introduction hybrid cloud private cloud public cloud service engineering grid computing backdoors. types of hackers hackers and crackers cyber-attacks and vulnerabilities malware threats sniffing gaining access escalating privileges executing applications hiding files covering tracks worms trojans social engineering targets and defence strategies preventing insider threats insider attack packet switching software development with services. monitors number system central processing unit (cpu) memory information assurance threats and attack vectors ethical hacking concepts and scopes memory dedicated private cloud shared private cloud community cloud viruses evolution of cloud computing applications cloud computing business models around cloud cloud services: benefits and challenges of cloud c types of cloud cloud computing definition restful services classifications of cloud major players in cloud computing issues in cloud - eucalyptus - nimbus - open nebul cloudsim. (topics: cluster computing grid computing versus cloud computing key characteristics of cloud computing. cloud mode and dynamic private cloud.) checksum is an error detection code hamming code is an error detection & correction co multiple access: random access- aloha-csma-csma/cd differential manchester coding. perspectives on co encoding (nrz nrzi manchester 4b/5b) framing error detection data link layer error detection and correction techniques multiple lan addresses and arp & rarp ppp: the point-to-poi unicast routing protocols rip ospf bgp multicast routing protocols : mospf dvmrp. verification and validation: planning verification software inspections automated static analysis verification and formal methods. software testing: component testing test case design test automation. software measurement: size-orient function-oriented metrics cocomo model software cost estimation: software pr estimation techniques project duration and staffing service oriented software engineering: services as service-oriented architectures custom coding go-live erp and related technologies business processing r data warehousing data mining on-line analytical processing(olap) supply chain management (scm) customer relationship management(crm) electronic data interchange (edi) wireless networks & cellular wireless networks wir wireless network architecture classification of wi wpan wlan wman wwan. ieee 802.11 ieee 802.16 bluetooth – standards architecture and services principles of cellular n generation of cellular networks – 1g 2g 2.5g 3g and 4g. threat modelling enterprise information security architecture vulnerability assessment and penetration testing types of social engineering introduction to cyber forensics computer equipment and associated storage polling token passing. wired &wireless lans media access c controlled access channelization: fdma tdma cdma. wired lans – ethernet protocol standard ethernet fast ethernet gigabit ethernet 10 gigabit ethernet wireless lans: introduction ieee 802.11 architecture mac sublayer addressing mechanism physical layer bluetooth: architecture-bluetooth l cellular telephony satellite networks. introduction to enterprise resource planning (erp value chain framework organizational functional units evolution of erp systems role of erp in organization three-tier architecture of erp system erp implementation lifecycle project preparation initial costing requirement engineering erp solution selection technical planning change management and training plan implementation and deployment planning configuration processor speed instruction set the instruction format communication between various units of a computer classification of computer generation of computer introduction to computer system full adder half adder 4. multiplexer & demultiplexer 1.combinational circuit 2. sequential circuit batcher banyan switch banyan switch multistage switch cross bar switch time space time division switch scanners digital camera speech recognition pointing devices keyboard magneto optical disk. optical disk magnetic disk magnetic tape classification of secondary storage devices types of rom. introduction read only memory (rom) types of ram random access memory (ram) memory hierarchy multiprocessor systems time division switch topology & it's various classifications transmission media & its classification comparison between osi & tcp/ip tcp/ip model description of layers of osl model osi model transmission modes types of communication maximum data rate signal classification types of servers signal parameters transmission impairments network classification by their component role network benefits components of computer network space division switch nic gateway brouter bridge repeater router hub hybrid topology tree topology ring topology star topology bus topology mesh topology un-guided media or wireless guided media 0r wired media context models requirements validations. system models: models an requirements elicitation and analysis safety and security of software systems. requireme availability and reliability a simple safety critical system people and computers. critical system: types of cr components of system such 9 as organization systems engineering emergent system properties socio-technical system: essential characteristics component software processes. software development documentation of the software requirements. softwa system requirements user requirements maintenance etc. software requirements: functional manchester encoding ethernet cabling message switching switching: circuit switching time division multiplexing wavelength division multiplexing brief introduction about bluetooth and wimax. mult performance. the physical layer: wireless transmis implementing network software network architecture requirements applications structured methods. object models data models behavioural models testing classification of programming languages evolution of programming languages and pseudo code (p code). introduction flowchart algorithm developing a program terminals. projectors audio output soft copy output devices computer output microfilm (com) plotters printers hard copy output devices classification of output optical scanners. introduction coding software design requirements analysis introduction: what is software engineering? softwa functions of an operating system