R23 3rd Year B.tech Cyber Security
R23 3rd Year B.tech Cyber Security
OpenElectives&Minor
OpenElectives,offeredtootherdepartmentstudents:
OpenElectiveI:JavaProgramming
OpenElectiveII:OperatingSystems
OpenElectiveIII:DataBaseManagementSystems
OpenElectiveIV:ComputerNetworks
Contact Hours
S.No. Code Course Name per week Credits
L T P
1 Application Thread Detection 3 0 3
2 IOT security 3 0 3
Penetration Testing and
3 3 0 3
Vulnerability Assessment
4 Social Media Security 3 0 3
5 NoSQL Databases 3 0 3
6 NoSQL Databases Lab 3 1.5
7 Social Media Security Lab 3 1.5
Total 18
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
III Year I Semester CLOUD COMPUTING
3 0 0 3
Course Objectives:
The main objectives of the course are to
• Explain the evolving utility computing model called cloud computing.
• Introduce the various levels of services offered by cloud.
• Discuss the fundamentals of cloud enabling technologies such as distributed
computing, service-oriented architecture and virtualization.
• Emphasize the security and other challenges in cloud computing.
• Introduce the advanced concepts such as containers, serverless computing and cloud-
centric Internet of Things.
Text Books:
1. Mastering Cloud Computing, 2nd edition, Rajkumar Buyya, Christian Vecchiola,
ThamaraiSelvi, ShivanandaPoojara, Satish N. Srirama, Mc Graw Hill, 2024.
2. Distributed and Cloud Computing, Kai Hwang, Geoffery C. Fox, Jack J. Dongarra,
Elsevier, 2012.
Reference Books:
1. Cloud Computing, Theory and Practice, Dan C Marinescu, 2nd edition, MK Elsevier,
2018.
2. Essentials of cloud Computing, K. Chandrasekhran, CRC press, 2014.
3. Online documentation and tutorials from cloud service providers (e.g., AWS, Azure,
GCP)
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Course Objectives:
The main objectives of this course are to
• Explore the working principles and utilities of various cryptographic algorithms
including secret key cryptography, hashes and message digests, public key
algorithms, design issues and working principles of various authentication protocols.
• Implement various secure communication standards including Kerberos, IPsec, and
SSL/TLS.
UNIT I:
Basic Principles: Security Goals, Cryptographic Attacks, Services and Mechanisms,
Mathematics of Cryptography- integer arithmetic, modular arithmetic, matrices, linear
congruence.
UNIT II:
Symmetric Encryption: Mathematics of Symmetric Key Cryptography-algebraic
structures, GF(2n) Fields, Introduction to Modern Symmetric Key Ciphers-modern block
ciphers, modern stream ciphers, Data Encryption Standard- DES structure, DES analysis,
Security of DES, Multiple DES, Advanced Encryption Standard-transformations, key
expansions, AES ciphers, Analysis of AES.
UNIT III:
Asymmetric Encryption: Mathematics of Asymmetric Key Cryptography-primes,
primality testing, factorization, CRT, Asymmetric Key Cryptography- RSA crypto
system, Rabin cryptosystem, Elgamal Crypto system, ECC
UNIT IV:
Data Integrity, Digital Signature Schemes & Key Management: Message Integrity
and Message Authentication-message integrity, Random Oracle model, Message
authentication, Cryptographic Hash Functions-whirlpool, SHA-512, Digital Signature-
process, services, attacks, schemes, applications, Key Management-symmetric key
distribution, Kerberos.
UNIT V:
Network Security-I: Security at application layer: PGP and S/MIME, Security at the
Transport Layer: SSL and TLS, Network Security-II :Security at the Network Layer:
IPSec-two modes, two security protocols, security association, IKE, ISAKMP, System
Security-users, trust, trusted systems, buffer overflow, malicious software, worms,
viruses, IDS, Firewalls.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Text Books:
1. Cryptography and Network Security, 3rd Edition Behrouz A Forouzan, Deb deep
Mukhopadhyay, McGraw Hill,2015
2. Cryptography and Network Security,4th Edition, William Stallings, (6e) Pearson,2006
3. Everyday Cryptography, 1st Edition, Keith M.Martin, Oxford,2016
Reference Books:
Network Security and Cryptography, 1st Edition, Bernard Meneges, Cengage
Learning,2018
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Course Objectives:
Course Outcomes:
• Able to employ finite state machines for modeling and solving computing
problems.
• Able to design context free grammars for formal languages.
• Able to distinguish between decidability and undecidability.
• Demonstrate the knowledge of patterns, tokens & regular expressions for lexical
analysis.
• Acquireskills in using lextool and design LR parsers
UNIT-I
Introduction to Finite Automata: Structural Representations, Automata and
Complexity, the Central Concepts of Automata Theory–Alphabets, Strings,
Languages, Problems.Non deterministic Finite Automata: Formal Definition, an
application, Text Search, Finite Automata with Epsilon-Transitions. Deterministic Finite
Automata: Definition of DFA, How ADFA Process Strings, The language of DFA,
Conversion of NFA with €-transitions to NFA without €-transitions. Conversion of NFA
to DFA
UNIT-II
Regular Expressions: Finite Automata and Regular Expressions, Applications of Regular
Expressions, Algebraic Laws for Regular Expressions, Conversion of Finite Automata to
Regular Expressions.Pumping Lemma for Regular Languages: Statement of the
pumping lemma, Applications of the Pumping Lemma. Context-Free Grammars:
Definition of Context-Free Grammars, Derivations Using a Grammar, Left most and
Right most Derivations, the Language of a Grammar, Parse Trees, Ambiguity in Grammars
and Languages.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT-III
Push Down Automata: Definition of the Pushdown Automaton, the Languages of a
PDA, Equivalence of PDA's and CFG's, Acceptance by final state. Turing Machines:
Introduction to Turing Machine, Formal Description, Instantaneous description, The
language of a Turing machine. Undecidability: Undecidability, A Language that is Not
Recursively Enumerable, An Undecidable Problem That is RE, Undecidable Problems
about Turing Machines
UNIT-IV
Introduction: The structure of a compiler, Lexical Analysis: The Role of the Lexical
Analyzer, Input Buffering, Recognition of Tokens, The Lexical-Analyzer Generator Lex.
Syntax Analysis: Introduction, Context-Free Grammars, Writing a Grammar, Top-
Down Parsing, Bottom-Up Parsing, Introduction to LR Parsing: Simple LR, More
Powerful LR Parsers.
UNIT-V
Syntax-Directed Translation: Syntax-Directed Definitions, Evaluation Orders for
SDD's, Syntax-Directed Translation Schemes, Implementing L-Attributed SDD's.
Intermediate-Code Generation: Variants of Syntax Trees, Three-Address Code. Run
Time Environments: Stack Allocation of Space, Access to Non local Data on the
Stack, Heap Management
TEXT BOOKS:
1. 1.Introduction to Automata Theory, Languages, and Computation, 3 ndEdition,
John E. Hopcroft, Rajeev Motwani, Jeffrey D.Ullman, Pearson Education.
2. Compilers: Principles, Techniques and Tools, Alfred V.Aho, Monica S.Lam,
RaviSethi, Jeffry D.Ullman,2ndEdition, Pearson.
3. Theory of Computer Science– Automata languages and computation,
nd
MishraandChandrashekaran, 2 Edition, PHI.
REFERENCE BOOKS:
1. Introduction to Formal languages Automata Theory and Computation, Kamala
Krithivasan, Rama R, Pearson.
2. Introduction to Languages and The Theory of Computation, John C Martin,
TMH.
3. Lex &yacc–John R. Levine, Tony Mason, Doug Brown, O’reilly
4. Compiler Construction, Kenneth C. Louden, Thomson. Course Technology.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
III Year I Semester SECURE CODING PRACTICES
3 0 0 3
COURSE OBJECTIVES:
COURSE OUTCOMES:
Upon the completion of the course, the students will be able to:
CO 1: Implement security as a culture and show mistakes that make applications vulnerable
to attacks.
CO 2: Understand various attacks like DoS, buffer overflow, web specific, database specific
web-spoofing attacks.
CO 3: Analyze and demonstrate skills necessary to address common programming errors
that lead to security issues and to learn how to develop secure applications.
CO 4: Analyze the nature of the threats to software and incorporate secure coding practices
throughout the planning and development of the product.
CO 5: Apply proper techniques for handling application faults, implement secure
authentication, authorization and data validation controls used to prevent common
vulnerabilities.
UNIT- I
INTRODUCTION: Need for secure systems: Proactive Security development process,
Secure Software Development Cycle (S-SDLC), Security issues while writing SRS, Design
phase security, Development Phase, Test Phase, Maintenance Phase, Writing Secure Code –
Best Practices SD3 (Secure by design, default and deployment), Security principles and
Secure Product Development Timeline
UNIT -II
SECURE CODING TECHNIQUES: Protection against DoS attacks, Application Failure
Attacks, CPU Starvation Attacks, Insecure Coding Practices in Java Technology. ARP
Spoofing and its countermeasures. Buffer Overrun- Stack overrun, Heap Overrun, Array
Indexing Errors, Format String Bugs. Security Issues in C Language: String Handling,
Avoiding Integer Overflows and Underflows and Type Conversion Issues- Memory
Management Issues, Code Injection Attacks, Canary based countermeasures using
StackGuard and Propolice. Socket Security, Avoiding Server Hijacking, Securing RPC,
ActiveX and DCOM
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT–III
Threat modelling process and its benefits: Identifying the Threats by Using Attack Trees
and rating threats using DREAD, Risk Mitigation Techniques and Security Best Practices.
Security techniques, authentication, authorization. Defense in Depth and Principle of Least
Privilege.
UNIT-IV
AND WEB SPECIFIC INPUT ISSUES: SQL Injection Techniques and Remedies, Race
conditions, Time of Check Versus Time of Use and its protection mechanisms. Validating
Input and Inter process Communication, Securing Signal Handlers and File Operations. XSS
scripting attack and its types – Persistent and Non persistent attack XSS Countermeasures
and Bypassing the XSS Filters. Testing Secure Applications: Security code overview, secure
software installation. The Role of the Security Tester, Building the Security Test Plan.
Testing HTTP-Based Applications, Testing File-Based Applications, Testing Clients with
Rogue Servers
UNIT -V
SOFTWARE SECURITY ENGINEERING: Requirements engineering for secure
software: Misuse and abuse cases- SQUARE process model- Software security practices and
knowledge for architecture and design.
Text Books:
1. Writing Secure Code, Michael Howard and David LeBlanc, Microsoft Press, 2nd
Edition, 2004.
2. Threat Modeling, Frank Swiderski and Window Snyder, Microsoft Professional, 1st
Edition, 2004.
Reference Books:
1. Robert C.Seacord, “ Secure Coding in C and C++”, Pearson Education, 2nd edition,
2013.
2. Julia H. Allen, Sean J. Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead, “
Software Security Engineering : A guide for Project Managers”, Addison-Wesley
Professional, 2008.
3. Buffer Overflow Attacks: Detect, Exploit, Prevent by Jason Deckar, Syngress, 1st
Edition, 2005.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
III Year I Semester SOFTWARE ENGINEERING
3 0 0 3
Objectives:
Course Outcomes:
Knowledge
CO Course Outcomes Level(K)#
CO1 Compare and analyse various process models K1
Develop SRS document and estimate the modularity of
CO2 K2
the project
Develop data flow diagrams and compare the user
CO3 K2
interface design
CO4 Compare testing strategies and analyse the software quality K3
Apply Computer Aided Software Engineering tools and analyse
CO5 the components of software maintenance and reuse. K2
#basedonsuggestedRevisedBTL
UNIT-I
INTRODUCTION: Evolution, Software development projects, Exploratory style of
software developments, Emergence of software engineering, Notable changes in software
development practices, Computer system engineering. SOFTWARE LIFE CYCLE
MODELS: Basic concepts, Waterfall model and its extensions, Rapid application
development, Agile development model and Spiral model.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT -II:
SOFTWARE PROJECT MANAGEMENT: Software project management complexities,
Responsibilities of a software project manager, Metrics for project size estimation, Project
estimation techniques, Empirical Estimation techniques, COCOMO, Halstead’s software
science, and risk management. REQUIREMENTS ANALYSIS AND SPECIFICATION:
Requirements gathering and analysis, Software Requirements Specification (SRS), Formal
system specification, Axiomatic specification, Algebraic specification, Executable
specification and 4GL.
