SETH JAI PARKASH POLYTECHNIC, DAMLA
|
|
- Hugh Gray
- 5 years ago
- Views:
Transcription
1 SETH JAI PARKASH POLYTECHNIC, DAMLA Name of the Faculty: Sh. Meep Singh Discipline: Computer Engineering Semester: Subject: DISTRIBUTED COMPUTING Lesson Plan Duration: 15 weeks (from January, 2018 to April, 2018) Work Load (Lecture/ ) per week (in hours): Lectures- 03 Week Theory Lecture (including assignment/ test) Introduction of Cloud Overview of Cloud. Characteristics of Cloud. Characteristics of Cloud Advantages of Cloud Advantages of Cloud Challenges of Cloud Challenges of Cloud Applications of Cloud Applications of Cloud of unit Assignment Introduction Service Model 13 Saas 14 Paas 15 Iaas 16 Deployment Models 17 Private Cloud 18 Private Cloud 7th 19 Public Cloud. 7th
2 Hybrid Cloud 21 Community Cloud Assignment & 22 revision of 2rd Chapter 23 TEST 24 Grid - Overview Introduction to Grid Introduction of Virtual Organizations Detail of Virtual Organizations Applications of Grid 29 Applications 30 Applications Assignment & 31 revision of Chapter 32 TEST 33 Cluster 34 Cluster 35 Introduction of Peer Networks Peer to Peer Networks Introduction of Utility 38 Utility Introduction 39 Ubiquitous 40 Ubiquitous 41 Comparison of Grid 42 Cluster Cloud 43 TEST
3 SETH JAI PARKASH POLYTECHNIC, DAMLA Name of the Faculty: Sh. Jaswinder Singh Discipline: Computer Engineering Semester: Subject: NETWORK SECURITY Lesson Plan Duration: 15 weeks (from January, 2018 to April, 2018) Work Load (Lecture/ ) per week (in hours): Lectures Theory Week Lecture (including assignment/ test) 1 Need for securing a network; Principles of Security 2 Type of attacks 3 introduction to cyber crime Introduction About Network Security 4 cyber law-indian Perspective (IT Act 2000 amended 2008), cyber ethics, Ethical hacking. What is hacking? 5 attacker, phreaker etc. 6 TEST Introduction to basic encryption decryption concept symmetric asymmetric key cryptography of Introduction About Network Security types of Attacks Installation of various antivirus software 10 overview of DES 11 RSA PGP 12 Introduction Hashing to Comparison of various antivirus software 13 MD5, SSL, SSH. 14 HTTPS Study of various parameters of firewall.
4 15 Digital Signatures, Digital certification, IPSec Installation study of various parameters of firewall. 7th TEST Definitions, preventive measures access central, checksum verification process configuration 7th Writing program in C to Encrypt/Decrypt using XOR key. Writing program in C to Encrypt/Decrypt using XOR key. 21 virus scanners 22 heuristic scanners 23 application level virus scanners, Deploying virus protection. Problem solving 24 TEST Definition types of firewalls firewall configuration Limitations of firewall. 28 TEST 29 Introduction; IDS limitations teardrop attacks Study of VPN. Study of VPN. 30 counter measures 31 Host based IDS set up 32 TEST Hling Cyber Assets- Configuration 33 policy as per stards 34 Disposable policy 35 Study of various hacking tools. Study of various hacking tools. 36 TEST
5 Basics, setting of VPN, VPN diagram configuration of required objects exchanging keys, modifying security policy applications of digital signature Disaster categories; network disasters cabling, topology, single point of failure, save configuration files; server disasters 1 applications of digital signature UPS, RAID, Clustering, Backups, server recovery TEST 1 Problem solving
6 SETH JAI PARKASH POLYTECHNIC, DAMLA Name of the Faculty: Sh. Jaswinder Singh Discipline: Computer Engineering Semester: Subject: PROGRAMMING IN JAVA Lesson Plan Duration: 15 weeks (from January, 2018 to April, 2018) Work Load (Lecture/ ) per week (in hours): Lectures Theory Week Lecture (including assignment/ test) A brief history, how Java works Java Virtual Machine (JVM) Java In Time (JIT) compiler Java features, using Java with other tools native code, Java application types, comparison with C C++ A brief history, how Java works?, Java Virtual Machine (JVM), Java In Time (JIT) compiler, Java features, using Java with other tools, native code, Java application types, 1 a) Write a program which tells whether a number is even or odd. Take a range from 1 50 b) Display the output which is given below: * * * * * * c) Write a program which sorts an array of type integer d) Write a programme to determine the sum of the following harmonic series for a given value of n: 1+1/2+1/3..+1/n the value of n should be given interactively through the keyboard Working with data types control statements flow Write a programme to convert the given temperature in Fahrenheit to Celsius using the following conversion formula C = F.32/1.8 display the value in a tabular form 10 arrays 11 casting Write a programme to find all the numbers sum of all integers greater than 100
