<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>
CCPTR
For the first time
Jointly offer
4-year BSc Hons. Degree in Cyber Security
100%
Practical
For ADMISSION
Highlights of the syllabus
Cyber Law and Ethics Cyber Forensics Vulnerability Analysis Penetration Testing and Incident Handling Malware Analysis
Cyber Threat and Modelling Operating System & System Programming (LINUX) Cryptography & Information Security Parallel and Distributed Computing Virtualisation and Cloud Security
Auditing IT Infrastructures for Compliance Big Data & IoT Security Penetration Testing Artificial Intelligence in Cyber Security & other industrial uses
Certified Ethical Hacker (Training)
Who will teach

Practical sessions will be given by industry experts (auditors with average 15-20 years of experience, who are CEH, ECSA, LPT, OSCP, OSCE, ISO 27001 Lead Auditor) at ISOAH Saltlake Sector-5 office & Siliguri office. Theory will be taught by Techno College professors at Techno Campus in South Kolkata & Rajarhat.

ISOAH Saltlake Office

Kariwala Towers, 4th Floor, Plot J/1-5, Block EP, Sector V, Salt Lake City, Kolkata - 700091

Program Highlight:

  1. Practical Lab with latest tools
  2. Tutors are auditors working with industry
  3. Interactive sessions
  4. Hacking contests, projects, regular assignments
  5. Interview preparation for cyber security jobs
  6. Internship for all students
  7. Placement assistance for students with good grades

Industry Scope:

As per Nasscom, India will need
5 lakhs cyber security professionals over the coming 5 years. We currently have only 50,000. There is an acute deficit of skilled cyber security professionals in the industry. The demand will rise with Digital India & Industry 4.0 drive.

Jobs:

  1. Penetration Tester
  2. ISO 27001 Auditor / Implementer
  3. System Administrator
  4. Web/Mobile Application Penetration Tester
  5. Software Developer
  6. Malware Analyst
  7. Information Security Researcher (ML & AI)

Companies our students are working in:

PWC, E&Y, TCS, CTS, Intel, Apple, Google, Amazon, Kolkata Police, CID, CDAC, Commercial Tax Dept, etc.

About Indian School of Anti Hacking (ISOAH Data Securities Pvt Ltd)

ISOAH is a group of experienced White-Hat Hackers with individual experience of 10-20 years in Information Security working in India & abroad, providing training & consultancy to MNCs, Government & Academia. Some of the audit clients for ISOAH are Apollo Gleneagles Hospital, CESC, Bandhan Bank, Jadavpur University, AMRI Hospitals, Spencer, Ambuja Realty, ABP Ltd, etc. ISOAH trains around 1200 students per year, who are working at E&Y, PWC, Deloitte, Tata Steel, Intel, Apple, Oracle, Amazon, TCS, CTS, etc. ISOAH is committee member to Nasscom East & CII ICT East.

Duration

Duration

4 years - 8 Semesters

Eligibility

Eligibility

10+2 in Science or Commerce or Arts (Any One Can Join). There is no prerequisite on percentage.

Course Fees

Course Fees

Admission Fee

Rs.10,000/-
(One time)

Caution Deposit

Rs.8,000/-
(One time)

Forms & Prospectus

Rs.300/-
(One time)

Semester Fee

Rs.37,000/- per semester
(Total 8 semesters)

Total Fee

Rs.3,12,300/-

What You Will Get?

4 Years
of in-depth Training by the Best Cyber Security Experts

On Campus Placement
Opportunities in Multinational Companies

B.Sc. Degree in Cyber Security
by MAKAUT, West Bengal

Course Benefits:

  1. Government Graduation Degree
  2. On Campus Placement Opportunities in Multinational Companies
  3. Get a Chance to Earn Good Salary – 30K to 2 Lakhs
  4. Get a Chance to Work with Government Security Industries