UNIT III:
SOFTWARE DESIGN: Overview of the design process, How to characterise a good
software design? Layered arrangement of modules, Cohesion and Coupling. approaches to
software design. FUNCTION-ORIENTED SOFTWARE DESIGN: Overview of SA/SD
methodology, Structured analysis, Developing the DFD model of a system, Structured
design, Detailed design, and Design Review. USER INTERFACE DESIGN: Characteristics
of a good user interface, Basic concepts, Types of user interfaces, Fundamentals of
component-based GUI development, and user interface design methodology.
UNIT IV:
CODING AND TESTING: Coding, Code review, Software documentation, Testing, Black-
box testing, White-Box testing, Debugging, Program analysis tools, Integration testing,
Testing object-oriented programs, Smoke testing, and Some general issues associated with
testing. SOFTWARE RELIABILITY AND QUALITY MANAGEMENT: Software
reliability. Statistical testing, Software quality, Software quality management system, ISO
9000.SEI Capability maturity model. Few other important quality standards, and Six Sigma.
UNIT V:
COMPUTER-AIDED SOFTWARE ENGINEERING (CASE): CASE and its scope,
CASE environment, CASE support in the software life cycle, Other characteristics of CASE
tools, Towards second generation CASE Tool, and Architecture of a CASE Environment.
SOFTWARE MAINTENANCE: Characteristics of software maintenance, Software reverse
engineering, Software maintenance process models and Estimation of maintenance cost.
SOFTWARE REUSE: What can be reused? Why almost no reuse so far? Basic issues in
any reuse program, A reuse approach, and Reuse at organisation level.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Text Books
1. Fundamentals of Software Engineering, Raji b Mall, Fifth Edition, PHI.
Reference Books
1. Software Engineering Apractitioner’s Approach, Roger S. Pressman,
Ninth Edition, McGraw Hill International Edition.
2. Software Engineering, Ian Sommerville, Tenth Edition, Pearson Education.
3. Software Engineering, Principles and Practices, Deepak Jain,
Oxford University Press.
e-Resources:
1) https://nptel.ac.in/courses/106/105/106105182/
2) https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_012605895063871
48827_shared/overview
https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_013382690411003
904735_shared/overview
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
III Year I Semester ARTIFICIAL INTELLIGENCE
3 0 0 3
Course Outcome(s):
This course introduces students to the basic knowledge representation, problem solving, and
learning methods of artificial intelligence.
UNIT-I
Introduction, Overview of Artificial intelligence: Problems of AI, AI technique, Tic - Tac -
Toe problem. Intelligent Agents, Agents & environment, nature of environment, structure of
agents, goal-based agents, utility-based agents, learning agents. Problem Solving, Problem
Space & search: Defining the problem as state space search, production system, problem
characteristics, issues in the design of search programs.
UNIT-II
Search techniques: Problem solving agents, searching for solutions; uniform search
strategies: breadth first search, depth first search, depth limited search, bidirectional search,
comparing uniform search strategies. Heuristic search strategies Greedy best-first search, A*
search, AO* search, memory bounded heuristic search: local search algorithms &
optimization problems: Hill climbing search, simulated annealing search, local beam search
UNIT-III
Constraint satisfaction problems: Local search for constraint satisfaction problems.
Adversarial search, Games, optimal decisions & strategies in games, the minimax search
procedure, alpha-beta pruning, additional refinements, iterative deepening.
UNIT – IV
Knowledge & reasoning: Knowledge representation issues, representation & mapping,
approaches to knowledge representation. Using predicate logic, representing simple fact in
logic, representing instant & ISA relationship, computable functions & predicates, resolution,
natural deduction. Representing knowledge using rules, Procedural verses declarative
knowledge, logic programming, forward verses backward reasoning, matching, control
knowledge.
UNIT – V
Probabilistic reasoning: Representing knowledge in an uncertain domain, the semantics of
Bayesian networks, Dempster-Shafer theory, Planning Overview, components of a planning
system, Goal stack planning, Hierarchical planning, other planning techniques. Expert
Systems: Representing and using domain knowledge, expert system shells, and knowledge
acquisition.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Home Assignments:
Assignments should include problems related to the topics covered in lectures, like heuristics,
optimal search, and graph heuristics. Constraint satisfaction problems, k-nearest neighbors,
decision trees, etc. can be included in home assignments.
Text Books:
1. Stuart Russell and Peter Norvig, Artificial Intelligence: A Modern Approach
2. Artificial Intelligence, Russel, Pearson
Reference Books:
1. Artificial Intelligence, Ritch & Knight, TMH
2. Introduction to Artificial Intelligence & Expert Systems, Patterson, PHI
3. Logic & Prolog Programming, Saroj Kaushik, New Age International
4. Expert Systems, Giarranto, VIKAS
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
MICROPROCESSORS & L T P C
III Year I Semester
MICROCONTROLLERS 3 0 0 3
Course Objectives:
• To introduce fundamental architectural concepts of microprocessors and
microcontrollers.
• To impart knowledge on addressing modes and instruction set of 8086 and 8051
• To introduce assembly language programming concepts
• To explain memory and I/O interfacing with 8086 and 8051
• To introduce16 bit and 32 bit microcontrollers.
UNIT I
8086 Architecture: Main features, pin diagram/description, 8086 microprocessor family,
internal architecture, bus interfacing unit, execution unit, interrupts and interrupt response,
8086 system timing, minimum mode and maximum mode configuration.
UNIT II
8086 Programming: Program development steps, instructions, addressing modes, assembler
directives, writing simple programs with an assembler, assembly language program
development tools.
UNIT III
8086 Interfacing: Semiconductor memories interfacing (RAM, ROM), Intel 8255
programmable peripheral interface, Interfacing switches and LEDS, Interfacing seven
segment displays, software and hardware interrupt applications, Intel 8251 USART
architecture and interfacing, Intel 8237a DMA controller, stepper motor, A/D and D/A
converters, Need for 8259 programmable interrupt controllers.
UNIT IV
Microcontroller, Architecture of 8051, Special Function Registers(SFRs), I/O Pins Ports and
Circuits, Instruction set, Addressing modes, Assembly language programming.
UNIT V
Interfacing Microcontroller, Programming 8051 Timers, Serial Port Programming, Interrupts
Programming, LCD & Keyboard Interfacing, ADC, DAC & Sensor Interfacing, External
Memory Interface, Stepper Motor and Waveform generation, Comparison of
Microprocessor, Microcontroller, PIC and ARM processors
Textbooks:
1. Microprocessors and Interfacing – Programming and Hardware by Douglas V Hall,
SSSP Rao, Tata McGraw Hill Education Private Limited, 3rd Edition,1994.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
2. K M Bhurchandi, A K Ray, Advanced Microprocessors and Peripherals, 3rd edition,
McGraw Hill Education, 2017.
3. Raj Kamal, Microcontrollers: Architecture, Programming, Interfacing and System
Design, 2nd edition, Pearson, 2012.
References:
1. Ramesh S Gaonkar, Microprocessor Architecture Programming and Applications with
the 8085, 6th edition, Penram International Publishing, 2013.
2. Kenneth J. Ayala, The 8051 Microcontroller, 3rd edition, Cengage Learning, 2004.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
III Year I Semester CLOUD COMPUTING LAB
0 0 3 1.5
Course Objectives:
• To introduce the various levels of services offered by cloud.
• To give practical knowledge about working with virtualization and containers.
• To introduce the advanced concepts such as serverless computing and cloud
simulation.
Course Outcomes: At the end of the course, the student should be able to
• Demonstrate various service types, delivery models and technologies of a cloud
computing environment.
• Distinguish the services based on virtual machines and containers in the cloud
offerings.
• Assess the challenges associated with a cloud-based application.
• Discuss advanced cloud concepts such as serverless computing and cloud simulation.
• Examine various programming paradigms suitable to solve real world and scientific
problems using cloud services.
List of Experiments:
1. Lab on web services
2. Lab on IPC, messagaging, publish/subscribe
3. Install VirtualBox/VMware Workstation with different flavours of Linux or windows
OS on top of windows8 or above.
4. Install a C compiler in the virtual machine created using VirtualBox and execute
Simple Programs.
5. Create an Amazon EC2 instance and set up a web-server on the instance and associate
an IP address with the instance. In the process, create a security group allowing access
to port 80 on the instance.
OR
6. Do the same with OpenStack
7. Install Google App Engine. Create a hello world app and other simple web
applications using python/java.
8. Start a Docker container and set up a web-server (e.g. apache2 or Python based Flask
micro web framework) on the instance. Map the host directory as a data volume for
the container.
9. Find a procedure to transfer the files from one virtual machine to another virtual
machine. Similarly, from one container to another container.
10. Find a procedure to launch virtual machine using trystack (Online Openstack Demo
Version)
11. Install Hadoop single node cluster and run simple applications like word count.
12. Utilize OpenFaaS – Serverless computing framework and demonstrate basic event
driven function invocation.
13. Simulate a cloud scenario using CloudSim and run a scheduling algorithm that is not
present in CloudSim.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Text Books:
1. Mastering Cloud Computing, 2nd edition, RajkumarBuyya, Christian Vecchiola,
ThamaraiSelvi, ShivanandaPoojara, Satish N. Srirama, McGraw Hill, 2024.
2. Distributed and Cloud Computing, Kai Hwang, Geoffery C. Fox, Jack J. Dongarra,
Elsevier, 2012.
Reference Books:
1. Cloud Computing, Theory and Practice, Dan C Marinescu, 2nd edition, MK Elsevier,
2018.
2. Cloud Computing: Principles and Paradigms by RajkumarBuyya, James Broberg and
Andrzej M. Goscinski, Wiley, 2011.
3. Online documentation and tutorials from cloud service providers (e.g. AWS, Google
App Engine)
4. Docker, Reference documentation, https://docs.docker.com/reference/
OpenFaaS, Serverless Functions Made Simple, https://docs.openfaas.com/
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Course Objectives:
• To learn basic understanding of cryptography, how it has evolved, and some key
encryption techniques used today.
• To understand and implementencryption and decryption using Ceaser Cipher,
Substitution Cipher, Hill Cipher.
List of Experiments:
1. Write a C program that contains a string (char pointer) with a value \Hello World’.
The program should XOR each character in this string with 0 and displays the result.
2. Write a C program that contains a string (char pointer) with a value \Hello World’.
The program should AND or and XOR each character in this string with 127 and
display the result
3. Write a Java program to perform encryption and decryption using the following
algorithms:
a) Ceaser Cipher
b) Substitution Cipher
c) Hill Cipher
4. Write a Java program to implement the DES algorithm logic
5. Write a C/JAVA program to implement the BlowFish algorithm logic
6. Write a C/JAVA program to implement the Rijndael algorithm logic.
7. Using Java Cryptography, encrypt the text “Hello world” using BlowFish. Create
your own key using Java key tool.
8. Write a Java program to implement RSA Algorithm
9. Implement the Diffie-Hellman Key Exchange mechanism using HTML and
JavaScript. Consider the end user as one of the parties (Alice) and the JavaScript
application as other party (bob).
10. Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
III Year I Semester FULLSTACK DEVELOPMENT - II
0 1 2 2
Course Outcomes:
At the end of the Course, Student will be able to:
CO1: Make use ofrouter, template engine and authentication using sessions to develop
application in ExpressJS.
CO2: Build a single page application using RESTful APIs in ExpressJS.
CO3: Make use ofcomponents, props, stats and render data in ReactJS.
CO4: Apply router and hooksin designing ReactJS application.
CO5: Make use of MongoDB queries to perform CRUD operations on document database.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO 1 2 2 3 2 2 2 2
CO 2 2 3 2 2 2 2 2
CO 3 2 2 3 2 2 2 2
CO 4 2 3 2 2 2 2 2
CO 5 2 2 3 2 2 2 2
List of Experiments:
Experiment 1:Node.js
a. Write a program to show the workflow of JavaScript code executable by creating web server in
Node.js.
b. Write a program to transfer data over http protocolusing http module.
c. Create a text file src.txt and add the following content to it. (HTML, CSS, Javascript,
Typescript, MongoDB, Express.js, React.js, Node.js)
d. Write a program to parse an URL using URL module.
e. Write a program to create an user-defined module and show the workflow of Modularization of
application using Node.js
Experiment 2:Typescript
a. Write a program to understand simple and special types.
b. Write a program to understand function parameter and return types.
c. Write a program to show the importance with Arrow function. Use optional, default and REST
parameters.
d. Write a program to understand the working of typescript with class, constructor, properties,
methods and access specifiers.
e. Write a program to understand the working of namespaces and modules.
f. Write a program to understand generics with variables, functions and constraints.
Experiment 3-15:
Augmented Programs: (Any 2 must be completed from Experiment 3-5)
3. Write a CSS program, to apply 2D and 3D transformations in a web page.
4. a web page with new features of HTML5 and CSS3.
5. Design a to-do list application using JavaScript.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Experiment 6:
ExpressJS – Routing, HTTP Methods, Middleware
a. Write a program to define a route, Handling Routes, Route Parameters, Query Parameters and
URL building.
b. Write a program to accept data, retrieve data and delete a specified resource using http
methods.
c. Write a program to show the working of middleware.
Experiment 7:
ExpressJS – Templating, Form Data
a. Write a program using templating engine.
b. Write a program to work with form data.
Experiment 8:
ExpressJS – Cookies, Sessions, Authentication
a. Write a program for session management using cookies and sessions.
b. Write a program for user authentication
Experiment 9:
ExpressJS – Database, RESTful APIs
a. Write a program to connect MongoDB database using Mangoose and perform CRUD
operations.
b. Write a program to develop a single page application using RESTful APIs
Experiment 10:
ReactJS – Render HTML, JSX, Components – function & Class
a. Write a program to render HTML to a web page.
b. Write a program for writing markup with JSX.
c. Write a program for creating and nesting components (function and class).
Experiment 11:
ReactJS – Props and States, Styles, Respond to Events
a. Write a program to work with props and states.
b. Write a program to add styles (CSS & Sass Styling) and display data.
c. Write a program for responding to events.
Experiment 12:
ReactJS – Conditional Rendering, Rendering Lists, React Forms
a. Write a program for conditional rendering.
b. Write a program for rendering lists.
c. Write a program for working with different form fields using react forms
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Experiment 13:
ReactJS – React Router, Updating the Screen
a. Write a program for routing to different pages using react router.
b. Write a program for updating the screen.
Experiment 14:
ReactJS – Hooks, Sharing data between Components
a. Write a program to understand the importance of using hooks.
b. Write a program for sharing data between components
Experiment 15:
ReactJS Applications – To-do list and Quiz
a. Design to-do list application
Experiment 16:
MongoDB – Installation, Configuration, CRUD operations
a. Install MongoDB and configure ATLAS
b. Write MongoDB queries to perform CRUD operations on document using insert(), find(),
update(), remove()
Experiment 17:
MongoDB – Databases, Collections and Records
g. Write MongoDB queries to Create and drop databases and collections.
Write MongoDB queries to work with records using find(), limit(), sort(), createIndex(), aggregate()
Experiment 18-20:
Augmented Programs: (Any 2 must be completed)
18. Design a to-do list application using NodeJS and ExpressJS.
19. Design a Quiz app using ReactJS.
20. Complete the MongoDB certification from MongoDB University website.
Text Books:
1.Programming the World Wide Web, 7th Edition, Robet W Sebesta, Pearson, 2013.
2.Pro MERN Stack: Full Stack Web App Development with Mongo, Express, React, and
Node, Vasan Subramanian, 2nd edition, A Press, O’Reilly.
Web Links:
1.ExpressJS - https://www.tutorialspoint.com/expressjs
2.ReactJS - https://www.w3schools.com/REACT (and) https://react.dev/learn#
3.MongoDB - https://learn.mongodb.com/learning-paths/introduction-to-mongodb
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
III Year I Semester UI DESIGN - FLUTTER LAB
0 0 2 1
Course Objectives:
• Learns to Implement Flutter Widgets and Layouts
• Understands Responsive UI Design and with Navigation in Flutter
• Knowledge on Widges and customize widgets for specific UI elements, Themes
• Understand to include animation apart from fetching data
List of Experiments:
Text Book:
1. Marco L. Napoli, Beginning Flutter: A Hands-on Guide to App Development.
2. Rap Payne, Beginning App Development with Flutter: Create Cross-Platform Mobile
Apps 1st Edition, Apres
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Course Objectives:
The aim of the course is to
• Identify security risks and take preventive steps
• understand the forensics fundamentals
• understand the evidence capturing process
• understand the preservation of digital evidence
UNIT II: Tools and Methods :Proxy Servers and Anonymizers, Phishing, Password
Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horses and Backdoors,
Steganography, Sniffers, Spoofing, Session Hijacking Buffer over flow, DoS and DDoS
Attacks, SQL Injection, Buffer Overflow, Attacks on Wireless Networks, Identity Theft (ID
Theft), Foot Printing and Social Engineering, Port Scanning, Enumeration.
UNIT V: Cyber Crime Legal Perspectives: Introduction, Cybercrime and the Legal
Landscape around the World, The Indian IT Act, Challenge to Indian Law and Cyber crime
Scenario in India, Consequences of Not Addressing the Weakness in Information Technology
Act, Digital Signatures and the Indian IT Act, Amendments to the Indian IT Act, Cyber crime
and Punishment, Cyber law,Technology and Students:Indian Scenario.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Text Books:
1. Sunit Belapure Nina Godbole “Cyber Security: Understanding Cyber Crimes,
Computer Forensics and Legal Perspectives”, WILEY, 2011.
2. Nelson Phillips and Enfinger Steuart, “Computer Forensics and Investigations”,
Cengage Learning, New Delhi, 2009.
Reference Books:
1. Michael T. Simpson, Kent Backman and James E. Corley, “Hands on Ethical
Hacking and Network Defence”, Cengage, 2019.
2. Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall
Media, New Delhi.
3. Alfred Basta, Nadine Basta,Mary Brown and Ravinder Kumar “Cyber Security
and Cyber Laws” , Cengage,2018.
E-Resources:
1. CERT-In Guidelines- http://www.cert-in.org.in/
2. https://www.coursera.org/learn/introduction-cybersecurity-cyber-attacks [ Online
Course]
3. https://computersecurity.stanford.edu/free-online-videos [ Free Online Videos]
4. Nickolai Zeldovich. 6.858 Computer Systems Security. Fall 2014. Massachusetts
Institute of Technology: MIT OpenCourseWare,
https://ocw.mit.eduLicense:CreativeCommonsBY-NC-SA.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
III Year II Semester BLOCKCHAIN TECHNOLOGYS
3 0 0 3
Course Objectives:
• To learn the fundamentals of Block Chain and various types of block chain and
consensus mechanism.
• To understand public block chain system, Private block chain system and
consortium block chain.
• Able to know the security issues of blockchain technology.
UNIT – I:
Fundamentals of Blockchain: Introduction, Origin of Blockchain, Blockchain Solution,
Components of Blockchain, Block in a Blockchain, The Technology and the Future.
Blockchain Types and Consensus Mechanism: Introduction, Decentralization and
Distribution, Types of Blockchain, Consensus Protocol. Cryptocurrency: Bitcoin,
Altcoin and Token: Introduction, Bitcoin and the Cryptocurrency, Cryptocurrency Basics,
Types of Cryptocurrencies, Cryptocurrency Usage.
UNIT – II:
Public Blockchain System: Introduction, Public Blockchain, Popular Public
Blockchains, The Bitcoin Blockchain, Ethereum Blockchain. Smart Contracts:
Introduction, Smart Contract, Characteristics of a Smart Contract, Types of Smart
Contracts, Types of Oracles, Smart Contracts in Ethereum, Smart Contracts in Industry.
UNIT – III:
Private Blockchain System: Introduction, Key Characteristics of Private Blockchain,
Private Blockchain, Private Blockchain Examples, Private Blockchain and Open Source,
E- commerce Site Example, Various Commands (Instructions) in E-commerce
Blockchain, Smart Contract in Private Environment, State Machine, Different Algorithms
of Permissioned Blockchain, Byzantine Fault, Multichain. Consortium Blockchain:
Introduction, Key Characteristics of Consortium Blockchain, Need of Consortium
Blockchain, Hyperledger Platform, Overview of Ripple, Overview of Corda. Initial Coin
Offering: Introduction, Blockchain Fundraising Methods, Launching an ICO, Investing
in an ICO, Pros and Cons of Initial Coin Offering, Successful Initial Coin Offerings,
Evolution of ICO, ICO Platforms.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT – IV:
Security in Blockchain: Introduction, Security Aspects in Bitcoin, Security and Privacy
Challenges of Blockchain in General, Performance and Scalability, Identity Management
and Authentication, Regulatory Compliance and Assurance, Safeguarding Blockchain
Smart Contract (DApp), Security Aspects in Hyperledger Fabric.
UNIT – V:
Blockchain Case Studies:
Case Study 1 – Retail,
Case Study 2 – Banking and Financial Services,
Case Study 3 – Healthcare,
Case Study 4 – Energy and Utilities.
Blockchain Platform using Python: Introduction, Learn How to Use Python Online
Editor, Basic Programming Using Python, Python Packages for Blockchain.
Blockchain platform using Hyperledger Fabric: Introduction, Components of Hyperledger
Fabric Network, Chain codes from Developer.ibm.com, Blockchain Application Using
Fabric Java SDK.
Text book:
1. “Block chain Technology”, Chandramouli Subramanian, Asha A.George, Abhilasj K A
and Meena Karthikeyan , Universities Press.
Reference Books:
1. Blockchain Blue print for Economy, Melanie Swan, SPD Oreilly.
2. Blockchain for Business, Jai Singh Arun, Jerry Cuomo, Nitin Gauar, Pearson Addition
Wesley
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
III Year II Semester MACHINE LEARNING
3 0 0 3
Course Objectives:
The objectives of the course is to
• Define machine learning and its different types (supervised and unsupervised) and
understand their applications.
• Apply supervised learning algorithms including decision trees and k-nearest
neighbours (k-NN).
• Implement unsupervised learning techniques, such as K-means clustering.
,
Course Outcomes: At the end of the course, student will be able to
• Enumerate the Fundamentals of Machine Learning
• Build Nearest neighbour based models
• Apply Models based on decision trees and Bayes rule
• Make use of Linear discriminants for machine Learning
• Choose appropriate clustering technique
UNIT-III: Models Based on Decision Trees: Decision Trees for Classification, Impurity
Measures, Properties, Regression Based on Decision Trees, Bias–Variance Trade-off,
Random Forests for Classification and Regression.
