R23 II Year Syllabus B.Tech Cyber Security
R23 II Year Syllabus B.Tech Cyber Security
II Year I Semester L T P C
3 0 0 3
Course Objectives:
To introduce the students to the topics and techniques of discrete methods and
combinatorial reasoning.
To introduce a wide variety of applications. The algorithmic approach to the solution
of problems is fundamental in discrete mathematics, and this approach reinforces the
close ties between this discipline and the area of computer science.
Course Outcomes: At the end of the course students will be able to
1. Build skills in solving mathematical problems (L3)
2. Comprehend mathematical principles and logic (L4)
3. Demonstrate knowledge of mathematical modeling and proficiency in using
mathematical software (L6)
4. Manipulate and analyze data numerically and/or graphicallysing appropriate Software
(L3)
5. How to communicate effectively mathematical ideas/results verbally or in writing
(L1)
Basic Concepts, Graph Theory and its Applications, Subgraphs, Graph Representations:
Adjacency and Incidence Matrices, Isomorphic Graphs, Paths and Circuits, Eulerian and
Hamiltonian Graphs,
TEXT BOOKS:
REFERENCE BOOKS:
II Year I Semester L T P C
2 1 0 3
Course Objectives:
To help the students appreciate the essential complementary between 'VALUES' and
'SKILLS' to ensure sustained happiness and prosperity which are the core aspirations
of all human beings.
To facilitate the development of a Holistic perspective among students towards life
and profession as well as towards happiness and prosperity based on a correct
understanding of the Human reality and the rest of existence. Such holistic
perspective forms the basis of Universal Human Values and movement towards
value-based living in a natural way.
To highlight plausible implications of such a Holistic understanding in terms of
ethical human conduct, trustful and mutually fulfilling human behaviour and mutually
enriching interaction with Nature.
Course Outcomes:
Define the terms like Natural Acceptance, Happiness and Prosperity (L1, L2)
Identify one’s self, and one’s surroundings (family, society nature) (L1, L2)
Apply what they have learnt to their own self in different day-to-day settings in
real life (L3)
Relate human values with human relationship and human society. (L4)
Justify the need for universal human values and harmonious existence (L5)
Develop as socially and ecologically responsible engineers (L3, L6)
Course Topics
The course has 28 lectures and 14 tutorials in 5 modules. The lectures and tutorials are of 1-
hour duration. Tutorial sessions are to be used to explore and practice what has been
proposed during the lecture sessions.
The Teacher’s Manual provides the outline for lectures as well as practice sessions. The
teacher is expected to present the issues to be discussed as propositions and encourage the
students to have a dialogue.
UNIT II Harmony in the Human Being (6 lectures and 3 tutorials for practice session)
Lecture 7: Understanding Human being as the Co-existence of the self and the
body.
Lecture 8: Distinguishing between the Needs of the self and the body
Tutorial 4: Practice Session PS4 Exploring the difference of Needs of self and
body.
Lecture 9: The body as an Instrument of the self
Lecture 10: Understanding Harmony in the self
Tutorial 5: Practice Session PS5 Exploring Sources of Imagination in the self
Lecture 11: Harmony of the self with the body
Lecture 12: Programme to ensure self-regulation and Health
Tutorial 6: Practice Session PS6 Exploring Harmony of self with the body
UNIT III Harmony in the Family and Society (6 lectures and 3 tutorials for practice
session)
Lecture 13: Harmony in the Family – the Basic Unit of Human Interaction
Lecture 14: 'Trust' – the Foundational Value in Relationship
Tutorial 7: Practice Session PS7 Exploring the Feeling of Trust
Lecture 15: 'Respect' – as the Right Evaluation
Tutorial 8: Practice Session PS8 Exploring the Feeling of Respect
Lecture 16: Other Feelings, Justice in Human-to-Human Relationship
Lecture 17: Understanding Harmony in the Society
Lecture 18: Vision for the Universal Human Order
Tutorial 9: Practice Session PS9 Exploring Systems to fulfil Human Goal
Practice Sessions for UNIT III – Harmony in the Family and Society
PS7 Exploring the Feeling of Trust
PS8 Exploring the Feeling of Respect
PS9 Exploring Systems to fulfil Human Goal
READINGS:
Textbook and Teachers Manual
a. The Textbook
R R Gaur, R Asthana, G P Bagaria, A Foundation Course in Human Values and Professional
Ethics, 2nd Revised Edition, Excel Books, New Delhi, 2019. ISBN 978-93-87034-47-1
b. The Teacher’s Manual
R R Gaur, R Asthana, G P Bagaria,Teachers’ Manual for A Foundation Course in Human
Values and Professional Ethics, 2nd Revised Edition, Excel Books, New Delhi, 2019. ISBN
978-93-87034-53-2
Reference Books
1. JeevanVidya: EkParichaya, A Nagaraj, JeevanVidyaPrakashan, Amarkantak, 1999.
2. Human Values, A.N. Tripathi, New Age Intl. Publishers, New Delhi, 2004.
3. The Story of Stuff (Book).
4. The Story of My Experiments with Truth - by Mohandas Karamchand Gandhi
5. Small is Beautiful - E. F Schumacher.
6. Slow is Beautiful - Cecile Andrews
7. Economy of Permanence - J C Kumarappa
8. Bharat Mein Angreji Raj – PanditSunderlal
9. Rediscovering India - by Dharampal
10. Hind Swaraj or Indian Home Rule - by Mohandas K. Gandhi
11. India Wins Freedom - Maulana Abdul Kalam Azad
12. Vivekananda - Romain Rolland (English)
13. Gandhi - Romain Rolland (English)
Mode of Conduct:
Lecture hours are to be used for interactive discussion, placing the proposals about the topics
at hand and motivating students to reflect, explore and verify them.
Tutorial hours are to be used for practice sessions.
While analyzing and discussing the topic, the faculty mentor’s role is in pointing to essential
elements to help in sorting them out from the surface elements. In other words, help the
students explore the important or critical elements.
In the discussions, particularly during practice sessions (tutorials), the mentor encourages the
student to connect with one’s own self and do self-observation, self-reflection and self-
exploration.
Scenarios may be used to initiate discussion. The student is encouraged to take up ”ordinary”
situations rather than” extra-ordinary” situations. Such observations and their analyses are
shared and discussed with other students and faculty mentor, in a group sitting.
