0 évaluation0% ont trouvé ce document utile (0 vote)
21 vues6 pages
DJS22 SEM6 Syllabus
Le document présente le programme détaillé des cours offerts par le Dwarkadas J. Sanghvi College of Engineering, couvrant des sujets tels que l'ingénierie logicielle, l'ingénierie des données, l'analyse des Big Data, et la forensic mobile. Chaque unité de cours inclut des descriptions des thèmes abordés, des techniques d'analyse, ainsi que des expériences pratiques suggérées. Les étudiants acquerront des compétences dans des domaines variés, allant de la gestion de projets logiciels à l'analyse de données massives et à la sécurité des appareils mobiles.
Téléchargez aux formats PDF ou lisez en ligne sur Scribd
0 évaluation0% ont trouvé ce document utile (0 vote)
21 vues6 pages
DJS22 SEM6 Syllabus
Le document présente le programme détaillé des cours offerts par le Dwarkadas J. Sanghvi College of Engineering, couvrant des sujets tels que l'ingénierie logicielle, l'ingénierie des données, l'analyse des Big Data, et la forensic mobile. Chaque unité de cours inclut des descriptions des thèmes abordés, des techniques d'analyse, ainsi que des expériences pratiques suggérées. Les étudiants acquerront des compétences dans des domaines variés, allant de la gestion de projets logiciels à l'analyse de données massives et à la sécurité des appareils mobiles.
Téléchargez aux formats PDF ou lisez en ligne sur Scribd
Stiri Vite Parle Kelavani Mandat's
BWARKADAS J. SANGHVI COLLEGE OF ENGINEERIN.
(Autonomous College At
ied to the Universtiy of Muibar
i]
sy
Detailed Syllabus:
| Unit | Deserip a DS Duration |
| Introduction to Software Engineering and Process Models |
Nature of Software, Software Engineering, Software Process, Capability
Maturity Model (CMM)
1 _ | Generic Process Model, Prescriptive Process Models: The Waterfall Model, ha
Secure SDLC, V-model, Incremental Process Models, Evolutionary Process
Models, Concurrent Models, Agile process, Agility Principles, Extreme
Programming (XP), Scrum, Kanban model |
Requirements Analysis, Modelling and Project Scheduling
Requirement Elicitation, Software requirement specification (SRS),
Developing Use Cases (UML)
Requirement Model — Scenario-based model, Class-based model,
2 A 2
Behavioral model.
Project scheduling: Defining a Task Set for the Software Project, Timeline
charts, Tracking the Schedule
|__| Software Project Estimation: LOC, FP and COCOMO a
Software Risk and Configuration Management |
Risk Identification, Risk Assessment, Risk Projection, RMMM Software
3° | Configuration management, SCM repositories, SCM process Software| 07
Quality Assurance Task and Plan, Metrics, Software Reliability, Formal
Technical Review (FTR), Walkthrough,
Software Testing and Maintenance
Strategic Approach to Software Testing, Unit testing, Integration testing
Verification, Validation Testing, System Testing
4° | Software Testing Fundamentals, White-Box Testing, Basis Path Testing, | 06
Control Structure Testing, Black-Box Testing,
Software maintenance and its types, Software Re-engineering, Reverse
Engineering _ a |
Secure Software Design
5 _| Design Principles & Concepts, Objectives, Levels of Software Design, eal
Secure Software Design Principals, Effective Modular Design, Cohesion
and Coupling. Architectural design Ea
Secure Coding Principles
Coding in € String manipulation, Pointers based vulnerabilities. Coding
§ | C++ and JAVA - Memory management, common errors, Integer Security, | 04
Double free Vulnerabilities, Secure handling of user inputs in different
|__| programming languages
i a 3)
L TotalDWARKADAS J. SANGHVI COLLEGE OF ENGINEERING
gay SEES
Detailed Syllabus
at's
Far Octiege|
| Unit | Description
Fundamentals with Introduction to Data Engineering
Data Engineering Definition, Evolution and Lifecycle, Data Engincering and Data
Science, Data Mining Definition, Data Mining as a step in KDD, Kind of patterns
1 | tobe mined, Technologies used, Data Mining, applications, Principles of Good Data 07
Architecture, Types of Data Architecture — Data Warehouse, DWH characteristics,
| Data Lake and Lambda Architecture.
Data Extraction, Transformation, and Loading
ETL Overview, Requirements and Steps. Data Extraction- Source Identification and
Data Extraction Techniques, Evaluation. Data Transformation- Types, Data
2 | Integration and Consolidation, Transformation for Dimension Attributes. Data} 06
| Loading- Applying data Techniques and processes, Dimension Table and Fact
Table.