The Bayes Classifier: Introduction to the Bayes Classifier, Bayes’ Rule and Inference, The
Bayes Classifier and its Optimality, Multi-Class Classification | Class Conditional
Independence and Naive Bayes Classifier (NBC)
Text Books:
Reference Books:
SOFTWARE VULNERABILITY L T P C
III Year II Semester
ANALYSIS 3 0 0 3
Course Objectives:
• This course provides the user to know the software vulnerabilities in the real software
world.
• Different application-level security
• Able to find the malicious code actions and different protection techniques.
UNIT-I:
Introduction to security & Authentication- Software Security Dealing with
Widespread Security Failures, Bugtraq, CERT Advisories, RISKS Digest, Technical
Trends Affecting Software Security, The ileitis, Beyond Reliability, Penetrate and Patch, On
Art and Engineering, Security Goals, Prevention, Traceability and Auditing, Monitoring,
Privacy and Confidentiality, Multilevel Security.
UNIT-II:
Security & Malicious Code-Managing Software Security Risk: An Overview Of
Software Risk Management For Security, The Role Of Security Personnel, Software Security
Personnel In The Life Cycle, Deriving Requirements, Risk Assessment, Software Risk
Management, Architectural Risk Analysis, Risk-Based Security Testing, Security
Requirements, Security Operations.
UNIT-III:
Access Control & Physical Protection- The UNIX Access Control Model, How
UNIX and Windows Exploits, Modifying File Attributes, Modifying Ownership, The
unmask, The Programmatic Interface, Setuid Programming, Access Control In Windows
NT, Compartmentalization, Fine-Grained Privileges. Buffer Overflow & Root kits: Buffer
Overflows As Security Problems, Defending Against Buffer Overflow.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT-IV:
Network Security& Intrusion- OSI Model, Sockets-Functions, Addresses, Network Byte
Order, Internet Address Conversion, Simple Server and Web Clients, Tiny web Server.
Peeling Back the Lower Layers, Network Sniffing, Raw Socket Sniffer, libpcap Sniffer,
Decoding the Layers, Active Sniffing, Denial of Service, SYN Flooding, The Ping of
Death, Teardrop, Ping Flooding, Amplification Attacks, Distributed DoS Flooding.
UNIT-V:
Counter Measures- Detection of System Daemons, Crash Course in Signals, Tiny web
Daemon, Tools of the Trade, tiny web Exploit Tool, Log Files, Log less Exploitation,
Socket Reuse, Payload Smuggling, String Encoding, Buffer Restrictions, Polymorphic
Printable ASCII Shell code. Hardening Countermeasures, Non executable Stack, ret2libc,
Returning into system() Randomized Stack Space, Investigations with BASH and
GDB, Bouncing Off Linux gate, Applied Knowledge, First Attempts, Paying the Odds.
Text Books:
1. John Viega & Gary McGraw: Building Secure Software: How to Avoid Security
Problems the Right Way (Addison-Wesley Professional Computing Series), 2001.
2. Gary McGraw: Software Security: Building Security In (Addison-Wesley
Professional Computing Series), 2008.
Reference Books:
1. Michael Howard, David LeBlanc, John Viega: 19 Deadly Sins of Software
Security: Programming Flaws and How to Fix Them (Security One-off) (Addison-Wesley
Professional Computing Series), 2001.
2. Jon Erickson: Hacking: The Art of Exploitation, 2nd Edition (No Starch Press, San
Fransico), 2005.
3. Richard Sinn “Software Security, Theory Programming and Practice” Cengage Learning,
2004.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
III Year II Semester DevOps
3 0 0 3
Course Objectives:
The main objectives of this course are to:
• Describe the agile relationship between development and IT operations.
• Understand the skill sets and high-functioning teams involved in DevOps and related
methods to reach a continuous delivery capability.
• Implement automated system update and DevOps lifecycle.
UNIT-I
Introduction to DevOps: Introduction to SDLC, Agile Model. Introduction to DevOps.
DevOps Features, DevOps Architecture, DevOps Lifecycle, Understanding Workflow and
principles, Introduction to DevOps tools, Build Automation, Delivery Automation,
Understanding Code Quality, Automation of CI/ CD. Release management, Scrum, Kanban,
delivery pipeline, bottlenecks, examples
UNIT-II
Source Code Management (GIT): The need for source code control, The history of source
code management, Roles and code, source code management system and migrations. What is
Version Control and GIT, GIT Installation, GIT features, GIT workflow, working with
remote repository, GIT commands, GIT branching, GIT staging and collaboration. UNIT
TESTING - CODE COVERAGE: Junit, nUnit& Code Coverage with Sonar Qube,
SonarQube - Code Quality Analysis.
UNIT-III
Build Automation - Continuous Integration (CI): Build Automation, What is CI Why Cl is
Required, CI tools, Introduction to Jenkins (With Architecture), jenkins workflow, jenkins
master slave architecture, Jenkins Pipelines, PIPELINE BASICS - Jenkins Master, Node,
Agent, and Executor Freestyle Projects & Pipelines, Jenkins for Continuous Integration,
Create and Manage Builds, User Management in Jenkins Schedule Builds, Launch Builds on
Slave Nodes.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT-IV
Continuous Delivery (CD): Importance of Continuous Delivery, CONTINUOUS
DEPLOYMENT CD Flow, Containerization with Docker: Introduction to Docker, Docker
installation, Docker commands, Images & Containers, DockerFile, Running containers,
Working with containers and publish to Docker Hub.
Testing Tools: Introduction to Selenium and its features, JavaScript testing.
UNIT-V
Configuration Management - ANSIBLE: Introduction to Ansible, Ansible tasks, Roles,
Jinjatemplating, Vaults, Deployments using Ansible.
CONTAINERIZATION USING KUBERNETES(OPENSHIFT): Introduction to Kubernetes
Namespace & Resources, CI/CD - On OCP, BC, DC &ConfigMaps, Deploying Apps on
Openshift Container Pods. Introduction to Puppet master and Chef.
Text Books:
1. Joyner, Joseph.,Devops for Beginners: Devops Software Development Method Guide
for Software Developers and It Professionals, 1st Edition MihailsKonoplows, 2015.
2. Alisson Machado de Menezes., Hands-on DevOps with Linux,1st Edition, BPB
Publications, India, 2021.
Reference Books:
1. Len Bass, Ingo Weber, Liming Zhu. DevOps: A Software Architect's Perspective.
Addison Wesley; ISBN-10
2. Gene Kim Je Humble, Patrick Debois, John Willis. The DevOps Handbook, 1st
Edition, IT Revolution Press, 2016.
3. Verona, Joakim Practical DevOps, 1stEdition, Packt Publishing, 2016.
4. Joakim Verona. Practical Devops, Ingram short title; 2ndedition (2018). ISBN10:
1788392574
5. Deepak Gaikwad, Viral Thakkar. DevOps Tools from Practitioner's Viewpoint. Wiley
publications. ISBN: 9788126579952
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
III Year II Semester APPLIED CRYPTOGRAPHY
3 0 0 3
Course Objectives:
Knowledge on significance of cryptographic protocols and symmetric and public key
algorithms
Course Outcomes:
1. Understand the various cryptographic protocols
2. Analyze key length and algorithm types and modes
3. Illustrate different public key algorithms in cryptosystems
4. Understand special algorithms for protocols and usage in the real world.
UNIT - I
Foundations: Terminology, Steganography, Substitution Ciphers and Transposition
Ciphers, Simple XOR, One-Time Pads, Computer Algorithms, Large Numbers,
Cryptographic Protocols: Protocol Building Blocks: Introduction to Protocols,
Communications Using Symmetric Cryptography, One-Way Functions, One-Way Hash
Functions, Communications Using Public-Key Cryptography, Digital Signatures, Digital
Signatures with Encryption, Random and Pseudo-Random-Sequence Generation
UNIT - II
Cryptographic Techniques: Key length: Symmetric Key length, Public key length,
comparing symmetric and public key length. Algorithm types and modes: Electronic
Codebook Mode, Block Replay, Cipher Block Chaining Mode, Stream Cipher, Self-
Synchronizing Stream Ciphers, Cipher-Feedback Mode, Synchronous Stream Ciphers,
Output-Feedback Mod, Counter Mode, Other Block-Cipher Modes.
UNIT - III
Public-Key Algorithms: Background, Knapsack Algorithms, RSA, Pohlig-Hellman,
Rabin, ElGamal, McEliece, Elliptic Curve Cryptosystems, LUC, Finite Automaton
Public-Key Cryptosystems Public-Key Digital Signature Algorithms: Digital Signature
Algorithm (DSA), DSA Variants, Gost Digital Signature Algorithm, Discrete Logarithm
Signature Schemes, Ong-Schnorr-Shamir, ESIGN
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT - IV
Special Algorithms for Protocols: Multiple-Key Public-Key Cryptography, Secret-
Sharing Algorithms, Subliminal Channel, Undeniable Digital Signatures, Designated
Confirmer Signatures, Computing with Encrypted Data, Fair Coin Flips, One-Way
Accumulators, All-or-Nothing Disclosure of Secrets, Fair and Failsafe Cryptosystems,
Zero-Knowledge Proofs of Knowledge, Blind Signatures, Oblivious Transfer, Secure
Multiparty Computation, Probabilistic Encryption, Quantum Cryptography
UNIT - V
Real World Approaches: IBM Secret key management protocol, ISDN, Kerberos,
KryptoKnight, Privacy enhanced mail (PEM), Message security protocol (MSP), PGP,
Public-Key Cryptography Standards (PKCS), Universal Electronic Payment System
(UEPS).
Text books:
1. Bruce Schneier, Applied Cryptography, Second Edition: Protocols, Algorithms, and
Source Code in C (cloth)
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
III Year II Semester INTERNET OF THINGS
3 0 0 3
Course Objectives:
From the course the student will learn
• the application areas of IOT
• the revolution of Internet in Mobile Devices, Cloud & Sensor Networks
• building blocks of Internet of Things and characteristics
UNIT I:
Predecessors of IoT: Introduction, Wireless Sensor Networks, Machine-to-Machine
Communications, Cyber Physical Systems. Emergence of IoT: Introduction, Evolution of
IoT, Enabling IoT and the Complex Interdependence of Technologies, IoT Networking
Components, Addressing Strategies in IoT
UNIT II:
IoT Sensing and Actuation: Introduction, Sensors, Sensor Characteristics, Sensorial
Deviations, Sensing Types, Sensing Considerations, Actuators, Actuator Types, Actuator
Characteristics. IoT Processing Topologies and Types: Data Format, Importance of
Processing in IoT, Processing Topologies, IoT Device Design and Selection
Considerations, Processing Offloading.
UNIT III:
IoT Connectivity Technologies: Introduction, IEEE 802.15.4, Zigbee, Thread,
ISA100.11A, WirelessHART, RFID, NFC,DASH7, Z-Wave, Weightless, Sigfox, LoRa,
NB-IT, Wi-Fi, Bluetooth. IoT Communication Technologies: Introduction, Infrastructure
Protocols, Discovery Protocols, Data Protocols, Identification Protocols, Device
Management, Semantic Protocols.
UNIT IV:
IoT Interoperability: Introduction, Standards, Frameworks. Fog Computing and Its
Applications: Introduction, View of Fog Computing Architecture, Fog Computing in IoT,
Selected Applications of Fog Computing
UNIT V:
Paradigms, Challenges, and the Future: Introduction, Evolution of New IoT Paradigms,
Challenges Associated with IoT, Emerging Pillars of IoT. IoT Case Studies: Agricultural
IoT, Vehicular IoT
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Text Books:
1. Introduction to IoT, SudipMisra, AnandarupMukhaerjee, Arjit Roy, Cambridge
University Press, 2021
2. Internet of Things: Architecture, Design Principles and Applications, Rajkamal, McGraw
Hill Higher Education
Reference Books:
1. Fog and Edge Computing: Principles and Paradigms, RajkumarBuyya (Editor), Satish
narayanaSrirama (Editor) , ISBN: 978-1-119-52498-4, January 2019
2. Getting Started with the Internet of Things, CunoPfister ,Oreilly
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
III Year II Semester DESIGN OF SECURE PROTOCOLS
3 0 0 3
Courseobjectives:
The main objective of this course is that to explore various protocols and design of various
protocols with deeper security.
