B.Sc in Cyber Security
in Kolkata

The course is offered by George Group of Colleges-ISOAH Data Securities Pvt. Ltd. in collaboration with MAKAUT (West Bengal State Government University).

Apply Now Why Should I Join This Program?

Career Growth in Cyber Security

This chart illustrates a wide range of roles within the field, showing how students can explore various paths, each contributing significantly to the field of Cyber Security.

Success Stories

Anish Kujur
Anish Kujur
Placed at ISOAH Data Securities Private Limited
Saptarshi Kundu
Saptarshi Kundu
Placed at EY
Sukanta Khawas
Sukanta Khawas
Placed at North Bengal St. Xavier's College
Rahul Bardhan
Rahul Bardhan
Placed at EY
Sidharth Dixit
Sidharth Dixit
Placed at Fusion CX
Akash Thakur
Akash Thakur
Placed at Huntmetrics Private Limited
Raj Nandi
Raj Nandi
Placed at BDO India LLP
Tushar Kumar Sonkar
Tushar Kumar Sonkar
Placed at ISOAH Data Securities Private Limited
>
<

What's in for You?

work

Get High Salary Package

Earn upto 7 LPA to upto 21 LPA step by step in your entire career.

account_box

Comprehensive Knowledge Base

Students gain a solid foundation in Cyber Security, combining computer science, Cyber Law & Ethics, and cybersecurity disciplines.

settings

Practical Skills Development

Through hands-on labs and real-world projects, students develop practical skills necessary for collecting and analysing digital evidence.

group

Internship Opportunities

The program includes internship placements at significant industry locations, providing students with real-world experience.

account_circle

Expert-Led Instruction

Courses are taught by industry experts and auditors, ensuring students learn from seasoned professionals.

engineering

Government and Private Sector Preparation

Training prepares students for roles in both government and private sectors, including police, military, and corporate security.

school

Legal and Ethical Training

Students learn the legal aspects of Cyber Law and Ethics, ensuring they can handle security ethically and legally.

badge

Incident Response Training

The curriculum includes incident response, teaching students how to react swiftly and effectively to cybersecurity breaches.

laptop_chromebook

Advanced Technological Tools

Access to the latest cyber security tools and technologies through advanced labs sponsored by corporates.

Program Highlights

  • Course: B.Sc in Cyber Security
  • Degree: Bachelor Degree from MAKAUT (State Govt University)
  • Duration: 8 Semesters (4 years)
  • Mode: Full-time, 5 days a week. The course consists of both practical and theoretical training
  • Eligibility: 10+2 from any recognised board having any stream - Science or Arts or Commerce
  • Venue: ISOAH Saltlake Campus: Kariwala Towers, 4th Floor, Plot J/1-5, Block EP, Sector V, Salt Lake City, Kolkata - 700091
    George College Barasat Campus: NIMAS - HL No. 1045/1/A, Barrackpore Barasat Road. Bus Stop - Talikhola, (Behind Loknath Mandir) Kolkata - 700125

Our Instructors

Sandeep Sengupta
Sandeep Sengupta
CISA, Certified Ethical Hacker, ISO 27001 Lead Auditor, Lead Privacy auditor, GDPR Implementer
Sukriti Santra
Sukriti Santra
M.Tech CSE specialization in AI, PhD pursuing
Saumitra Biswas
Saumitra Biswas
M Tech - Computer Science, MSc (Statistics), GATE qualified
>
<

Career Development Journey with Industry Leaders

During the program, ISOAH guides you from the basics to advanced Cyber Security, with hands-on labs, internships, and expert-led workshops. Forge your path in the high-demand tech market!

Step: 1

Orientation sessions with career counsellors to set goals and understand the cyber security landscape

Step: 2

Introduction to Basics of Cyber Security

Step: 3

Workshops on real-world applications of cyber laws and networking in Cyber Security, as well as conducting advanced workshops and guest lectures from field experts.

Step: 4

Hands-on LAB sessions to apply data recovery and encryption methods

Step: 5

Training on using specialised forensic software and handling mobile-related cyber issues

Step: 6

Facilitate internships with industry partners

Step: 7

Support in undertaking a significant capstone project; guidance on publishing research

Step: 8

Mock exams, interview preparation workshops, resume-building sessions, and job placement support

What Our Students Say About Us

Raj Nandi
B.Sc. in Cyber Security (MAKAUT) 2nd Semester

grade grade grade grade grade

"The Great Infrastructure and teachers are all very good and teaching is aslo excellent."

