CSE - Cyber Security

Department offers four year under graduate program Bachelor of Technology (B. Tech.) in Computer Science and Engineering- Cyber Security. Cyber Security specialization will provide a deeply engaging learning experience with interesting real-world applications. Cyber Security gives a better understanding of protecting your data from cyber-attacks with proper risk management and mitigation.

Cyber Security has become an important due to day to day technological advancement. Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from various attacks, damage or unauthorized access. In a computing context, security includes both cyber security and physical security. Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.

Today Increased Internet penetration across the world has given rise to sophisticated attacks on Information Technology (IT) Services and infrastructure. People with malicious intent are able to access sensitive financial and personal information through different types of attacks. Smartphone attacks are growing manifolds and with the growth of 3G, 4G internet services and seamless financial transactions using mobile phones, there is a substantial increase in mobile malware and data theft. In order to make our Information Technology infrastructure resilient against these threats, there is a dire need for cutting-edge research and development efforts in Cyber Security, Network Security etc.

According to job market analysis agencies, the number of Cyber Security jobs has grown. Cyber Security jobs now account for more than 10% of all information technology jobs. Consequently, the study of Cyber Security as a discipline has become essential to cater the growing need for professionals and researchers to deal with the future security challenges.

The curriculum of the Bachelor of Technology (B. Tech.) in Computer Science and Engineering- Cyber Security program focuses on exposing to the students with the essentials of network security issues, solutions and computer science required in the context of Security and its applications with strong emphasis on having hands-on experience with the help of practical, labs and experience of dealing with real-world problems.

Our objective is to become a pioneer in the field of Cyber Security by providing quality and skilled education as per requirements. It has a comprehensive curriculum as per the mandate of the RGPV on topics pertaining to all aspects with a focus on most preferred practical learning. The course structure comprises latest technologies in the trend.

This four year undergraduate degree progamme of Computer Science & Engineering- Cyber Security is designed to make the students technically sound in advanced learning systems related to cyber security. This four years degree programme develop the skills of cyber attack detection, protection and approach to resolve future security issues.

Our faculty members aim at delivering excellent education which exhibits their rich research experience with classroom teaching. The teaching-learning process comprises classroom teaching, online teaching tools along with tutorials, practical, seminars, expert lectures, industrial visits, industrial training, and workshops etc.

 

Course Branch Intake
B.Tech Computer Science Engineering (Cyber Security) 60

  Our Vision

To produce competent, world class Cyber Security professionals who will excel in their fields and effectively meet challenges of the dynamic global scenario.

  Our Mission

  • To prepare students for becoming smart and good ethical cyber security professionals, leaders and entrepreneurs in global market or for continuing in advanced studies
  • To promote students to be creative and value-adding talents in cyber security by creating suitable environment in order to be able to compete in international level.
  • Developing capacity to learn new technologies and apply to solve social and industrial problems to become an entrepreneur.

  Program Specific Outcomes (PSOs)

  • To understand, analyze and develop essential proficiency in the areas related to ethical acking, cyber laws, cyber defense, cryptography, data communication, and network security.
  • To develop ability to identify Network vulnerabilities and detect attacks and resolve them and find the solution to secure organization information system
  • Eligibility
  • Career Prospect
  • Recent Activities
  • Students Results
  • Students Achievements

Eligibility

  • 1st Year XII with : Phy + Maths + (Chem. / Comp. Sc./Bio) with Min. 50% (45 % for SC/ST/OBC) with qualified rank in JEE.
  • 2nd Year Direct Admission : 1. Min. 50% (45% for SC/ST/OBC) Diploma in Engg. 2. With at least 60% in B. Sc (with Maths)

Career Prospect

Career Prospects in Cyber Security

In near future our country will require millions of Cyber Security Professionals to keep the people, organizations and even the economy of India, safe and protected against these high-tech crimes. Looking at the severity and need, specialised courses are greatly in demand on Cyber Security. Oriental college of Technology, Bhopal is one of the institute which has started specialised programmes to create expert scholars in this arena. The Cyber Security is one of the most active team of learners and experts in central India. Having a close association with the Government agencies, and IT Industries, the department provides universally accepted, highly valuable graduate engineering.

