Comprehensive Course Listing Across 8 Semesters
Semester | Course Code | Course Title | Credit Structure (L-T-P-C) | Pre-requisites |
---|---|---|---|---|
1 | CS101 | Introduction to Programming | 3-0-0-3 | - |
1 | CS102 | Mathematics for Computer Science | 4-0-0-4 | - |
1 | CS103 | Basic Electronics and Communication | 3-0-0-3 | - |
1 | Lab | Programming Lab | 0-0-2-2 | - |
2 | CS201 | Data Structures and Algorithms | 4-0-0-4 | CS101 |
2 | CS202 | Digital Logic Design | 3-0-0-3 | - |
2 | CS203 | Operating Systems | 3-0-0-3 | CS101 |
2 | Lab | OS Lab | 0-0-2-2 | - |
3 | CS301 | Database Management Systems | 3-0-0-3 | CS201 |
3 | CS302 | Computer Networks | 3-0-0-3 | CS203 |
3 | CS303 | Cryptography and Network Security | 3-0-0-3 | CS201 |
3 | Lab | Network Security Lab | 0-0-2-2 | - |
4 | CS401 | Software Engineering | 3-0-0-3 | CS201 |
4 | CS402 | Malware Analysis | 3-0-0-3 | CS301 |
4 | CS403 | Incident Response and Forensics | 3-0-0-3 | CS302 |
4 | Lab | Malware Analysis Lab | 0-0-2-2 | - |
5 | CS501 | Advanced Cryptography | 3-0-0-3 | CS303 |
5 | CS502 | Cloud Security | 3-0-0-3 | CS401 |
5 | CS503 | Security Architecture and Risk Management | 3-0-0-3 | CS303 |
5 | Lab | Cloud Security Lab | 0-0-2-2 | - |
6 | CS601 | Cyber Policy and Governance | 3-0-0-3 | CS501 |
6 | CS602 | Human Factors in Cybersecurity | 3-0-0-3 | CS402 |
6 | CS603 | AI for Cybersecurity | 3-0-0-3 | CS502 |
6 | Lab | AI for Security Lab | 0-0-2-2 | - |
7 | CS701 | Thesis Research Proposal | 0-0-0-6 | CS603 |
7 | CS702 | Capstone Project | 0-0-0-12 | - |
8 | CS801 | Final Year Thesis | 0-0-0-12 | CS701 |
8 | CS802 | Internship | 0-0-0-6 | - |
Advanced Departmental Electives
The department offers a range of advanced elective courses designed to give students specialized knowledge in specific areas of cyber security:
- Cryptography and Network Security: This course explores the mathematical foundations of encryption algorithms, secure communication protocols, and cryptographic systems used in modern networks. Students learn about RSA, AES, and ECC algorithms while gaining hands-on experience with tools like OpenSSL.
- Malware Analysis and Incident Response: Designed for students interested in digital forensics, this course covers techniques for analyzing malicious code, identifying attack vectors, and responding to security incidents effectively. It includes practical sessions on reverse engineering using IDA Pro and Ghidra.
- Cloud Security and Compliance: This elective focuses on securing cloud environments using technologies such as AWS, Azure, and GCP. Students explore compliance frameworks like ISO 27001, NIST, and GDPR to ensure data protection in shared infrastructures.
- Cyber Policy and Governance: This course addresses the legal and regulatory aspects of cyber security, including international treaties, national laws, and ethical considerations. It includes case studies on major cyber incidents and their policy responses.
- Human Factors in Cyber Security: Understanding how human behavior impacts security is crucial for designing effective policies. This course examines cognitive biases, social engineering, and training strategies to reduce insider threats and improve overall organizational resilience.
- Artificial Intelligence for Cybersecurity: As AI becomes integral to both attacks and defenses, this course explores machine learning models for anomaly detection, threat prediction, and automated response systems. Students work with datasets from real-world security incidents.
- Security Architecture and Risk Management: This course teaches students how to design secure systems by understanding risk assessment methodologies, identifying vulnerabilities, and implementing appropriate controls. It emphasizes enterprise-level architecture planning.
- Digital Forensics and Incident Response: Students learn forensic techniques for recovering data from compromised systems and reconstructing cyber attacks. Emphasis is placed on legal admissibility of evidence and chain of custody procedures.
- Quantum Cryptography: As quantum computing advances, traditional cryptographic methods become vulnerable. This course explores quantum key distribution protocols and their implications for future security architectures.
- Security Testing and Penetration Testing: Through hands-on labs, students practice penetration testing methodologies using tools like Metasploit, Burp Suite, and Nessus to identify weaknesses in target systems before they are exploited by attackers.
Project-Based Learning Philosophy
The department strongly advocates for project-based learning as a core component of its pedagogical approach. Projects are structured to mirror real-world scenarios, allowing students to apply theoretical concepts in practical settings. The program includes two mandatory mini-projects during the third and fourth years, followed by a capstone project in the final year.
Mini-project 1 (Third Year): Students form teams of 3–4 members and select a topic related to network security or cryptography. Each team presents their findings in a formal report and an oral presentation before a panel of faculty experts. Projects are evaluated based on technical depth, clarity of documentation, and demonstration of problem-solving skills.
Mini-project 2 (Fourth Year): Building upon the first project, students refine their approach and implement solutions using industry-standard tools. The second mini-project involves collaboration with external partners, such as startups or government agencies, providing real-world exposure to current challenges in cyber security.
The final-year thesis/capstone project is a culmination of all learned skills. Students choose topics aligned with emerging trends, such as AI-powered threat detection, blockchain-based identity verification, or quantum-resistant encryption methods. Faculty mentors guide students through research methodologies, data collection, and analysis phases. The final deliverables include a comprehensive report, presentation slides, and a working prototype or simulation model.