Ajitesh Maity
Working in Infosys

grade grade grade grade grade

"ISOEH has helped me to grow into a promising software professional by superb courseware, excellent faculty and latest development tools. Now I am working in Infosys Ltd and very much confident to face any challenge."

Shrobon Biswas
B.Sc. in Cyber Security (MAKAUT) 4th Semester

grade grade grade grade grade

"Excellent course material and well qualified faculty at ISOEH has helped me a lot to score good marks in college semesters."

Suraj Bag
B.Sc. in Cyber Security (MAKAUT) 2nd Semester

grade grade grade grade grade

"ISOEH is best place for cyber security and Digital forensic course they helping me for my study and my future career, ISOEH faculties are best and knowledgeable in cyber security and Digital forensic."

Comprehensive Course that Secure your Future

Fee:
Rs.37,000/-
per Semester (8 semesters)

Registration Fee (Admission Fee, Caution Deposit, Forms & Prospectus:
Rs.18,300/-
one-time

task_altFaculty are working professionals from the industry

task_altThe most advanced Syllabus made by industry experts. Immersive Learning with100% Practical

task_altICS, SCADA, PLC; HMI-based attacks, Side-Channel attacks

task_altCID & Kolkata Police officers are trained here. Get a Chance to Work with Government Security Industries

task_altWhile you study, you work on our LIVE projects to get hands-on industry experience

task_altInternship at a Security Audit firm

task_altGovt. Approved Graduation Degree from a leading Government Institute in West Bengal

task_altOpportunities in Multinational Companies. Job Ready Program With 100% placement assistance

task_altGet a Chance to Earn Good Salary – up to 6 lakhs

Why Should I Join This Program?

Talk to our career counselling team to understand if you are a good fit for this programme.

60 Seats Only!

28 seats left

By providing your contact details, you agree to our Terms of Use & Privacy Policy

Course Syllabus

Course Structure

Model Curriculum Structure:
Sem Major
(Offline)
Minor
(Blended Mode)
Sem: I Major
(Offline):
Fundamentals of Computing – using C and C++ language (including lab) (Code Theory-FYCYS 101, Lab-FYCYS 191) - 3+2 credits

Basic Mathematics and Statistics (including lab) (Code Theory-FYCYS 102, Lab-FYCYS 192) – 3+2 credits
Minor
(Blended Mode):
(1 sub x 3 credits)
Principles Of Management
Sem: II Major
(Offline):
Computer Architecture and Object Oriented Concepts (including lab) (Code Theory-FYCYS 201, Lab-FYCYS 291) – 3+2 credits

Data Structures and Algorithms (including lab) (Code Theory-FYCYS 202, Lab-FYCYS 292) – 3+2 credits
Minor
(Blended Mode):
(1 sub x 3 credits) Organization Behaviour/Busin ess Ethics & Corporate Governance
Sem: III Major
(Offline):
Python Programming (including lab) (Code Theory-FYCYS 301, Lab-FYCYS 391) – 3+2 credits

Operating System and DBMS (including lab) (Code Theory-FYCYS 302, Lab-FYCYS 392) – 3+2 credits
Minor
(Blended Mode):
(1 sub x 4 credits) Principles of Marketing/Business & Sustainability
Sem: IV Major
(Offline):
Design and Analysis of Algorithms (including lab) (Code Theory-FYCYS 401, Lab-FYCYS 491) – 2+2 credits

Ethical Hacking and Systems Defence (including lab) (Code Theory-FYCYS 402, Lab-FYCYS 492)– 3+2 credits

Cryptography and Information Security (including lab) (Code Theory-FYCYS 403, Lab-FYCYS 493)– 2+2 credits
Minor
(Blended Mode):
Human resource management / Corporate Social Responsibility (CSR) (4 credits)

Sales and distribution management / E-Commerce (4 credits)
Sem: V Major
(Offline):
Cyber Systems & Cyber Threat and Modelling (including lab) (Code Theory-FYCYS 501, Lab-FYCYS 591) – 3+2 credits

Vulnerability Analysis, Penetration Testing and Incident Handling (including lab) (Code Theory-FYCYS 502, Lab-FYCYS 592) – 3+2 credits
Minor
(Blended Mode):
Financial management (4 credits)

