NU has been offering the Cyber Security course as a specialisation area in its undergraduate programme since 2014. Our alumni are performing key roles in industry and academia. NU also offers industry-sponsored MTech Cyber Security programmes. Shikhil Sharma and Ananda Krishna, both alumni of NU’s Cyber Security programme have founded Czar Securities, one of the hottest startups in India that has also won a prestigious award. The firm operates in the field of cybersecurity.Read more
The time is perfect to build a career in Cyber Security. Human society is increasingly becoming dependent on digital technologies. From online transactions to socialising, applying for jobs to exchanging private and confidential information, digital pervades our lives like never before. And every digital touch point generates large swathes of complex data. IoT (Internet of Things) and Industry 4.0 are adding to this volume of complex data with wireless sensors networks generating data by the second.
If digital is the new way of life, data is the invisible currency and hence, vulnerable to attacks. Well-equipped cyber criminals continue to assault corporates, governments and the common man alike through data breaches, data manipulation, and cyber-attacks. Critical infrastructure of nations such as banking, air traffic control, energy distribution, e-governance etc., which are dependent on the Internet for proper functioning, are vulnerable to cyber-attacks. National security, in today’s times, is linked to Cyber Security.
The science of protecting data and networks from threats, manipulation and cyber-attacks forms the core of cyber security. It involves predicting, preventing and mitigating the effects of cyber-attacks. However, there is an increased need of trained professionals with the right set of knowledge, skills and attitudes to tackle the ever-growing menace of cyber-crime. According to the World Economic Forum, the world faces a projected shortfall of 3.5 million cyber security experts today.
NU’s BTech Cyber Security programme aims to bridge the skill gap between the manpower needs and available talent pool. Our Cyber Security course is designed to create skillful industry-ready Cyber Security engineers. The programme architecture has been designed for students who are keen to explore and exploit the latest trends in Cyber Security technologies in undergraduate studies. A combination of deep academic rigour and intense practical approach will allow BTech Cyber Security graduates to obtain in-demand skills and build expertise.
NU’s BTech Cyber Security course is a 4-year undergraduate programme that prepares students to identify and assess cyber threats, and design, configure and implement solutions to secure networks including global, industry-specific and networks critical to the nation such as governance, banking, energy, transportation, etc, using the latest technologies and tools for encryption, firewalls and malware protection.
The course includes topics such as Cryptography, Cloud Security, IoT and Ad hoc Networks Security, AI in Cyber Security and Information Security Risk Management. BTech Cyber Security graduates go on to work in the areas of incident response management, SOC (security operation centre), GRC (Governance, Risk Management and Compliance), Cyber Forensics, etc.
BTech Cyber Security – Distinguishing Features
NU alum; currently works at IBM India Pvt. Ltd.
"NU’s industry-linked, advanced Cyber Security curriculum provided me with the opportunity to enter the thrilling world of Cybersecurity. At my current organisation that focuses on continuous learning, I chose to conduct research on gRPC Pentesting and Security. It is a new technology and very few companies have adopted it. I worked with my team under the guidance of senior mentors and discovered some key vulnerabilities in the technology. We also represented the research at international conferences. I am glad that this added a lot of value to my current organisation. NU taught me to remain curious and explore the new and the unknown. Somewhere, it is this mindset that pushes me to explore new realms and keep adding value to my work."
Student of BTech, Semester VIII (Specialising in Cyber Security), NU
"The Cyber Security specialisation at NU helped me build my core knowledge in computer systems, networks, information and data security processes & practices, both practically and theoretically. The various courses offered in this specialisation, like Network Security, Information Security, Cyber Forensics, AI and ML in Cybersecurity along with the R&D and capstone projects helped me develop necessary skills and techniques on how to protect, monitor, mitigate the various threats and attacks. My R&D project, in particular, helped me improve my research skills and also gave me an insight on how an attack takes place in reality and how to think and create our own solutions to prevent such attacks. The entire process helped improve my problem-solving & critical-thinking skills."
Student of BTech Cyber Security at NU
"“Picking Cyber Security as my specialisation was one of the best decisions I have ever made. NU provides a suitable environment for all budding Cyber Security enthusiasts. Our faculty guided me in the right direction and even helped me complete my CEH certification. In the 6th semester, I along with my team, worked on an exciting R&D project in the Cyber Security domain under the guidance of Surender Sir. We developed a chrome extension capable of detecting phishing links, automatically blocking such links and then reporting it in the PhishTank Database.
I had courses related to Cyber Security domains like System and Network Security, Cyber Forensics, and AI-ML in Cyber Security. I learnt to use advanced tools like Wireshark, Nmap, Burp Suite, etc."
