Programs
- Clinical Fellowship In Parkison’s Disease & Movement Disorders - Fellowship
- Fellowship -microsurgery in plastic and reconstructive surgery - Fellowship
B. Tech. (Bachelor of Technology) in Computer Science and Engineering (Cyber Security) is a program offered by the School of Engineering, Amrita Vishwa Vidyapeetham.
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
HUM | 19ENG111 | Technical Communication | 2 | 0 | 3 | 3 |
ENGG | 20CYS101 | Classical Cryptography | 2 | 0 | 0 | 2 |
MAT | 20MAT102 | Linear Algebra | 3 | 1 | 0 | 4 |
SCI | 19PHY101 | Engineering Physics | 2 | 1 | 0 | 3 |
ENGG | 19CSE100 | Problem Solving and Algorithmic Thinking | 2 | 1 | 3 | 4 |
ENGG | 20CYS102 | Principles of Engineering | 2 | 0 | 3 | 3 |
ENGG | 20CYS103 | Computer Hardware and System Essentials | 2 | 0 | 3 | 3 |
HUM | 19CUL101 | Cultural Education – 1 | 2 | 0 | 3 | 2 |
Total (17 L + 3 T + 12 P = 32 hrs) | 24 |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
MAT | 19MAT115 | Discrete Mathematics | 3 | 1 | 0 | 4 |
MAT | 20MAT112 | Number Theory and Algebra | 3 | 0 | 0 | 3 |
ENGG | 20CYS111 | Digital Signal Processing | 2 | 1 | 0 | 3 |
ENGG | 20CYS112 | Computer Organisation and Architecture | 3 | 0 | 3 | 4 |
ENGG | 20CYS113 | Computer Programming | 3 | 0 | 0 | 3 |
ENGG | 20CYS181 | Computer Programming lab | 0 | 0 | 3 | 1 |
ENGG | 20CYS114 | Cyber Security Essentials | 2 | 0 | 3 | 3 |
HUM | 19CUL111 | Cultural Education – II | 2 | 0 | 0 | 2 |
Total (18L + 2T + 9P = 29hrs) | 23 |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
MAT | 20CYS201 | Optimization Techniques | 3 | 1 | 0 | 4 |
ENGG | 20CYS202 | User Interface Design | 1 | 0 | 3 | 2 |
ENGG | 20CYS203 | Operating Systems | 3 | 0 | 0 | 3 |
ENGG | 20CYS281 | Operating Systems Lab | 0 | 0 | 3 | 1 |
ENGG | 19CYS201 | Advanced Programming | 2 | 0 | 3 | 3 |
ENGG | 20CYS204 | Database Management System | 2 | 0 | 3 | 3 |
ENGG | 20CYS205 | Modern Cryptography | 3 | 1 | 0 | 4 |
HUM | 19AVP201 | Amrita Value Program I | 1 | 0 | 0 | 1 |
Total (15L + 2T +12P = 29 hrs) | 21 |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
SCI | 20CYS211 | Probability and Statistics | 3 | 1 | 0 | 4 |
ENGG | 20CYS212 | Multimedia Processing | 2 | 0 | 3 | 3 |
ENGG | 20CYS213 | System Security | 3 | 0 | 0 | 3 |
ENGG | 20CYS282 | System Security Lab | 0 | 0 | 3 | 1 |
ENGG | 19CSE305 | Machine Learning | 2 | 0 | 3 | 3 |
ENGG | 20CYS214 | Data Structures and Algorithms | 3 | 0 | 0 | 3 |
ENGG | 20CYS283 | Data Structures and Algorithms Lab | 0 | 0 | 3 | 1 |
HUM | 19AVP211 | Amrita Value Program II | 1 | 0 | 0 | 1 |
HUM | Humanities Elective | 2 | 0 | 0 | 2 | |
HUM | 19SSK211 | Soft Skills – 1 | 1 | 0 | 3 | 2 |
HUM | 19MNG300 | Disaster Management | – | P/F | ||
Total (17 L + 1T + 15 P = 33hrs) | 23 |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
ENGG | 20CYS301 | Digital Communication | 3 | 0 | 0 | 3 |
ENGG | 20CYS302 | Secure Coding | 3 | 0 | 0 | 3 |
ENGG | 20CYS381 | Secure Coding Lab | 0 | 0 | 3 | 1 |
ENGG | 19CSE302 | Design and Analysis of Algorithms | 3 | 0 | 0 | 3 |
ENGG | 20CYS303 | Computer Networks | 3 | 0 | 0 | 3 |
