BCS453: Cyber Security Workshop
Course Outcomes:
CO |
Description |
CO1 |
Apply the cryptographic algorithms for data communication. |
CO2 |
Understand implementation of various security tools and algorithms. |
CO3 |
Apply the Digital signature for secure data transmission and secure data storage. |
CO4 |
Utilize the different open source tools for network security and analysis. |
CO5 |
Demonstrate intrusion detection system using network security tool. |
Mapping Matrix of CO's and PO's
COs |
PO1 |
PO2 |
PO3 |
PO4 |
PO5 |
PO6 |
PO7 |
PO8 |
PO9 |
PO10 |
PO11 |
PO12 |
PSO1 |
PSO2 |
PSO3 |
CO1
|
2 |
3 |
2 |
2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
2 |
- |
- |
CO2
|
2 |
3 |
2 |
2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
3 |
- |
- |
CO3
|
2 |
3 |
2 |
2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
3 |
- |
- |
CO4
|
2 |
3 |
2 |
2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
3 |
- |
- |
CO5
|
2 |
3 |
2 |
3 |
3 |
- |
- |
- |
- |
- |
- |
3 |
3 |
- |
- |
Avg
|
2 |
3 |
2 |
2.2 |
3 |
- |
- |
- |
- |
- |
- |
3 |
2.8 |
- |
- |