0% found this document useful (0 votes)
175 views2 pages

Network Security Syllabus

The document outlines the curriculum for a Network Security course under the NEP Oriented BCA program, detailing course type, credits, evaluation scheme, and course outcomes. Key topics include networking fundamentals, network security principles, firewall basics, and network traffic analysis. The course aims to equip learners with essential skills in business communication, document writing, teamwork, and understanding network security measures.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
175 views2 pages

Network Security Syllabus

The document outlines the curriculum for a Network Security course under the NEP Oriented BCA program, detailing course type, credits, evaluation scheme, and course outcomes. Key topics include networking fundamentals, network security principles, firewall basics, and network traffic analysis. The course aims to equip learners with essential skills in business communication, document writing, teamwork, and understanding network security measures.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

NEP Oriented BCA Curriculum

Course: Network Security


Course Type: Departmental Core Course Code: BCADST506 –B
Credits:2 L-T-P: 2-0-0

Course Title: Network Security

Evaluation Scheme
Semester V Teaching Scheme
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course Discipline SC
Category (Major)
NA
Course BCADST506 –B 2 2 10 15 25 NA -
Code .

Teaching
Offline 50
Mode
Duration of 2 Total
ESE 2 .30 Hrs. 50

Course Outcomes: On successful completion of the course the learner will be able to:

CO# Course Outcomes


Understand the importance and principles of effective business communication in
1 professional settings.
2 Write clear, concise, and professional business documents, including emails, memos, and
reports
3 Analyze the role of communication in fostering effective teamwork and leadership

4 Introducing network trafficking analysis to know about different trafficking algorithm.

Unit Content Contact


No. Hr.
Introduction to Networking: Definition, importance, and applications of computer
networks. Types of networks: LAN, WAN, MAN, and the Internet .Network 8
Components:Overview of hardware (routers, switches, access points) and
1 [Link] topologies: star, bus, mesh, and [Link] Protocols:OSI and
TCP/IP models: layers and their functions .Protocols: HTTP/HTTPS, FTP, SMTP, and
[Link] Transmission:Basics of wired and wireless [Link] of wired and
wireless transmission.
Introduction to Network Security:Goals of network security: confidentiality, integrity, 8
and [Link] threats: eavesdropping, malware, and [Link]
2 and Authorization:Password policies and best [Link]-based access control
(RBAC).Security Policies:Importance of organizational security policies. Risk
management and mitigation.
Firewall Basics:Types and functions of firewalls. Setting up basic firewall rules. Intrusion 8
3 Detection Systems (IDS):Host-based and network-based [Link] configurations and
tools. Endpoint Security:Securing devices connected to the [Link] of patch
management and antivirus solutions.
Network Traffic AnNaElyPsiO
s: r T
ieonot lesd fBo C
r A
moCnuitrorriicnuglu(m
Wireshark, SolarWinds). Analyzing 8
4 traffic to identify anomalies. Incident Response Framework:Steps in incident handling:
detection, containment, eradication, [Link] of forensic [Link]
(Security Information and Event Management):Role of SIEM in centralized security
monitoring. Introduction to tools like Splunk and IBM QRadar.

TextBooks

Sr.
No. Title/ Edition Author Publisher
"Computer Networks" Andrew S. Tanenbaum and
1 David J. Wetherall

"Network Security Essentials: Applications and William Stallings


2 Standards"

You might also like