NEP Oriented BCA Curriculum
Course: Network Security
Course Type: Departmental Core Course Code: BCADST506 –B
Credits:2 L-T-P: 2-0-0
Course Title: Network Security
Evaluation Scheme
Semester V Teaching Scheme
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course Discipline SC
Category (Major)
NA
Course BCADST506 –B 2 2 10 15 25 NA -
Code .
Teaching
Offline 50
Mode
Duration of 2 Total
ESE 2 .30 Hrs. 50
Course Outcomes: On successful completion of the course the learner will be able to:
CO# Course Outcomes
Understand the importance and principles of effective business communication in
1 professional settings.
2 Write clear, concise, and professional business documents, including emails, memos, and
reports
3 Analyze the role of communication in fostering effective teamwork and leadership
4 Introducing network trafficking analysis to know about different trafficking algorithm.
Unit Content Contact
No. Hr.
Introduction to Networking: Definition, importance, and applications of computer
networks. Types of networks: LAN, WAN, MAN, and the Internet .Network 8
Components:Overview of hardware (routers, switches, access points) and
1 software.Network topologies: star, bus, mesh, and hybrid.Networking Protocols:OSI and
TCP/IP models: layers and their functions .Protocols: HTTP/HTTPS, FTP, SMTP, and
DNS.Data Transmission:Basics of wired and wireless transmission.Basics of wired and
wireless transmission.
Introduction to Network Security:Goals of network security: confidentiality, integrity, 8
and availability.Common threats: eavesdropping, malware, and phishing.Authentication
2 and Authorization:Password policies and best practices.Role-based access control
(RBAC).Security Policies:Importance of organizational security policies. Risk
management and mitigation.
Firewall Basics:Types and functions of firewalls. Setting up basic firewall rules. Intrusion 8
3 Detection Systems (IDS):Host-based and network-based IDS.Basic configurations and
tools. Endpoint Security:Securing devices connected to the network.Importance of patch
management and antivirus solutions.
Network Traffic AnNaElyPsiO
s: r T
ieonot lesd fBo C
r A
moCnuitrorriicnuglu(m
Wireshark, SolarWinds). Analyzing 8
4 traffic to identify anomalies. Incident Response Framework:Steps in incident handling:
detection, containment, eradication, recovery.Importance of forensic investigations.SIEM
(Security Information and Event Management):Role of SIEM in centralized security
monitoring. Introduction to tools like Splunk and IBM QRadar.
TextBooks
Sr.
No. Title/ Edition Author Publisher
"Computer Networks" Andrew S. Tanenbaum and
1 David J. Wetherall
"Network Security Essentials: Applications and William Stallings
2 Standards"