Computer Science & Engineering (Cyber Security)

Student Evaluation and OBE

Evaluation Scheme for B. Tech.
    • Theory (100 Marks)
      • Continuous Internal Assessment (25 Marks)
        • Sessional Tests (15 Marks)
        • Attendance (5 Marks)
        • Assignments (5 Marks)
      • End Semester University Examination (75 Marks)
    • Practicals (100 Marks)
      • Continuous Internal Assessment (30 Marks)
        • Lab Performance (10 Marks)
        • Lab Records (10 Marks)
        • Viva (10 Marks)
      • Final Internal Evaluation (10 Marks)
        • Lab Record Completeness (05 marks)
        • Final Internal Viva (05 Marks)
      • End Semester University Examination (60 Marks)
    • Project: Rubric based evaluation
    • Seminar on Internship: Rubric based evaluation
Course Outcomes
Semester III
PC-CS-CYS-203A Data Structures
CO 1 Understand various data structures like array, linked list.
CO 2 Implement operations like searching, insertion, and deletion, traversing mechanism  on various data structures.
CO 3 Implement Linear and Non-Linear data structures
CO 4 Implement appropriate sorting/searching technique.
CO 5 Understand advance data structure using Non Linear data structure.
CO 6 Determine and analyze the complexity of given algorithms.
Mapping PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 3 3 3 1 2 1 2 1 1 1 2 2
CO 2 3 3 3 2 2 1 2 1 1 1 3 2
CO 3 3 3 3 3 2 1 2 1 1 2 3 3
CO 4 3 3 3 2 2 1 2 1 1 2 3 3
CO 5 3 3 3 3 2 1 2 1 1 2 3 2
CO 6 3 2 3 3 2 1 2 1 1 2 3 2
AVG 3 2.83 3 2.33 12 1 2 1 1 1.66 2.83 2.33
ES-CS-CYS- 211A Computer Organization and Architecture
CO1   Be familiar with the functional units of the processor such as the register file and arithmetic‐logical unit, and with the basics of systems topics
CO2  Be familiar with the design trade‐offs in designing and constructing a computer processor.
CO3  Be familiar with the design trade‐offs in designing and constructing a computer processor.
CO4  Be familiar with the CPU design including the RISC/CISC architectures.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 1 3 2 3 2
CO2 2 3 3 2
CO3 3 1 1 3 2
CO4 2 2 2 2 2
AVG 2.5 1.7 2 2.3 2.5 2
PC-CS-CYS-209A Principles of Programming Languages
CO 1 To introduce the basic concepts of programming language, the general problems and methods related to syntax and semantics.
CO 2 To introduce the structured data objects, subprograms and programmer defined data types.
CO 3 To outline the sequence control and data control.
CO 4 To introduce the concepts of storage management using programming languages.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 1 1 2
CO2 3 3 3 3 1 3 2
CO3 3 1 1 1 3
CO4 3 3 2 2 1 2 2
AVG 3 2.2 1.6 2.2 1 2.33 2
PC-CS-CYS-207A Software Engineering
CO 1 Understand the basic concepts of Software Engineering.
CO 2 Interpret the fundamental concept of Software requirements specifications and Analysis Modelling.
CO 3 Develop different design techniques and their implementation.
CO 4 Discuss about software testing and maintenance measures.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 3 1 1 1
CO 2 3 2 2 2 2
CO 3 3 3 3 2 2 2
CO 4 3 3 1 2 1
Avg 3 2.67 3 1.5 1.75 1.5
PC-CS-CYS-205A Computational Thinking with Python
CO1 To Learn python statements, comments and indentation, tokens, input and output methods using various example programs.
CO2 To Learn the different methods involved in List, String, Tuples and Dictionary and Design solutions for complex programs.
CO3 To learn about different functions in python and develop the function programs with all the concepts like lambda, decorators and generators.
CO4 To learn about the exception handling functions, file concepts and CSV and JSON.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 1 2
CO2 3 3 3 3 3 2
CO3 3 1 1 3
CO4 3 3 2 2 2 2
AVG 3 2.2 1.6 2.2 2.33 2
PC-CS-CYS- 201A Introduction to Cyber Security
CO 1 Understand the basic knowledge of cyber security.