7 12 comm line arguments less than 200 that are divisible by TEST Given a list of marks ranging from 0 to 100, write a programme to compute print the number of student should have obtained marks (a) in the range 81 to 100 (ii) In the range 61 to 80 (c) in the range 41 to 60 (d) in the range 0 to 40. The programme should use a minimum number of if statement 15 Introduction to Classes, inheritance Admission to a professional course is subject to the following conditions: a) Marks in mathematics >=60 b) Marks in physics >=50 c) Marks in chemistry >=40 d) Total in all 3 subjects >=200 (OR) Total in mathematics physics >=150 given the marks in the 3 subjects. Write the programme to process the applicationto list the eligible cidates encapsulation polymorphism constructors finalizer garbage collection, access specifier The number in the sequence Are called Fibonacci Numbers. Write programme using a do.. while loop to calculate print the first m Fibonacci numbers (Hint: after the first 2 numbers in the series, each number is the sum of the 2 preceding the numbers) 7th TEST 21 Interfaces Packages Using Java interface 7th Write a programme to evaluate the following investment equation V=P (1+r)n print the tables which would give the value of V for various combination of the following values of P, r n. 22 using Java packages 23 Problem solving
8 24 TEST TEST Over view ofexception hling method to use exception hling method available to exceptions creating your own exception classes Overview, thread basics creating running a thread The thread control methods The threads life cycle synchronization Write a program which will store the students roll no. names total marks in thedatabase Write a program which will display all those records whose marks are above 75% Exercises on implementing Java Classes. Exercises on exceptional hling TEST Java applets Vs Java applications building application with JDK building applets with JDK Exercises on creating running threads HTML for Java applets managing inputoutput stream TEST 1 1 Problem solving. Problem solving
9 SETH JAI PARKASH POLYTECHNIC, DAMLA Name of the Faculty: Sh. Vipin Gupta Discipline: Computer Engineering Semester: Subject: EDM Lesson Plan Duration: 15 weeks (from January, 2018 to April, 2018) Work Load (Lecture/ ) per week (in hours): Lectures- 03 Theory Week Lecture (including assignment/ test) 1 Introduction, Concept /Meaning its need 2 3 Qualities functions of entrepreneur barriers in entrepreneurship Sole proprietorship partnership forms of business organizations 4 NSIC, NRDC, DC:MSME 5 SIDBI, NABARD 6 Commercial Banks, SFC s TCO 7 KVIB, DIC 8 Technology Business Incubator (TBI) Science Technology Entrepreneur Parks (STEP). of previous chapter, Assignment class test Market Survey Opportunity Identification, Scanning of business environment Salient features of National State industrial policies resultant business opportunities 13 Types conduct of market survey 14 Assessment of dem supply in potential areas of growth
