BSC It 2023 24 Syllabus
BSC It 2023 24 Syllabus
Information Technology
Syllabus
AFFILIATED COLLEGES
BHARATHIAR UNIVERSITY
(A State University, Accredited with “A++” Grade by NAAC,
Ranked 21st among Indian Universities by MHRD-NIRF)
Coimbatore - 641 046, Tamil Nadu, India
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 1 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 2 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 3 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
BHARATHIAR UNIVERSITY::COIMBATORE 641 046
B. Sc. Information Technology (CBCS PATTERN)
(For the students admitted from the academic year 2023-2024 and
onwards)
Scheme of Examination
Examination
Hours/
Part Title of the Course Duration Maximum Marks Credits
Week
in Hours CIA CEE Total
Semester I
I Language - I 4 3 25 75 100 4
II English - I 4 3 25 75 100 4
III Core Paper I Computing Fundamentals and C 5 3 25 75 100 4
Programming
III Core Paper II Digital Fundamentals and 25 75 100
Computer Architecture 5 3 4
III Core Practical – I Programming Lab - C 5 3 25 75 100 4
III Allied A: Paper I Mathematical Structures for 5 3 25 75 100 4
Computer Science
IV Environmental Studies* 2 3 - 50 50 2
Total 30 150 500 650 26
Semester II
I Language – II 4 3 25 75 100 4
II English – II 4 3 12 38 50 2
Naan Mudhalvan Courses
Effective English & 12 38
2 50 2
http://kb.naanmudhalvan.in/images/c/c7/Cambri
dge_Course_Details.pdf
III Core Paper 3: C++ Programming 5 3 25 75 100 4
III Core Lab 2: Programming Lab - C++ 5 3 20 30 50 2
III Core Lab 3: Internet Basics 3 3 20 30 50 2
III Allied A: Paper II Discrete Mathematics 5 3 25 75 100 4
IV Value Education – Human Rights* 2 3 - 50 50 2
Total 30 139 411 550 22
Semester III
I Language – III 4 3 25 75 100 4
II English – III 4 3 25 75 100 4
III Core Paper 4: Data Structures 4 3 25 75 100 4
III Core Paper 5: Java Programming 4 3 25 75 100 4
III Core Lab 4: Programming Lab - Java 3 3 20 30 50 2
III Allied B: Paper I Microprocessor & ALP 5 3 12 38 50 2
III Skill based Subject1: Introduction to web 4 3 30 45 75 3
design & Applications
IV Tamil** / Advanced Tamil* (OR) Non-
major elective - I (Yoga for Human 2 3 - 50 50 2
Excellence)* / Women’s Rights*
Total 30 162 463 625 25
Semester IV
I Language – IV
4 3 25 75 100 4
II English – IV 4 3 12 38 50 2
Page 4 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
III Core Paper 6: System Software and Operating
4 3 25 75 100 4
System
III Core Paper 7: Linux and Shell Programming 4 3 25 75 100 3
III Core Lab – 5: Linux and Shell Programming
3 3 20 30 50 2
Lab
Naan Mudhalvan Courses
Office Fundamentals - Lab***
http://kb.naanmudhalvan.in/Bharathiar_ 2 - 20 30 50 2
University_(BU)
III Allied 4: Business Accounting 4 3 12 38 50 2
III Skill based Subject 2 Lab: HTML, XML and
3 3 20 30 50 2
JavaScript- Lab
IV Tamil**/Advanced Tamil* (OR) Non-
major elective -II (General Awareness*) 2 3 - 50 50 2
Total 30 159 441 600 23
Semester V
III Core8:RDBMS & Oracle 6 3 25 75 100 4
III Core9:Visual Basic 6 3 25 75 100 4
III Core6:Programming VB & Oracle lab 6 3 30 45 75 4
Page 5 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Note:
* No Continuous Internal Assessment (CIA), University Examinations Only.
** No University Examinations, Continuous Internal Assessment (CIA) Only.
*** Naan Mudhalvan – Skill courses- external marks (CEE) will be assessed by Industry and internal will
be offered by respective course teacher.
Page 6 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
First
Semester
Page 7 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 8 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Scope, Visibility and Lifetime of Variables- Multi file Programs. Structures and Unions
Reference Books
1 Ashok N Kamthane: Programming with ANSI and Turbo C, Pearson, 2002.
2 Henry Mullish & Hubert L.Cooper: The Sprit of C, Jaico, 1996.
Page 9 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 10 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Reference Books
1 Digital Electronics Circuits and Systems, V.K. Puri, TMH.
2 Computer Architecture, M. Carter, Schaum‘s outline series, TMH.
Page 11 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Programs 36 hours
1. Write a C program to find the sum, average, standard deviation for a given set of numbers.
2. Write a C program to generate n prime numbers.
3. Write a C program to generate Fibonacci series.
4. Write a C program to print magic square of order n where n > 3 and n is odd.
5. Write a C program to sort the given set of numbers in ascending order.
6. Write a C program to check whether the given string is a palindrome or not using pointers.
7. Write a C program to count the number of Vowels in the given sentence.
8. Write a C program to find the factorial of a given number using recursive function.
9. Write a C program to print the students Mark sheet assuming roll no, name, and marks in 5
subjects in a structure. Create an array of structures and print the mark sheet in the university
pattern.
