Course Outcome
CO 1: Apply different security techniques to achieve core security goals and implement appropriate security mechanisms.
CO 2: Apply various symmetric and asymmetric encryption/decryption algorithms to ensure data confidentiality.
CO 3: Apply integrity and authentication mechanisms such as digital signatures and message digests, and relate them to real-world applications.
CO 4: Apply web, network, and system security techniques to make systems resilient against attacks and vulnerabilities.
Course Content (Download )
Teaching and Examination Scheme
Resource Person