Course Outcomes
7IT4-22.1 |
Apply the cryptographic algorithms for data communication. |
7IT4-22.2 |
Understand implementation of various security tools and algorithms. |
7IT4-22.3 |
Apply the Digital signature for secure data transmission and secure data storage. |
7IT4-22.4 |
Utilize the different open source tools for network security and analysis. |
7IT4-22.5 |
Demonstrate intrusion detection system using network security tool. |
Mapping of COs and POs
COs |
PO1 |
PO2 |
PO3 |
PO4 |
PO5 |
PO6 |
PO7 |
PO8 |
PO9 |
PO10 |
PO11 |
PO12 |
PSO1 |
PSO2 |
PSO3 |
CO1 |
2 |
3 |
2 |
2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
2 |
- |
- |
CO2 |
2 |
3 |
2 |
2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
3 |
- |
- |
CO3 |
2 |
3 |
2 |
2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
3 |
- |
- |
CO4 |
2 |
3 |
2 |
2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
3 |
- |
- |
CO5 |
2 |
3 |
2 |
3 |
3 |
- |
- |
- |
- |
- |
- |
3 |
3 |
- |
- |
Avg |
2 |
3 |
2 |
2.2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
2.8 |
- |
- |