Tutorials (experiments or practical) are important for the course. The difference is that the
laboratory is everyday life, and practical are how you behave and work in real life.
Depending on the nature of topics, worksheets, home assignment and/or activity are included.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY
(R23-IInd YEAR COURSE STRUCTURE & SYLLABUS)
The practice sessions (tutorials) would also provide support to a student in performing actions
commensurate to his/her beliefs. It is intended that this would lead to development of
commitment, namely behaving and working based on basic human values.
It is recommended that this content be placed before the student as it is, in the form of a basic
foundation course, without including anything else or excluding any part of this content.
Additional content may be offered in separate, higher courses. This course is to be taught by
faculty from every teaching department, not exclusively by any one department.
Teacher preparation with a minimum exposure to at least one 8-day Faculty Development
Program on Universal Human Values is deemed essential.
Online Resources:
1. https://fdp-si.aicte-india.org/UHV-
II%20Class%20Notes%20&%20Handouts/UHV%20Handout%201-
Introduction%20to%20Value%20Education.pdf
2. https://fdp-si.aicte-india.org/UHV-
II%20Class%20Notes%20&%20Handouts/UHV%20Handout%202-
Harmony%20in%20the%20Human%20Being.pdf
3. https://fdp-si.aicte-india.org/UHV-
II%20Class%20Notes%20&%20Handouts/UHV%20Handout%203-
Harmony%20in%20the%20Family.pdf
4. https://fdp-si.aicte-india.org/UHV%201%20Teaching%20Material/D3-
S2%20Respect%20July%2023.pdf
5. https://fdp-si.aicte-india.org/UHV-
II%20Class%20Notes%20&%20Handouts/UHV%20Handout%205-
Harmony%20in%20the%20Nature%20and%20Existence.pdf
6. https://fdp-si.aicte-india.org/download/FDPTeachingMaterial/3-days%20FDP-
SI%20UHV%20Teaching%20Material/Day%203%20Handouts/UHV%203D%20D3-
S2A%20Und%20Nature-Existence.pdf
7. https://fdp-si.aicte-
india.org/UHV%20II%20Teaching%20Material/UHV%20II%20Lecture%2023-
25%20Ethics%20v1.pdf
8. https://www.studocu.com/in/document/kiet-group-of-institutions/universal-human-
values/chapter-5-holistic-understanding-of-harmony-on-professional-ethics/62490385
9. https://onlinecourses.swayam2.ac.in/aic22_ge23/preview
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY
(R23-IInd YEAR COURSE STRUCTURE & SYLLABUS)
II Year I Semester L T P C
3 0 0 3
UNIT–I:
Data Representation: Binary Numbers, Fixed Point Representation.Floating Point
Representation. Number base conversions, Octal and Hexadecimal Numbers,
components, Signed binary numbers,Binary codes Digital Logic Circuits-I:BasicLogic
Functions,Logicgates,universallogicgates, Minimization of Logic expressions. K-Map
Simplification,CombinationalCircuits,Decoders,Multiplexers
UNIT–II:
Digital Logic Circuits-II:SequentialCircuits,Flip-
Flops,Binarycounters,Registers,ShiftRegisters,Ripplecounters. Basic Structure of
Computers:Computer Types, Functional units, Basic operational concepts,
Busstructures, Software, Performance, multiprocessors and multicomputers, Computer
Generations,Von-Neumann Architecture
UNIT–III:
Computer Arithmetic: Additionand Subtraction of Signed Numbers, Design of Fast
Adders, Multiplication of Positive Numbers, Signed-operand Multiplication, Fast
Multiplication, Integer Division, Floating-Point Numbers and Operations. Processor
Organization: Fundamental Concepts, Execution of a Complete Instruction, Multiple-
Bus Organization, Hardwired Control and Multiprogrammed Control
UNIT–IV:
The Memory Organization: Basic Concepts, Semiconductor RAM Memories, Read-
OnlyMemories, Speed, Size and Cost, Cache Memories, Performance
Considerations,VirtualMemories, Memory Management Requirements, Secondary
Storage.
UNIT–V:
Input/Output Organization: Accessing I/O Devices, Interrupts, Processor Examples,
Direct Memory Access, Buses, Interface Circuits, Standard I/O Interfaces
Textbooks:
Computer Organization, CarlHamacher, ZvonkoVranesic, SafwatZaky, 6thedition,
McGrawHill
Digital Design, 6thEdition, M.MorrisMano, Pearson Education.
Organization and Architecture,William Stallings,11thEdition, Pearson.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY
(R23-IInd YEAR COURSE STRUCTURE & SYLLABUS)
ReferenceBooks:
Computer Systems Architecture, M.Moris Mano, 3rdEdition, Pearson
Computer Organization and Design, David A.Paterson, JohnL. Hennessy, Elsevier
Fundamentals of Logic Design, Roth,5thEdition, Thomson
OnlineLearningResources:
1.https://nptel.ac.in/courses/106/103/106103068/
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY
nd
(R23-II YEAR COURSE STRUCTURE & SYLLABUS)
II Year I Semester L T P C
3 0 0 3
UNIT–I:
Introduction to Algorithm Analysis, Space and Time Complexity analysis,
Asymptotic Notations. AVLT rees–Creation, Insertion, Deletion operations and
Applications. B. Trees–Creation,Insertion,Deletion operations and Applications
UNIT–II:
Heap Trees (PriorityQueues)–Minand MaxHeaps,Operations and Applications.
Graphs–Terminology, Representations, Basic Search and Traversals, Connected
Components and Biconnected Components, applications. Divide and Conquer:
The General Method, Quick Sort, Merge Sort, Strassen’s matrix
multiplication, Convex Hull
UNIT–III:
Greedy Method: General Method, Job Sequencing with deadlines,
KnapsackProblem, Minimum costspanningtrees, Single Source Shortest Paths
Dynamic Programming: General Method, All pairs shortest paths,Single Source
Shortest Paths–General Weights (Bellman Ford Algorithm),Optimal Binary
SearchTrees,0/1Knapsack,String Editing,Travelling Salesperson problem
UNIT–IV:
Back tracking: General Method, 8-Queens Problem, Sum of
Subsets problem, Graph Coloring,0/1Knapsack Problem. Branch and Bound: The
General Method, 0/1Knapsack Problem,Travelling Salesperson problem
UNIT–V:
NPHard and NPComplete Problems: Basic Concepts, Cook’s theorem. NPHard
Graph Problems:Clique Decision Problem (CDP),Chromatic Number Decision
Problem (CNDP), Traveling Salesperson Decision Problem(TSP). NP Hard
Scheduling Problems: Scheduling Identical Processors, Job Shop Scheduling
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY
nd
(R23-II YEAR COURSE STRUCTURE & SYLLABUS)
Text books:
ReferenceBooks:
1. Data Structures and program design in C,RobertKruse,Pearson Education
Asia
2. An introduction to Data Structures with applications, Trembley&Sorenson,
McGrawHill
3. The Art of Computer Programming,Vol.1:Fundamental Algorithms,
Donald EKnuth,Addison-Wesley,1997.