Course Outcomes:
• Get the exposure to various protocols.
• Gain knowledge on various secure mechanisms through set of protocols.
• Apply different data link layer protocols
• Efficiently design new set of protocols.
• Learn Security issues and over comemeans with protocols.
UNIT–I
OSI: ISO Layer Protocols:- Application Layer Protocols-TCP/IP, HTTP, SHTTP, LDAP,
MIME, - POP & POP3 - RMON-SNTP-SNMP. Presentation Layer Protocols –Light Weight
Presentation Protocol Session layer protocols.
UNIT–II
RPC protocols transport layer protocols ITOT,RDP,RUDP,TALI,TCP/UDP, compressed
TCP. Network layer Protocols – routing protocols-border gateway protocol-exterior gateway
protocol-internet protocol IPv4- IPv6- Internet Message Control Protocol- IRDP- Transport
Layer Security-TSL-SSL-DTLS
UNIT–III
Data Link layer Protocol – ARP – In ARP – IPCP – IPv6CP – RARP – SLIP .Wide Area
and NetworkProtocols- ATM protocols – Broadband Protocols – Point to Point Protocols –
Other WAN Protocols-securityissues.
UNIT–IV
Local Area Network and LAN Protocols – ETHERNET Protocols–VLAN protocols–
Wireless LAN Protocols–Metropolitan Area Network Protocol–Storage Area Network and
SAN
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT–V
Protocols - FDMA, WIFI and WIMAX Protocols - security issues. Mobile IP – Mobile
Support Protocol for IPv4 and IPv6 – Resource Reservation Protocol. Multi – casting
Protocol–VGMP, IGMPMSDP. Network Security and Technologies and Protocols–AAA
Protocols–Tunneling Protocols– Secured Routing Protocols– GRE-Generic Routing
Encapsulation– IPSEC–Security.
TEXTBOOKS:
1. Jawin:“Networks Protocols Handbook”,3rd Edition, Jawin Technologies Inc.,
2005.
2. Bruce Potter and BobFleck:“802.11Security”,1st Edition, O’Reilly Publications,2002.
REFERENCES:
L T P C
III Year II Semester FIREWALLS & VPN SECURITY
3 0 0 3
Course Objectives:
• Identify and assess current and anticipated security risks and vulnerabilities
• Develop a network security plan and policies
• Establish a VPN to allow IPSec remote access traffic
• Monitor, evaluate and test security conditions and environment
• Develop critical situation contingency plans and disaster recovery plan
• Implement/test contingency and backup plans and coordinate with stakeholders
• Monitor, report and resolve security problems
SYLLABUS
UNIT– II: VPN Fundamentals-VPN Deployment Models and Architecture, Edge Router,
Corporate Firewall, VPN Appliance, Remote Access, Site-to-Site, Host-to-Host, Extranet
Access, Tunnel versus Transport Mode, The Relationship Between Encryption and VPNs,
Establishing VPN Connections with Cryptography, VPN Authorization.
UNIT–V: SCADA Protocols-Modbus RTU, Modbus TCP/IP, DNP3, DNP3 TCP/IP, OPC,
DA/HAD, SCADA protocol fuzzing. Finding Vulnerabilities in HMI: software- Buffer
Overflows, Shell code. Previous attacks Analysis- Stuxnet, Duqu.
Text Books:
1. Michael Stewart “Network Security, Firewalls, and VPNs” Jones & Bartlett Learning
September 2010.
2. T. Macaulay and B. L. Singer, Cyber security for Industrial Control Systems: SCADA,
DCS, PLC, HMI, and SIS, Auerbach Publications, 2011.
Reference Books:
L T P C
III Year II Semester WEB APPLICATION SECURITY
3 0 0 3
Course Objectives: This course aims to provide students with a fundamental understanding
of web application security principles, common vulnerabilities, and security best practices.
Course Outcomes:
Upon completion of this course, the students will be able to:
CO1- Identify and analyze web application security vulnerabilities.
CO2- Apply secure coding practices to develop and maintain web applications.
CO3- Perform security testing and assessment on web applications.
CO4- Configure and manage Web Application Firewalls (WAFs) for protection.
CO5- Develop an incident response plan for web application security breaches.
UNIT I: (9 Hours)
Introduction to Web Application Security: Introduction to web application security
concepts, Importance of web application security, Threat landscape and security challenges in
web applications, The role of security in the software development lifecycle
UNIT V: (9 Hours)
Web Application Firewall (WAF) and Incident Response: Introduction to Web
Application Firewalls (WAF), Deploying and configuring WAF for web application
protection, Incident response and handling security breaches, Web application security
monitoring and alerting.
TEXT BOOKS:
1. "Web Application Security: A Beginner's Guide" by Bryan Sullivan, Vincent Liu
2. "The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws" by
DafyddStuttard and Marcus Pinto
3. "Secure Coding in C and C++" by Robert C. Seacord (For secure coding practices)
4. "OWASP Testing Guide" by The OWASP Foundation (Free online resource for
security testing)
REFERENCE BOOKS:
1. Web Application Security: Threats, Countermeasures, and Best Practices" by
Lakshmanan Ganapathy and Mike Ware
2. Hacking Web Apps: Detecting and Preventing Web Application Security Problems"
by Mike Shema
3. Secure Programming with Static Analysis" by Brian Chess and Jacob West
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
COURSE OBJECTIVES
1. The course takes a software development perspective to the challenges of engineering
software systems that are secure.
2. This course addresses design and implementation issues critical to producing secure
software systems.
3. The course deals with the question of how to make the requirements for confidentiality,
integrity, and availability integral to the software development process.
4. Secure software requirements gathering to design, development, configuration,
deployment, and ongoing maintenance
5. Security of enterprise information systems.
COURSE OUTCOMES:
1. Understand various aspects and principles of software security.
2. Devise security models for implementing at the design level.
3. Identify and analyze the risks associated with s/w engineering and use relevant models
to mitigate the risks.
4. Understand the various security algorithms to implement for secured computing and
computer networks
5. Explain different security frameworks for different types of systems including
electronic systems.
UNIT-I
Defining computer security, the principles of secure software, trusted computing base,
etc, threat modeling, advanced techniques for mapping security requirements into design
specifications. Secure software implementation, deployment and ongoing management.
UNIT-II
Software design and an introduction to hierarchical design representations.Difference
between high-level and detailed design.Handling security with high-level design. General
Design Notions. Security concerns designs at multiple levels of abstraction, Design
patterns, quality assurance activities and strategies that support early vulnerability
detection, Trust models, security Architecture & design reviews .
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT-III
Software Assurance Model: Identify project security risks & selecting risk management
strategies, Risk Management Framework, Security Best practices/ Known Security Flaws,
Architectural risk analysis, Security Testing & Reliability (Penn testing, Risk- Based
Security Testing
UNIT-IV
Security in Enterprise Business: Identification and authentication, Enterprise Information
Security, Symmetric and asymmetric cryptography, including public key cryptography,
data encryption standard (DES), advanced encryption standard (AES), algorithms for
hashes and message digests. Authentication, authentication schemes , access control
models, Kerberos protocol, public key infrastructure (PKI), protocols specially designed
for e-commerce and web applications, firewalls and VPNs.
UNIT-V
Security development frameworks. Security issues associated with the development and
deployment of information systems, including Internet-based e-commerce, e-business,
and e-service systems.
TEXT BOOKS:
REFERENCE BOOKS:
1. Gary McGraw, Software Security: Building Security In, Addison-Wesley, 2006
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Course Objectives:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
(Please fill the above with Levels of Correlation, viz., L, M, H)
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Experiment- 1
Evidence Collection
Experiment- 2
Disk Analysis
Experiment- 3
Memory Analysis
Experiment- 4
Exercise- 6
Implement video Analytics for a live video
Exercise- 7
Analysis on different Malware Working
Exercise- 8
Work on Mail Bombs &SMS bombs
Exercise- 9
Implement a case on windows and Linux forensics
Exercise- 10
Implement a case on network Forensic
Exercise- 11
Work on different types of vulnerabilities
Exercise- 12
Implement a case on Mobile Forensics
Exercise- 13
Develop a Evidence and Preparation and Documentation
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
COURSE OBJECTIVES:
• This course provides students a foundational knowledge about reverse engineering
and malware analysis, through the study of various cases.
• This course provides students a hand-on analysis of malware samples.
• It covers fundamental concepts in malware investigations so as to equip the students
with enough background knowledge in handling malicious software attacks.
COURSE OUTCOMES:
Upon the completion of the course, the students will be able to:
CO 1: Demonstrate the cyber security challenges posed by malicious software attacks. [K2]
CO 2: Analyze security risks, threats and potential vulnerabilities in enterprise networks
environment. [K3]
CO 3: Independently to conduct in-depth analysis of modern malware samples using
behavioural, code analysis and memory forensic techniques. [K3]
CO 4: Apply the techniques learned to proactively protect computer systems and networks,
reduce security risks and mitigate the potential for malicious software attacks. [K5]
CO 5: Apply immunity debugger for reverse engineering [K3]
EXPERIMENTS:
1. Upload the files to http://www.VirusTotal.com/ and view the reports. Does either file
match any existing antivirus signatures?
2. When were these files compiled?
3. Are there any indications that either of these files is packed or obfuscated? If so, what
are these indicators?
4. Do any imports hint at what this malware does? If so, which imports are they?
5. Are there any other files or host-based indicators that you could look for on infected
systems?
6. What network-based indicators could be used to find this malware on infected
machines?
7. What would you guess is the purpose of these files?
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
WEEK-12:
1. Reverse Engineering with Immunity Debugger
2. Software Cracking with HexEditor Tool
3. Rebuilding the software after cracking
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Text Books:
1. Sikorski, M., & Honig, A. (2012). Practical malware analysis: the hands-on guide to
dissecting malicious software. No starch press.
2. Eilam, E. (2005). Reversing, Secrets of Reverse Engineering Wiley Publishing.
3. Malin, C. H. (2013). Linux Malware Incident Response: A Practitioner's Guide to
Forensic Collection and Examination of Volatile Data: An Excerpt from Malware
Forensic FieldGuide for Linux Systems. Elsevier.
Reference Books:
1. Sikorski, M., & Honig, A. (2012). Practical malware analysis: the hands-on guide
to dissectingmalicious software. No starch press.
2. Shashidhar, N., & Cooper, P. (2016, April). Teaching malware analysis: The
designphilosophy of a model curriculum. In 2016 4th International Symposium on
Digital Forensic andSecurity (ISDFS) (pp. 119-125). IEEE.
