4-1 Final
4-1 Final
edi
Cr
ts
Subject
Name of the Subject
Credits
External
Tutorial
Internal
Code
Theory
Total
Lab
PROFESSIONAL ELECTIVES-III
Malware Analysis
2 1 0 3 30 70 100
Cyber Security Governance
Quantum Cryptography
PROFESSIONAL ELECTIVES-IV
Social Network Security
2 1 0 3 30 70 100
Secure Software Engineering
Mobile and Wireless Network Security
PROFESSIONAL ELECTIVE-V/ MOOCS
Steganography and Digital Watermarking
2 1 0 3 30 70 100
Multimedia Security
Advanced Data Security and Privacy
OPEN ELECTIVE-III/ JOB ORIENTED COURSE
AR&VR
2 1 0 3 30 70 100
HPC
Intelligent Information-Retrieval-Systems
OPEN ELECTIVE-III/ JOB ORIENTED COURSE
Secure Coding Practices
2 1 0 3 30 70 100
Security of E- Systems
Big Data Security
SKILL DEVELOPMET COURSE
Security in AI 1 2 0 2 30 70 100
HUMANITIES AND SOCIAL SCIENCES
Management Science 2 0 0 2 30 70 100
MANDATORY LEARNING COURSES
Universal Human Values 2 0 0 0 0 0 0
Comprehensive Viva 0 0 0 1 0 50 50
Industrial/ Research Internship 0 0 0 3 0 100 100
Total 5 7 0 23 210 640 850
Page 1 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
MALWARE ANALYSIS
(Professional Elective-III)
Course Objectives:
The learning objectives of this course are to:
Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Apply foundational knowledge of computing and security to identify
CO 1 L5
and analyse different forms of malware.
Introduction to Malware, Malware Threats and Types: Viruses, Worms, Rootkits, Trojans,
Bots, Spyware, Adware, Logic Bombs; Malware Attack Life Cycle; Anti-malware Products
and Overview; Reverse Engineering Basics for Windows and Linux
Page 2 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Static vs Dynamic Malware Analysis Overview; Fingerprinting Malware; PE File Structure &
Header Analysis; String Extraction Techniques, Tools – PEiD, TrID, MASTIFF; YARA Rule
Creation; C Code and Assembly Recognition; Anti-Static Analysis Techniques – Obfuscation,
Packing, Metamorphism, Polymorphism
Concepts – Live vs Dead Malware Analysis; Behavior Monitoring with ProcMon, Autoruns;
Process Monitor and Wireshark, Code Injection Detection; Virtual Machine Structure;
Automated Analysis Tools – VirusTotal; Sandboxing Techniques
x86 Architecture – Memory, Registers, Opcodes, Stack, Control Flow; Tools Overview – IDA
Pro, OllyDbg, x86dbg, Disassemblers, Debuggers, Decompilers; Malware Delivery and
Hidden Component Extraction; Control Flow Flattening; Dynamic Library Loading
Text Books:
1. Abhijit Mohanta, Anoop Saldanha, Malware Analysis and Detection Engineering a
Comprehensive Approach to Detect and Analyze Modern Malware, 2020, 1st edition,
Apress (ISBN 978-1-4842-6192-7), United States.
2. Reginald Wong, Mastering Reverse Engineering, 2018, 1st edition, Packt Publishing Ltd,
Birmingham, ISBN 978-1-78883-884-9, UK.
Page 3 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
References Books:
1. M. Sikorski and A. Honig, Practical Malware Analysis: The Hands-on Guide to Dissecting
Malicious Software. 2012, 1st edition, No Starch Press San Francisco, CA. (ISBN No.:
9781593272906), United States.
2. Practical malware analysis The Hands-On Guide to Dissecting Malicious Software by
Michael Sikorski and Andrew Honig ISBN-10: 159327-290-1, ISBN-13: 978-1-59327-290-6,
2012 2
3. Computer viruses: from theory to applications by Filiol, Eric Springer Science & Business
Media, 2006
4. Android Malware by Xuxian Jiang and Yajin Zhou, Springer ISBN 978-1-4614-7393-0, 2005
5. Hacking exposed™ malware & rootkits: malware & rootkits security secrets & Solutions
by Michael Davis, Sean Bodmer, Aaron Lemasters, McGraw-Hill, ISBN: 978-0-07-159119-
5, 2010
6. Windows Malware Analysis Essentials by Victor Marak, Packt Publishing, 2015
Page 4 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Apply knowledge of computing, mathematics, and cybersecurity
CO 1 principles to analyse and solve real-world security governance L3
problems.