Entrepreneurship (4 credits)
Sem: VI Major
(Offline):
Cyber Forensics (Code FYCYS 601) – 4+1 credits

Malware Analysis (Code FYCYS 602) – 4+1 Credits

Advanced Computer Network and Security(including lab) (Code Theory-FYCYS 603, Lab-FYCYS 693) – 2+2 credits
Minor
(Blended Mode):
Customer relationship management (4 credits)

Career planning and management / Managing Workplace Diversity (4 credits)
Sem: VII Major
(Offline):
Minor Project (Code FYCYS 781) – 5 credits

Software Project Management (Code FYCYS 701) – 4+1 credits

Artificial Intelligence in Security (Code FYCYS 702) – 3+1 credits
Minor
(Blended Mode):
Consumer behaviour / Exploring Business Opportunity (4 credits)

Strategic management / Intellectual Property Rights (4 credits)
Sem: VIII Major
(Offline):
Major Project (continuation of minor project) (Code FYCYS 881) – 5 credits

Security in E-business (Code FYCYS 801) - 4+1 credits
 
  Major
(Offline):
19 sub - 91 credits
Minor
(Blended Mode):
11 sub – 42 credits
Download Details »

Fundamentals of Computing - using C and C++ Language

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 101)

Module Number: M 1 Content: Computer fundamentals Total Hours: 6 %age of Questions: 10
Module Number: M 2 Content: Programming method Total Hours: 3 %age of Questions: 10
Module Number: M 3 Content: General problem solving concepts Total Hours: 6 %age of Questions: 20
Module Number: M 4 Content: Control Flow, Function, Arrays & Pointers Total Hours: 16 %age of Questions: 20
Module Number: M 5 Content: Structures Input & Output Total Hours: 4 %age of Questions: 20
Module Number: M 6 Content: C++ Basics Total Hours: 5 %age of Questions: 20
Total Hours: 40 %age of Questions: 100

Practical (FYCYS 191)

Module Number: M 7 Content: C and C++ Programs Total Hours: 60 %age of Questions: 100
Total Hours: 60 %age of Questions: 100

Basic Mathematics and Statistics

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 102)

Module Number: M 1 Content: Discrete Mathematics Total Hours: 8 %age of Questions: 10
Module Number: M 2 Content: Algebraic Structures and Morphism Total Hours: 8 %age of Questions: 25
Module Number: M 3 Content: Combinatorics and Probability Total Hours: 6 %age of Questions: 10
Module Number: M 4 Content: Frequency Distribution Total Hours: 10 %age of Questions: 25
Module Number: M 5 Content: Introduction to Statistics Total Hours: 14 %age of Questions: 20
Module Number: M 6 Content: Bivariate Statistics Total Hours: 10 %age of Questions: 10
Total Hours: 56 %age of Questions: 100

Practical (FYCYS 192)

Module Number: M 7 Content: Application of C program Total Hours: 20 %age of Questions: 100
Total Hours: 20 %age of Questions: 100

Computer Architecture and Object Oriented Concepts

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 201)

Module Number: M 1 Content: Computer Organization & Memory System Total Hours: 10 %age of Questions: 20
Module Number: M 2 Content: Computer Arithmetic Total Hours: 10 %age of Questions: 25
Module Number: M 3 Content: Input and Output System Total Hours: 10 %age of Questions: 30
Module Number: M 4 Content: Instruction Set and addressing modes Total Hours: 10 %age of Questions: 25
Total Hours: 40 %age of Questions: 100

Practical (Code - FYCYS 291)

Module Number: M 5 Content: Concepts of OOP & Basics of Java Total Hours: 15 %age of Questions: 40
Module Number: M 6 Content: Objects and Classes Total Hours: 45 %age of Questions: 60
Total Hours: 60 %age of Questions: 100

Data Structures and Algorithms

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 202)

Module Number: M 1 Content: Concepts of Abstract data type Total Hours: 6 %age of Questions: 10
Module Number: M 2 Content: Data Structure using Array Total Hours: 6 %age of Questions: 20
Module Number: M 3 Content: Linked List Total Hours: 6 %age of Questions: 20
Module Number: M 4 Content: Trees Total Hours: 6 %age of Questions: 10
Module Number: M 5 Content: Graphs & Hashing Total Hours: 10 %age of Questions: 20
Total Hours: 40 %age of Questions: 100

