Announcement List

Specialization in Computer Networks and Systems Security

Compulsory Courses

  1. CS-506 Advanced Computer Systems Architecture

    CS-506 Advanced Computer Systems Architecture

    Comparative studies of CPU, Memory I/O systems and overall systems architecture companion of instruction sets advanced arithmetic units, pipeline and parallel architecture segmentation, paging and replacement algorithms, Microprogramming, Different I/O performance evaluation, factors for consideration, Cost/complexity measures.

  2. CS-531 Advanced Operating Systems

    CS-531 Advanced Operating Systems

    Concurrency, Interprocess Synchronization, Types of Schedulers, Scheduling Algorithms, Exclusion: Interprocess Synchronization Algorithms, Review of Semaphore, critical regions conditional critical regions event queue. Interprocess Communication Monitors and Messages, Interprocess Communication and Synchronization with Messages, Deadlocks, Analysis and Design issues for prevention of Deadlocks, Advanced Memory Management Concepts: Virtual Memory Management, Working Set Theory, Multiprocessor Systems: Multiprocessor OS functions and requirements, OS design and implementation issues, Multiprocessor Synchronization, Distributed Operating Systems: Algorithms for distributed processing, Handling of failures, Models of Distributed Systems.

  3. CS-539 Computer Security

    CS-539 Computer Security

    Software Security: Non malicious program flaws, Buffer overflows, Return-to-libc, String formatting, Race conditions, Environment variables. Malicious program flaws (viruses, worms, trojan horses)

    Web Security: Cross site scripting, SQL injection, LFI (Local File Injection), Web Tracking.

    Cryptography: Secret Key Encryption, Public Key Encryption and PKI infrastructure, Hash functions.

    System Security: Role based access control, File system security.

    Network security: Authentication, Authorization & Accounting, Types of threats: Impersonation attacks, DOS (Denial of services) & DDOS, Internetwork Access: Email security, PGP & S/MIME, Infrastructure Topologies: Intranet & DMZ, Network Security Controls, Filters & Firewalls

  4. CS-540 Computer Network Protocols

    CS-540 Computer Network Protocols

    Fundamentals of Protocol design, Protocol data unit and service data unit formating and encoding.

    Application Layer: Principles of network applications, The Web and HTTP, Domain Name Service, File transfer and FTP Electronic Mail, Peer-to-peer applications, Socket programming.

    Transport Layer: Transport layer services – Connectionless transport, UDP, Connection-oriented transport: TCP – Reliable data transfer, Congestion and flow control .Network Layer: Internet Protocol (IP) – Routing Protocols.

    Multimedia Networking: Multimedia networking applications, Streaming stored video, Voice-over-IP.

    Data Link layer protocols: Asynchronous and synchronous protocols, bit oriented protocols, link access procedures, Local Area Networks, PPP, Multiplexing, Switching.

  5. CS-541 Stochastic Processes for Computer Networks

    CS-541 Stochastic Processes for Computer Networks

    Introduction to Stochastic Processes. Poisson Processes, Renewal Theory. Markov Chain and Processes, Chebychev, and Chernov inequalities; various notions of convergence of random variable sequences; laws of large numbers; central limit theorem; and large deviation theory. Basic notions of estimation and properties of estimators, Parameter Estimation, Maximum Likelihood Estimation, Confidence Intervals, unbiased and minimum variance estimation, CRLB (Cramer Rao Lower Bound), sufficient statistics, consistency of estimators. Stochastic processes in computer communication networks. Modelling Internet traffic arrival processes, Hurst parameter, Self-similarity, Long range dependence, Burstiness and memory in computer network traffic.

Elective Courses

  1. CS-503 Queuing Theory for Performance Modelling of Computer Systems

    CS-503 Queuing Theory for Performance Modelling of Computer Systems

    Review of Markov chains and simple Queuing Theory, Advanced Queuing Theory, approximations open and closed Network of Queues, Computation techniques, Priority Queuing scheduling.

