Semester III |
PC-CS-CYS-203A |
Data Structures |
CO 1 |
Understand various data structures like array, linked list. |
CO 2 |
Implement operations like searching, insertion, and deletion, traversing mechanism on various data structures. |
CO 3 |
Implement Linear and Non-Linear data structures |
CO 4 |
Implement appropriate sorting/searching technique. |
CO 5 |
Understand advance data structure using Non Linear data structure. |
CO 6 |
Determine and analyze the complexity of given algorithms. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
3 |
3 |
3 |
1 |
2 |
– |
– |
1 |
2 |
1 |
1 |
1 |
2 |
2 |
CO 2 |
3 |
3 |
3 |
2 |
2 |
– |
– |
1 |
2 |
1 |
1 |
1 |
3 |
2 |
CO 3 |
3 |
3 |
3 |
3 |
2 |
– |
– |
1 |
2 |
1 |
1 |
2 |
3 |
3 |
CO 4 |
3 |
3 |
3 |
2 |
2 |
– |
– |
1 |
2 |
1 |
1 |
2 |
3 |
3 |
CO 5 |
3 |
3 |
3 |
3 |
2 |
– |
– |
1 |
2 |
1 |
1 |
2 |
3 |
2 |
CO 6 |
3 |
2 |
3 |
3 |
2 |
– |
– |
1 |
2 |
1 |
1 |
2 |
3 |
2 |
AVG |
3 |
2.83 |
3 |
2.33 |
12 |
– |
– |
1 |
2 |
1 |
1 |
1.66 |
2.83 |
2.33 |
ES-CS-CYS- 211A |
Computer Organization and Architecture |
CO1 |
Be familiar with the functional units of the processor such as the register file and arithmetic‐logical unit, and with the basics of systems topics |
CO2 |
Be familiar with the design trade‐offs in designing and constructing a computer processor. |
CO3 |
Be familiar with the design trade‐offs in designing and constructing a computer processor. |
CO4 |
Be familiar with the CPU design including the RISC/CISC architectures. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
1 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO2 |
2 |
3 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
– |
CO3 |
3 |
1 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO4 |
2 |
2 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
– |
AVG |
2.5 |
1.7 |
2 |
2.3 |
– |
– |
– |
– |
– |
– |
– |
– |
2.5 |
2 |
PC-CS-CYS-209A |
Principles of Programming Languages |
CO 1 |
To introduce the basic concepts of programming language, the general problems and methods related to syntax and semantics. |
CO 2 |
To introduce the structured data objects, subprograms and programmer defined data types. |
CO 3 |
To outline the sequence control and data control. |
CO 4 |
To introduce the concepts of storage management using programming languages. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
1 |
– |
– |
1 |
– |
– |
– |
– |
– |
– |
– |
2 |
– |
CO2 |
3 |
3 |
3 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO3 |
3 |
– |
1 |
1 |
1 |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
CO4 |
3 |
3 |
2 |
2 |
1 |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
AVG |
3 |
2.2 |
1.6 |
2.2 |
1 |
– |
– |
– |
– |
– |
– |
– |
2.33 |
2 |
PC-CS-CYS-207A |
Software Engineering |
CO 1 |
Understand the basic concepts of Software Engineering. |
CO 2 |
Interpret the fundamental concept of Software requirements specifications and Analysis Modelling. |
CO 3 |
Develop different design techniques and their implementation. |
CO 4 |
Discuss about software testing and maintenance measures. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
3 |
– |
– |
1 |
– |
– |
– |
– |
– |
– |
– |
1 |
1 |
– |
CO 2 |
3 |
2 |
– |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
– |
CO 3 |
3 |
3 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
– |
CO 4 |
3 |
3 |
– |
1 |
– |
– |
– |
– |
– |
– |
– |
2 |
1 |
– |
Avg |
3 |
2.67 |
3 |
1.5 |
– |
– |
– |
– |
– |
– |
– |
1.75 |
1.5 |
– |
PC-CS-CYS-205A |
Computational Thinking with Python |
CO1 |
To Learn python statements, comments and indentation, tokens, input and output methods using various example programs. |
CO2 |
To Learn the different methods involved in List, String, Tuples and Dictionary and Design solutions for complex programs. |
CO3 |
To learn about different functions in python and develop the function programs with all the concepts like lambda, decorators and generators. |
CO4 |
To learn about the exception handling functions, file concepts and CSV and JSON. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
– |
CO2 |
3 |
3 |
3 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO3 |
3 |
– |
1 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
CO4 |
3 |
3 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
AVG |
3 |
2.2 |
1.6 |
2.2 |
– |
– |
– |
– |
– |
– |
– |
– |
2.33 |
2 |
PC-CS-CYS- 201A |
Introduction to Cyber Security |
CO 1 |
Understand the basic knowledge of cyber security. |
CO 2 |
Analyze and sort issues related to different types of activities in cybercrime. |
CO 3 |
Evaluate the fixing methods of the various cyberattacks. |
CO 4 |
Understand the digital forensics and related scenarios of cybercrimes. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