Course Details

  1. The course duration is 4 years
  2. The course fee is Rs.3,12,300/-. Total 8 semesters - Rs.37,000/- per semester. Admission Fee, Caution Deposit, Forms & Prospectus - Rs.18,300/- one time
  3. The course is administered in equal measures of practical and theory
Model Curriculum Structure:
Sem Major
(Offline)
Minor
(Blended Mode)
Inter Disciplinary
(Offline)
Ability Enhancement
(Offline)
Skill Enhancement
(Online /Sessional)
Common Value Added Course
(SESSIONAL)
TOTAL CREDITS
Sem: I Major
(Offline):
Fundamentals of Computing – using C and C++ language (including lab) (Code Theory-FYCYS 101, Lab-FYCYS 191) - 3+2 credits

Basic Mathematics and Statistics (including lab) (Code Theory-FYCYS 102, Lab-FYCYS 192) – 3+2 credits
Minor
(Blended Mode):
(1 sub x 3 credits)
Principles Of Management
Inter Disciplinary
(Offline):
Any one from GE baskets Basket A or D
(3 credits)
Ability Enhancement
(Offline):
AECC 101-English and Professional Communication
Skill Enhancement
(Online /Sessional):
SEC 181- Life Skills & Personality Development (2 credits)
Common Value Added Course
(SESSIONAL):
VAC 181A/B/C- Yoga/ Health & Wellness/ Sports (2 credits)
TOTAL CREDITS: 22
Sem: II Major
(Offline):
Computer Architecture and Object Oriented Concepts (including lab) (Code Theory-FYCYS 201, Lab-FYCYS 291) – 3+2 credits

Data Structures and Algorithms (including lab) (Code Theory-FYCYS 202, Lab-FYCYS 292) – 3+2 credits
Minor
(Blended Mode):
(1 sub x 3 credits) Organization Behaviour/Busin ess Ethics & Corporate Governance
Inter Disciplinary
(Offline):
Any one from GE baskets Basket B or E (3 credits)
Ability Enhancement
(Offline):
AECC 201- Modern Indian Languages and Literature (2 credits)
Skill Enhancement
(Online /Sessional):
SEC 201- IT Skills (2 credits)
Common Value Added Course
(SESSIONAL):
VAC281A/B/C/D- Critical Thinking / NSS / Mental Health / Environmental Studies (2 credits)
TOTAL CREDITS: 22
Sem: III Major
(Offline):
Python Programming (including lab) (Code Theory-FYCYS 301, Lab-FYCYS 391) – 3+2 credits

Operating System and DBMS (including lab) (Code Theory-FYCYS 302, Lab-FYCYS 392) – 3+2 credits
Minor
(Blended Mode):
(1 sub x 4 credits) Principles of Marketing/Business & Sustainability
Inter Disciplinary
(Offline):
Any one from GE baskets Basket C or F (3 credits)
Ability Enhancement
(Offline):
AECC 301- The Constitution, Human Rights and Law (2 credits)
Skill Enhancement
(Online /Sessional):
SEC 301- Understanding basics of Cyber Security (2 credits)
  TOTAL CREDITS: 21
Sem: IV Major
(Offline):
Design and Analysis of Algorithms (including lab) (Code Theory-FYCYS 401, Lab-FYCYS 491) – 2+2 credits

Ethical Hacking and Systems Defence (including lab) (Code Theory-FYCYS 402, Lab-FYCYS 492)– 3+2 credits

Cryptography and Information Security (including lab) (Code Theory-FYCYS 403, Lab-FYCYS 493)– 2+2 credits
Minor
(Blended Mode):
Human resource management / Corporate Social Responsibility (CSR) (4 credits)

Sales and distribution management / E-Commerce (4 credits)
  Ability Enhancement
(Offline):
AECC 401A Society Culture and Human Behavior (2 credits)
    TOTAL CREDITS: 23
Sem: V Major
(Offline):
Cyber Systems & Cyber Threat and Modelling (including lab) (Code Theory-FYCYS 501, Lab-FYCYS 591) – 3+2 credits

Vulnerability Analysis, Penetration Testing and Incident Handling (including lab) (Code Theory-FYCYS 502, Lab-FYCYS 592) – 3+2 credits
Minor
(Blended Mode):
Financial management (4 credits)

Entrepreneurship (4 credits)
    Skill Enhancement
(Online /Sessional):
FYBMS581 Internship (4 credits)
  TOTAL CREDITS: 22
Sem: VI Major
(Offline):
Cyber Forensics (Code FYCYS 601) – 4+1 credits

