III - I Syllabus - R22b.tech - Cse (Cybersecurity) Coursestructure
III - I Syllabus - R22b.tech - Cse (Cybersecurity) Coursestructure
I Year I Semester
S. Course Course L T P Credits
No. Code
1. MA101BS Matrices and Calculus 3 1 0 4
2. CH102BS Engineering Chemistry 3 1 0 4
3. CS103ES Programming for Problem Solving 3 0 0 3
4. EE104ES Basic Electrical Engineering 2 0 0 2
5. ME105ES Computer Aided Engineering Graphics 1 0 4 3
6. CS106ES Elements of Computer Science & Engineering 0 0 2 1
7. CH107BS Engineering Chemistry Laboratory 0 0 2 1
8. CS108ES Programming for Problem Solving Laboratory 0 0 2 1
9. EE109ES Basic Electrical Engineering Laboratory 0 0 2 1
Induction Program
Total 12 2 12 20
I Year II Semester
S. Course Course L T P Credits
No. Code
1. MA201BS Ordinary Differential Equations and Vector Calculus 3 1 0 4
2. PH202BS Applied Physics 3 1 0 4
3. ME203ES Engineering Workshop 0 1 3 2.5
4. EN204HS English for Skill Enhancement 2 0 0 2
5. EC205ES Electronic Devices and Circuits 2 0 0 2
6. CS206ES Python Programming Laboratory 0 1 2 2
7. PH207BS Applied Physics Laboratory 0 0 3 1.5
8. EN208HS English Language and Communication Skills Laboratory 0 0 2 1
9. CS209ES IT Workshop 0 0 2 1
10. *MC210 Environmental Science 3 0 0 0
Total 13 4 12 20
II YEAR I SEMESTER
Course
S. No. Course Title L T P Credits
Code
1 CY301PC Digital Electronics 3 0 0 3
2 CY302PC Data Structures 3 0 0 3
3 CY303PC Computer Oriented Statistical Methods 3 1 0 4
4 CY304PC Computer Organization and Architecture 3 0 0 3
5 CY305PC Object Oriented Programming through Java 3 0 0 3
6 CY306PC Data Structures Lab 0 0 3 1.5
7 CY307PC Object Oriented Programming through Java Lab 0 0 3 1.5
8 CY308PC Data visualization- R Programming/ Power BI 0 0 2 1
9 *MC309 Gender Sensitization Lab 0 0 2 0
Total 15 1 10 20
Page 1 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
II YEAR II SEMESTER
Course
S. No. Course Title L T P Credits
Code
1 CY401PC Discrete Mathematics 3 0 0 3
2 SM402MS Business Economics & Financial Analysis 3 0 0 3
3 CY403PC Operating Systems 3 0 0 3
4 CY404PC Computer Networks 3 0 0 3
5 CY405PC Software Engineering 3 0 0 3
6 CY406PC Operating Systems Lab 0 0 2 1
7 CY407PC Computer Networks Lab 0 0 2 1
8 CY408PC Real-time Research Project/ Field Based Project 0 0 4 2
9 CY409PC Node JS/ React JS/ Django 0 0 2 1
10 *MC410 Constitution of India 3 0 0 0
Total 18 0 10 20
Environmental Science in III Yr II Sem Should be Registered by Lateral Entry Students Only.
Page 2 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
IV YEAR I SEMESTER
Course
S. No. Course Title L T P Credits
Code
1 CY701PC Vulnerability Assessment & Penetration Testing 3 0 0 3
2 CY702PC Network Management Systems and Operations 3 0 0 3
3 Professional Elective - IV 3 0 0 3
4 Professional Elective - V 3 0 0 3
5 Open Elective - II 3 0 0 3
6 CY703PC Vulnerability Assessment & Penetration Testing Lab 0 0 2 1
7 CY704PC Network Management Systems and Operations Lab 0 0 2 1
8 CY705PC Project Stage - I 0 0 6 3
Total 15 0 14 20
IV YEAR II SEMESTER
Course
S. No. Course Title L T P Credits
Code
1 CY801PC Organizational Behavior 3 0 0 3
2 Professional Elective – VI 3 0 0 3
3 Open Elective – III 3 0 0 3
4 CY802PC Project Stage – II including Seminar 0 0 22 11
Total 9 0 22 20
*MC – Satisfactory/Unsatisfactory
Professional Elective - I
CY511PE Compiler Design
CY512PE Artificial Intelligence
CY513PE Data warehousing and Data Mining
CY514PE Ad-hoc & Sensor Networks
CY515PE Cloud Computing
Professional Elective - II
CY521PE Ethical Hacking
CY522PE Data Science
CY523PE Distributed Systems
CY524PE Cyber Laws
CY525PE IoT Security
#
Courses in PE - III and PE - III Lab must be in 1-1 correspondence.
Page 3 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Professional Elective -V
CY751PE Quantum Computing
CY752PE Data Analytics for Fraud Detection
CY753PE 5G Technologies
CY754PE Security Incident & Response Management (SOC)
CY755PE Authentication Techniques
Professional Elective – VI
CY861PE Quantum Cryptography
CY862PE IoT Cloud Processing and Analytics
CY863PE Cloud Security
CY864PE Digital Watermarking and Steganography
CY865PE Data Privacy
Open Elective I:
1. CY611OE: Cyber Laws
2. CY612OE: Ethical Hacking
Page 4 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Outcomes:
Student will be able to understand basic cryptographic algorithms, message and web
authentication and security issues.
Ability to identify information system requirements for both of them such as client and server.
Ability to understand the current legal issues towards information security.
UNIT - I
Security Concepts: Introduction, The need for security, Security approaches, Principles of security,
Types of Security attacks, Security services, Security Mechanisms, A model for Network Security
Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution
techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key
cryptography, steganography, key range and key size, possible types of attacks.
UNIT - II
Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher
operation, Stream ciphers, RC4.
Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal
Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.
UNIT - III
Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512),
Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures,
Elgamal Digital Signature Scheme.
Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric
Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key
Infrastructure
UNIT - IV
Transport-level Security: Web security considerations, Secure Socket Layer and Transport Layer
Security, HTTPS, Secure Shell (SSH)
Wireless Network Security: Wireless Security, Mobile Device Security, IEEE 802.11 Wireless LAN,
IEEE 802.11i Wireless LAN Security
UNIT - V
E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP Security
architecture, Authentication Header, Encapsulating security payload, Combining security associations,
Internet Key Exchange
Case Studies on Cryptography and security: Secure Multiparty Calculation, Virtual Elections, Single
sign On, Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability.
