BTech Cyber Security
An advanced BTech degree to put you on a high-growth career path.
The science of protecting data and networks from threats, manipulation and cyber-attacks forms the core of cyber security. It involves predicting, preventing and mitigating the effects of cyber-attacks. However, there is an increased need of trained professionals with the right set of knowledge, skills and attitudes to tackle the ever-growing menace of cyber-crime. According to the World Economic Forum, the world faces a projected shortfall of 3.5 million cyber security experts today.
The BTech Cyber Security programme at NIIT University (NU) aims to bridge the skill gap between the manpower needs and available talent pool. NU’s Cyber Security programme is designed to create skillful industry-ready cybersecurity engineers. The programme architecture has been designed for students who are keen to explore and exploit the latest trends in cyber security technologies in undergraduate studies. A combination of deep academic rigour and intense practical approach will allow BTech Cyber Security graduates to obtain in-demand skills and build expertise. The programme basically focuses on preparing expert cyber security professionals who can easily handle real-life difficulties directly connected with the cyber security scenario.
NU’s BTech Cyber Security programme is a 4-year undergraduate programme that prepares students to identify and assess cyber threats, and design, configure and implement solutions to secure networks including global, industry-specific and networks critical to the nation such as governance, banking, energy, transportation, etc, using the latest technologies and tools for encryption, firewalls and malware protection.
The course includes topics such as Cryptography, Cloud Security, IoT and Ad hoc Networks Security, AI in Cyber Security and Information Security Risk Management. BTech Cyber Security graduates go on to work in the areas of incident response management, SOC (security operation centre), GRC (Governance, Risk Management and Compliance), Cyber Forensics, etc.
NU has the unique advantage of having offered Cyber Security as a specialisation area in its undergraduate programme since 2014 with alumni performing key roles in industry and academia. NU also offers industry-sponsored MTech Cyber Security programmes. Czar Securities, one of the hottest startups in India, founded by Shikhil Sharma and Ananda Krishna, NU alums operates in the field of cybersecurity.
Apply the knowledge of Mathematics, Science, fundamentals of Engineering and an engineering specialisation to the solution of complex engineering problems.
Identify, formulate, review research literature, and analyse complex engineering problems to reach substantiated conclusions using first principles of Mathematics, Natural Sciences, and Engineering Sciences.
Design solutions for complex engineering problems and system components or processes that meet specified needs with appropriate consideration for public health and safety, and cognisant of cultural, societal, and environmental considerations.
Conduct investigations of complex problems
Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesise information to provide valid conclusions.
Modern tool usage
Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools including prediction and modelling to complex engineering activities with an understanding of the limitations.
The engineer and society
Apply reasoning informed by contextual knowledge to assess societal, health, safety, legal and cultural issues, and the consequent responsibilities relevant to the professional engineering practice.
Environment and sustainability
Understand the impact of professional engineering solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development.
Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering practice.
Individual and teamwork
Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings.
Communicate effectively on complex engineering activities with the engineering community and with society at large. This includes being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions.
Project management and finance
Demonstrate knowledge and understanding of engineering and management principles and apply these to one’s own work, as a member and/or leader in a team, to manage projects in multidisciplinary environments.
Recognise the need for, and have the preparation and ability to, engage in independent and life-long learning in the broadest context of technological change.
Meet our faculty
|Mathematics and Basic Sciences (MBS)||20|
|Engineering Sciences (ESC)||14|
|Humanities and Social Sciences (HSS)||18|
|Professional Core Course (PCC)||32|
|Cyber Security Core Course (CYS)||28|
|Professional Electives Course (PEC)||20|
|Open Electives Course (OEC)||12|
|Project Work, Internship and Industry Practice (PRJ)||32|
|Environmental Sciences (EVS)||Audit Course|
Year I (Semester I & Semester II)
|2||Science – I||3||0||2||4|
|3||EL 111||Fundamentals of Electronics||3||1||0||4|
|4||TA 111||Fundamentals of Computer Programming||2||0||4||4|
|5||TA 212||Workshop Practice||1||0||4||3|
|6||TA 102||Communication Skills||2||0||2||3|
|7||NU 111||Community Connect||0||0||2||1|
|Total semester L-T-P-C||14||2||12||22|
|1||MAT 101||Algebra and Differential Equations||3||1||0||4|
|2||Science – II||3||0||2||4|
|3||ENV 301||Environmental Science||3||0||0||0|
|4||CS 102||Data Structures||3||0||2||4|
|5||TA 202||Engineering Graphics||2||0||2||3|
|7||NU 111||Community Connect||0||0||2||1|
|Total semester L-T-P-C||17||1||6||18|
Year II (Semester III & Semester IV)