3. Singh, A.(Ed.). (2009). Identifying malicious code through reverse engineering
(Vol. 4).Springer Science & Business Media.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
III Year II Semester SOFT SKILLS or IELTS
0 1 2 2
Course Objectives:
• To equip the students with the skills to effectively communicate in English
• To train the students in interview skills, group discussions and presentation skills
• To motivate the students to develop confidence
• To enhance the students’ interpersonal skills
• To improve the students’ writing skills
UNIT -I
Analytical Thinking & Listening Skills: Self-Introduction, Shaping Young Minds - A Talk
by Azim Premji (Listening Activity), Self – Analysis, Developing Positive Attitude,
Perception.Communication Skills: Verbal Communication; Non Verbal Communication
(Body Language)
UNIT -II
Self-Management Skills: Anger Management, Stress Management, Time Management, Six
Thinking Hats, Team Building, Leadership Qualities. Etiquette: Social Etiquette, Business
Etiquette, Telephone Etiquette, Dining Etiquette
UNIT - III
Standard Operation Methods: Basic Grammars, Tenses, Prepositions, Pronunciation, Letter
Writing; Note Making, Note Taking, Minutes Preparation, Email & Letter Writing
UNIT-IV
Job-Oriented Skills: Group Discussion, Mock Group Discussions, Resume Preparation,
Interview Skills, Mock Interviews
UNIT-V
Interpersonal relationships: Introduction, Importance, Types, Uses, Factors affecting
interpersonal relationships, Accommodating different styles, Consequences of interpersonal
relationships
Text books:
1. Barun K. Mitra, Personality Development and Soft Skills, Oxford University Press,
2011.
2. S.P. Dhanavel, English and Soft Skills, Orient Blackswan, 2010.
Reference books:
1. R.S.Aggarwal, A Modern Approach to Verbal & Non-Verbal Reasoning, S.Chand&
Company Ltd., 2018.
2. Raman, Meenakshi& Sharma, Sangeeta, Technical Communication Principles and
Practice, Oxford University Press, 2011.
E-resources:
https://swayam-plus.swayam2.ac.in/courses/course-details?id=P_CAMBR_01
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
TECHNICAL PAPER L T P C
III Year II Semester
WRITING & IPR 2 0 0 0
Course Objective :
• The course will explain the basic related to writing the technical reports and
understanding the concepts related to formatting and structuring the report.
• This will help students to comprehend the concept of proofreading, proposals and
practice
UNIT-I
Introduction: An introduction to writing technical reports, technical sentences formation,
using transitions to join sentences, Using tenses for technical writing. Planning and
Structuring: Planning the report, identifying reader(s), Voice, Formatting and structuring
the report, Sections of a technical report, Minutes of meeting writing.
UNIT-II
Drafting report and design issues: The use of drafts, Illustrations and graphics.Final
edits: Grammar, spelling, readability and writing in plain English: Writing in plain English,
Jargon and final layout issues, Spelling, punctuation and Grammar, Padding, Paragraphs,
Ambiguity.
UNIT-III
Proofreading and summaries: Proofreading, summaries, Activities on summaries.
Presenting final reports: Printed presentation, Verbal presentation skills, Introduction to
proposals and practice.
UNIT-V
Nature of Intellectual Property: Patents, Designs, Trade and Copyright. Process of
Patenting and Development: technological research, innovation, patenting, development.
International Scenario: International cooperation on Intellectual Property
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Text Books:
1. Kompal Bansal &Parshit Bansal, “Fundamentals of IPR for Beginner’s”, 1st Ed., BS
Publications, 2016.
2. William S. Pfeiffer and Kaye A. Adkins, “Technical Communication: A Practical
Approach”, Pearson.
3. Ramappa,T., “Intellectual Property Rights Under WTO”, 2nd Ed., S Chand, 2015.
Reference Books:
1. Adrian Wallwork , English for Writing Research Papers, Springer New York
Dordrecht Heidelberg London, 2011.
2. Day R, How to Write and Publish a Scientific Paper, Cambridge University
Press(2006)
E-resources:
1. https://www.udemy.com/course/reportwriting/
2. https://www.udemy.com/course/professional-business-english-and-technical-report-
writing/
3. https://www.udemy.com/course/betterbusinesswriting/
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
MINORS
L T P C
COMPUTER NETWORKS
3 0 0 3
Course Objectives:
• To understand the different types of networks
• To discuss the software and hardware components of a network
• To develop an understanding the principles of computer networks.
• To familiarize with OSI model and the functions of layered structure.
• To explain networking protocols, algorithms and design perspectives.
UNIT-I
UNIT-II
The Data Link Layer: Guided Transmission Media, Persistent Storage, Twisted Pairs,
Coaxial Cable, Power Lines, Fiber Optics, Data Link Layer Design Issues, Services Provided
To The Network Layer, Framing Error Control, Flow Control, Error Detection And
Correction, Error-Correcting Codes, Error-Detecting Codes, Elementary Data Link Protocols,
Initial Simplifying Assumptions Basic Transmission And Receipt, Simplex Link-Layer
Protocols, Improving Efficiency, Bidirectional Transmission, Multiple Frames In Flight,
Examples Of Full-Duplex, Sliding Window Protocols, The Channel Allocation Problem,
Static Channel Allocation, Assumptions For Dynamic Channel Allocation, Multiple Access
Protocols, Aloha, Carrier Sense Multiple Access Protocols, Collision-Free Protocols,
Limited-Contention Protocols, Wireless LAN Protocols, Ethernet, Classic Ethernet Physical
Layer, Classic Ethernet Mac Sublayer Protocol, Ethernet Performance, Switched Ethernet,
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet,40- And 100-Gigabit Ethernet,
Retrospective On Ethernet.
UNIT-III
The Network Layer: Network Layer Design Issues, Store-And-Forward Packet Switching,
Services Provided To The Transport Layer, Implementation Of Connectionless Service,
Implementation Of Connection-Oriented Service, Comparison Of Virtual-Circuit And
Datagram Networks, Routing Algorithms In A Single Network, The Optimality Principle,
Shortest Path Algorithm, Flooding, Distance Vector Routing, Link State Routing,
Hierarchical Routing Within a Network, Broadcast Routing, Multicast Routing, Anycast
Routing, Traffic Management at The Network Layer, The Need for Traffic Management:
Congestion, Approaches To Traffic Management, Internetworking, Internetworks: An
Overview, How Networks differ, Connecting Heterogeneous Networks, Connecting
Endpoints Across Heterogeneous Networks, Internetwork Routing: Routing Across Multiple
Networks Supporting Different Packet Sizes: Packet Fragmentation, The Network Layer In
The Internet, The IP Version 4 Protocol, IP Addresses, IP Version 6, Internet Control
Protocols, Label Switching and MPLS, OSPF—An Interior Gateway Routing Protocol,
BGP—The Exterior Gateway Routing Protocol, Internet Multicasting.
UNIT-IV
The Transport Layer: The Transport Service, Services Provided To The Upper Layers,
Transport Service Primitives, Berkeley Sockets, An Example Of Socket Programming: An
Internet File Server, Elements Of Transport Protocols, Addressing, Connection
Establishment, Connection Release, Error Control And Flow Control, Multiplexing, Crash
Recovery, Congestion Control, Desirable Bandwidth Allocation, Regulating The Sending
Rate, Wireless Issues, The Internet Transport Protocols: UDP, Introduction To UDP, Remote
Procedure Call, Real-Time Transport Protocols, The Internet Transport Protocols: TCP,
Introduction To TCP, The TCP Service Model, The TCP Protocol, The TCP Segment
Header, TCP Connection Establishment, TCP Connection Release.
UNIT-V
The Application Layer: Electronic Mail, Architecture and Services, The User Agent,
Message Formats, Message Transfer, Final Delivery, The World Wide Web, Architectural
Overview, Static Web Objects, Dynamic Web Pages and Web Applications, HTTP and
HTTPS, Web Privacy, Content Delivery, Content and Internet Traffic, Server Farms and Web
Proxies, Content Delivery Networks, Peer-To-Peer Networks, Evolution of The Internet.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Textbook:
1. Andrew Tanenbaum, Feamster Wetherall, Computer Networks, 6th Edition, Global
Edition.
Reference Books:
1. Behrouz A. Forouzan, Data Communications and Networking, 5th Edition, McGraw Hill
Publication, 2017.
2. James F. Kurose, Keith W. Ross, “Computer Networking: A Top-Down Approach”, 6th
edition, Pearson, 2019.
3. YouluZheng, ShakilAkthar, “Networks for Computer Scientists and Engineers”, Oxford
Publishers, 2016.
Course Objectives:
Course Outcomes:By the end of the course, the student should be able to:
UNIT-I
UNIT-II
Ethics in Cyber Security & Cyber Law: Privacy, Intellectual Property, Professional Ethics,
Freedom of Speech, Fair User and Ethical Hacking, Trademarks, Internet Fraud, Electronic
Evidence, Cybercrimes.
UNIT-III
Penetration Testing: Overview of the web from a penetration testers perspective, Exploring
the various servers and clients, Discussion of the various web architectures, Discussion of the
different types of vulnerabilities, defining a web application test scope and process, Defining
types of penetration testing.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT-IV
Web Application Security: Common Issues in Web Apps, what is XSS, SQL injection,
CSRF, Password Vulnerabilities, SSL, CAPTCHA, Session Hijacking, Local and Remote
File Inclusion, Audit Trails, Web Server Issues. Forensics & Network Assurance: Forensic
Technologies, Digital Evidence Collection, Evidentiary Reporting, Layered Defense,
Surveillance and Reconnaissance, Outsider Thread Protection
UNIT-V
Information Risk Management: Asset Evaluation and Business Impact Analysis, Risk
Identification, Risk Quantification, Risk Response Development and Control, Security
Policy, Compliance, and Business Continuity. Forensic investigation using Access Data FTK,
En-Case
Cyber Incident Analysis and Response: Incident Preparation, Incident Detection and
Analysis. Containment, Eradication, and Recovery. Proactive and Post-Incident Cyber
Services, CIA triangle
Text Books:
1. Cyber Security & Digital Forensics by Anas Zakir, Clever Fox Publishing,
Publication Date- 2022
2. “Beginners Guide To Ethical Hacking and Cyber Security “, by Abhinav Ojha,
Khanna Publishers, First Edition, Publication Date-2023
Reference Books:
1. The Official CHFI Study Guide for Computer Hacking Forensic Investigator by Dave
Kleiman
2. CISSP Study Guide, 6th Edition by James M. Stewart
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
Course Objectives:
Knowledge
CO Course Outcomes
Level (K)#
Student will be able to understand security issues related to computer
CO1 K2
networks and learn different symmetric key techniques
Students will be able learn mathematic of cryptography for symmetric and
CO2 Asymmetric algorithms and apply this knowledge to understand the K3
Cryptographic algorithms
Students will be able learn different types of symmetric and Asymmetric
CO3 K3
algorithms
Students will be able learn different algorithms of Hash functions, message
CO4 K4
authentication and digital signature and their importance to the security
Students will be able learn different Enhanced security protocols of
CO5 K4
Application Layer, Transport Layer and Network layer
#Based on suggested Revised BTL
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
P P P P P P P P P PO PO PO PS PS PS
O1 O2 O3 O4 O5 O6 O7 O8 O9 10 11 12 O1 O2 O3
C
1 2 1 2 1 1 1 1 1 2 2 2 2
O1
C
3 1 1 2 2 2 1 2 3 3 2 3 2 1
O2
C
2 2 2 1 2 1 1 1 2 3 1
O3
C
3 2 3 2 3 2 1 1 2 1 2 2 1
O4
C
3 2 3 1 2 2 1 1 2 2 2 1 2 1
O5
(Please fill the above with Levels of Correlation, viz., L-1, M-2, H-3)
UNIT-I
Security Concepts: Introduction, The need for security, Security approaches, Principles of
security, Types of Security attacks, Security services, Security Mechanisms, A model for
Network Security Cryptography. Classical Encryption Techniques-symmetric cipher model,
Substitution techniques, Transposition techniques, Rotor Machines, Stenography.
UNIT-II
UNIT-III
Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, IDEA, Block
cipher operation, Stream ciphers: RC4, RC5. Asymmetric key Ciphers: Principles of public
key cryptosystems, RSA algorithm, Diffie-Hellman Key Exchange, Elgamal Cryptographic
system, Elliptic Curve Arithmetic, Elliptic Curve Cryptography.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT-IV
UNIT-V
Text Books:
Reference Books:
1. Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition
2. Introduction to Cryptography with Coding Theory: Wade Trappe, Lawrence C.
Washington, Pearson.
