SETH JAI PARKASH POLYTECHNIC, DAMLA

Size: px
Start display at page:

Download "SETH JAI PARKASH POLYTECHNIC, DAMLA"

Transcription

1 SETH JAI PARKASH POLYTECHNIC, DAMLA Name of the Faculty: Sh. Meep Singh Discipline: Computer Engineering Semester: Subject: DISTRIBUTED COMPUTING Lesson Plan Duration: 15 weeks (from January, 2018 to April, 2018) Work Load (Lecture/ ) per week (in hours): Lectures- 03 Week Theory Lecture (including assignment/ test) Introduction of Cloud Overview of Cloud. Characteristics of Cloud. Characteristics of Cloud Advantages of Cloud Advantages of Cloud Challenges of Cloud Challenges of Cloud Applications of Cloud Applications of Cloud of unit Assignment Introduction Service Model 13 Saas 14 Paas 15 Iaas 16 Deployment Models 17 Private Cloud 18 Private Cloud 7th 19 Public Cloud. 7th

2 Hybrid Cloud 21 Community Cloud Assignment & 22 revision of 2rd Chapter 23 TEST 24 Grid - Overview Introduction to Grid Introduction of Virtual Organizations Detail of Virtual Organizations Applications of Grid 29 Applications 30 Applications Assignment & 31 revision of Chapter 32 TEST 33 Cluster 34 Cluster 35 Introduction of Peer Networks Peer to Peer Networks Introduction of Utility 38 Utility Introduction 39 Ubiquitous 40 Ubiquitous 41 Comparison of Grid 42 Cluster Cloud 43 TEST

3 SETH JAI PARKASH POLYTECHNIC, DAMLA Name of the Faculty: Sh. Jaswinder Singh Discipline: Computer Engineering Semester: Subject: NETWORK SECURITY Lesson Plan Duration: 15 weeks (from January, 2018 to April, 2018) Work Load (Lecture/ ) per week (in hours): Lectures Theory Week Lecture (including assignment/ test) 1 Need for securing a network; Principles of Security 2 Type of attacks 3 introduction to cyber crime Introduction About Network Security 4 cyber law-indian Perspective (IT Act 2000 amended 2008), cyber ethics, Ethical hacking. What is hacking? 5 attacker, phreaker etc. 6 TEST Introduction to basic encryption decryption concept symmetric asymmetric key cryptography of Introduction About Network Security types of Attacks Installation of various antivirus software 10 overview of DES 11 RSA PGP 12 Introduction Hashing to Comparison of various antivirus software 13 MD5, SSL, SSH. 14 HTTPS Study of various parameters of firewall.

4 15 Digital Signatures, Digital certification, IPSec Installation study of various parameters of firewall. 7th TEST Definitions, preventive measures access central, checksum verification process configuration 7th Writing program in C to Encrypt/Decrypt using XOR key. Writing program in C to Encrypt/Decrypt using XOR key. 21 virus scanners 22 heuristic scanners 23 application level virus scanners, Deploying virus protection. Problem solving 24 TEST Definition types of firewalls firewall configuration Limitations of firewall. 28 TEST 29 Introduction; IDS limitations teardrop attacks Study of VPN. Study of VPN. 30 counter measures 31 Host based IDS set up 32 TEST Hling Cyber Assets- Configuration 33 policy as per stards 34 Disposable policy 35 Study of various hacking tools. Study of various hacking tools. 36 TEST

5 Basics, setting of VPN, VPN diagram configuration of required objects exchanging keys, modifying security policy applications of digital signature Disaster categories; network disasters cabling, topology, single point of failure, save configuration files; server disasters 1 applications of digital signature UPS, RAID, Clustering, Backups, server recovery TEST 1 Problem solving