CO 2 Analyze and sort issues related to different types of activities in cybercrime.
CO 3 Evaluate the fixing methods of the various cyberattacks.
CO 4 Understand the digital forensics and related scenarios of cybercrimes.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 2 1 1 2 1 2 1 1 2
CO2 2 3 2 2 2 1 1 2 2
CO3 2 3 3 3 2 2 2 2 1 1
CO4 2 2 1 2 2 1 1 2 1 1
AVG 2.25 2.5 1.75 2 2 1.25 1.5 1.2 1.25 1.5
PC-CS-CYS- 217LA Software Engineering Lab
CO 1 Discuss about the reasons for the software crisis.
CO 2 Understand the various software testing techniques.
CO 3 Interpret the various software metrics.
CO 4 Develop different design techniques and their implementation.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 3 3 3 1 3 3 2 2
CO 2 3 3 2 3 3 3 2
CO 3 3 3 2 3 2 3 3
CO 4 3 3 3 3 2 2 3 3 2 2
AVG 3 3 2.67 3 1.75 2 3 3 1.75 2
PC-CS-CYS-  213LA Data Structure Lab
CO1 Implement linear and non linear data structures using linked list
CO2 Apply various data structures such as stack, queue and tree to solve the problems.
CO3 Implement various searching and sorting techniques
CO4 Choose appropriate data structure while designing the applications and analyze the complexity of the algorithms.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 2 3 3 3 2 1
CO2 2 3 2 3 2 2 2
CO3 2 2 1 2 2 1 2
CO4 2 2 2 3 2 2 2
AVG 2.25 2.25 2 2.75 2.25 1.75 1.75
PC-CS-CYS- 215LA Python Lab
CO 1 To study fundamentals of python programming and implement basic programs.
CO 2 To implement the searching technique using python.
CO 3 To implement sorting techniques using python.
CO 4 To implement matrix multiplication using python.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 3 2 3 3 3 2 1
CO 2 2 3 2 3 2 2 2
CO 3 2 2 1 2 2 1 2
CO 4 2 2 2 3 2 2 2
AVG 2.25 2.25 2 2.75 2.25 1.75 1.75
Semester IV
ES-CS-CYS-204A Object-Oriented Programming System
CO1 To introduce the basic concepts of object oriented programming language and the  its  representation.
CO2 To allocate dynamic memory, access private members of class and the behavior of inheritance and its implementation.
CO3 To introduce polymorphism, interface design and overloading of operator.
CO4 To handle backup system using file, general purpose template and handling of raised exception during programming.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 1 3
CO2 1 1 3 1 2
CO3 1 3 2 2 3 2
CO4 2 2 2 3 2
AVG 1.75 1.75 2.33 1.5 3 2.25
PC-CS-CYS-202A Mathematics for Intelligent Systems
CO 1 To develop an understanding of the basic concepts and techniques of linear algebra as applied to signal processing.
CO 2 To provide connection between the concepts of linear algebra, differential equation and probability theory.
CO 3 To enable the students to understand the use of calculus and Linear algebra in modelling electrical and mechanical elements.
CO 4 To equip the students to understand the role of probability theory in providing data sets for computational experiments in data science.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 3 3 1
CO 2 3 2 1
CO 3 3 3 1
CO 4 3 3 1
Avg 3 2.67 1
ES-CS-CYS-208A  Internet & Web Technology
CO1 Learn the basic concepts of information and web architecture.
CO2 Learn about the skills that will enable to design and build high level web enabled applications.
CO3 Understand the applicability of Java Script as per current software industry standards.
CO4 Acquaint the latest programming language for the implementation of object based and procedure based applications using Python.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 3 3 1
CO 2 3 2 1
CO 3 3 3 1
CO 4 3 3 1
Avg 3 2.67 1
PC-CS-CYS-206A Data Base Management Systems
CO 1 Illustrate the concept of Database Management System & Entity Relationship Diagrams.
CO 2 Identify and apply the SQL, Relational Algebra and Relational Calculus queries.
CO 3 Elaborate the concept of functional dependencies.
CO 4 Explain the concept of Transaction Processing & Concurrency control
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 3 3
CO 2 3 3
CO 3 3 3 3 2 3 2
CO 4 3 3 3 2 3 2
Avg  3  1.5  1.5 –   – –  –  –   –  –  –
PC-CS-CYS- 210A Operating System
CO 1 Understand the structure and functions of operating system.
