and Development, Prentice Hall, April 2004, ISBN-13: 978-0131172630
2. Lyla B. Das, “Embedded Systems: An Integrated Approach” Pearson , ISBN:
9332511675, 9789332511675
3. Internet of Things: Architecture, Design Principles And Applications, Rajkamal,
McGraw Hill HigherEducation.
4. Fei Hu, “Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and
Implementations “, ISBN: 9781498723183, CRC Press, 2016. 6.
5. The Internet of Things – Key applications and Protocols, Olivier Hersent, David
Boswarthick, Omar Elloumi and Wiley, 2012.
6. Olivier Hersent, David Boswarthick, Omar Elloumi , “The Internet of Things – Key
applications and Protocols”, Wiley, 2012, ISBN:978-1-119-99435-0.
7. David Hanes, IoT Fundamentals: Networking Technologies, Protocols, and Use Cases
for the Internet of Things, Cisco Press, ISBN-13: 978-1-58714-456-1, ISBN-10: 1-
58714-456-5, 2017.

List of Assignments
1. With neat diagram, explain simplified IOT architecture.
2. Getting started with NodeMCU, Arduino with ESP8266 and ESP32 in the Arduino IDE.
3. Familiarization with the concept of IOT, Arduino / Raspberry Pi and perform necessary
software installation.
4. Explain with neat diagram, The oneM2M IoT Standardized Architecture.
5. Identify and analyse the security and privacy issues in IoT, particularly the issue of
securing its wireless system.
6. List out the different IOT applications and importance of IOT in present scenario.

List of Laboratory Exercises


1. Excercise on Eclipse IoT Project.
2. Exercise on smart object API Gateway service reference implementation in IoT
3. Toolkit.
4. Study and Install IDE of Arduino and different types of Arduino.
5. Experiment on HTTP-to-CoAP semantic mapping Proxy in IoT Toolkit.
6. Experiment on application framework and embedded software agents for IoT
Toolkit.
7. Study and Configure Raspberry Pi.
8. Installing Windows 10 IoT Core on Raspberry Pi.
9. Experiment on connectivity of Rasberry Pi with existing system components.
10. IoT based Web Controlled Home Automation using Raspberry Pi
11. Implementation of Interfacing Raspberry Pi with RFID.

Project Based Learning


1. Internet of things enabled real time water quality monitoring system.
2. Controlling Raspberry Pi with WhatsApp.
3. Smart city IoT applications
4. Turn your smartphone into an IoT device using the IBM Watson IoT platform cloud-
hosted service.
5. Implement a communication technology for IoT enable devices in a home network.
6. Fingerprint Sensor interfacing with Raspberry Pi.
7. Building Google Assistant with Raspberry Pi.
8. Design a system to control the traffic signals through IOT

Syllabus for Unit Tests:


Unit Test -1 Unit – I, Unit – II, Unit – III
Unit Test -2 Unit – IV, Unit – V, Unit – VI
DATA ENGINEERING
Teaching Scheme Examination Scheme Credit Scheme
Hours/Week Marks Credits
Lecture: 03 Hours/Week University Examination: 60 Marks
Practical: -- Internal Assessment: 40 Marks Lecture 03
Term Work & Practical 100 Marks Practical --

Total 100 Marks Total 03


Course Objective: Get a concise overview of the entire data engineering landscape

Prerequisite: Concepts of Querying, Data Warehousing, Data mining

Course Outcomes: On completion of the course, students will have the ability to:
1. Understand the data architecture and data engineering life cycle
2. Understand the source systems
3. Deduce various data storage systems for data engineering
4. Understand the ingestion phase of data engineering life cycle
5. Interpret the transformation and serving phase of data engineering life cycle
6. Recognise the future of data engineering

Unit I Data engineering described 06 Hours


What is data engineering? Data engineering skills and activities, data engineers
inside an Organisation, What is the data engineering life cycle? The data life
cycle versus the data engineering life cycle, Designing good Data Architecture

Unit II Source systems 06 Hours


Data generation in source systems: How is data created? Source systems in
detail, source systems practical details, Undercurrents and their impact on
source systems

