


department OF COMPUTER SCIENCE AND ENGINEERING
cyber security
Our cyber Security course will make you well versed with the processes of cyber-attacks and practices followed for protecting data from unauthorized attacks across the networks. You will be able to detect vulnerabilities of a system, ward off attacks and manage emergency situations.
Under Graduate Programme
B.E Computer Science in Cyber Security
4 Years Course
Course Description
The course is designed to equip students with the knowledge and skills required to defend the computer operating systems, networks and data from cyber-attacks.

Lab 1

Lab 2

Lab 3

Lab 4

Lab 5
cyber security
career opportunities

Security Specialist

Incident Responder

Security Administrator

Vulnerability Assessor

Cryptographer

Security Manager

Security Architect

Chief Information Security Officer

Security Analyst

Security Auditor

Security Director

Forensic Expert

Penetration Tester

Security Consultant

Security Engineer
