President Award Click here CAREER Click here
President Award Click here CAREER Click here
ADMISSION ENQUIRY- 2024
ADMISSION ENQUIRY - 2024
Quick Links
- Pearson Undergraduate Entrance Exams
- Virtual Admission Counselings and Helpline
- B.Tech Admission(All India JEE)
- Admission Counseling Centre
- Information booklet
- After 12th (Undergraduate Programs)
- Apply Online
- After Graduation (PG Programs)
- After Post Graduation (PH.D.)
- Post Graduation Diploma
- After 10th (Diploma Programs)
- Transportation
- Marine Programs
- Hostel Facility
- Admission Brochure
- Scholarship Information
- Education Loan Information
- FAQ
- Fee Refund
- Campus Life
- Gallery
Faculty of Computer Applications
Share
MASTER OF SCIENCE IN INFORMATION TECHNOLOGY (CYBER SECURITY)
Program Details
The Master in Information Technology (Cyber Security) is a postgraduate programme designed for scholars, who wish to develop indepth understanding of technical skills and expertise in the cyber security domain including technical implementation. It is designed to meet the upcoming demand of technical experts, who can implement and lead technical cyber security functions in government,industry, law enforcement and defense. The course designed to develop career as a cybersecurity specialist and includes relevant contents from information systems, systems engineering, computer science, network security, and defense.
Fees
Tuition Fees
₹ 77,000 /- per year
Contact No.:
+91- (M) 9904383500 9726602020
+91- (M) 9825427921
admission.dcs@ganpatuniversity.ac.in
For International Students
Fee for SAARC & OTHER ASIAN | ₹ 75000 |
Fee For International | $ 2000 |
Eligibility
Passed Bachelor degree examination in Computer Science/Application/Engineering/Information Technology, i.e. B.C.A., B.Sc.(Computer Science), B.Sc. (CA & IT), B.I.T.,B.E.(CE),B.E.(IT) etc. Or Any Science Graduate (Students of non-computer and non-mathematical/statistics background needs to clear bridge course syllabus for Fundamental of Mathematics) or P.G.D.C.A. or equivalent
Program Outcome
PO -1 | Ability to understand the various security aspects of operating system, network and data,web applications and mobile apps. |
PO -2 | To analyze the application threat detection, network forensics, digital forensics and analytics, malware analysis and its terminlogy. |
PO -3 | Develop basic understanding of information and cyber security, cryptography, attacks and threats, identify and classify cyber crime, cyber attacks and its methods, static and dynamic malware analysis. |
PO -4 | Implement secuirty tools and technologies to protect systems and information. |
PO -5 | Ability to develope various vulnerabilities report as per industry requirement for security updates. |
PO -6 | Ability to apply knowledge of mathematics, algorithms, logical reasoning to solve real time problems. |
PO -7 | To understand the information security management system and information security standards. |
PO -8 | Ability to understand basic web designing concepts and develop web pages and prepare well formatted project documents. |
PO -9 | Able to understand the legal procedure against the cyber offence and ethics in cyber security. |
PO -10 | To learn logic building and programming languages. |
PO-11 | Able to develop knowlwdge, interpersonal skills, judgement around the human communication that facilitate their ability to work collaboratively. |
Program Educational Objectives (PEO)
PEO I | Computer Science graduate students will be able to design and develop secure software systems. |
PEO II | Able to trouble shoot computer software problems, network configurations and to provide solutions. |
PEO III | To train the students with computer programming basic skills with logic and reasoning problems. |
PEO IV | Post graduate students will be able to develop professional software, web application & mobile applications with advanced features. |
PEO V | To improve skills of leadership, interview cracking, personality development with high regard for ethical values and social responsibilities. |
PEO VI | Students will gain the knowledge of cyber security principles, security architecture, risk management, attacks, incidents, cyber forensic and cyber laws. |
Syllabus
Subject Name | Subject Type | Subject Code | Subject Credit | Subject Comment | Attachments |
---|---|---|---|---|---|
DIGITAL SECURITY AND FORENSIC FUNDAMENTAL | Regular | P71A1DSF | 5 |
Read More |
|
APPLICATION THREAT DETECTION | Regular | P71A2ATD | 5 |
Read More |
|
LINUX FUNDAMENTALS | Regular | P71A3LF | 5 |
Read More |
|
CYBER LAW AND INDIAN IT ACT | Open | P71B4CLI | 3 |
Read More |
Subject Name | Subject Type | Subject Code | Subject Credit | Subject Comment | Attachments |
---|---|---|---|---|---|
PYTHON PROGRAMMING | Regular | P72A1PP | 5 |
Read More |
|
CYBER FORENSIC-1 | Regular | P72A2CF | 5 |
Read More |
|
WEB PENTESTING | Regular | P72A3WP | 5 |
Read More |
|
COMPUTER NETWORK OPERATION | Open | P72B4CN | 3 |
Read More |
Subject Name | Subject Type | Subject Code | Subject Credit | Subject Comment | Attachments |
---|---|---|---|---|---|
MALWARE TAXONOMY AND ANALYSIS | Regular | P73A1MTA | 5 |
Read More |
|
MOBILE DEVICE SECURITY AND FORENSIC | Regular | P73A2MDS | 5 |
Read More |
|
NETWORK FORENSIC | Regular | P73A3NF | 5 |
Read More |
|
INDUSTRIAL PROJECT – I | Regular | P73A4IP1 | 5 |
Read More |
|
INFORMATION SECURITY COMPLIANCE MANAGEMENT | Open | P73B5ISC | 3 |
Read More |
Subject Name | Subject Type | Subject Code | Subject Credit | Subject Comment | Attachments |
---|---|---|---|---|---|
INDUSTRIAL PROJECT – II | Regular | P74A1IP2 | 24 |
Read More |