JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
--- Content provided by FirstRanker.com ---
COURSE STRUCTURE & SYLLABUS M.Tech CSE for
COMPUTER NETWORKS & INFORMATION SECURITY Programme
(Applicable for batches admitted from 2019-2020)
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaI - SEMESTER
S.
Course
Cate
--- Content provided by FirstRanker.com ---
CoursesL T P C
No
Code
gory
--- Content provided by FirstRanker.com ---
Program Core-11 MTCNIS1101
PC 3
0 0 3
Transport Control Protocol/Internet Protocol (TCP/IP)
--- Content provided by FirstRanker.com ---
Program Core-22 MTCNIS1102
PC 3
0 0 3
Advanced Data Structures
--- Content provided by FirstRanker.com ---
Program Elective-11. Advanced Computer Networks
3 MTCNIS1103
PE 3
0 0 3
--- Content provided by FirstRanker.com ---
2. Distributed Systems3. Intrusion Detection & Prevention Systems
Program Elective-2
1. Data Storage Technologies and Networks
4 MTCNIS1104
--- Content provided by FirstRanker.com ---
PE 30 0 3
2. Wireless Sensor Networks
3. Network Programming
5 MTCNIS1105 Research Methodology and IPR
--- Content provided by FirstRanker.com ---
CC 20 0 2
Laboratory-1
6 MTCNIS1106
LB 0
--- Content provided by FirstRanker.com ---
0 4 2Transport Control Protocol/Internet Protocol (TCP/IP) Lab
Laboartory-2
7 MTCNIS1107
LB 0
--- Content provided by FirstRanker.com ---
0 4 2Advanced Data Structures Lab
8 MTCNIS1108 Audit Course-1*
AC 2
0 0 0
--- Content provided by FirstRanker.com ---
Total Credits18
II -SEMESTER
S.
Cate
--- Content provided by FirstRanker.com ---
Course CodeCourses
L T P C
No
gory
--- Content provided by FirstRanker.com ---
Program Core-31 MTCNIS1201
PC
3 0 0 3
Principles of Cyber Security
--- Content provided by FirstRanker.com ---
Program Core-42 MTCNIS1202
PC
3 0 0 3
Cyber Crime Investigation & Digital Forensics
--- Content provided by FirstRanker.com ---
Program Elective-31. Wireless and Mobile Security
3 MTCNIS1203 2. Android Security Design and Internals
PE
3 0 0 3
--- Content provided by FirstRanker.com ---
3. Firewall and VPN Security4. Information Theory & Coding
Program Elective-4
1. Vulnerability Assessment & Penetration Testing
4 MTCNIS1204 2. Cloud & IoT Security
--- Content provided by FirstRanker.com ---
PE3 0 0 3
3. Applied Cryptography
4. Secure Coding
Laboratory-3
--- Content provided by FirstRanker.com ---
5 MTCNIS1205LB
0 0 4 2
Cyber Security Lab
Laboartory-4
--- Content provided by FirstRanker.com ---
6 MTCNIS1206LB
0 0 4 2
Cyber Crime Investigation & Digital Forensics Lab
7 MTCNIS1207 Mini Project with Seminar
--- Content provided by FirstRanker.com ---
MP 0 0 0 28 MTCNIS1208 Audit Course-2*
AC 2 0 0 0
Total Credits
--- Content provided by FirstRanker.com ---
18*Student has to choose any one audit course listed below.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
Audit Course 1 & 2:
--- Content provided by FirstRanker.com ---
1. English for Research Paper Writing5. Constitution of India
2. Disaster Management
6. Pedagogy Studies
3. Sanskrit for Technical Knowledge
--- Content provided by FirstRanker.com ---
7. Stress Management by Yoga4. Value Education
8. Personality Development through Life
Enlightenment Skills
III -SEMESTER
--- Content provided by FirstRanker.com ---
CourseCate
S.No
Courses
L T P C
--- Content provided by FirstRanker.com ---
Codegory
Program Elective-5
1. Cloud Architectures and Security
2. Information Security Management and
--- Content provided by FirstRanker.com ---
Standards1
MTCNIS2101
3 0 0 3
3. Cyber Laws and Security Policies
--- Content provided by FirstRanker.com ---
4. MOOCs-1 (NPTEL/SWAYAM)-12 WeekProgram related to the programme which is
not listed in the course structure
Open Elective
1. MOOCs-2 (NPTEL/SWAYAM)-Any 12
--- Content provided by FirstRanker.com ---
WeekCourse
on
Engineering
2
--- Content provided by FirstRanker.com ---
MTCNIS2102/Management/ Mathematics offered by other
3 0 0 3
than parent department
2. Course offered by other departments in the
--- Content provided by FirstRanker.com ---
college3
MTCNIS2103 Dissertation-I/Industrial Project#
0 0 20 10
Total Credits
--- Content provided by FirstRanker.com ---
16#Students going for Industrial Project/Thesis will complete these courses through MOOCs
Iv -SEMESTER
Course
--- Content provided by FirstRanker.com ---
CateS.No
Courses
L T P C
Code
--- Content provided by FirstRanker.com ---
gory1
MTCNIS2201
Dissertation-II
0 0 32 16
--- Content provided by FirstRanker.com ---
Total Credits16
Open Electives offered by the Department of CSE for other Departments Students
1. Python Programming
2. Principles of Cyber Security
--- Content provided by FirstRanker.com ---
3. Internet of Things4. Artificial Intelligence and Machine Learning
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
LT
P
C
I Year - I Semester
--- Content provided by FirstRanker.com ---
3
0
0
3
--- Content provided by FirstRanker.com ---
Transport Control Protocol/Internet Protocol (MTCNIS1101)Course Objectives:
? Able to learn about the protocols which are using in the current scenario.
? To learn and understand client server relations and OSI programming Implementation of
--- Content provided by FirstRanker.com ---
the socket and IPC.Course Outcomes:
? Explain OSI Model and Standard Internet Services and Protocols
? How to handle server process termination
--- Content provided by FirstRanker.com ---
? Acquire the knowledge of Elementary TCP sockets and I/O Multiplexing and socketoptions
? Demonstrate the concepts of FIFOs streams messages and Remote logins.
UNIT-I: Introduction to Network Programming: OSI model, Unix standards, TCP and UDP &
--- Content provided by FirstRanker.com ---
TCP connection establishment and Format, Buffer sizes and limitation, standard internet services,Protocol usage by common internet application.
UNIT-II: TCP client server: Introduction, TCP Echo server functions, Normal startup, terminate
and signal handling server process termination, Crashing and Rebooting of server host shutdown
of server host.
--- Content provided by FirstRanker.com ---
UNIT-III: Sockets: Address structures, value ? result arguments, Byte ordering and manipulationfunction and related functions Elementary TCP sockets ? Socket, connect, bind, listen, accept, fork
and exec function, concurrent servers. Close function and related function. I/O Multiplexing and
socket options: I/O Models, select function, Batch input, shutdown function, poll function, TCP
Echo server, get-sockopt and set-sockopt functions. Socket states, Generic socket option IPV6
--- Content provided by FirstRanker.com ---
socket option ICMPV6 socket option IPV6 socket option and TCP socket options.UNIT-IV: Elementary UDP sockets: Introduction UDP Echo server function, lost datagram,
summary of UDP example, Lack of flow control with UDP, determining outgoing interface with
UDP. Elementary name and Address conversions: DNS, get-host by Name function, Resolver
--- Content provided by FirstRanker.com ---
option, Function and IPV6 support, uname function, other networking information.UNIT-V: IPC- Introduction, File and record locking, Pipes, FIFOs streams and messages, Name
spaces, system IPC, Message queues, Semaphores. Remote Login: Terminal line disciplines,
Pseudo-Terminals, Terminal modes, Control Terminals, rlogin Overview, RPC Transparency
--- Content provided by FirstRanker.com ---
Issues.Text Books:
1. UNIX Network Programming, Vol. I, Sockets API, 2nd Edition. - W.Richard
Stevens, Pearson Edn. Asia.
2. UNIX Network Programming, 1st Edition, - W.Richard Stevens. PHI.
--- Content provided by FirstRanker.com ---
Reference Books:
1. UNIX Systems Programming using C++ T CHAN, PHI.
2. UNIX for Programmers and Users, 3rd Edition
Graham GLASS, King abls,
--- Content provided by FirstRanker.com ---
Pearson Education3. Advanced UNIX Programming 2nd Edition M. J. ROCHKIND, Pearson Education
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
--- Content provided by FirstRanker.com ---
TP
C
I Year - I Semester
--- Content provided by FirstRanker.com ---
30
0
3
Advanced Data Structures (MTCNIS1102)
--- Content provided by FirstRanker.com ---
Course Objective:? The student should be able to choose appropriate data structures, understand the
ADT/libraries, and use it to design algorithms for a specific problem
? Students should be able to understand the necessary mathematical abstraction to solve
problems
--- Content provided by FirstRanker.com ---
? To familiarize students with advanced paradigms and data structure used to solvealgorithmic problems
? Student should be able to come up with analysis of efficiency and proofs of correctness
Course Outcomes:
? Discuss the concepts of Collision Resolution Techniques in Hashing and implement
--- Content provided by FirstRanker.com ---
symbol table using hashing techniques? Develop and analyze algorithms for red-black trees, B-trees and Splay trees.
? Develop algorithms for text processing applications.
? Identify suitable data structures and develop algorithms for computational geometry
problems.
--- Content provided by FirstRanker.com ---
UNIT-I: Dictionaries-Definition, Dictionary Abstract Data Type, and Implementation ofDictionaries. Hashing: Review of Hashing, Hash Function, Collision Resolution Techniques in
Hashing, Separate Chaining, Open Addressing, Linear Probing, Quadratic Probing, Double
Hashing, Rehashing, Extendible Hashing.
UNIT-II: Skip Lists- Need for Randomizing Data Structures and Algorithms, Search and Update
--- Content provided by FirstRanker.com ---
Operations on Skip Lists, Probabilistic Analysis of Skip Lists, Deterministic Skip ListsUNIT-III: Trees-Binary Search Trees, AVL Trees, Red Black Trees, 2-3 Trees, B-Trees, Splay
Trees
UNIT-IV: Text Processing: Sting Operations, Brute-Force Pattern Matching, The Boyer- Moore
Algorithm, The Knuth-Morris-Pratt Algorithm, Standard Tries, Compressed Tries, Suffix Tries,
--- Content provided by FirstRanker.com ---
The Huffman Coding Algorithm, The Longest Common Subsequence Problem (LCS), ApplyingDynamic Programming to the LCS Problem
UNIT-V: Computational Geometry: One Dimensional Range Searching, Two Dimensional
Range Searching, Constructing a Priority Search Tree, Searching a Priority Search Tree, Priority
Range Trees, Quad-trees, k-D Trees. Recent Trends in Hashing, Trees, and various computational
--- Content provided by FirstRanker.com ---
geometry methods for efficiently solving the new evolving problemText Books:
1. Data Structures: A Pseudo-code Approach, 2/e, Richard F.Gilberg, Behrouz A.Forouzon,
Cengage
2. Data Structures, Algorithms and Applications in java, 2/e, Sartaj Sahni, University Press
--- Content provided by FirstRanker.com ---
Reference Books:
1. Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 2nd Edition, Pearson,
2004.
2. M T Goodrich, Roberto Tamassia, Algorit
--- Content provided by FirstRanker.com ---
hm Design, John Wiley, 2002.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
--- Content provided by FirstRanker.com ---
TP
C
I Year - I Semester
--- Content provided by FirstRanker.com ---
30
0
3
Advanced Computer Networks MTCNIS11XX
--- Content provided by FirstRanker.com ---
Course Objectives:
? To become familiar with the basics of Computer Networks.
? To learn Network architectures.
? To learn Concepts of fundamental protocols.
--- Content provided by FirstRanker.com ---
? To gain the knowledge of internetworking concepts.? To understand the knowledge of internetworking concepts in various applications.
? To acquire knowledge of implementation concepts in congestion control and error
detections.
--- Content provided by FirstRanker.com ---
Course Outcomes: At the end of the course, student will be able to? Classify network services, protocols and architectures, explain why they are layered.
? Knowledge on key Internet applications and their protocols, and ability to develop their own
applications (e.g. Client Server applications, Web Services) using the sockets API.
? Practical knowledge gained by hands-on sessions.
--- Content provided by FirstRanker.com ---
? Gain the knowledge of application layer protocol.? List the role and responsibilities of a system administrator and Create and administer user
accounts on both a Linux and Windows platform.
UNIT?I: Foundation- Building a Network, Requirements, Perspectives, Scalable Connectivity,
--- Content provided by FirstRanker.com ---
Cost-Effective Resource sharing, Support for Common Services, Manageability, Protocol layering,Performance, Bandwidth and Latency, Delay X Bandwidth Product, Perspectives on Connecting,
Classes of Links, Reliable Transmission, Stop-and-Wait , Sliding Window, Concurrent Logical
Channels.
UNIT?II: Internetworking- I- Switching and Bridging, Data-grams, Virtual Circuit Switching,
--- Content provided by FirstRanker.com ---
Source Routing, Bridges and LAN, Switches, Basic Internetworking (IP), What is an Internetwork?, Service Model, Global Addresses, Datagram Forwarding in IP, sub-netting and classless
addressing, Address Translation(ARP), Host Configuration(DHCP), Error Reporting(ICMP),
Virtual Networks and Tunnels.