2 |
1 |
1 |
2 |
1 |
2 |
1 |
– |
1 |
– |
– |
2 |
– |
CO2 |
2 |
3 |
2 |
2 |
2 |
1 |
1 |
– |
– |
2 |
– |
– |
2 |
– |
CO3 |
2 |
3 |
3 |
3 |
2 |
2 |
2 |
2 |
– |
1 |
– |
– |
1 |
– |
CO4 |
2 |
2 |
1 |
2 |
2 |
1 |
1 |
2 |
– |
1 |
– |
– |
1 |
– |
AVG |
2.25 |
2.5 |
1.75 |
2 |
2 |
1.25 |
1.5 |
1.2 |
– |
1.25 |
– |
– |
1.5 |
– |
PC-CS-CYS- 217LA |
Software Engineering Lab |
CO 1 |
Discuss about the reasons for the software crisis. |
CO 2 |
Understand the various software testing techniques. |
CO 3 |
Interpret the various software metrics. |
CO 4 |
Develop different design techniques and their implementation. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
3 |
3 |
3 |
– |
1 |
– |
– |
– |
3 |
3 |
– |
– |
2 |
2 |
CO 2 |
3 |
3 |
– |
– |
2 |
– |
– |
– |
3 |
3 |
– |
– |
3 |
2 |
CO 3 |
3 |
3 |
2 |
3 |
2 |
– |
– |
– |
3 |
3 |
– |
– |
– |
– |
CO 4 |
3 |
3 |
3 |
3 |
2 |
2 |
– |
– |
3 |
3 |
– |
– |
2 |
2 |
AVG |
3 |
3 |
2.67 |
3 |
1.75 |
2 |
– |
– |
3 |
3 |
– |
– |
1.75 |
2 |
PC-CS-CYS- 213LA |
Data Structure Lab |
CO1 |
Implement linear and non linear data structures using linked list |
CO2 |
Apply various data structures such as stack, queue and tree to solve the problems. |
CO3 |
Implement various searching and sorting techniques |
CO4 |
Choose appropriate data structure while designing the applications and analyze the complexity of the algorithms. |
|
|
|
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
2 |
3 |
3 |
3 |
– |
– |
– |
– |
– |
– |
– |
2 |
1 |
CO2 |
2 |
3 |
2 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
CO3 |
2 |
2 |
1 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
1 |
2 |
CO4 |
2 |
2 |
2 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
AVG |
2.25 |
2.25 |
2 |
2.75 |
2.25 |
– |
– |
– |
– |
– |
– |
– |
1.75 |
1.75 |
PC-CS-CYS- 215LA |
Python Lab |
CO 1 |
To study fundamentals of python programming and implement basic programs. |
CO 2 |
To implement the searching technique using python. |
CO 3 |
To implement sorting techniques using python. |
CO 4 |
To implement matrix multiplication using python. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
3 |
2 |
3 |
3 |
3 |
– |
– |
– |
– |
– |
– |
– |
2 |
1 |
CO 2 |
2 |
3 |
2 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
CO 3 |
2 |
2 |
1 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
1 |
2 |
CO 4 |
2 |
2 |
2 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
AVG |
2.25 |
2.25 |
2 |
2.75 |
2.25 |
– |
– |
– |
– |
– |
– |
– |
1.75 |
1.75 |
Semester IV |
ES-CS-CYS-204A |
Object-Oriented Programming System |
CO1 |
To introduce the basic concepts of object oriented programming language and the its representation. |
CO2 |
To allocate dynamic memory, access private members of class and the behavior of inheritance and its implementation. |
CO3 |
To introduce polymorphism, interface design and overloading of operator. |
CO4 |
To handle backup system using file, general purpose template and handling of raised exception during programming. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
CO2 |
1 |
1 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
– |
CO3 |
1 |
3 |
2 |
2 |
3 |
– |
– |
– |
– |
– |
– |
– |
2 |
– |
CO4 |
2 |
2 |
2 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
2 |
– |
AVG |
1.75 |
1.75 |
2.33 |
1.5 |
3 |
– |
– |
– |
– |
– |
– |
– |
2.25 |
– |
PC-CS-CYS-202A |
Mathematics for Intelligent Systems |
CO 1 |
To develop an understanding of the basic concepts and techniques of linear algebra as applied to signal processing. |
CO 2 |
To provide connection between the concepts of linear algebra, differential equation and probability theory. |
CO 3 |
To enable the students to understand the use of calculus and Linear algebra in modelling electrical and mechanical elements. |
CO 4 |
To equip the students to understand the role of probability theory in providing data sets for computational experiments in data science. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
3 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
CO 2 |
3 |
2 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
CO 3 |
3 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
CO 4 |
3 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
Avg |
3 |
2.67 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
ES-CS-CYS-208A |
Internet & Web Technology |
CO1 |
Learn the basic concepts of information and web architecture. |
CO2 |
Learn about the skills that will enable to design and build high level web enabled applications. |
CO3 |
Understand the applicability of Java Script as per current software industry standards. |
CO4 |
Acquaint the latest programming language for the implementation of object based and procedure based applications using Python. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