Unit III Storage 06 Hours


Raw ingredients of data storage, Data storage systems, Data engineering
storage abstractions, Big trends in storage

Unit IV Ingestion 06 Hours


What is data injestion? Why to injest data? Key engineering considerations for
the injestion phase, batch injestion consideration, message and stream injestion
consideration

Unit V Transformation and serving 06 Hours


Queries, modelling and transformations
Serving data for Analytics machine learning and reverse ETL: General
considerations for serving data, analytics, machine learning, ways to serve data
for analytics and machine learning, reverse ETL

Unit VI Security privacy and the future of data engineering 06 Hours


Security and privacy: People, Processes, Technology
The future of data engineering: Decline of complexity and rise of easy to use
data tools, The cloud scale data OS and improved interoperability, Enterprisey
data engineering, Moving beyond the modern data stack towards the live data
stack

Textbooks
1. Joe Reis, Matt Housely, “Fundamentals of Data Engineeing: Plan and Build Robust
Data Systems”, O’Reilly publication, 1st Edition, 2022

Reference Books
1.
2.

List of Assignments

1. Compare the types of Data Architectures


2. Case study of data engineering using AWS
3. Case study of SAPRK as an ETL tool
4. Study of any one data ingestion tool and its architecture
5. Analysis of security in data engineering: Threats, Challenges, Considerations and
best practices
6. Comparison of storage mechanism for various types of data engineering scenarios

Project Based Learning


Implement any of the following or similar project using any data engineering tools such as
but not limited to: SPARK, AZURE, AWS, Python etc
1. Predicting flight delays
2. Data pipeline
3. Creating a data lake
4. Creating an enterprise data hub
5. Streaming analytics on fraud detection
6. In-game events auto-adjustment of complexity levels, target advertising, etc
7. Dataset analysis for any application such as airline, twitter, etc

Syllabus for Unit Tests:


Unit Test -1 Unit – I, Unit – II, Unit - III
Unit Test -2 Unit – IV, Unit – V, Unit - VI
Elective-II Cyber Security
Teaching Scheme Examination Scheme Credit Scheme
Hours/Week Marks Credits
Lecture: 04 60 Marks
University Examination:
Hours/Week
Practical: 02 40 Marks Lecture 04
Internal Assessment:
Hours/Week
Term Work & Oral 50 Marks Practical 01

Total 150 Marks Total 05


Course Objective:
To understand threats and vulnerabilities to security.
To understand Information security models
To understand laws for cyber security
This programme aims to help the learners to navigate the foundations and skills necessary to build a
career in the field of cyber security.
Prerequisite:
Basics of security
Knowledge of networking

Course Outcomes: On completion of the course, students will have the ability to:
1. Understand Information security and it’s threats.
2. Understand cyber vulnerability and network security
3. Discuss authentication tools and information security models
4. Implement various security methods for web and mobiles.
5. Understand cyber crimes
6. Understand cyber security laws

Unit I Introduction to Information Security and Potential Threats 08 Hours


Introduction to Cyber Space, Cyber Security and Information Systems, Cyber
Attacks and their Classification, Types of Malware and Threats.

Unit II Cyber Vulnerability and Network Security 08 Hours


Assessment of Vulnerability, Intrusion Detection and Prevention Systems,
Internet Protocols, Operating System Security and Network Security.

Unit III User Authentication Tools and Information Security Models 08 Hours
User Authentication Methods, Information Security Models and Security
Mechanisms, Biometric Systems and Biometric Authentication Processes.

