| 2nd year SEMESTER 3 | ||||||||||||||
| PC-CS-CYS-203A | Data Structures | |||||||||||||
| CO 1 | Understand various data structures like array,linked list. | |||||||||||||
| CO 2 | Implement operations like searching, insertion, and deletion, traversing mechanism on various data structures. | |||||||||||||
| CO 3 | Implement Linear and Non-Linear data structures | |||||||||||||
| CO 4 | Implement appropriate sorting/searching technique. | |||||||||||||
| CO 5 | Understand advance data structure using Non Linear data structure. | |||||||||||||
| CO 6 | Determine and analyze the complexity of given algorithms. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | 3 | 3 | 3 | 1 | 2 | – | – | 1 | 2 | 1 | 1 | 1 | 2 | 2 |
| CO 2 | 3 | 3 | 3 | 2 | 2 | – | – | 1 | 2 | 1 | 1 | 1 | 3 | 2 |
| CO 3 | 3 | 3 | 3 | 3 | 2 | – | – | 1 | 2 | 1 | 1 | 2 | 3 | 3 |
| CO 4 | 3 | 3 | 3 | 2 | 2 | – | – | 1 | 2 | 1 | 1 | 2 | 3 | 3 |
| CO 5 | 3 | 3 | 3 | 3 | 2 | – | – | 1 | 2 | 1 | 1 | 2 | 3 | 2 |
| CO 6 | 3 | 2 | 3 | 3 | 2 | – | – | 1 | 2 | 1 | 1 | 2 | 3 | 2 |
| AVG | 3 | 2.83 | 3 | 2.33 | 12 | – | – | 1 | 2 | 1 | 1 | 1.66 | 2.83 | 2.33 |
| Cos ES-CS-CYS- 211A | Computer Organization and Architecture S-CYS-211A)/Third Semester | |||||||||||||
| CO1 | Be familiar with the functional units of the processor such as the register file and arithmetic‐logical unit, and with the basics of systems topics | |||||||||||||
| CO2 | Be familiar with the design trade‐offs in designing and constructing a computer processor. | |||||||||||||
| CO3 | Be familiar with the design trade‐offs in designing and constructing a computer processor. | |||||||||||||
| CO4 | Be familiar with the CPU design including the RISC/CISC architectures. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 1 | 3 | 2 | – | – | – | – | – | – | – | – | 3 | 2 |
| CO2 | 2 | 3 | – | 3 | – | – | – | – | – | – | – | – | 2 | – |
| CO3 | 3 | 1 | 1 | – | – | – | – | – | – | – | – | – | 3 | 2 |
| CO4 | 2 | 2 | 2 | 2 | – | – | – | – | – | – | – | – | 2 | – |
| AVG | 2.5 | 1.7 | 2 | 2.3 | – | – | – | – | – | – | – | – | 2.5 | 2 |
| PC-CS-CYS-209A | Principles of Programming Languages | |||||||||||||
| CO 1 | To introduce the basic concepts of programming language, the general problems and methods related to syntax and semantics. | |||||||||||||
| CO 2 | To introduce the structured data objects, subprograms and programmer defined data types. | |||||||||||||
| CO 3 | To outline the sequence control and data control. | |||||||||||||
| CO 4 | To introduce the concepts of storage management using programming languages. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 1 | – | – | 1 | – | – | – | – | – | – | – | 2 | – |
| CO2 | 3 | 3 | 3 | 3 | 1 | – | – | – | – | – | – | – | 3 | 2 |
| CO3 | 3 | – | 1 | 1 | 1 | – | – | – | – | – | – | – | 3 | – |
| CO4 | 3 | 3 | 2 | 2 | 1 | – | – | – | – | – | – | – | 2 | 2 |
| AVG | 3 | 2.3 | 2 | 2 | 1 | – | – | – | – | – | – | – | 2.5 | 2 |
| PC-CS-CYS-207A | Software Engineering | |||||||||||||
| CO 1 | Understand the basic concepts of Software Engineering. | |||||||||||||
| CO 2 | Interpret the fundamental concept of Software requirements specifications and Analysis Modelling. | |||||||||||||
| CO 3 | Develop different design techniques and their implementation. | |||||||||||||
| CO 4 | Discuss about software testing and maintenance measures. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | 3 | – | – | 1 | – | – | – | – | – | – | – | 1 | 1 | – |
| CO 2 | 3 | 2 | – | 2 | – | – | – | – | – | – | – | 2 | 2 | – |
| CO 3 | 3 | 3 | 3 | 2 | – | – | – | – | – | – | – | 2 | 2 | – |
| CO 4 | 3 | 3 | – | 1 | – | – | – | – | – | – | – | 2 | 1 | – |
| Avg | 3 | 2.67 | 3 | 1.5 | – | – | – | – | – | – | – | 1.75 | 1.5 | – |
| PC-CS-CYS-205A | Computational Thinking with Python | |||||||||||||
| CO1 | To Learn python statements, comments and indentation, tokens, input and output methods using various example programs. | |||||||||||||
| CO2 | To Learn the different methods involved in List, String, Tuples and Dictionary and Design solutions for complex programs. | |||||||||||||
| CO3 | To learn about different functions in python and develop the function programs with all the concepts like lambda, decorators and generators. | |||||||||||||
| CO4 | To learn about the exception handling functions, file concepts and CSV and JSON. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 1 | – | – | – | – | – | – | – | – | – | – | 2 | – |
| CO2 | 3 | 3 | 3 | 3 | – | – | – | – | – | – | – | – | 3 | 2 |
| CO3 | 3 | – | 1 | 1 | – | – | – | – | – | – | – | – | 3 | – |
| CO4 | 3 | 3 | 2 | 2 | – | – | – | – | – | – | – | – | 2 | 2 |
| AVG | 3 | 2.3 | 2 | 2 | – | – | – | – | – | – | – | – | 2.5 | 2 |
| PC-CS-CYS- 201A | Introduction to Cyber Security | |||||||||||||
| CO 1 | Understand the basic knowledge of cyber security. | |||||||||||||
| CO 2 | Analyze and sort issues related to different types of activities in cybercrime. | |||||||||||||
| CO 3 | Evaluate the fixing methods of the various cyberattacks. | |||||||||||||
| CO 4 | Understand the digital forensics and related scenarios of cybercrimes. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 2 | 1 | 1 | 2 | 1 | 2 | 1 | – | 1 | – | – | 2 | – |
