
Bachelor of Science in Computer Science and Engineering


This course will tell you about different types of attacks that are happened over the internet... how someone exploit others profiles and their private data... its will teach you about spoofing,sniffing and many other types of attacks. encapsulation of data, header files and their details. from intermediate to advance level.. so this course is for intermediate and advance levels people.

In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Concepts for both public and private communication networks will be discussed. Course Objectives 1. Describe network-related security issues 2. Identify protective measures for telecommunication technologies 3. Define processes for controlling network access 4. Identify processes for managing LAN-based security 5. Describe procedures for operating and configuring networked-based security devices 6. Define procedures to implement and operate wireless technologies

In this Guided Project, you will:
Computer networks and their components.
Accessing and managing Cisco devices.
Navigating the Cisco IOS.
Basic device configuration.

In this course, you will:
Learn the business and technical logistics behind penetration testing
Identify evolving threats from different types of hackers
Reveal shocking truths about the information operating systems can divulge
Realize the power of footprinting on the Internet
Detect live systems by inference
Get by a step-by-step, no-nonsense introduction to cryptography
Identify differences between vulnerability assessments and penetration tests
Master ways to prevent and disable system hacking
Protect yourself from malware, including Trojans, backdoor, viruses, and more
Thwart hackers attacking wireless networks and mobile devices
Understand the pros and cons of intrusion detection systems, intrusion prevention system, and web application firewalls
Implement countermeasures to stop SQL injections and other database attacks
And more!
Papers
1: SMILES2DTA: A Deep Learning based Approach for Identifying Drug Candidates and Predicting Drug-target Binding Affinity