Page 65 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
TEXT BOOKS:
1. Cryptography and Network Security - Principles and Practice: William Stallings, Pearson
Education, 6th Edition
2. Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition
REFERENCE BOOKS:
1. Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley
India, 1st Edition.
2. Cryptography and Network Security: Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition
3. Information Security, Principles, and Practice: Mark Stamp, Wiley India.
4. Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH
5. Introduction to Network Security: Neal Krawetz, CENGAGE Learning
6. Network Security and Cryptography: Bernard Menezes, CENGAGE Learning
Page 66 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Outcomes:
● Gain knowledge of fundamentals of DBMS, database design and normal forms
● Master the basics of SQL for retrieval and management of data.
● Be acquainted with the basics of transaction processing and concurrency control.
● Familiarity with database storage structures and access techniques
UNIT - I
Database System Applications: A Historical Perspective, File Systems versus a DBMS, the Data
Model, Levels of Abstraction in a DBMS, Data Independence, Structure of a DBMS
Introduction to Database Design: Database Design and ER Diagrams, Entities, Attributes, and Entity
Sets, Relationships and Relationship Sets, Additional Features of the ER Model, Conceptual Design
With the ER Model
UNIT - II
Introduction to the Relational Model: Integrity constraint over relations, enforcing integrity
constraints, querying relational data, logical database design, introduction to views, destroying/altering
tables and views.
Relational Algebra, Tuple relational Calculus, Domain relational calculus.
UNIT - III
SQL: QUERIES, CONSTRAINTS, TRIGGERS: form of basic SQL query, UNION, INTERSECT, and
EXCEPT, Nested Queries, aggregation operators, NULL values, complex integrity constraints in SQL,
triggers and active databases.
Schema Refinement: Problems caused by redundancy, decompositions, problems related to
decomposition, reasoning about functional dependencies, First, Second, Third normal forms, BCNF,
lossless join decomposition, multivalued dependencies, Fourth normal form, Fifth normal form.
UNIT - IV
Transaction Concept, Transaction State, Implementation of Atomicity and Durability, Concurrent
Executions, Serializability, Recoverability, Implementation of Isolation, Testing for serializability, Lock
Based Protocols, Timestamp Based Protocols, Validation- Based Protocols, Multiple Granularity,
Recovery and Atomicity, Log–Based Recovery, Recovery with Concurrent Transactions.
UNIT - V
Data on External Storage, File Organization and Indexing, Cluster Indexes, Primary and Secondary
Indexes, Index data Structures, Hash Based Indexing, Tree based Indexing, Comparison of File
Organizations, Indexes- Intuitions for tree Indexes, Indexed Sequential Access Methods (ISAM),
B+ Trees: A Dynamic Index Structure.
TEXT BOOKS:
1. Database System Concepts, Silberschatz, Korth, McGraw hill, V edition.3rd Edition
Page 67 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
2. Database Management Systems, Raghurama Krishnan, Johannes Gehrke, Tata Mc Graw Hill
REFERENCE BOOKS:
1. Database Systems design, Implementation, and Management, Peter Rob & Carlos Coronel 7th
Edition.
2. Fundamentals of Database Systems, Elmasri Navrate, Pearson Education
3. Introduction to Database Systems, C. J. Date, Pearson Education
4. Oracle for Professionals, The X Team, S.Shah and V. Shah, SPD.
5. Database Systems Using Oracle: A Simplified guide to SQL and PL/SQL, Shah, PHI.
6. Fundamentals of Database Management Systems, M. L. Gillenson, Wiley Student Edition.
Page 68 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Outcomes
Understand the concept of abstract machines and their power to recognize the languages.
Employ finite state machines for modeling and solving computing problems.
Design context free grammars for formal languages.
Distinguish between decidability and undecidability.
UNIT - I
Introduction to Finite Automata: Structural Representations, Automata and Complexity, the Central
Concepts of Automata Theory – Alphabets, Strings, Languages, Problems.
Nondeterministic Finite Automata: Formal Definition, an application, Text Search, Finite Automata
with Epsilon-Transitions.
Deterministic Finite Automata: Definition of DFA, How A DFA Process Strings, The language of DFA,
Conversion of NFA with €-transitions to NFA without €-transitions. Conversion of NFA to DFA, Moore
and Melay machines
UNIT - II
Regular Expressions: Finite Automata and Regular Expressions, Applications of Regular
Expressions, Algebraic Laws for Regular Expressions, Conversion of Finite Automata to Regular
Expressions.
Pumping Lemma for Regular Languages, Statement of the pumping lemma, Applications of the
Pumping Lemma.
Closure Properties of Regular Languages: Closure properties of Regular languages, Decision
Properties of Regular Languages, Equivalence and Minimization of Automata.
UNIT - III
Context-Free Grammars: Definition of Context-Free Grammars, Derivations Using a Grammar,
Leftmost and Rightmost Derivations, the Language of a Grammar, Sentential Forms, Parse Trees,
Applications of Context-Free Grammars, Ambiguity in Grammars and Languages.
Push Down Automata: Definition of the Pushdown Automaton, the Languages of a PDA, Equivalence
of PDA's and CFG's, Acceptance by final state, Acceptance by empty stack, Deterministic Pushdown
Automata. From CFG to PDA, From PDA to CFG.
UNIT - IV
Normal Forms for Context- Free Grammars: Eliminating useless symbols, Eliminating €-Productions.
Chomsky Normal form Greibach Normal form.
Pumping Lemma for Context-Free Languages: Statement of pumping lemma, Applications
Closure Properties of Context-Free Languages: Closure properties of CFL’s, Decision Properties of
CFL's Turing Machines: Introduction to Turing Machine, Formal Description, Instantaneous description,
The language of a Turing machine
Page 69 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
UNIT - V
Types of Turing machine: Turing machines and halting
Undecidability: Undecidability, A Language that is Not Recursively Enumerable, An Undecidable
Problem That is RE, Undecidable Problems about Turing Machines, Recursive languages, Properties
of recursive languages, Post's Correspondence Problem, Modified Post Correspondence problem,
Other Undecidable Problems, Counter machines.