CO 2 Identify, formulate, and analyse security threats to derive governance L2
requirements and propose effective solutions..
Design and evaluate governance frameworks that incorporate legal,
CO 3 L2
ethical, and professional standards.
CO 4 Use modern security tools, governance models, and risk assessment L4
techniques effectively.
CO 5 Understand the impact of cybersecurity governance decisions in a L2
global, economic, environmental, and societal context.
Communicate effectively in both technical and non-technical contexts to
CO 6 diverse stakeholders, including management and compliance L5
authorities.
Page 5 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Aspects of cyber security governance: strategic integration, allied disciplines, cyber risk
mitigation approach, adaptability and agility, senior engagement, cyber risk analytics,
Introduction to Cyber Risk Analytics.
UNIT III – Assessing an Organization’s Cyber Security Governance and Maturity Models
Assessing an Organization’s Cyber Security Governance: Cyber Prep Level 1, Cyber Prep
Level 2, Cyber Prep Level 3, Cyber Prep Level 4, Cyber Prep Level 5, maturity models: SSE-
CMM, BSI-MM, ISM3, SOMA, GRC MM, PRISMA.
Text Books:
1. Deb Bodeau, Steve Boyle, Jenn Fabius-Greene, Rich Graubart. Cyber Prep Paper,
MITRE, 2010. Link for pdf:
https://www.mitre.org/sites/default/files/pdf/10_3710.pdf
2. Jacobs, Jay, and Bob Rudis. Data-driven Security: Analysis, Visualization and
Dashboards. Wiley, 2014.
3. Collins, Michael. Network Security Through Data Analysis: From Data to Action.
O’Reilly Media, 2017.
4. Jaquith, Andrew. Security Metrics: Replacing Fear, Uncertainty, and Doubt. Pearson
Education, 2007.
5. Framework for Improving Critical Infrastructure Cybersecurity. NIST, 2014.
References Books:
1. Touhill, G. and Touhil, C., Cybersecurity for Executives: A Practical Guide. John
Wiley & Sons, 2014.
2. Iannarelli, J.G. and O’Shaughnessy, M.O., Information Governance and Security:
Protecting and Managing Your Company’s Proprietary Information. Elsevier, 2015.
3. Bosworth, S., Kabay, M.E., and Whyne, E., Computer Security Handbook. John Wiley
& Sons, 2014.
Page 6 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
QUANTUM CRYPTOGRAPHY
(Professional Elective-III)
Course Objectives:
The learning objectives of this course are to:
Understand the fundamentals of quantum information and cryptography. Learn key
concepts like qubits, density matrices, entropy, and secure quantum communication.
Explore Quantum Key Distribution (QKD) protocols and error correction methods.
Study QKD techniques, resource constraints, and adaptive error correction strategies.
Analyse attack strategies and the security of QKD systems. Evaluate attack types in
ideal and real-world environments and review QKD system implementations
Examine real-life applications and network models in quantum cryptography.
Understand quantum networks, the Ring of Trust, and practical deployment
challenges.
Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Explain the core principles of quantum information theory. Students will
CO 1 understand qubits, density matrices, entropy, and the foundations of L4
quantum cryptography.
Describe and evaluate various Quantum Key Distribution (QKD) protocols.
CO 2 Students will analyse QKD methods, gain, error correction, and resource L3
management techniques
Assess different attack strategies on QKD systems. Students will examine
CO 3 individual and realistic attacks and understand how they affect protocol L4
security.
Apply statistical methods to analyse QKD networks. Students will use
CO 4 statistical tools to evaluate the performance and reliability of QKD in L3
real-life networks.
Illustrate real-world implementations of quantum cryptographic systems.
CO 5 Students will study projects like SECOQC and identify the challenges in L6
deploying quantum-secure networks.
Discuss application models and trust frameworks in quantum security.
CO6 Studentswill explain the Ring of Trust model and its role in secure L5
communications, such as medical systems.
Page 7 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Text Books:
1. Kollmitzer C., Pivk M. (Eds.), Applied Quantum Cryptography, Lect. Notes Phys.
797(Springer, Berlin Heidelberg 2010).
