Cyber Law and Ethics | Cyber Forensics | Vulnerability Analysis | Penetration Testing and Incident Handling | Malware Analysis |
Cyber Threat and Modelling | Operating System & System Programming (LINUX) | Cryptography & Information Security | Parallel and Distributed Computing | Virtualisation and Cloud Security |
Auditing IT Infrastructures for Compliance | Big Data & IoT Security Penetration Testing | Artificial Intelligence in Cyber Security & other industrial uses | ||
Certified Ethical Hacker (Training) |
Practical sessions will be given by industry experts (auditors with average 15-20 years of experience, who are CEH, ECSA, LPT, OSCP, OSCE, ISO 27001 Lead Auditor) at ISOAH Saltlake Sector-5 office & Siliguri office. Theory will be taught by Techno College professors at Techno Campus in South Kolkata & Rajarhat.
Kariwala Towers, 4th Floor, Plot J/1-5, Block EP, Sector V, Salt Lake City, Kolkata - 700091
As per Nasscom, India will need
5 lakhs cyber security professionals over the coming 5 years. We currently have only 50,000. There is an acute deficit of skilled cyber security professionals in the industry. The demand will rise with Digital India & Industry 4.0 drive.
PWC, E&Y, TCS, CTS, Intel, Apple, Google, Amazon, Kolkata Police, CID, CDAC, Commercial Tax Dept, etc.
ISOAH is a group of experienced White-Hat Hackers with individual experience of 10-20 years in Information Security working in India & abroad, providing training & consultancy to MNCs, Government & Academia. Some of the audit clients for ISOAH are Apollo Gleneagles Hospital, CESC, Bandhan Bank, Jadavpur University, AMRI Hospitals, Spencer, Ambuja Realty, ABP Ltd, etc. ISOAH trains around 1200 students per year, who are working at E&Y, PWC, Deloitte, Tata Steel, Intel, Apple, Oracle, Amazon, TCS, CTS, etc. ISOAH is committee member to Nasscom East & CII ICT East.
4 years - 8 Semesters
10+2 in Science or Commerce or Arts (Any One Can Join). There is no prerequisite on percentage.
Rs.10,000/-
(One time)
Rs.8,000/-
(One time)
Rs.300/-
(One time)
Rs.37,000/- per semester
(Total 8 semesters)
Rs.3,12,300/-
4 Years
of in-depth Training by the Best Cyber Security Experts
On Campus Placement
Opportunities in Multinational Companies
B.Sc. Degree in Cyber Security
by MAKAUT, West Bengal
Sem | Major (Offline) |
Minor (Blended Mode) |
Inter Disciplinary (Offline) |
Ability Enhancement (Offline) |
Skill Enhancement (Online /Sessional) |
Common Value Added Course (SESSIONAL) |
TOTAL CREDITS |
---|---|---|---|---|---|---|---|
Sem: I | Major (Offline): Fundamentals of Computing – using C and C++ language (including lab) (Code Theory-FYCYS 101, Lab-FYCYS 191) - 3+2 credits Basic Mathematics and Statistics (including lab) (Code Theory-FYCYS 102, Lab-FYCYS 192) – 3+2 credits |
Minor (Blended Mode): (1 sub x 3 credits) Principles Of Management |
Inter Disciplinary (Offline): Any one from GE baskets Basket A or D (3 credits) |
Ability Enhancement (Offline): AECC 101-English and Professional Communication |
Skill Enhancement (Online /Sessional): SEC 181- Life Skills & Personality Development (2 credits) |
Common Value Added Course (SESSIONAL): VAC 181A/B/C- Yoga/ Health & Wellness/ Sports (2 credits) |
TOTAL CREDITS: 22 |
Sem: II | Major (Offline): Computer Architecture and Object Oriented Concepts (including lab) (Code Theory-FYCYS 201, Lab-FYCYS 291) – 3+2 credits Data Structures and Algorithms (including lab) (Code Theory-FYCYS 202, Lab-FYCYS 292) – 3+2 credits |
Minor (Blended Mode): (1 sub x 3 credits) Organization Behaviour/Busin ess Ethics & Corporate Governance |
Inter Disciplinary (Offline): Any one from GE baskets Basket B or E (3 credits) |
Ability Enhancement (Offline): AECC 201- Modern Indian Languages and Literature (2 credits) |
Skill Enhancement (Online /Sessional): SEC 201- IT Skills (2 credits) |
Common Value Added Course (SESSIONAL): VAC281A/B/C/D- Critical Thinking / NSS / Mental Health / Environmental Studies (2 credits) |
