First Internal Exam Syllabus - September 2024
SEM - VII - B. TECH. CSE (CBA/CS/BDA)
2CSE701 - COMPILER DESIGN ( RLP ) |
Unit-01 Introduction: Overview of the Translation Process, A Simple Compiler, Difference between interpreter, assembler and compiler. Overview and use of linker and loader, types of Compiler, Analysis of the Source Program, The Phases of a Compiler, Cousins of the Compiler, The Grouping of Phases, Lexical Analysis, Hard Coding and Automatic Generation Lexical Analyzers, Front-end and Back-end of compiler, pass structure Unit-02 Lexical Analyzer: Introduction to Lexical Analyzer, Input Buffering, Specification of Tokens, Recognition of Tokens, A Language for Specifying Lexical Analyzers, Finite Automata From a Regular Expression, Design of a Lexical Analyzer Generator, Optimization of DFA Unit-03 Parsing Theory: Top Down and Bottom up Parsing Algorithms, Top-Down Parsing, Bottom-Up Parsing, |
2CSE702 - MACHINE LEARNING (NS) |
Unit 1 Introduction: Machine Learning Foundations: Design of a Learning system - Types of machine learning, Applications of machine learning. Unit 2 Supervised Learning: Regression algorithms, Classification algorithms |
2CSE709 - CLOUD SECURITY (IBM) |
Unit-1: Cloud Security Fundamentals Introduction to Cloud Security, Basic concepts (CIA) - Confidentiality, Integrity and Availability, Understanding Multi tenancy, Multi tenancy concepts, Design considerations for multi-tenant cloud, Security concerns on multi-tenant cloud environments, Security in context of Cloud Deployment and consumption models, Cloud Governance, Risk and Compliance Unit-2: Virtualization and Container Security Virtualization Security, Vulnerabilities in management, Vulnerabilities in Hypervisor, Vulnerabilities in Virtualization and virtual machines, Platform Hardening to Prevent Threats, Container Security, Network isolation and Protection , Setting up a secure network, Network isolation and segmentation, Load balancer and Ingress services |
2CSE710 - CLOUD COMPUTING ESSENTIALS ( CBA - PS) |
Unit – 01 Fundamentals of Cloud Computing What is Cloud?, Cloud Service Models, Provider and Client Responsibilities, Why Cloud? Unit – 02 Cloud Economics Traditional vs Cloud vs Hybrid Cloud Architecture, SLA Sums, Advantages and Disadvantage of Cloud, SLAs, Types of SLAs, SLOs, KPIs, Limitations of SLAs Unit – 03 Infrastructure as a Service Under Provisioning and Over Provisioning of Cloud, Resource Provisioning Challenges, Resource Management Phases, Stochastic Optimization, 6 Pillars of AWS Well Architected Model, RTO & RPO, IAM, Elastic IPs Unit – 04 Cloud Automation using Infrastructure as a Code What is IaaC?, Declarative vs Imperative, IaaS vs IaaC, Advantages of IaaC, Terraform Unit – 05 Load Balancing and Autoscaling Static and Dynamic Load Balancing Algorithms, Auto Scaling Groups, Auto Scaling Policies, Auto Scaling Algorithms, Threshold based Algorithms, QoS based Algorithms, Sticky Sessions |
2CSE70E19 - CLOUD COMPUTING ESSENTIALS ( BDA - PS) |
Unit – 01 Fundamentals of Cloud Computing What is Cloud?, Cloud Service Models, Provider and Client Responsibilities, Why Cloud? Unit – 02 Cloud Economics Traditional vs Cloud vs Hybrid Cloud Architecture, SLA Sums, Advantages and Disadvantage of Cloud, SLAs, Types of SLAs, SLOs, KPIs, Limitations of SLAs Unit – 03 Infrastructure services on Cloud What is IaaS?, Virtualization, Traditional vs Virtual Architecture, Types of Virtualizations, Advantages and Disadvantages of Cloud, Type-1 and Type-2 Hypervisors, Under Provisioning and Over Provisioning of Cloud, Resource Provisioning Challenges, Resource Management Phases, Stochastic Optimization, 6 Pillars of AWS Well Architected Model, RTO & RPO, IAM, Elastic IPs Unit – 04 Load Balancing and Autoscaling Static and Dynamic Load Balancing Algorithms, Auto Scaling Groups, Auto Scaling Policies, Auto Scaling Algorithms, Threshold based Algorithms, QoS based Algorithms, Sticky Sessions |
