Upload
vuminh
View
218
Download
1
Embed Size (px)
Citation preview
Page 1
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
VELS UNIVERSITY
MATRIX & CURRICULUM 2013
M. TECH. IT-IMS 2 Years (4 Semesters)
The Course Objectives
This course is aimed at students who have completed Graduation and are keen on making a career in
the fast growing field of IT Infrastructure management. Students who graduate from this program would
be capable of implementing IT infrastructure solutions and handling the Industry challenges. The course
provides the student comprehensive knowledge, technical expertise and hands-on experience in
Infrastructure Management.
The course provides opportunity for the students to learn all aspects of IMS such as Networking,
Operating Systems, Virtualisations and Data Center technologies. The early part of the course engages
in Basics, and as the student progresses, the amount of LAB exercises increases, thereby giving the
student a “real world” experience. In the last semester, the student can opt for an industry based
internship, which helps the student to familiarise with the needs of the industry.
Short Term and Long Term Benefits of the Course:
Infrastructure Management Services Industry is a very fast growing industry, and it provides great job
opportunities for the students to start a career. At iNurture, our courses are designed using Industry
experts, and we give a large amount of LAB facility and exercises to the students, so that they can
handle practical problems.
We have also ensured that the course covers some of the major Vendor Certification in the areas of
Networking, Operating Systems etc., Also, in the final semester, the student spends some time with a
company as an intern, or he/ she works on a project which will simulate industry conditions. As part of
the program, we also teach the student communication skills and interviewing skills. Because of this, we
are confident that the student will not only get placements, but will also be able to shine in their career.
Career Opportunities after the Course:
• Remote Infrastructure Management Services (RIMS) is an industry which started in 2005,
and has been one of the fastest growing in the past 5 years
• As per NASSCOM, approx. 1,00,000 jobs are being created every year ( including the
domestic market )
• 6 BN USD (INR 35000 cr) industry in 2011, growing to 12 BN USD ( INR 70,000 cr) in 2015
Page 2
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
• Over the last five years, the RIM segment has been on an accelerated growth path in India
growing at a CAGR over 25 % per cent. It is estimated that by 2020 RIM can contribute more
than a third of total IT services revenues for India.
• Cloud Computing, virtualization, unified communication, green data centers are fast
reshaping the technology infrastructure landscape and provide a unique opportunity for
RIM providers in India to build unique offerings and new business models
Major Companies who hire the students of this Course:
• Service Berry
• Dev IT Solutions
• Mind Inventory
• Q Page
• I-Link
• Infosoft
• Acute Informatics
• Tact Pro
• Mark TeQ
• Ashtech Infotech
• Sprics technologies
• Elemany IT Services
• VB Soft,
• Elite Core
• I – Infotechsys
Page 3
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
SEMESTER – I
SEMESTER – II
Sub. Code Course Title L T P C CIA ESE TOTAL
Theory
13MTIM201 Server Operating System 1
3 3 40 60 100
13MTIM202 Linux RHCE 1
3 3 40 60 100
13MTIM203 Principles of Virtualization 1
3 3 40 60 100
13MTIM204 Programming with C 1
3 3 40 60 100
13MTIM205 Designing Enterprise Networks II 1
3 3 40 60 100
13MTIM206E Elective 1 3
0 3 40 60 100
Total 8
15 18 240 360 600
Sub. Code Course Title L T P C CIA ESE TOTAL
Theory
13MTIM101 Computer System Organization 1
3 3 40 60 100
13MTIM102 Designing Enterprise Networks I 2
3 4 40 60 100
13MTIM103 Fundamentals of Operating System 2
3 4 40 60 100
13MTIM104 Office Automation Tools 2
3 4 40 60 100
13MTIM105 Datacenter Architecture and Storage
Management 3
0 3 40 60 100
13MTIM106 Introduction to Information Security 3
0 3 40 60 100
Total 13
12 21 240 360 600
Page 4
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
SEMESTER – III
SEMESTER – IV
Sub. Code Course Title L T P C CIA ESE TOTAL
Theory
13MTIM301 Linux Administration 2
3 4 40 60 100
13MTIM302 Object Oriented Programming with
C++ 1
3 3 40 60 100
13MTIM303 ITIL & HPSM/Microsoft SM 3
0 3 40 60 100
13MTIM304 Introduction to Cloud Computing 4
0 4 40 60 100
13MTIM305E Elective 2 3
0 3 40 60 100
Practical
13MTIM306 Project Phase 1
9 6 100 0 100
Total 13
15 23 300 300 600
Sub. Code Course Title L T P C CIA ESE TOTAL
Theory
13MTIM401 Evaluation of Project Phase 2
18 12 60 240 300
Total
18 12 60 240 300
Page 5
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
List of Electives
M. TECH. IT-IMS
Elective List
Sub. Code Course Title L T P C CIA ESE TOTAL
Semester II
13MTIM206E1 Concepts of Open Source Scripting Languages 3 0 3 40 60 100
13MTIM206E2 Introduction to DBMS 3 0 3 40 60 100
Semester III
13MTIM305E1 Advanced Information Security 3 0 3 40 60 100
13MTIM305E2 VOIP and Wireless Technologies 3 0 3 40 60 100
Page 6
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
SYLLABUS
SEMESTER I
Computer System Organization
Course Code: 13MTIM101 Total Lecture Hours: 15
Module - I: Computer Organization: 3 Hrs
Basic Logic Design: Boolean Algebra, Gate – 6, Integrated Circuits, Sequential Logic. Number Systems:
Representation of Number Bases, Converting Between bases, Common Data Representation Formats
Overview of Computer Systems: Overview of a Computer System, Units of Measurement in Computing,
Computer Applications, Classification of Computers, History of Computers, Basic Microcomputer Design.
ALU and Instruction Sets: Arithmetic – Logic Unit, Instruction set Architecture Central Processing Unit:
Internal Organization of the CPU, The Instruction Execution Cycle, Advanced Technologies used in
modern CPUs, Organization of the Pentium Processor. System Memory: The Memory Hierarchy,
Memory Characteristics, Basic Memory Operation, Cache Memory, Main Memory, Memory Error
Detection and Correction, Disk Storage, RAID (Redundant Array of Inexpensive Disks), Optical Storage,
Magnetic Tape I/O Subsystem: Structure of the I/O Subsystem, I/O control strategies, Memory Mapped
I/O and Isolated I/O, External Devices used in Computers. Control Unit: Micro-operations, Operation of
the Control Unit, and Techniques for implementation of the control Unit
Module - II: Introduction to PC Hardware: 3Hrs
PC Hardware, System Case, Motherboard, Processor Memory and I/O ports: Memory, Modems, Types of
ports, Universal Serial Bus, Storage Devices: Hard disk drive, Input devices, Display adapters, Monitors
and Printers, Assembling and Disassembling a PC: Materials Required for Assembling, Precautions for
Assembling and Disassembling the PC, Assembling Procedure, Disassembling a PC.
Module - III: Introduction to Operating System: Windows 7 3 Hrs
Functions of an Operating System, Classification of Operating System, Windows Operating System,
Diagnosing and Troubleshooting OS, Perform a clean installation of Windows 7, upgrade to Windows 7,
and migrate user-related data and settings from an earlier version of Windows
Module - IV: Configuring Operating Systems 3 Hrs
Configure disks, partitions, volumes, and device drivers to enable a Windows 7 client computer,
Configure file access and printers on a Windows 7 client computer, Configure network connectivity on a
Windows 7 client computer, Configure wireless network connectivity on a Windows 7 client computer,
Secure Windows 7 client desktop computers, Optimize and maintain the performance and reliability of a
Windows 7 client computer, Configure mobile computing and remote access settings for a Windows 7
client computer.
Page 7
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Module -V: Introduction to Operating System: Windows server 2003 3Hrs
Managing and Maintaining Physical and Logical Devices, Managing Users, Computers, and Groups,
Managing and Maintaining Access to Resources, Managing and Maintaining a Server Environment,
Managing and Implementing Disaster Recovery
Text Book:
1. CompTIA A+ Certification All-In-One Desk Reference For Dummies Glen E. Clarke, Ed Tetz John
Wiley and Sons, 2010
Reference Books:
1. A+ Certification Bible, Ed Tetz, Glen E. Clarke, Angshuman Chakraborti, Meeta Gupta, Mridula
Parihar, Rashim Mogha, Wiley, 2011
2. Computer organization and architecture: An Introduction, B. S. Chalk, Robert Hind, A. T. (Antony T.)
Carter, 2010
3. Windows Server 2003: the complete reference by Kathy Ivens, 2003
4. CompTIA A+ Complete Study Guide Quentin Docter, Emmett Dulaney, Toby Skandier Wiley, 2004
Page 8
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Designing Enterprise Networks I
Course Code: 13MTIM102 Total Lecture Hours: 30
Module - I: Networking fundamentals 5Hrs
Network Models, Internet Connectivity Technologies, Network Protocols, TCP/IP Applications and
Technologies, Network Topologies, Network Types, Cable and Connector Types, Installing Network
Interface Cards, Configuring Network Interface Cards, Switches and Hubs, Beyond LANs—Repeaters,
Bridges, and Routers, Networking fundamentals Setting Up the Network Client, Using Shared Resource,
Browser Installation and Configuration, Using Network Command-Line Tools, Network and Internet
Troubleshooting. Network security: Authentication, Firewalls, Virtual Private Networks.