10 15 Identifying business opportunity 16 Considerations in product selection 7th of previous chapter, Assignment class test Project report Preparation, Preliminary project report Detailed project report including technical, economic market feasibility 21 Common errors in project report preparations 22 Exercises on preparation of project report of previous chapter, Assignment class test Introduction to Management; Definitions importance of management Functions of management: Importance Process of planning, organising, staffing, directing controlling Concept structure of an organization, Principles of management (Henri Fayol, F.W. Taylor) Types of industrial organisations a) Line organisation b) Line staff organisation c) Functional Organisation of previous chapter, Assignment class test Leadership Definition Need, Types of leadership, Manager Vs leader, Qualities functions of a leader Motivation Factors affecting motivation, Definitions characteristics, Theories of motivation (Maslow, Herzberg, McGregor) of previous chapter, Assignment class test Introduction to Man power planning, recruitment selection, Introduction objective, Human Resource Management, Introduction to performance appraisal methods ABC Analysis EOQ, Introduction functions, objectives, Material Store Management
11 Introduction, importance, its functions, Marketing sales 128 Physical distribution, Introduction to promotion mix, Sales promotion Introductions, importance its functions, Financial Management Elementary knowledge of income tax, sales tax, excise duty, custom duty VAT of previous chapter, Assignment class test Definition need, Customer Relation Management (CRM), Types of CRM 39 Just in time (JIT),Total employees Involvement, Statistical process control, Total Quality Management (TQM) Intellectual Property Right (IPR); Introductions, definition its importance 42 Infringement related to patents, copy right, trademark 43 of previous chapter, Assignment class test 1 44 entrepreneurship awareness camp 45 interactions sessions with entrepreneurs
12 SETH JAI PARKASH POLYTECHNIC, DAMLA Name of the Faculty: Sh. Sanjeev Sehgal Discipline: Computer Engineering Semester: Subject: Employability Skills-II Lesson Plan Duration: 15 weeks (from January, 2018 to April, 2018) Work Load (Lecture/ ) per week (in hours): - 02 Theory Week Lecture (including assignment/ test) week Oral Practice of students for attending mock interviews Mock interview. week Oral Practice of the students by conducting Mock interview in the institutes. week Oral Practice of the students regarding Preparing for meeting week Oral Practice of the students regarding Preparing for meeting week Oral Practice of the students for participating in Group discussion week Oral Practice of students by conducting Group discussion 7th 7th week Guiding Oral Practice of students for Seminar presentation. week Oral Practice by conducting Seminar presentation in the institute. week Oral Practice of students for Making a presentation
13 week Oral Practice by conducting presentation of students in the labs. week week week Explaining students about the Structure tools of presentation Oral Practice of the students regarding Paper reading organising such events for the students. Oral Practice by giving different task aspower point presentation. 1 1 week Organising Some Expert lecture on personality development also visits to some industries are also organised during this period. 1 1 week
day 3rd Writing program in c to Encrypt 8 th attacker 9 th test 4 th 10 th Introduction to basic encryption and decryption
Lesson Plan for Even Semester Govt. Polytechnic Education Society Lisana (Rewari) Name of the Faculty: Ms. Indu Bala Discipline: Computer Engg. Semester: Subject: NETWORK SECURITY Lesson Plan Duration:
More informationName of Faculty: (theory) (Practical) Discipline: EE Semester: 6th subject: es-ii Lesson plan Duration: 15 weeks (jan 2018 to april 2018)
Name of Faculty: (theory) (Practical) Discipline: EE Semester: 6th subject: es-ii Lesson plan Duration: 1 weeks (jan 018 to april 018) theory week No. lecture no. 1 1 3 1. Oral Practice i) Mock interview
More information6.1 NETWORK SECURITY L T P 3-3
6.1 NETWORK SECURITY L T P 3-3 RATIONALE This course has been designed by keeping in view the basic computer users and information system managers. The concepts needed to read through the ripe in the market
More informationDBSCR Govt. Polytechnic Education Society, Sampla LESSON PLAN
DBSCR Govt. Polytechnic Education Society, Sampla Electronics & Communication Engineering (6 th sem) LESSON PLAN NAME OF THE FACULTY: - Jatin Kochar DISCIPLINE: - ECE SEMESTER: - 6th SUBJECT MOCS Lesson
More information3 rd What is hacking? Attacker, phreaker etc. parameters of firewall.
Name of the Faculty : MISS. SONICA UPADHYAY Discipline : Computer Engg. Lesson Plan Semester : 6 th Subject : Network Security Lesson plan duration : 15 weeks (from January, 018 to April, 018) Week Theory
More informationLesson plan. Semester : 4 TH. : WEB DESIGN (practical) Lesson plan duration : 15 Weeks (January 2018 to April 2018)
Lesson plan Name of faculty Discipline : Manju : OMCA Semester : 4 TH Subject : WEB DESIGN (practical) Lesson plan duration : 15 Weeks (January 2018 to April 2018) week Practical day Practical topic Web
More informationThe GenCyber Program. By Chris Ralph
The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest
More informationWeek. Lecture Topic day (including assignment/test) 1 st 1 st Introduction to Module 1 st. Practical
Name of faculty: Gaurav Gambhir Discipline: Computer Science Semester: 6 th Subject: CSE 304 N - Essentials of Information Technology Lesson Plan Duration: 15 Weeks (from January, 2018 to April, 2018)
More informationSeth Jai Parkash Polytechnic, Damla
Seth Jai Parkash Polytechnic, Damla Name of the Faculty: Ms Richa Kharbanda Discipline: Computer Engg. Semester: 4 th Subject: DATA STRUCTURES USING C Lesson Plan Duration: 15 weeks (from January, 2018
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationObject Oriented Programming
Program Structure for Master of Computer Application (MCA) Mumbai University (With Effect from 2012-2013) Semester I Object Oriented Programming 1 C++ Fundamentals: Data types, Operators, Preprocessor
More informationLesson Plan. Subject: OBJECT ORIENTED PROGRAMMING USING C++ :15 weeks (From January, 2018 to April,2018)
Lesson Plan Name of the Faculty Discipline Semester :Mrs. Reena Rani : Computer Engineering : IV Subject: OBJECT ORIENTED PROGRAMMING USING C++ Lesson Plan Duration :15 weeks (From January, 2018 to April,2018)
More informationCourse 832 EC-Council Computer Hacking Forensic Investigator (CHFI)
Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationBTEC LEVEL 4 Higher National Certificate in Business
BTEC LEVEL 4 Higher National Certificate in Business HNC Business (RQF programme) HNC Programme Specification 1. Qualification HNC 2. Programme Title Business 3. UCAS Code 4. Programme Type Full time 5.
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationFaculty of Engineering Computer Engineering Department Islamic University of Gaza C++ Programming Language Lab # 6 Functions
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2013 C++ Programming Language Lab # 6 Functions C++ Programming Language Lab # 6 Functions Objective: To be familiar with
More informationINFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II
Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationThe CPE hour is equal to 50 minutes. Credit is given in whole hours only; any fractional hours must be rounded down.
Division of Service Operations Bureau of Education & Testing Continuing Education Correspondence 1940 North Monroe Street Tallahassee, Florida 32399-1046 Phone: 850.921.8582 Fax: 850.922.2316 Ken Lawson,
More informationLevel 5 Diploma in Computing
Level 5 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationCourse Name: Information and Computers Networks Security Course Code: IT423
Course Name: Information and Computers Networks Security Course Code: IT423 I. Basic Course Information Major or minor element of program: Major Department offering the course:information Technology Department
More informationGoVenture
BBI1O, BBI2O, Grades 9 or 10 Introduction to Business Strand: Business Fundamentals Economic Basics Types of Businesses C C C C C Business Ethics and Social Responsibility C C C C C C C C C C International
More informationAP Computer Science A Course Syllabus
AP Computer Science A Course Syllabus Textbook: Litvin, Maria and Litvin, Gary. Java Methods: Object-Oriented Programming and Data Structures. Skylight Publishing, 2011 http://www.skylit.com Course Description:
More informationCourse 834 EC-Council Certified Secure Programmer Java (ECSP)
Course 834 EC-Council Certified Secure Programmer Java (ECSP) Duration: 3 days You Will Learn How To Apply Java security principles and secure coding practices Java Security Platform, Sandbox, JVM, Class
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 Course Title Course Code Regulation COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM JAVA PROGRAMMING A40503 R15-JNTUH
More informationPearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct
Course Outline Pearson CISSP Cert Guide with Labs 17 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training
More informationIBM SmartCloud Notes Security
IBM Software White Paper September 2014 IBM SmartCloud Notes Security 2 IBM SmartCloud Notes Security Contents 3 Introduction 3 Service Access 4 People, Processes, and Compliance 5 Service Security IBM
More informationComputer Information Science xxx
1 xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates
More informationCourse D:Implementing and Managing Windows 100
Course 20697-1D:Implementing and Managing Windows 100 About this course: This course provides students with the knowledge and skills required to install and configure Windows 10 desktops and devices in
More informationSoftware Development & Education Center Security+ Certification
Software Development & Education Center Security+ Certification CompTIA Security+ Certification CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the
More informationSyllabus: The syllabus is broadly structured as follows:
Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data