--- Content provided by FirstRanker.com ---
UNIT?III: Internetworking- II- Network as a Graph, Distance Vector (RIP), Link State (OSPF),Metrics, The Global Internet, Routing Areas, Routing among Autonomous systems(BGP), IP
Version 6(IPv6), Mobility and Mobile IP.
UNIT?IV: End-to-End Protocols- Simple De-multiplexer (UDP), Reliable Byte Stream (TCP),
--- Content provided by FirstRanker.com ---
End-to-End Issues, Segment Format, Connecting Establishment and Termination, Sliding WindowRevisited, Triggering Transmission, Adaptive Retransmission, Record Boundaries, TCP
Extensions, Queuing Disciplines, FIFO, Fair Queuing, TCP Congestion Control, Additive
Increase/ Multiplicative Decrease, Slow Start, Fast Retransmit and Fast Recovery.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
UNIT?V: Congestion Control and Resource Allocation- Congestion-Avoidance Mechanisms,
DEC bit, Random Early Detection (RED), Source-Based Congestion
Avoidance.TheDomainNameSystem(DNS),ElectronicMail(SMTP,POP,IMAP,MIME),WorldWide
Web(HTTP),Network Management(SNMP) .
--- Content provided by FirstRanker.com ---
Text Books:
1. Larry Peterson and Bruce S Davis "Computer Networks: A System Approach" 5th Edition ,
Elsevier-2014
2. Douglas E Comer, "Internetworking with TCP/IP, Principles, Protocols and Architecture" 6th
--- Content provided by FirstRanker.com ---
Edition, PHI - 2014Reference Books:
1. Uyless Black "Computer Networks, Protocols , Standards and Interfaces" 2nd Edition - PHI
2. Behrouz A Forouzan "TCP/IP Protocol Suite" 4th Edition ? Tata McGraw-Hill.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
T
P
--- Content provided by FirstRanker.com ---
CI Year - I Semester
3
0
--- Content provided by FirstRanker.com ---
03
Distributed Systems MTCNIS11XX
Course Objectives:
--- Content provided by FirstRanker.com ---
? Students will get exposure to various Distributed Systems and their architectures? Students will get exposed to Remote Invocation and Distributed file systems.
? Students will learn the different communication mechanisms and its advantages and
disadvantages.
? Students will get exposure on transaction management and Replication.
--- Content provided by FirstRanker.com ---
Course Outcomes:
? Explain resource sharing in distributed systems and different system models used to
construct Distributed system network between systems
? Illustrate Distributed Objects and Remote Invocation
--- Content provided by FirstRanker.com ---
? Explore functional distributed file systems? Explain Distributed Transaction management, Coordination and Agreement between
distributed processes
? Design a distributed system that fulfills requirements with regards to key distributed
systems properties (such as scalability, transparency, etc)
--- Content provided by FirstRanker.com ---
UNIT I: Characterization of Distributed Systems: Introduction, Examples of DistributedSystems, Resource Sharing and the Web, Challenges. (6 hours) System Models: Introduction,
Architectural Models- Software Layers, System Architecture, Variations, Interface and Objects,
Design Requirements for Distributed Architectures, Fundamental Models- Interaction Model,
Failure Model, Security Model.
--- Content provided by FirstRanker.com ---
UNIT II: Distributed Objects and Remote Invocation: Introduction, Communication betweenDistributed Objects- Object Model, Distributed Object Modal, Design Issues for RMI,
Implementation of RMI, Distributed Garbage Collection; Remote Procedure Call, Events and
Notifications, Case Study: JAVA RMI
UNIT III: Distributed File Systems: Introduction, File Service Architecture; Peer-to-Peer
--- Content provided by FirstRanker.com ---
Systems: Introduction, Napster and its Legacy, Peer-to-Peer Middleware, Routing Overlays.UNIT IV: Coordination and Agreement: Introduction, Distributed Mutual Exclusion, Elections,
Multi-cast Communication.
UNIT V: Transactions & Replications: Introduction, System Model and Group Communication,
Concurrency Control in Distributed Transactions, Distributed Dead Locks, Transaction Recovery;
--- Content provided by FirstRanker.com ---
Replication-Introduction, Passive (Primary) Replication, Active Replication.Text Books:
1. George Coulouris, Jean Dollimore, Tim Kindberg, "Distributed Systems- Concepts and
Design", Fourth Edition, Pearson Publication
--- Content provided by FirstRanker.com ---
2. Ajay D Kshemkalyani, Mukesh Sighal, "Distributed Computing, Principles, Algorithms andSystems", Cambridge
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
LT
P
C
I Year - I Semester
--- Content provided by FirstRanker.com ---
3
0
0
3
--- Content provided by FirstRanker.com ---
Intrusion Detection & Prevention Systems (MTCNIS11XX)Course Objectives:
? Understand when, where, how, and why to apply Intrusion Detection tools and techniques
in order to improve the security posture of an enterprise.
--- Content provided by FirstRanker.com ---
? Apply knowledge of the fundamentals and history of Intrusion Detection in order to avoidcommon pitfalls in the creation and evaluation of new Intrusion Detection Systems
? Analyze intrusion detection alerts and logs to distinguish attack types from false alarms
Course Outcomes:
? Explain the fundamental concepts of Network Protocol Analysis and demonstrate the skill
--- Content provided by FirstRanker.com ---
to capture and analyze network packets.? Use various protocol analyzers and Network Intrusion Detection Systems as security tools
to detect network attacks and troubleshoot network problems.
UNIT-I: History of Intrusion detection, Audit, Concept and definition, Internal and external
threats to data, attacks, Need and types of IDS, Information sources Host based information
--- Content provided by FirstRanker.com ---
sources, Network based information sources.UNIT-II: Intrusion Prevention Systems, Network IDs protocol based Ids, Hybrid IDs, Analysis
schemes, thinking about intrusion. A model for intrusion analysis, techniques Responses
requirement of responses, types of responses mapping responses to policy Vulnerability analysis,
credential analysis non credential analysis.
--- Content provided by FirstRanker.com ---
UNIT-III: Introduction to Snort; Snort Installation Scenarios, Installing Snort, Running Snort onMultiple, Network
Interfaces, Snort Command Line Options. Step-By-Step Procedure to
Compile and Install Snort Location of Snort Files, Snort Modes Snort Alert Modes.
UNIT-IV: Working with Snort Rules, Rule Headers, Rule Options, and the Snort Configuration
--- Content provided by FirstRanker.com ---
File etc. Plug-in, Pre-processors and Output Modules, Using Snort with My-SQL.UNIT-V: Using ACID and Snort Scarf with Snort, Agent development for intrusion detection,
Architecture models of IDs and IPs.
--- Content provided by FirstRanker.com ---
Text Books:1. Rafeeq Rehman : " Intrusion Detection with SNORT, Apache, MySQL, PHP
and ACID," 1st Edition, Prentice Hall , 2003.
Reference Books:
1. Christopher Kruegel,Fredrik Valeur, Giovanni Vigna: "Intrusion Detection and
--- Content provided by FirstRanker.com ---
Correlation Challenges and Solutions", 1st Edition, Springer, 2005.2. Carl Endorf, Eugene Schultz and Jim Mellander " Intrusion Detection & Prevention", 1st Edition,
Tata McGraw-Hill, 2004.
3. Stephen Northcutt, Judy Novak : "Network Intrusion Detection", 3rd Edition, New Riders
Publishing, 2002
--- Content provided by FirstRanker.com ---
4. T. Fahringer, R. Prodan, "A Text book on Grid Application Development and Computing
Environment". 6th Edition, KhannaPublihsers, 2012.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
LT
P
C
I Year - I Semester
--- Content provided by FirstRanker.com ---
3
0
0
3
--- Content provided by FirstRanker.com ---
Data Storage Technologies and Networks MTCNIS11XXCourse Outcomes:
? To provide learners with a basic understanding of Enterprise Data Storage and Management
Technologies
--- Content provided by FirstRanker.com ---
? Study storage technologies: SAN, NAS, IP storage etc., which will bridge the gap between theemerging trends in industry and academics.
Course Outcomes:
? Explain the Optical, Semiconductor media and techniques for read/write operations
? Overview of Virtualization Technologies, Storage Area Network
--- Content provided by FirstRanker.com ---
? Discuss the Networked Attached Storage and Networking issues.? Classify the applications as per their requirements and select relevant SAN solutions.
UNIT-1: Storage Media and Technologies ? Magnetic, Optical and Semiconductor Media, Techniques
for read/write Operations, Issues and Limitations.
--- Content provided by FirstRanker.com ---
UNIT-II: Usage and Access ? Positioning in the Memory Hierarchy, Hardware and Software Design forAccess, Performance issues.
UNIT-III: Large Storages ? Hard Disks, Networked Attached Storage, Scalability issues, Networking
issues.
--- Content provided by FirstRanker.com ---
UNIT-IV: Storage Architecture - Storage Partitioning, Storage System Design, Caching, Legacy
Systems.
UNIT-V: Storage Area Networks ? Hardware and Software Components, Storage Clusters/Grids.
--- Content provided by FirstRanker.com ---
Storage QoS? Performance, Reliability and Security issues.Text Books:
1. The Complete Guide to Data Storage Technologies for Network-centric
Computing Paperback? Import, Mar 1998 by Computer Technology
Research Corporation
--- Content provided by FirstRanker.com ---
2. Data Storage Networking: Real World Skills for the CompTIA Storage by Nigel PoultonJAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaL
T
P
C
--- Content provided by FirstRanker.com ---
I Year - I Semester3
0
0
--- Content provided by FirstRanker.com ---
3Wireless Sensor Networks (MTCNIS11XX)
Course Objectives:
? Understanding of the various security attacks and knowledge to recognize and remove common
--- Content provided by FirstRanker.com ---
coding errors that lead to vulnerabilities.? Knowledge of outline of the techniques for developing a secure application.
? Recognize opportunities to apply secure coding principles.
Course Outcomes: At the end of the course, student will be able to
--- Content provided by FirstRanker.com ---
?Explain common wireless sensor node architectures.
?
Demonstrate knowledge of MAC protocols developed for WSN.
?
--- Content provided by FirstRanker.com ---
Demonstrate knowledge of routing protocols developed for WSN.?
Explain mobile data-centric networking principles.
?
Describe the WSN standards.
--- Content provided by FirstRanker.com ---
UNIT-I: Characteristics Of WSN: Characteristic requirements for WSN - Challenges for WSNs ?
WSN vs Adhoc Networks - Sensor node architecture ? Commercially available sensor nodes ?Imote,
IRIS, Mica Mote, EYES nodes, BTnodes, TelosB, Sunspot -Physical layer and transceiver design
considerations in WSNs, Energy usage profile, Choice of modulation scheme, Dynamic modulation
--- Content provided by FirstRanker.com ---
scaling, Antenna considerations.UNIT-II: Medium Access Control Protocols: Fundamentals of MAC protocols, Low duty cycle
protocols and wakeup concepts, Contention based protocols, Schedule-based protocols - SMAC ?
BMAC, Traffic-adaptive medium access protocol (TRAMA) - The IEEE 802.15.4 MAC protocol.
--- Content provided by FirstRanker.com ---
UNIT-III: Routing And Data Gathering Protocols Routing Challenges and Design Issues in Wireless
Sensor Networks, Flooding and gossiping ? Data centric Routing ? SPIN ? Directed Diffusion ? Energy
aware routing - Gradient-based routing - Rumor Routing ? COUGAR ? ACQUIRE ? Hierarchical
Routing - LEACH, PEGASIS ? Location Based Routing ? GF, GAF, GEAR, GPSR ? Real Time routing
--- Content provided by FirstRanker.com ---
Protocols ? TEEN, APTEEN, SPEED, RAP - Data aggregation - data aggregation operations -Aggregate Queries in Sensor Networks - Aggregation Techniques ? TAG, Tiny DB.
UNIT-IV: Embedded Operating Systems: Operating Systems for Wireless Sensor Networks ?
Introduction - Operating System Design Issues - Examples of Operating Systems ? TinyOS ? Mate ?
--- Content provided by FirstRanker.com ---
MagnetOS ? MANTIS - OSPM - EYES OS ? SenOS ? EMERALDS ? PicOS ? Introduction to Tiny OS? NesC ? Interfaces and Modules- Configurations and Wiring - Generic Components -Programming in
Tiny OS using NesC, Emulator TOSSIM.
UNIT-V: Applications Of WSN: WSN Applications - Home Control - Building Automation - Industrial
--- Content provided by FirstRanker.com ---
Automation - Medical Applications - Reconfigurable Sensor Networks - Highway Monitoring - MilitaryApplications - Civil and Environmental Engineering Applications - Wildfire Instrumentation - Habitat
Monitoring ? Nanoscopic Sensor Applications ? Case Study: IEEE 802.15.4 LR-WPANs Standard -
Target detection and tracking - Contour/edge detection - Field sampling.
