Course Outcomes
7IT4-22.1 |
Apply the cryptographic algorithms for data communication. |
7IT4-22.2 | Understand implementation of various security tools and algorithms. |
7IT4-22.3 | Apply the Digital signature for secure data transmission and secure data storage. |
7IT4-22.4 | Utilize the different open source tools for network security and analysis. |
7IT4-22.5 | Demonstrate intrusion detection system using network security tool. |
Mapping of COs and POs
COs | PO1 | PO2 | PO3 | PO4 | PO5 | PO6 | PO7 | PO8 | PO9 | PO10 | PO11 | PO12 | PSO1 | PSO2 | PSO3 |
CO1 |
2 |
3 | 2 | 2 | 3 | - | - | - | - | - | - | - | 3 | 2 | - |
CO2 | 2 | 3 | 2 | 2 | 3 | - | - | - | - | - | - | - | 3 | 3 | - |
CO3 | 2 | 3 | 2 | 2 | 3 | - | - | - | - | - | - | - | 3 | 3 | - |
CO4 | 2 | 3 | 2 | 2 | 3 | - | - | - | - | - | - | - | 3 | 3 | - |
CO5 | 2 | 3 | 2 | 3 | 3 | - | - | - | - | - | - | - | 3 | 3 | - |
Avg | 2 | 3 | 2 | 2 | 3 | - | - | - | - | - | - | - | 3 | 3 | 3 |