Value added courses
- INTRODUCATION
- DIGITAL MARKETING (BASICS)
- BLOCK CHAIN (BASICS)
- ROBOTICS (BASICS)
- QUANTUM COMPUTING (BASICS)
- CYBER SECURITY (BASICS)
- 3D PRINTING (BASICS)
- DIGITAL MARKETING (ADVANCED)
- BLOCK CHAIN (ADVANCED)
- ROBOTICS (ADVANCED)
- QUANTUM COMPUTING (ADVANCED)
- CYBER SECURITY (ADVANCED)
- 3D PRINTING (ADVANCED)
- ETHICAL HACKING
- VIRTUAL REALITY
INTRODUCTION
IT skill based prestigious under graduate programme is BCA, the programme covers rudimentary to advance concepts in Computer Science and its applications in various domains. In broader perspective the mission of teaching BCA is to produce employable IT workforce, that will have sound knowledge of IT and business fundamentals that can be applied to develop and customize solutions for various Corporate Enterprises. An exceptionally broad range of topics covering current trends and technologies in the field of information technology and computer science are included in the syllabus. The hands on sessions in Computer labs using various Programming languages and tools are also given to have a deep conceptual understanding of the topics to widen the horizon of students’ self- experience. The learner, choose BCA Programme to develop the ability to think critically, logically, analytically and to use and apply current technical concepts and practices in the core development of solutions in the multiple domains. The knowledge and skills gained with a degree in Computer Application prepare graduates for a broad range of jobs in education, research, government sector, business sector and industry.
DICT-VAC-02 | DIGITAL MARKETING | Credits:4 |
Pre-Requisites
- Students should have knowledge of online marketing fundamentals and advertising via online media such as print, digital, internet marketing
Objectives
The main objective of this course to make participants understand the online business models and digital marketing methodology from the point of view of consumers, entrepreneurs. Moreover, the course aims at understanding the student’s different techniques of digital marketing so that they can utilize this technique to support organization’s marketing activities
LEARNING Outcomes
On successful completion of the course, the students will be able to:
- Different techniques of promotion on online platforms
- Internet marketing communication techniques
- Interpret the traditional marketing mix within the context of a changing and extended range of digital strategies and tactics.
- Comprehend the importance of conversion and working with digital relationship marketing
GGSIPU UNIVERSITY Syllabus
Detail Contents
|
List of Suggested Books
- 1. Chaffey, D, Ellis-Chadwick, F, Johnston, K. and Mayer, R, (4th Ed.,2009) Internet Marketing: Strategy, Implementation and Practice, Third Edition, Pearson Education, New Delhi.
- Strauss, Judy and Frost, Raymond (6th Ed, 2011), E-Marketing, 5th Edition, PHI Learning, New Delhi.
- Roberts, M, L,.(3rd Ed, 2013) Internet Marketing, 1st Indian Edition, Cengage Learning, New Delhi
- Shainash G, and Jagdish N Sheth (1st Ed, 2008). Customer Relationship Management- A Strategic Perspective, Macmillan India Ltd
DICT-VAC-01 | BLOCK CHAIN (BASICS) | Credits:2 |
Pre-Requisites
- Cryptography Techniques
- Data Structures and Algorithms
- Introduction to Programming
Objectives
The objective of this course is to provide conceptual understanding of how block chain technology can be used to innovate and improve business processes. The course covers the technological underpinning of block Chain operations in both theoretical and practical implementation of solutions using block Chain technology.
Learning Outcomes
At the end of this course, the students will be able to:
- Understand block chain technology.
- Develop block chain based solutions and write smart contract using Hyperledger Fabric and Ethereum frameworks.
- Build and deploy block chain application for on premise and cloud based architecture.
- Integrate ideas from various domains and implement them using block chain technology in different perspectives.
Detail Contents
|
List of Suggested Books
- 1. Melanie Swan, “Block Chain: Blueprint for a New Economy”, O’Reilly, 2015
- Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to Blockchain Technology and Leveraging BlockChain Programming”
- Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017
- Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
- Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization and Smart Contracts Explained”, Packt Publishing
- Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts for Ethereum and Block Chain”, Packt Publishing
- Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O’Dowd, Venkatraman Ramakrishna, “Hands-On Block Chain with Hyperledger: Building Decentralized Applications with Hyperledger Fabric and Composer”, Import, 2018
DICT-VAC-02 | ROBOTICS (BASICS) | Credits:2 |
Pre-Requisites
- Basic Engineering Mathematics
- Automation and Control
Objectives
The objective of this course is to impart knowledge about industrial robots for their control and design.