4. Data Structures using C&C++:Langsam, Augenstein & Tanenbaum,
Pearson,1995
5. Algorithms +Data Structures & Programs:,N.Wirth,PHI
6. Fundamentals of Data Structures in C++: Horowitz
Sahni&Mehta,GalgottiaPub.
7. Data structures in Java:,ThomasStandish, Pears on Education Asia
OnlineLearningResources:
https://www.tutorialspoint.com/advanced_data_structures/index.asphttp://p
eterindia.net/Algorithms.html
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
II Year I Semester L T P C
3 0 0 3
Course Objectives:
The learning objectives of this course are to:
Identify Java language components and how they work together in applications
Learn the fundamentals of object-oriented programming in Java, including defining
classes, invoking methods, using class libraries.
Learn how to extend Java classes with inheritance and dynamic binding and how to
use exception handling in Java applications
Understand how to design applications with threads in Java
Understand how to use Java APIs for program development
UNIT I
Object Oriented Programming: Basic concepts, Principles, Program Structure in Java:
Introduction, Writing Simple Java Programs, Elements or Tokens in Java Programs, Java
Statements, Command Line Arguments, User Input to Programs, Escape Sequences
Comments, Programming Style.Data Types, Variables, and Operators :Introduction, Data
Types in Java, Declaration of Variables, Data Types, Type Casting, Scope of Variable
Identifier, Literal Constants, Symbolic Constants, Formatted Output with printf() Method,
Static Variables and Methods, Attribute Final, Introduction to Operators, Precedence and
Associativity of Operators, Assignment Operator ( = ), Basic Arithmetic Operators,
Increment (++) and Decrement (- -) Operators, Ternary Operator, Relational Operators,
Boolean Logical Operators, Bitwise Logical Operators.Control Statements: Introduction, if
Expression, Nested if Expressions, if–else Expressions, Ternary Operator?:, Switch
Statement, Iteration Statements, while Expression, do–while Loop, for Loop, Nested for
Loop, For–Each for Loop, Break Statement, Continue Statement.
UNIT II
Classes and Objects: Introduction, Class Declaration and Modifiers, Class Members,
Declaration of Class Objects, Assigning One Object to Another, Access Control for Class
Members, Accessing Private Members of Class, Constructor Methods for Class, Overloaded
Constructor Methods, Nested Classes, Final Class and Methods, Passing Arguments by Value
and by Reference, Keyword this.Methods: Introduction, Defining Methods, Overloaded
Methods, Overloaded Constructor Methods, Class Objects as Parameters in Methods, Access
Control, Recursive Methods, Nesting of Methods, Overriding Methods, Attributes Final and
Static.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
UNIT III
Arrays: Introduction, Declaration and Initialization of Arrays, Storage of Array in Computer
Memory, Accessing Elements of Arrays, Operations on Array Elements, Assigning Array to
Another Array, Dynamic Change of Array Size, Sorting of Arrays, Search for Values in
Arrays, Class Arrays, Two-dimensional Arrays, Arrays of Varying Lengths, Three-
dimensional Arrays, Arrays as Vectors.Inheritance: Introduction, Process of Inheritance,
Types of Inheritances, Universal Super Class-Object Class, Inhibiting Inheritance of Class
Using Final, Access Control and Inheritance, Multilevel Inheritance, Application of Keyword
Super, Constructor Method and Inheritance, Method Overriding, Dynamic Method Dispatch,
Abstract Classes, Interfaces and Inheritance. Interfaces: Introduction, Declaration of
Interface, Implementation of Interface, Multiple Interfaces, Nested Interfaces, Inheritance of
Interfaces, Default Methods in Interfaces, Static Methods in Interface, Functional Interfaces,
Annotations.
UNIT IV
Packages and Java Library:Introduction, Defining Package, Importing Packages and
Classes into Programs, Path and Class Path, Access Control, Packages in Java SE, Java.lang
Package and its Classes, Class Object, Enumeration, class Math, Wrapper Classes, Auto-
boxing and Auto-unboxing, Java util Classes and Interfaces, Formatter Class, Random Class,
Time Package, Class Instant (java.time.Instant), Formatting for Date/Time in Java, Temporal
Adjusters Class, Temporal Adjusters Class.Exception Handling: Introduction, Hierarchy of
Standard Exception Classes, Keywords throws and throw, try, catch, and finally Blocks,
Multiple Catch Clauses, Class Throwable, Unchecked Exceptions, Checked Exceptions.Java
I/O and File: Java I/O API, standard I/O streams, types, Byte streams, Character streams,
Scanner class, Files in Java (Text Book 2)
UNIT V
String Handling in Java:Introduction, Interface Char Sequence, Class String, Methods for
Extracting Characters from Strings, Comparison, Modifying, Searching; Class String Buffer.
Multithreaded Programming:Introduction, Need for Multiple Threads Multithreaded
Programming for Multi-core Processor, Thread Class, Main Thread- Creation of New
Threads, Thread States, Thread Priority-Synchronization, Deadlock and Race Situations,
Inter-thread Communication - Suspending, Resuming, and Stopping of Threads.Java
Database Connectivity:Introduction, JDBC Architecture, Installing MySQL and MySQL
Connector/J, JDBC Environment Setup, Establishing JDBC Database Connections, ResultSet
Interface. Java FX GUI: Java FX Scene Builder, Java FX App Window Structure, displaying
text and image, event handling, laying out nodes in scene graph, mouse events (Text Book 3)
Text Books:
References Books:
Online Resources:
1) https://nptel.ac.in/courses/106/105/106105191/
2) https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_012880464547618
816347_shared/overview
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
II Year I Semester L T P C
0 0 3 1.5
Course Objectives:
The objectives of the course is to
acquire practical skills in constructing and managing Data structures
apply the popular algorithm design methods in problem-solving scenarios
Sample Programs:
1. Construct an AVL tree for a given set of elements which are stored in a file. And
implement insert and delete operation on the constructed tree. Write contents of tree
into a new file using in-order.
