Programs Description

  • Semester-wise Course Breakdown

    Semester I

    S.No Course Code Course Title Credit Hrs (Theory – Lab – Credits) Prerequisite
    1 HU119 English Comprehension and Composition 3-0-3
    2 CY102 Introduction to Cyber security 3-0-3
    3 MA216 Discrete Structures 3-0-3
    4 CS180 Introduction to Information & Communication Technologies 2-0-2
    CS180L Introduction to Information & Communication Technologies Lab 0-1-1
    5 CS111 Programming Fundamentals 3-0-3
    CS111L Programming Fundamentals Lab 0-1-1
    Credit Hours = 16
    Contact Hours = 20
    14-2-16

    Semester II

    S.No Course Code Course Title Credit Hrs (Theory – Lab – Credits) Prerequisite
    1 CS360 Computer Networks 3-0-3
    CS360L Computer Networks Lab 0-1-1
    2 CY103 Information Assurance 3-0-3
    3 CS 112 Object Oriented Programming 3-0-3 CS111/CS111L
    CS112L Object Oriented Programming Lab 0-1-1
    4 MA301 Probability and Statistics 3-0-3
    5 EE223 Digital Logic Design 3-0-3
    EE223L Digital Logic Design Lab 0-1-1
    Credit Hours = 18
    Contact Hours = 24
    15-3-18

    Semester III

    S.No Course Code Course Title Credit Hrs (Theory – Lab – Total) Prerequisite
    1 CY371 Software Engineering 3-0-3
    2 HU124 Islamic Studies and Ethics 2-0-2
    3 MA201 Linear Algebra 3-0-3
    4 CS214 Data Structure & Algorithm 3-0-3 CS112/CS112L
    CS214L Data Structure & Algorithm Lab 0-1-1
    5 MA110 Calculus & Analytical Geometry 3-0-3
    6 CY222 Network Security 0-1-1
    CY222L Network Security 2-0-2
    Credits Hours=18
    Contact Hours=22
    16-2-18

    Semester IV

    S.No Course Code Course Title Credit Hrs (Theory – Lab – Credits) Prerequisite
    1 CS225 Operating Systems 3-0-3 CS214/CS214L
    CS225L Operating Systems Lab 0-1-1
    2 CS223 Computer Organization & Assembly Language 3-0-3 EE223/EE223L
    CS223L Computer Organization & Assembly Language Lab 0-1-1
    3 CYXXX CYS Elective I 3-0-3
    4 CY206 Information Security 3-0-3
    5 MA106 Differential Equations 3-0-3
    Credit Hours = 17
    Contact Hours = 21
    15-2-17

    Semester V

    S.No Course Code Course Title Credit Hrs (Theory – Lab – Total) Prerequisite
    1 CS332 Design and Analysis of Algorithm 3-0-3 CS214, CS214L
    2 CS426 Parallel and Distributed Computing 2-0-2 CS225,CS225L
    CS426L Digital Forensics Lab 0-1-1
    3 CYXXX Cyber Security Elective II 3-0-3
    4 BAXXX University Elective I 2-0-2
    5 CYXXX Cyber Security Elective III 3-0-3
    6 CS230 Database Systems 3-0-3 CS214/CS214L
    CY230L Database Systems Lab 0-1-1
    Credit Hours = 18
    Contact Hours = 22
    16-2-18
    Summer
    CY496 Internship Non Credits

    Semester VI

    S.No Course Code Course Title Credit Hrs (Theory – Lab – Credits) Prerequisite
    1 CY335 Vulnerability Assessment & Reverse Engineering 3-0-3 CY102
    CS335L Vulnerability Assessment & Reverse Engineering Lab 0-1-1
    2 CS340 Artificial Intelligence 3-0-3 MA216
    CS340L Artificial Intelligence Lab 0-1-1
    3 CYXXX Cyber security Elective IVd 3-0-3
    4 BAXXX University Elective II 3-0-3
    5 CY497 Final Project-1 0-1-1
    6 CY334 Digital Forensics 2-0-2
    CY334 Digital Forensics Lab 0-1-1
    Credit Hours = 17
    Contact Hours = 25
    14-3-17

