Appendix - I. Post Graduate Degree in Master of Cyber Law & Information Technology FIRST SEMESTER SECOND SEMESTER



Similar documents
DESKTOP PRODUCTIVITY SOFTWARE

Computer Applications (10004)

MASTER COURSE OUTLINE

Excel 2003 Tutorials - Video File Attributes

Computer Skills Checklist 1

Advanced Presentation Features and Animation

Basic Microsoft Excel 2007

Microsoft Office Word 2010: Level 1

LEWIS-CLARK STATE COLLEGE BUSINESS TECHNOLOGY AND SERVICE DIVISION SYLLABUS

Computer Skills: Levels of Proficiency

Word processing software

MS-CIT COURSE SYLLABUS

Excel 2007 Tutorials - Video File Attributes

Level 2 Certificate in Practical ICT Skills

NAVIGATION TIPS. Special Tabs

Course Descriptions for Focused Learning Classes

Langara College Summer archived

Microsoft Excel Training - Course Topic Selections

Oregon State Bar Software Standards Software Proficiency Expectations (Items in bold are to be demonstrated)

Question: 1 You type a document and you want to insert header from third page. Which of the following technique will you use to accomplish the task?

Basic Excel Handbook

Level 1 Certificate in Practical ICT Skills

Microsoft Courses. Microsoft Office 2007

Excel 2003 Tutorial I

JOB SEARCH TECHNIQUES

Microsoft Office Topics per Course

Cashion High School Fundamentals of Administrative Technologies Syllabus Course Number: 8103 (OK Promise Approved)

F9D7 04 (ESKWP2): Word Processing Software 2

No restrictions are placed upon the use of this list. Please notify us of any errors or omissions, thank you,

Excel 2007: Basics Learning Guide

Florida Department of Education Student Performance Standards

Ohio University Computer Services Center August, 2002 Crystal Reports Introduction Quick Reference Guide

Excel 2010: Create your first spreadsheet

Microsoft Excel 2007 Level 2

Lower School. Third Grade

Sending a Document via Working with Graphics & Using Section Breaks, Envelopes and Labels

Word 2007: Basics Learning Guide

Middle School. Sixth Grade

Proposed Course title: - Basic Computer Course

ST. MARY S COLLEGE FORM 5

Computer Literacy Syllabus Class time: Mondays 5:00 7:00 p.m. Class location: 955 W. Main Street, Mt. Vernon, KY 40456

Microsoft Excel 2007 Mini Skills Overview of Tables

ESKIWP1 Word processing software

Computer Classes held

Introduction to the Computer and Word Processing application LEVEL: 1. Switch on computer and demonstrate use of mouse

Rows & Columns. Workbooks & Worksheets

Search help. More on Office.com: images templates. Here are some basic tasks that you can do in Microsoft Excel 2010.

PowerPoint 2007 Basics Website:

Contact Information I usually try to check once per day and respond within 48 hours or sooner, except on weekends and holidays.

Microsoft Excel 2010 Tutorial

Microsoft Access 2010 handout

Office v.x Mac OS X Keyboard Shortcuts

Exam Name: Excel 2010 Exam Type: Microsoft Exam Code: Certification Microsoft Office Specialist (MOS) Total Questions: 26

Introduction to Microsoft Word 2003

To reuse a template that you ve recently used, click Recent Templates, click the template that you want, and then click Create.

Business Objects 4.1 Quick User Guide

Index. Index IEEEE Page 1 10/18/06 MM. Index IND 1

Overview of Microsoft Office Word 2007

Microsoft Word 2010 Prepared by Computing Services at the Eastman School of Music July 2010

BUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE

Unit 1: ICT skills for business (LEVEL 2)

DOING MORE WITH WORD: MICROSOFT OFFICE 2010

Chapter 1 Kingsoft Office for Android: A Close Look. Compatible with Microsoft Office: With Kingsoft Office for Android, users are allowed to create,

Business Objects Version 5 : Introduction

Microsoft Word 2013 Tutorial

Q&As: Microsoft Excel 2013: Chapter 2

Page Create and Manage a Presentation 1.1 Create a Presentation Pages Where Covered

Google Docs Basics Website:

4) How many peripheral devices can be connected to a single SCSI port? 4) A) 8 B) 32 C) 1 D) 100

Enhanced Formatting and Document Management. Word Unit 3 Module 3. Diocese of St. Petersburg Office of Training Training@dosp.

