In the course, students will learn
There are enormous opportunities available in the field of cyber security. Some of the available options are:
The admissions shall be based on the merit drawn from the marks obtained in graduation or in the degree applicable as qualifying examination and personal interview. The admission process shall be following:
STAGE I: The merit list, for admission shall be determined on the basis of marks obtained (CGPA equivalent thereto) by the candidate in graduation or in the degree applicable as qualifying examination.
STAGE II: The candidates shall be called for Personal Interview on the basis of merit drawn as prescribed in stage I.
STAGE III: A combined merit on the basis of 85% from Stage I and 15 % from Stage II shall be drawn. Admissions shall be based in the order of combined merit.
S. No. | Course Code | Course Title |
---|---|---|
1 | Paper 101 | Fundamentals of Computer Security |
2 | Paper 102 | Networking Basics and Network Security |
3 | Paper 103 | Fundamentals of Web Designing and Web Application Security |
4 | Paper 104 | Cryptography |
5 | Paper 105 | Cloud Fundamentals and Cloud Security |
6 | Paper 106 | Project 1 |
S. No. | Course Code | Course Title |
---|---|---|
1 | Paper 201 | Mobile Eco System Security |
2 | Paper 202 | Internet of Things Security (IoT) |
3 | Paper 203 | Supervisory Control and Data Acquisition (SCADA) System and Information Hiding Techniques |
4 | Paper 204 | Cyber Laws and Forensics |
5 | Paper 205 | Information Security Compliance Management |
6 | Paper 206 | Project 2 |