PE - II Subject Options With Syllabus
PE - II Subject Options With Syllabus
PE - II Subject Options With Syllabus
Summary
Course Status : Upcoming
Course Type : Elective
Duration : 12 weeks
Start Date : 24 Jan 2022
End Date : 15 Apr 2022
Exam Date : 23 Apr 2022 IST
Enrollment Ends : 31 Jan 2022
Course layout
Week 1: Introduction to IoT: Part I, Part II, Sensing, Actuation, Basics of Networking: Part-I
Week 2: Basics of Networking: Part-II, Part III, Part IV, Communication Protocols: Part I, Part II
Week 3: Communication Protocols: Part III, Part IV, Part V, Sensor Networks: Part I, Part II
Week 4: Sensor Networks: Part III, Part IV, Part V, Part VI, Machine-to-Machine Communications
Week 5: Interoperability in IoT, Introduction to Arduino Programming: Part I, Part II, Integration of
Sensors and Actuators with Arduino: Part I, Part II
Week 6: Introduction to Python programming, Introduction to Raspberry Pi, Implementation of IoT
with Raspberry Pi
Week 7: Implementation of IoT with Raspberry Pi (contd), Introduction to SDN, SDN for IoT
Week 8: SDN for IoT (contd), Data Handling and Analytics, Cloud Computing
Week 9: Cloud Computing(contd), Sensor-Cloud
Week 10: Fog Computing, Smart Cities and Smart Homes
Week 11: Connected Vehicles, Smart Grid, Industrial IoT
Week 12: Industrial IoT (contd), Case Study: Agriculture, Healthcare, Activity Monitoring
Link:
https://onlinecourses.nptel.ac.in/noc22_cs53/preview
Blockchain and its Applications
By Prof. Sandip Chakraborty, Prof. Shamik Sural | IIT Kharagpur
Summary
Course Status : Upcoming
Course Type : Elective
Duration : 12 weeks
Start Date : 24 Jan 2022
End Date : 15 Apr 2022
Exam Date : 23 Apr 2022 IST
Enrollment Ends : 31 Jan 2022
Course layout
Week 1: Introduction to Blockchain Technology and its Importance
Week 2: Basic Crypto Primitives I – Cryptographic Hash
Week 3: Basic Crypto Primitives II – Digital Signature
Week 4: Evolution of the Blockchain Technology
Week 5: Elements of a Blockchain
Week 6: Blockchain Consensus I – Permissionless Models
Week 7: Blockchain Consensus II – Permissioned Models
Week 8: Smart Contract Hands On I – Ethereum Smart Contracts (Permissionless Model)
Week 9: Smart Contract Hand On II – Hyperledger Fabric (Permissioned Model)
Week 10: Decentralized Identity Management
Week 11: Blockchain Interoperability
Week 12: Blockchain Applications
Link:
https://onlinecourses.nptel.ac.in/noc22_cs44/preview
Embedded Systems Design
By Prof. Anupam Basu | IIT Kharagpur
Summary
Course Status : Upcoming
Course Type : Core
Duration : 12 weeks
Start Date : 24 Jan 2022
End Date : 15 Apr 2022
Exam Date : 24 Apr 2022 IST
Enrollment Ends : 31 Jan 2022
Computer Science and Engineering
Category :
Credit Points : 3
Level : Undergraduate
Course layout
Link:
https://onlinecourses.nptel.ac.in/noc22_cs46/preview
An Introduction to Programming Through C++
By Prof. Abhiram G. Ranade | IIT Bombay
Summary
Credit Points : 3
Level : Undergraduate
Course layout
Week 1:Introduction to computers using graphics. Notions of program organization, control flow.
Introduction to a repeat macro statement and its use for drawing interesting pictures.Basics of
computer hardware and how numbers and other information are represented and processed on
computers.
Week 2:Basic data types. Variables. Assignment statement. Introduction to program design using
examples such as summing infinite series. Introduction to coordinate based graphics and
elementary animation. The repeat macro is used for looping.
Week 3-4: Statements of C++ for conditional execution and looping. Applications such as
computing mathematical functions, root finding.
Week 5:Functions. Parameter passing. Pointers and references. Recursion basics.
Week 6:Recursive algorithms and recursive drawings. Breaking larger programs into functions.
Passing functions as arguments to other functions.
Week 7:Arrays. Basic array processing strategies including passing arrays to functions. Pointers.
Applications illustrating use of arrays to store sets and sequences. Iterating over pairs of objects
from an array. Selection sort.
Week 8:Use of arrays to represent textual data. Multidimensional arrays. Command line arguments.
Binary search. Mergesort.
Week 9:Structures. Pointers with structures. Structure examples. Basics of classes: member
functions, constructors, operator overloading and access control.