TOTAL CREDITS: 22 |
Sem: III | Major (Offline): Python Programming (including lab) (Code Theory-FYCYS 301, Lab-FYCYS 391) – 3+2 credits Operating System and DBMS (including lab) (Code Theory-FYCYS 302, Lab-FYCYS 392) – 3+2 credits |
Minor (Blended Mode): (1 sub x 4 credits) Principles of Marketing/Business & Sustainability |
Inter Disciplinary (Offline): Any one from GE baskets Basket C or F (3 credits) |
Ability Enhancement (Offline): AECC 301- The Constitution, Human Rights and Law (2 credits) |
Skill Enhancement (Online /Sessional): SEC 301- Understanding basics of Cyber Security (2 credits) |
TOTAL CREDITS: 21 | |
Sem: IV | Major (Offline): Design and Analysis of Algorithms (including lab) (Code Theory-FYCYS 401, Lab-FYCYS 491) – 2+2 credits Ethical Hacking and Systems Defence (including lab) (Code Theory-FYCYS 402, Lab-FYCYS 492)– 3+2 credits Cryptography and Information Security (including lab) (Code Theory-FYCYS 403, Lab-FYCYS 493)– 2+2 credits |
Minor (Blended Mode): Human resource management / Corporate Social Responsibility (CSR) (4 credits) Sales and distribution management / E-Commerce (4 credits) |
Ability Enhancement (Offline): AECC 401A Society Culture and Human Behavior (2 credits) |
TOTAL CREDITS: 23 | |||
Sem: V | Major (Offline): Cyber Systems & Cyber Threat and Modelling (including lab) (Code Theory-FYCYS 501, Lab-FYCYS 591) – 3+2 credits Vulnerability Analysis, Penetration Testing and Incident Handling (including lab) (Code Theory-FYCYS 502, Lab-FYCYS 592) – 3+2 credits |
Minor (Blended Mode): Financial management (4 credits) Entrepreneurship (4 credits) |
Skill Enhancement (Online /Sessional): FYBMS581 Internship (4 credits) |
TOTAL CREDITS: 22 | |||
Sem: VI | Major (Offline): Cyber Forensics (Code FYCYS 601) – 4+1 credits Malware Analysis (Code FYCYS 602) – 4+1 Credits Advanced Computer Network and Security(including lab) (Code Theory-FYCYS 603, Lab-FYCYS 693) – 2+2 credits |
Minor (Blended Mode): Customer relationship management (4 credits) Career planning and management / Managing Workplace Diversity (4 credits) |
TOTAL CREDITS: 22 | ||||
Sem: VII | Major (Offline): Minor Project (Code FYCYS 781) – 5 credits Software Project Management (Code FYCYS 701) – 4+1 credits Artificial Intelligence in Security (Code FYCYS 702) – 3+1 credits |
Minor (Blended Mode): Consumer behaviour / Exploring Business Opportunity (4 credits) Strategic management / Intellectual Property Rights (4 credits) |
TOTAL CREDITS: 22 | ||||
Sem: VIII | Major (Offline): Major Project (continuation of minor project) (Code FYCYS 881) – 5 credits Security in E-business (Code FYCYS 801) - 4+1 credits |
Skill Enhancement (Online /Sessional): Capstone / [Code FYCYSC881] Or Research project [Code FYCYSR882] 12 credits |
TOTAL CREDITS: 22 | ||||
Major (Offline): 19 sub - 91 credits |
Minor (Blended Mode): 11 sub – 42 credits |
Inter Disciplinary (Offline): 3 sub – 09 credits |
Ability Enhancement (Offline): 4 sub – 08 credits |
Skill Enhancement (Online /Sessional): 3 sub & Int & Proj - 22 credits |
Common Value Added Course (SESSIONAL): 2 sub – 4 credits |
TOTAL CREDITS: 176 |
Fundamentals of Computing - using C and C++ Language | |||
---|---|---|---|
Module Number | Content | Total Hours | %age of Questions |
Theory (Code – FYCYS 101) | |||
Module Number: M 1 | Content: Computer fundamentals | Total Hours: 6 | %age of Questions: 10 |
Module Number: M 2 | Content: Programming method | Total Hours: 3 | %age of Questions: 10 |
Module Number: M 3 | Content: General problem solving concepts | Total Hours: 6 | %age of Questions: 20 |
Module Number: M 4 | Content: Control Flow, Function, Arrays & Pointers | Total Hours: 16 | %age of Questions: 20 |
Module Number: M 5 | Content: Structures Input & Output | Total Hours: 4 | %age of Questions: 20 |
Module Number: M 6 | Content: C++ Basics | Total Hours: 5 | %age of Questions: 20 |