3 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
CO 2 |
3 |
2 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
CO 3 |
3 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
CO 4 |
3 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
Avg |
3 |
2.67 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
PC-CS-CYS-206A |
Data Base Management Systems |
CO 1 |
Illustrate the concept of Database Management System & Entity Relationship Diagrams. |
CO 2 |
Identify and apply the SQL, Relational Algebra and Relational Calculus queries. |
CO 3 |
Elaborate the concept of functional dependencies. |
CO 4 |
Explain the concept of Transaction Processing & Concurrency control |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
CO 2 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
CO 3 |
3 |
3 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO 4 |
3 |
3 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
Avg |
3 |
1.5 |
1.5 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
1 |
PC-CS-CYS- 210A |
Operating System |
CO 1 |
Understand the structure and functions of operating system. |
CO 2 |
Explain about processes, threads and scheduling algorithms. |
CO 3 |
Elaborate the principle of concurrency and the concept of deadlocks. |
CO 4 |
Discuss various memory management scheme and to study I/O management and file systems. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
2 |
2 |
2 |
2 |
1 |
1 |
1 |
– |
1 |
– |
– |
– |
– |
CO2 |
2 |
3 |
2 |
2 |
2 |
1 |
1 |
1 |
– |
2 |
– |
– |
– |
– |
CO3 |
2 |
3 |
3 |
2 |
1 |
2 |
1 |
2 |
– |
1 |
– |
– |
2 |
2 |
CO4 |
3 |
2 |
2 |
3 |
3 |
1 |
1 |
1 |
– |
1 |
– |
– |
2 |
2 |
AVG |
2.5 |
2.5 |
2.25 |
2.25 |
2 |
1.25 |
1 |
1.25 |
– |
1.25 |
– |
– |
2 |
2 |
PC-CS-CYS- 212A |
Cryptographic Fundamentals |
CO 1 |
To understand basics of Cryptography and Network Security. |
CO 2 |
To be able to secure a message over insecure channel by various means.. |
CO 3 |
To learn about how to maintain the Confidentiality, Integrity and Availability of a data |
CO 4 |
To understand various protocols for network security to protect against the threats in the networks. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
3 |
2 |
1 |
2 |
– |
1 |
– |
– |
– |
– |
3 |
3 |
1 |
CO2 |
2 |
2 |
3 |
– |
3 |
3 |
– |
2 |
1 |
– |
– |
2 |
– |
2 |
CO3 |
2 |
3 |
1 |
3 |
1 |
3 |
– |
2 |
– |
– |
– |
3 |
3 |
2 |
CO4 |
3 |
1 |
1 |
– |
1 |
1 |
3 |
3 |
2 |
– |
– |
1 |
1 |
– |
AVG |
2.5 |
2.25 |
1.75 |
3 |
1.75 |
1.75 |
3 |
1.75 |
2 |
– |
– |
2.25 |
2 |
1.25 |
ES-CS-CYS- 218LA |
Internet & Web Technology Lab |
CO1 |
Design webpages using HTML, JavaScript and CSS. |
CO2 |
Design and test simple function/program to implement Searching and sorting techniques using Python. |
CO3 |
Develop program in Java Script for pattern matching using regular expressions and errors in scripts. |
CO4 |
Design client-server based web applications. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
– |
CO 2 |
3 |
3 |
3 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO 3 |
3 |
– |
1 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
CO 4 |
3 |
3 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
AVG |
3 |
2.2 |
1.6 |
2.2 |
– |
– |
– |
– |
– |
– |
– |
– |
2.33 |
2 |
PC-CS-CYS- 214LA |
Object Oriented Programming Lab |
CO1 |
To introduce the basic concepts of object oriented programming language and the its representation. |
CO2 |
To allocate dynamic memory, access private members of class and the behavior of inheritance and its implementation. |
CO3 |
To introduce polymorphism, interface design and overloading of operator. |
CO4 |
To handle backup system using file, general purpose template and handling of raised exception during programming. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO2 |
1 |
1 |
2 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
1 |
CO3 |
1 |
3 |
2 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
1 |
2 |
CO4 |
2 |
1 |
3 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
1 |
1 |
AVG |
1.75 |
1.75 |
2.33 |
1.5 |
2.5 |
|
|
|
|
|
|
|
1.75 |
1.5 |
PC-CS-CYS- 216LA |
Database Management Systems Lab |
CO 1 |
Illustrate & Implement basic DDL commands. |
CO 2 |
Illustrate & Implement DML and DCL commands. |
CO 3 |
Demonstrate SQL queries using SQL operators. |
CO 4 |
Explain the concept of relational algebra and implement using examples. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
2 |
2 |
2 |
1 |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO2 |
3 |
2 |
3 |
2 |
3 |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO3 |
3 |
3 |
3 |
1 |
3 |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO4 |
3 |
3 |
3 |
1 |