TEXT BOOKS:
1. Introduction to Automata Theory, Languages, and Computation, 3nd Edition, John E. Hopcroft,
Rajeev Motwani, Jeffrey D. Ullman, Pearson Education.
2. Theory of Computer Science – Automata languages and computation, Mishra and
Chandrashekaran, 2nd edition, PHI.
REFERENCE BOOKS:
1. Introduction to Languages and The Theory of Computation, John C Martin, TMH.
2. Introduction to Computer Theory, Daniel I.A. Cohen, John Wiley.
3. A Textbook on Automata Theory, P. K. Srimani, Nasir S. F. B, Cambridge University Press.
4. Introduction to the Theory of Computation, Michael Sipser, 3rd edition, Cengage Learning.
5. Introduction to Formal languages Automata Theory and Computation Kamala Krithivasan,
Rama R, Pearson.
Page 70 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Objectives:
Introduce the major concepts of language translation and compiler design and impart the
knowledge of practical skills necessary for constructing a compiler.
Topics include phases of compiler, parsing, syntax directed translation, type checking use of
symbol tables, code optimization techniques, intermediate code generation, code generation
and data flow analysis.
Course Outcomes:
Demonstrate the ability to design a compiler given a set of language features.
Demonstrate the knowledge of patterns, tokens & regular expressions for lexical analysis.
Acquire skills in using lex tool & yacc tool for developing a scanner and parser.
Design and implement LL and LR parsers
Design algorithms to do code optimization in order to improve the performance of a program in
terms of space and time complexity.
Design algorithms to generate machine code.
UNIT - I
Introduction: The structure of a compiler, the science of building a compiler, programming language
basics
Lexical Analysis: The Role of the Lexical Analyzer, Input Buffering, Recognition of Tokens, The
Lexical-Analyzer Generator Lex, Finite Automata, From Regular Expressions to Automata, Design of a
Lexical-Analyzer Generator, Optimization of DFA-Based Pattern Matchers.
UNIT - II
Syntax Analysis: Introduction, Context-Free Grammars, Writing a Grammar, Top-Down Parsing,
Bottom-Up Parsing, Introduction to LR Parsing: Simple LR, More Powerful LR Parsers, Using
Ambiguous Grammars and Parser Generators.
UNIT - III
Syntax-Directed Translation: Syntax-Directed Definitions, Evaluation Orders for SDD's, Applications
of Syntax-Directed Translation, Syntax-Directed Translation Schemes, Implementing L-Attributed
SDD's.
Intermediate-Code Generation: Variants of Syntax Trees, Three-Address Code, Types and
Declarations, Type Checking, Control Flow, Switch-Statements, Intermediate Code for Procedures.
UNIT - IV
Run-Time Environments: Stack Allocation of Space, Access to Nonlocal Data on the Stack, Heap
Management, Introduction to Garbage Collection, Introduction to Trace-Based Collection.
Code Generation: Issues in the Design of a Code Generator, The Target Language, Addresses in the
Target Code, Basic Blocks and Flow Graphs, Optimization of Basic Blocks, A Simple Code Generator,
Peephole Optimization, Register Allocation and Assignment, Dynamic Programming Code-Generation
Page 71 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
UNIT - V
Machine-Independent Optimization: The Principal Sources of Optimization, Introduction to Data-Flow
Analysis, Foundations of Data-Flow Analysis, Constant Propagation, Partial-Redundancy Elimination,
Loops in Flow Graphs.
TEXT BOOK:
1. Compilers: Principles, Techniques and Tools, Second Edition, Alfred V. Aho, Monica S. Lam,
Ravi Sethi, Jeffry D. Ullman.
REFERENCE BOOKS:
1. Lex & Yacc – John R. Levine, Tony Mason, Doug Brown, O’reilly
2. Compiler Construction, Louden, Thomson.
Page 72 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Objectives:
To learn the distinction between optimal reasoning Vs. human like reasoning
To understand the concepts of state space representation, exhaustive search, heuristic
search together with the time and space complexities.
To learn different knowledge representation techniques.
To understand the applications of AI, namely game playing, theorem proving, and machine
learning.
Course Outcomes:
Understand search strategies and intelligent agents
Understand different adversarial search techniques
Apply propositional logic, predicate logic for knowledge representation
Apply AI techniques to solve problems of game playing, and machine learning.
UNIT - I
Introduction to AI, Intelligent Agents, problem-Solving Agents, Searching for Solutions, Uninformed
Search Strategies: Breadth-first search, Uniform cost search, Depth-first search, Iterative deepening
Depth-first search, Bidirectional search, Informed (Heuristic) Search Strategies: Greedy best-first
search, A* search, Heuristic Functions, Beyond Classical Search: Hill-climbing search, Simulated
annealing search, Local Search in Continuous Spaces
UNIT - II
Problem Solving by Search-II and Propositional Logic
Adversarial Search: Games, Optimal Decisions in Games, Alpha–Beta Pruning, Imperfect Real-Time
Decisions. Constraint Satisfaction Problems: Defining Constraint Satisfaction Problems, Constraint
Propagation, Backtracking Search for CSPs, Local Search for CSPs, The Structure of Problems.
Propositional Logic: Knowledge-Based Agents, The Wumpus World, Logic, Propositional Logic,
Propositional Theorem Proving: Inference and proofs, Proof by resolution, Horn clauses and definite
clauses, Forward and backward chaining, Effective Propositional Model Checking, Agents Based on
Propositional Logic.
UNIT - III
Logic and Knowledge Representation
First-Order Logic: Representation, Syntax and Semantics of First-Order Logic, Using First-Order
Logic, Knowledge Engineering in First-Order Logic.
Inference in First-Order Logic: Propositional vs. First-Order Inference, Unification and Lifting,
Forward Chaining, Backward Chaining, Resolution.
UNIT - IV
Knowledge Representation: Ontological Engineering, Categories and Objects, Events. Mental Events
and Mental Objects, Reasoning Systems for Categories, Reasoning with Default Information.
Classical Planning: Definition of Classical Planning, Algorithms for Planning with State-Space Search,
Planning Graphs, other Classical Planning Approaches, Analysis of Planning approaches.
