Network Administration - Syllabus

Course Overview and Structure

Embark on a profound academic exploration as you delve into the Network Administration course () within the distinguished Tribhuvan university's BCA department. Aligned with the BCA Curriculum, this course (CACS406) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 100 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.

This 3 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.


Course Description: The course introduces the theoretical as well as practical concepts of
Network Administration. The course includes concepts of work station, server and services,
Network infrastructure, Implementing different network services.
Course Objectives: The objectives of this course is to make the students to design and
implement enterprise level network with its services

Units

Key Topics

  • Introduction to E-commerce
    IN-1

    Overview of E-commerce and its significance in the digital age.

  • E-business vs E-commerce
    IN-2

    Understanding the differences between E-business and E-commerce.

  • Features of E-commerce
    IN-3

    Key characteristics and benefits of E-commerce.

Key Topics

  • Concept of Women Entrepreneurship
    WO-1

    Understanding the definition and scope of women entrepreneurship, including its importance and relevance in today's economy.

  • Women Empowerment through Entrepreneurship
    WO-2

    Exploring how entrepreneurship can be a powerful tool for women's empowerment, including its impact on their economic, social, and political status.

  • Women Entrepreneurship in Nepal
    WO-3

    Examining the current state of women entrepreneurship in Nepal, including its opportunities, challenges, and success stories.

  • Problems of Women Entrepreneurship
    WO-4

    Identifying and analyzing the common problems and obstacles faced by women entrepreneurs, including social, cultural, and economic barriers.

  • Future Challenges and Success Factors of Women Entrepreneurs
    WO-5

    Discussing the future challenges and opportunities facing women entrepreneurs, including the key success factors and strategies for overcoming obstacles.

  • Service Requirements
    WO-6

    Determining the requirements for a service, including hardware, software, and network requirements. This topic covers the process of identifying service requirements.

  • Service Planning and Engineering
    WO-7

    Planning and engineering a service, including designing and implementing the service infrastructure. This topic covers the process of planning and engineering a service.

  • Service Launch
    WO-8

    Launching a service, including testing, deployment, and maintenance. This topic covers the process of launching a service.

  • Disaster Recovery
    WO-9

    Planning and implementing disaster recovery strategies for services, including backup and restore procedures. This topic covers the process of planning and implementing disaster recovery strategies.

Key Topics

  • Introduction to E-commerce
    IN-1

    Overview of E-commerce and its significance in the digital age.

  • E-business vs E-commerce
    IN-2

    Understanding the differences between E-business and E-commerce.

  • Features of E-commerce
    IN-3

    Key characteristics and benefits of E-commerce.

  • Pure vs Partial E-commerce
    IN-4

    Types of E-commerce models and their applications.

Key Topics

  • Authentication in ASP.NET Core
    SE-01

    Learn how to implement authentication in ASP.NET Core applications using ASP.NET Core Identity and configure identity services.

  • Authorization in ASP.NET Core
    SE-02

    Understand how to implement authorization in ASP.NET Core applications using roles, claims, and policies to secure access to resources.

  • Securing Controllers and Action Methods
    SE-03

    Discover how to secure controllers and action methods in ASP.NET Core applications to prevent unauthorized access.

  • Cross-site Scripting (XSS) Attacks
    SE-04

    Learn how to prevent cross-site scripting (XSS) attacks in ASP.NET Core applications by validating user input and encoding output.

  • SQL Injection Attacks
    SE-05

    Understand how to prevent SQL injection attacks in ASP.NET Core applications by using parameterized queries and input validation.

  • Cross-site Request Forgery (CSRF) Attacks
    SE-06

    Learn how to prevent cross-site request forgery (CSRF) attacks in ASP.NET Core applications by using anti-forgery tokens and validating requests.

  • Open Redirect Attacks
    SE-07

    Discover how to prevent open redirect attacks in ASP.NET Core applications by validating redirects and using secure protocols.

  • Session Tracking
    SE-10

    Understanding how to track user sessions using servlets, including session creation and management.

  • Database Server Administration
    SE-08

    This topic covers the administration of database servers, including MySQL, and database management best practices.

  • Software Repository
    SE-09

    Managing software packages and updates using a software repository. This includes configuring and using repository tools and techniques.

Key Topics

  • Procurement Planning for Network Setup
    NE-101

    This topic covers the process of preparing a procurement plan and document for setting up an enterprise-level network, including identifying necessary resources and equipment.