You are on page 1of 152

SCHEME OF STUDIES

DIPLOMA IN COMPUTER SCIENCE &


ENGINEERING
(C-20)

Department of Collegiate & Technical Education Bengaluru-560001 Page 1


CURRICULUM STRUCTURE
V Semester Scheme of Studies - Diploma in Computer Science and Engineering [C-20]
Course Pathway Title Hours per CIE SEE-1 SEE-2

Course Category /
Code Semester Marks Marks Mark

Total contact hrs

Grade

SGPA and CGPA


(including CIE
Min Marks for
Total Marks

Grade Point
(Theory (Practical)
Pathway

Passing

marks)
Credits
Department
)

/Semester

Assigned
L T P Max Min Max Min Max Min

Teaching

Programme Specialization Pathway


20CS51I 1. Artificial 104 52 312 468 24 240 96 60 24 100 40 400 160
CSE Intelligence and
Specialization Machine Learning
pathways in 20CS52I 2. Full Stack 104 52 312 468 24 240 96 60 24 100 40 400 160
emerging areas Development
1

Student may
select any one 20CS53I 3. Cloud Computing 104 52 312 468 24 240 96 60 24 100 40 400 160
of the
specializations 20CS54I 4. Cyber Security 104 52 312 468 24 240 96 60 24 100 40 400 160

Science and Research Pathway L T P Total CIE SEE

Credit
Marks Marks

s
Max Min Max Min
BS/SC 2OSC51T Paper 1-Applied 52 26 0 78 6 50 20 50 20 100 40
Specialization Mathematics

Both SGPA & CGPA


pathway in 2OSC52T Paper 2 – Applied 52 0 52 104 6 50 20 50 20 100 40
Science and Science
Research 2ORM53T Paper 3 – Research 52 0 52 104 6 50 20 50 20 100 40
2

(Student need Methodology


to take all four 2OTW54P Paper 4 – Technical 39 13 52 104 6 60 40 16 100 40
papers in this Writing 24
pathway) Total 195 39 156 390 24 210 84 190 76 400 160

Entrepreneurship Pathway
ES/CSE 20ET51I Entrepreneurship 104 52 312 468 24 240 96 160 64 400 160
and Start up
3

L:- Lecture T:- Tutorial P:- Practical BS- Basic Science:: ES-Engineering Science:: SC: Science , I: Integrated :: CS: Computer Science and Engineering

Note : In 5th Semester student need to select any one of the pathways consisting of 24 credits

Department of Collegiate & Technical Education Bengaluru-560001 Page 2


VI Semester Scheme of Studies - Diploma in Computer Science and Engineering [C-20]
Hours per CIE SEE

Departmen

for Passing

CIE marks)
contact hrs

Min Marks

(including
Category /

SGPA and
/Semester

Assigned
Semester Marks Marks

Pathway

Credits
Teaching

Marks

Grade
Grade
Course

Point

CGPA
Total
Course

Course
Code

Total
L T P Max Min Max Min

t
Internship/Project

Both SGPA &


Internshi

CGPA
40 Hours / week
ES/CSE 20CS61P Internship / Project 640 16 240 96 160 64 400 160
p

Total 16 Weeks

P: Project/Internship

Department of Collegiate & Technical Education Bengaluru-560001 Page 3


Artificial Intelligence
and
Machine Learning

Department of Collegiate & Technical Education Bengaluru-560001 Page 4


Diploma in Computer Science & Engineering
Program Computer Science & Semester 5
Engineering
Course Code 20CS51I Type of Course L:T:P (104:52:312)
Course Name Artificial Intelligence and Credits 24
Machine Learning
CIE Marks 240 SEE Marks 160
Introduction:

Welcome to the curriculum for the Artificial Intelligence and Machine Learning (AI&ML)
Specialisation. This specialisation course is taught in Bootcamp mode. Bootcamps are 12 weeks,
intense learning sessions designed to prepare you for the practical world – ready for either industry
or becoming an entrepreneur. You will be assisted through the course, with development-based
assessments to enable progressive learning. In this course, you’ll learn how to produce a computer-
assisted solution when data is too complex for humans to find answers as they combine both data
science and machine learning skills that are needed for today’s job market.

Some common examples include; Amazon Alexa - converting spoken audio into language; Google
Image Search – uses image recognition to return specific search results; Samsung Smart Fridges –
uses data and machine learning to produce intuitions about your behaviour. Leading to the
successful completion of this bootcamp, you shall be equipped to either do an internship at an
organization working in AI or do a project in AI. After the completion of your Diploma, you shall be
ready to take up roles like Machine Learning Engineer, Data Scientist, Data Analyst, and more.

This course will teach you Fundamentals of AI, Python and Python libraries, data visualization,
machine learning models, maths like linear algebra, data interpretation, deep learning, Version
control system, cloud deployment and more. Details of the curriculum is presented in the sections
below.

Pre-requisite

Before the start of this specialisation course, you would have completed the following courses;

In the 1st year of study, you would have studied Engineering Mathematics, Communication Skills,
Computer Aided Engineering Graphics, Statistics & Analysis, Basic IT Skills, Fundamentals of
Diploma in Computer Science & Engineering C 20 : 2020 - 21

Computer, Fundamentals of Electrical and Electronics Engineering, Project Management skills and
Multimedia & Animation.

In the 2nd year of study, you would have studied Python Programming, Computer Hardware,
Maintenance and Administration, Computer Networks, Database System Concepts and PL/SQL,
Data Structures with Python, Operating System and Administration, Object oriented programming
and Design with Java, Software Engineering principles and practices.

In this year of study, you shall be applying your previous years learning along with specialised field
of study into projects and real-world applications.

Course Cohort Owner

A Course Cohort Owner is a faculty from the core discipline, who is fully responsible for one
specialised field of study and the cohort of students who have chosen to study that specialised field
of study.

Guidelines for Cohort Owner


1. Each Specialized field of study is restricted to a Cohort of 20 students which could include
students from other relevant programs.
2. One faculty from the Core Discipline shall be the Cohort Owner, who for teaching and
learning in allied disciplines can work with faculty from other disciplines or industry experts.
3. The course shall be delivered in boot camp mode spanning over 12 weeks of study, weekly
developmental assessments and culminating in a mini capstone.
4. The industry session shall be addressed by industry subject experts in the discipline only.
5. The cohort owner shall be responsible to identify experts from the relevant field and
organize industry session as per schedule.
6. Cohort owner shall plan and accompany the cohort for any industrial visits.
7. Cohort owner shall maintain and document industrial assignments, weekly assessments,
practices and mini project.
8. The cohort owner shall coordinate with faculties across programs needed for their course to
ensure seamless delivery as per time table
9. The cohort owner along with classroom sessions can augment or use supplementally
teaching and learning opportunities including good quality online courses available on
platforms like Karnataka LMS, Infosys Springboard, NPTEL, Unacademy, SWAYAM , etc.

Department of Collegiate & Technical Education Bengaluru-560001 Page 6


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Course outcome: A student should be able to


CO1 Explain the concept of AI, its applications, constituents and challenges of ethics in AI.

CO2 Analyze and visualize any given dataset

CO3 Evaluate, optimize, build and test an AI model for a given requirement

CO4 Perform comparative analysis of methods or algorithms for a given requirement

CO5 Select the appropriate tools, production environment and deploy the model.

Department of Collegiate & Technical Education Bengaluru-560001 Page 7


Detailed course plan
Wee Da
CO PO 1st session (9am to 1 pm) L T P 2ND session (1.30pm to 4.30pm) L T P
k ys
- AI influence in companies viz, Amazon,
Microsoft, Google, IBM
- Latest developments in AI domain
- Google's DeepMind AI Just Taught Itself To
Walk - YouTube
- Introducing Amazon Go and the world’s
most advanced shopping technology -
1. AI based movie (Screening)
1 1 1 4 2 1
YouTube
- IBM Watson
- Understanding the evolution of AI and HMI
(human machine interface)
1
- Discussion on how AI will Impact of daily life,
work life, work force, jobs, products and
services – T

Fundamentals of AI
- Significance of data in AI
- What is artificial intelligence?
- AI Software Development life cycle
- How AI works
- Compare traditional software development
1 1 2 - Purpose of AI 3 1 2 1
with AI Software Development
- Types of Artificial Intelligence
- Example – Game rules (Chess)
- Goals of AI
Explore and prepare a report on all popular AI
- Applications of AI
cloud services (ML & DL) offered by vendors - T
Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Ethics in AI
Examples of AI in real world - T
Why Do We Need a Version Control System?
Fundamentals of Git
Git installation and setup
Git Branching and merging
basic local Git operations
Basic
▪ creating a repository,
▪ Creating and switching to new branches
5 4 3 ▪ cloning a repository, 1 3 3
▪ Switching between branches
▪ making and recording changes
▪ Merging local branches together
▪ staging and committing changes,
▪ viewing the history of all the changes
▪ undoing changes

GitHub
- Basics of distributed git
- Account creation and configuration Create repository – named mini project-1

- Create and push to repositories Push the same to GitHub


5 4 4 1 3 3
- versioning TOC - Git Essentials: Become a Git and GitHub Ninja
| Infosys Springboard (onwingspan.com)
- Collaboration
- Migration

5 Developmental Assessment Assessment Review and corrective action 3

1 1,5 6 Real industry experience of AI 2 3 Weekly Assignment(1PM-2PM)


2 1 1 1 Peer Review 4 Machine Learning 2 1

Department of Collegiate & Technical Education Bengaluru-560001 Page 9


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Fundamentals
- Machine learning types
- Machine learning workflow
- Machine learning applications
- Challenges in ML
- Building a model – steps involved
- Pipelines
▪ Data engineering
▪ Machine learning
▪ Deployment
- What is Data Science?
- How Data Science works?
- Data Science uses
Group discussion - Examples of ML in everyday
life / Use of Machine Learning in Daily Life
Machine Leaning Terminologies - T
TOC - Machine Learning Fundamentals | Infosys
Springboard (onwingspan.com)
Prediction – continuous value
Introduction to Cloud Computing Introduction to Containers
Essentials of Cloud Computing Cloud Native application development
1,5 1,4 2 2 2 1 2
Cloud Deployment Models Explore AI (ML and DL) services across public
Cloud Service Models cloud platforms

Department of Collegiate & Technical Education Bengaluru-560001 Page 10


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Serverless Services Note : teacher has to choose a public cloud


Major Cloud service Providers platform to perform the fallowing activities
Virtualization - Getting to know cloud platform
Explore the cloud service providers and services - Creating an account
offered by them - T

Walking through the administrative console and Essentials of cloud billing

Cloud SDK Cloud VPN

Explore Virtual machines (PaaS, Iaas and SaaS) SLA


1,5 4 3 1 3 Deploy one simple web app on web server using 1 2
and storage options
Deploy a simple application on the cloud cloud platform

AI Platform overview TOC - Essentials of Cloud Computing | Infosys


Springboard (onwingspan.com)
Big Data Python recap
- What is Big Data? Database connectivity
- Vs of Big Data
- Sources of data
- Role of Big Data in AI&ML
1,3, Python Packages for Machine Learning and Deep
1 4 1 3 1 2
4
Learning
- Scientifics computing libraries
- Visualization Libraries
- Algorithmic libraries
Environment setup: install required packages

Department of Collegiate & Technical Education Bengaluru-560001 Page 11


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Explore above listed packages

5 Developmental Assessment Assessment Review and corrective action 3


2,3 Build applications using AI cloud services
1,5 6 2 3 Weekly Assignment
,4
Explore NumPy Module
- Array Aggregation Functions
- Vectorized Operations
2,3 Peer review - Use Map, Filter, Reduce and Lambda
3 1,5 1 4 3
,4
Functions with NumPy
-
TOC - Pandas and NumPy Tips, Tricks, and
Techniques | Infosys Springboard (onwingspan.com)
Explore Pandas modules
- Aggregation and Grouping
- Time Series Operations
- Pivot and melt function
2,3
1,5 2 - Use Map, Filter, Reduce and Lambda 1 3 Contd. 3
,4
Functions with Pandas dataframes
-
TOC - Unpacking NumPy and Pandas | Infosys
Springboard (onwingspan.com)

Data visualization with python


2,3 - Visualization fundamentals - Visualizing Amounts
2,5 3 2 2 3
,4
- Why visualization - Visualizing distributions

Department of Collegiate & Technical Education Bengaluru-560001 Page 12


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Coordinate Systems and Axes - Visualizing proportions


- Directory of Visualizations - Visualizing associations
Amounts, Distributions, Proportions, x-y - Visualizing time series
Relationships, Uncertainty
Basics of python visualization with Matplotlib
- Understand the anatomy of a figure
- Plot creation
- Plotting routines
- Basic plot customizations
- Saving plots
- Visualizing trends
- Visualizing uncertainty
- Visualizing categorical data
Basics of python visualization with Seaborn
2,3, - visualize proportions
2,5 4 1 3 The Course Overview - Viewer Page | Infosys 3
4 - visualize data on multi-plot grid
Springboard (onwingspan.com)
- Composite views for informative summaries
of data

5 CIE 1 – Written and Practice Test Assessment Review and corrective action 3
How to create project plan and product backlog
for AI project
1 4 6 2 3 Weekly Assignment
Create Git Repository for following
Regression Project - ML / deep learning

Department of Collegiate & Technical Education Bengaluru-560001 Page 13


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Classification Project – ML / deep learning


Clustering project – ML / deep learning
Natural Language Processing – ML / deep
learning
Data engineering pipeline
Peer review Data Collection
Mini Project Activity (2) - Population and sample
- Regression - Types of data
- Classification ▪ Data type (type 1 (cross sectional, time
(Individual/ Team of 2) series), type 2 (univariate,
2,3 1 - Define Problem statement (solution to be multivariate))
2 4 2 1
,4
presented at the semester end) ▪ Variable types (categorical, ordinal,
- Create project plan and product backlog ratio, interval)

4 - Create git repository for the project - Data Collection


- Work progress should be monitored Key terminologies in Statistics – T
weekly Mini Project Activity
- Data collection for the stated problem
Probability Exploratory data analysis
- Basic concepts - overview
- Conditional and Joint probability - EDA goals and benefits
2 1,3 2 2 2 1 2
- Bayes’ Theorem Univariate data analysis
Probability Distributions - Characterizing data with descriptive statistics
- Discrete - Univariate distribution plots

Department of Collegiate & Technical Education Bengaluru-560001 Page 14


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Continuous - Univariate comparison plots


- Central Limit Theorem - Univariate composition plots
Infosys Springboard (onwingspan.com) Mini Project Activity
TOC - Probability Distribution using Python | Infosys Data Exploration and analysis for the stated problem
Springboard (onwingspan.com)
Univariate analysis tests Multivariate analysis
Hypothesis testing Finding relationship in data
2,3 Error, Test statistic, type, interpreting test
2 3 1 3 - Covariance 1 2
,4
statistics. - Correlation
Understanding p-value
Linear algebra using python
- Multivariate distribution plot
- Scalars
Multivariate comparison plot
- Vectors
Multivariate relationship plot
- Matrices
Multivariate composition plot
- Tensors
- TOC - Exploratory Data Analysis with Pandas
2,3 Gradients
2 4 4 1 2
,4 and Python 3.x | Infosys Springboard
- Eigen values and eigen vectors
(onwingspan.com)
- Norms and Eigen decomposition
Mini Project Activity – Status review
(Data Exploration and analysis for the stated TOC - Basics of Linear Algebra using Python | Infosys
Springboard (onwingspan.com)
problem) Interactive Scenario: Introduction to Vector Algebra
Using Python (oreilly.com)
5 Developmental Assessment Assessment Review and corrective action 3

Department of Collegiate & Technical Education Bengaluru-560001 Page 15


Diploma in Computer Science & Engineering C 20 : 2020 - 21

2,3
2 6 Statistics and Linear algebra 2 3 Weekly assignment
,4
Data Preprocessing
Importance of data preprocessing
Data cleaning
- Assess Data quality
- Data anomalies
- Detect missing values with pandas dataframe
Peer review
functions: .info() and .isna()
2,3 - Diagnose type of missing values with visual
2,5 1 4 1 2
,4 Mini Project Activity – Status review
and statistical methods (eg. chi-squared test of
independence)
Approaches to deal with missing values
5
▪ Keep the missing value as is
▪ Remove data objects with missing values
▪ Remove the attributes with missing values
▪ Estimate and impute missing values
Practice: Dealing with missing values with Dealing with outliers
different approaches
- Do nothing

Outliers - Replace with the upper cap or lower


2,3
2,5 2 1 3 3
,4 Detecting outliers cap

▪ univariate outlier detection - Perform a log transformation

▪ bivariate outlier detection - Remove data objects with outliers

Department of Collegiate & Technical Education Bengaluru-560001 Page 16


Diploma in Computer Science & Engineering C 20 : 2020 - 21

▪ Time series outlier detection Practice: Dealing with outliers with different
approaches
TOC - Data Preprocessing | Infosys Springboard
(onwingspan.com)
TOC - Data Cleaning and Transformation | Infosys
Springboard (onwingspan.com)

Data reduction
Data Integration - Distinction between data reduction and data
- Overview redundancy
- data integration challenges - Objectives
2,3 3 - Approaches - Methods
2,5 1 3 1 2
,4
- Adding attributes o numerosity data reduction
- Adding data objects o dimensionality data reduction
Practice: data integration Practice: Data reduction with numerosity data
reduction method
Data transformation
Need for data transformation.
- Normalization Data transformation with
2,3 - Standardization - ranking transformation
2,5 4 1 3 3
,4
Data transformation with - discretization
- binary coding
- ranking transformation

Department of Collegiate & Technical Education Bengaluru-560001 Page 17


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- discretization

5 CIE 2 – Written and Practice Test Assessment Review and corrective action 3
2,3
2,5 6 Feature engineering 2 3 Weekly Assignment
,4
Data Splitting
Importance of data splitting
- Training set
- Validation set
Peer review
- Testing set
2,3 2,3 Mini Project Activity – Status review
1 4 1 2
,5 ,4 Underfitting and overfitting
Practice : split training and testing data sets in
Python using train_test_split() of sci-kit learn.
Explore the options of train_test_split()
6
Machine Learning pipeline: Understanding Simple linear regression
Model training - Regression equation
- Supervised Learning: Regression - Assumptions
- What is Regression? - Gradient descent
2,3 2,3 - Types of regression - Setting up the regression problem
2 2 2 1 2
,5 ,4
- Regularization in ML Practice: student score based on study hours
- Real-Life Applications - T Problem statement:
- Linear regression • Create a model to analyses the relation
Overview between CIE and SEE result

Department of Collegiate & Technical Education Bengaluru-560001 Page 18


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Types • Create a model to analyze the relation


- simple linear regression between crop yield and rain fall rate
- Multiple linear regression Build linear regression model using
- Polynomial linear regression - Stats model
Applications of Linear Regression - T - Scikit learn

Model Evaluation & testing


Evaluate regression model: Cross-validation
Evaluation Metric Why do we need Cross-Validation?
- Coefficient of Determination or R-Squared Techniques
2,3 2,3
3 2 2 1 2
,5 ,4 (R2) - Hold out method
- Root Mean Squared Error (RSME) - Leave One Out Cross-Validation
- Optimize regression model - K-Fold Cross-Validation
- Gradient descent
Multiple Linear Regression
- Overview
- Assumptions Implementation in python
- Normal Equation - Build regression model
2,3 2,3 - Applications
4 2 2 - Evaluate the model 3
,5 ,4
Identification and collection of regression - To minimize the cost function
dataset - T
Perform data exploration, preprocessing and
splitting on datasets like

Department of Collegiate & Technical Education Bengaluru-560001 Page 19


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Boston housing price from sci-kit learn


datasets
- Cricket match result - past data
- Performance of a cricket player - past data
- Crop yield - past data

5 Developmental Assessment Assessment Review and corrective action 3


Optimization and performance matrices for
2,3 2,3
6 2 3 Weekly Assignment
,5 ,4 regression
Explore other regression algorithms - T
Rebuild the model with other regression
algorithms such as
Peer Review
2,3 2,3 - Random Forest Regressor
1 Mini Project Activity – Status review 4 3
,5 ,4 - Support Vector Regression
- Lasso regression
Evaluate and compare the performance of each.
7
Supervised learning – classification Decision trees
What is classification? - What is decision tree?
Types: - Understanding Entropy, information gain
2,3 2,3 - Binary classification - How to stop overfitting
2 2 2 3
,5 ,4
- Multi-Label Classification - Pruning
- Multi-Class Classification DecisionTreeClassifier
- Imbalanced Classification - How it works?