CO 2 Explain about processes, threads and scheduling algorithms.
CO 3 Elaborate the principle of concurrency and the concept of deadlocks.
CO 4 Discuss various memory management scheme and to study I/O management and file systems.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 2 2 2 2 1 1 1 1
CO2 2 3 2 2 2 1 1 1 2
CO3 2 3 3 2 1 2 1 2 1 2 2
CO4 3 2 2 3 3 1 1 1 1 2 2
AVG 2.5 2.5 2.25 2.25 2 1.25 1 1.25 1.25 2 2
PC-CS-CYS-  212A Cryptographic Fundamentals
CO 1 To understand basics of Cryptography and Network Security.
CO 2 To be able to secure a message over insecure channel by various means..
CO 3 To learn about how to maintain the Confidentiality, Integrity and Availability of a data
CO 4 To understand various protocols for network security to protect against the threats in the networks.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 3 2 1 2 1 3 3 1
CO2 2 2 3 3 3 2 1 2 2
CO3 2 3 1 3 1 3 2 3 3 2
CO4 3 1 1 1 1 3 3 2 1 1
AVG 2.5 2.25 1.75 3 1.75 1.75 3 1.75 2 2.25 2 1.25
ES-CS-CYS- 218LA Internet & Web Technology Lab
CO1 Design webpages using HTML, JavaScript and CSS.
CO2 Design and test simple function/program to implement Searching and sorting techniques using Python.
CO3 Develop program in Java Script for pattern matching using regular expressions and errors in scripts.
CO4 Design client-server based web applications.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 3 1 2
CO 2 3 3 3 3 3 2
CO 3 3 1 1 3
CO 4 3 3 2 2 2 2
AVG 3 2.2 1.6 2.2 2.33 2
PC-CS-CYS-  214LA Object Oriented Programming Lab
CO1 To introduce the basic concepts of object oriented programming language and the  its  representation.
CO2 To allocate dynamic memory, access private members of class and the behavior of inheritance and its implementation.
CO3 To introduce polymorphism, interface design and overloading of operator.
CO4 To handle backup system using file, general purpose template and handling of raised exception during programming.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 1 3 2
CO2 1 1 2 1 2 1
CO3 1 3 2 2 2 1 2
CO4 2 1 3 3 1 1
AVG 1.75 1.75 2.33 1.5 2.5               1.75 1.5
PC-CS-CYS- 216LA Database Management Systems Lab
CO 1 Illustrate & Implement basic DDL commands.
CO 2 Illustrate & Implement DML and DCL commands.
CO 3 Demonstrate SQL queries using SQL operators.
CO 4 Explain the concept of relational algebra and implement using examples.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 2 2 2 1 3 2
CO2 3 2 3 2 3 3 2
CO3 3 3 3 1 3 3 2
CO4 3 3 3 1 3 3 2
AVG 3 2.5 2.75 1.5 2.5 3 2
Semester V
ES-CS-CYS-307A Microprocessor and Interfacing
CO1 Understanding the Architecture, Instruction set and addressing modes of 8086 microprocessor.
CO2 Analyze the instruction set of 8086 microprocessor.
CO3 Implement the assembly language programming of 8086 microprocessor.
CO4 Design the memory (RAM/ROM) interfacing with 8086 microprocessor.
CO5 Design and implement the interfacing of interrupts, basic I/O and DMA with 8086 Microprocessor.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 1 1 1 1
CO2 1 3 1 1 3 1 1
CO3 3 2 2 1 3 2 1
CO4 2 2 3 2 3 2
CO5 3 2 3 2 3 2
AVG 2 2 2 1.5 3 2.25 1.4
HM-902A Business Intelligence and Entrepreneurship
CO1  Students will be able understand who the entrepreneurs are and what competences needed to become an entrepreneur.
CO2 Students will be able understand insights into the management, opportunity search, identification of a Product and market feasibility studies.
CO3 Students can be able to write a report and do oral presentation on the topics such as product identification, business idea, export marketing etc.
