Every day, people are victimized by cybercriminals while online banking transactions, online shopping, online money transfer, etc. The sad truth is that very few criminals can be described as experts. The lack of Cyber Safety and Security awareness make most of the people an easy target for anyone trying to hack into their personal information. The estimated cybercrime cost is over $400 billion per year of the global economy. As a result, most of the companies and organizations of the world, including the Indian Government, are emphasizing cybersecurity a top priority for the coming year and are setting up standards for cyber security protocol as well as creating cyber security awareness in society. Cyber Security Post Graduate program offered through GTU-GSET help students to understand modern information and system protection technology and methods. This AICTE approved Post Graduate ME course of two years duration has an intake of 30 students per year and the admissions are done through ACPC, Gujarat. It involves the learning of cybersecurity tools and techniques, services, systems, programming methodologies, and the best-designed approach. The students can be able to learn about the detection, prevention, and mitigation of cybercrime.
Career Opportunities in Cybersecurity
Cyber Security as a career choice covering the various types of roles, the skill sets required, and the career roadmap for cybersecurity professionals. GSET provides opportunities to the students to work on the real-time problems during their learning duration with the help of a strong linkage with various state/central government security agencies and private companies. The students are encouraged to attend and explore GTU- International Experience Program (IEP) in the field of cybersecurity such as Cyber Security Summer Training Program at Tel Aviv University, Israel. The institute provides the support for skill development, training, and placement in various esteemed industries and organization such as Deloitte India, KPMG India, and National Technical Research Organisation (NTRO), Net- Square Solutions Pvt. Ltd., BlueInfy Solutions Pvt. Ltd., TrasVista, IG Global Business Services India, Cloud24x7 Pvt. Ltd., Sophos Technologies Pvt. Ltd., Alterego Technology Ltd., etc.
- To create a research environment to provide socially responsible and technically sound postgraduate technocrats, innovators and entrepreneurs in the cyber security domain.
- To develop state-of-art research facilities of cyber security and digital forensics with well-equipped academic infrastructure
- To encourage faculty to do research and consultancies in the field of cyber security and digital forensics.
- To establish strong linkages with research organizations, Institute of national importance and Industries for cyber security.
- To promote innovative practices to produce innovators and entrepreneurs in the field of cyber security.
- To leverage International linkage of Gujarat Technological University to establish strong international outreach for cyber security domain.
Program Specific Outcomes
- To understand and analyze the various cyber-attacks, cyber laws, ethical hacking concepts, defending practice of cyber security, and digital forensics techniques.
- Identify, analyze and develop software and hardware solutions for complex problems in cyber security domain.
- Apply advanced knowledge to identify research challenges, and contribute individually or in team to resolve Cyber Security and Digital Forensics issues.
Program Educational Objectives
- Impart knowledge/skill in the areas of cyber security, digital forensics, cyber laws and related disciplines.
- Work in reputed computer and IT security, Government and Research organizations or as an entrepreneur to build cyber safe nation.
- Able to cope with cyber security challenges through continuing education, increased responsibility, team work and ethical code of conduct.
Cyber Security and Digital Forensics Laboratory
The Cyber Security and Digital Forensics Laboratory is a state-of-the-art, dedicated space in which students can safely engage in cyber related activities, including malware detection and analysis, and penetration testing. It is equipped with everything required to secure and analyze digital evidence. Cybercrime and forensic investigations are simulated in a safe, controlled environment without possible impact to other campus networks. This lab is provided to all ME Cyber Security students to undertake coursework and project work where they can enhance their research skill in the field of Cyber Security.
High Performance Computing (HPC) Laboratory:
High performance computing laboratory facilities is established with PARAM Shavak Supercomputer and high-end computer systems to create a culture of research and innovation for students and researchers. It is useful to execute the various projects of AI and machine learning, deep learning, network traffic analysis, digital forensic investigation, log analysis, electronic design automation, blockchain technology based research projects, etc.
Network Research Laboratory:
The objective of network research laboratory is to pursue the research in the various area of computer communications and networks. Students can able to perform various experiments on virtualization, network measurement and dissemination, etc. to explore the knowledge of network communication systems and security.