    Semester VII

    S.No Course Code Course Title Credit Hrs (Theory – Lab – Credits) Prerequisite
    1 HU401 Technical & Business Writing 3-0-3
    2 BAXXX University Elective III 3-0-3
    3 BAXXX University Elective IV 3-0-3
    4 CY498 Final Project –II 0-2-2 CY497
    5 CY456 Secure Software Design and Development 2-0-2
    CY456L Secure Software Design and Development 0-1-1
    Credit Hours = 14
    Contact Hours = 20
    11-3-14

    Semester VIII

    S.No Course Code Course Title Credit Hrs (Theory – Lab – Credits) Prerequisite
    1 HU414 Social Service (University Elective V) 1-0-1
    2 CY499 University Elective IV 0-3-3 CY-498
    3 CS270 Professional Practices 3-0-3
    4 HU120 Communication and Presentation Skills 3-0-3 HU119
    5 HU125 Pakistan Studies and Global Perspective 2-0-2
    Credit Hours=16
    Contact Hours = 18
    9-3-12
    Total Credits = 130

    Course Description with CLOs

    Semester I

    S.No Code Course Title CLO Bloom’s level PLO
    1 CS180 Introduction to Information & Communication Technologies Understand the fundamentals, hardware, software, and communication components of existing and emerging ICT systems C2 1
    Explain the emerging and disruptive technologies C2 1
    Effective use of basic ICT tools applications C3 2
    Understand the process modeling for problem-solving C3 4
    2 CS111 Programming Fundamentals Understand and recognize the syntax of different constructs of structured programming C2 1
    Understand problem and design logic using programming constructs C3 2
    Demonstrate the ability to test, debug, and correct the structured program C5 3
    Apply programming knowledge and design algorithms that solve small-to-moderate scale computational problems C3 4
    3 CY102 Introduction to Cyber Security Understand the fundamentals of cyber security and digital forensics C2 1
    Understand attacks, vulnerabilities, threats, and countermeasures C2 2,3
    Investigate real-world scenarios and propose solutions against cyber-attacks C3 2
    Understand organizational security requirements, policies, and standards C2 5
    Identify the cyber security and digital forensics market needs and use cyber security tools and techniques C3 3,2
    4 HU115 Pakistan Studies Know and understand governance structure, political processes, constitutional and legislative development and myriad cultures of Pakistan with a sense of ownership and contribution to the country. C1 6
    Understand the ideological and historical struggle in the creation of Pakistan C2 6
    Demonstrate the knowledge and education in practical life C3 10
    Analyze the objectives, principles and challenges of Pakistan’s foreign policies. C4 10
    5 HU119 English Comprehension and Composition Demonstrate sound ‘Reading Strategies’ and proficiency in comprehending the written text. C2 1
    Display fundamentals of correct expression to achieve optimum writing skills. C2 1
    Use adequate vocabulary for expression in various formats. C3 2
    Construct well composed short and long passages on a variety of themes. C2 4

    Semester II

    S.No Code Course Title CLO Bloom’s Level PLO
    1 CS112 Object-Oriented Programming Understand principles of the object-oriented paradigm C2 1
    Apply the object-oriented paradigm to solve real-world problems C6 4
    Design and implement a solution to a small/medium industrial project using an object-oriented paradigm C2 4
    Understand basics of graphical user interface C2 5
    2 CY103 Information Assurance Understand fundamentals of information assurance and legal/ethical issues of information security C2 1
    Identify, analyze and assess risks in an organization using popular methodologies to manage these risks C5 3
    Identify significant national and international security-related laws and explain how organizations achieve compliance with these and specific industry standards C2 2
    Assess security posture of an organization, formulate information security policies and propose a plan to develop, implement, and maintain an effective policy C6 3, 4
    Develop contingency, incident response, and business continuity plans and describe the principal components of cybersecurity system implementation planning C6 4, 6
    3 EE198 Basic Electronics Recognize resistive, capacitive and inductive circuits for DC & AC inputs C1 1
    Explain PN junction and describe its voltage and current relationship and operating modes. C2 2
    Classify BJT terminals and mode of operation based on voltage current relationship. C2 2
    Describe the AC & DC response of FETs & BJTs based amplifiers and switches C6 2
    4 HU120 Communication & Presentation Skills Demonstrate understanding of concepts of communication and extend their application to real-life contexts C2 7
    Elaborate on topics, concepts and ideas argumentatively through enhanced writing mechanics and techniques. C3 7
    Perform communication confidently and build effective presentations with successful integration of technology. C3 7
    5 HU118 Islamic Studies Identify the basic teachings of Islam substantiated in the Quran and Sunnah. C1 8
    Express the integration and significance of religious beliefs and practices for positioning a society in the constructive level. C2 10
    Apply and analyze the knowledge of Islam with a view to develop ethical values in society and organization. C3 8
    6 HU215 Ethics Comprehend the concepts related to complicated ethical issues in today’s world C1 9
    To demonstrate how to live in today’s multi-cultural global world C2 9
    Apply ethical principles and commit to professional ethics and responsibilities particularly and in daily life in general C3 10