CO4 Students will be able to know the different financial and other assistance available for the small industrial units.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 1 1
CO2 2 2 2 2 1 1 3 2 2
CO3 1 2 1 1 2 2 1 2 2
CO4 1 1
AVG 0.75 1.25 0.75 0.75 0.5 0.75 1.25 1.25 0.5 1
MC-904A Energy Resources & Management
CO1 State the basics of energy, energy management, audit and tariffs.
CO2 Explain the layout and working of conventional power plants
CO3 Explain the layout and working of non-conventional power plants
CO4 Outline the role of energy in economic development and energy scenario in India
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 2 2
CO2 2 1 2
CO3 2 1 2 2
CO4 2 2 2
AVERAGE 2 1.5 2 2
 ES-CS-CYS-305A  Information Security and Data Hiding
CO1 Demonstrate the knowledge of cryptography, security concepts and applications.
CO2 Explore the emerging security for information and IPsec.
CO3 Identify techniques for data hiding and different types of attacks.
CO4 Apply data hiding techniques into different domains
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 1 2 2 1 1 1 1  3  2
CO2 2 2 3 3 2 1 2 3 2 1 1  2  2
CO3 3 2 3 3 1 1 1 1 3  2  2
CO4 1 2 2 2 3 1 1 1 1 2  2  2
AVG  .75 1.75  2.5  1.25  1.5  1.25  .5  .25  1.5  2.25 
PC-CS-CYS-303A Security Threats and Trends
CO 1  Understand the various security and network threats.
CO 2 Outline the security threat management and various vulnerabilities.
CO 3 Elaborate the detail of Security monitoring and Auditing tools.
CO 4 Identify various access control mechanisms to protect against threats in the networks
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 3 2 3 3
CO2 3 2 2 2 3 3
CO3 3 2 2 2 2 3 3
CO4 3 2 2 2 3 3
AVG 3 2.25 2 1.5 2 3 3
PC-CS-CYS-311A Computer Networks
CO1 To understand the basic concept of networking, types, networking topologies and layered architecture.
CO2 To understand data link layer and MAC sub-layer`
CO3 To understand the network Layer functioning
CO4 To understand the transport layer and application layer operation
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 2 3 2
CO2 3 1 3 3 1
CO3 3 3 3
CO4 3 3 3
AVG 3 2 3 2
PC-CS-CYS-301A Design and Analysis of Algorithms
CO1  introduce the basic concepts of Data Structures and their analysis.
CO2 study the concept of Dynamic Programming and various advanced Data Structures.
CO3 introduce various Graph algorithms and concepts of Computational complexities.
CO4  study various Flow and Sorting Networks
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 1 3 2
CO2 1 1 3 1 2 1
CO3 1 2 2 2 2 2 2
CO4 2 3 2 3 2 1
AVG 1.75 1.75 2.33 1.5 2.5               2.25 1.5
PC-CS-CYS-315LA Design and Analysis of Algorithms Lab
CO1 The student should be able to Design algorithms for various computing problems.
CO2 The student should be able to Analyse the time and space complexity of algorithms.
CO3 The student should be able to Critically analyse the different algorithm design techniques for a given problem.
CO4 The student should be able to Modify existing algorithms to improve efficiency.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 1 3 2
CO2 1 1 3 1 2 1
CO3 1 3 3 2 3 1 2
CO4 2 2 2 2 2 1
AVG 1.75 1.75 2.66 1.5 2.5               2 1.5
PC-CS-CYS-313LA Computer Networks Lab
CO 1 Do Problem Solving using algorithms.
CO 2 Design and test simple programs to implement networking concepts using Java.
CO 3 Document artifacts using applied addressing & quality standards.
CO 4 Design simple data transmission using networking concepts and implement.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 CO1 2 1 2 3 2
CO2 CO2 2 2 2 2 3
CO3 CO3 3 1 1 1 3
CO4 CO4 3 3 2 2 2 2
AVG AVG 2.5 1.75 1.75 2 2 2.5
ES-CS-CYS-317LA Microprocessor & Interfacing Lab
CO 1 Understand basic concept of 8085, 8086 Microprocessors and 8051 Microcontrollers.
CO 2 Develop an assembly language program for 8086 Microprocessors as well as C language program for 8051 Microcontroller.
CO 3 Experiment with interfacing the various Peripheral to 8086 Microprocessors and 8051 Microcontrollers.