| CO2 | 2 | 3 | 2 | 2 | 2 | 1 | 1 | – | – | 2 | – | – | 2 | – |
| CO3 | 2 | 3 | 3 | 3 | 2 | 2 | 2 | 2 | – | 1 | – | – | 1 | – |
| CO4 | 2 | 2 | 1 | 2 | 2 | 1 | 1 | 2 | – | 1 | – | – | 1 | – |
| AVG | 2.25 | 2.5 | 1.75 | 2 | 2 | 1.25 | 1.5 | 1.6 | – | 1.25 | – | – | 1.5 | – |
| PC-CS-CYS- 217LA | Software Engineering Lab | |||||||||||||
| CO 1 | Discuss about the reasons for the software crisis. | |||||||||||||
| CO 2 | Understand the various software testing techniques. | |||||||||||||
| CO 3 | Interpret the various software metrics. | |||||||||||||
| CO 4 | Develop different design techniques and their implementation. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | 3 | 3 | 3 | – | 1 | – | – | – | 3 | 3 | – | – | 2 | 2 |
| CO 2 | 3 | 3 | – | – | 2 | – | – | – | 3 | 3 | – | – | 3 | 2 |
| CO 3 | 3 | 3 | 2 | 3 | 2 | – | – | – | 3 | 3 | – | – | – | – |
| CO 4 | 3 | 3 | 3 | 3 | 2 | 2 | – | – | 3 | 3 | – | – | 2 | 2 |
| AVG | 3 | 3 | 2.67 | 2 | 1.75 | 2 | – | – | 3 | 3 | – | – | 2.3 | 2 |
| PC-CS-CYS- 213LA | Data Structure Lab | |||||||||||||
| CO1 | Implement linear and non linear data structures using linked list | |||||||||||||
| CO2 | Apply various data structures such as stack, queue and tree to solve the problems. | |||||||||||||
| CO3 | Implement various searching and sorting techniques | |||||||||||||
| CO4 | Choose appropriate data structure while designing the applications and analyze the complexity of the algorithms. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 2 | 3 | 3 | 3 | – | – | – | – | – | – | – | 2 | 1 |
| CO2 | 2 | 3 | 2 | 3 | 2 | – | – | – | – | – | – | – | 2 | 2 |
| CO3 | 2 | 2 | 1 | 2 | 2 | – | – | – | – | – | – | – | 1 | 2 |
| CO4 | 2 | 2 | 2 | 3 | 2 | – | – | – | – | – | – | – | 2 | 2 |
| AVG | 2.25 | 2.25 | 2 | 2.75 | 2.25 | – | – | – | – | – | – | – | 1.75 | 1.75 |
| PC-CS-CYS- 215LA | Python Lab | |||||||||||||
| CO 1 | To study fundamentals of python programming and implement basic programs. | |||||||||||||
| CO 2 | To implement the searching technique using python. | |||||||||||||
| CO 3 | To implement sorting techniques using python. | |||||||||||||
| CO 4 | To implement matrix multiplication using python. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | 3 | 2 | 3 | 3 | 3 | – | – | – | – | – | – | – | 2 | 1 |
| CO 2 | 2 | 3 | 2 | 3 | 2 | – | – | – | – | – | – | – | 2 | 2 |
| CO 3 | 2 | 2 | 1 | 2 | 2 | – | – | – | – | – | – | – | 1 | 2 |
| CO 4 | 2 | 2 | 2 | 3 | 2 | – | – | – | – | – | – | – | 2 | 2 |
| AVG | 2.25 | 2.25 | 2 | 2.75 | 2.25 | – | – | – | – | – | – | – | 1.75 | 1.75 |
| SEMESTER 4 | ||||||||||||||
| ES-CS-CYS-204A | Object-Oriented Programming System | |||||||||||||
| CO1 | To introduce the basic concepts of object oriented programming language and the its representation. | |||||||||||||
| CO2 | To allocate dynamic memory, access private members of class and the behavior of inheritance and its implementation. | |||||||||||||
| CO3 | To introduce polymorphism, interface design and overloading of operator. | |||||||||||||
| CO4 | To handle backup system using file, general purpose template and handling of raised exception during programming. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | CO1 | 3 | 1 | – | – | – | – | – | – | – | – | – | – | 3 |
| CO2 | CO2 | 1 | 1 | 3 | 1 | – | – | – | – | – | – | – | – | 2 |
| CO3 | CO3 | 1 | 3 | 2 | 2 | 3 | – | – | – | – | – | – | – | 2 |
| CO4 | CO4 | 2 | 2 | 2 | – | 3 | – | – | – | – | – | – | – | 2 |
| AVG | AVERAGE | 1.75 | 1.75 | 2.33 | 1.5 | 3 | 2.25 | |||||||
| PC-CS-CYS-202A | Mathematics for Intelligent Systems | |||||||||||||
| CO 1 | To develop an understanding of the basic concepts and techniques of linear algebra as applied to signal processing. | |||||||||||||
| CO 2 | To provide connection between the concepts of linear algebra, differential equation and probability theory. | |||||||||||||
| CO 3 | To enable the students to understand the use of calculus and Linear algebra in modelling electrical and mechanical elements. | |||||||||||||
| CO 4 | To equip the students to understand the role of probability theory in providing data sets for computational experiments in data science. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | 3 | 3 | 1 | – | – | – | – | – | – | – | – | – | 1 | – |
| CO 2 | 3 | 2 | 1 | – | – | – | – | – | – | – | – | – | 1 | 1 |
| CO 3 | 3 | 3 | 1 | – | – | – | – | – | – | – | – | – | 1 | – |
| CO 4 | 3 | 3 | 1 | – | – | – | – | – | – | – | – | – | 1 | 1 |
| Avg | 3 | 2.67 | 1 | – | – | – | – | – | – | – | – | – | 1 | 1 |
| ES-CS-CYS-208A | Internet & Web Technology | |||||||||||||
| CO1 | Learn the basic concepts of information and web architecture. | |||||||||||||
| CO2 | Learn about the skills that will enable to design and build high level web enabled applications. | |||||||||||||
| CO3 | Understand the applicability of Java Script as per current software industry standards. | |||||||||||||
| CO4 | Acquaint the latest programming language for the implementation of object based and procedure based applications using Python. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | 3 | 1 | – | – | – | – | – | – | – | – | – | – | 3 | 2 |
