BACHELOROFCOMPUTERAPPLICATION(B.C.A.
)
DETAILED SYLLABUS
FIRST SEMESTER
PAPERCODE:C-103
BusinessCommunicationandSoftSkills
UNIT-I
Means of Communication:MeaningandDefinition,Process,Functions,Objectives,Importance,
Essentials of good communication, Communication barriers, 7C’s of Communication, Types of
Communication: Meaning,nature and scope.
UNIT-II
Oral communication: Principle of effective oral communication Techniques of effective speech,
Media of oral communication (Face, to, face conversation, Teleconferences, Press Conference,
Demonstration, Radio Recording, Dictaphone, Meetings, Rumour, Demonstration and
Dramatisation, Public address system, Grapevine, Group Discussion, Oral report, Closed circuit
TV). The art of listening, Principles of good listening. Written Communication Purpose of
writing, Clarity in Writing, Principle of Effective writing, Writing Techniques, Electronic Writing
Process. Business Letters & Reports: Need and functions of business letters, Planning & layout
of business letter, Kinds of business letters, Essentials of effective correspondence,Purpose,
Kind and Objective of Reports, Writing Reports.
UNIT-III
Drafting of business letters: Enquiries and replies, Placing and fulfilling orders, Complaints and
follow, up Sales letters, Circular letters Application for employment and resume. Information
Technology for Communication: Word Processor, Telex, Facsimile(Fax), E-mail, Voice mail,
Internet Multimedia, Teleconferencing, Mobile Phone Conversation, Video Conferencing, SMS,
Telephone AnsweringMachine, Advantages and limitations of these types. Self Analysis: SWOT
Analysis, Who am I, Attributes, Importance of Self Confidence, Self Esteem. Creativity: Out of
box thinking, Lateral Thinking.
UNIT-IV
Attitude: Factors influencing Attitude, Challenges and lessons from Attitude, Etiquette.
Motivation: Factors of motivation, Self talk, Intrinsic & Extrinsic Motivators. Goal Setting: Wish
List,SMARTGoals,Blueprintforsuccess,ShortTerm,LongTerm,LifeTimeGoals. Interpersonal Skills:
Gratitude: Understanding the relationship between Leadership Networking & Teamwork.
Assessing Interpersonal Skills Situation description of Interpersonal Skill. Team Work: Necessity
of Team Work Personally, Socially and Educationally.
UNIT-V
Leadership: Skills for a good Leader, Assessment of Leadership Skills, Stress
Management: Causes of Stress and its impact, how to manage & distress, Circle of
control, Stress Busters. Emotional Intelligence: What is Emotional Intelligence,
emotional quotient why Emotional Intelligence matters, Emotion Scales, Managing
Emotions. Conflict Resolution: Conflicts in Human Relations – Reasons Case Studies,
Approaches to conflict resolution. Decision Making: Importance and necessity of
Decision Making, Process and practical way of Decision Making, Weighing Positives
& Negatives.
SuggestedBooks:
1. BusinessCommunication,“K.K.Sinha,GalgotiaPublishingCompany,NewDelhi”.
2. MediaandCommunicationManagement,“C.S.Rayudu,HikalayaPublishingHouse,Bombay”.
3. Essentials of Business Communication, “Rajendra Pal and J.S. Korlhalli, Sultan
Chand & Sons, New Delhi”.
DETAILED SYLLABUS
THIRD SEMESTER
PAPERCODE:C-304
ComputerNetwork
UNITI
DataCommunications:Introduction:Theoreticalbasisforcommunication,Fourier
analysis,Bandlimitedsignals,Maximumdatarateofachannel:Transmission
impairments,Attenuationdistortion,Delaydistortion,Dispersion,Noise:Data
transmission modes, Serial & Parallel, Simplex, Half duplex & full duplex,
Synchronous & Asynchronous transmission:
TransmissionMedium:Introduction:Transmissionmedium,Guided&Unguided
Transmissionmedium,Twistedpair,Coaxialcable,Opticalfiber,Comparisonoffiber
opticsandcopperwire:Wirelesstransmission.
UNIT II
Computer Network: Introduction: Definition of a Computer Network, Components
of a computernetwork, Types of Network: Based on Topology (Bus, Star, Ring Mesh,
Tree), Basedon Size Technology and ownership (LAN, MAN, WAN). Network
topologies, Linear
BusTopology,RingTopology,StarTopology,HierarchicalorTreeTopology,OSIreference
model.