    Semester III

    S.No Code Course Title CLO Bloom's Level PLO
    1 CY371 Software Engineering Recognize properties of functions and their inverses such as polynomials, rational functions, exponential, logarithmic, trigonometric and inverse-trigonometric functions; describe the domain and range of functions C1 1
    Understand/comprehend the ideas of limits and continuity of a function and their properties; identify continuous functions from their graphs; define tangent lines and rates of change and relate these concepts with the derivative of a function; know the techniques to find derivatives of a function, e.g. product and quotient rule, chain rule etc. C2 1
    Express integration as an anti-derivative of a function; identify and apply different techniques to solve indefinite/definite integrals, e.g. integration by substitution, integration by parts, integration by partial fractions and Fundamental theorem of Calculus. C1, C3 3
    Apply the concepts of derivatives and integrations to solve problems in science and engineering; use derivates to solve optimization problems and related-rates problems; implement definite integral to find area under a curve. C3 4
    Analyze the behavior of a function in its vicinity, e.g. increasing function, decreasing function, concavity of a function, relative/absolute extrema of a function; use this analysis to sketch the graph of polynomials and rational functions. C4 1, 2
    2 CS214 Data Structures & Algorithms Understand various data structures and algorithms C2 1
    Examine and choose appropriate data structures and algorithms for real-world computing problems C4 2, 3
    Implement various data structures and algorithms using different programming languages C3 4
    Analyze algorithms and determine associated time complexities C3 4
    3 CS360 Computer Networks Describe the key terminologies and technologies of computer networks C2 1
    Explain the services, functions, and standards (RFCs) for each layer in the Internet protocol stack C2 1
    Identify various internetworking devices, protocols, and their functions in a network C4 3
    Analyze working and performance of key technologies, algorithms, and protocols C4 6
    Design and develop network protocols, applications, and components based on RFCs C6 4
    4 EE223 Digital Logic Design Understand the fundamental concepts of digital logic design including basic and universal gates, number systems, binary coded systems, basic components of combinational and sequential circuits C2 1
    Explain the basic techniques of digital electronic circuits design including boolean algebra and multi-variable Karnaugh map C2 2
    Illustrate the working of small-scale combinational and sequential digital circuits C2 2
    Interpret real world problems and solve them using small-scale combinational and synchronous sequential digital circuits C3 3
    5 MA201 Linear Algebra Identify solutions of systems of linear equations by Gaussian Elimination and matrix inversion and carry out matrix operations including inverses and determinants C1 1
    Demonstrate understanding of the concepts of vector space, subspace, linear independence, span, basis, and linear transformations. C2 1
    Solve Eigenvalue problems by determining eigenvalues and eigenvectors. C2 3
    Apply principles of Linear Algebra in Engineering problems. C3 4
    Illustrate the use of inner products in finding orthonormal bases. C3 2