More informationCompTIA Security+ (Exam SY0-401)
CompTIA Security+ (Exam SY0-401) Course Overview This course will prepare students to pass the current CompTIA Security+ SY0-401 certification exam. After taking this course, students will understand the
More informationSchool of Engineering & Built Environment
School of Engineering & Built Environment BEng (Hons) in Digital Security, Forensics & Ethical Hacking Programme Specification Proforma (PSP) August 2015 P a g e 1 GLASGOW CALEDONIAN UNIVERSITY Programme
More informationCourse list for the Bachelor of Computer Science in INFORMATION SYSTEM
Course list for the Bachelor of Computer Science in INFORMATION SYSTEM Course Objectives: Preparing graduates with knowledge, skills and competencies in the field of information systems, especially in
More informationUniversity of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE)
University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline Program: Course Title: Computer Science and Engineering (CSE) Object Oriented Programming I: Java Course
More informationData Security and Privacy Principles IBM Cloud Services
Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER CIENCE AND ENGINEERING COURE DECRIPTION FORM Course Title Course Code Course tructure Course Coordinator Team of
More informationB.C.A 2017 OBJECT ORIENTED PROGRAMMING USING C++ BCA303T MODULE SPECIFICATION SHEET
B.C.A 2017 OBJECT ORIENTED PROGRAMMING USING C++ BCA303T MODULE SPECIFICATION SHEET Course Outline The main objective of this course is to introduce students to the basic concepts of a selected language
More informationThe fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More information(800) Toll Free (804) Fax Introduction to Java and Enterprise Java using Eclipse IDE Duration: 5 days
Course Description This course introduces the Java programming language and how to develop Java applications using Eclipse 3.0. Students learn the syntax of the Java programming language, object-oriented
More informationIT Information Security Manager Job Description
IT Information Security Manager Job Description IT Information Security Manager Responsible to: Accountable to: IT Service Manager Head of IT Services Overall Purpose To provide effective response, protection
More informationSYLLABUS JAVA COURSE DETAILS. DURATION: 60 Hours. With Live Hands-on Sessions J P I N F O T E C H
JAVA COURSE DETAILS DURATION: 60 Hours With Live Hands-on Sessions J P I N F O T E C H P U D U C H E R R Y O F F I C E : # 4 5, K a m a r a j S a l a i, T h a t t a n c h a v a d y, P u d u c h e r r y
More informationCOMPUTER SCIENCE/INFORMATION SYSTEMS DEGREE PLAN
COMPUTER SCIENCE/INFORMATION SYSTEMS DEGREE PLAN YEAR 1, SEMESTER 1 YEAR 1, SEMESTER 2 Composition I 3 Composition II 3 Calculus I 5 Calculus II 5 Humanistic (Religion) 3 Physics I 5 Total Wellness 2 Statistics
More informationArticle II - Standards Section V - Continuing Education Requirements
Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update
More informationCOURSE PLAN Regulation: R11 FACULTY DETAILS: Department::
203-4 COURSE PLAN Regulation: R FACULTY DETAILS: Name of the Faculty:: Designation: Department:: ROSHAN KAVURI Associate Professor IT COURSE DETAILS Name Of The Programme:: B.TECH Batch:: 202 Designation::
More information3D Graphics Programming Mira Costa High School - Class Syllabus,
3D Graphics Programming Mira Costa High School - Class Syllabus, 2009-2010 INSTRUCTOR: Mr. M. Williams COURSE GOALS and OBJECTIVES: 1 Learn the fundamentals of the Java language including data types and
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationThe Information Technology Program (ITS) Contents What is Information Technology?... 2
The Information Technology Program (ITS) Contents What is Information Technology?... 2 Program Objectives... 2 ITS Program Major... 3 Web Design & Development Sequence... 3 The Senior Sequence... 3 ITS
More informationIT Information Systems & Technology Multiple Choice Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY ( EXTERNAL) Academic Year 2012/2013 1 st Year Examination Semester 1 IT1104 - Information
More informationBEng (Hons) Civil Engineering E410 (Under Review)
BEng (Hons) Civil Engineering E410 (Under Review) 1.0 Introduction The aim of the degree programme is to provide students with a sound knowledge and understanding of the subject of Civil Engineering and
More informationMICROCOMPUTER AND NETWORKING SYSTEMS LEA.3V
MICROCOMPUTER AND NETWORKING SYSTEMS LEA.3V It was only a few years ago that the terms Internet, intranet and extranet were used only in very specialized environments. Now they are part of the everyday
More informationFRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES
More informationINFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME
INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME CO-1 Programming fundamental using C The purpose of this course is to introduce to students to the field of programming using C language. The students
More informationADMINISTRATIVE MANAGEMENT COLLEGE
First Semester ADMINISTRATIVE MANAGEMENT COLLEGE BACHELOR OF COMPUTER APPLICATION COURSE OUTCOME (CO) Problem solving techniques Using C CO 1: Understand the basic concepts of programming, software and
More informationHigh School Course Guide Business Management & Administration
88610 Business Computer Information Management I (R) 1 credit Gr: 9-12 Prerequisite: Touch Systems Data Entry Keyboarding Recommended Description: Students will gain the necessary skills to make a successful
More informationCompTIA Security+ (2008 Edition) Exam
