COURSE OUTCOMES
Upon completion of this course, the student will be able to
CO1: identify common network security vulnerabilities and attacks (K2).
CO2: apply standard cryptographic algorithms to avoid basic level threats. (K3).
CO3: comprehend the issues involved in hash functions, authentication applications and key management (K2).
CO4: realize the importance of security practice and system security (K2).
CO5: acquire the knowledge of internet security protocols.(K2).
- Teacher: BHUVANESWARI M