CO 4 Design the systems based on 8051 Microcontrollers.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 3
CO2 2 3 3 3 2 3
CO3 2 3 3 3 2 3
CO4 2 3 3 3 3
AVG 2.25 3 3 3 2 3
Semester VI
PC-CS-CYS- 302A  Mobile Security
CO1 Study the concepts in mobile security
CO2 Learn various OS, acquisition and analysis of android.
CO3 Learn various security of Windows and ios.
CO4 Understand the purpose of malware analysis.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 1 2
CO2 3 3 3 3 3 2
CO3 3 1 1 3
CO4 3 3 2 2 2 2
AVG 3 2.2 1.6 2.2 2.33 2
PC-CS-CYS-306A Cryptanalysis
CO 1 Develop a mathematical foundation for the study of cryptography.
CO 2 Understand Number Theory and Algebra for design of cryptographic algorithms
CO 3 Explain the role of cryptography in communication over an insecure channel.
CO 4 Analyze the different public key encryption schemes and elliptic curves and pairings based on different security models
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 3
CO2 3 3
CO3 3 3 3 2 3 2
CO4 3 3 3 2 3 2
AVG 3 1.5 1.5 1 3 1
ES-CS-CYS-308A Information Theory and Coding
CO 1 Apply the concept of Information Theory to analyse the channel performance.
CO 2 Design source coding techniques to improve the channel performance.
CO 3 Develop the linear block codes and cyclic codes for error detection and correction.
CO 4 Develop and decode non-linear convolution codes.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 2 3 2
CO2 3 1 3 3 1
CO3 3 3 3
CO4 3 3 3
AVG 3 0.75 1.25 3 0.75
OE-CS-CYS-304 Creativity Innovation and Entrepreneurship
CO 1 Understand basics of Creativity
CO 2 Analyze entrepreneurship skills
CO 3 Understand creative Intelligence
CO 4 Understand perspectives of Innovation
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 2 2 2 1 3 1 2 3 2
CO2 3 2 2 1 1 1 3 3
CO3 3 2 2 3
CO4 1 3 2 2 3 1
AVG 2 2 2 1 3 1 2 3 2
PC-CS-CYS-310A Cloud Security and   Management
CO 1 Understand an in-depth and comprehensive knowledge of the Cloud Computing fundamental issues, technologies and implementations.
CO 2 Identify the infrastructure of cloud computing, including SaaS, PaaS, IaaS, and Virtualization etc
CO 3 Evaluate the security issues related to the development of cloud applications.
CO 4 Learn Identity and Access Management in the cloud
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 1 2 2 2 2 1
CO2 1 3 3 1 1 1
CO3 2 1 1 1 1 2
CO4 2 3 3 2 3 3 2
AVG 1.5 1.5 1.5 2 1.75               1.75 1.5
ES-CS-CYS-304A Digital Forensics
CO1 To postulate the introduction of digital forensics and motive behind the crime and identity of the main culprit with the current tools used.
CO2 To identify the evidence quickly, and to estimate the potential impact of the malicious activity on the victim Interpret the cyber pieces of evidence.
CO3 To understand various artifacts related to systems in areas of windows System and Computer operating System
CO4 To analyze Digital forensic case study which offers a complete report on the investigation process with the associated legal aspects.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 2 1 2 3 2 2
CO2 2 2 2 2 3 2
CO3 3 1 1 1 3 2
CO4 3 3 2 2 2 2
AVG 2.5 1.75 1.75 2 2.5 2
 PC-CS-CYS-312 LA Information Theory and Coding Lab
CO 1 Analyze and demonstrate information and various entropies.
CO 2 Understand and apply various source coding techniques.
CO 3 Construct codes using different linear block code and cyclic code techniques.
CO 4 Design various convolution coding schemes.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 2 2 2 2 1
CO2 3 2 2 2 1 2
CO3 3 2 3 2 2 2 1 2 2
CO4 3 2 3 2 2 2 1 2 2
AVG 3 1.5 1.5 2 2 2 1 1 1.5
ES-CS-CYS- 314LA Digital Forensic Lab
CO 1 To familiarize students with the tools and network of Digital Forensics.