6 SETH JAI PARKASH POLYTECHNIC, DAMLA Name of the Faculty: Sh. Jaswinder Singh Discipline: Computer Engineering Semester: Subject: PROGRAMMING IN JAVA Lesson Plan Duration: 15 weeks (from January, 2018 to April, 2018) Work Load (Lecture/ ) per week (in hours): Lectures Theory Week Lecture (including assignment/ test) A brief history, how Java works Java Virtual Machine (JVM) Java In Time (JIT) compiler Java features, using Java with other tools native code, Java application types, comparison with C C++ A brief history, how Java works?, Java Virtual Machine (JVM), Java In Time (JIT) compiler, Java features, using Java with other tools, native code, Java application types, 1 a) Write a program which tells whether a number is even or odd. Take a range from 1 50 b) Display the output which is given below: * * * * * * c) Write a program which sorts an array of type integer d) Write a programme to determine the sum of the following harmonic series for a given value of n: 1+1/2+1/3..+1/n the value of n should be given interactively through the keyboard Working with data types control statements flow Write a programme to convert the given temperature in Fahrenheit to Celsius using the following conversion formula C = F.32/1.8 display the value in a tabular form 10 arrays 11 casting Write a programme to find all the numbers sum of all integers greater than 100

7 12 comm line arguments less than 200 that are divisible by TEST Given a list of marks ranging from 0 to 100, write a programme to compute print the number of student should have obtained marks (a) in the range 81 to 100 (ii) In the range 61 to 80 (c) in the range 41 to 60 (d) in the range 0 to 40. The programme should use a minimum number of if statement 15 Introduction to Classes, inheritance Admission to a professional course is subject to the following conditions: a) Marks in mathematics >=60 b) Marks in physics >=50 c) Marks in chemistry >=40 d) Total in all 3 subjects >=200 (OR) Total in mathematics physics >=150 given the marks in the 3 subjects. Write the programme to process the applicationto list the eligible cidates encapsulation polymorphism constructors finalizer garbage collection, access specifier The number in the sequence Are called Fibonacci Numbers. Write programme using a do.. while loop to calculate print the first m Fibonacci numbers (Hint: after the first 2 numbers in the series, each number is the sum of the 2 preceding the numbers) 7th TEST 21 Interfaces Packages Using Java interface 7th Write a programme to evaluate the following investment equation V=P (1+r)n print the tables which would give the value of V for various combination of the following values of P, r n. 22 using Java packages 23 Problem solving

8 24 TEST TEST Over view ofexception hling method to use exception hling method available to exceptions creating your own exception classes Overview, thread basics creating running a thread The thread control methods The threads life cycle synchronization Write a program which will store the students roll no. names total marks in thedatabase Write a program which will display all those records whose marks are above 75% Exercises on implementing Java Classes. Exercises on exceptional hling TEST Java applets Vs Java applications building application with JDK building applets with JDK Exercises on creating running threads HTML for Java applets managing inputoutput stream TEST 1 1 Problem solving. Problem solving

9 SETH JAI PARKASH POLYTECHNIC, DAMLA Name of the Faculty: Sh. Vipin Gupta Discipline: Computer Engineering Semester: Subject: EDM Lesson Plan Duration: 15 weeks (from January, 2018 to April, 2018) Work Load (Lecture/ ) per week (in hours): Lectures- 03 Theory Week Lecture (including assignment/ test) 1 Introduction, Concept /Meaning its need 2 3 Qualities functions of entrepreneur barriers in entrepreneurship Sole proprietorship partnership forms of business organizations 4 NSIC, NRDC, DC:MSME 5 SIDBI, NABARD 6 Commercial Banks, SFC s TCO 7 KVIB, DIC 8 Technology Business Incubator (TBI) Science Technology Entrepreneur Parks (STEP). of previous chapter, Assignment class test Market Survey Opportunity Identification, Scanning of business environment Salient features of National State industrial policies resultant business opportunities 13 Types conduct of market survey 14 Assessment of dem supply in potential areas of growth

10 15 Identifying business opportunity 16 Considerations in product selection 7th of previous chapter, Assignment class test Project report Preparation, Preliminary project report Detailed project report including technical, economic market feasibility 21 Common errors in project report preparations 22 Exercises on preparation of project report of previous chapter, Assignment class test Introduction to Management; Definitions importance of management Functions of management: Importance Process of planning, organising, staffing, directing controlling Concept structure of an organization, Principles of management (Henri Fayol, F.W. Taylor) Types of industrial organisations a) Line organisation b) Line staff organisation c) Functional Organisation of previous chapter, Assignment class test Leadership Definition Need, Types of leadership, Manager Vs leader, Qualities functions of a leader Motivation Factors affecting motivation, Definitions characteristics, Theories of motivation (Maslow, Herzberg, McGregor) of previous chapter, Assignment class test Introduction to Man power planning, recruitment selection, Introduction objective, Human Resource Management, Introduction to performance appraisal methods ABC Analysis EOQ, Introduction functions, objectives, Material Store Management

