SlideShare a Scribd company logo
1 of 1
Download to read offline
Computer Architecture Course - MIPS programming, Dynamic pipelining (Tomasulo algorithm),
Cache-write/replacement policy,Cache coherence, Loop Unrolling, Dynamic Branch Prediction
Advanced Computer Design Course - System Verilog, Unidirectional and Bidirectional Bus
architectures, SRAM, SDRAM and flash memories
Computer Network Design - Network Topology and Queueing theory, OSI reference model
Network Programming and Applications - Development of software for building distributed
applications. Application Programming Interfaces: BSD Sockets, Winsock, Remote Procedure
Call. Raw Sockets, Multi-threading, Concurrency.
Network Security -
White Hat Hacking
Reconnaissance using HTTrack, Harvester, whois, Maltego.
Vulnerability Scanning using Nessus.
Exploitation and gaining access using John the ripper, Medusa and Armitage.
Arp Spoofing, Active Sniffing through Port Stealing, MITM against HTTPS and SSH
Web Hacking using Nikto, WebScarab, SQL Injection, Cross Site Scripting (XSS)
Cryptographic Techniques
Public Key Cryptography and RSA, Advanced Encryption Standard, Block Ciphers and Data
Encryption Standard
System Software - Program structure and execution, Concurrent programming, Virtual
Memory, System-Level I/O, Exceptional Control Flow, Linking
1

More Related Content

Similar to CourseDescription

Mobile application security and threat modeling
Mobile application security and threat modelingMobile application security and threat modeling
Mobile application security and threat modelingShantanu Mitra
 
The Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network SecurityThe Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network SecurityDeris Stiawan
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
 
NTA UGC NET JRF - 87 csa-new updated syllabus
NTA UGC NET JRF - 87 csa-new updated syllabusNTA UGC NET JRF - 87 csa-new updated syllabus
NTA UGC NET JRF - 87 csa-new updated syllabusUGC NET Astral Education
 
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM AttacksDefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM AttacksMichael Smith
 
Detection of webshells in compromised perimeter assets using ML algorithms
Detection of webshells in compromised perimeter assets using ML algorithms Detection of webshells in compromised perimeter assets using ML algorithms
Detection of webshells in compromised perimeter assets using ML algorithms Rod Soto
 
Knightsbridge Wireless COmmunication's brief profile
Knightsbridge Wireless COmmunication's  brief profileKnightsbridge Wireless COmmunication's  brief profile
Knightsbridge Wireless COmmunication's brief profileThomas Chanian
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryptionSachin Tripathi
 
Ieee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsIeee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsHarish PG
 
Web Based Security
Web Based SecurityWeb Based Security
Web Based SecurityJohn Wiley
 
Tyrone Wethers Skills & Abilities v1
Tyrone Wethers Skills & Abilities v1Tyrone Wethers Skills & Abilities v1
Tyrone Wethers Skills & Abilities v1Tyrone Wethers
 
Post XSS Exploitation : Advanced Attacks and Remedies
Post XSS Exploitation : Advanced Attacks and RemediesPost XSS Exploitation : Advanced Attacks and Remedies
Post XSS Exploitation : Advanced Attacks and RemediesAdwiteeya Agrawal
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionDavid Perkins
 

Similar to CourseDescription (20)

Course List
Course ListCourse List
Course List
 
Mobile application security and threat modeling
Mobile application security and threat modelingMobile application security and threat modeling
Mobile application security and threat modeling
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Modern Malware and Threats
Modern Malware and ThreatsModern Malware and Threats
Modern Malware and Threats
 
The Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network SecurityThe Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network Security
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
NTA UGC NET JRF - 87 csa-new updated syllabus
NTA UGC NET JRF - 87 csa-new updated syllabusNTA UGC NET JRF - 87 csa-new updated syllabus
NTA UGC NET JRF - 87 csa-new updated syllabus
 
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM AttacksDefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM Attacks
 
Nagabhushana Rao P
Nagabhushana Rao PNagabhushana Rao P
Nagabhushana Rao P
 
Detection of webshells in compromised perimeter assets using ML algorithms
Detection of webshells in compromised perimeter assets using ML algorithms Detection of webshells in compromised perimeter assets using ML algorithms
Detection of webshells in compromised perimeter assets using ML algorithms
 
Knightsbridge Wireless COmmunication's brief profile
Knightsbridge Wireless COmmunication's  brief profileKnightsbridge Wireless COmmunication's  brief profile
Knightsbridge Wireless COmmunication's brief profile
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryption
 
Ieee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsIeee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projects
 
Nethemba profil
Nethemba profilNethemba profil
Nethemba profil
 
Nethemba profil
Nethemba profilNethemba profil
Nethemba profil
 
Web Based Security
Web Based SecurityWeb Based Security
Web Based Security
 
Tyrone Wethers Skills & Abilities v1
Tyrone Wethers Skills & Abilities v1Tyrone Wethers Skills & Abilities v1
Tyrone Wethers Skills & Abilities v1
 
Post XSS Exploitation : Advanced Attacks and Remedies
Post XSS Exploitation : Advanced Attacks and RemediesPost XSS Exploitation : Advanced Attacks and Remedies
Post XSS Exploitation : Advanced Attacks and Remedies
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
 

CourseDescription

  • 1. Computer Architecture Course - MIPS programming, Dynamic pipelining (Tomasulo algorithm), Cache-write/replacement policy,Cache coherence, Loop Unrolling, Dynamic Branch Prediction Advanced Computer Design Course - System Verilog, Unidirectional and Bidirectional Bus architectures, SRAM, SDRAM and flash memories Computer Network Design - Network Topology and Queueing theory, OSI reference model Network Programming and Applications - Development of software for building distributed applications. Application Programming Interfaces: BSD Sockets, Winsock, Remote Procedure Call. Raw Sockets, Multi-threading, Concurrency. Network Security - White Hat Hacking Reconnaissance using HTTrack, Harvester, whois, Maltego. Vulnerability Scanning using Nessus. Exploitation and gaining access using John the ripper, Medusa and Armitage. Arp Spoofing, Active Sniffing through Port Stealing, MITM against HTTPS and SSH Web Hacking using Nikto, WebScarab, SQL Injection, Cross Site Scripting (XSS) Cryptographic Techniques Public Key Cryptography and RSA, Advanced Encryption Standard, Block Ciphers and Data Encryption Standard System Software - Program structure and execution, Concurrent programming, Virtual Memory, System-Level I/O, Exceptional Control Flow, Linking 1