Data Pre-processing
Overview- Data Quality and Major Task in Data Preprocessing, Data Cleaning-
Missing Value, Noisy Data and Data Cleaning 2s a Process, Data Integration-
Redundancy and Correlation Analysis, Tuple Duplication, Data Value Conflict
3 | Detection and Resolution, Data Reduction-Overview of Data Reduction Strategies, | 07
Attribute Subset Selection, Regression and Log-Linear Models: Parametric Data
Reduction, Histograms, Clustering and data Cube Aggregation. Overview of Data
‘Transformation,
Data Ingestion and Streaming
Definition and Key Engineering Considerations for the Ingestion Phase, Data
Ingestion- Bounded Verses Unbounded Data, Synchronous versus Asynchronous
ingestion, Stream Ingestion Considerations- Schema Evolution, Late Arriving Data, 07
4 | Time to live and Message Size, Different Ways to Ingest Data- Direct Database
Connection, Change data Capture, API's, Message Queues and Event Streaming
Platforms,
| Transforming Data to Optimize for Analytics
Technical Requirements of Transformations, Making Raw data more Valuable, Data
5 _| Transformations as a part of Pipeline, Types of Data Transformation Tools-GUI| 9g
Based Tools, Apache Spark, Data Preparation Transformations — Optimizing the
File Format, Optimizing with data Partitioning, Data Cleansing.
hsPSL of Kamba)
DWARKAOKS J BANOMDY cOluman Sk sNaidabnine oO
‘Course Outeomes: On completion of this course, learners will be able to:
1
2
Understand Big Data concepts, challenges, and applications, and apply Hadoop and its
ecosystem to solve real-world problems.
Distinguish NoSQL architectures and use MongoDB to manage and analyze distributed
unstructured data,
Execute complex data processing tasks using MapReduce and manage distributed applications
with a focus on execution efficiency and fault tolerance,
Gain proficiency in techniques for big data analysis, including similarity search, stream
processing, link analysis, and frequent itemset mining.
Develop expertise in building recommendation systems using content-based and collaborative
filtering techniques.
6. Analyze social networks as graphs and apply community detection techniques like Clique
Percolation
p Detailed Syllabus =
Unit | Deseription : i Duration |
[ Introduction to Big Data Analytics & Hadoop |
Introduction to Big Data, Big Data characteristics, types of Big Data,
‘Traditional vs. Big Data business approach.
1 | Technologies Available for Big Data, Infrastructure for Big Dat, Rig Data 06 |
Challenges, Case Study of Big Data Solutions.
Introduction to Hadoop, Core Hadoop Components, Hadoop Ecosystem,
Physical Architecture, Name Node and Data Node.
| NosQL
Introduction to NoSQL, NoSQL business drivers, NoSQL. case studies.
NoSQL data architecture patterns: Key-value stores, Graph stores, Column.
2 | family (Bigtable) stores, Document stores, Variations of NoSQL| 08
| architectural pattems, Analyzing big data with a shared-nothing architecture;
Choosing distribution models: master-slave versus peer-to-peer
| Introduction to MongoDB, MongoDB commands.
| MapReduce
MapReduce and The New Software Stack: Distributed File Systems,
Physical Organization of Compute Nodes, Large Scale File-System |
3° | Organization, 08
| MapReduce: The Map Tasks, Grouping by Key, The Reduce Tasks,
Combiners, Details of MapReduce Execution, Matrix vector multiplication
using MapReduce, Coping With Node Failures it
f 4 | Techniques in Big Data Analytics feseraral
Finding Similar Item: Nearest Neighbor Search, Similarity of Documents
4 % hoMining Data Streams: Data Stream Management Systems, Data Stream
Model, Apache Spark. Apache Beam.
Link Analysis: PageRank Definition, Structure of the web, dead ends,
Using Page rank in a search engine
Frequent Itemset Mining: Market Basket Model- Applications, Association
Rule-Confidence, Interest, Support. Apriori Algorithm - PassI, Pass2.
Big Data Analytics Applications
Recommendation Systems: Introduction, A Model for Recommendation
5 | systems, Content based Recommendation System, Collaborative-Filtering |
System: Nearest Neighbour Technique, Example,
Mining Social-network Grap! |
| 6 | Social Networks as graphs, Types of Social-network, relevance of 03
| community detection, Clique Percolation Method is |
(i Total 3 |
List of Laboratory Experiments:
ec Suggested Experiments
1 ‘Case Study on Hadoop Installation and HDFS Commands
Installation of MongoDB, and execution of CREATE, INSERT, DELETE and
2 | UPDATE operations. Querying in MongoDB.
3 _| Implement Word Count program in Map- Reduce.
‘4 _| Execution of PIG SCRIPTING language and PIG Commands.
‘5 _ | Execution of HIVE SCRIPTING language.