11 Introduction, importance, its functions, Marketing sales 128 Physical distribution, Introduction to promotion mix, Sales promotion Introductions, importance its functions, Financial Management Elementary knowledge of income tax, sales tax, excise duty, custom duty VAT of previous chapter, Assignment class test Definition need, Customer Relation Management (CRM), Types of CRM 39 Just in time (JIT),Total employees Involvement, Statistical process control, Total Quality Management (TQM) Intellectual Property Right (IPR); Introductions, definition its importance 42 Infringement related to patents, copy right, trademark 43 of previous chapter, Assignment class test 1 44 entrepreneurship awareness camp 45 interactions sessions with entrepreneurs

12 SETH JAI PARKASH POLYTECHNIC, DAMLA Name of the Faculty: Sh. Sanjeev Sehgal Discipline: Computer Engineering Semester: Subject: Employability Skills-II Lesson Plan Duration: 15 weeks (from January, 2018 to April, 2018) Work Load (Lecture/ ) per week (in hours): - 02 Theory Week Lecture (including assignment/ test) week Oral Practice of students for attending mock interviews Mock interview. week Oral Practice of the students by conducting Mock interview in the institutes. week Oral Practice of the students regarding Preparing for meeting week Oral Practice of the students regarding Preparing for meeting week Oral Practice of the students for participating in Group discussion week Oral Practice of students by conducting Group discussion 7th 7th week Guiding Oral Practice of students for Seminar presentation. week Oral Practice by conducting Seminar presentation in the institute. week Oral Practice of students for Making a presentation

13 week Oral Practice by conducting presentation of students in the labs. week week week Explaining students about the Structure tools of presentation Oral Practice of the students regarding Paper reading organising such events for the students. Oral Practice by giving different task aspower point presentation. 1 1 week Organising Some Expert lecture on personality development also visits to some industries are also organised during this period. 1 1 week

day 3rd Writing program in c to Encrypt 8 th attacker 9 th test 4 th 10 th Introduction to basic encryption and decryption

day 3rd Writing program in c to Encrypt 8 th attacker 9 th test 4 th 10 th Introduction to basic encryption and decryption Lesson Plan for Even Semester Govt. Polytechnic Education Society Lisana (Rewari) Name of the Faculty: Ms. Indu Bala Discipline: Computer Engg. Semester: Subject: NETWORK SECURITY Lesson Plan Duration:

More information

Name of Faculty: (theory) (Practical) Discipline: EE Semester: 6th subject: es-ii Lesson plan Duration: 15 weeks (jan 2018 to april 2018)

Name of Faculty: (theory) (Practical) Discipline: EE Semester: 6th subject: es-ii Lesson plan Duration: 15 weeks (jan 2018 to april 2018) Name of Faculty: (theory) (Practical) Discipline: EE Semester: 6th subject: es-ii Lesson plan Duration: 1 weeks (jan 018 to april 018) theory week No. lecture no. 1 1 3 1. Oral Practice i) Mock interview

More information

6.1 NETWORK SECURITY L T P 3-3

6.1 NETWORK SECURITY L T P 3-3 6.1 NETWORK SECURITY L T P 3-3 RATIONALE This course has been designed by keeping in view the basic computer users and information system managers. The concepts needed to read through the ripe in the market

More information

DBSCR Govt. Polytechnic Education Society, Sampla LESSON PLAN

DBSCR Govt. Polytechnic Education Society, Sampla LESSON PLAN DBSCR Govt. Polytechnic Education Society, Sampla Electronics & Communication Engineering (6 th sem) LESSON PLAN NAME OF THE FACULTY: - Jatin Kochar DISCIPLINE: - ECE SEMESTER: - 6th SUBJECT MOCS Lesson

More information

3 rd What is hacking? Attacker, phreaker etc. parameters of firewall.