10. Write a function using pointers to add two matrices and to return the resultant matrix to the
calling function.
11. Write a C program which receives two filenames as arguments and check whether the file
contents are same or not. If same delete the second file
12. Write a program which takes a file as command line argument and copy it to another file. At
the end of the second file write the total i) no of chars ii) no. of words and iii) no. of lines.
Total Lecture hours 36 hours
Text Book(s)
1 E Balagurusamy: Computing Fundamentals & C Programming – Tata McGraw-Hill, Second
Reprint 2008
Page 12 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Reference Books
1 Ashok N Kamthane: Programming with ANSI and Turbo C, Pearson, 2002.
2 Henry Mullish & Hubert L.Cooper: The Sprit of C, Jaico, 1996.
Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]
1 Introduction to Programming in C – NPTEL
2 Problem solving through Programming in C – SWAYAM
3 C for Everyone : Programming Fundamentals – Course
Page 13 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Second
Semester
Page 14 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 15 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Reference Books
1 E. Balagurusamy, Object-Oriented Programming with C++, TMH, 1998.
2 Maria Litvin & Gray Litvin, C++ for you, Vikas publication, 2002.
3 John R Hubbard, Programming with C, 2nd Edition, TMH publication, 2002.
Page 16 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Programs 36 hours
1. Write a C++ Program to create a class to implement the data structure STACK. Write a constructor
to initialize the TOP of the STACK. Write a member function PUSH() to insert an element and
member function POP() to delete an element check for overflow and underflow conditions..
2. Write a C++ Program to create a class ARITHMETIC which consists of a FLOAT and an INTEGER
variable. Write member functions ADD (), SUB(), MUL(), DIV() to perform addition, subtraction,
multiplication, division respectively. Write a member function to get and display values.
3. Write a C++ Program to read an integer number and find the sum of all the digits until it reduces to a
single digit using constructors, destructors and inline member functions.
4. Write a C++ Program to create a class FLOAT that contains one float data member. Overload all the
four Arithmetic operators so that they operate on the object FLOAT
5. Write a C++ Program to create a class STRING. Write a Member Function to initialize, get and
display stings. Overload the operators ++ and == to concatenate two Strings and to compare two
strings respectively.
6. Write a C++ Program to create class, which consists of EMPLOYEE Detail like E_Number,
E_Name, Department, Basic, Salary, Grade. Write a member function to get and display them.
Derive a class PAY from the above class and write a member function to calculate DA, HRA and PF
depending on the grade.
7. Write a C++ Program to create a class SHAPE which consists of two VIRTUAL FUNCTIONS
Calculate_Area() and Calculate_Perimeter() to calculate area and perimeter of various figures.
Derive three classes SQUARE, RECTANGLE, TRIANGE from class Shape and Calculate Area and
Page 17 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Reference Books
1 E. Balagurusamy, Object-Oriented Programming with C++, TMH, 1998.
2 Maria Litvin & Gray Litvin, C++ for you, Vikas publication, 2002.
3 John R Hubbard, Programming with C, 2nd Edition, TMH publication, 2002.
Page 18 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Programs 36 hours
1. Create an email account in Gmail. Using the account created compose a mail to invite other
college students for your college fest, enclose the invitation as attachment and send the mail
to at least 50 recipients. Use CC and BCC options accordingly
2. Open your inbox in the Gmail account created, check the mail received from your peer from
other college inviting you for his college fest, and download the invitation. Reply to the
mail with a thank you note for the invite and forward the mail to other friends.
3. Assume that you are studying in final year of your graduation and are eagerly looking for
a job. Visit any job portal and upload your resume.
4. Create a meeting using Google calendar and share meeting id to the attendees. Transfer
the ownership to the Manager once the meeting id is generated.
5. Create a label and upload bulk contacts using import option in Google Contacts
6. Create your own Google classroom and invite all your friends through email id. Post study
material in Google classroom using Google drive. Create a separate folder for every
subject and upload all unit wise E-Content Materials.
7. Create and share a folder in Google Drive using ‘share a link’ option and set the
permission to access that folder by your friends only.
8. Create one-page story in your mother tongue by using voice recognition facility of Google
Docs.
9. Create a registration form for your Department Seminar or Conference using Google
Forms.
10. Create a question paper with multiple choice types of questions for a subject of your
choice, using Google Forms.
11. Create a Google form with minimum 25 questions to conduct a quiz and generate a certificate after
submission.