References Books:
1. Gerald B. Gilbert, Michael Hamrick, and Yaakov S. Weinstein, Quantum
Cryptography, World Scientific Publishing.
2. Gilles Van Assche, Quantum Cryptography and Secret-Key Distillation, Cambridge
University Press.
Page 8 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Course Objectives:
The learning objectives of this course are to:
Introduce the foundations of social networking, semantic web, and social network
analysis with a focus on privacy and security concepts.
Understand evolving security and privacy challenges in social networks, including
user behaviour and contextual privacy issues.
Learn methods for extracting, analysing, and mining data from social networks and
evaluating web communities.
Explore behavioural prediction, user trust, identity management, and privacy in social
networking environments.
Gain knowledge of access control, identity federation, and device-level cyber security
policies and tools.
Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
The engineer and society: Apply reasoning informed by the contextual
CO 1 knowledge to assess societal, health, safety, legal and cultural issues L2
and the consequent responsibilities relevant to the professional
engineering practice.
Environment and sustainability: Understand the impact of the
CO 2 professional engineering solutions in societal and environmental L5
contexts, and demonstrate the knowledge of, and need for sustainable
development.
CO 3 Ethics: Apply ethical principles and commit to professional ethics and L4
responsibilities and norms of the engineering practice.
Page 9 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Text Books:
1. Peter Mika, “Social Networks and the Semantic Web, First Edition, Springer 2007.
2. BorkoFurht, “Handbook of Social Network Technologies and Application, First
Edition, Springer, 2010.
3. James Graham, Richard Howard, and Ryan Otson "Cyber Security Essentials", First
Edition, Auerbach Publications,2010.
4. Nina Godbole and Sunit Belpure “Cyber Security: Understanding Cyber Crimes,
Computer Forensics and legal perspectives”
References Books:
1. Easley D. Kleinberg J., “Networks, Crowds, and Markets – Reasoning about a Highly
Connected World”, Cambridge University Press, 2010.
2. Jackson, Matthew O., “Social and Economic Networks”, Princeton University Press,
2008.
Page 10 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Course Objectives:
The learning objectives of this course are to:
Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Engineering knowledge: Apply the knowledge of mathematics,
CO 1 science, engineering fundamentals, and an engineering specialization L2
to the solution of complex engineering problems
Problem analysis: Identify, formulate, review research literature, and
CO 2 analyze complex engineering problems reaching substantiated L5
conclusions using first principles of mathematics, natural sciences, and
engineering sciences.
Design/development of solutions: Design solutions for complex
engineering problems and design system components or processes
CO 3 that meet the specified needs with appropriate consideration for the L4,L3
public health and safety, and the cultural, societal, and environmental
considerations.
Conduct investigations of complex problems: Use research-based
knowledge and research methods including design of experiments,
CO 4 L3
analysis and interpretation of data, and synthesis of the information to
provide valid conclusions.
Page 11 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Textbooks:
1. Julia H Allen, Sean J Barnum, Robert J Ellison, Gary McGraw, Nancy R Mead, Software
Security Engineering: A Guide for Project Managers, Addison Wesley, 2008.
Page 12 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
References Books:
2. Developing Secure Software: Jason Grembi, Cengage Learning.
3. Software Securtiy: Richard Sinn, Cengage Learning
Course Objectives:
The learning objectives of this course are to:
Discover the wireless/mobile market and the future needs and challenges.
Describe the key concepts of wireless networks, standards, technologies and their
basic
Operations.
Evaluate the mac and different network protocols using network simulation software
tools.
Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Understand Advanced Knowledge Of Networking And Wireless
CO 1 L2
Networking
CO 2 Describe Various Types Of Wireless Networks, Standards, Operations L5
And Use Cases.
CO 3 Compare Wlan, Wpan, Wwan, Cellular Based Upon Underlying L4,
Propagation And Performance Analysis.
Demonstrate Knowledge Of Protocols Used In Wireless Networks
CO 4 L6
And Learn Simulating Wireless Networks.
CO 5 Summarize Wireless Networks Exploring Trade-Offs Between Wire L2
Line And Wireless Links.
CO 6 Develop Mobile Applications To Solve Some Of The Real World L3
Problems.
UNIT - I: Introduction:
Security Issues in Mobile Communication: Mobile Communication History, Security – Wired Vs
Wireless, Security Issues in Wireless and Mobile Communications, Security Requirements in Wireless
and Mobile Communications, Security for Mobile Applications, Advantages and Disadvantages of
Application – level Security.
