You are on page 1of 2

Web Technologies

Course Code: BTI Credit Units: 03

Course Objective: This course will make students to understand the basics of scripting languages to help them in designing websites and connecting them to server and databases.

Module I: Introduction and Web Development Strategies History of Web, Protocols governing Web, Creating Websites for individual and Corporate World, Cyber Laws, Web Applications, Writing Web Projects, Identification of Objects, Target Users, Web Team, Planning and Process Development. Module II: HTML, XML and Scripting List, Tables, Images, Forms, Frames, CSS Document type definition, XML schemes, Object Models, Presenting XML, Using XML Processors: DOM and SAX, Introduction to Java Script, Object in Java Script, Dynamic HTML with Java Script, Introduction to AJAX, VB Script, CGI

Module III: Java Beans and Web Servers Introduction to Java Beans, Advantage, Properties, BDK, Introduction to EJB, Java Beans API Introduction to Servelets, Lifecycle, JSDK, Servlet API, Servlet Packages: HTTP package, Working with Http request and response, Security Issues. Module IV: JSP Introduction to JSP, JSP processing, JSP Application Design, Tomcat Server, Implicit JSP objects, Conditional Processing, Declaring variables and methods, Error Handling and Debugging, Sharing data between JSP pages- Sharing Session and Application Data. Introduction to active server pages (ASP) and ASP.Net Module V: Database Connectivity Database Programming using JDBC, Studying Javax.sql.*package, accessing a database from a JSP page, Application-specific Database Action, Developing Java Beans in a JSP page, introduction to Struts framework.

Text/References: 1. Burdman, Collaborative Web Development Addison Wesley. 2. Chris Bates, Web Programing Building Internet Applications, 2nd Edition, WILEY, Dreamtech 3. Joel Sklar , Principal of web Design Vikash and Thomas Learning 4. Horstmann, CoreJava, Addison Wesley. 5. Herbert Schieldt, The Complete Reference:Java, TMH. 6. Hans Bergsten, Java Server Pages, SPD OReilly

Cyber & Information Security

Course Code:

TIT105

Credit Units: 02

This course is designed for under graduate students seeking a broad understanding of Cyber and Information Security. It will provide the student with basic knowledge of cyber crime dynamics, cyber law & Intellectual property issues, explore legal & policy developments for dealing fraud using Cyber space. The course will address issues involving hackers, malware, social theories, protocols, firewalls, and intrusion detection. In addition, this course will discuss the prevention and security measures.
Module 1: Cyber & Information Security Concepts Introduction to security, Information security, Security triad: Confidentiality, Integrity, Availability, Goals for Security, Focus of control, Security threats and attacks,Basic Terminology : Adware, Back Door, Black Hat, Botnet, Cracker , Phishing, Polymorphic Virus, Spam , Spoofing, Zombie / Zombie Drone , DOS , Trojan Horse , Information Security Services ,Types of Cyber Attacks , E-commerce Security , Computer Forensics , Steganography,Security Engineering . Module 2: Cyber Crimes Introduction of Cyber Crime: Hacking, Cyber Squatting, Cyber Stalking, Classic cybercrime, Crimes of deception, Content oriented on line crime, Social Theories, Intrusion Detection, Malicious software Use & Detection.: An Overview ofonline fraud, Identity theft, Intellectual Property Theft, Virtual Crime. Cyber Forensics: introduction, Evaluation of crime scene & evidence Collection, recovery process, Module 3: Cyber Law & IT Act Cyber Laws: Advantages, cyber lawyers, Jurisdiction and Sovereignty. The IT Act of India 2000, Intellectual property rights, Ownership & Enforcement of IPR, Defenses for Infringement , Copy right objective , Transfer of copy right, practical aspect of licensing , Benefits, jurisdictional Issues, copy right in digital media, patents in cyber world, security standards, ISO 27001, PCI DSS. Module 4: Information & Cyber Security Introduction to cyber security,Types of Security Attacks ,Hacking Techniques ,Password Cracking , Insecure Network connections, Cyber terrorism , Information Warfare and Surveillance ,Introduction to Cryptography, Message Authentication and Hash functions , Digital Signatures, Digital Watermarking, Biometric security. Cryptography: introduction and Applications, Overview and requirement of Security Management: Information Classification Process, Security Policies, Risk Management ,Procedures and Guidelines . Examination Scheme: Components Weightage (%)

A 5

CT 10

S/V/Q 8

HA 7

EE 70

CT: Class Test, HA: Home Assignment, S/V/Q: Seminar/Viva/Quiz, EE: End Semester Examination; Att: Attendance Text & References: 1. William Stallings, Network Security Essentials (Applications and Standards) Pearson Education. 2. McClure, Stuart & Scambray, Joel, et al (2005). Hacking Exposed 5th Edition. McGraw-Hill Osborne Media. 3. Ortmeier, P. J. (2005). Security Management: An Introduction, 2nd edition, Prentice Hall. 4. Skoudis, Ed & Zeltser, Lenny (2004). Malware: Fighting Malicious Code. Second Ed. Prentice Hall PTR. 5. Skoudis, Ed & Liston, Tom, (2006). Counter Hack Reloaded, Second Edition. Prentice Hall PTR. Plano, TX 6. Wall, David, (2007). Cybercrime: The Transformation of Crime in the Information Age. Polity Publishing Learning Outcomes: After completion of this course students will be able to: 1. Identify different types of issues related to Cyber and Information Security. 2. Identify various methods to ensure Cyber and Information Security. 3. Identify legal issues and laws associated to Cyber and Information Security.

You might also like