syllabus

Cybersecurity program:

Year 1: Foundation Courses

  • Semester 1:

    • Introduction to Cybersecurity
    • Fundamentals of Information Technology
    • Programming Basics (Python, C++)
    • Discrete Mathematics
    • Digital Logic Design
    • Lab Work (Programming, IT Fundamentals)
  • Semester 2:

    • Data Structures and Algorithms
    • Computer Networks
    • Operating Systems
    • Cyber Law and Ethics
    • Probability and Statistics
    • Lab Work (Data Structures, Networks)

Year 2: Core Cybersecurity Courses

  • Semester 3:

    • Network Security
    • Cryptography
    • Database Management Systems
    • Web Technologies
    • Software Engineering
    • Lab Work (Network Security, Cryptography)
  • Semester 4:

    • Ethical Hacking
    • Secure Coding Practices
    • Wireless and Mobile Security
    • Cyber Forensics
    • Human-Computer Interaction
    • Lab Work (Ethical Hacking, Forensics)

Year 3: Advanced Cybersecurity Topics

  • Semester 5:

    • Advanced Cryptography
    • Intrusion Detection and Prevention Systems
    • Cloud Security
    • Risk Management and Compliance
    • Elective I (e.g., Blockchain Security, IoT Security)
    • Lab Work (Intrusion Detection, Cloud Security)
  • Semester 6:

    • Penetration Testing
    • Secure Software Development Lifecycle
    • Incident Response and Management
    • Security in Emerging Technologies
    • Elective II (e.g., AI in Cybersecurity, Cyber-Physical Systems)
    • Lab Work (Penetration Testing, Incident Response)

Year 4: Specialization and Capstone Projects

  • Semester 7:

    • Advanced Network Security
    • Digital Forensics and Investigations
    • Security Architecture and Design
    • Elective III (e.g., Advanced Malware Analysis, Cyber Threat Intelligence)
    • Industrial Training/Internship
    • Project Work Phase I
  • Semester 8:

    • Cybersecurity Management and Leadership
    • Advanced Topics in Cybersecurity
    • Elective IV (e.g., Quantum Cryptography, Privacy Enhancing Technologies)
    • Project Work Phase II
    • Seminar and Viva Voce

Comments

Popular posts from this blog

Introduction to security frameworks and controls

Common cybersecurity terminology