| CO 2 | 1 | 1 | 3 | 1 | – | – | – | – | – | – | – | – | 2 | 1 |
| CO 3 | 1 | 3 | 2 | 2 | 3 | – | – | – | – | – | – | – | 2 | 2 |
| CO 4 | 2 | 2 | 2 | – | 3 | – | – | – | – | – | – | – | 2 | 1 |
| Avg | 1.75 | 1.75 | 2.33 | 1.5 | 3 | – | – | – | – | – | – | – | 2.25 | 1.5 |
| PC-CS-CYS-206A | Data Base Management Systems | |||||||||||||
| CO 1 | Illustrate the concept of Database Management System & Entity Relationship Diagrams. | |||||||||||||
| CO 2 | Identify and apply the SQL, Relational Algebra and Relational Calculus queries. | |||||||||||||
| CO 3 | Elaborate the concept of functional dependencies. | |||||||||||||
| CO 4 | Explain the concept of Transaction Processing & Concurrency control | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | 3 | – | – | – | – | – | – | – | – | – | – | – | 3 | – |
| CO 2 | 3 | – | – | – | – | – | – | – | – | – | – | – | 3 | – |
| CO 3 | 3 | 3 | 3 | 2 | – | – | – | – | – | – | – | – | 3 | 2 |
| CO 4 | 3 | 3 | 3 | 2 | – | – | – | – | – | – | – | – | 3 | 2 |
| Avg | 3 | 3 | 3 | 2 | – | – | – | – | – | – | – | – | 3 | 2 |
| PC-CS-CYS- 210A | Operating System | |||||||||||||
| CO 1 | Understand the structure and functions of operating system. | |||||||||||||
| CO 2 | Explain about processes, threads and scheduling algorithms. | |||||||||||||
| CO 3 | Elaborate the principle of concurrency and the concept of deadlocks. | |||||||||||||
| CO 4 | Discuss various memory management scheme and to study I/O management and file systems. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 2 | 2 | 2 | 2 | 1 | 1 | 1 | – | 1 | – | – | – | – |
| CO2 | 2 | 3 | 2 | 2 | 2 | 1 | 1 | 1 | – | 2 | – | – | – | – |
| CO3 | 2 | 3 | 3 | 2 | 1 | 2 | 1 | 2 | – | 1 | – | – | 2 | 2 |
| CO4 | 3 | 2 | 2 | 3 | 3 | 1 | 1 | 1 | – | 1 | – | – | 2 | 2 |
| AVG | 2.5 | 2.5 | 2.25 | 2.25 | 2 | 1.25 | 1 | 1.25 | – | 1.25 | – | – | 2 | 2 |
| PC-CS-CYS- 212A | Cryptographic Fundamentals | |||||||||||||
| CO 1 | To understand basics of Cryptography and Network Security. | |||||||||||||
| CO 2 | To be able to secure a message over insecure channel by various means.. | |||||||||||||
| CO 3 | To learn about how to maintain the Confidentiality, Integrity and Availability of a data | |||||||||||||
| CO 4 | To understand various protocols for network security to protect against the threats in the networks. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 3 | 2 | 1 | 2 | – | 1 | – | – | – | – | 3 | 3 | 1 |
| CO2 | 2 | 2 | 3 | – | 3 | 3 | – | 2 | 1 | – | – | 2 | – | 2 |
| CO3 | 2 | 3 | 1 | 3 | 1 | 3 | – | 2 | – | – | – | 3 | 3 | 2 |
| CO4 | 3 | 1 | 1 | – | 1 | 1 | 3 | 3 | 2 | – | – | 1 | 1 | – |
| AVG | 2.5 | 2.25 | 1.75 | 2 | 1.75 | 1.75 | 2 | 2.3 | 1.5 | – | – | 2.25 | 2.3 | 1.6 |
| ES-CS-CYS- 218LA | Internet & Web Technology Lab | |||||||||||||
| CO1 | Design webpages using HTML, JavaScript and CSS. | |||||||||||||
| CO2 | Design and test simple function/program to implement Searching and sorting techniques using Python. | |||||||||||||
| CO3 | Develop program in Java Script for pattern matching using regular expressions and errors in scripts. | |||||||||||||
| CO4 | Design client-server based web applications. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | 3 | 1 | – | – | – | – | – | – | – | – | – | – | 3 | 2 |
| CO 2 | 1 | 1 | 3 | 1 | – | – | – | – | – | – | – | – | 2 | 1 |
| CO 3 | 1 | 3 | 2 | 2 | 3 | – | – | – | – | – | – | – | 2 | 2 |
| CO 4 | 2 | 2 | 2 | – | 3 | – | – | – | – | – | – | – | 2 | 1 |
| AVG | 1.75 | 1.75 | 2.33 | 1.5 | 3 | – | – | – | – | – | – | – | 2.25 | 1.5 |
| PC-CS-CYS- 214LA | Object Oriented Programming Lab | |||||||||||||
| CO1 | To introduce the basic concepts of object oriented programming language and the its representation. | |||||||||||||
| CO2 | To allocate dynamic memory, access private members of class and the behavior of inheritance and its implementation. | |||||||||||||
| CO3 | To introduce polymorphism, interface design and overloading of operator. | |||||||||||||
| CO4 | To handle backup system using file, general purpose template and handling of raised exception during programming. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 1 | – | – | – | – | – | – | – | – | – | – | 3 | 2 |
| CO2 | 1 | 1 | 2 | 1 | – | – | – | – | – | – | – | – | 2 | 1 |
| CO3 | 1 | 3 | 2 | 2 | 2 | – | – | – | – | – | – | – | 1 | 2 |
| CO4 | 2 | 1 | 3 | – | 3 | – | – | – | – | – | – | – | 1 | 1 |
| AVG | 1.75 | 1.75 | 2.33 | 1.5 | 2.5 | 1.75 | 1.5 | |||||||
| PC-CS-CYS- 216LA | Database Management Systems Lab | |||||||||||||
| CO 1 | Illustrate & Implement basic DDL commands. | |||||||||||||
| CO 2 | Illustrate & Implement DML and DCL commands. | |||||||||||||
| CO 3 | Demonstrate SQL queries using SQL operators. | |||||||||||||
| CO 4 | Explain the concept of relational algebra and implement using examples. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 2 | 2 | 2 | 1 | – | – | – | – | – | – | – | 3 | 2 |
| CO2 | 3 | 2 | 3 | 2 | 3 | – | – | – | – | – | – | – | 3 | 2 |
| CO3 | 3 | 3 | 3 | 1 | 3 | – | – | – | – | – | – | – | 3 | 2 |
| CO4 | 3 | 3 | 3 | 1 | 3 | – | – | – | – | – | – | – | 3 | 2 |