ENGG | 20CTS382 | Computer Networks Lab | 0 | 0 | 3 | 1 |
ENGG | 20CYS304 | Artificial Intelligence and Neural Networks | 3 | 0 | 3 | 4 |
ENGG | 20CYS383 | Java Programming Lab | 0 | 0 | 3 | 1 |
HUM | 19SSK301 | Soft Skills – 2 | 1 | 0 | 3 | 2 |
HUM | 19ENV300 | Environmental Science | P/F | |||
ENGG | 19LIV390 | Live – in – Labs | [3] | |||
Total (16L + 0T + 15P = 31 hrs) | 21+[3] |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
ENGG | 20CYS311 | Cyber Forensics | 2 | 0 | 3 | 3 |
ENGG | 20CYS312 | Principles of Programming Languages | 2 | 0 | 3 | 3 |
ENGG | 20CYS384 | Advanced Protocol Engineering and Security Lab | 0 | 0 | 3 | 1 |
ENGG | 20CYS313 | Network Security | 3 | 0 | 0 | 3 |
ENGG | 20CYS314 | Applied Cryptography | 3 | 1 | 0 | 4 |
ENGG | 20CYS315 | Automata Theory and Compiler Design | 2 | 0 | 3 | 3 |
ENGG | Professional Elective – 1 | 3 | 0 | 0 | 3 | |
HUM | 19SSK311 | Soft Skills – 3 | 1 | 0 | 3 | 2 |
ENGG | 19LIV490 | Live-in-Labs | [3] | |||
Total (16L + 1T +15P = 32 hrs) | 22+[3] |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
ENGG | 20CYS401 | Secure Software Engineering | 2 | 0 | 3 | 3 |
ENGG | 20CYS402 | Distributed Systems and Cloud Computing | 2 | 0 | 3 | 3 |
ENGG | 20CYS403 | Web Application Security | 2 | 0 | 3 | 3 |
ENGG | 20CYS404 | Android Application Development | 0 | 0 | 3 | 1 |
ENGG | Professional Elective – 2 | 3 | 0 | 0 | 3 | |
ENGG | Professional Elective – 3 | 3 | 0 | 0 | 3 | |
ENGG | Free Elective – 1 (Management Elective) | 3 | 0 | 0 | 3 | |
PRJ | 20CYS495 | Project – Phase – 1/ Seminar | 2 | |||
HUM | 19LAW300 | Indian Constitution | P/F | |||
Total (15L+0T+12P +12P = 27 hrs) | 21 |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
PRJ | 20CYS499 | Project – Phase – 2 | 0 | 0 | 30 | 10 |
Total (30hrs) | 10 | |||||
Total Credits | 165 |
Category | Code | Title | L | T | P | Credit |
---|---|---|---|---|---|---|
Professional Elective – I | ||||||
ENGG | 20CYS331 | Wireless Sensor Network Security | 3 | 0 | 0 | 3 |
ENGG | 19CSE436 | Mobile and Wireless Security | 3 | 0 | 0 | 3 |
ENGG | 19CSE446 | Internet of Things | 2 | 0 | 3 | 3 |
Professional Elective – II | ||||||
ENGG | 20CYS431 | Program Obfuscation | 3 | 0 | 0 | 3 |
ENGG | 20CYS432 | Vulnerability Assessment and Penetration Testing | 3 | 0 | 0 | 3 |
ENGG | 20CYS433 | Blockchain Technology | 2 | 0 | 3 | 3 |
Professional Elective – III | ||||||
ENGG | 20CYS441 | Formal Methods for Security | 3 | 0 | 0 | 2 |
ENGG | 20CYS442 | Hardware Security | 3 | 0 | 0 | 3 |
ENGG | 20CYS443 | Biometrics and Security | 3 | 0 | 0 | 3 |
Professional Elective (Open to all) | ||||||
Cat. | Code | Title | L | T | P | Credit |
ENGG | 22ENV331 | Environmental Engineering and Management | 3 | 0 | 0 | 3 |
Free Elective (Open to all) | ||||||
---|---|---|---|---|---|---|
Cat. | Code | Title | L | T | P | Credit |
22ENV231 | Environmental Management | 2 | 0 | 0 | 2 |
Educational Qualification: A pass in 12th class or equivalent from a recognized board with not less than 55% in Physics, Chemistry & Mathematics separately and an aggregate minimum of 60% in Physics, Chemistry & Mathematics.
