Course Outcomes
After completion of this course, students will be able to –
7CS6-60.2.1 |
Describe the concept of cyber security, and the issues and challenges related to wireless devices. |
7CS6-60.2.2 |
Discuss prevention measures against digital payment fraud. |
7CS6-60.2.3 |
Apply various privacy and security concerns to online social media. |
7CS6-60.2.4 |
Discuss cybercrimes, their nature, legal remedies, reporting platforms, and procedures. |
7CS6-60.2.5 |
Explain the IT Act 2000 legal framework and penalties and punishments against cybercrimes. |
CO-PO/PSO Mapping Matrix
COs |
PO1 |
PO2 |
PO3 |
PO4 |
PO5 |
PO6 |
PO7 |
PO8 |
PO9 |
PO10 |
PO11 |
PO12 |
PSO1 |
PSO2 |
7CS6-60.2.1 |
2 |
3 |
- |
- |
- |
- |
- |
- |
- |
- |
- |
3 |
- |
3 |
7CS6-60.2.2 |
2 |
3 |
- |
- |
- |
- |
- |
- |
- |
- |
- |
3 |
- |
3 |
7CS6-60.2.3 |
2 |
3 |
- |
- |
- |
- |
- |
- |
- |
- |
- |
3 |
- |
3 |
7CS6-60.2.4 |
2 |
3 |
- |
- |
- |
- |
- |
- |
- |
- |
- |
3 |
- |
3 |
7CS6-60.2.5 |
2 |
3 |
- |
- |
- |
- |
- |
- |
- |
- |
- |
3 |
- |
3 |
7CS6-60.2 |
2 |
3 |
- |
- |
- |
- |
- |
- |
- |
- |
- |
3 |
- |
3 |