--- Content provided by FirstRanker.com ---
Text Books :1. Kazem Sohraby, Daniel Minoli and Taieb Znati, " Wireless Sensor Networks
Technology, Protocols, and Applications", John Wiley & Sons, 2007.
2. Holger Karl and Andreas Willig, "Protocols and Architectures for Wireless
--- Content provided by FirstRanker.com ---
Sensor Networks", John Wiley & Sons, Ltd, 2005.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
Reference Books:
--- Content provided by FirstRanker.com ---
1. K. Akkaya and M. Younis, "A survey of routing protocols in wireless sensornetworks", Elsevier Ad Hoc Network Journal, Vol. 3, no. 3, pp. 325--349
2. Philip Levis, " TinyOS Programming" 3.Anna Ha?c, "Wireless Sensor Network Designs", John
Wiley & Sons Ltd,
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
--- Content provided by FirstRanker.com ---
TP
C
I Year - I Semester
--- Content provided by FirstRanker.com ---
30
0
3
Network Programming ( MTCNIS11XX)
--- Content provided by FirstRanker.com ---
Course Objectives:
? Students will gain the understanding of core network programming by using sockets and transport
layer protocols like TCP and UDP
? Students will gain the understanding of inter process communication and implementation of
--- Content provided by FirstRanker.com ---
different forms of IPC in client-server environment? Students will get an exposure to various application layer protocols which are designed using
sockets and transport layer protocols
Course Outcomes:
--- Content provided by FirstRanker.com ---
? Explain the client-server paradigm and socket structures.? Describe the basic concepts of TCP sockets and TCP echo client-server programs.
? Discuss the UDP sockets and UDP echo client-server programs.
? Explain Socket options and ability to understand IPC.
? Apply the applications of sockets and demonstrate skill to design simple applications like FTP,
--- Content provided by FirstRanker.com ---
TELNET etc.UNIT-I: Introduction to Network Programming: OSI model-transport layer protocols: TCP, UDP and
SCTP-network architecture: client-server and peer-to-peer systems, Sockets-socket Address structures:
IPv4, IPv6 and Generic-value result arguments-Byte ordering functions-Byte manipulation functions-
--- Content provided by FirstRanker.com ---
Address conversion functionsUNIT-II: TCP: introduction to TCP-TCP connection establishment and termination-TIME_WAIT State.
Elementary TCP sockets ? Socket-connect-bind-listen-accept-fork-exec function-concurrent servers-
Close function-read and write functions
--- Content provided by FirstRanker.com ---
UNIT-III: TCP echo client server program-getsockname and getpeername functions I/O multiplexing:
I/O models-Select function-TCP echo server using select function-shutdown function-Poll function
UNIT-IV: UDP: Introduction to UDP-difference between TCP and UDP-recvfrom( ) and sendto( )
--- Content provided by FirstRanker.com ---
functions-UDP echo client server program-UDP echo client server using select function. Socket Options:IPv4 socket options-IPv6 socket options
UNIT-V: Socket Options: Generic socket options-TCP socket options. IPC: Introduction to IPC-forms
of IPC-UNIX kernel support for pipes, FIFO, message queues, semaphores and shared memory Network
--- Content provided by FirstRanker.com ---
programming concepts Implementation: FTP-ping-arp-SMTP-TELNET--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
Text Books:
1. Unix Network programming, the socket networking API, W.Richard Stevens, bill fenner, Andrew
m.rudoff ,PHI.
--- Content provided by FirstRanker.com ---
References Books:
1. Advanced programming in the UNIX environment, W.Richard Stevens ,pearson education
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaL
T
P
C
--- Content provided by FirstRanker.com ---
I Year - I Semester2
0
0
--- Content provided by FirstRanker.com ---
2RESEARCH METHODOLOGY AND IPR
UNIT 1:
Meaning of research problem, Sources of research problem, Criteria Characteristics of a good research
problem, Errors in selecting a research problem, Scope and objectives of research problem. Approaches
--- Content provided by FirstRanker.com ---
of investigation of solutions for research problem, data collection, analysis, interpretation, Necessaryinstrumentations
UNIT 2:
Effective literature studies approaches, analysis Plagiarism, Research ethics, Effective technical writing,
how to write report, Paper Developing a Research Proposal, Format of research proposal, a presentation
--- Content provided by FirstRanker.com ---
and assessment by a review committeeUNIT 3:
Nature of Intellectual Property: Patents, Designs, Trade and Copyright. Process of Patenting and
Development: technological research, innovation, patenting, development. International Scenario:
International cooperation on Intellectual Property. Procedure for grants of patents, Patenting under PCT.
--- Content provided by FirstRanker.com ---
UNIT 4:Patent Rights: Scope of Patent Rights. Licensing and transfer of technology. Patent information and
databases. Geographical Indications.
UNIT 5:
New Developments in IPR: Administration of Patent System. New developments in IPR; IPR of
--- Content provided by FirstRanker.com ---
Biological Systems, Computer Software etc. Traditional knowledge Case Studies, IPR and IITs.REFERENCES:
(1) Stuart Melville and Wayne Goddard, "Research methodology: an introduction for science &
engineering students'"
(2) Wayne Goddard and Stuart Melville, "Research Methodology: An Introduction"
--- Content provided by FirstRanker.com ---
(3) Ranjit Kumar, 2nd Edition, "Research Methodology: A Step by Step Guide for beginners"(4) Halbert, "Resisting Intellectual Property", Taylor & Francis Ltd ,2007.
(5) Mayall, "Industrial Design", McGraw Hill, 1992.
(6) Niebel, "Product Design", McGraw Hill, 1974.
(7) Asimov, "Introduction to Design", Prentice Hall, 1962.
--- Content provided by FirstRanker.com ---
(8) (8) Robert P. Merges, Peter S. Menell, Mark A. Lemley, " Intellectual Property in NewTechnological Age", 2016.
(9) T. Ramappa, "Intellectual Property Rights Under WTO", S. Chand, 2008
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaL
T
P
C
--- Content provided by FirstRanker.com ---
I Year - I Semester0
0
4
--- Content provided by FirstRanker.com ---
2Transport Control Protocol/Internet Protocol (TCP/IP) Lab (MTCNIS1106)
Course Objectives: From the course the student will learn
? To understand the working principle of various communication protocols.
--- Content provided by FirstRanker.com ---
? To analyze the various routing algorithms and know the concept of data transfer between nodes.? Able to analyse a communication system by separating out the different functions provided by the
network, and understand that there are fundamental limits to any communications system;
? Understand the general principles behind multiplexing, addressing, routing, reliable transmission
and other stateful protocols as well as specific examples of each& understand what FEC is and
--- Content provided by FirstRanker.com ---
how CRCs work;? Able to compare communications systems in how they solve similar problems;
? View of both the internal workings of the Internet and of a number of common Internet
applications and protocols.
--- Content provided by FirstRanker.com ---
Course Outcomes:? Demonstrate data link layer functionalities.
? Develop the client server application using socket programming.
? Choose routing protocols to solve real world problems.
? Evaluate FTP, DNS/ HTTP of application layer functionalities.
--- Content provided by FirstRanker.com ---
Experiment 1
Implementation of Stop & Wait Protocol and Sliding Window Protocol.
Experiment 2
Study of Socket Programming and Client Server model.
--- Content provided by FirstRanker.com ---
Experiment 3Write a code simulating ARP /RARP protocols.
Experiment 4
Write a code simulating PING and TRACEROUTE commands.
--- Content provided by FirstRanker.com ---
Experiment 5
Create a socket for HTTP for web page upload and download.
Experiment 6
--- Content provided by FirstRanker.com ---
Write a program to implement RPC (Remote Procedure Call).--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
Experiment 7
Implementation of Sub-netting .
--- Content provided by FirstRanker.com ---
Experiment 8
Applications using TCP Sockets like
a. Echo client and echo server b. Chat
c. File Transfer
--- Content provided by FirstRanker.com ---
Experiment 9
Applications using TCP and UDP Sockets like
a.DNS b. SNMP
c. File Transfer
--- Content provided by FirstRanker.com ---
Experiment 10
Study of Network simulator (NS).and Simulation of Congestion Control Algorithms using NS.
Experiment 11
--- Content provided by FirstRanker.com ---
Configure a DNS server.Experiment 12
Implement the client for Simple Mail Transfer Protocol (SMTP).
--- Content provided by FirstRanker.com ---
Experiment 13Configure a mail server for IMAP/POP protocols and write a simple SMTP client to send and receive
mails.
Experiment 14
Configuring a Cisco Router as a DHCP Server.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
T
--- Content provided by FirstRanker.com ---
PC
I Year - I Semester
0
--- Content provided by FirstRanker.com ---
04
2
Advanced Data Structures Lab
Course Objectives:
--- Content provided by FirstRanker.com ---
From the course the student will learn? Knowing about oops concepts for a specific problem.
? Various advanced data structures concepts like arrays, stacks, queues, linked lists, graphs and
trees.
--- Content provided by FirstRanker.com ---
Course Outcomes:? Identify classes, objects, members of a class and relationships among them needed for a specific
problem.
? Examine algorithms performance using Prior analysis and asymptotic notations.
? Organize and apply to solve the complex problems using advanced data structures (like arrays,
--- Content provided by FirstRanker.com ---
stacks, queues, linked lists, graphs and trees.)? Apply and analyze functions of Dictionary
Experiment 1:
Implement Multi stacks.
--- Content provided by FirstRanker.com ---
Experiment 2:
Implement Double Ended Queue (De-queues) & Circular Queues.
Experiment 3:
Implement various Recursive operations on Binary Search Tree.
--- Content provided by FirstRanker.com ---
Experiment 4:Implement various Non-Recursive operations on Binary Search Tree.
Experiment 5:
Implement BFS for a Graph
Experiment 6:
--- Content provided by FirstRanker.com ---
Implement DFS for a Graph.Experiment 7:
Implement Merge & Heap Sort of given elements.
Experiment 8:
Implement Quick Sort of given elements.
--- Content provided by FirstRanker.com ---
Experiment 9:Implement various operations on AVL trees.
Experiment 10:
Implement B: Tree operations.
Experiment 11:
--- Content provided by FirstRanker.com ---
Implementation of Binary trees and Traversals (DFT, BFT)
Experiment 12:
Implement Kruskal's algorithm to generate a min-cost spanning tree.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaExperiment 13:
Implement Prim's algorithm to generate a min-cost spanning tree.
Experiment 14:
--- Content provided by FirstRanker.com ---
Implement functions of Dictionary using Hashing.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
LT
P
C
I Year - II Semester
--- Content provided by FirstRanker.com ---
3
0
0
3
--- Content provided by FirstRanker.com ---
Principles of Cyber SecurityCourse Objectives:
? To learn threats and risks within context of the cyber security architecture.
? Student should learn and Identify security tools and hardening techniques.
? To learn types of incidents including categories, responses and timelines for response.
--- Content provided by FirstRanker.com ---
Course Outcomes: At the end of the course, student will be able to
? Apply cyber security architecture principles.
? Describe risk management processes and practices.
? Appraise cyber security incidents to apply appropriate response
--- Content provided by FirstRanker.com ---
? Distinguish system and application security threats and vulnerabilities.? Identify security tools and hardening techniques
UNIT?I: Introduction to Cyber security- Cyber security objectives, Cyber security roles, Differences
between Information Security & Cyber security.
--- Content provided by FirstRanker.com ---
Cyber security Principles-Confidentiality, integrity, &availability Authentication& non- repudiation.
UNIT?II: Information Security (IS) within Lifecycle Management-Lifecycle management landscape,
Security architecture processes, Security architecture tools, Intermediate lifecycle management concepts.
--- Content provided by FirstRanker.com ---
Risks & Vulnerabilities-Basics of risk management, Operational threat environments, Classes of attacks.UNIT?III: Incident Response- Incident categories, Incident response Incident recovery.
Operational security protection: Digital and data assets, ports and protocols, Protection technologies,
Identity and access Management, configuration management.
UNIT?IV: Threat Detection and Evaluation (DE): Monitoring- Vulnerability Management, Security
--- Content provided by FirstRanker.com ---
Logs and Alerts, Monitoring Tools and Appliances.Analysis- Network traffic Analysis, packet capture and analysis
UNIT?V: Introduction to backdoor System and security-Introduction to metasploit, Backdoor,
demilitarized zone(DMZ),Digital Signature, Brief study on Harding of operating system.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
Text Books:
--- Content provided by FirstRanker.com ---
1. NASSCOM: Security Analyst Student Hand Book Dec 2015.2. Information Security Management Principles Updated Edition by David Alexander, Amanda
Finch, David Sutton ,Published by BCS, June 2013.
Reference Books:
--- Content provided by FirstRanker.com ---
1. CSX- cyber security fundamentals 2 nd edition, Published by ISACA, Cyber security, NetworkSecurity, Data Governance Security.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
T
--- Content provided by FirstRanker.com ---
PC
I Year - II Semester
3
--- Content provided by FirstRanker.com ---
00
3
Cyber Crime Investigation and Digital Forensics
--- Content provided by FirstRanker.com ---
Course Objectives:? Able to identify security risks and take preventive steps
? To understand the forensics fundamentals.
? To understand the evidence capturing process.
? To understand the preservation of digital evidence
--- Content provided by FirstRanker.com ---
Course Outcomes: At the end of the course, student will be able to
? Acquire the definition of computer forensics fundamentals.