CompTIA SY0-201 CompTIA Security+ (2008 Edition) Exam Version: 7.20 Topic 1, Volume A QUESTION NO: 1 Which of the following cryptography types provides the same level of security but uses smaller key sizes
More informationImplementing Cisco Network Security (IINS) 3.0
Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
More informationE-guide Getting your CISSP Certification
Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International
More informationQualification Specification for the Knowledge Modules that form part of the BCS Level 3 Infrastructure Technician Apprenticeship
Qualification Specification for the Knowledge Modules that form part of the BCS Level 3 Infrastructure Technician Apprenticeship BCS Level 3 Award in Networking and Architecture BCS Level 3 Award in Mobile
More informationTotal No. of Questions : 09 ] [ Total No.of Pages : 02
CS / IT 321 (CR) Total No. of Questions : 09 ] [ Total No.of Pages : 02 III/IV B. TECH. DEGREE EXAMINATIONS, OCT / NOV - 2015 Second Semester COMPUTER SCIENCE & ENGINEERING NETWK SECURITY Time : Three
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationCitrix NetScaler 10.5 Essentials and Networking (CNS-205)
Citrix NetScaler 10.5 Essentials and Networking (CNS-205) COURSE OVERVIEW: The objective of the Citrix NetScaler 10.5 Essentials and Networking course is to provide the foundational concepts and advanced
More informationCourse overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)
Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience
More informationFIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates
Case Study FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates World s largest global provider dedicated to banking
More informationCompTIA Security+ Certification
CompTIA Security+ Certification Course Number: SY0-301 Length: 5 Days Certification Exam This course is preparation for the CompTIA Security+ Certification exam. Course Overview This course will prepare
More informationCourse Information
Course Information 2018-2020 Master of Information Systems: Management and Innovation Institutt for teknologi / Department of Technology Index Index... i 1... 1 1.1 Content... 1 1.2 Name... 1 1.3 Programme
More informationBatch Programme Structure
2019-20 Batch Programme Structure Executive PGDM is 15 months full-time Management Programme (generally known as Fast Track MBA), which is ideal for junior and middle level executives who need a management
More informationLesson Plan for Even semester
Lesson Plan for Even semester Govt. Polytechnic, Ambala City Name of e Faculty: Discipline: Semester: Subject: Sh. Munish Gupta (Theory + Pract.) & Dr. Surender Kumar (Practical) Computer Engg. 4 DATA
More informationThe CPE hour is equal to 50 minutes. Credit is given in whole hours only; any fractional hours must be rounded down.
Charlie Crist, Governor Holly Benson, Secretary Division of Certified Public Accounting Veloria Kelly, Director 240 NW 76th Drive, Suite A Gainesville, FL 32607-6655 Phone: 850.487.1395 Fax: 352.333.2508
More informationBachelor of Information Technology (Network Security)
Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year
More informationDISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017
DISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017 Table of Contents Executive Summary 3 Introduction 3 vsphere Replication... 3 VMware NSX for vsphere... 4 What
More informationEthical Hacker Foundation and Security Analysts Course Semester 2
Brochure Software Education Ethical Hacker Foundation and Security Analysts Course Semester 2 The Security Management Course is a graduate-level foundation course in the Information Security space. Brochure
More informationOffice Administration
Office Administration 216 Office Administration Location: Library Tower - 2 nd Floor Program Information As part of the Business and Services Technology Division at, the Office Administration program prepares
More informationE-guide CISSP Prep: 4 Steps to Achieve Your Certification
CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access
More informationSyllabus Honors Java Programming 1 & 2
Syllabus Honors Java Programming 1 & 2 Instructor William Tomeo Phone (719) 328-2048 Office IT Lab 175 E-mail william.tomeo@d11.org Course Description: Honors Java Programming 1 This course engages students
More informationCO Java SE 8: Fundamentals
CO-83527 Java SE 8: Fundamentals Summary Duration 5 Days Audience Application Developer, Developer, Project Manager, Systems Administrator, Technical Administrator, Technical Consultant and Web Administrator
More informationMake Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online
Make Your Statement Master of Management in Library and Information Science online Graduate Certificate in Library and Information Management online Help shape the future of your field. The Master of Management
More information- 4 hours per week (2 hours lectures + 2 hours laboratory exercises)
Course title: INFORMATION SYSTEMS SECURITY Lecturers Asst.Prof. Tonimir Kišasondi, Ph.D. Language of Croatian and English instruction: Schedule: 60 teaching hours - 4 hours per week (2 hours lectures +
More informationKEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology
KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level
More informationAcademic Course Description
BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography
More informationInformation Systems and Tech (IST)
Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of
More informationCOMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.)
