The 2020 BTech Admission is Closed.
The 2020 BTech Admission is Closed.
In regard to the changing trends and demands in cyberspace, cyber security will continue to grow as obligatory technologies as the world becomes digitally connected.
Amrita Vishwa Vidyapeetham being the No 1 Private University in India is intensifying the cyber security allied edifying services with its need of time B. Tech in Computer Science Engineering specialized on Cyber Security.
In fact, it is the most relevant and promising sphere of influence for students to pursue their carrier guided by expertise who are offering the full-time M. Tech in Cyber Security, first of a kind in India from 2006 as a initiative by TIFAC-CORE Vision 2020 of Dr. A.P.J. Abdul Kalam.
This program of Computer Science - Cyber Security is intended to mould students into well prepared cyber security professionals and has been designed with a good balance between theoretical & practical aspects, analytical and architectural methods complemented by academic research and industry best practices.The curriculum is specially prepared by experts covering all the needs and aspects a cyber security engineer needs. Through this program, the students will learn and acquire the necessary theoretical background with concept clarity and insights into hands-on technical aspects of cyber security, a good understanding of analytical methods and industry practices in the field. They cultivate an proficiency into the growing threats and vulnerabilities in cyber era.
The program is designed specially keeping in mind the demand and skill requirement for coming decade for satisfying the 3.5 million unfilled cyber security jobs globally by 2025 (Source: NY Times). The program will deliver an opportunity for the students to acquire the needed soft skills, technical skills, implementation applied cyber security skills and also IT management skills. It serves as a hybrid blend of cyber perception and industrial practice. Our University has MoU for academic partnership in training our graduates for core cyber related on-demand industry ready certifications that is to say EC-Council's Certified Ethical Hacker (CEH), ComTIA's Cyber Security Analyst (CySA+) and many more at an reasonably priced student kits. This B. Tech program also provides opportunities for students to study abroad through student exchange programs during bachelor's course and can be the promising pathway for our cyber security intense dual-degree masters and PhD programs thereafter.
In near future, the number of unfilled cyber security jobs is expected to grow by 350 percent (source: MIT Technology Review) creating massive skills gap over copious cyber security industries in India and abroad, Antivirus companies, Banking/Finance/Insurance sectors, IT companies and government (defense and non-defense) organizations need security analyst to protect their digital assets as not surprisingly, they all deal with sensitive information, which is commonly targeted by attackers.
Opportunities for our graduates are easy to fit into the core job roles of Cyber Security Analyst, Security Engineer, Security Architect, Security Administrator, Security Software Developer, Cryptanalyst, Digital Forensic Analyst, Vulnerability Assessor, Cloud Security Architect, Intrusion Detection Specialist, Cybercrime Investigator, Malware Analyst, Data Privacy Officer, Computer Security Incident Responder, Governance Compliance & Risk (GRC) Manager and Security Consultant. There is a wide range of placements for these cyber security job roles program and some includes and not limited to: ABB Corp, Cisco, IBM, VMware, EY, Paladion Networks, Bosch, Nokia, Philips, Amazon, IndusFace, Deloitte, SBI-Infosec Wing, Symantec, CloudByte and so on. There is wide range of opportunities available in India and abroad for Cyber Security Research.
Ultimately this programme will yield next generation cyber security leaders who can be successfully employed in various sectors of industries, business firms, Government agencies, financial bodies, and educational institutions.
Also the major strength of amrita lies at collaborative alliance of academic and industrial partners over TIFAC-CORE which gives significant thrust to the frontier areas of Cyber Security, including technology, practice, management, and policy issues. The unique aspect of this CORE is coming together and partnering of industry and academia to create innovative educational and research programs and develop world-class expertise in Cyber Security. Amrita TIFAC-CORE in cyber security acts as turning point in career path which helped the students in gaining a lot of practical exposure to industries like real world research and work coined by an alumini of amrita school of engineering amirtapuri campus.
B. Tech. (Bachelor of Technology) in Computer Science and Engineering (Cyber Security) is a program offered by the School of Engineering, Amrita Vishwa Vidyapeetham.
In regard to the changing trends and demands in cyberspace, cyber security will continue to grow as obligatory technologies as the world becomes digitally connected.