    Semester IV

    S.No Code Course Title CLO Bloom's Level PLO
    1 CS371 Software Engineering Understand the fundamentals of software engineering C2 1
    Analyze given problem scenario and apply software engineering concepts for solution development C4 3
    Construct design model of a small software system using state of the art tools C6 4
    Apply software quality assurance and testing principles to software systems C3 5
    Discuss key principles and common methods for software project management such as scheduling, size estimation, cost estimation, and risk analysis C2 2, 7
    2 CS225 Operating Systems Understand the fundamentals of operating systems C2 1
    Understand the core services of the operating systems C2 1
    Analyze and evaluate algorithms of the core services C5 3
    Understand the kernel level implementation of LINUX and modify some of the components C3 2
    3 CS223 Computer Organization & Assembly Language Understand the fundamentals of operating systems C2 1
    Understand the core services of the operating systems C2 1
    Analyze and evaluate algorithms of the core services C5 3
    Understand the kernel level implementation of LINUX and modify some of the components C3 2
    4 CY222 Network Security Understand the security aspects of computer networks, attacks, exploits, and vulnerabilities C2 1
    Configure and use network defense technologies to prevent attacks C3 2
    Design and develop network defense solutions Evaluate existing research-based network security solutions and propose improvements in existing state-of-the-art C3 3
    Evaluate existing research-based network security solutions and propose improvements in existing state-of-the-art C2 1
    5 HU401 Technical & Business Writing Identify salient features of technical and business communication. C2 7
    Illustrate graphically and display information on subjects of general, technical and business nature. C3 7
    Compose technical documents and write reports both in technical and business domains. C6 7

    Semester V

    S.No Code Course Title CLO Bloom's Level PLO
    1 CS332 Design and Analysis of Algorithms Identify the characteristics of data and/or other conditions or assumptions that lead to different behaviors of an algorithm. C1 1
    Describe the time and space complexity of simple algorithms. C2 2
    Use big O, Omega, Theta notation formally to give asymptotic upper bounds on time and space complexity of algorithms. C3 3
    Identify and Use appropriate strategies (brute-force, greedy, divide-and-conquer, and dynamic programming) to solve a real-world problem. C3 3, 4
    Trace and/or implement string-matching and optimization algorithms C6 3, 4
    2 MA106 Differential Equations Define the basic concepts about differential equations e.g. How ODEs arise in physical world, solution of an ODE, order, degree, linearity, homogeneity of an ODE, Initial value problems, general and particular solutions. C2 1
    Explain different types of ODEs, e.g., separable, exact, linear, bernoulli, homogeneous ODEs. C2 1
    Use an appropriate method to solve an ODE, e.g. finding integrating factor, reduction of order, method of variation of parameters, power series method and Laplace Transform. C3 3
    Construct the problems in mechanical and electrical systems as an ODE and apply the technique learned to find the solutions of these problems. C4 3
    Interpret the nature of physical systems by the solutions of the corresponding mathematical model, for example, analyzing the nature of PDEs as elliptic, parabolic or hyperbolic, solution PDEs using separation of variables method C5 3
    3 CY334 Digital Forensics Understand forensic needs, incident handling, laws, standards, regulations, and ethical values C2 8, 9
    Perform investigation of multiple digital devices for cybercrimes using forensic tools C3 2, 5
    Perform investigation for multiple platforms, media, and applications for cybercrimes using forensic tools C3 3, 5
    Write forensic reports based on findings of investigations performed by forensic tools. C3 7
    4 CY250 Secure Software Development Understand the fundamentals of secure software design, development, and modeling of Secure Software Development Lifecycle C2 1
    Understand to protect against security threats and software vulnerabilities C6 1
    Design and develop a secure and robust application with appropriate controls to mitigate security threats C4 3, 4
    Develop test cases to assess quality adherence to security requirements of software C2 2, 3
    Explore new avenues in secure software development and their strengths and limitations C2 2, 3
    5 CS230 Database Systems Understand fundamental database concepts and differentiate between various types of database management systems C2 1
    Design database schemas for a real-world scenario, and implement the design into database applications using advanced constructs C6 3, 6
    Examine functional dependencies and resolve anomalies in a database C4 4
    Use Structured Query Language (SQL) for database definition, manipulation, and optimization C3 5
    Implement security mechanisms in database applications to guard against common threats C3 4