3 |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
AVG |
3 |
2.5 |
2.75 |
1.5 |
2.5 |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
Semester V |
ES-CS-CYS-307A |
Microprocessor and Interfacing |
CO1 |
Understanding the Architecture, Instruction set and addressing modes of 8086 microprocessor. |
CO2 |
Analyze the instruction set of 8086 microprocessor. |
CO3 |
Implement the assembly language programming of 8086 microprocessor. |
CO4 |
Design the memory (RAM/ROM) interfacing with 8086 microprocessor. |
CO5 |
Design and implement the interfacing of interrupts, basic I/O and DMA with 8086 Microprocessor. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
1 |
1 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
1 |
CO2 |
1 |
3 |
1 |
1 |
3 |
– |
– |
– |
– |
– |
– |
– |
1 |
1 |
CO3 |
3 |
2 |
2 |
1 |
3 |
– |
– |
– |
– |
– |
– |
– |
2 |
1 |
CO4 |
2 |
2 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO5 |
3 |
2 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
AVG |
2 |
2 |
2 |
1.5 |
3 |
– |
– |
– |
– |
– |
– |
– |
2.25 |
1.4 |
HM-902A |
Business Intelligence and Entrepreneurship |
CO1 |
Students will be able understand who the entrepreneurs are and what competences needed to become an entrepreneur. |
CO2 |
Students will be able understand insights into the management, opportunity search, identification of a Product and market feasibility studies. |
CO3 |
Students can be able to write a report and do oral presentation on the topics such as product identification, business idea, export marketing etc. |
CO4 |
Students will be able to know the different financial and other assistance available for the small industrial units. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
|
|
|
|
– |
– |
– |
– |
1 |
– |
– |
1 |
– |
– |
CO2 |
2 |
2 |
2 |
2 |
– |
– |
– |
– |
1 |
1 |
3 |
2 |
– |
2 |
CO3 |
1 |
2 |
1 |
1 |
– |
– |
– |
– |
– |
2 |
2 |
1 |
2 |
2 |
CO4 |
|
1 |
|
|
– |
– |
– |
– |
– |
– |
– |
1 |
– |
– |
AVG |
0.75 |
1.25 |
0.75 |
0.75 |
– |
– |
– |
– |
0.5 |
0.75 |
1.25 |
1.25 |
0.5 |
1 |
MC-904A |
Energy Resources & Management |
CO1 |
State the basics of energy, energy management, audit and tariffs. |
CO2 |
Explain the layout and working of conventional power plants |
CO3 |
Explain the layout and working of non-conventional power plants |
CO4 |
Outline the role of energy in economic development and energy scenario in India |
CO |
PO1 |
PO2 |
PO3 |
PO4 |
PO5 |
PO6 |
PO7 |
PO8 |
PO9 |
PO10 |
PO11 |
PO12 |
PSO1 |
PSO2 |
CO1 |
2 |
– |
– |
– |
– |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
CO2 |
2 |
– |
– |
– |
– |
1 |
2 |
– |
– |
– |
– |
– |
– |
– |
CO3 |
2 |
– |
– |
– |
– |
1 |
2 |
– |
– |
– |
– |
– |
2 |
– |
CO4 |
2 |
– |
– |
– |
– |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
AVERAGE |
2 |
– |
– |
– |
– |
1.5 |
2 |
– |
– |
– |
– |
– |
2 |
– |
ES-CS-CYS-305A |
Information Security and Data Hiding |
CO1 |
Demonstrate the knowledge of cryptography, security concepts and applications. |
CO2 |
Explore the emerging security for information and IPsec. |
CO3 |
Identify techniques for data hiding and different types of attacks. |
CO4 |
Apply data hiding techniques into different domains |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
|
1 |
|
|
2 |
2 |
|
1 |
1 |
1 |
|
1 |
3 |
2 |
CO2 |
2 |
2 |
3 |
3 |
2 |
1 |
2 |
3 |
2 |
1 |
1 |
– |
2 |
2 |
CO3 |
– |
3 |
2 |
3 |
3 |
1 |
1 |
1 |
1 |
– |
– |
3 |
2 |
2 |
CO4 |
1 |
2 |
2 |
2 |
3 |
1 |
1 |
1 |
1 |
– |
– |
2 |
2 |
2 |
AVG |
.75 |
2 |
1.75 |
2 |
2.5 |
1.25 |
1 |
1.5 |
1.25 |
.5 |
.25 |
1.5 |
2.25 |
2 |
PC-CS-CYS-303A |
Security Threats and Trends |
CO 1 |
Understand the various security and network threats. |
CO 2 |
Outline the security threat management and various vulnerabilities. |
CO 3 |
Elaborate the detail of Security monitoring and Auditing tools. |
CO 4 |
Identify various access control mechanisms to protect against threats in the networks |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
3 |
3 |
CO2 |
3 |
2 |
– |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
3 |
3 |
CO3 |
3 |
2 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
3 |
3 |
CO4 |
3 |
2 |
– |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
3 |
3 |
AVG |
3 |
2.25 |
2 |
1.5 |
– |
– |
– |
– |
– |
– |
– |
2 |
3 |
3 |
PC-CS-CYS-311A |
Computer Networks |
CO1 |
To understand the basic concept of networking, types, networking topologies and layered architecture. |
CO2 |
To understand data link layer and MAC sub-layer` |
CO3 |
To understand the network Layer functioning |
CO4 |
To understand the transport layer and application layer operation |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO2 |
3 |
1 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
1 |
CO3 |
