Course Outcomes
|
7IT4-22.1 |
Apply the cryptographic algorithms for data communication. |
| 7IT4-22.2 | Understand implementation of various security tools and algorithms. |
| 7IT4-22.3 | Apply the Digital signature for secure data transmission and secure data storage. |
| 7IT4-22.4 | Utilize the different open source tools for network security and analysis. |
| 7IT4-22.5 | Demonstrate intrusion detection system using network security tool. |
Mapping of COs and POs
| COs | PO1 | PO2 | PO3 | PO4 | PO5 | PO6 | PO7 | PO8 | PO9 | PO10 | PO11 | PO12 | PSO1 | PSO2 | PSO3 |
| CO1 |
2 |
3 | 2 | 2 | 3 | - | - | - | - | - | - | - | 3 | 2 | - |
| CO2 | 2 | 3 | 2 | 2 | 3 | - | - | - | - | - | - | - | 3 | 3 | - |
| CO3 | 2 | 3 | 2 | 2 | 3 | - | - | - | - | - | - | - | 3 | 3 | - |
| CO4 | 2 | 3 | 2 | 2 | 3 | - | - | - | - | - | - | - | 3 | 3 | - |
| CO5 | 2 | 3 | 2 | 3 | 3 | - | - | - | - | - | - | - | 3 | 3 | - |
| Avg | 2 | 3 | 2 | 2 | 3 | - | - | - | - | - | - | - | 3 | 3 | 3 |