Unit IV Web and Mobile App security Methods 08 Hours


Web Security and Email Security, Security of Mobile Devices and Cloud Space,
Social Media Security and IoT Security

Unit V Cyber Crimes and Digital Forensic Science 08 Hours


Cyber Crimes, Scams and Frauds, Digital Forensic Investigation Methods, Cyber
Trails, Branches of Digital Forensics, Reporting, Management of Evidence

Unit VI Laws for Cyber Security 08 Hours


Jurisdiction of Cyber Crime, Information Technology Act 2000 and its
Amendments, Validity of Digital Communication Evidences (Call Records
/Emails/SMS), RBI Act and IPR Act

Textbooks
1. William Stallings, Computer Security: Principles and Practices, Pearson 6 Ed, ISBN
978-0-13-335469-0
2. Nina Godbole, Sunit Belapure , Cyber Security- Understanding Cyber Crimes,
Computer Forensics and Legal Perspectives, Wiely India Pvt.Ltd, ISBN- 978-81-265-
2179-1
Reference Books
1. Bruice Schneier , Applied Cryptography- Protocols, Algorithms and Source code in
C, Algorithms, Wiely India Pvt Ltd, 2nd Edition, ISBN 978-81-265-1368-0.
2. CK Shyamala et el., Cryptography and Security, Wiley India Pvt. Ltd, ISBN-978-81-
265-2285-9.

List of Experiments

1. Write a program to perform web security audit.


2. Write a program for Biometric authentication process.
3. Write a program to examine SQL injection attack.
4. Write a program to perform online and offline attacks of password cracking.
5. Evaluate network defense tools for DOS attack.
6. Evaluate network defense tools for IP spoofing.
7. A Case study on Cyber Crime.
8. A Case study on scams and Frauds.

Project Based Learning

1. Keylogging
2. Packet Sniffing
3. Breaking Caesar Cipher
4. SQL Injection
5. Hacking an Offline Device
6. Encrypting Images
7. Online Fund Transfers with DES Encryption
8. Detection and Intimation of Theft
9. Card Payment Security Using RSA
10. Detecting Data Leaks via Sql Injection Prevention on an E-Commerce

Syllabus for Unit Tests:


Unit Test -1 Unit – I, Unit – II, Unit - III
Unit Test -2 Unit – IV, Unit – V, Unit - VI
Elective-II: Management Information System

Teaching Scheme Examination Scheme Credit Scheme


Hours/Week Marks Credits
Lecture 04 University Examination 60 Lecture 04
Internal Assessment 40
Practica 02 Term Work 25 Practical 01
l
Oral 25
Total 06 Total 150 Total 05
Course Objective:
This course aims at giving students a knowledge of Information Management along with its
applications in terms of the following:
 To understand the basics of Management Information System.
 Learn to evaluate information Management systems
 To describe the role of information technology and decision support systems in
business and record the current issues with those of the firm to solve business
problems.
 To provide the theoretical models used in database management systems to answer
business questions.
Prerequisite:
 Students must have the minimal concept of Data Base Management Systems
 They must also have the concept of different types of algorithms used for searching
data
 To knowledge of DBMS
Course Outcomes: On completion of the course, students will have the ability to:
1. Describe the objectives of Management information systems.
2. Relate the basic concepts and technologies used in the field of management
information systems
3. Outline the role of the ethical, social, and security issues of information systems
4. Understand query, document, and phrase translation.
5. Apply the understanding of how various information systems like DBMS work
together to accomplish the information objectives of an organization
6. Design and implement a recommender system.

Unit I Management information system in a digital firm: 08 Hours


Goals and history of MIS, Objectives of Management Information System, MIS
concept - Definition –Role of the MIS.System View of Business, Process of
MIS.Development of MIS within in organization.

Unit - System analysis and design:


Implementation and controlling of management Information System
Approach and Introduction to Information System. Management as a control
system. Impact of the MIS-MIS and the user. Need for system analysis. System
analysis of a new requirements. System analysis of the existing system
Unit III Technology of information system: 08 Hours
Data process- Transaction and application process Information system process;
Unified communication and network. Computer Operation Of Manual
Information System.Conversion of manual to Computer Based System.
Resources and Components of Management information System.

Unit IV Data base management system: 08 Hours


Objectives of data base approach. Characters of database Management systems
Integration and Automation of Business Function and Developing. Components
of DBMS packages. Data models.

Unit V - Management Information system applications


MIS applications, DSS – GDSS - DSS applications in E enterprise. Types of
Applications. Features of Management System. e, E-communication, Business
Process Engineering.Inout Output Design.

Unit VI Architecture AND Design of IS: 08 Hours


Architecture Development and maintenance of Information System, Factor of
Success and failure, Value and Risk of MIS.

