You are on page 1of 14

School of Computer

Science and
Engineering
Engineering Minor
• A set of four courses in an engineering stream to develop a
competency within or outside the discipline area (e.g. a computer
science engineering student choosing Cyber Security or Machine
Learning or a mechanical engineering student taking courses from
computer science engineering or as his/her engineering minor area).

• These Engineering Minors are being offered so that each student


would have at least one major skills by the end of 7th term.
Engineering Minor
• Students are expected to provide his/her choice of Engineering Minor
area only once and the set of courses of that particular area would get
registered in pre-defined terms (5th, 6th and 7th).
Engineering Minors in School of Computer Science and
Engineering:
1. Cyber Security
2. Data Science
3. Machine Learning
4. MEAN Stack Development (Not for IT students)
5. Software Methodologies and Testing
Cyber Security
Brief Description
Cyber security transform into a frightening new reality, one where
corporate and government organizations seem helpless to stop cyber
incursions that leads to cyber risk. To mitigate the cyber risk we need
knowledge of cryptographic techniques, traffic monitoring and ethical
hacking knowledge for better understanding of security issues to
protect our network.
Total number of seats: 710 

Selection Criteria: Based on preference


and CGPA
Career Opportunities
• Information Security Analyst
• Penetration Tester
• Cyber Security Consultant
• Malware Analyst
• Cyber Threat Management
• Cyber Intelligent Analyst
• can also work as freelancer to provide the security services.
Courses to be studied in Cyber Security
Course Course Title L T P Credit
Code
INT242 CYBER SECURITY ESSENTIALS 0 0 4 3

INT243 INFORMATION SYSTEM SECURITY 2 0 2 3


INT244 SECURING COMPUTING SYSTEMS 2 0 2 3

INT245 PENETRATION TESTING 2 0 2 3


Description of the Courses
1) INT242 : CYBER SECURITY ESSENTIALS

It covers the concepts of cyber security with their importance and identify various
vulnerabilities and security flaws in the operating systems and networks. It also focuses on
secure social networking sites and email communications along with the prevention methods.
Course Outcome:
• Discover the basic concepts of cyber security and their importance in the cyber world.
• Identify and analyse various vulnerabilities and security flaws in the operating systems, web
servers, network equipments and to be able to patch them.
• Observe the measures to protect a system from possible security breaches.
• Observe application of scripting language in cyber security.
2) INT243 : INFORMATION SYSTEM SECURITY

It introduce the concepts of computer security incident, detection, live data collection and its forensics
duplication. It also emphasis on the data collection techniques and investigate windows systems and
routers for the audit.
Course Outcome:
• Describe the basics of incident response handling process.
• Analyze the practices and procedures involved in incident response handling process.
• Observe different methods of obtaining information and data for forensic investigation.
• Demonstrate various procedures for acquiring forensic evidences and document their details, in order
to present them as legal evidence.
Description of the Courses cont….
3) INT244: SECURING COMPUTING SYSTEMS

It covers the basic concepts of penetration testing along with the analysis of various
vulnerabilities and security flaws exist in the operating systems, web servers, network
equipments through the techniques used by hackers.
Course Outcome:
• Identify the basic concept, fundamentals and practice of penetration testing.
• Analyze various vulnerabilities and security flaws in the operating systems, web servers,
network equipment's and to be able to patch them.
• Distinguish and compare legal and illegal techniques used by hackers, specific types of attacks
and their counter measures.
4) INT245: PENETRATION TESTING
It covers the tools and technologies used by ethical hackers in order to identify weaknesses in
information system and recommend mitigation measures to increase the resistance of the
information technology (IT) infrastructure to unauthorized access.
Course Outcome:
• Recite how to analyze the outcome from the tools and technologies used by ethical hackers.
• Examine intensive assessments required to effectively identify and mitigate risks to the
information security of the infrastructure.
• Summarize weaknesses in information system and recommend mitigation measures to increase
the resistance of the information technology (IT) infrastructure to unauthorized access.
• Analyze the outcomes of their Vulnerability Assessments in the form of Penetration testing
report.
Industrial applications:

• Intelligence agencies
• Defense
• Automation systems
• Retail
• Banking
• Internet of Things
• Automotive sector
• E-commerce
Special requirements:

• Students must bring laptop in class.


• Basic knowledge of Linux and networking is required.
• Continuous 02 hours slots are required.
Selection Criteria:

Preferences would be taken from students. If the number of


students who give preference of this Engineering Minor are more
than the number of seats, then CGPA would be considered for
selection criteria.

You might also like