Practical (Code - FYCYS 292)

Module Number: M 6 Content: Data Structure using Array Total Hours: 6 %age of Questions: 20
Module Number: M 7 Content: Searching and Sorting Total Hours: 12 %age of Questions: 20
Module Number: M 8 Content: Linked List Total Hours: 12 %age of Questions: 20
Module Number: M 9 Content: Trees Total Hours: 15 %age of Questions: 20
Module Number: M 10 Content: Graphs & Hashing Total Hours: 15 %age of Questions: 20
Total Hours: 60 %age of Questions: 100

Python Programming & Python Programming Lab

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 301)

Module Number: M 1 Content: Introduction to Python Total Hours: 12 %age of Questions: 20
Module Number: M 2 Content: Conditions & Iterations Total Hours: 8 %age of Questions: 20
Module Number: M 3 Content: Recursion, Strings, List, Dictionaries, Tuples Total Hours: 10 %age of Questions: 30
Module Number: M 4 Content: Classes & Objects Total Hours: 10 %age of Questions: 30
Total Hours: 40 %age of Questions: 100

Practical (Code - FYCYS 391)

Module Number: M 5 Content: Introduction to Python Total Hours: 18 %age of Questions: 20
Module Number: M 6 Content: Conditions & Iterations Total Hours: 12 %age of Questions: 20
Module Number: M 7 Content: Recursion, Strings, List, Dictionaries, Tuples Total Hours: 15 %age of Questions: 30
Module Number: M 8 Content: Classes& Objects Total Hours: 15 %age of Questions: 30
Total Hours: 60 %age of Questions: 100

Operating Systems and Database Management Systems

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 302)

Module Number: M 1 Content: Introduction Total Hours: 3 %age of Questions: 10
Module Number: M 2 Content: Process Total Hours: 10 %age of Questions: 25
Module Number: M 3 Content: Resource Manager Total Hours: 8 %age of Questions: 10
Module Number: M 4 Content: Introducing to Data and Data Management Total Hours: 4 %age of Questions: 10
Module Number: M 5 Content: Data Models and Architecture of DBMS Total Hours: 6 %age of Questions: 20
Module Number: M 6 Content: Data Modeling using ER Modeling Total Hours: 7 %age of Questions: 10
Module Number: M 7 Content: Relational Model and Relational Database Management System Total Hours: 7 %age of Questions: 15
Total Hours: 45 %age of Questions: 100

Practical (Code - FYCYS 392)

Module Number: M 8 Content: Introduction Total Hours: 3 %age of Questions: 10
Module Number: M 9 Content: Process Total Hours: 15 %age of Questions: 25
Module Number: M 10 Content: Resource Manager Total Hours: 9 %age of Questions: 10
Module Number: M 11 Content: Introducing to Data and Data Management Total Hours: 6 %age of Questions: 10
Module Number: M 12 Content: Data Models and Architecture of DBMS Total Hours: 9 %age of Questions: 20
Module Number: M 13 Content: Data Modeling using ER Modeling Total Hours: 9 %age of Questions: 10
Module Number: M 14 Content: Relational Model and Relational Database Management System Total Hours: 9 %age of Questions: 15
Total Hours: 60 %age of Questions: 100

Design and Analysis of Algorithms

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 401)

Module Number: M 1 Content: Complexity Analysis Total Hours: 8 %age of Questions: 20
Module Number: M 2 Content: Algorithm Design by Divide and Conquer Total Hours: 8 %age of Questions: 20
Module Number: M 3 Content: Disjoint Set Data Structure Total Hours: 8 %age of Questions: 20
Module Number: M 4 Content: Algorithm Design by Greedy Strategy Total Hours: 8 %age of Questions: 10
Module Number: M 5 Content: Algorithm Design by Dynamic Programming Total Hours: 8 %age of Questions: 10
Module Number: M 6 Content: 6 Algorithm Design byb Backtracking Total Hours: 8 %age of Questions: 20
Total Hours: 48 %age of Questions: 100

Practical (Code - FYCYS 491)

