Course Outcomes
|
7IT4-22.1 |
Apply cryptographic algorithms to achieve secured data communication. |
| 7IT4-22.2 | Demonstrate various types of attacks on different cryptographic algorithms. |
| 7IT4-22.3 | Compare different security tools to identify and analyze software vulnerabilities. |
| 7IT4-22.4 | Demonstrate the working of an intrusion detection system using network security tools. |
| 7IT4-22.5 | Design and develop secure network architecture for an enterprise. |
Mapping of COs and POs
| COs | PO1 | PO2 | PO3 | PO4 | PO5 | PO6 | PO7 | PO8 | PO9 | PO10 | PO11 | PSO1 | PSO2 | PSO3 |
| CO1 |
2 |
1 | 1 | 2 | - | - | - | 2 | - | - | 1 | 3 | - | - |
| CO2 | 2 | 1 | 2 | 2 | - | - | - | 2 | - | - | 1 | 3 | - | - |
| CO3 | 2 | 2 | - | 1 | 3 | - | - | - | - | 2 | 3 | 1 | 2 | - |
| CO4 | 2 | 2 | 1 | 3 | 2 | 2 | 2 | 3 | 2 | 2 | 3 | - | 3 | 1 |
| CO5 | 2 | 3 | 2 | 3 | 3 | - | - | - | - | - | - | 3 | - | - |
| Avg | 2 | 2 | 2 | 3 | 3 | 2 | 2 | 3 | 2 | 2 | 2 | 3 | 3 | 1 |