Page 13 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Security at Device, Network, and Server Levels: Mobile Devices Security Requirements, Mobile
Wireless network level Security, Server Level Security. Application Level Security in Wireless
Networks: Application of WLANs, Wireless Threats, Some Vulnerabilities and Attach Methods over
WLANs, Security for 1G Wi-Fi Applications, Security for 2G Wi-Fi Applications, Recent Security
Schemes for Wi-Fi Applications
Textbooks:
1. Pallapa Venkataram, Satish Babu: “Wireless and Mobile Network Security”, 1st Edition, Tata
McGraw Hill,2010.
2. Frank Adelstein, K.S.Gupta : “Fundamentals of Mobile and Pervasive Computing”, 1st Edition,
Tata McGraw Hill 2005.
3. Randall K. Nichols and Panos C. Lekkas :"Wireless Security: Models, Threats, and
Solutions",1st Edition, Tata McGraw Hill,2002
4. Tyler Wrightson :"Wireless Network Security: A Beginner's Guide”, 1st Edition, Tata McGraw
Hill,2012
References Books:
1. Bruce Potter and Bob Fleck : “802.11 Security” , 1st Edition, SPD O’REILLY 2005.
2. James Kempf: “Guide to Wireless Network Security, Springer. Wireless Internet Security –
Architecture and Protocols”, 1st Edition, Cambridge University Press, 2008
Page 14 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Course Objectives:
The learning objectives of this course are to:
Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Demonstrate a comprehensive understanding of information hiding
CO 1 L2
techniques and their real-world applications.
CO 2 Apply various steganographic techniques to embed and retrieve L5
hidden data securely.
CO 3 Conduct steganalysis to detect and counter unauthorized data hiding L4,
in digital media.
CO 4 Develop and optimize watermarking algorithms for image, video, and L6
multimedia security.
CO 5 Critically assess the effectiveness of copyright protection mechanisms L2
and their implementation in digital systems.
Discuss the legal, ethical, and security implications of digital copyright
CO 6 L3
and watermarking in global internet usage.
Page 15 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
UNIT- II: Survey of steganographic techniques - Substitution system and bitplane tools -
Transform domain techniques - Spread spectrum and information hiding- Statistical
Steganography - Distortion and code generation techniques - Automated generation of
English text.
UNIT - IV: Survey of current watermarking techniques - Cryptographic and psycho visual
aspects - Choice of a workspace Formatting the watermark bets - Merging the watermark and
the cover - Optimization of the watermark receiver - Extension from still images to video -
Robustness of copyright making systems
UNIT - VI: Copyright on the Internet and Watermarking – Digital copyright and
Watermarking, conflict of copyright laws on the internet, Watermarking detector Failure,
Counterfeiting Marks, Detection of the Watermark.
Textbooks:
1. Stefan Katzenbelsser and Fabien A. P. Petitcolas, Information hiding techniques for
Steganography and Digital Watermarking, ARTECH House Publishers, January 2004.
Reference Books
1. Multimedia Security: Steganography and Digital water marking techniques for
protection of Intellectual property, Chun shienlk, Idea group publishing, 2005.
2. Techniques and Applications of Digital Watermarking and content protection, Michel
Arnold, Martin, Shemuckev, Stephen, D. Wolfhusen artech house, 2003.
Page 16 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
MULTIMEDIA SECURITY
(Professional Elective-V/MOOCS)
Course Objectives:
The learning objectives of this course are to:
Understand the need for multimedia content protection in distribution networks.
Explore various encryption techniques and their applications in multimedia.
Gain knowledge of digital watermarking and steganography techniques.
Analyze the vulnerabilities and attacks on multimedia protection systems.
Study modern multimedia security approaches like fingerprinting and authentication.
Evaluate the effectiveness of encryption, watermarking, and data hiding in real-world
multimedia applications.
Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
CO 1 Explain general issues and vulnerabilities in multimedia protection schemes. L2
CO 2 Apply encryption techniques including chaos-based and streaming media L5
encryption.