Module - II: Layered Models 10Hrs
OSI Reference Mode, Application Layer, Presentation Layer, Session Layer, Transport Layer, Network
Layer, Data link Layer, Physical Layer ,Cisco Three-Layer Model, TCP/IP :Introduction to TCP/IP, Transport
Layer Protocols (TCP, UDP),Internet Layer Protocols (IP, ICMP, ARP) IP Addressing: IP Addressing Classes,
Subnet Masks and Subnetting, Complex Subnet &Supernetting , Determining Broadcast & Network
Address. Configuring a Router: Starting up with a Router and Switch, Booting a Router and setup mode,
The Command-line Interface, Passwords and Line Console Commands, Interface Configuration setting,
Verifying & Debugging the Configuration.
Module - III: Building a Network 5 Hrs
Configuring a Router and Switch, Verifying Configuration and Duplex Settings, Continued Router
Configuration, Continued Switch Configuration. Managing CISCO in an Internetwork:
Backing up and restoring startup configuration and IOS, Booting IOS from TFTP Server, Cisco Discovery
Protocol, Ping and Trace, Understanding configuration register, Recovering the password.
Module - IV: IP Routing 5 Hrs
Routing Basics, Managing static and Dynamic Routes, Configuring static IP Routing, Configuring Dynamic
IP routing using RIP, IGRP, Managing and configuring OSPF & EIGRP, Avoiding Routing loops using split
horizon, route poisoning.
Module - V: Switching 5 Hrs
Bridging versus switching, working concept of Switch, Spanning Tree Protocol (STP), LAN Switch Types,
Virtual LANs, VLAN membership, VLAN Configuration and VTP, Assigning Ports, ISL Routing and Frame
tagging, Perform LAN and VLAN troubleshooting. Access Lists, Access Lists Commands, Standard IP
Access List, Wildcard Cards Implementing an Access List, Extended Access Lists, IPX access Lists, Securing
a Network Site with Access list. WAN: WAN Connection Types ISDN, X.25, Leased line and Frame-Relay,
Connection protocols, HDLC, PPP AND PPMP, Dial-on-Demand Routing, Frame Relay configuration, Sub
interfaces in Frame-Relay, Troubleshooting and Debugging Tools
Page 9
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Text Book:
1. CCNA Cisco Certified Network Associate: Study Guide (With CD) 7th Edition (Paperback), Wiley India,
2011
Reference Books:
1. CCENT/CCNA ICND1 640-822 Official Cert Guide 3 Edition (Paperback), Pearson, 2013
2. Routing Protocols and Concepts CCNA Exploration Companion Guide (With CD) (Paperback),
Pearson, 2008
3. CCNA Exploration Course Booklet : Routing Protocols and Concepts, Version 4.0 (Paperback),
Pearson, 2010
Lab Experiments for Designing Enterprise Networks
The Experiments include:
1. Implementation of TCP/IP protocol.
2. Troubleshooting Scenarios Network
3. Router - Configuration
4. Configuration of IP Address for a Router
5. Setting up of Passwords
6. Recovering of Passwords
Recap of all Previous Labs 1 -6
7. Configuration of Static and Dynamic Routing.
8. Configuration of Default Route.
Recap of Practical 8 & 9
9. Implementation of RIP V1 & V2
10. Implementation of EIGRP
11. Implementation of OSPF
12. Switch Configuration - Basic Commands
13. Switch Configuration - Switch Port Security
14. VLAN Configuration
15. Switch Troubleshooting
16. Recap of all Switching labs
17. Recap of all Switching and Routing labs
18. Configuration of Access-lists - Standard & Extended ACLs
Page 10
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Fundamentals of Operating System
Course Code: 13MTIM103 Total Lecture Hours: 30
Module - I: Introduction to Operating System 5 Hrs
Introduction to Operating System, Evolution of operating system, Structure of Operating, OS
Operations OS Organizations, Distributed Systems, Open source Operating systems, Process
Management, Memory Management, Storage Management, Computing Environment
Module - II: Installing, upgrading and managing Windows – 7 10 Hrs
Gathering hardware devices, Preparing to install windows 7, upgrading and migrating to
windows 7, Clean and Image based installation, Configuring Application Compatibility,
administrating windows features, Disk management, installing and configuring device drivers
Module - III: File Access, Printers and Network connectivity with Windows – 7 5 Hrs
Introduction to Authentication and Authorization , Managing file access , Shared Folders , File
compression , file archiving , managing printers , connecting windows 7 client with server ,
configuring ipv4 & ipv6 connectivity , Implementing APIPA , Introduction to Name resolution ,
troubleshooting network issues , Overview of wireless network , configuring wireless network
Module - IV: Securing, Optimizing and maintaining windows 7 Client 5 Hrs
Overview of local security management, local security policy settings, EFS and Bitlocker,
Application restrictions, UAC, Windows Firewall, Administrating IE8, Windows Defender
Module - V: Configuring Mobile Computing and Remote Access in windows 7 5 Hrs
Configure Mobile computer and device settings, Remote desktop, remote assistance, direct
access, branch cache
Text Book:
1. Milan Milenkovic - Operating Systems – TATA McGRAW HILL, 2009
Reference Books:
1. Operating Systems Fundamentals D. Irtegov, Laxmi Publications (December 30, 2005)
2. A Short Introduction to Operating Systems (M. Burgess), Wiley,2010
3. Operating Systems: Design and Implementation (Second Edition), Andrew S. Tanenbaum,
O’Reilly, 2010
Page 11
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Office Automation Tools
Course Code: 13MTIM104 Total Lecture Hours: 30
Module - I: Introduction to Office 2010 5 Hrs
Introduction to office: Introduction to office Versions of office, Benefits of using office, Help and
Security, Features and comparison of different versions of office
Module - II: Microsoft Office Word 2010 5 Hrs
Introduction to Word: Introduction to Word, Getting started with word 2010, Text Basics, Formatting
Text, Saving, Modifying Page Layout,
Formatting Word: Checking spelling and grammar, Printing, Using Indents and Tabs, Line and Paragraph
Spacing, Working with Lists, Adding breaks,
Working with Word: Working with columns, Working with hyperlinks, Working with shapes, Text Boxes
and WordArt, Inserting Clip Art and Pictures, Formatting Pictures, Styles and Themes,
Formatting Word: Working with Headers and Footers, Reviewing Documents, Working with Tables,
Smart Art Graphics, Using a Template,
Advanced Word features: Using Mail Merge, Working with Equation Editor, Bullets and Numbering,
Presenting Information with Word Table, Word Styles and Automation of Work
Module - III: Microsoft Office Excel 2010 5 Hrs
Introduction to excel 2010: Introduction, Getting to start Excel, Modifying Columns, Rows and Cells,
Formatting Cells, Saving,
Text and Math equations: Creating Simple Formulas, Worksheet Basics, Printing, Creating Complex
Formulas, Working with Basic Functions, Sorting Data, Outlining Data, Filtering Data,
Presenting data: Formatting Tables, Reviewing and Sharing Worksheet, Using Templates, Working with
Charts, Working with Spark line, Using Conditional Formatting, Using Pivot Table, Using What-If analysis,
Excel Workbook,
Module - IV: Microsoft Office PowerPoint 5 Hrs
Introduction to PowerPoint 2010 : Getting Started with PowerPoint, Slide Basics, Text Basics, Applying a
Theme, Inserting Images, Applying Transitions, Checking Spelling, Presenting Slide Show, Saving and
Printing,
Working with PowerPoint 2010: Modifying Lists, Indents and Line Spacing, Modifying Themes,
Formatting Pictures, WordArt and Shapes ,Arranging Objects, Animating Text and Objects,
Visual enhancement: Inserting Videos, Inserting Audio, SmartArt Illustrations, Hyperlinks and Action
Buttons, Working with Tables, Working with Charts, Reviewing Presentations, Advanced Presentation
Options, Working with Objects, Customizing Power Point, Online Presentation
Module - V: Microsoft Office Access , Outlook and Publisher 5 Hrs
Microsoft Access 2010: Introduction to Databases, Introduction to Objects, Getting Started in Access,
Managing Databases and Objects, Working with Tables, Working with Forms, Sorting and Filtering
Records,
Page 12
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Analyzing data: Designing a Query, More Query Design Options, Creating Reports, Advanced Report
Options, Modifying Tables, Creating Forms, Formatting Forms, Designing Your Own Database
Microsoft Outlook: Basics of Outlook 2007, Sending Electronic Mails, Organizing the Inbox, Managing
Outlook Calendar, Managing Events and Meetings,
Microsoft Office Publisher: Introduction to Publisher, Getting to know Publisher, Producing a Publisher,
Creating a new Publication, Working with Text, Working with Shapes and Objects, Working with
Pictures, Working with Tables
Module - VI: Microsoft Office One Note, Microsoft SharePoint and InfoPath 5 Hrs
Microsoft Office One Note: Introduction to One Note, Working with Multiple Notebooks, Collecting
your Notes and Information, Drawing Tools and Tables, Flagging notes for follow up, Finding Notes
Quickly with Quickly Search Capabilities
Microsoft SharePoint: Using the launch bar, Creating a workspace, Understanding Workspace window,
Powerful Collaborative tools
Microsoft InfoPath: Introduction to InfoPath, Quickly Design Forms with Easy-to-Use Tools, Make Forms
for SharePoint Lists, Create SharePoint Applications, Build Advanced Forms and Connect Forms to Line-
of-Business systems, Embed forms in Web Pages,
New Technologies: Introduction to MS Office 2013, Introduction to Office 365, Introduction to Office
Live, Alternate to MS Office (http://www.openoffice.org/)
Text Book:
1. MICROSOFT OFFICE HOME & STUDENT 2010 STEP BY STEP By Joyce Cox, Joan Lambert and Curtis
Frye –Microsoft Press Publisher.