Total Hours: 40 | %age of Questions: 100 | ||
Practical (FYCYS 191) | |||
Module Number: M 7 | Content: C and C++ Programs | Total Hours: 60 | %age of Questions: 100 |
Total Hours: 60 | %age of Questions: 100 | ||
Basic Mathematics and Statistics | |||
Module Number | Content | Total Hours | %age of Questions |
Theory (Code – FYCYS 102) | |||
Module Number: M 1 | Content: Discrete Mathematics | Total Hours: 8 | %age of Questions: 10 |
Module Number: M 2 | Content: Algebraic Structures and Morphism | Total Hours: 8 | %age of Questions: 25 |
Module Number: M 3 | Content: Combinatorics and Probability | Total Hours: 6 | %age of Questions: 10 |
Module Number: M 4 | Content: Frequency Distribution | Total Hours: 10 | %age of Questions: 25 |
Module Number: M 5 | Content: Introduction to Statistics | Total Hours: 14 | %age of Questions: 20 |
Module Number: M 6 | Content: Bivariate Statistics | Total Hours: 10 | %age of Questions: 10 |
Total Hours: 56 | %age of Questions: 100 | ||
Practical (FYCYS 192) | |||
Module Number: M 7 | Content: Application of C program | Total Hours: 20 | %age of Questions: 100 |
Total Hours: 20 | %age of Questions: 100 |
Computer Architecture and Object Oriented Concepts | |||
---|---|---|---|
Module Number | Content | Total Hours | %age of Questions |
Theory (Code – FYCYS 201) | |||
Module Number: M 1 | Content: Computer Organization & Memory System | Total Hours: 10 | %age of Questions: 20 |
Module Number: M 2 | Content: Computer Arithmetic | Total Hours: 10 | %age of Questions: 25 |
Module Number: M 3 | Content: Input and Output System | Total Hours: 10 | %age of Questions: 30 |
Module Number: M 4 | Content: Instruction Set and addressing modes | Total Hours: 10 | %age of Questions: 25 |
Total Hours: 40 | %age of Questions: 100 | ||
Practical (Code - FYCYS 291) | |||
Module Number: M 5 | Content: Concepts of OOP & Basics of Java | Total Hours: 15 | %age of Questions: 40 |
Module Number: M 6 | Content: Objects and Classes | Total Hours: 45 | %age of Questions: 60 |
Total Hours: 60 | %age of Questions: 100 | ||
Data Structures and Algorithms | |||
Module Number | Content | Total Hours | %age of Questions |
Theory (Code – FYCYS 202) | |||
Module Number: M 1 | Content: Concepts of Abstract data type | Total Hours: 6 | %age of Questions: 10 |
Module Number: M 2 | Content: Data Structure using Array | Total Hours: 6 | %age of Questions: 20 |
Module Number: M 3 | Content: Linked List | Total Hours: 6 | %age of Questions: 20 |
Module Number: M 4 | Content: Trees | Total Hours: 6 | %age of Questions: 10 |
Module Number: M 5 | Content: Graphs & Hashing | Total Hours: 10 | %age of Questions: 20 |
Total Hours: 40 | %age of Questions: 100 | ||
Practical (Code - FYCYS 292) | |||
Module Number: M 6 | Content: Data Structure using Array | Total Hours: 6 | %age of Questions: 20 |
Module Number: M 7 | Content: Searching and Sorting | Total Hours: 12 | %age of Questions: 20 |
Module Number: M 8 | Content: Linked List | Total Hours: 12 | %age of Questions: 20 |
Module Number: M 9 | Content: Trees | Total Hours: 15 | %age of Questions: 20 |
Module Number: M 10 | Content: Graphs & Hashing | Total Hours: 15 | %age of Questions: 20 |
Total Hours: 60 | %age of Questions: 100 |
Python Programming & Python Programming Lab | |||
---|---|---|---|
Module Number | Content | Total Hours | %age of Questions |
Theory (Code – FYCYS 301) | |||
Module Number: M 1 | Content: Introduction to Python | Total Hours: 12 | %age of Questions: 20 |
Module Number: M 2 | Content: Conditions & Iterations | Total Hours: 8 | %age of Questions: 20 |
Module Number: M 3 | Content: Recursion, Strings, List, Dictionaries, Tuples | Total Hours: 10 | %age of Questions: 30 |
Module Number: M 4 | Content: Classes & Objects | Total Hours: 10 | %age of Questions: 30 |
Total Hours: 40 | %age of Questions: 100 | ||
