{"id":22329,"date":"2020-07-12T02:51:50","date_gmt":"2020-07-12T02:51:50","guid":{"rendered":"https:\/\/www.inspirenignite.com\/vtu\/18ec821-network-security-ete-syllabus-for-be-8th-sem-2018-scheme-vtu-professional-elective-4\/"},"modified":"2020-07-12T02:51:50","modified_gmt":"2020-07-12T02:51:50","slug":"18ec821-network-security-ete-syllabus-for-be-8th-sem-2018-scheme-vtu-professional-elective-4","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/vtu\/18ec821-network-security-ete-syllabus-for-be-8th-sem-2018-scheme-vtu-professional-elective-4\/","title":{"rendered":"18EC821: Network Security ETE Syllabus for BE 8th Sem 2018 Scheme VTU (Professional Elective-4)"},"content":{"rendered":"<p align=\"justify\">Network Security detailed Syllabus for Electronics &amp; Telecommunication Engineering (ETE), 2018 scheme has been taken from the <a href=\"https:\/\/vtu.ac.in\/b-e-scheme-syllabus\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">VTUs<\/a> official website and presented for the VTU students. For Course Code, Subject Names, Teaching Department, Paper Setting Board, Theory Lectures, Tutorial, Practical\/Drawing, Duration in Hours, CIE Marks, Total Marks, Credits and other information, visit full semester subjects post given below. The Syllabus PDF files can also be downloaded from the official website of the university.<\/p>\n<p align=\"justify\">For all the other VTU ETE 8th Sem Syllabus for BE 2018 Scheme, visit <a href=\"..\/vtu-ete-8th-sem-syllabus-for-be-2018-scheme\">Electronics &amp; Telecommunication Engineering 8th Sem 2018 Scheme<\/a>. <\/p>\n<p align=\"justify\">For all the (Professional Elective-4) subjects refer to <a href=\"..\/vtu-ete-8th-sem-professional-elective-4-syllabus-for-be-2018-scheme\">Professional Elective-4 Scheme<\/a>. The detail syllabus for network security is as follows.  <\/p>\n<h4>Course Learning Objectives:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Module -1<\/h4>\n<p align=\"justify\">\nAttacks on Computers and Computer Security: Need for Security, Security Approaches, Principles of Security Types of Attacks. Chapter 1 of Text 2<\/p>\n<h4>Module -2<\/h4>\n<p align=\"justify\">\nTransport Level Security: Web Security Considerations, Secure Sockets Layer, Transport Layer Security, HTTPS, Secure Shell (SSH) Chapter 15 of Text 1<\/p>\n<h4>Module -3<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Module -4<\/h4>\n<p align=\"justify\">\nIntruders, Intrusion Detection. (Chapter20of Text1) MALICIOUS SOFTWARE: Viruses and Related Threats, Virus Countermeasures, Chapter 21 of Text 1<\/p>\n<h4>Module -5<\/h4>\n<p align=\"justify\">\nFirewalls: The Need for firewalls, Firewall Characteristics, Types of Firewalls, Firewall Biasing, Firewall location and configuration Chapter 22 of Text 1<\/p>\n<h4>Course Outcomes:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Question paper pattern:<\/h4>\n<p align=\"justify\">\n<ul>\n<li>Examination will be conducted for 100 marks with question paper containing 10 full questions, each of 20 marks.<\/li>\n<li>Each full question can have a maximum of 4 sub questions.<\/li>\n<li>There will be 2 full questions from each module covering all the topics of the module.<\/li>\n<li>Students will have to answer 5 full questions, selecting one full question from each module.<\/li>\n<\/ul>\n<h4>TEXT BOOKS:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Cryptography and Network Security Principles and Practice 1, Pearson EducationInc., William Stallings, 5th Edition, 2014, ISBN: 978-81-317- 6166-3.<\/li>\n<li>Cryptography and Network Security, Atul Kahate, TMH, 2003<\/li>\n<\/ol>\n<h4>REFERENCE BOOK:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.<\/p>\n<p align=\"justify\">For the detail Syllabus of all other subjects of BE (ETE) 8th Sem, visit <a href=\"..\/category\/ete+8th-sem\">Electronics &amp; Telecommunication Engineering 8th Sem<\/a> Subjects.<\/p>\n<p align=\"justify\">For all (CBSE &amp; Non-CBSC) BE\/B.Tech results, visit <a href=\"https:\/\/www.inspirenignite.com\/vtu\/vtu-b-e-b-tech-results\/\">VTU BE\/B.Tech all semester results<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network Security detailed Syllabus for Electronics &amp; Telecommunication Engineering (ETE), 2018 scheme has been taken from the VTUs official website and presented for the VTU students. For Course Code, Subject [&hellip;]<\/p>\n","protected":false},"author":2298,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[90],"tags":[],"class_list":["post-22329","post","type-post","status-publish","format-standard","hentry","category-ete"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/posts\/22329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/users\/2298"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/comments?post=22329"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/posts\/22329\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/media?parent=22329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/categories?post=22329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/tags?post=22329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}