Multiplexing,FDM,Frequencydivisionmultiplexing,WDM,Wavelengthdivisionmultiple
xing,TDM,Timedivisionmultiplexing.
UNIT III
Data Link Layer: Services provided to the Upper Layer, Framing, Error Control, Flow
Control, sliding window protocols Medium Access Sub Layer: Medium access sub
layer - channel allocations, LAN protocols – aloha protocols - overview of IEEE
standards - FDDI.
UNIT IV
Network Layer: Services provided to the Upper Layer: Routing Algorithms
(Centralized, Distributed),CongestionControl(TokenBasedandNonToken Based),
Internetworking, TCP/IP, IPpacket, IP address, and IPv4 and IPV6. Transport Layer:
Design issues, and connection management, TCP, UDP
UNITV
Session Layer: Design issues and remote procedure call. Presentation Layer: Design
issues.
ApplicationLayer:Filetransfer,accessandmanagement,electronicmail,virtualterminals
, other application.
SuggestedBooks:
1. W.Stallings,“DataandComputerCommunication”,PearsonEducation.
2. A.S.Tanenbaum,“ComputerNetwork”,4th,Edition,Pearson Education.
3. Forouzan,“DataCommunicationandNetworking”,2ndEdition,TataMcGrawHill.
BACHELOROFCOMPUTERAPPLICATION(B.C.
A.)
DETAILED SYLLABUS
FIFTH SEMESTER
PAPERCODE:C-501
Network Security
UNIT-I
Network Security: Introduction: OSI Security Architecture-Classical Encryption
techniquesCipher Principles, Data Encryption Standard, Block Cipher Design
Principles and Modes of Operation.
UNIT-II
Introduction to Number Theory: modular arithmetic, prime and relative prime
numbers, Extended Euclidean Algorithm, Fermat’s and Euler’s theorem, Primarily
testing, Chinese Remainder theorem, Discrete Logarithmic Problem . Public Key
Cryptography: Key Management, Diffie Hellman key Exchange-Elliptic Curve .
Architecture and Cryptography, Confidentiality using Symmetric Encryption, Public
Key Cryptography and RSA.
UNIT-III
Authentication and Hash Function: Authentication requirements, Authentication
functions– Message Authentication Codes, Hash Functions, Security of Hash
Functions and MACs, MD5 message Digest algorithm, Secure Hash Algorithm,
RIPEMD, HMAC Digital Signatures, Authentication Protocols, Digital Signature
Standard
UNIT-IV
Network Security: Authentication Applications: Kerberos, X.509 Authentication
Service, Electronic Mail Security, PGP, S/MIME, IP Security, Web Security.
UNIT-V
SystemLevelSecurity:Intrusiondetection,passwordmanagement,VirusesandrelatedTh
reats, Virus Counter measures, Firewall Design Principles, Trusted Systems.
SuggestedBooks:
1. William Stallings, “Cryptography and Network Security, Principles and Practices ",
Prentice Hall of India, Third Edition,2003.
AtulKahate-“CryptographyandNetworkSecurity",TataMcGraw,Hill,2003
Course File: Network Security
Course Details:
Course Title: Network Security
Course Code: C-501
Semester: 5th
Faculty Name: Anupma Malhotra
Email:
[email protected]Method of Teaching:
Lectures using whiteboard, PPTs, and live demonstrations
Case study discussions and role-play of real-world attacks
Assignments, group discussions, and quizzes for engagement
Course Objectives:
1. Understand the principles and fundamentals of network security.
2. Learn cryptographic algorithms and authentication mechanisms.
3. Identify and prevent different network attacks.
4. Analyze security protocols like firewalls and VPNs.
5. Utilize network security tools for scanning and securing networks.
Course Outcomes (COs):
CO Code Description
CO1 Explain network security principles and types of attacks.
CO2 Implement cryptographic techniques for secure communication.
CO3 Apply authentication and access control models.
CO4 Evaluate security protocols such as firewalls and VPNs.
CO5 Analyze and secure networks using modern tools.
