Live zoom counselling Virtual
Tour

Computer Science Engineering


B.Tech in Computer Science & Engineering – Cyber Security

Eligibility

Pass in PUC / 10+2 examination with Physics and Mathematics as compulsory subjects along with Chemistry / Computer Science / Electronics as one of the subjects and obtained at least 60% marks (55% in case of SC/ST category) in the above subjects taken together.

Study Campus

JAIN Global Campus
Faculty of Engineering & Technology
45th km, NH - 209, Jakkasandra Post
Bangalore - Kanakapura Main Road
Ramanagara District - 562 112

+91 80 46650130

Admissions Office

JAIN Knowledge Campus
# 44/4, District Fund Road
Jayanagar 9th Block Campus
Bangalore - 5600 69
+91 7337618222
080-69279444

About the program

The B.Tech program in Computer Science and Engineering (Cyber Security) is designed to equip students with the knowledge and skills necessary to succeed in Industry 4.0, which features emerging and exponential technologies. The course is industry-integrated and includes EC-Council certifications in Cyber Security, such as the Certified Ethical Hacker (CEH), Certified Network Defender (CND), Certified Security Analyst (ECSA), and Computer Hacking Forensics Investigator (CHFI), among others. Cost of certification will be paid by the student on actual basis.The program uses project-based learning to provide students with internships and career opportunities with startups and MNCs in India and abroad.

Why to take this course?

This course focuses on addressing the global risk of cyberattacks. It equips students with skills to set up and secure computer systems, manage information security risks, implement network security solutions, detect intrusions, conduct digital forensics investigations, and apply cybersecurity skills in real-world scenarios. Students also gain practical experience in various settings to solve cybersecurity issues. The program offers global exposure through internships from 2nd year and integrates global certifications from EC- Council, aligning with JAIN (Deemed to-de University)'s vision of cultivating Technopreneurs.

Program Specific Outcome

On completion of the Cyber Security program, students will possess the following program specific outcomes:

  • PSO 1: Apply cyber security skills to construct secure systems, from the hardware to the software to the human-computer interface.
  • PSO 2: Develop cyber security skills including network defense, ethical hacking, penetration testing, application security, encryption, and cryptography as well as digital forensics.

Enhance your B.Tech experience with the option to pursue a Minor Degree from IIITH and gain unique opportunities for academic and professional growth!

Key Highlights of the UG Minor Degree Program from IIITH:

Certificate Issuance:

  • Students will have the option to receive certificates from IIITH upon successful completion of each semester.
  • These certificates will be issued in three parts over the course of the program, recognizing incremental progress.

Minor Degree Recognition:

  • University has the discretion to award a minor degree to their students, utilizing the certificates issued by IIITH.
  • This option allows students to earn additional credentials and enhance their academic profile.

Research Internships:

  • Top performers in the Minor Program will be considered for research internships at IIITH.
  • These internships provide an excellent opportunity for students to gain hands-on experience and deepen their expertise in their field of study.

Note:

  • An additional cost is applicable for enrolling in the UG Minor Degree Program.
  • To earn the minor degree, students must earn an additional 20 credits on top of their regular credits as part of the curriculum.

Duration of the program: 4 years

Curriculum

  • Computational Physics
  • Computational Mathematics
  • Electrical and Electronics for Computational Thinking
  • Mind Management and Human Values-1
  • Cyber security Landscape
  • Communicative English
  • Computational Chemistry
  • PCL1-Research and Entrepreneurship Project
  • Computer Networks
  • Programming in JAVA
  • Workshop Practices
  • Network Security
  • Data Structures and Algorithms
  • Database Management Systems
  • Enterprise and Infrastructure Security
  • Python Programming
  • Mind Management and Human Values-II
  • Project-I
  • Web Application Security
  • Foundations of Cloud Computing
  • Probability and Vector Space
  • Operating Systems
  • Scripting for Hackers
  • Business Communication and Storytelling
  • Foundations of Mathematics I
  • Cloud Security
  • Elective-1
  • Open Elective-1
  • PCL-Project Centric Learning
  • Assembly C
  • Ethical Hacking-1
  • Biology for Engineers
  • Foundations of Mathematics II
  • Threat Analysis and Reverse Engineering
  • Standardization
  • Environmental Studies
  • Internship-1
  • Project-II
  • Digital Forensics
  • Data Protection and Data Security
  • Indian Constitution
  • Disaster Recovery
  • Elective-2
  • Leadership and Negotiation skills
  • Mobile Forensics and Security
  • Scientific Writing
  • Open Elective-2
  • PCL-Project Centric Learning
  • Ethical Hacking-2
  • Cyber Law
  • Elective-3
  • Ethics and Values (CSR)
  • Internship-2
  • Internship-2
  • Project -III
  • Cyber Risk Analysis
  • Cyber security Administration
  • Intellectual Property Rights
  • Pen Testing
  • Elective-4
  • Open Elective-3
  • Open Elective-4
  • Elective-5
  • Project-IV
  • Internship -3
  • Research

Department Specific Electives

Elective – I Elective – II Elective – III Elective – IV Elective V
Network Defense Cryptography Social Network Analytics MAC OS Control Bypass Environmental Social and Governance Computing
Introduction to AI (Artificial Intelligence) and ML Data Analytics and Machine Learning for Cybersecurity Introduction to Natural Language Processing Wireless Security  Applications of AI
Internet of Things (IoT) Secure Software Life Cycle Management Building Customized Solution with UI/UX Blockchain Technology IoT Security 4.0 

Computer Science and Engineering (Open Elective Baskets)

Sl. No Finance and Accounting Entrepreneurship and new venture creation Marketing and Management
1 Finance for non-finance professionals Entrepreneurship Theory and Practice Marketing Management
2 Wealth Management   Launching and managing an enterprise   Consumer Behavior
3 Indian Financial System Business Plan and Project Implementation Brand Management
4 Financial Reporting Sustainable Entrepreneurship Product Management
  • Network Security Engineer
  • Cybersecurity Analyst
  • Cybersecurity Architect
  • Cybersecurity Specialist
  • Cybersecurity Manager / Officer
  • Chief Information Security Officer (CISO)
  • Cyber Defense Analyst
  • Digital Forensics Investigator
  • Digital Forensics Specialist
  • Digital Forensics Analyst
  • Certified Ethical Hacker – form EC- Council
  • Network Defence Essentials - form EC- Council

Note

  • The university will cover the cost of global certification (only for two certifications) and it is limited to one attempt. If students fail to complete the first certification, the university will not cover the cost for the second certification attempt.
  • In the event that the certification industry changes the name of the certification, the university reserves the right to modify the name of the certifications accordingly.
  • The university retains the authority to adjust the certification name it offers in accordance with industry trends.

Students are provided with a structured learning path integrated with contributions from the following organizations. This approach facilitates a holistic comprehension of diverse facets within the field, empowering students to cultivate specialized skills and knowledge as they progress through their academic journey.

  • LinkedIn
  • EC Council
  • CISCO