CO 2 To have a clear understanding of Network related commands in windows and Linux
CO 3 Study of the phases of investigation process using tools of Digital forensic.
CO 4 To analyze case study of forensic investigation.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 CO1 2 1 2 3 2
CO2 CO2 2 2 2 2 3 3
CO3 CO3 3 1 1 1 3
CO4 CO4 3 3 2 2 2
AVG AVG 2.5 1.75 1.75 2 3 2.5
PC-CS-CYS-316LA Cryptanalysis Lab
CO1 Develop cryptography techniques using different cipher algorithms.
CO2 Understand Number Theory and Algebra for design of cryptographic algorithms
CO3 Understand the role of cryptography in communication over an insecure channel.
CO4 Illustrate the symmetric key encryption schemes based on different security modeis
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 3
CO2 3 3
CO3 3 3 3 2 3 2
CO4 3 3 3 2 3 2
AVG 3 1.5 1.5 1 3 1
Semester VII
PC-CS-CYS-401A  Cyber Attacks- OWASP Framework
CO1 Awareness about OWASP Top 10 web application security risks.
CO2 Understanding of the most critical security risks to web applications.
CO3 Identify and mitigate the ten most critical security risks by reviewing vulnerable source code.
CO4 Understand the need of writing the secure code.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 3 2 3 2
CO 2 3 1 3 3 2
CO 3 3 3 3 2
CO 4 3 3 3 2
AVG 3 1.5 3 3 2
PE-CS-CYS-425A Cloud Security
CO1 Classify and interpret various paradigms, models and micro-architectural design of advanced computer architecture.
CO2 Identify the roles of VLIW & superscalar processors and branch handling techniques for performance improvement
CO3 Analyze and interpret the basic usage of various MIMD architectures and relative importance of various types of static and dynamic connection.
CO4 Examine the various types of processors and memory hierarchy levels and cache coherence problem including software and hardware.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 1 2
CO2 3 3 3 3 3 2
CO3 3 1 1 3
CO4 3 3 2 2 2 2
AVG 3 2.2 1.6 2.2 2.33 2
PE-CS-CYS- 415A Introduction to cyber laws
CO 1  give overview of Cyber Ethics, Intellectual Property Right and Trademark Related laws with respect to Cyber Space.
CO 2  Analyze and evaluate existing legal framework and laws on cyber security.
CO 3  analyze and evaluate the Intellectual rights and copyrights.
CO 4  understand cyber ethics.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 1 3 2
CO2 1 1 3 3 2 1
CO3 1 3 1 2 3 1 2
CO4 2 2 2 2 2 1
AVG 1.75 1.75 2 2.5 2.5               2 1.5
OE-CS-CYS- 403 Ethical Hacking
CO 1 To gain knowledge about Ethical hacking and penetration testing.
CO 2 To learn about various types of attacks, attackers and security threats and vulnerabilities present in the computer system.
CO 3 To examine how social engineering can be done by attacker to gain access of useful & sensitive information about the confidential data.
CO 4 To learn about cryptography, and basics of web application attacks.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 3 3 3 3 3 3 3 3 2 2
CO 2 3 3 3 2 3 3 3 2 2
CO 3 2 3 1 2 3 1 2 2
CO 4 3 2 3 2 3 2 1 1
AVG 2.75 2.75 2.25 2 2.75 2.75 1.75 2 2 1.75
HSS-403A  Universal Human Values II: Understanding  Harmony
CO1  Development of a holistic perspective based on self-exploration about
CO2  themselves(human being),family, society and nature/existence.
CO3  Understanding(or developing clarity)of the harmony in the human being, family, Strengthening of self-reflection.
CO4  Society and nature/existence. Development of commitment and courage to act.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 3 3 3
CO 2 3 3 3
CO 3 3 3 3
CO 4 3 3 3
AVG 3 3 3
PC-CS-CYS 407LA Cloud Security Lab
CO 1 Learn various cloud deployment tools
CO 2 Learn about Cloud security metrics.
CO 3 Explore threat in cloud services & application.
CO 4 To get the knowledge about work with cloud management Platform
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 3 1 3 2
CO2 1 1 3 3 2 1
CO3 1 3 1 2 3 1 2
CO4 2 2 2 2 2 1
AVG 1.75 1.75 2 2.5 2.5       2 1.5
PC-CS-CYS 405LA  Cyber Attacks- OWASP Framework Lab
CO1 Apply the OWASP Top 10 to ensure your applications minimize the security risks in the list.