Malware Analysis (Code FYCYS 602) – 4+1 Credits

Advanced Computer Network and Security(including lab) (Code Theory-FYCYS 603, Lab-FYCYS 693) – 2+2 credits
Minor
(Blended Mode):
Customer relationship management (4 credits)

Career planning and management / Managing Workplace Diversity (4 credits)
        TOTAL CREDITS: 22
Sem: VII Major
(Offline):
Minor Project (Code FYCYS 781) – 5 credits

Software Project Management (Code FYCYS 701) – 4+1 credits

Artificial Intelligence in Security (Code FYCYS 702) – 3+1 credits
Minor
(Blended Mode):
Consumer behaviour / Exploring Business Opportunity (4 credits)

Strategic management / Intellectual Property Rights (4 credits)
        TOTAL CREDITS: 22
Sem: VIII Major
(Offline):
Major Project (continuation of minor project) (Code FYCYS 881) – 5 credits

Security in E-business (Code FYCYS 801) - 4+1 credits
      Skill Enhancement
(Online /Sessional):
Capstone / [Code FYCYSC881] Or Research project [Code FYCYSR882] 12 credits
  TOTAL CREDITS: 22
  Major
(Offline):
19 sub - 91 credits
Minor
(Blended Mode):
11 sub – 42 credits
Inter Disciplinary
(Offline):
3 sub – 09 credits
Ability Enhancement
(Offline):
4 sub – 08 credits
Skill Enhancement
(Online /Sessional):
3 sub & Int & Proj - 22 credits
Common Value Added Course
(SESSIONAL):
2 sub – 4 credits
TOTAL CREDITS: 176
1st Year - Semester 1:

Fundamentals of Computing - using C and C++ Language

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 101)

Module Number: M 1 Content: Computer fundamentals Total Hours: 6 %age of Questions: 10
Module Number: M 2 Content: Programming method Total Hours: 3 %age of Questions: 10
Module Number: M 3 Content: General problem solving concepts Total Hours: 6 %age of Questions: 20
Module Number: M 4 Content: Control Flow, Function, Arrays & Pointers Total Hours: 16 %age of Questions: 20
Module Number: M 5 Content: Structures Input & Output Total Hours: 4 %age of Questions: 20
Module Number: M 6 Content: C++ Basics Total Hours: 5 %age of Questions: 20
Total Hours: 40 %age of Questions: 100

Practical (FYCYS 191)

Module Number: M 7 Content: C and C++ Programs Total Hours: 60 %age of Questions: 100
Total Hours: 60 %age of Questions: 100

Basic Mathematics and Statistics

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 102)

Module Number: M 1 Content: Discrete Mathematics Total Hours: 8 %age of Questions: 10
Module Number: M 2 Content: Algebraic Structures and Morphism Total Hours: 8 %age of Questions: 25
Module Number: M 3 Content: Combinatorics and Probability Total Hours: 6 %age of Questions: 10
Module Number: M 4 Content: Frequency Distribution Total Hours: 10 %age of Questions: 25
Module Number: M 5 Content: Introduction to Statistics Total Hours: 14 %age of Questions: 20
Module Number: M 6 Content: Bivariate Statistics Total Hours: 10 %age of Questions: 10
Total Hours: 56 %age of Questions: 100

Practical (FYCYS 192)

Module Number: M 7 Content: Application of C program Total Hours: 20 %age of Questions: 100
Total Hours: 20 %age of Questions: 100

Computer Architecture and Object Oriented Concepts

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 201)

Module Number: M 1 Content: Computer Organization & Memory System Total Hours: 10 %age of Questions: 20
Module Number: M 2 Content: Computer Arithmetic Total Hours: 10 %age of Questions: 25
Module Number: M 3 Content: Input and Output System Total Hours: 10 %age of Questions: 30
Module Number: M 4 Content: Instruction Set and addressing modes Total Hours: 10 %age of Questions: 25
Total Hours: 40 %age of Questions: 100

Practical (Code - FYCYS 291)

