WAS Syllabus
WAS Syllabus
WAS Syllabus
Course Outcomes:
At the end of the course, students will be able to
Course Bloom’s
Description
Outcome Taxonomy Level
CO 1 Understand the concept of Internet Web Technologies L2
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 3
CO2 3 1 1 1 2
CO3 3 1 2 2 1 1 2 1
CO4 2 2 1 2 1 2 2 1
CO5 2 2 2 2 2 1
SYLLABUS:
Tools/Soft
CO PO ware/Dat
Module Topic
Mapping Mapping abase
Used
Introduction to Internet Web Technologies PO-1
Internet technology and Internet standards-evolution of PO-2
1 web technology-web2.0 an overview –HTML tags – CO1 PO-5 Eclipse/Ne
(12 Hrs) new tags in HTML 5 –XML technologies-DTD-
Schemaparsers-XHTML-CSS-javascript-data types- PO-6 tBeans
control structures-functions –objects - mobile web.
Advanced Dynamic Web Client Side
Programming AJAX-xmlHttpRequest object-AJAX
applications-AJAX framework -java script libraries - PO-3 Eclipse/Ne
2
JQuery-basics –animation-overview on Yahoo UI, CO2 PO-4 tBeans
(12 Hrs)
Google web toolkit libraries-Applets-overview on PO-7
javaFX applets. Basics and overview of
React.js,Anime.js.
Working with Node.js
Features, Why use Node.js, Setting up the
environment, Node programming, REPL PO-9
3 PO-10 Eclipse/Ne
Terminal,Loading modules, Package manager (NPM), CO3
(12 Hrs) Callbacks, Events - loop, emitter – eventbinding, PO-11 tBeans
Timers, Listeners, Buffers, Streams, File System,
Global Objects, Utility modules,Web Module, Express
Framework, RESTFul API, Scaling, Packaging.
Web application vulnerabilities, attacks, and
mitigation
Introduction to Web application vulnerabilities and Eclipse/Ne
attacks, URL Interpretation attacks, Authentication PO-9
4 vulnerabilities, Authorization vulnerabilities, tBeans
CO4 PO-10
(12 Hrs) Application Coding vulnerabilities, Input Validation
attacks, SQL Injection attacks, Impersonation attacks PO-12
& Buffer Overflow attacks, their effects, and the
technical & managerial mitigation controls; overview
of automated tools for web vulnerability scanning.
Current Trends in Application Security
Overview of Agile Security and DevSecOps, trends in
5 static and dynamic application security testing (SAST PO-9
CO5
(12 hrs) and DAST) understanding how application security is
PO-11
approached in Open Source, Cloud SaaS, mobile app -
development, Container Security, IoT PO-12
Text Books
1. Paul J. Deitel, Harvey Deitel, Abbey Deitel, “Internet and World Wide Web How to Program”,
Edition 5, ISBN 0132151006, 9780132151009, 2011.
2. Node.js in Action, by Mike Cantelon, Marc Harter, TJ Holowaychuk, Nathan Rajlich, Second
Edition, Aug 2017, Manning Publications
3. Node.js, MongoDB, and AngularJS Web Development, by Brad Dayley, Brendon Dayley,
Caleb Drayley, Second Edition, Feb 2018, Pearson.
4. Web Application Security, A Beginner's Guide by Bryan Sullivan and Vincent Liu, McGraw
Hill; 1st ed; 2012
5. CISSP All-In-One Exam Guide 6th Edition Paperback, Shon Harris 2012.
Reference Books:
1. Eilliote, Rusty Harold, “Java Network Programming”, 3/e, O'Reilly Media, Inc, Released
October 2013, ISBN: 9781449365950. (Module 3)
2. “Java server programming java JavaEE5 Black Book”, Kogent Solutions Inc, Dreamtech
Press, 2012. 6. AJAX, “black book”, new edition, Kogent Solutions Inc, Dreamtech Press,
2008.
3. The Tangled Web – A Guide to Securing Modern Web Applications by Michal Zalewski,
No Starch Press; 1 ed; 2011