Admission to all the B.Tech programmes for the year 2023 is based on any one of the following:
This program of Computer Science – Cyber Security is intended to mould students into well prepared cyber security professionals and has been designed with a good balance between theoretical & practical aspects, analytical and architectural methods complemented by academic research and industry best practices.The curriculum is specially prepared by experts covering all the needs and aspects a cyber security engineer needs. Through this program, the students will learn and acquire the necessary theoretical background with concept clarity and insights into hands-on technical aspects of cyber security, a good understanding of analytical methods and industry practices in the field. They cultivate an proficiency into the growing threats and vulnerabilities in cyber era.
The program is designed specially keeping in mind the demand and skill requirement for coming decade for satisfying the 3.5 million unfilled cyber security jobs globally by 2025 (Source: NY Times). The program will deliver an opportunity for the students to acquire the needed soft skills, technical skills, implementation applied cyber security skills and also IT management skills. It serves as a hybrid blend of cyber perception and industrial practice. Our University has MoU for academic partnership in training our graduates for core cyber related on-demand industry ready certifications that is to say EC-Council’s Certified Ethical Hacker (CEH), ComTIA’s Cyber Security Analyst (CySA+) and many more at an reasonably priced student kits. This B. Tech program also provides opportunities for students to study abroad through student exchange programs during bachelor’s course and can be the promising pathway for our cyber security intense dual-degree masters and PhD programs thereafter.
In near future, the number of unfilled cyber security jobs is expected to grow by 350 percent (source: MIT Technology Review) creating massive skills gap over copious cyber security industries in India and abroad, Antivirus companies, Banking/Finance/Insurance sectors, IT companies and government (defense and non-defense) organizations need security analyst to protect their digital assets as not surprisingly, they all deal with sensitive information, which is commonly targeted by attackers.
Opportunities for our graduates are easy to fit into the core job roles of Cyber Security Analyst, Security Engineer, Security Architect, Security Administrator, Security Software Developer, Cryptanalyst, Digital Forensic Analyst, Vulnerability Assessor, Cloud Security Architect, Intrusion Detection Specialist, Cybercrime Investigator, Malware Analyst, Data Privacy Officer, Computer Security Incident Responder, Governance Compliance & Risk (GRC) Manager and Security Consultant. There is a wide range of placements for these cyber security job roles program and some includes and not limited to: ABB Corp, Cisco, IBM, VMware, EY, Paladion Networks, Bosch, Nokia, Philips, Amazon, IndusFace, Deloitte, SBI-Infosec Wing, Symantec, CloudByte and so on. There is wide range of opportunities available in India and abroad for Cyber Security Research.
Ultimately this programme will yield next generation cyber security leaders who can be successfully employed in various sectors of industries, business firms, Government agencies, financial bodies, and educational institutions.
Also the major strength of amrita lies at collaborative alliance of academic and industrial partners over TIFAC-CORE which gives significant thrust to the frontier areas of Cyber Security, including technology, practice, management, and policy issues. The unique aspect of this CORE is coming together and partnering of industry and academia to create innovative educational and research programs and develop world-class expertise in Cyber Security. Amrita TIFAC-CORE in cyber security acts as turning point in career path which helped the students in gaining a lot of practical exposure to industries like real world research and work coined by an alumini of amrita school of engineering amirtapuri campus.
B. Tech. (Bachelor of Technology) in Computer Science and Engineering (Cyber Security) is a program offered by the School of Engineering, Amrita Vishwa Vidyapeetham.
In regard to the changing trends and demands in cyberspace, cyber security will continue to grow as obligatory technologies as the world becomes digitally connected.
Amrita Vishwa Vidyapeetham being the No 1 Private University in India is intensifying the cyber security allied edifying services with its need of time B. Tech. in Computer Science Engineering specialized on Cyber Security. In fact, it is the most relevant and promising sphere of influence for students to pursue their carrier guided by expertise who are offering the full-time M. Tech in Cyber Security, first of a kind in India from 2006 as a initiative by TIFAC-CORE Vision 2020 of Dr. A.P.J. Abdul Kalam.