Module Number: M 5 Content: Concepts of OOP & Basics of Java Total Hours: 15 %age of Questions: 40
Module Number: M 6 Content: Objects and Classes Total Hours: 45 %age of Questions: 60
Total Hours: 60 %age of Questions: 100

Data Structures and Algorithms

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 202)

Module Number: M 1 Content: Concepts of Abstract data type Total Hours: 6 %age of Questions: 10
Module Number: M 2 Content: Data Structure using Array Total Hours: 6 %age of Questions: 20
Module Number: M 3 Content: Linked List Total Hours: 6 %age of Questions: 20
Module Number: M 4 Content: Trees Total Hours: 6 %age of Questions: 10
Module Number: M 5 Content: Graphs & Hashing Total Hours: 10 %age of Questions: 20
Total Hours: 40 %age of Questions: 100

Practical (Code - FYCYS 292)

Module Number: M 6 Content: Data Structure using Array Total Hours: 6 %age of Questions: 20
Module Number: M 7 Content: Searching and Sorting Total Hours: 12 %age of Questions: 20
Module Number: M 8 Content: Linked List Total Hours: 12 %age of Questions: 20
Module Number: M 9 Content: Trees Total Hours: 15 %age of Questions: 20
Module Number: M 10 Content: Graphs & Hashing Total Hours: 15 %age of Questions: 20
Total Hours: 60 %age of Questions: 100

Python Programming & Python Programming Lab

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 301)

Module Number: M 1 Content: Introduction to Python Total Hours: 12 %age of Questions: 20
Module Number: M 2 Content: Conditions & Iterations Total Hours: 8 %age of Questions: 20
Module Number: M 3 Content: Recursion, Strings, List, Dictionaries, Tuples Total Hours: 10 %age of Questions: 30
Module Number: M 4 Content: Classes & Objects Total Hours: 10 %age of Questions: 30
Total Hours: 40 %age of Questions: 100

Practical (Code - FYCYS 391)

Module Number: M 5 Content: Introduction to Python Total Hours: 18 %age of Questions: 20
Module Number: M 6 Content: Conditions & Iterations Total Hours: 12 %age of Questions: 20
Module Number: M 7 Content: Recursion, Strings, List, Dictionaries, Tuples Total Hours: 15 %age of Questions: 30
Module Number: M 8 Content: Classes& Objects Total Hours: 15 %age of Questions: 30
Total Hours: 60 %age of Questions: 100

Operating Systems and Database Management Systems

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 302)

Module Number: M 1 Content: Introduction Total Hours: 3 %age of Questions: 10
Module Number: M 2 Content: Process Total Hours: 10 %age of Questions: 25
Module Number: M 3 Content: Resource Manager Total Hours: 8 %age of Questions: 10
Module Number: M 4 Content: Introducing to Data and Data Management Total Hours: 4 %age of Questions: 10
Module Number: M 5 Content: Data Models and Architecture of DBMS Total Hours: 6 %age of Questions: 20
Module Number: M 6 Content: Data Modeling using ER Modeling Total Hours: 7 %age of Questions: 10
Module Number: M 7 Content: Relational Model and Relational Database Management System Total Hours: 7 %age of Questions: 15
Total Hours: 45 %age of Questions: 100

Practical (Code - FYCYS 392)

Module Number: M 8 Content: Introduction Total Hours: 3 %age of Questions: 10
Module Number: M 9 Content: Process Total Hours: 15 %age of Questions: 25
Module Number: M 10 Content: Resource Manager Total Hours: 9 %age of Questions: 10
Module Number: M 11 Content: Introducing to Data and Data Management Total Hours: 6 %age of Questions: 10
Module Number: M 12 Content: Data Models and Architecture of DBMS Total Hours: 9 %age of Questions: 20
Module Number: M 13 Content: Data Modeling using ER Modeling Total Hours: 9 %age of Questions: 10
Module Number: M 14 Content: Relational Model and Relational Database Management System Total Hours: 9 %age of Questions: 15
Total Hours: 60 %age of Questions: 100

Design and Analysis of Algorithms

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 401)