? Describe the types of computer forensics technology
? Analyze various computer forensics systems.
--- Content provided by FirstRanker.com ---
? Illustrate the methods for data recovery, evidence collection and data seizure.? Summarize duplication and preservation of digital evidence.
UNIT?I: Introduction: Introduction and Overview of Cyber Crime, Nature and Scope of Cyber
Crime, Types of Cyber Crime: Social Engineering, Categories of Cyber Crime, Property Cyber Crime.
--- Content provided by FirstRanker.com ---
UNIT?II: Cyber Crime Issues: Unauthorized Access to Computers, Computer Intrusions, White
collar Crimes, Viruses and Malicious Code, Internet Hacking and Cracking, Virus Attacks,
Pornography, Software Piracy, Intellectual Property, Mail Bombs, Exploitation ,Stalking and
Obscenity in Internet, Digital laws and legislation, Law Enforcement Roles and Responses.
--- Content provided by FirstRanker.com ---
UNIT?III: Investigation: Introduction to Cyber Crime Investigation, Investigation Tools, e-Discovery, Digital Evidence Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking,
IP Tracking, E-Mail Recovery, Hands on Case Studies. Encryption and Decryption Methods, Search
and Seizure of Computers, Recovering Deleted Evidences, Password Cracking.
--- Content provided by FirstRanker.com ---
UNIT?IV: Digital Forensics: Introduction to Digital Forensics, Forensic Software and Hardware,Analysis and Advanced Tools, Forensic Technology and Practices, Forensic Ballistics and Photography,
Face, Iris and Fingerprint Recognition, Audio Video Analysis, Windows System Forensics,
Linux System Forensics, Network Forensics.
UNIT? V: Laws And Acts: Laws and Ethics, Digital Evidence Controls, Evidence Handling
--- Content provided by FirstRanker.com ---
Procedures, Basics of Indian Evidence ACT IPC and CrPC , Electronic Communication Privacy ACT,Legal Policies.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
Text Books:
1. Cyber Security (with CD): Understanding Cyber Crimes, Computer Forensics and Legal Perspectives
--- Content provided by FirstRanker.com ---
(Wind), by Nina Godbole, Sunit Belapure, wileyReference Books:
1. Nelson Phillips and EnfingerSteuart, "Computer Forensics and Investigations", Cengage
Learning,New Delhi, 2009.
2. Kevin Mandia, Chris Prosise, Matt Pepe, "Incident Response and Computer Forensics",
--- Content provided by FirstRanker.com ---
TataMcGraw-Hill, New Delhi, 2006.3. Robert M Slade," Software Forensics", Tata McGraw - Hill, New Delhi, 2005
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
T
P
--- Content provided by FirstRanker.com ---
CI Year - II Semester
3
0
--- Content provided by FirstRanker.com ---
03
Wireless and Mobile Security
Course Objective:
--- Content provided by FirstRanker.com ---
? Student able to learn issues and technologies involved in designing a wireless and mobilesystem that is robust against various attacks
? To learn and understand Application Level Security in Wireless Networks
? Understand and apply the knowledge in real time applications
Course Outcomes: After the completion of the course, student will be able to
--- Content provided by FirstRanker.com ---
? Familiarize with the issues and technologies involved in designing a wireless and mobile systemthat is robust against various attacks.
? Gain knowledge and understanding of the various ways in which wireless networks can be
attacked and tradeoffs in protecting networks.
? Have a broad knowledge of the state-of-the-art and open problems in wireless and mobile security,
--- Content provided by FirstRanker.com ---
thus enhancing their potential to do research or pursue a career in this rapidly developing area.? Learn various security issues involved in cloud computing.
? Learn various security issues related to GPRS and 3G.
UNIT- I : Security Issues in Mobile Communication: Mobile Communication History, Security ?
Wired Vs Wireless, Security Issues in Wireless and Mobile Communications, Security Requirements in
--- Content provided by FirstRanker.com ---
Wireless and Mobile Communications, Security for Mobile Applications, Advantages and Disadvantagesof Application ? level Security.
UNIT-II: Security of Device, Network, and Server Levels: Mobile Devices Security Requirements,
Mobile Wireless network level Security, Server Level Security.
--- Content provided by FirstRanker.com ---
Application Level Security in Wireless Networks: Application of WLANs, Wireless Threats, SomeVulnerabilities and Attach Methods over WLANs, Security for 1G Wi-Fi Applications, Security for 2G
Wi-Fi Applications, Recent Security Schemes for Wi-Fi Applications
UNIT -III : Application Level Security in Cellular Networks: Generations of Cellular Networks,
--- Content provided by FirstRanker.com ---
Security Issues and attacks in cellular networks, GSM Security for applications, GPRS Security forapplications, UMTS security for applications, 3G security for applications, Some of Security and
authentication Solutions.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
UNIT-IV: Application Level Security in MANETs: MANETs, Some applications of MANETs,
MANET Features, Security Challenges in MANETs, Security Attacks on 3MANETs, External Threats
--- Content provided by FirstRanker.com ---
for MANET applications, Internal threats for MANET Applications, Some of the Security Solutions.Ubiquitous Computing, Need for Novel Security Schemes for UC, Security Challenges for UC, and
Security Attacks on UC networks, some of the security solutions for UC.
UNIT -V : Data Center Operations - Security challenge, implement "Five Principal Characteristics of
--- Content provided by FirstRanker.com ---
Cloud Computing, Data center Security Recommendations Encryption for Confidentiality and Integrity,Encrypting data at rest, Key Management Lifecycle, Cloud Encryption Standards.
Text Books:
1. PallapaVenkataram, SatishBabu: "Wireless and Mobile Network Security", 1st Edition, Tata
--- Content provided by FirstRanker.com ---
McGraw Hill,2010.2. Frank Adelstein, K.S.Gupta: "Fundamentals of Mobile and Pervasive Computing", 1st Edition, Tata
McGraw Hill 2005.
References Books:
--- Content provided by FirstRanker.com ---
1. Randall k. Nichols, Panos C. Lekkas: "Wireless Security Models, Threats and Solutions", 1st
Edition, Tata McGraw Hill, 2006.
2. Bruce Potter and Bob Fleck: "802.11 Security", 1st Edition, SPD OREILLY 2005.
--- Content provided by FirstRanker.com ---
3. James Kempf: "Guide to Wireless Network Security, Springer. Wireless Internet Security ?Architecture and Protocols", 1st Edition, Cambridge University Press, 2008.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
LT
P
C
I Year - II Semester
--- Content provided by FirstRanker.com ---
3
0
0
3
--- Content provided by FirstRanker.com ---
Android Security Design and InternalsCourse Objectives:
? To study about the basic architecture of Android and its features
? To learn the various natures of permission in Android Platform
--- Content provided by FirstRanker.com ---
? To implement a simple Android APK following Secure coding principles? To understand and implement the various services provided through Android platform
? To build and secure custom Android ROM.
Course Outcomes:
? Explain the Android Security model
--- Content provided by FirstRanker.com ---
? Describe the various natures of permission in Android Platform? Build a Secure Smartphone Society
? Explain the secure custom Android ROM
UNIT-I: Android Security Model- Linux Kernel- Native User space ? Dalvik VM- Java Run Time
--- Content provided by FirstRanker.com ---
Libraries- System Services- IPC- Binder's- Framework Libraries- Applications- Sandboxing- CodeSigning and Platform Key- SELinux- System Updates- Verified Boot.
UNIT-II: Permissions-Nature of Permission- Request for permission- Management- Protecting Levels-
Assignment- Enforcement- System Permission- Shared User ID- Custom Permission? Broadcast
--- Content provided by FirstRanker.com ---
Permissions- Content Provider Permission- Pending Intents.UNIT- III: Introduction to Secure Coding-Building a Secure Smartphone Society - Developer's
Context- Steps to Install Sample Codes into Android Studio- Android Application Security- Handling
Input Data Carefully and Securely.
--- Content provided by FirstRanker.com ---
UNIT-IV: Application Development :Creating/Using Activities- Receiving/Sending Broadcasts.-Creating/Using Content Providers- Creating/Using Services- Using SQLite- Handling Files- Using
Browsable Intent- Outputting Log to Log Cat- Using Web View- Using Notifications.
UNIT-V ? Secure Functions: Building custom Android ROM- Steps and Tools, Creating Password
Input Screens-Permission and Protection Level- Add In-house Accounts to Account Manager-
--- Content provided by FirstRanker.com ---
Communicating via HTTPS- Handling privacy data- Using Cryptography- Using fingerprintauthentication features- Risk of Information Leakage from Clipboard.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
Text Books:
--- Content provided by FirstRanker.com ---
1. Nikolay Elenkov, "Android Security Internals: An In-Depth Guide to Android's Security ", ISBN-13:978-1-59327-581-5, reprint, No Starch Press,2014.
2. Japan Smartphone Security Association, "Android Application Secure Design/Secure Coding
Guidebook", JSSEC-TECA-SC-GD20170201BE, Secure Coding Working Group, February 1, 2017
Edition.
--- Content provided by FirstRanker.com ---
Reference Books:1. "Application Security for the Android Platform", Jeff Six ,O'Reilly Media, Inc., 2011.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
LT
P
C
I Year - II Semester
--- Content provided by FirstRanker.com ---
3
0
0
3
--- Content provided by FirstRanker.com ---
Firewall and VPN SecurityCourse Objectives:
? Identify and assess current and anticipated security risks and vulnerabilities
? Develop a network security plan and policies
--- Content provided by FirstRanker.com ---
? Establish a VPN to allow IPSec remote access traffic? Monitor, evaluate and test security conditions and environment
? Develop critical situation contingency plans and disaster recovery plan
? Implement/test contingency and backup plans and coordinate with stakeholders
? Monitor, report and resolve security problems
--- Content provided by FirstRanker.com ---
Course Outcomes: At the end of the course, student will be able to
? To show the fundamental knowledge of Firewalls and it types
? Construct a VPN to allow Remote Access, Hashing, connections with Cryptography and VPN
Authorization
--- Content provided by FirstRanker.com ---
? Elaborate the knowledge of depths of Firewalls, Interpreting firewall logs, alerts, Intrusion andDetection
? Infer the design of Control Systems of SCAD, DCS, PLC's and ICS's
UNIT ? I: Firewall Fundamentals: Introduction, Types of Firewalls, Ingress and Egress Filtering,
Types of Filtering, Network Address Translation (NAT), Application Proxy, Circuit Proxy, Content
--- Content provided by FirstRanker.com ---
Filtering, Software versus Hardware Firewalls, IPv4 versus IPv6 Firewalls, Dual-Homed and Triple-Homed Firewalls, Placement of Firewalls.
UNIT ?II: VPN Fundamentals: VPN Deployment Models and Architecture, Edge Router, Corporate
Firewall, VPN Appliance, Remote Access, Site-to-Site, Host-to-Host, Extranet Access, Tunnel versus
Transport Mode, The Relationship Between Encryption and VPNs, Symmetric Cryptography,
--- Content provided by FirstRanker.com ---
Asymmetric Cryptography, Hashing, Establishing VPN Connections with Cryptography, DigitalCertificates, VPN Authorization.
UNIT?III: Exploring the Depths of Firewalls: Firewall Rules, Authentication and Authorization,
Monitoring and Logging, Understanding and Interpreting Firewall Logs and Alerts, Intrusion Detection,
Limitations of Firewalls, Downside of Encryption with Firewalls, Firewall Enhancements, Management
--- Content provided by FirstRanker.com ---
Interfaces.UNIT ?IV: Overview of Industrial Control Systems: Overview of SCADA, DCS, and PLCs, ICS
Operation, Key ICS Components, Control Components, Network Components, SCADA Systems,
Distributed Control Systems, Programmable Logic Controllers, Industrial Sectors and Their
Interdependencies.
--- Content provided by FirstRanker.com ---
UNIT ? V: SCADA Protocols: Modbus RTU, Modbus TCP/IP, DNP3, DNP3 TCP/IP, OPC, DA/HAD,
SCADA protocol fuzzing, Finding Vulnerabilities in HMI: software- Buffer Overflows, Shell code.
Previous attacks Analysis- Stuxnet, Duqu.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
Text Books:1. Michael Stewart "Network Security, Firewalls, and VPNs" Jones & Bartlett Learning September
2010.
2. T. Macaulay and B. L. Singer, Cyber security for Industrial Control Systems: SCADA, DCS, PLC,
HMI, and SIS, Auerbach Publications, 2011.
--- Content provided by FirstRanker.com ---
3. J. Lopez, R. Setola, and S. Wolthusen, Critical Infrastructure Protection Information InfrastructureModels, Analysis, and Defense, Springer-Verlag Berlin Heidelberg, 2012.
Reference Books:
1. J. Lopez, R. Setola, and S. Wolthusen, Critical Infrastructure Protection Information Infrastructure
--- Content provided by FirstRanker.com ---
Models, Analysis, and Defense, Springer-Verlag Berlin Heidelberg, 2012.2. Robert Radvanovsky and Jacob Brodsky, editors. Handbook of SCADA/Control Systems Security.
CRC Press, 2013.
