0% ont trouvé ce document utile (0 vote)
21 vues6 pages

DJS22 SEM6 Syllabus

Le document présente le programme détaillé des cours offerts par le Dwarkadas J. Sanghvi College of Engineering, couvrant des sujets tels que l'ingénierie logicielle, l'ingénierie des données, l'analyse des Big Data, et la forensic mobile. Chaque unité de cours inclut des descriptions des thèmes abordés, des techniques d'analyse, ainsi que des expériences pratiques suggérées. Les étudiants acquerront des compétences dans des domaines variés, allant de la gestion de projets logiciels à l'analyse de données massives et à la sécurité des appareils mobiles.

Transféré par

CheeseFright
Copyright
© © All Rights Reserved
Nous prenons très au sérieux les droits relatifs au contenu. Si vous pensez qu’il s’agit de votre contenu, signalez une atteinte au droit d’auteur ici.
Formats disponibles
Téléchargez aux formats PDF ou lisez en ligne sur Scribd
0% ont trouvé ce document utile (0 vote)
21 vues6 pages

DJS22 SEM6 Syllabus

Le document présente le programme détaillé des cours offerts par le Dwarkadas J. Sanghvi College of Engineering, couvrant des sujets tels que l'ingénierie logicielle, l'ingénierie des données, l'analyse des Big Data, et la forensic mobile. Chaque unité de cours inclut des descriptions des thèmes abordés, des techniques d'analyse, ainsi que des expériences pratiques suggérées. Les étudiants acquerront des compétences dans des domaines variés, allant de la gestion de projets logiciels à l'analyse de données massives et à la sécurité des appareils mobiles.