Department of Collegiate & Technical Education Bengaluru-560001 Page 20


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Classification models - Understanding the parameters


Applications - T - Applications
Practice: Iris dataset from sci-kit learn
Perform data exploration, preprocessing and
splitting
Evaluation Metrics for Classification
- confusion matrix,
- Accuracy
Build decision tree-based model in python for
- Precision and Recall
like
- Specificity
2,3 2,3 Breast Cancer Wisconsin (diagnostic) dataset
3 4 1 2
,5 ,4 - F1-score
from sci-kit learn Or any classification dataset
- AUC-ROC
from UCI , Kaggle
▪ How to compute
▪ How does it work
▪ When to use
Hyper parameter tuning for
Evaluation Metrics for Classification- contd.
2,3 2,3 DecisionTreeClassifier
4 Evaluation of decision tree model with different 4 3
,5 ,4
metrics

5 Development Assessment Assessment Review and corrective action 3


2,3 2,3
6 Hyper parameter tuning for classification 2 3 Weekly Assignment
,5 ,4
Peer review Logistic regression
2,3 2,3
8 1 4 1 2
,5 ,4 Mini Project Activity – Status review - Overview

Department of Collegiate & Technical Education Bengaluru-560001 Page 21


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Types
- How does logistic regression work?
- Assumptions
- Understanding sigmoid function
- Applications
Practice: build Logistic regression model in
python
Support Vector Machine
- Introduction to SVM
build Logistic regression model in python - How does it work?
2,3 2,3
2 2 2 2 1
,5 ,4 Evaluation and optimization of the model - Applications
Practice: Build a SVM Model in python for Fish
dataset from Kaggle
Ensemble Learning
Introduction
Basic Ensemble Techniques
- Max Voting
Build a SVM Model in python - Averaging
2,3 2,3 4
3 3
,5 ,4 How to optimize SVM? - Weighted Average
Advanced Ensemble Techniques
- Stacking
- Blending
- Bagging

Department of Collegiate & Technical Education Bengaluru-560001 Page 22


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Boosting
Explore and list the Ensemble Algorithms - T
Random Forest
- Introduction
- How does it work?
- Hyper parameters
- Applications
Build Random Forest-based model in python for
2,3 2,3 Breast Cancer Wisconsin (diagnostic) dataset
4 4 Evaluation and optimization 3
,5 ,4
from sci-kit learn Or dataset from UCI , Kaggle

5 CIE 3 – Written and Practice Test Assessment Review and corrective action 3
Comparison of classification algorithms with real
2,3 2,3
6 2 3 Weekly Assignment
,5 ,4 world scenario

Unsupervised learning –
- What is unsupervised learning?
- Common approaches
Peer review
- Challenges
9 3 2,3 1 Mini Project Activity – Status review 4 2 1
- Clustering Types
Applications of unsupervised learning - T
K-means –
Working of K-means
How to Choose the Right Number of Clusters?

Department of Collegiate & Technical Education Bengaluru-560001 Page 23


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Implementation in python
Evaluation Metrics
2,3 2,3 - Inertia
2 1 3 Contd. 3
,5 ,4
- Dunn Index
Evaluate the model using mentioned metrics
Dimensionality Reduction
- Importance of Dimension Reduction in

2,3 2,3 machine learning


3 2 2 Dimensionality Reduction using PCA in python 3
,5 ,4 Common methods to perform Dimension
Reduction - T
Dimensionality Reduction using PCA in python
Deployment Process
5 3,4 4 - Local 2 2 Contd. 3

5 Development Assessment Assessment Review and corrective action 3

4 2,3 6 Compare various clustering techniques 2 3 Weekly Assignment


Peer review Deep learning
Mini Project Activity (2) - Limitations of Machine Learning
- Regression - Rebuild with deep learning - What is deep learning?

10 1 3,4 1 model 4 - Deep learning models 2 1


- Classification - Rebuild with deep learning - Deep Learning Applications
model - Deep learning frameworks
- Analyze the performance of ML and DL Group discussion – T

Department of Collegiate & Technical Education Bengaluru-560001 Page 24


Diploma in Computer Science & Engineering C 20 : 2020 - 21

(Individual/ Team of 2) Future -Impact deep learning will likely to have on


- Define Problem statement (solution to be a variety of industries in the next few years.
presented in the 13th week CIE – 6) Environment setup
- Create project plan and product backlog - Local
- Create git repository for the project - Cloud
Work progress should be monitored weekly TOC - Deep Learning with TensorFlow | Infosys
Springboard (onwingspan.com)
Introduction to Neural Networks Introduction to TensorFlow
▪ Understanding - What is TensorFlow?
- Biological Neurons - Why TensorFlow?
- Artificial neuron /Perceptron - TensorFlow ecosystem
- Working of perceptron - TensorFlow architecture
▪ Neural network - Program Elements in TensorFlow
- Architecture Keras
- Working of NN - What is Keras?
2,3 3,4 2 2 2 1 2
- Forward propagation - Keras APIs – three programming models
- Back propagation - Sequential Model
▪ Activation function - Functional API and
- Sigmoid - Model Subclassing
- Tanh - Keras layers
- ReLU - Custom Keras Layers
- LeakyReLU TOC - Deep Learning with TensorFlow | Infosys
▪ Cost function Springboard (onwingspan.com)

Department of Collegiate & Technical Education Bengaluru-560001 Page 25


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- How to measure loss? TOC - TensorFlow for Beginners | Infosys


- How to reduce Loss? Springboard (onwingspan.com)
- Gradient Descent
Get data, and explore
Eg. Stroke Prediction Dataset | Kaggle or dataset
from any other source
Prepare data: Dealing with
- missing values
- Categorical values
- Labeled encoding
- One hot coding
Prepare data : Feature scaling with
StandardScalar() or other method
Dropping unnecessary features
Data splitting
Dealing with imbalanced dataset
- Why do we have to flatten the input data? Keras optimizers
- Understand Keras Dense Layer Keras Metrics
- Overview Keras Losses
2,3, - Parameters Create a complete end to end neural network –
3 3 1 3 1 2
4
- Operation Contd.

- Building Shallow Neural Network with Keras TOC - Learning TensorFlow 2.0 | Infosys Springboard

Dense Layer (onwingspan.com)

Department of Collegiate & Technical Education Bengaluru-560001 Page 26


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Building Deep Neural Network with Keras


Dense Layers
- Create a complete end to end neural network
model using Keras Sequential Model and
Keras Layer API
Eg.
MNIST dataset (classify handwritten numerals)
or fashion-MNIST dataset or dataset from other
source

Keras
- Callbacks
- Commonly used callbacks
Monitor neural network performance with
How to save trained model
3 3,4 4 TensorBoard 1 3 3
Local deployment with TensorFlow ModelServer
- TensorBoard Basics
- TensorBoard Setup
Understand Model Behavior During Training
Reduce overfitting with Dropout Layer

5 CIE 4 – Written and Practice Test Assessment Review and corrective action 3
Building deep learning model with TensorFlow
2,3 3,4 6 2 3 Weekly Assignment
and Keras for use cases

Department of Collegiate & Technical Education Bengaluru-560001 Page 27


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Natural Language Processing


Understanding natural language processing
NLP approaches – rule based, statistical
Peer Review
NLP use cases
2,3, Mini Project Activity – Status review 4
1,5 1 2 1
4 How to use dictionary?
Commonly used NLP tools & libraries
Setup environment
(spaCy or similar nlp package)
Text processing tasks (Processing Words)
Document Assembler
Annotation

11 Tokenization Spell Correction


- Sentence tokenization Normalization
2,3, - Word tokenization 1 - Stemming
2,3 2 1 2
4 3
- Visualize frequency distribution of words - Lemmatization
- Visualize with word cloud
Stop word
- Dropping stop words
- Dropping punctuations
Parts of speech tagging Vectorizer
2,3 3 3 1 3 1 2
Named Entity Recognition N-Gram
TF-IDF Contd.
2.3, 1 3
2,3 4 3
4 Build a pipeline for text processing

Department of Collegiate & Technical Education Bengaluru-560001 Page 28


Diploma in Computer Science & Engineering C 20 : 2020 - 21

5 Development Assessment Assessment Review and corrective action 3

3 2,3 6 NLP – text summarization 2 3 Weekly Assignment


Regular Expression 3
- Introduction
Peer review
2,3, - Simple patterns – matching characters,
1 1
4 Mini Project Activity – Status review
repetition
- Explore python ‘re’ module
NLP use case – Sentiment Analysis (SA) 3
What is sentiment analysis?
Why is SA important?
Business applications for SA
How does sentiment analysis work?
1,2, 2,3, Contd..
12 2 2 2
3 4 Transformers
Conduct Sentiment analysis to classify movie
reviews with
- spaCy
TensorFlow and keras
1,2, Ethics in AI Deployment pipeline 3
3,4,
- Importance of AI ethics - Model Serving
5
2,3, - Ethical challenges of AI - Model Performance Monitoring
3 4
4,6
- AI code of ethics - Model Performance logging
Group Discussion: Discussion on the Ethics of AI Deployment strategies

Department of Collegiate & Technical Education Bengaluru-560001 Page 29


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Ethics of AI: Safeguarding Humanity | Deploying ML Models as Docker Containers


Professional Education (mit.edu)

2,3 3,4 4 Deploying ML Models as Serverless Functions 4 Contd. 3

3
5 CIE 5 – Written and Practice Test Assessment Review and corrective action

1,3 5 6 Natural Language Generation / web scrapping 2 3 Weekly Assignment


Project
Internship a) Identification of the problem statement
a) Secondary research on various (from at least 3 known problems) the students
industries and their operations to identify
would like to work as part of the project –
at least 3 companies along with the areas
of work interest and develop an internship either as provided by faculty or as identified by
plan that clearly highlights expectations the student. Document the impact the project
from the industry during the internship.
will have from a technical, social and business
1 b) Design and develop a cover letter for an
2,3, perspective. 4 11
13 to internship request to all 3 identified 2 4 19
4,6
4 companies and the resume to be submitted b) Design and develop the project solution
to potential companies.
or methodology to be used to solve at least one
Prepare for an internship interview to
highlight your interests, areas of study, of the problems identified.
career aspirations and personnel Prepare a project plan that will include a
competence – including the areas of schedule, WBS, Budget and known risks along
learning you expect to learn during
internship. with strategies to mitigate them to ensure the
project achieves the desired outcome.
**Note: Saturday session from 9 AM -2 PM

Department of Collegiate & Technical Education Bengaluru-560001 Page 30


Diploma in Computer Science & Engineering C 20 : 2020 - 21

References
Sl. No Description

1 Hands-On Artificial Intelligence for Beginners By Patrick D. Smith

2 Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 2nd Edition, By Aurélien Géron

3 Machine Learning with Python for everyone, Mark E Fenner

4 Hands on Data processing in Python , Joy Jafari

5 Deep Learning with TensorFlow2 and Keras , Antonio Gulli, Amita Kapoor,Sujith Pal

6 Cloud Computing, Concepts, Technology and Architecture by Thomas Erl

7 Khan Academy

8 Fundamentals of Data Visualization, Claus O. Wilke

9 Pro Git ,Scott Chacon, Ben Straub

10 Mathematics for Machine Learning, A. Aldo Faisal, Cheng Soon Ong, and Marc Peter Deisenroth

Department of Collegiate & Technical Education Bengaluru-560001 Page 31


Diploma in Computer Science & Engineering C 20 : 2020 - 21

CIE and SEE Assessment Methodologies


Duration
CIE Assessment Assessment Mode Max Marks
In hours

Week 3 CIE 1– Written and practice test 4 30


Week 5 CIE 2– Written and practice test 4 30
Week 8 CIE 3– Written and practice test 4 30
Week 10 CIE 4– Written and practice test 4 30
Week 12 CIE 5– Written and practice test 4 30
Week 13 Assessment for Project or Internship 4 30
On line Course work (At least one related to the specialization) 30
Portfolio evaluation (Based on industrial assignments and weekly developmental assessment) * 30
TOTAL CIE MARKS (A) 240
SEE 1 - Theory exam (QP from BTE) Conducted for 100 marks 3 hour duration reduced to 60 marks 3 60
SEE 2 – Practical 3 100
TOTAL SEE MARKS (B) 160
TOTAL MARKS (A+B) 400
* The industrial assignment shall be based on peer-to-peer assessment for a total of 10 marks (on a scale of 1 to 10) and in the event of a group
assignment the marks awarded will be the same for the entire group, the developmental assessment will be for a total of 20 marks and based on
MCQ/case study/demonstration and such other assignment methods

Department of Collegiate & Technical Education Bengaluru-560001 Page 32


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Scheme of Evaluation for SEE 2

Sl. No Description Marks

1 Case submission 20

2 Case presentation 20

3 Case innovation 20

4 Result 20

5 Viva voce 20

Total 100

Department of Collegiate & Technical Education Bengaluru-560001 Page 33


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Submission / Content Evaluation Rubrics


Evaluation
5 4 3 2 1 Student Score
Parameters
Identifies and Identifies and
Identifies and Identifies and Identifies limited
Identification of understands all understands most
understands some of understands a few issues
the main the main issues of the main issues 5
the issues in the of the issues in the in the problem
issues / problem in the problem in the problem
problem statement problem statement statement
statemen statement

Insightful and Superficial analysis of


Analysis of the Thorough analysis of Incomplete analysis of No analysis of the
thorough analysis some of the issues in 4
issues most of the issues the issues issue
of all the issues the problem statement

Well documented,
Comments on reasoned and Appropriate, well
effective solutions pedagogically thought out
Superficial and / or Little and/or
/ strategies (The appropriate comments about
inappropriate solutions inappropriate No action to all
solution may be in comments on solutions, or
to some of the issues solutions to all of the issues in the 2
the problem solutions, or proposals for
in the problem issues in the problem problem statement
statement already proposals for solutions, to most of
statement statement
or proposed by solutions, to all the issues in the
you) issues in the problem statement
problem statement
Excellent research
Links to course into the issues with Good research and
Limited research and Incomplete research
learning and clearly documented documented links to No research or links
documented links to and links to any 3
additional links to course the materials read to any reading
any readings reading.
research learnings and during the course
beyond.

Total 14/20

Case Presentation Evaluation Rubrics


Department of Collegiate & Technical Education Bengaluru-560001 Page 34
Diploma in Computer Science & Engineering C 20 : 2020 - 21

Evaluation Student
5 4 3 2 1
Parameters Score
Clear flow of
ideas Most ideas flow Hard to
Very clear and concise No flow in
but is lost at follow the
flow of ideas Demonstrates the
times Limited flow of
Demonstrates passionate interest in the presentation
Delivery & Enthusiasm evidence of ideas Lack 4
interest in the topic and topic and Poor
interest in and of
engagement with class / engagement presentation
examiner engagement enthusiasm
with class / skills
with the topic and interest
examiner
Limited
use of Poor visuals used
Visuals augmented
Use of visuals and some visuals
and extended visuals
Visuals related to the No use of visuals are not easy to 2
comprehension of the loosely
topic understand its
issues in unique ways related to
relevance.
the topic
Uses stage
effects such as
Uses stage effects props, sound Limited use of
such as props, sound effects, and stage effects
effects, and speech speech and/or used in a
modulation in a modulation in manner that did
No use of stage Poor stage effects
Staging unique and dramatic an effective not enhance the 5
effects usage
manner that enhances manner to understanding
the understanding of extend the of the issues in
the issues in the understanding the problem
problem statement. of the issues in statement.
the problem
statement.

Department of Collegiate & Technical Education Bengaluru-560001 Page 35


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Questions and Questions and


Excellent and salient discussions discussions
discussion points that addressed addressed
Involvement Little or no
elucidated material to important important
of the class / attempt to Did not engage
develop a deep information superficial
Examiners engage the the class /
understanding that issues of the
class / examiner and 3
• Questions Appropriate and developed problem
examiner in poor listening
• Discussions imaginative activities understanding statement
demonstrating skills
• Activities used to extend Appropriate Limited use of
their learning
understanding in a activities used activities to
creative manner to clarify clarify
understanding understanding

Total 14/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 36


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Results Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score
The topic was well 4
researched and all
information and
The topic was
data included are The topic was The topic was
researched but
accurate and from researched and researched and data
information and data Desired results
reliable sources of most information were not from
were only partly from not obtained,
information like and data were from reliable sources.
reliable sources of but some
high impact journals reliable sources of The proof was not
information. relevant
Problem standards, etc. information. The backed up with
The proof was not fully research was
outcome The proof was proof was backed data, analysis or
backed up with good done. Outcome
enough backed up up with good data reasoning as taught
data or reasoning as not obtained as
with accurate data, and reasoning as in the class.
taught in the class. per the
analysis and taught in the class. Some outcome
Partial outcome problem brief
reasoning beyond Outcome achieved as obtained as per the
achieved as per the
the class learning. per the problem brief problem brief
problem brief
Outcome achieved
beyond the problem
brief
Made effective use of Made good use of class 3
class principles, principles, models and
Made some use of Poorly applied
models and theories. theories Some creative
Application of class principles, Made limited use of class
Also used creativity ideas were explored to
class learning in models and theories class principles, principals,
to find effective find desired outcome
problem solving No creative ideas or models and theories models and
results appropriate but within the
models explored theories
to industry beyond framework of class
class learning. learning
Response to Queries Excellent Poor or no 2
Good response to Satisfactory response Limited response
Class / response to response to
questions and to questions and to questions and
Examiners comments and questions and
discussions with some discussions with discussions with
Queries discussion with did not

Department of Collegiate & Technical Education Bengaluru-560001 Page 37


Diploma in Computer Science & Engineering C 20 : 2020 - 21

appropriate content connection made to limited reference to no reference to participate in


supported by theory/research theory/research theory/research the discussions.
theory/research
Has not 4
Provides limited
Provides detailed and Provides adequate and provided
Provides appropriate and somewhat
appropriate mostly appropriate appropriate
Conclusions conclusion for the appropriate
conclusion for the conclusions for the conclusions for
problem statement conclusions for the
problem statement problem statement the problem
problem statement
statement.
Total 13/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 38


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Innovation Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score
Finding new The newly The newly The newly discovered The newly No new 5
processes / discovered discovered processes processes / models / discovered processes /
models / processes / models / models / approaches have processes / models models /
approaches / approaches are of approaches are of limited application but / approaches has approaches
good quality and appropriate quality relevant to the restricted were identified
relevant but limited relevance problem application
Proposing ideas Various ideas and Various ideas and Some ideas or Few ideas have No ideas or 3
and innovative innovative solutions innovative solutions innovative solutions been proposed innovative
solutions in terms have been proposed have been proposed have been proposed solutions have
of processes / and their application as well as the outline but the process of been proposed
models / have been clearly of the process to applying them hasn't
approaches and outlined apply them been specified
how they can be
applied to solve
the problem on
hand
Using creativity Wherever necessary Creativity techniques Creativity techniques Creativity Creativity 2
techniques to creativity techniques are frequently are utilized at times in techniques are technique are
provide and are utilized to utilized in more than less than 50% of the used a few times not utilized to
reason good ideas analyse and solve the 50% of the occasions occasions only analyse and
which are original problem solve the
and problem
unconventional
Finding Constraints and weak Constraints and weak A critical analysis is Only a description No constraints 3
constraints and points are are identified undertaken of the working or weak points
weak points in understood process and have been
existing processes methods are identified.
/ models / provided
approaches or
methods
Total 13/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 39


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Assessment framework for SEE (Theory) – 100 Marks / 3 hours (Reduced to 60 marks)

Programme: Computer Science & Engineering Semester: V


Course: Artificial Intelligence & Machine Learning Max Marks: 100
Course Code: 20CS51I Duration: 3 Hrs
Instruction to the Candidate: Answer one full question from each section.
Qn.No Question CL CO Marks
Section-1
1.a) 1
b)
2.a)
b)
Section-2
3.a) 2
b)
4.a)
b)
Section- 3
5.a) 3
b)
6.a)
b)
Section-4
7.a) 4
b)
8.a)
b)

Department of Collegiate & Technical Education Bengaluru-560001 Page 40


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Section-5
9.a) 5
b)
10.a)
b)

Assessment framework for CIE


Note : Theory to be conducted for 1 hour and practice for 3 hours, total duration of exam – 4 hours
Programme Computer Science & Engineering Semester V
Course Artificial Intelligence & Machine Learning Max Marks 30
Course Code 20CS51I Duration 4 hours
Name of the course coordinator
Note: Answer one full question from each section.
Qn.No Question CL CO PO Marks
L3/L4
Section-1 (Theory) – 10 marks
1.a)
b)
2.a)
b)
c)
Section-2 (Practical) - 20 marks
3)
4)

Department of Collegiate & Technical Education Bengaluru-560001 Page 41


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Equipment/software list with Specification for a batch of 20 students

Sl. No. Particulars Specification Quantity


1. Intel i7, 4GB RAM,
Computers 20
500GB SSD
2.
Python (Anaconda Distribution), Git, Jira, Jenkins, TensorFlow or similar tools
3.
Cloud – AWS/AZURE/GCB or any similar cloud environment
4.
Broadband connection

Department of Collegiate & Technical Education Bengaluru-560001 Page 42


Full Stack Development
Diploma in Computer Science & Engineering C 20 : 2020 - 21

Diploma in Computer Science & Engineering


Computer Science &
Program Semester 5
Engineering

Course Code 20CS52I Type of Course L:T:P (104:52:312)

Course Name Full Stack Development Credits 24

CIE Marks 240 SEE Marks 160

Introduction: Welcome to the curriculum for the Full Stack Development Specialisation.
This specialisation course is taught in Bootcamp mode. Bootcamps are 12 weeks, intense learning
sessions designed to prepare you for the practical world – ready for either industry or becoming
an entrepreneur. You will be assisted through the course, with development-based assessments to
enable progressive learning. In this course, you’ll learn a complete suite of software development
skills to build application like front-end, middleware, and back-end Java web developer
technologies, test and deploy code, store data using MongoDB, and much more.
This course will teach you Fundamentals of business process automation, React, Spring, MongoDB,
REST API, DevOps practices, cloud deployment and more. Details of the curriculum is presented in
the sections below.