3 rd What is hacking? Attacker, phreaker etc. parameters of firewall. Name of the Faculty : MISS. SONICA UPADHYAY Discipline : Computer Engg. Lesson Plan Semester : 6 th Subject : Network Security Lesson plan duration : 15 weeks (from January, 018 to April, 018) Week Theory

More information

Lesson plan. Semester : 4 TH. : WEB DESIGN (practical) Lesson plan duration : 15 Weeks (January 2018 to April 2018)

Lesson plan. Semester : 4 TH. : WEB DESIGN (practical) Lesson plan duration : 15 Weeks (January 2018 to April 2018) Lesson plan Name of faculty Discipline : Manju : OMCA Semester : 4 TH Subject : WEB DESIGN (practical) Lesson plan duration : 15 Weeks (January 2018 to April 2018) week Practical day Practical topic Web

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

Week. Lecture Topic day (including assignment/test) 1 st 1 st Introduction to Module 1 st. Practical

Week. Lecture Topic day (including assignment/test) 1 st 1 st Introduction to Module 1 st. Practical Name of faculty: Gaurav Gambhir Discipline: Computer Science Semester: 6 th Subject: CSE 304 N - Essentials of Information Technology Lesson Plan Duration: 15 Weeks (from January, 2018 to April, 2018)

More information

Seth Jai Parkash Polytechnic, Damla

Seth Jai Parkash Polytechnic, Damla Seth Jai Parkash Polytechnic, Damla Name of the Faculty: Ms Richa Kharbanda Discipline: Computer Engg. Semester: 4 th Subject: DATA STRUCTURES USING C Lesson Plan Duration: 15 weeks (from January, 2018

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Object Oriented Programming

Object Oriented Programming Program Structure for Master of Computer Application (MCA) Mumbai University (With Effect from 2012-2013) Semester I Object Oriented Programming 1 C++ Fundamentals: Data types, Operators, Preprocessor

More information

Lesson Plan. Subject: OBJECT ORIENTED PROGRAMMING USING C++ :15 weeks (From January, 2018 to April,2018)

Lesson Plan. Subject: OBJECT ORIENTED PROGRAMMING USING C++ :15 weeks (From January, 2018 to April,2018) Lesson Plan Name of the Faculty Discipline Semester :Mrs. Reena Rani : Computer Engineering : IV Subject: OBJECT ORIENTED PROGRAMMING USING C++ Lesson Plan Duration :15 weeks (From January, 2018 to April,2018)

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

BTEC LEVEL 4 Higher National Certificate in Business

BTEC LEVEL 4 Higher National Certificate in Business BTEC LEVEL 4 Higher National Certificate in Business HNC Business (RQF programme) HNC Programme Specification 1. Qualification HNC 2. Programme Title Business 3. UCAS Code 4. Programme Type Full time 5.

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza C++ Programming Language Lab # 6 Functions

Faculty of Engineering Computer Engineering Department Islamic University of Gaza C++ Programming Language Lab # 6 Functions Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2013 C++ Programming Language Lab # 6 Functions C++ Programming Language Lab # 6 Functions Objective: To be familiar with

More information

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

The CPE hour is equal to 50 minutes. Credit is given in whole hours only; any fractional hours must be rounded down.

The CPE hour is equal to 50 minutes. Credit is given in whole hours only; any fractional hours must be rounded down. Division of Service Operations Bureau of Education & Testing Continuing Education Correspondence 1940 North Monroe Street Tallahassee, Florida 32399-1046 Phone: 850.921.8582 Fax: 850.922.2316 Ken Lawson,

More information

Level 5 Diploma in Computing

Level 5 Diploma in Computing Level 5 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Course Name: Information and Computers Networks Security Course Code: IT423

Course Name: Information and Computers Networks Security Course Code: IT423 Course Name: Information and Computers Networks Security Course Code: IT423 I. Basic Course Information Major or minor element of program: Major Department offering the course:information Technology Department

More information

GoVenture

GoVenture BBI1O, BBI2O, Grades 9 or 10 Introduction to Business Strand: Business Fundamentals Economic Basics Types of Businesses C C C C C Business Ethics and Social Responsibility C C C C C C C C C C International

More information

AP Computer Science A Course Syllabus

AP Computer Science A Course Syllabus AP Computer Science A Course Syllabus Textbook: Litvin, Maria and Litvin, Gary. Java Methods: Object-Oriented Programming and Data Structures. Skylight Publishing, 2011 http://www.skylit.com Course Description:

More information

Course 834 EC-Council Certified Secure Programmer Java (ECSP)

