ABCDEFG
1
Maharashtra State Board of Technical Education
2
Teaching Plan (TP)
3
Academic Year : 2025-26
4
Program : Computer Engg.Course : Network Information SecurityCourse Code : 316317
5
Semester : Sixth
Name of Faculty : R.H.Rathod
6
Chapter no. (Total Hrs.)CO (Mention only number)Title / DetailsPlan (From - To & number of Lectures)Actual Execution (From - To & number of Lectures)Teaching Method /MediaRemarks
7
01 (8)aUnit - I Introduction to Computer and Information
Security
15/12/25 to 31/12/25 PPT, Slideshow, GMeet, Zoom, Self YouTube channelBy conducting extra classes, this chapter will be completed , if required
8
1.1 Foundations of computer security: Definition and Need
of Computer Security
16/12/25 (1)
9
Security Basics: Confidentiality,
Integrity, Availability, Accountability, Authentication, Non -
repudiation and Reliability
17/12/25 (1)
10
1.2 Information Security Overview: Introduction to information, need and importance of information security19/12/25 (1)
11
Information classification, Criteria for information classification 23/12/25 (1)
12
1.3 Type of Attacks: Active and Passive attacks, Masquerade Attack, Denial of Service, Backdoors and Trapdoors,24/12/25 (1)
13
Sniffing, phishing, Spoofing, Man in the Middle, Replay, TCP/IP Hacking, Social Engineering26/12/25 (1)
14
1.4 Types of Malwares: Virus, Worms, Trojan horse, Spyware, Adware, Ransom ware, Logic Bombs, Rootkits, Key loggers30/12/25 (1)
15
1.5 Operating system updates: HotFix, Patch, Service Pack
1.6 Threat to security: Introduction to assets, vulnerability, threats, risks, relation between threat, vulnerability, risks
31/12/25 (2)
16
02 (8)bUnit - II User Authentication and Access Control01/01/26 to 16/01/26 PPT, Slideshow, GMeet, Zoom, Self YouTube channelBy conducting extra classes, this chapter will be completed , if required
17
2.1 Identification and Authentication methods: Electronic user authentication, user name and password, multi-factor
authentication, token-based authentic
02/01/26
18
2.2 Password attacks: Guessing password, Piggybacking, Shoulder surfing, Dumpster diving03/01/26
19
2.3 Biometrics: Finger prints, Hand prints, Retina scan patterns06/01/26
20
Voice patterns, Face recognition, Signature and Writing patterns, Keystrokes07/01/26
21
2.4 Authorization: Introduction to authorization, goals of authorization09/01/26
22
2.5 Access controls: Definition, Authentication mechanism13/01/26
23
Access control principles, Access rights and permission Access control policies: Discretionary access control (DAC), Mandatory access control (MAC)14/01/26
24
Role-based access control(RBAC), Attribute-based access control (ABAC)16/01/26
25
Chapter no. (Total Hrs.)CO (Mention only number)Title / DetailsPlan (From - To & number of Lectures)Actual Execution (From - To & number of Lectures)Teaching Method /MediaRemarks
26
03 (10)c Unit - III Cryptography20/01/26 to 10/02/26 PPT, Slideshow, GMeet, Zoom, Self YouTube channelBy conducting extra classes, this chapter will be completed , if required
27
3.1 Introduction: Plain text, Cipher text, Cryptography, Cryptanalysis, Cryptology, Encryption, Decryption20/01/26
28
3.2 Symmetric and Asymmetric cryptography21/01/26
29
Introduction, working, key management,23/01/26
30
asymmetric cryptography -public key distribution27/01/26
31
3.3 Substitution techniques : Caesar cipher28/01/26
32
Play fair cipher, Vigenere cipher, Vernam cipher(One-timepad)30/01/26
33
3.4 Transposition techniques03/02/26
34
Railfence technique, Simple columnar technique04/02/26
35
3.5 Steganography: Overview of steganography06/02/26
36
Overview of Unit-310/02/26
37
04 (9)dUnit - IV Firewall and Encryption Algorithms11/02/26 to 03/03/26 PPT, Slideshow, GMeet, Zoom, Self YouTube channelBy conducting extra classes, this chapter will be completed , if required
38
4.1 Firewall: Need of firewall, 11/02/26
39
Types of firewalls: Packet filters, Stateful packet filters, Application gateways, Circuit
gateways
13/02/26
40
4.2 Firewall policies, Configuration, Limitations, Demilitarized zone (DMZ)17/02/26
41
4.3 DES (Data Encryption Standard) algorithm18/02/26
42
(Advanced Encryption Standard) algorithm20/02/26
43
RSA (Rivest- Shamir-Adleman) algorithm24/02/26
44
4.4 Diffie-Hellman key exchange algorithm, Man-in- middle attack25/02/26
45
4.5 Hash Function: Introduction, Features of Hash Functions, MD5 (Message Digest Method 5) and SHA(secure hashing
algorithm) algorithm
27/02/26
46
4.6 Digital Signature: Introduction and working of digital signature, Digital Certificate03/03/26
47
Chapter no. (Total Hrs.)CO (Mention only number)Title / DetailsPlan (From - To & number of Lectures)Actual Execution (From - To & number of Lectures)Teaching Method /MediaRemarks
48
05 (10)eUnit - V Network and Database Security04/03/26 to 27/03/26 PPT, Slideshow, GMeet, Zoom, Self YouTube channelBy conducting extra classes, this chapter will be completed , if required
49
5.1 Intrusion Detection System(IDS):Network-based IDS, Host-based IDS, Honeypots04/03/26
50
5.2 Kerberos: Working, Authentication Server (AS), Ticket Granting Service (TGS), Service Server (SS), IP Security:06/03/26
51
Overview, Authentication Header (AH), Encapsulating Security Payload (ESP) protocols, Transport and tunnel
modes
10/03/26
52
5.3 E-mail security: Simple mail transfer protocol (SMTP)11/03/26
53
Pretty good privacy (PGP), Secure/ Multipurpose Internet Mail Extensions (S/MIME)13/03/26
54
Privacy Enhance Mail (PEM)17/03/26
55
5.4 Database Security: Need for database security18/03/26
56
SQL injection attack, database encryption20/03/26
57
5.5 Cloud security: Essential characteristics, service model, deployment model24/03/26
58
cloud specific security threats25/03/26
59
60
61
62
63