2. Construct B-Tree an order of 5 with a set of 100 random elements stored in array.
Implement searching, insertion and deletion operations.
3. Construct Min and Max Heap using arrays, delete any element and display the content
of the Heap.
4. Implement BFT and DFT for given graph, when graph is represented by
a) Adjacency Matrix b) Adjacency Lists
5. Write a program for finding the biconnected components in a given graph.
6. Implement Quick sort and Merge sort and observe the execution time for various
input sizes (Average, Worst and Best cases).
7. Compare the performance of Single Source Shortest Paths using Greedy method when
the graph is represented by adjacency matrix and adjacency lists.
8. Implement Job Sequencing with deadlines using Greedy strategy.
9. Write a program to solve 0/1 Knapsack problem Using Dynamic Programming.
10. Implement N-Queens Problem Using Backtracking.
11. Use Backtracking strategy to solve 0/1 Knapsack problem.
12. Implement Travelling Sales Person problem using Branch and Bound approach.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
Reference Books:
II Year I Semester L T P C
0 0 3 1.5
Sample Experiments:
Exercise – 1:
a) Write a JAVA program to display default value of all primitive data type of JAVA
b) Write a java program that display the roots of a quadratic equation ax2+bx=0. Calculate the
discriminate D and basing on value of D, describe the nature of root.
Exercise - 2
a) Write a JAVA program to search for an element in a given list of elements using binary
search mechanism.
b) Write a JAVA program to sort for an element in a given list of elements using bubble sort
c) Write a JAVA program using StringBuffer to delete, remove character.
Exercise - 3
a) Write a JAVA program to implement class mechanism. Create a class, methods and invoke
them inside main method.
b) Write a JAVA program implement method overloading.
c) Write a JAVA program to implement constructor.
d) Write a JAVA program to implement constructor overloading.
Exercise - 4
a) Write a JAVA program to implement Single Inheritance
b) Write a JAVA program to implement multi level Inheritance
c) Write a JAVA program for abstract class to find areas of different shapes
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
Exercise - 5
a) Write a JAVA program give example for “super” keyword.
b) Write a JAVA program to implement Interface. What kind of Inheritance can be achieved?
c) Write a JAVA program that implements Runtime polymorphism
Exercise - 6
a) Write a JAVA program that describes exception handling mechanism
b) Write a JAVA program Illustrating Multiple catch clauses
c) Write a JAVA program for creation of Java Built-in Exceptions
d) Write a JAVA program for creation of User Defined Exception
Exercise - 7
a) Write a JAVA program that creates threads by extending Thread class. First thread display
“Good Morning “every 1 sec, the second thread displays “Hello “every 2 seconds and the
third display “Welcome” every 3 seconds, (Repeat the same by implementing Runnable)
b) Write a program illustrating is Alive and join ()
c) Write a Program illustrating Daemon Threads.
d) Write a JAVA program Producer Consumer Problem
Exercise – 8
a) Write a JAVA program that import and use the user defined packages
b) Without writing any code, build a GUI that display text in label and image in an
ImageView (use JavaFX)
c) Build a Tip Calculator app using several JavaFX components and learn how to respond to
user interactions with the GUI
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
II Year I Semester L T P C
0 1 2 2
PYTHON PROGRAMMING
(Skill Enhancement Course)
Course Objectives:
Sample Experiments:
UNIT-II:
Functions: Built-In Functions, Commonly Used Modules, Function Definition and Calling
the function, return Statement and void Function, Scope and Lifetime of Variables, Default
Parameters, Keyword Arguments, *args and **kwargs, Command Line Arguments. Strings:
Creating and Storing Strings, Basic String Operations, Accessing Characters in String by
Index Number, String Slicing and Joining, String Methods, Formatting Strings.Lists: Creating
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
Lists, Basic List Operations, Indexing and Slicing in Lists, Built-In Functions Used on Lists,
List Methods, del Statement.
Sample Experiments:
UNIT-III:
Dictionaries: Creating Dictionary, Accessing and Modifying key:value Pairs in Dictionaries,
Built-In Functions Used on Dictionaries, Dictionary Methods, del Statement.Tuples and Sets:
Creating Tuples, Basic Tuple Operations, tuple() Function, Indexing and Slicing in Tuples,
Built-In Functions Used on Tuples, Relation between Tuples and Lists, Relation between
Tuples and Dictionaries, Using zip() Function, Sets, Set Methods, Frozenset.
Sample Experiments:
1. Write a program to create tuples (name, age, address, college) for at least two
members and concatenate the tuples and print the concatenated tuples.
2. Write a program to count the number of vowels in a string (No control flow allowed).
3. Write a program to check if a given key exists in a dictionary or not.
4. Write a program to add a new key-value pair to an existing dictionary.
5. Write a program to sum all the items in a given dictionary.
UNIT-IV:
Files: Types of Files, Creating and Reading Text Data, File Methods to Read and Write Data,
Reading and Writing Binary Files, Pickle Module, Reading and Writing CSV Files, Python
os and os.path Modules.Object-Oriented Programming: Classes and Objects, Creating
Classes in Python, Creating Objects in Python, Constructor Method, Classes with Multiple
Objects, Class Attributes Vs Data Attributes, Encapsulation, Inheritance, Polymorphism.
Sample Experiments:
1. Write a program to sort words in a file and put them in another file. The output file
should have only lower-case words, so any upper-case words from source must be
lowered.
2. Python program to print each line of a file in reverse order.
3. Python program to compute the number of characters, words and lines in a file.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
4. Write a program to create, display, append, insert and reverse the order of the items
in the array.
5. Write a program to add, transpose and multiply two matrices.
6. Write a Python program to create a class that represents a shape. Include methods to
calculate its area and perimeter. Implement subclasses for different shapes like circle,
triangle, and square.
UNIT-V:
Introduction to Data Science: Functional Programming, JSON and XML in Python, NumPy
with Python, Pandas.