Cyber Security career options
  • Chief information security officer This is an executive-level position tasked with developing and overseeing a company’s cybersecurity architecture, policy/planning, and execution. This position requires technical chops and management acumen.
  • Chief privacy officer A chief privacy officer is a new executive-level position that is becoming increasingly more common at large companies, institutions, and organizations — including municipalities and governmental organizations. This new role was created to ensure the protection of critical data such as personal details and financial information.
  • Computer forensics These experts are detectives that work with company officials or law enforcement after a data, network, or security breach to paint a picture of how a computer or computer system was compromised.
  • Computer security incident responder The responsibilities for this job are very much aligned with the job title itself. Incident responders are usually the first call within an organization or company if a data breach or hack is detected. The role requires documenting the attack and developing a response.
  • Cryptanalysts Today’s codebreakers, cryptanalysts use mathematics, computer science, and engineering to analyze different methods of concealing data. This career name is sometimes used to mean cryptographer, but there is a distinction within the industry.
  • Cryptographer A cryptographer working in cybersecurity is a modern spin on an ancient discipline. Cryptographers use algorithms and computer code to create (and decipher) encrypted software and related services.
  • Cybercrime investigator Digital crimes are unique in that they are undertaken remotely, or that they can happen in virtual realms, or require sophisticated coordination among many nodes or hubs. Cybercrime investigators act as digital detectives to help bring cybercriminals to justice after a hack or cyberattack.
  • Data protection officer The data protection officer (DPO) is a relatively new position created to meet the requirements set by the General Data Protection Regulation (GDPR) in Europe. Since the regulation affects all companies doing business in Europe, a DPO helps develop and implement data privacy strategies within a company or organization.
  • Digital forensics These professionals are like the sleuths of the digital world. Often they are tasked with figuring out what happened after a security incident and being able to reverse engineer hacks and attacks. As the number of digital attack surfaces continues to grow, so too does the need for professionals with digital forensic skills.
  • Ethical hacker An ethical hacker, also known as a penetration tester, is tasked with trying to find vulnerabilities in a computer system or network. The goal is to find these vulnerabilities and suggest fixes or defenses before cybercriminals or black-hat hackers are able to exploit the systems.
  • Malware analyst An important and rapidly growing role within the cybersecurity hierarchy is that of a malware analyst. Part security engineer, part digital forensics expert, and part programmer, this crucial function provides in-depth intelligence after a cybersecurity event.
  • Penetration tester Or pen tester, or ethical hacker, is a popular job within cybersecurity. Penetration testers are hired by companies or organizations to look for security issues and vulnerabilities before other hackers do.
  • Risk management is a critical part in running a business. Increasingly, understanding and mitigating cybersecurity risk are becoming more important for businesses with a digital footprint. Today’s risk managers need to have a diverse professional background that includes an understanding of cybersecurity.
  • Security administrator A security administrator is often an IT-dominant role that can focus or transition into security-related job functions.
  • Security analyst A security analyst is responsible for monitoring security procedures and making sure that best practices are implemented and followed. The role of a security analyst might vary widely depending on the size and industry of the employing company, but the career is definitely becoming more popular across all sectors.
  • Security architect Designing computing networks and other infrastructure with an eye towards security and maintaining overall integrity is the job of security architects. Often this job draws on the skills and experience from a variety of backgrounds and is considered a foundational function when creating secure and resilient networks.
  • Security code auditor This job title is also referred to as a security auditor, source code auditor, or security auditor. This job, which acts as an editor of sensitive security code requires a wide-ranging skillset including programming, an understanding of network and systems infrastructure as well as a familiarity with penetration testing and underlying security protocols.
  • Security consultant Security consultants often have a depth of experience and knowledge to pull from and are hired when there is a pressing security problem or issue that a company or organization is trying to deal with or eliminate.
  • Security engineer Security engineers are responsible for building and maintaining security code and systems to safeguard data and infrastructure.
  • Security software developer A security software developer is tasked with taking software that a company or organization might write for its business or operations and then adding layers of security on top of that software so that it is hardened from an attack perspective. In some ways, this role straddles the worlds of traditional commercial software development with the emerging info security world.
  • Security specialist A security specialist is someone with a deep understanding of tactics and best practices and that can be tasked with a number of specific security-oriented roles depending on company or organization size and scope.

Recent Activities

Details of Recent Activities conducted by Department
S.No Date Topic
1 13/05/22 Industrial visit at State Cyber Police Headquarters (State Cyber Cell) , Bhopal
2 27/04/22 Cyber Awareness camp at Semari Khurd Village , Gram Panchayat- Bagroa under the Unnat Bharat Abhiyan.
3 06/04/22 07/04/22 Workshop on Cyber Attack
4 24/03/22 30/03/22 AICTE-CPF Online Training on Cyber Security
5 15/03/22 Word Press Workshop
6 28/02/22 02/03/22 Two days Workshop on Web Design Development
7 29/12/21 Industrial Visit at Surveillance System of Traffic Police Station , Police Control Room , Bhopal and Integrated Traffic Management BNEST , Bhopal
8 16/11/21 Workshop on Cyber Security and Ethical Hacking

