CO1: Classify security vulnerabilities involved in data communication over Internet and
After completion of the course the students will be able to:
Outcome
CO2: Make use of modern block ciphers to secure data transmission and storage
make use of classical algorithms to address the vulnerabilities.
CO3; Analyze challenges involved in key distribution and select approache that can be
CO4: Analyze strengths of public key algorithms and explore applications in exchange,
adopted
CO5: Appreciate application of algorithms for ensuring access control, authentication,
authentication and hashing of messages.
CO6: Appraise risks related to wireless, web, cloud security and measures to be adopted to
secured transmission of data at different layers. Secure organizational network.
- Teacher: ROHAN VERMA
Software Verification Validation and Testing
- Teacher: NEHA TRIPATHI
COMPUTER NETWORKS II
- Teacher: NEHA TRIPATHI