3. A.W. Colombo, T. Bangemann, S. Karnouskos, S. Delsing, P. Stluka, R. Harrison, et al. Industrial
cloud-based cyber-physical systems Springer International Publishing, 2014.
--- Content provided by FirstRanker.com ---
4. D. Bailey, Practical SCADA for Industry. Burlington, MA: Newnes, 2003.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaL
T
P
C
--- Content provided by FirstRanker.com ---
I Year - II Semester3
0
0
--- Content provided by FirstRanker.com ---
3Information Theory & Coding
Course Objectives:
--- Content provided by FirstRanker.com ---
? The objective of this course is to provide an insight to information coding techniques, errorcorrection mechanism.
? To learn various compression techniques for text, video and image are covered for thorough
knowledge of efficient information conveying systems.
--- Content provided by FirstRanker.com ---
Course Outcomes:? Explain the basic concepts of principles and applications of information theory.
? How information is measured in terms of probability and entropy.
? Describe the coding schemes, including error correcting codes, The Fourier perspective and
extensions to wavelets, complexity, compression
--- Content provided by FirstRanker.com ---
? Explain the concepts of efficient coding of audio-visual information.UNIT-I: Information and entropy information measures, Shannon's concept of Information. Channel
coding, channel mutual information capacity (BW)
UNIT-II: Theorem for discrete memory less channel, information capacity theorem, Error detecting and
--- Content provided by FirstRanker.com ---
error correcting codesUNIT-III: Types of codes: block codes, Hamming and Lee metrics, description of linear block codes,
parity check Codes, cyclic code, Masking techniques,
UNIT-IV: Compression: loss less and loss, Huffman codes, LZW algorithm, Binary Image compression
schemes, run length encoding, CCITT group 3 1-DCompression, CCITT group 3 2D compression,
--- Content provided by FirstRanker.com ---
CCITT group 4 2DCompression.UNIT-V: Convolution codes, sequential decoding. Video image Compression: CITT H 261 Video coding
algorithm, audio (speech) Compression. Cryptography and cipher, Case study of CCITT group 3 1
Decompression, CCITT group 3 2D compression.
Text Books:
--- Content provided by FirstRanker.com ---
1. Fundamentals in information theory and coding, Monica Borda,Springer.2. Communication Systems: Analog and digital, Singh and Sapre, TataMcGraw Hill.
3. Multimedia Communications Fred Halsall.
Reference Books:
1. Information Theory, Coding and Cryptography R Bose.
--- Content provided by FirstRanker.com ---
2. Multimedia system Design Prabhat K Andleigh and Kiran Thakrar.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
--- Content provided by FirstRanker.com ---
TP
C
I Year - II Semester
--- Content provided by FirstRanker.com ---
30
0
3
Vulnerability Assessment & Penetration Testing
--- Content provided by FirstRanker.com ---
Course Objectives:? To identify security vulnerabilities and weaknesses in the target applications.
? To identify how security controls can be improved to prevent hackers gaining access to operating
systems and networked environments.
? To test and exploit systems using various tools.
--- Content provided by FirstRanker.com ---
? To understand the impact of hacking in real time machines.Course Outcomes:
? Explain Penetration testing phases
? Illustrate information gathering methodologies
? Apply System Hacking Techniques in real time applications
--- Content provided by FirstRanker.com ---
? Describe Bypassing WLAN AuthenticationUNIT-I: Introduction: Penetration Testing phases/Testing Process, types and Techniques, Blue/Red
Teaming, Strategies of Testing, Non Disclosure Agreement Checklist, Phases of hacking, Open-
source/proprietary Pentest Methodologies
--- Content provided by FirstRanker.com ---
UNIT II - Information Gathering and Scanning: Information gathering methodologies- Foot printing,Competitive Intelligence- DNS Enumerations- Social Engineering attacks, Port Scanning-Network
Scanning- Vulnerability Scanning- NMAP scanning tool- OS Fingerprinting- Enumeration.
UNIT III - System Hacking: Password cracking techniques- Key loggers- Escalating privileges- Hiding
Files, Double Encoding, Steganography technologies and its Countermeasures. Active and passive
--- Content provided by FirstRanker.com ---
sniffing- ARP Poisoning, MAC Flooding- SQL Injection - Error- based, Union-based, Time-based, BlindSQL, Out-of-band. Injection Prevention Techniques.
UNIT IV - Advanced System Hacking: Broken Authentication, Sensitive Data Exposure, XML External
Entities, Broken Access Code, XSS - Stored, Reflected, DOM Based
UNIT- V: Wireless Pentest: Wi-Fi Authentication Modes, Bypassing WLAN Authentication, Types of
--- Content provided by FirstRanker.com ---
Wireless Encryption, WLAN Encryption Flaws, AP Attack, Attacks on the WLAN Infrastructure, DoS-Layer1, Layer2, Layer 3, DDoS Attack, Client Misassociation, Wireless Hacking Methodology, Wireless
Traffic Analysis
Text Books:
1. Kali Linux 2: Windows Penetration Testing, By Wolf Halton, Bo Weaver , June 2016 Packt
--- Content provided by FirstRanker.com ---
PublishingReference Books:
1. Mastering Modern Web Penetration Testing By Prakhar Prasad,October 2016 Packt Publishing.
2. SQL Injection Attacks and Defense 1st Edition, by Justin Clarke-Salt, Syngress Publication
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
T
P
--- Content provided by FirstRanker.com ---
CI Year - II Semester
3
0
--- Content provided by FirstRanker.com ---
03
Cloud & IoT Security
Course Objectives:
--- Content provided by FirstRanker.com ---
? Student learn and understand the advantages, challenges, security issues of cloud computing andinterrelationships between cloud computing and big data.
? Student learns different Key components of Amazon Web Services, Cloud Backup and solutions.
? Student able to discuss the main threats and attacks on IoT products and services
? Be able to learn secure a connected IoT product from scratch.
--- Content provided by FirstRanker.com ---
Course Outcomes: At the end of the course, student will be able to
? Define Cloud Computing and memorize the different Cloud services and deployment models
? Assessing the financial, technological, and organizational capacity of employer's for actively
initiating and installing cloud-based applications.
--- Content provided by FirstRanker.com ---
? Explain how IOT can be used in different Industries.? Discuss how companies can plan for the future of technologies.
? How to apply smart applications in real world.
UNIT?I: Cloud Computing Fundamental-Cloud Computing definition, private, public and hybrid
cloud. Cloud types; IaaS, PaaS, SaaS. Benefits and challenges of cloud computing, public vs private
--- Content provided by FirstRanker.com ---
clouds, role of virtualization in enabling the cloudUNIT?II: Cloud Applications-Development environments for service development; Amazon, Azure,
Google App. Security management in the cloud ? security management standards- SaaS, PaaS, IaaS
availability management- access control- Data security and storage in cloud
--- Content provided by FirstRanker.com ---
UNIT?III: The Internet of Things-An Overview of Internet of things, Internet of Things Technology,behind IoTs Sources of the IoTs, M2M Communication, Examples OF IoTs, Design Principles For
Connected Devices Internet Connectivity Principles, Internet connectivity, Application Layer Protocols:
HTTP, HTTPS, FTP, Telnet
UNIT?IV: IOT Design-Business Models for Business Processes in the Internet of Things ,IoT/M2M
--- Content provided by FirstRanker.com ---
systems LAYERS AND designs standardizations ,Modified OSI Stack for the IoT/M2M Systems ,ETSIM2M domains and High-level capabilities ,Communication Technologies, Data Enrichment and
Consolidation and Device Management Gateway Ease of designing and affordability
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
UNIT?V: IOT Security Issues- Secure constrained devices, Authorize and authenticate devices, Manage
--- Content provided by FirstRanker.com ---
device updates, secure communication, Ensure data privacy and integrity, secure web, mobile, and cloudapplications, Ensure high availability, Detect vulnerabilities and incidents, Manage vulnerabilities,
Predict and preempt security issues.
Text Books:
--- Content provided by FirstRanker.com ---
1. Internet of Things: Architecture, Design Principles And Applications, Raj kamal, McGraw HillHigher Education
2. Internet of Things, A. Bahgya and V. Madisetti, Univesity Press, 2015
Reference Books:
1. Gautam Shroff, Enterprise Cloud Computing Technology Architecture
--- Content provided by FirstRanker.com ---
Applications2. Toby Velte, Anthony Velte, Robert Elsenpeter, Cloud Computing, A
Practical Approach
3. IOT Security Issues by Alasdair Gilchrist, O'Reilly Publishers, 2017.
4. Tim Mather, Subra Kumara swamy, Shahed Latif, Cloud Security and Privacy: An Enterprise
--- Content provided by FirstRanker.com ---
Perspective on Risks and Compliance.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
LT
P
C
I Year - II Semester
--- Content provided by FirstRanker.com ---
3
0
0
3
--- Content provided by FirstRanker.com ---
Applied CryptographyCourse Objectives:
? Student learns the basic concepts of symmetric cryptography and simple encryption methods.
? An understanding of the RSA cryptosystem, the mathematics used in the system, and the ability to
--- Content provided by FirstRanker.com ---
encrypt and decrypt clear text using the system.? To learn the properties of message authentication codes and the ability to use hash functions to build
a message authentication code.
Course Outcomes: At the end of the course, student will be able to
--- Content provided by FirstRanker.com ---
? Demonstrate the basics of Cryptographic protocols? Explain the concepts of Stream Ciphers and Public Key Encryption
? Demonstrate Number Theory for Symmetric and Asymmetric Ciphers and discuss various Ciphers
? Discuss Hashing Algorithms and Message Authentication Codes
? Discuss Key-Exchange algorithms and Real world Implementations
--- Content provided by FirstRanker.com ---
UNIT ? I: Foundations: Protocol Building Blocks, Basic Protocols, Advanced Protocols - Zero-
Knowledge Proofs, Zero-Knowledge Proofs of Identity, Blind Signatures, Identity-Based Public-Key
Cryptography, Key Length, Key Management, Electronic Codebook Mode, Block Replay, Cipher
Block Chaining Mode, Stream Ciphers, Self-Synchronizing Stream Ciphers, Cipher- Feedback Mode,
--- Content provided by FirstRanker.com ---
Synchronous Stream Ciphers, Output-Feedback Mode, Counter Mode, Other Block-Cipher Modes,Choosing a Cipher Mode.
UNIT ? II: Information Theory, Complexity Theory, Number Theory, Factoring, Prime Number
Generation, Discrete Logarithms in a Finite Field, Data Encryption Standard (DES), IDEA, CAST,
Blowfish, RC5, Double Encryption, Triple Encryption.
--- Content provided by FirstRanker.com ---
UNIT ? III: Pseudo-Random-Sequence Generators and Stream Ciphers- Linear Congruential
Generators, Linear Feedback Shift Registers, Stream Ciphers using LFSRs, RC4, Feedback with Carry
Shift Registers, Stream Ciphers Using FCSRs, Nonlinear-Feedback Shift Registers, Other Stream
Ciphers, One-Way Hash Functions- MD5, Secure Hash Algorithm (SHA), One Way Hash Functions
--- Content provided by FirstRanker.com ---
Using Symmetric Block, Using Public Key Algorithms, Message Authentication Codes.UNIT ? IV:
Public-Key Algorithms, Knapsack Algorithms, RSA, Rabinm ElGamal, Elliptic Curve Cryptosystems,
Digital Signature Algorithm (DSA), DSA Variants, Gost Digital Signature Algorithm, Discrete
--- Content provided by FirstRanker.com ---
Logarithm Signature Schemes, Ong-Schnorr-Shamir, Schnorr, Converting Identification Schemes toSignature Schemes.
UNIT ? V:
Diffie- Hellman, Station-to-Station Protocol, Multiple-Key Public-Key Cryptography, Subliminal
--- Content provided by FirstRanker.com ---
Channel, Undeniable Digital Signatures, Designated Confirmer Signatures, Kerberos, Privacy-EnhancedMail (PEM), Message Security Protocol (MSP), Pretty Good Privacy (PGP), Smart Cards, Public-Key
Cryptography Standards (PKCS).
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
Text Books:
--- Content provided by FirstRanker.com ---
1. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition, Bruce Schneier,John Wiley & Sons Inc, 1996
2. Cryptography and Network Security, 6th Edition, William Stallings, Pearson Education, March 2013
Reference Books:
--- Content provided by FirstRanker.com ---
1. Modern Cryptography Theory and Practicel, Wenbo Mao, Pearson Education, 20042. Cryptography and network security, Behrouz A. Forouzan, McGraw-Hill, Inc., 2008
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
LT
P
C
I Year - II Semester
--- Content provided by FirstRanker.com ---
3
0
0
3
--- Content provided by FirstRanker.com ---
Secure CodingCourse Objectives:
? Understanding of the various security attacks and knowledge to recognize and remove common
coding errors that lead to vulnerabilities.
? Knowledge of outline of the techniques for developing a secure application.
--- Content provided by FirstRanker.com ---
? Recognize opportunities to apply secure coding principles.Course Outcomes: At the end of the course, student will be able to
? List of secure systems and various security attacks
? Demonstrate the development of process of software leads to secure coding practices
? Apply Secure programs and various risk in the software's
--- Content provided by FirstRanker.com ---
? Classify various errors that lead to vulnerabilities? Design Real time software and vulnerabilities
UNIT?I: Introduction-Need for secure systems, Proactive security development process, Security
principles to live by and threat modeling.