Amrita Vishwa Vidyapeetham being the No 1 Private University in India is intensifying the cyber security allied edifying services with its need of time B. Tech. in Computer Science Engineering specialized on Cyber Security. In fact, it is the most relevant and promising sphere of influence for students to pursue their carrier guided by expertise who are offering the full-time M. Tech in Cyber Security, first of a kind in India from 2006 as a initiative by TIFAC-CORE Vision 2020 of Dr. A.P.J. Abdul Kalam.
This program of Computer Science - Cyber Security is intended to mould students into well prepared cyber security professionals and has been designed with a good balance between theoretical & practical aspects, analytical and architectural methods complemented by academic research and industry best practices.The curriculum is specially prepared by experts covering all the needs and aspects a cyber security engineer needs. Through this program, the students will learn and acquire the necessary theoretical background with concept clarity and insights into hands-on technical aspects of cyber security, a good understanding of analytical methods and industry practices in the field. They cultivate an proficiency into the growing threats and vulnerabilities in cyber era.
The program is designed specially keeping in mind the demand and skill requirement for coming decade for satisfying the 3.5 million unfilled cyber security jobs globally by 2025 (Source: NY Times). The program will deliver an opportunity for the students to acquire the needed soft skills, technical skills, implementation applied cyber security skills and also IT management skills. It serves as a hybrid blend of cyber perception and industrial practice. Our University has MoU for academic partnership in training our graduates for core cyber related on-demand industry ready certifications that is to say EC-Council's Certified Ethical Hacker (CEH), ComTIA's Cyber Security Analyst (CySA+) and many more at an reasonably priced student kits. This B. Tech program also provides opportunities for students to study abroad through student exchange programs during bachelor's course and can be the promising pathway for our cyber security intense dual-degree masters and PhD programs thereafter.
In near future, the number of unfilled cyber security jobs is expected to grow by 350 percent (source: MIT Technology Review) creating massive skills gap over copious cyber security industries in India and abroad, Antivirus companies, Banking/Finance/Insurance sectors, IT companies and government (defense and non-defense) organizations need security analyst to protect their digital assets as not surprisingly, they all deal with sensitive information, which is commonly targeted by attackers.
Opportunities for our graduates are easy to fit into the core job roles of Cyber Security Analyst, Security Engineer, Security Architect, Security Administrator, Security Software
Developer, Cryptanalyst, Digital Forensic Analyst, Vulnerability Assessor, Cloud Security Architect, Intrusion Detection Specialist, Cybercrime Investigator, Malware Analyst, Data Privacy Officer, Computer Security Incident Responder, Governance Compliance & Risk (GRC) Manager and Security Consultant. There is a wide range of placements for these cyber security job roles program and some includes and not limited to: ABB Corp, Cisco, IBM, VMware, EY, Paladion Networks, Bosch, Nokia, Philips, Amazon, IndusFace, Deloitte, SBI-Infosec Wing, Symantec, CloudByte and so on. There is wide range of opportunities available in India and abroad for Cyber Security Research.
Ultimately this programme will yield next generation cyber security leaders who can be successfully employed in various sectors of industries, business firms, Government agencies, financial bodies, and educational institutions.
Also the major strength of amrita lies at collaborative alliance of academic and industrial partners over TIFAC-CORE which gives significant thrust to the frontier areas of Cyber Security, including technology, practice, management, and policy issues. The unique aspect of this CORE is coming together and partnering of industry and academia to create innovative educational and research programs and develop world-class expertise in Cyber Security. Amrita TIFAC-CORE in cyber security acts as turning point in career path which helped the students in gaining a lot of practical exposure to industries like real world research and work coined by an alumini of Amrita School of Engineering Amirtapuri campus.
