Preview

Ty Bsc It

Satisfactory Essays
Open Document
Open Document
7130 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ty Bsc It
AC 27/2/13 Item no. 4.129

UNIVERSITY OF MUMBAI

Syllabus for sem V & VI Programme: B. Sc. Course - Information Technology
(as per Credit Based Semester and Grading System w.e.f. Academic Year 2013 – 14)

1

Semester V

Courses and Course Codes Semester V
Course Code USIT501 USIT502 USIT503 USIT504 USIT505 Course Title Network Security Asp.Net With C# Software Testing Advanced Java Linux Administration Course Code USIT5P1 USIT5P2 USIT5P3 USIT5P4 USIT5P5 Course Title Network Security Practical Asp.Net With C# Practical Software Testing Practical Advanced Java Practical Linux Administration Practical

Semester VI
Course Code USIT601 USIT602 USIT603 Course Title Internet Technology Project Management Data Warehousing USIT607 USIT608 Elective USIT604 USIT605 USIT606 IPR and Cyber Laws Digital Signal And Systems Geographic Information Systems USIT6P4 USIT6P5 USIT6P6 IPR and Cyber Laws Case Studies Digital Signal And Systems Practical Geographic Information Systems Practical Course Code USIT6P1 USIT6P2 USIT6P3 Course Title Internet Technology Practical Project Management Case Studies Data Warehousing Practical Project Report Project Viva Voce

2

Semester V
PROGRAMME: B. Sc (Information Technology) COURSE: NETWORK SECURITY Periods per week 1 Period is 50 minutes Evaluation System Semester – V COURSE CODE: USIT501 Lecture 5 Practical 3 Hours Marks Theory Examination 2 60 Theory Internal -40 Practical 50

Unit I

Unit II :

Unit III

Unit IV

Unit V

Unit VI

Computer Security : Introduction, Need for security, Principles of Security, Types of Attacks Cryptography : Plain text and Cipher Text, Substitution techniques, Caesar Cipher, Mono-alphabetic Cipher, Polygram, Polyalphabetic Substitution, Playfair, Hill Cipher, Transposition techniques, Encryption and Decryption, Symmetric and Asymmetric Key Cryptography, Steganography, Key Range and Key

You May Also Find These Documents Helpful

  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    From this book I take back lot of things related to computers, networks, the government, information security and its importance, and how to handle things under pressure and stress. There are many characters who teach us how to look at situations which actually shows us a way to solve the problem.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I know the email is from one of my students. I check email every day from my students. I encourage you to contact me with any questions about the course, require that you contact me for extenuating circumstances for late work, and meet with me online for any required conferences that are held during the course. We will meet in the online chat room at least once this semester to discuss the midterm and once this semester to discuss your final assignment. This is in addition to your required face-to-face attendance each week for eight weeks.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    CMGT430 2015 SYLLABUS

    • 2598 Words
    • 16 Pages

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks,…

    • 2598 Words
    • 16 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Syabus

    • 3034 Words
    • 13 Pages

    Print Mini Syllabus Course ID: Title: Modality: Credit Hours: Specialty: CIS105 Survey of Computer Information Systems Internet 3.00 MS Office Pro 2010…

    • 3034 Words
    • 13 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    References: Conklin, A., Williams, G., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.). New York, NY: McGraw-Hill/Osborne Media.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Better Essays

    References: Comer, D. E. (2009, 2009,2004,2001,1999,1997). Computer Networks And Internets (5th ed.). Upper Saddle River, New Jersey: Pearson Education, Inc.…

    • 1195 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    This case study is a practical application of all of the knowledge you have acquired from your courses in the networking curriculum over the past two years. It will allow you to demonstrate both your knowledge and experience in networking both academically and hands-on. It will also allow you to draw on what you have learned as you worked your way through the online Microsoft IT Academy Security course. It is intended to be used as first a mid-term examination and then will also be continued as your end of class project and final exam. It presents a thorough review of concepts and applications presented in courses you have taken while at JSRCC. To complete this case study, read the scenario below and perform the tasks that follow. You will perform many of these tasks in teams of two but your final reports will be written individually. In addition to your analysis you are required to submit a formal written proposal that makes specific recommendations. You will be provided additional instructions regarding the format of your project report and other requirements.…

    • 5277 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    Syllabus IT/205

    • 2628 Words
    • 11 Pages

    This course introduces students to the world of information technology. Students will examine the technology concepts included in business systems, networking and project management and explore the systems development life cycle. Specific topics for the course include: hardware components, software applications, operating systems, databases, programming, as well as the security, privacy, and safety issues associated with information technology.…

    • 2628 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    CIS 207 Syllabus

    • 2226 Words
    • 15 Pages

    University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.…

    • 2226 Words
    • 15 Pages
    Powerful Essays

Related Topics