Page 19 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
12. Create a meet using Google Calendar and record the meet using Google Meet.
13. Create a Google slides for a topic and share the same with your friends.
14. Create template for a seminar certificate using Google Slides.
15. Create a sheet to illustrate simple mathematical calculations using Google Sheets.
16. Create student’s internal mark statement and share the Google sheets via link.
17. Create different types of charts for a range in CIA mark statement using Google Sheets.
18. Create a mark statement in Google Sheets and download it as PDF, .xls and .csv files
Text Book(s)
1 Ian Lamont, Google Drive & Docs in 30 Minutes, 2nd Edition.
2
Reference Books
1 Sherry Kinkoph Gunter, My Google Apps, 2014.
2
3
Page 20 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Third
Semester
Page 21 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 22 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Reference Books
Jean-Paul,Tremblay & Paul G.Sorenson , An Introduction to Data structures with Applications
1
Tata McGraw Hill Company 2008, 2ndEdition.
2 Samanta.D , Classic Data Structure Prentice Hall of India Pvt Ltd 2007, 9th Edition
3 Seymour Lipschutz, Data Structures McGraw Hill Publications, 2014, 1st Edition
Page 23 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 24 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Reference Books
1 The Complete Reference Java 2 - Patrick Naughton & Hebert Schildt, 3rd Edition, TMH
2 Programming with Java – John R. Hubbard, 2nd Edition, TMH.
Page 25 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Programs 36 hours
1. Write a Java Applications to extract a portion of a character string and print the extracted string.
2. Write a Java Program to implement the concept of multiple inheritance using Interfaces.
3. Write a Java Program to create an Exception called payout-of-bounds and throw the
exception.
4. Write a Java Program to implement the concept of multithreading with the use of any three
multiplication tables and assign three different priorities to them.
5. Write a Java Program to draw several shapes in the created windows.
6. Write a Java Program to create a frame with four text fields name, street, city and pin code
with suitable tables. Also add a button called my details. When the button is clicked its
corresponding values are to be appeared in the text fields.
7. Write a Java Program to demonstrate the Multiple Selection List-box.
8. Write a Java Program to create a frame with three text fields for name, age and qualification
and a text field for multiple line for address
9. Write a Java Program to create Menu Bars and pull down menus.
10. Write a Java Program to create frames which respond to the mouse clicks. For each events
with mouse such as mouse up, mouse down, etc., the corresponding message to be
displayed.
11. Write a Java Program to draw circle, square, ellipse and rectangle at the mouse click
Page 26 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
positions.
12. Write a Java Program which open an existing file and append text to that file.
Total Lecture hours 36 hours
Text Book(s)
1 Programming with Java – A Primer – E. Balagurusamy, 5th Edition, TMH.
2 Herbert Schildt , Java: The Complete Reference, McGraw Hill Education, Oracle Press 10th
Edition, 2018
3 Programming with Java – A Primer – E. Balagurusamy, 3rd Edition, TMH.
Reference Books
1 The Complete Reference Java 2 – Patrick Naughton & Hebert Schildt, 3rd Edition, TMH
2 Programming with Java – John R. Hubbard, 2nd Edition, TMH.
Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]
1 https://www.w3resource.com/java-exercises/
2 https://www.udemy.com/introduction-to-java-programming/
3
Page 27 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 28 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Reference Books
1 Chris Bates, “Web Programming: Building Internet Applications”, Third Edition, Wiley India
Edition, 2007
Page 29 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Fourth
Semester
Page 30 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 31 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Working Sets – Demand Paging – Page Size. Processor Management: Job and Processor
Scheduling: Preemptive Vs Non-preemptive scheduling – Priorities – Deadline scheduling.
Reference Books
1 Achy8ut S. Godbole, Operating Systems, TMH, 2002.
2 John J. Donovan, Systems Programming, TMH, 1991.
3 D.M. Dhamdhere, Systems Programming and Operating Systems, 2nd Revised Edition, TMH.
Page 32 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 33 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Using Conditional Execution in Shell Scripts: Conditional Execution – The case…esac Construct.
Managing repetitive tasks using Shell Scripts: Using Iteration in Shell Scripts – The while
construct – until construct – for construct – break and continue commands – Simple Programs
using Shell Scripts.
Reference Books
1 Richard Petersen, Linux: The Complete Reference, Sixth Edition, Tata McGraw-Hill Publishing
Company Limited, New Delhi, Edition 2008.
2
Page 34 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Programming Lab –
Course code LINUX and SHELL PROGRAMMING L T P C
Programs 36 hours
1. Write a shell script to stimulate the file commands: rm, cp, cat, mv, cmp, wc, split, diff.
2. Write a shell script to show the following system configuration :
a. currently logged user and his log name
b. current shell , home directory , Operating System type , current Path setting , current working
directory
c. show currently logged number of users, show all available shells
d. show CPU information like processor type , speed
e. show memory information
3. Write a Shell Script to implement the following: pipes, Redirection and tee commands.
4. Write a shell script for displaying current date, user name, file listing and directories by
getting user choice.