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
HUM | 19ENG111 | Technical Communication | 2 | 0 | 3 | 3 |
ENGG | 20CYS101 | Classical Cryptography | 2 | 0 | 0 | 2 |
MAT | 20MAT102 | Linear Algebra | 3 | 1 | 0 | 4 |
SCI | 19PHY101 | Engineering Physics | 2 | 1 | 0 | 3 |
ENGG | 19CSE100 | Problem Solving and Algorithmic Thinking | 2 | 1 | 3 | 4 |
ENGG | 20CYS102 | Principles of Engineering | 2 | 0 | 3 | 3 |
ENGG | 20CYS103 | Computer Hardware and System Essentials | 2 | 0 | 3 | 3 |
HUM | 19CUL101 | Cultural Education – 1 | 2 | 0 | 3 | 2 |
Total (17 L + 3 T + 12 P = 32 hrs) | 24 |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
MAT | 19MAT115 | Discrete Mathematics | 3 | 1 | 0 | 4 |
MAT | 20MAT112 | Number Theory and Algebra | 3 | 0 | 0 | 3 |
ENGG | 20CYS111 | Digital Signal Processing | 2 | 1 | 0 | 3 |
ENGG | 20CYS112 | Computer Organisation and Architecture | 3 | 0 | 3 | 4 |
ENGG | 20CYS113 | Computer Programming | 3 | 0 | 0 | 3 |
ENGG | 20CYS181 | Computer Programming lab | 0 | 0 | 3 | 1 |
ENGG | 20CYS114 | Cyber Security Essentials | 2 | 0 | 3 | 3 |
HUM | 19CUL111 | Cultural Education – II | 2 | 0 | 0 | 2 |
Total (18L + 2T + 9P = 29hrs) | 23 |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
MAT | 20CYS201 | Optimization Techniques | 3 | 1 | 0 | 4 |
ENGG | 20CYS202 | User Interface Design | 1 | 0 | 3 | 2 |
ENGG | 20CYS203 | Operating Systems | 3 | 0 | 0 | 3 |
ENGG | 20CYS281 | Operating Systems Lab | 0 | 0 | 3 | 1 |
ENGG | 19CYS201 | Advanced Programming | 2 | 0 | 3 | 3 |
ENGG | 20CYS204 | Database Management System | 2 | 0 | 3 | 3 |
ENGG | 20CYS205 | Modern Cryptography | 3 | 1 | 0 | 4 |
HUM | 19AVP201 | Amrita Value Program I | 1 | 0 | 0 | 1 |
Total (15L + 2T +12P = 29 hrs) | 21 |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
SCI | 20CYS211 | Probability and Statistics | 3 | 1 | 0 | 4 |
ENGG | 20CYS212 | Multimedia Processing | 2 | 0 | 3 | 3 |
ENGG | 20CYS213 | System Security | 3 | 0 | 0 | 3 |
ENGG | 20CYS282 | System Security Lab | 0 | 0 | 3 | 1 |
ENGG | 19CSE305 | Machine Learning | 2 | 0 | 3 | 3 |
ENGG | 20CYS214 | Data Structures and Algorithms | 3 | 0 | 0 | 3 |
ENGG | 20CYS283 | Data Structures and Algorithms Lab | 0 | 0 | 3 | 1 |
HUM | 19AVP211 | Amrita Value Program II | 1 | 0 | 0 | 1 |
HUM | Humanities Elective | 2 | 0 | 0 | 2 | |
HUM | 19SSK211 | Soft Skills – 1 | 1 | 0 | 3 | 2 |
HUM | 19MNG300 | Disaster Management | - | P/F | ||
Total (17 L + 1T + 15 P = 33hrs) | 23 |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
ENGG | 20CYS301 | Digital Communication | 3 | 0 | 0 | 3 |
ENGG | 20CYS302 | Secure Coding | 3 | 0 | 0 | 3 |
ENGG | 20CYS381 | Secure Coding Lab | 0 | 0 | 3 | 1 |
ENGG | 19CSE302 | Design and Analysis of Algorithms | 3 | 0 | 0 | 3 |
ENGG | 20CYS303 | Computer Networks | 3 | 0 | 0 | 3 |
ENGG | 20CTS382 | Computer Networks Lab | 0 | 0 | 3 | 1 |
ENGG | 20CYS304 | Artificial Intelligence and Neural Networks | 3 | 0 | 3 | 4 |
ENGG | 20CYS383 | Java Programming Lab | 0 | 0 | 3 | 1 |
HUM | 19SSK301 | Soft Skills - 2 | 1 | 0 | 3 | 2 |
HUM | 19ENV300 | Environmental Science | P/F | |||