3. Modern Cryptography: Theory and Practice ByWenbo Mao. Pearson
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
BLOCKCHAIN TECHNOLOGY
3 0 0 3
Course Objectives:
• To learn the fundamentals of Block Chain and various types of block chain and
consensus mechanism.
• To understand public block chain system, Private block chain system and
consortium block chain.
• Able to know the security issues of blockchain technology.
UNIT – I
Fundamentals of Blockchain: Introduction, Origin of Blockchain, Blockchain Solution,
Components of Blockchain, Block in a Blockchain, The Technology and the Future.
Blockchain Types and Consensus Mechanism: Introduction, Decentralization and
Distribution, Types of Blockchain, Consensus Protocol. Cryptocurrency: Bitcoin,
Altcoin and Token: Introduction, Bitcoin and the Cryptocurrency, Cryptocurrency Basics,
Types of Cryptocurrencies, Cryptocurrency Usage.
UNIT – II
Public Blockchain System: Introduction, Public Blockchain, Popular Public
Blockchains,
The Bitcoin Blockchain, Ethereum Blockchain. Smart Contracts: Introduction, Smart
Contract, Characteristics of a Smart Contract, Types of Smart Contracts, Types of
Oracles, Smart Contracts in Ethereum, Smart Contracts in Industry.
UNIT – III
Private Blockchain System: Introduction, Key Characteristics of Private Blockchain,
Private Blockchain, Private Blockchain Examples, Private Blockchain and Open Source,
E- commerce Site Example, Various Commands (Instructions) in E-commerce
Blockchain, Smart Contract in Private Environment, State Machine, Different Algorithms
of Permissioned Blockchain, Byzantine Fault, Multichain. Consortium Blockchain:
Introduction, Key Characteristics of Consortium Blockchain, Need of Consortium
Blockchain, Hyperledger Platform, Overview of Ripple, Overview of Corda. Initial Coin
Offering: Introduction, Blockchain Fundraising Methods, Launching an ICO, Investing
in an ICO, Pros and Cons of Initial Coin Offering, Successful Initial Coin Offerings,
Evolution of ICO, ICO Platforms.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT – IV
Security in Blockchain: Introduction, Security Aspects in Bitcoin, Security and Privacy
Challenges of Blockchain in General, Performance and Scalability, Identity Management
and Authentication, Regulatory Compliance and Assurance, Safeguarding Blockchain
Smart Contract (DApp), Security Aspects in Hyperledger Fabric.
Applications of Blockchain: Introduction, Blockchain in Banking and Finance,
Blockchain in Education, Blockchain in Energy, Blockchain in Healthcare, Blockchain in
Real-estate, Blockchain in Supply Chain, The Blockchain and IoT. Limitations and
Challenges of Blockchain.
UNIT – V:
Blockchain Case Studies:
Case Study 1 – Retail,
Case Study 2 – Banking and Financial Services,
Case Study 3 – Healthcare,
Case Study 4 – Energy and Utilities.
Blockchain Platform using Python: Introduction, Learn How to Use Python Online
Editor, Basic Programming Using Python, Python Packages for Blockchain.
Blockchain platform using Hyperledger Fabric: Introduction, Components of Hyperledger
Fabric Network, Chain codes from Developer.ibm.com, Blockchain Application Using
Fabric Java SDK.
Text book:
Reference Books:
1. Blockchain Blue print for Economy, Melanie Swan, SPD Oreilly.
2. Blockchain for Business, Jai Singh Arun, Jerry Cuomo, Nitin Gauar, Pearson Addition
Wesley
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
CLOUD COMPUTING
3 0 0 3
Course Objectives:
UNIT -I
UNIT-II
UNIT-III
UNIT-IV
Cloud computing challenges, Economics of the cloud, cloud interoperability and standards,
scalability and fault tolerance, energy efficiency in clouds, federated clouds, cloud computing
security, fundamentals of computer security, cloud security architecture, cloud shared
responsibility model, security in cloud deployment models.
UNIT -V
Text Books:
Reference Books:
1. Cloud Computing, Theory and Practice, Dan C Marinescu, 2nd edition, MK Elsevier,
2018.
2. Essentials of cloud Computing, K. Chandrasekhran, CRC press, 2014.
3. Online documentation and tutorials from cloud service providers (e.g., AWS, Azure,
GCP)
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
CYBER SECURITY LAB
0 0 3 1.5
Course Objective: To get practical exposure to Cybersecurity threats and Forensics tools.
Course Outcome:
List of Experiments:
Text Books:
1. Real Digital Forensics for Handheld Devices, E.P. Dorothy, Auerback Publications,
2013.
2. The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics,
J. Sammons, Syngress Publishing, 2012.
Reference Books:
Course Objectives:
• To learn basic understanding of cryptography, how it has evolved, and some key
encryption techniques used today.
• To understand and implementencryption and decryption using Ceaser Cipher,
Substitution Cipher, Hill Cipher.
List of Experiments:
1. Write a C program that contains a string (char pointer) with a value \Hello World’. The
program should XOR each character in this string with 0 and displays the result.
2. Write a C program that contains a string (char pointer) with a value \Hello World’. The
program should AND or and XOR each character in this string with 127 and display the
result
3. Write a Java program to perform encryption and decryption using the following
algorithms:
a) Ceaser Cipher
b) Substitution Cipher
c) Hill Cipher
4. Write a Java program to implement the DES algorithm logic
5. Write a C/JAVA program to implement the BlowFish algorithm logic
6. Write a C/JAVA program to implement the Rijndael algorithm logic.
7. Using Java Cryptography, encrypt the text “Hello world” using BlowFish. Create your own
key using Java key tool.
8. Write a Java program to implement RSA Algorithm
9. Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript.
Consider the end user as one of the parties (Alice) and the JavaScript application as other
party (bob).
10. Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
OPEN ELECTIVES
L T P C
JAVA PROGRAMMING
3 0 0 3
Course Objectives:
The learning objectives of this course are to:
• Identify language components and how they work to get her in applications
• Learn the fundamentals of object-oriented programming in Java, including
defining classes, invoking methods, using class libraries.
• Learn how to extend Java classes with in heritance and dynamic binding and
how to use exception handling in Java applications
• Understand how to design applications with threads in Java
• Understand how to use Java APIs for program development
UNIT I
Object Oriented Programming: Basic concepts, Principles, Program Structure in
Java: Introduction, Writing Simple Java Programs, Elements or Tokens in Java
Programs, Java Statements, Command Line Arguments, User Input to Programs,
Escape Sequences Comments, Programming Style.
Data Types, Variables, and Operators :Introduction, Data Types in Java, Declaration
of Variables, Data Types, Type Casting, Scope of Variable Identifier, Literal
Constants, Symbolic Constants, Formatted Output with printf() Method, Static
Variables and Methods, Attribute Final,Introduction to Operators, Precedence and
Associativity of Operators, Assignment Operator ( = ), Basic Arithmetic Operators,
Increment (++) and Decrement (- -) Operators, Ternary Operator, Relational Operators,
Boolean Logical Operators, Bitwise Logical Operators. Control Statements:
Introduction, if Expression, Nested if Expressions, if–else Expressions, Ternary
Operator ?:, Switch Statement, Iteration Statements, while Expression, do–while Loop,
for Loop, Nested for Loop, For–Each for Loop, Break Statement, Continue Statement.
UNIT II
Classes and Objects: Introduction, Class Declaration and Modifiers, Class Members,
Declaration of Class Objects, Assigning One Object to Another, Access Control for
Class Members, Accessing Private Members of Class, Constructor Methods for Class,
Overloaded ConstructorMethods, NestedClasses, FinalClassandMethods, Passing
ArgumentsbyValue and by Reference, Keyword this. Methods: Introduction, Defining
Methods, Overloaded Methods, Overloaded Constructor Methods, Class Objects as
Parameters in Methods, Access Control, Recursive Methods, Nesting of Methods,
Overriding Methods, Attributes Final and Static.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT III
Arrays: Introduction, Declaration and Initialization of Arrays, Storage ofArray in
Computer Memory, Accessing Elements of Arrays, Operations on Array Elements,
Assigning Array to Another Array, Dynamic Change of Array Size, Sorting of Arrays,
Search for Valuesin Arrays, Class Arrays, Two-dimensional Arrays, Arrays of Varying
Lengths, Three-dimensional Arrays, Arrays as Vectors. Inheritance: Introduction,
Process of Inheritance, Types of Inheritances, Universal Super Class-Object Class,
Inhibiting Inheritance of Class Using Final, Access Control and Inheritance, Multilevel
Inheritance, Application of Keyword Super, Constructor Method and Inheritance,
Method Overriding, Dynamic Method Dispatch, Abstract Classes, Interfaces and
Inheritance. Interfaces: Introduction, Declaration of Interface, Implementation
ofInterface, Multiple Interfaces, Nested Interfaces, Inheritance of Interfaces, Default
Methods in Interfaces, Static Methods in Interface, Functional Interfaces, Annotations.
UNITIV
Packages and Java Library: Introduction, Defining Package, Importing Packages and
Classes into Programs, Path and Class Path, Access Control, Packages in Java SE,
Java.lang Package and its Classes, Class Object, Enumeration, class Math, Wrapper
Classes, Auto- boxing and Auto-unboxing, Java util Classes and Interfaces, Formatter
Class, RandomClass, Time Package, Class Instant (java.time.Instant), Formatting for
Date/Time inJava, Temporal Adjusters Class, Temporal Adjusters Class. Exception
Handling: Introduction, Hierarchyof Standard Exception Classes, Keywords throws
and throw, try, catch, and finally Blocks, Multiple Catch Clauses, Class Throwable,
Unchecked Exceptions, Checked Exceptions.
JavaI/OandFile:JavaI/OAPI,standardI/Ostreams, types, Byte streams, Character
streams, Scanner class, Files in Java (Text Book 2)
UNITV
String Handling in Java: Introduction, Interface Char Sequence, Class String, Methods
for Extracting Characters from Strings, Comparison, Modifying, Searching; Class String
Buffer. MultithreadedProgramming:Introduction, Need for Multiple Threads
Multithreaded Programming for Multi-core Processor,Thread Class, Main Thread-
Creation of New Threads, Thread States, Thread Priority-Synchronization, Deadlock and
Race Situations, Inter-thread Communication-Suspending, Resuming, and Stopping of
Threads .Java Database Connectivity: Introduction, JDBC Architecture, Installing
MySQL and MySQL Connector/J, JDBC Environment Setup, Establishing JDBC
Database Connections, Result Set Interface. Java FX GUI: Java FX Scene Builder, Java
FX App Window Structure, displaying text and image, event handling, laying out nodes in
scene graph, mouse events (Text Book 3)
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
TextBooks:
1. JAVAonestepahead, AnithaSeth, B.L.Juneja,Oxford.
2. Joy with JAVA,Fundamentals of Object Oriented Programming, Debasis
Samanta, Monalisa Sarma, Cambridge, 2023.
3. JAVA9forProgrammers,PaulDeitel,HarveyDeitel,4thEdition,Pearson.
ReferencesBooks:
1. ThecompleteReferenceJava,11thedition,HerbertSchildt,TMH
2. IntroductiontoJavaprogramming, 7thEdition, YDanielLiang, Pearson
Online Resources:
1. https://nptel.ac.in/courses/106/105/106105191/
2. https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_01288046454
7618816347_shared/overview
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
OPERATINGSYSTEMS
3 0 0 3
Course Objectives:
The main objectives of the course is to make student
• Understand the basic concepts and principles of operating systems,
including process management, memory management, file systems, and
Protection
• Make use of process scheduling algorithms and synchronization
techniques to achieve better performance of a computer system.