Textbooks:
1. Management Information Systems: Managing the Digital Firm" by Kenneth C Laudon.
2. "Management Information System: Conceptual Foundations - Structure and Development" by
Gordon Davis and Margrethe Olson
3. "Management Information Systems: Managerial Perspectives" by D P Goyal

Reference Books:
1. Jawadekar, W.S., “Management Information Systems”, Tata McGraw Hill Private
Limited, New Delhi, 2009
2. Mahadeo Jaiswal, Monika Mital: “Management Information System”, Oxford University
Press, New Delhi, 2008.

1.Introduction to Management information System


2.Explain Types of Information.
3. Discuss Why do we need Computer Based System
4. Steps to Avail Management Information Systems (MIS) Assignment Help By Academic
Expert.
5. Computer Operation Of Manual Information System.
6. Architecture Development and maintenance of Information System,

Project Based Learning

1. Implementation Management as a control system


2. Implementation Transaction and application process Information system
3. Implementation Resources and Components of Management infortemmation
System.
Syllabus for Unit Tests:
Unit Test -1 Unit – I, Unit – II, Unit – III
Unit Test -2 Unit – IV, Unit – V, Unit – VI
Elective-II: Social Analytics in Digital Marketing
Teaching Scheme Examination Scheme Credit Scheme
Hours/Week Marks Credits
Lecture: 04 Hours/Week University Examination: 60 Marks
Practical: 02 Hours/Week Internal Assessment: 40 Marks Lecture 04
Term Work 25 Marks Practical 01
Oral 25 Marks
Total 150 Marks Total 05
Course Objective:
This course aims at giving students a knowledge of
 Social Media Analytics
 Digital Marketing

Prerequisite:
 Basic knowledge of Social media sites/ apps
 Basic knowledge of Digital Marketing tools

Course Outcomes: On completion of the course, students will have the ability to:
1. Understand the Concept of Social media
2. Understand the concept of Social media analytics
3. Analyse various types of social media platforms.
4. Understanding the concept of Digital marketing
5. Analyse and understanding use of social media analytics in digital marketing
6. Understanding the effectiveness of different social media tools/apps in social
media analytics

Unit I 06 Hours
Introduction to Social Media Analytics (SMA):
The social media landscape, Need for SMA; SMA in Small organizations; SMA
in large organizations; Application of SMA in different areas

Unit II 06 Hours
Network fundamentals and models:
The social networks perspective - nodes, ties and influencers, Social network
and web data and methods. Graphs and Matrices- Basic measures for
individuals and networks. Information visualization

Unit III 06 Hours


Making connections:
Link analysis. Random graphs and network evolution. Social contexts:
Affiliation and identity.
Web analytics tools and techniques:
Clickstream analysis, A/B testing, online surveys, Use of Google Analytics;
Web crawling and Indexing; Natural Language Processing Techniques for
Micro-text Analysis
Unit IV 06 Hours
Facebook Analytics:
Introduction, parameters, demographics. Analyzing page audience. Reach and
Engagement analysis. Postperformance on FB, Use of Facebook Business
Manager; Social campaigns. Measuring and Analyzing social campaigns,
defining goals and evaluating outcomes, Network Analysis. (LinkedIn,
Instagram, YouTube Twitter etc

Unit V 06 Hours
Processing and Visualizing Data, Influence Maximization, Link Prediction,
Collective Classification. Applications in Advertising and Game Analytics
(Use of tools like Unity30 / PyCharm). Introduction to Python Programming,
Collecting and analyzing social media data; visualization and exploration

Unit VI 06 Hours
Analyzing Social media campaign:
Analyzing the social media of any ongoing campaigns and present the
findings.