Howard County Public School System Educational Technology. Essential Curriculum Grades 9-12

Publisher 2010 Cheat Sheet

PowerPoint 2013 Basics for Windows Training Objective

Microsoft Word 2010 Tutorial

In this session, we will explain some of the basics of word processing. 1. Start Microsoft Word 11. Edit the Document cut & move

Microsoft Office Series

3 What s New in Excel 2007

4. Click on the insert tab: Create a title at the top of the page using word art that says Microsoft Word PD 11-12

MOS 2010 Study Guide for Microsoft Word, Excel, PowerPoint, and Outlook. Joan Lambert Joyce Cox

EXCEL Using Excel for Data Query & Management. Information Technology. MS Office Excel 2007 Users Guide. IT Training & Development

How to Use Excel for Law Firm Billing

NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.)

Installation Instruction STATISTICA Enterprise Small Business

Microsoft Excel 2013: Macro to apply Custom Margins, Titles, Gridlines, Autofit Width & Add Macro to Quick Access Toolbar & How to Delete a Macro.

Curriculum Map (Computer Technology 9 th grade)

Secure Website and Reader Application User Guide

Move between open workbooks. Display the print menu. Select whole spreadsheet. Microsoft Excel Keyboard Keys. General

Instructional Programming. Evaluation Instruction

EXCEL PIVOT TABLE David Geffen School of Medicine, UCLA Dean s Office Oct 2002

paragraph(s). The bottom mark is for all following lines in that paragraph. The rectangle below the marks moves both marks at the same time.

Excel Using Pivot Tables

Introduction to Microsoft Word 2008

Installation Instruction STATISTICA Enterprise Server

BUSINESS ADMINISTRATION EVENTS

ECDL / ICDL Spreadsheets Syllabus Version 5.0

ECDL / ICDL Word Processing Syllabus Version 5.0

Beginning Microsoft Word XP

Computer Literacy Skills A Companion to the Maryland Technology Literacy Standards for Students

Transcription:

Appendix - I Post Graduate Degree in Master of Cyber Law & Information Technology FIRST SEMESTER Sr.No Name of Subject No. of Credits Max. Marks Min. Marks 1.1 Computer & Networks 4 100 50 1.2 The Information Technology Act 4 100 50 1.3 Information Technology Law International Perspective 4 100 50 SECOND SEMESTER Sr.No Name of Subject No. of Credits Mix. Marks Min.Marks 2.1 Cyber Crime : New Challenges 4 100 50 2.2 Practical 6 150 75 i) Computer Practical Ext Examiner -100Marks ii) Viva Voce Ext Examiner -25 Marks iii) GGroup Discussion Ext. Examiner -25 marks 2.3 Project Work and Viva -Voce. 6 150 75 ( External Examiner) i) Project Work -100Marks ii) Viva Voce 50 Marks THIRD SEMESTER Sr.No Name of Subject No. of Credits Mix. Marks Min.Marks 3.1 Principles of E- Commerce 4 100 50 3.2 Digital Signature 4 100 50 3.3 Seminar & Group Discussion 4 100 50 i) Seminar Internal Examiner-50 Marks ii) Group Discussion External Examiner 50 Marks

FOURTH SEMESTER Sr.No Name of Subject No. of Credits Max. Marks Min. Marks 4.1 Cyber Security 4 100 50 4.2 Field Visits/ Work 4 100 50 ( Internal Examener) APENDIX-II DETAILED SYLLABUS Master of Cyber Law and Information Technology FIRST SEMESTER PAPER I COMPUTER AND NETWORKS 1. Fundamentals of Computers :- a) Early computing machines. b) Computer and its assembly. c) Software. d) Computer memory, type of memory and speed. 2. Basics of Networks and Internet :- a) Computer networks and its need. b) Networks topology. c) Types of networks. d) History of Internet. e) Concept of Internet and www. f) Working of Internet. g) Protocols. h) Web publications. i) Cyber space. j) Organisations of Internet management. k) Related Terms (Abbreviations).