Reference Book:
1. First Look 2010 Microsoft Office System By Katherine Murray–Microsoft Press Publisher.
Page 13
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Data Center Architecture and Storage Management
Course Code: 13MTIM105 Total Lecture Hours: 45
Module - I: Data Center Design Principles 8 Hrs
The Service Delivery Network, A Route to Standardized Operating Environments, Dynamic Infrastructure
,The Service Delivery Network: A Case Study, Data Center Virtualization, Energy Efficiency Strategies:
Server Virtualization Technology, Understanding and Deploying Logical Domains Operating System
Virtualization Product Architecture Server Platforms in Data Center: Servers used in Data Center, Server
Management Storage used in Data Center: Storage System, iScsi Multipathing, Network Management
and Fabric Management.
Module - II: Disaster Recovery fundamentals 7 Hrs
Disaster Architecting Availability and Disaster Recovery Solutions, Security: Managing Data Center
Security, Management of Data Center: Remote Monitoring, Applications: Web Proxy, LDAP
Module - III: Solution Overview 10 Hrs
Product Features and options, Key EVA values and Virtualization technology, drive enclosures,
Functional and physical layout of the EVA, solution Low/Middle/High End configurations, Capacity
matrix, interconnects and indicators, Controller software versions and upgrades, Command view EVA
installation and operation, Storage Management Server (SMS), Controllers: Controller features and
redundancy, Operator Control Panel (OCP) operations, Configuring the World Wide Name and checksum
on the arrays, Password installation for the OCP, Enclosure host and port identification. Disk Drive
Enclosures: Drive enclosure models and configurations, Customer self-repair operations for the drive
enclosure, Drive enclosure indicators and connections from front and rear views, EMU functions, LED
status displays and display and pushbutton operations, Enclosure Address Bus EAB and Environmental
Monitoring Unit EMU functions. Storage Works Command View EVA: Command View EVA overview, EVA
Management Server requirements, Browsing to the SMS (versions 3x and 5x), Installation and
configuration of Command, View EVA versions 6.x - 8.x, Licensing of the various versions of command
View, Firmware and management software for the EVA 4400
Module - IV: Basic Concepts and Terminology 10 Hrs
Virtual storage overview, Powering the Storage System off and on sequence, Storage system, Disk group
configurations, default disk group and metadata content, Distributed virtual RAID (VRAID) technology,
Hosts and Virtual disk overview.
Module - V: Storage System Configuration 10 Hrs
Configuration guidelines, controller code loads and upgrades, Gathering preliminary host information
and configuration of host connections, Perform an un-initialize of the storage system, Perform storage
discovery and initialization, Disk group creation and configuration guidelines. Host System Configuration:
Operating system support, Co-existence with other EVA models, Installing and configuring hosts, Host
Page 14
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
properties, Presenting Storage (LUN mask/map), Verifying LUN presentation. Storage Works Multi-Path
Solutions: Automatic Path Failover and Load Balancing, Supported multi-path solutions, Active-Active
Failover: Overview of active-passive and active-active failover modes, Virtual disk ownership and
transitions, Configuration Best Practices Summary.
Text Books:
1. Data center fundamentals by Mauricio Arregoces, Maurizio Portolani From Cisco Press, 2010
2. Storage Management: The Complete Cornerstone Guide to Storage Management Best Practices -
Gerard Blokdijk, Ivanka Menken, Emereo Pty Ltd (October 3, 2010), 2011
Reference Books:
1. The holy grail of network storage management By Jon William Toigo, Prentice Hall; 1 edition
(November 6, 2003)
2. NX-OS And Cisco Nexus Switching: Next-Generation Data Center Architectures Kevin Corbin, Ron
Fuller, David Jansen Cisco Press, 2009
3. The Green and Virtual Data Center Greg Schulz Auerbach Publications, 2008
4. Handbook of data center management Layne C. Bradley A1Books.co.in, 2008
5. Administering Data Centers: Servers, Storage, And Voice Over Ip By KailashJayaswal Wiley-India,
2010
Page 15
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Introduction to Information Security
Course Code: 13MTIM106 Total Lecture Hours: 45
Module - I: Introduction to Information Security 10 Hrs
Introduction: Security Definition, Why Security, Security and its need, Current Trends and Statistics,
Basic Terminology, The C I A of Security the Relation: Security functionality and Ease of Use Triangle.
Module - II: User Identity and Access Management 8 Hrs
User identity and Access Management: Authentication, Account Authorization, Validation, Access
Control and Privilege management. Hashing and Cryptography- Encryption and Decryption
Module - III: System and Server Security 7 Hrs
System Security, Desktop & Server Security, Firewalls, Password cracking Techniques, Key-logger, viruses
and worms, Malwares & Spy wares, Windows Registry
Module - IV: Internet Security 10 Hrs
Internet Security: LAN Security, Email Security, Hacking attacks, preventive measures.
Module - V: Risk Assessment and Cyber Laws 10 Hrs
Vulnerability Assessment, Penetration Testing, Cyber Laws
Text Book:
1. Information Systems Security: Security Management, Metrics, Frameworks And Best Practices - Nina
Godbole, ISC2 Press, 2010
Reference Book:
1. Information Security Management Handbook, Volume 4 - Micki Krause, ISC2 Press, 2007
Page 16
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Semester II
Server Operating System
Course Code: 13MTIM201 Total Lecture Hours: 15
Module - I: Server 2008 Active Directory Services 3 Hrs
Installing Active Directory Domain Services Active Directory, Identity and Access, Active Directory
Domain Services on Server Core, Working with Active Directory Snap-ins, Creating a Custom Console
with Active Directory Snap-ins, Delegation and Security of Active Directory Objects, Delegating
Administrative Tasks with the Delegation Of Control Wizard ,Creating Users with Windows Power Shell
and VBScript ,Automating the Creation and Management of Groups ,Administering Groups in an
Enterprise, Supporting Computer Objects and Accounts, Group Policy Infrastructure ,Group Policy
Settings, Managing Software with Group Policy Software Installation ,Authentication, Integrating
Domain Name System with AD DS, Sites and Replication, Domains and Forests, Directory Business
Continuity, Active Directory Lightweight Directory Services, Active Directory Certificate Services and
Public Key Infrastructures, Active Directory Rights Management Services, Active Directory Federation
Services.
Module - II: Server 2008 Network Infrastructure Configuration 3 Hrs
Configure IPv4 and IPv6 addressing, Configure Dynamic Host Configuration Protocol (DHCP),Configure
Windows Firewall with Advanced Security, Configuring Name Resolution ,Configure a Domain Name
System (DNS) server, Configure DNS zones, Records, Replication, Configure name resolution for client
computers, Configure Direct Access & remote access, Configure Network Access Protection
(NAP),Configure Network Policy Server (NPS),
Module - III: Configuring File System and Network Infrastructure 3 Hrs
Configure Distributed File System (DFS),Configure backup and restore, Manage file server resources,
Configure and monitor print services, Configure Windows Server Update Services (WSUS) server
settings, Configure performance monitoring, Configure event logs, Gather network data, Configuring
Network Access ,Configuring File and Print Services ,Monitoring and Managing a Network Infrastructure.