Student of BTech Cyber Security at NU
"Selecting a Cyber Security specialisation at NU paved the way for exploring the exciting domain in a much broader sense. The courses taught here helped me understand the way the industry works and how digital security remains an indispensable part of any organization. The programme gave me the opportunity to explore the field without any restrictions and the freedom to explore new and emergent technologies. My R&D project which was based on a Blockchain technology use-case, assisted me in gaining knowledge on the current trends. Furthermore, courses like Information Security, Networking and Digital Forensics gave me a clear understanding of tools and technologies used for continued growth and development of an organization.
BTech Cyber Security – Course Outline
|Mathematics and Basic Sciences (MBS)||20|
|Engineering Sciences (ESC)||14|
|Humanities and Social Sciences (HSS)||18|
|Professional Core Course (PCC)||32|
|Cyber Security Core Course (CYS)||28|
|Professional Electives Course (PEC)||20|
|Open Electives Course (OEC)||12|
|Project Work, Internship and Industry Practice (PRJ)||32|
|Environmental Sciences (EVS)||Audit Course|
BTech Cyber Security – Course Architecture
Year I (Semester I & Semester II)
|2||Science – I||3||0||2||4|
|3||EL 111||Fundamentals of Electronics||3||1||0||4|
|4||TA 111||Fundamentals of Computer Programming||2||0||4||4|
|5||TA 212||Workshop Practice||1||0||4||3|
|6||TA 102||Communication Skills||2||0||2||3|
|7||NU 111||Community Connect||0||0||2||1|
|Total semester L-T-P-C||14||2||12||22|
|1||MAT 101||Algebra and Differential Equations||3||1||0|
|2||Science – II||3||0||2|
|3||ENV 301||Environmental Science||3||0||0|
|4||CS 102||Data Structures||3||0||2|
|5||TA 202||Engineering Graphics||2||0||2|
|7||NU 111||Community Connect||0||0||2|
|Total semester L-T-P-C||17||1||6|
Year II (Semester III & Semester IV)
|1||MAT||Mathematical Foundation of Cyber Security||3||1||0||4|
|2||CS 251||Object Oriented Programming (with Java)||2||0||4||4|
|3||CS 261||Computer Networks||3||0||2||4|
|4||CYS 291||Introduction to Cyber Security||3||1||0||4|
|5||CS 241||Introduction to Communications Systems||3||0||2||4|
|7||NU 211||Community Connect||0||0||2||1|
|Total semester L-T-P-C||18||2||8||23|
|1||CS 201||Design & Analysis of Algorithms||3||0||3||4|
|2||CS 122||Computer Organisation and Architecture||3||0||2||4|
|4||CYS 262||Network Security||3||0||2||4|
|5||CS 211||Operating Systems||3||0||2||4|
|7||NU 212||Community Connect||0||0||2||1|
|Total semester L-T-P-C||18||0||9||23|
Year III (Semester V & Semester VI)
|1||CS 301||Software Engineering||3||0||2||4|
|2||CYS 4151||Cyber Security||3||0||2||4|
|3||CYS 572||Cyber Forensics||3||0||2||4|
|4||CYS||Secure Programming and Application Security||2||0||4||4|
|5||Open Elective – I||3||0||2||4|
|7||NU 311||Community Connect||0||0||2||1|
|Total semester L-T-P-C||17||0||12||23|
|#||Course Code||Course||L||T||P||C||Course Type|
|2||Professional Elective – I||3||0||2||4||PEC|
|3||Professional Elective – II||3||0||2||4||PEC|
|4||CS 392||Capstone Project — I||1||0||6||4||PRJ|
|5||NU 302||R & D Project||1||0||6||4||PRJ|
|7||NU 312||Community Connect||0||0||2||1|
|Total semester L-T-P-C||14||0||18||23|
Year IV (Semester VII &Semester VIII)
|1||Professional Elective – III||3||0||2||4|
|2||Professional Elective – IV||3||0||2||4|
|3||Professional Elective – V||3||0||2||4|
|4||Open Elective – II||3||0||2||4|
|5||Open Elective – III||3||0||2||4|
|6||Capstone Project — II||1||0||6||4|
|7||NU 312||Community Connect||0||0||2||1|
|Total semester L-T-P-C||16||0||16||24|
|1||NU 402||Industry Practice / Project||0||0||40||20|
|Total semester L-T-P-C||0||0||40||20|
|CYS||Platforms and Systems Security||3||0||2||4|
|CYS 4251||AI in Cyber Security||3||0||2||4|
|CYS||Security in Wireless Ad Hoc Networks||3||0||2||4|
|CYS||Identity & Access Management||2||0||4||4|
|CYS||Information Security Risk Assessment||3||1||0||4|
Apply the knowledge of Mathematics, Science, fundamentals of Engineering and an engineering specialisation to the solution of complex engineering problems.
