|Cyber Law and Ethics||Cyber Forensics||Vulnerability Analysis||Penetration Testing and Incident Handling||Malware Analysis|
|Cyber Threat and Modelling||Operating System & System Programming (LINUX)||Cryptography & Information Security||Parallel and Distributed Computing||Visualisation and Cloud Security|
|Auditing IT Infrastructures for Compliance||Big Data & IoT Security Penetration Testing||Artificial Intelligence in Cyber Security & other industrial uses|
|Certified Ethical Hacker (Global Certification)|
Practical sessions will be given by industry experts (auditors with average 15-20 years of experience, who are CEH, ECSA, LPT, OSCP, OSCE, ISO 27001 Lead Auditor) at ISOAH Saltlake Sector-5 office & Siliguri office. Theory will be taught by Techno College professors at Techno Campus in South Kolkata, Rajarhat, Sector-V & Siliguri.
ISOAH is a group of experienced White-Hat Hackers with individual experience of 10-20 years in Information Security working in India & abroad, providing training & consultancy to MNCs, Government & Academia. Some of the audit clients for ISOAH are Apollo Gleneagles Hospital, CESC, Bandhan Bank,Jadavpur University, AMRI Hospitals, Spencer, Ambuja Realty, ABP Ltd, etc. ISOAH trains around 1200 students per year, who are working at E&Y, PWC, Deloitte, Tata Steel, Intel, Apple, Oracle, Amazon, TCS, CTS, etc. ISOAH is committee member to Nasscom East & CII ICT East.
10+2 in Science or Commerce (with Maths, Statistics and Computer science as one of the subjects). There is no prerequisite on percentage.
Rs.50,000/- per semester
(Total 6 semesters - Total Rs.3,00,000/-)
of in-depth Training by the Best Cyber Security Experts
On Campus Placement
Opportunities in Multinational Companies
B.Sc. Degree in Cyber Security
by MAKAUT, West Bengal
|SL No: 1||Code: CYS-101||Paper: Fundamental of Computing|
|SL No: 2||Code: CYS(M)-101||Paper: Mathematics for Computing Professionals|
|SL No: 3||Code: CYS(HU)-101||Paper: English Communication|
|SL No: 4||Code: CYS-102||Paper: Digital Principles and System Design|
|SL No: 5||Code: CYS-103||Paper: Computational Statistics|
|SL No: 1||Code: CYS-191||Paper: Fundamental of Computing|
|SL No: 2||Code: CYS-192||Paper: Digital Principles and System Design|
|SL No: 3||Code: CYS-193||Paper: Computational Statistics - (Lab)|
|SL No: 1||Code: CYS-201||Paper: Computer Architecture & Organization|
|SL No: 2||Code: CYS-202||Paper: Data Structures and Algorithms|
|SL No: 3||Code: CYS(HU)-201||Paper: Environmental Science|
|SL No: 4||Code: CYS(HU)-202||Paper: Cyber Law and Ethics|
|SL No: 5||Code: CYS-203||Paper: Object Oriented Concepts|
|SL No: 1||Code: CYS-291||Paper: Data Structures and Algorithms|
|SL No: 2||Code: CYS-292||Paper: Object Oriented Concepts|
|SL No: 1||Code: CYS-301||Paper: Database Management Systems & Distributed Databases|
|SL No: 2||Code: CYS-302||Paper: Security Architecture and Models|
|SL No: 3||Code: CYS-303||Paper: Operating System & System Programming|
|SL No: 4||Code: CYS-304||Paper: Computer Networks|
|SL No: 5||Code: CYS-305||Paper: Cyber Threat and Modelling|
|SL No: 1||Code: CYS-391||Paper: Database Management Systems|
|SL No: 2||Code: CYS-392||Paper: Operating Syatem & Syatem Programming (Linux)|
|SL No: 3||Code: CYS-393||Paper: Computer Networks|
|SL No: 1||Code: CYS-401||Paper: Cryptography & Information Security|
|SL No: 2||Code: CYS-402||Paper: Parallel and Distributing Computing (including Cloud Computing)|
|SL No: 3||Code: CYS-403||Paper: Ethical Hacking & Systems Defence|
|SL No: 4||Code: CYS-404||Paper: Software Engineering & Software Design with UML|
|SL No: 5||Code: CYS-405||Paper: Advanced Computer Network & Security (TCP/IP, Wireless, Mobile)|
|SL No: 1||Code: CYS-491||Paper: Ethical Hacking & Systems Defence|