Pre-requisite

Before the start of this specialisation course, you would have completed the following courses;

In the 1st year of study, you would have studied Engineering Mathematics, Communication Skills,
Computer Aided Engineering Graphics, Statistics & Analysis, Basic IT Skills, Fundamentals of
Computer, Fundamentals of Electrical and Electronics Engineering, Project Management skills and
Multimedia & Animation.

In the 2nd year of study, you would have studied Python Programming, Computer Hardware,
Maintenance and Administration, Computer Networks, Database System Concepts and PL/SQL,
Data Structures with Python, Operating System and Administration, Object oriented programming
and Design with Java, Software Engineering principles and practices.

In this year of study, you shall be applying your previous years learning along with specialised field
of study into projects and real-world applications.

Course Cohort Owner

Department of Collegiate & Technical Education Bengaluru-560001 Page 41


Diploma in Computer Science & Engineering C 20 : 2020 - 21

A Course Cohort Owner is a faculty from the core discipline, who is fully responsible for one
specialised field of study and the cohort of students who have chosen to study that specialised field
of study.

Guidelines for Cohort Owner


1. Each Specialized field of study is restricted to a Cohort of 20 students which could include
students from other relevant programs.
2. One faculty from the Core Discipline shall be the Cohort Owner, who for teaching and
learning in allied disciplines can work with faculty from other disciplines or industry experts.
3. The course shall be delivered in boot camp mode spanning over 12 weeks of study, weekly
developmental assessments and culminating in a mini capstone.
4. The industry session shall be addressed by industry subject experts in the discipline only.
5. The cohort owner shall be responsible to identify experts from the relevant field and
organize industry session as per schedule.
6. Cohort owner shall plan and accompany the cohort for any industrial visits.
7. Cohort owner shall maintain and document industrial assignments, weekly assessments,
practices and mini project.
8. The cohort owner shall coordinate with faculties across programs needed for their course to
ensure seamless delivery as per time table
9. The cohort owner along with classroom sessions can augment or use supplementally
teaching and learning opportunities including good quality online courses available on
platforms like Karnataka LMS, Infosys Springboard, NPTEL, Unacademy, SWAYAM , etc.
Course outcome: A student should be able to
Explain typical business process in an organization and identify opportunities for digital
CO1
transformation.
CO2 Document system requirements and write an appropriate development plan.

CO3 Design, develop and test an automated business process.

CO4 Develop RESTful API’s and test functions as per the defined requirements.

CO5 Select an appropriate production environment, UI and deploy the application.

Department of Collegiate & Technical Education Bengaluru-560001 Page 42


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Detailed course plan


We Da
CO PO 1st session (9am to 1 pm) L T P 2ND session (1.30pm to 4.30pm) L T P
ek ys
- Digital transformation through
- What is an Enterprise? Convergence of IT & OT
- Organizing the Enterprise - process - Digital Transformation Success Stories
- Understanding /Types of business - How technology has impacted digital
1 1 1 4 1 2
activities transformation
- What is business process? - Case study: Digital transformation through
- Why to automate business process? IT/OT convergence

Industrial visit: Map the relationship between various


Visit small or medium scale nearby industry divisions of business entity both vertical and
1
and know the business entity and activities. horizontal relationships
1 1,5 2 4 3
Understand the different work divisions with Understanding the business process and
a business entity. workflow within a business entity

- Identify the typical processes and


Report of industrial visit.
workflows that can be automated.
- Document the major business divisions
- Introduction to Full stack development, its
1 2,3 3 and their activities. 4 3
components, tools used, etc.
- Draw the workflow for each identified
- Understanding Full stack framework both
division.
within firewall and on the cloud

Department of Collegiate & Technical Education Bengaluru-560001 Page 73


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Create a map of workflows to represent


interaction among divisions and the entire
business process as well.

Recap
- Design Thinking
1,2 2,3 4 1 3 Contd. 3
- Apply design thinking to automate the
observed activities in the industrial visit

5 Developmental Assessment Assessment Review and corrective action 3


Full stack development – industrial
perspective
2,3,
1,2 6 2 3 Weekly Assignment(1PM-2PM)
4 How to create project plan and product
backlog for project and User story creation
peer review Recap – software development (Agile
project activity: methodology)
Make student teams (2 -3 students per team), Project Inception
each team is responsible for automating - Define goal of product
2,3,
2,3 1 4 2 1
4 activities of an identified business entity. - Define epic /requirements
2 Integration of each team’s work must lead to - Creating user stories for the epic
an enterprise application. - Creating test plan
- Creating testcase – test bed, test data
- Scope of product Design principles
2,3, 2 2
2,3 2 2 1
4 - Planning iterations / sprint planning - Availability

Department of Collegiate & Technical Education Bengaluru-560001 Page 74


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Schedule of the project - Performance


- Cost estimation - Consistency
- Burn down charts - Scalability
- Risk management - Manageability

Prepare the project environment by selecting - cost

tools Architectural patterns

Create and manage product backlog using - Monolithic


- Layered
appropriate tool like Jira
- Service oriented architecture
- Microservice architecture
Step 01 - Need for Architecture - Viewer Page |
Infosys Springboard (onwingspan.com)
Design methods for security
- Application security
- Authentication and authorization
methods and their usage and Design principles for – UI / UX
considerations Create UI/UX design - for created user stories
2,3, o Token based 2 2 (wireframing)
2,3 3 2 1
4
o Cookie based Technology, tools and frameworks for
o OpenID application development
o Third party access
o SAML
o Multi factor authentication

Department of Collegiate & Technical Education Bengaluru-560001 Page 75


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Encryption
Design methods for Datastores
- Structured
- Semi structured
- Unstructured
Recap of
Data base design
Configuration management
DevOps engineering practices Why Do We Need a Version Control System?
- Configuration management Fundamentals of Git
- Continuous integration Git installation and setup
- Automated testing basic local Git operations
2,3, - Infrastructure as code ▪ creating a repository,
2,3 4 2 2 1 2
4
- Continuous delivery ▪ cloning a repository,
- Continuous deployment ▪ making and recording changes
- Continuous monitoring ▪ staging and committing changes,
Explore the various tools used - T ▪ viewing the history of all the changes
undoing changes

5 Developmental Assessment Assessment Review and corrective action 3


Comparison of various enterprise application

6 development technology stacks (development, 2 3 Weekly Assignment


engineering, deployment, Monitoring)

Department of Collegiate & Technical Education Bengaluru-560001 Page 76


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Security architecture and best practices in


enterprise application programming.
Git Branching and merging
Peer review Basic
2,3, Project status review ▪ Creating and switching to new branches
3 2,3 1 4 1 2
4
Demonstration of artifacts of the project ▪ Switching between branches
Merging local branches together
Continuous integration with Jenkins
GitHub
What is Jenkins?
- Basics of distributed git
How does it work?
Account creation and configuration
Architecture of Jenkins
- Create and push to repositories
Jenkins pipeline
- versioning
Install and configure Jenkins
2,3, - Collaboration
2 2,3 2 1 3 1 2
4 Perform user management
- Migration
Assign roles to users
Create repository – named mini project-1
Create build pipeline with Jenkins
Push the same to GitHub
TOC - Continuous Integration with Jenkins 2 |
TOC - Git Essentials: Become a Git and GitHub
Infosys Springboard (onwingspan.com)
Ninja | Infosys Springboard (onwingspan.com)

5 1,4 3 Continuous integration with Jenkins 4 Contd. 3


Cloud basics - Create cloud account (AWS, GCB or any
2,3, - Service models other service provider) and explore the
2,3 4 2 2 3
4
- Deployment models features

Department of Collegiate & Technical Education Bengaluru-560001 Page 77


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Cloud Infrastructure Overview - Create and setup a virtual machine.


- Cloud computing architecture and its - Create a simple webapp using cloud
components services
- Virtualization - Build a Basic Web Application on AWS
o Characteristics and benefits (amazon.com)
o Virtual Machines
o Hypervisors
o Types

5 CIE 1 – Written and Practice Test Assessment Review and corrective action 3
Comparison of cloud services
2,3, How to make full stack development efficient
2,3 6 2 3 Weekly Assignment
4
by using DevOps
Recap
HTML, CSS and JavaScript Fundamentals
(Code structure – statements, comments,
variables, Constants, Data types, Interaction,
Peer review Operators, Comparisons, Control flow,
2,3, 2,3, 1 Project status review Functions)
4 4 1 2
5 4
Demonstration of artifacts of the project Setting Up the Environment and Tools for
front end development
- Installing Node.js
- Installing VS Code
- VS Code extensions

Department of Collegiate & Technical Education Bengaluru-560001 Page 78


Diploma in Computer Science & Engineering C 20 : 2020 - 21

JS objects
ES6
Methods, Constructors,
- Arrow functions
Object properties
2,3, 2,3, - Template strings
2 1 3 1 2
5 4 - Data properties
- Prototype methods
- Accessor properties
- Spread operator
- Prototype
Introduction to TypeScript
Why TypeScript?
ES6 Setting up development environment for
- Map TypeScript
2,3, 2,3,
3 - Set 1 3 1 2
5 4 - Install TypeScript compiler
- Install Live server
Create and run first program in TypeScript
TypeScript "Hello, World!" (typescripttutorial.net)
Basic Types Contd.
2,3, 2,3, Control flow statement JSON- T
4 2 2 3
5 4
Functions

5 Development Assessment Assessment Review and corrective action 3


2,3, 2,3, Modern UI technologies
6 2 3 Weekly Assignment
5 4
Peer review
Introduction to React
2,3, 2,3, Project status review
5 1 4 1 2
5 4 - What is React?
Demonstration of artifacts of the project

Department of Collegiate & Technical Education Bengaluru-560001 Page 79


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Setting up React development


environment
- Anatomy of React app
- Configuring react app
- Creating and running a React.js app
React Components

Introduction to JSX What is a component?

What is JSX? Types


2,3, 2,3, DOM - Functional
2 2 2 1 2
5 4
React DOM - Class

Implementing JSX Create your first React Component.


Understanding Component life cycle

React components
- Presentational and Container
Components State and Props
- Functional components Component life cycle methods
- Communication between components - Mounting phase
2,3, 2,3, 3 1 3 1 2
5 4 JSX for React components - Updating phase
How to crate JSX elements? - Unmounting phase
Props & State - Error Handling
- Understanding Props
How to test components

Department of Collegiate & Technical Education Bengaluru-560001 Page 80


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Understanding React Virtual DOM


MVC architecture
React Router

2,3, 2,3, - React router – parameters


4 2 2 Building Single page application 1 2
5 4 - React router key components
- Implement navigation using react
router
Building Single page application

5 CIE 2 – Written and Practice Test Assessment Review and corrective action 3
Testing single page application - manual and
2,3, 2,3,
6 2 3 Weekly Assignment
5 4 automation testing
Recap
- Object oriented concepts and design
principles
- Data Structures
- Database Concepts
Peer review
- java
2,3, 2,3, Project status review
6 1 4 2 1
5 4 Setting up the environment and tools
Demonstration of artifacts of the project
Install java (latest stable version) and add
environment variable
Install java editor (such as IntelliJ, Eclipse or
any other)
Install DBMS (MySQL, PostgreSQL or any other)

Department of Collegiate & Technical Education Bengaluru-560001 Page 81


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Java Collections (List, Set, Map) Introduction to Spring Framework


Basics of Apache Maven or Gradle – project What is Spring?
management tool - Why Spring Framework?
2,3, 2,3,
2 1 3 1 2
5 4 Understanding pom.xml - Spring Framework Architecture
XML – tutorial - Key components of Spring Framework
-
Inversion of Control and Dependency Injection
What is inversion of control?
What is dependency injection?
Type of classes
understanding the spring initializer - Client class
interface - Service class
- Spring Annotations - Injector class
2,3, 2,3, Create Spring application with Spring Types of DI
3 1 3 1 2
5 4
Initializer using dependencies like Spring - Constructor
Web, Spring Data JPI - Property
How to run the project - Method
Practice :
constructor injection
Property injection
Method injection
Spring IoC container – ApplicationContext
2,3, 2,3, Contd..
4 2 2 3
5 4 AutoScanning – package scanning

Department of Collegiate & Technical Education Bengaluru-560001 Page 82


Diploma in Computer Science & Engineering C 20 : 2020 - 21

DI in spring Boot
- Constructor injection
- Setter injection

Autowiring
Autowiring dependencies

5 Development assessment Assessment Review and corrective action 3


2,3, 2,3, Java and Frameworks
6
5 4
Application Programming Interface (API)
- What is an API?
- How API works?
Peer review
- Why we need APIs?
2,3, Project status review
3,4 1 4 2 1
4 - API types (Open APIs, Partner APIs, Internal
Demonstration of artifacts of the project
APIs, Composite APIs)
- Types of API Protocols (SOAP, REST)

7 Common API examples


API endpoints Basics of REST
What is API endpoint? - Evolution of distributed API
Why are API endpoints important? - Overview of REST
2,3, API endpoint examples - REST architectural style, components,
3,4 2 2 2 3
4
How to Test API Endpoints views,
HTTP Concepts - REST constraints
- HTTP working - Properties of REST API

Department of Collegiate & Technical Education Bengaluru-560001 Page 83


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- HTTP Method (GET, POST, PUT, DELETE) - REST API Design Principles
Understanding of JSON structure for API
How to create RESTful service
request and response data
Spring REST – creating Spring REST controller
Controller Layer –
- Create REST controller for CRUD
operations
Spring Data JPA configuration
- Handling URI data
Create ORM entity class
Service Layer – build business logic
Create database and configure using
Limitations of JDBC API
application.property file
2,3, Object relational Mapping – features and
3,4 3 2 2 3
4 - **Note – Hibernate or any other ORM
benefits
framework can be used
- ORM Framework
About Hibernate Framework - Viewer Page |
- ORM Architecture
Infosys Springboard (onwingspan.com)
- ORM Mapping
- ORM Annotations
- ORM Configuration
JPA – Java Persistent API
Model/ Repository layer – construct entity/
model object and communicate with DB using
2,3, Spring Data JPI Creating CRUD repositories
3,4 4 1 3 3
4
Install Postman
Test created APIs with the help of Postman

Department of Collegiate & Technical Education Bengaluru-560001 Page 84


Diploma in Computer Science & Engineering C 20 : 2020 - 21

5 Developmental Assessment Assessment Review and corrective action 3


Converting monolithic application to
2,3,
3,4 6 2 3 Weekly Assignment
4 microservices architecture
Versioning Spring REST APIs
Peer review
Make RESTful service functional using Spring
2,3, Project status review
3,4 1 4 1 2
4 Data REST - CRUD operations using Spring Data
Demonstration of artifacts of the project
JPA

2,3, Contd..
3,4 2 4 Contd.. 3
4
8 2,3, Transaction management and compliance to
3,4 3 1 3 Contd.. 3
4 ACID principles

Securing REST APIs with Spring Security


2,3,
3,4 4 1 3 Creating unit tests with Spring Boot 1 2
4 API security configuration

5 CIE 3 – Written and Practice Test Assessment Review and corrective action 3

2,3, Spring Transactions


3,4 6 Weekly Assignment
4
Introduction NoSQL - 1
- Brief history
Peer review - Features & Benefits
2,3, Project status review - Types
9 3,4 1 4 1 2
4
Demonstration of artifacts of the project - Cap theorem
- BASE
Getting started with MongoDB

Department of Collegiate & Technical Education Bengaluru-560001 Page 85


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- MongoDB overview
- features
- key components of Architecture
- data modelling
Working with MongoDB
- MongoDB Shell – mongosh
Mongo Compass GUI
Setup CRUD Operations
- Download and Install MongoDB - Create and Drop database
Community Server - Create and Drop Collections
Or - CRUD Operations on document
- MongoDB Atlas Setup
2,3, - Create an Atlas account and get ready to
3,4 2 1 3 1 2
4
use MongoDB Atlas
- Configure MongoDB Atlas
- Explore Compass (MongoDB’s GUI tool)
- Create and Manage MongoDB
Data types and operators – T
Limit and Sort Records
2,3, - CRUD Operations on document 4
3,4 3 1 2
4 Cursor
Indexing Replication
2,3,
3,4 4 1 3 1 2
4 Aggregation Sharding

5 Development Assessment Assessment Review and corrective action 3

Department of Collegiate & Technical Education Bengaluru-560001 Page 86


Diploma in Computer Science & Engineering C 20 : 2020 - 21

2,3, API Gateway


3,4 6 Weekly Assignment
4
Peer review Administration
2,3, Project status review - Create and manage users and roles
3,4 1 4 1 2
4
Demonstration of artifacts of the project - Migration to MongoDB
Monitoring
Why Monitor MongoDB?
Areas to monitor
Backup in MongoDB - Instance status and health
Types: Logical backups and physical backups. - MongoDB cluster’s operations and
Back Up and Restore a MongoDB Database connections metrics
2,3,
3,4 2 1 3 1 2
4 using - Instance hardware metrics
- MongoDB Atlas - Replication metrics
10
- MongoDB Backup and Restore Tools Monitor above areas with
• MongoDB Atlas
• self-managed MongoDB instances
performance monitoring tools
ACID transactions in MongoDB
2,3, How to run MongoDB on cloud?
3,4 3 1 3 3
4 Best practices for transactions in MongoDB
Perform CRUD Operations on MongoDB
2,3, through REST API using Spring Boot Starter Contd.
3,4 4 1 3 3
4
Data MongoDB

5 CIE 4 – Written and Practice Test Assessment Review and corrective action 3

Department of Collegiate & Technical Education Bengaluru-560001 Page 87


Diploma in Computer Science & Engineering C 20 : 2020 - 21

MongoDB implementation, administration and


2,3,
3,4 6 Weekly Assignment
4 deployment
Application Testing
- Manual
Peer review
- Automated
3,4, 2,3, Project status review 4
1 1 2
5 4 Application testing tools
Demonstration of artifacts of the project
Functional testing
UI testing
Automation testing with selenium (widely used)
Integration testing - Jenkins
Components of selenium
System testing
3,4, 2,3, 1 3 Features and limitations of selenium - T
2 1 2
5 4 Integrate the work of each group and carry out
Components of WebDriver architecture
integration testing
11 Selenium WebDriver - Installation and setup
WebDriver Script
How WebDriver works?
WebDriver Commands -
Get, Navigation, WebElement, Action, and
3,4, 2,3, 1 3 Contd..
3 3
5 4 Result commands.
Working with WebDriver commands
Select Class and different select methods
Working with WebDriver commands
Acceptance testing
4 Automation testing with selenium web driver 4 1 2
Acceptance tests and test plan

Department of Collegiate & Technical Education Bengaluru-560001 Page 88


Diploma in Computer Science & Engineering C 20 : 2020 - 21

User acceptance testing


Bug tracking – Jira

5 Development Assessment Assessment Review and corrective action 3


2,3, Automation and cloud application testing
3,4 6
4
Deployment process 2
- Manual deployment
- Automated deployment
How to implement automated deployment?
Peer review Top Deployment tools and their features
3,4, 2,3, Project status review 4 Best Deployment practices
1 1
5 4
Demonstration of artifacts of the project Setup deployment pipeline
Continuous deployment
Static code analysis

12 Automated review and peer review


Practice – code analysis using tools
Containers 2
Why containers? Docker image
What is a docker? Docker file
How docker works? Commands to create docker file.
3,4, 2,3,
2 1 3 1
5 4 Components of docker Build docker image with docker file
- Docker container create docker container from docker image
- Docker client Run the docker container
- Docker daemon

Department of Collegiate & Technical Education Bengaluru-560001 Page 89


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Docker image
- Docker registry
Install docker on desktop and start the docker
tool.
Explore and try other containers.
Disaster recovery and their types 2
Container orchestration
How does it work?
What is orchestration?
Elements of disaster recovery plan
3,4, 2,3, Orchestration engine
3 1 3 1
5 4 Build a disaster recovery plan
Orchestration tools
Load Balancing
Docker swarm – components and features
Load balancer and its functions
Application monitoring 2
- Need for application monitoring
- Components of application performance Contd.
3,4, 2,3,
4 1 3 1
5 4 management. Redundancy and mirroring
- How to select application monitoring tools?
Explore and compare APM tools

5 CIE 5 – Written and Practice Test Assessment Review and corrective action

6 Cloud orchestration 2 3
Project
Internship
a) Secondary research on various a) Identification of the problem statement
13 1 industries and their operations to identify at (from at least 3 known problems) the students
least 3 companies along with the areas of work would like to work as part of the project – either
interest and develop an internship plan that
as provided by faculty or as identified by the

Department of Collegiate & Technical Education Bengaluru-560001 Page 90


Diploma in Computer Science & Engineering C 20 : 2020 - 21

clearly highlights expectations from the student. Document the impact the project will
industry during the internship. have from a technical, social and business
b) Design and develop a cover letter for an perspective.
internship request to all 3 identified companies
and the resume to be submitted to potential b) Design and develop the project solution
companies. or methodology to be used to solve at least one of
Prepare for an internship interview to highlight the problems identified.
your interests, areas of study, career
aspirations and personnel competence – Prepare a project plan that will include a
including the areas of learning you expect to schedule, WBS, Budget and known risks along
learn during internship. with strategies to mitigate them to ensure the
project achieves the desired outcome.

