M Tech (Computer Science and Applications):Information Security

Thapar University
In Patiala

Price on request
You can also call the Study Centre
17523... More
Compare this course with other similar courses
See all

Important information

  • Master
  • Patiala
Description

Important information
Venues

Where and when

Starts Location
On request
Patiala
Thapar University P.O Box 32, 147004, Punjab, India
See map

Frequent Asked Questions

· Requirements

Admission to M. Tech. (Computer Science and Applications) will be open to a candidate who obtains at least 50% marks in aggregate in the qualifying examination from a recognized university.

Course programme

Semester I


Advanced Data Structures
Data Communication and Computer Networks
Computer Organization and Operating Systems
Computational Algorithms in Optimization
Statistical Methods and Algorithms
Database Management and Administration


Semester II

Object Oriented Analysis and Design
Software Engineering
Logic and its applications
Computer Graphics and Multimedia Technologies
Web Technologies and E-Governance


Semester III

Seminar
Thesis (starts)


Semester IV

Thesis (contd.)


Information Security


Introduction to cryptography: Encryption schemes, Cryptanalysis, Block ciphers, Stream ciphers, Affine ciphers, DES and AES algorithms,

Public Key Encryption: RSA cryptosystem, Rabin Encryption, Diffie-Hellman Key Exchange, ElGamal Encryption, Cryptographic hash functions,

Network security: Network security issues, Sniffing, IP spoofing, Common threats, E-Mail security, IPSec, SSL, PGP, Intruders, Virus, Worms, Firewalls-need and features of firewall, Types of firewall, Intruder Detection Systems.

Digital Signatures: RSA signatures, Signatures from public key systems, ElGamal Signatures, Digital Signature Algorithm, Undeniable Signatures, Blind Signatures, Digital certificates.

Cyber Security: Cyber Crime and security, Security tools, Introduction to Digital Forensic, OS fingerprinting, TCP/IP stack masking, Social engineering.

Laboratory: The lab work will be based on the setting up of network firewalls, Intruder Detection systems, implementation of cryptography algorithms and digital signature algorithms, tcpdump.


Compare this course with other similar courses
See all