B.Tech/M.Tech in Computer Science Engineering with specialization in Cyber Security

 

 

Course Offered

Duration (in years)

Eligibility Criteria

B.Tech in Computer Science Engineering (Cyber Security)

4

12th standard pass with Physics, Maths, Chemistry/ Computer Science with at least 60% marks.

 

M.Tech in Computer Science Engineering (Cyber Security)

6

 

 

On successful completion of 4 years course the student will receive B.Tech Degree and those who successfully complete 6 years course will receive M.Tech Degree.Students have the option to exit after 4 years, with only B.Tech Degree.

In the 21st century, technology is omnipresent in our lives. With a boom in the technology sector, it is proving to be a lucrative career opportunity for students, who are in the juncture to pass out from school and are considering various aspects for their future career option. Computer Science Engineering is the most popular course for the Engineering aspirants.With cyber security impacting the country's security, the national security adviser, announced that the government is putting in place a national cyber security architecture to prevent sabotage, espionage and other forms of cyber threats.

India has seen many attacks on its critical installations and the misuse of social media and internet has brought home the threat of cyber-terrorism, which cyber security experts say the country is poorly equipped to handle. To meet the needs,   B. Tech in Computer Science Engineering with specialization in Cyber Security offered by The Neotia University prepares you for an exciting career in the domain. On passing out, one can choose a career either between Government cyber organizations and National organizations such as DRDO, ISRO or private firms with needs of IT security.

Course Structure

Semester 1

Subject Name

Credit Points

Effective English (English deficient students only) / English I

3

Multivariable Calculus and Differential Equations

4

Physics

3

Physics Lab

2

Introduction to Electronics

3

Introduction to Electronics Lab

2

Computer Programming and Problem Solving

3

Computer Programming and Problem Solving Lab (using C)

2

TOTAL

22

Semester 2

Subject Name

Credit Points

English I /  English II

2

Differential and Difference Equations

4

Discrete Mathematical Structures

4

Software Development Fundamentals

3

Software Development Fundamentals Lab (using C++)

2

Digital Logic Design

3

Digital Logic Design Lab

2

Engineering Graphics

2

TOTAL

23

Semester 3

Subject Name

Credit Points

Applied Probability and Statistics

4

Computer Architecture and Organization

3

Object-Oriented Program Design

2

Object-Oriented Program Design Lab (Using Java)

2

Data Structure, Algorithm and Complexity

3

Data Structures, Algorithm and Complexity Lab(Using C, C++ and Java)

2

English II / General Elective I

3

Workshop Practice

2

TOTAL

21

Semester 4

Subject Name

Credit Points

Microprocessor and Interfacing

2

Microprocessor and Interfacing Lab

1

Soft Computing

3

Operating Systems

3

Operating Systems Lab

2

Applied Sociology and Psychology

3

Environmental Science

3

General Elective II

3

Industrial Training (Summer after Semester 4)

4

TOTAL

24

Semester 5

Subject Name

Credit Points

Database Systems

3

Database Systems Lab

2

Computer Networks

3

Computer Networks Lab

2

Program Elective I

3

Applied Economics

3

General Elective III 3
General Elective IV 3

TOTAL

22

Semester 6

Subject Name

Credit Points

Fundamentals of Cryptography

3

Embedded Systems

3

Embedded Systems Lab

2

Software Engineering

3

Software Engineering Lab

2

Program Elective II

3

Program Elective III 3
General Elective V 3
Industrial Training (Summer after Semester 6) 4

TOTAL

26

Semester 7

Subject Name

Credit Points

Parallel and Distributed Computing

3

System Fundamentals

3

Social Issues and Professional Practice

2

Program Elective IV

3

rogram Elective V

3

General Elective VI

3

General Elective VII

3

General Elective VIII

2

TOTAL

22

Semester 8

Subject Name

Credit Points

Project (After completion of Semester 7)

20

TOTAL

20

Advisory Committee

Dr.Ujjwal Maulik
 Professor Computer Science and Engineering
 Jadavpur University

Dr.Gulshan Rai
 Cyber Security Head
 Government of India

Dr.Sipra Das Bit
 Professor Computer Science and Technology
 Mechanical Engineering
 IIEST

Dr.Shefali S. Dash
 Former Director Genera
 Ministry of Communications & Information Technology

Prof. M. Khalid
 Former Director, NITMAS

 
  • Career Prospects for Computer Science Engineering with specilization in Cyber Security

    New cyber threats appear constantly, creating new and innovative career opportunities. Industries such as health care, finance, manufacturing and retail all hire cyber security professionals to protect valuable information from cyber breaches. The demand for specialists in the field is high. And because any individual or organization is a potential target for cyber-attacks – from governments to banks to hospitals – cyber security professionals can find employment in a wide range of industries. Some of the more common career paths in this field include:

    Chief Information Security Officer is typically a mid-executive level position whose job is to oversee the general operations of a company’s or organization’s IT security division. They are directly responsible for planning, coordinating and directing all computer, network and data security needs of their employers. CISOs work directly with upper-level management to determine an organization’s unique cyber security needs.

    Forensic Computer Analyst is the detective of the cyber security world. Forensic computer analysts review computer-based information for evidence following a security breach or other incident. Tasks include handling hard drives and other storage devices and employing specialized software programs in order to identify vulnerabilities and recover data from damaged or destroyed devices.

    Information Security Analyst is responsible for the protection of an organization’s computer systems and networks. They plan and execute programs and other measures, including installing and using software for data encryption and firewalls. Additionally, ISAs help design and execute plans and methods for the recovery of data and systems following a cyber-attack.

    Penetration Testing concerns the proactive authorized employment of testing techniques on IT infrastructures to identify system vulnerabilities. Simply put, penetration testers attempt to (with authorization) hack into computer and network systems to pre-emptively discover operating system vulnerabilities, service and application problems, improper configurations and more, before outside intruders have the opportunity to cause real damage. Penetration testers must be highly creative in their methods, often using testing tools of their own design, to “break into” the systems under scrutiny.

    Security Architect is responsible for establishing and maintaining network security for his or her organization. Security architects work in all sectors of the economy for companies, government agencies, and non-profits. In addition security architects develop and implement organization security policies and procedures for employees and others with access to computer, network and data systems.

    Security Engineering provides a specialized engineering approach to cyber security, specifically regarding the design of security systems to counter potentially catastrophic issues. Security engineers are often involved in systems maintenance, performing security checks to identify potential vulnerabilities, as well as keeping logs and developing automation scripts to track security incidents.

    Security Systems Administrator’s core responsibilities are quite similar to those of many other cyber security jobs: installing, administering, maintaining and troubleshooting computer, network and data security systems. Typical tasks include systems monitoring and running regular backups, and setting up, deleting and maintaining individual user accounts.

    IT security consultants meet with clients to advise them on how to best protect their organizations’ cyber security objectives efficiently and cost effectively. They are often hired companies that cannot afford to handle their security issues in-house, but are also employed by larger businesses to supplement their security teams and provide an unbiased outside perspective to current systems issues.

    The explosion in the demand for skilled cyber security professionals combined with a scarcity in talent supply has resulted in high wages and excellent benefits for qualified applicants.

 

Get In Touch

  • City Office: Monday - Friday: 11:00 AM - 6:00 PM
  • Saturday (1st, 3rd, 5th) - 11:00 AM - 6:00 PM
  • Campus: Monday - Friday 10AM - 4PM
  • Phone: 1800 419 0909
  • Email: contact@tnu.in
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…