2CSE70E16 - INTERNET OF THINGS ( PS ) |
Unit – 01 Internet of Things What is IoT? Characteristics of IoT, Things in IoT, Components of IoT, Advantages and Disadvantages of IoT, Challenges in IoT Unit – 02 Sensors and Actuators Types of Sensors - PIR Motion Sensor, Temperature and Humidity Sensor, Bluetooth, Servo Motor, Ultrasonic Sensor, Actuators, Raspberry Pi, NodeMCU, IOT Gateway Unit – 03 Protocols HTTP, HTTPS, Persistent and Non-Persistent Connection, Web Socket, TCP, UDP, IPv4 vs IPv6, Wi-Fi, LPWAN, Data Protocols - MQTT, CoAP, XMPP, AMQP, Communication / Connectivity Protocols - IEEE 802.15.4, 6LoWPAN, Bluetooth Low Energy, Zigbee, NFC, RFID, Wireless HART, Z-Wave. |
2CSE711 - ADVANCE BIG DATA ANALYTICS ( SGB ) |
Processing stream data SCALA: What is Scala? Basic Operations, variable types, control structure, foreach loop, functions, array, higher order functions, Scala Collections SPARK: Spark Components & its Architecture, Spark Resilient Distributed Dataset (RDDs), RDD operations, transformations and actions, data loading and saving, dataframes and datasets, JSON and Parquet file formats, SPARK SQL |
2CSE712 - COGNITIVE COMPUTING (IBM) |
INTRODUCTION TO COGNITIVE SCIENCE AND COGNITIVE COMPUTING WITH AI: Cognitive Computing, Cognitive Psychology, The Architecture of the Mind, The Nature of Cognitive Psychology, Cognitive architecture, Cognitive processes, The Cognitive Modeling Paradigms, Declarative / Logic based Computational cognitive modeling (Knowledge-Based Systems, Rule based chatbot, etc), connectionist models – Bayesian models. Introduction to Knowledge-Based AI – Human Cognition on AI – Cognitive Architectures. PYTORCH AND TENSORFLOW: Differences between PyTorch and Tensorflow, Tensors and tensor operations, Artificial and biological neurons, weights and biases, data preprocessing for deep learning, Artificial Neural Networks and their types : Perceptron , MLP , Feed Forward Neural Network, Conv. Nets., different Activation and loss functions, Optimizers, Pooling. Misc: NLP , Speech to text, Text to speech, Chatbots. |
2CSE707 - CYBER FORENSICS ( RS ) |
Cyber Forensics Cybercrime, Basics of cyber forensics, cyber forensics investigation processes, digital evidence, challenges in cyber forensics, skills required for cyber forensics expert OS Forensics Digital Evidence in Windows, File system, Timeline analysis, challenges, Digital Evidence on UNIX Mobile Forensics Acquisition Protocol |
2CSE708 - SECURITY INCIDENT & EVENT MANAGEMENT ( IBM ) |
Introduction to Security Intelligence & Event Management Security technologies implemented in the IT Industry, SIEM Evolution, Introduction to SIEM, SIEM Architecture and its components, General Security Practices, Correlation - Brute Force Detection, DDos Attack, File Copying, File Integrity Change Security Operations Center and Network Security Monitoring What is SOC, SOC Components, Awareness of assets, aggregation and correlation, Log Collection, Monitoring & Reporting, Threat Intelligence, Alerts, Defence and Compliance, Introduction to Firewall, Switches, IPS & Directories, Collection, Detection and Analysis, Security Policies, Topologies Events, Asset Profiles, Flows and Investigating Offences |
2CSE70E25 - CYBER DEFENSE ( KDG ) |
Fundamentals of Cyber Defense: Threat Landscape, Security Challenges, Defense Team, Information Security Control, Risk Level, Risk Management Cycle, CVSS scoring, NIST Framework Incident Response Process Incident response process: Reasons to have an IR process in place, Creating an incident response process, Incident response team, Incident life cycle, Handling an incident, Incident response in the cloud Security Audits ISP-Information Security Policy, Creating, Enforcing ISP, Overview of audit, Network device audit, windows audit, linux audit, web server audit, database audit |