ENGG | 19LIV390 | Live - in - Labs | [3] | |||
Total (16L + 0T + 15P = 31 hrs) | 21+[3] |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
ENGG | 20CYS311 | Cyber Forensics | 2 | 0 | 3 | 3 |
ENGG | 20CYS312 | Principles of Programming Languages | 2 | 0 | 3 | 3 |
ENGG | 20CYS384 | Advanced Protocol Engineering and Security Lab | 0 | 0 | 3 | 1 |
ENGG | 20CYS313 | Network Security | 3 | 0 | 0 | 3 |
ENGG | 20CYS314 | Applied Cryptography | 3 | 1 | 0 | 4 |
ENGG | 20CYS315 | Automata Theory and Compiler Design | 2 | 0 | 3 | 3 |
ENGG | Professional Elective – 1 | 3 | 0 | 0 | 3 | |
HUM | 19SSK311 | Soft Skills – 3 | 1 | 0 | 3 | 2 |
ENGG | 19LIV490 | Live-in-Labs | [3] | |||
Total (16L + 1T +15P = 32 hrs) | 22+[3] |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
ENGG | 20CYS401 | Secure Software Engineering | 2 | 0 | 3 | 3 |
ENGG | 20CYS402 | Distributed Systems and Cloud Computing | 2 | 0 | 3 | 3 |
ENGG | 20CYS403 | Web Application Security | 2 | 0 | 3 | 3 |
ENGG | 20CYS404 | Android Application Development | 0 | 0 | 3 | 1 |
ENGG | Professional Elective - 2 | 3 | 0 | 0 | 3 | |
ENGG | Professional Elective - 3 | 3 | 0 | 0 | 3 | |
ENGG | Free Elective - 1 (Management Elective) | 3 | 0 | 0 | 3 | |
PRJ | 20CYS495 | Project - Phase - 1/ Seminar | 2 | |||
HUM | 19LAW300 | Indian Constitution | P/F | |||
Total (15L+0T+12P +12P = 27 hrs) | 21 |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
PRJ | 20CYS499 | Project - Phase – 2 | 0 | 0 | 30 | 10 |
Total (30hrs) | 10 | |||||
Total Credits | 165 |
*Professional Elective - Electives categorised under Engineering, Science, Mathematics, Live-in-Labs, and NPTEL Courses. Student can opt for such electives across departments/campuses. Students with CGPA of 7.0 and above can opt for a maximum of 2 NPTEL courses with the credits not exceeding 8. |
** Free Electives - This will include courses offered by Faculty of Humanities and Social Sciences/ Faculty Arts, Commerce and Media / Faculty of Management/Amrita Darshanam -(International Centre for Spiritual Studies). |
*** Live-in-Labs - Students undertaking and registering for a Live-in-Labs project, can be exempted from registering for an Elective course in the higher semester. |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
Professional Elective - I | ||||||
ENGG | 20CYS331 | Wireless Sensor Network Security | 3 | 0 | 0 | 3 |
ENGG | 19CSE436 | Mobile and Wireless Security | 3 | 0 | 0 | 3 |
ENGG | 19CSE446 | Internet of Things | 2 | 0 | 3 | 3 |
Professional Elective - II | ||||||
ENGG | 20CYS431 | Program Obfuscation | 3 | 0 | 0 | 3 |
ENGG | 20CYS432 | Vulnerability Assessment and Penetration Testing | 3 | 0 | 0 | 3 |
ENGG | 20CYS433 | Blockchain Technology | 2 | 0 | 3 | 3 |
Professional Elective - III | ||||||
ENGG | 20CYS441 | Formal Methods for Security | 3 | 0 | 0 | 2 |
ENGG | 20CYS442 | Hardware Security | 3 | 0 | 0 | 3 |
ENGG | 20CYS443 | Biometrics and Security | 3 | 0 | 0 | 3 |
Cat | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
HUM | 19ENG111 | Technical Communication | 2 | 0 | 3 | 3 |
CYS | 20CYS101 | Classical Cryptography | 2 | 0 | 0 | 2 |