Transféré par

CheeseFright
Copyright
© © All Rights Reserved
Nous prenons très au sérieux les droits relatifs au contenu. Si vous pensez qu’il s’agit de votre contenu, signalez une atteinte au droit d’auteur ici.
Formats disponibles
Téléchargez aux formats PDF ou lisez en ligne sur Scribd
Stiri Vite Parle Kelavani Mandat's BWARKADAS J. SANGHVI COLLEGE OF ENGINEERIN. (Autonomous College At ied to the Universtiy of Muibar i] sy Detailed Syllabus: | Unit | Deserip a DS Duration | | Introduction to Software Engineering and Process Models | Nature of Software, Software Engineering, Software Process, Capability Maturity Model (CMM) 1 _ | Generic Process Model, Prescriptive Process Models: The Waterfall Model, ha Secure SDLC, V-model, Incremental Process Models, Evolutionary Process Models, Concurrent Models, Agile process, Agility Principles, Extreme Programming (XP), Scrum, Kanban model | Requirements Analysis, Modelling and Project Scheduling Requirement Elicitation, Software requirement specification (SRS), Developing Use Cases (UML) Requirement Model — Scenario-based model, Class-based model, 2 A 2 Behavioral model. Project scheduling: Defining a Task Set for the Software Project, Timeline charts, Tracking the Schedule |__| Software Project Estimation: LOC, FP and COCOMO a Software Risk and Configuration Management | Risk Identification, Risk Assessment, Risk Projection, RMMM Software 3° | Configuration management, SCM repositories, SCM process Software| 07 Quality Assurance Task and Plan, Metrics, Software Reliability, Formal Technical Review (FTR), Walkthrough, Software Testing and Maintenance Strategic Approach to Software Testing, Unit testing, Integration testing Verification, Validation Testing, System Testing 4° | Software Testing Fundamentals, White-Box Testing, Basis Path Testing, | 06 Control Structure Testing, Black-Box Testing, Software maintenance and its types, Software Re-engineering, Reverse Engineering _ a | Secure Software Design 5 _| Design Principles & Concepts, Objectives, Levels of Software Design, eal Secure Software Design Principals, Effective Modular Design, Cohesion and Coupling. Architectural design Ea Secure Coding Principles Coding in € String manipulation, Pointers based vulnerabilities. Coding § | C++ and JAVA - Memory management, common errors, Integer Security, | 04 Double free Vulnerabilities, Secure handling of user inputs in different |__| programming languages i a 3) L Total DWARKADAS J. SANGHVI COLLEGE OF ENGINEERING gay SEES Detailed Syllabus at's Far Octiege| | Unit | Description Fundamentals with Introduction to Data Engineering Data Engineering Definition, Evolution and Lifecycle, Data Engincering and Data Science, Data Mining Definition, Data Mining as a step in KDD, Kind of patterns 1 | tobe mined, Technologies used, Data Mining, applications, Principles of Good Data 07 Architecture, Types of Data Architecture — Data Warehouse, DWH characteristics, | Data Lake and Lambda Architecture. Data Extraction, Transformation, and Loading ETL Overview, Requirements and Steps. Data Extraction- Source Identification and Data Extraction Techniques, Evaluation. Data Transformation- Types, Data 2 | Integration and Consolidation, Transformation for Dimension Attributes. Data} 06 | Loading- Applying data Techniques and processes, Dimension Table and Fact Table. Data Pre-processing Overview- Data Quality and Major Task in Data Preprocessing, Data Cleaning- Missing Value, Noisy Data and Data Cleaning 2s a Process, Data Integration- Redundancy and Correlation Analysis, Tuple Duplication, Data Value Conflict 3 | Detection and Resolution, Data Reduction-Overview of Data Reduction Strategies, | 07 Attribute Subset Selection, Regression and Log-Linear Models: Parametric Data Reduction, Histograms, Clustering and data Cube Aggregation. Overview of Data ‘Transformation, Data Ingestion and Streaming Definition and Key Engineering Considerations for the Ingestion Phase, Data Ingestion- Bounded Verses Unbounded Data, Synchronous versus Asynchronous ingestion, Stream Ingestion Considerations- Schema Evolution, Late Arriving Data, 07 4 | Time to live and Message Size, Different Ways to Ingest Data- Direct Database Connection, Change data Capture, API's, Message Queues and Event Streaming Platforms, | Transforming Data to Optimize for Analytics Technical Requirements of Transformations, Making Raw data more Valuable, Data 5 _| Transformations as a part of Pipeline, Types of Data Transformation Tools-GUI| 9g Based Tools, Apache Spark, Data Preparation Transformations — Optimizing the File Format, Optimizing with data Partitioning, Data Cleansing. hs PSL of Kamba) DWARKAOKS J BANOMDY cOluman Sk sNaidabnine oO ‘Course Outeomes: On completion of this course, learners will be able to: 1 2 Understand Big Data concepts, challenges, and applications, and apply Hadoop and its ecosystem to solve real-world problems. Distinguish NoSQL architectures and use MongoDB to manage and analyze distributed unstructured data, Execute complex data processing tasks using MapReduce and manage distributed applications with a focus on execution efficiency and fault tolerance, Gain proficiency in techniques for big data analysis, including similarity search, stream processing, link analysis, and frequent itemset mining. Develop expertise in building recommendation systems using content-based and collaborative filtering techniques. 6. Analyze social networks as graphs and apply community detection techniques like Clique Percolation p Detailed Syllabus = Unit | Deseription : i Duration | [ Introduction to Big Data Analytics & Hadoop | Introduction to Big Data, Big Data characteristics, types of Big Data, ‘Traditional vs. Big Data business approach. 1 | Technologies Available for Big Data, Infrastructure for Big Dat, Rig Data 06 | Challenges, Case Study of Big Data Solutions. Introduction to Hadoop, Core Hadoop Components, Hadoop Ecosystem, Physical Architecture, Name Node and Data Node. | NosQL Introduction to NoSQL, NoSQL business drivers, NoSQL. case studies. NoSQL data architecture patterns: Key-value stores, Graph stores, Column. 