Practical (Code - FYCYS 391) | |||
Module Number: M 5 | Content: Introduction to Python | Total Hours: 18 | %age of Questions: 20 |
Module Number: M 6 | Content: Conditions & Iterations | Total Hours: 12 | %age of Questions: 20 |
Module Number: M 7 | Content: Recursion, Strings, List, Dictionaries, Tuples | Total Hours: 15 | %age of Questions: 30 |
Module Number: M 8 | Content: Classes& Objects | Total Hours: 15 | %age of Questions: 30 |
Total Hours: 60 | %age of Questions: 100 | ||
Operating Systems and Database Management Systems | |||
Module Number | Content | Total Hours | %age of Questions |
Theory (Code – FYCYS 302) | |||
Module Number: M 1 | Content: Introduction | Total Hours: 3 | %age of Questions: 10 |
Module Number: M 2 | Content: Process | Total Hours: 10 | %age of Questions: 25 |
Module Number: M 3 | Content: Resource Manager | Total Hours: 8 | %age of Questions: 10 |
Module Number: M 4 | Content: Introducing to Data and Data Management | Total Hours: 4 | %age of Questions: 10 |
Module Number: M 5 | Content: Data Models and Architecture of DBMS | Total Hours: 6 | %age of Questions: 20 |
Module Number: M 6 | Content: Data Modeling using ER Modeling | Total Hours: 7 | %age of Questions: 10 |
Module Number: M 7 | Content: Relational Model and Relational Database Management System | Total Hours: 7 | %age of Questions: 15 |
Total Hours: 45 | %age of Questions: 100 | ||
Practical (Code - FYCYS 392) | |||
Module Number: M 8 | Content: Introduction | Total Hours: 3 | %age of Questions: 10 |
Module Number: M 9 | Content: Process | Total Hours: 15 | %age of Questions: 25 |
Module Number: M 10 | Content: Resource Manager | Total Hours: 9 | %age of Questions: 10 |
Module Number: M 11 | Content: Introducing to Data and Data Management | Total Hours: 6 | %age of Questions: 10 |
Module Number: M 12 | Content: Data Models and Architecture of DBMS | Total Hours: 9 | %age of Questions: 20 |
Module Number: M 13 | Content: Data Modeling using ER Modeling | Total Hours: 9 | %age of Questions: 10 |
Module Number: M 14 | Content: Relational Model and Relational Database Management System | Total Hours: 9 | %age of Questions: 15 |
Total Hours: 60 | %age of Questions: 100 |
Design and Analysis of Algorithms | |||
---|---|---|---|
Module Number | Content | Total Hours | %age of Questions |
Theory (Code – FYCYS 401) | |||
Module Number: M 1 | Content: Complexity Analysis | Total Hours: 8 | %age of Questions: 20 |
Module Number: M 2 | Content: Algorithm Design by Divide and Conquer | Total Hours: 8 | %age of Questions: 20 |
Module Number: M 3 | Content: Disjoint Set Data Structure | Total Hours: 8 | %age of Questions: 20 |
Module Number: M 4 | Content: Algorithm Design by Greedy Strategy | Total Hours: 8 | %age of Questions: 10 |
Module Number: M 5 | Content: Algorithm Design by Dynamic Programming | Total Hours: 8 | %age of Questions: 10 |
Module Number: M 6 | Content: 6 Algorithm Design byb Backtracking | Total Hours: 8 | %age of Questions: 20 |
Total Hours: 48 | %age of Questions: 100 | ||
Practical (Code - FYCYS 491) | |||
Module Number: M 7 | Content: Implement Merge sort | Total Hours: 9 | %age of Questions: 10 |
Module Number: M 8 | Content: Implement Quicksort | Total Hours: 9 | %age of Questions: 10 |
Module Number: M 9 | Content: Find maximum and minimum elements froman array of integers using divide and conquerstrategy | Total Hours: 6 | %age of Questions: 10 |
Module Number: M 10 | Content: Implement fractional knapsack | Total Hours: 6 | %age of Questions: 10 |
Module Number: M 11 | Content: Implement Job sequence withdeadline | Total Hours: 9 | %age of Questions: 10 |
Module Number: M 12 | Content: Implement Kruskal's algorithm | Total Hours: 9 | %age of Questions: 10 |
Module Number: M 13 | Content: Implement Prim’s algorithm | Total Hours: 9 | %age of Questions: 10 |
Module Number: M 14 | Content: Implement Dijkstra's algorithm | Total Hours: 9 | %age of Questions: 10 |
