M Tech (Computer Science and Applications):Information Security

Master

In Patiala

Price on request

Description

  • Type

    Master

  • Location

    Patiala

Facilities

Location

Start date

Patiala (Punjab)
See map
Thapar University P.O Box 32, 147004

Start date

On request

About this course

Admission to M. Tech. (Computer Science and Applications) will be open to a candidate who obtains at least 50% marks in aggregate in the qualifying examination from a recognized university.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

Semester I


Advanced Data Structures
Data Communication and Computer Networks
Computer Organization and Operating Systems
Computational Algorithms in Optimization
Statistical Methods and Algorithms
Database Management and Administration


Semester II

Object Oriented Analysis and Design
Software Engineering
Logic and its applications
Computer Graphics and Multimedia Technologies
Web Technologies and E-Governance


Semester III

Seminar
Thesis (starts)


Semester IV

Thesis (contd.)


Information Security


Introduction to cryptography: Encryption schemes, Cryptanalysis, Block ciphers, Stream ciphers, Affine ciphers, DES and AES algorithms,

Public Key Encryption: RSA cryptosystem, Rabin Encryption, Diffie-Hellman Key Exchange, ElGamal Encryption, Cryptographic hash functions,

Network security: Network security issues, Sniffing, IP spoofing, Common threats, E-Mail security, IPSec, SSL, PGP, Intruders, Virus, Worms, Firewalls-need and features of firewall, Types of firewall, Intruder Detection Systems.

Digital Signatures: RSA signatures, Signatures from public key systems, ElGamal Signatures, Digital Signature Algorithm, Undeniable Signatures, Blind Signatures, Digital certificates.

Cyber Security: Cyber Crime and security, Security tools, Introduction to Digital Forensic, OS fingerprinting, TCP/IP stack masking, Social engineering.

Laboratory: The lab work will be based on the setting up of network firewalls, Intruder Detection systems, implementation of cryptography algorithms and digital signature algorithms, tcpdump.

M Tech (Computer Science and Applications):Information Security

Price on request