Computer Science, Bachelor of Science (B.S.) 1 COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) The Bachelor of Science in Computer Science is built on a rigorous, highly concentrated, accredited curriculum
More informationUniversity of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline
University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline Program: Course Title: Computer Networks Sessional Course Code: CSE 448 Semester: Level: Spring-2018
More informationJava Programming Course Overview. Duration: 35 hours. Price: $900
978.256.9077 admissions@brightstarinstitute.com Java Programming Duration: 35 hours Price: $900 Prerequisites: Basic programming skills in a structured language. Knowledge and experience with Object- Oriented
More informationDATABASE ADMINISTRATOR
DATABASE ADMINISTRATOR Department FLSA Status Reports To Supervises Information Technology Exempt IT Director N/A DISTINGUISHING CHARACTERISTICS: The principal function of an employee in this class is
More informationCourse Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs)
Course Outline CISSP - Certified Information Systems Security Professional 2015 (Course & Labs) 09 Nov 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number
More informationCITY OF MONTEBELLO SYSTEMS MANAGER
CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and
More informationCitrix NetScaler 10.5 Essentials for ACE Migration (CNS-208)
Citrix NetScaler 10.5 Essentials for ACE Migration (CNS-208) COURSE OVERVIEW: The objective of the Citrix NetScaler 10.5 Essentials for ACE Migration course is to provide the foundational concepts and
More informationCOURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer /blog Room No. Phone No. / Name.
FACULTY OF COMPUTING Page 1 of 6 COURSE 0 PRE-REQUISITE none EQUIVALENCE CONTACT HOURS 4 Lecturer e-mail/blog Room No. Phone No. 1. Dr. Siti Hajar Othman hajar@utm.my / www.comp.utm.my/hajar 347-04, N8
More information- A course outline or agenda, indicating what subjects were covered and how much time was spent on each subject.
Division of Certified Public Accounting Veloria Kelly, Director 240 NW 76th Drive, Suite A Gainesville, FL 32607-6655 Phone: 850.487.1395 Fax: 352.333.2508 Halsey Beshears, Secretary Ron DeSantis, Governor
More informationBSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems.
Bachelor of Science in Information Technology At Purdue Global, we employ a method called Course-Level Assessment, or CLA, to determine student mastery of Course Outcomes. Through CLA, we measure how well
More informationMSc(IT) Program. MSc(IT) Program Educational Objectives (PEO):
MSc(IT) Program Master of Science (Information Technology) is an intensive program designed for students who wish to pursue a professional career in Information Technology. The courses have been carefully
More informationUniversity of Plymouth. BA (Hons) Accounting and Finance 0414
University of Plymouth Faculty of Business Plymouth Business School Programme Specification BA (Hons) Accounting and Finance 0414 Final Approved Version August 2018 1. BA (Hons) Accounting and Finance
More informationFIT5044 Network security. Unit Guide. Semester 1, 2010
FIT5044 Network security Unit Guide Semester 1, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the elements contained
More informationCASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)
CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic
More informationCurriculum for the Academy Profession Degree Programme in Multimedia Design & Communication National section. September 2014
Curriculum for the Academy Profession Degree Programme in Multimedia Design & Communication National section September 2014 1 Table of contents 1. Programme structure... 3 1.1 The programme is regulated
More informationCOMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN CYBERSECURITY
Computer Science, Bachelor of Science (B.S.) with a concentration in cybersecurity 1 COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN CYBERSECURITY The Bachelor of Science in Computer
More information