You are on page 1of 15

School of Computer

Science and Engineering


Engineering Minor
• A set of four courses in an engineering stream to develop a
competency within or outside the discipline area (e.g. a Computer
Science Engineering student choosing Cyber Security or Machine
Learning or a Mechanical Engineering student taking courses from
Computer Science Engineering as his/her Engineering Minor Area).

• These Engineering Minors are being offered so that each student


would have at least one major skills by the end of 7th term.
Engineering Minor
• Students are expected to provide the preferences of Engineering Minor
area only once and the set of courses of area allocated would get
registered in pre-defined terms (5th, 6th and 7th).
Important points to remember during polling process
Interfaces to be followed Interface not to be followed
• Polling for Engineering Minor
can be done through both UMS
Never use UMS through mobile
and LPU touch App browser for polling process as
it may result in change in
1. UMS
preferences

2.LPU Touch App

Note: Link for the UMS pathway and LPU Touch App will be shared with the announcement for Engineering
Minor(s) polling in the near future.
Engineering Minors in School of Computer Science
and Engineering:
1. Cyber Security
2. Data Science
3. Machine Learning
4. MEAN Stack Development (Not for IT students)
5. Software Methodologies and Testing
6. Internet of Things
Cyber Security
Brief Description
Cyber security transform into a frightening new reality, one where
corporate and government organizations seem helpless to stop cyber
incursions that leads to cyber risk. To mitigate the cyber risk we need
knowledge of cryptographic techniques, traffic monitoring and ethical
hacking knowledge for better understanding of security issues to
protect our network.
Total number of seats: 950

Selection Criteria: Based on preference and CGPA

Preferences would be taken from students. If the number of


students who give preference of this Engineering Minor are
more than the number of seats, then CGPA would be
considered for selection criteria. It should be noted that the
CGPA till 3rd Semester only shall be considered while
generating the merit list.
Career Opportunities
• Information Security Analyst
• Penetration Tester
• Cyber Security Consultant
• Malware Analyst
• Cyber Threat Management
• Cyber Intelligent Analyst
• Can also work as freelancer to provide the security services.
Courses to be studied in Cyber Security
Course
Course Title L T P Credit
Code
INT242 CYBER SECURITY ESSENTIALS 2 0 2 3

INT243 INFORMATION SYSTEM SECURITY 2 0 2 3

INT244 SECURING COMPUTING SYSTEMS 2 0 2 3

INT245 PENETRATION TESTING 2 0 2 3


Description of the Courses
1) INT242 : CYBER SECURITY ESSENTIALS

It covers the concepts of cyber security with their importance and identify various
vulnerabilities and security flaws in the operating systems and networks. It also focuses on
secure social networking sites and email communications along with the prevention methods.
Course Outcome:
•Understand the basic concepts of cyber security and their importance in the cyber world.
•Identify and analyze various vulnerabilities and security flaws in the operating systems, web
servers, network equipments and how to patch them.
•Evaluate the measures to protect a system from possible security breaches.
•Construct application of scripting language for different malwares identification.
2) INT243 : INFORMATION SYSTEM SECURITY
It introduce the concepts of computer security incident, detection, live data collection and its forensics
duplication. It also emphasis on the data collection techniques and investigate windows systems and
routers for the audit.
Course Outcome:
1)Describe the basics of incident response handling process.
2)Analyze the practices and procedures involved in incident response handling process.
3)Observe different methods of obtaining information and data for forensic investigation.
4)Validate the procedures required for acquiring forensic evidences along with the documentation
part in order to present as legal evidence.
Description of the Courses cont….
3) INT244: SECURING COMPUTING SYSTEMS

It covers the basic concepts of penetration testing along with the analysis of various vulnerabilities
and security flaws exist in the operating systems, web servers, network equipments through the
techniques used by hackers.
Course Outcome:
•Understand the basic concept, fundamentals and practice of penetration testing and ethical
hacking.
•Analyze various vulnerabilities and security flaws in the operating systems, web servers and
network equipments.
•Simulate the techniques used by hackers for specific types of attacks and their countermeasures.
4) INT245: PENETRATION TESTING
It covers the tools and technologies used by ethical hackers in order to identify weaknesses in
information system and recommend mitigation measures to increase the resistance of the
information technology (IT) infrastructure to unauthorized access.
Course Outcome:
•Recite how to analyze the outcome from the tools and technologies used by ethical hackers.
•Examine intensive assessments required to effectively identify and mitigate risks to the
information security of the organization.
•Summarize weaknesses in information system and recommend mitigation measures to increase
the resistance of the information technology (IT) infrastructure against unauthorized access.
•Generalize the outcomes of their vulnerability assessments in the form of penetration testing
report.
Industrial applications:
•Intelligence agencies
•Defense
•Automation systems
•Retail
•Banking
•Internet of Things
•Automotive sector
•E-commerce
Special requirements:
•Student must bring laptop.
•Basic knowledge of Linux and networking is required.
•Scheduling of continuous 02 hours slots in time table.
Queries/Doubt clearing:

Sitting
Name of faculty UID Email-id
Place
Atul Malhotra 18011 atul.18011@lpu.co.in 33-203

Awadhesh Kumar Shukla 23866 awadhesh.23866@lpu.co.in 33-203

You might also like