MAT | 20MAT102 | Linear Algebra | 3 | 1 | 0 | 4 |
SCI | 19PHY101 | Engineering Physics | 2 | 1 | 0 | 3 |
ENGG | 19CSE100 | Problem Solving and Algorithmic Thinking | 2 | 1 | 3 | 4 |
ENGG | 20CYS102 | Principles of Engineering | 2 | 0 | 3 | 3 |
CYS | 20CYS103 | Computer Hardware and System Essentials | 2 | 0 | 3 | 3 |
HUM | 19CUL101 | Cultural Education – 1 | 2 | 0 | 0 | 2 |
Total (17 L + 3 T + 12 P = 32 hrs) | 24 |
Cat | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
MAT | 19MAT115 | Discrete Mathematics | 3 | 1 | 0 | 4 |
MAT | 20MAT112 | Number Theory and Algebra | 3 | 0 | 0 | 3 |
ECE | 20CYS111 | Digital Signal Processing | 2 | 1 | 0 | 3 |
CYS | 20CYS112 | Computer Organisation and Architecture | 3 | 0 | 3 | 4 |
CYS | 20CYS113 | Computer Programming | 3 | 0 | 0 | 3 |
CYS | 20CYS181 | Computer Programming lab | 0 | 0 | 3 | 1 |
CYS | 20CYS114 | Cyber Security Essentials | 2 | 0 | 3 | 3 |
HUM | 19CUL111 | Cultural Education – II | 2 | 0 | 0 | 2 |
Total (18L + 2T + 9P = 29hrs) | 23 |
Cat | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
MAT | 20CYS201 | Optimization Techniques | 3 | 1 | 0 | 4 |
CYS | 20CYS202 | User Interface Design | 1 | 0 | 3 | 2 |
CSE | 20CYS203 | Operating Systems | 3 | 0 | 0 | 3 |
CSE | 20CYS281 | Operating System Lab | 0 | 0 | 3 | 1 |
CSE | 19CSE201 | Advanced Programming | 2 | 0 | 3 | 3 |
CSE | 20CYS204 | Database Management System | 2 | 0 | 3 | 3 |
CYS | 20CYS205 | Modern Cryptography | 3 | 1 | 0 | 4 |
HUM | 19AVP201 | Amrita Value Program I | 1 | 0 | 0 | 1 |
Total (15 L + 2 T + 12 P = 29 hrs) | 21 |
Cat | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
MAT | 20CYS211 | Probability and Statistics | 3 | 1 | 0 | 4 |
CYS | 20CYS212 | Multimedia Processing | 2 | 0 | 3 | 3 |
CYS | 20CYS213 | System Security | 3 | 0 | 0 | 3 |
CYS | 20CYS282 | System Security Lab | 0 | 0 | 3 | 1 |
CYS | 19CSE305 | Machine Learning | 2 | 0 | 3 | 3 |
CSE | 20CYS214 | Data Structures and Algorithms | 3 | 0 | 0 | 3 |
CSE | 20CYS283 | Data Structures and Algorithms Lab | 0 | 0 | 3 | 1 |
HUM | 19AVP211 | Amrita Value Program II | 1 | 0 | 0 | 1 |
HUM | Humanities Elective | 2 | 0 | 0 | 2 | |
HUM | 19SSK211 | Soft Skills – 1 | 1 | 0 | 3 | 2 |
HUM | 19MNG300 | Disaster Management | - | P/F | ||
Total (17 L + 1T + 15 P = 33hrs) | 23 |
Cat | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
CYS | 20CYS301 | Digital Communication | 3 | 0 | 0 | 3 |
CYS | 20CYS302 | Secure Coding | 3 | 0 | 0 | 3 |
CYS | 20CYS381 | Secure Coding Lab | 0 | 0 | 3 | 1 |
CYS | 19CSE302 | Design and Analysis of Algorithms | 3 | 0 | 0 | 3 |
CSE | 20CYS303 | Computer Networks | 3 | 0 | 0 | 3 |
CSE | 20CYS382 | Computer Networks lab | 0 | 0 | 3 | 1 |
CSE | 20CYS304 | Artificial Intelligence and Neural Networks | 3 | 0 | 3 | 4 |
CYS | 20CYS383 | Java Programming Lab | 0 | 0 | 3 | 1 |
HUM | 19SSK301 | Soft Skills – 2 | 1 | 0 | 3 | 2 |
HUM | 19ENV300 | Environmental Science | - | P/F | ||
ENGG | 19LIV390 | Live – in – Labs | [3] | |||
Total (16 L + 0T + 15 P = 31 hrs) | 21+[3] |
Cat | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
CYS | 20CYS311 | Cyber Forensics | 2 | 0 | 3 | 3 |