Page 73 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
UNIT - V
Uncertain knowledge and Learning Uncertainty: Acting under Uncertainty, Basic Probability
Notation, Inference Using Full Joint Distributions, Independence, Bayes’ Rule and Its Use
Probabilistic Reasoning: Representing Knowledge in an Uncertain Domain, The Semantics of
Bayesian Networks, Efficient Representation of Conditional Distributions, Approximate Inference in
Bayesian Networks, Relational and First-Order Probability, Other Approaches to Uncertain Reasoning;
Dempster-Shafer theory.
TEXT BOOK:
1. Artificial Intelligence: A Modern Approach, Third Edition, Stuart Russell and Peter Norvig,
Pearson Education.
REFERENCE BOOKS:
1. Artificial Intelligence, 3rd Edn, E. Rich and K. Knight (TMH)
2. Artificial Intelligence, 3rd Edn., Patrick Henry Winston, Pearson Education.
3. Artificial Intelligence, Shivani Goel, Pearson Education.
4. Artificial Intelligence and Expert systems – Patterson, Pearson Education
Page 74 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Objectives:
Students will become acquainted with both the strengths and limitations of various data mining
techniques like Association, Classification, Cluster and Outlier analysis. Understand Data
warehouse and OLAP tools and architectures.
Course Outcomes:
Understand the need of data mining and pre-processing techniques.
Identify data warehouse models, architectures and schemas for enterprise applications.
Perform market basket analysis using association rule mining.
Understanding various classification models.
Identify appropriate clustering and outlier detection techniques to handle complex data.
UNIT - I
Introduction to Data Mining:
Data mining, Kinds of Data, Knowledge Discovery process, Data Mining Functionalities-Kinds of
Patterns mined, Major Issues in Data Mining. Data Pre-processing: Descriptive Data summarization,
Data Cleaning, Data Integration & Transformation, Data Reduction, Data Discretization.
UNIT- II
Data Warehouse and OLAP:
Data Warehouse basic concepts, Differences between Operational Database Systems and Data
Warehouses, multidimensional Data model, data warehouse architecture.
UNIT- III
Mining frequent patterns, associations and correlations: Basic Concepts, Market Basket Analysis,
Apriori Algorithm, FP-growth, mining various kinds of association rules, From Association Analysis to
Correlation Analysis.
UNIT- IV
Classification and prediction: Basic Concepts, issues regarding classification and prediction,
Decision Tree Induction, Bayesian Classification, Rule-Based Classification, classification by
backpropagation, lazy learners, prediction: linear regression, nonlinear regression, evaluating accuracy
of a classifier or predictor
UNIT- V
Cluster Analysis: Requirements for Cluster Analysis, Overview of Basic Clustering Methods,
Partitioning Methods-k-Means, k-Medoids, Hierarchical Methods-AGENES, DIANA, BIRCH, Density-
Based Method-DBSCAN, Outlier Analysis.
TEXT BOOKS:
1. Jiawei Han, Micheline Kamber, Jian Pei., Data Mining: Concepts and Techniques, 2 nd/3rd
Edition, Morgan Kaufmann/Elsevier, 2012.
2. Margaret H Dunham., Data Mining Introductory and Advanced Topics, 2nd Edition, Pearson
Education India, 2006.
REFERENCE BOOKS:
1. Data Mining Techniques, Arun K Pujari, 3rd Edition, Universities Press.
2. Pang-Ning Tan, Michael Steinbach, Anuj Karpatne and Vipin Kumar., Introduction to Data
Mining, 2nd Edition, Pearson Education India, 2021.
3. Amitesh Sinha., Data Warehousing, Thomson Learning, India, 2007.
Page 75 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Objectives
To understand the challenges of routing in ad-hoc and sensor networks
To understand various broadcast, mutlicast and geocasting protocols in ad hoc and sensor
networks
To understand basics of Wireless sensors, and Lower Layer Issues and Upper Layer Issues of WSN
Course Outcomes
Understand the concepts of sensor networks and applications
Understand and compare the MAC and routing protocols for adhoc networks
Understand the transport protocols of sensor networks
UNIT - I
Introduction to Ad Hoc Networks
Characteristics of MANETs, Applications of MANETs and Challenges of MANETs.
Routing in MANETs
Criteria for classification, Taxonomy of MANET routing algorithms, Topology-based routing algorithms-
Proactive: DSDV, WRP; Reactive: DSR, AODV, TORA; Hybrid: ZRP; Position- based routing algorithms-
Location Services-DREAM, Quorum-based, GLS; Forwarding Strategies, Greedy Packet, Restricted
Directional Flooding-DREAM, LAR; Other routing algorithms-QoS Routing, CEDAR.
UNIT - II
Data Transmission
Broadcast Storm Problem, Rebroadcasting Schemes-Simple-flooding, Probability-based Methods, Area-
based Methods, Neighbour Knowledge-based: SBA, Multipoint Relaying, AHBP. Multicasting: Tree-based:
AMRIS, MAODV; Mesh-based: ODMRP, CAMP; Hybrid: AMRoute, MCEDAR.
UNIT - III
Geocasting
Data-transmission Oriented-LBM; Route Creation Oriented-GeoTORA, MGR.
TCP over Ad Hoc TCP protocol overview, TCP and MANETs, Solutions for TCP over Ad hoc
UNIT - IV
Basics of Wireless Sensors and Lower Layer Issues-Applications, Classification of sensor networks,
Architecture of sensor network, Physical layer, MAC layer, Link layer, Routing Layer.
UNIT - V
Upper Layer Issues of WSN
Transport layer, High-level application layer support, Adapting to the inherent dynamic nature of WSNs.
TEXT BOOKS
1. Ad Hoc and Sensor Networks – Theory and Applications, Carlos Corderio Dharma P.Aggarwal, World
Scientific Publications, March 2006, ISBN – 981-256-681-3
2. Wireless Sensor Networks: An Information Processing Approach, Feng Zhao, Leonidas Guibas,
Elsevier Science, ISBN – 978-1-55860-914-3 (Morgan Kauffman)
REFERENCE BOOKS:
1. C. Siva Ram Murthy, B.S. Manoj Ad Hoc Wireless Networks: Architectures and Protocols.
2. Taieb Znati Kazem Sohraby, Daniel Minoli, Wireless Sensor Networks: Technology, Protocols and
Applications, Wiley.