Course 834 EC-Council Certified Secure Programmer Java (ECSP) Course 834 EC-Council Certified Secure Programmer Java (ECSP) Duration: 3 days You Will Learn How To Apply Java security principles and secure coding practices Java Security Platform, Sandbox, JVM, Class

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 Course Title Course Code Regulation COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM JAVA PROGRAMMING A40503 R15-JNTUH

More information

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct Course Outline Pearson CISSP Cert Guide with Labs 17 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

IBM SmartCloud Notes Security

IBM SmartCloud Notes Security IBM Software White Paper September 2014 IBM SmartCloud Notes Security 2 IBM SmartCloud Notes Security Contents 3 Introduction 3 Service Access 4 People, Processes, and Compliance 5 Service Security IBM

More information

Computer Information Science xxx

Computer Information Science xxx 1 xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates

More information

Course D:Implementing and Managing Windows 100

Course D:Implementing and Managing Windows 100 Course 20697-1D:Implementing and Managing Windows 100 About this course: This course provides students with the knowledge and skills required to install and configure Windows 10 desktops and devices in

More information

Software Development & Education Center Security+ Certification

Software Development & Education Center Security+ Certification Software Development & Education Center Security+ Certification CompTIA Security+ Certification CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the

More information

Syllabus: The syllabus is broadly structured as follows:

Syllabus: The syllabus is broadly structured as follows: Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data

More information

CompTIA Security+ (Exam SY0-401)

CompTIA Security+ (Exam SY0-401) CompTIA Security+ (Exam SY0-401) Course Overview This course will prepare students to pass the current CompTIA Security+ SY0-401 certification exam. After taking this course, students will understand the

More information

School of Engineering & Built Environment

School of Engineering & Built Environment School of Engineering & Built Environment BEng (Hons) in Digital Security, Forensics & Ethical Hacking Programme Specification Proforma (PSP) August 2015 P a g e 1 GLASGOW CALEDONIAN UNIVERSITY Programme

More information

Course list for the Bachelor of Computer Science in INFORMATION SYSTEM

Course list for the Bachelor of Computer Science in INFORMATION SYSTEM Course list for the Bachelor of Computer Science in INFORMATION SYSTEM Course Objectives: Preparing graduates with knowledge, skills and competencies in the field of information systems, especially in

More information

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE)

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline Program: Course Title: Computer Science and Engineering (CSE) Object Oriented Programming I: Java Course

More information

Data Security and Privacy Principles IBM Cloud Services

Data Security and Privacy Principles IBM Cloud Services Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER CIENCE AND ENGINEERING COURE DECRIPTION FORM Course Title Course Code Course tructure Course Coordinator Team of

More information

B.C.A 2017 OBJECT ORIENTED PROGRAMMING USING C++ BCA303T MODULE SPECIFICATION SHEET

B.C.A 2017 OBJECT ORIENTED PROGRAMMING USING C++ BCA303T MODULE SPECIFICATION SHEET B.C.A 2017 OBJECT ORIENTED PROGRAMMING USING C++ BCA303T MODULE SPECIFICATION SHEET Course Outline The main objective of this course is to introduce students to the basic concepts of a selected language

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

(800) Toll Free (804) Fax Introduction to Java and Enterprise Java using Eclipse IDE Duration: 5 days

(800) Toll Free (804) Fax   Introduction to Java and Enterprise Java using Eclipse IDE Duration: 5 days Course Description This course introduces the Java programming language and how to develop Java applications using Eclipse 3.0. Students learn the syntax of the Java programming language, object-oriented

More information

IT Information Security Manager Job Description

IT Information Security Manager Job Description IT Information Security Manager Job Description IT Information Security Manager Responsible to: Accountable to: IT Service Manager Head of IT Services Overall Purpose To provide effective response, protection

More information

SYLLABUS JAVA COURSE DETAILS. DURATION: 60 Hours. With Live Hands-on Sessions J P I N F O T E C H

SYLLABUS JAVA COURSE DETAILS. DURATION: 60 Hours. With Live Hands-on Sessions J P I N F O T E C H JAVA COURSE DETAILS DURATION: 60 Hours With Live Hands-on Sessions J P I N F O T E C H P U D U C H E R R Y O F F I C E : # 4 5, K a m a r a j S a l a i, T h a t t a n c h a v a d y, P u d u c h e r r y