3 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
CO4 |
3 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
AVG |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
PC-CS-CYS-301A |
Design and Analysis of Algorithms |
CO1 |
introduce the basic concepts of Data Structures and their analysis. |
CO2 |
study the concept of Dynamic Programming and various advanced Data Structures. |
CO3 |
introduce various Graph algorithms and concepts of Computational complexities. |
CO4 |
study various Flow and Sorting Networks |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO2 |
1 |
1 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
1 |
CO3 |
1 |
2 |
2 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
CO4 |
2 |
3 |
2 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
2 |
1 |
AVG |
1.75 |
1.75 |
2.33 |
1.5 |
2.5 |
|
|
|
|
|
|
|
2.25 |
1.5 |
PC-CS-CYS-315LA |
Design and Analysis of Algorithms Lab |
CO1 |
The student should be able to Design algorithms for various computing problems. |
CO2 |
The student should be able to Analyse the time and space complexity of algorithms. |
CO3 |
The student should be able to Critically analyse the different algorithm design techniques for a given problem. |
CO4 |
The student should be able to Modify existing algorithms to improve efficiency. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO2 |
1 |
1 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
1 |
CO3 |
1 |
3 |
3 |
2 |
3 |
– |
– |
– |
– |
– |
– |
– |
1 |
2 |
CO4 |
2 |
2 |
2 |
– |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
1 |
AVG |
1.75 |
1.75 |
2.66 |
1.5 |
2.5 |
|
|
|
|
|
|
|
2 |
1.5 |
PC-CS-CYS-313LA |
Computer Networks Lab |
CO 1 |
Do Problem Solving using algorithms. |
CO 2 |
Design and test simple programs to implement networking concepts using Java. |
CO 3 |
Document artifacts using applied addressing & quality standards. |
CO 4 |
Design simple data transmission using networking concepts and implement. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
CO1 |
2 |
1 |
2 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
CO2 |
CO2 |
2 |
2 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
CO3 |
CO3 |
3 |
1 |
1 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
CO4 |
CO4 |
3 |
3 |
2 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
AVG |
AVG |
2.5 |
1.75 |
1.75 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
2.5 |
ES-CS-CYS-317LA |
Microprocessor & Interfacing Lab |
CO 1 |
Understand basic concept of 8085, 8086 Microprocessors and 8051 Microcontrollers. |
CO 2 |
Develop an assembly language program for 8086 Microprocessors as well as C language program for 8051 Microcontroller. |
CO 3 |
Experiment with interfacing the various Peripheral to 8086 Microprocessors and 8051 Microcontrollers. |
CO 4 |
Design the systems based on 8051 Microcontrollers. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
CO2 |
2 |
3 |
3 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
2 |
3 |
CO3 |
2 |
3 |
3 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
2 |
3 |
CO4 |
2 |
3 |
3 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
AVG |
2.25 |
3 |
3 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
2 |
3 |
Semester VI |
PC-CS-CYS- 302A |
Mobile Security |
CO1 |
Study the concepts in mobile security |
CO2 |
Learn various OS, acquisition and analysis of android. |
CO3 |
Learn various security of Windows and ios. |
CO4 |
Understand the purpose of malware analysis. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
– |
CO2 |
3 |
3 |
3 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO3 |
3 |
– |
1 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
CO4 |
3 |
3 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
AVG |
3 |
2.2 |
1.6 |
2.2 |
– |
– |
– |
– |
– |
– |
– |
– |
2.33 |
2 |
PC-CS-CYS-306A |
Cryptanalysis |
CO 1 |
Develop a mathematical foundation for the study of cryptography. |
CO 2 |
Understand Number Theory and Algebra for design of cryptographic algorithms |
CO 3 |
Explain the role of cryptography in communication over an insecure channel. |
CO 4 |
Analyze the different public key encryption schemes and elliptic curves and pairings based on different security models |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
CO2 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
CO3 |
3 |
3 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO4 |
3 |
3 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
AVG |
3 |
1.5 |
1.5 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
1 |
ES-CS-CYS-308A |
Information Theory and Coding |
CO 1 |
Apply the concept of Information Theory to analyse the channel performance. |
CO 2 |
Design source coding techniques to improve the channel performance. |
