0% found this document useful (0 votes)
19 views9 pages

BC, CN, NS

The document outlines the detailed syllabus for a Bachelor of Computer Applications (B.C.A.) program, covering various subjects across multiple semesters, including Business Communication, Computer Networks, and Network Security. Each subject is divided into units that detail specific topics, learning objectives, and suggested books for further reading. Additionally, the syllabus includes teaching methods, course objectives, outcomes, and a lesson plan for the Network Security course.

Uploaded by

Anupmamalhotra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views9 pages

BC, CN, NS

The document outlines the detailed syllabus for a Bachelor of Computer Applications (B.C.A.) program, covering various subjects across multiple semesters, including Business Communication, Computer Networks, and Network Security. Each subject is divided into units that detail specific topics, learning objectives, and suggested books for further reading. Additionally, the syllabus includes teaching methods, course objectives, outcomes, and a lesson plan for the Network Security course.

Uploaded by

Anupmamalhotra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

BACHELOROFCOMPUTERAPPLICATION(B.C.A.

)
DETAILED SYLLABUS
FIRST SEMESTER
PAPERCODE:C-103
BusinessCommunicationandSoftSkills
UNIT-I
Means of Communication:MeaningandDefinition,Process,Functions,Objectives,Importance,
Essentials of good communication, Communication barriers, 7C’s of Communication, Types of
Communication: Meaning,nature and scope.

UNIT-II
Oral communication: Principle of effective oral communication Techniques of effective speech,
Media of oral communication (Face, to, face conversation, Teleconferences, Press Conference,
Demonstration, Radio Recording, Dictaphone, Meetings, Rumour, Demonstration and
Dramatisation, Public address system, Grapevine, Group Discussion, Oral report, Closed circuit
TV). The art of listening, Principles of good listening. Written Communication Purpose of
writing, Clarity in Writing, Principle of Effective writing, Writing Techniques, Electronic Writing
Process. Business Letters & Reports: Need and functions of business letters, Planning & layout
of business letter, Kinds of business letters, Essentials of effective correspondence,Purpose,
Kind and Objective of Reports, Writing Reports.

UNIT-III
Drafting of business letters: Enquiries and replies, Placing and fulfilling orders, Complaints and
follow, up Sales letters, Circular letters Application for employment and resume. Information
Technology for Communication: Word Processor, Telex, Facsimile(Fax), E-mail, Voice mail,
Internet Multimedia, Teleconferencing, Mobile Phone Conversation, Video Conferencing, SMS,
Telephone AnsweringMachine, Advantages and limitations of these types. Self Analysis: SWOT
Analysis, Who am I, Attributes, Importance of Self Confidence, Self Esteem. Creativity: Out of
box thinking, Lateral Thinking.

UNIT-IV
Attitude: Factors influencing Attitude, Challenges and lessons from Attitude, Etiquette.
Motivation: Factors of motivation, Self talk, Intrinsic & Extrinsic Motivators. Goal Setting: Wish
List,SMARTGoals,Blueprintforsuccess,ShortTerm,LongTerm,LifeTimeGoals. Interpersonal Skills:
Gratitude: Understanding the relationship between Leadership Networking & Teamwork.
Assessing Interpersonal Skills Situation description of Interpersonal Skill. Team Work: Necessity
of Team Work Personally, Socially and Educationally.
UNIT-V
Leadership: Skills for a good Leader, Assessment of Leadership Skills, Stress
Management: Causes of Stress and its impact, how to manage & distress, Circle of
control, Stress Busters. Emotional Intelligence: What is Emotional Intelligence,
emotional quotient why Emotional Intelligence matters, Emotion Scales, Managing
Emotions. Conflict Resolution: Conflicts in Human Relations – Reasons Case Studies,
Approaches to conflict resolution. Decision Making: Importance and necessity of
Decision Making, Process and practical way of Decision Making, Weighing Positives
& Negatives.

SuggestedBooks:
1. BusinessCommunication,“K.K.Sinha,GalgotiaPublishingCompany,NewDelhi”.
2. MediaandCommunicationManagement,“C.S.Rayudu,HikalayaPublishingHouse,Bombay”.
3. Essentials of Business Communication, “Rajendra Pal and J.S. Korlhalli, Sultan
Chand & Sons, New Delhi”.
DETAILED SYLLABUS
THIRD SEMESTER
PAPERCODE:C-304
ComputerNetwork
UNITI
DataCommunications:Introduction:Theoreticalbasisforcommunication,Fourier
analysis,Bandlimitedsignals,Maximumdatarateofachannel:Transmission
impairments,Attenuationdistortion,Delaydistortion,Dispersion,Noise:Data
transmission modes, Serial & Parallel, Simplex, Half duplex & full duplex,
Synchronous & Asynchronous transmission:

TransmissionMedium:Introduction:Transmissionmedium,Guided&Unguided
Transmissionmedium,Twistedpair,Coaxialcable,Opticalfiber,Comparisonoffiber
opticsandcopperwire:Wirelesstransmission.