Page 76 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Objectives:
This course provides an insight into cloud computing
Topics covered include- Cloud Computing Architecture, Deployment Models, Service Models,
Technological Drivers for Cloud Computing, Networking for Cloud Computing and Security in
Cloud Computing
Course Outcomes:
Understand different computing paradigms and potential of the paradigms and specifically
cloud computing
Understand cloud service types, cloud deployment models and technologies supporting and
driving the cloud
Acquire the knowledge of programming models for cloud and development of software
application that runs the cloud and various services available from major cloud providers
Understand the security concerns and issues in cloud computing
Acquire the knowledge of advances in cloud computing.
UNIT - I
Computing Paradigms, Cloud Computing Fundamentals, Cloud Computing Architecture and
Management
UNIT - II
Cloud Deployment Models, Cloud Service Models, Technological Drivers for Cloud Computing:
SOA and Cloud, Multicore Technology, Web 2.0 and Web 3.0, Pervasive Computing, Operating
System, Application Environment
UNIT - III
Virtualization, Programming Models for Cloud Computing: MapReduce, Cloud Haskell, Software
Development in Cloud
UNIT - IV
Networking for Cloud Computing: Introduction, Overview of Data Center Environment, Networking
Issues in Data Centers, Transport Layer Issues in DCNs, Cloud Service Providers
UNIT - V
Security in Cloud Computing, and Advanced Concepts in Cloud Computing
TEXT BOOK:
1. Chandrasekaran, K. Essentials of cloud computing. CRC Press, 2014
REFERENCE BOOKS:
1. Cloud Computing: Principles and Paradigms, Editors: Rajkumar Buyya, James Broberg,
Andrzej M. Goscinski, Wiley, 2011
2. Enterprise Cloud Computing - Technology, Architecture, Applications, Gautam Shroff,
Cambridge University Press, 2010
3. Cloud Computing Bible, Barrie Sosinsky, Wiley-India, 2010
Page 77 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Objectives:
The aim of the course is to introduce the methodologies and framework of ethical hacking for
enhancing security.
The course includes-Impacts of Hacking; Types of Hackers; Information Security Models;
Information Security Program; Business Perspective; Planning a Controlled Attack;
Framework of Steps (Reconnaissance, Enumeration, Vulnerability Analysis, Exploitation,
Deliverable and Integration)
Course Outcomes:
Gain the knowledge of the use and availability of tools to support an ethical hack
Gain the knowledge of interpreting the results of a controlled attack
Understand the role of politics, inherent and imposed limitations and metrics for planning of a
test
Comprehend the dangers associated with penetration testing
UNIT- I
Introduction: Hacking Impacts, The Hacker Framework: Planning the test, Sound Operations,
Reconnaissance, Enumeration, Vulnerability Analysis, Exploitation, Final Analysis, Deliverable,
Integration
Information Security Models: Computer Security, Network Security, Service Security, Application
Security, Security Architecture
Information Security Program: The Process of Information Security, Component Parts of Information
Security Program, Risk Analysis and Ethical Hacking
UNIT - II
The Business Perspective: Business Objectives, Security Policy, Previous Test Results, Business
Challenges Planning for a Controlled Attack: Inherent Limitations, Imposed Limitations, timing is
Everything, Attack Type, Source Point, Required Knowledge, Multi-Phased Attacks, Teaming and
Attack Structure, Engagement Planner, The Right Security Consultant, The Tester, Logistics,
Intermediates, Law Enforcement
UNIT - III
Preparing for a Hack: Technical Preparation, Managing the Engagement Reconnaissance: Social
Engineering, Physical Security, Internet Reconnaissance
UNIT - IV
Enumeration: Enumeration Techniques, Soft Objective, Looking Around or Attack, Elements of
Enumeration, Preparing for the Next Phase
Exploitation: Intuitive Testing, Evasion, Threads and Groups, Operating Systems, Password Crackers,
RootKits, applications, Wardialing, Network, Services and Areas of Concern
UNIT - V
Deliverable: The Deliverable, The Document, Overall Structure, Aligning Findings, Presentation
Page 78 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Integration: Integrating the Results, Integration Summary, Mitigation, Defense Planning, Incident
Management, Security Policy, Conclusion
TEXT BOOK:
1. James S. Tiller, “The Ethical Hack: A Framework for Business Value Penetration Testing”,
Auerbach Publications, CRC Press.
REFERENCE BOOKS:
1. EC-Council, “Ethical Hacking and Countermeasures Attack Phases”, Cengage Learning.
2. Michael Simpson, Kent Backman, James Corley, “Hands-On Ethical Hacking and Network
Defense”, Cengage Learning.
Page 79 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Outcomes:
Understand basic terms of statistical modeling and data science
Implementation of R programming concepts
utilize R elements for data visualization and prediction
UNIT- I
Introduction
Definition of Data Science- Big Data and Data Science hype – and getting past the hype - Datafication
- Current landscape of perspectives - Statistical Inference - Populations and samples - Statistical
modeling, probability distributions, fitting a model – Over fitting.
Basics of R: Introduction, R-Environment Setup, Programming with R, Basic Data Types.
UNIT- II
Data Types & Statistical Description
Types of Data: Attributes and Measurement, Attribute, The Type of an Attribute, The Different Types
of Attributes, Describing Attributes by the Number of Values, Asymmetric Attributes, Binary Attribute,
Nominal Attributes, Ordinal Attributes, Numeric Attributes, Discrete versus Continuous Attributes.
Basic Statistical Descriptions of Data: Measuring the Central Tendency: Mean, Median, and Mode,
Measuring the Dispersion of Data: Range, Quartiles, Variance, Standard Deviation, and Interquartile
Range, Graphic Displays of Basic Statistical Descriptions of Data.
UNIT- III
Vectors: Creating and Naming Vectors, Vector Arithmetic, Vector sub setting,
Matrices: Creating and Naming Matrices, Matrix Sub setting, Arrays, Class.
Factors and Data Frames: Introduction to Factors: Factor Levels, Summarizing a Factor, Ordered
Factors, Comparing Ordered Factors, Introduction to Data Frame, subsetting of Data Frames,
Extending Data Frames, Sorting Data Frames.
Lists: Introduction, creating a List: Creating a Named List, Accessing List Elements, Manipulating List
Elements, Merging Lists, Converting Lists to Vectors
UNIT- IV
Conditionals and Control Flow: Relational Operators, Relational Operators and Vectors, Logical
Operators, Logical Operators and Vectors, Conditional Statements.
Iterative Programming in R: Introduction, While Loop, For Loop, Looping Over List.