CO 3 |
Develop the linear block codes and cyclic codes for error detection and correction. |
CO 4 |
Develop and decode non-linear convolution codes. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO2 |
3 |
1 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
1 |
CO3 |
3 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
CO4 |
3 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
AVG |
3 |
0.75 |
1.25 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
0.75 |
OE-CS-CYS-304 |
Creativity Innovation and Entrepreneurship |
CO 1 |
Understand basics of Creativity |
CO 2 |
Analyze entrepreneurship skills |
CO 3 |
Understand creative Intelligence |
CO 4 |
Understand perspectives of Innovation |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
– |
2 |
2 |
2 |
– |
– |
1 |
– |
3 |
1 |
2 |
3 |
– |
2 |
CO2 |
– |
3 |
2 |
2 |
– |
– |
– |
– |
1 |
1 |
1 |
3 |
– |
3 |
CO3 |
– |
– |
3 |
2 |
– |
– |
– |
– |
– |
2 |
– |
3 |
– |
– |
CO4 |
– |
1 |
3 |
– |
– |
– |
– |
– |
2 |
2 |
– |
3 |
– |
1 |
AVG |
– |
2 |
2 |
2 |
– |
– |
1 |
– |
3 |
1 |
2 |
3 |
– |
2 |
PC-CS-CYS-310A |
Cloud Security and Management |
CO 1 |
Understand an in-depth and comprehensive knowledge of the Cloud Computing fundamental issues, technologies and implementations. |
CO 2 |
Identify the infrastructure of cloud computing, including SaaS, PaaS, IaaS, and Virtualization etc |
CO 3 |
Evaluate the security issues related to the development of cloud applications. |
CO 4 |
Learn Identity and Access Management in the cloud |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
1 |
– |
2 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
1 |
CO2 |
1 |
3 |
– |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
1 |
1 |
CO3 |
2 |
– |
1 |
1 |
1 |
– |
– |
– |
– |
– |
– |
– |
1 |
2 |
CO4 |
2 |
3 |
3 |
2 |
3 |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
AVG |
1.5 |
1.5 |
1.5 |
2 |
1.75 |
|
|
|
|
|
|
|
1.75 |
1.5 |
ES-CS-CYS-304A |
Digital Forensics |
CO1 |
To postulate the introduction of digital forensics and motive behind the crime and identity of the main culprit with the current tools used. |
CO2 |
To identify the evidence quickly, and to estimate the potential impact of the malicious activity on the victim Interpret the cyber pieces of evidence. |
CO3 |
To understand various artifacts related to systems in areas of windows System and Computer operating System |
CO4 |
To analyze Digital forensic case study which offers a complete report on the investigation process with the associated legal aspects. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
2 |
1 |
2 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
CO2 |
2 |
2 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO3 |
3 |
1 |
1 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO4 |
3 |
3 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
AVG |
2.5 |
1.75 |
1.75 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
2.5 |
2 |
PC-CS-CYS-312 LA |
Information Theory and Coding Lab |
CO 1 |
Analyze and demonstrate information and various entropies. |
CO 2 |
Understand and apply various source coding techniques. |
CO 3 |
Construct codes using different linear block code and cyclic code techniques. |
CO 4 |
Design various convolution coding schemes. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
2 |
– |
– |
2 |
– |
– |
2 |
2 |
1 |
– |
– |
– |
– |
CO2 |
3 |
– |
– |
– |
2 |
– |
– |
2 |
2 |
1 |
– |
– |
2 |
– |
CO3 |
3 |
2 |
3 |
– |
2 |
– |
– |
2 |
2 |
1 |
– |
2 |
2 |
– |
CO4 |
3 |
2 |
3 |
– |
2 |
– |
– |
2 |
2 |
1 |
– |
2 |
2 |
– |
AVG |
3 |
1.5 |
1.5 |
– |
2 |
– |
– |
2 |
2 |
1 |
– |
1 |
1.5 |
– |
ES-CS-CYS- 314LA |
Digital Forensic Lab |
CO 1 |
To familiarize students with the tools and network of Digital Forensics. |
CO 2 |
To have a clear understanding of Network related commands in windows and Linux |
CO 3 |
Study of the phases of investigation process using tools of Digital forensic. |
CO 4 |
To analyze case study of forensic investigation. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
CO1 |
2 |
1 |
2 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
CO2 |
CO2 |
2 |
2 |
2 |
2 |
3 |
– |
– |
– |
– |
– |
– |
– |
3 |
CO3 |
CO3 |
3 |
1 |
1 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
CO4 |
CO4 |
3 |
3 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
AVG |
AVG |
2.5 |
1.75 |
1.75 |
2 |
3 |
– |
– |
– |
– |
– |
– |
– |
2.5 |
PC-CS-CYS-316LA |
Cryptanalysis Lab |
CO1 |
Develop cryptography techniques using different cipher algorithms. |
CO2 |
Understand Number Theory and Algebra for design of cryptographic algorithms |
CO3 |
Understand the role of cryptography in communication over an insecure channel. |
CO4 |