| AVG | 3 | 2.5 | 2.75 | 1.5 | 2.5 | – | – | – | – | – | – | – | 3 | 2 |
| 3nd year SEMESTER 5 | ||||||||||||||
| ES-CS-CYS-307A | Microprocessor and Interfacing | |||||||||||||
| CO1 | Understanding the Architecture, Instruction set and addressing modes of 8086 microprocessor. | |||||||||||||
| CO2 | Analyze the instruction set of 8086 microprocessor. | |||||||||||||
| CO3 | Implement the assembly language programming of 8086 microprocessor. | |||||||||||||
| CO4 | Design the memory (RAM/ROM) interfacing with 8086 microprocessor. | |||||||||||||
| CO5 | Design and implement the interfacing of interrupts, basic I/O and DMA with 8086 Microprocessor. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 1 | 1 | 1 | – | – | – | – | – | – | – | – | – | – | 1 |
| CO2 | 1 | 3 | 1 | 1 | 3 | – | – | – | – | – | – | – | 1 | 1 |
| CO3 | 3 | 2 | 2 | 1 | 3 | – | – | – | – | – | – | – | 2 | 1 |
| CO4 | 2 | 2 | 3 | 2 | – | – | – | – | – | – | – | – | 3 | 2 |
| CO5 | 3 | 2 | 3 | 2 | – | – | – | – | – | – | – | – | 3 | 2 |
| AVG | 2 | 2 | 2 | 1.5 | 3 | – | – | – | – | – | – | – | 2.25 | 1.4 |
| HM-902A | Business Intelligence and Entrepreneurship | |||||||||||||
| CO1 | Students will be able understand who the entrepreneurs are and what competences needed to become an entrepreneur. | |||||||||||||
| CO2 | Students will be able understand insights into the management, opportunity search, identification of a Product and market feasibility studies. | |||||||||||||
| CO3 | Students can be able to write a report and do oral presentation on the topics such as product identification, business idea, export marketing etc. | |||||||||||||
| CO4 | Students will be able to know the different financial and other assistance available for the small industrial units. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | – | – | – | – | – | 1 | – | – | 1 | – | – | |||
| CO2 | 2 | 2 | 2 | 2 | – | – | – | – | 1 | 1 | 3 | 2 | – | 2 |
| CO3 | 1 | 2 | 1 | 1 | – | – | – | – | – | 2 | 2 | 1 | 2 | 2 |
| CO4 | – | 1 | – | – | – | – | – | – | – | 1 | – | – | ||
| AVG | 1.5 | 1.25 | 1.5 | 1.5 | – | – | – | – | 1 | 1.5 | 2.5 | 1.25 | 0.5 | 2 |
| MC-904A | Energy Resources & Management | |||||||||||||
| CO1 | State the basics of energy, energy management, audit and tariffs. | |||||||||||||
| CO2 | Explain the layout and working of conventional power plants | |||||||||||||
| CO3 | Explain the layout and working of non-conventional power plants | |||||||||||||
| CO4 | Outline the role of energy in economic development and energy scenario in India | |||||||||||||
| CO | PO1 | PO2 | PO3 | PO4 | PO5 | PO6 | PO7 | PO8 | PO9 | PO10 | PO11 | PO12 | PSO1 | PSO2 |
| CO1 | 2 | – | – | – | – | 2 | 2 | – | – | – | – | – | – | – |
| CO2 | 2 | – | – | – | – | 1 | 2 | – | – | – | – | – | – | – |
| CO3 | 2 | – | – | – | – | 1 | 2 | – | – | – | – | – | 2 | – |
| CO4 | 2 | – | – | – | – | 2 | 2 | – | – | – | – | – | – | – |
| AVERAGE | 2 | – | – | – | – | 1.5 | 2 | – | – | – | – | – | 2 | – |
| ES-CS-CYS-305A | Information Security and Data Hiding | |||||||||||||
| CO1 | Demonstrate the knowledge of cryptography, security concepts and applications. | |||||||||||||
| CO2 | Explore the emerging security for information and IPsec. | |||||||||||||
| CO3 | Identify techniques for data hiding and different types of attacks. | |||||||||||||
| CO4 | Apply data hiding techniques into different domains | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 1 | 1 | 2 | 2 | – | – | – | – | 3 | – | 3 | 3 | 3 |
| CO2 | 3 | 2 | 3 | 2 | 2 | – | – | – | – | 2 | – | 2 | 3 | 3 |
| CO3 | 2 | 3 | 2 | 3 | 3 | – | – | – | – | 2 | – | 3 | 3 | 3 |
| CO4 | 3 | 2 | 2 | 2 | 3 | – | – | – | – | 3 | – | 3 | 3 | 3 |
| AVG | 2.75 | 2 | 2 | 2.25 | 2.5 | – | – | – | – | 2.5 | – | 2.75 | 3 | 3 |
| PC-CS-CYS-303A | Security Threats and Trends | |||||||||||||
| CO 1 | Understand the various security and network threats. | |||||||||||||
| CO 2 | Outline the security threat management and various vulnerabilities. | |||||||||||||
| CO 3 | Elaborate the detail of Security monitoring and Auditing tools. | |||||||||||||
| CO 4 | Identify various access control mechanisms to protect against threats in the networks | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 3 | – | – | – | – | – | – | – | – | – | 2 | 3 | 3 |
| CO2 | 3 | 2 | – | 2 | – | – | – | – | – | – | – | 2 | 3 | 3 |
| CO3 | 3 | 2 | 2 | 2 | – | – | – | – | – | – | – | 2 | 3 | 3 |
| CO4 | 3 | 2 | – | 2 | – | – | – | – | – | – | – | 2 | 3 | 3 |
| AVG | 3 | 2.25 | 2 | 2 | – | – | – | – | – | – | – | 2 | 3 | 3 |
| PC-CS-CYS-311A | Computer Networks | |||||||||||||
| CO1 | To understand the basic concept of networking, types, networking topologies and layered architecture. | |||||||||||||
| CO2 | To understand data link layer and MAC sub-layer` | |||||||||||||
| CO3 | To understand the network Layer functioning | |||||||||||||
| CO4 | To understand the transport layer and application layer operation | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 2 | 3 | 2 | 2 | – | – | – | – | 3 | 2 | 3 | 2 | 2 |
| CO2 | 3 | 2 | 3 | 2 | 2 | – | – | – | – | 3 | 2 | 3 | 2 | 2 |
| CO3 | 3 | 2 | 3 | 2 | 2 | – | – | – | – | 3 | 2 | 3 | 2 | 2 |