  2. CS-504 Design and Analysis of Computer Communication Networks

    CS-504 Design and Analysis of Computer Communication Networks

    Applications of Stochastic modelling, Optimization techniques to communication Networks design and analysis data link control. Performance includes multi-access channels routing and flow control.

  3. CS-514 Performance Evaluation of Computer Systems

    CS-514 Performance Evaluation of Computer Systems

    Performance modelling, Measurement and evaluation techniques, C.P.U. scheduling descriptions, Queuing Network models of computer systems, Aggregation and decomposition Memory hierarchies interface analysis, Reliability models.

  4. CS-517 Digital Communication Theory

    CS-517 Digital Communication Theory

    RF subsystem design, RF Channel characteristics, Carrier and sub-carrier signal processing. Digital signal formats: Binary and M-array, Coherent and non-coherent noise analysis, Probability of error performance, Signal design and spectral analysis, Channel capacity.

  5. CS-573 Network Security
  6. CS-523 Routing and Switching

    CS-523 Routing and Switching

    ARP, Proxy ARP, IP sub-netting, VLSM (Variable Length Subnet Mask), Cisco Router IOS and CLI basics, RIP, RIP2, IGRP, EIGRP, Frame relay configuration on Cisco routers, Hub and spoke frame relay, Standard and extended access list and Traffic management.

  7. CS-524 Distributed Computer Systems

    CS-524 Distributed Computer Systems

    Distributed Models, Networking and Internetworking, Inter-process communication, Distributed objects and remote Invocation, Remote procedure call, Security, Cryptographic Algorithms, Digital Signatures, Coordination and Agreement, Distributed Mutual Exclusion, Election Algorithms, Distributed Transactions and Concurrency Control, Replication Systems Model, Fault-tolerant systems, Mobile and Ubiquitous Computing, Association Sensing and context-awareness, security and privacy, Distributed shared memory: design and implementation issues.

  8. CS-538 Information Theory and Cryptography

    CS-538 Information Theory and Cryptography

    Source Coding: Theorem. Huffman Coding Arithmetic Coding, Source Models and Adoptive Source Coding Channel Models: Discrete Memoryless Channel Model, Markov Processes, Source with memory, Markov Chains and Data Processing, Data Translation Codes, Channel Coding Techniques, Linear Block Error Correcting Codes, Cyclic Codes, Convolutional Codes, The Viterbi Algorithm, Cryptography: Crypto Systems, Language Entropy, Computational Security Diffusion and Confusion, Product Cipher Systems, Public Key Crypto System,. Shannon’s Coding Theorems: Random Coding Shannon’s Second Theorem, Shannon-Fano Coding, Shannon’s Noiseless Coding Theorem.

  9. CS-542 Cyber Security

    CS-542 Cyber Security

    The Security Environment, Principles of Cybersecurity, Cybersecurity Management Concepts, Information security roles and positions, Strategy and Strategic Planning, The information security lifecycle, Security Plans and Policies, Laws and Regulatory Requirements, Security Standards and Controls, Risk Management, Security Metrics and Key Performance Indicators (KPIs), Physical and environmental threats, The future of cybersecurity, Key future uncertainties and possible future scenarios, Cybercrimes: their methodologies and mitigation. Cyber forensics and tracing.

  10. CS-543 Internet Security

    CS-543 Internet Security

    Introduction (vulnerabilities, examples for known attacks),Brief introduction to cryptography: cryptographic primitives (symmetric and asymmetric key ciphers, oneway hash functions, message authentication codes, digital signatures),key establishment protocols, public-key certification structures ,E-mail security: PGP and S/MIME, Secure remote access: SSH, Web security: SSL/TLS,Network layer security: IPSec, ISAKMP/Oakley,Ecommerce security: SET and other e-cash and micropayment schemes, Privacy protection and anonymity services (Onion routing and Crowds), Firewalls and intrusion detection systems, Security in wireless networks.