**Note: Saturday session from 9 AM -2 PM

References

Sl. No Description

1 Hands-On Full Stack Development with Spring Boot 2.0 and React

2 React Cookbook , David Griffiths and Dawn Griffiths

3 Build a Basic Web Application on AWS (amazon.com)

4 A Docker Tutorial for Beginners (docker-curriculum.com)

5 Spring Boot 2.0 Projects By Mohamed Shazin Sadakath

Department of Collegiate & Technical Education Bengaluru-560001 Page 91


Diploma in Computer Science & Engineering C 20 : 2020 - 21

CIE and SEE Assessment Methodologies

Duration
CIE Assessment Assessment Mode Max Marks
In hours
Week 3 CIE 1– Written and practice test 4 30
Week 5 CIE 2– Written and practice test 4 30
Week 8 CIE 3– Written and practice test 4 30
Week 10 CIE 4– Written and practice test 4 30
Week 12 CIE 5– Written and practice test 4 30
Week 13 Assessment for Project or Internship 4 30
On line Course work (At least one related to the specialization) 30
Portfolio evaluation (Based on industrial assignments and weekly developmental assessment) * 30
TOTAL CIE MARKS (A) 240
SEE 1 - Theory exam (QP from BTE) Conducted for 100 marks 3 hour duration reduced to 60 marks 3 60
SEE 2 – Practical duration 3hr. Max marks 100 3 100
TOTAL SEE MARKS (B) 160
TOTAL MARKS (A+B) 400
* The industrial assignment shall be based on peer-to-peer assessment for a total of 10 marks (on a scale of 1 to 10) and in the event of a group
assignment the marks awarded will be the same for the entire group, the developmental assessment will be for a total of 20 marks and based on
MCQ/case study/demonstration and such other assignment methods

Department of Collegiate & Technical Education Bengaluru-560001 Page 92


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Scheme of Evaluation for SEE 2

Sl. No Description Marks

1 Case submission 20

2 Case presentation 20

3 Case innovation 20

4 Result 20

5 Viva voce 20

Total 100

Department of Collegiate & Technical Education Bengaluru-560001 Page 93


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Submission / Content Evaluation Rubrics


Evaluation
5 4 3 2 1 Student Score
Parameters
Identifies and Identifies and
Identifies and Identifies and Identifies limited
Identification of understands all understands most
understands some of understands a few issues
the main the main issues of the main issues 5
the issues in the of the issues in the in the problem
issues / problem in the problem in the problem
problem statement problem statement statement
statemen statement

Insightful and Superficial analysis of


Analysis of the Thorough analysis of Incomplete analysis of No analysis of the
thorough analysis some of the issues in 4
issues most of the issues the issues issue
of all the issues the problem statement

Well documented,
Comments on reasoned and Appropriate, well
effective solutions pedagogically thought out
Superficial and / or Little and/or
/ strategies (The appropriate comments about
inappropriate solutions inappropriate No action to all
solution may be in comments on solutions, or
to some of the issues solutions to all of the issues in the 2
the problem solutions, or proposals for
in the problem issues in the problem problem statement
statement already proposals for solutions, to most of
statement statement
or proposed by solutions, to all the issues in the
you) issues in the problem statement
problem statement
Excellent research
Links to course into the issues with Good research and
Limited research and Incomplete research
learning and clearly documented documented links to No research or links
documented links to and links to any 3
additional links to course the materials read to any reading
any readings reading.
research learnings and during the course
beyond.

Total 14/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 94


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Presentation Evaluation Rubrics

Evaluation Student
5 4 3 2 1
Parameters Score
Clear flow of
ideas Most ideas flow Hard to
Very clear and concise No flow in
but is lost at follow the
flow of ideas Demonstrates the
times Limited flow of
Demonstrates passionate interest in the presentation
Delivery & Enthusiasm evidence of ideas Lack 4
interest in the topic and topic and Poor
interest in and of
engagement with class / engagement presentation
examiner engagement enthusiasm
with class / skills
with the topic and interest
examiner
Limited
use of Poor visuals used
Visuals augmented
Use of visuals and some visuals
and extended visuals
Visuals related to the No use of visuals are not easy to 2
comprehension of the loosely
topic understand its
issues in unique ways related to
relevance.
the topic
Uses stage
effects such as
Uses stage effects props, sound Limited use of
such as props, sound effects, and stage effects
effects, and speech speech and/or used in a
modulation in a modulation in manner that did
No use of stage Poor stage effects
Staging unique and dramatic an effective not enhance the 5
effects usage
manner that enhances manner to understanding
the understanding of extend the of the issues in
the issues in the understanding the problem
problem statement. of the issues in statement.
the problem
statement.

Department of Collegiate & Technical Education Bengaluru-560001 Page 95


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Questions and Questions and


Excellent and salient discussions discussions
discussion points that addressed addressed
Involvement Little or no
elucidated material to important important
of the class / attempt to Did not engage
develop a deep information superficial
Examiners engage the the class /
understanding that issues of the
class / examiner and 3
• Questions Appropriate and developed problem
examiner in poor listening
• Discussions imaginative activities understanding statement
demonstrating skills
• Activities used to extend Appropriate Limited use of
their learning
understanding in a activities used activities to
creative manner to clarify clarify
understanding understanding

Total 14/20

Case Results Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score
The topic was well The topic was 4
The topic was The topic was
researched and all researched but
researched and researched and data
information and information and data Desired results
most information were not from
data included are were only partly from not obtained,
and data were from reliable sources.
accurate and from reliable sources of but some
reliable sources of The proof was not
reliable sources of information. relevant
Problem information. The backed up with
information like The proof was not fully research was
outcome proof was backed data, analysis or
high impact journals backed up with good done. Outcome
up with good data reasoning as taught
standards, etc. data or reasoning as not obtained as
and reasoning as in the class.
The proof was taught in the class. per the
taught in the class. Some outcome
enough backed up Partial outcome problem brief
Outcome achieved as obtained as per the
with accurate data, achieved as per the
per the problem brief problem brief
analysis and problem brief

Department of Collegiate & Technical Education Bengaluru-560001 Page 96


Diploma in Computer Science & Engineering C 20 : 2020 - 21

reasoning beyond
the class learning.
Outcome achieved
beyond the problem
brief
Made effective use of Made good use of class 3
class principles, principles, models and
Made some use of Poorly applied
models and theories. theories Some creative
Application of class principles, Made limited use of class
Also used creativity ideas were explored to
class learning in models and theories class principles, principals,
to find effective find desired outcome
problem solving No creative ideas or models and theories models and
results appropriate but within the
models explored theories
to industry beyond framework of class
class learning. learning
Queries Excellent 2
Poor or no
response to Good response to Satisfactory response Limited response
Response to response to
comments and questions and to questions and to questions and
Class / questions and
discussion with discussions with some discussions with discussions with
Examiners did not
appropriate content connection made to limited reference to no reference to
Queries participate in
supported by theory/research theory/research theory/research
the discussions.
theory/research
Has not 4
Provides limited
Provides detailed and Provides adequate and provided
Provides appropriate and somewhat
appropriate mostly appropriate appropriate
Conclusions conclusion for the appropriate
conclusion for the conclusions for the conclusions for
problem statement conclusions for the
problem statement problem statement the problem
problem statement
statement.
Total 13/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 97


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Innovation Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score
Finding new The newly The newly The newly discovered The newly No new 5
processes / discovered discovered processes processes / models / discovered processes /
models / processes / models / models / approaches have processes / models models /
approaches / approaches are of approaches are of limited application but / approaches has approaches
good quality and appropriate quality relevant to the restricted were identified
relevant but limited relevance problem application
Proposing ideas Various ideas and Various ideas and Some ideas or Few ideas have No ideas or 3
and innovative innovative solutions innovative solutions innovative solutions been proposed innovative
solutions in terms have been proposed have been proposed have been proposed solutions have
of processes / and their application as well as the outline but the process of been proposed
models / have been clearly of the process to applying them hasn't
approaches and outlined apply them been specified
how they can be
applied to solve
the problem on
hand
Using creativity Wherever necessary Creativity techniques Creativity techniques Creativity Creativity 2
techniques to creativity techniques are frequently are utilized at times in techniques are technique are
provide and are utilized to utilized in more than less than 50% of the used a few times not utilized to
reason good ideas analyse and solve the 50% of the occasions occasions only analyse and
which are original problem solve the
and problem
unconventional
Finding Constraints and weak Constraints and weak A critical analysis is Only a description No constraints 3
constraints and points are are identified undertaken of the working or weak points
weak points in understood process and have been
existing processes methods are identified.
/ models / provided
approaches or
methods
Total 13/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 98


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Assessment framework for SEE (Theory) – 100 Marks / 3 hours (Reduced to 60 marks)

Programme: Computer Science & Engineering Semester: V


Course: Full Stack Web Development Max Marks: 100
Course Code: 20CS52I Duration: 3 Hrs
Instruction to the Candidate:
Answer one full question from each section.

Qn.No Question CL CO Marks


Section-1
1.a) 1
b)
2.a)
b)
Section-2
3.a) 2
b)
4.a)
b)
Section- 3
5.a) 3
b)
6.a)
b)
Section-4
7.a) 4
b)
8.a)
b)

Department of Collegiate & Technical Education Bengaluru-560001 Page 99


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Section-5
9.a) 5
b)
10.a)
b)

Assessment framework for CIE


Note : Theory to be conducted for 1 hour and practice for 3 hours, total duration of exam – 4 hours
Programme Computer Science & Engineering Semester V
Course Full Stack Development Max Marks 30
Course Code 20CS52I Duration 4 hours
Name of the course coordinator
Note: Answer one full question from each section.
Qn.No Question CL CO PO Marks
L3/L4
Section-1 (Theory) – 10 marks
1.a)
b)
2.a)
b)
c)
Section-2 (Practical) - 20 marks
3)
4)

Department of Collegiate & Technical Education Bengaluru-560001 Page 100


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Equipment/software list with Specification for a batch of 20 students

Sl. No. Particulars Specification Quantity


5. Intel i7, 4GB RAM,
Computers 20
500GB SSD
6. Eclipse/InteliJ , Apache Maven, Spring 5.0, MongoDB, MySQL,React, Selenium WebDrive,
Jira,Git,Jenkins
7.
Cloud – AWS/AZURE/GCB or any similar cloud environment
8.
Broadband connection

Department of Collegiate & Technical Education Bengaluru-560001 Page 101


Diploma in Computer Science & Engine

Cloud Computing

Department of Collegiate & Technical Education Bengaluru-560001 Page 102


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Diploma in Computer Science & Engineering


Program Computer Science & Semester 5
Engineering
Course Code 20CS53I Type of Course L:T:P (104:52:312)
Course Name Cloud Computing Credits 24
CIE Marks 240 SEE Marks 160

Introduction:

With technological advances, the future is set to be highly competitive and agility is the need of the
hour. With cloud computing, organizations can save money on storage, servers and management
services, as these services can be moved to the cloud with minimum cost, making your operations
more efficient. The cloud offers businesses more flexibility overall versus hosting on a local server.
And, for need of extra bandwidth, a cloud-based service can meet that demand instantly, rather than
undergoing a complex (and expensive) update to your IT infrastructure.

This specialisation course is taught in Bootcamp mode. Bootcamps are 12 weeks, intense learning
sessions designed to prepare you for the practical world – ready for either industry or becoming an
entrepreneur. You will be assisted through the course, with development-based assessments to
enable progressive learning.

This course will teach you Fundamentals of cloud computing Architecture, Compute instances, High
Availability and Scalability in Cloud, Databases, Cloud Storage Service, DNS Services and Content
Delivery, Serverless Computing, Container Services, Monitoring & Auditing and Cloud
Security. Details of the curriculum is presented in the sections below.

Note: Faculty and students are free to choose any two open public cloud available such as Amazon
Web Services (AWS), Microsoft Azure or Google Cloud Platform (GCP) etc. to implement the
activities as suggested in the detailed curriculum.

Pre-requisite

Before the start of this specialisation course, you would have completed the following courses;

In the 1st year of study, you would have studied Engineering Mathematics, Communication Skills,
Computer Aided Engineering Graphics, Statistics & Analysis, Basic IT Skills, Fundamentals of

Department of Collegiate & Technical Education Bengaluru-560001 Page 103


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Computer, Fundamentals of Electrical Electronics Engineering, Project Management skills and


Multimedia & Animation.

In the 2nd year of study, you would have studied Python Programming, Computer Hardware,
Maintenance and Administration, Computer Networks, Database System Concepts and PL/SQL,
Data Structures with Python, Operating System and Administration, Object oriented programming
and Design with Java, Software Engineering principles and practices.

In this year of study, you shall be applying your previous years learning along with specialised field
of study into projects and real-world applications.

Course Cohort Owner

A Course Cohort Owner is a faculty from the core discipline, who is fully responsible for one
specialised field of study and the cohort of students who have chosen to study that specialised field
of study.

Guidelines for Cohort Owner


1. Each Specialized field of study is restricted to a Cohort of 20 students which could include
students from other relevant programs.
2. One faculty from the Core Discipline shall be the Cohort Owner, who for teaching and
learning in allied disciplines can work with faculty from other disciplines or industry experts.
3. The course shall be delivered in boot camp mode spanning over 12 weeks of study, weekly
developmental assessments and culminating in a mini capstone.
4. The industry session shall be addressed by industry subject experts in the discipline only.
5. The cohort owner shall be responsible to identify experts from the relevant field and
organize industry session as per schedule.
6. Cohort owner shall plan and accompany the cohort for any industrial visits.
7. Cohort owner shall maintain and document industrial assignments, weekly assessments,
practices and mini project.
8. The cohort owner shall coordinate with faculties across programs needed for their course to
ensure seamless delivery as per time table
9. The cohort owner along with classroom sessions can augment or use supplementally
teaching and learning opportunities including good quality online courses available on
platforms like Karnataka LMS, Infosys Springboard, NPTEL, Unacademy, SWAYAM , etc.

Department of Collegiate & Technical Education Bengaluru-560001 Page 104


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Course outcome: A student should be able to


Work in cloud environment to demonstrate various aspects of Cloud computing and leverage
CO1
them for project needs
Demonstrate the Public cloud services like compute, storage, networking, IAM, databases and
CO2
configure them for given specification

CO3 Design, build and deploy a cloud native application using public cloud services and APIs

CO4 Adopt Cloud security policies, Monitor and troubleshoot basic issues in Cloud services

CO5 Administer cost, privileges and manage an existing deployed network

Department of Collegiate & Technical Education Bengaluru-560001 Page 105


Detailed course plan
Wee Da
CO PO 1st session (9am to 1 pm) L T P 2ND session (1.30pm to 4.30pm) L T P
k ys
Building blocks of cloud computing - IP addressing
- Introduction
- Networking - Routers and Switches
- Basic Architecture of Computer
- Networking - Firewalls
- Servers vs Desktop and laptops
1 1 1 4 - Databases 2 1
- Client-Server Computing
- Server virtualization
- Hard Drives - HDDs and SDDs
- Docker Containers
- Storage - block vs file vs object
- Application Programming Interfaces (API)
-
Introduction to cloud computing
- Introduction
- From Mainframes to Clouds Evolution –
1 How to host an application in traditional - Cloud Deployment Models - Public,
IT Infra Private, Hybrid, and Community.
- What is Cloud Computing - List out the examples for each cloud
1 1 2 3 1 2 1
- Example Cloud Application deployment models
- Cloud Computing Service Models - Benefits of Cloud
- Software as a Service (SaaS)
- Platform as a Service (PaaS)
- Infrastructure as a Service (IaaS)
-
Cloud Architecture
5 4 3 3 1 - Event-driven Architecture 2 1
- Introduction
Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Stateful vs Stateless Service - List out the Popular Cloud service


- Scaling up vs Scaling out providers along with their features (AWS,
- Load Balancing Azure, GCP)
- Fault Tolerance - Open Source cloud computing platforms
- Loose coupling
- Monolithic and Microservices
Architectures
Azure
- Regions, Region Pairs, Sovereign Regions
- Availability Zones and Data Centers
Cloud Overview
- Resources, Resource Groups,
Subscriptions, Management Groups
AWS
- Overview of Azure Services
- Regions and AZ
- VM and App Services
5 4 4 - Tour of AWS Console and Services in 4 3
- Azure Storage and Data Services
AWS
- Azure Networking Services and
- Creating an AWS Account
Microservices
- Shared Responsibility Model and AWS
- Tour of the Azure Portal
Acceptable Policy
- Azure Free Account
- Creating an Azure Free Account
- Shared Responsibility Model

5 Developmental Assessment Assessment Review and corrective action 3


1 1,5 6 Build blocks of Cloud Computing 2 3 Weekly Assignment(1PM-2PM)
Department of Collegiate & Technical Education Bengaluru-560001 Page 107
Diploma in Computer Science & Engineering C 20 : 2020 - 21

Cloud IAM Services


- What is IAM ?
- What is IAM used for ?
- Principle of least privilege
- AWS IAM
1 1 1 Peer Review 4 2 1
- IAM Introduction: Users, Groups, Policies
- IAM Users & Groups Hands on
- IAM Policies
- IAM Policies Hands On

- IAM MFA Overview

2 - IAM MFA Hands On


- AWS Access Keys, CLI & SDK Azure Active Directory
- AWS CLI Setup - Introduction to Azure Active Directory
- AWS CLI Hands On - Azure Active Directory Features