This program of Computer Science – Cyber Security is intended to mould students into well prepared cyber security professionals and has been designed with a good balance between theoretical & practical aspects, analytical and architectural methods complemented by academic research and industry best practices.The curriculum is specially prepared by experts covering all the needs and aspects a cyber security engineer needs. Through this program, the students will learn and acquire the necessary theoretical background with concept clarity and insights into hands-on technical aspects of cyber security, a good understanding of analytical methods and industry practices in the field. They cultivate an proficiency into the growing threats and vulnerabilities in cyber era.
The program is designed specially keeping in mind the demand and skill requirement for coming decade for satisfying the 3.5 million unfilled cyber security jobs globally by 2025 (Source: NY Times). The program will deliver an opportunity for the students to acquire the needed soft skills, technical skills, implementation applied cyber security skills and also IT management skills. It serves as a hybrid blend of cyber perception and industrial practice. Our University has MoU for academic partnership in training our graduates for core cyber related on-demand industry ready certifications that is to say EC-Council’s Certified Ethical Hacker (CEH), ComTIA’s Cyber Security Analyst (CySA+) and many more at an reasonably priced student kits. This B. Tech program also provides opportunities for students to study abroad through student exchange programs during bachelor’s course and can be the promising pathway for our cyber security intense dual-degree masters and PhD programs thereafter.
In near future, the number of unfilled cyber security jobs is expected to grow by 350 percent (source: MIT Technology Review) creating massive skills gap over copious cyber security industries in India and abroad, Antivirus companies, Banking/Finance/Insurance sectors, IT companies and government (defense and non-defense) organizations need security analyst to protect their digital assets as not surprisingly, they all deal with sensitive information, which is commonly targeted by attackers.
Opportunities for our graduates are easy to fit into the core job roles of Cyber Security Analyst, Security Engineer, Security Architect, Security Administrator, Security Software
Developer, Cryptanalyst, Digital Forensic Analyst, Vulnerability Assessor, Cloud Security Architect, Intrusion Detection Specialist, Cybercrime Investigator, Malware Analyst, Data Privacy Officer, Computer Security Incident Responder, Governance Compliance & Risk (GRC) Manager and Security Consultant. There is a wide range of placements for these cyber security job roles program and some includes and not limited to: ABB Corp, Cisco, IBM, VMware, EY, Paladion Networks, Bosch, Nokia, Philips, Amazon, IndusFace, Deloitte, SBI-Infosec Wing, Symantec, CloudByte and so on. There is wide range of opportunities available in India and abroad for Cyber Security Research.
Ultimately this programme will yield next generation cyber security leaders who can be successfully employed in various sectors of industries, business firms, Government agencies, financial bodies, and educational institutions.
Also the major strength of amrita lies at collaborative alliance of academic and industrial partners over TIFAC-CORE which gives significant thrust to the frontier areas of Cyber Security, including technology, practice, management, and policy issues. The unique aspect of this CORE is coming together and partnering of industry and academia to create innovative educational and research programs and develop world-class expertise in Cyber Security. Amrita TIFAC-CORE in cyber security acts as turning point in career path which helped the students in gaining a lot of practical exposure to industries like real world research and work coined by an alumini of Amrita School of Engineering Amirtapuri campus.
Course Outcome (CO) – Statements that describe what students are expected to know and are able to do at the end of each course. These relate to the skills, knowledge and behaviour that students acquire in their progress through the course.
Program Outcomes (POs) – Program Outcomes are statements that describe what students are expected to know and be able to do upon graduating from the Program. These relate to the skills, knowledge, attitude and behaviour that students acquire through the program. NBA has defined the Program Outcomes for each discipline.
The B. Tech program in CSE (Cyber Security) is intended to mould students into well prepared Cyber Security professionals and has been designed with a good balance between theoretical & practical aspects, analytical and architectural methods complemented by academic research and industry best practices.
Through this program student acquire necessary theoretical background, insights into general and technical aspects of Cyber Security, a good understanding of analytical methods and management practices in the field.
The PEOs outlined below describe the expectations of what graduates will accomplish in their careers, and how they perform during the first few years after graduation.
Areas or fields where graduates can find employment: Hundreds of Cyber Security career roles in pretty much every vertical market in the industry.
Preparedness of graduates to take up higher studies: There are various tracks with ample funding to take up master’s and subsequently PhD programs around the world.
The top reasons to choose Amrita for your career