B. Tech in Cyber Security and Forensic imparts knowledge about the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
Cyber forensics is a branch of digital forensic science pertaining to legal evidence found in cyberspace and digital storage media.
This program addresses the underlying need for cyber experts as the country is heading towards an internet explosion mostly fueled by e-commerce, e-banking, e-governance and social media.
The program trains students to maintain a digital document chain for any structured investigation to find out exactly what happened on a computing device and who was responsible for it.
Specialised programme in Cyber Security and Forensic within B. Tech Computer Science and Technology imparts knowledge about the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Cyber forensics is a branch of digital forensic science pertaining to legal evidence found in cyberspace and digital storage media. The programme addresses the underlying need of developing cyber security experts by providing specialized courses such ascyber security and data forensics, IT application security, Network security, information security, audit etc.
The graduates of this course understand the process of digital document chain for any structured investigation to find out exactly what happened on a computing device and who was responsible for it.
Why Cybersecurity and Forensic
Cybersecurity is important because it encompasses everything that pertains to protecting our sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries.
Cybersecurity risk is increasing, driven by global connectivity and usage of cloud services, like Amazon Web Services, to store sensitive data and personal information. Widespread poor configuration of cloud services paired with increasingly sophisticated cyber criminals means the risk that your organization suffers from a successful cyber attack or data breach is on the rise.
As everything is going digital Cyber Security is required in every industry, including healthcare, finance, retail and manufacturing.
Designed in collaboration with IBM with curriculum designed by PU Faculty along and IBM Industry Experts
2. PROJECT WORK & CURRICULUM:
(i) Students do two minor projects in third year and two major projects in fourth year
Imparting Skills in students through-
(i) Personality Development Program
(ii) Languages like C++, PHP, JAVA
4. WORKSHOPS/GUEST LECTURES:
Extensive & in-depth work shops and Guest lectures from prominent industry professionals
5. LIVE PROJECTS:
Exposure to work on live projects
All labs are industry based like:
Practicing attacks on vulnerable machines
Vulnerability Assessment using tools like
• IBM Webinars
• CISCO Academy Webinars etc.
3. Students will be given distinct assignments which help them during internships and even during jobs
1. Specialised Learning:
(i) Students are involved with various chapters like:
Open Web Application Security Project (OWASP)
(ii) Students can be certified as Ethical Hacker
2. Industry Demand
For professionals in this domain for Cyber Security: Cyber Security Architect, Cyber Security Analyst, Cyber Security Engineer, Network Penetration Testing and secure Configuration
ELIGIBILITY CRITERIA for B.Tech
Pre-University / Higher Secondary /10+2 examination Pass with Physics and Mathematics as compulsory subjects along with either Chemistry / Biotechnology / Biology / Technical Vocational subject
Obtained at least 45% marks (40% in case of candidates belonging to Reserved Category) in the above subjects taken together
Appeared for JEE (Main); JEE (Advanced); Karnataka CET; COMED-K; PUEET-2020 or any other State-level Engineering Entrance Examination.
|SEMESTER I||SEMESTER II|
|Mathematics I||3||Mathematics II||3|
|Physics||3||Data Structures using C||3|
|Programming in C Language||3||Engineering Graphics||2|
|Written Technical English||3||Spoken Technical English||3|
|Environmental Studies||2||Electronic Devices & Circuits||3|
|Urban Sociology||2||Introduction to Psychology||2|
|Open Source Software & Open Standards||2||Introduction to Mathematical Logic||2|
|Physics Lab||1||Data Structures using C Lab||1|
|C Programming Lab||1||Engineering Graphics Lab I||1|
|SEMESTER III||SEMESTER IV|
|Operating Systems||3||Microprocessors and Embedded Systems||3|
|Mathematics III||3||IT Data Security||2|
|OOPS using C++||3||Emerging Trends in Cyber Security 2||2|
|Computer Systems Architecture||3||Data Communication & Networks||3|
|Information Security fundamentals||2||Advanced DBMS||3|
|Database Management Systems & data Modelling||3||Theory of Automata & Computation||3|
|Technical Report writing||2||Appreciating Art Fundamentals||2|
|Emerging Trends in Cyber Security 1||2||Placement Related Communication||1|
|DBMS Lab||1||Microprocessors and Embedded Systems Lab||1|
|OOPS using C++ Lab||1||Advanced DBMS Lab||1|
|Operating Systems Lab||1||IT Data Security Lab||1|
|Data Communication & Networks Lab||1|
|SEMESTER V||SEMESTER VI|
|Physical Security||2||Digital Forensics – I||3|
|IT application security||2||Information security audit and monitoring||2|
|Software Engineering & Project Management||3||Information Security Intelligence and Compliance Analytics||3|
|Java Programming||3||Emerging Trends in Digital Forensics||1|
|Organizational behaviour||2||IT Systems security||3|
|Emerging Trends in Cyber Security 3||1||Design & Analysis of Algorithms||3|
|Effective Communication||2||Being Corporate Ready||1|
|Minor Project 1||4||IT Systems security Lab||1|
|Software Engineering & Project Management Lab||1||Minor Project 2||4|
|Java Programming Lab||1||Digital Forensics – I Lab||1|
|IT application and security Lab||1||Information Security Audit & Monitoring Lab||1|
|SEMESTER VII||SEMESTER VIII|
|IT Network Security||3||Entrepreneurship and Product Development||2|
|Digital Forensics –II||2||Information Security Management Practices||3|
|Information Technology Security Evaluation Criteria (ITSEC)||3||Intrusion Detection and Prevention system||3|
|Cryptography & Network Sec.||3||Leadership in a Dynamic Business Environment||2|
|Placement Boot Camp||1|
|Digital Forensics – II Lab||1||Major Project II||6|
|IT Network Security Lab||1|
|Major Project I||4|
*The above program structure is indicative in nature. The academic council of Presidency University reserves the rights to change, modify, or alter the curriculum structure and courses as per contemporary demand of the industry.