CYS | 20CYS312 | Principles of Programming Languages | 2 | 0 | 3 | 3 |
CYS | 20CYS384 | Advanced Protocol Engineering and Security Lab | 0 | 0 | 3 | 1 |
CYS | 20CYS313 | Network Security | 3 | 0 | 0 | 3 |
CYS | 20CYS314 | Applied Cryptography | 3 | 1 | 0 | 4 |
CYS | 20CYS315 | Automata Theory and Compiler Design | 2 | 0 | 3 | 3 |
CYS | Professional Elective – 1 | 3 | 0 | 0 | 3 | |
HUM | 19SSK311 | Soft Skills – 3 | 1 | 0 | 3 | 2 |
ENGG | 19LIV490 | Live-in-Labs | [3] | |||
Total (16L + 1T +15P = 32 hrs) | 22+[3] |
Cat | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
CYS | 20CYS401 | Secure Software Engineering | 2 | 0 | 3 | 3 |
CYS | 20CYS402 | Distributed Systems and Cloud Computing | 2 | 0 | 3 | 3 |
CYS | 20CYS403 | Web Application Security | 2 | 0 | 3 | 3 |
CYS | 20CYS404 | Android Application Development | 0 | 0 | 3 | 1 |
CYS | Professional Elective – 2 | 3 | 0 | 0 | 3 | |
CYS | Professional Elective – 3 | 3 | 0 | 0 | 3 | |
CYS | Free Elective – 1 (Management Elective) | 3 | 0 | 0 | 3 | |
CYS | 20CYS495 | Project - Phase – 1 / Seminar | 2 | |||
HUM | 19LAW300 | Indian Constitution | - | P/F | ||
Total (15L+0T+12P = 27hrs) | 21 |
Cat | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
CYS | 20CYS499 | Project - Phase – 2 | 0 | 0 | 3 | 10 |
Total (30hrs) | 10 | |||||
Total Credits | 165 |
*Professional Elective - Electives categorised under Engineering, Science, Mathematics, Live- in-Labs, and NPTEL Courses. Student can opt for such electives across departments/campuses. Students with CGPA of 7.0 and above can opt for a maximum of 2 NPTEL courses with the credits not exceeding 8. |
** Free Electives - This will include courses offered by Faculty of Humanities and Social Sciences/ Faculty Arts, Commerce and Media / Faculty of Management/Amrita Darshanam -(International Centre for Spiritual Studies). |
*** Live-in-Labs - Students undertaking and registering for a Live-in-Labs project, can be exempted from registering for an Elective course in the higher semester. |
Cat | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
Professional Elective-1 | ||||||
CSE | 20CYS331 | Wireless Sensor Network Security | 3 | 0 | 0 | 3 |
CSE | 19CSE436 | Mobile and Wireless Security | 3 | 0 | 0 | 3 |
CSE | 19CSE372 | Internet of Things | 3 | 0 | 0 | 3 |
Professional Elective-2 | ||||||
CYS | 20CYS431 | Program Obfuscation | 3 | 0 | 0 | 3 |
CYS | 20CYS432 | Vulnerability Assessment and Penetration Testing | 3 | 0 | 0 | 3 |
CYS | 20CYS433 | Blockchain Technology |
2 | 0 | 3 | 3 |
Cat | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
Professional Elective-3 | ||||||
CYS | 20CYS441 | Formal Methods for Security | 3 | 0 | 0 | 3 |
CYS | 20CYS442 | Hardware Security | 3 | 0 | 0 | 3 |
CYS | 20CYS443 | Biometrics and Security | 3 | 0 | 0 | 3 |
Electives in Business Systems | ||||||
CSE | 19CSE358 | Software Project Management | 3 | 0 | 0 | 3 |
HUM | 19CSE359 | Financial Engineering | 3 | 0 | 0 | 3 |
HUM | 19MNG331 | Financial Management | 3 | 0 | 0 | 3 |
CYS | 20MNG331 | Information Security Risk Management | 3 | 0 | 0 | 3 |
2020 |