CO1: Understand the basics of computer security
CO2: Elaborate the cryptographic techniques.
CO3: Discuss the transport layer security
CO4: Find the pros and cons of various key distribution methods
CO5: Analyze the wireless Network security
CO6: Find the level of system security
- Teacher: MUKESH SINGH
- Teacher: GULSHAN DHASMANA