More information

COMPUTER SCIENCE/INFORMATION SYSTEMS DEGREE PLAN

COMPUTER SCIENCE/INFORMATION SYSTEMS DEGREE PLAN COMPUTER SCIENCE/INFORMATION SYSTEMS DEGREE PLAN YEAR 1, SEMESTER 1 YEAR 1, SEMESTER 2 Composition I 3 Composition II 3 Calculus I 5 Calculus II 5 Humanistic (Religion) 3 Physics I 5 Total Wellness 2 Statistics

More information

Article II - Standards Section V - Continuing Education Requirements

Article II - Standards Section V - Continuing Education Requirements Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update

More information

COURSE PLAN Regulation: R11 FACULTY DETAILS: Department::

COURSE PLAN Regulation: R11 FACULTY DETAILS: Department:: 203-4 COURSE PLAN Regulation: R FACULTY DETAILS: Name of the Faculty:: Designation: Department:: ROSHAN KAVURI Associate Professor IT COURSE DETAILS Name Of The Programme:: B.TECH Batch:: 202 Designation::

More information

3D Graphics Programming Mira Costa High School - Class Syllabus,

3D Graphics Programming Mira Costa High School - Class Syllabus, 3D Graphics Programming Mira Costa High School - Class Syllabus, 2009-2010 INSTRUCTOR: Mr. M. Williams COURSE GOALS and OBJECTIVES: 1 Learn the fundamentals of the Java language including data types and

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

The Information Technology Program (ITS) Contents What is Information Technology?... 2

The Information Technology Program (ITS) Contents What is Information Technology?... 2 The Information Technology Program (ITS) Contents What is Information Technology?... 2 Program Objectives... 2 ITS Program Major... 3 Web Design & Development Sequence... 3 The Senior Sequence... 3 ITS

More information

IT Information Systems & Technology Multiple Choice Question Paper

IT Information Systems & Technology Multiple Choice Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY ( EXTERNAL) Academic Year 2012/2013 1 st Year Examination Semester 1 IT1104 - Information

More information

BEng (Hons) Civil Engineering E410 (Under Review)

BEng (Hons) Civil Engineering E410 (Under Review) BEng (Hons) Civil Engineering E410 (Under Review) 1.0 Introduction The aim of the degree programme is to provide students with a sound knowledge and understanding of the subject of Civil Engineering and

More information

MICROCOMPUTER AND NETWORKING SYSTEMS LEA.3V

MICROCOMPUTER AND NETWORKING SYSTEMS LEA.3V MICROCOMPUTER AND NETWORKING SYSTEMS LEA.3V It was only a few years ago that the terms Internet, intranet and extranet were used only in very specialized environments. Now they are part of the everyday

More information

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES

More information

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME CO-1 Programming fundamental using C The purpose of this course is to introduce to students to the field of programming using C language. The students

More information

ADMINISTRATIVE MANAGEMENT COLLEGE

ADMINISTRATIVE MANAGEMENT COLLEGE First Semester ADMINISTRATIVE MANAGEMENT COLLEGE BACHELOR OF COMPUTER APPLICATION COURSE OUTCOME (CO) Problem solving techniques Using C CO 1: Understand the basic concepts of programming, software and

More information

High School Course Guide Business Management & Administration

High School Course Guide Business Management & Administration 88610 Business Computer Information Management I (R) 1 credit Gr: 9-12 Prerequisite: Touch Systems Data Entry Keyboarding Recommended Description: Students will gain the necessary skills to make a successful

More information

CompTIA Security+ (2008 Edition) Exam

CompTIA Security+ (2008 Edition) Exam CompTIA SY0-201 CompTIA Security+ (2008 Edition) Exam Version: 7.20 Topic 1, Volume A QUESTION NO: 1 Which of the following cryptography types provides the same level of security but uses smaller key sizes

More information

Implementing Cisco Network Security (IINS) 3.0

Implementing Cisco Network Security (IINS) 3.0 Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

E-guide Getting your CISSP Certification

E-guide Getting your CISSP Certification Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International

More information

Qualification Specification for the Knowledge Modules that form part of the BCS Level 3 Infrastructure Technician Apprenticeship

Qualification Specification for the Knowledge Modules that form part of the BCS Level 3 Infrastructure Technician Apprenticeship Qualification Specification for the Knowledge Modules that form part of the BCS Level 3 Infrastructure Technician Apprenticeship BCS Level 3 Award in Networking and Architecture BCS Level 3 Award in Mobile