    Semester VI

    S.No Code Course Title CLO Bloom's Level PLO
    1 CY406 Information Security Understand data security controls and secure data handling C2 1
    Apply Cryptography for secure architecture design C3 3
    Understand Authentication, Authorization, and Access Control mechanisms C2 1
    Analyze and Assess the security deployments and their regular updation C4 2
    Understand security management and incident response C2 1
    2 CY354 Vulnerability Assessment & Reverse Engineering Understand fundamental concepts of software reverse engineering and vulnerability analysis. C2 1
    Perform static and dynamic techniques for the evaluation of binaries of executable for investigation of software code structure and program behavior. C3 5
    Assess program code and behavior for evaluation of presence of common vulnerabilities C3 3
    Evaluate executables for malicious behaviors and structures that prevent static and dynamic analysis. C5 4
    3 CS340 Artificial Intelligence Understand the fundamentals of artificial intelligence and its application areas C2 1
    Formulate real-world problems as state-space problems, optimization problems, or constraint satisfaction problems C6 2, 3
    Design and develop AI techniques to solve real-world problems C6 4, 5
    4 MA301 Probability & Statistics Students should be able to use of descriptive techniques to describe the statistical data C4 2
    Define theory of probability and probability analysis of data related to engineering research C1 1
    Illustrate the use of PMFs (probability mass function), PDFs (Probability density functions), and CDFs (Cumulative distribution function) of discrete and as well as continuous Random variables. C3 2
    Use statistical soft-wares: SPSS, Minitab/Eviews, Microsoft excel for complex problems having huge data. C3 2
    Infers the population parameters on the basis of sample study using the techniques of inferential statistics C4 2

    Semester VII

    S.No Code Course Title CLO Bloom's Level PLO
    1 CS426 Parallel and Distributed Computing Understand the fundamental concepts in parallel and distributed computing and describe the architecture of distributed systems such as DNS and CDN C2 (Understanding) C2 1
    Design and develop parallel programs using multithreading and MPI C3 (Applying) C3 2
    Analyze different approaches of designing parallel C4 1
    2 CS332 Design and Analysis of Algorithms Identify the characteristics of data and/or other conditions or assumptions that lead to different behaviors of an algorithm C1 1
    Describe the time and space complexity of simple algorithms C2 2
    Use big O, Omega, Theta notation formally to give asymptotic upper bounds on time and space complexity of algorithms C3 3
    Identify and Use appropriate strategies (brute-force, greedy, divide-and-conquer, and dynamic programming) to solve a real-world problem C6 3, 4
    Trace and/or implement string-matching and optimization algorithms C6 3, 4
    3 HU 401 Technical & Business Writing Identify salient features of technical and business C2 7
    Illustrate graphically and display information on subjects of general, technical and business nature. C3 7
    Compose technical documents and write reports both in technical and business domains. C6 7

    Semester VIII

    S.No Code Course Title CLO Bloom's Level PLO
    1 CY406 Information Security Understand data security controls and secure data handling C2 1
    Apply Cryptography for secure architecture design C3 3
    Understand Authentication, Authorization, and Access Control mechanisms C2 1
    Analyze and Assess the security deployments and their regular updation C4 2
    Understand security management and incident response C2 1
    2 CS270 Professional Practices Describe positive and negative ways in which computer technology (networks, mobile, and cloud computing) alters modes of social interaction at the personal level C2 8, 9
    Understand the ethical responsibility of ensuring software correctness, reliability, and safety C2 1, 8
    Analyze the global computing issues and the role of professionals in managing this problem C5 3, 8
    Understand the rationale for legal protection of intellectual property and identify the intangible digital intellectual property C5 8, 9
    Describe the motivation and ramifications of cyber terrorism and criminal hacking and examine the ethical and legal issues surrounding the misuse of access and breaches in security C5 9
    Write clear concise and accurate technical documents following well-defined standards C3 2, 7
    3 HU414 Social Service To describe societal significance of social problems and to identify solutions. C1 9
    To apply the sociological knowledge and become an active member of the society to serve humanity. C5, C6 10

