BCS453: Cyber Security Workshop
Course Outcomes:
| CO |
Description |
| CO1 |
Apply the cryptographic algorithms for data communication. |
| CO2 |
Understand implementation of various security tools and algorithms. |
| CO3 |
Apply the Digital signature for secure data transmission and secure data storage. |
| CO4 |
Utilize the different open source tools for network security and analysis. |
| CO5 |
Demonstrate intrusion detection system using network security tool. |
Mapping Matrix of CO's and PO's
| COs |
PO1 |
PO2 |
PO3 |
PO4 |
PO5 |
PO6 |
PO7 |
PO8 |
PO9 |
PO10 |
PO11 |
PO12 |
PSO1 |
PSO2 |
PSO3 |
|
CO1
|
2 |
3 |
2 |
2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
2 |
- |
- |
|
CO2
|
2 |
3 |
2 |
2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
3 |
- |
- |
|
CO3
|
2 |
3 |
2 |
2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
3 |
- |
- |
|
CO4
|
2 |
3 |
2 |
2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
3 |
- |
- |
|
CO5
|
2 |
3 |
2 |
3 |
3 |
- |
- |
- |
- |
- |
- |
3 |
3 |
- |
- |
|
Avg
|
2 |
3 |
2 |
2.2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
2.8 |
- |
- |