Co Po Mapping

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

SRINIVAS INSTITUTE OF TECHNOLOGY

(Accredited by NAAC)
Valachil, Mangaluru-574143
Department of Computer Science and Engineering
COURSE OUTCOMES
Semester: I/II
Course Title: Introduction to Cyber Security Course Code: BETCK105I/205I
CIE Marks: 50 SEE Marks: 50 Total Marks: 100
Credits: 03 L-T-P: 3-0-0 Exam Hours: 3
Course Outcomes: At the end of the course the student will be able to:
RBT
COs STATEMENTS
Level
CO 1 Explain the Cybercrime terminologies L2
Describe Cyber offenses and Botnets
CO 2 L2
Illustrate Tools and Methods used on Cybercrime
CO 3 L2

CO 4 Justify the need of computer forensics in cybercrimes L3

CO-PO/PSO MAPPING
CO PO1 PO1 PO1 PSO PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9
0 1 2 01 02
Comm
Cmplx

EnggS

Prjctm
DsgnS

Ethics
Sustbt

Team
Mdrn
Prbm

Indvl

ngmt
Knw

Anls

Tool

Life
Eng

Env

lrng
Prb
oln

cty

CO1 2 1 - - - - - - - - - - - -
CO2 2 1 1 - - - - - - - - - - -
CO3 2 1 1 1 - - - - - - - - - -
CO4 2 1 1 1 - - - 1 1 1 - 1 - -
Avg. 2 1 1 1 - - - 1 1 1 - 1 - -
Note: Correlation levels are entered as defined below:
1: Slight (low) 2: Moderate (Medium) 3: Substantial (High) If there is no correlation put “ –“

Course Instructor/s Course Coordinator ModuleCoordinator


(AN,RB,SJ,SS) (AN) (AR)

PAQIC HOD and


Coordinator PAQIC Chair
(PN)
SRINIVAS INSTITUTE OF TECHNOLOGY
(Accredited by NAAC)
Valachil, Mangaluru-574143
Department of Computer Science and Engineering

Course Title: Introduction to Cyber Security Course Code: BETCK105I/205I


JUSTIFICATIONS FOR CO-PO/PSO MAPPING LEVELS
CO1 - PO1 2 Students will be able to demonstrate the cyber terminologies
and its needs.
CO1-PO2 1 Students will be able to identify cyber terminologies
and its needs.
CO2-PO1 2 Students will be able to apply suitable techniques for Cyber
offenses and Botnets.
CO2-PO2 1 Students will be able to identify and analyze problems in Cyber
offenses and Botnets.
CO2-PO3 1 Students will be able to design solutions to problem related
Cyber offenses and Botnets.
CO3-PO1 2 Students will be able to apply knowledge of Tools and
Methods used on Cybercrime.
CO3-PO2 1 Students will be able to identify the problems related to Tools
and Methods used on Cybercrime.
CO3-PO3 1 Students will be able to analyze and develop the solutions for
identified problems related to Tools and Methods used on
Cybercrime.
CO3-PO4 1 Students will be able to resolve issues in Tools and
Methods used on Cybercrime.
CO4-PO1 2 Students will be able to apply the need of computer forensics
CO4-PO2 1 Students will be able to identify problems related to
computer forensics.
CO4-PO3 1 Students will be able to find solutions to problems related
tocomputer forensics.
CO4-PO4 1 Students will be able to design and develop solutions to
problems related to computer forensics
CO4-P08 1 Students will be able to follow rules and guidelines that
engineers adhere to as a moral obligation to their
Professional life.
CO4-PO9 1 Students will be able to take responsibility to solve the
Problems incomputer forensics as a team.
CO4-PO10 1 Students will be able to demonstrate the concept of computer
forensics.
CO4-PO12 1 Students will be able to recognize the need of computer
forensics and its functionality in their life.
*1: Slight (low) 2: Moderate (Medium) 3: Substantial (High)

Page 2 of 3
SRINIVAS INSTITUTE OF TECHNOLOGY
(Accredited by NAAC)
Valachil, Mangaluru-574143
Department of Computer Science and Engineering

Course Title: Introduction to Cyber Security Course Code: BETCK105I/205I

Minutes of the Meeting


Following course outcomes as per the syllabus framed by Visveswaraya Technological
University, as per the 2022 scheme.
COURSE OUTCOMES:

COs Statements
CO1 Explain the cybercrime terminologies
CO2 Describe Cyber offenses and Botnets
CO3 Illustrate Tools and Methods used on Cybercrime
CO4 Explain Phishing and Identity Theft
CO5 Justify the need of computer forensics

To suit the IQAC requirements of the institute, the course instructors, in due consultation
with the PAQIC coordinator, the HoD& other concerned, the course outcomes have been
restructured and the following outcomes have been framed with the relevant reasons:
CO Content Reasons
1 Explain the Cybercrime terminologies The course outcomes of
the university are
2 Describe Cyber offenses and Botnets
module based. The new
3 Illustrate Tools and Methods used on Cybercrime COs are formed in such
a way that each module
4 Justify the need of computer forensics in cybercrimes addresses all the COs.

Course Instructor/s Course Coordinator Module Coordinator


(AN,RB,SJ,SS) (AN) (AR)

PAQIC HOD and


Coordinator PAQIC Chair
(PN)

Page 3 of 3

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy