Anda di halaman 1dari 9

Lectu

re 32
Website
Security(W
orking with
Data: XML
Introductio
n)
T-
1:Cha
pter
11
RW-1
RW-2
L31
XML
Introduc
tion
W3C
Consorti
um


L32
Working
with
Data
Hiding
Data
L31
To Learn
the
Evolution
of XML
and new
Tagging
Tech


L32
To Learn
to Input
Data using
Byte
Streams
Case
Studies

Lecture 33

Term
Paper,Qui
z,Test 3


Week 12 Lectur
e 34
Website
Security(Website
Security : Security
Fundamentals)
T-
1:Term
Paper
RW-1
VL-1
Website
Data
Hacking
Introductio
n to Ethical
Hacking
Security
Breaking
Concept in
Python
To Learn
and be
aware of
Hacking
Tech to
Break
Security
and
Firewalls
Case
Studies

Lectur
e 35
Website
Security(Website
Security :
Introduction to
Profiles)
T-
1:Chapt
er 11
OR-1 L35
Banking
Website
Security
Basis
Security
Fundamen
tal

L36
Web
Profiles
Creation
L35
To Learn
Concept of
Banking
Website
Security

L36
To Learn
Customizat
ion in
Websites
Discussio
n

and
Implement
ation

Lectur
e 36
Website
Security(Website
Security :
Introduction to
Profiles)
T-
1:Chapt
er 11
OR-1 L35
Banking
Website
Security
Basis
Security
Fundamen
tal

L36
Web
Profiles
Creation
and
Implement
ation
L35
To Learn
Concept of
Banking
Website
Security

L36
To Learn
Customizat
ion in
Websites
Discussio
n

Week 13 Lectur
e 37
Component Based
Programming(Com
ponent Jargons)
T-
1:Chapt
er 14
Chapter
16
RW-1
RW-2
L37
Componen
t of Words
and
Expression
used by
Technical
People in
Web
Developm
ents
Jargon


L38
Technical
aspects of
Componen
t Based
Programmi
ng
L37
To
Understan
d Technical
Word
Power and
there
Working

L38
To
Implement
Jargon
Role
playSimul
ation

Lectur Component Based
Programming(Com
T-
1:Chapt
RW-1 L37
Componen
L37
To
Role
playSimul
e 38 ponent Jargons) er 14
Chapter
16
RW-2 t of Words
and
Expression
used by
Technical
People in
Web
Developm
ents
Jargon


L38
Technical
aspects of
Componen
t Based
Programmi
ng
Understan
d Technical
Word
Power and
there
Working

L38
To
Implement
Jargon
ation

Lectur
e 39
Component Based
Programming(Crea
ting a Component)
T-
1:Chapt
er 14
Chapter
16
VL-1 Website
Operations
from
different
locations
and IP
Addressing

Hosting
Pass Word
Verificatio
ns
To Learn
the Power
of Web
Hosting
Technique
s
Peer
learning

Week 14 Lectur
e 40
Component Based
Programming(Class
es)
T-
1:Chapt
er 14
Chapter
16
VL-1 Accessor

Types
public
private
protected
internal
protected
internal

Constructo
rs
To Learn
Implement
ation of
Classes
Case
Study
Properties

Lectur
e 41
Component Based
Programming(Nam
espaces)
T-
1:Chapt
er 14
Chapter
16
VL-1 L41
Revision
Hacking
Technique
s

L42
Revision
Classes
L41
Revision
To Learn
Concepts
of Hacking
Technique
s


L42
Revision
Classes
Revision
Peer
learning 1

Lectur
e 42
Component Based
Programming(Nam
espaces)
T-
1:Chapt
er 14
Chapter
16
VL-1 L41
Revision
Hacking
Technique
s

L42
Revision
Classes
L41
Revision
To Learn
Concepts
of Hacking
Technique
s


L42
Revision

Lecture
22
Working
with
Data(ADO.n
et
Fundamental
s)
T-1:Chapter 4 RW-1
RW-2
Beginning
of ASP Net
Understand
ing
Environme
nt
To Learn the
starters for
ASP Net
Peer
learning

Lecture 23 Working with
Data(Data
Binding)
T-1:Test RW-2
VL-1
Data
grid
Editing Data
Inserting Data
Element
To
Learn
Workin
g with
Data
Peer
learni
ng

Lecture 24

Term
Paper,Quiz,Tes
t 2


Week 9 Lecture 25 Working with Data(The
Data Controls)
T-
1:Chapter
4 Chapter
7
RW-2
VL-1
L25
Additio
n of the
Login
server
controls

L25
To
Learn
to add
a new
login

Case
Studies
L26
To
create
user
account
s

L27
Grid
View,
Data
Lists,
and
Detailed
View

L28
updatin
g the
data
stored
in the
databas
e using
paramet
ers and
referrin
g to
data
using
keys
that
uniquel
y
identify
items in
a
databas
e

L26
To
Learn
to add
a new
user

L27
To
Learn
to
create
Repor
ts


L28
To
Learn
to
refres
h
Datab
ase

Lecture 26 Working with Data(The
Data Controls)
T-
1:Chapter
4 Chapter
7
RW-2
VL-1
L25
Additio
n of the
Login
server
controls

L26
To
create
user
account
s

L27
Grid
L25
To
Learn
to add
a new
login


L26
To
Learn
to add
a new
user

L27
Case
Studies
View,
Data
Lists,
and
Detailed
View

L28
updatin
g the
data
stored
in the
databas
e using
paramet
ers and
referrin
g to
data
using
keys
that
uniquel
y
identify
items in
a
databas
e
To
Learn
to
create
Repor
ts


L28
To
Learn
to
refres
h
Datab
ase

Lecture 27 Working with Data(The
Data Controls)
T-
1:Chapter
4 Chapter
7
RW-2
VL-1
L25
Additio
n of the
Login
server
controls

L26
To
create
user
account
s

L27
Grid
View,
Data
Lists,
and
Detailed
View

L28
updatin
L25
To
Learn
to add
a new
login


L26
To
Learn
to add
a new
user

L27
To
Learn
to
create
Repor
ts


L28
Case
Studies
g the
data
stored
in the
databas
e using
paramet
ers and
referrin
g to
data
using
keys
that
uniquel
y
identify
items in
a
databas
e
To
Learn
to
refres
h
Datab
ase

Week 10 Lecture 28 Working with Data(The
Data Controls)
T-
1:Chapter
4 Chapter
7
RW-2
VL-1
L25
Additio
n of the
Login
server
controls

L26
To
create
user
account
s

L27
Grid
View,
Data
Lists,
and
Detailed
View

L28
updatin
g the
data
stored
in the
databas
e using
paramet
ers and
referrin
L25
To
Learn
to add
a new
login


L26
To
Learn
to add
a new
user

L27
To
Learn
to
create
Repor
ts


L28
To
Learn
to
refres
h
Datab
ase
Case
Studies
g to
data
using
keys
that
uniquel
y
identify
items in
a
databas
e

Lecture 29 Website Security(Working
with Data: Files and
Stream)
T-
1:Chapter
11
RW-2
VL-1
L29
Workin
g with
Data
Files
Openin
g a New
File
Saving
to FIle



L30
Workin
g with
Stream
of Data
Bytes
and the
Inbuilt
Classes
involve
d
L29
To
Learn
File
Handl
ing


L30
To
import
Expor
t Data
Using
Byte
Strea
m
Brainstor
ming

Lecture 30 Website Security(Working
with Data: Files and
Stream)
T-
1:Chapter
11
RW-2
VL-1
L29
Workin
g with
Data
Files
Openin
g a New
File
Saving
to FIle



L30
Workin
g with
Stream
of Data
Bytes
L29
To
Learn
File
Handl
ing


L30
To
import
Expor
t Data
Using
Byte
Strea
m
Brainstor
ming
and the
Inbuilt
Classes
involve
d

Week 11 Lecture 31 Website Security(Working
with Data: XML
Introduction)
T-
1:Chapter
11
RW-1
RW-2
L31
XML
Introduc
tion
W3C
Consort
ium


L32
Workin
g with
Data
Hiding
Data
L31
To
Learn
the
Evolut
ion of
XML
and
new
Taggi
ng
Tech


L32
To
Learn
to
Input
Data
using
Byte
Strea
ms
Case
Studies