Week 10:Dynamic memory allocation. Basic mechanisms and pitfalls. Design of a "String" class
that has automated memory management. Copy constructors and destructors. Introduction to the
standard library.
Week 11-12: Use of the standard library in designing programs. Design of medium size programs.
A miniature program for marks and ranks display. A program for gravitational simulation. A
program for designing and solving resistive circuits with a graphical user interface.
Summary
With increase in the usage of the Internet, there has been an exponential increase in the use of
online platforms, including social media (Facebook, Twitter, Koo, Tinder), e-commerce (Amazon,
Flipkart), gaming (Roblox), video streaming (Netflix, Amazon Prime, Twitch), and messaging
(WhatsApp, Signal, Telegram) services. These platforms have changed our way of living, and
information that we share with or consume from these platforms. However, widely used, there is a
lack of understanding of privacy on these online platforms. Popularity of study of Online privacy as
a topic of study is very recent. Online Privacy needs to be investigated, studied and characterized
from various perspectives (computational, cultural, psychological, theoretical, etc.). It is critical to
understand the threats and defend privacy through real-time and scalable systems. Since there are
no logical boundaries for the online space, it is important to study the problem from an international
perspective too.
PRE-REQUISITE :Any student from 5th semester UG B.Tech. should be able to understand the
content of the course.
INDUSTRY SUPPORT :TCS, Wipro, Microsoft to name a few, any company involved in online
business will be interested
Course layout
Week 1:Introduction; Various Privacy breaches, and its effects; Why Online privacy has become an
important topic?; Privacy cases / litigations, and outcomes
Week 2:Definition & forms of Privacy; Difference between data security & data privacy; Trade-off
between privacy and freedom of speech; Trade-off between privacy and utility; Contextual integrity
theory and applications
Week 3:Privacy Attitudes & Awareness
Week 4:Social Media Privacy
Week 5:Social Media Privacy
Week 6:Data anonymity:K-anonymity, L-diversity, T-closeness, Differential privacy
Week 7:Image & Location privacy; Ethics about studying online privacy:Institutional Review
Board / Ethics Committee; Conducting {User, Lab, and Online} Studies; Privacy from 3rd party
trackers & advertisers
Week 8:Image & Location privacy; Ethics about studying online privacy:Institutional Review
Board / Ethics Committee; Conducting {User, Lab, and Online} Studies; Privacy from 3rd party
trackers & advertisers
Week 9:User behaviour & Usable privacy; Privacy in National projects like Aadhaar, NATGRID;
Differential privacy in US census, Apple; PDP Bill / Srikrishna commission report /
GDPR:Implications
Week 10:User behaviour & Usable privacy; Privacy in National projects like Aadhaar, NATGRID;
Differential privacy in US census, Apple; PDP Bill / Srikrishna commission report /
GDPR:Implications
Week 11:Privacy policies:Length, readability, legality, cost of reading privacy polcies; Nutrition
labels of Privacy policies:How to make the policies simple and user friendly
Week 12:Privacy policies:Length, readability, legality, cost of reading privacy polcies; Nutrition
labels of Privacy policies:How to make the policies simple and user friendly
Link:
https://onlinecourses.nptel.ac.in/noc22_cs37/preview
Ethical Hacking
By Prof. Indranil Sen Gupta | IIT Kharagpur
Summary
Course Status : Upcoming
Course Type : Elective
Duration : 12 weeks
Start Date : 24 Jan 2022
End Date : 15 Apr 2022
Exam Date : 23 Apr 2022 IST
Enrollment Ends : 31 Jan 2022
Computer Science and Engineering
Category :
Credit Points : 3
Level : Undergraduate/Postgraduate
Course layout
Week 1: Introduction to ethical hacking. Fundamentals of computer networking. TCP/IP protocol
stack.
Week 2: IP addressing and routing. TCP and UDP. IP subnets.
Week 3: Routing protocols. IP version 6.
Week 4: Demonstration Session:: Vulnerability assessment: OpenVAS, Nessus, etc.
System hacking: password cracking, penetration testing, etc.
Week 5: Demonstration Session: Social engineering attacks.
Malware threats, penetration testing by creating backdoors.
Week 6: Introduction to cryptography, private-key encryption, public-key encryption.
Week 7: Cryptographic hash functions, digital signature and certificate, applications.
Week 8: Steganography, biometric authentication, network-based attacks, DNS and Email
security.
Week 9: Demonstration Session:: Sniffing: Wireshark, ARP poisoning, DNS poisoning.
Hacking wireless networks, Denial of service attacks.
Week 10: Elements of hardware security: side-channel attacks, physical inclinable functions,
hardware trojans.
Week 11: Demonstration Session:: Hacking web applications: vulnerability assessment, SQL
injection, cross-site scripting.
Week 12: Case studies: various attacks scenarios and their remedies.
Link:
https://onlinecourses.nptel.ac.in/noc22_cs13/preview