Identify, formulate, review research literature, and analyse complex engineering problems to reach substantiated conclusions using first principles of Mathematics, Natural Sciences, and Engineering Sciences.
Design solutions for complex engineering problems and system components or processes that meet specified needs with appropriate consideration for public health and safety, and cognisant of cultural, societal, and environmental considerations.
Conduct investigations of complex problems
Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesise information to provide valid conclusions.
Modern tool usage
Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools including prediction and modelling to complex engineering activities with an understanding of the limitations.
The engineer and society
Apply reasoning informed by contextual knowledge to assess societal, health, safety, legal and cultural issues, and the consequent responsibilities relevant to the professional engineering practice.
Environment and sustainability
Understand the impact of professional engineering solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development.
Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering practice.
Individual and teamwork
Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings.
Communicate effectively on complex engineering activities with the engineering community and with society at large. This includes being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions.
Project management and finance
Demonstrate knowledge and understanding of engineering and management principles and apply these to one’s own work, as a member and/or leader in a team, to manage projects in multidisciplinary environments.
Recognise the need for, and have the preparation and ability to, engage in independent and life-long learning in the broadest context of technological change.
Programme specific outcomes
You will get extensive hands-on training with tools and technologies in cyber security projects and research like: Cisco Packet Tracer, Oracle Virtual Box, Nmap/Zenmap, Wireshark, Hping3, Google Hacking, Metasploit Framework, Acunetix, Nikto, SPLUNK, X-Ways Forensics, Netsparker, Burp Suite, SQLMAP, KFSensor, Snort, VeraCrypt, Wapiti, Ettercap, Savvius, IBM Reslient , IBM QRadar, QualysGuard, Nessus Professional, OWASP Zed, ProDiscover Forensic, CAINE, MS Baseline Security Analyzer, Zscaler Proxy, Crowdstrike Falcon , Carbon black , Kali Linux with Cybersecurity Tools, RSA NetWitness.
Cyber security is important because it protects data from thefts, manipulation and damage. The importance of cyber security can be gauged by the fact that large companies such as KPMG have almost doubled the size of their cyber security teams. The government, banks, retail, and BFSI sectors are now actively building their cyber security workforce as they need to protect their confidential data along with the user’s information they are privy to. The demand for such professionals will shoot up in the upcoming years.
According to a report by PwC and Data Security Council of India (DSCI), the cyber security market in India is expected to rise from $1.97 billion in 2019 to $3.05 billion by 2022, at a CAGR of 15.6 percent, almost 1.5 times the global rate. The cyber security market in India will be defined by top three sectors including banking and financial services industry (BFSI), information technology (IT) and information technology enabled services (ITeS), and the government, the report estimates. Other industries that are likely to hire cyber security experts, include energy, healthcare and automobile.
The world faces a projected shortfall of 3.5 million cyber security experts today. Some of the top names in the industry look for the certain qualities in a cyber security job applicant. The applicant needs to:
- Be a continuous learner
- Demonstrate persistence
- Be curious and perceptive
- Be cerebral, instinctive and emotional
- Have well-rounded skillsets
- Be able to work under pressure
- Be able to think like a black hat
- Be analytical
- Demonstrate willingness to continuously develop skills
- Security testing services involving penetration testing, web testing, application security, audits and reviews is expected to grow at the fastest rate (17.4%) as businesses are willing to prevent their systems from cyber-attacks.
- Incident response services are also growing (16.3%) due to the high number of and complexity in security breaches.
- Security operations services is the most dominant occupying 38% of India’s cyber security services market.
Cyber security products
- Data security products are growing at the fastest rate (22.2%) driven by emphasis on privacy and confidentiality.
- Endpoint security products such as anti-virus and anti-spam software, exploit protection, continuous monitoring, etc. are growing driven by concern among business executives to protect high-profile endpoints. There is high demand for real-time endpoint attack detection software, due to which there is going to be an increase in the endpoint detection and response (EDR) solutions.
- The IDR products will continue to be the most dominant product in the cyber security market at 32% of the product mix.
Cyber securities areas to learn
- Mathematical Foundation of Information Security, Fundamentals of Cyber Security, Cryptography, Network Security, Secure Programming and Application Security, Cyber Security, Cyber Forensics, Platforms and Systems Security, AI in Cyber Security, Security in Wireless Ad Hoc Networks, Identity & Access Management, IoT Security, Blockchain Security, Information Security Risk Assessment.