• Illustrate different conditions for dead lock and their possible solutions.
UNIT-I
Operating Systems Overview: Introduction, Operating systemfunctions, Operating
systems operations, Computing environments, Free and Open-Source Operating
Systems System Structures: Operating System Services, User and Operating-System
Interface, system calls, Types of System Calls, system programs, Operating system
Design and Implementation, Operating system structure, Building and Booting an
Operating System, Operating system debugging
UNIT-II
Processes: Process Concept, Process scheduling, Operations on processes, Inter-
process communication. Threads and Concurrency: Multithreading models, Thread
libraries, Threading issues. CPU Scheduling: Basic concepts, Scheduling criteria,
Scheduling algorithms, Multiple processor scheduling.
UNIT– III
Synchronization Tools: The Critical Section Problem, Peterson’s Solution, Mutex
Locks, Semaphores, Monitors, Classic problems of Synchronization. Deadlocks:
system Model, Deadlock characterization, Methods for handling Deadlocks, Deadlock
prevention, Deadlock avoidance, Deadlock detection, Recovery from Deadlock.
UNIT-IV
Memory-Management Strategies: Introduction, Contiguous memory allocation,
Paging, Structure of the Page Table, Swapping. Virtual Memory Management:
Introduction, Demand paging, Copy-on-write, Pagereplacement, Allocationofframes,
Thrashing. Storage Management: Overview of Mass Storage Structure, HDD
Scheduling.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT-V
File System: File System Interface: File concept, Access methods, Directory Structure;
File system Implementation: File-system structure, File-system Operations, Directory
implementation, Allocation method, Free space management; File-System Internals:
File- System Mounting, Partitions and Mounting, File Sharing. Protection: Goals of
protection, Principles of protection, Protection Rings, Domain of protection, Access
matrix.
TextBooks:
1. Operating System Concepts, Silberschatz A, Galvin P B, Gagne G, 10th
Edition, Wiley, 2018.
2. ModernOperatingSystems,TanenbaumAS,4thEdition,Pearson,2016
ReferenceBooks:
1. OperatingSystems-InternalsandDesignPrinciples,StallingsW,9thedition,
Pearson, 2018
2. OperatingSystems:AConceptBasedApproach,D.MDhamdhere,3rdEdition,
McGraw- Hill, 2013
OnlineLearningResources:
1. https://nptel.ac.in/courses/106/106/10610
6144/
http://peterindia.net/OperatingSystems.html
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
DATABASE MANAGEMENT
SYSTEMS 3 0 0 3
Course Objectives:
The main objectives of the course is to
• Introduce database management systems and to give a good formal foundation on the
relational model of data and usage of Relational Algebra
• Introduce the concepts of basic SQL asa universal Data base language
• Demonstrate the principles behind systematic data base design approaches by
covering conceptual design, logical design through normalization
• Provide an overview of physical design of a database system, by discussing Database
indexing techniques and storage techniques
UNIT-I
Introduction: Database system, Characteristics (Database Vs File System), Database
Users, Advantages of Database systems, Database applications. Brief introduction of
different Data Models; Concepts of Schema, Instance and data independence; Threetier
schema architecture for data independence; Database system structure, environment,
Centralized and Client Server architecture for the database.
Entity Relationship Model: Introduction, Representation of entities, attributes, entity set,
relationship, relationship set, constraints, sub classes, super class, inheritance,
specialization, generalization using ER Diagrams.
UNIT-II
Relational Model: Introduction to relational model, concepts of domain, attribute, tuple,
relation, importance of null values, constraints (Domain, Key constraints, integrity
constraints) and their importance, Relational Algebra, Relational Calculus. BASICSQL:
Simple Databaseschema, data types, table definitions (create, alter), different DML
operations (insert, delete, update).
UNIT-III
SQL: Basic SQL querying (select andproject) using where clause, arithmetic& logical
operations, SQL functions (Date and Time, Numeric, String conversion). Creating tables
with relationship, implementation of key and integrity constraints, nested queries, sub
queries, grouping, aggregation, ordering, implementation of different types of joins,
view(updatable andnon-updatable), relational set operations.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT-IV
Schema Refinement (Normalization):Purpose of Normalization or schema refinement,
conceptof functional dependency, normal forms based on functional dependency Loss
less join and dependency preserving decomposition,(1NF,2NFand3NF), concept of
surrogatekey, Boyce-Codd normal form(BCNF), MVD, Fourth normal form(4NF), Fifth
Normal Form (5NF).
UNIT-V
Transaction Concept: Transaction State, ACID properties, Concurrent Executions,
Serializability, Recoverability, Implementation of Isolation, Testing for Serializability,
lock based, time stamp based, optimistic, concurrency protocols, Deadlocks, Failure
Classification,Storage, Recovery and Atomicity, Recovery algorithm.
Introduction to Indexing Techniques: B+ Trees, operations on B+Trees, Hash Based
Indexing:
Text Books:
1) Database Management Systems, 3rd edition, Raghurama Krishnan, Johannes
Gehrke,TMH (For Chapters 2, 3, 4)
2) Database SystemConcepts,5th edition, Silberschatz, Korth, Sudarsan, TMH (For
Chapter 1 and Chapter 5)
ReferenceBooks:
1) Introduction to Data base Systems, 8thedition, CJDate,Pearson.
2) Database Management System, 6th edition, Ramez Elmasri, Shamkant B. Navathe,
Pearson
3) Database Principles Fundamentals of Design Implementation and Management,
Corlos Coronel, Steven Morris, Peter Robb, Cengage Learning.
Web-Resources:
1) https://nptel.ac.in/courses/106/105/106105175/
2) https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_0127580666728202
2456_shared/overview
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
L T P C
COMPUTER NETWORKS
3 0 0 3
Course Objectives:
• To understand the different types of networks
• To discuss the software and hardware c omponents of a network
• To develop an understanding the principles of computer networks.
• To familiarize with OS Imodel and the function so flayered structure.
• To explain networking protocols, algorithms and design perspectives.
CourseOutcomes(CO):
After completion of the course, students will be able to
• Identify the software and hardware components of a Computer network.(L1)
• Explain the functionality of each layer of a computer network.(L2)
Identify and analyze flow control, congestion control, and routing issues.(L4)
• Analyze and interpret the functionality and effectiveness of the routing protocols.
(L4)
• Choose the appropriate transport protocol based on the application
requirements.(L3)
UNIT-I
Introduction: Types of Computer Networks, Broadband Access Networks, Mobile
and Wireless Access Networks, Content Provider Networks, Transit networks,
Enterprise Networks, Network technology from local to global, Personal Area
Networks, Local Area Networks, Home Networks, Metropolitan Area Networks, Wide
Area Networks, Internetworks, Network Protocols, Design Goals, Protocol Layering,
Connections and Reliability, Service Primitives, The Relationship ofServices to
Protocols ,Reference Models, The OSI Reference Model, The TCP/IP Reference
Model, A Critique of the OSI Model and Protocols, A Critique of the TCP/IP
Reference Model and Protocols.
UNIT-II
The Data Link Layer: Guided Transmission Media, Persistent Storage, Twisted Pairs,
CoaxialCable, PowerLines, Fiber Optics, Data Link Layer DesignIssues, Services
Provided To The Network Layer, Framing Error Control, Flow Control, Error
Detection And Correction, Error-Correcting Codes, Error-Detecting Codes, Elementary
Data Link Protocols, Initial Simplifying Assumptions Basic Transmission And
Receipt, Simplex Link-Layer Protocols, Improving Efficiency, Bidirectional
Transmission, Multiple Frames In Flight, Examples Of Full-Duplex, Sliding Window
Protocols, The Channel Allocation Problem, Static Channel
Allocation,AssumptionsForDynamicChannelAllocation,MultipleAccessProtocols,Aloh
a, Carrier Sense Multiple Access Protocols, Collision-Free Protocols, Limited-
Contention Protocols, Wireless LAN Protocols, Ethernet, Classic Ethernet Physical
Layer, Classic Ethernet Mac Sublayer Protocol, Ethernet Performance, Switched
Ethernet, Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet,40- And 100-Gigabit
Ethernet, Retrospective On Ethernet.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
KAKINADA–533003,Andhra Pradesh, India
R23 B.Tech Cyber Security
rd
(R23 – III YEAR COURSE STRUCTURE & SYLLABUS)
UNIT-III
The Network Layer: Network Layer Design Issues, Store-And-Forward Packet
Switching, Services Provided To The Transport Layer, Implementation Of
Connectionless Service, Implementation Of Connection-Oriented Service, Comparison
Of Virtual-Circuit And Datagram Networks, Routing Algorithms In A Single Network,
The Optimality Principle, Shortest Path Algorithm, Flooding, Distance Vector Routing,
Link State Routing, Hierarchical Routing Within a Network, Broadcast Routing,
Multicast Routing, Anycast Routing, Traffic Management at The Network Layer, The
Need for Traffic Management: Congestion, Approaches To Traffic Management,
Internetworking, Internetworks: An Overview, How Networks differ, Connecting
Heterogeneous Networks, Connecting Endpoints Across Heterogeneous Networks,
Internetwork Routing: Routing Across Multiple Networks Supporting Different Packet
Sizes:Packet Fragmentation,The Network Layer In The Internet, The IP Version 4
Protocol, IP Addresses, IP Version 6, Internet Control Protocols, Label Switching and
MPLS, OSPF—An Interior Gateway Routing Protocol, BGP—The Exterior Gateway
Routing Protocol, Internet Multicasting.
UNIT-IV
The Transport Layer: The Transport Service, Services Provided To The Upper
Layers, Transport Service Primitives, Berkeley Sockets, An Example Of Socket
Programming: An Internet File Server, Elements Of Transport Protocols, Addressing,
Connection Establishment, Connection Release, Error Control And Flow Control,
Multiplexing, Crash Recovery, Congestion Control, Desirable Band width Allocation,
Regulating The Sending Rate,Wireless Issues, The Internet Transport Protocols: UDP,
Introduction To UDP, Remote Procedure Call, Real-Time Transport Protocols, The
Internet Transport Protocols:TCP,IntroductionToTCP, The TCP Service Model, The
TCP Protocol, The TCP Segment Header, TCP Connection Establishment, TCP
Connection Release.
UNIT-V
TheApplicationLayer:Electronic Mail, Architecture and Services, The User Agent,
Message Formats, Message Transfer, Final Delivery, The World Wide Web,
Architectural Overview, Static Web Objects, Dynamic Web Pages and Web
Applications, HTTP and HTTPS, Web Privacy, Content Delivery, Content and Internet
Traffic, Server Farms and Web Proxies, Content Delivery Networks, Peer-To-Peer
Networks, Evolution of The Internet.
JAWAHARLALNEHRUTECHNOLOGICALUNIVERSITY KAKINADA
(EstablishedbyGovt.ofA.P.,ACTNo.30of2008)
KAKINADA –533003(A.P)INDIA
Textbook:
1.AndrewTanenbaum,FeamsterWetherall,ComputerNetworks,6thEdition,Global
Edition.
ReferenceBooks:
1. Behrouz A. Forouzan, Data Communications and Networking, 5th Edition, McGraw
Hill Publication, 2017.
2. JamesF.Kurose,KeithW.Ross,“Computer Networking: A Top-Down Approach”,6th
edition, Pearson, 2019.
3. YouluZheng,ShakilAkthar,“NetworksforComputerScientistsandEngineers”,Oxford
Publishers, 2016.
Online Learning Resources:
https://nptel.ac.in/courses/106105183/25
http://www.nptelvideos.in/2012/11/computer-
networks.html https://nptel.ac.in/courses/106105183/