| Course Status : | Completed |
| Course Type : | Elective |
| Language for course content : | English |
| Duration : | 12 weeks |
| Category : |
|
| Credit Points : | 4 |
| Level : | Undergraduate |
| Start Date : | 15 Jul 2024 |
| End Date : | 31 Oct 2024 |
| Enrollment Ends : | 31 Aug 2024 |
| Exam Date : | 14 Dec 2024 IST |
| Course Exam Shift : | Shift I |
Note: This exam date is subject to change based on seat availability. You can check final exam date on your hall ticket.
| Seq No | Name of the Lecture |
| 1 | Information Security |
| 2 | Network Security |
| 3 | Computer Network Reference Models |
| 4 | TCP/IP Reference Model |
| 5 | Protocol Stack |
| 6 | Transmission Control Protocol |
| 7 | Data Link Layer |
| 8 | Medium Access Control Protocols |
| 9 | TCP/IP Model-IP Addressing – I |
| 10 | TCP/IP Model-IP Addressing – II |
| 11 | TCP - Connection Management and Flow Control |
| 12 | IPV4 & IPV6 |
| 13 | UDP - User Datagram Protocol |
| 14 | IPSec Security Protocol |
| 15 | Network Topologies |
| 16 | Animated Cursor Vulnerability - Proof of Concept - I |
| 17 | Animated Cursor Vulnerability - Proof of Concept - II |
| 18 | Electronic Mail |
| 19 | Email Security Protocols |
| 20 | WWW Security |
| 21 | Mobile Code Security |
| 22 | Transmission Media |
| 23 | Ethernet and Fast Ethernet |
| 24 | Ethernet Security |
| 25 | Gigabit Ethernet |
| 26 | 10 Gigabit Ethernet |
| 27 | ISDN |
| 28 | Stream Control Transmission Protocol |
| 29 | ATM Network Security Protocol |
| 30 | Wireless Networks |
| 31 | Wi-Fi Technology |
| 32 | Wi-Fi Security Protocol |
| 33 | Bluetooth Networks and Security Protocols |
| 34 | Virtual Private Networks |
| 35 | WiMAX Technology and its Security |
| 36 | Introduction to Mobile IP and Addressing |
| 37 | Cloud Computing Architecture |
| 38 | Cloud Computing Security |
| 39 | GSM Architecture |
| 40 | MANET - I |
| 41 | MANET – Routing Protocols |
| 42 | 3G Network and Security |
| 43 | 4G LTE |
| 44 | 5G |
| 45 | VoIP Protocols |
| 46 | Introduction to DDoS |
| 47 | Defence to DDoS Attacks |

DOWNLOAD APP
FOLLOW US