CO 3 Differentiate between watermarking and steganography with use cases. L4,
CO 4 Identify and classify multimedia watermarking methods and applications. L6
CO 5 Demonstrate knowledge of multimedia-specific encryption techniques for L2
audio
UNIT - I:
General Issues -Protection of Multimedia Content in Distribution Networks - Vulnerabilities
of Multimedia Protection Schemes- Fundamentals of Multimedia Encryption Techniques
UNIT - II:
Page 17 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
UNIT - III:
Digital Watermarking–Digital Steganography, Difference between Watermarking and
Steganography, A brief history, Classification Based on Characteristics, Classification Based
on Applications, Watermarking attacks and tools, Image-Processing Attacks, Geometric
Attacks, Cryptographic Attacks, Watermarking Tools.
UNIT - IV:
Multimedia Watermarking - Survey of Watermarking Techniques and Applications - New
Trends and Challenges in Digital Watermarking Technologies. Applications for Printed
Materials-Lossless Data Hiding: Fundamentals, Algorithms, and Applications- Attacking
Multimedia Protecting Systems via Blind Pattern matching
UNIT - V:
Fundamental of Multimedia Encryption Techniques- Introduction, Overview of Modern
Cryptography, Introduction to Multimedia Security, Video Encryption Techniques, Image
Encryption Techniques, Audio and Speech Encryption Techniques.
.
UNIT - VI:
Multimedia Data Hiding, Fingerprinting-And Authentication - Attacking Multimedia
Protection Systems via Blind Pattern Matching - Digital Media Fingerprinting: Techniques
and Trends Scalable Image and Video Authentication- Signature Based Media Authentication.
References Books:
1. B.Furht and D.Kirovski, Multimedia Security Handbook. CRC Press, Boca Ranton,
Florida, 2004
2. Frank Shih, Digital Watermarking and Steganography: Fundamentals and
Techniques, CRC Press, 2014.
3. Furht B, Socek D, Eskicioglu AM. Fundamentals of multimedia encryption techniques.
Multimedia Security Handbook.2004
Page 18 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Course Objectives:
The learning objectives of this course are to:
Understand the fundamentals of database systems and identify key data security
requirements such as integrity, confidentiality, and reliability.
Analyze and design distributed databases including architectural models,
fragmentation, and allocation techniques.
Apply database integration techniques using schema matching, mapping, and
data cleaning methods.
Demonstrate control mechanisms for data access, view management, and semantic
integrity within secure transactions.
Explore privacy principles and policies, and understand privacy-enhancing
technologies across various domains.
Evaluate the impact of privacy on emerging technologies such as IoT, cloud, e-
voting, RFID, and cyber warfare.
Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
CO 1 Design and manage distributed database systems addressing security, L4
fragmentation, and allocation concerns.
CO 2 Integrate heterogeneous databases through schema integration and resolve L2
inconsistencies via data cleaning.
CO 3 Implement access control models and manage transaction properties to ensure L3
secure data operations.
Page 19 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
UNIT – V: PRIVACY
Privacy Concepts, Privacy Principles and Policies, Authentication and Privacy, Privacy in
Data Mining, Privacy on the web, E-mail Security.
Reference Books:
1. Security in Computing. Charles P. Ploeger and Shari Lawrence Pfleeger, Thind
Edition, Pearson Education, 2003.
2. Principles of Distributed Database Systems, M.Tamer OZSU and Patrick Valdureiz,
Second Edition Pearson Education, 2001
Page 20 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Course Objectives:
The learning objectives of this course are to:
Understand core concepts and components of AR/VR systems. Learn the definitions,
history, and scope of AR/VR technologies. Explore key system elements like displays
and sensory interfaces.
Apply interface technologies for AR/VR interaction. Examine input/output devices
including trackers and gesture tools. Understand how these interfaces enhance virtual
experiences.
Evaluate human factors and safety in AR/VR use. Study user performance,
ergonomics, and health concerns. Assess how human interaction impacts AR/VR
system design.
Explore tools, programming, and applications of AR/VR. Work with VR toolkits and
programming frameworks. Investigate real-world applications across multiple
industries.
Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Explain the fundamental concepts and evolution of Augmented and
Virtual Reality.
CO 1 L4
Students will describe the definitions, scope, history, and essential
components of AR/VR systems.
Identify and compare various AR/VR input and output devices.
CO 2 Students will differentiate between interaction devices such as L2
trackers, gesture interfaces, and display types.
Page 21 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
UNIT – I: Introduction to Augmented and Virtual Reality: Definition and Scope of Augmented
Reality, A Brief History of AR & VR, Examples and Applications of AR, Related Fields of AR,
Displays, Multimodal Displays, Audio Displays, Haptic, Tactile, and Tangible Displays, Olfactory and
Gustatory Displays, the five classic components of a VR system, Components of VR Systems, Three
I’s of Virtual Reality.
