{"id":29466,"date":"2021-08-29T14:40:42","date_gmt":"2021-08-29T14:40:42","guid":{"rendered":"https:\/\/www.inspirenignite.com\/jntuh\/it701pc-information-security-it-syllabus-for-btech-4th-year-1st-sem-r18-regulation-jntuh\/"},"modified":"2021-08-29T14:40:42","modified_gmt":"2021-08-29T14:40:42","slug":"it701pc-information-security-it-syllabus-for-btech-4th-year-1st-sem-r18-regulation-jntuh","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/jntuh\/it701pc-information-security-it-syllabus-for-btech-4th-year-1st-sem-r18-regulation-jntuh\/","title":{"rendered":"IT701PC: Information Security IT Syllabus for B.Tech 4th Year 1st Sem R18 Regulation JNTUH"},"content":{"rendered":"<p align=\"justify\">Information Security detailed syllabus for Information Technology (IT), R18 regulation has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/jntuh.ac.in\/syllabus\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">JNTUHs<\/a> official website and presented for the students of B.Tech Information Technology branch affiliated to JNTUH course structure. For Course Code, Course Titles, Theory Lectures, Tutorial, Practical\/Drawing, Credits, and other information do visit full semester subjects post given below. The syllabus PDF files can also be downloaded from the universities official website.<\/p>\n<p align=\"justify\">For all other IT 4th Year 1st Sem Syllabus for B.Tech R18 Regulation JNTUH, do visit <a class=\"rank-math-link\" href=\"..\/it-4th-year-1st-sem-syllabus-for-btech-r18-regulation-jntuh\">IT 4th Year 1st Sem Syllabus for B.Tech R18 Regulation JNTUH <\/a>subjects. The detailed syllabus for information security is as follows.  <\/p>\n<h4>Prerequisites:<\/h4>\n<p>  A Course on \u00ef\u00bf\u00bdComputer Networks and a course on Mathematics<\/p>\n<h4>Course Objective:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Course Outcome:<\/h4>\n<ul>\n<li>Demonstrate the knowledge of cryptography, network security concepts and applications.<\/li>\n<li>Ability to apply security principles in system design.<\/li>\n<\/ul>\n<h4>Unit &#8211; I<\/h4>\n<p>  Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services (Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and Mechanisms, A model for Internetwork security. Classical Encryption Techniques, DES, Strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of operation, Blowfish, Placement of Encryption Function, Traffic Confidentiality, key Distribution, Random Number Generation.<\/p>\n<h4>Unit &#8211; II<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Unit &#8211; III<\/h4>\n<p>  Digital Signatures, Authentication Protocols, Digital signature Standard, Authentication Applications, Kerberos, X.509 Directory Authentication Service. Email Security: Pretty Good Privacy (PGP) and S\/MIME.<\/p>\n<h4>Unit &#8211; IV<\/h4>\n<p>  IP Security: Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations and Key Management. Web Security: Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Electronic Transaction (SET).<\/p>\n<h4>Unit &#8211; V<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Text Books:<\/h4>\n<ol>\n<li>Cryptography and Network Security (principles and approaches) by William Stallings Pearson Education, 4th Edition.<\/li>\n<\/ol>\n<h4>Reference Books:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.<\/p>\n<p align=\"justify\">For detail syllabus of all other subjects of B.Tech 4th Year Information Technology, visit <a class=\"rank-math-link\" href=\"..\/category\/it+4th-year\">IT 4th Year syllabus<\/a> subjects.<\/p>\n<p align=\"justify\">For B.Tech IT branch results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-b-tech-results\/\">JNTUH B.Tech Information Technology all semester results<\/a> direct link.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security detailed syllabus for Information Technology (IT), R18 regulation has been taken from the JNTUHs official website and presented for the students of B.Tech Information Technology branch affiliated to [&hellip;]<\/p>\n","protected":false},"author":2344,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[123,114],"tags":[],"class_list":["post-29466","post","type-post","status-publish","format-standard","hentry","category-4th-year","category-it"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/29466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/users\/2344"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/comments?post=29466"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/29466\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/media?parent=29466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/categories?post=29466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/tags?post=29466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}