Illustrate the symmetric key encryption schemes based on different security modeis |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
CO2 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
CO3 |
3 |
3 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO4 |
3 |
3 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
AVG |
3 |
1.5 |
1.5 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
1 |
Semester VII |
PC-CS-CYS-401A |
Cyber Attacks- OWASP Framework |
CO1 |
Awareness about OWASP Top 10 web application security risks. |
CO2 |
Understanding of the most critical security risks to web applications. |
CO3 |
Identify and mitigate the ten most critical security risks by reviewing vulnerable source code. |
CO4 |
Understand the need of writing the secure code. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
3 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO 2 |
3 |
1 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO 3 |
3 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO 4 |
3 |
– |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
AVG |
3 |
1.5 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
PE-CS-CYS-425A |
Cloud Security |
CO1 |
Classify and interpret various paradigms, models and micro-architectural design of advanced computer architecture. |
CO2 |
Identify the roles of VLIW & superscalar processors and branch handling techniques for performance improvement |
CO3 |
Analyze and interpret the basic usage of various MIMD architectures and relative importance of various types of static and dynamic connection. |
CO4 |
Examine the various types of processors and memory hierarchy levels and cache coherence problem including software and hardware. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
– |
CO2 |
3 |
3 |
3 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO3 |
3 |
– |
1 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
– |
CO4 |
3 |
3 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
AVG |
3 |
2.2 |
1.6 |
2.2 |
– |
– |
– |
– |
– |
– |
– |
– |
2.33 |
2 |
PE-CS-CYS- 415A |
Introduction to cyber laws |
CO 1 |
give overview of Cyber Ethics, Intellectual Property Right and Trademark Related laws with respect to Cyber Space. |
CO 2 |
Analyze and evaluate existing legal framework and laws on cyber security. |
CO 3 |
analyze and evaluate the Intellectual rights and copyrights. |
CO 4 |
understand cyber ethics. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO2 |
1 |
1 |
3 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
1 |
CO3 |
1 |
3 |
1 |
2 |
3 |
– |
– |
– |
– |
– |
– |
– |
1 |
2 |
CO4 |
2 |
2 |
2 |
– |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
1 |
AVG |
1.75 |
1.75 |
2 |
2.5 |
2.5 |
|
|
|
|
|
|
|
2 |
1.5 |
OE-CS-CYS- 403 |
Ethical Hacking |
CO 1 |
To gain knowledge about Ethical hacking and penetration testing. |
CO 2 |
To learn about various types of attacks, attackers and security threats and vulnerabilities present in the computer system. |
CO 3 |
To examine how social engineering can be done by attacker to gain access of useful & sensitive information about the confidential data. |
CO 4 |
To learn about cryptography, and basics of web application attacks. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
– |
2 |
— |
– |
– |
2 |
CO 2 |
3 |
3 |
3 |
2 |
3 |
3 |
3 |
2 |
– |
– |
– |
– |
– |
2 |
CO 3 |
2 |
3 |
– |
1 |
2 |
3 |
1 |
2 |
– |
– |
– |
– |
– |
2 |
CO 4 |
3 |
2 |
3 |
2 |
3 |
2 |
– |
1 |
– |
– |
– |
– |
– |
1 |
AVG |
2.75 |
2.75 |
2.25 |
2 |
2.75 |
2.75 |
1.75 |
2 |
– |
2 |
– |
– |
– |
1.75 |
HSS-403A |
Universal Human Values II: Understanding Harmony |
CO1 |
Development of a holistic perspective based on self-exploration about |
CO2 |
themselves(human being),family, society and nature/existence. |
CO3 |
Understanding(or developing clarity)of the harmony in the human being, family, Strengthening of self-reflection. |
CO4 |
Society and nature/existence. Development of commitment and courage to act. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
– |
– |
– |
– |
– |
– |
– |
3 |
3 |
3 |
– |
– |
– |
– |
CO 2 |
– |
– |
– |
– |
– |
– |
– |
3 |
3 |
3 |
– |
– |
– |
– |
CO 3 |
– |
– |
– |
– |
– |
– |
– |
3 |
3 |
3 |
– |
– |
– |
– |
CO 4 |
– |
– |
– |
– |
– |
– |
– |
3 |
3 |
3 |
– |
– |
– |
– |
AVG |
– |
– |
– |
– |
– |
– |
– |
3 |
3 |
3 |
– |
– |
– |
– |
PC-CS-CYS 407LA |
Cloud Security Lab |
CO 1 |
Learn various cloud deployment tools |
CO 2 |
Learn about Cloud security metrics. |
CO 3 |
Explore threat in cloud services & application. |
CO 4 |
To get the knowledge about work with cloud management Platform |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
3 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO2 |
1 |
1 |
3 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