Module - IV: Server 2008 Applications Infrastructure 3 Hrs
Deploy images by using Windows Deployment Services, Configure Microsoft Windows activation,
Configure Windows Server Hyper-V and virtual machines, Configure high availability, Configure storage,
Configure Remote App and Remote Desktop Web Access, Configure Remote Desktop Gateway (RD
Gateway, Configure Remote Desktop Connection Broker, Configure and monitor Remote Desktop
resources, Configure Remote Desktop licensing, Configure Remote Desktop Session Host, Configure Web
applications, Manage Web sites, Configure a File Transfer Protocol (FTP) server, Configure Simple Mail
Transfer Protocol (SMTP), Manage the Web Server (IIS) role.
Page 17
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Module - V: Server Troubleshooting 3 Hrs
Server 2008 Active Directory troubleshooting, Server 2008 Network Infrastructure troubleshooting, and
Server 2008 Applications Infrastructure troubleshooting.
Text Books:
1. Microsoft Windows Server 2008: A Beginner's Guide, Marty Matthews, McGraw-Hill Osborne Media;
1 edition (February 14, 2008)
2. 70-642:Windows Server 2008 Network Infrastructure Configuration (MOC) from John Wiley & Sons,
2009
3. 70-643: Windows Server 2008 Applications Infrastructure Configuration Textbook (MOC) from John
Wiley & Sons, 2010
Reference Books:
1. Windows Server 2008: the definitive guide By Jonathan Hassell, O’Reilly, 2008
2. MCTS: Windows Server 2008 Network Infrastructure Configuration Study Guide By William Panek,
T lor Wentworth, James , O’Reilly, 2011
3. MCTS Windows Server 2008 Applications Infrastructure Configuration Study. By Joel Stidley, Sybex,
2010
Page 18
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Linux RHCE
Course Code: 13MTIM202 Total Lecture Hours: 15
Module - I: Introduction and installation of Linux 3Hrs
Linux Ideas and History , Open source information , Linux Origin , Linux Usage basics , Linux Principles ,
virtual console and graphical environment , X windows , Logging into Linux system , Redhat Distributions
, Linux installation
Module - II: Basic Management of Linux Operating System 3 Hrs
Getting help , cal , date , browsing file system , pwd , ls , cd, cp , md , absolute and relative path names ,
important directories of linux , creating users and groups , managing permission by numeric and
symbolic method , changing ownership , default permissions , umask , configuring bash shell ,history
tricks , gnome terminal , standard i/o pipes , error redirection , tee , tools for extracting-analyzing and
manipulating text data , vi & vim
Module - III: Network configuration, managing processes with Linux 3 Hrs
Network and printer settings , sending text to printers , device activation , DNS configuration , Default
Gateway , IP configuration ,web clients , mail clients , ftp clients , ssh , scp , rsync , network diagnosis
tools , introduction to process , ps , signals , fg&bg , nice , top , scheduling techniques , setting up ipv6
Module - IV: Advance configuration in users, groups and permissions, file system in depth with Linux.
3 Hrs
Special permissions ,uid&gid , suid , sgid , sticky bit , important files for users configurations ,
monitoring logins , Locate , find , gnome search tools , inode , hardlink & softlink , fundamental file types
, mounting devices , nfs , swap , fstab, /etc/export , direct map , auto mounting , archive-compress tools
with linux , lvm , quota , raid.
Module - V: System initialization, package management and system services with Linux 3 Hrs
Boot sequence , grub , init role , system v services controls , rpm , yum , ntp , system logging , remote
administration of system , anacron ,
Security, virtualization, remote installation and troubleshooting with Linux
Setfacl , getfacl , selinux , enabling and disabling firewall , xen introduction , configuring virtual machine
with linux , kick start , initrd , grub , password , /etc/shadow , runlevel , rescue
Page 19
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Text Books:
1. Red hat Linux Administration By Michael Turner and Steve Shah-McGraw-Hill Companies, Inc
Publisher, 2010
2. Redhat Fedora linux for Dummies By Naba Barkakati-Wiley Publishing, Inc, 2011
Reference Book:
1. RHCSA/RHCE Red Hat Linux Certification Study Guide (Exams EX200 & EX300), 6th Edition
(Certification Press) [Paperback], Michael Jang, McGraw-Hill Osborne Media; 6 edition (June 17,
2011)
Page 20
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Principles of Virtualization
Course Code: 13MTIM203 Total Lecture Hours: 15
Module - I: Introduction 3 Hrs
What is Virtualization?, Why You Need Virtualization ?,Understanding Virtualization Technologies
:Server Virtualization, Hardware emulation ,Storage Virtualization ,Network-attached storage ,Storage
area networks ,I/O Virtualization ,Network Virtualization, Client Virtualization ,Application virtualization
,Desktop virtualization Understanding Virtualization Use Cases: Studying Server Consolidation,
Development and Test Environments ,Quality of Service ,Simple failover High availability, Clustering
,Data mirroring ,Data replication, IT Operational Flexibility ,Load balancing ,Server pooling ,Helping with
Disaster Recovery ,Rethinking Virtualization in Business Terms :Rethinking Infrastructure Virtualization
,Rethinking Applications and IT Operations Management ,Rethinking Client Virtualization, Benefits of
Virtualization
Module - II: Introduction to VMware Virtualization 3 Hrs
Introduce virtualization, virtual machines, and vSphere components, Explain the concepts of server,
network, and storage virtualization, Describe where vSphere fits into the cloud architecture, Install and
use vSphere user interfaces, Create Virtual Machine VMware vCenter Server: Introduction to vCenter
Server architecture and appliance , Virtual Machine Management :Deploy virtual machines using
templates and cloning, Modify and manage virtual machines, Create and manage virtual machine
snapshots, Perform VMware vSphere® vMotion® and Storage vMotion migrations, Create a
vSpherevApp
Module - III: Access and Authentication Control 3 Hrs
Control user access through roles and permissions, Configure and manage the ESXi firewall, Configure
ESXi lockdown mode, Integrate ESXi with Active Directory, Introduce VMware vShield Zones.
Module - IV: Installing VMware Components 3 Hrs
Introduce ESXi installation, Describe boot from SAN requirements, Introduce vCenter Server deployment
options, Describe vCenter Server hardware, software, and database requirements, Install vCenter Server
(Windows based)
Module - V: Implement and configure Window server 2008 Hyper V 3 Hrs
Configure Hyper V Virtual Networking, Configure and use Hyper V remote administration, Create and
configure Virtual Hard Drives, Use Virtual Machine snapshots, Describe considerations for configuring
Hyper-V servers for high availability, Monitor the performance of a Hyper-V server, use existing virtual
machines with Hyper-V server, understand issues with migrating existing virtual machines to Hyper-V,
Understand system center Virtual Machine Manager (VMM) features and use VMM to manage virtual
machines, Manage a VMM Library, Manage VMM checkpoint.
Page 21
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Text Books:
1. Virtualization: a beginner's guide - Danielle Ruest, Nelson Ruest , McGraw-Hill Prof Med, 2010
2. Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor By John Kelbley, Mike
Sterling, Allen Stewart, Sybex; 1 edition (April 20, 2009)
Reference Books:
1. Virtualization for Dummies - Bernard Golden, For Dummies; 1 edition (December 5, 2007)
2. Mastering Microsoft Virtualization - Tim Cerling, Jeffrey Buller, Jeffrey L. Buller, Sybex; 1 edition
(December 21, 2009)
Page 22
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Programming with C
Course Code: 13MTIM204 Total Lecture Hours: 15
Module - I: Elements of C Language 3 Hrs
Origin of C, Features & Characteristic of C, C Compiler, Character Set, Keywords, Identifiers, Constants,
Variables, Input/ Output Statements, Basic Data Types, Operators and Expressions, Tools for Problem
Solving: Problem Analysis, Flowchart, Algorithm Development. Top-Down Program Design, Structured
Design Approach, Basic structure of C programs, A simple C Program.
Module - II: Control Flow Construction 3 Hrs
Decision making and branching: Simple if statement, if else statement, Nesting of it. Else statement,
else. If Ladder, switch statement, ?: operator, goto statement. Decision making and looping: while
statement, do. While statement, for statement, jumps in loops, break and continue statement.