More information

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Total No. of Questions : 09 ] [ Total No.of Pages : 02 CS / IT 321 (CR) Total No. of Questions : 09 ] [ Total No.of Pages : 02 III/IV B. TECH. DEGREE EXAMINATIONS, OCT / NOV - 2015 Second Semester COMPUTER SCIENCE & ENGINEERING NETWK SECURITY Time : Three

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Citrix NetScaler 10.5 Essentials and Networking (CNS-205)

Citrix NetScaler 10.5 Essentials and Networking (CNS-205) Citrix NetScaler 10.5 Essentials and Networking (CNS-205) COURSE OVERVIEW: The objective of the Citrix NetScaler 10.5 Essentials and Networking course is to provide the foundational concepts and advanced

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates

FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates Case Study FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates World s largest global provider dedicated to banking

More information

CompTIA Security+ Certification

CompTIA Security+ Certification CompTIA Security+ Certification Course Number: SY0-301 Length: 5 Days Certification Exam This course is preparation for the CompTIA Security+ Certification exam. Course Overview This course will prepare

More information

Course Information

Course Information Course Information 2018-2020 Master of Information Systems: Management and Innovation Institutt for teknologi / Department of Technology Index Index... i 1... 1 1.1 Content... 1 1.2 Name... 1 1.3 Programme

More information

Batch Programme Structure

Batch Programme Structure 2019-20 Batch Programme Structure Executive PGDM is 15 months full-time Management Programme (generally known as Fast Track MBA), which is ideal for junior and middle level executives who need a management

More information

Lesson Plan for Even semester

Lesson Plan for Even semester Lesson Plan for Even semester Govt. Polytechnic, Ambala City Name of e Faculty: Discipline: Semester: Subject: Sh. Munish Gupta (Theory + Pract.) & Dr. Surender Kumar (Practical) Computer Engg. 4 DATA

More information

The CPE hour is equal to 50 minutes. Credit is given in whole hours only; any fractional hours must be rounded down.

The CPE hour is equal to 50 minutes. Credit is given in whole hours only; any fractional hours must be rounded down. Charlie Crist, Governor Holly Benson, Secretary Division of Certified Public Accounting Veloria Kelly, Director 240 NW 76th Drive, Suite A Gainesville, FL 32607-6655 Phone: 850.487.1395 Fax: 352.333.2508

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year

More information

DISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017

DISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017 DISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017 Table of Contents Executive Summary 3 Introduction 3 vsphere Replication... 3 VMware NSX for vsphere... 4 What

More information

Ethical Hacker Foundation and Security Analysts Course Semester 2

Ethical Hacker Foundation and Security Analysts Course Semester 2 Brochure Software Education Ethical Hacker Foundation and Security Analysts Course Semester 2 The Security Management Course is a graduate-level foundation course in the Information Security space. Brochure

More information

Office Administration

Office Administration Office Administration 216 Office Administration Location: Library Tower - 2 nd Floor Program Information As part of the Business and Services Technology Division at, the Office Administration program prepares

More information

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

E-guide CISSP Prep: 4 Steps to Achieve Your Certification CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access

More information

Syllabus Honors Java Programming 1 & 2

Syllabus Honors Java Programming 1 & 2 Syllabus Honors Java Programming 1 & 2 Instructor William Tomeo Phone (719) 328-2048 Office IT Lab 175 E-mail william.tomeo@d11.org Course Description: Honors Java Programming 1 This course engages students

More information

CO Java SE 8: Fundamentals

CO Java SE 8: Fundamentals CO-83527 Java SE 8: Fundamentals Summary Duration 5 Days Audience Application Developer, Developer, Project Manager, Systems Administrator, Technical Administrator, Technical Consultant and Web Administrator

More information

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online Make Your Statement Master of Management in Library and Information Science online Graduate Certificate in Library and Information Management online Help shape the future of your field. The Master of Management

More information

- 4 hours per week (2 hours lectures + 2 hours laboratory exercises)

- 4 hours per week (2 hours lectures + 2 hours laboratory exercises) Course title: INFORMATION SYSTEMS SECURITY Lecturers Asst.Prof. Tonimir Kišasondi, Ph.D. Language of Croatian and English instruction: Schedule: 60 teaching hours - 4 hours per week (2 hours lectures +

More information

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level

More information

Academic Course Description

Academic Course Description BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.)

COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) Computer Science, Bachelor of Science (B.S.) 1 COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) The Bachelor of Science in Computer Science is built on a rigorous, highly concentrated, accredited curriculum

More information

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline Program: Course Title: Computer Networks Sessional Course Code: CSE 448 Semester: Level: Spring-2018

More information

Java Programming Course Overview. Duration: 35 hours. Price: $900

Java Programming Course Overview. Duration: 35 hours. Price: $900 978.256.9077 admissions@brightstarinstitute.com Java Programming Duration: 35 hours Price: $900 Prerequisites: Basic programming skills in a structured language. Knowledge and experience with Object- Oriented

More information

DATABASE ADMINISTRATOR

DATABASE ADMINISTRATOR DATABASE ADMINISTRATOR Department FLSA Status Reports To Supervises Information Technology Exempt IT Director N/A DISTINGUISHING CHARACTERISTICS: The principal function of an employee in this class is

More information

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs)

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs) Course Outline CISSP - Certified Information Systems Security Professional 2015 (Course & Labs) 09 Nov 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number

More information

CITY OF MONTEBELLO SYSTEMS MANAGER

CITY OF MONTEBELLO SYSTEMS MANAGER CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Citrix NetScaler 10.5 Essentials for ACE Migration (CNS-208)

Citrix NetScaler 10.5 Essentials for ACE Migration (CNS-208) Citrix NetScaler 10.5 Essentials for ACE Migration (CNS-208) COURSE OVERVIEW: The objective of the Citrix NetScaler 10.5 Essentials for ACE Migration course is to provide the foundational concepts and

More information

COURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer /blog Room No. Phone No. / Name.

COURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer  /blog Room No. Phone No. /  Name. FACULTY OF COMPUTING Page 1 of 6 COURSE 0 PRE-REQUISITE none EQUIVALENCE CONTACT HOURS 4 Lecturer e-mail/blog Room No. Phone No. 1. Dr. Siti Hajar Othman hajar@utm.my / www.comp.utm.my/hajar 347-04, N8

More information

- A course outline or agenda, indicating what subjects were covered and how much time was spent on each subject.

- A course outline or agenda, indicating what subjects were covered and how much time was spent on each subject. Division of Certified Public Accounting Veloria Kelly, Director 240 NW 76th Drive, Suite A Gainesville, FL 32607-6655 Phone: 850.487.1395 Fax: 352.333.2508 Halsey Beshears, Secretary Ron DeSantis, Governor

More information

BSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems.

BSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems. Bachelor of Science in Information Technology At Purdue Global, we employ a method called Course-Level Assessment, or CLA, to determine student mastery of Course Outcomes. Through CLA, we measure how well

More information

MSc(IT) Program. MSc(IT) Program Educational Objectives (PEO):

MSc(IT) Program. MSc(IT) Program Educational Objectives (PEO): MSc(IT) Program Master of Science (Information Technology) is an intensive program designed for students who wish to pursue a professional career in Information Technology. The courses have been carefully

More information

University of Plymouth. BA (Hons) Accounting and Finance 0414

University of Plymouth. BA (Hons) Accounting and Finance 0414 University of Plymouth Faculty of Business Plymouth Business School Programme Specification BA (Hons) Accounting and Finance 0414 Final Approved Version August 2018 1. BA (Hons) Accounting and Finance

More information

FIT5044 Network security. Unit Guide. Semester 1, 2010

FIT5044 Network security. Unit Guide. Semester 1, 2010 FIT5044 Network security Unit Guide Semester 1, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the elements contained

More information

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic

More information

Curriculum for the Academy Profession Degree Programme in Multimedia Design & Communication National section. September 2014

Curriculum for the Academy Profession Degree Programme in Multimedia Design & Communication National section. September 2014 Curriculum for the Academy Profession Degree Programme in Multimedia Design & Communication National section September 2014 1 Table of contents 1. Programme structure... 3 1.1 The programme is regulated

More information

COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN CYBERSECURITY

COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN CYBERSECURITY Computer Science, Bachelor of Science (B.S.) with a concentration in cybersecurity 1 COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN CYBERSECURITY The Bachelor of Science in Computer

More information