5. Write a shell script to implement the filter commands.
6. Write a shell script to remove the files which has file size as zero bytes.
7. Write a shell script to find the sum of the individual digits of a given number.
8. Write a shell script to find the greatest among the given set of numbers using command line
arguments.
9. Write a shell script for palindrome checking.
10. Write a shell script to print the multiplication table of the given argument using for loop.
Page 35 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 36 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Programs 36 hours
1. Design Simple Web Pages using standard HTML tags like, HEAD, TITLE, BODY.
2. Design HTML web pages, which make use of INPUT, META, SCRIPT, FORM,
APPLET, BGSOUND, MAP
3. Working with various attributes of standard HTML elements
4. Using JavaScript's Window and document objects and their properties and various
methods like alert(), eval(), Parselnt () etc. methods to give the dynamic functionality
to HTML web pages
5. Writing JavaScript snippet which makes use of JavaScript's in-bulit as well as user
defined objects like navigator, Date Array, Event, Number etc.
6. Write code which does the form validation in various INPUT elements like
TextFiled, Text Area, Password, Selection list etc.
7. Writing XML web Documents which make use of XML Declaration, Element
Declaration, Attribute Declaration
8. Usage of Internal DTD, External DTD, Entity Declaration.
Total Lecture hours 36 hours
Text Book(s)
1 Raymond Greenlaw, Ellen Hepp, Fundamentals of the INTERNET and the World Wide
Web, Second Edition , Tata McGraw Hill, 2005
Reference Books
1 Brett McLaughlin, Java and XML, 2nd edition, O’REILLY, 2006.
Page 37 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
1
2
3
Page 38 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Fifth
Semester
Page 39 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 40 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Substitution Variables – DEFINE command – CASE structure. Functions and Grouping: Built-in
functions –Grouping Data. Multiple Tables: Joins and Set operations: Join – Set operations.
Reference Books
1 Database Management Systems, Majumdar & Bhattacharya, 2007, TMH.
2 Database Management Systems, Gerald V. Post, 3rd edition, TMH.
Page 41 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 42 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Data reports.
Reference Books
1 Gray Cornell (2003), ”Visual Basic 6 from ground up” TMH, New Delhi, 1st Edition,
Deitel and Deitel, T.R.Nieto (1998), “Visual Basic 6 - How to Program”, Pearson Education.
2
First Edition.
3
Page 43 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Programming Lab –
Course code L T P C
VB & Oracle
Core/Elective/Supportive Core Lab : 6 0 0 6 4
Students should have the theoretical knowledge Syllabus 2021-22
Pre-requisite
in visual basic and oops concept. Version Onwards
Course Objectives:
The main objectives of this course are to:
1. To develop applications using Graphical User Interface tools.
2. To understand the design concepts.
3. To design and build database systems and demonstrate their competence.
4. To create requirement analysis and specification for software applications.
Programs 36 hours
1. Construction of an Arithmetic Calculator (Simple).
2. Writing simple programs using loops and decision-making statements.
a. Generate Fibonacci series.
b. Find the sum of N numbers.
3. Write a program to create a menu and MDI Forms.
4. Write a program to display files in a directory using DriveListBox, DirListBox and
FileListBox control and open, edit and save text file using Rich text box control.
5. Write a program to illustrate Common Dialog Control and to open, edit and save text file.
6. Write a program to implement animation using timers.
7. Write a simple VB program to accept a number as input and convert it into
a. Binary b. Octal c. Hexa-decimal
8. Create a table for Employee details with Employee Number as primary key and following
fields:
Name, Designation, Gender, Age, Date of Joining and Salary. Insert at least ten rows and
perform various queries using any one Comparison, Logical, Set, Sorting and Grouping
operators.
9. Write a PL/SQL to update the rate field by 20% more than the current rate in inventory
table which has the following fields: Prono, ProName and Rate. After updating the table a
new field (Alter) called for Number of item and place for values for the new field without
using PL/SQL block.
Page 44 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Reference Books
1 Gray Cornell (2003), ”Visual Basic 6 from ground up” TMH, New Delhi, 1st Edition,
Deitel and Deitel, T.R.Nieto (1998), “Visual Basic 6 – How to Program”, Pearson Education.
2
First Edition.
Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]
1
2
3
Page 45 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 46 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Algorithms.