  11. CS-544 Vulnerability Assessment and Ethical Hacking

    CS-544 Vulnerability Assessment and Ethical Hacking

    Definitions, Concepts, and Phases of Vulnerability Assessments and Ethical Hacking, Legal Statutes and Issues of Vulnerability Research and Ethical Hacking, Exploring the way of thinking for an industrial spy, a competitor, or a hacker, Network Surveying, Port Scanning, System Identification / OS Fingerprinting, Vulnerability assessment and ethical hacking methodologies, technologies, and techniques and from a defensive and offensive perspective, Examining an organization for weaknesses and exploiting vulnerabilities remotely, Vulnerability Research and Verification, Service Identification, Internet Application Testing, Implementing appropriate countermeasures to thwart malicious hacking, Employing tools & exploits; Backtrack, Core Impact, DDOS, Sniffers, Spoofing, Session Hijacking, Buffer Overflows, Hacking Web Servers and Applications, Google Hacking, Network and host monitoring and traffic analysis, Configuring and monitoring intrusion detection systems and honeypots and honey nets, Reading, interpreting, and analyzing network traffic and log files, Foot printing, scanning, enumeration and escalation.

  12. CS-545 Cloud Computing and Security

    CS-545 Cloud Computing and Security

    Introduction to cloud computing, Cloud Computing services (IaaS, PaaS, SaaS), Cloud deployment and usage models, Storage in cloud, Cloud and big data, Resource Allocation in Cloud, Service Level Agreements in Cloud, Network Awareness in Cloud computing, Risks in Cloud, Trust factors in cloud, Security in cloud, Homomorphic encryption, Incident response in cloud, cloud computing for critical infrastructure, end-to-end security in cloud.

  13. CS-546 Carrier and ISP Networks

    CS-546 Carrier and ISP Networks

    Backbone computer networks (MPLS, ATM, Frame Relay), Private Peering, Public Peering, Transitivity in Peering, Load Balancing in core networks, Service Level Agreements, Autonomous Systems; Border Gateway Protocol, Capacity planning, Internet Exchange Points, Traffic and Network Engineering, Access Networks (WiMax, 4G,LTE), Evolved Packet Core, Wireless hotspots, Congestion control in access networks, Performance issues in Access networks.

  14. CS-572 Internet Traffic Engineering & Management

    CS-572 Internet Traffic Engineering & Management

  15. CS-600 Independent Study Project
  16. CS-601 Dissertation

Non-Credit Courses

  1. CS-403 Introduction to Computer Networks

    CS-403 Introduction to Computer Networks

    Basic Network Architecture, Layered Protocols, Network Service Interface, Local Network, Long Haul Networks, Internal Protocols Addressing, Routing, Flow control, Higher Level Protocols.

  2. CS-404 Computer Systems Architecture and Organization

    CS-404 Computer Systems Architecture and Organization

    Machine organization at Register transfer level, Data and Control paths of CPU, Micro-programmed and HW implementation of Control unit, Timing Fundamental Arithmetic units, I/O organization, Virtual Memory.

  3. CS-407 Computing Essentials

    CS-407 Computing Essentials

    Data Structures: Introduction and classification of Data Structures; Complexity Analysis of Algorithms; Arrays: Searching and Sorting Algorithms. Stacks; Queues; Linked Lists; Binary Trees; Graphs.

    Databases: Basic Definitions; Benefits of Database Approach; Database System Architecture; Entity-Relationship Model; Relational Model and Relational Algebra; Functional Dependencies and Normal Forms; Introduction to SQL programming; Indexing in databases.

    Operating Systems: Objectives and Functions; Process Management: States, Description and Control; Process vs Threads; Scheduling Algorithms; File Management.

    Software Engineering: Basic Definitions; Software Processes; Software Requirements & their Specification; System Models.