Sample Experiments:
1. Python program to check whether a JSON string contains complex object or not.
2. Python Program to demonstrate NumPy arrays creation using array () function.
3. Python program to demonstrate use of ndim, shape, size, dtype.
4. Python program to demonstrate basic slicing, integer and Boolean indexing.
5. Python program to find min, max, sum, cumulative sum of array
6. Create a dictionary with at least five keys and each key represent value as a list where
this list contains at least ten values and convert this dictionary as a pandas data frame
and explore the data through the data frame as follows:
a) Apply head () function to the pandas data frame
b) Perform various data selection operations on Data Frame
7. Select any two columns from the above data frame, and observe the change in one
attribute with respect to other attribute with scatter and plot operations in matplotlib
Reference Books:
1. https://www.coursera.org/learn/python-for-applied-data-science-ai
2. https://www.coursera.org/learn/python?specialization=python#syllabus
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
II Year I Semester L T P C
ENVIRONMENTAL SCIENCE 2 0 0 0
CourseObjectives:
● To make the students to ge tawareness on environment
● To understand the importance of protecting natural resources, ecosystems for future
generations and pollution causes due to the day to day activities of human life
● To save earth from the inventions by the engineers.
CourseOutcomes:
● Grasp multidisciplinary nature of environmental studies and various renewable and
non-renewable resources.
● Understand flow and bio-geo-chemical cycles and ecological pyramids.
● Understand various causes of pollution and solid waste management and related
preventive measures.
● About the rainwater harvesting, watershed management, ozone layer depletion and
waste landreclamation.
● Casus of population explosion, value education and welfare programmes.
UNIT–I
Multidisciplinary Nature Of Environmental Studies: – Definition, Scope and Importance –
Need forPublicAwareness.
Natural Resources:Renewable and non-renewable resources – Natural resources and
associated problems – Forest resources – Use and over – exploitation, deforestation, case
studies – Timberextraction – Mining, dams and other effects on forest and tribal people –
Water resources – Use andover utilization of surface and ground water – Floods, drought,
conflicts over water, dams – benefits and problems–Mineral resources:Use and
exploitation, environmental effects of extracting and using mineral resources, case studies–
Food resources:World food problems, changes caused by agriculture and overgrazing,
effects of modern agriculture, fertilizer-pesticide problems, water logging,
salinity,casestudies.–Energy resources:
UNIT–II
Ecosystems: Concep to fan ecosystem.–Structure and function of an ecosystem–Producers,
consumers and decomposers – Energy flow in the ecosystem – Ecological succession –
Food chains, food webs and ecological pyramids–Introduction, types, characteristic
features, structure and function of the following ecosystem:
a. Forest ecosystem.
b. Grassl and ecosystem
c. Desert ecosystem
d. Aquatic ecosystems (ponds, streams, lakes, rivers, oceans, estuaries)
Biodiversity And Its Conservation: Introduction Definition: genetic, species and ecosystem
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
UNIT–IV
Social Issues and the Environment: From Unsustainable to Sustainable development–
Urban problems related to energy – Water conservation, rain water harvesting, watershed
management –Resettlement and rehabilitation of people; its problems and concerns. Case
studies – Environmental ethics: Issues and possible solutions–Climate change, global
warming, acidrain, ozone layer depletion, nuclear accidents and holocaust. Case Studies –
Wastel and reclamation. – Consumerism and waste products. – Environment Protection
Act. – Air (Prevention and Control of Pollution) Act. –Water (Prevention and control of
Pollution) Act–Wild life Protection Act–Forest Conservation Act–Issues involved
inenforcement of environment allegislation–Public awareness.
UNIT–V
Human Population And The Environment: Population growth, variation among nations.
Population explosion – Family Welfare Programmes. – Environment and human health –
Human Rights – Value Education–HIV/AIDS–Women and Child Welfare–Role of
information Technology in Environment and human health–Case studies. Field Work:Visit
to a local area to document environmental assets River/ forest grassland/ hill/ mountain –
Visit to a local polluted site-Urban/Rural/Industrial/Agricultural Study of common
plants,insects, and birds–river, hills lopes,etc..
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
Text books:
1. Text book of Environmental Studies for Undergraduate Courses ErachBharucha for
University Grants Commission,Universities Press.
2. Palaniswamy,“Environmental Studies”,Pearson education
3. S.AzeemUnnisa,“Environmental Studies”Academic Publishing Company
4. K.RaghavanNambiar,“Text book of Environmental Studies for Undergraduate
Courses as per UGC model syllabus”, Scitech Publications (India), Pvt.Ltd.
Reference Books:
1. DeekshaDaveandE.SaiBabaReddy, “Text book of Environmental Science”,Cengage
Publications.
2. M.AnjiReddy,“Text book of Environmental Sciences and
Technology”,BSPublication.
3. J.P.Sharma,Comprehensive Environmental studies,Laxmi publications.
4. J.GlynnHenryandGaryW.Heinke,“Environmental Sciences and
Engineering”,Prentice Hall of India Private limited
5. G.R.Chatwal,“A Text Book of Environmental Studies”Himalaya Publishing House
6. Gilbert M.Masters and WendellP.Ela,“Introduction to Environmental Engineering
and Science,Prentice Hall of India Private limited.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
II Year II Semester L T P C
2 0 0 2
MANAGERIAL ECONOMICS AND FINANCIAL ANALYSIS
Course Objectives:
● To inculcate the basic knowledge of micro economics and financial accounting
● To make the students learn how demand is estimated for different products, input-
out put relationship for optimizing production and cost
● To Know the Various types of market structure and pricing methods and strategy
● To give an overview on investment appraisal methods to promote the students to
learn how to plan long-terminvestment decisions.
● To provide fundamental skills on accounting and to explain the process of
preparing financial statements.
Course Outcomes:
● Define the concepts related to Managerial Economics, financial accounting and
management.
● Understand the fundament also fEconomicsviz., Demand, Production, cost, revenue
and markets
● Apply the Concept of Production costand revenues for effective Business decision
● Analyze how to invest their capital and maximize returns
● Evaluate the capital budgeting techniques
● Develop the accounting statements and evaluate the financial performance of
businessentity.
UNIT-I
Managerial Economics: Introduction – Nature, meaning, significance, functions, and
advantages. Demand-Concept, Function,Law of Demand - Demand Elasticity- Types –
Measurement. Demand Forecasting- Factors governing Forecasting, Methods. Managerial
Economics and Financial Accounting and Management.