3. Fundamentals of E-commerce :- a) Basic of e-commerce. b) Types of e-commerce. c) Benefits. 4. Cyber crimes and cyber terrorism :- a) Cyber crimes and the categories of crime i) Cyber frauds ii) Cyber thefts iii) Cyber stacking b) Cyber Terrorism. c) Hacking, Virus, Trojan, worms etc. 5. Internet Security concept :- a) Concept of security b) Firewalls and types. c) Security products. d) Biometrics. 6. Cryptography :- a) Introduction of Cryptography b) Type of Cryptography. c) Cryptographic goals. d) Key and Keypair. 7. Digital signatures and electronic signatures :- a) Technical issue of digital and electronic signature. b) Recognition and authentication of digital and electronic signatures c) Benefits. 8. PKI Infrastructure:- a) PKI Components. b) PKI Applications. c) Certification. 9. Electronic Payment system and Taxation.

PAPER II INFORMATION TECHNOLOGY ACT 1. Salient features of IT Act - 2000. a) Definitions. b) Electronic record and digital signature authentication. c) Electronic governance. d) Various authorities under IT Act and their powers. e) Penalties. f) Offences. g) Miscellaneous. 2. Impact on other related Acts (Amendments) :- a) Amendments to Indian Penal Code. b) Amendments to Evidence Act. c) Amendments to Bankers Book Evidence Act. d) Amendments to Reserve Bank of India Act. 3. Concept of Cyber space jurisdiction and other principal of jurisdiction: a) Territorial jurisdiction b) Extra Territorial jurisdiction c) Cyber space jurisdiction 4. Investigation of Cyber crime (Technical Issue) PAPER III Information Technology Law : International Perspective Section-A : Electronic Data Interchange 1) EDI : Concept and legal Issues. 2) UNCITRAL Model Law. 3) Electronic Signature Law s of Major Countries 4) Cryptography Laws 5) Cyber Law s of Major Countries

Section B : Law of Intellectual Property. 1) Copy Right Act. 2) Trade and Merchandise Act 3) Patent Act 4) Domain Name Disputes 5) Cyber-Squatting 6) Important Case Laws. SECOND SEMESTER PAPER-IV CYBER CRIME: NEW CHALLENGES UNIT I CYBERCRIME AND THE INTERNET : A New High Tech Crime Paradigm Perception of cybercrime A brief history and analysis of the internet Cybercrime classification Challenges for criminology, criminal justice and policing. UNIT II HACKERS, ATTACKS AND CRIMES : Hackers and hacking: Introduction Representation myths and realities Hacking and the law. Attacks and Crimes: Introduction Types of Abuse, Attacks and Crime Evolving Forms of Cybercrimes, Attacks and Conflict Computer Abusers and Cybercriminals. UNIT III THEORETICAL AND SOCIAL PERSPECTIVES ON CYBERCRIME : Introduction Theories Classical Criminology Trait Theories Social Process Theories Social Structure Theories Conflict Theories Integrated Theories The Social and Economic Impacts of Cybercrime Emerging Crime Related Issues and Controversies. UNIT IV MANAGING CYBERCRIME : Cyber Laws and Regulations: Introduction The Rationale and Reach of Cyber Laws Laws and Regulations are Created and Administered Bodies of U.S. Law Pertaining to IT and Cybercrime Issues Federal Cybercrime Laws and InfoSec Regulations Investigating and Prosecuting Cybercrime: Introduction Criminal Justice System Components Legal Issues Governing Investigative Procedures Crime Scene Processing and Evidence Management Prosecuting Cybercriminals. UNIT V PREVENTING CYBERCRIME : Preventing Cybercrime via Information Security: Introduction Personal and Organizational Information Security Protocols Advancing the Security Posture of Organizations The Purpose and the Value of Auditing Future Opportunities for Managing Cybercrime: Introduction Government Prevent Cybercrime Transformation of Information Security Folk Artistry Career Opportunities.