Module - III: Defining and Manipulating Arrays 3 Hrs
One- Dimensional Arrays: Declaration of Arrays, Initialization of Arrays, Reading and Writing of integer,
real and character arrays, sorting and searching in Arrays, Multi-Dimensional Arrays, and Handling of
Character Strings.
Module - IV: User Defined Functions 3 Hrs
Syntax of Function, Calling functions, Actual & Formal Arguments, Categories of Functions, Function
prototype, Scope Rules: Local & Global variables, Recursion, Recursion vs. iteration, Passing Arguments:
call by values & call by reference, Passing array to function. Structures: Declaration and initialization of
structures, Array of structures, Array within structure, structure within structure, Structures and
functions, Introduction to unions.
Module - V: Pointer Data type and its Application 3 Hrs
Pointer Operator, Pointer Expression, Initialization pointers, Pointer Arithmetic, Pointer and Function
Arguments, Pointer to function, Pointer and Arrays, Pointers and String, Arrays of Pointers, Pointers to
Pointers. Files in C: Defining and opening a file, closing a file, input/ Output operations on files, error
handling during I/O operations, random access to files.
Text Books:
1. ANSI C programming By Balaguru swami, Tata Mc-Graw Hill, 2010
Reference Books:
1. C for Dummies by: DanGookin-Wiley Publishing, 2010
2. C++ for Dummies By Stephen Randy Davis-Wiley Publishing, Inc, 2009
Page 23
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Designing Enterprise Networks II
Course Code: 13MTIM205 Total Lecture Hours: 15
Module - I: Enterprise Network Fundamentals 3 Hrs
Describe the Methodology used to design a network, Describe developing business trends, Identify
Network Requirements to Support the Organization, Describe the tools/process to characterize an
existing network, Describe the top down approach to network design, Describe Network Management
Protocols and Features, Describe network structure and modularity: Describe the Network Hierarchy,
Describe the Modular Approach in Network Design, Describe network architecture for the enterprise.
Module - II: Designing Basic Enterprise Campus Networks 3 Hrs
Describe Campus Design considerations, Design the Enterprise Campus Network, Design the enterprise
data center, Describe enterprise network virtualization tools, Design Enterprise Edge and Remote
Network Units: Describe the Enterprise Edge, branch, and Teleworker design characteristics, Describe
physical and logical.
Module - III: WAN 3 Hrs
WAN connectivity, Design the branch office WAN solutions, Describe Access Network solutions for a
remote worker, Design the WAN to support selected redundancy methodologies, Identify Design
Considerations for a Remote Data Center.
Module - IV: Designing IP Addressing and Routing Protocols 3 Hrs
Describe IPv4 Addressing, Describe IPv6 Addressing, Identify Routing Protocol Considerations in an
Enterprise Network, Design a Routing Protocol Deployment
Module - V: Designing network services 3 Hrs
Describe the security lifecycle, Identify Cisco technologies to mitigate security vulnerabilities, Select
appropriate Cisco security solutions and deployment placement, Describe high level voice and video
architectures, Identify the design considerations for voice/video services, Describe Cisco Unified
Wireless Network Architectures and Features, Design wireless network using controllers
Text Book:
1. CCDA self-study: CCDA exam certification guide, By A. Anthony Bruno, Jacqueline Kim, Cisco Press,
2010
Reference Books:
1. CCDA self-study: designing For Cisco Internetwork Solutions (DESGN)Diane Teare, Cisco Press, 2010
2. CCDA: Cisco certified design associate study guide, By Todd Lammle, Andy Barkl, Sybex, 2010
3. CCDA Cisco Certified Design Associate By Todd Lammle, Donald Porter, Sybex, 2009
4. Enterprise Networks and Logistics for Agile Manufacturing By Lihui Wang, Springer Publication,
2010.
Page 24
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Elective I
Concepts of Open Source Scripting Languages
Course Code: 13MTIM206E1 Total Lecture Hours: 45
Module - I: Introduction to PHP 8 Hrs
PHP: Introduction to Web Technology, HTML, Basic Tags, CSS, Table and Forms , Introduction to
JavaScript, Variables, Operators, Data Type Conversions, functions, Control Structure, Date Time
functions and Form Manipulation. MYSQL – Introduction about Database, Data Types, DML, DDL,
Aggregate functions, Data Time functions, Stored Procedure, Sub query and join, PHP-Introduction to
PHP, History, Web Brower, Web Server, Xampp, Installation and Configuration files, Syntax, Operators,
Variables, Constants, Control, Structure, Language construct and functions
Module - II: Functions and Syntax 7 Hrs
Function – Syntax, Arguments, Variables, References, Returns and Variable Scope , Arrays-Enumerated
Arrays, Associative array, array, iteration, Multi-dimensional array, Array function and SPL, Date and
Time functions, OOP’s – Instantiation, Modifiers, Inheritance, Interfaces, Exceptions, Static Methods and
Properties, Auto load, Reflection, Type Hinting and Class Constance,
Module - III: String and Patterns 10 Hrs
Quoting, Matching, Extracting, Searching, Replacing and Formatting, Web Features- Sessions, Forms,
GET and POST data, Cookies, HTTP Headers. Database Programming, Streams and Network
Programming- Files, Reading, Writing, File System functions, Streams File Uploading and File
Downloading.
Module - IV: Unix & Linux Shell Scripting 10 Hrs
Introduction to Unix/Linux Login, Logging into the system, Editor , The File System , FS commands and
Permissions Useful Commands of Unix/Linux , Useful Commands of Unix/Linux, Utilities, Advance Shell
Scripting Using TheBash/Sh/ksh, Working with ksh / bash Korn Shell Scripts / Bash Shell Scripts , Korn
Shell Scripts , Bash Shell Scripts.
Module - V: Python 10 Hrs
Introduction and Installation Python , First Steps, The Basics, Operators and Expressions , The Control
Flow, Functions , Units, Data Structures, Problem Solving- Writing Python Script, Object Oriented
programming, Input / Output , The Python Standard Library.
Text Books:
1. PHP: a beginner's guide by Vikram Vaswani, Wiley, 2010
2. Linux Command Line and Shell Scripting Bible Richard Blum, Christine Bresnahan, O’Reilly, 2010
3. Learning Python by Mark Lutz,O’Reilly, 2009
Page 25
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Reference Books:
1. PHP: The Complete Reference Steven Holzner, Sybex, 2009
2. Pro Bash Programming: Scripting the GNU/Linux Shell By Chris F. A. Johnson, O’Reilly, 2010
3. Python: Programming Fundamentals by Kent D. Lee, O’Reilly, 2008
Page 26
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Elective I
Introduction to DBMS
Course Code: 13MTIM206E2 Total Lecture Hours: 45
Module - I: Introduction to data base 8 Hrs
Advantages of DBMS, Type of Data Models, Schema and instances, DBMS Architecture and Data
Independence, Entity- Relationship Model, Attributes and Keys, Relationship Types, Weak Entity set,
Strong Entity Set, Enhanced E–R Modeling, Specialization and Generalization, Record Storage and
Primary File Organizations: Introduction, Secondary Storage Devices, Buffering of Blocks, Structure of
Files: Types of Single –Level ordered indexes, Multilevel indexes, Dynamics Multilevel indexes using B-
trees and B+- Trees.
Module - II: the Relational data model 7 Hrs
Relational data model concepts, constraints, relational algebra, relational calculus, Tuple relational
calculus SQL: DDL, DML, DCL, Types of constraints, Defining different constraints on a table, Defining &
Dropping integrity constraints in the alter table command, View, Index.
Module - III: Database design 10 Hrs
Functional Dependencies and Normalization for Relational Databases: Informal design guidelines for
relation schemes, Functional dependencies, Normal forms based on primary keys, General definitions of
second and third normal forms, Boyce- Codd normal form, problem related with normal forms &
solutions. Multivalued & Join Dependencies, 4th & 5thNormalization.
Introduction to Database Management
Define Database and its fundamentals, Learn the oracle database 10g architecture, Learn the basic
oracle database 10g data types, Work with tables, Work with stored objects, Indexes, Roles, Table space
quotas, Synonyms, Users , Work with Object and System privileges , Introduction to grid.