Module Number: M 15 | Content: Implement Matrix ChainMultiplication | Total Hours: 9 | %age of Questions: 10 |
Module Number: M 16 | Content: Implement Floyd WarshallAlgorithm | Total Hours: 9 | %age of Questions: 10 |
Total Hours: 58 | %age of Questions: 100 | ||
Ethical Hacking and Systems Defence | |||
Module Number | Content | Total Hours | %age of Questions |
Theory (Code – FYCYS 402) | |||
Module Number: M 1 | Content: Introduction to Ethical Hacking | Total Hours: 10 | %age of Questions: 25 |
Module Number: M 2 | Content: System Hacking | Total Hours: 14 | %age of Questions: 25 |
Module Number: M 3 | Content: TCP/IP - OverviewConcepts and PortScanning | Total Hours: 14 | %age of Questions: 30 |
Module Number: M 4 | Content: Desktop and Server OS Vulnerabilities | Total Hours: 10 | %age of Questions: 20 |
Total Hours: 48 | %age of Questions: 100 | ||
Practical (Code - FYCYS 492) | |||
Module Number: M 5 | Content: System and Network Security | Total Hours: 24 | %age of Questions: 60 |
Module Number: M 6 | Content: Identifying vulnerabilities in OS | Total Hours: 24 | %age of Questions: 40 |
Total Hours: 48 | %age of Questions: 100 | ||
Cryptography and Information Security | |||
Module Number | Content | Total Hours | %age of Questions |
Theory (Code – FYCYS 403) | |||
Module Number: M 1 | Content: Overview of cryptography, numbersystem | Total Hours: 10 | %age of Questions: 20 |
Module Number: M 2 | Content: One time pad andstream ciphers | Total Hours: 10 | %age of Questions: 20 |
Module Number: M 3 | Content: Block ciphers, message integrity | Total Hours: 14 | %age of Questions: 30 |
Module Number: M 4 | Content: Public key cryptography, digital signature | Total Hours: 14 | %age of Questions: 30 |
Total Hours: 48 | %age of Questions: 100 | ||
Practical (Code - FYCYS 493) | |||
Module Number: M 5 | Content: Arithmetic modulo, programming | Total Hours: 28 | %age of Questions: 40 |
Module Number: M 6 | Content: Cryptography algorithm design and programming | Total Hours: 30 | %age of Questions: 60 |
Total Hours: 58 | %age of Questions: 100 |
Fields marked with * are mandatory.
The various designations in cybersecurity include Information Risk Auditors, Firewall Administrators, Software Developers, Security Analysts, Intrusion Detection Specialists, Computer Security Incident Responders, Cryptologists, Vulnerability Assessors, Lead Security Architects and Chief Information Security Managers.
Freshers are offered starting salary of 30k per month to 2 lakhs per month. As per Nasscom, INDIA needs 5lac cyber security professional over coming 5 years. Currently INDIA has only 50,000. Click on APPLY NOW to check ACTIVE CYBER SECURITY JOBS.
Governmental initiative for digital India is a further impetus for increased demand for cyber security jobs.
Financial services institutions including banks, payment gateways and ecommerce organisations are the biggest employers in cybersecurity, according to Sunil Goel, managing director at GlobalHunt. In certain cases cyber security experts are reporting to the company boards directly.
The course duration is 4 years - 8 Semesters.
The course is administered in equal measures of practical and theory.
Eligibility is 10+2 in Science or Commerce (with Maths, Statistics and Computer science as one of the subjects). There is no prerequisite on percentage.
India is confronted with a scarcity of cyber security professionals, especially at the top corporate levels. Hence the field has seen increased salaries offered for such roles by 25-35% over the past year.
Freshers are offered starting salary of 30k per month to 2 lakhs per month. As per Nasscom, INDIA needs 5lac cyber security professional over coming 5 years. Currently INDIA has only 50,000. Click on APPLY NOW to check ACTIVE CYBER SECURITY JOBS.
Rs.18,300/-
One Time
Rs.37,000/-
Per Semester
(Total 8 semesters)