GUJARAT TECHNOLOGICAL UNIVERSITY ME - Computer Engineering ( IT Systems and Network Security ) PROPOSED TEACHING SCHEME

Semester-I Subject Code

710001 715101 715102 715103 715104

University Exam(E)

Teaching Scheme(Hours) Subject Name

2 3 3 3 3 3 3

2 0 0 0 0 0 0

0 2 0 2 0 0 0

3 4 3 4 3 3 3

70 70 70 70 70 70 70

Practical /Viva 0 30 0 30 0 0 0

0 0 0

0 0 0

6 6 6

2 2 2

0 0 0

80 80 80

Theory Tutorial Practical

Communication & Research Skills Network Programming Advanced Operating System and Management Object Oriented Programming Network Defense and Countermeasures (NDC) Elective-I Elective-II

Credits

Theory

Mid Sem Test (M) 30 30 30 30 30 30 30 0 0 0

Practical Total (I) Mark

Branch Code

20 20 20 20 20 20 20

120 150 120 150 120 120 120

51 51 51 51 51 51 51

20 20 20

100 100 100

51 51 51

Practical

715109 715110 715111

Advanced Operating System and Management(Practical) Network & Web Programming(Practical) Network Defense and Countermeasures (NDC)(Practical)

Semester-II Subject Code

Teaching Scheme(Hours) Subject Name

3 3 3 3 3 3

0 0 0 0 0 0

0 0 0 0 0 0

3 3 3 3 3 3

70 70 70 70 70 70

Practical /Viva 0 0 0 0 0 0

0 0 0

0 0 0

8 8 6

3 3 2

0 0 0

80 80 80

Theory Tutorial Practical

725101 725102 725103 725104

Application Security IT Service Management Information System & Network Security PKI and Biometrics Elective -III Elective- IV

725109 725110 725111

Application Security(Practical) PKI and Biometrics(Practical) Information System & Network Security(Practical)

University Exam(E) Credits

Theory

Mid Sem Test 30 30 30 30 30 30 0 0 0

Practical Total (I) Mark

Branch Code

20 20 20 20 20 20

120 120 120 120 120 120

51 51 51 51 51 51

20 20 20

100 100 100

51 51 51

Practical

Semester-III Teaching Scheme(Hours)

Subject Code

Subject Name

735101 735102 730001 730002 730003

Cyber Forensics Data Center Management Seminar Presentation of Literature Review Dissertation Phase - I

Theory Tutorial Practical

3 3 0 0

0 0 0 0

2 0 4 18

University Exam(E) Credits

4 3 2 2 9

Theory 70 70 0 0 0

Practical /Viva 30 0 0 0 80

Mid Sem Test 30 30 0 0 0

Practical Total (I) Mark 20 20 100 100 20

150 120 100 100 100

Branch Code 51 51 51 51 51

Semester-IV Teaching Scheme(Hours)

Subject Code

Subject Name

740001 740002

Mid semester Thesis Progress Review Dissertation Phase - II

Group - 1 Elective I & II in 1st semester Subject Code

Subject Name

715105 715106 715107 715108

Distributed Computing Parallel Programming Cluster and Grid Computing Cloud Computing

Group - 2 Elective III& IV in 2nd semester Subject Code

Subject Name

725105 725106 725107 725108

Storage Area Network Ethical Hacking & Cyber Laws Security Standards and Audit Software Engineering

Theory Tutorial Practical

-

-

24

University Exam(E) Credits

5 10

Theory 0 0

Practical /Viva 0 80

Mid Sem Test (M) 0 0

Practical Total (I) Mark 100 20

100 100

Branch Code 51 51

ME IT System and Network Security Compiler I-IV - Gujarat ...

ME - Computer Engineering ( IT Systems and Network Security ). Practical. (I) ... 715107 Cluster and Grid Computing. 715108 Cloud Computing. 725105 ...

22KB Sizes 16 Downloads 129 Views

Recommend Documents

ME IT System and Network Security Compiler I-IV - Gujarat ...
Practical. /Viva. 725101 Application Security. 3. 0 ... 725109 Application Security(Practical). 0. 0. 8. 3. 0. 80. 0. 20 ... 715108 Cloud Computing. 725105 Storage ...

Security and Communication Network
Soft computing techniques, such as Fuzzy Logic, Neural Networks, Evolutionary. Computing, Rough Sets and other similar techniques, have been proved ...

Security and Communication Network
pattern detection, data segmentation, data mining, adaptive control, information assurance, etc. Recently, soft computing is widely used in information system for assurance. For example, neural networks are used for intrusion detection or prevention,

Download Cryptography and Network Security: Principles and ...
Download Cryptography and Network Security: Principles and Practice: United States Edition. (The William Stallings Books on Computer & Data.

Network Security
[Read PDF] Network Security: Private. Communication in a Public ... Series in Computer Networking and Distributed). Best Online ... Information Technology Law.

Network Security and Storage Security: Symmetries ...
application of network-oriented solutions. ... of data, or network communication, and the timeshifting of data, or storage. ..... scribing to a data service. The link ...

Network Security and Storage Security: Symmetries ...
According to this view, the network or storage device is simply a path from ..... held asymmetric private keys, the authenticity and integrity of the public keys are ...