Module - IV: Application Programming with database 10 Hrs
Introduction to Joomla, Installation and configuration ,Front end Backend Administrative function, Site
Menu/Help Menu/Menu manager, Managing Content, Components and Modules, Forums, comments
and calendar, Image gallery and document Management
Module - V: My SQL Database 10 Hrs
Installation and Up gradation to MYSQL, MySQL Architecture, Invoking MySQL through Command Line,
MySQL Server Start and Stop, Defining a Database, Creating Tables and Fields in MySQL, Overview of
Data Types in MySQL, Introduction to SQL, Executing DDL and DML Queries, Grouping and Aggregate
Functions, SubQueries, Date and Utility Functions, Triggers and Stored Procedures
Transaction Management
Concurrency Control-Lost Updates- Uncommitted Data- Inconsistent Retrievals-The Scheduler-
Concurrency Control with Locking Methods – Concurrency Control with Time Stamping- Concurrency
Control with Optimistic Methods- Database Recovery Management. Introduction to object oriented
databases, Active databases, Data warehouses – Data mining
Page 27
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Interactive SQL: Introduction to SQL, Logging into SQL *Plus, Naming rules and Conventions, Data Types,
Constraints, DDL, DML, DCL, TCL, DQL(Select Clause) Create, Alter, Drop, Rename on table structure,
Insert, Update and Delete Operation on table, Select Clause. Functions, Group by and Having Clause,
Group by using cube and rollup operator, Exist and Not Exist Operator, Sub Query, Different types of
Joins, set Operators, Index, View, Sequence, Spooling, Setting Environment Using SET Command, Paging,
Cluster and Snapshots.
Text Books:
• Oracle 10G beginners guide, Ian Abramson, Michael Corey, Michael S. Abbey, Michael S. Abbey,
Michael Corey, Barns and Noble, 2010
• Oracle 10g Data Warehousing, Lilian Hobbs, Susan Hillson, Shilpa Lawande, Pete Smith, Google
Ebook, Elsevier Publishing, 2011
Reference Book:
• Database Management Systems, Raghu Ramakrishnan, McGraw-Hill Education, 2010
Page 28
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Semester III
Linux Administration
Course Code: 13MTIM301 Total Lecture Hours: 30
Module - I: System Performance-Security-Service Access Control-Network Resource Access Control in
Redhat Linux 10 Hrs
Goals , Security Domains , System Faults , System Faults Analysis Methods , Benefit of maintaining
system state , Networking-data storage and processing resource concerns , Log file analysis ,
Understanding service management , Service configuration resources , Implement Access Control ,
Selinux Overview , SELinux management , IP and IP routing , Compare IPv4 and IPv6 , Netfilter
architecture , iptables , NAT
Module - II: Organizing Network System, NFS, SAMBA, Web Services in Redhat Linux 10 Hrs
Host name resolutions , verification of DNS server operation , BIND DNS configuration , DHCP Overview ,
DHCP configuration , Describe FTP service , Network File Sharing , Samba Service , client tool with each
service , features of Apache HTTP server , configure important Apache parameters , per-directory
configuration , CGI use with Apache , Identify key modules , Introduction to proxy web servers
Module - III: Mail Services, Securing Data, Account Management with Redhat Linux 10 Hrs
Understanding email Operations , Basic configuration of mail server , configuring proc mail – dovecot ,
Debug email services , Fundamental of encryption protocols encryptions with redhatlinux , configure
encryption services for common networking protocols , basics of authentication , Understanding the
Roles of NSS and PAM
Text Books:
1. Linux Bible By: Christopher Negus- Wiley Publishing, Inc, 2010.
2. Redhat Linux Networking and System Admin By: Terry Collings and Kurt Wall-M&T Books, 2009.
Reference Books:
1. UNIX and Linux System Administration Handbook (4th Edition), Evi Nemeth, Garth Snyder, Trent R.
Hein, Ben Whaley, Prentice Hall; 4th edition (July 24, 2010)
2. Linux Administration A Beginners Guide 6/E, Wale Soyinka, McGraw-Hill Osborne Media; 6 edition
(February 21, 2012)
Lab Experiments for Linux Administration:
1. Configure your system such that SE Linux must be in enforcing mode and firewall is enables and ssh
service is not allowed through your firewall.
Page 29
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
2. Configure ftp server such that anonymous can download and upload the data to ftp server. Deny
users John and Carel to access the ftp server. Note that your ftp server must be accessible in your
private network only. It can’t be accessible in another network.
3. Create a RAID level 1 on /dev/md0 device by creating two equal partitions of 100MB size and mount
it on /data. The RAID device must be mounted at the time of system startup.
4. Configure LVM in volume group named volgrp by creating 2 partitions of 100MB size and mount it
on /exam directory. The initial size of LVM is approximately 40MB and after extending the size of
LVM is 80MB.
5. Configure a NIS domain RHCE.COM for user authentication on server.example.com. Note the
following:
a. Nisuser should be able to log into client.example.com but will not have a home directory
until you have completed the autofs requirements.
b. NIS user has a password of password.
c. Configure autofs on client.example.com to auto mount the home directories of NIS users
where nisuser’s home directory is server.example.com:/rhome/server/nisuser.
d. nisuser’s home directory should be auto mounted on client.example.com on /rhome.
6. Configure the DHCP server such that your DHCP server will able to provide IP configuration to 65
systems in your network.
7. Configure the station as NFS server such that /share directory is shared & only accessible in your
network. This NFS share should be automatically mounted on remote client using autofs. On remote
client system, NFS share should be mounted on /data/share directory.
8. Configure stationx.example.com for quota such that when user neo type
dd if=/dev/zero of=/quota/somefile bs=1024 count=30, he succeed. When he type
dd if=/dev/zero of=/quota/somefile bs=1024 count=70 he fails.
9. Implement a stationx.example.com as a web server for the site http://wwwx.rhce.com, then
perform the following steps:
a. Download ftp://server.rhce.com/pub/rhce/station.html.
b. Rename the downloaded file to index.html.
c. Copy this index.html to the Document Root of your web server.
d. Do not make any modification to the content of index.html.
e. Extend your web server to include a virtual host for the site http://wwwy.rhce.com/.
f. Set the Document Root to /var/www/virtual for this virtual host.
g. Download ftp://server.rhce.com/pub/rhce/www.html.
h. Rename the downloaded file to index.html and place it to the DocumentRoot of the virual
host. Don’t change the contents of index.html.
Page 30
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
10. Configure the sendmail server for your local LAN. As well as the mail of user john should get by the
jane user. If any mail coming from outside of the local LAN block all mails.
11. Configure the system to allow the pop3 and imap connection from your domain and deny all other
domains.
12. Configure the DNS for rhce.com domain, where 192.168.0.20 is associated IP for www and NS is
192.168.0.254.
13. There are systems running on Linux as well as windows os. Some users are working on windows os.
Your printer is connected on linux server and you want to share the printer using samba so that
users working on windows also can print. Configure samba server to share printer.
14. Share the internet using squid for your local LAN. Proxy server should be run on 8080 port. Using
squid block internet to 192.168.1.0/24 network and allow to 192.168.0.0/24 network. Also block the
msn.com site.
15. Ssh service is enabled in your server. Your LAN is connected to WAN also. Configure to match
following conditions:
a. Deny the ssh from outside your domain.
b. If any denied host tried for ssh then send the information through mail with clients
information.
Page 31
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Object Oriented Programming with C++
Course Code: 13MTIM302 Total Lecture Hours: 15
Module - I: Introduction 2.5 Hrs
Basic concepts of OOP, Benefits of OOP, Object Oriented Language, Structure of C++ Program, Compiling
& Linking, Operators & Expressions, Looping concepts, Arrays & Structures, functions.
Module - II: Classes & Object 2.5 Hrs
Specifying a class, Define member function, Scope of class and its member, Nested Class, Data hiding &
encapsulation, Friend function, Array within a class, array of object as function argument, function
returning object, static member.
Overview of C language, History of C, Features of C language, C Structure, Execution of C program,
Compiler and Interpreter, Literals, Variable s in C, Data Types in C, Operators in C language, Basic
Programs in C.
Module - III: Constructors and Destructors 2.5Hrs
Constructor function, parameterized multiple constructor, default constructor, copy constructor, const
and class, Data conversion between objects of different classes, Destructor function, Polymorphism,
function overloading, Operator overloading.
Module - IV: Inheritance, Pointer & Virtual function 2.5 Hrs
Define derived classes, single inheritance, multilevel inheritance, Hierarchical inheritance, Hybrid
Inheritance, Pointers to objects, this pointer, Pointers to derived class, Virtual function, Pure Virtual
function, Abstract classes.
Module - V: File I/O & Templates 5 Hrs
Files streams, opening & closing a file, read () & write () functions, detecting end-of-file, seekp(), seekg(),
tellg(), tellp()function. Introduction to Templates & Exception, Creating and handling Templates and
Exception in OOP.
Text Books:
1. Object Oriented Programming With C++, E. Balaguruswamy, Tata McGraw Hill Publications, 2008
Reference Books:
1. C++ Programming Fundamentals, Chuck Easttom, Charles River Media, 2011
2. Object Oriented Programming With C++, David Parsons, Continuum Books, 2002
Lab Experiments for Object Oriented Programming Lab
1. Write a C++ program to find the sum of individual digits of a positive integer.
Page 32
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
2. A Fibonacci sequence is defined as follows: the first and second terms in the sequence are 0 and
1.Subsequent terms are found by adding the preceding two terms in the sequence. Write a C++
program to generate the first n terms of the sequence.