1,5 1,4 2 - AWS Cloud Shell 4 - Azure Subscriptions 1 2


- IAM Roles for AWS Services - Creating an Azure subscription
- IAM Roles Hands On - Trust between Azure Subscription and Azure
- IAM Security Tools AD
- IAM Security Tools Hands On
- IAM Best Practices
- Creating a user in Azure AD - Lab - Azure AD - Creating a group
1,5 4 3 2 2 1 2
- Introduction to Role Based Access Control - Azure AD Roles

Department of Collegiate & Technical Education Bengaluru-560001 Page 108


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Lab - Role-based assignments (Reader Role, - Lab - Azure AD- Assigning a Azure AD role
Resource group level, Subscription level, - Azure AD Custom Domains
Contributor Role, User Access Administrator - Self Service Password Reset
Role) - Lab on self-service password reset
- MFA or 2FA
- Lab - MFA on per user basis
- Installing Powershell
- Conditional Access Policies
- Quick look at a couple of commands
- Lab - Conditional Access Policies
1,3, - Installing Azure Powershell
1 4 1 2
4 - Azure Powershell and Azure CLI
- Installing Azure CLI
- What is Powershell
- Azure CLI Hands on

5 Developmental Assessment Assessment Review and corrective action 3


2,3
1,5 6 IAM services 2 3 Weekly Assignment
,4
Cloud Computing Instances
- Virtualization in Cloud Computing
- What is Virtualization ?
- Virtualization as a Concept of Cloud
2,3 Peer review
3 1,5 1 4 2 1
,4 Computing
- Architecture of Virtualization
- Types of Virtualization

2,3 AWS EC2 Instance - Private vs Public vs Elastic IP


1,5 2 1 3 3
,4
Department of Collegiate & Technical Education Bengaluru-560001 Page 109
Diploma in Computer Science & Engineering C 20 : 2020 - 21

- EC2 Basics - Lab - Private vs Public vs Elastic IP


- Create a EC2 instance with EC2 user data - EC2 Placement groups
- EC2 instance types basics - Lab - EC2 Placement groups
- Security groups and classic ports - Elastic Network Interface (ENI) Overview
- Lab - Security Groups - Lab - ENI
- How to SSH to EC2 Instance - EC2 Hibernate
- EC2 Instance Connect - Lab - EC2 Hibernate
- EC2 Instance Roles Demo - EC2 Advance concepts (Nitro, vCPU,
Capacity Reservations)

- EBS Overview Azure Virtual Machines


- Lab - EBS - The Virtual Machine Service
- EBS Snapshots - Deploying a Virtual Machine
- Lab - EBS Snapshots - Lab - Building a Windows Virtual Machine
- AMI Overview - Connecting to the Virtual Machine
2,3 - Lab - AMI - Lab - Installing IIS
2,5 3 1 4 3
,4
- EC2 Instance Store - State of the Virtual Machine
- EBS Volume Types - Lab - State of the Virtual Machine
- EBS Multi-Attach - Lab - Building a Linux Virtual Machine
- EBS Encryption - Lab - Deploying a web server on the Linux
- EFS virtual machine

Department of Collegiate & Technical Education Bengaluru-560001 Page 110


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Lab - EFS
- EFS vs EBS

- Lab - Deploying a Linux machine - SSH


keys
- The network interface - Lab - Data Disks Snapshot
- Network Security Groups - Azure Shared Disks
- Lab - Network Security Groups - Lab - Un-managed disks
- Azure Virtual Machines - Data Disks - Lab - Custom Script Extensions
- Lab - Adding data disks - Lab - Linux Virtual Machines - Cloud init
2,3,
2,5 4 1 3 3
4 - Server-side encryption - Azure Disk - Virtual Machine - Boot Diagnostics
Storage - Lab - Virtual Machine - Serial Console and
- Encryption with customer managed keys Run command
- Lab - Azure Disk Encryption - Azure Dedicated Host
- Disks - Understanding IOPS and
Throughput
-

5 CIE 1 – Written and Practice Test Assessment Review and corrective action 3

1 4 6 2 3 Weekly Assignment
Computing Instances

Peer review - Cloud Networking


2,3 1
4 2 4 2 1
,4 - Introduction

Department of Collegiate & Technical Education Bengaluru-560001 Page 111


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- CIDR, Private vs Public IP


- Subnet Overview
- Networking - VPC
- Default VPC Overview
- VPC Overview
- Lab - VPC
- Lab – Subnet
- Internet Gateways & Route Tables
- Lab - Internet Gateways & Route Tables
- Bastion Hosts
- Lab - Bastion Hosts
- NAT Instances
- Lab - NAT Instances
- NAT Gateways
- Lab - NAT Gateways
- NACL & Security Groups - Direct Connect & Direct Connect Gateway
- Lab - NACL & Security Groups - AWS PrivateLink - VPC Endpoint Services
- VPC Reachability Analyzer - AWS ClassicLink
- Lab - VPC Reachability Analyzer - Transit Gateway
2 1,3 2 1 3 1 2
- VPC Peering - VPC Traffic Mirroring
- Lab - VPC Peering - IPv6 for VPC
- VPC Endpoints - Lab - IPv6 for VPC
- Lab - VPC Endpoints - Egress Only Internet Gateway

Department of Collegiate & Technical Education Bengaluru-560001 Page 112


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- VPC Flow Logs - Lab - Egress Only Internet Gateway


- Lab - VPC Flow Logs - Networking Costs in AWS
- Site to Site VPN, Virtual Private Gateway
& Customer Gateway
- Lab - Site to Site VPN, Virtual Private
Gateway & Customer Gateway
- Attaching a secondary network interface
- Virtual Networks in Azure - Lab - Adding a secondary network
- Introduction interface
- The network interface - Network Security Groups
- Lab - Working with Azure virtual - Lab - Network Security Groups (Working
2,3
2 3 1 3 3
,4 networks with rules, Priority setting, Subnets)
- Lab - Deploying a machine to the virtual - Virtual Network Peering
network - Lab - Virtual Network Peering - Setup and
Implementation

- Virtual private network - Connection Troubleshoot


- Point-to-Site VPN Connections - Connection Monitor
- Lab - Point-to-Site VPN Connections - IP Flow Verify
2,3 - Site to Site VPN Connection - Next hop
2 4 2 2 1 2
,4
- Lab - Site to Site VPN Connection - NSG Diagnostic
- Azure VPN Gateway - High Availability - Lab - Network Watcher - NSG Flow logs
- Azure ExpressRoute - User Defined Routes

Department of Collegiate & Technical Education Bengaluru-560001 Page 113


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Azure ExpressRoute peering - Lab - User Defined Routes (Setup, Route


- Network Watcher table and Enable forwarding)
- Azure Firewall
- Lab - Azure Firewall
5 Developmental Assessment Assessment Review and corrective action 3
2,3 Cloud Networking
2 6 2 3 Weekly assignment
,4
High Availability and Scalability in Cloud
- High Availability and Scalability
- Elastic Load Balancer (ELB) and Auto
Scaling Groups (ASG)
- Classic Load Balancer (CLB)
- Lab - CLB
Peer review
- Application Load Balancer (ALB)
2,3 - Lab - ALB
5 2,5 1 4 1 2
,4 Mini Project Activity – Status review
- Network Load Balancer (NLB)
- Lab - NLB
- Gateway Load Balancer (GWLB)
- Elastic Load Balancer - Sticky Sessions
- Elastic Load Balancer - Cross Zone Load
Balancing
- Elastic Load Balancer - SSL Certificates

Department of Collegiate & Technical Education Bengaluru-560001 Page 114


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Elastic Load Balancer - Connection


Draining
- Auto Scaling Groups (ASG) Overview
- Lab - ASG
- Auto Scaling Groups - Scaling Policies
- Lab - Auto Scaling Groups - Scaling Policies

The Azure Load Balancer Service


Explore Availability and Scalability in Azure - Azure Basic Load Balancer
- Availability Sets - Azure Load Balancer and SKU's
- Lab - Availability Sets - Lab - Basic Load Balancer - Setup and
- Use case scenario - Availability sets Implementation
- Availability Zones - Basic Load Balancer - NAT rules
2,3 - Lab - Availability Zones - Lab - Basic Load Balancer - Scale Set
2,5 2 1 3 3
,4
- Azure virtual machine scale sets - Setting up the scale set,Setting up the scale
- Lab - Azure Virtual Machine Scale Sets, set - Resources, Load Balancer Setup,
Scaling conditions and Flexible Scaling
Orchestration Mode - Lab - Azure Load Balancer - Standard SKU
- - Setup
-
Azure Application Gateway
- Lab - Azure Load Balancer - Standard SKU
2,3 3 - Open Systems Interconnection Model
2,5 4 1 2
,4 - Implementation
- Azure Application Gateway - Components

Department of Collegiate & Technical Education Bengaluru-560001 Page 115


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Lab - Azure Load Balancer - Multiple - Lab - Azure Application Gateway - URL
Backend Pools Routing
- Lab - NAT Rules - Same port number - Setup and Implementation
- Lab - Standard Load Balancer - Outbound - Lab - Azure Application Gateway -
Connectivity Multiple Sites
- Load Balancer - Session Persistence - Setup and Implementation
Azure Database Service
- Major Database Features
Databases in Cloud
- Database on VM
- Introduction
- Azure SQL
- RDS, Aurora, ElasticCache
- Which Azure SQL to Choose?
- Amazon RDS Overview
- Creating and Connecting to Azure SQL
- RDS Read Replicas vs Multi AZ
- Connecting the Catalog to the Database
- Lab - Amazon RDS
- Securing the Database Connection
2,3 - RDS Encryption + Security
2,5 4 1 3 3
,4 - Connecting the Inventory to the Database
- Amazon Aurora
- Cosmos DB
- Lab - Amazon Aurora
- SQL vs NoSQL Databases
- Aurora - Advanced Concepts
- Cosmos DB Consistency Levels
- ElasticCache Overview
- Creating and Using Cosmos DB
- Lab - ElasticCache
- Connecting the Orders Function to Cosmos
DB
Azure MySQL and Azure PostgreSQL Overview

5 CIE 2 – Written and Practice Test Assessment Review and corrective action 3

Department of Collegiate & Technical Education Bengaluru-560001 Page 116


Diploma in Computer Science & Engineering C 20 : 2020 - 21

2,3
2,5 6 High Availability and Scalability 2 3 Weekly Assignment
,4
Cloud Storage Service
- AWS Storage Services
- Amazon S3 - Section Introduction
- S3 Buckets and Objects
- Lab - S3 Buckets and Objects
- S3 Versioning
Peer review
- Lab - S3 Versioning
2,3 2,3 Mini Project Activity – Status review
1 4 1 2
,5 ,4 - S3 Encryption
- Lab- S3 Encryption
- S3 Security & Bucket Policies

6 - Lab - S3 Security & Bucket Policies


- S3 Websites
- S3 CORS
- Lab - S3 CORS
- Lab - S3 Pre-signed URLs
- S3 Consistency Model
- S3 Storage Classes + Glacier
- S3 MFA Delete
- Lab - S3 Storage Classes + Glacier
- Lab - S3 MFA Delete
2,3 2,3 - S3 Lifecycle Rules
2 1 3 1 2
,5 ,4 - S3 Default Encryption
- Lab - S3 Lifecycle Rules
- S3 Access Logs
- S3 Analytics
- Lab - S3 Access Logs
- S3 Performance

Department of Collegiate & Technical Education Bengaluru-560001 Page 117


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- S3 Replication (Cross Region and Same - S3 Event Notifications


Region)
- Lab - S3 Replication
- S3 Pre-signed URLs
- Athena Overview
- Lab - Athena Azure Storage Data Services
- AWS Snow Family Overview - Introduction
- Lab - AWS Snow Family - Benefits of Azure Storage
- Amazon FSx - What are storage accounts
2,3 2,3 - Lab - Amazon FSx - Different types of storage accounts
3 2 2 1 2
,5 ,4
- Storage Gateway Overview - Lab - Creating an Azure storage account
- Lab - Storage Gateway - Azure Blob service
- AWS Transfer Family - Lab - Blob service - Uploading a blob,
- Compare AWS Storage options Accessing the blob

- Azure Storage Accounts - Different


- Azure Storage Accounts - Data
authorization techniques
Redundancy
- Lab - Using Azure Storage Explorer,
- Configuring Storage Redundancy
Using Access keys
2,3 2,3 - Storage Accounts - Access Tiers
4 4 3
,5 ,4 - Lab - Shared Access Signatures - Blob
- Lab - Storage Accounts - Hot and Cool
Level, At the Storage Account Level
Access Tier, Archive Access Tier
- Lab - Azure Storage Accounts - Stored
- Azure Storage Accounts - Lifecycle policies
Access Policy

Department of Collegiate & Technical Education Bengaluru-560001 Page 118


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Lab - Azure Storage Accounts - Active - Lab - Azure Storage Accounts - Object
Directory Authentication Replication
- Azure Storage Accounts - Different - Azure File shares
authorization techniques - Lab - Working with File shares
- Azure File Sync
- Lab - Azure File Sync Service - Setup and
Configuration

5 Developmental Assessment Assessment Review and corrective action 3


2,3 2,3 Storage Service - Weekly Assignment
6 2 3
,5 ,4
DNS Services and Content Delivery
- What is DNS ?
- Route 53
- Overview
- Route 53 - Registering a domain
Peer Review - Route 53 - Creating our first records
2,3 2,3 Mini Project Activity – Status review - Route 53 - EC2 Setup
7 1 4 3
,5 ,4
- Route 53 - TTL
- Route 53 CNAME vs Alias
- Routing Policy - Simple, Weighted
- Routing Policy - Latency
- Route 53 - Health Checks
- Lab - Route 53 - Health Checks

Department of Collegiate & Technical Education Bengaluru-560001 Page 119


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Routing Policy - Failover, GeoLocation,


Geoproximity
- Lab - Routing Policy - Traffic Flow &
Geoproximity hands On
- Routing Policy - Multi Value
- 3rd Party Domains & Route 53
- Azure Private DNS
- What is CDN ?
- Lab- Azure Private DNS
- Advantages of CDN
- Azure Public DNS
- CloudFront & AWS Global Accelerator
- Azure CDN
- CloudFront Overview
2,3 2,3 - Azure CDN Features
2 - Lab - CloudFront with S3 2 2 1 2
,5 ,4 - How to use Azure CDN ?
- CloudFront Signed URL / Cookies
- Lab - Create Azure CDN
- CloudFront Advanced Concepts
- Create a storage account
- AWS Global Accelerator - Overview
- Enabling CDN for storage account
- Lab - AWS Global Accelerator

Serverless Computing in Cloud


Amazon DynamoDB
- What is Serverless computing?
- Lab - Amazon DynamoDB
- Benefits of serverless computing
2,3 2,3 - API Gateway Overview
3 - Serverless application patterns 1 3 1 2
,5 ,4 - Lab - API Gateway Overview
- Serverless computing in AWS
- API Gateway Security
- Lambda Overview
- AWS Cognito Overview
- Lab - Lambda

Department of Collegiate & Technical Education Bengaluru-560001 Page 120


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Lambda Limits - Serverless Application Model (SAM)


- Lambda@Edge Overview
Azure Serverless
Lab - Creating a Testing a Logic App
- How Azure Does Serverless
- Azure Serverless Storage and Data
- Overview of Azure Functions
2,3 2,3 - Using Azure Storage with Functions
4 - Lab - Creating and Testing a Azure 1 3 3
,5 ,4 - Using Cosmos DB with Functions
Function
- Securing Azure Functions
- Logic Apps
- Serverless Solutions Architecture

5 Development Assessment Assessment Review and corrective action 3


2,3 2,3 DNS Services and Content Delivery
6 2 3 Weekly Assignment
,5 ,4
Container Services
- The need for containers
- Introduction to Docker

Peer review - Lab - Deploying Docker on a virtual


2,3 2,3 Mini Project Activity – Status review machine
1 4 1 2
,5 ,4
- Lab - Running the nginx container on the
8
Linux VM
- Lab - Practice Docker commands
- The need for an image registry
Amazon ECR Azure Container Registry
2,3 2,3
2 4 2 1
,5 ,4 - Lab - Amazon ECR - Lab - Azure Container Registry

Department of Collegiate & Technical Education Bengaluru-560001 Page 121


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- Publishing to Amazon ECR - Publishing to the Azure Container Registry


- Publishing to the Azure Container Registry
- Resources
Amazon ECS
- Lab - Creating ECS Cluster Azure Container Instances
2,3 2,3 - Lab - Creating ECS Service 4 - Lab - Azure Container Instances and Azure
3 3
,5 ,4
- Amazon ECS - Auto Scaling, Rolling Container Groups
Updated and Solutions Architectures
Kubernetes
- What is Kubernetes ?
- Kubernetes components
Azure Kubernetes Services (AKS) Overview
- Learn Kubernetes Basics
- Lab - Deploying an Azure Kubernetes
- Create a Cluster
2,3 2,3 cluster
4 1 3 3
,5 ,4 - Deploy an App
- Lab - Deploying our application
- Explore your App
Amazon EKS Overview
- Expose your App Publicly
- Scaling your App

5 CIE 3 – Written and Practice Test Assessment Review and corrective action 3

2,3 2,3
6 Container Services 2 3 Weekly Assignment
,5 ,4

Department of Collegiate & Technical Education Bengaluru-560001 Page 122


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Monitoring and Auditing


- AWS Monitoring

Peer review - CloudWatch Metrics

Mini Project Activity – Status review - CloudWatch Custom Metrics and


3 2,3 1 4 2 1
Dashboards
- CloudWatch Logs
- Lab - CloudWatch Logs
- CloudWatch Agent & CloudWatch Logs
- CloudTrail Overview
Agent
- Lab - CloudTrail
- CloudWatch Alarms
2,3 2,3 - AWS Config - Overview
2 1 3 3
,5 ,4 - Lab - CloudWatch Alarms
- Lab - AWS Config
9 - AWS CloudWatch Events
- CloudTrail vs CloudWatch vs Config
- Amazon EventBridge

Azure Monitoring - Lab - Azure Monitor - Alerts


2,3 2,3 - Azure Monitor Service - What is a Log Analytics Workspace?
3 2 2 3
,5 ,4
- Quick look at Azure Monitor - Lab - Creating a Log Analytics workspace
- Lab - Connecting virtual machine to the - Log Analytics - Alerts
workspace - What is Application Insights
5 3,4 4 4 3
- Log Analytics Queries - Quick Look at Application Insights
- Lab - Log Analytics Queries - Application Insights Tips and Tricks

5 Development Assessment Assessment Review and corrective action 3

4 2,3 6 Monitoring and Auditing 2 3 Weekly Assignment

Department of Collegiate & Technical Education Bengaluru-560001 Page 123


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Cloud Security
- Introduction
Defense in depth in security
Peer review
1 3,4 1 4 - AWS Security & Encryption 1 2
Mini Project Activity (2)
- KMS Overview
- Lab - KMS with CLI
- KMS Key Rotation
- AWS Secrets Manager - Overview
- SSM Parameter Store Overview
- Lab - AWS Secrets Manager
- Lab - SSM Parameter Store (CLI)
2,3 3,4 2 4 - CloudHSM 1 2
- Lab - SSM Parameter Store (AWS
- Shield - DDoS Protection
Lambda)
10
- Amazon Inspector
- Web Application Firewall (WAF)
- Macie
- Lab - WAF & Shield
2,3, - AWS Well Architected Framework with
3 3 1 3 1 2
4 - Amazon GuardDuty
more focus on Security

- Azure Key Vault


- VM Security Best Practices
- Azure Monitor
- Networking Security Best Practices
3 3,4 4 1 3 - Azure Sentinel (SIEM and SOAR) 3
- Database Security Best Practices
- Azure Policy
- Zero Trust security
Azure Security Center
5 CIE 4 – Written and Practice Test Assessment Review and corrective action 3

Department of Collegiate & Technical Education Bengaluru-560001 Page 124


Diploma in Computer Science & Engineering C 20 : 2020 - 21

2,3 3,4 6 Defense in depth in security 2 3 Weekly Assignment


Cloud Migration
- How to plan a cloud migration?
Peer Review - Cloud migration process
2,3, Mini Project Activity – Status review 4 - Cloud Migration strategies
1,5 1 2 1
4
Prepare a report that, how will it helpful to small
scale industry moving from its own data center to
cloud?
11
Use any cloud migration tool and migrate a
2,3, - Cloud migration tools 1 3
2,3 2 1 2
4 service.