1 |
CO3 |
1 |
3 |
1 |
2 |
3 |
– |
– |
– |
– |
– |
– |
– |
1 |
2 |
CO4 |
2 |
2 |
2 |
– |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
1 |
AVG |
1.75 |
1.75 |
2 |
2.5 |
2.5 |
|
|
|
|
|
|
|
2 |
1.5 |
PC-CS-CYS 405LA |
Cyber Attacks- OWASP Framework Lab |
CO1 |
Apply the OWASP Top 10 to ensure your applications minimize the security risks in the list. |
CO2 |
Explore how Web Applications are built and delivered on top of the HTTP protocol. |
CO3 |
Explore threat agents, attack vectors, and impact of the ten most critical web application security Risks |
CO4 |
Explore common exploitation techniques used to test software security. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO1 |
2 |
1 |
2 |
3 |
– |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
CO2 |
2 |
2 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO3 |
3 |
1 |
1 |
1 |
– |
– |
– |
– |
– |
– |
– |
– |
3 |
2 |
CO4 |
3 |
3 |
2 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
2 |
2 |
AVG |
2.5 |
1.75 |
1.75 |
2 |
2 |
– |
– |
– |
– |
– |
– |
– |
2.5 |
2 |
Semester VIII |
HSS-404A |
Entrepreneurship and Start-ups |
CO1 |
Explain the basics of entrepreneurship. |
CO2 |
Analyzing Skills and Traits of an Entrepreneur |
CO3 |
Crafting Business Models and Lean Start-ups. |
CO4 |
Evaluating Institutions Supporting Small Business Enterprises. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
– |
3 |
2 |
– |
– |
1 |
3 |
3 |
3 |
3 |
2 |
3 |
– |
– |
CO 2 |
– |
3 |
3 |
2 |
2 |
3 |
3 |
3 |
2 |
3 |
3 |
3 |
– |
– |
CO 3 |
– |
3 |
3 |
2 |
3 |
2 |
3 |
3 |
3 |
3 |
3 |
3 |
– |
– |
CO 4 |
– |
– |
– |
– |
– |
– |
2 |
2 |
– |
3 |
3 |
3 |
– |
– |
Avg |
– |
3 |
2.67 |
2.00 |
2.50 |
2.00 |
2.75 |
2.75 |
2.67 |
3 |
2.75 |
3 |
– |
– |
PC-CS-CYS-402A |
Block Chain in Cyber Security |
CO 1 |
Explain the basics of blockchain concepts and architecture. |
CO 2 |
Explore and analyze various processes of cyber-attacks on blockchain. |
CO 3 |
Evaluate smart contract and code security issues |
CO 4 |
Compile and deploy Solidity smart contracts on a blockchain network. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
1 |
1 |
2 |
– |
3 |
1 |
– |
1 |
1 |
1 |
2 |
2 |
2 |
3 |
CO 2 |
– |
1 |
– |
3 |
1 |
1 |
– |
2 |
2 |
1 |
2 |
3 |
2 |
2 |
CO 3 |
1 |
1 |
2 |
1 |
3 |
2 |
2 |
– |
1 |
2 |
1 |
3 |
2 |
3 |
CO 4 |
2 |
1 |
3 |
2 |
1 |
– |
– |
1 |
1 |
2 |
2 |
3 |
2 |
1 |
AVG |
1 |
1 |
1.75 |
1.5 |
2 |
1 |
0.5 |
1 |
1.25 |
1.5 |
1.75 |
2.75 |
2 |
2.25 |
OE-CS-CYS-410 |
Data Injection |
CO 1 |
Understand the basic concept of data injection |
CO 2 |
Understand various concept of SQL that are fundamental to data injection |
CO 3 |
Study of Injection vulnerabilities against hacking and web attacks |
CO 4 |
Explore some introductory concepts data injection in different field |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
3 |
3 |
– |
3 |
3 |
3 |
— |
2 |
– |
– |
– |
2 |
1 |
2 |
CO 2 |
3 |
3 |
– |
3 |
3 |
3 |
– |
2 |
– |
– |
– |
2 |
1 |
1 |
CO 3 |
2 |
2 |
3 |
3 |
2 |
2 |
– |
3 |
– |
– |
– |
2 |
2 |
1 |
CO 4 |
2 |
2 |
– |
2 |
3 |
2 |
– |
2 |
– |
– |
– |
2 |
2 |
1 |
Avg |
2.5 |
2.5 |
3 |
2.75 |
2.75 |
2.5 |
– |
2.25 |
– |
– |
– |
2 |
1.5 |
1.25 |
PC-CS -CYS-406LA |
Cyber Security Block Chain Lab |
CO1 |
Implement solidity programming language. |
CO2 |
Implement various process of blockchain network. |
CO3 |
Implement meta mask to execute the smart contract. |
CO4 |
Implement various type of smart contract and its deployment. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
1 |
1 |
2 |
– |
3 |
1 |
– |
1 |
1 |
1 |
2 |
2 |
2 |
3 |
CO 2 |
– |
1 |
– |
3 |
1 |
1 |
– |
2 |
2 |
1 |
2 |
3 |
2 |
2 |
CO 3 |
1 |
1 |
2 |
1 |
3 |
2 |
2 |
– |
1 |
2 |
1 |
3 |
2 |
3 |
CO 4 |
2 |
1 |
3 |
2 |
1 |
– |
– |
1 |
1 |
2 |
2 |
3 |
2 |
1 |
AVG |
1 |
1 |
1.75 |
1.5 |
2 |
1 |
0.5 |
1 |
1.25 |
1.5 |
1.75 |
2.75 |
2 |
|
PE-CS -CYS 422A |
Intrusion Detection and Prevention |
CO 1 |
To understand the intrusion detection technologies |
CO 2 |
To understand the intrusion detection and prevention technologies, various types of network behaviour analysis. |
CO 3 |
To understand the honeypots, multiple IDS methods, tools to analyse various types of attacks like wireless attacks and their detection. |
CO4 |
To understand the attack source and provides practical knowledge for dealing with intrusions in real world applications. |
Mapping |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PO 11 |
PO 12 |
PSO 1 |
PSO 2 |
CO 1 |
3 |
1 |
1 |
– |
– |
– |
– |
|
– |
– |
– |
– |
– |
3 |
CO 2 |
1 |
1 |
3 |
3 |
– |
– |
– |
|
– |
– |
– |
– |
– |
2 |
CO 3 |
1 |
3 |
1 |
2 |
3 |
– |
– |
|
– |
– |
– |
– |
– |
1 |
CO 4 |
2 |
1 |
2 |
– |
1 |
– |
– |
|
– |
– |
– |
– |
– |
2 |
AVG |
2 |
1.5 |
1.75 |
2.5 |
2 |
|
|
|
|
|
|
|
|
2 |