| CO4 | 3 | 2 | 3 | 2 | 2 | – | – | – | – | 3 | 2 | 3 | 2 | 2 |
| AVG | 3 | 2 | 3 | 2 | 2 | – | – | – | – | 3 | 2 | 3 | 2 | 2 |
| PC-CS-CYS-301A | Design and Analysis of Algorithms | |||||||||||||
| CO1 | introduce the basic concepts of Data Structures and their analysis. | |||||||||||||
| CO2 | study the concept of Dynamic Programming and various advanced Data Structures. | |||||||||||||
| CO3 | introduce various Graph algorithms and concepts of Computational complexities. | |||||||||||||
| CO4 | study various Flow and Sorting Networks | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 1 | – | – | – | – | – | – | – | – | – | – | 3 | 2 |
| CO2 | 1 | 1 | 3 | 1 | – | – | – | – | – | – | – | – | 2 | 1 |
| CO3 | 1 | 2 | 2 | 2 | 2 | – | – | – | – | – | – | – | 2 | 2 |
| CO4 | 2 | 3 | 2 | – | 3 | – | – | – | – | – | – | – | 2 | 1 |
| AVG | 1.75 | 1.75 | 2.33 | 1.5 | 2.5 | 2.25 | 1.5 | |||||||
| PC-CS-CYS-315LA | Design and Analysis of Algorithms Lab | |||||||||||||
| CO1 | The student should be able to Design algorithms for various computing problems. | |||||||||||||
| CO2 | The student should be able to Analyse the time and space complexity of algorithms. | |||||||||||||
| CO3 | The student should be able to Critically analyse the different algorithm design techniques for a given problem. | |||||||||||||
| CO4 | The student should be able to Modify existing algorithms to improve efficiency. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 1 | – | – | – | – | – | – | – | – | – | – | 3 | 2 |
| CO2 | 1 | 1 | 3 | 1 | – | – | – | – | – | – | – | – | 2 | 1 |
| CO3 | 1 | 3 | 3 | 2 | 3 | – | – | – | – | – | – | – | 1 | 2 |
| CO4 | 2 | 2 | 2 | – | 2 | – | – | – | – | – | – | – | 2 | 1 |
| AVG | 1.75 | 1.75 | 2.66 | 1.5 | 2.5 | 2 | 1.5 | |||||||
| PC-CS-CYS-313LA | Computer Networks Lab | |||||||||||||
| CO 1 | Do Problem Solving using algorithms. | |||||||||||||
| CO 2 | Design and test simple programs to implement networking concepts using Java. | |||||||||||||
| CO 3 | Document artifacts using applied addressing & quality standards. | |||||||||||||
| CO 4 | Design simple data transmission using networking concepts and implement. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | CO1 | 2 | 1 | 2 | 3 | – | – | – | – | – | – | – | – | 2 |
| CO2 | CO2 | 2 | 2 | 2 | 2 | – | – | – | – | – | – | – | – | 3 |
| CO3 | CO3 | 3 | 1 | 1 | 1 | – | – | – | – | – | – | – | – | 3 |
| CO4 | CO4 | 3 | 3 | 2 | 2 | 2 | – | – | – | – | – | – | – | 2 |
| AVG | AVG | 2.5 | 1.75 | 1.75 | 2 | 2 | – | – | – | – | – | – | – | 2.5 |
| ES-CS-CYS-317LA | Microprocessor & Interfacing Lab | |||||||||||||
| CO 1 | Understand basic concept of 8085, 8086 Microprocessors and 8051 Microcontrollers. | |||||||||||||
| CO 2 | Develop an assembly language program for 8086 Microprocessors as well as C language program for 8051 Microcontroller. | |||||||||||||
| CO 3 | Experiment with interfacing the various Peripheral to 8086 Microprocessors and 8051 Microcontrollers. | |||||||||||||
| CO 4 | Design the systems based on 8051 Microcontrollers. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | – | 3 | – | – | – | – | – | – | – | – | – | – | – |
| CO2 | 2 | 3 | 3 | – | 3 | – | – | – | – | – | – | – | 2 | 3 |
| CO3 | 2 | 3 | 3 | – | 3 | – | – | – | – | – | – | – | 2 | 3 |
| CO4 | 2 | 3 | 3 | – | 3 | – | – | – | – | – | – | – | – | 3 |
| AVG | 2.25 | 3 | 3 | – | 3 | – | – | – | – | – | – | – | 2 | 3 |
| 3nd year SEMESTER 6 | ||||||||||||||
| PC-CS-CYS- 302A | Mobile Security | |||||||||||||
| CO 1 | Study the concepts in mobile security | |||||||||||||
| CO 2 | Learn various OS, acquisition and analysis of android. | |||||||||||||
| CO 3 | Learn various security of Windows and ios. | |||||||||||||
| CO 4 | Understand the purpose of malware analysis. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 1 | – | – | – | – | – | – | – | – | – | – | 2 | – |
| CO2 | 3 | 3 | 3 | 3 | – | – | – | – | – | – | – | – | 3 | 2 |
| CO3 | 3 | – | 1 | 1 | – | – | – | – | – | – | – | – | 3 | – |
| CO4 | 3 | 3 | 2 | 2 | – | – | – | – | – | – | – | – | 2 | 2 |
| AVG | 3 | 2.2 | 1.6 | 2.2 | – | – | – | – | – | – | – | – | 2.33 | 2 |
| PC-CS-CYS-306A | Cryptanalysis | |||||||||||||
| CO 1 | Develop a mathematical foundation for the study of cryptography. | |||||||||||||
| CO 2 | Understand Number Theory and Algebra for design of cryptographic algorithms | |||||||||||||
| CO 3 | Explain the role of cryptography in communication over an insecure channel. | |||||||||||||
| CO 4 | Analyze the different public key encryption schemes and elliptic curves and pairings based on different security models | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | – | – | – | – | – | – | – | – | – | – | – | 3 | – |
| CO2 | 3 | – | – | – | – | – | – | – | – | – | – | – | 3 | – |
| CO3 | 3 | 3 | 3 | 2 | – | – | – | – | – | – | – | – | 3 | 2 |
| CO4 | 3 | 3 | 3 | 2 | – | – | – | – | – | – | – | – | 3 | 2 |
| AVG | 3 | 1.5 | 1.5 | 1 | – | – | – | – | – | – | – | – | 3 | 1 |
| ES-CS-CYS-308A | Information Theory and Coding | |||||||||||||
| CO 1 | Apply the concept of Information Theory to analyse the channel performance. | |||||||||||||