UNIT–II: Interfaces and Interaction Devices in VR and AR: Input devices: trackers, navigation,
gesture interfaces, three dimensional position trackers, navigation and manipulation interfaces and
gesture interfaces. Output devices: graphics displays, sound displays, haptic feedback. virtual reality
vs 3D Computer Graphics, Benefits of Virtual Reality.
UNIT–III: Human Factors and Virtual Space in AR/VR: Methodology and terminology, user
performance studies, VR health and safety issues, medical applications, military applications, robotics
applications, head-up displays, helmet-mounted sights and displays, smart glasses and augmenting
displays, visual space, object space.
UNIT–IV: VR Programming & Human Factors in VR: Toolkits and Scene Graphs, WorldTool
Kit, Java 3D, General Haptics Open Software Toolkit, Methodology and Terminology , User
Performance Studies, VR Health and Safety Issues, VR and Society.
UNIT–V: Emerging & Traditional VR Applications: Medical Applications of VR, Education, Arts,
and Entertainment, Military VR Applications, VR Applications in Manufacturing , Applications of VR
in Robotics, Information Visualization.
Textbooks:
1. Dieter Schmaltzier and Tobias Hollerer,”Augmented Reality: Principles and Practice”,
Addison-Wesley, 2006.
2. Burdea, G. C. and P. Coffet. ,”Virtual Reality Technology”, Second Edition. Wiley-IEEE Press,
2003/2006.
Page 22 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
References Books:
1. Sherman, William R. and Alan B. Craig, “Understanding Virtual Reality – Interface,
Application, and Design”,Morgan Kaufmann, 2002.
2. Fei GAO, “Design and Development of Virtual Reality Application System”, Tsinghua Press,
March 2012.
3. Alan Craig, William Sherman and Jeffrey Will, Developing Virtual Reality Applications, Fou
ndations of Effective Design, Morgan Kaufmann, 2009.
4. Guangran LIU, “Virtual Reality Technology”, Tsinghua Press, Jan. 2011.
5. International Journal of Virtual and Augmented Reality (IJVAR)
6. Springer, Virtual Reality.
7. George Mather, Foundations of Sensation and Perception:Psychology Press; 2 edition, 2009.
8. The VR Book: Human‐Centered Design for Virtual Reality, by Jason Jerald
9. Learning Virtual Reality by Tony Parisi, O’ Reilly
Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Explain key architectural features of modern processors and evaluate
CO 1 L3
their impact on computational performance.
Apply profiling and optimization techniques to improve the
CO 2 L4
performance of serial and parallel applications.
Design and implement parallel programs using MPI and OpenMP,
CO 3 and optimize them for scalability, communication overhead, and L5
computational efficiency.
Page 23 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Pipelining- Super Scalarity- SIMD- Memory Hierarchies Cache- mapping- prefetch- Multicore
processors- Muti threaded processors- Vector Processors- Design principles.
UNIT – II: Basic optimization techniques for serial code: scalar profiling- function and line
based runtime profiling- hardware performance counters- common sense optimizations-
simple measures, large impact- elimination of common sub expressions- avoiding branches-
using simd instruction sets- the role of compilers - general optimization options- inlining -
aliasing- computational accuracy- register optimizations- using compiler logs- c++
optimizations - temporaries- dynamic memory management- loop kernels and iterators data
access optimization: balance analysis and light speed estimates- storage order- case study:
jacobi algorithm and densematrix transpose.
Textbooks:
1. Georg Hager, Gerhard Wellein, ” Introduction to High Performance Computing for
Scientists and Engineers”, Chapman & Hall / CRC Computational Science series, 2011.
References Books:
1. Charles Severance, Kevin Dowd, High Performance Computing, O'Reilly Media, 2nd
Edition, 1998.
Page 24 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
2. Kai Hwang, Faye Alaye Briggs, Computer Architecture and Parallel Processing,
McGraw Hill, 1984.
Course Objectives:
The learning objectives of this course are to:
Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Engineering knowledge: Apply the knowledge of mathematics, science,
CO 1 engineering fundamentals, and an engineering specialization to the solution of L3
complex engineering problems.
Problem analysis: Identify, formulate, review research literature, and analyze
CO 2 complex engineering problems reaching substantiated conclusions using first L4
principles of mathematics, natural sciences, and engineering sciences.