3. Write a C++ program to generate all the prime numbers between 1 and n , where n is a value
supplied by the user.
4. Write C++ programs that use both recursive and non-recursive functions
a. To find the factorial of a given integer.
b. To find the GCD of two given integers.
c. To find the nth Fibonacci number.
5. Write a C++ program that uses a recursive function for solving Towers of Hanoi problem.
6. Write a C++ program that uses functions
a) To swap two integers.
b) To swap two characters.
c) To swap two reals. Note: Use overloaded functions.
7. Write a C++ program to find both the largest and smallest number in a list of integers.
8. Write a C++ program to sort a list of numbers in ascending order.
9. Write a C++ program that uses function templates to solve problems-7&8.
10. Write a C++ program to sort a list of names in ascending order.
11. Write a C++ program to implement the matrix ADT using a class. The operations supported by this
ADT are:
a) Reading a matrix.
c) Addition of matrices.
b) Printing a matrix.
d) Subtraction of matrices.
e) Multiplication of matrices.
12. Implement the matrix ADT presented in the problem-11 using overloaded operators (<<, >>, +, -, *)
and templates.
13. Implement the complex number ADT in C++ using a class. The complex ADT is used to represent
complex numbers of the form c=a+ib, where a and b are real numbers. The operations supported by
this ADT are:
a) Reading a complex number. d) Subtraction of complex numbers.
b) Writing a complex number. e) Multiplication of complex numbers.
c) Addition of Complex numbers. f) Division of complex numbers.
14. Write a C++ program that overloads the + operator and relational operators (suitable) to perform
the following operations:
a) Concatenation of two strings.
b) Comparison of two strings.
15. Implement the complex number ADT in C++ using a class. The complex ADT is used to represent
complex numbers of the form c=a+ib, where a and b are real numbers. The operations supported by
Page 33
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
this ADT are:
a) Reading a complex number.
b) Writing a complex number.
c) Addition of Complex numbers.
d) Subtraction of complex numbers.
e) Multiplication of complex numbers.
f) Division of complex numbers.
Note: 1. overload << & >> operators in part a and part b.
2. overload +, - , *, / operators in parts c, d, e and f.
16. Write a template based C++ program that determines if a particular value occurs in an array of
values.
17. Write a C++ program that uses functions to perform the following operations to:
a) Insert a sub-string in to the given main string from a given position.
b) Delete n characters from a given position in a given string.
18. Write a C++ program that uses a function to reverse the given character string in place, without any
duplication of characters.
19. Write a C++ program to make the frequency count of letters in a given text.
20. Write a C++ program to count the lines, words and characters in a given text.
Page 34
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
ITIL AND HPSM/MICROSOFT SM
Course Code: 13MTIM303 Total Lecture Hours: 45
Module - I: ITIL Overview 8 Hrs
ITIL History, Components of the ITIL Library, IT Service Management ,Organizing for IT Service
Management, Technology and Architecture , Service Strategy : Service Strategy Lifecycle Stage, Service
Portfolio Management, The Demand Management Process, The IT Financial Management Process ,
Service Design : Service Design Lifecycle Stage, The Service Catalog Management Process, The Service
Level Management Process, The Availability Management Process, The Capacity Management Process,
The Information Security, Management Process, The IT Service Continuity, Management Process, The
Supplier Management Process.
Module - II: Service Transition 7 Hrs
Service Transition Lifecycle Stage, The Change Management Process, The Release and Deployment,
Management Process, The Service Asset and Configuration, Management Process, Knowledge
Management ,Service Operation Functions : Service Operation Lifecycle Stage, The Service Desk
Function, The Technical Management Function, The Application Management Function, The IT
Operations Management Function Service Operation Processes :The Event Management Process, The
Incident Management Process, The Request Fulfillment Process, The Access Management Process, The
Problem Management Process ,Continual Service Improvement :Continual Service Improvement,
Lifecycle Stage.
Module - III: Introduction to Service Manager 10 Hrs
Why IT organizations are turning to service management, How Service Manager fits in the ITSM
portfolio, Benefits of using Service Manager, Service Manager workflow – Roles and Responsibilities,
Multilanguage support and localization, Installing Service Manager: Understanding the Service Manager
architecture, Installing the Service Manager database, Installing the Service Manager server, Installing
the Service Manager client, Installing the Service Manager help, Installing the Service Manager web
client and self-service client, Troubleshooting the installation, Logging On and Navigating Service
Manager: Logging onto the Service Manager client and web interfaces as system administrator,
Comparing Service Manager client interface and web interface, Accessing the To Do list, favorites and
dashboard views, the Service Manager client interface, the Service Manager interface, Exporting to Excel
or Text files, Using the Service Manager help system, Service Manager Processes, goals for each of the
Service Manager components, features for Service Manager components, benefits for Service Manager
components, process flows, Embedded Best Practices, the workflows, interoperability among the
Service Manager Units, Operator Records, Roles, and Profiles: Connections among operator records,
roles, and profiles, Adding connections to Service Manager for different operators, Adding access rights
to user roles, how menus are mapped to user roles, different types of profiles, Creating and editing
profiles, Creating a user role, Defining and applying Security Folders, Approvals and Approval
Delegations, Define approvals and approval groups, Delegate approval authority to another group or
Page 35
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
operator, Configuration Management Unit: Configuring the Configuration Management Unit, Changing
Device Types, baselines and baseline versioning, Setting Environment Records, Using supporting table
Module - IV: Configuring the Service Desk Unit 10 Hrs
Configuring the Service Desk Unit, supporting tables, Setting Environment Records, Using templates to
populate interaction records, Using popup forms, Using smart indicators, Configuring the Incident
Management :Configuring the Incident Management ,Using supporting tables, Setting Environment
Records, Using Templates, Creating new area and subarea categories, Configuring the Problem
Management: Configuring the Problem Management Unit, Using supporting tables, Setting Environment
Records, alerts and alert notifications,
Module - V: Configuring the Scheduled Maintenance 10 Hrs
Configuring the Scheduled Maintenance, tasks for implementing Scheduled Maintenance, Configuring
the Change Management: the Change Management Unit, Setting Environment Records, Using
supporting tables, a change category, Configuring the Service Catalog: Configuring the Service Catalog,
the Service Catalog, Delivery Objectives, Configuring System Wide Configurations: functions of the
System Information Record, functions of the login. DEFAULT format control record, Administering
Service Manager: folder entitlement, calendars and work schedules, Purging and archiving records,
Moving from development to production environment.