    Cyber Security Elective Courses

    S.No Code Course Title CLO Bloom’s level PLO
    1 CY312 Cryptography Understand the basics of cryptography, cryptanalysis, number theory, algebra, and complexity theory. C2 1
    Understand cryptographic protocols and algorithms in different application areas C2 1
    Evaluate security and performance of cryptographic algorithms and propose improvements C5 4
    Implement fundamental public key and symmetric key cryptographic algorithms C3 2
    2 CY313 Cryptanalysis Understand and analyze the objectives, environment, and limitations of academic cryptanalysis C4 1, 3
    Use Knowledge of cipher structures and cryptanalysis techniques to solve and extract secret information C3 1, 2
    Implement the cryptanalysis techniques using tools and programming languages C3 5
    Assess the weakness of the cryptosystem against any break C5 4
    3 CY426 Wireless Networks Security Discuss existing law that can be applied to the peculiarities of cyber operations C2 1
    Explain the security features and limitations of modern mobile operating systems C1 1, 2
    Understand how a secure channel is set up in a wireless environment that uses the 802.11 or WAP standards C2 3, 4
    Analyze vulnerabilities and risks in wireless and mobile systems C5 3, 6
    4 CY447 Cyber Warfare Discuss existing law that can be applied to the peculiarities of cyber operations C2 8, 9 
    Discuss elements of general international law that governs the recourse to armed force and international humanitarian law in the specific context of cyber warfare and perspectives on internet governance C5 7,8
    Explain warfare activities and cybercrime in the global information society, sociological and criminological perspectives on these crimes C3 8
    Analyze cyber-related decisions as they apply to national and military strategy from social, ethical, legal, and political viewpoints C5 8, 9
    5 CY324 IoT Security Understand the fundamentals of the Internet of Things and key components C2 1
    Analyze the security features and limitations of IoT devices and networks C3 5
    Examine a complete and working IoT system for vulnerabilities and risks C5 3, 4
    6 CY351 Web Application Security Understand the fundamentals of web and browser security C2 1
    Discuss the latest emerging attacks facing the Internet C2 1
    Use web application vulnerability scanning and testing tools C3 5
    Explain web application lifecycle maintenance and defense techniques C2 1
    7 CY353 Cyber Security Tool Development Understand modern programming language, i.e., Python C2 1
    Analyze open-source cyber security tool C4 3
    Design and develop cyber security tools using a modern programming language C3 4, 5
    Evaluate recent research advances in cyber security tool development and incorporate in locally developed tool C5 10
    8 CY353 Operating System Security Understand the fundamentals of operating systems and C2 1
    Explain the interaction of operating systems, new storage devices, and virtualization C2 3
    Analyze current state-of-the-art OS-level mechanisms and policies designed to help protect systems against sophisticated attacks C4 2, 3
    9 CY458 Cyber Security for AI & AI for Cyber Security Understand basics of AI and explain baseline machine learning and deep learning algorithms used to solve cyber security problems C2 2, 3
    Understand basics of AI and explain baseline machine learning and deep learning algorithms used to solve cyber security problems C4 3
    Compare different AI algorithms for solving security-related problems C2 3
    10 CY458 Embedded Systems Security Understand and interact with embedded systems components and protocols C2 1
    Understand concepts, issues, principles, and mechanisms in embedded systems security such as embedded security trends, software vulnerabilities, physical attacks, and security policies C2 1
    Conduct attacks on embedded systems protocols and systems C3 4, 5
    Design embedded systems and architectures that are resilient to attack C3 4, 5
    Evaluate recent research advances in embedded systems security and prepare for graduate research in embedded systems security C6 10
    11 CY464 Security of Control Systems Understand the fundamentals of hardware, software, and network protocols used in industrial control systems C2 1
    Understand the vulnerabilities and threats to industrial control systems C2 1
    Analyze the information assets within an automation or control systems environment, classify them by value, and determine the risk that they face C4 3
    Develop and implement comprehensive mitigation strategies as well as effective administrative and technical risk management controls to protect and secure assets in a process control system C3 4, 8
    12 CY464 Security of Control Systems Understand the fundamentals of hardware, software, and network protocols used in industrial control systems C2 7
    Understand the vulnerabilities and threats to industrial control systems C3 8, 9
    Analyze the information assets within an automation or control systems environment, classify them by value, and determine the risk that they face C3 9, 10
    Develop and implement comprehensive mitigation strategies as well as effective administrative and technical risk management controls to protect and secure assets in a process control system C3 3
    13 CY446 Cyber Security Professional Ethics Gain the ability to enhance key factors of interpersonal relations C2 7
    Perform all professional activities and duties in accordance with the highest ethical principles C3 8, 9
    Carry out all times in accordance with existing laws, association values, and exercising the highest moral principles without compromising organization principles and without hurting others’ interests C3 9, 10
    Prepare and maintain an appropriate level of confidentiality, integrity, and availability of sensitive information in any course of professional activities C3 3
    Demonstrate safe cyber security practices C3 8,9