Learning Outcomes
After the completion of this course, the students will be able to:
- Perform kinematic and dynamic analyses with simulation.
- Design control laws for a robot.
- Integrate mechanical and electrical hardware for a real prototype of robotic device.
- Select a robotic system for given application.
Detail Contents
|
List of Suggested Books
- Saha, S.K., “Introduction to Robotics, 2nd Edition, McGraw-Hill Higher Education, New Delhi, 2014.
- Ghosal, A., “Robotics”, Oxford, New Delhi, 2006.
- Niku Saeed B., “Introduction to Robotics: Analysis, Systems, Applications”, PHI, New Delhi.
- Mittal R.K. and Nagrath I.J., “Robotics and Control”, Tata McGraw Hill.
- Mukherjee S., “Robotics and Automation”, Khanna Publishing House, Delhi.
- Craig, J.J., “Introduction to Robotics: Mechanics and Control”, Pearson, New Delhi, 2009
- Mark W. Spong, Seth Hutchinson, and M. Vidyasagar, “Robot Modelling and Control”, John Wiley and Sons Inc, 2005
- Steve Heath, “Embedded System Design”, 2nd Edition, Newnes, Burlington, 2003
- Merzouki R., Samantaray A.K., Phathak P.M. and Bouamama B. Ould, “Intelligent Mechatronic System: Modeling, Control and Diagnosis”, Springer.
DICT-VAC-03 | QUANTUM COMPUTING (BASICS) | Credits:2 |
Pre-Requisites
- Data Structure and Algorithm.
- Programming in Python/C#
Objectives
The objective of this course is to impart necessary knowledge to the learner so that he/she can develop and implement algorithm and write programs using these algorithm.
Learning Outcomes
At the end of this course, the students will be able to:
- Explain the working of a Quantum Computing program, its architecture and program model.
- Develop quantum logic gate circuits
- Develop quantum algorithm
- Program quantum algorithm on major toolkits
Detail Contents
|
List of Suggested Books
- Michael A. Nielsen, “Quantum Computation and Quantum Information”, Cambridge University Press.
- David McMahon, “Quantum Computing Explained”, Wiley
- IBM Experience https://quantumexperience,ng,bluemix.net
- Microsoft Quantum Development Kit https://www.microsoft.com/en-us/quantum/development-kit
- Forest SDK PyQuil: https://pyquil.readthedocs.io/en/stable/
DICT-VAC-04 | CYBER SECURITY (BASICS) | Credits:2 |
Pre-Requisites
- Basic knowledge of Computers
- Basic knowledge of networking and Internet
- Hands on Windows operating system
Objectives
The course has been designed to give students an extensive overview of cyber security issues, tools and techniques that are critical in solving problems in cyber security domains.The course aims at providing students with concepts of computer security, cryptography, digital money, secure protocols, detection and other security techniques. The course will help students to gauge understanding in essential techniques in protecting Information Systems, IT infrastructure, analysing and monitoring potential tHoureats and attacks, devising security architecture and implementing security solutions. The students will also have a wider perspective to information security from national security perspective from both technology and legal perspective.
Learning Outcomes
After completion of this course, the students should be able to:
- Understand, appreciate, employ, design and implement appropriate security technologies and policies to protect computers and digital information.
- Identify & Evaluate Information Security tHoureats and vulnerabilities in Information Systems and apply security measures to real time scenarios
- Identify common trade-offs and compromises that are made in the design and development process of Information Systems
- Demonstrate the use of standards and cyber laws to enhance information security in the development process and infrastructure protection
Detail Contents
|
List of Suggested Books
- William Stallings, “Cryptography and Network Security”, Pearson Education/PHI, 2006.
- V.K. Jain, “Cryptography and Network Security”, Khanna Publishing House.
- Gupta Sarika, “Information and Cyber Security”, Khanna Publishing House, Delhi.
- Atul Kahate, “Cryptography and Network Security”, McGraw Hill.
- V.K. Pachghare, “Cryptography and Information Security”, PHI Learning
- Nina Godbole, “Information System Security”, Wiley
- Bothra Harsh, “Hacking”, Khanna Publishing House, Delhi.
DICT-VAC-05 | 3D PRINTING (BASICS) | Credits:2 |
Pre-Requisites
- Computer Aided Design
- Engineering Materials
Objectives
The course is designed to impart knowledge and skills related to 3D printing technologies, selection of material and equipment and develop a product using this technique in Industry 4.0 environment.
Learning Outcomes
After completion of this course, the students will be able to:
- Develop CAD models for 3D printing.
- Import and Export CAD data and generate .stl file.
- Select a specific material for the given application.