Reference Books
1 Klir.G, Yuan B.B. Fuzzy Sets and Fuzzy Logic, Prentice Hall of India, 1997.
2 Laurance Fausett, Fundamentals of Neural Networks, Prentice Hall, 1992.
3 Gen, M. and R. Cheng, Genetic Algorithm and Engineering Design, John Wiley, 1997.
Page 47 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 48 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Reference Books
1 Ze-Nian Li and Mark S.Drew, “Fundamentals of Multimedia”, First Edition, Pearson
Education, 2007
2 Prabhat K Andleigh, Kiran Thakrar, “Multimedia systems design”, First Edition, PHI, 2007
Page 49 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 50 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
– China Eastern
Reference Books
1 Knowledge Management and Business Innovation, Yogesh Malhotra, Idea Group, 2001
Page 51 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Unit:2 File I/O, Object Oriented Concepts and Message Queues 15 hours
Procedures- Dialog boxes- File IO and System objects- Error handling- Namespaces-Classes and
Objects- Multithreading-Message Queue- Programming MSMQ.
Page 52 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Reference Books
1 Fergal Grimes, Microsoft .NET for programmers, Shroff Publishers & Distributors (P) Ltd.
ISBN 81-7366-540-0.
Thuan Thai & Hoang Q.Lam, .NET Framework Essentials, Shroff Publishers & Distributors
2 (P) Ltd. ISBN 81-7366-654-7
3
Page 53 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Sixth
Semester
Page 54 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 55 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Basics of Staff Notation – Sound Card – Audio Transmission – Audio File formats and CODECs –
Audio Recording Systems – Audio and Multimedia – Voice Recognition and Response - Audio
Processing Software.
Reference Books
1 Computer Graphics, Amarendra N Sinha, Arun D Udai, TMH.
2 Multimedia: Making it Work, Tay Vaughan, 7th edition, TMH.
Page 56 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 57 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
College Logo
Page 58 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
2.1.1 Drawbacks
2.2 Proposed System
2.2.1 Features
3. System Design and Development
3.1 File Design
3.2 Input Design
3.3 Output Design
3.4 Database Design
3.5 System Development
3.5.1 Description of Modules (Detailed explanation about the project work)
4. Testing and Implementation
5. Conclusion
Bibliography
Appendices
A. Data Flow Diagram
B. Table Structure
C. Sample Coding
D. Sample Input
E. Sample Output
Course Designed By:
Page 59 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Programming Lab –
Course code L T P C
Graphics & Multimedia
Core/Elective/Supportive Core Lab : 7 0 0 5 3
Students should have the basic knowledge on C
Syllabus 2021-22
Pre-requisite and C++ to do computer graphics and
Version Onwards
multimedia applications.
Course Objectives:
The main objectives of this course are to:
1. To learn the basic principles of 2-dimensional computer graphics.
2. Provide an understanding of how to scan convert the basic geometrical primitives, how to
transform the shapes to fit them as per the picture definition.
3. Provide an understanding of mapping from a world coordinates to device coordinates,
clipping and projections.
4. To be able to discuss the application of computer graphics concepts in the development of
computer games, information visualization and business applications.
5. To comprehend and analyse the fundamentals of animation, virtual reality, underlying
technologies, principles and applications.
Programs 36 hours
Graphics
1. Write a program to rotate an image.
2. Write a program to drop each word of a sentence one by one from the top.
3. Write a program to drop a line using DDA Algorithm.
4. Write a program to move a car with sound effect.
5. Write a program to bounce a ball and move it with sound effect.
6. Write a program to test whether a given pixel is inside or outside or on a polygon.
Multimedia
7. Create Sun Flower using Photoshop.
8. Animate Plane flying in the Clouds using Photoshop.
9. Create Plastic Surgery for the Nose using Photoshop.
10. Create See-through text using Photoshop.
11. Create a Web Page using Photoshop.
12. Convert Black and White Photo to Color Photo using Photoshop.
Total Lecture hours 36 hours
Text Book(s)
Page 60 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
1
Reference Books
1
Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]
1
2
3
Page 61 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 62 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Secure Socket Layer – (SSL) – Transport Layer Security(TLS) – Secure Hyper Text Transfer Protocol
(SHTTP) – Time Stamping Protocol (TSP) – Secure Electronic Transaction (SET) – SSL Versus SET
– 3-D secure Protocol –Electronic Money - - Email security – Wireless Application Protocol (WIP)
Security - Security in GSM –Security in 3G.
Reference Books
1 Computer Networks, Andrew S. Tanenbaum, 4th edition, PHI.
Page 63 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 64 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
– Data services in GPRS – Application for GPRS- Limitations – Billing and Charging. WAP :
MMS – GPRS Applications
Reference Books
1 Jochen H. Schller, “Mobile Communications”, Second Edition, Pearson Education, New Delhi,
2007.
Dharma Prakash Agarval, Qing and An Zeng, “Introduction to Wireless and Mobile systems”,
2
Thomson Asia Pvt Ltd, 2005.
Uwe Hansmann, Lothar Merk, Martin S. Nicklons and Thomas Stober, “Principles of Mobile
3
Computing”, Springer, 2003.
