Minor in Information Security

Security is a critical issue in all the computing systems due to increasing number of security related breaches and incidents. The need of security professionals is ever increasing due to most of the services being made available online.

This programme will focus on basics of security starting security goals, vulnerabilities, threats & controls to advanced topics like blockchain, cyber forensics and cyber laws etc. There will be topics on cryptography, cyber security, forensics, vulnerability assessment and penetrative testing.

show more... show less...

Key Information

Objectives

  • Understand security goals, vulnerabilities, threats & controls.
  • Implementation of various control mechanisms related to various security services.
  • Understand cybercrime, its prevention and cyber laws.
  • Carrying out various information security-related tasks such as Penetration Testing and Vulnerability Analysis.
  • Understand Digital forensics and Advanced Offensive Security techniques.

Learning Outcomes

At the successful completion of this minor program, an Engineering Graduate will be able to

  • LO1. Demonstrate the knowledge of security goals, vulnerabilities, threats and controls.
  • LO2. Discuss types of cybercrimes their prevention and applicability of various cyber laws.
  • LO3. Implement penetration testing, vulnerability analysis and offensive security techniques for applications and systems.

Assessment Method

Evaluation will be carried out through a variety of tools including Open book tests, MCQs (multiple-choice questions), Study of research papers, Internal Assessment tools and End Semester Examinations etc. Mini-Projects are offered to encourage project based learning among students.

Eligibility Criteria

Student who has earned all credits of First Year of Engineering in Electronics Engineering /  Mechanical Engineering / Electronics and Computer Engineering

List of Courses

  • Cryptography and System Security
  • Cyber Security, Forensics and Cyber Law
  • Block Chain Technology
  • Vulnerability Assessment and Penetrative Testing
  • Cyber Physical Systems Security
  • Applied Project