UNIT?II: Secure Coding in C-Character strings- String manipulation errors, String Vulnerabilities and
--- Content provided by FirstRanker.com ---
exploits Mitigation strategies for strings, Pointers, Mitigation strategies in pointer basedvulnerabilities Buffer Overflow based vulnerabilities
UNIT?III: Secure Coding in C++ and Java-Dynamic memory management, Common errors in
dynamic memory management, Memory managers, Double ?free vulnerabilities, Integer security,
Mitigation strategies
--- Content provided by FirstRanker.com ---
UNIT?IV: Database and Web Specific Input Issues-Quoting the Input, Use of stored procedures,Building SQL statements securely, XSS related attacks and remedies
UNIT?V: Software Security Engineering-Requirements engineering for secure software: Misuse
and abuse cases, SQUARE process model Software security practices and knowledge for architecture
and design
--- Content provided by FirstRanker.com ---
Text Book:1. Michael Howard, David LeBlanc, "Writing Secure Code", Microsoft Press, 2nd Edition, 2003.
Reference Books:
1. Robert C. Seacord, "Secure Coding in C and C++", Pearson Education, 2nd edition, 2013.
2. Julia H. Allen, Sean J. Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead, "Software Security
--- Content provided by FirstRanker.com ---
Engineering: A guide for Project Managers", Addison-Wesley Professional, 2008.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
--- Content provided by FirstRanker.com ---
TP
C
I Year - II Semester
--- Content provided by FirstRanker.com ---
00
4
2
Cyber Security Lab
--- Content provided by FirstRanker.com ---
Course Objectives:
? Student to get the knowledge about audit and information security management, which makes the
student to get the real world experience.
? To learn and implement Data leakage in a website database
--- Content provided by FirstRanker.com ---
Course Outcomes: At the end of the course, student will be able to? Analyze and implement Audit security policy in windows environment, create a Demilitarized
zone creation in Network environment
? Illustrate the Resource harvesting attack and mitigation, Window Patch management policy, Trojans
and mitigation strategies
--- Content provided by FirstRanker.com ---
? Apply the knowledge of metasploit, Access control list creation and content filtering limiting thetraffic
? Explain the Data leakage in a website database, Password policy and verification, Patch
management using MBSA tool on windows machine
? Build an Audit Policy management, Media handling policy and event log analysis and Installation of
--- Content provided by FirstRanker.com ---
Trojan, Network DOS attack and proof of bandwidth utilizationExercise ? 1:
Audit security policy implementation in windows environment.
--- Content provided by FirstRanker.com ---
Exercise ? 2:Create a Demilitarized zone creation in Network environment for information security.
Exercise ? 3:
Implement Resource harvesting attack and mitigation.
Exercise ? 4:
--- Content provided by FirstRanker.com ---
Implement Window Patch management policy.Exercise ? 5:
Knowing the Behavior of Trojans and mitigation strategies.
Exercise- 6
Create a metasploit and make it to implement.
--- Content provided by FirstRanker.com ---
Exercise-7Access control list creation and content filtering limiting the traffic.
Exercise-8
Data leakage in a website database and preventive measures.
--- Content provided by FirstRanker.com ---
Exercise-9Password policy implementations and verification.
Exercise-10
Patch management implementation using MBSA tool on windows machine
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaExercise-11
Audit Policy management for users and computers log analysis.
Exercise-12
Media handling policy implementation and event log analysis.
--- Content provided by FirstRanker.com ---
Exercise-13Installation of Trojan and study of different options.
Exercise-14
Network DOS attack and proof of bandwidth utilization and preventive steps.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
T
P
--- Content provided by FirstRanker.com ---
CI Year - II Semester
0
0
--- Content provided by FirstRanker.com ---
42
Cyber Crime Investigation and Digital Forensic Lab
Course Objectives:
--- Content provided by FirstRanker.com ---
? Investigate cybercrime and collect evidences? Able to use knowledge of forensic tools and software
? To understand the preservation of digital evidence.
? To learn about stenography Perceptual models
--- Content provided by FirstRanker.com ---
Course Outcomes: At the end of the course, student will be able to? Identify the importance of a systematic procedure for investigation of data found on digital storage
media that might provide evidence of wrong-doing.
? Construct the file system storage mechanisms of two common desktop opera ting systems and
forensics tools used in data analysis.
--- Content provided by FirstRanker.com ---
? List and Implement all running processes, network connections from a memory image and findwhether a firewall is set by analyzing a memory image.
? Define and perform live incident response on a system, View all browser history and List out all
established network connections in a computer (Hint: Triage Incident Response).
Experiment- 1
--- Content provided by FirstRanker.com ---
Evidence Collectiona) Linux: Capturing RAM dump using fmem
https://github.com/NateBrune/fmem
i) dcfldd if=/dev/fmem of=memory.dump hash=sha256
sha256log=memory.dump.sha256 bs=1MB count=1000
--- Content provided by FirstRanker.com ---
b) Linux: Capturing Disk using dflddhttps://www.obsidianforensics.com/blog/imaging-using-dcfldd
i) dcfldd if=/dev/sdb1 of=/media/disk/test_image.dd hash=md5,
sha1hashlog=/media/disk/hashlog.txt
c) Windows: Capture RAM dump of a windows system
--- Content provided by FirstRanker.com ---
a. Hint: FTK Imager or RAMCaptureWindows: Capture Disk Image of a windows system(Hint: FTK Imager)
Experiment- 2
Disk Analysis
i)
--- Content provided by FirstRanker.com ---
List all files in a directory from a disk imagea. FTK Imager
ii)
Export a particular file from a disk image
a. FTK Imager
--- Content provided by FirstRanker.com ---
iii)Recover a deleted file from a disk image
FTK Imager
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
Experiment- 3
--- Content provided by FirstRanker.com ---
Memory Analysis1. List all running processes from a memory image
2. List all network connections from a memory image
3. Find out whether a firewall is set by analyzing a memory image
Hint: volatility
--- Content provided by FirstRanker.com ---
Experiment- 44) Live Incident Response
1. Perform live incident response on a system
2. View all browser history in a computer
3. List out all established network connections in a computer
--- Content provided by FirstRanker.com ---
Hint: Triage Incident ResponseExercise- 5
Implement E-Mail Tracking and Email Investigation
Exercise- 6
Implement video Analytics for a live video
--- Content provided by FirstRanker.com ---
Exercise- 7Analysis on different Malware Working
Exercise- 8
Work on Mail Bombs &SMS bombs
--- Content provided by FirstRanker.com ---
Exercise- 9Implement a case on windows and Linux forensics
Exercise- 10
Implement a case on network Forensic
Exercise- 11
--- Content provided by FirstRanker.com ---
Work on different types of vulnerabilitiesExercise- 12
Implement a case on Mobile Forensics
Exercise- 13
Develop an Evidence and Preparation and Documentation
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
--- Content provided by FirstRanker.com ---
TP
C
I Year - II Semester
--- Content provided by FirstRanker.com ---
00
0
2
Mini Project with Seminar
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
L
T
P
C
--- Content provided by FirstRanker.com ---
II Year - I Semester3
0
0
--- Content provided by FirstRanker.com ---
3Cloud Architectures and Security
Course Objective
? To learn the concepts of Cloud computing has drawn the attention of many business organization
and normal users of computers in the recent past.
--- Content provided by FirstRanker.com ---
? Student able to learn the Security aspects of cloud computing have always been subjected tomany criticisms. Hence it becomes important for any security professional to possess an
understanding of the cloud architecture and methods to secure the same.
Course Outcomes
? Explain the basic fundamentals of cloud computing.
--- Content provided by FirstRanker.com ---
? Describe the requirements for an application to be deployed in a cloud.? Apply the knowledge in the methods to secure cloud.
? Discuss the Multi-tenancy Issues and Virtualization System Security Issues
? Explain the security management standards in cloud
--- Content provided by FirstRanker.com ---
UNIT?I: Cloud Computing Fundamentals-Cloud Computing definition, private, public and hybridcloud. Cloud types; IaaS, PaaS, SaaS. Benefits and challenges of cloud computing, public vs private
clouds, role of virtualization in enabling the cloud; Business Agility: Benefits and challenges to Cloud
architecture.
UNIT? II: Cloud Applications- Technologies and the processes required when deploying web services-
--- Content provided by FirstRanker.com ---
Deploying a web service from inside and outside a cloud architecture, advantages and disadvantages-Development environments for service development; Amazon, Azure, Google App.
UNIT? III: Securing the Cloud- Security Concepts - Confidentiality, privacy, integrity, authentication,
non-repudiation, availability, access control, defence in depth, least privilege- how these concepts apply
in the cloud and their importance in PaaS, IaaS and SaaS. e.g. User authentication in the cloud.
--- Content provided by FirstRanker.com ---
UNIT- IV: Virtualization Security- Multi-tenancy Issues: Isolation of users/VMs from each other- How
the cloud provider can provide this- Virtualization System Security Issues: e.g. ESX and ESXi Security,
ESX file system security- storage considerations, backup and recovery- Virtualization System
Vulnerabilities.
--- Content provided by FirstRanker.com ---
UNIT ? V: Cloud Security Management - Security management in the cloud ? security management
standards- SaaS, PaaS, IaaS availability management- access control- Data security and storage in cloud.
Text Books:
--- Content provided by FirstRanker.com ---
1. Gautam Shroff, "Enterprise Cloud Computing Technology Architecture Applications", CambridgeUniversity Press; 1 edition ,2010.
2. Toby Velte, Anthony Velte, Robert Elsenpeter, "Cloud Computing, A Practical Approach", Tata
McGraw-Hill Osborne Media; 1 edition 22, 2009.
3. Tim Mather, Subra Kumaraswamy, Shahed Latif, "Cloud Security and Privacy: "An Enterprise
--- Content provided by FirstRanker.com ---
Perspective on Risks and Compliance", O'Reilly Media; 1 edition,2009.Reference Books:
1. Ronald L. Krutz, Russell Dean Vines, "Cloud Sec
urity", Wiley, 2010.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
T
--- Content provided by FirstRanker.com ---
PC
II Year - I Semester
3
--- Content provided by FirstRanker.com ---
00
3
Information Security Management and Standards (ISMS)
--- Content provided by FirstRanker.com ---
Course Objectives:? Students will get exposure to principles of information security management, contingency
planning, and information security policy.
? Students will get an understanding of Security and risk management models and practices.
? Students will gain an understanding of Personnel security, and ISO standards related to
--- Content provided by FirstRanker.com ---
information security.Course Outcomes:
? Explain the principles of information security management and planning.
? Explain the importance of contingency planning, Information security policy, training and
--- Content provided by FirstRanker.com ---
awareness.? Apply the knowledge and understanding of various security models.
? Demonstrate the prominence of risk management and risk assessment.
? Write the significance of personal staffing, perimeter security components related to information
security.
--- Content provided by FirstRanker.com ---
UNIT-I: Introduction-What is security, what is management, principles of information securitymanagement, project management, applying security to project management. Planning for security, the
role of planning, precursors to planning, strategic planning, information security governance, planning for
information security implementation.
--- Content provided by FirstRanker.com ---
UNIT-II: Contingency planning, components of contingency planning, Information security policy, whypolicy, Enterprise information security policy, issue specific and system specific policy. Organizing for
security, placing information security within an organization, components, security roles and titles,
implementing security education, training and awareness programs.
UNIT-III: Security management models: Access control models, Security architecture models, security
--- Content provided by FirstRanker.com ---
management models, security management practices, benchmarking, performance measurement inInfoSec management
UNIT-IV: Risk Management, Risk Identification and Risk Assessment, documenting the results of risk
assessment, Risk control strategies, managing risk, feasibility and cost benefit analysis, recommended
--- Content provided by FirstRanker.com ---
risk control practices.--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
UNIT-V: Personnel and Security: Staffing the security function, employment policies and practices.
Protection mechanism, access control, firewalls, IDS, IPS, remote access protection, wireless networking
--- Content provided by FirstRanker.com ---
protection. Overview of ISO 17799/ISO 27001 Standards, System Security Engineering CapabilityMaturity Model (SSE-CMM). Legal, Ethical, and professional Issues in Information Security
Text Books:
1. Management of Information Security 4th edition, Michael. E. Whitman, Herbert J Mattord, Cengage
Learning.
--- Content provided by FirstRanker.com ---
2. Information Systems Security, Nina Godbole, Wiley India, 20093. Principles and Practices of Information Security. Michael E. Whitman,
Herbert J. Mattord, Cengage Learning.
Reference Books:
1. Information Security Management Handbook , 6e, Harold F. Tipton, 2007
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
LT
P
C
II Year - I Semester
--- Content provided by FirstRanker.com ---
3
0
0
3
--- Content provided by FirstRanker.com ---
Cyber Laws and Security PoliciesCourse Objectives:
? The Objectives Of This Course Is To Enable Learner To Understand, Explore, And Acquire A
Critical Understanding Cyber Law.