types of operating system evolution of operating system operating system software terminology. introduction application software system software software categories relationship between software and hardware selection of a programming language. introduction features of a good programming language generations of programming languages definition & applications of computer network comp multiprocessor systems. multicomputer system universal gates (nand nor) ex-or ex-nor basic gates (and or not) sensors signals and systems sensor classification units of measurements sensor characteristics electric charges fields and potentials capacitance magnetism induction resistance piezoelectric effect hall effect temperature and thermal properties of material heat transfer light dynamic models of sensor elements topics: interface electronic circuits input characteristics of interface circuits amplifiers excitation circuits analog to digital converters direct digitization and processing bridge circuits data transmission batteries for low power sensors icmpv6 protocol transition from ipv4 to ipv6. introduction to the transport layer protocols (simple protocol stop-and-wait protocol go-back-n protocol selective repeat protocol bidirectional protocols) transport layer services user datagram protocol standard client / server protocols: worldwide- web ftp electronic mail telnet secured shell domain name system. application layer: dns: name s topics: introduction characteristics of computers block diagram of computer types of computers an types of memory (primary and secondary) i/o dev operating system and services topics 1 dos – hist files and directories 2 internal and external com viz. input storage processing output and control features of windows features of ms office communication between various units of a computer the instruction format instruction set building cloud computing envir infrastructure and system deve computing platform parallel and distributed compu hardware architecture of paral conversion bcd binary addition decimal to binary decimal to octal cluster computing grid computing v/s cloud compu key characteristics of cloud c cloud models: benefits of cloud models dynamic private cloud r program r data types basic of r programming languag r constant concatenation rounding off practice questions complex numbers integers reserved words how to run r data frames lists matrices arrays classes processor speed occupancy and motion detectors strain and tactile sensors pressure temperature sensors position displacement sensor level sensor force sensor velocity acceleration sensor data link layer design issues error detection and correction elementary data link protocols unrestricted simplex protocol simplex stop-and-wait protocol simplex protocol for a noisy c data link protocol: hdlc higher level data link control internetworking and advanced i switching and bridging routing routing among mobile devices basic internetworking (ip) the vision of cloud computing the cloud computing reference cloud reference models characteristics of cloud compu advantages of cloud computing disadvantages of cloud computi deadlock deadlock prevention avoidance detection and recovery system modeling memory management strategies swapping memory allocation segmentation virtual memory management demand paging page replacement file management file attributes access methods directory and disk structure file system mounting automatic vs. manual mounting file sharing directory implementation file allocation methods i/o systems i/o hardware application i/o lnterface direct memory access (dma) polling v/s interrupts i/o spooling and device reservation transforming l/o requests to hardware operations what is computer functionalities of a computer computer components hardware media role of forensics investigator forensics investigation process collecting network based evidence writing computer forensics reports auditing plan an audit against a set of audit criteria information security management system management. introduction to iso 27001:2013 architectural design: architectural design decisio system organization modular decomposition styles control styles reference architectures. uml model. user interface design issues the ui design process user analysis user interface prototyping interface evaluation. project management software management activities project planning risk management. quality management: process and p quality assurance and standards quality planning quality control software measurement and metrics. process synchronization critical section problem semaphores types of semaphores classical problems of synchronization synchronization framework.) types of cloud services: software as a service platform as a service – infrastructure as a servic database as a service monitoring as a service communication as services. service providers- goog amazon ec2 microsoft azure sales force threat modelling enterprise information security a vulnerability assessment and penetration testing t security in the cloud security overview cloud security challenges and risks. software-as-a security monitoring security architecture design data security application security virtual machine security identity management and access control autonomic security. introduction to the network layer: network layer s network layer performance ipv4 addressing forwarding of ip packets internet protocol icmpv4 mobile ip unicast routing: introduction routing algorithms unicast routing protocols. next generation ip: ipv ipv6 protocol virtualization in cloud comput atomic transaction software input devices output devices cpu (central processing unit) unit of measurements classification of computers computer languages generation of computers data information and knowledge characteristics of computer computer viruses process improvement: process and product quality process classification process measurement process analysis and modeling process change the cmmi process improvement framework. service or virtualization: basics of virtualization types of virtualizations implementation levels of virtualization virtualization structures tools and mechanisms virtualization of cpu i/o devices virtual clusters and resource management virtualization for data-center automation introduction to mapreduce gfs hdfs hadoop
See more