| CO 2 | Design source coding techniques to improve the channel performance. | |||||||||||||
| CO 3 | Develop the linear block codes and cyclic codes for error detection and correction. | |||||||||||||
| CO 4 | Develop and decode non-linear convolution codes. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 2 | – | – | – | – | – | – | – | – | – | – | – | – |
| CO2 | 3 | 1 | 3 | – | – | – | – | – | – | – | – | – | – | 2 |
| CO3 | 3 | – | 3 | – | – | – | – | – | – | – | – | – | – | 3 |
| CO4 | 3 | – | 3 | – | – | – | – | – | – | – | – | – | – | 3 |
| AVG | 3 | 1.5 | 3 | – | – | – | – | – | – | – | – | – | – | 2.67 |
| OE-CS-CYS-304 | Creativity Innovation and Entrepreneurship | |||||||||||||
| CO 1 | Understand basics of Creativity | |||||||||||||
| CO 2 | Analyze entrepreneurship skills | |||||||||||||
| CO 3 | Understand creative Intelligence | |||||||||||||
| CO 4 | Understand perspectives of Innovation | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | – | 2 | 2 | 2 | – | – | 1 | – | 3 | 1 | 2 | 3 | – | 2 |
| CO2 | – | 3 | 2 | 2 | – | – | – | – | 1 | 1 | 1 | 3 | – | 3 |
| CO3 | – | – | 3 | 2 | – | – | – | – | – | 2 | – | 3 | – | – |
| CO4 | – | 1 | 3 | – | – | – | – | – | 2 | 2 | – | 3 | – | 1 |
| AVG | – | 2 | 2 | 2 | – | – | 1 | – | 3 | 1 | 2 | 3 | – | 2 |
| PC-CS-CYS-310A | Cloud Security and Management | |||||||||||||
| CO 1 | Understand an in-depth and comprehensive knowledge of the Cloud Computing fundamental issues, technologies and implementations. | |||||||||||||
| CO 2 | Identify the infrastructure of cloud computing, including SaaS, PaaS, IaaS, and Virtualization etc | |||||||||||||
| CO 3 | Evaluate the security issues related to the development of cloud applications. | |||||||||||||
| CO 4 | Learn Identity and Access Management in the cloud | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 1 | – | 2 | 2 | 2 | – | – | – | – | – | – | – | 2 | 1 |
| CO2 | 1 | 3 | – | 3 | 1 | – | – | – | – | – | – | – | 1 | 1 |
| CO3 | 2 | – | 1 | 1 | 1 | – | – | – | – | – | – | – | 1 | 2 |
| CO4 | 2 | 3 | 3 | 2 | 3 | – | – | – | – | – | – | – | 3 | 2 |
| AVG | 1.5 | 1.5 | 1.5 | 2 | 1.75 | 1.75 | 1.5 | |||||||
| ES-CS-CYS-304A | Digital Forensics | |||||||||||||
| CO1 | To postulate the introduction of digital forensics and motive behind the crime and identity of the main culprit with the current tools used. | |||||||||||||
| CO2 | To identify the evidence quickly, and to estimate the potential impact of the malicious activity on the victim Interpret the cyber pieces of evidence. | |||||||||||||
| CO3 | To understand various artifacts related to systems in areas of windows System and Computer operating System | |||||||||||||
| CO4 | To analyze Digital forensic case study which offers a complete report on the investigation process with the associated legal aspects. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 2 | 1 | 2 | 3 | – | – | – | – | – | – | – | – | 2 | 2 |
| CO2 | 2 | 2 | 2 | 2 | – | – | – | – | – | – | – | – | 3 | 2 |
| CO3 | 3 | 1 | 1 | 1 | – | – | – | – | – | – | – | – | 3 | 2 |
| CO4 | 3 | 3 | 2 | 2 | – | – | – | – | – | – | – | – | 2 | 2 |
| AVG | 2.5 | 1.75 | 1.75 | 2 | – | – | – | – | – | – | – | – | 2.5 | 2 |
| PC-CS-CYS-312 LA | Information Theory and Coding Lab | |||||||||||||
| CO 1 | Analyze and demonstrate information and various entropies. | |||||||||||||
| CO 2 | Understand and apply various source coding techniques. | |||||||||||||
| CO 3 | Construct codes using different linear block code and cyclic code techniques. | |||||||||||||
| CO 4 | Design various convolution coding schemes. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 2 | – | – | 2 | – | – | 2 | 2 | 1 | – | – | – | – |
| CO2 | 3 | – | – | – | 2 | – | – | 2 | 2 | 1 | – | – | 2 | – |
| CO3 | 3 | 2 | 3 | – | 2 | – | – | 2 | 2 | 1 | – | 2 | 2 | – |
| CO4 | 3 | 2 | 3 | – | 2 | – | – | 2 | 2 | 1 | – | 2 | 2 | – |
| AVG | 3 | 1.5 | 1.5 | – | 2 | – | – | 2 | 2 | 1 | – | 1 | 1.5 | – |
| ES-CS-CYS- 314LA | Digital Forensic Lab | |||||||||||||
| CO 1 | To familiarize students with the tools and network of Digital Forensics. | |||||||||||||
| CO 2 | To have a clear understanding of Network related commands in windows and Linux | |||||||||||||
| CO 3 | Study of the phases of investigation process using tools of Digital forensic. | |||||||||||||
| CO 4 | To analyze case study of forensic investigation. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | CO1 | 2 | 1 | 2 | 3 | – | – | – | – | – | – | – | – | 2 |
| CO2 | CO2 | 2 | 2 | 2 | 2 | 3 | – | – | – | – | – | – | – | 3 |
| CO3 | CO3 | 3 | 1 | 1 | 1 | – | – | – | – | – | – | – | – | 3 |
| CO4 | CO4 | 3 | 3 | 2 | 2 | – | – | – | – | – | – | – | – | 2 |
| AVG | AVG | 2.5 | 1.75 | 1.75 | 2 | 3 | – | – | – | – | – | – | – | 2.5 |
| PC-CS-CYS-316LA | Cryptanalysis Lab | |||||||||||||
| CO1 | Develop cryptography techniques using different cipher algorithms. | |||||||||||||
| CO2 | Understand Number Theory and Algebra for design of cryptographic algorithms | |||||||||||||
| CO3 | Understand the role of cryptography in communication over an insecure channel. | |||||||||||||