PAPER V Practical on Computer shall be conducted on following topics UNIT- I : DOS & WINDOWS Xp File Types, Directory Structure, Booting (Warm and Cold), Internal and External DOS Commands, Wildcard Characters, Commands related to Directory (DIR, MD, CD, RD, TREE, PATH), Commands related to files (COPY, DEL, ERASE, REN, ATTRIB, FORMAT, SCANDISK, XCOPY, BACKUP, RESTORE), General Commands (TYPE, DATE, EDIT, TIME, PROMPT), Use of Wildcard characters in different commands, Introduction to Windows Operating System and their examples, Graphical User Interface, Various applications and Utilities of Windows Operating System, Starting applications, Creating shortcuts, files, folders and sub-folders, Copying files and folders, Control Panel (Add Hardware, add or remove program, display properties, date and time properties, taskbar and start button, mouse, keyboard), Accessories (Notepad, WordPad, Paint, Calculator) UNIT- II Introduction to Microsoft Word 2007 Creating a new document, designing a document, saving and closing a document, different views of document. Formatting : Selection of text, Cut, Copy, Paste, Delete, Alignments, Bold, Italic, Underline, Borders and Shadings, Tabs, Paragraph settings, Page Setup, Print preview, Print, Spellings and Grammar check, Drop Caps, Bullets and Numbering, Columns settings, Header and Footer, Endnotes and Footnotes, Inserting Pictures, Clipart, Shapes, Wordart, Text box, Find and Replace, Change Case. Inserting or Creating Tables, Add and remove Columns and Rows, Inserting Text, Change text directions, Sorting (Ascending and Descending), Inserting formula in the tables, Working with formulas like SUM, PRODUCT, MAX, MIN, MOD, AVERAGE, INT, Table properties, Table Autoformat, Mailmerge. UNIT -III Introduction to Microsoft Excel 2007 Introduction to Excel, Concept of Worksheet and Workbook, Creating a new worksheet, saving and closing a worksheet, different views in Excel. Formatting : Paste special, Fill Series, Format Cell, Split Cell, Borders and Shadings, Data Sort (Ascending & Descending), Auto Filter, Advanced Filter, Conditional Formatting, Working with Functions (Mathematical, Text, Statistical, Logical and Financial), Goal Seek Function, Workbook and Worksheet linking. Inserting Chart, Formatting of Chart UNIT- IV Introduction to Microsoft Powerpoint 2007 Introduction to Powerpoint, Designing, Saving and closing presentation, Different views of Powerpoint. Inserting Slide, Pictures, Cliparts, Organisation Chart, Tables, Chart, Text Styling, Hide and Unhide slide, Header and Footer Animation settings, Custom Animation, Transition, Applying Timings and sound effects to slide and text, Slide Show

UNIT V Internet Creation of Email ID, Exchange of Email with and without attachment, Searching materials on Internet using different search engines, downloading and uploading of data ii) Viva Voce( External Examiner) :- Viva will be conducted on topics mentioned above iii) Group Discussion: Group Discussion will be held on emerging issues in Cyber Law ( External Examiner) Paper-VI Project Work and Viva -Voce. i) Project Work :- Students are required to prepare a project Work of 60-75 pages on a given topic. It will be evaluated by the External Examiner. ii) Viva voce: - Viva voce will be conducted on the basis of project work Books Suggested for Reading : 1) Vishwanathan Suresh T., "The Indian Cyber Law" Second Edition 2001:- Bharat Law House. 2) Prasad T.V.R. Satya, : "Law Relating to Information Technology (Cyber Laws)" 1 st edition 2001:- Asia Law House. 3) Syed Shakil Ahmed and Reheja Rajiv, A Guide to Information Technology (Cyber Laws & E-commerce) Edition 2001:- Capital Law House. 4) Reed Chris, Computer Law, Third Edition 1996 (First Indian Reprint 2000):- Universal Law Publishing Co. Pvt. Ltd. 5) Kamath Nandan,"Law Relating to Computers Internet & E-commerce (A guide to Cyber Laws & the Information Technology Act, 2000 with Rules & Notification), 2 nd Edition, Reprint : 2002:- Universal Book Traders. 6) P. Narayanan, Intellectual Property (Trade Marks & the Emerging concepts of Cyber property rights (HB)", 3 rd Edition. (HB), 2002:- Universal Book Traders. 7) C.Sam McQuade, Understanding and Managing Cybercrime, Prentice Hall, 2006. 8) Dr Majid Yar, Cybercrime and Society,: Sage Publications Ltd, 2006.