UNIT-II
Production and Cost Analysis: Introduction – Nature, meaning, significance, functions and
advantages. Production Function– Least-cost combination– Short run and long run
Production Function- Isoquants and Isocosts, MRTS -Cobb-Douglas Production Function -
Laws of Returns - Internal and External Economies of scale.Cost & Break-Even Analysis -
Cost concepts and Cost behaviour- Break-Even Analysis (BEA) -Determination of Break-
Even Point (Simple Problems)-Managerial significance and limitations ofBreak-
EvenAnalysis.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
UNIT-III
Business Organizations and Markets: Introduction–Nature, meaning, significance,
functions and advantages.Forms of Business Organizations- Sole Proprietary - Partnership -
Joint Stock Companies - Public Sector Enterprises.Types of Markets - Perfect and Imperfect
Competition - Features of Perfect Competition Monopoly-MonopolisticCompetition–
Oligopoly-Price-Output Determination-Pricing Methods and Strategies
UNIT-IV
UNIT-V
Financial Accounting and Analysis: Introduction – Nature, meaning, significance, functions
and advantages. Concepts and Conventions-Double-Entry Book Keeping, Journal, Ledger,
Trial Balance-Final Accounts (Trading Account, Profit and Loss Account and Balance Sheet
with simple adjustments).Financial Analysis-Analysis and Interpretation of Liquidity
Ratios,Activity Ratios,and Capital structure Ratios and Profitability.
Textbooks:
1. Varshney &Maheswari:Managerial Economics,Sultan Chand,2013.
Reference Books:
1. Managerial Economics: Principles And Worldwide Applications, 9E (Adaptation) by
Dominick Salvatore and Siddhartha Rastogi
2. Managerial Economics: Principles and Worldwide Applications
by Dominick Salvatore
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
II Year II Semester L T P C
3 0 0 3
NUMBER THEORY AND ITS APPLICATIONS
Course Objectives:
This course enables the students to learn the concepts of number theory and its applications to
information security.
Course Outcomes:
UNIT – V: Cryptology
Text Books:
1. Elementary number theory and its applications, Kenneth H Rosen, AT & T
Information systems & Bell laboratories.
2. A course in Number theory & Cryptography, Neal Koblitz, Springer.
Reference Books:
II Year II Semester L T P C
3 0 0 3
OPERATING SYSTEMS
Course Objectives:
The main objectives of the course is to make student
Understand the basic concepts and principles of operating systems, including process
management, memory management, file systems, and Protection
Make use of process scheduling algorithms and synchronization techniques to achieve
better performance of a computer system.
Illustrate different conditions for deadlock and their possible solutions.
UNIT - I
Operating Systems Overview: Introduction, Operating system functions, Operating systems
operations, Computing environments, Free and Open-Source Operating Systems System
Structures: Operating System Services, User and Operating-System Interface, system calls,
Types of System Calls, system programs, Operating system Design and Implementation,
Operating system structure, Building and Booting an Operating System, Operating system
debugging
UNIT - II
Processes: Process Concept, Process scheduling, Operations on processes, Inter-process
communication.Threads and Concurrency: Multithreading models, Thread libraries,
Threading issues.CPU Scheduling: Basic concepts, Scheduling criteria, Scheduling
algorithms, Multiple processor scheduling.
UNIT – III
Synchronization Tools: The Critical Section Problem, Peterson’s Solution, Mutex Locks,
Semaphores, Monitors, Classic problems of Synchronization.Deadlocks: system Model,
Deadlock characterization, Methods for handling Deadlocks, Deadlock prevention, Deadlock
avoidance, Deadlock detection, Recovery from Deadlock.
UNIT - IV
Memory-Management Strategies: Introduction, Contiguous memory allocation, Paging,
Structure of the Page Table, Swapping.Virtual Memory Management: Introduction,
Demand paging, Copy-on-write, Page replacement, Allocation of frames, Thrashing. Storage
Management: Overview of Mass Storage Structure, HDD Scheduling.
UNIT - V
File System: File System Interface: File concept, Access methods, Directory Structure; File
system Implementation: File-system structure, File-system Operations, Directory
implementation, Allocation method, Free space management; File-System Internals: File-
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
System Mounting, Partitions and Mounting, File Sharing. Protection: Goals of protection,
Principles of protection, Protection Rings, Domain of protection, Access matrix.
Text Books:
1. Operating System Concepts, Silberschatz A, Galvin P B, Gagne G, 10th Edition,
Wiley, 2018.
2. Modern Operating Systems, Tanenbaum A S, 4th Edition, Pearson , 2016
Reference Books:
1. Operating Systems -Internals and Design Principles, Stallings W, 9th edition, Pearson,
2018
2. Operating Systems: A Concept Based Approach, D.M Dhamdhere, 3rd Edition,
McGraw- Hill, 2013
II Year II Semester L T P C
DATABASE MANAGEMENT SYSTEMS 3 0 0 3
Course Objectives:
The main objectives of the course is to
Introduce database management systems and to give a good formal foundation on the
relational model of data and usage of Relational Algebra
Introduce the concepts of basic SQL as a universal Database language
Demonstrate the principles behind systematic database design approaches by covering
conceptual design, logical design through normalization
Provide an overview of physical design of a database system, by discussing Database
indexing techniques and storage techniques
UNIT I:
Introduction: Database system, Characteristics (Database Vs File System), Database Users,
Advantages of Database systems, Database applications. Brief introduction of different Data
Models; Concepts of Schema, Instance and data independence; Three tier schema
architecture for data independence; Database system structure, environment, Centralized and
Client Server architecture for the database.Entity Relationship Model: Introduction,
Representation of entities, attributes, entity set, relationship, relationship set, constraints, sub
classes, super class, inheritance, specialization, generalization using ER Diagrams.
UNIT II:
Relational Model: Introduction to relational model, concepts of domain, attribute, tuple,
relation, importance of null values, constraints (Domain, Key constraints, integrity
constraints) and their importance, Relational Algebra, Relational Calculus. BASIC SQL:
Simple Database schema, data types, table definitions (create, alter), different DML
operations (insert, delete, update).
UNIT III:
SQL: Basic SQL querying (select and project) using where clause, arithmetic & logical
operations, SQL functions (Date and Time, Numeric, String conversion).Creating tables with
relationship, implementation of key and integrity constraints, nested queries, sub
queries,grouping, aggregation, ordering, implementation of different types of joins,
view(updatable and non-updatable), relational set operations.