2,3 3 3 - AWS Tools 1 3 Cntd. 3


2.3, - Azure tools 1 3 Cntd.
2,3 4 3
4
5 Development Assessment Assessment Review and corrective action 3

3 2,3 6 Cloud Migration 2 3 Weekly Assignment


Big Data 1
- Big data examples BSE(5L orders/sec),jet
engine, Bank transactions, Social Media
Peer Review
- What is Big Data?
2,3, Mini Project Activity – Status review
12 1 1 2
4 - Types of Big data
- V’s of Big Data
- Sources of data
- Role of Big Data in AI&ML

Department of Collegiate & Technical Education Bengaluru-560001 Page 125


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Data Collection 2
- Frequency of data
- Flow characteristics of data (Streaming,
Transaction, Batch processing)
- Apache Hadoop - Data Cleaning or Data Cleansing
- HDFS 1. Consider a local big-data source, identify
1,2, 2,3,
2 2 2 1
3 4 Install big data solution softwares like MangoDB, the frequency, flow of data.
Hadoop Mapreduce or any other software 2. Cleanse (eg: remove duplicates, formatting
mistakes, organize) the data based on
requirements given by owner of data
(create your own rules)

1,2, - Transformation - Data Access 3


3,4,
- Data acquisition - update patterns (e.g. bulk, transactional,
5
- Integration batch/micro-batch)

Transfer the data using an ETL tool and store it access patterns (e.g. sequential vs. random access,
continuous usage vs.ad hoc)
2,3, in a big-data solution DB (like MangoDB)
3 2 2
4,6
Storage and Data Management 1. Calculate efficiency of different big-data
solutions during a. bulk b. transactional c.
- Storage Solutions based on
micro-batch updates
- cost and efficiency 2. Calculate efficiency of different big-data
- latency and durability characteristics solutions during a. sequential vs. random
access b. continuous usage vs ad hoc
Department of Collegiate & Technical Education Bengaluru-560001 Page 126
Diploma in Computer Science & Engineering C 20 : 2020 - 21

1. Compare multiple big-data solutions


based on a. Cost and Efficiency b. Latency
and durability

- searching and retrieving data catalogs and 3


Managing Metadata
metadata
- creating and updating data catalogs and
2,3 3,4 4 4 Create or update a standard or custom
metadata
metadata using AWS S3 or any other cloud
service
3
5 CIE 5 – Written and Practice Test Assessment Review and corrective action

1,3 5 6 Apache Hadoop 2 3 Weekly Assignment


Internship Project
a) Secondary research on various
industries and their operations to identify a) Identification of the problem statement
at least 3 companies along with the areas (from at least 3 known problems) the students
of work interest and develop an internship
plan that clearly highlights expectations would like to work as part of the project –
from the industry during the internship. either as provided by faculty or as identified by
1 b) Design and develop a cover letter for
2,3, the student. Document the impact the project 4 11
13 to an internship request to all 3 identified 2 4 19
4,6
4 companies and the resume to be submitted will have from a technical, social and business
to potential companies.
Prepare for an internship interview to perspective.
highlight your interests, areas of study, b) Design and develop the project solution
career aspirations and personnel
competence – including the areas of or methodology to be used to solve at least one
learning you expect to learn during of the problems identified.
internship.

Department of Collegiate & Technical Education Bengaluru-560001 Page 127


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Prepare a project plan that will include a


schedule, WBS, Budget and known risks along
with strategies to mitigate them to ensure the
project achieves the desired outcome.
**Note: Saturday session from 9 AM -2 PM
CIE and SEE Assessment Methodologies

Duration
CIE Assessment Assessment Mode Max Marks
In hours

Week 3 CIE 1– Written and practice test 4 30


Week 5 CIE 2– Written and practice test 4 30
Week 8 CIE 3– Written and practice test 4 30
Week 10 CIE 4– Written and practice test 4 30
Week 12 CIE 5– Written and practice test 4 30
Week 13 Assessment for Project or Internship 4 30
On line Course work (At least one related to the specialization) 30
Portfolio evaluation (Based on industrial assignments and weekly developmental assessment) * 30
TOTAL CIE MARKS (A) 240
SEE 1 - Theory exam (QP from BTE) Conducted for 100 marks 3 hour duration reduced to 60 marks 3 60
SEE 2 – Practical 3 100
TOTAL SEE MARKS (B) 160
TOTAL MARKS (A+B) 400
* The industrial assignment shall be based on peer-to-peer assessment for a total of 10 marks (on a scale of 1 to 10) and in the event of a group
assignment the marks awarded will be the same for the entire group, the developmental assessment will be for a total of 20 marks and based on
MCQ/case study/demonstration and such other assignment methods

Department of Collegiate & Technical Education Bengaluru-560001 Page 128


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Scheme of Evaluation for SEE 2

Sl. No Description Marks

1 Case submission 20

2 Case presentation 20

3 Case innovation 20

4 Result 20

5 Viva voce 20

Total 100

Department of Collegiate & Technical Education Bengaluru-560001 Page 129


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Submission / Content Evaluation Rubrics


Evaluation
5 4 3 2 1 Student Score
Parameters
Identifies and Identifies and
Identifies and Identifies and Identifies limited
Identification of understands all understands most
understands some of understands a few issues
the main the main issues of the main issues 5
the issues in the of the issues in the in the problem
issues / problem in the problem in the problem
problem statement problem statement statement
statemen statement

Insightful and Superficial analysis of


Analysis of the Thorough analysis of Incomplete analysis of No analysis of the
thorough analysis some of the issues in 4
issues most of the issues the issues issue
of all the issues the problem statement

Well documented,
Comments on reasoned and Appropriate, well
effective solutions pedagogically thought out
Superficial and / or Little and/or
/ strategies (The appropriate comments about
inappropriate solutions inappropriate No action to all
solution may be in comments on solutions, or
to some of the issues solutions to all of the issues in the 2
the problem solutions, or proposals for
in the problem issues in the problem problem statement
statement already proposals for solutions, to most of
statement statement
or proposed by solutions, to all the issues in the
you) issues in the problem statement
problem statement
Excellent research
Links to course into the issues with Good research and
Limited research and Incomplete research
learning and clearly documented documented links to No research or links
documented links to and links to any 3
additional links to course the materials read to any reading
any readings reading.
research learnings and during the course
beyond.

Total 14/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 130


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Presentation Evaluation Rubrics

Evaluation Student
5 4 3 2 1
Parameters Score
Clear flow of
ideas Most ideas flow Hard to
Very clear and concise No flow in
but is lost at follow the
flow of ideas Demonstrates the
times Limited flow of
Demonstrates passionate interest in the presentation
Delivery & Enthusiasm evidence of ideas Lack 4
interest in the topic and topic and Poor
interest in and of
engagement with class / engagement presentation
examiner engagement enthusiasm
with class / skills
with the topic and interest
examiner
Limited
use of Poor visuals used
Visuals augmented
Use of visuals and some visuals
and extended visuals
Visuals related to the No use of visuals are not easy to 2
comprehension of the loosely
topic understand its
issues in unique ways related to
relevance.
the topic
Uses stage
effects such as
Uses stage effects props, sound Limited use of
such as props, sound effects, and stage effects
effects, and speech speech and/or used in a
modulation in a modulation in manner that did
No use of stage Poor stage effects
Staging unique and dramatic an effective not enhance the 5
effects usage
manner that enhances manner to understanding
the understanding of extend the of the issues in
the issues in the understanding the problem
problem statement. of the issues in statement.
the problem
statement.

Department of Collegiate & Technical Education Bengaluru-560001 Page 131


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Questions and Questions and


Excellent and salient discussions discussions
discussion points that addressed addressed
Involvement Little or no
elucidated material to important important
of the class / attempt to Did not engage
develop a deep information superficial
Examiners engage the the class /
understanding that issues of the
class / examiner and 3
• Questions Appropriate and developed problem
examiner in poor listening
• Discussions imaginative activities understanding statement
demonstrating skills
• Activities used to extend Appropriate Limited use of
their learning
understanding in a activities used activities to
creative manner to clarify clarify
understanding understanding

Total 14/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 132


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Results Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score
The topic was well 4
researched and all
information and
The topic was
data included are The topic was The topic was
researched but
accurate and from researched and researched and data
information and data Desired results
reliable sources of most information were not from
were only partly from not obtained,
information like and data were from reliable sources.
reliable sources of but some
high impact journals reliable sources of The proof was not
information. relevant
Problem standards, etc. information. The backed up with
The proof was not fully research was
outcome The proof was proof was backed data, analysis or
backed up with good done. Outcome
enough backed up up with good data reasoning as taught
data or reasoning as not obtained as
with accurate data, and reasoning as in the class.
taught in the class. per the
analysis and taught in the class. Some outcome
Partial outcome problem brief
reasoning beyond Outcome achieved as obtained as per the
achieved as per the
the class learning. per the problem brief problem brief
problem brief
Outcome achieved
beyond the problem
brief
Made effective use of Made good use of class 3
class principles, principles, models and
Made some use of Poorly applied
models and theories. theories Some creative
Application of class principles, Made limited use of class
Also used creativity ideas were explored to
class learning in models and theories class principles, principals,
to find effective find desired outcome
problem solving No creative ideas or models and theories models and
results appropriate but within the
models explored theories
to industry beyond framework of class
class learning. learning
Response to Queries Excellent Poor or no 2
Good response to Satisfactory response Limited response
Class / response to response to
questions and to questions and to questions and
Examiners comments and questions and
discussions with some discussions with discussions with
Queries discussion with did not

Department of Collegiate & Technical Education Bengaluru-560001 Page 133


Diploma in Computer Science & Engineering C 20 : 2020 - 21

appropriate content connection made to limited reference to no reference to participate in


supported by theory/research theory/research theory/research the discussions.
theory/research
Has not 4
Provides limited
Provides detailed and Provides adequate and provided
Provides appropriate and somewhat
appropriate mostly appropriate appropriate
Conclusions conclusion for the appropriate
conclusion for the conclusions for the conclusions for
problem statement conclusions for the
problem statement problem statement the problem
problem statement
statement.
Total 13/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 134


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Innovation Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score
Finding new The newly The newly The newly discovered The newly No new 5
processes / discovered discovered processes processes / models / discovered processes /
models / processes / models / models / approaches have processes / models models /
approaches / approaches are of approaches are of limited application but / approaches has approaches
good quality and appropriate quality relevant to the restricted were identified
relevant but limited relevance problem application
Proposing ideas Various ideas and Various ideas and Some ideas or Few ideas have No ideas or 3
and innovative innovative solutions innovative solutions innovative solutions been proposed innovative
solutions in terms have been proposed have been proposed have been proposed solutions have
of processes / and their application as well as the outline but the process of been proposed
models / have been clearly of the process to applying them hasn't
approaches and outlined apply them been specified
how they can be
applied to solve
the problem on
hand
Using creativity Wherever necessary Creativity techniques Creativity techniques Creativity Creativity 2
techniques to creativity techniques are frequently are utilized at times in techniques are technique are
provide and are utilized to utilized in more than less than 50% of the used a few times not utilized to
reason good ideas analyse and solve the 50% of the occasions occasions only analyse and
which are original problem solve the
and problem
unconventional
Finding Constraints and weak Constraints and weak A critical analysis is Only a description No constraints 3
constraints and points are are identified undertaken of the working or weak points
weak points in understood process and have been
existing processes methods are identified.
/ models / provided
approaches or
methods
Total 13/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 135


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Assessment framework for SEE (Theory) – 100 Marks / 3 hours (Reduced to 60 marks)

Programme: Computer Science & Engineering Semester: V


Course: Cloud Computing Max Marks: 100
Course Code: 20CS53I Duration: 3 Hrs
Instruction to the Candidate: Answer one full question from each section.
Qn.No Question CL CO Marks
Section-1
1.a) 1
b)
2.a)
b)
Section-2
3.a) 2
b)
4.a)
b)
Section- 3
5.a) 3
b)
6.a)
b)
Section-4
7.a) 4
b)
8.a)

Department of Collegiate & Technical Education Bengaluru-560001 Page 136


Diploma in Computer Science & Engineering C 20 : 2020 - 21

b)
Section-5
9.a) 5
b)
10.a)
b)

Assessment framework for CIE


Note : Theory to be conducted for 1 hour and practice for 3 hours, total duration of exam – 4 hours
Programme Computer Science & Engineering Semester V
Course Cloud Computing Max Marks 30
Course Code 20CS53I Duration 4 hours
Name of the course coordinator
Note: Answer one full question from each section.
Qn.No Question CL CO PO Marks
L3/L4
Section-1 (Theory) – 10 marks
1.a)
b)
2.a)
b)
c)
Section-2 (Practical) - 20 marks
3)
4)

Department of Collegiate & Technical Education Bengaluru-560001 Page 137


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Equipment/software list with Specification for a batch of 20 students

Sl. No. Particulars Specification Quantity


9. Intel i5, 4GB RAM,
Computers 20
500GB SSD
10.
Cloud – AWS/AZURE/GCP or any similar public cloud environment 20
11.
Broadband connection Atleast 50MBPS 1

Department of Collegiate & Technical Education Bengaluru-560001 Page 138


Cyber Security
Diploma in Computer Science & Engineering C 20 : 2020 - 21

Diploma in Computer Science & Engineering


Computer Science &
Program Semester 5
Engineering

Course Code 20CS54I Type of Course L:T:P (104:52:312)

Course Name Cyber Security Credits 24

CIE Marks 240 SEE Marks 160

Introduction:
Welcome to the curriculum for the Artificial Intelligence and Machine Learning (AI&ML)
Specialisation. This specialisation course is taught in Bootcamp mode. Bootcamps are 13 weeks,
intense learning sessions designed to prepare you for the practical world – ready for either industry
or becoming an entrepreneur. You will be assisted through the course, with development-based
assessments to enable progressive learning.

In the era of connected computing devices, securing the personal data, application, system, network
and organization becomes the challenging task in the field of Computer science and Engineering.
The specialization prepare students to take up job or to become entrepreneur in the challenging
area of Cyber security

Pre-requisite

Before the start of this specialisation course, you would have completed the following courses;

In the 1st year of study, you would have studied Engineering Mathematics, Communication Skills,
Computer Aided Engineering Graphics, Statistics & Analysis, Basic IT Skills, Fundamentals of
Computer, Fundamentals of Electrical and Electronics Engineering, Project Management skills and
Multimedia & Animation.

In the 2nd year of study, you would have studied Python Programming, Computer Hardware,
Maintenance and Administration, Computer Networks, Database System Concepts and PL/SQL,
Data Structures with Python, Operating System and Administration, Object oriented programming
and Design with Java, Software Engineering principles and practices.

In this year of study, you shall be applying your previous years learning along with specialised field
of study into projects and real-world applications.

Course Cohort Owner

Department of Collegiate & Technical Education Bengaluru-560001 Page 140


Diploma in Computer Science & Engineering C 20 : 2020 - 21

A Course Cohort Owner is a faculty from the core discipline, who is fully responsible for one
specialised field of study and the cohort of students who have chosen to study that specialised field
of study.

Guidelines for Cohort Owner


10. Each Specialized field of study is restricted to a Cohort of 20 students which could include
students from other relevant programs.
11. One faculty from the Core Discipline shall be the Cohort Owner, who for teaching and
learning in allied disciplines can work with faculty from other disciplines or industry experts.
12. The course shall be delivered in boot camp mode spanning over 12 weeks of study, weekly
developmental assessments and culminating in a mini capstone.
13. The industry session shall be addressed by industry subject experts in the discipline only.
14. The cohort owner shall be responsible to identify experts from the relevant field and
organize industry session as per schedule.
15. Cohort owner shall plan and accompany the cohort for any industrial visits.
16. Cohort owner shall maintain and document industrial assignments, weekly assessments,
practices and mini project.
17. The cohort owner shall coordinate with faculties across programs needed for their course to
ensure seamless delivery as per time table
18. The cohort owner along with classroom sessions can augment or use supplementally
teaching and learning opportunities including good quality online courses available on
platforms like Karnataka LMS, Infosys Springboard, NPTEL, Unacademy, SWAYAM , etc.

Course outcome: A student should be able to


Design, optimize, operate and maintain a secure network/system/application/cloud and data
CO1
resources for given requirements
CO2 Apply cryptography to secure a cyber system.

CO3 Respond to incidents to mitigate immediate and potential threats .

Test, implement, deploy, maintain and review the infrastructure to effectively manage the
CO4
network and resources.

CO5 Monitor network to actively remediate unauthorized activities.

Department of Collegiate & Technical Education Bengaluru-560001 Page 141


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Detailed course plan


We Da
CO PO 1st session (9am to 1 pm) L T P 2ND session (1.30pm to 4.30pm) L T P
ek ys
- Protecting your personal data
- Online identity Introduction and Basic concepts of cyber
- Where is your data ? security
- Smart devices What is Cyber security, Security
- What do attackers want ? principles
- Identity theft CIA, AAA
- Protecting your organization data Vulnerability, Threat, Risk, attack and
- Traditional data Impact
- Cloud; IoT; Big data People, Process and Technology
- Types of data McCumbers Cube
1 1 1 1 4 - - 3
- Sensitive and non sensitive data Cyber Security
- Personal data, PII data - Brief history and types
- Data classification - Infrastructure, network, cloud, IOT,
- Ex: Govt. of India classification of data application.
- Unclassified - Purpose and Importance
- Restricted - Challenges
- Confidential - Applications
- Secret How does cyber security work?
- Top secret
-

Department of Collegiate & Technical Education Bengaluru-560001 Page 142


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Recap –
Topology Hackers
OSI Model Who are they?
TCP/IP Model What is not hacking

1 1,5 2 Internet protocols 3 1 Types of hackers 1 2


Network resources Hacking methodologies
Router and Firewall, Hub, switch – security Purpose
issues Activity: Stuxnet - a case study
Basic Network terminologies
Analysing a Cyber Attack
Types of Malwares
Spyware - Defence in depth
Malware
- What is defence in depth
Backdoor
Ransomware - Layers
Scareware
- Needs for Defence in depth
Rootkit
Virus - Examples
Trojan horse
- Host encryption
Worms
1 2,3 3 3 1 3
Symptoms of attack - Anti-virus
- Firewall
Methods of Infiltration
Social Engineering - E-Mail gateway
Pretexting
- Password management
Tailgating
Something for something (quid - Honeypot
pro quo)
- Multi Factor Auth
Denial-of-Service and DDoS
Botnet
On the Path attack

Department of Collegiate & Technical Education Bengaluru-560001 Page 143


Diploma in Computer Science & Engineering C 20 : 2020 - 21

SEO Poisoning
Wi-Fi Password Cracking
Password Attacks
Password spraying
Dictionary attack
Brute force
Password Cracking Times
Rainbow
Traffic interception

Advanced Persistent Threats


Security Vulnerability and Exploits
Hardware Vulnerabilities
Meltdown and Spectre
Software Vulnerabilities
Categorizing Software
Vulnerabilities
Software updates
Data Maintenance
Using free tools
Back Up Your Data
How Do You Delete Your Data
Permanently? Protecting Your Computing Devices
Tools
turn the firewall on
Who owns your data?
Terms of service install antivirus and antispyware
1,2 2,3 4 Understand the term; what are you 2 1 1 3
manage your operating system and
agreeing to?
The data use policy browser
Privacy settings
set up password protection.
Before you sign up protect your data
Activity: Check terms of service of the
popular application you use on your phone and
check their data sharing policy, access to device
etc.