Page 25 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
UNIT- I:
Introduction to Information Retrieval Systems: Definition of Information Retrieval System,
Objectives of Information Retrieval Systems, Functional Overview, Relationship to Database
Management Systems, Digital Libraries and Data Warehouses
UNIT -II:
Information Retrieval System Capabilities: Search Capabilities, Browse Capabilities,
Miscellaneous Capabilities
Cataloguing and Indexing: History and Objectives of Indexing, Indexing Process, Automatic
Indexing, Information Extraction
UNIT -III:
Data Structure: Introduction to Data Structure, Stemming Algorithms, Inverted File Structure,
N-Gram Data Structures, PAT Data Structure, Signature File Structure, Hypertext and XML
Data Structures, Hidden Markov Models
UNIT -IV:
Automatic Indexing: Classes of Automatic Indexing, Statistical Indexing, Natural Language,
Concept Indexing, Hypertext Linkages
Document and Term Clustering: Introduction to Clustering, Thesaurus Generation, Item
Clustering, Hierarchy of Clusters
UNIT -V:
User Search Techniques: Search Statements and Binding, Similarity Measures and Ranking,
Relevance Feedback, Selective Dissemination of Information Search, Weighted Searches of
Boolean Systems, Searching the INTERNET and Hypertext
Information Visualization: Introduction to Information Visualization, Cognition and
Perception, Information Visualization Technologies
UNIT -VI:
Page 26 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Text Search Algorithms: Introduction to Text Search Techniques, Software Text Search
Algorithms, Hardware Text Search Systems
Multimedia Information Retrieval: Spoken Language Audio Retrieval, Non-Speech Audio
Retrieval, Graph Retrieval, Imagery Retrieval, Video Retrieval
Textbooks:
1. Information Storage and Retrieval Systems – Theory and Implementation, Second
Edition, Gerald J. Kowalski, Mark T. Maybury, Springer
References Books:
1. Frakes, W.B., Ricardo Baeza-Yates: Information Retrieval Data Structures and
Algorithms, Prentice Hall, 1992.
2. Information Storage & Retrieval By Robert Korfhage – John Wiley & Sons.
Course Objectives:
The learning objectives of this course are to:
Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Engineering knowledge: Apply the knowledge of mathematics, science,
CO 1 engineering fundamentals, and an engineering specialization to the solution of L3
complex engineering problems.
Page 27 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Page 28 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Software Security Issues, Handling Program Input, Writing Safe Program Code, Interacting
with the Operating Systems and Other Programs, Handling Program Output.
1. William Stallings, Lawrie Brown, Computer Security: Principles and Practice, 3rd
edition,
2. Charles P. Pfleeger, Security in Computing, 4th Edition, Pearson, 2009.
SECURITY OF E-SYSTEMS
(Open Elective-IV)
Course Objectives:
The learning objectives of this course are to:
To introduce students to the fundamentals of E-Security, including security
frameworks, risk management, and cyber threat mitigation.
To explore multilevel security models, such as Bell-LaPadula and Chinese
Wall, for effective access control and data protection.
To analyse banking and payment system security, focusing on fraud
prevention, secure transactions, and smartcard-based banking.
To understand authentication and monitoring techniques, including tamper-
resistant technologies and treaty verification methods.
To examine biometric authentication and security printing, covering
fingerprint recognition, iris scans, and anti-counterfeiting methods.
To develop knowledge in secure system engineering, risk management
methodologies, and assurance techniques for digital security.
Page 29 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
CO 1 Demonstrate a comprehensive understanding of E-security principles, L3
cybercrime surveys, and security policies.
CO 2 Apply multilevel and multilateral security models for secure access control in L4
various applications.
CO 3 Implement secure banking, bookkeeping, and payment system architectures, L5
preventing financial cyber threats.
CO 4 Utilize monitoring tools and authentication technologies to enhance L6
cybersecurity across digital platforms.
CO 5 Assess and deploy biometric security measures, such as fingerprint L4
recognition, iris scans, and face recognition.
Page 30 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
References Books:
1. Anderson, Ross J. Security engineering: a guide to building dependable distributed systems.
John Wiley & Sons, 2010
2. Obaidat, Mohammad, and Noureddine Boudriga. Security of E-systems and Computer
Networks. Cambridge University Press, 2007
Page 31 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20
Page 32 of 32