| A | B | C | D | E | F | G | |
|---|---|---|---|---|---|---|---|
1 | Maharashtra State Board of Technical Education | ||||||
2 | Teaching Plan (TP) | ||||||
3 | Academic Year : 2025-26 | ||||||
4 | Program : Computer Engg. | Course : Network Information Security | Course Code : 316317 | ||||
5 | Semester : Sixth | Name of Faculty : R.H.Rathod | |||||
6 | Chapter no. (Total Hrs.) | CO (Mention only number) | Title / Details | Plan (From - To & number of Lectures) | Actual Execution (From - To & number of Lectures) | Teaching Method /Media | Remarks |
7 | 01 (8) | a | Unit - I Introduction to Computer and Information Security | 15/12/25 to 31/12/25 | PPT, Slideshow, GMeet, Zoom, Self YouTube channel | By conducting extra classes, this chapter will be completed , if required | |
8 | 1.1 Foundations of computer security: Definition and Need of Computer Security | 16/12/25 (1) | |||||
9 | Security Basics: Confidentiality, Integrity, Availability, Accountability, Authentication, Non - repudiation and Reliability | 17/12/25 (1) | |||||
10 | 1.2 Information Security Overview: Introduction to information, need and importance of information security | 19/12/25 (1) | |||||
11 | Information classification, Criteria for information classification | 23/12/25 (1) | |||||
12 | 1.3 Type of Attacks: Active and Passive attacks, Masquerade Attack, Denial of Service, Backdoors and Trapdoors, | 24/12/25 (1) | |||||
13 | Sniffing, phishing, Spoofing, Man in the Middle, Replay, TCP/IP Hacking, Social Engineering | 26/12/25 (1) | |||||
14 | 1.4 Types of Malwares: Virus, Worms, Trojan horse, Spyware, Adware, Ransom ware, Logic Bombs, Rootkits, Key loggers | 30/12/25 (1) | |||||
15 | 1.5 Operating system updates: HotFix, Patch, Service Pack 1.6 Threat to security: Introduction to assets, vulnerability, threats, risks, relation between threat, vulnerability, risks | 31/12/25 (2) | |||||
16 | 02 (8) | b | Unit - II User Authentication and Access Control | 01/01/26 to 16/01/26 | PPT, Slideshow, GMeet, Zoom, Self YouTube channel | By conducting extra classes, this chapter will be completed , if required | |
17 | 2.1 Identification and Authentication methods: Electronic user authentication, user name and password, multi-factor authentication, token-based authentic | 02/01/26 | |||||
18 | 2.2 Password attacks: Guessing password, Piggybacking, Shoulder surfing, Dumpster diving | 03/01/26 | |||||
19 | 2.3 Biometrics: Finger prints, Hand prints, Retina scan patterns | 06/01/26 | |||||
20 | Voice patterns, Face recognition, Signature and Writing patterns, Keystrokes | 07/01/26 | |||||
21 | 2.4 Authorization: Introduction to authorization, goals of authorization | 09/01/26 | |||||
22 | 2.5 Access controls: Definition, Authentication mechanism | 13/01/26 | |||||
23 | Access control principles, Access rights and permission Access control policies: Discretionary access control (DAC), Mandatory access control (MAC) | 14/01/26 | |||||
24 | Role-based access control(RBAC), Attribute-based access control (ABAC) | 16/01/26 | |||||
25 | Chapter no. (Total Hrs.) | CO (Mention only number) | Title / Details | Plan (From - To & number of Lectures) | Actual Execution (From - To & number of Lectures) | Teaching Method /Media | Remarks |
26 | 03 (10) | c | Unit - III Cryptography | 20/01/26 to 10/02/26 | PPT, Slideshow, GMeet, Zoom, Self YouTube channel | By conducting extra classes, this chapter will be completed , if required | |
27 | 3.1 Introduction: Plain text, Cipher text, Cryptography, Cryptanalysis, Cryptology, Encryption, Decryption | 20/01/26 | |||||
28 | 3.2 Symmetric and Asymmetric cryptography | 21/01/26 | |||||
29 | Introduction, working, key management, | 23/01/26 | |||||
30 | asymmetric cryptography -public key distribution | 27/01/26 | |||||
31 | 3.3 Substitution techniques : Caesar cipher | 28/01/26 | |||||
32 | Play fair cipher, Vigenere cipher, Vernam cipher(One-timepad) | 30/01/26 | |||||
33 | 3.4 Transposition techniques | 03/02/26 | |||||
34 | Railfence technique, Simple columnar technique | 04/02/26 | |||||
35 | 3.5 Steganography: Overview of steganography | 06/02/26 | |||||
36 | Overview of Unit-3 | 10/02/26 | |||||
37 | 04 (9) | d | Unit - IV Firewall and Encryption Algorithms | 11/02/26 to 03/03/26 | PPT, Slideshow, GMeet, Zoom, Self YouTube channel | By conducting extra classes, this chapter will be completed , if required | |
38 | 4.1 Firewall: Need of firewall, | 11/02/26 | |||||
39 | Types of firewalls: Packet filters, Stateful packet filters, Application gateways, Circuit gateways | 13/02/26 | |||||
40 | 4.2 Firewall policies, Configuration, Limitations, Demilitarized zone (DMZ) | 17/02/26 | |||||
41 | 4.3 DES (Data Encryption Standard) algorithm | 18/02/26 | |||||
42 | (Advanced Encryption Standard) algorithm | 20/02/26 | |||||
43 | RSA (Rivest- Shamir-Adleman) algorithm | 24/02/26 | |||||
44 | 4.4 Diffie-Hellman key exchange algorithm, Man-in- middle attack | 25/02/26 | |||||
45 | 4.5 Hash Function: Introduction, Features of Hash Functions, MD5 (Message Digest Method 5) and SHA(secure hashing algorithm) algorithm | 27/02/26 | |||||
46 | 4.6 Digital Signature: Introduction and working of digital signature, Digital Certificate | 03/03/26 | |||||
47 | Chapter no. (Total Hrs.) | CO (Mention only number) | Title / Details | Plan (From - To & number of Lectures) | Actual Execution (From - To & number of Lectures) | Teaching Method /Media | Remarks |
48 | 05 (10) | e | Unit - V Network and Database Security | 04/03/26 to 27/03/26 | PPT, Slideshow, GMeet, Zoom, Self YouTube channel | By conducting extra classes, this chapter will be completed , if required | |
49 | 5.1 Intrusion Detection System(IDS):Network-based IDS, Host-based IDS, Honeypots | 04/03/26 | |||||
50 | 5.2 Kerberos: Working, Authentication Server (AS), Ticket Granting Service (TGS), Service Server (SS), IP Security: | 06/03/26 | |||||
51 | Overview, Authentication Header (AH), Encapsulating Security Payload (ESP) protocols, Transport and tunnel modes | 10/03/26 | |||||
52 | 5.3 E-mail security: Simple mail transfer protocol (SMTP) | 11/03/26 | |||||
53 | Pretty good privacy (PGP), Secure/ Multipurpose Internet Mail Extensions (S/MIME) | 13/03/26 | |||||
54 | Privacy Enhance Mail (PEM) | 17/03/26 | |||||
55 | 5.4 Database Security: Need for database security | 18/03/26 | |||||
56 | SQL injection attack, database encryption | 20/03/26 | |||||
57 | 5.5 Cloud security: Essential characteristics, service model, deployment model | 24/03/26 | |||||
58 | cloud specific security threats | 25/03/26 | |||||
59 | |||||||
60 | |||||||
61 | |||||||
62 | |||||||
63 | |||||||