Professional Documents
Culture Documents
Note: Link for the UMS pathway and LPU Touch App will be shared with the announcement for Engineering
Minor(s) polling in the near future.
Engineering Minors in School of Computer Science
and Engineering:
1. Cyber Security
2. Data Science
3. Machine Learning
4. MEAN Stack Development (Not for IT students)
5. Software Methodologies and Testing
6. Internet of Things
Cyber Security
Brief Description
Cyber security transform into a frightening new reality, one where
corporate and government organizations seem helpless to stop cyber
incursions that leads to cyber risk. To mitigate the cyber risk we need
knowledge of cryptographic techniques, traffic monitoring and ethical
hacking knowledge for better understanding of security issues to
protect our network.
Total number of seats: 950
It covers the concepts of cyber security with their importance and identify various
vulnerabilities and security flaws in the operating systems and networks. It also focuses on
secure social networking sites and email communications along with the prevention methods.
Course Outcome:
•Understand the basic concepts of cyber security and their importance in the cyber world.
•Identify and analyze various vulnerabilities and security flaws in the operating systems, web
servers, network equipments and how to patch them.
•Evaluate the measures to protect a system from possible security breaches.
•Construct application of scripting language for different malwares identification.
2) INT243 : INFORMATION SYSTEM SECURITY
It introduce the concepts of computer security incident, detection, live data collection and its forensics
duplication. It also emphasis on the data collection techniques and investigate windows systems and
routers for the audit.
Course Outcome:
1)Describe the basics of incident response handling process.
2)Analyze the practices and procedures involved in incident response handling process.
3)Observe different methods of obtaining information and data for forensic investigation.
4)Validate the procedures required for acquiring forensic evidences along with the documentation
part in order to present as legal evidence.
Description of the Courses cont….
3) INT244: SECURING COMPUTING SYSTEMS
It covers the basic concepts of penetration testing along with the analysis of various vulnerabilities
and security flaws exist in the operating systems, web servers, network equipments through the
techniques used by hackers.
Course Outcome:
•Understand the basic concept, fundamentals and practice of penetration testing and ethical
hacking.
•Analyze various vulnerabilities and security flaws in the operating systems, web servers and
network equipments.
•Simulate the techniques used by hackers for specific types of attacks and their countermeasures.
4) INT245: PENETRATION TESTING
It covers the tools and technologies used by ethical hackers in order to identify weaknesses in
information system and recommend mitigation measures to increase the resistance of the
information technology (IT) infrastructure to unauthorized access.
Course Outcome:
•Recite how to analyze the outcome from the tools and technologies used by ethical hackers.
•Examine intensive assessments required to effectively identify and mitigate risks to the
information security of the organization.
•Summarize weaknesses in information system and recommend mitigation measures to increase
the resistance of the information technology (IT) infrastructure against unauthorized access.
•Generalize the outcomes of their vulnerability assessments in the form of penetration testing
report.
Industrial applications:
•Intelligence agencies
•Defense
•Automation systems
•Retail
•Banking
•Internet of Things
•Automotive sector
•E-commerce
Special requirements:
•Student must bring laptop.
•Basic knowledge of Linux and networking is required.
•Scheduling of continuous 02 hours slots in time table.
Queries/Doubt clearing:
Sitting
Name of faculty UID Email-id
Place
Atul Malhotra 18011 atul.18011@lpu.co.in 33-203