2 | family (Bigtable) stores, Document stores, Variations of NoSQL| 08 | architectural pattems, Analyzing big data with a shared-nothing architecture; Choosing distribution models: master-slave versus peer-to-peer | Introduction to MongoDB, MongoDB commands. | MapReduce MapReduce and The New Software Stack: Distributed File Systems, Physical Organization of Compute Nodes, Large Scale File-System | 3° | Organization, 08 | MapReduce: The Map Tasks, Grouping by Key, The Reduce Tasks, Combiners, Details of MapReduce Execution, Matrix vector multiplication using MapReduce, Coping With Node Failures it f 4 | Techniques in Big Data Analytics feseraral Finding Similar Item: Nearest Neighbor Search, Similarity of Documents 4 % ho Mining Data Streams: Data Stream Management Systems, Data Stream Model, Apache Spark. Apache Beam. Link Analysis: PageRank Definition, Structure of the web, dead ends, Using Page rank in a search engine Frequent Itemset Mining: Market Basket Model- Applications, Association Rule-Confidence, Interest, Support. Apriori Algorithm - PassI, Pass2. Big Data Analytics Applications Recommendation Systems: Introduction, A Model for Recommendation 5 | systems, Content based Recommendation System, Collaborative-Filtering | System: Nearest Neighbour Technique, Example, Mining Social-network Grap! | | 6 | Social Networks as graphs, Types of Social-network, relevance of 03 | community detection, Clique Percolation Method is | (i Total 3 | List of Laboratory Experiments: ec Suggested Experiments 1 ‘Case Study on Hadoop Installation and HDFS Commands Installation of MongoDB, and execution of CREATE, INSERT, DELETE and 2 | UPDATE operations. Querying in MongoDB. 3 _| Implement Word Count program in Map- Reduce. ‘4 _| Execution of PIG SCRIPTING language and PIG Commands. ‘5 _ | Execution of HIVE SCRIPTING language. 6 | implement any Social Analysis Tool (Pajel/SocNet/ Graphviz) 7 _| Language Processing with SPARK 8 | Consumer and Consumer Groups implementation on kafka, 9_| Data visualization (Tablaue/ SAS/ PowerBV/ Infogram etc.) 10 | Neo4J for Graph Based Data Analysis, 11 | Exploratory Data Analysis using Spark/ Pyspark. 12 | Streaming window word count application using Flink 13 _ | Apriori Algorithm Implementation in Python 14 | Data Aggregation Using Apache Beam. 7 % gh Stiri Vite Parle Kelavani Mandat'e WARKADAS J. SANGHVI COLLEGE OF ENGINEERING Faced Deseription Introduction to Mobile Devices Basics of Mobile phone: Different Mobile Devices, Hardware ‘& Software Characteristics of Mobile Devices, Mobile Operating Systems: Classification of Mobile Operating Systems (Android OS, Apple iOS), difference between desktop operating system and ‘mobile operating system. Top Issues Facing Mobile Devices. The Mobile Risk Ecosystem Mobile Risk Model: Physical Risks, Service Risks and App Risks, Basic Cellular Network Functionality: Interoperability, Voice Calls, The Control Channels, Voice Mailboxes, Short Message Service Attacks and Countermeasures: Hacking Mobile Voicemail, Countermeasures for Mobile Voicemail Hacks, Rogue Mobile Devices, Rogue Mobile Device Countermeasures, Early Rogue Station Attacks, Rogue Base Station Countermeasures, Rogue Femtocell Attacks, Countermeasures for Rogue Femtocells cn B Mobile Device Management MDM Frameworks, Device Provisioning, Bypassing MDM, Decompiling and Debugging Apps, Detecting Jailbreaks, Remote Wipe and Lock. Mobile App Threat Modelling: Threats, Assets, Finishing and Using the Threat Model. Secure Mobile Development Guidance: Preparation, Secure Mobile Application Guidelines. ss Introduction to Mobile Forensics: ‘Need for mobile forensies, Mobile forensics, Challenges in mobile forensics, The | evidence intake phase, The identification phase, preparation phase, isolation phase, processing phase, verification phase, documenting and reporting phase, “The presentation phase, archiving phase, Data acquisition methods, Examination and analysis, Good forensic practices: Securing the evidence, Preserving the evidence, Documenting the evidence and changes, Reporting. | Introduction to 10S Forensics | 10S Boot Process, iOS Architecture, iOS Architecture Layers, The HFS Plus and | ‘APES File Systems, iOS Scourity, i$ Data Extraction Techniques, Data | ‘Acquisition from Backup Devices, Data Acquisition from iOS Devices, Jaifbreaking. Introduction to Android Forensics: ‘Android File System, Flash Memory File Systems, Media-Based File Systems, Pseudo File Systems, Android System Architecture, Android System Permission | oe or Stari Vile Parte Kelavani Mandat's DWARKADAS J. SANGHVI COLLEGE OF ENGINEERING nous Coliege Affiliated to the Universi’ of Mumba Model, Data Extraction Techniques on Android, Mobile Forensics Investigation Challenges on Android Devices | | Data carving: t | Best practices ~ ACPO, Interpol, STCIA, DOI guidelines and best practices in Indian environment. Responsive toolkit — preparation, portable software tools, | 06 validation of toots, things to carry. Areas to search, Active files, deleted files, slack space, unallocated space, hibernation file, page file, metadata and registry | ete. Case Study for crime scene investigation, a | | List of Laboratory Experiments: Totai afeaese) [Link]. Suggested Experiments To install Android SDK To Study and install Androguard to analyze apk files. 2 3 4 ‘To Study and install mobs? installation in windows for mobile Pen-testing, malware analysis and security assessment. To Study and install QARK (Quick Android Review Kit) tool capable of finding common secarity vulnerabilities in Android, ‘4 de pehudy and install Frida (Dynamic Instrumentation Toolkil) to modify code tippets To Study and install Drozer in kali linux and Drozer agent in android device, of JavaScript. To Study GDA (Gloy Dex Analyzer) - Android Reversing Tool | To perform Screen lock bypassing in Android. | To perform SQLite Browser to view the data in Android 10 un To perform recovery of deleted data and files from an external SD card using file> To perform analysis of Android apps using Android Lint, 2 carving techniques | To perform extraction of an APK file from an Android device. 13 _| To perform Mobile forensies using UFED tool. Any other} experiment based on the syllabus may be included, which would help the leamer to understand the topic/concept. s no

Vous aimerez peut-être aussi