Textbooks
1. Mathew Ganis, Avinash Koihrkar :Social Media Analytics IBM Press
2. Jim Sterne Social Media Metrics Wiley

Reference Books
1. Oliver Blanchard Social Media ROI Que Publishing Latest 4
2. Marshall Sponder, Gorah F. Khan Digital Analytics for Marketing Routledge
2017 / 1st 5
3. Marshall Sponder Social Media Analytics McGraw Hill Latest 6
4. Tracy L. Tuten, Michael R. Solomon Social Media Marketing Sage 2

List of Assignments

Project Based Learning


1. Analyzing the social media of any ongoing campaigns and present the findings.

Syllabus for Unit Tests:


Unit Test -1 Unit – I, Unit – II, Unit - III
Unit Test -2 Unit – IV, Unit – V, Unit - VI
ELECTIVE-II: SEMANTIC WEB MINING
Teaching Scheme Examination Scheme Credit Scheme
Hours/Week Marks Credits
Lecture 04 University Examination 60 Lecture 04
Practical 02 Internal Assessment 40
Term Work 25 Practical 01
Oral 25
Total 06 Total 150 Total 05
Course Objective:
1. Understand a detailed overview of the data mining process and techniques, specifically
those that are relevant to Web mining.
2. Understand the basics of Information retrieval and Web search with special emphasis on
web crawling.
3. Apply the use of machine learning approaches for Web Content Mining.
4. Understand the role of hyper links in web structure mining.
5. Learn the various aspects of web usage mining.

Prerequisite:
1. Concepts of data mining, Concepts of Web Technology/Web Engineering

Course Outcomes: On completion of the course, students will have the ability:
1. Build a sample search engine using available open source tools.
2. Identify the different components of a web page that can be used for mining
3. Apply machine learning concepts to web content mining.
4. Implement Page Ranking algorithm and modify the algorithm for mining information.
5. Design a system to harvest information available on the web to build recommender
systems.
6. Analyse social media data using appropriate data/web mining techniques and modify an
existing search engine to make it personalized.

Unit I : Introduction 08 Hours


Introduction – Web Mining – Theoretical background –Algorithms and techniques
– Association rule mining – Sequential Pattern Mining -Information retrieval and
Web search – Information retrieval Models-Relevance Feedback- Text and Web
page Pre-processing – Inverted Index – Latent Semantic Indexing – Web Search –
Meta-Search – Web Spamming. The Syntactic and the Semantic Web, Logics of
the Semantic Web. The world of the semantic web-WWW-Meta data-Search
engine-Search engine for traditional web-Semantic web-Search engine for semantic
web-Traditional web to semantic web.

Unit II : Semantic Web Technology 08 Hours


RDF,- Elements of RDF, Basic Syntax and Fundamental rules of RDF-
Aggregation-Distributed information-RDFS-core elements of RDFS-Ontology-
Taxonomy-Inferencing based on RDF schema.
OWL: OWL syntax, OWL and RDF semantics, OWL document, Using OWL to
define classes-Set operators-Enumerations-Define propertiesontologymatching-
Three faces of OWL-Validate OWL.
Swoogle : FOAF-Semantic markup-Issues-prototype system-Design of
Semanticweb search engine-Discovery and indexation-prototype system-case
study.
Unit III : Web Content Mining & Semantic Web Services 08 Hours
Web Content Mining – Supervised Learning – Decision tree - Naïve Bayesian Text
Classification -Support Vector Machines - Ensemble of Classifiers. Unsupervised
Learning - K-means Clustering -
Hierarchical Clustering –Partially Supervised Learning – Markov Models -
Probability-BasedClustering - Evaluating Classification and Clustering – Vector
Space Model – Latent semanticIndexing – Automatic Topic Extraction - Opinion
Mining and Sentiment Analysis – Document Sentiment Classification. Introduction
to web services- SOA, Limitations of web services. Semantic web services-OWL-
S-Upper ontology-WSDL-S,OWL-S to UDDImapping ,Design of the search
engine,implementations.