    University Elective Courses

    S.No Code Course Title CLO Bloom’s level PLO
    1 BA156 Entrepreneurship Identify the ethical and legal practices in entrepreneurship applied in business world. C2 1
    Know the actual cases of successful and unsuccessful entrepreneurial initiatives and are able to analyze different cases both actual and imaginary by applying the theoretical concepts C2 1
    Demonstrate an understanding of taught concepts through a business plan development that integrates all technical dimensions of a successful business start up C5 4
    2 BA157 Management Information Systems Student understand the roles of Information Systems in contemporary organizations C4 1, 3
    Students learn various types of information systems at various levels of the organizations C3 1, 2
    Student learn how to analyze and design an information system based on user requirements C3 5
    Students understand the strategic role of information systems and information technology in organizations. C5 4
    3 BA241 Principles of Marketing Ability to demonstrate people skills by successfully working in teams/groups C2 1
    Superior communication skills and ability to carry out professional presentations C1 1, 2
    Enhanced analytical abilities in diagnosing marketing issues and devising smart marketing decisions C2 3, 4
    4 HU313 Industrial Psychology Demonstrate an understanding of the basic elements of Industrial Psychology. C2 8, 9 
    Get familiarize with what I/O psychology is and what I/O psychologists do. C5 7,8
    Understand organizational culture be able to deal with any C3 8
    5 HU317 Interpersonal Skills/Public Relations Develop an understanding of interpersonal communication processes. C2 1
    Gain skills in active listening and receiving information from others. C3 5
    Develop the ability to work in a team by successful integration of theory and practice of interpersonal skills. C5 3, 4
    Undertake self-direction and independent learning. C5 3, 4
    6 HU214 Introduction to Sociology To explain sociological knowledge in everyday life. C2 1
    To analyze social and moral issue through sociological knowledge. C2 1
    To demonstrate the idea of respecting genders in different spheres of life. C3 5
    To apply the knowledge in everyday life to resolve social problems. C2 1
    7 FL201 Foreign Language: French Identify similarities and differences in vocabulary and recognize functions of grammatical units (parts of speech and phrases) and use formal / informal in two languages i.e. French and English C2 1
    Demonstrate that French is not a completely alien language and that students are already familiar with 30-40% of the French vocabulary C4 3
    Use basic French expressions to achieve optimum command on everyday expressions and carry out conversations in daily life C3 4, 5
    Apply knowledge of the language to examine the importance of language skills as a significant step towards career advancements, become a native like speaker of the language, teach others and develop one’s own desire to learn new language. C5 10
    8 FL202 Foreign Language: Chinese Identifying Chinese characters that are having similar or different way of writing, and their meanings, with reference to the identification of sounds in isolation and combined with more than one characters. C1 7
    Demonstrate the understanding of each character in grammatical, and vocabulary usage in formal and informal way of speech and in written. C2 7
    Usage of Chinese vocabulary in different occasion. Chinese is a different language as compared to other language. Benefit of Mandarin which are used in different countries C3 7
    Usage of Chinese vocabulary in different occasion. Chinese is a different language as compared to other language. Benefit of Mandarin which are used in different countries C4, C6 10
    9 HU414 Social Service To describe societal significance of social problems and to identify solutions. C1 9

    To apply the sociological knowledge and become an active members

    of the society to serve humanity.
    C5, C6 10