Network Administration - Syllabus
Embark on a profound academic exploration as you delve into the Network Administration course () within the distinguished Tribhuvan university's BCA department. Aligned with the BCA Curriculum, this course (CACS406) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 100 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.
This 3 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.
Course Description: The course introduces the theoretical as well as practical concepts of
Network Administration. The course includes concepts of work station, server and services,
Network infrastructure, Implementing different network services.
Course Objectives: The objectives of this course is to make the students to design and
implement enterprise level network with its services
Units
Key Topics
-
Introduction to E-commerce
IN-1Overview of E-commerce and its significance in the digital age.
-
E-business vs E-commerce
IN-2Understanding the differences between E-business and E-commerce.
-
Features of E-commerce
IN-3Key characteristics and benefits of E-commerce.
Key Topics
-
Concept of Women Entrepreneurship
WO-1Understanding the definition and scope of women entrepreneurship, including its importance and relevance in today's economy.
-
Women Empowerment through Entrepreneurship
WO-2Exploring how entrepreneurship can be a powerful tool for women's empowerment, including its impact on their economic, social, and political status.
-
Women Entrepreneurship in Nepal
WO-3Examining the current state of women entrepreneurship in Nepal, including its opportunities, challenges, and success stories.
-
Problems of Women Entrepreneurship
WO-4Identifying and analyzing the common problems and obstacles faced by women entrepreneurs, including social, cultural, and economic barriers.
-
Future Challenges and Success Factors of Women Entrepreneurs
WO-5Discussing the future challenges and opportunities facing women entrepreneurs, including the key success factors and strategies for overcoming obstacles.
-
Service Requirements
WO-6Determining the requirements for a service, including hardware, software, and network requirements. This topic covers the process of identifying service requirements.
-
Service Planning and Engineering
WO-7Planning and engineering a service, including designing and implementing the service infrastructure. This topic covers the process of planning and engineering a service.
-
Service Launch
WO-8Launching a service, including testing, deployment, and maintenance. This topic covers the process of launching a service.
-
Disaster Recovery
WO-9Planning and implementing disaster recovery strategies for services, including backup and restore procedures. This topic covers the process of planning and implementing disaster recovery strategies.
Key Topics
-
Introduction to E-commerce
IN-1Overview of E-commerce and its significance in the digital age.
-
E-business vs E-commerce
IN-2Understanding the differences between E-business and E-commerce.
-
Features of E-commerce
IN-3Key characteristics and benefits of E-commerce.
-
Pure vs Partial E-commerce
IN-4Types of E-commerce models and their applications.
Key Topics
-
Authentication in ASP.NET Core
SE-01Learn how to implement authentication in ASP.NET Core applications using ASP.NET Core Identity and configure identity services.
-
Authorization in ASP.NET Core
SE-02Understand how to implement authorization in ASP.NET Core applications using roles, claims, and policies to secure access to resources.
-
Securing Controllers and Action Methods
SE-03Discover how to secure controllers and action methods in ASP.NET Core applications to prevent unauthorized access.
-
Cross-site Scripting (XSS) Attacks
SE-04Learn how to prevent cross-site scripting (XSS) attacks in ASP.NET Core applications by validating user input and encoding output.
-
SQL Injection Attacks
SE-05Understand how to prevent SQL injection attacks in ASP.NET Core applications by using parameterized queries and input validation.
-
Cross-site Request Forgery (CSRF) Attacks
SE-06Learn how to prevent cross-site request forgery (CSRF) attacks in ASP.NET Core applications by using anti-forgery tokens and validating requests.
-
Open Redirect Attacks
SE-07Discover how to prevent open redirect attacks in ASP.NET Core applications by validating redirects and using secure protocols.
-
Session Tracking
SE-10Understanding how to track user sessions using servlets, including session creation and management.
-
Database Server Administration
SE-08This topic covers the administration of database servers, including MySQL, and database management best practices.
-
Software Repository
SE-09Managing software packages and updates using a software repository. This includes configuring and using repository tools and techniques.
Key Topics
-
Procurement Planning for Network Setup
NE-101This topic covers the process of preparing a procurement plan and document for setting up an enterprise-level network, including identifying necessary resources and equipment.