Unit IV : Web Link Mining 08 Hours


Link mining, common link mining tasks, link-based object ranking
Web Link Mining – Hyperlink based Ranking – Introduction -Social Networks
Analysis- Co-Citation and Bibliographic Coupling - Page Rank -Authorities and
Hubs -Link-Based Similarity Search - Enhanced Techniques for Page Ranking -
Community Discovery – Web Crawling -A Basic Crawler Algorithm-
Implementation Issues- Universal Crawlers- Focused Crawlers- Topical Crawlers-
Evaluation - Crawler Ethics and Conflicts - New Developments

Unit V : Structured Data Extraction 08 Hours


Structured Data Extraction: Wrapper Generation – Preliminaries- Wrapper
Induction- Instance-Based Wrapper Learning ·- Automatic Wrapper Generation:
Problems - String Matching and Tree Matching - Multiple Alignment - Building
DOM Trees - Extraction Based on a Single List Page and Multiple pages-
Introduction to Schema Matching - Schema-Level Match -Domain and Instance-
Level Matching – Extracting and Analyzing Web Social Networks.

Unit VI : Web Usage Mining & Semantic Web Applications 08 Hours


Web Usage Mining - Click stream Analysis -Web Server Log Files - Data
Collection and Pre-Processing - Cleaning and Filtering- Data Modeling for Web
Usage Mining - The BIRCH Clustering Algorithm -Affinity Analysis and the A
Priori Algorithm – Binning. Discovery and Analysis of Web Usage Patterns –
Modeling user interests –Probabilistic Latent Semantic Analysis – Latent Dirichlet
Allocation Model– Applications- Collaborative Filtering- Recommender Systems –
Web Recommender systems based on User and Item – PLSA and LDA Models .
Semantic Web applications and services, Semantic Search, e-learning, Semantic
Bioinformatics,Knowledge Base ,XML Based Web Services, Creating an OWL-S
Ontology for Web Services,Semantic Search Technology, Web Search Agents and
Semantic Methods.
Textbooks
1. Bing Liu, “Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-
Centric Systems and Applications)”, Springer; 2nd Edition 2009.
2. GuandongXu,Yanchun Zhang, Lin Li, “Web Mining and Social Networking:
Techniques and Applications”, Springer; 1st Edition.2010.
3. “Thinking on the Web” - Berners Lee, Godel and Turing, Wiley inter science, 2008.
4. “Social Networks and the Semantic Web”, Peter Mika, Springer, 2007.
5. Foundations of Semantic Web Technologies, by Pascal Hitzler, Markus Krötzsch,
Sebastian Rudolph, Publisher: Chapman and Hall; 1st edition (August 6, 2009).

6. Semantic Web Programming, by John Hebeler, Matthew Fisher, Ryan Blace, Andrew
Perez-Lopez, and Mike Dean (Foreword). Publisher: Wiley; 1 edition (April 13, 2009).

Reference Books

1. Zdravko Markov, Daniel T. Larose, “Data Mining the Web: Uncovering Patterns in
Web Content, Structure, and Usage”, John Wiley & Sons, Inc., 2007.
2. SoumenChakrabarti, “Mining the Web: Discovering Knowledge from Hypertext Data”,
Morgan Kaufmann; edition 2002.
3. Adam Schenker, “Graph-Theoretic Techniques for Web Content Mining”, World
Scientific Pub Co Inc , 2005.
4. Min Song, Yi Fang and Brook Wu, “Handbook of research on Text and Web mining
technologies”, IGI global, information Science Reference – imprint of :IGI publishing,
2008.

Journals
1. Journal of Web Semantics,
Elsevier, http://www.elsevier.com/wps/find/journaldescription.cws_home/671322/descri
ption
2. International Journal On Semantic Web and Information Systems,IGI
Global, https://www.igi-global.com/journal/international-journal-semantic-web-
information/1092
3. Semantic Web – Interoperability, Usability, Applicability, http://www.semantic-web-
journal.net/

Resources
1. W3C Semantic Web Activity, http://www.w3.org/2001/sw/
2. semanticweb.org, http://semanticweb.org
3. SemWebCentral, http://www.semwebcentral.org/
4. W3Schools, http://www.w3schools.com/
5. John F. Sowa's Ontology pages: http://www.jfsowa.com/ontology/
6. The Semantic Web in Ten Passages, http://www.dfki.uni-kl.de/~boley/sw10pass/sw10pass-
en.htm