Page 65 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 66 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Reference Books
1 Allen B. Downey, “Think Python: How to Think Like a Computer Scientist”, 2nd edition,
Updated for Python 3, Shroff/O‘Reilly Publishers, 2016
Guido van Rossum and Fred L. Drake Jr, An Introduction to Python – Revised and updated for
2
Python 3.2, Network Theory Ltd., 2011
3 Wesley J Chun, Core Python Applications Programming‖, Prentice Hall, 2012.
Page 67 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 68 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Reference Books
Internet of Things - Srinivasa K.G., Siddesh G.M. Hanumantha Raju R. Publisher: Cengage
1
Learning India pvt. Ltd (2018)
Page 69 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 70 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Migration case studies - Problem and Objective standard based Profile - Project context - Business
objects and Process - Interface migration.
Reference Books
1
2
3
Page 71 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 72 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
: Elements – e-Visibility – The e-Shop – On line Payments - Delivering the Goods – Internet e-
Commerce Security .
Reference Book(s)
1 E-Commerce - An Indian Perspective, P.T.Joseph, S.J., Fourth Edition, PHI 2012.
Page 73 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Programs 36 hours
1. Create a VB .Net program to add a string to Combo box with value of Textbox when user
clicks button control.
2. Create a VB .Net program to display hierarchical representations of items with tree view
control using Runtime coding.
3. Create a VB .Net program to handle user defined Exceptions.
4. Create a VB .Net program for Employee details to read and display the data using
constructors and member functions.
5. Create an application in VB .Net to demonstrate the following events:
i. Click
ii. Mouse Down
iii. Key Down
iv. Form Load
6. Create an application in VB .Net for File Menu with Menu items New, Open, Save, Print
and Exit & Edit Menu with Menu items Cut, Copy, Paste, Find and Undo.
7. Create an application in VB .Net for student information database and perform the following
operations:
i. Addition
ii.Deletion
iii. Updation
8. Design a website using web form to show the current date and time when a user clicks the
button.
Page 74 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Text Book(s)
1 Bill Evjen, Jason Beres, et.al, Visual Basic .Net programming, Wiley Dreamtech India (p)
Ltd. ISBN 81-265-0254-1.
Reference Books
1
Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]
1 Fergal Grimes, Microsoft .NET for programmers, Shroff Publishers & Distributors (P) Ltd.
ISBN 81-7366-540-0.
Thuan Thai & Hoang Q.Lam, .NET Framework Essentials, Shroff Publishers & Distributors
2
(P) Ltd. ISBN 81-7366-654-7
Page 75 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Page 76 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Course 1 - Information Security Fundamentals : Broad Overview of Information Security
will coverthe following topics:
• 1.1 Information Security, 1.2 Computer Security, 1.3 CIA Triad/Principles, 1.4
Non-repudiation, 1.5 Risk Management
• 1.6 Cryptography Basics, 1.7 Authentication, 1.8 Authorization, 1.9 Access
Control, 1.10Security Policies
• 1.11 Security Auditing, 1.12 Security Laws and Regulations, 1.13 Defense,
1.14 Security Monitoring, 1.15 ISO 27000 framework
• 1.16 Information Security use case demonstration as per industry verticals,
1.17 Policy, Process, Procedures, Standards, Guidelines, Baselines
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Case structure – Objectives, Target audience, Executive summary, Background,
Yourevaluation, Proposed solution, Conclusion
• Case Study #1: List Foundations of HealthCare Industries
• Patient medical records contain sensitive information that must be
protected from unauthorized access.