Module Number: M 1 Content: Complexity Analysis Total Hours: 8 %age of Questions: 20
Module Number: M 2 Content: Algorithm Design by Divide and Conquer Total Hours: 8 %age of Questions: 20
Module Number: M 3 Content: Disjoint Set Data Structure Total Hours: 8 %age of Questions: 20
Module Number: M 4 Content: Algorithm Design by Greedy Strategy Total Hours: 8 %age of Questions: 10
Module Number: M 5 Content: Algorithm Design by Dynamic Programming Total Hours: 8 %age of Questions: 10
Module Number: M 6 Content: 6 Algorithm Design byb Backtracking Total Hours: 8 %age of Questions: 20
Total Hours: 48 %age of Questions: 100

Practical (Code - FYCYS 491)

Module Number: M 7 Content: Implement Merge sort Total Hours: 9 %age of Questions: 10
Module Number: M 8 Content: Implement Quicksort Total Hours: 9 %age of Questions: 10
Module Number: M 9 Content: Find maximum and minimum elements froman array of integers using divide and conquerstrategy Total Hours: 6 %age of Questions: 10
Module Number: M 10 Content: Implement fractional knapsack Total Hours: 6 %age of Questions: 10
Module Number: M 11 Content: Implement Job sequence withdeadline Total Hours: 9 %age of Questions: 10
Module Number: M 12 Content: Implement Kruskal's algorithm Total Hours: 9 %age of Questions: 10
Module Number: M 13 Content: Implement Prim’s algorithm Total Hours: 9 %age of Questions: 10
Module Number: M 14 Content: Implement Dijkstra's algorithm Total Hours: 9 %age of Questions: 10
Module Number: M 15 Content: Implement Matrix ChainMultiplication Total Hours: 9 %age of Questions: 10
Module Number: M 16 Content: Implement Floyd WarshallAlgorithm Total Hours: 9 %age of Questions: 10
Total Hours: 58 %age of Questions: 100

Ethical Hacking and Systems Defence

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 402)

Module Number: M 1 Content: Introduction to Ethical Hacking Total Hours: 10 %age of Questions: 25
Module Number: M 2 Content: System Hacking Total Hours: 14 %age of Questions: 25
Module Number: M 3 Content: TCP/IP - OverviewConcepts and PortScanning Total Hours: 14 %age of Questions: 30
Module Number: M 4 Content: Desktop and Server OS Vulnerabilities Total Hours: 10 %age of Questions: 20
Total Hours: 48 %age of Questions: 100

Practical (Code - FYCYS 492)

Module Number: M 5 Content: System and Network Security Total Hours: 24 %age of Questions: 60
Module Number: M 6 Content: Identifying vulnerabilities in OS Total Hours: 24 %age of Questions: 40
Total Hours: 48 %age of Questions: 100

Cryptography and Information Security

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 403)

Module Number: M 1 Content: Overview of cryptography, numbersystem Total Hours: 10 %age of Questions: 20
Module Number: M 2 Content: One time pad andstream ciphers Total Hours: 10 %age of Questions: 20
Module Number: M 3 Content: Block ciphers, message integrity Total Hours: 14 %age of Questions: 30
Module Number: M 4 Content: Public key cryptography, digital signature Total Hours: 14 %age of Questions: 30
Total Hours: 48 %age of Questions: 100

Practical (Code - FYCYS 493)

Module Number: M 5 Content: Arithmetic modulo, programming Total Hours: 28 %age of Questions: 40
Module Number: M 6 Content: Cryptography algorithm design and programming Total Hours: 30 %age of Questions: 60
Total Hours: 58 %age of Questions: 100

ISOEH Cyber Lab

Our Advance Digital Forensic Lab

Hacking Tutorials

Read All Tutorials »
Building a career in Digital Forensics - How promising is the future? A thorough career guide
Building a career in Digital Forensics - How promising is the future? A thorough career guide
Read Details »

Hacking Videos

Explore All Videos »
How to Hiding Your Secret File using Steganography?
View On Youtube »

Related Course


Enroll Now »

Enroll Now

Fields marked with * are mandatory.

