Honours in Cyber Security

Information Technology | B.Tech. ( IT)

Cyber Security aims to protect data, system and services from unauthorized access, misuse, modification, and disruption. To safeguard the infrastructure and information there is a high demand of skilled and knowledgeable security professionals. The honors program in Cyber Security aims in molding next generation cyber security professionals who can build secure and compliant systems. The program aims to create a strong foundation and detailed technical knowledge in security fundamentals, cryptography, cyber law, incident response, cloud security, penetration testing, software security, digital forensics and reverse engineering.

show more... show less...

    Cyber Security honors degree helps students in developing analytical and investigative skills needed to manage the evolving threat landscape through well formulated curriculum that foster hands-on learning. The cyber security honor’s program offered by department of Information Technology helps students to gain holistic view of security to solve complex problems, respond to cyber threats, assess risk, and apply cutting-edge security techniques. The Honors program offered range of courses that include courses on but not limited to Network Security, Application Security, and Incident Response and Investigation. As students’ progress through the program, they will develop the diverse knowledge, skills, abilities, and dispositions needed to succeed as a cybersecurity professional in a broad range of public or private sector contexts.

Cyber Security honors degree helps students in developing analytical and investigative skills needed to manage the evolving threat landscape through well formulated curriculum that foster hands-on learning. The cyber security honor’s program offered by department of Information Technology helps students to gain holistic view of security to solve complex problems, respond to cyber threats, assess risk, and apply cutting-edge security techniques. The Honors program offered range of courses that include courses on but not limited to Network Security, Application Security, and Incident Response and Investigation. As students’ progress through the program, they will develop the diverse knowledge, skills, abilities, and dispositions needed to succeed as a cybersecurity professional in a broad range of public or private sector contexts.

Objectives

This program aims to

  • Analyze challenges associated with cyber security to attempt solutions with applications of fundamental computing and security principles.
  • Design, implement, and evaluate a computing-based solution to meet requirement of secure software and cyber physical systems.
  • Apply security principles and practices to maintain operational functionality of system in the presence of risks and threats.
  • Impart knowledge of cyber laws, Information security compliances and ethical disclosures to prepare responsible Cyber Security professional

Learning Outcomes

At the successful completion of this Honor program, students will able to

  • Realize legal and ethical principles to be adopt in the domain of security practices
  • Demonstrate capability to work with cyber security related principles, tools and techniques, digital forensic lifecycle for proactive as well as responsive security
  • Apply allied domain knowledge of computing and information technologies for security
  • Analyze domain specific cyber security measures to be taken in response to protect different cyber physical systems and information sharing platforms

Eligibility Criteria

Students who have passed First Year of Engineering in Information Technology successfully.

Assessment Method

Laboratory performance evaluation, Mini Projects, Viva-voce, Continuous Assessment through internal assessments and unit tests, End Semester Examination

List of Courses

  • Cyber Laws
  • Vulnerability Analysis And Penetration Testing
  • Digital Forensic
  • Elective Courses:
    • Cloud Computing Security
    • Machine Learning for Cyber security
    • Malware Analysis and Reverse Engineering
  • Cyber Physical Systems And Security