--- Content provided by FirstRanker.com ---
? Student learns and develops Competencies for Dealing with Frauds and Deceptions (ConfidenceTricks, Scams) And Other Cyber Crimes For Example, Child Pornography Etc. That Are Taking
Place Via The Internet.
? Student should learn security policies and procedures.
--- Content provided by FirstRanker.com ---
Course Outcomes: At the end of the course, student will be able to? Explain the Social And Intellectual Property Issues Emerging From `Cyberspace.
? Explore The Legal And Policy Developments In Various Countries To Regulate Cyberspace
? Develop The Understanding Of Relationship Between Commerce And Cyberspace.
? Determine in Depth Knowledge Of Information Technology Act And Legal Frame Work Of Right
--- Content provided by FirstRanker.com ---
To Privacy, Data Security And Data Protection.? Apply various Case Studies on Real Time Crimes.
UNIT?I: Introduction to Computer Security- Definition, Threats to security, Government
requirements, Information Protection and Access Controls, Computer security efforts, Standards,
Computer Security mandates and legislation, Privacy considerations, International security activity.
--- Content provided by FirstRanker.com ---
UNIT?II: Secure System Planning and administration- Introduction to the orange book, Securitypolicy requirements, accountability, assurance and documentation requirements, and Network Security,
The Redbook and Government network evaluations.
UNIT?III: Information security policies and procedures-Corporate policies- Tier 1, Tier 2 and
--- Content provided by FirstRanker.com ---
Tier3 policies - process management-planning and preparation-developing policies- assetclassification policy- developing standards.
UNIT?IV: Information security-fundamentals-Employee responsibilities- information classification-
Information handling- Tools of information security- Information processing-secure program
--- Content provided by FirstRanker.com ---
administration.UNIT?V: Organizational and Human Security-Adoption of Information Security Management
Standards, Human Factors in Security- Role of information security professionals, IT Act- Structure of IT
Act, Common cyber crime scenarios and Applicability of Legal sections, Case studies as per selected IT
Act sections.
--- Content provided by FirstRanker.com ---
Text Books:1. Debby Russell and Sr. G.T Gangemi, "Computer Security Basics (Paperback), 2ndEdition, O
Reilly Media, 2006.
2. Thomas
R. Peltier, Information Security policies and procedures: A Practitioner's Reference,
--- Content provided by FirstRanker.com ---
2nd Edition Prentice Hall, 2004.3. Kenneth J. Knapp, Cyber Security and Global Information Assurance: Threat Analysis and Response
Solutions, IGI Global, 2009.
Web References:
--- Content provided by FirstRanker.com ---
1. https://meity.gov.in/content/information-technology-act 2000JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
T
--- Content provided by FirstRanker.com ---
PC
IV Semester
0
--- Content provided by FirstRanker.com ---
032
16
(DISSERTATION) DISSERTATION PHASE ? I AND PHASE ? II
Syllabus Contents:
--- Content provided by FirstRanker.com ---
The dissertation / project topic should be selected / chosen to ensure the satisfaction of the urgent need toestablish a direct link between education, national development and productivity and thus reduce the gap
between the world of work and the world of study. The dissertation should have the following
? Relevance to social needs of society
? Relevance to value addition to existing facilities in the institute
--- Content provided by FirstRanker.com ---
? Relevance to industry need? Problems of national importance
? Research and development in various domain
The student should complete the following:
? Literature survey Problem Definition
--- Content provided by FirstRanker.com ---
? Motivation for study and Objectives? Preliminary design / feasibility / modular approaches
? Implementation and Verification
? Report and presentation
The dissertation stage II is based on a report prepared by the students on dissertation allotted to them. It
--- Content provided by FirstRanker.com ---
may be based on:? Experimental verification / Proof of concept.
? Design, fabrication, testing of Communication System.
? The viva-voce examination will be based on the above report and work.
Guidelines for Dissertation Phase ? I and II at M. Tech. (Electronics):
--- Content provided by FirstRanker.com ---
? As per the AICTE directives, the dissertation is a yearlong activity, to be carried out andevaluated in two phases i.e. Phase ? I: July to December and Phase ? II: January to June.
? The dissertation may be carried out preferably in-house i.e. department's laboratories and
centers OR in industry allotted through department's T & P coordinator.
? After multiple interactions with guide and based on comprehensive literature survey, the student
--- Content provided by FirstRanker.com ---
shall identify the domain and define dissertation objectives. The referred literature shouldpreferably include IEEE/IET/IETE/Springer/Science Direct/ACM journals in the areas of
Computing and Processing (Hardware and Software), Circuits-Devices and Systems,
Communication-Networking and Security, Robotics and Control Systems, Signal Processing
and Analysis and any other related domain. In case of Industry sponsored projects, the relevant
--- Content provided by FirstRanker.com ---
application notes, while papers, product catalogues should be referred and reported.? Student is expected to detail out specifications, methodology, resources required, critical issues
involved in design and implementation and phase wise work distribution, and submit the
proposal within a month from the date of registration.
? Phase ? I deliverables: A document report comprising of summary of literature survey, detailed
--- Content provided by FirstRanker.com ---
objectives, project specifications, paper and/or computer aided design, proof ofconcept/functionality, part results, A record of continuous progress.
? Phase ? I evaluation: A committee comprising of guides of respective specialization shall assess
the progress/performance of the student ba sed on report, presentation and Q &A. In case of
unsatisfactory performance, committee may recommend repeating the Phase-I work.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
? During phase ? II, student is expected to exert on design, development and testing of the
proposed work as per the schedule. Accomplished results/contributions/innovations should be
published in terms of research papers in reputed journals and reviewed focused conferences OR
--- Content provided by FirstRanker.com ---
IP/Patents.? Phase ? II deliverables: A dissertation report as per the specified format, developed system in
the form of hardware and/or software, a record of continuous progress.
? Phase ? II evaluation: Guide along with appointed external examiner shall assess the
progress/performance of the student based on report, presentation and Q &A. In case of
--- Content provided by FirstRanker.com ---
unsatisfactory performance, committee may recommend for extension or repeating the workCourse Outcomes:
At the end of this course, students will be able to
1. Ability to synthesize knowledge and skills previously gained and applied to an in-depth study
and execution of new technical problem.
--- Content provided by FirstRanker.com ---
2. Capable to select from different methodologies, methods and forms of analysis to produce asuitable research design, and justify their design.
3. Ability to present the findings of their technical solution in a written report.
4. Presenting the work in International/ National conference or reputed journals.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
AUDIT 1 and 2: ENGLISH FOR RESEARCH PAPER WRITING
--- Content provided by FirstRanker.com ---
Course objectives:Students will be able to:
1. Understand that how to improve your writing skills and level of readability
2. Learn about what to write in each section
3. Understand the skills needed when writing a Title Ensure the good quality of paper at very first-
--- Content provided by FirstRanker.com ---
time submissionSyllabus
Units
CONTENTS
--- Content provided by FirstRanker.com ---
Hours
1
Planning and Preparation, Word Order, Breaking up long sentences, 4
--- Content provided by FirstRanker.com ---
Structuring Paragraphs and Sentences, Being Conciseand Removing Redundancy, Avoiding Ambiguity and Vagueness
2
Clarifying Who Did What, Highlighting Your Findings, Hedging and 4
Criticising, Paraphrasing and Plagiarism, Sections of a Paper,
--- Content provided by FirstRanker.com ---
Abstracts. Introduction3
Review of the Literature, Methods, Results, Discussion,
4
Conclusions, The Final Check.
--- Content provided by FirstRanker.com ---
4key skills are needed when writing a Title, key skills are needed when 4
writing an Abstract, key skills are needed when writing an
Introduction, skills needed when writing a Review of the Literature,
5
--- Content provided by FirstRanker.com ---
skills are needed when writing the Methods, skills needed when writing the 4Results, skills are needed when writing the Discussion,
skills are needed when writing the Conclusions
6
useful phrases, how to ensure paper is as good as it could possibly
--- Content provided by FirstRanker.com ---
4be the first- time submission
Suggested Studies:
1. Goldbort R (2006) Writing for Science, Yale University Press (available on Google Books)
--- Content provided by FirstRanker.com ---
2. Day R (2006) How to Write and Publish a Scientific Paper, Cambridge University Press3. Highman N (1998), Handbook of Writing for the Mathematical Sciences, SIAM.
Highman'sbook .
4. Adrian Wallwork , English for Writing Research Papers, Springer New York Dordrecht
Heidelberg London, 2011
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKI
NADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaAUDIT 1 and 2: DISASTER MANAGEMENT
--- Content provided by FirstRanker.com ---
Course Objectives: -Students will be able to:
1. learn to demonstrate a critical understanding of key concepts in disaster risk reduction and
humanitarian response.
2. critically evaluate disaster risk reduction and humanitarian response policy and practice from
--- Content provided by FirstRanker.com ---
multiple perspectives.3. develop an understanding of standards of humanitarian response and practical relevance in specific
types of disasters and conflict situations.
4. critically understand the strengths and weaknesses of disaster management approaches, planning
and programming in different countries, particularly their home country or the countries
--- Content provided by FirstRanker.com ---
they work inSyllabus
Units CONTENTS
Hours
1
--- Content provided by FirstRanker.com ---
Introduction4
Disaster: Definition, Factors And Significance; Difference Between Hazard And
Disaster; Natural And Manmade Disasters: Difference,
Nature, Types And Magnitude.
--- Content provided by FirstRanker.com ---
2Repercussions Of Disasters And Hazards: Economic Damage, Loss Of
4
Human And Animal Life, Destruction Of Ecosystem.
Natural Disasters: Earthquakes, Volcanisms, Cyclones, Tsunamis, Floods,
--- Content provided by FirstRanker.com ---
Droughts And Famines, Landslides And Avalanches, Man- made disaster:Nuclear Reactor Meltdown, Industrial Accidents, Oil Slicks And Spills,
Outbreaks Of Disease And Epidemics, War And
Conflicts.
3
--- Content provided by FirstRanker.com ---
Disaster Prone Areas In India4
Study Of Seismic Zones; Areas Prone To Floods And Droughts, Landslides And
Avalanches; Areas Prone To Cyclonic And Coastal Hazards With Special
Reference To Tsunami; Post-Disaster Diseases
--- Content provided by FirstRanker.com ---
And Epidemics4
Disaster Preparedness And Management
4
Preparedness: Monitoring Of Phenomena Triggering A Disaster Or Hazard;
--- Content provided by FirstRanker.com ---
Evaluation Of Risk: Application Of Remote Sensing, Data From MeteorologicalAnd Other Agencies, Media Reports:
Governmental And Community Preparedness.
5
Risk Assessment
--- Content provided by FirstRanker.com ---
4Disaster Risk: Concept And Elements, Disaster Risk Reduction, Global And
National Disaster Risk Situation. Techniques Of Risk Assessment, Global Co-
Operation In Risk Assessment And Warning, People's
Participation In Risk Assessment. Strategies for Survival.
--- Content provided by FirstRanker.com ---
6Disaster Mitigation
4
Meaning, Concept And Strategies Of Disaster Mitigation, Emerging
Trends In Mitigation. Structural Mitigation And Non-Structural Mitigation,
--- Content provided by FirstRanker.com ---
Programs Of Disaster Mitigation In India.Suggested Readings:
1. R. Nishith, Singh AK, "Disaster Management in India: Perspectives, issues and strategies "'New Royal
--- Content provided by FirstRanker.com ---
book Company.2. Sahni, PardeepEt.Al. (Eds.)," Disaster Mitigation Experiences And Reflections", Prentice Hall Of
India, New Delhi.
3. Goel S. L. , Disaster Administration And Management Text And Case Studies" ,Deep &Deep
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
Publication Pvt. Ltd., New Delhi.
AUDIT 1 and 2: SANSKRIT FOR TECHNICAL KNOWLEDGE
--- Content provided by FirstRanker.com ---
Course Objectives1. To get a working knowledge in illustrious Sanskrit, the scientific language in the world
2. Learning of Sanskrit to improve brain functioning
3. Learning of Sanskrit to develop the logic in mathematics, science & other subjects enhancing
the memory power
--- Content provided by FirstRanker.com ---
4. The engineering scholars equipped with Sanskrit will be able to explore the huge knowledgefrom ancient literature
Syllabus
Unit Content
--- Content provided by FirstRanker.com ---
Hours1
Alphabets in Sanskrit,
4
Past/Present/Future Tense,
--- Content provided by FirstRanker.com ---
Simple Sentences2
Order
4
Introduction of roots
--- Content provided by FirstRanker.com ---
Technical information about Sanskrit Literature3
Technical concepts of Engineering-Electrical,
4
4
--- Content provided by FirstRanker.com ---
Technical concepts of Engineering - Mechanical.4
5
Technical concepts of Engineering - Architecture.
4
--- Content provided by FirstRanker.com ---
6Technical concepts of Engineering ? Mathematics.
4
Suggested reading
--- Content provided by FirstRanker.com ---
1. "Abhyaspustakam" ? Dr.Vishwas, Samskrita-Bharti Publication, New Delhi2. "Teach Yourself Sanskrit" Prathama Deeksha-Vempati Kutumbshastri, Rashtriya Sanskrit Sansthanam,
New Delhi Publication
3. "India's Glorious Scientific Tradition" Suresh Soni, Ocean books (P) Ltd., New Delhi.