- Select a 3D printing process for an application.
- Produce a product using 3D Printing or Additive Manufacturing (AM).
Detail Contents
|
List of Suggested Books
- Lan Gibson, David W. Rosen and Brent Stucker, “Additive Manufacturing Technologies: Rapid Prototyping to Direct Digital Manufacturing”, Springer, 2010.
- Andreas Gebhardt, “Understanding Additive Manufacturing: Rapid Prototyping, Rapid Tooling, Rapid Manufacturing”, Hanser Publisher, 2011.
- Khanna Editorial, “3D Printing and Design”, Khanna Publishing House, Delhi.
- CK Chua, Kah Fai Leong, “3D Printing and Rapid Prototyping- Principles and Applications”, World Scientific, 2017.
- J.D. Majumdar and I. Manna, “Laser-Assisted Fabrication of Materials”, Springer Series in Material Science, 2013.
- L. Lu, J. Fuh and Y.S. Wong, “Laser-Induced Materials and Processes for Rapid Prototyping”, Kulwer Academic Press, 2001.
- Zhiqiang Fan And Frank Liou, “Numerical Modelling of the Additive Manufacturing (AM) Processes of Titanium Alloy”, InTech, 2012.
DICT-VAC-02 | DIGITAL MARKETING | Credits:4 |
Pre-Requisites
- Students should qualify basic level of digital marketing and must have the knowledge of marketing platforms for advertising via online media such as print, digital, internet marketing
Objectives
The main objective of this course is to make goals, plan campaigns, and reach customers. Understand what keeps customers engaged between attention and action Modify current business operations to provide a better online experience. Master the science of measuring performance versus plan. Grasp the Project management skills. Know how to continuously improve performance to increase ROI with data and analytics.to support organization’s marketing activities.
LEARNING Outcomes
On successful completion of the course, the students will be able to:
- Know different techniques of SEO
- Understand the target audience by using different tools
- Hands-on experience on different promotional techniques.
- Learn advanced promotional techniques by using different online marketing tools and channels.
GGSIPU UNIVERSITY Syllabus
Detail Contents
|
List of Suggested Books
- The psychology of email marketing Influencing subscribers and driving engagement Author: Eleanor Blake Year: 2023
- Strauss, Judy and Frost, Raymond (6th Ed, 2011), E-Marketing, 5th Edition, PHI Learning, New Delhi.
- Chaffey, D, Ellis-Chadwick, F, Johnston, K. and Mayer, R, (4th Ed.,2009) Internet Marketing: Strategy, Implementation and Practice, Third Edition, Pearson Education, New Delhi.
- Shainash G, and Jagdish N Sheth (1st Ed, 2008). Customer Relationship Management- A Strategic Perspective, Macmillan India Ltd.
- The Art Of SEO: Mastering Search Engine Optimization by Eric Enge of Stone Temple Consulting, Stephan Spencer, and Jessie C. Stricchiola.
DICT-VAC-06 | BLOCK CHAIN (ADVANCED) | Credits:2 |
Pre-Requisites
- Cryptography Techniques
- Data Structures and Algorithms
- Introduction to Programming
Objectives
The objective of this course is to provide conceptual understanding of how block chain technology can be used to innovate and improve business processes. The course covers the technological underpinning of block Chain operations in both theoretical and practical implementation of solutions using block Chain technology.
Learning Outcomes
At the end of this course, the students will be able to:
- Understand block chain technology.
- Develop block chain based solutions and write smart contract using Hyperledger Fabric and Ethereum frameworks.
- Build and deploy block chain application for on premise and cloud based architecture.
- Integrate ideas from various domains and implement them using block chain technology in different perspectives.
Detail Contents
|
List of Suggested Books
- Melanie Swan, “Block Chain: Blueprint for a New Economy”, O’Reilly, 2015
- Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to Block chain Technology and Leveraging Block Chain Programming”
- Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017
- Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
- Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization and Smart Contracts Explained”, Packt Publishing
- Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts for Ethereum and Block Chain”, Packt Publishing
- Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O’Dowd, Venkatraman Ramakrishna, “Hands-On Block Chain with Hyperledger: Building Decentralized Applications with Hyperledger Fabric and Composer”, Import, 2018
DICT-VAC-07 | ROBOTICS (ADVANCED) | Credits:2 |
Pre-Requisites
- Basic Engineering Mathematics
- Automation and Control
Objectives
The objective of this course is to impart knowledge about industrial robots for their control and design.
Learning Outcomes
After the completion of this course, the students will be able to:
- Perform kinematic and dynamic analyses with simulation.
- Design control laws for a robot.