Functions in R: Introduction, writing a Function in R, Nested Functions, Function Scoping, Recursion,
Loading an R Package, Mathematical Functions in R.
UNIT- V
Charts and Graphs: Introduction, Pie Chart: Chart Legend, Bar Chart, Box Plot, Histogram, Line
Graph: Multiple Lines in Line Graph, Scatter Plot.
Regression: Linear Regression Analysis, Multiple Linear regression
Page 80 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
TEXT BOOKS:
1. Doing Data Science, Straight Talk from The Frontline. Cathy O’Neil and Rachel Schutt, O’Reilly,
2014.
2. K G Srinivas, G M Siddesh, “Statistical programming in R”, Oxford Publications.
REFERENCE BOOKS:
1. Jiawei Han, Micheline Kamber and Jian Pei. Data Mining: Concepts and Techniques, 3rd ed.
The Morgan Kaufmann Series in Data Management Systems.
2. Introduction to Data Mining, Pang-Ning Tan, Vipin Kumar, Michael Steinbanch, Pearson
Education.
3. Brain S. Everitt, “A Handbook of Statistical Analysis Using R”, Second Edition, 4 LLC, 2014.
4. Dalgaard, Peter, “Introductory statistics with R”, Springer Science & Business Media, 2008.
5. Paul Teetor, “R Cookbook”, O’Reilly, 2011.
Page 81 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Objectives:
To provide an insight into Distributed systems.
To introduce concepts related to Peer to Peer Systems, Transactions and Concurrency control,
Security and Distributed shared memory
Course Outcomes:
Understand Transactions and Concurrency control.
Understand distributed shared memory.
Design a protocol for a given distributed application.
UNIT - I
Characterization of Distributed Systems: Examples of Distributed systems, Resource sharing and
web, challenges
System models: Architectural and Fundamental models, Networking and Internetworking, Interprocess
Communication
Distributed objects and Remote Invocation: Communication between distributed objects, RPC,
Events and notifications, Case study-Java RMI.
UNIT - II
Operating System Support- OS layer, Protection, Processes and Threads, Communication and
Invocation, Operating system architecture.
Distributed File Systems-Introduction, File Service architecture.
UNIT - III
Peer to Peer Systems– Napster and its legacy, Peer to Peer middleware
Time and Global States-Introduction, Clocks, events and Process states, Synchronizing physical
clocks, logical time and logical clocks, global states, distributed debugging.
Coordination and Agreement- Distributed mutual exclusion, Elections, Multicast communication,
consensus and related problems.
UNIT - IV
Transactions and Concurrency Control- Introduction, Transactions, Nested Transactions, Locks,
Optimistic concurrency control, Timestamp ordering.
Distributed Transactions-Introduction, Flat and Nested Distributed Transactions, Atomic commit
protocols, Concurrency control in distributed transactions
Distributed deadlocks: Transaction recovery.
UNIT - V
Replication: Introduction, System model and group communication, Fault tolerant services,
Transactions with replicated data.
Distributed shared memory: Design and Implementation issues, Consistency models.
TEXT BOOKS:
1. Distributed Systems Concepts and Design, G Coulouris, J Dollimore and T Kindberg, Fourth
Edition, Pearson Education.
2. Distributed Systems, S. Ghosh, Chapman & Hall/CRC, Taylor & Francis Group, 2010.
REFERENCE BOOKS:
1. Distributed Systems – Principles and Paradigms, A.S. Tanenbaum and M.V. Steen, Pearson
Education.
2. Distributed Computing, Principles, Algorithms and Systems, Ajay D. Kshemakalyani and
Mukesh Singhal, Cambridge, rp 2010.
Page 82 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Outcomes
Learn evolution and key aspects of Indian cyber law, including recent amendments.
Gain knowledge about the legalities of digital signatures and the role of e-governance in the IT
Act.
Develop an understanding of the legalities involved in electronic contracts and international
conventions.
Adapt in understanding and analyzing cybercrime, electronic evidence, and intellectual property
rights in the context of IT.
UNIT - I
Introduction: History of Internet and World Wide Web, Need for cyber law, Cybercrime on the rise,
Important terms related to cyber law.
Cyber law in India: Need for cyber law in India, History of cyber law in India.
Information Technology Act, 2000: Overview of other laws amended by the IT Act, 2000, National
Policy on Information Technology 2012.
UNIT - II
Overview of the Information Technology Act, 2000: Applicability of the Act, Important provisions of
the Act: Digital signature and Electronic signature, Digital Signature under the IT Act, 2000, E-
Governance Attribution, Acknowledgement and Dispatch of Electronic Records, Certifying Authorities,
Electronic Signature Certificates, Duties of Subscribers, Penalties and Offences, Intermediaries.
UNIT - III
Overview of rules issued under The IT Act, 2000, Electronic Commerce, Electronic Contracts, Cyber
Crimes, Cyber Frauds.
UNIT - IV
Regulatory Authorities: Department of Electronics and Information Technology, Controller of
Certifying Authorities (CCA), Cyber Appellate Tribunal, Indian Computer Emergency Response Team
(ICERT), Cloud Computing, Case Laws.
UNIT - V
Introduction to Cybercrime and procedure to report Cybercrime: procedure to report cybercrime,
some basic rules for safe operations of the computer and internet, the criminal law (amendment) act,
2013: legislative remedies for online harassment and cyberstalking in India.
TEXT BOOKS:
1. Textbook on “Cyber Law”, second edition, Pavan Duggal, Universal Law Publishing.
2. Textbook on “Indian Cyber law on Cybercrimes”, Pavan Duggal,
Page 83 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
REFERENCE BOOKS:
1. Debby Russell and Sr. G.T Gangemi, "Computer Security Basics (Paperback)”, 2nd Edition, O’
Reilly Media, 2006.
2. Thomas R. Peltier, “Information Security policies and procedures: A
Practitioner’s Reference”, 2nd Edition Prentice Hall, 2004.
3. Kenneth J. Knapp, “Cyber Security and Global Information Assurance: Threat Analysis and
Response Solutions”, IGI Global, 2009.
4. Thomas R Peltier, Justin Peltier and John Blackley,” Information Security Fundamentals”, 2nd
Edition, Prentice Hall, 1996.