CO2 Explore how Web Applications are built and delivered on top of the HTTP protocol.
CO3 Explore threat agents, attack vectors, and impact of the ten most critical web application security Risks
CO4 Explore common exploitation techniques used to test software security.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO1 2 1 2 3 2 2
CO2 2 2 2 2 3 2
CO3 3 1 1 1 3 2
CO4 3 3 2 2 2 2 2
AVG 2.5 1.75 1.75 2 2 2.5 2
Semester VIII
HSS-404A Entrepreneurship and Start-ups
CO1 Explain the basics of entrepreneurship.
CO2 Analyzing Skills and Traits of an Entrepreneur
CO3 Crafting Business Models and Lean Start-ups.
CO4 Evaluating Institutions Supporting Small Business Enterprises.
Mapping PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 3 2 1 3 3 3 3 2 3
CO 2 3 3 2 2 3 3 3 2 3 3 3
CO 3 3 3 2 3 2 3 3 3 3 3 3
CO 4 2 2 3 3 3
Avg 3 2.67 2.00 2.50 2.00 2.75 2.75 2.67 3 2.75 3
PC-CS-CYS-402A Block Chain in Cyber Security
CO 1 Explain the basics of blockchain concepts and architecture.
CO 2 Explore and analyze various processes of cyber-attacks on blockchain.
CO 3 Evaluate smart contract and code security issues
CO 4 Compile and deploy Solidity smart contracts on a blockchain network.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 1 1 2 3 1 1 1 1 2 2  2  3
CO 2 1 3 1 1 2 2 1 2 3  2  2
CO 3 1 1 2 1 3 2 2 1 2 1 3  2  3
CO 4 2 1 3 2 1 1 1 2 2 3  2  1
AVG 1 1 1.75 1.5 2 1 0.5 1 1.25 1.5 1.75 2.75 2 2.25
OE-CS-CYS-410 Data Injection
CO 1 Understand the basic concept of data injection
CO 2 Understand various concept of SQL that are fundamental to data injection
CO 3 Study of Injection vulnerabilities against hacking and web attacks
CO 4 Explore some introductory concepts data injection in different field
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 3 3 3 3 3 2 2 1 2
CO 2 3 3 3 3 3 2 2 1 1
CO 3 2 2 3 3 2 2 3 2 2 1
CO 4 2 2 2 3 2 2 2 2 1
Avg 2.5 2.5 3 2.75 2.75 2.5 2.25 2 1.5 1.25
PC-CS -CYS-406LA Cyber Security Block Chain Lab
CO1  Implement solidity programming language.
CO2  Implement various process of blockchain network.
CO3  Implement meta mask to execute the smart contract.
CO4  Implement various type of smart contract and its deployment.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 1 1 2 3 1 1 1 1 2 2  2  3
CO 2 1 3 1 1 2 2 1 2 3  2  2
CO 3 1 1 2 1 3 2 2 1 2 1 3  2  3
CO 4 2 1 3 2 1 1 1 2 2 3  2  1
AVG 1 1 1.75 1.5 2 1 0.5 1 1.25 1.5 1.75 2.75 2  
PE-CS -CYS 422A Intrusion Detection and Prevention 
CO 1  To understand the intrusion detection  technologies
CO 2  To understand the intrusion detection and prevention technologies, various types of  network behaviour analysis.
CO 3  To understand the honeypots, multiple IDS methods, tools to analyse various types of  attacks like wireless attacks and their detection.
CO4 To understand the attack source and provides practical knowledge for dealing with  intrusions in real world applications.
Mapping PO 1 PO 2 PO 3  PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12 PSO 1 PSO 2
CO 1 3 1 1 3
CO 2 1 1 3 3 2
CO 3 1 3 1 2 3 1
CO 4 2 1 2 1 2
AVG 2 1.5 1.75 2.5 2                 2
© PIET 2022 Developed and Maintained by City Innovates Pvt. Ltd.
Skip to content
Downloads
PMSSS (J&K)
Panipat Institute of Engineering & Technology (PIET)