Cyber security is a very fast-moving field. A program in security that aims to be on the forefront must necessarily have a companion-advanced a program that has a good balance between theoretical and practical aspects, analytical methods and system architectures, academic ideas and industry practices.
This program provides a good blend of theory and industrial practice; necessary theoretical background, insight into general and technical aspects of Cyber Security, analytical methods and management practices in the field of Cyber Security are the areas receiving detailed attention. It aims at moulding the student into an Information Security professional. Practicing industry professionals and enterprise experts with little or no knowledge in Cyber Security too can benefit from this program.
Career Opportunities in Cybersecurity
Cybersecurity Ventures predicts there will be 3.5 million unfilled cybersecurity positions globally by 2021. Data from Burning Glass Technologies Research found that cyber security professionals tend to make about 9 percent more compared to other IT workers, yet there remains a lack of enough qualified professionals in the field. Read our comprehensive report on cybersecurity as a career choice covering the various types of roles, the skillsets required, and the career roadmap for cybersecurity professionals.
GTU-GSET Students . Moreover, they are encouraged to attend and explore GTU- International Experience Program (IEP) in the field of cyber security such as Cyber Security Summer Training Program at Tel Aviv University, Israel. All the students get 100% placement in various esteemed industries and organization such as Deloitte India, KPMG India, National Technical Research Organisation (NTRO). Net-Square Solutions Pvt. Ltd., BlueInfy Solutions Pvt. Ltd., TrasVista-Pune, Cloud24x7 Pvt. Ltd., Sophos Technologies Pvt. Ltd., etc.
This AICTE approved Post Graduate ME course of two years duration has an intake of 30 students per year and the admissions are done through ACPC, Gujarat on the basis of PGSET/GATE and the score at BE.
About Cyber Security and Digital Forensics Laboratory:
The Cyber Security and Digital Forensics Laboratory is a state-of-the-art, dedicated space in which students can safely engage in cyber related activities, including malware detection and analysis, and penetration testing. It is equipped with everything required to secure and analyze digital evidence. Cybercrime and forensic investigations are simulated in a safe, controlled environment without possible impact to other campus networks. This lab is provided to all ME Cyber Security students to undertake coursework and project work where they can enhance their research skill in the field of Cyber Security.
FRED Forensic Workstation:
FRED is Forensic Recovery of Evidence Device. The FRED family of forensic workstations are highly integrated, flexible and modular forensic platforms and now include Digital Intelligence's exclusive UltraBay 3D Write Protected Imaging Bay and Ventilated Imaging Shelf. FERD Systems are optimized for stationary laboratory acquisition and analysis. Simply remove the hard drive(s) from the suspect system and plug them into FERD and acquire the digital evidence. FERD will acquire data directly from IDE/EIDE/ATA/SATA/ATAPI/SAS/Firewire/USB hard drives and storage devices and save forensic images to Blu-Ray, DVD, CD or hard drives. FERD systems also acquire data from Blu-Ray, CD-ROM, DVD-ROM, Compact Flash, Micro Drives, Smart Media, Memory Stick, Memory Stick Pro, xD Cards, Secure Digital media and Multimedia Cards. Furthermore, with the optional tape drive FERD is capable of archiving to or acquiring evidence from LTO ultrium 5 tapes. All FERD systems include the UltraBay, front panel connections, and removable drive trays so there is no need to open up the processing system to install drives or crawl around the back of the unit to attach devices
|Subject code||Branch code||Eff_from||Subject Name||Category||Sem /Year||L.||T.||P.||Total||E||M||I||V||Total|
|3700001||59||2018-19||English for Research Paper Writing||Audit Course||1||2||0||0||0||50||0||0||0||50|
|3700005||59||2018-19||Constitution of India||Audit Course||1||2||0||0||0||50||0||0||0||50|
|3710001||59||2018-19||Research Methodology and IPR||MLC||1||1||0||2||2||0||0||20||80||100|
|3715901||59||2018-19||Mathematical Foundation for Cyber Security||Core I||1||3||0||2||4||70||30||20||30||150|
|3715901||59||2018-19||Introduction to Cryptography||Program Elective I||1||3||0||2||4||70||30||20||30||150|
|3715905||59||2018-19||Cyber Crimes, Ethics and Laws||Program Elective II||1||3||0||2||4||70||30||20||30||150|
|3715906||59||2018-19||Cyber Security: Administration and Management||Program Elective II||1||3||0||2||4||70||30||20||30||150|
|3715907||59||2018-19||Defense Programming in Python||Core II||1||3||0||2||4||70||30||20||30||150|
|3715908||59||2018-19||Digital Forensic||Program Elective I||1||3||0||2||4||70||30||20||30||150|
|3715909||59||2018-19||Intrusion Detection||Program Elective I||1||3||0||2||4||70||30||20||30||150|
|3715910||59||2018-19||Secure Software Design and Enterprise Computing||Program Elective II||1||3||0||2||4||70||30||20||30||150|
|3700001||59||2018-19||English for Research Paper Writing||Audit Course||2||2||0||0||0||50||0||0||0||50|
|3700005||59||2018-19||Constitution of India||Audit Course||2||2||0||0||0||50||0||0||0||50|
|3720001||59||2018-19||Mini Project with Seminar||Core||2||0||0||4||2||0||0||100||0||100|
|3722323||59||2018-19||Information Theory & Coding||Program Elective III||2||3||0||2||4||70||30||20||30||150|
|3725611||59||2018-19||Steganography & Digital Watermarking||Program Elective III||2||3||0||2||4||70||30||20||30||150|
|3725902||59||2018-19||Internetworking and security||Program Elective IV||2||3||0||2||4||70||30||20||30||150|
|3725903||59||2018-19||Ethical Hacking||Program Elective IV||2||3||0||2||4||70||30||20||30||150|
|3725904||59||2018-19||Web and Database Security||Program Elective III||2||3||0||2||4||70||30||20||30||150|
|3725905||59||2018-19||Security Assessment and Risk Analysis||Program Elective IV||2||3||0||2||4||70||30||20||30||150|
|3725908||59||2018-19||Malware Analysis||Core IV||2||3||0||2||4||70||30||20||30||150|
|3725910||59||2018-19||Operating system and Host Security||Core III||2||3||0||2||4||70||30||20||30||150|
|3730002||59||2018-19||Internal Review 1||Internal Review 1||3||0||0||4||2||0||0||100||0||100|
|3730003||59||2018-19||Dissertation Phase I||Dissertation||3||0||0||16||8||0||0||0||100||100|
|3730005||59||2018-19||Business Analytics||Open Elective||3||3||0||0||3||70||30||0||0||100|
|3730006||59||2018-19||Industrial Safety||Open Elective||3||3||0||0||3||70||30||0||0||100|
|3730007||59||2018-19||Operation Research||Open Elective||3||3||0||0||3||70||30||0||0||100|
|3735903||59||2018-19||Advance Algorithms||Program Elective V||3||3||0||0||3||70||30||0||0||100|
|3735904||59||2018-19||Machine Learning||Program Elective V||3||3||0||0||3||70||30||0||0||100|
|3735905||59||2018-19||Mobile and Wireless Communication Security||Program Elective V||3||3||0||0||3||70||30||0||0||100|
|3740001||59||2018-19||Internal Review - 2||Dissertation||4||0||0||4||2||0||0||100||0||100|
|3740002||59||2018-19||Dissertation Phase II||Dissertation||4||0||0||28||14||0||0||0||100||100|
Tokyo is the capital of Japan.