Syllabus:
Unit 1: Introduction to Network Security
Security Goals: Confidentiality, Integrity, Availability
Security Attacks and Services
OSI Model and Security Issues
Passive vs Active Attacks
Unit 2: Cryptography
Symmetric Key Cryptography (DES, AES)
Asymmetric Key Cryptography (RSA, ECC)
Key Exchange: Diffie-Hellman
Hashing: SHA, MD5
Digital Signatures
Unit 3: Authentication and Access Control
Authentication Protocols: Kerberos, CHAP
Multi-factor Authentication
Access Control Models: DAC, MAC, RBAC
Unit 4: Network Security Mechanisms
Firewalls (Types, Configuration)
Intrusion Detection Systems (IDS/IPS)
VPNs and Tunneling
Email and Web Security
Unit 5: Modern Threats and Countermeasures
Malware, Phishing, DoS/DDoS
Vulnerability Scanning Tools: Nmap, Nessus
Wireless and Mobile Network Security
Zero Trust Model
Lesson Plan (12 Weeks):
Week Topics COs Activities
1 Introduction to Security, CIA Triad CO1 Lecture, Quiz
2 Types of Attacks and OSI Security CO1 Lecture + Diagram
3 Symmetric Cryptography: DES, AES CO2 Lecture
4 Asymmetric Cryptography: RSA CO2 Lecture
5 Hashing and Digital Signature CO2 Lecture
6 Authentication Protocols CO3 Lecture + Case Study
7 Access Control Models CO3 Lecture + Q&A
8 Firewalls, IDS, VPNs CO4 Lecture
9 Email and Web Security CO4 l
10 Attacks: Malware, DoS, Phishing CO5 Lecture
12 Wireless Security and Review CO5 Group Activity
Textbooks:
1. William Stallings – Cryptography and Network Security
2. Behrouz A. Forouzan – Cryptography and Network Security
References:
Bruce Schneier – Applied Cryptography
Charles P. Pfleeger – Security in Computing
RFCs and Online Resources
PREPARE COURSE FILE ACCORDING ABOVE GIVEN SYLLABUS WITH LESSON
PLAN AND TEACHING METHODSCourse File: Network Security
Course Details:
Course Title: Network Security
Course Code: C-501
Semester: 5th
Faculty Name: Anupma Malhotra
Email:
[email protected]Method of Teaching:
Lectures using whiteboard, PPTs, and live demonstrations
Case study discussions and role-play of real-world attacks
Assignments, group discussions, and quizzes for engagement
Course Objectives:
1. Understand the principles and fundamentals of network security.
2. Learn cryptographic algorithms and authentication mechanisms.
3. Identify and prevent different network attacks.
4. Analyze security protocols like firewalls and VPNs.
5. Utilize network security tools for scanning and securing networks.
Course Outcomes (COs):
CO CodeDescription
CO1 Explain network security principles and types of attacks.
CO2 Implement cryptographic techniques for secure communication.
CO3 Apply authentication and access control models.
CO4 Evaluate security protocols such as firewalls and VPNs.
CO5 Analyze and secure networks using modern tools.
Syllabus:
Unit 1: Introduction to Network Security
Security Goals: Confidentiality, Integrity, Availability
Security Attacks and Services
OSI Model and Security Issues
Passive vs Active Attacks
Unit 2: Cryptography
Symmetric Key Cryptography (DES, AES)
Asymmetric Key Cryptography (RSA, ECC)
Key Exchange: Diffie-Hellman
Hashing: SHA, MD5
Digital Signatures
Unit 3: Authentication and Access Control
Authentication Protocols: Kerberos, CHAP
Multi-factor Authentication
Access Control Models: DAC, MAC, RBAC
Unit 4: Network Security Mechanisms
Firewalls (Types, Configuration)
Intrusion Detection Systems (IDS/IPS)
VPNs and Tunneling
Email and Web Security
Unit 5: Modern Threats and Countermeasures
Malware, Phishing, DoS/DDoS
Vulnerability Scanning Tools: Nmap, Nessus
Wireless and Mobile Network Security
Zero Trust Model
Lesson Plan (12 Weeks):
Week Topics COs Activities
1 Introduction to Security, CIA Triad CO1 Lecture, Quiz
2 Types of Attacks and OSI Security CO1 Lecture + Diagram
3 Symmetric Cryptography: DES, AES CO2 Lecture
4 Asymmetric Cryptography: RSA CO2 Lecture
5 Hashing and Digital Signature CO2 Lecture
6 Authentication Protocols CO3 Lecture + Case Study
7 Access Control Models CO3 Lecture + Q&A
8 Firewalls, IDS, VPNs CO4 Lecture
9 Email and Web Security CO4 l
10 Attacks: Malware, DoS, Phishing CO5 Lecture
12 Wireless Security and Review CO5 Group Activity
Textbooks:
1. William Stallings – Cryptography and Network Security
2. Behrouz A. Forouzan – Cryptography and Network Security
References:
Bruce Schneier – Applied Cryptography
Charles P. Pfleeger – Security in Computing
RFCs and Online Resources