Page 84 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Outcomes:
Incorporate the best practices learnt to identify the attacks and mitigate the same
Adopt the right security techniques and protocols during the design of IoT products
Assimilate and apply the skills learnt on ciphers and block chains when appropriate
Describe the essential components of IoT
Find appropriate security/privacy solutions for IoT
UNIT- I
Fundamentals of IoT and Security and its need, Prevent Unauthorized Access to Sensor Data, Block
ciphers, Introduction to Blockchain, Introduction of IoT devices, IoT Security Requirements, M2M
Security, Message integrity Modeling faults and adversaries Difference among IoT devices, computers,
and embedded devices.
UNIT- II
IoT and cyber-physical systems RFID Security, Authenticated encryption Byzantine Generals problem
sensors and actuators in IoT, IoT security (vulnerabilities, attacks, and countermeasures), Cyber
Physical Object Security, Hash functions Consensus algorithms and their scalability problems
Accelerometer, photoresistor, buttons
UNIT- III
Security engineering for IoT development Hardware Security, Merkle trees and Elliptic curves digital
signatures, verifiable random functions, Zero-knowledge systems motor, LED, vibrator, IoT security
lifecycle, Front-end System Privacy Protection, Management, Secure IoT Databases, Public-key crypto
(PKI), blockchain, the challenges, and solutions, analog signal vs. digital signal
UNIT- IV
Data Privacy Networking Function Security Trees signature algorithms proof of work, Proof of stake,
Networking in IoT Device/User Authentication in IoT IoT Networking Protocols, Crypto-currencies,
alternatives to Bitcoin consensus, Bitcoin scripting language and their use Real-time communication
UNIT- V
Introduction to Authentication Techniques, Secure IoT Lower Layers, Bitcoin P2P network, Ethereum
and Smart Contracts, Bandwidth efficiency, Data Trustworthiness in IoT, Secure IoT Higher Layers,
Distributed consensus, Smart Contract Languages and verification challenges, Data analytics in IoT -
simple data analyzing methods
TEXT BOOKS:
1. B. Russell and D. Van Duren, “Practical Internet of Things Security,” Packt Publishing, 2016.
2. FeiHU,“Security and Privacy Internet of Things (IoTs):Models, Algorithms and
Implementations”, CRC Press, 2016
3. Narayanan et al., “Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction,”
Princeton University Press, 2016.
Page 85 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
REFERENCE BOOKS:
1. A. Antonopoulos, “Mastering Bitcoin: Unlocking Digital Crypto currencies,” O’Reilly, 2014.
2. T. Alpcan and T. Basar, “Network Security: A Decision and Game-theoretic Approach,”
Cambridge University Press, 2011.
3. Security and the IoT ecosystem, KPMG International, 2015.
4. Internet of Things: IoT Governance, Privacy and Security Issues” European Research Cluster.
5. Ollie Whitehouse, “Security of Things: An Implementers' Guide to Cyber-Security for Internet
of Things Devices and Beyond”, NCC Group, 2014.
6. Josh Thompson, ‘Blockchain: The Blockchain for Beginnings, Guide to Blockchain Technology
and Blockchain Programming’, Create Space Independent Publishing Platform, 2017.
Page 86 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Outcomes:
Understand basic cryptographic algorithms, message and web authentication and security
issues.
Identify information system requirements for both of them such as client and server.
Understand the current legal issues towards information security.
List of Experiments:
1. Write a C program that contains a string (char pointer) with a value ‘Hello world’. The program should
XOR each character in this string with 0 and display the result.
2. Write a C program that contains a string (char pointer) with a value ‘Hello world’. The program should
AND or and XOR each character in this string with 127 and display the result.
3. Write a Java program to perform encryption and decryption using the following algorithms
a. Ceaser cipher b. Substitution cipher c. Hill Cipher
4. Write a C/JAVA program to implement the DES algorithm logic.
5. Write a C/JAVA program to implement the Blowfish algorithm logic.
6. Write a C/JAVA program to implement the Rijndael algorithm logic.
7. Write the RC4 logic in Java Using Java cryptography; encrypt the text “Hello world” using Blowfish.
Create your own key using Java key tool.
8. Write a Java program to implement the RSA algorithm.
9. Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript.
10. Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
11. Calculate the message digest of a text using the MD5 algorithm in JAVA
TEXT BOOKS:
1. Cryptography and Network Security - Principles and Practice: William Stallings, Pearson
Education, 6th Edition
2. Cryptography and Network Security: Atul Kahate, McGraw Hill, 3rd Edition
REFERENCE BOOKS:
1. Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley
India, 1st Edition.
2. Cryptography and Network Security: Forouzan Mukhopadhyay, McGraw Hill, 3rd Edition
3. Information Security, Principles, and Practice: Mark Stamp, Wiley India.
4. Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH
5. Introduction to Network Security: Neal Krawetz, CENGAGE Learning
6. Network Security and Cryptography: Bernard Menezes, CENGAGE Learning
Page 87 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Objectives:
Introduce ER data model, database design and normalization
Learn SQL basics for data definition and data manipulation
Course Outcomes:
Design database schema for a given application and apply normalization
Acquire skills in using SQL commands for data definition and data manipulation.
Develop solutions for database applications using procedures, cursors and triggers
List of Experiments:
1. Concept design with E-R Model
2. Relational Model
3. Normalization
4. Practicing DDL commands
5. Practicing DML commands
6. A. Querying (using ANY, ALL, UNION, INTERSECT, JOIN, Constraints etc.)
B. Nested, Correlated subqueries
7. Queries using Aggregate functions, GROUP BY, HAVING and Creation and dropping of Views.
8. Triggers (Creation of insert trigger, delete trigger, update trigger)
9. Procedures
10. Usage of Cursors
TEXT BOOKS:
1. Database Management Systems, Raghurama Krishnan, Johannes Gehrke, Tata Mc Graw Hill,
3rd Edition
2. Database System Concepts, Silberschatz, Korth, McGraw Hill, V edition.
REFERENCES BOOKS:
1. Database Systems design, Implementation, and Management, Peter Rob & Carlos Coronel
7th Edition.