UNIT IV:
Schema Refinement (Normalization):Purpose of Normalization or schema refinement,
concept of functional dependency, normal forms based on functional dependency Lossless
join and dependency preserving decomposition, (1NF, 2NF and 3 NF), concept of surrogate
key, Boyce-Codd normal form(BCNF), MVD, Fourth normal form(4NF), Fifth Normal Form
(5NF).
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
UNIT V:
Transaction Concept: Transaction State, ACID properties, Concurrent Executions,
Serializability, Recoverability, Implementation of Isolation, Testing for Serializability, lock
based, time stamp based, optimistic, concurrency protocols, Deadlocks, Failure
Classification, Storage, Recovery and Atomicity, Recovery algorithm.Introduction to
Indexing Techniques: B+ Trees, operations on B+Trees, Hash Based Indexing:
Text Books:
Reference Books:
Web-Resources:
1) https://nptel.ac.in/courses/106/105/106105175/
2) https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_012758066672820
22456_shared/overview
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
II YEAR II SEMESTER L T P C
COMPUTER NETWORKS 3 0 0 3
Course Objectives:
The main objectives of the course is to
To understand the different types of networks
To discuss the software and hardware components of a network
To develop an understanding the principles of computer networks.
To familiarize with OSI model and the functions of layered structure.
To explain networking protocols, algorithms and design perspectives
UNIT I:
UNIT II:
The Data Link Layer: Guided Transmission Media, Persistent Storage, Twisted Pairs,
Coaxial Cable, Power Lines, Fiber Optics, Data Link Layer Design Issues, Services Provided
To The Network Layer, Framing Error Control, Flow Control, Error Detection And
Correction, Error-Correcting Codes, Error-Detecting Codes, Elementary Data Link Protocols,
Initial Simplifying Assumptions Basic Transmission And Receipt, Simplex Link-Layer
Protocols, Improving Efficiency, Bidirectional Transmission, Multiple Frames In Flight,
Examples Of Full-Duplex, Sliding Window Protocols, The Channel Allocation Problem,
Static Channel Allocation, Assumptions For Dynamic Channel Allocation, Multiple Access
Protocols, Aloha, Carrier Sense Multiple Access Protocols, Collision-Free Protocols,
Limited-Contention Protocols, Wireless LAN Protocols, Ethernet, Classic Ethernet Physical
Layer, Classic Ethernet Mac Sublayer Protocol, Ethernet Performance, Switched Ethernet,
Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet,40- And 100-Gigabit Ethernet,
Retrospective On Ethernet.
UNIT III:
The Network Layer: Network Layer Design Issues, Store-And-Forward Packet Switching,
Services Provided To The Transport Layer, Implementation Of Connectionless Service,
Implementation Of Connection-Oriented Service, Comparison Of Virtual-Circuit And
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
UNIT IV:
The Transport Layer: The Transport Service, Services Provided To The Upper Layers,
Transport Service Primitives, Berkeley Sockets, An Example Of Socket Programming: An
Internet File Server, Elements Of Transport Protocols, Addressing, Connection
Establishment, Connection Release, Error Control And Flow Control, Multiplexing, Crash
Recovery, Congestion Control, Desirable Bandwidth Allocation, Regulating The Sending
Rate, Wireless Issues, The Internet Transport Protocols: UDP, Introduction To UDP, Remote
Procedure Call, Real-Time Transport Protocols, The Internet Transport Protocols: TCP,
Introduction To TCP, The TCP Service Model, The TCP Protocol, The TCP Segment
Header, TCP Connection Establishment, TCP Connection Release.
UNIT V:
The Application Layer: Electronic Mail, Architecture and Services, The User Agent,
Message Formats, Message Transfer, Final Delivery, The World Wide Web, Architectural
Overview, Static Web Objects, Dynamic Web Pages and Web Applications, HTTP and
HTTPS, Web Privacy, Content Delivery, Content and Internet Traffic, Server Farms and Web
Proxies, Content Delivery Networks, Peer-To-Peer Networks, Evolution of The Internet.
Text Books:
Andrew Tanenbaum, Feamster Wetherall, Computer Networks, 6th Edition, Global Edition.
Reference Books:
Web-Resources:
https://nptel.ac.in/courses/106105183/25
http://www.nptelvideos.in/2012/11/computer-networks.html
https://nptel.ac.in/courses/106105183/3
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
II YEAR II SEMESTER L T P C
0 0 3 1.5
List of Activities/Experiments:
1. Study different types of Network cables (Copper and Fiber) and prepare cables
(Straight and Cross) to connect Two or more systems. Use crimping tool to connect
jacks. Use LAN tester to connect the cables.
- Install and configure Network Devices: HUB, Switch and Routers. Consider
both manageable and non-manageable switches. Do the logical configuration
of the system. Set the bandwidth of different ports.
- Install and Configure Wired and Wireless NIC and transfer files between
systems in Wired LAN and Wireless LAN. Consider both adhoc and
infrastructure mode of operation.
2. Work with the commands Ping, Tracert, Ipconfig, pathping, telnet, ftp, getmac, ARP,
Hostname, Nbtstat, netdiag, and Nslookup
3. Use Packet tracer software to build network topology and configure using Distance
vector routing protocol.
4. Use Packet tracer software to build network topology and configure using Link State
routing protocol.
5. Using JAVA RMI Write a program to implement Basic Calculator.
6. Implement a Chatting application using JAVA TCP and UDP sockets.
7. Hello command is used to know whether the machine at the other end is working or
not. Echo command is used to measure the round-trip time to the neighbor. Implement
Hello and Echo commands using JAVA.
8. Using Wireshark perform the following operations:
- Inspect HTTP Traffic
Sample Experiments:
Text Books:
Reference Books:
II Year II Semester L T P C
0 0 3 1.5
DATABASE MANAGEMENT SYSTEMS LAB
Course Objectives:
This Course will enable students to
Populate and query a database using SQL DDL/DML Commands
Declare and enforce integrity constraints on a database
Writing Queries using advanced concepts of SQL
Programming PL/SQL including procedures, functions, cursors and triggers,
Sample Experiments:
1. Creation, altering and droping of tables and inserting rows into a table (use constraints
while creating tables) examples using SELECT command.