• Case Study #2: List Strong Foundations of Fintech Industries
• Financial institutions handle large amounts of sensitive financial data, such
as account numbers and transaction history, which must be protected from
cyber threats
• Demo
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 77 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Course 2 - Cyber Security Introduction : Broad Overview of Cyber Security will cover the
followingtopics:
• 2.1 Cybersecurity, 2.2 Cybers attacks, 2.3 Social Engineering, 2.4 Cybersecurity
Defences (Firewall, AV, SIEM, Patch, Password etc), 2.5 Cloud security, 2.6
Endpoint security, 2.7 Mobile security, 2.8 Zero trust, 2.9 IOT, 2.10 Layers of
cybersecurity, 2.11 Hacking, 2.12 Incident management, 2.13 Security operations
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Case Study #3: Define cyber security governance structure for CISO in bank
• Case Study #4: Define cyber security structure for CISO in Auto manufacturing
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 78 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Course 3 - Technologies in Cybersecurity eco-system: Broad Overview of Technologies
will cover thefollowing topics:
• 3.1 Network security – Architecture and Standards, Wireless security, Network
Vulnerabilities, Threats – Password cracking, Spoofing, Packet sniffing, Port
scanning, Poisoning
• 3.2 System security - Asset classification, Asset accountability, Configuration
management, Privilege access control, Virtualization security, System hardening,
End-point security, System upgrades and patches, Backup and recovery, Systems
Auditing, Threats – Denial of Service (DOS), DHCP spoofing, Dictionary attack,
Email spoofing
• 3.3 Software security – Secure Design, Secure Coding, Static Security, Dynamic
Security, Open source governance, Software composition analysis, Log and audit
trail ,OWASP Top10 Threats
- SQL Injection, Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF)
• 3.4 Cryptography Basics – Security by Obscurity, Cryptographic Keys,
Asymmetric, Symmetric, Hashing, Public Key Infrastructure (PKI), Challenges in
cryptography
• 3.5 Application of Cryptography – Virtual Private Network (VPN), Secure
Socket Layer (SSL), Digital Signature
• 3.6 Cloud security – Identity and Access management (IAM), Key management,
Governance, Risk and Compliance (GRC), Legal, Data sovereignty, Business
continuity, Disaster recovery, Cloud security models
• 3.7 Block chain security, 3.8 Zero Trust, 3.9 XDR, 3.10 AI, 3.11 MUD, 3.12
Context aware
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Case Study #5: What are the Fundamental Network protections used in Any
Industry
• Firewalls, IDS, IPS, VPN, Antivirus, SIEM
• Case Study #6: List methods to Secure Data in transit and Data at rest
• Encryption, Hashing,
• Case Study #7: How many ways can you protect any user account in applications
• 2FA, MFA, Password Management
• Demo
Page 79 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 80 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Course 4 - Core Threat Intelligence Engineering: Broad Overview of threat intelligence will
cover the following topics:
• 4.1 Threat model, 4.2 Tactical, operations and strategic threat intelligence, 4.3
How to detect, respond and defeat threats, 4.4 Adversary data, 4.5 Reactive and
proactive threat approach , 4.6 IOC, 4.7 Cyber kill chain,. 4.8 MITRE
ATT@ACK
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Case Study #8: How many Levels of User expertise are involved to form an
Threat Intelteam
• Case Study #9: What are the roles included in Threat Intelligence at Industry level
• Demo
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 81 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Course 5 - Core Vulnerability Management Engineering: Broad Overview of Vulnerability
managementwill cover the following topics:
• 5.1 what is vulnerability, Threats, Risks, Exploitation, 5.2 Computer ports /
protocols, 5.3 Ethical hack, Recon, Enumeration, Port Scanning, 5.4 Tools, 5.5
Attack Toolset – Metasploit, Nessus, nmap, Burpsuite, 5.6 Basic defence
measures - Antivirus, Intrusion Detection / Prevention systems
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Case Study #10: What are few examples of an Vulnerability as per Industry
oriented applications
• Case Study #11: Explain RACI Matrix in banking environment
• Demo
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 82 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Course 6 - Core Penetration test techniques: Broad Overview of penetration test techniques
will cover the following topics:
• 6.1 what is penetration testing, vulnerability, Threats, Risks, Exploitation, 6.2
Computer ports / protocols, 6.3 Port Scanning, 6.4 Tools, 6.5 Attack Toolset –
Metasploit, Nessus, nmap, Burpsuite, 6.6 Basic defence measures - Antivirus,
Intrusion Detection / Prevention systems,
6.7 Penetration test approach, tools, 6.8 Pen test reporting, 6.9 Pen test rules, 6.10 Gray
box, White box, Black box , 6.11 Sniffing, 6.12 DOS, 6.12 Social engineering, 6.13
Session hijacking, SQL Injection
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Case Study #12: How to do network scanning in banking industry
• Case Study #13: How to do social engineering (email phishing) in auto
manufacturing
• Demo
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 83 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Course 7 - Core Cyber Exploitations: Broad Overview of cyber exploitation will cover the
following topics:
• 7.1 Exploitation, 7.2 Types of exploits, 7.3 Identify, Protect, Detect, Respond,
Recover, 7.3 Honey pot, 7.4 Data collection, analytics 7.5 Proactive and reactive
exploitation, 7.6 Red , blue team, and purple team, 7.7 Incident management, 7.8
Data breach, 7.9 Ransomware,
7.10 Zero day attack, 7.11 Man in the middle
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Case Study #14: Difference between Vulnerability and Exploitations. How to
identifyexploitation in banking industry
• Case Study #15: What Network vectors are considered for exploitation. How to
implement in healthcare
• Demo
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 84 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Course 8 – Global attack trends: Broad Overview of cyber-attack trends will cover the
followingtopics:
• 8.1 Past, present & future trends of cyber threat landscape (Worldwide)
• 8.2 Cybercrime landscape in Asia Pacific
• 8.3 Organizational processes, Security roles and responsibilities, Due care and Due
diligence
• 8.4 Cybersecurity threats – Malware, Viruses and Worms, Trojan horses,
Botnets, Zero-dayexploits, Phishing, Spear phishing, Whaling, Social
engineering, etc.