2. Fundamentals of Database Systems, Elmasri Navrate, Pearson Education
3. Introduction to Database Systems, C.J. Date, Pearson Education
4. Oracle for Professionals, The X Team, S. Shah and V. Shah, SPD.
5. Database Systems Using Oracle: A Simplified guide to SQL and PL/SQL, Shah, PHI.
6. Fundamentals of Database Management Systems, M. L. Gillenson, Wiley Student Edition.
Page 88 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
2. Objectives:
This Lab focuses on using multi-media instruction for language development to meet the following
targets:
To improve the students’ fluency in English, with a focus on vocabulary
To enable them to listen to English spoken at normal conversational speed by educated English
speakers
To respond appropriately in different socio-cultural and professional contexts
To communicate their ideas relevantly and coherently in writing
To prepare the students for placements.
3. Syllabus:
The following course content to conduct the activities is prescribed for the Advanced English
Communication Skills (AECS) Lab:
1. Activities on Listening and Reading Comprehension: Active Listening – Development of
Listening Skills Through Audio clips - Benefits of Reading – Methods and Techniques of Reading
– Basic Steps to Effective Reading – Common Obstacles – Discourse Markers or Linkers - Sub-
skills of reading - Reading for facts, negative facts and Specific Details- Guessing Meanings from
Context, Inferring Meaning - Critical Reading –– Reading Comprehension – Exercises for Practice.
2. Activities on Writing Skills: Vocabulary for Competitive Examinations - Planning for Writing –
Improving Writing Skills - Structure and presentation of different types of writing – Free Writing and
Structured Writing - Letter Writing –Writing a Letter of Application –Resume vs. Curriculum Vitae
– Writing a Résumé – Styles of Résumé - e-Correspondence – Emails – Blog Writing - (N)etiquette
– Report Writing – Importance of Reports – Types and Formats of Reports– Technical Report
Writing– Exercises for Practice.
3. Activities on Presentation Skills - Starting a conversation – responding appropriately and
relevantly – using the right language and body language – Role Play in different situations including
Seeking Clarification, Making a Request, Asking for and Refusing Permission, Participating in a
Small Talk – Oral presentations (individual and group) through JAM sessions- PPTs – Importance
of Presentation Skills – Planning, Preparing, Rehearsing and Making a Presentation – Dealing with
Glossophobia or Stage Fear – Understanding Nuances of Delivery - Presentations through
Posters/Projects/Reports – Checklist for Making a Presentation and Rubrics of Evaluation
Page 89 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
4. Minimum Requirement:
The Advanced English Communication Skills (AECS) Laboratory shall have the following
infrastructural facilities to accommodate at least 35 students in the lab:
Spacious room with appropriate acoustics
Round Tables with movable chairs
Audio-visual aids
LCD Projector
Public Address system
One PC with latest configuration for the teacher
T. V, a digital stereo & Camcorder
Headphones of High quality
5. Suggested Software: The software consisting of the prescribed topics elaborated above should be
procured and used.
TOEFL & GRE (KAPLAN, AARCO & BARRONS, USA, Cracking GRE by CLIFFS)
Oxford Advanced Learner’s Dictionary, 10th Edition
Cambridge Advanced Learner’s Dictionary
DELTA’s key to the Next Generation TOEFL Test: Advanced Skill Practice.
Lingua TOEFL CBT Insider, by Dreamtech
6. Books Recommended:
1. Rizvi, M. Ashraf (2018). Effective Technical Communication. (2nd ed.). McGraw Hill Education
(India) Pvt. Ltd.
2. Suresh Kumar, E. (2015). Engineering English. Orient BlackSwan Pvt. Ltd.
3. Bailey, Stephen. (2018). Academic Writing: A Handbook for International Students. (5th Edition).
Routledge.
4. Koneru, Aruna. (2016). Professional Communication. McGraw Hill Education (India) Pvt. Ltd.
5. Raman, Meenakshi & Sharma, Sangeeta. (2022). Technical Communication, Principles and
Practice. (4TH Edition) Oxford University Press.
6. Anderson, Paul V. (2007). Technical Communication. Cengage Learning Pvt. Ltd. New Delhi.
7. McCarthy, Michael; O’Dell, Felicity & Redman, Stuart. (2017). English Vocabulary in Use
Series. Cambridge University Press
8. Sen, Leela. (2009). Communication Skills. PHI Learning Pvt Ltd., New Delhi.
9. Elbow, Peter. (1998 ). Writing with Power. Oxford University Press.
10. Goleman, Daniel. (2013). Emotional Intelligence: Why it can matter more than IQ. Bloomsbury
Publishing.
Page 90 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
CY506PC: UI DESIGN-FLUTTER
Course Outcomes:
Implements Flutter Widgets and Layouts
Responsive UI Design and with Navigation in Flutter
Create custom widgets for specific UI elements and also Apply styling using themes and custom
styles.
Design a form with various input fields, along with validation and error handling
Fetches data and write code for unit Test for UI components and also animation
TEXT BOOK:
1. Marco L. Napoli, Beginning Flutter: A Hands-on Guide to App Development.
Page 91 of 150
R22 B.Tech. CSE (Cyber Security) Syllabus JNTU Hyderabad
Course Outcomes:
Distinguish and Explain various forms of IPRs.
Identify criteria to fit one's own intellectual work in particular form of IPRs.
Apply statutory provisions to protect particular form of IPRs.
Appraise new developments in IPR laws at national and international level
UNIT – I
Introduction to Intellectual property: Introduction, types of intellectual property, international
organizations, agencies and treaties, importance of intellectual property rights.
UNIT – II
Trade Marks: Purpose and function of trademarks, acquisition of trade mark rights, protectable matter,
selecting, and evaluating trade mark, trade mark registration processes.
UNIT – III
Law of copyrights: Fundamental of copyright law, originality of material, rights of reproduction, rights
to perform the work publicly, copyright ownership issues, copyright registration, notice of copyright,
International copyright law.
Law of patents: Foundation of patent law, patent searching process, ownership rights and transfer
UNIT – IV
Trade Secrets: Trade secret law, determination of trade secret status, liability for misappropriations of
trade secrets, protection for submission, trade secret litigation.
Unfair competition: Misappropriation right of publicity, false advertising.
UNIT – V
New development of intellectual property: new developments in trade mark law; copyright law, patent
law, intellectual property audits.
International overview on intellectual property, international – trade mark law, copyright law,
international patent law, and international development in trade secrets law.
TEXT BOOK:
1. Intellectual property right, Deborah. E. Bouchoux, Cengage learning.
REFERENCE BOOK:
1. Intellectual property right – Unleashing the knowledge economy, prabuddha ganguli, Tata
McGraw Hill Publishing company ltd.
Page 92 of 150