- Integrate mechanical and electrical hardware for a real prototype of robotic device.
- Select a robotic system for given application.
Detail Contents
|
List of Suggested Books
- Saha, S.K., “Introduction to Robotics, 2nd Edition, McGraw-Hill Higher Education, New Delhi, 2014.
- Ghosal, A., “Robotics”, Oxford, New Delhi, 2006.
- Niku Saeed B., “Introduction to Robotics: Analysis, Systems, Applications”, PHI, New Delhi.
- Mittal R.K. and Nagrath I.J., “Robotics and Control”, Tata McGraw Hill.
- Mukherjee S., “Robotics and Automation”, Khanna Publishing House, Delhi.
- Craig, J.J., “Introduction to Robotics: Mechanics and Control”, Pearson, New Delhi, 2009
- Mark W. Spong, Seth Hutchinson, and M. Vidyasagar, “Robot Modelling and Control”, John Wiley and Sons Inc, 2005
- Steve Heath, “Embedded System Design”, 2nd Edition, Newnes, Burlington, 2003
- Merzouki R., Samantaray A.K., Phathak P.M. and Bouamama B. Ould, “Intelligent Mechatronic System: Modeling, Control and Diagnosis”, Springer.
DICT-VAC-08 | QUANTUM COMPUTING (ADVANCED) | Credits:2 |
Pre-Requisites
- Data Structure and Algorithm.
- Programming in Python/C#
Objectives
The objective of this course is to impart necessary knowledge to the learner so that he/she can develop and implement algorithm and write programs using these algorithm.
Learning Outcomes
At the end of this course, the students will be able to:
- Explain the working of a Quantum Computing program, its architecture and program model.
- Develop quantum logic gate circuits
- Develop quantum algorithm
- Program quantum algorithm on major toolkits
Detail Contents
|
List of Practicals
- Building Quantum dice
- Building Quantum Random No. Generation
- Composing simple quantum circuits with q-gates and measuring the output into classical bits.
- Implementation of Shor’s Algorithms
- Implementation of Grover’s Algorithm
- Implementation of Deutsch’s Algorithm
- Implementation of Deutsch-Jozsa’s Algorithm
- Mini Project such as implementing an API for efficient search using Grover’s Algorithms or Integer factorization using Shor’s Algorithm
List of Suggested Books
- Michael A. Nielsen, “Quantum Computation and Quantum Information”, Cambridge University Press.
- David McMahon, “Quantum Computing Explained”, Wiley
- IBM Experience https://quantumexperience,ng,bluemix.net
- Microsoft Quantum Development Kit https://www.microsoft.com/en-us/quantum/development-kit
- Forest SDK PyQuil: https://pyquil.readthedocs.io/en/stable/
DICT-VAC-09 | CYBER SECURITY (ADVANCED) | Credits:2 |
Pre-Requisites
- Basic knowledge of Computers
- Basic knowledge of networking and Internet
- Hands on Windows operating system
Objectives
The course has been designed to give students an extensive overview of cyber security issues, tools and techniques that are critical in solving problems in cyber security domains.The course aims at providing students with concepts of computer security, cryptography, digital money, secure protocols, detection and other security techniques. The course will help students to gauge understanding in essential techniques in protecting Information Systems, IT infrastructure, analysing and monitoring potential tHoureats and attacks, devising security architecture and implementing security solutions. The students will also have a wider perspective to information security from national security perspective from both technology and legal perspective.
Learning Outcomes
After completion of this course, the students should be able to:
- Understand, appreciate, employ, design and implement appropriate security technologies and policies to protect computers and digital information.
- Identify & Evaluate Information Security tHoureats and vulnerabilities in Information Systems and apply security measures to real time scenarios
- Identify common trade-offs and compromises that are made in the design and development process of Information Systems
- Demonstrate the use of standards and cyber laws to enhance information security in the development process and infrastructure protection
Detail Contents
|
List of Suggested Books
- William Stallings, “Cryptography and Network Security”, Pearson Education/PHI, 2006.
- V.K. Jain, “Cryptography and Network Security”, Khanna Publishing House.
- Gupta Sarika, “Information and Cyber Security”, Khanna Publishing House, Delhi.
- Atul Kahate, “Cryptography and Network Security”, McGraw Hill.
- V.K. Pachghare, “Cryptography and Information Security”, PHI Learning
- Nina Godbole, “Information System Security”, Wiley
- BotHoura Harsh, “Hacking”, Khanna Publishing House, Delhi.
DICT-VAC-10 | 3D PRINTING (ADVANCED) | Credits:2 |
Pre-Requisites
- Computer Aided Design
- Engineering Materials
Objectives
The course is designed to impart knowledge and skills related to 3D printing technologies, selection of material and equipment and develop a product using this technique in Industry 4.0 environment.