Know Your Faculty
Sandeep Sengupta
Sandeep Sengupta
CISA, Certified Ethical Hacker, ISO 27001 Lead Auditor, Lead Privacy auditor, GDPR Implementer

With over 27 years of experience in Information Technology and Cyber Security, Mr. Sandeep Sengupta has made significant contributions to the field, providing solutions across India and internationally, including Singapore (2009-2010) and New Zealand (2002-2003). He is a certified lead auditor for standards such as ISO 27001 (Information Security), ISO 22301 (Business Continuity), ISO 9001 (Quality Management), and ISO 27701 (Data Protection & Privacy/GDPR). Additionally, he holds certifications as a Certified Ethical Hacker (CEH) and a Certified Information Systems Auditor (CISA).

Sandeep Sengupta has conducted audits for organizations such as PwC, KPMG, Tata Steel, SAIL, Capgemini, Genpact, ITC, Airtel, Vodafone, ONGC, National Power Grid, Bandhan Bank, PayU, Vedanta, and Accenture, among others. He collaborates with law enforcement agencies, including the CID and Lal Bazar Police Cyber Cell, on cybercrime investigations.

Sukriti Santra
Sukriti Santra
M.Tech CSE specialization in AI, PhD pursuing

Sukriti Santra is M.Tech in Computer Science and Engineering, Pursuing PhD domain Cyber Security from NITTTR. She has 15 years of teaching experience. Her technical interests include Cyber Security, Networking, Cloud Computing, Artificial Intelligence, Machine Learning, Deep Learning. She is skilled in C, C++, Java, Python, My SQL, HTML, CSS, PHP, JavaScript, Linux, Windows.

Saumitra Biswas
Saumitra Biswas
M Tech - Computer Science, MSc (Statistics), GATE qualified

Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.

>
<

Job Prospects & Job Sources

The various designations in cybersecurity include Information Risk Auditors, Firewall Administrators, Software Developers, Security Analysts, Intrusion Detection Specialists, Computer Security Incident Responders, Cryptologists, Vulnerability Assessors, Lead Security Architects and Chief Information Security Managers.

Freshers are offered starting salary of 30k per month to 2 lakhs per month. As per Nasscom, INDIA needs 5lac cyber security professional over coming 5 years. Currently INDIA has only 50,000. Click on APPLY NOW to check ACTIVE CYBER SECURITY JOBS.

Salary index in this field has risen by 25 to 35% in the last few years.

Governmental initiative for digital India is a further impetus for increased demand for cyber security jobs.

Financial services institutions including banks, payment gateways and ecommerce organisations are the biggest employers in cybersecurity, according to Sunil Goel, managing director at GlobalHunt. In certain cases cyber security experts are reporting to the company boards directly.

FAQs

What is the course content?
  • Cyber Law and Ethics
  • Cyber Forensics
  • Vulnerability Analysis
  • Penetration Testing, and Incident Handling
  • Malware Analysis
  • Cyber Threat and Modelling
  • Operating System & system programming (LINUX)
  • Cryptography & Information Security
  • Parallel and Distributed Computing
  • Virtualisation and Cloud Security
  • Auditing IT Infrastructures for Compliance
  • Big Data & IoT Security Penetration testing
  • Artificial Intelligence In Cyber security & Industry use cases
What is the course Duration?

The course duration is 4 years - 8 Semesters.

What is the course Methodology?

The course is administered in equal measures of practical and theory.

What is the course Prerequisites?

Eligibility is 10+2 in Science or Commerce (with Maths, Statistics and Computer science as one of the subjects). There is no prerequisite on percentage.

What is the career path after doing this course?

India is confronted with a scarcity of cyber security professionals, especially at the top corporate levels. Hence the field has seen increased salaries offered for such roles by 25-35% over the past year.

Freshers are offered starting salary of 30k per month to 2 lakhs per month. As per Nasscom, INDIA needs 5lac cyber security professional over coming 5 years. Currently INDIA has only 50,000. Click on APPLY NOW to check ACTIVE CYBER SECURITY JOBS.

Class room regular training for BSc in Digital Forensic
Direct Admission Open

Admission Fee, Caution Deposit, Forms & Prospectus

Rs.18,300/-
One Time

Semester Fees

Rs.37,000/-
Per Semester
(Total 8 semesters)

Member of:

NASSCOM
Data Security Council of India