• 8.5 Risk management concepts, Personnel security policies, Information security
training andawareness
• 8.6 Critical infrastructure protection, Privacy by design
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Case Study #16: Explain Ransomware behaviour and impact within the industries.
• Case Study #17: What is a Malware and how to setup malware protection in
hospital
• Case Study #18: Will Linux and Mac have any Attacks and Malware. Consider
ecommerceservices
• Demo
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 85 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Course 9 – Security Operations Management : Broad Overview of SOC will cover the
following topics:
• 9.1 SOC security operations centre concept, 9.2 Logging, Attack methodology and
monitoring,
9.3 Incident detection and Reporting, 9.4 SIEM, 9.5 Threat intelligence feed , 9.6 24x7
monitoring
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Case Study #19: What is Security posture for any healthcare industry
• Case Study #20: What is SOC in food chain industry
• Demo
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 86 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Case Study #21: What is Zero Day? Does it have any impact on any industry
applications. Define process framework
• Case Study #22: How are Incidents managed for HealthCare , FinTech,
SCADA and Automotive industries
• Demo
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 87 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Course 11 – Web and Mobile security Techniques: Broad Overview of web and mobile
securitytechniques will cover the following topics:
• 11.1 Web environment setup for scan and tools, 11.2 Scan web application,
11.3 Exploit vulnerabilities, 11.4 Deep analysis, 11.5 Reporting
• 11.6 Mobile environment setup for scan and tools, 11.7 Scan mobile application,
11.8 Exploitvulnerabilities, 11.9 Deep analysis, 11.10 Reporting
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Cyber breach case study (Equifax, Uber, Target, Stuxnet, SWIFT)
• Case Study #23: What’s the Top standard followed in Web Applications
• Case Study #24: What the Top standard followed in Mobile Applications
• Case Study #25: List secure frameworks used in Mobile App Development
• Demo
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 88 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Course 12 – Privacy and online rights: Broad Overview of privacy techniques will cover the
followingtopics:
• 12.1 Privacy concept, 12.2 Privacy regulations, 12.3 GDPR, 12.4 Online privacy
challenges 12.5 Online marketing/ sales privacy challenges, 12.6 Privacy
protection and penalties
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Cyber breach case study (Equifax, Uber, Target, Stuxnet, SWIFT)
• Case Study #26: What data is considered as Privacy issue in online ecommerce
• Case Study #27: Whats the impact if your company related data is available
online?
• Demo
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 89 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Course 13 – Best Practices for keeping Systems and Data safe: Broad overview of Security
best practices will cover the following topics:
• 13.1 Understand your data and risk, 13.2 Protect your systems, 13.3 Cyber
Insurance, 13.4 AV, 13.5 Data leakage , 13.6 Security guidelines – NIST, ISO
27001, GDPR, 13.7 Risk Management Frameworks and Security Standards
▪ NIST SP800-30: Evaluating security risks
▪ ISO 27000 - Information Security Management Standards (ISMS)
▪ DO-178C - Software Considerations in Airborne Systems and Equipment
Certification
▪ ISO/IEC 27034 – Application security guidelines
▪ SS 584 : Singapore Standard for Multi Tier Cloud Security
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Case Study #28: How can you assure your data is safe in Public network and
corporatenetwork
• Case Study #29: List 3 simple methods to keep your system safe from malware
• Demo
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 90 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Course 14 – Cloud security engineering: Broad Overview of cloud security will cover the
following topics:
• 14.1 Cloud security fundamentals, 14.2 Cloud providers, 14.3 Tools for cloud
security, 14.4 Cloud recovery, 14.5 Cloud Monitoring, 14.6 Cloud compliance,
certification, audit and compliance, Pen test
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Case Study #30: How the Cloud services or applications can be targeted to hackers
• Case Study #31: What are the Different methods to store data safe
• Demo
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 91 of 92
B.Sc. Information Technology - Syllabus w.e.f. 2023-24 onwards - Affiliated Colleges - Annexure No.33A
SCAA DATED: 18.05.2023
Course 15 – Industry Infosec Governance: Broad Overview of Industry security governance
will coverthe following topics:
• 15.1 Industry roles and student skill identification, 15.2 Industry training,
certification, 15.3 Industry career path, 15.4 How to become industry
cybersecurity expert, 15.5 Job application process, 15.6 Salary / perks, 15.7
Working in healthcare industry
Case Study / Demo / Role Play / Discussion / Quiz will cover the following topics:
• Cyber breach case study (Equifax, Uber, Target, Stuxnet, SWIFT)
• Case Study #32: Abbreviated CIA and give one example for Healthcare industry
• Case Study #33: Are Policies, procedures and standards important to protect
CIA for anIndustry
• Demo
• Scenario based role play (Cybersecurity strategy development, Incident response
plan)
• Group discussion
• Quiz
Page 92 of 92