Department of Computer Science and Engineering
M.Tech in Information Security & Cyber Forensics

Objectives :

The goal of this course is for students to maintain an appropriate level of awareness, knowledge and skill to allow them to minimize the occurrence and severity of information security incidents. To provide suitable coverage of the international standards of cyber security and cyber laws. The rapid development of IT industry has made conventional methods of investigation of cyber crimes futile. This course is designed to extend employment, education and entrepreneurial opportunities to the students. It enables the students to gain in depth knowledge in the field of Information Security and Cyber Forensics with a foundation in Computer Science.

Cyber forensics is a huge field that is constantly evolving and this course aims to achieve the following:

  1. 1. Teach students the basics of information security and computer communication.
  2. 2. Familiarize students with Cyber laws and Security policies and Cryptography.
  3. 3. Learn some of the conventions and experience the ways of improving from existing experiences.
Learning Outcomes:
  1. 1. They can help the organization to continue its commercial activities in the event of significant information security incidents.
  2. 2. Students can establish responsibility and accountability for information security in organizations.
  3. 3. To be proficient in various forensic tools and usage of tools for disk imaging and recovery processes.
  4. 4. The students will be able to design security procedures and policies.
  5. 5. They can be well versed in various security standards and security testing techniques.
Employability:

Possible opportunities for graduates include roles in information security such as network security engineers, forensic analysts, information security crime investigators, security architects, disaster recovery managers and security analysts. These jobs may be offered in organizations where large amount of data has to be securely stored and cannot be intercepted during transmission between trading partners over the network. Since most operations are carried out in wireless mode it is the job of the network security engineers, forensic analysts, information security crime investigators, security architects, disaster recovery managers and security analysts to safe guard the information from any criminal activities.


"Immerse in this course and Emerge as
Cyber Crime Detectives"

For CURRICULUM click here....