| CO4 | Illustrate the symmetric key encryption schemes based on different security modeis | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | – | – | – | – | – | – | – | – | – | – | – | 3 | – |
| CO2 | 3 | – | – | – | – | – | – | – | – | – | – | – | 3 | – |
| CO3 | 3 | 3 | 3 | 2 | – | – | – | – | – | – | – | – | 3 | 2 |
| CO4 | 3 | 3 | 3 | 2 | – | – | – | – | – | – | – | – | 3 | 2 |
| AVG | 3 | 1.5 | 1.5 | 1 | – | – | – | – | – | – | – | – | 3 | 1 |
| FINAL YEAR SEMESTER VII | ||||||||||||||
| PC-CS-CYS-401A | Cyber Attacks- OWASP Framework | |||||||||||||
| CO1 | Awareness about OWASP Top 10 web application security risks. | |||||||||||||
| CO2 | Understanding of the most critical security risks to web applications. | |||||||||||||
| CO3 | Identify and mitigate the ten most critical security risks by reviewing vulnerable source code. | |||||||||||||
| CO4 | Understand the need of writing the secure code. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | 3 | 2 | 1 | 1 | 3 | 3 | – | – | – | 3 | 2 | 3 | 3 | 2 |
| CO 2 | 3 | 1 | 3 | 1 | 3 | 3 | – | – | – | 3 | 2 | 3 | 3 | 2 |
| CO 3 | 3 | 2 | 3 | 1 | 3 | 3 | – | – | – | 2 | 2 | 3 | 3 | 2 |
| CO 4 | 3 | 2 | 3 | 1 | 3 | 3 | – | – | – | 2 | 2 | 3 | 3 | 2 |
| AVG | 3 | 1.75 | 2.5 | 1 | 3 | 3 | – | – | – | 2.5 | 2 | 3 | 3 | 2 |
| SEM-VII | PE-CS-CYS-425A: Cloud Security | |||||||||||||
| CO1 | Classify and interpret various paradigms, models and micro-architectural design of advanced computer architecture. | |||||||||||||
| CO2 | Identify the roles of VLIW & superscalar processors and branch handling techniques for performance improvement | |||||||||||||
| CO3 | Analyze and interpret the basic usage of various MIMD architectures and relative importance of various types of static and dynamic connection. | |||||||||||||
| CO4 | Examine the various types of processors and memory hierarchy levels and cache coherence problem including software and hardware. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 1 | – | – | – | – | – | – | – | – | – | – | 2 | – |
| CO2 | 3 | 3 | 3 | 3 | – | – | – | – | – | – | – | – | 3 | 2 |
| CO3 | 3 | – | 1 | 1 | – | – | – | – | – | – | – | – | 3 | – |
| CO4 | 3 | 3 | 2 | 2 | – | – | – | – | – | – | – | – | 2 | 2 |
| AVG | 3 | 2.2 | 1.6 | 2.2 | – | – | – | – | – | – | – | – | 2.33 | 2 |
| PE-CS-CYS- 415A | Introduction to cyber laws | |||||||||||||
| CO 1 | give overview of Cyber Ethics, Intellectual Property Right and Trademark Related laws with respect to Cyber Space. | |||||||||||||
| CO 2 | Analyze and evaluate existing legal framework and laws on cyber security. | |||||||||||||
| CO 3 | analyze and evaluate the Intellectual rights and copyrights. | |||||||||||||
| CO 4 | understand cyber ethics. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 1 | – | – | – | – | – | – | – | – | – | – | 3 | 2 |
| CO2 | 1 | 1 | 3 | 3 | – | – | – | – | – | – | – | – | 2 | 1 |
| CO3 | 1 | 3 | 1 | 2 | 3 | – | – | – | – | – | – | – | 1 | 2 |
| CO4 | 2 | 2 | 2 | – | 2 | – | – | – | – | – | – | – | 2 | 1 |
| AVG | 1.75 | 1.75 | 2 | 2.5 | 2.5 | 2 | 1.5 | |||||||
| OE-CS-CYS- 403 | Ethical Hacking | |||||||||||||
| CO 1 | To gain knowledge about Ethical hacking and penetration testing. | |||||||||||||
| CO 2 | To learn about various types of attacks, attackers and security threats and vulnerabilities present in the computer system. | |||||||||||||
| CO 3 | To examine how social engineering can be done by attacker to gain access of useful & sensitive information about the confidential data. | |||||||||||||
| CO 4 | To learn about cryptography, and basics of web application attacks. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | – | 2 | — | – | – | 2 |
| CO 2 | 3 | 3 | 3 | 2 | 3 | 3 | 3 | 2 | – | – | – | – | – | 2 |
| CO 3 | 2 | 3 | – | 1 | 2 | 3 | 1 | 2 | – | – | – | – | – | 2 |
| CO 4 | 3 | 2 | 3 | 2 | 3 | 2 | – | 1 | – | – | – | – | – | 1 |
| AVG | 2.75 | 2.75 | 2.25 | 2 | 2.75 | 2.75 | 1.75 | 2 | – | 2 | – | – | – | 1.75 |
| HSS-403A | Universal Human Values II: Understanding Harmony | |||||||||||||
| CO1 | Development of a holistic perspective based on self-exploration about | |||||||||||||
| CO2 | themselves(human being),family, society and nature/existence. | |||||||||||||
| CO3 | Understanding(or developing clarity)of the harmony in the human being, family, Strengthening of self-reflection. | |||||||||||||
| CO4 | Society and nature/existence. Development of commitment and courage to act. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | – | – | – | – | – | – | – | 3 | 3 | 3 | – | – | – | – |
| CO 2 | – | – | – | – | – | – | – | 3 | 3 | 3 | – | – | – | – |
| CO 3 | – | – | – | – | – | – | – | 3 | 3 | 3 | – | – | – | – |
| CO 4 | – | – | – | – | – | – | – | 3 | 3 | 3 | – | – | – | – |
| AVG | – | – | – | – | – | – | – | 3 | 3 | 3 | – | – | – | – |
| PC-CS-CYS 407LA | Cloud Security Lab | |||||||||||||
| CO 1 | Learn various cloud deployment tools | |||||||||||||
| CO 2 | Learn about Cloud security metrics. | |||||||||||||
| CO 3 | Explore threat in cloud services & application. | |||||||||||||
| CO 4 | To get the knowledge about work with cloud management Platform | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 3 | 1 | – | – | – | – | – | – | – | – | – | – | 3 | 2 |