Mathematical Foundation of Cyber Security
Object Oriented Programming (with Java)
Introduction to Cyber Security
Introduction to Communications Systems
Total semester L-T-P-C
|1||CS 201||Design & Analysis of Algorithms||3||0||3||4|
|2||CS 122||Computer Organisation and Architecture||3||0||2||4|
|4||CYS 262||Network Security||3||0||2||4|
|5||CS 211||Operating Systems||3||0||2||4|
|7||NU 212||Community Connect||0||0||2||1|
|Total semester L-T-P-C||18||0||9||23|
Year III (Semester V & Semester VI)
|1||CS 301||Software Engineering||3||0||2||4|
|2||CYS 4151||Cyber Security||3||0||2||4|
|3||CYS 572||Cyber Forensics||3||0||2||4|
|4||CYS||Secure Programming and Application Security||2||0||4||4|
|5||Open Elective – I||3||0||2||4|
|7||NU 311||Community Connect||0||0||2||1|
|Total semester L-T-P-C||17||0||12||23|
|#||Course Code||Course||L||T||P||C||Course Type|
|2||Professional Elective – I||3||0||2||4||PEC|
|3||Professional Elective – II||3||0||2||4||PEC|
|4||CS 392||Capstone Project — I||1||0||6||4||PRJ|
|5||NU 302||R & D Project||1||0||6||4||PRJ|
|7||NU 312||Community Connect||0||0||2||1|
|Total semester L-T-P-C||14||0||18||23|
Year IV (Semester VII &Semester VIII)
|1||Professional Elective – III||3||0||2||4|
|2||Professional Elective – IV||3||0||2||4|
|3||Professional Elective – V||3||0||2||4|
|4||Open Elective – II||3||0||2||4|
|5||Open Elective – III||3||0||2||4|
|6||Capstone Project — II||1||0||6||4|
|7||NU 312||Community Connect||0||0||2||1|
|Total semester L-T-P-C||16||0||16||24|
|1||NU 402||Industry Practice / Project||0||0||40||20|
|Total semester L-T-P-C||0||0||40||20|
|CYS||Platforms and Systems Security||3||0||2||4|
|CYS 4251||AI in Cyber Security||3||0||2||4|
|CYS||Security in Wireless Ad Hoc Networks||3||0||2||4|
|CYS||Identity & Access Management||2||0||4||4|
|CYS||Information Security Risk Assessment||3||1||0||4|
Programme specific outcomes
You will get extensive hands-on training with tools and technologies in cyber security projects and research like: Cisco Packet Tracer, Oracle Virtual Box, Nmap/Zenmap, Wireshark, Hping3, Google Hacking, Metasploit Framework, Acunetix, Nikto, SPLUNK, X-Ways Forensics, Netsparker, Burp Suite, SQLMAP, KFSensor, Snort, VeraCrypt, Wapiti, Ettercap, Savvius, IBM Reslient , IBM QRadar, QualysGuard, Nessus Professional, OWASP Zed, ProDiscover Forensic, CAINE, MS Baseline Security Analyzer, Zscaler Proxy, Crowdstrike Falcon , Carbon black , Kali Linux with Cybersecurity Tools, RSA NetWitness.
Cyber security is important because it protects data from thefts, manipulation and damage. The importance of cyber security can be gauged by the fact that large companies such as KPMG have almost doubled the size of their cyber security teams. The government, banks, retail, and BFSI sectors are now actively building their cyber security workforce as they need to protect their confidential data along with the user’s information they are privy to. The demand for such professionals will shoot up in the upcoming years.
According to a report by PwC and Data Security Council of India (DSCI), the cyber security market in India is expected to rise from $1.97 billion in 2019 to $3.05 billion by 2022, at a CAGR of 15.6 percent, almost 1.5 times the global rate. The cyber security market in India will be defined by top three sectors including banking and financial services industry (BFSI), information technology (IT) and information technology enabled services (ITeS), and the government, the report estimates. Other industries that are likely to hire cyber security experts, include energy, healthcare and automobile.
The world faces a projected shortfall of 3.5 million cyber security experts today. Some of the top names in the industry look for the certain qualities in a cyber security job applicant. The applicant needs to:
- Be a continuous learner
- Demonstrate persistence
- Be curious and perceptive
- Be cerebral, instinctive and emotional
- Have well-rounded skillsets
- Be able to work under pressure
- Be able to think like a black hat
- Be analytical
- Demonstrate willingness to continuously develop skills
- Security testing services involving penetration testing, web testing, application security, audits and reviews is expected to grow at the fastest rate (17.4%) as businesses are willing to prevent their systems from cyber-attacks.
- Incident response services are also growing (16.3%) due to the high number of and complexity in security breaches.
- Security operations services is the most dominant occupying 38% of India’s cyber security services market.
Cyber security products
- Data security products are growing at the fastest rate (22.2%) driven by emphasis on privacy and confidentiality.
- Endpoint security products such as anti-virus and anti-spam software, exploit protection, continuous monitoring, etc. are growing driven by concern among business executives to protect high-profile endpoints. There is high demand for real-time endpoint attack detection software, due to which there is going to be an increase in the endpoint detection and response (EDR) solutions.
- The IDR products will continue to be the most dominant product in the cyber security market at 32% of the product mix.
Cyber securities areas to learn
- Mathematical Foundation of Information Security, Fundamentals of Cyber Security, Cryptography, Network Security, Secure Programming and Application Security, Cyber Security, Cyber Forensics, Platforms and Systems Security, AI in Cyber Security, Security in Wireless Ad Hoc Networks, Identity & Access Management, IoT Security, Blockchain Security, Information Security Risk Assessment.