Vulnerability Assessment and Penetration Testing (VAPT) Laboratory:
The VAPT laboratory is aim to develop to provide the facilities of attack defense lab to the students. Students can perform various experiments of web application security, operating system security, vulnerability assessment of computer network, pentesting and Wi-Fi security, programming practices for various pentesting methodologies, etc.
|Subject code||Branch code||Eff_from||Subject Name||Category||Sem /Year||L.||T.||P.||Total||E||M||I||V||Total|
|3700001||59||2018-19||English for Research Paper Writing||Audit Course||1||2||0||0||0||50||0||0||0||50|
|3700005||59||2018-19||Constitution of India||Audit Course||1||2||0||0||0||50||0||0||0||50|
|3710001||59||2018-19||Research Methodology and IPR||MLC||1||1||0||2||2||0||0||20||80||100|
|3715901||59||2018-19||Mathematical Foundation for Cyber Security||Core I||1||3||0||2||4||70||30||20||30||150|
|3715901||59||2018-19||Introduction to Cryptography||Program Elective I||1||3||0||2||4||70||30||20||30||150|
|3715905||59||2018-19||Cyber Crimes, Ethics and Laws||Program Elective II||1||3||0||2||4||70||30||20||30||150|
|3715906||59||2018-19||Cyber Security: Administration and Management||Program Elective II||1||3||0||2||4||70||30||20||30||150|
|3715907||59||2018-19||Defense Programming in Python||Core II||1||3||0||2||4||70||30||20||30||150|
|3715908||59||2018-19||Digital Forensic||Program Elective I||1||3||0||2||4||70||30||20||30||150|
|3715909||59||2018-19||Intrusion Detection||Program Elective I||1||3||0||2||4||70||30||20||30||150|
|3715910||59||2018-19||Secure Software Design and Enterprise Computing||Program Elective II||1||3||0||2||4||70||30||20||30||150|
|3700001||59||2018-19||English for Research Paper Writing||Audit Course||2||2||0||0||0||50||0||0||0||50|
|3700005||59||2018-19||Constitution of India||Audit Course||2||2||0||0||0||50||0||0||0||50|
|3720001||59||2018-19||Mini Project with Seminar||Core||2||0||0||4||2||0||0||100||0||100|
|3722323||59||2018-19||Information Theory & Coding||Program Elective III||2||3||0||2||4||70||30||20||30||150|
|3725611||59||2018-19||Steganography & Digital Watermarking||Program Elective III||2||3||0||2||4||70||30||20||30||150|
|3725902||59||2018-19||Internetworking and security||Program Elective IV||2||3||0||2||4||70||30||20||30||150|
|3725903||59||2018-19||Ethical Hacking||Program Elective IV||2||3||0||2||4||70||30||20||30||150|
|3725904||59||2018-19||Web and Database Security||Program Elective III||2||3||0||2||4||70||30||20||30||150|
|3725905||59||2018-19||Security Assessment and Risk Analysis||Program Elective IV||2||3||0||2||4||70||30||20||30||150|
|3725908||59||2018-19||Malware Analysis||Core IV||2||3||0||2||4||70||30||20||30||150|
|3725910||59||2018-19||Operating system and Host Security||Core III||2||3||0||2||4||70||30||20||30||150|
|3730002||59||2018-19||Internal Review 1||Internal Review 1||3||0||0||4||2||0||0||100||0||100|
|3730003||59||2018-19||Dissertation Phase I||Dissertation||3||0||0||16||8||0||0||0||100||100|
|3730005||59||2018-19||Business Analytics||Open Elective||3||3||0||0||3||70||30||0||0||100|
|3730006||59||2018-19||Industrial Safety||Open Elective||3||3||0||0||3||70||30||0||0||100|
|3730007||59||2018-19||Operation Research||Open Elective||3||3||0||0||3||70||30||0||0||100|
|3735903||59||2018-19||Advance Algorithms||Program Elective V||3||3||0||0||3||70||30||0||0||100|
|3735904||59||2018-19||Machine Learning||Program Elective V||3||3||0||0||3||70||30||0||0||100|
|3735905||59||2018-19||Mobile and Wireless Communication Security||Program Elective V||3||3||0||0||3||70||30||0||0||100|
|3740001||59||2018-19||Internal Review - 2||Dissertation||4||0||0||4||2||0||0||100||0||100|
|3740002||59||2018-19||Dissertation Phase II||Dissertation||4||0||0||28||14||0||0||0||100||100|
Tokyo is the capital of Japan.