6 | implement any Social Analysis Tool (Pajel/SocNet/ Graphviz)
7 _| Language Processing with SPARK
8 | Consumer and Consumer Groups implementation on kafka,
9_| Data visualization (Tablaue/ SAS/ PowerBV/ Infogram etc.)
10 | Neo4J for Graph Based Data Analysis,
11 | Exploratory Data Analysis using Spark/ Pyspark.
12 | Streaming window word count application using Flink
13 _ | Apriori Algorithm Implementation in Python
14 | Data Aggregation Using Apache Beam.
7 % ghStiri Vite Parle Kelavani Mandat'e
WARKADAS J. SANGHVI COLLEGE OF ENGINEERING
Faced
Deseription
Introduction to Mobile Devices
Basics of Mobile phone: Different Mobile Devices, Hardware ‘& Software
Characteristics of Mobile Devices,
Mobile Operating Systems: Classification of Mobile Operating Systems
(Android OS, Apple iOS), difference between desktop operating system and
‘mobile operating system. Top Issues Facing Mobile Devices.
The Mobile Risk Ecosystem
Mobile Risk Model: Physical Risks, Service Risks and App Risks,
Basic Cellular Network Functionality: Interoperability, Voice Calls, The Control
Channels, Voice Mailboxes, Short Message Service
Attacks and Countermeasures: Hacking Mobile Voicemail, Countermeasures for
Mobile Voicemail Hacks, Rogue Mobile Devices, Rogue Mobile Device
Countermeasures, Early Rogue Station Attacks, Rogue Base Station
Countermeasures, Rogue Femtocell Attacks, Countermeasures for Rogue
Femtocells cn B
Mobile Device Management
MDM Frameworks, Device Provisioning, Bypassing MDM, Decompiling and
Debugging Apps, Detecting Jailbreaks, Remote Wipe and Lock.
Mobile App Threat Modelling: Threats, Assets, Finishing and Using the Threat
Model.
Secure Mobile Development Guidance: Preparation, Secure Mobile Application
Guidelines. ss
Introduction to Mobile Forensics:
‘Need for mobile forensies, Mobile forensics, Challenges in mobile forensics, The |
evidence intake phase, The identification phase, preparation phase, isolation
phase, processing phase, verification phase, documenting and reporting phase,
“The presentation phase, archiving phase, Data acquisition methods, Examination
and analysis,
Good forensic practices: Securing the evidence, Preserving the evidence,
Documenting the evidence and changes, Reporting.
|
Introduction to 10S Forensics |
10S Boot Process, iOS Architecture, iOS Architecture Layers, The HFS Plus and |
‘APES File Systems, iOS Scourity, i$ Data Extraction Techniques, Data |
‘Acquisition from Backup Devices, Data Acquisition from iOS Devices,
Jaifbreaking.
Introduction to Android Forensics:
‘Android File System, Flash Memory File Systems, Media-Based File Systems,
Pseudo File Systems, Android System Architecture, Android System Permission |
oe
orStari Vile Parte Kelavani Mandat's
DWARKADAS J. SANGHVI COLLEGE OF ENGINEERING
nous Coliege Affiliated to the Universi’ of Mumba
Model, Data Extraction Techniques on Android, Mobile Forensics Investigation
Challenges on Android Devices | |
Data carving: t |
Best practices ~ ACPO, Interpol, STCIA, DOI guidelines and best practices in
Indian environment. Responsive toolkit — preparation, portable software tools, | 06
validation of toots, things to carry. Areas to search, Active files, deleted files,
slack space, unallocated space, hibernation file, page file, metadata and registry |
ete. Case Study for crime scene investigation, a |
| List of Laboratory Experiments:
Totai afeaese)
[Link].
Suggested Experiments
To install Android SDK
To Study and install Androguard to analyze apk files.
2
3
4
‘To Study and install mobs? installation in windows for mobile Pen-testing, malware
analysis and security assessment.
To Study and install QARK (Quick Android Review Kit) tool capable of finding
common secarity vulnerabilities in Android, ‘4
de pehudy and install Frida (Dynamic Instrumentation Toolkil) to modify code tippets
To Study and install Drozer in kali linux and Drozer agent in android device,
of JavaScript.
To Study GDA (Gloy Dex Analyzer) - Android Reversing Tool |
To perform Screen lock bypassing in Android. |
To perform SQLite Browser to view the data in Android
10
un
To perform recovery of deleted data and files from an external SD card using file>
To perform analysis of Android apps using Android Lint,
2
carving techniques |
To perform extraction of an APK file from an Android device.
13
_| To perform Mobile forensies using UFED tool.
Any other}
experiment based on the syllabus may be included, which would help the leamer to understand
the topic/concept.
s no