Media
Media
Media
B.Tech. V Semester
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 2
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-V Semester: B.Tech. Computer Science and Engineering (Cyber Security)
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 3
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-V Semester: B.Tech. Computer Science and Engineering (Cyber Security)
UNIX and Linux operating systems as case studies; Time OS and case
6 08
studies of Mobile OS
Total 40
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 4
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-V Semester: B.Tech. Computer Science and Engineering (Cyber Security)
Total 42
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 5
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-V Semester: B.Tech. Computer Science and Engineering (Cyber Security)
4 Branch And Bound: Traveling Salesman Problem and Lower Bound Theory.
Backtracking Algorithms and queens problem. 08
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 6
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-V Semester: B.Tech. Computer Science and Engineering (Cyber Security)
Building Cyber Warriors and Warrior Corps : The warrior and warrior
corps concept as applied to cyber organizations, The challenges of
5 training and developing a cyber-workforce from senior leadership to the 7
technical workforce.
Designing Cyber Related Commands : Mission statements, Essential
tasks, Organizational structures, Tables of organizations Training and
6 Readiness for Cyber Related Commands Mission Essential Tasks (METs), 7
Developing the cyber workforce, Plan your own training programs within
your organization.
Total 32
TEXT BOOK
Paulo Shakarian et al. “Introduction of Cyber Warfare: A Multidisciplinary Approach,” syngress,
1 Elsevier 2013.
Jeffery carr et al, “Inside Cyber Warfare: Mapping the Cyber Underworld,” O’Reilly Publication
2 December 2012.
Jason Andress et al. “Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners”
3 Syngress, Elsevier 2013.
4 R. A. Clarke, Robert Knake “Cyber War: The Next Threat to National Security and What to Do About It”
Haper Collins Publisher 2010.
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 7
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-V Semester: B.Tech. Computer Science and Engineering (Cyber Security)
TEXT BOOK
Jason Luttgens, Matthew Pepe, Kevin Mandia, Incident Response & Computer Forensics, McGraw-Hill
1 Osborne Media, 3 rdediton, 2014.
Keith J. Jones, Richard Bejtlich, Curtis W. Rose, Real Digital Forensics: Computer Security and Incident
2 Response, Paperback – Import, 2005.
John Sammons, The Basics of Digital Forensics: The Primer for Getting Started in Digital• Forensics
3 Paperback, February 24, 2012.
4 Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George
Kurtz, McGraw-Hill, 2005.
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 8
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-V Semester: B.Tech. Computer Science and Engineering (Cyber Security)
5CCS5-13: Bioinformatics
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 9
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-V Semester: B.Tech. Computer Science and Engineering (Cyber Security)
7 Composite 2D Transformations
11 Composite 3D transformations
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 10
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-V Semester: B.Tech. Computer Science and Engineering (Cyber Security)
5 Count total occurrence of each character in a given file. [Taking file from user]
6 Write a C program to insert, delete and display the entries in Symbol Table.
9 Write a lex program to count the no. of vowels and consonants in a C file.
10 Write a YACC program to recognize strings aaab,abbb using a^nb^n, where b>=0.
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 11
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-V Semester: B.Tech. Computer Science and Engineering (Cyber Security)
1 Sort a given set of elements using the Quicksort method and determine the
time required to sort the elements. Repeat the experiment for different values
of n, the number of elements in the list to be sorted and plot a graph of the
time taken versus n. The elements can be read from a file or can be generated
using the random number generator.
Find Minimum Cost Spanning Tree of a given undirected graph using Kruskal's
6
algorithm.
a. Print all the nodes reachable from a given starting node in a digraph using
7 BFS method. b. Check whether a given graph is connected or not using DFS
method.
Find Minimum Cost Spanning Tree of a given undirected graph using Prim’s
8.
algorithm.
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 12
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-V Semester: B.Tech. Computer Science and Engineering (Cyber Security)
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 13
Syllabus of
UNDERGRADUATE DEGREE COURSE
B.Tech. VI Semester
Total 28
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 2
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-VI Semester: B.Tech. Computer Science and Engineering (Cyber Security)
Total 42
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 3
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-VI Semester: B.Tech. Computer Science and Engineering (Cyber Security)
Total 28
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 4
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-VI Semester: B.Tech. Computer Science and Engineering (Cyber Security)
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 5
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-VI Semester: B.Tech. Computer Science and Engineering (Cyber Security)
Total 28
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 6
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-VI Semester: B.Tech. Computer Science and Engineering (Cyber Security)
TEXT BOOK
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 7
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-VI Semester: B.Tech. Computer Science and Engineering (Cyber Security)
TEXT BOOK
John R. Vacca, Computer Forensics: Computer Crime Scene Investigation, 2nd Edition,
1 CharlesRiverMedia, 2005
Christof Paar, Jan Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners,
2 2nd Edition, Springer’s, 2010
Ali Jahangiri, Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for
3 Ethical Hackers & IT Security Experts, Ali Jahangiri, 2009
4 Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press
Series:Computer Forensics), 2010.
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 8
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-VI Semester: B.Tech. Computer Science and Engineering (Cyber Security)
Total 28
TEXT BOOK
Rafeeq Rehman : “ Intrusion Detection with SNORT, Apache, MySQL, PHP and ACID,” 1st Edition,
1 Prentice Hall , 2003.
Christopher Kruegel,Fredrik Valeur, Giovanni Vigna: “Intrusion Detection and Correlation Challenges
2 and Solutions”, 1st Edition, Springer, 2005.
Carl Endorf, Eugene Schultz and Jim Mellander“ Intrusion Detection & Prevention”, 1st Edition, Tata
3 McGraw-Hill, 2004.
Stephen Northcutt, Judy Novak : “Network Intrusion Detection”, 3rd Edition, New Riders Publishing,
4
2002.
T. Fahringer, R. Prodan, “A Text book on Grid Application Development and Computing
5
Environment”. 6th Edition, KhannaPublihsers, 2012.
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 9
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-VI Semester: B.Tech. Computer Science and Engineering (Cyber Security)
TEXT BOOK
1 Kenneth C.Brancik “Insider Computer Fraud” Auerbach Publications Taylor & Francis Group, 2008.
2 Ankit Fadia “ Ethical Hacking” 2nd Edition Macmillan India Ltd, 2006
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 10
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-VI Semester: B.Tech. Computer Science and Engineering (Cyber Security)
Ideal filters in the frequency domain. Non Linear filtering using convolutional
4 masks. Edge detection. This experiment enables students to understand the
concept of edge detectors and their operation in noisy images.
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 11
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-VI Semester: B.Tech. Computer Science and Engineering (Cyber Security)
3 Write a program to demonstrate the working of the decision tree based ID3
algorithm. Use an appropriate data set for building the decision tree and apply
this knowledge toclassify a new sample
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 12
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-VI Semester: B.Tech. Computer Science and Engineering (Cyber Security)
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 13
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
Syllabus
III Year-VI Semester: B.Tech. Computer Science and Engineering (Cyber Security)
3 Design simple GUI application with activity and intents e.g. calculator.
Syllabus of 3rdYear B. Tech. (CCS) for students admitted in Session 2021-22 onwards. Page 14