| CO2 | 1 | 1 | 3 | 3 | – | – | – | – | – | – | – | – | 2 | 1 |
| CO3 | 1 | 3 | 1 | 2 | 3 | – | – | – | – | – | – | – | 1 | 2 |
| CO4 | 2 | 2 | 2 | – | 2 | – | – | – | – | – | – | – | 2 | 1 |
| AVG | 1.75 | 1.75 | 2 | 2.5 | 2.5 | – | – | – | – | – | – | – | 2 | 1.5 |
| PC-CS-CYS 405LA | Cyber Attacks- OWASP Framework Lab | |||||||||||||
| CO1 | Apply the OWASP Top 10 to ensure your applications minimize the security risks in the list. | |||||||||||||
| CO2 | Explore how Web Applications are built and delivered on top of the HTTP protocol. | |||||||||||||
| CO3 | Explore threat agents, attack vectors, and impact of the ten most critical web application security Risks | |||||||||||||
| CO4 | Explore common exploitation techniques used to test software security. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO1 | 2 | 1 | 2 | 3 | – | – | – | – | – | – | – | – | 2 | 2 |
| CO2 | 2 | 2 | 2 | 2 | – | – | – | – | – | – | – | – | 3 | 2 |
| CO3 | 3 | 1 | 1 | 1 | – | – | – | – | – | – | – | – | 3 | 2 |
| CO4 | 3 | 3 | 2 | 2 | 2 | – | – | – | – | – | – | – | 2 | 2 |
| AVG | 2.5 | 1.75 | 1.75 | 2 | 2 | – | – | – | – | – | – | – | 2.5 | 2 |
| FINAL YEAR SEMESTER VIII | ||||||||||||||
| HSS-404A | Entrepreneurship and Start-ups | |||||||||||||
| CO1 | Explain the basics of entrepreneurship. | |||||||||||||
| CO2 | Analyzing Skills and Traits of an Entrepreneur | |||||||||||||
| CO3 | Crafting Business Models and Lean Start-ups. | |||||||||||||
| CO4 | Evaluating Institutions Supporting Small Business Enterprises. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | – | 3 | 2 | – | – | 1 | 3 | 3 | 3 | 3 | 2 | 3 | – | |
| CO 2 | – | 3 | 3 | 2 | 2 | 3 | 3 | 3 | 2 | 3 | 3 | 3 | – | |
| CO 3 | – | 3 | 3 | 2 | 3 | 2 | 3 | 3 | 3 | 3 | 3 | 3 | – | |
| CO 4 | – | – | – | – | – | – | 2 | 2 | 3 | 3 | 3 | – | ||
| Avg | – | – | – | – | – | – | – | – | ||||||
| PC-CS-CYS-402A | Block Chain in Cyber Security | |||||||||||||
| CO 1 | Explain the basics of blockchain concepts and architecture. | |||||||||||||
| CO 2 | Explore and analyze various processes of cyber-attacks on blockchain. | |||||||||||||
| CO 3 | Evaluate smart contract and code security issues | |||||||||||||
| CO 4 | Compile and deploy Solidity smart contracts on a blockchain network. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | 1 | 1 | 2 | – | 3 | 1 | – | 1 | 1 | 1 | 2 | 2 | 2 | 3 |
| CO 2 | – | 1 | – | 3 | 1 | 1 | – | 2 | 2 | 1 | 2 | 3 | 2 | 2 |
| CO 3 | 1 | 1 | 2 | 1 | 3 | 2 | 2 | – | 1 | 2 | 1 | 3 | 2 | 3 |
| CO 4 | 2 | 1 | 3 | 2 | 1 | – | – | 1 | 1 | 2 | 2 | 3 | 2 | 1 |
| AVG | 1 | 1 | 1.75 | 1.5 | 2 | 1 | 0.5 | 1 | 1.25 | 1.5 | 1.75 | 2.75 | 2 | 2.25 |
| OE-CS-CYS-410 | Data Injection | |||||||||||||
| CO 1 | Understand the basic concept of data injection | |||||||||||||
| CO 2 | Understand various concept of SQL that are fundamental to data injection | |||||||||||||
| CO 3 | Study of Injection vulnerabilities against hacking and web attacks | |||||||||||||
| CO 4 | Explore some introductory concepts data injection in different field | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | 3 | 3 | – | 3 | 3 | 3 | — | 2 | – | – | – | 2 | 1 | 2 |
| CO 2 | 3 | 3 | – | 3 | 3 | 3 | – | 2 | – | – | – | 2 | 1 | 1 |
| CO 3 | 2 | 2 | 3 | 3 | 2 | 2 | – | 3 | – | – | – | 2 | 2 | 1 |
| CO 4 | 2 | 2 | – | 2 | 3 | 2 | – | 2 | – | – | – | 2 | 2 | 1 |
| Avg | 2.5 | 2.5 | 3 | 2.75 | 2.75 | 2.5 | – | 2.25 | – | – | – | 2 | 1.5 | 1.25 |
| PC-CS -CYS-406LA | Cyber Security Block Chain Lab | |||||||||||||
| CO1 | Implement solidity programming language. | |||||||||||||
| CO2 | Implement various process of blockchain network. | |||||||||||||
| CO3 | Implement meta mask to execute the smart contract. | |||||||||||||
| CO4 | Implement various type of smart contract and its deployment. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | 1 | 1 | 2 | – | 3 | 1 | – | 1 | 1 | 1 | 2 | 2 | 2 | 3 |
| CO 2 | – | 1 | – | 3 | 1 | 1 | – | 2 | 2 | 1 | 2 | 3 | 2 | 2 |
| CO 3 | 1 | 1 | 2 | 1 | 3 | 2 | 2 | – | 1 | 2 | 1 | 3 | 2 | 3 |
| CO 4 | 2 | 1 | 3 | 2 | 1 | – | – | 1 | 1 | 2 | 2 | 3 | 2 | 1 |
| AVG | 1 | 1 | 1.75 | 1.5 | 2 | 1 | 0.5 | 1 | 1.25 | 1.5 | 1.75 | 2.75 | 2 | 2.25 |
| PE-CS -CYS 422A | Intrusion Detection and Prevention | |||||||||||||
| CO 1 | To understand the intrusion detection technologies | |||||||||||||
| CO 2 | To understand the intrusion detection and prevention technologies, various types of network behaviour analysis. | |||||||||||||
| CO 3 | To understand the honeypots, multiple IDS methods, tools to analyse various types of attacks like wireless attacks and their detection. | |||||||||||||
| CO4 | To understand the attack source and provides practical knowledge for dealing with intrusions in real world applications. | |||||||||||||
| Mapping | PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PO 11 | PO 12 | PSO 1 | PSO 2 |
| CO 1 | 3 | 1 | 1 | – | – | – | – | – | – | – | – | – | 3 | |
| CO 2 | 1 | 1 | 3 | 3 | – | – | – | – | – | – | – | – | 2 | |
| CO 3 | 1 | 3 | 1 | 2 | 3 | – | – | – | – | – | – | – | 1 | |
| CO 4 | 2 | 1 | 2 | – | 1 | – | – | – | – | – | – | – | 2 | |
| AVG | 2 | 1.5 | 1.75 | 2.5 | 2 | 2 | ||||||||