{"id":33072,"date":"2021-05-21T08:09:16","date_gmt":"2021-05-21T08:09:16","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/it5711-mobile-and-security-laboratory-syllabus-for-it-7th-sem-2019-regulation-anna-university\/"},"modified":"2021-05-21T08:09:16","modified_gmt":"2021-05-21T08:09:16","slug":"it5711-mobile-and-security-laboratory-syllabus-for-it-7th-sem-2019-regulation-anna-university","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/it5711-mobile-and-security-laboratory-syllabus-for-it-7th-sem-2019-regulation-anna-university\/","title":{"rendered":"IT5711: Mobile and Security Laboratory Syllabus for IT 7th Sem 2019 Regulation Anna University"},"content":{"rendered":"<p align=\"justify\">Mobile and Security Laboratory detailed syllabus for Information Technology (IT) for 2019 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna Universities<\/a> official website and presented for the IT students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Information Technology 7th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/information-technology-it-syllabus-for-7th-sem-2019-regulation-anna-university\">IT 7th Sem 2019 regulation scheme<\/a>. The detailed syllabus of mobile and security laboratory is as follows. <\/p>\n<p>  <title>Mobile and Security Laboratory<\/title><\/p>\n<h4>Course Objective:<\/h4>\n<p align=\"justify\">\n<ul>\n<li>To do several hands-on exercises to reinforce the students&#8221; knowledge and understanding of the various security aspects.<\/li>\n<li>To explore the sequence of cryptographic algorithms by implementing using a programming language.<\/li>\n<li>To understand vulnerabilities and security flaws in the various applications.<\/li>\n<li>To develop simple and location specific applications in android environment.<\/li>\n<li>To analyse the performance of mobile networks using Network simulator.<\/li>\n<\/ul>\n<h4>List of Exercises:<\/h4>\n<p align=\"justify\">\n  The following exercises are based on the cryptographic algorithms. They can be implemented using any Programming Language.<\/p>\n<ol>\n<li>Write a program to perform encryption and decryption using the following algorithms:\n<ol type=\"a\">\n<li>Caesar cipher<\/li>\n<li>Affine Cipher<\/li>\n<li>Hill Cipher<\/li>\n<li>Transposition Cipher.<\/li>\n<\/ol>\n<\/li>\n<li>Perform cryptographic attack on the cipher-text generated using any of the algorithms implemented in exercise 1.<\/li>\n<li>Write a program to demonstrate symmetric key encryption process using DES and AES algorithm.<\/li>\n<li>Write a program to implement RSA algorithm and demonstrate the key generation and encryption process.<\/li>\n<li>Write a program to generate message digest for the given message using the SHA\/MD5 algorithm and verify the integrity of message.<\/li>\n<li>Write a program to sign and verify a document using DSA algorithm.<\/li>\n<li>Perform Penetration testing on a web application to gather information about the system, then initiate XSS and SQL injection attacks using tools like kali Linux.<\/li>\n<li>Develop a Mobile application for event handling and push notification in Android.<\/li>\n<li>Create animations and graphical primitives in Android environment.<\/li>\n<li>Develop a Location based services such as tracking, geofencing, and activity recognition using Google play services.<\/li>\n<li>Develop a Mobile application for recognizing and authorizing using camera and sensors.<\/li>\n<li>Performance analysis of various node deployment strategies in mobile environment using network simulators such as NS2\/NS3\/OPNET\/GloMoSim\/NetSim.<\/li>\n<\/ol>\n<h4>Course Outcome:<\/h4>\n<p align=\"justify\">\n  On completion of the course, the students will be able to:<\/p>\n<ol>\n<li>Attain knowledge to program both symmetric and asymmetric key cryptography.<\/li>\n<li>Implement specific encryption\/decryption algorithms.<\/li>\n<li>Analyse the vulnerabilities in any application using penetration testing.<\/li>\n<li>Develop basic mobile applications in Android environment.<\/li>\n<li>Use both hardware and sensors to develop applications.<\/li>\n<li>Explore the performance analysis of mobile network using network simulator.<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all other subjects of Information Technology, 2019 regulation curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/it+7th-sem\">IT 7th Sem subject syllabuses for 2019 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Information Technology results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University IT all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile and Security Laboratory detailed syllabus for Information Technology (IT) for 2019 regulation curriculum has been taken from the Anna Universities official website and presented for the IT students. For [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[50,72],"tags":[],"class_list":["post-33072","post","type-post","status-publish","format-standard","hentry","category-7th-sem","category-it"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/33072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=33072"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/33072\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=33072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=33072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=33072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}