Students Results

LIST OF TOP 10 STUDENTS
S.No Enrollment No. Name of Student SGPA
1 0126CY201037 POORVI TAILANG 10
2 0126CY201047 SAGAR SAHU 10
3 0126CY201049 SAKSHI AHIRWAR 10
4 0126CY201053 SAURAV SHARMA 10
5 0126CY201056 SHIVAM MISHRA 10
6 0126CY201058 SNEHA JAIN 10
7 0126CY201002 AAYUSH CHOUHAN 9.83
8 0126CY201007 AINAAN NASIR 9.83
9 0126CY201008 AJINKY AASATI 9.83
10 0126CY201015 ANKUR PRAJAPATI 9.83
0126CY201021 BHOOMIKA SHARMA 9.83
0126CY201036 NITIN KUSHWAHA 9.83
0126CY201038 PRAGYA JAIN 9.83
0126CY201044 SREHBARHUSAIN NAQVI 9.83

Students Achievements

 

 
CISCO Certifications (2021-22)
S.No Name of Student Certificate Details
1 Poorvi Tailang Introduction to Cyber security CISCO Networking Academy
2 Poorvi Tailang Cyber security Essentials CISCO Networking Academy
3 Amir Ali Introduction to Cyber security NASSCOM FutureSkills
4 Ajinkya Asati Introduction to Cyber security NASSCOM FutureSkills
5 Nikhil Ahirwar Introduction to Cyber security NASSCOM FutureSkills
6 Rhythum Tikarya Digital 101 Journey IT-ITes SSC NASSCOM
7 Shivam Mishra Developer Certification on Responsive Web Design, at freeCodeCamp
8 Shivam Mishra Introduction to Cyber security CISCO Networking Academy
9 Shivam Mishra Cyber security Essentials CISCO Networking Academy
10 Shivam Mishra Engineering Virtual Program, Module- Crack leaked password database at Forage
11 Shivam Mishra Computer Networks guided path on Codestudio Powered by Coding Ninjas
12 Shantanu Tomar Introduction to Cyber security CISCO Networking Academy
13 Shantanu Tomar Cyber security Essentials CISCO Networking Academy
14 Shantanu Tomar Digital 101 Journey IT-ITes SSC NASSCOM
15 Sumit Kumar Introduction to Packet Tracer CISCO Networking Academy
16 Sumit Kumar Introduction to Cyber security CISCO Networking Academy
17 Sumit Kumar Cyber security Essentials CISCO Networking Academy
18 Sumit Kumar Digital 101 Journey IT-ITes SSC NASSCOM
19 Sumit Kumar Digital 101 Journey IT-ITes SSC NASSCOM
20 Hardik Sharma Adobe UX Foundation Learning Journey aligned to SSC NASSCOM UX Design Foundation by Adobe
21 Deepanshu Shukla Digital 101 Journey IT-ITes SSC NASSCOM
22 Sagar Gupta Digital 101 Journey IT-ITes SSC NASSCOM
23 Sagar Gupta Adobe UX Foundation Learning Journey aligned to SSC NASSCOM UX Design Foundation by Adobe
24 Shivam Kumar Digital 101 Journey IT-ITes SSC NASSCOM
25 Shivam Kumar Digital 101 Journey IT-ITes SSC NASSCOM
26 Shivam Kumar Introduction to Packet Tracer CISCO Networking Academy
27 Shivam Kumar Introduction to Networks CISCO Networking Academy
28 Shivam Kumar Introduction to Cyber security CISCO Networking Academy
29 Sameer Khan Introduction to Cyber security CISCO Networking Academy
30 Sameer Khan Introduction to Cyber security Tools & Cyber Attacks, IBM, COURSERA
31 Sameer Khan Cyber security Compliance Framework & System Administration, IBM, COURSERA
32 Sameer Khan Cyber security Roles, Processes & Operating System Security, IBM, COURSERA
33 Sameer Khan Network Security & Database Vulnerabilities, IBM, COURSERA
34 Sameer Khan Introduction to Python for Cyber security, INFOSEC, COURSERA
35 Sameer Khan Execution, persistence, privilege escalation and Evasion INFOSEC, COURSERA
36 Sameer Khan Fundamental of Digital Marketing , IAB Europe & Google.
37 Sameer Khan Digital 101 Journey IT-ITes SSC NASSCOM
38 Ayush Pandey Introduction to Cyber security NASSCOM FutureSkills
39 Ayush Pandey Cyber security Essentials CISCO Networking Academy
40 Aditya Shrivastava Digital 101 Journey IT-ITes SSC NASSCOM
41 Sneha Jain Digital 101 Journey IT-ITes SSC NASSCOM
42 Kashyap Bisen Introduction to Packet Tracer CISCO Networking Academy
43 Akshat Sharma Applications of Cloud Computing , Grate Learning Academy
44 Sakshi Ahirwar Introduction to Cyber security CISCO Networking Academy