UNIT II
Computer Network: Introduction: Definition of a Computer Network, Components
of a computernetwork, Types of Network: Based on Topology (Bus, Star, Ring Mesh,
Tree), Basedon Size Technology and ownership (LAN, MAN, WAN). Network
topologies, Linear
BusTopology,RingTopology,StarTopology,HierarchicalorTreeTopology,OSIreference
model.
Multiplexing,FDM,Frequencydivisionmultiplexing,WDM,Wavelengthdivisionmultiple
xing,TDM,Timedivisionmultiplexing.

UNIT III
Data Link Layer: Services provided to the Upper Layer, Framing, Error Control, Flow
Control, sliding window protocols Medium Access Sub Layer: Medium access sub
layer - channel allocations, LAN protocols – aloha protocols - overview of IEEE
standards - FDDI.

UNIT IV
Network Layer: Services provided to the Upper Layer: Routing Algorithms
(Centralized, Distributed),CongestionControl(TokenBasedandNonToken Based),
Internetworking, TCP/IP, IPpacket, IP address, and IPv4 and IPV6. Transport Layer:
Design issues, and connection management, TCP, UDP

UNITV
Session Layer: Design issues and remote procedure call. Presentation Layer: Design
issues.
ApplicationLayer:Filetransfer,accessandmanagement,electronicmail,virtualterminals
, other application.
SuggestedBooks:
1. W.Stallings,“DataandComputerCommunication”,PearsonEducation.
2. A.S.Tanenbaum,“ComputerNetwork”,4th,Edition,Pearson Education.
3. Forouzan,“DataCommunicationandNetworking”,2ndEdition,TataMcGrawHill.
BACHELOROFCOMPUTERAPPLICATION(B.C.
A.)
DETAILED SYLLABUS
FIFTH SEMESTER
PAPERCODE:C-501
Network Security
UNIT-I
Network Security: Introduction: OSI Security Architecture-Classical Encryption
techniquesCipher Principles, Data Encryption Standard, Block Cipher Design
Principles and Modes of Operation.

UNIT-II
Introduction to Number Theory: modular arithmetic, prime and relative prime
numbers, Extended Euclidean Algorithm, Fermat’s and Euler’s theorem, Primarily
testing, Chinese Remainder theorem, Discrete Logarithmic Problem . Public Key
Cryptography: Key Management, Diffie Hellman key Exchange-Elliptic Curve .
Architecture and Cryptography, Confidentiality using Symmetric Encryption, Public
Key Cryptography and RSA.

UNIT-III
Authentication and Hash Function: Authentication requirements, Authentication
functions– Message Authentication Codes, Hash Functions, Security of Hash
Functions and MACs, MD5 message Digest algorithm, Secure Hash Algorithm,
RIPEMD, HMAC Digital Signatures, Authentication Protocols, Digital Signature
Standard

UNIT-IV
Network Security: Authentication Applications: Kerberos, X.509 Authentication
Service, Electronic Mail Security, PGP, S/MIME, IP Security, Web Security.

UNIT-V
SystemLevelSecurity:Intrusiondetection,passwordmanagement,VirusesandrelatedTh
reats, Virus Counter measures, Firewall Design Principles, Trusted Systems.

SuggestedBooks:
1. William Stallings, “Cryptography and Network Security, Principles and Practices ",
Prentice Hall of India, Third Edition,2003.
AtulKahate-“CryptographyandNetworkSecurity",TataMcGraw,Hill,2003

Course File: Network Security

Course Details:

 Course Title: Network Security


 Course Code: C-501
 Semester: 5th
 Faculty Name: Anupma Malhotra
 Email: [email protected]

Method of Teaching:

 Lectures using whiteboard, PPTs, and live demonstrations


 Case study discussions and role-play of real-world attacks
 Assignments, group discussions, and quizzes for engagement

Course Objectives:

1. Understand the principles and fundamentals of network security.


2. Learn cryptographic algorithms and authentication mechanisms.
3. Identify and prevent different network attacks.
4. Analyze security protocols like firewalls and VPNs.
5. Utilize network security tools for scanning and securing networks.

Course Outcomes (COs):

CO Code Description
CO1 Explain network security principles and types of attacks.
CO2 Implement cryptographic techniques for secure communication.
CO3 Apply authentication and access control models.
CO4 Evaluate security protocols such as firewalls and VPNs.
CO5 Analyze and secure networks using modern tools.