Department of Collegiate & Technical Education Bengaluru-560001 Page 144


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Safeguarding Your Online Privacy


Two Factor Authentication
Open Authorization
Social Sharing
Email and Web Browser Privacy
Activity: Discover your own risky online
behaviour
Scenario 1: posting private info on
social media
Scenario 2: What password you choose
when creating new account for social service
Scenario 3: Using public Wi-Fi
- Scenario 4: Using trial version of the
software
Activity: Check if your password is
compromised
Note :Use Have I been pwned
-

5 Developmental Assessment Assessment Review and corrective action 3


2,3, class: Cyber security at workplace
1,2 6 2 3 Weekly Assignment(1PM-2PM)
4
Reference materials : skillsforall.com – Introduction to Cyber security
Why Do We Need a Version Control System?
Peer review Fundamentals of Git
2,3, Project / activity Git installation and setup
2 2,3 1 4 1 2
4
Propose problem statement basic local Git operations
▪ creating a repository,

Department of Collegiate & Technical Education Bengaluru-560001 Page 145


Diploma in Computer Science & Engineering C 20 : 2020 - 21

▪ cloning a repository,
▪ making and recording changes
▪ staging and committing changes,
▪ viewing the history of all the changes
undoing changes
History of cryptography (overview: Caesar Algebra: groups, rings, fields - definitions +
cipher, enigma cipher) examples
Introduction (high level overview only) AES (SPN structure, rounds, modes of operation
2,3, Enc (sym - stream + block ciphers, asym) 2 2 - high level overview with diagram)
2,3 2 1 2
4
Hashing MAC + SHA2/3 (high level + security
Digital signature, MAC requirements))
- PRNG

RSA (with numerical examples) Number theory - primes, modular arithmetic,


2,3, 2 2
2,3 3 1 2
4 Digital signature (RSA) gcd, Euler totient function - definitions +
examples
Practice sessions/ student activities:
Practice sessions/ student activities:
Inspect digital certificates using a web browser
- Numerical/programming exercises: subset of
and visiting popular websites
math / Caesar cipher / one time pad / RSA /
2,3, - Identify the crypto algorithms in TLS
2,3 4 1 3 3
4 GCD / primality
- Design a toy crypto algorithm like key
Cryptanalysis (brute force over keys, birthday
generation + encryption + decryption / digital
attacks on hash functions, hardness of
signature / hash function

Department of Collegiate & Technical Education Bengaluru-560001 Page 146


Diploma in Computer Science & Engineering C 20 : 2020 - 21

factoring integers, discrete log problem, side-


channel attacks – high level overview)

Applied crypto (PKI, Full disk encryption,


blockchain: overview

5 Developmental Assessment Assessment Review and corrective action 3


Industrial class : Application of
6 2 3 Weekly Assignment
cryptography
References :

• https://www.youtube.com/user/Computerphile - YouTube channel by Dr. Mike Pound

• https://nptel.ac.in/courses/106105031/ : Cryptography and Network Security by Prof. Debdeep Mukhopadhyay, IIT Kharagpur

• https://www.coursera.org/learn/crypto and https://www.coursera.org/learn/crypto2 : by Prof. Dan Boneh, Stanford University

• http://williamstallings.com/Cryptography/ - student resources by Prof. William Stallings


How Internet/Application works (Security
Peer review aspects – end-to-end packet path)
Project / activity
2,3, Propose problem statement and network Network architecture concepts
3 2,3 1 4 3
4
design requirements Understanding vulnerabilities in different OSI
layers and protocols (TCP, UDP, IP, ICMP)

Department of Collegiate & Technical Education Bengaluru-560001 Page 147


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Network Security : Concepts- Firewall, IDS, IPS, Protocols : IPSec, SSL, TLS (versions and
2,3,
2,3 2 2 2 1 2
4 VPN vulnerabilities)

Web Security : Concepts-HTTP, HTML, Frames, Attacks and vulnerabilities: Injection attacks :
5 1,4 3 2 2 SQL, HTTP header, OS command 1 2
browser design

o Wireless Security : Introduction to


- DOS attacks, countermeasures (in
2,3, security issues in cellular networks,
2,3 4 2 2 1 2
4 relation to wireless networks)
WIFI, LAN systems, RFID systems

5 CIE 1 : Written and practice test Assessment Review and corrective action 3
Industrial class : High availability and load
2,3,
2,3 6 2 3 Weekly Assignment
4 balancing
References :
1. https://www.cisco.com/c/en_in/products/security/what-is-network-security.html
2. https://purplesec.us/firewall-penetration-testing/
3. How hackers do it: Tricks, Tools, and Techniques
4. https://cse29-iiith.vlabs.ac.in/
5. https://nptel.ac.in/courses/106105031/ : Cryptography and Network Security by Prof. Debdeep Mukhopadhyay, IIT Kharagpur.
6. https://wiki.apnictraining.net/netsec-20220627-bdnog14/agenda
Windows Security
Peer review Windows Security Infrastructure
2,3, 2,3, 1 Project status review Windows Family of Products
4 4 2 1
5 4
Demonstration of artifacts of the project Windows Workgroups and Accounts
Windows Active Directory and Group Policy

Department of Collegiate & Technical Education Bengaluru-560001 Page 148


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Windows Access Controls

Windows as a Service NTFS Permissions


Shared Folder Permissions
End of Support
Servicing Channels Registry Key Permissions
Windows Update Active Directory Permissions
2,3, 2,3,
2 Windows Server Update Services 2 2 1 2
5 4 Privileges
Windows Autopilot
Windows Virtual Desktop BitLocker Drive Encryption
Third-Party Patch Management Secure Boot
Practice : Process observation and analysis - Practice : NTFS file system practical
with Process Hacker using NTFS Permissions Reporter
Enforcing Security Policy Linux Security
Applying Security Templates Linux Fundamentals
Employing the Security Configuration and Operating System Comparison
Analysis Snap-in Linux Vulnerabilities
Understanding Local Group Policy Objects Linux Operating System
Understanding Domain Group Policy Objects Shell
2,3, 2,3, Administrative Users Kernel
3 2 2 1 2
5 4
Privileged Account Management Filesystem
Reduction of Administrative Privileges Linux Unified Key Setup
AppLocker Linux Security Permissions
User Account Control Linux User Accounts
Windows Firewall Pluggable Authentication Modules
IPsec Authentication and Encryption Built-in Command-Line Capability

Department of Collegiate & Technical Education Bengaluru-560001 Page 149


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Remote Desktop Services Service Hardening


Recommended GPO Settings. Package Management
Practice :
Auditing and enforcement of system baseline
configurations with security templates
PowerShell scripting and automation
techniques

Linux Security Enhancements and


Log Files
Infrastructure
○ Key Log Files
Operating System Enhancements
○ Syslog
○ SE Linux
○ Syslog Security
○ App Armor
○ Log Rotation
2,3, 2,3, Linux Hardening
4 2 2 1 2
5 4 ○ Centralized
○ Address Space Layout Randomization
○ Logging
○ Kernel Module Security
○ Audit id
○ SSH Hardening
○ Firewalls: Network and Endpoint
○ Open SCAP
○ Rootkit Detection
○ CIS Hardening Guides and Utilities
Development Assessment
5 (Hardening the image win and linux Assessment Review and corrective action 3
CIS controls)
2,3, 2,3, Industrial Class : System Security
6 2 3 Weekly Assignment
5 4
Peer review Introduction to Application Security
2,3, 2,3,
5 1 4 2 1
5 4 Project status review Secure SDLC

Department of Collegiate & Technical Education Bengaluru-560001 Page 150


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Introduction to Software Application Provide a use case – Microsoft Secure SDLC


Development – How was it created, Why is it Practice and Security controls covered in each
important? How does it work. stage at a higher level.
Types of Application Software – Thick Client, Requirements (Determine Application Risk
Web Applications, Web Services, RESTFul Profile based on Security Requirements,
Services, Middle Ware, Mobile Applications etc Determine Control Requirements, Establish
(Give an example of each). Quality Gates)
Explain Software Development Lifecycle – b. Design (Architecture Design Review and
Requirements, Design, Develop, Deploy, Threat Modeling)
Operate and Purge. c. Implementation (Static Analysis, Software
Life Cycle Models – Waterfall, Agile, Iterative Composition Analysis, Secret Detection,
etc. Deprecate unsafe functions, use of plugins in
SDLC Best Practices IDE, Safe Commit and Change Management in
Repositories)
d. Verification (Dynamic Analysis, Interactive
Application Security Testing, Fuzz Testing,
Abuse use case Testing, Architecture
Verification).
e. Release (Run Time Application Self
Protection, Web Application Firewall, SOP for
Operations, Secure Provisioning, Deployment
and De commissioning)
- f. Response (Incident Response).

Department of Collegiate & Technical Education Bengaluru-560001 Page 151


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Application Security – Requirements

1. Functional and Non Functional


Requirements for an application

2. Security Requirements for an


Application Security Design:
application
Secure Architecture Review – For a given use
2,3, 2,3, case, with examples; conduct security
2 3. Determining Application Risk Profile 1 3 1 2
5 4
architecture review using the OWASP standard.
Based on the security requirements.

4. Determining Control Requirements


Based on Application Risk Profile and
Eligibility Criteria for an application to
undergo a certain security control.
Establish Security Toll Gates
Application Security Design – Threat Modelling.
1. Why Threat Modelling
2. What is Threat Modelling
- Using the Microsoft Threat Modeling
3. Threat Modelling Methodologies –
methodology, execute a threat model for
2,3, 2,3, 3 STRIDE, PASTA, OCTAVE, TRIKE, VAST. 1 3 3
5 4 a given application architecture using
4. Threat Model Ranking – DREAD, CVSS,
Microsoft threat modeling tool.
CWSS etc.
Threat Model Execution Phases: - Planning,
Scoping, Deep Dive Discussions, Drawing a

Department of Collegiate & Technical Education Bengaluru-560001 Page 152


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Threat Model, Identifying Threats, Threat


Objects, Security Controls, Threat Actors,
Threat Traceability Matrix, Reporting and
Debrief.
Application Security – Implementation
- Explain use of Security Tools within Explain Secret Detection using tools like
IDE. Githound.
- Static Code Analysis Tools – Explain - Change Management during pre-commit
with examples. and post-commit in repositories.
2,3, 2,3,
4 1 3 3
5 4 - Explain Software Composition - Safe SCM practices (Take Github as an
Analysis, Identifying Software example).
Dependencies and CVE in underlying - Highlight deprecated unsafe functions in
libraries. Demonstrate a tool like common programming languages.
OWASP Dependency Check.

5 CIE 2 – Written and Practice Test Assessment Review and corrective action 3
Industrial class : Source Code Scan using a
2,3, 2,3,
6 commercial tool like Microfocus Fortify or 2 3 Weekly Assignment
5 4
Checkmarz.
Application Security – Verification.

Peer review
Explain Dynamic Analysis using an example –
2,3, 2,3, Project status review
6 1 4 3
5 4 owasp zap.
Interactive Application Security Testing –
Demonstrate using Contrast Security Tool.

Department of Collegiate & Technical Education Bengaluru-560001 Page 153


Diploma in Computer Science & Engineering C 20 : 2020 - 21

- For a given site (local), conduct a dynamic Introduce Manual Security Testing using OWASP
2,3, 2,3, analysis scan using OWASP ZAP, Check for Testing Guide. Add Misuse case testing to the
2 4 1 2
5 4
False positives and create a report framework in addition
Conduct a manual security testing for a local
web application or an API using proxy tools
like burp suite/paros etc and provide a
report. Compare the results of both manual
and automated scans.
Application Security – Release
- 1. Cover OWASP ASVS and its aid as a tool
1. Explain Run Time Application Self in architecture verification.
2,3, 2,3,
3 1 3 Introduce OWASP SAMM – to attain software 1 2
5 4 Protection – Contrast Security or Microfocus
Fortify Software can be used as an example. assurance maturity.

2. Define Web Application Firewall.


Demonstrate using a tool.
Elaborate on Standard Operating Procedure
for Operations, Secure Provisioning,
deployment and decommissioning
Measurement of Application Security –
Define Metrics, Type of Metrics (Operations,
For the previous run scans, define metrics and
2,3, 2,3, Efficiency, Quality etc).
4 1 3 evaluate the values at operational level. 3
5 4
Example Application Security Metrics from
OWASP.

Department of Collegiate & Technical Education Bengaluru-560001 Page 154


Diploma in Computer Science & Engineering C 20 : 2020 - 21

5 Development assessment Assessment Review and corrective action 3


Weekly Assignment
Weekly Assignment (Suggestive Student
Activities)

1. Install Web Goat and do an automated


Industrial class : Dynamic Analysis using scan using one of the dynamic analysis tools.
2,3, 2,3,
6
5 4 Qualys
2. Follow up with a manual security testing
with OWASP Testing guide as an aid and
compare the results of automated and
dynamic scan.

References:
1. https://www.synopsys.com/glossary/what-is-sdlc.html
2. https://www.synopsys.com/blogs/software-security/secure-sdlc/
3. https://www.microsoft.com/en-us/securityengineering/sdl
4. https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
5. https://www.microsoft.com/en-in/download/details.aspx?id=49168
6. https://medium.com/@melsatar/software-development-life-cycle-models-and-methodologies-297cfe616a3a
7. https://owasp.org/www-project-application-security-verification-standard/
8. https://resources.infosecinstitute.com/topic/application-architecture-review/
9. https://owasp.org/www-community/controls/Static_Code_Analysis
10. https://owasp.org/www-project-web-security-testing-guide/
11. https://owasp.org/www-project-zap/
12. https://owasp.org/www-project-dependency-check/
13. https://www.synopsys.com/glossary/what-is-software-composition-analysis.html
14. https://owasp.org/www-project-samm/
15. https://github.com/tillson/git-hound
16. https://owasp.org/www-project-security-qualitative-metrics/
17. https://www.qualys.com/apps/web-app-scanning/
18. https://www.veracode.com/security/interactive-application-security-testing-iast
19. https://en.wikipedia.org/wiki/Runtime_application_self-protection
20. https://en.wikipedia.org/wiki/ModSecurity
Department of Collegiate & Technical Education Bengaluru-560001 Page 155
Diploma in Computer Science & Engineering C 20 : 2020 - 21

21. https://github.com/WebGoat/WebGoat
22. https://spectralops.io/resources/how-to-choose-a-secret-scanning-solution-to-protect-credentials-in-your-code/
23. https://www.geeksforgeeks.org/functional-vs-non-functional-requirements/
24. https://owaspsamm.org/model/design/threat-assessment/stream-a/
25. https://docs.42crunch.com/latest/content/concepts/security_quality_gates.htm
Basics of cloud computing
Why is cloud computing necessary?
Introduction to key cloud services (Compute,
storage, networking)
Cloud delivery models
IaaS v/s PaaS v/s SaaS
Introduction to cloud vendors(Azure,AWS, GCP)
Peer review
Key Cloud Security Principles
2,3, Project status review
3,4 1 4 3
4 Shared responsibility model
Principle of least privilege
7
Defense in depth
Threat actors, diagrams & trust boundaries
Practice :
Create a cloud account
Create 2 accounts
Setup 2FA on both account
Identity & Access management in the cloud
Introduction to IAM
2,3, Cloud asset management
3,4 2 1 3 3
4 Introduction to Federal Identity Management
IAM Best Practices

Department of Collegiate & Technical Education Bengaluru-560001 Page 156


Diploma in Computer Science & Engineering C 20 : 2020 - 21

IAM Audit
Intro to AWS/Azure clint and Web Portal
Vulnerability management
Network security
Discovering cloud misconfiguration
Security groups
2,3, Remediating vulnerabilities
3,4 3 1 3 1 2
4 VPC
Tracking open vulnerabilities using cloud
WAF
native tools
Data protection in the cloud
Incident response
• Data protection at rest and at transit
- Log analysis
2,3, • Cloud data storage - AWS EBS, S3 / Azure
3,4 4 1 3 3
4 - Events & alerts
SAS
- Key metrics (MTTD & MTTR)
• Secrets Management
CIE 3 – Written and Practice Test
5 Assessment Review and corrective action 3
Secure a vulnerable cloud env
Industrial class :
2,3, 1. Preventing DDoS in a cloud native
3,4 6 env 2 3 Weekly Assignment
4
Hybrid cloud env
Intro to VAPT
Peer review Developing a Hacker Mindset
2,3, Project status review • Ethics of Penetration Testing
3,4 1 4 1 2
4
8 • Goal of Penetration Testing
• Thinking like a Hacker
ATT&CK Framework Overview
2,3,
3,4 2 4 Contd.. 3
4 Introduction to the framework

Department of Collegiate & Technical Education Bengaluru-560001 Page 157


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Deep dive into the key topics


○ Reconnaissance
○ Initial Access
○ Privilege Escalation
○ Lateral Movement
○ Exfiltration
Web Application Penetration Testing
● Basics of Web
2,3, ○ HTTP Methods 4 Contd..
3,4 3 3
4
○ HTTP Requests & Response
Session management & Cookies

Web Application Penetration Testing


Finding common web vulnerabilities
(OWASP top 10)
2,3,
3,4 4 1 3 Contd.. 1 2
4 Burp Suite Essentials
Practical: Setup Burp Suite on local machine
and observe traffic of 1 website

5 CIE 3 – Written and Practice Test Assessment Review and corrective action 3
Industrial class :
How penetration testing is used in
2,3, companies to improve their Security
3,4 6 Weekly Assignment
4
posture

Department of Collegiate & Technical Education Bengaluru-560001 Page 158


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Peer review Cloud Penetration Testing


2,3, Project status review Finding common cloud vulnerabilities
3,4 1 4 1 2
4
Introduction to tools: Nessus, NMAP, Prowler
Introduction to OSINT: - Contd..
Scanning the internet (example: Shodan)
2,3,
3,4 2 1 3 1 2
4 Google dorking
Subdomain enumeration & asset monitoring
- Hands-on exercise 1: Complete 3 server-
side and 3 client-side topic from Burp - Contd..
9 2,3,
3,4 3 Suite academy: 4 1 2
4 https://portswigger.net/web-
security/learning-path

Hands-on exercise 2: Complete either the


- Contd..
2,3, attacker or defender track in
3,4 4 1 3 1 2
4
http://flaws2.cloud

5 Development Assessment Assessment Review and corrective action 3


Industrial class :
2,3,
3,4 6 Weekly Assignment
4 Bug bounty hunting
References :
1. Basics of Web: https://www.hacker101.com/sessions/web_in_depth.html
2. NMAP Basics: https://www.freecodecamp.org/news/what-is-nmap-and-how-to-use-it-a-tutorial-for-the-greatest-scanning-tool-of-all-
time/
3. HTTP Proxy:
a. Burp Suite Essentials: https://www.youtube.com/playlist?list=PLoX0sUafNGbH9bmbIANk3D50FNUmuJIF3\
b. OWASP Zed Attack Proxy: https://www.zaproxy.org/getting-started/

Department of Collegiate & Technical Education Bengaluru-560001 Page 159


Diploma in Computer Science & Engineering C 20 : 2020 - 21

4. Vulnerability Scanning with Nessus: https://www.tenable.com/blog/how-to-run-your-first-vulnerability-scan-with-nessus


5. How to think like a Hacker: https://www.darkreading.com/vulnerabilities-threats/how-to-think-like-a-hacker
The Cuckoo’s egg (book)
Incident management introduction and
objectives
Stages and life cycle of incident management
Tracking incidents
Peer review Incident remediation
2,3, Project status review Reporting and documentation
3,4 1 4 1 2
4
Incident Closure
Incident management teams and models
Incident management services and integration
tools

10 - Best practices of Incident Management


Fundamentals Network
· CIA
· Quick revision of OSI model,
· Threat Actors
· Different kinds of hackers encapsulation, IP, Subnets, TCP/UDP, well
· Different kinds of teams – Blue, Red,
known ports, TCP/IP, Layer 2
Purple
· Criminal Groups Network Protocols
2,3,
3,4 2 · Hactivist Groups 1 3 1 2
4 · Quick revision of SMTP, HTTP,
· APT
· Attack Vectors HTRPS/TLS, DNS
· Protect/Prevent
Web technologies
· Detect/Respond
· Trust Positive vs False Positive · Quick revision of DOM, CSS, Javascript,
Ajax, MVC, Databases, SQL
Data

Department of Collegiate & Technical Education Bengaluru-560001 Page 160


Diploma in Computer Science & Engineering C 20 : 2020 - 21

· Bits and Bytes Authentical protocols


· Charter Encoding (ASCII, UTF-
· Quick revision of Kerberos, SAML,
8,Base64)
· File Magic Bytes, Hashes OpenID, OAuth
· Imphash
· Ssdeep