2. Queries (along with sub Queries) using ANY, ALL, IN, EXISTS, NOTEXISTS,
UNION, INTERSET, Constraints. Example:- Select the roll number and name of the
student who secured fourth rank in the class.
3. Queries using Aggregate functions (COUNT, SUM, AVG, MAX and MIN), GROUP
BY, HAVING and Creation and dropping of Views.
4. Queries using Conversion functions (to_char, to_number and to_date), string
functions (Concatenation, lpad, rpad, ltrim, rtrim, lower, upper, initcap, length, substr
and instr), date functions (Sysdate, next_day, add_months, last_day, months_between,
least, greatest, trunc, round, to_char, to_date)
5.
i. Create a simple PL/SQL program which includes declaration section,
executable section and exception –Handling section (Ex. Student marks can be
selected from the table and printed for those who secured first class and an
exception can be raised if no records were found)
ii. Insert data into student table and use COMMIT, ROLLBACK and
SAVEPOINT in PL/SQL block.
6. Develop a program that includes the features NESTED IF, CASE and CASE
expression. The program can be extended using the NULLIF and COALESCE
functions.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
7. Program development using WHILE LOOPS, numeric FOR LOOPS, nested loops
using ERROR Handling, BUILT –IN Exceptions, USE defined Exceptions, RAISE-
APPLICATION ERROR.
8. Programs development using creation of procedures, passing parameters IN and OUT
of PROCEDURES.
9. Program development using creation of stored functions, invoke functions in SQL
Statements and write complex functions.
10. Develop programs using features parameters in a CURSOR, FOR UPDATE
CURSOR, WHERE CURRENT of clause and CURSOR variables.
11. Develop Programs using BEFORE and AFTER Triggers, Row and Statement
Triggers and INSTEAD OF Triggers
12. Create a table and perform the search operation on table using indexing and non-
indexing techniques.
13. Write a Java program that connects to a database using JDBC
14. Write a Java program to connect to a database using JDBC and insert values into it
15. Write a Java program to connect to a database using JDBC and delete values from it
II Year II Semester L T P C
FULL STACK DEVELOPMENT – 1 0 1 2 2
(Skill Enhancement Course)
Course Objectives:
The main objectives of the course are to
Make use of HTML elements and their attributes for designing static web pages
Build a web page by applying appropriate CSS styles to HTML elements
Experiment with JavaScript to develop dynamic web pages and validate forms
Sample Experiments:
4. Selector forms
a. Write a program to apply different types of selector forms
i. Simple selector (element, id, class, group, universal)
ii. Combinator selector (descendant, child, adjacentsibling, general sibling)
iii. Pseudo-class selector
iv. Pseudo-element selector
v. Attribute selector
5. CSS with Color, Background, Font, Text and CSS Box Model
a. Write a program to demonstrate the various ways you can reference a color in CSS.
b. Write a CSS rule that places a background image halfway down the page, tilting it
horizontally. The image should remain in place when the user scrolls up or down.
c. Write a program using the following terms related to CSS font and text:
i. font-size ii. font-weight iii. font-style
iv. text-decoration v. text-transformation vi. text-alignment
d. Write a program, to explain the importance of CSS Box model using
i. Content ii. Border iii. Margin iv. padding
d. Create a webpage which uses prompt dialogue box to ask a voter for his name and age.
Display the information in table format along with either the voter can vote or not
10. Node.js
a. Write a program to show the workflow of JavaScript code executable by creating web
server in Node.js.
b. Write a program to transfer data over http protocolusing http module.
c. Create a text file src.txt and add the following content to it. (HTML, CSS, Javascript,
Typescript, MongoDB, Express.js, React.js, Node.js)
d. Write a program to parse an URL using URL module.
e. Write a program to create an user-defined module and show the workflow of
Modularization of application using Node.js
Text Books:
1. Programming the World Wide Web, 7th Edition, Robet W Sebesta, Pearson, 2013.
2. Pro MERN Stack: Full Stack Web App Development with Mongo, Express, React, and
Node, Vasan Subramanian, 2nd edition, APress, O’Reilly.
Web Links:
https://www.w3schools.com/html
https://www.w3schools.com/css
https://www.w3schools.com/js/
https://www.w3schools.com/nodejs
https://www.w3schools.com/typescript
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
II Year II Semester L T P C
1 0 2 2
Introduction to elements and principles of Design, basics of design-dot, line, shape, form as
fundamental design components. Principles of design. Introduction to design thinking, history
of Design Thinking, New materials in Industry.
Design thinking process (empathize, analyze, idea & prototype), implementing the process in
driving inventions, design thinking in social innovations. Tools of design thinking - person,
costumer, journey map, brainstorming, product development
Activity: Every student presents their idea in three minutes, Every student can present design
process in the form of flow diagram or flow chart etc. Every student should explain about
product development.
Art of innovation, Difference between innovation and creativity, role of creativity and
innovation in organizations. Creativity to Innovation. Teams for innovation, Measuring the
impact and value of creativity.
Activity: Debate on innovation and creativity, Flow and planning from idea to innovation,
Debate on value-based innovation.
Problem formation, introduction to product design, Product strategies, Product value, Product
planning, product specifications. Innovation towards product design Case studies.
Activity: Importance of modeling, how to set specifications, Explaining their own product
design.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA – 533 003, Andhra Pradesh, India
B.TECH -CYBER SECURITY (R23-COURSE STRUCTURE & SYLLABUS)
Design Thinking applied in Business & Strategic Innovation, Design Thinking principles that
redefine business – Business challenges: Growth, Predictability, Change, Maintaining
Relevance, Extreme competition, Standardization. Design thinking to meet corporate needs.
Design thinking for Startups. Defining and testing Business Models and Business Cases.
Developing & testing prototypes.
Activity: How to market our own product, about maintenance, Reliability and plan for
startup.
Textbooks:
https://nptel.ac.in/courses/110/106/110106124/
https://nptel.ac.in/courses/109/104/109104109/
https://swayam.gov.in/nd1_noc19_mg60/preview
https://onlinecourses.nptel.ac.in/noc22_de16/preview
Course Outcomes:
Blooms
COs Statements
Level
CO1 Define the concepts related to design thinking. L1
CO2 Explain the fundamentals of Design Thinking and innovation. L2
Apply the design thinking techniques for solving problems in
CO3 L3
various sectors.
CO4 Analyse to work in a multidisciplinary environment. L4
CO5 Evaluate the value of creativity. L5