Information Security and Management Syllabus

Topics: Security, Data warehouse, Information security Pages: 27 (5382 words) Published: August 19, 2012




Master of Technology
(Information Security & Management)


Uttrakhand Technical University, Dehradun

Study And Evaluation Scheme - M.Tech.

Information Security and Management

Academic Session: 2010-2011

Year 1, SEMESTER-i

|S.No |Course Code |Subject |Periods |Evaluation Scheme |Subject | | | | | | |Total | | | | | |Sessional Exam. |Exam | | | |L |T |P |CT |TA | | | | | |Sessional Exam. |Exam | | | |L |T |P |CT |TA | | | | | |Sessional Exam. |Exam | | | |L |T |P |CT |TA | | | | | |Sessional Exam. |Exam | |

|L |T |P |CT |TA |Total |ESE | | |5. |ISMP-401 |Dissertation |0 |0 |30 |- | |200 |200 |400 | | | |Total | | |30 | | | | |400 | |


ISM-185Mobile Computing
ISM-186Coding for Reliable Communication
ISM-187Computer Internet Security Management
ISM-188Cyber Law and Security Policies


ISM-284Multimedia and Database Security
ISM-285Network Security and Assessmant
ISM-286Distributed System
ISM-287Embedded System


ISM-288Advance Software Project Management
ISM-289Digitasml Image Processing
ISM-290Data Warehousing and Mining
ISM-291Trust Management in ecommerce

ISM181 Advanced Computer Networks L T/P C
3 1 4 Introduction:
Introduction to Network models-ISO-OSI, SNA, Appletalk and TCP/IP models. Review of Physical layer and Data link layers, Review of LAN (IEEE 802.3, 802.5, 802.11b/a/g, FDDI) and WAN (Frame Relay, ATM, ISDN) standards.

Network layer
Internet architecture and addressing, internetworking, IPv4, ICMP, Routing Protocols- RIP, OSPF, BGP, and IP over ATM. IPv6, Next Generation IP protocol, Wireless Networks, GSM, CDMA, Mobility in networks, Mobile IP, Mobile IP multicasting, BSD Sockets,.

Transport layer
Design issues, Connection management, Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Finite state machine model. TCP extensions for high speed network, TCP/IP programming.

Application layer
WWW, DNS, e-mail, SNMP, RMON

Network Security:
IP Security: Architecture, Authentication header, Encapsulating security payloads, combining security associations, key management. Web Security: Secure socket layer and transport layer security, secure electronic transaction (SET).

System Security
Intruders, Viruses and related threads, firewall design principals, trusted systems.

Case study
Study of various network simulators, Network performance analysis using NS2

1. Behrouz A. Forouzan, “TCP/IP Protocol Suit”, TMH, 2000. 2. C.E.Perkins, B.Woolf and S.R.Alpert, “Mobile IP, Design Principles and Practices,” Addision Wesley, 1997 3 Tananbaum A....
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Comparisons of Information Security Management Frameworks Essay
  • Main Purpose of security management Essay
  • Information Security Risk Analysis and Management Essay
  • Information Security Management System Essay
  • Essay on information security management
  • Information Security Risk Management Essay
  • Essay about Information Security
  • Management Information Systems Essay

Become a StudyMode Member

Sign Up - It's Free