Learning Outcomes
After completion of this course, the students will be able to:
- Develop CAD models for 3D printing.
- Import and Export CAD data and generate .stl file.
- Select a specific material for the given application.
- Select a 3D printing process for an application.
- Produce a product using 3D Printing or Additive Manufacturing (AM).
Detail Contents
|
List of Suggested Books
- Lan Gibson, David W. Rosen and Brent Stucker, “Additive Manufacturing Technologies: Rapid Prototyping to Direct Digital Manufacturing”, Springer, 2010.
- Andreas Gebhardt, “Understanding Additive Manufacturing: Rapid Prototyping, Rapid Tooling, Rapid Manufacturing”, Hanser Publisher, 2011.
- Khanna Editorial, “3D Printing and Design”, Khanna Publishing House, Delhi.
- CK Chua, Kah Fai Leong, “3D Printing and Rapid Prototyping- Principles and Applications”, World Scientific, 2017.
- J.D. Majumdar and I. Manna, “Laser-Assisted Fabrication of Materials”, Springer Series in Material Science, 2013.
- L. Lu, J. Fuh and Y.S. Wong, “Laser-Induced Materials and Processes for Rapid Prototyping”, Kulwer Academic Press, 2001.
- Zhiqiang Fan And Frank Liou, “Numerical Modelling of the Additive Manufacturing (AM) Processes of Titanium Alloy”, InTech, 2012.
DICT-VAC-11 | ETHICAL HACKING | Credits:2 |
Pre-Requisites
- Computer Networking Skills
- Programming Skills
- Database Skills
Objectives
The motive of this course is to learn ethical hacking Techniques. It is organized for BCA students to provide them practical exposure. This Ethical Hacking course leads students from the basics to more advanced features of the course. This course aims at providing the attendee with abroad introduction to the profound concepts in Ethical Hacking using forensic detection by exposing them to practical scenarios in order to make them industry ready.
Learning Outcomes
After completion of this course, the students will be able to:
- Understand, appreciate, employ, design and implement appropriate security technologies and policies to protect computers and digital information.
- Identify & Evaluate Information Security threats and vulnerabilities in Information Systems and apply security measures to real time scenarios
- Identify common trade-offs and compromises that are made in the design and development process of Information Systems
- Demonstrate the use of standards and cyber laws to enhance information security inthe development process and infrastructure protection
Detail Contents
|
List of Suggested Books
- The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws” by Dafydd Stuttard and Marcus Pinto
- Metasploit: The Penetration Tester’s Guide” by David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni
- CEH Certified Ethical Hacker All-in-One Exam Guide” by Matt Walker
- Gray Hat Hacking: The Ethical Hacker’s Handbook” by Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, and Michael Baucom
- Penetration Testing: A Hands-On Introduction to Hacking” by Georgia Weidman
DICT-VAC-11 | VIRTUAL REALITY | Credits:2 |
Pre-Requisites
- Fundamentals of C++
Objectives
The objective of this course is to provide a detailed understanding of the concepts of Virtual Reality and its applications.
Learning Outcomes
At the end of the course, the students will be able to:
- Understand geometric modelling and Virtual environment.
- Study about Virtual Hardware and Software.
- Develop Virtual Reality applications.
Detail Contents
|
List of Practicals
- Developing architecture of a house using Virtual Reality.
- Perform CRO based experiment using Virtual Reality.
- Undertaking qualitative analysis in Chemistry using Virtual Reality.
- Carry out assembly/disassembly of an engine using Virtual Reality.
- Explore human anatomy using Virtual Reality.
- Simulation of circulation of blood in heart.
- Simulation of Fight/Vehicle/Space Station.
- Building Electronic circuit using Virtual Reality, given basic electronic components.
- Developing concept of Virtual class room with multiplayer.
List of Suggested Books
- John Vince, “Virtual Reality Systems “, Pearson Education Asia, 2007.
- Anand R., “Augmented and Virtual Reality”, Khanna Publishing House, Delhi.
- Adams, “Visualizations of Virtual Reality”, Tata McGraw Hill, 2000.
- Grigore C. Burdea, Philippe Coiffet , “Virtual Reality Technology”, Wiley Inter Science, 2nd Edition, 2006.
- William R. Sherman, Alan B. Craig, “Understanding Virtual Reality: Interface, Application and Design”, Morgan Kaufmann, 2008.
- www.vresources.org
- www.vrac.iastate.edu
- www.w3.org/MarkUp/VRM