Ph.D Admission Aug 2024 Click here to know moreย

Ph.D Admission Aug 2024 Click here to know moreย

ADMISSION ENQUIRY - 2025
Faculty of Computer Applications
MASTER OF SCIENCE IN INFORMATION TECHNOLOGY (CYBER SECURITY)
Program Details
Shape Your Professional Career with NAAC "A" Grade Accredited and GSIRF 05 Star Rated Ganpat University.
๐๐๐๐ฎ๐ซ๐ ๐๐จ๐ฎ๐ซ ๐๐๐๐ญ ๐๐จ๐๐๐ฒ, ๐๐๐๐ ๐๐จ๐ฆ๐จ๐ซ๐ซ๐จ๐ฐ!
Join ๐.๐๐. ๐๐ (๐๐ฒ๐๐๐ซ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ)
โ05+ million job opportunities created in India by 2030: ๐๐๐๐๐๐๐
โ๐๐๐๐ "๐" Grade Accredited University
โCollaboration with ๐๐-๐๐จ๐ฎ๐ง๐๐ข๐ฅ
โ05 Star Rated University – ๐๐๐๐๐
โStrong ๐๐ฅ๐ฎ๐ฆ๐ง๐ข ๐๐๐จ๐ฌ๐ฒ๐ฌ๐ญ๐๐ฆ
โ๐๐+ Fully Equipped Computer Laboratories
โA Socially Responsible University
๐๐ฉ๐ฉ๐ฅ๐ฒ ๐๐จ๐ฐ: https://admission.ganpatuniversity.ac.in/
๐๐ก๐๐ญ๐ฌ๐๐ฉ๐ฉ ๐๐จ๐ฐ: https://wa.me/+919998583001
๐๐๐ฆ๐ข๐ฌ๐ฌ๐ข๐จ๐ง๐ฌ ๐๐๐ฅ๐ฉ๐ฅ๐ข๐ง๐: 9998583001
๐๐๐๐ข๐๐ข๐๐ฅ ๐๐๐๐ฌ๐ข๐ญ๐: http://dcs.guni.ac.in/
Fees
Tuition Fees
โน - /- per year
Contact No.:
+91- (M) 9904383500 9825889955
+91- (M) 9825427921
admission.dcs@ganpatuniversity.ac.in
Eligibility
Program Outcome
PO -1 | Ability to understand the various security aspects of operating system, network and data,web applications and mobile apps. |
PO -2 | To analyze the application threat detection, network forensics, digital forensics and analytics, malware analysis and its terminlogy. |
PO -3 | Develop basic understanding of information and cyber security, cryptography, attacks and threats, identify and classify cyber crime, cyber attacks and its methods, static and dynamic malware analysis. |
PO -4 | Implement secuirty tools and technologies to protect systems and information. |
PO -5 | Ability to develope various vulnerabilities report as per industry requirement for security updates. |
PO -6 | Ability to apply knowledge of mathematics, algorithms, logical reasoning to solve real time problems. |
PO -7 | To understand the information security management system and information security standards. |
PO -8 | Ability to understand basic web designing concepts and develop web pages and prepare well formatted project documents. |
PO -9 | Able to understand the legal procedure against the cyber offence and ethics in cyber security. |
PO -10 | To learn logic building and programming languages. |
PO-11 | Able to develop knowlwdge, interpersonal skills, judgement around the human communication that facilitate their ability to work collaboratively. |
Program Educational Objectives (PEO)
PEO I | Computer Science graduate students will be able to design and develop secure software systems. |
PEO II | Able to trouble shoot computer software problems, network configurations and to provide solutions. |
PEO III | To train the students with computer programming basic skills with logic and reasoning problems. |
PEO IV | Post graduate students will be able to develop professional software, web application & mobile applications with advanced features. |
PEO V | To improve skills of leadership, interview cracking, personality development with high regard for ethical values and social responsibilities. |
PEO VI | Students will gain the knowledge of cyber security principles, security architecture, risk management, attacks, incidents, cyber forensic and cyber laws. |
Syllabus
Subject Name | Subject Type | Subject Code | Subject Credit | Subject Comment | Attachments |
---|---|---|---|---|---|
DIGITAL SECURITY AND FORENSIC FUNDAMENTAL | Regular | P71A1DSF | 5 |
Read More |
|
APPLICATION THREAT DETECTION | Regular | P71A2ATD | 5 |
Read More |
|
LINUX FUNDAMENTALS | Regular | P71A3LF | 5 |
Read More |
|
CYBER LAW AND INDIAN IT ACT | Open | P71B4CLI | 3 |
Read More |
Subject Name | Subject Type | Subject Code | Subject Credit | Subject Comment | Attachments |
---|---|---|---|---|---|
PYTHON PROGRAMMING | Regular | P72A1PP | 5 |
Read More |
|
CYBER FORENSIC-1 | Regular | P72A2CF | 5 |
Read More |
|
WEB PENTESTING | Regular | P72A3WP | 5 |
Read More |
|
COMPUTER NETWORK OPERATION | Open | P72B4CN | 3 |
Read More |
Subject Name | Subject Type | Subject Code | Subject Credit | Subject Comment | Attachments |
---|---|---|---|---|---|
MALWARE TAXONOMY AND ANALYSIS | Regular | P73A1MTA | 5 |
Read More |
|
MOBILE DEVICE SECURITY AND FORENSIC | Regular | P73A2MDS | 5 |
Read More |
|
NETWORK FORENSIC | Regular | P73A3NF | 5 |
Read More |
|
INDUSTRIAL PROJECT โ I | Regular | P73A4IP1 | 5 |
Read More |
|
INFORMATION SECURITY COMPLIANCE MANAGEMENT | Open | P73B5ISC | 3 |
Read More |
Subject Name | Subject Type | Subject Code | Subject Credit | Subject Comment | Attachments |
---|---|---|---|---|---|
INDUSTRIAL PROJECT โ II | Regular | P74A1IP2 | 24 |
Read More |