|Unit I||What Is AI: Foundations, History and State of the Art of AI.
Intelligent Agents: Agents and Environments, Nature of Environments, Structure of Agents.
Problem Solving by searching: Problem-Solving Agents, Example Problems,Searching for Solutions, Uninformed Search Strategies, Informed (Heuristic) Search Strategies, Heuristic Functions.
|Learning from Examples: Forms of Learning, Supervised Learning, Learning Decision Trees, Evaluating and Choosing the Best Hypothesis, Theory of Learning, Regression and Classification with Linear Models, Artificial Neural Networks, Nonparametric Models, Support Vector Machines, Ensemble Learning, Practical Machine Learning|
|Unit III||Learning probabilistic models: Statistical Learning, Learning with Complete Data, Learning with Hidden Variables: The EM Algorithm. Reinforcement learning: Passive Reinforcement Learning, Active Reinforcement Learning, Generalization in Reinforcement Learning, Policy Search, Applications of Reinforcement Learning.|
|Unit I||Introduction: Technical Summary of Linux Distributions, Managing Software Single-Host Administration: Managing Users and Groups, Booting and shutting down processes, File Systems, Core System Services, Process of configuring, compiling, Linux Kernel Networking and Security: TCP/IP for System Administrators, basic network Configuration, Linux Firewall (Netfilter), System and network security|
|Unit II||Internet Services: Domain Name System (DNS), File Transfer Protocol (FTP), Apache web server, Simple Mail Transfer Protocol (SMTP), Post Office Protocol and Internet Mail Access Protocol (POP and IMAP), Secure Shell (SSH), Network Authentication, OpenLDAP Server, Samba and LDAP, Network authentication system (Kerberos), Domain Name Service (DNS), Security|
|Unit III||Intranet Services: Network File System (NFS), Samba, Distributed File Systems (DFS), Network Information Service (NIS), Lightweight Directory Access Protocol (LDAP), Dynamic Host Configuration Protocol (DHCP), MySQL, LAMP Applications File Servers, Email Services, Chat Applications, Virtual Private Networking.|
|Unit I||Software Testing and Introduction to quality : Introduction, Nature of errors, an example for Testing, Definition of Quality , QA, QC, QM and SQA , Software Development Life Cycle, Software Quality Factors Verification and Validation : Definition of V &V , Different types of V & V Mechanisms, Concepts of Software Reviews, Inspection and Walkthrough Software Testing Techniques : Testing Fundamentals, Test Case Design, White Box Testing and its types, Black Box Testing and its types|
|Unit II||Software Testing Strategies : Strategic Approach to Software Testing, Unit Testing, Integration Testing, Validation Testing, System Testing Software Metrics : Concept and Developing Metrics, Different types of Metrics, Complexity metrics Defect Management: Definition of Defects, Defect Management Process, Defect Reporting, Metrics Related to Defects, Using Defects for Process Improvement.|
|Unit III||Software Quality Assurance : Quality Concepts, Quality Movement, Background Issues, SQA activities, Software Reviews, Formal Technical Reviews, Formal approaches to SQA, Statistical Quality Assurance, Software Reliability, The ISO 9000 Quality Standards, , SQA Plan , Six sigma, Informal Reviews|
|Unit I||Introduction: Security Trends, The OSI Security Architecture, Security Attacks, Security Services, Security Mechanisms Classical Encryption Techniques: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Steganography, Block Cipher Principles, The Data Encryption Standard, The Strength of DES, AES (round details not expected), Multiple Encryption and Triple DES, Block Cipher Modes of Operation, Stream Ciphers Public-Key Cryptography and RSA: Principles of Public-Key Cryptosystems, The RSA Algorithm|
|Unit II||Key Management: Public-Key Cryptosystems, Key Management, Diffie-Hellman Key Exchange
Message Authentication and Hash Functions: Authentication Requirements, Authentication Functions, Message Authentication Codes, Hash Functions, Security of Hash Functions and Macs, Secure Hash Algorithm, HMAC
Digital Signatures and Authentication: Digital Signatures, Authentication Protocols, Digital Signature Standard
Authentication Applications: Kerberos, X.509 Authentication, Public-Key Infrastructure
|Unit III||Electronic Mail Security: Pretty Good Privacy, S/MIME
IP Security: Overview, Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations, Key Management
Web Security: Web Security Considerations, Secure Socket Layer and Transport Layer Security, Secure Electronic Transaction
Intrusion: Intruders, Intrusion Techniques, Intrusion Detection
Malicious Software: Viruses and Related Threats, Virus Countermeasures, DDOS
Firewalls: Firewall Design Principles, Types of Firewalls