Text Books:
1. Introduction to ITIL, Jan van Bon Stationery Office Books, The Stationery Office, 2010
2. HP operation Manual from HP, 2010
Reference Books:
1. A Guide to Service Desk Concepts Donna Knapp From Cengage Learning, 2010
2. The Shortcut Guide to Virtualization and Service Automation, Greg Shield Real-time Publishers,
2008
3. Service automation and dynamic provisioning techniques in IP/MPLS environments - Christian
Jacquenet, Gilles Bourdon, Mohamed Boucadair John Wiley and Sons, 2008
4. It Service Desk: What You Need To Know For It Operations Management Michael, Johnson
Tebbo, 2010
5. Help Desk, Service Desk Best Practice Handbook: Building, Running and Managing Effective
Support - Ready to Use Supporting Documents Bringing ITIL Theory Into Practice Gerard Blokdijk,
Ivanka Menken Emereo Pvt. Ltd, 2009
6. ITIL V3 Foundation Complete Certification Kit - Study Guide Book and Online, By Tim Malone,
Michael Wedemeyer, Gerard Blokdijk Lulu.com, 2008
7. The Shortcut Guide to Improving IT Service Support Through ITIL , Rebecca Herold
Realtimepublishers.com, 2009
8. The official introduction to the ITIL service lifecycle By OGC - Office of Government
Commerce The Stationery Office, 2010
Page 36
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
The Lab Experiments for ITIL and HPSM/ Microsoft SM are:
Basic Utilities and Tools
1.1 Data Policy
1.1.1 Access datapolicy
1.1.2 Modify the data policy record to filter data
1.1.3 Verify data policy changes
1.2 Database Manager
1.2.1 Access the database manager utility
1.2.2 Delete a record
1.2.3 Creating new operator
1.2.4 Add a new record to a table
1.2.5 Modify an existing record
1.2.6 Loading and unloading records
1.3 Forms designer
1.3.1 Field comparisons
1.3.2 Field value matching
1.3.3 Dynamic functions
1.3.4 Using select () function
1.3.5 Using DVD (Dynamic View Dependancies)
1.4 Links and Virtual Links
1.4.1 Accessing the Link record
1.4.2 Linking records between tables
1.4.3 Find function
1.4.4 Fill function
1.4.5 Format control
1.4.6 Configuring virtual joins, subforms,master forms
1.4.7 Configuring Links for Virtual Joins
1.4.8 Accessing views and favorites
1.4.9 Creating new View, modifying view
1.4.10 Analyzing User Profile
1.4.11 Modifying Queues and Views
1.5 Menus and MYSM
1.5.1 Creating menu
1.5.2 Enabling MySM Pages
1.5.2 Configuring a New MySM page
1.6 Document Engine
1.6.1 Navigating the Escalate Process in the Document Engine
1.7 Display Application
1.7.1 Analyzing the functionality of the Display Applications
1.8 Wizard
1.8.1 Running wizard.run
Page 37
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
1.8.2 File selection Tab, Usage tab, actions to Perform
1.8.3 Wizards functionality Quick Add Utility
1.9 Notifications and Alerts
1.9.1 Accessing the Notification Engine from the Object record
Page 38
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Introduction to Cloud Computing
Course Code: 13MTIM304 Total Lecture Hours: 60
Module - I: Introduction to Cloud Computing 12 Hrs
Defining cloud computing, Components of a computing cloud, Differentiating types of clouds: public,
private, hybrid Delivering services from the cloud: Categorizing service types, Comparing vendor cloud
products: Amazon, Google, Microsoft and others Adopting the Cloud
Module - II: Key drivers of cloud computing solutions 12 Hrs
Instantaneous provisioning of computing resources, Handling varied loads with elasticity and seamless
scalability, Tapping into an infinite storage capacity, Cost-effective pay-as-you-use billing models
Evaluating barriers to cloud computing: Handling sensitive data, Aspects of cloud security, Assessing
governance solutions
Module - III: Exploiting Software as a Service 11 Hrs
Characterizing SaaS: Minimizing the need for local hardware and software, Streamlining administration
with centralized installation and updates, Optimizing cost and performance with the ability to scale on
demand Comparing service scenarios: Improving collaboration with business productivity tools
Module - IV: Web Services 13 Hrs
Simplifying business process creation by integrating existing components Inspecting SaaS technologies:
Deploying Web applications Implementing Web services: SOAP, REST, Choosing a development
platform.
Module - V: Platform as a Service (PaaS) 12 Hrs
Delivering Platform as a Service (PaaS) Exploring the technical foundation for PaaS : Specifying the
components of PaaS, Analyzing vendor PaaS provisions , Selecting an appropriate implementation
Text Book:
1. Cloud Computing: Principles and Paradigms, Rajkumar Buyya, James Broberg, Andrzej M. Goscinski,,
John Wiley and Sons Publications, 2011
Reference Books:
1. Brief Guide to Cloud Computing, Christopher Barnett, Constable & Robinson Limited, 2010
2. Handbook on Cloud Computing, Borivoje Furht, Armando Escalante, Springer, 2010
Page 39
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Elective II
Advanced Information Security
Course Code: 13MTIM305E1 Total Lecture Hours: 45
Module - I : Introduction 8 Hrs
Introduction to Ethical Hacking, Foot printing and Reconnaissance
Module - II: Introduction to System Hacking 10 Hrs
Scanning Networks, System Hacking
Module - III: Trojans 10 Hrs
Trojans and Backdoors, Viruses and Worms
Module - IV: Social Engineering and Phishing Attacks 7 Hrs
Social Engineering, Denial of Service, Phishing
Module - V: Cryptography and Cyber Laws 10 Hrs
Cryptography, Penetration Testing, Cyber Laws
Text Book:
• Information Systems Security: Security Management, Metrics, Frameworks And Best Practices - Nina
Godbole, ISC2 Press, 2010
Reference Book:
• Information Security Management Handbook, Volume 4 - Micki Krause, ISC2 Press, 2007
Lab Experiments for Advanced Information Security
1. Working with Sniffers for monitoring network communication (Ethereal).
2. Understanding of cryptographic algorithms and implementation of the same in c or c++.
3. Using open ssl for web server browser communication.
4. Using GNU PGP.
5. Performance evaluation of various cryptographic algorithms.
6. Using IP TABLES on Linux and setting the filtering rules.
7. Configuring S/MIME for email communication
8. Using NMAP for ports monitoring.
9. Understanding the buffer overflow and format string attacks
Page 40
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
10. Implementation of proxy based security protocols in C or C++ with feathers like confidentiality,
integrity and authentication.
11. Make a detailed Report and ppt on windows registry.
12. Implement various password cracking techniques for breaking system password and make a
report.
Create a live Phishing scenario. Generate a report and ways to avoid this threat.
13. Detailed report on SQL Injection.
14. XSS attack.
15. List Major Indian Cyber Laws and make a PPT.
Page 41
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Elective II
VOIP and Wireless Technologies
Course Code: 13MTIM305E2 Total Lecture Hours: 45
Module - I: VOIP fundamentals 8Hrs
Describe a dial plan, Describe the basic operation and components involved in a VoIP call , Describe VoIP
call flows, RTP, RTCP, cRTP, and sRTP,H.323,MGCP,Skinny Call Control Protocol, SIP, Identify the
appropriate gateway signaling protocol for a given scenario, Choose the appropriate codec for a given
scenario, Describe and Configure VLANs. Implement Cisco Unified Communications Manager Express to
support endpoints using CLI , Describe the appropriate software components needed to support
endpoints, Configure DHCP, NTP and TFTP, Describe the differences between the different types of
ephones and ephone-dns, Configure Cisco Unified Communications Manager Express endpoints
Module - II : Gateway 10Hrs
Describe the function of gateways, Describe DSP functionality, Describe the different types of voice
ports and their usage, Describe dial peers and the gateway call routing process, Describe codecs and
codec complexity Implement a gateway: Configure analog voice ports, Configure digital voice ports,
Configure dial-peers, Configure digit manipulation, Configure calling privileges, Verify dial-plan
implementation, Implement fax support on a gateway Implement Cisco
Module - III: Unified Border Element: 7 Hrs
Describe the Cisco Unified Border Element features and functionality, Configure Cisco Unified Border
Element to provide address hiding, Configure Cisco Unified Border Element to provide protocol and
media interworking, Configure Cisco Unified Border Element to provide call admission control, Verify
Cisco Unified Border Element configuration and operation
Module IV: Implementing QoS for voice and video : 10Hrs
Describe causes of voice and video quality issues, Describe how to resolve voice and video quality issues,
Describe QoS requirements for voice and video traffic Describe and configure the DiffServQoS model:
Describe the DiffServQoS model, Describe marking based on CoS, DSCP, and IP Precedence, Configure
layer 2 to layer 3 QoS mapping, Describe trust boundaries, Configure trust boundary on Cisco switches,
Describe the operations of the QoS classifications and marking mechanisms, Describe Low Latency
Queuing, Describe the operations of the QoS WAN Link Efficiency mechanisms, Enable QoS mechanisms
on switches using AutoQoS, Configure Low Latency Queuing
Module - V: WLAN fundamentals 10Hrs
Install a basic Cisco wireless LAN, Install Wireless Clients, Implement basic WLAN Security, Operate basic
WCS.
Page 42
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Text Books:
• Voice over IPv6: architectures for next generation VoIP networks, Daniel Minoli, John Wiley and
Sons 2009
• Handbook Of Wireless Networks & Mobile Computing , Stojmenovic, John Wiley and sons
Publications, 2010
Reference Books:
• Wireless and mobile data networks , Aftab Ahmad, John Wiley and sons Publications, 2010
• Ad-hoc, mobile, and wireless networks, Violet R. Syrotiuk, Edgar Chávez - Technology &
Engineering Springer, 2009
• Wireless And Mobile Network Architectures By Yi-Bang Lin, Imrich Chlamtac, Wiley Publications,
2008
• The wireless mobile Internet: architectures, protocols and services By Abbas Jamalipour Wiley
Publications, 2009
The Lab Experiments for Implementing the VOIP and Wireless Technologies are:
1. Configuring Analog Interfaces
2. Configuring FXS Ports
3. Configuring FXO Ports
4. Configure CCS (PRI) Settings
5. Configure ISDN Network End
6. Create POTS and VoIP Dial Peers
7. Call Processing, Dial Plans, and Digit Manipulation
8. Configuring the Phone Directory
9. Configuring Call Forwarding
10. Configuring Call Detail Records and Accounting
Page 43
M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)
Project Phase 1
Course Code: 13MTIM306 Total Lecture Hours:
As Per University Norms