Syllabus:

Unit 1: Introduction to Network Security


 Security Goals: Confidentiality, Integrity, Availability
 Security Attacks and Services
 OSI Model and Security Issues
 Passive vs Active Attacks

Unit 2: Cryptography

 Symmetric Key Cryptography (DES, AES)


 Asymmetric Key Cryptography (RSA, ECC)
 Key Exchange: Diffie-Hellman
 Hashing: SHA, MD5
 Digital Signatures

Unit 3: Authentication and Access Control

 Authentication Protocols: Kerberos, CHAP


 Multi-factor Authentication
 Access Control Models: DAC, MAC, RBAC

Unit 4: Network Security Mechanisms

 Firewalls (Types, Configuration)


 Intrusion Detection Systems (IDS/IPS)
 VPNs and Tunneling
 Email and Web Security

Unit 5: Modern Threats and Countermeasures

 Malware, Phishing, DoS/DDoS


 Vulnerability Scanning Tools: Nmap, Nessus
 Wireless and Mobile Network Security
 Zero Trust Model

Lesson Plan (12 Weeks):

Week Topics COs Activities


1 Introduction to Security, CIA Triad CO1 Lecture, Quiz
2 Types of Attacks and OSI Security CO1 Lecture + Diagram
3 Symmetric Cryptography: DES, AES CO2 Lecture
4 Asymmetric Cryptography: RSA CO2 Lecture
5 Hashing and Digital Signature CO2 Lecture
6 Authentication Protocols CO3 Lecture + Case Study
7 Access Control Models CO3 Lecture + Q&A
8 Firewalls, IDS, VPNs CO4 Lecture
9 Email and Web Security CO4 l
10 Attacks: Malware, DoS, Phishing CO5 Lecture
12 Wireless Security and Review CO5 Group Activity

Textbooks:

1. William Stallings – Cryptography and Network Security


2. Behrouz A. Forouzan – Cryptography and Network Security

References:

 Bruce Schneier – Applied Cryptography


 Charles P. Pfleeger – Security in Computing
 RFCs and Online Resources

PREPARE COURSE FILE ACCORDING ABOVE GIVEN SYLLABUS WITH LESSON


PLAN AND TEACHING METHODSCourse File: Network Security

Course Details:

 Course Title: Network Security


 Course Code: C-501
 Semester: 5th
 Faculty Name: Anupma Malhotra
 Email: [email protected]

Method of Teaching:

 Lectures using whiteboard, PPTs, and live demonstrations


 Case study discussions and role-play of real-world attacks
 Assignments, group discussions, and quizzes for engagement

Course Objectives:

1. Understand the principles and fundamentals of network security.


2. Learn cryptographic algorithms and authentication mechanisms.
3. Identify and prevent different network attacks.
4. Analyze security protocols like firewalls and VPNs.
5. Utilize network security tools for scanning and securing networks.
Course Outcomes (COs):

CO CodeDescription
CO1 Explain network security principles and types of attacks.
CO2 Implement cryptographic techniques for secure communication.
CO3 Apply authentication and access control models.
CO4 Evaluate security protocols such as firewalls and VPNs.
CO5 Analyze and secure networks using modern tools.

Syllabus:

Unit 1: Introduction to Network Security

 Security Goals: Confidentiality, Integrity, Availability


 Security Attacks and Services
 OSI Model and Security Issues
 Passive vs Active Attacks

Unit 2: Cryptography

 Symmetric Key Cryptography (DES, AES)


 Asymmetric Key Cryptography (RSA, ECC)
 Key Exchange: Diffie-Hellman
 Hashing: SHA, MD5
 Digital Signatures

Unit 3: Authentication and Access Control

 Authentication Protocols: Kerberos, CHAP


 Multi-factor Authentication
 Access Control Models: DAC, MAC, RBAC

Unit 4: Network Security Mechanisms

 Firewalls (Types, Configuration)


 Intrusion Detection Systems (IDS/IPS)
 VPNs and Tunneling
 Email and Web Security

Unit 5: Modern Threats and Countermeasures

 Malware, Phishing, DoS/DDoS


 Vulnerability Scanning Tools: Nmap, Nessus
 Wireless and Mobile Network Security
 Zero Trust Model

Lesson Plan (12 Weeks):

Week Topics COs Activities


1 Introduction to Security, CIA Triad CO1 Lecture, Quiz
2 Types of Attacks and OSI Security CO1 Lecture + Diagram
3 Symmetric Cryptography: DES, AES CO2 Lecture
4 Asymmetric Cryptography: RSA CO2 Lecture
5 Hashing and Digital Signature CO2 Lecture
6 Authentication Protocols CO3 Lecture + Case Study
7 Access Control Models CO3 Lecture + Q&A
8 Firewalls, IDS, VPNs CO4 Lecture
9 Email and Web Security CO4 l
10 Attacks: Malware, DoS, Phishing CO5 Lecture
12 Wireless Security and Review CO5 Group Activity

Textbooks:

1. William Stallings – Cryptography and Network Security


2. Behrouz A. Forouzan – Cryptography and Network Security

References:

 Bruce Schneier – Applied Cryptography


 Charles P. Pfleeger – Security in Computing
 RFCs and Online Resources

You might also like