List of Laboratory Exercises


1. Discuss the Meta-Search and Web Spamming concepts in detail.
2. Determine the location of a resource with the help of ontologies and reasoning using
router
3. Steps in designing a search engine. Take a case study of designing your own search
engine.
4. Design a crawler program to list out the URL’s on the page, modify the program for
again crawl those founded URL’s to find more URL’s using High speed computer
( Hint : call the crawl_site function to crawl a URL. ).
5. Write a Script/ program to perform Analysis of User's Browsing Behavior and Their
Categorization Using Markov Chain Model.
6. Applications of Semantic Web, Web Search Agents

Syllabus for Unit Tests:


Unit Test -1 Unit – I, Unit – II, Unit – III
Unit Test -2 Unit – IV, Unit – V, Unit – VI
B.Tech (IT) Semester - VII Subject : ITL-VI

Teaching Scheme Examination Scheme Credit Allotted


Theory : 04 Hrs/Week End Semester : 00 Marks Theory :00
Examination

Practical : 02 Hrs/Week Internal Assessment : 50 Marks Practical : 01


Term Work:25 Marks Total Credits : 01
Pract/Oral : 25 Marks
Total :100 Marks

Course Objectives:
1) Design solution to deploy the application.
2) Apply the configuration management mechanisms.
Course Prerequisites:
Students should have knowledge of
Agile methodology, Basic Linux

Course Outcome:
Students will be able to:
1) Understand the Agile using DevOps
2) Apply Amazon AWS for containerization.
3) Analyze monitoring and logging using Kibana
4) Implement the CICD approach.
5) Perform the configuration management with Ansible.
6) Apply the kubernetics for Orchestration.

UNIT-I Dev Ops Essentials (08 Hours)

Introduction to advances in Dev Ops, Linux commands and bash scripting which are
frequently used by DevOps engineers.
UNIT-II Containerization (08 Hours)
Introduction to Containerization, concepts of docker and the di-erence between docker
and VM. commands in docker and deployment of a monolithic application using Docker
with AWS VM using AWS ECS service. setup and configure jobs on Jenkins
UNIT-III Monitoring and logging (08 Hours)
containerise applications at scale. Handling scalability issues with web applications
by configuring load balancers, deciding server's geographical location, Application
Monitoring using Kibana/ELK cluster. Site Reliability.
UNIT-IV CICD (08 Hours)
Automated Testing using Selenium and Jetkins, continuous integration, Tool,
Applications using Maven, SonarQube. Continuous deployment using
Amazon AWS.
UNIT-V System Provisioning and Configuration Management (08 Hours)
Introduction to Configuration Management via tools like Ansible and Terraform.

UNIT-VI Orchestration using Kubernetes


Orchestrate multiple docker containers using an orchestration tool like Kubernetes. (08 Hours)
Installation, component, architecutre, creating deployment, volumes, secret and
creation of CICD pipeline involving kubernetes.
Assignment List:
1) Implement all Linux command by deploying on VM
2) Use Amazon AWS for containerization.
3) Create Azure Pipeline
4) Deploy the application using Nexus.
5) Deploy Application using SonarQube.
6) Use Amazon AWS for
7) Implement Kibana for monitoring and logging.
8) Implement the configuration management using Ansible.
9) Deploy Docker Container app using Kubernetics.
10) Design aand deploy project using Microsoft Azure.

Text Books:
1) DevOps Tools from Practitioner's Viewpoint
Deepak Gaikwad, Willey.
2) Docker for Developers: Develop and run your application with Docker containers using
DevOps tools for continuous delivery
Richard Mcguire, Pact.
3) Hands-on DevOps with Linux, Mitesh Soni, bpb.

Reference Books:
1) AWS Certified DevOps Engineer - Professional Certification and Beyond: Pass the DOP-C01
exam and prepare for the real world using case studies and real-life examples, Adam Book.
2) Automated Deep Learning Using Neural Network Intelligence: Develop and Design PyTorch
and TensorFlow Models Using Python, Ivan Gridin.
3) Agile Model-Based Systems Engineering Cookbook: Improve system development by applying
proven recipes for effective agile systems engineering
, Dr. Bruce, Pacto

You might also like