M.Tech. CSE Information Security Part Time

M.Tech. Computer Science & Engineering (CSE) is one of the most famous courses which centers on the fundamental components of modern computing.

M.Tech. CSE Information Security Part Time


Computer Science & Engineering (CSE) is one of the most famous courses which centers on the fundamental components of modern computing. Students pursuing computer science courses will gain knowledge of design, implementation and management of information system of both hardware and software. The university provides both theory and hand on experience for both hardware and software system.

The master`s program offers a wide variety of specializations programs for students, which are Data Mining, Information Security, Advanced Computing and Internet of Things. The primary focus of this master’s program is to develop research-oriented engineers, who can contribute in development of the nation.

After successfully completing this program students can work in renowned organizations such as IBM, Dell, Oracle, Amazon, Microsoft, Google etc. Along with that students may pursue their carrier in research and development and apply for organizations like NASA, ISRO, DRDO and other research centers around the globe. This program is a roadmap for PhD studies for those who want to have a bright carrier in research.

At GNA Students work on:

  • Octave
  • Matlab
  • Python
  • Kali Linux
  • Amazon Cloud
  • Raspberry Pie
  • Arduino

Program Highlights


  • Post Graduate students have worked in collaboration with IIT Delhi, Videocon Connect Broadband firms to carry out their research activities.
  • Students get benefit from guest lectures on the latest innovations in both established and emerging fields.
  • Students get exposure in many countries based on their research works and contribution in research papers of reputed journals at International Conferences.
  • An open access and multidisciplinary journal named GJMT (GNA Journal of Management & Technology) provide a research platform and tool for research scholars.
  • Workshops, Industrial Visits and Seminars are conducted to enrich the students with industry related technical knowledge and hands on experience.

Semester Wise Subjects

Semester 1

Sr. No. Course Title
1 Mathematical Foundation of Computer Science
2 Advanced Data Structures
3 Elective – I
4 Advanced Data Structure Lab

Semester 2

Sr. No. Course Title
1 Soft Computing
2 Elective-II
3 Elective – III
4 Elective – II Lab

Semester 3

Sr. No. Course Title
1 Business Intelligence Mining
2 Advanced Algorithm analysis and design
3 Advanced Algorithm analysis and design Lab
4 Elective - IV

Semester 4

Sr. No. Course Title
1 Elective-V
2 Mini Project with Seminar

Semester 5

Sr. No. Course Title
1 Open Elective
2 Research Methodology
3 Dissertation - I

Semester 6

Sr. No. Course Title
1 Dissertation - II

Core Elective - I

Course Code Course Name
MCS1110 Digital Forensics
MCS1111 Ethical Hacking
MCS1112 Intrusion Detection

Core Elective - II

Course Code Course Name
MCS1113 Malware Analysis & Reverse Engineering
MCS1114 Secure Software Design and Enterprise Computing
MCS1108 Machine Learning

Core Elective - III

Course Code Course Name
MCS1209 Data Encryption & Compression
MCS1210 Steganography and Digital Watermarking
MCS1211 Information Theory & Coding

Core Elective - IV

Course Code Course Name
MCS1212 Security Assessment and Risk Analysis
MCS1213 Secure Coding
MCS1214 Biometrics

Core Elective - V

Course Code Course Name
MCS1205 Data Warehouse and Data Mining
MCS1305 Web Search & Information Retrieval
MCS1306 Database Security and Access Control

Open Elective

S.No. Course Title
1 Business Analytics
2 Industrial Safety
3 Operations Research
4 Cost Management of Engineering Projects
5 Composite Materials

Career Opportunities


Cybersecurity's importance is on the rise. Fundamentally, our society is more technologically reliant than ever before and there is no sign that this trend will slow. Personal data that could result in identity theft is now posted to the public via our social media accounts. Sensitive information like credit card information and bank account details are now stored in cloud storage services like Dropbox or Google Drive.

Governments around the world are bringing more attention to cybercrimes. GDPR is a great example. It has increased the reputational damage of data breaches by forcing all organizations that operate in the EU to:

  • Communicate data breach
  • Appoint a data-protection officer
  • Require user consent to process information
  • Anonymize data for privacy

Students can work as Network Security, Forensics Expert, Security Administrator, Web Security, Security Software Developer, Security Architect, Security Consultant, Information Security Analyst, Ethical Hackers, Computer Forensics Analysts, Penetration Tester etc.


Placements


Tech Companies that hire Information Security Specialists :



Enquire Us