|SL No: 2||Code: CYS-492||Paper: Software Engineering & Software Design with UML|
|SL No: 3||Code: CYS-493||Paper: Advanced Computer Network & Security|
|SL No: 1||Code: CYS-501||Paper: Cyber Forensics|
|SL No: 2||Code: CYS-502||Paper: Vulnerability Analysis, Penetration Testing and Incident Handling|
|SL No: 3||Code: CYS-503||Paper: Malware Analysis|
|SL No: 4||Code: CYS(PE)-504A||Paper: Enterprise Security Architecture and Design|
|Code: CYS(PE)-504B||Paper: Visualisation and Cloud Security|
|Code: CYS(PE)-504C||Paper: Intrusion Detection and Prevention System|
|Code: CYS(PE)-504D||Paper: Auditing IT Infrastructures for Compliance|
|SL No: 5||Code: CYS(PE)-505A||Paper: Big data & IoT Security|
|Code: CYS(PE)-505B||Paper: Disaster Recovery & Business Continuity Management|
|Code: CYS(PE)-505C||Paper: Data Science, Algorithms and Complexity in the Cyber Context|
|Code: CYS(PE)-505D||Paper: Biometric Security|
|SL No: 1||Code: CYS-591||Paper: Cyber Forensics|
|SL No: 1||Code: CYS-601||Paper: Artificial Intelligence in Cyber Security & Industry Use Cases|
|SL No: 2||Code: CYS(PE)-602A||Paper: Advanced Ethical Hacking|
|Code: CYS(PE)-602B||Paper: Block Chain & Cryptocurrency|
|Code: CYS(PE)-602C||Paper: Penetration Testing|
|Code: CYS(PE)-602D||Paper: Risk Management|
|SL No: 1||Code: CYS-691||Paper: Project|
|SL No: 2||Code: CYS-692||Paper: Artificial Intelligence in Cyber Security & Industry Use Cases|
Total credits in the Program: 120 credits
Honours degree requirements: Additional 16 credits from MOOCS of the MOOCS basket
19 years of experience working in India, New Zealand & Singapore; in Information Security domain as Ethical Hacker, ISO 27001 Lead Auditor / Tutor, BS 10012 Privacy Lead Auditor, Mr. Sandeep Sengupupta has conducted security audit in companies like ONGC, KPMG, PWC, Airtel, Vodafone, Accenture, Capgemini, Vedanta, PayU, Bandhan Bank, ABP, etc.
He has been invited as a speaker at FICCI, VIT (Vellore), Nasscom, CII, BCCI, ICAI, ISACA, FICCI, CeBIT, US High Commission (Kolkata), etc. He has taken part in several Television shows on ABP, ETV, NDTV, AajTak, Times Now, etc. In 2005, Sandeep founded the online community "Hackers Library"; which had 80,000+ members, making it the largest Indian online forum for cyber-security professionals at its time. Mr. Sengupta is the committee member at Nasscom (East) & CII ICT-East.
A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensics and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata).
With 4 years of experience in Information Security audit and Forensic Investigation, Mr. Sanchayan Bhaumik is working as Information Security Analyst at ISOEH and has successfully conducted various Vulnerability Assessment and Penetration Testing / audit, as well as Forensic Investigation for leading corporate houses and Government entities.
He has worked as an Assistant Professor at Sikkim Manipal University & Guest Faculty at National Institute of Pharmaceutical Education and Research. His research domain is AI, Machine Learning and Cryptography. He has presented several research papers in international conferences. At ISOEH his job profile includes VAPT, Forensic Assignments & Teaching advance courses on penetration testing, creating hacking tools using python, AI & ML.
Mr. Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.
After completion of her Master degree, she has worked with ISOAH as an intern for few years before joining full time as secuity analyst. She has been involved in internal audit, policy design, ISMS consultancy for more than 2 years. She is well versed in Kali Linux, Nmap, Metasploit, ITGC, ISO 27001 & COBIT framework. ISOAH clients she has provided active consultancy are CESC, Diadem, Lexplosion, Diamond Beverages, etc. As part of her hobby, she has been a professional model in her free time.