Windows & Linux


- · Quick revision on basic commands,
important files and directories, windows
registry and processes, Audit in Linux
Understanding the tools and products used in
any organization
· Firewall, load balancers, proxy, email
infrastructure, IDS, DNS, Ani-virus, Content
2,3, Continued..
3,4 3 1 3 3
4 Delivery Solutions, Malware Protection System,
Endpoint Detection and Response, Netowrk
Access Control, Placement of all devices in the
organization – Tier1, Tier 2, Tier 3, DMZ
Basics of Incident Response
SIEM
· Alert processing
· Understanding logs
· Procedures, runbooks and reference
· Email, Proxy, DNS, IDS, Firewall, AV,
· Response options
2,3, EDR, Web application, Unix, Windows
3,4 4 1 3 3
4 · Escalations
Attack Types/Vectors
· Incident categories
· Phishing, Malware, Distributed Denial
· Incident Resolution Codes
of Service, Vulnerabilities (Infrastructure,

Department of Collegiate & Technical Education Bengaluru-560001 Page 161


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Application, third party), Web attacks, Data Analysis


Misconfigurations, Brute force · Data vs Intelligence
Attack Models · Indicators of compromise (IoCs)
· The cyber kill chain, MITRE ATT&CK · Malware analysis
Framework, Pyramid of Pain · Accessing IoCs
· Contacting threat intelligence

Analysis tools
· Anomaly
· Domain tools
· WhoIS
· Passive DNS
· Virus total
· Dynamic File analysis

5 CIE 4 – Written and Practice Test Assessment Review and corrective action 3
Industrial class : Handling Internal and
external incidents Complexity of Incident
2,3,
3,4 6 Weekly Assignment
4 management
Demo of real world SOC
References :
1. https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf

2. https://www.cisa.gov/uscert/bsi/articles/best-practices/incident-management
https://www.infotech.com/research/ss/develop-and-implement-a-security-incident-management-program

Department of Collegiate & Technical Education Bengaluru-560001 Page 162


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Lab : https://letsdefend.io

GRC
(a) 1) Definition of GRC, introduction to IT
governance
(b) 2) Importance of GRC in cyber security
(c) 3) Policies, processes and procedures
Peer review (d) 4) Importance of checklists, templates and
3,4, 2,3, Project status review 4 guidelines
1 1 2
5 4
Enterprise risk management
(a) Understanding risks that enterprises face –
Operational Risks, Strategy Risks, Credit risks,
Reputational risk, Market risks, Cyber risk
11 (b) Cyber risk integration with Operational risk
management
Patch management
- Introduction to basics of risk management
Probability, Impact:-- [Financial, Legal, Importance of patch management; pre-requisites
Regulatory, Reputational ], Threat, Risk and sample patch management process
Assessment, Risk Treatment:-- [Accept,
3,4, 2,3, 1 3 Vulnerability Management
2 1 2
5 4 Mitigate, Transfer, Avoid ], Residual risk, risk
acceptance, Control objective, Controls:-- Vulnerability management lifecycle
Preventive control, detective control and understanding – Identify, Evaluate, Remediate,
corrective control Report

Department of Collegiate & Technical Education Bengaluru-560001 Page 163


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Types of vulnerabilities – Hardware, Network,


Operating systems, Application, Human and
Process related vulnerabilities

Vulnerability Management process


Practice Session:

(a) Define one control statement each for


access control, physical security and
backup management ITIL Process overview –
Incident Management, Problem Management,
(b) Explain one human vulnerability with Change Management, Configuration
example and how it can be exploited Management, Release Management, Supplier
3,4, 2,3, 4
3 including remedial measures 3
5 4 Management, IT Security Management, Service
level management, Capacity Management,
(c) Design IT asset register template with
Availability Management, Service continuity
5 sample rows populated with data
Management
Give examples for each category of classified
information in an organization – do a
combination of government organization and
private organisation

4 Security frameworks and Compliances 4 Cyber Security Governance: 1 2

Department of Collegiate & Technical Education Bengaluru-560001 Page 164


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Introduction to standards/best (a) Security organization, Responsibilities


practices/framework and its primary and authority, Management/Board
objective, responsibilities on cyber security,
Resource allocation and cyber security budget
ISO 27001, COBIT, PCI-DSS, Hi-Tech (HIPAA),
management, Security Education, training and
NIST, IT Act 2000 (amendment in 2008), CERT-
awareness, Cyber metrics, KRI/KPIs
IN Guidelines.

Regulatory requirements

(a) RBI framework for banking (Cyber


security framework, Gopalakrishna
committee, UCB tiered framework)

(b) SEBI framework for Securities market

(c) Guidelines on Information and cyber


security for insurers from IRDAI

(d) TRAI requirements on security for


telecom sector

(e) GDPR

5 Development Assessment Assessment Review and corrective action 3

Department of Collegiate & Technical Education Bengaluru-560001 Page 165


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Weekly Assignment (Suggestive Student


Activities)

(a) Identify use case of how changes or


configuration in IT systems impacts security
configuration resulting in cyber risk
Industrial class :
exposure
1. An industry perspective of GRC, VM
2,3,
3,4 6
4 and Security frameworks (b) Design a sample cyber security
Demo of a GRC tool dashboard for reporting to top management

(c) Give two KRI examples each for the


following domains:
a. Patch Management
b. Anti-virus management
c. Change Management
References :
1) https://www.armosec.io/blog/kubernetes-security-frameworks-and-guidance - Security Frameworks table
2) https://www.cybersaint.io/blog/what-is-grc
3) https://www.ibm.com/cloud/learn/grc
4) https://unece.org/fileadmin/DAM/trade/Publications/WP6_ECE_TRADE_390.pdf

5) https://www.pcisecuritystandards.org/documents/PCI_DSS-QRG-v3_2_1.pdf

Department of Collegiate & Technical Education Bengaluru-560001 Page 166


Diploma in Computer Science & Engineering C 20 : 2020 - 21

6) https://www.nist.gov/

7) https://www.isaca.org/resources/cobit

8) https://www.meity.gov.in/writereaddata/files/itact2000/it_amendment_act2008.pdf

9) https://www.coso.org/SitePages/Guidance-on-Enterprise-Risk-Management.aspx?web=1

10) https://rbidocs.rbi.org.in/rdocs/notification/PDFs/NT41893F697BC1D57443BB76AFC7AB56272EB.PDF

11) https://rbidocs.rbi.org.in/rdocs/notification/PDFs/LBS300411F.pdf

1) https://rbidocs.rbi.org.in/rdocs/notification/PDFs/NOTI129BB26DEA3F5C54198BF24774E1222E61A.PDF

14) https://www.sebi.gov.in/legal/circulars/dec-2018/cyber-security-and-cyber-resilience-framework-for-stock-brokers-depository-
participants_41215.html

15) https://www.sebi.gov.in/sebiweb/home/HomeAction.do?doListing=yes&sid=1&ssid=6&smid=0

16) https://www.aicofindia.com/AICEng/General_Documents/Notices%20And%20Tenders/IRDAI-GUIDELINES.pdf

17) https://www.irdai.gov.in/ADMINCMS/cms/whatsNew_Layout.aspx?page=PageNo4315&flag=1

18) https://www.rapid7.com/fundamentals/patch-management/

19) https://www.rapid7.com/fundamentals/vulnerability-management-and-scanning/

1)18. https://www.techtarget.com/searchsecurity/tip/IT-security-frameworks-and-standards-Choosing-the-right-one

Department of Collegiate & Technical Education Bengaluru-560001 Page 167


Diploma in Computer Science & Engineering C 20 : 2020 - 21

21)https://www.irdai.gov.in/ADMINCMS/cms/Uploadedfiles/07.04.2017-
Guidelines%20on%20Information%20and%20Cyber%20Security%20for%20insurers.pdf

https://www.trai.gov.in/sites/default/files/RecommendationDataPrivacy16072018_0.pdf
DevOps and Security Challenges 2
Peer review Understand the Core Principles and Patterns
3,4, 2,3, Project status review 4 behind DevOps
1 1
5 4
Recognize how DevOps works and identify keys
to success
Secure DevOps tools and workflows 2
Conduct effective risk assessments and threat Pre-Commit Security Controls
modeling in a rapidly changing environment Rapid Risk Assessment
Design and write automated security tests and Git Hook Security
checks in CI/CD Code Editor Extensions
12 Understand the strengths and weaknesses of Branch Protections
3,4, 2,3,
2 1 3 1
5 4 different automated testing approaches in CodeOwners
Continuous Delivery Peer Reviews
Inventory and patch your software Commit Security Controls
dependencies Static Analysis Security Testing
Wire security scanning into Jenkins, Code Component Analysis
Pipeline, and Azure DevOps workflows
3
Secrets Management
3,4, 2,3, Cloud Infrastructure as Code
3 4
5 4
Managing secrets in CI / CD

Department of Collegiate & Technical Education Bengaluru-560001 Page 168


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Azure Key Vault Introduction to Cloud Infrastructure as


AWS SSM Parameter Store Code
AWS Secrets Manager AWS Cloud Formation
HashiCorp Vault Terraform
Deploying
Cloud Infrastructure as Code security analysis
2
Container Security

Dockerfile and BuildKit Security


Base Image Hardening with Hadolint and
Conftest
Container Image Security
Configuration Management as Code Scanning Container Images with Docker
Scan and Trivy
Automating Configuration Management Container Registry Security
in CI / CD Container Scanning with AWS ECR and
3,4, 2,3, Azure ACR
4 Using Ansible to Configure Virtual 1 3 1
5 4 Container Runtime Security
Machines
Building Gold Images with Vagrant and
Exercises
Packer
Certifying Gold Images with InSpec Attacking the DevOps Toolchain
Version Control Security
Automating Static Analysis
Protecting Secrets with Vault
Infrastructure as Code Network
Hardening
Gold Image Creation
Container Security Hardening

Department of Collegiate & Technical Education Bengaluru-560001 Page 169


Diploma in Computer Science & Engineering C 20 : 2020 - 21

5 CIE 5 – Written and Practice Test Assessment Review and corrective action

6 Industry Class : 2 3
Project
Internship a) Identification of the problem statement
a) Secondary research on various
(from at least 3 known problems) the students
industries and their operations to identify at
would like to work as part of the project – either
least 3 companies along with the areas of work
interest and develop an internship plan that as provided by faculty or as identified by the
clearly highlights expectations from the student. Document the impact the project will
industry during the internship. have from a technical, social and business
b) Design and develop a cover letter for an perspective.
13 1
internship request to all 3 identified companies
b) Design and develop the project solution
and the resume to be submitted to potential
companies. or methodology to be used to solve at least one of
Prepare for an internship interview to highlight the problems identified.
your interests, areas of study, career Prepare a project plan that will include a
aspirations and personnel competence –
schedule, WBS, Budget and known risks along
including the areas of learning you expect to
with strategies to mitigate them to ensure the
learn during internship.
project achieves the desired outcome.

**Note: Saturday session from 9 AM -2 PM

CIE and SEE Assessment Methodologies

Duration
CIE Assessment Assessment Mode Max Marks
In hours
Week 3 CIE 1– Written and practice test 4 30
Week 5 CIE 2– Written and practice test 4 30
Week 8 CIE 3– Written and practice test 4 30
Week 10 CIE 4– Written and practice test 4 30

Department of Collegiate & Technical Education Bengaluru-560001 Page 170


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Week 12 CIE 5– Written and practice test 4 30


Week 13 Assessment for Project or Internship 4 30
On line Course work (At least one related to the specialization) 30
Portfolio evaluation (Based on industrial assignments and weekly developmental assessment) * 30
TOTAL CIE MARKS (A) 240
SEE 1 - Theory exam (QP from BTE) Conducted for 100 marks 3 hour duration reduced to 60 marks 3 60
SEE 2 – Practical duration 3hr. Max marks 100 3 100
TOTAL SEE MARKS (B) 160
TOTAL MARKS (A+B) 400
* The industrial assignment shall be based on peer-to-peer assessment for a total of 10 marks (on a scale of 1 to 10) and in the event of a group assignment
the marks awarded will be the same for the entire group, the developmental assessment will be for a total of 20 marks and based on MCQ/case
study/demonstration and such other assignment methods

Scheme of Evaluation for SEE 2

Sl. No Description Marks

1 Case submission 20

2 Case presentation 20

3 Case innovation 20

4 Result 20

5 Viva voce 20

Total 100

Department of Collegiate & Technical Education Bengaluru-560001 Page 171


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Submission / Content Evaluation Rubrics


Evaluation
5 4 3 2 1 Student Score
Parameters
Identifies and Identifies and
Identifies and Identifies and Identifies limited
Identification of understands all understands most of
understands some of understands a few of issues
the main the main issues in the main issues in 5
the issues in the the issues in the in the problem
issues / problem the problem the problem
problem statement problem statement statement
statemen statement

Insightful and Superficial analysis of


Analysis of the Thorough analysis of Incomplete analysis of No analysis of the
thorough analysis of some of the issues in the 4
issues most of the issues the issues issue
all the issues problem statement

Well documented,
Comments on reasoned and
effective solutions / pedagogically Appropriate, well
Little and/or
strategies (The appropriate thought out comments Superficial and / or
inappropriate No action to all
solution may be in comments on about solutions, or inappropriate solutions
solutions to all of the issues in the 2
the problem solutions, or proposals for solutions, to some of the issues in
issues in the problem problem statement
statement already proposals for to most of the issues in the problem statement
statement
or proposed by solutions, to all the problem statement
you) issues in the
problem statement
Excellent research
into the issues with Good research and
Links to course Limited research and Incomplete research
clearly documented documented links to No research or links
learning and documented links to and links to any 3
links to course the materials read to any reading
additional research any readings reading.
learnings and during the course
beyond.

Total 14/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 172


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Case Presentation Evaluation Rubrics

Evaluation Student
5 4 3 2 1
Parameters Score
Clear flow of
ideas Hard to
Most ideas flow No flow in
Very clear and concise flow of follow the
Demonstrates but is lost at times the
ideas Demonstrates passionate flow of
interest in the Limited evidence presentation
Delivery & Enthusiasm interest in the topic and ideas Lack 4
topic and of interest in and Poor
engagement with class / of
examiner engagement engagement with presentation
enthusiasm
with class / the topic skills
and interest
examiner
Limited
use of Poor visuals used
Visuals augmented and Use of visuals and some visuals
visuals
Visuals extended comprehension of related to the No use of visuals are not easy to 2
loosely
the issues in unique ways topic understand its
related to
relevance.
the topic
Uses stage
effects such as
props, sound Limited use of
Uses stage effects such as effects, and stage effects
props, sound effects, and speech and/or used in a
speech modulation in a modulation in manner that did
No use of stage Poor stage effects
Staging unique and dramatic manner an effective not enhance the 5
effects usage
that enhances the manner to understanding of
understanding of the issues extend the the issues in the
in the problem statement. understanding problem
of the issues in statement.
the problem
statement.

Department of Collegiate & Technical Education Bengaluru-560001 Page 173


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Questions and Questions and


discussions discussions
Excellent and salient addressed addressed
Involvement Little or no
discussion points that important important
of the class / attempt to Did not engage
elucidated material to information superficial
Examiners engage the the class /
develop a deep that issues of the
class / examiner and 3
• Questions understanding Appropriate developed problem
examiner in poor listening
• Discussions and imaginative activities understanding statement
demonstrating skills
• Activities used to extend understanding Appropriate Limited use of
their learning
in a creative manner activities used activities to
to clarify clarify
understanding understanding

Total 14/20

Case Results Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score
The topic was well The topic was 4
The topic was The topic was
researched and all researched but
researched and researched and data
information and information and data Desired results
most information were not from
data included are were only partly from not obtained,
and data were from reliable sources.
accurate and from reliable sources of but some
reliable sources of The proof was not
reliable sources of information. relevant
Problem information. The backed up with
information like The proof was not fully research was
outcome proof was backed data, analysis or
high impact journals backed up with good done. Outcome
up with good data reasoning as taught
standards, etc. data or reasoning as not obtained as
and reasoning as in the class.
The proof was taught in the class. per the
taught in the class. Some outcome
enough backed up Partial outcome problem brief
Outcome achieved as obtained as per the
with accurate data, achieved as per the
per the problem brief problem brief
analysis and problem brief

Department of Collegiate & Technical Education Bengaluru-560001 Page 174


Diploma in Computer Science & Engineering C 20 : 2020 - 21

reasoning beyond
the class learning.
Outcome achieved
beyond the problem
brief
Made effective use of Made good use of class 3
class principles, principles, models and
Made some use of Poorly applied
models and theories. theories Some creative
Application of class principles, Made limited use of class
Also used creativity ideas were explored to
class learning in models and theories class principles, principals,
to find effective find desired outcome
problem solving No creative ideas or models and theories models and
results appropriate but within the
models explored theories
to industry beyond framework of class
class learning. learning
Queries Excellent 2
Poor or no
response to Good response to Satisfactory response Limited response
Response to response to
comments and questions and to questions and to questions and
Class / questions and
discussion with discussions with some discussions with discussions with
Examiners did not
appropriate content connection made to limited reference to no reference to
Queries participate in
supported by theory/research theory/research theory/research
the discussions.
theory/research
Has not 4
Provides limited
Provides detailed and Provides adequate and provided
Provides appropriate and somewhat
appropriate mostly appropriate appropriate
Conclusions conclusion for the appropriate
conclusion for the conclusions for the conclusions for
problem statement conclusions for the
problem statement problem statement the problem
problem statement
statement.
Total 13/20

Case Innovation Evaluation Rubrics


Evaluation 5 4 3 2 1 Student
Parameters Score
Finding new The newly The newly The newly discovered The newly No new 5
processes / discovered discovered processes processes / models / discovered processes /
Department of Collegiate & Technical Education Bengaluru-560001 Page 175
Diploma in Computer Science & Engineering C 20 : 2020 - 21

models / processes / models / models / approaches have processes / models models /


approaches / approaches are of approaches are of limited application but / approaches has approaches
good quality and appropriate quality relevant to the restricted were identified
relevant but limited relevance problem application
Proposing ideas Various ideas and Various ideas and Some ideas or Few ideas have No ideas or 3
and innovative innovative solutions innovative solutions innovative solutions been proposed innovative
solutions in terms have been proposed have been proposed have been proposed solutions have
of processes / and their application as well as the outline but the process of been proposed
models / have been clearly of the process to applying them hasn't
approaches and outlined apply them been specified
how they can be
applied to solve
the problem on
hand
Using creativity Wherever necessary Creativity techniques Creativity techniques Creativity Creativity 2
techniques to creativity techniques are frequently are utilized at times in techniques are technique are
provide and are utilized to utilized in more than less than 50% of the used a few times not utilized to
reason good ideas analyse and solve the 50% of the occasions occasions only analyse and
which are original problem solve the
and problem
unconventional
Finding Constraints and weak Constraints and weak A critical analysis is Only a description No constraints 3
constraints and points are are identified undertaken of the working or weak points
weak points in understood process and have been
existing processes methods are identified.
/ models / provided
approaches or
methods
Total 13/20

Department of Collegiate & Technical Education Bengaluru-560001 Page 176


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Assessment framework for SEE (Theory) – 100 Marks / 3 hours (Reduced to 60 marks)

Programme: Computer Science & Engineering Semester: V


Course: Cyber Security Max Marks: 100
Course Code: 20CS54I Duration: 3 Hrs
Instruction to the Candidate:
Answer one full question from each section.
Qn.No Question CL CO Marks
Section-1
1.a) 1
b)
2.a)
b)
Section-2
3.a) 2
b)
4.a)
b)
Section- 3
5.a) 3
b)
6.a)
b)
Section-4
7.a) 4
b)

Department of Collegiate & Technical Education Bengaluru-560001 Page 177


Diploma in Computer Science & Engineering C 20 : 2020 - 21

8.a)
b)
Section-5
9.a) 5
b)
10.a)
b)

Assessment framework for CIE


Note : Theory to be conducted for 1 hour and practice for 3 hours, total duration of exam – 4 hours
Programme Computer Science & Engineering Semester V
Course Cyber Security Max Marks 30
Course Code 20CS54I Duration 4 hours
Name of the course coordinator
Note: Answer one full question from each section.
Qn.No Question CL CO PO Marks
L3/L4
Section-1 (Theory) – 10 marks
1.a)
b)
2.a)
b)
c)
Section-2 (Practical) - 20 marks
3)
4)

Department of Collegiate & Technical Education Bengaluru-560001 Page 178


Diploma in Computer Science & Engineering C 20 : 2020 - 21

Equipment/software list with Specification for a batch of 20 students

Sl. No. Particulars Specification Quantity


12. Intel i7, 4GB RAM,
Computers 20
500GB SSD
13.
Broadband connection

Department of Collegiate & Technical Education Bengaluru-560001 Page 179

You might also like