Course Output
--- Content provided by FirstRanker.com ---
Students will be able to1. Understanding basic Sanskrit language
2. Ancient Sanskrit literature about science & technology can be understood
3. Being a logical language will help to develop logic in students
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKI
--- Content provided by FirstRanker.com ---
NADAKAKINADA ? 533 003, Andhra Pradesh, India
AUDIT 1 and 2: VALUE EDUCATION
--- Content provided by FirstRanker.com ---
Course Objectives
Students will be able to
1. Understand value of education and self- development
2. Imbibe good values in students
--- Content provided by FirstRanker.com ---
3. Let the should know about the importance of characterSyllabus
Unit Content
Hours
--- Content provided by FirstRanker.com ---
1Values and self-development ?Social values and individual attitudes. Work ethics, 4
Indian vision of humanism.
Moral and non- moral valuation. Standards and principles.
Value judgements
--- Content provided by FirstRanker.com ---
2Importance of cultivation of values.
4
Sense of duty. Devotion, Self-reliance. Confidence, Concentration. Truthfulness,
Cleanliness.
--- Content provided by FirstRanker.com ---
Honesty, Humanity. Power of faith, National Unity.Patriotism.Love for nature ,Discipline
3
Personality and Behavior Development - Soul and Scientific attitude. Positive 4
Thinking. Integrity and discipline.
--- Content provided by FirstRanker.com ---
Punctuality, Love and Kindness.Avoid fault Thinking.
4
Free from anger, Dignity of labour.
4
--- Content provided by FirstRanker.com ---
Universal brotherhood and religious tolerance.True friendship.
Happiness Vs suffering, love for truth.
Aware of self-destructive habits.
Association and Cooperation.
--- Content provided by FirstRanker.com ---
Doing best for saving nature5
Character and Competence ?Holy books vs Blind faith.
4
Self-management and Good health.
--- Content provided by FirstRanker.com ---
Science of reincarnation.Equality, Nonviolence ,Humility, Role of Women.
6
All religions and same message.
4
--- Content provided by FirstRanker.com ---
Mind your Mind, Self-control.Honesty, Studying effectively
Suggested reading
1 Chakroborty, S.K. "Values and Ethics for organizations Theory and practice", Oxford University Press,
--- Content provided by FirstRanker.com ---
New DelhiCourse outcomes
Students will be able to 1.Knowledge of self-development
2.Learn the importance of Human values 3.Developing the overall personality
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKI
NADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
AUDIT 1 and 2: CONSTITUTION OF INDIA
Course Objectives:
--- Content provided by FirstRanker.com ---
Students will be able to:1. Understand the premises informing the twin themes of liberty and freedom from a civil rights
perspective.
2. To address the growth of Indian opinion regarding modern Indian intellectuals' constitutional
role and entitlement to civil and economic rights as well as the emergence of nationhood in the
--- Content provided by FirstRanker.com ---
early years of Indian nationalism.3. To address the role of socialism in India after the commencement of the Bolshevik Revolution
in 1917 and its impact on the initial drafting of the Indian Constitution.
Syllabus
Units
--- Content provided by FirstRanker.com ---
ContentHours
History of Making of the Indian Constitution:
1
History
--- Content provided by FirstRanker.com ---
4Drafting Committee, ( Composition & Working)
Philosophy of the Indian Constitution:
2
Preamble Salient Features
--- Content provided by FirstRanker.com ---
4Contours of Constitutional Rights & Duties:
Fundamental Rights
Right to Equality
Right to Freedom
--- Content provided by FirstRanker.com ---
3Right against Exploitation
4
Right to Freedom of Religion
Cultural and Educational Rights
--- Content provided by FirstRanker.com ---
Right to Constitutional RemediesDirective Principles of State Policy
Fundamental Duties.
Organs of Governance:
Parliament
--- Content provided by FirstRanker.com ---
CompositionQualifications and Disqualifications
Powers and Functions
4
Executive
--- Content provided by FirstRanker.com ---
4President
Governor
Council of Ministers
Judiciary, Appointment and Transfer of Judges, Qualifications
--- Content provided by FirstRanker.com ---
Powers and FunctionsLocal Administration:
District's Administration head: Role and Importance,
5
Municipalities: Introduction, Mayor and role of Elected Representative, CE of
--- Content provided by FirstRanker.com ---
Municipal Corporation.4
Pachayati raj: Introduction, PRI: ZilaPachayat.
Elected officials and their roles, CEO ZilaPachayat: Position and role.
Block level: Organizational Hierarchy (Different departments),
--- Content provided by FirstRanker.com ---
Village level: Role of Elected and Appointed officials,Importance of grass root democracy
Election Commission:
Election Commission: Role and Func
tioning.
--- Content provided by FirstRanker.com ---
6Chief Election Commissioner and Election Commissioners.
4
State Election Commission: Role and Functioning.
Institute and Bodies for the welfare of SC/ST/OBC and women.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKI
NADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
Suggested reading
1. The Constitution of India, 1950 (Bare Act), Government Publication.
--- Content provided by FirstRanker.com ---
2. Dr. S. N. Busi, Dr. B. R. Ambedkar framing of Indian Constitution, 1st Edition, 2015.3. M. P. Jain, Indian Constitution Law, 7th Edn., Lexis Nexis, 2014.
4. D.D. Basu, Introduction to the Constitution of India, Lexis Nexis, 2015.
Course Outcomes:
Students will be able to:
--- Content provided by FirstRanker.com ---
1. Discuss the growth of the demand for civil rights in India for the bulk of Indians before the arrivalof Gandhi in Indian politics.
2. Discuss the
intellectual
origins of
--- Content provided by FirstRanker.com ---
theframework
of
argument
that
--- Content provided by FirstRanker.com ---
informedthe conceptualization of social reforms leading to revolution in India.
3. Discuss the circumstances surrounding the foundation of the Congress Socialist Party [CSP] under
the leadership of Jawaharlal Nehru and the eventual failure of the proposal of direct elections
through adult suffrage in the Indian Constitution.
--- Content provided by FirstRanker.com ---
4. Discuss the passage of the Hindu Code Bill of 1956.--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKI
NADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
AUDIT 1 and 2: PEDAGOGY STUDIES
Course Objectives:
--- Content provided by FirstRanker.com ---
Students will be able to:4. Review existing evidence on the review topic to inform programme design and policy
making undertaken by the DfID, other agencies and researchers.
5. Identify critical evidence gaps to guide the development.
Syllabus
--- Content provided by FirstRanker.com ---
Units ContentHours
Introduction and Methodology:
Aims and rationale, Policy background, Conceptual framework and terminology
--- Content provided by FirstRanker.com ---
1Theories of learning, Curriculum, Teacher education.
4
Conceptual framework, Research questions.
Overview of methodology and Searching.
--- Content provided by FirstRanker.com ---
Thematic overview: Pedagogical practices are being used by teachers in formal2
and informal classrooms in developing countries.
4
Curriculum, Teacher education.
--- Content provided by FirstRanker.com ---
3Evidence on the effectiveness of pedagogical practices
Methodology for the in depth stage: quality assessment of included studies.
How can teacher education (curriculum and practicum) and the school curriculum
and guidance materials best support effective pedagogy?
--- Content provided by FirstRanker.com ---
4Theory of change.
Strength and nature of the body of evidence for effective pedagogical practices.
4
Pedagogic theory and pedagogical approaches.
--- Content provided by FirstRanker.com ---
4Teachers' attitudes and beliefs and Pedagogic strategies.
Professional development: alignment with classroom practices and follow-up
support
Peer support
--- Content provided by FirstRanker.com ---
45
Support from the head teacher and the community.
Curriculum and assessment
Barriers to learning: limited resources and large class sizes
--- Content provided by FirstRanker.com ---
6Research gaps and future directions
4
Research design
Contexts
--- Content provided by FirstRanker.com ---
PedagogyTeacher education
Curriculum and assessment
Dissemination and research impact.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKI
--- Content provided by FirstRanker.com ---
NADAKAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
Suggested reading1. Ackers J, Hardman F (2001) Classroom interaction in Kenyan primary schools, Compare, 31 (2):
245-261.
2. Agrawal M (2004) Curricular reform in schools: The importance of evaluation, Journal of
--- Content provided by FirstRanker.com ---
Curriculum Studies, 36 (3): 361-379.3. Akyeampong K (2003) Teacher training in Ghana - does it count? Multi-site teacher education
research project (MUSTER) country report 1. London: DFID.
4. Akyeampong K, Lussier K, Pryor J, Westbrook J (2013) Improving teaching and learning of basic
maths and reading in Africa: Does teacher preparation count? International Journal Educational
--- Content provided by FirstRanker.com ---
Development, 33 (3): 272?282.5. Alexander RJ (2001) Culture and pedagogy: International comparisons in primary education.
Oxford and Boston: Blackwell.
6. Chavan M (2003) Read India: A mass scale, rapid, `learning to read' campaign.
7. www.pratham.org/images/resource%20working%20paper%202.pdf.
--- Content provided by FirstRanker.com ---
Course Outcomes:
Students will be able to understand:
1. What pedagogical practices are being used by teachers in formal and informal classrooms in
developing countries?
--- Content provided by FirstRanker.com ---
2. What is the evidence on the effectiveness of these pedagogical practices, in what conditions, andwith what population of learners?
3. How can teacher education (curriculum and practicum) and the school curriculum and guidance
materials best support effective pedagogy?
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKI
NADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
AUDIT 1 and 2: STRESS MANAGEMENT BY YOGA
Course Objectives
--- Content provided by FirstRanker.com ---
1. To achieve overall health of body and mind2. To overcome stress
Syllabus
Unit Content
Hours
--- Content provided by FirstRanker.com ---
1 Definitions of Eight parts of yog. ( Ashtanga )5
2 Yam and Niyam. Do`s and Don't's in life.
5
Ahinsa, satya, astheya, bramhacharya and aparigraha
--- Content provided by FirstRanker.com ---
3 Yam and Niyam. Do`s and Don't's in life.5
Shaucha, santosh, tapa, swadhyay, ishwarpranidhan
4 Asan and Pranayam
5
--- Content provided by FirstRanker.com ---
Various yog poses and their benefits for mind & body5 Regularization of breathing techniques and its effects-Types of pranayam
4
Suggested reading
--- Content provided by FirstRanker.com ---
1. `Yogic Asanas for Group Tarining-Part-I" : Janardan Swami YogabhyasiMandal, Nagpur2. "Rajayoga or conquering the Internal Nature" by Swami Vivekananda, Advaita Ashrama
(Publication Department), Kolkata
Course Outcomes:
Students will be able to:
--- Content provided by FirstRanker.com ---
1. Develop healthy mind in a healthy body thus improving social health also2. Improve efficiency
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKI
--- Content provided by FirstRanker.com ---
NADAKAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
AUDIT 1 and 2: PERSONALITY DEVELOPMENT THROUGH LIFE ENLIGHTENMENT
SKILLS
Course Objectives
1. To learn to achieve the highest goal happily
--- Content provided by FirstRanker.com ---
2. To become a person with stable mind, pleasing personality and determination3. To awaken wisdom in students
Syllabus
Unit
Content
--- Content provided by FirstRanker.com ---
Hours1
Neetisatakam-Holistic development of personality
4
Verses- 19,20,21,22 (wisdom)
--- Content provided by FirstRanker.com ---
Verses- 29,31,32 (pride & heroism)Verses- 26,28,63,65 (virtue)
2
Neetisatakam-Holistic development of personality
4
--- Content provided by FirstRanker.com ---
Verses- 52,53,59 (dont's)Verses- 71,73,75,78 (do's)
3
Approach to day to day work and duties.
4
--- Content provided by FirstRanker.com ---
Shrimad Bhagwad Geeta : Chapter 2-Verses 41, 47,48,4
Chapter 3-Verses 13, 21, 27, 35, Chapter 6-Verses 5,13,17, 23, 35,
4
Chapter 18-Verses 45, 46, 48.
--- Content provided by FirstRanker.com ---
5Statements of basic knowledge.
4
Shrimad Bhagwad Geeta: Chapter2-Verses 56, 62, 68
Chapter 12 -Verses 13, 14, 15, 16,17, 18
--- Content provided by FirstRanker.com ---
6Personality of Role model. Shrimad Bhagwad Geeta: Chapter2-Verses 4
17, Chapter 3-Verses 36,37,42,
Chapter 4-Verses 18, 38,39
Chapter18 ? Verses 37,38,63
--- Content provided by FirstRanker.com ---
Suggested reading1. "Srimad Bhagavad Gita" by Swami Swarupananda Advaita Ashram (Publication Department), Kolkata
2. Bhartrihari's Three Satakam (Niti-sringar-vairagya) by P.Gopinath, Rashtriya Sanskrit Sansthanam,
New Delhi.
Course Outcomes
--- Content provided by FirstRanker.com ---
Students will be able to1. Study of Shrimad-Bhagwad-Geeta will help the student in developing his personality and achieve the
highest goal in life
2. The person who has studied Geeta will lead the nation and mankind to peace and prosperity
3. Study of Neetishatakam will help in developing versatile personality of students
--- Content provided by FirstRanker.com ---
***