Module Number: M 7 Content: Implement Merge sort Total Hours: 9 %age of Questions: 10
Module Number: M 8 Content: Implement Quicksort Total Hours: 9 %age of Questions: 10
Module Number: M 9 Content: Find maximum and minimum elements froman array of integers using divide and conquerstrategy Total Hours: 6 %age of Questions: 10
Module Number: M 10 Content: Implement fractional knapsack Total Hours: 6 %age of Questions: 10
Module Number: M 11 Content: Implement Job sequence withdeadline Total Hours: 9 %age of Questions: 10
Module Number: M 12 Content: Implement Kruskal's algorithm Total Hours: 9 %age of Questions: 10
Module Number: M 13 Content: Implement Prim’s algorithm Total Hours: 9 %age of Questions: 10
Module Number: M 14 Content: Implement Dijkstra's algorithm Total Hours: 9 %age of Questions: 10
Module Number: M 15 Content: Implement Matrix ChainMultiplication Total Hours: 9 %age of Questions: 10
Module Number: M 16 Content: Implement Floyd WarshallAlgorithm Total Hours: 9 %age of Questions: 10
Total Hours: 58 %age of Questions: 100

Ethical Hacking and Systems Defence

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 402)

Module Number: M 1 Content: Introduction to Ethical Hacking Total Hours: 10 %age of Questions: 25
Module Number: M 2 Content: System Hacking Total Hours: 14 %age of Questions: 25
Module Number: M 3 Content: TCP/IP - OverviewConcepts and PortScanning Total Hours: 14 %age of Questions: 30
Module Number: M 4 Content: Desktop and Server OS Vulnerabilities Total Hours: 10 %age of Questions: 20
Total Hours: 48 %age of Questions: 100

Practical (Code - FYCYS 492)

Module Number: M 5 Content: System and Network Security Total Hours: 24 %age of Questions: 60
Module Number: M 6 Content: Identifying vulnerabilities in OS Total Hours: 24 %age of Questions: 40
Total Hours: 48 %age of Questions: 100

Cryptography and Information Security

Module Number Content Total Hours %age of Questions

Theory (Code – FYCYS 403)

Module Number: M 1 Content: Overview of cryptography, numbersystem Total Hours: 10 %age of Questions: 20
Module Number: M 2 Content: One time pad andstream ciphers Total Hours: 10 %age of Questions: 20
Module Number: M 3 Content: Block ciphers, message integrity Total Hours: 14 %age of Questions: 30
Module Number: M 4 Content: Public key cryptography, digital signature Total Hours: 14 %age of Questions: 30
Total Hours: 48 %age of Questions: 100

Practical (Code - FYCYS 493)

Module Number: M 5 Content: Arithmetic modulo, programming Total Hours: 28 %age of Questions: 40
Module Number: M 6 Content: Cryptography algorithm design and programming Total Hours: 30 %age of Questions: 60
Total Hours: 58 %age of Questions: 100

Curriculum Structure

Sl. No. Course Name
Sl. No.: 1 Course Name: Fundamentals of Digital Systems
Sl. No.: 2 Course Name: Fundamentals of Digital Systems Lab
Sl. No.: 3 Course Name: Introduction to Programming
Sl. No.: 4 Course Name: Introduction to Programming Lab
Sl. No.: 5 Course Name: Students will have to choose from the GE Basket
Sl. No.: 6 Course Name: English Communication
Sl. No. Course Name
Sl. No.: 1 Course Name: Introduction to Digital Forensic & Cyber Laws
Sl. No.: 2 Course Name: Introduction to Digital Forensic & Cyber Laws Lab
Sl. No.: 3 Course Name: Data Structures and Algorithms
Sl. No.: 4 Course Name: Data Structures and Algorithms Lab
Sl. No.: 5 Course Name: Students will have to choose from the GE Basket
Sl. No.: 6 Course Name: Environmental Science
Sl. No. Course Name
Sl. No.: 1 Course Name: Computer Networks and Network Security
Sl. No.: 2 Course Name: Computer Networks and Network Security Lab
Sl. No.: 3 Course Name: Cyber Security
Sl. No.: 4 Course Name: Cyber Security Lab
Sl. No.: 5 Course Name: Biometric Security
Sl. No.: 6 Course Name: Students will choose from the GE Basket
Sl. No.: 7 Course Name: Students will choose from the GE Basket
Sl. No. Course Name
Sl. No.: 1 Course Name: Cryptography
Sl. No.: 2 Course Name: Cryptography Lab
Sl. No.: 3 Course Name: Software Engineering
Sl. No.: 4 Course Name: Software Engineering Lab
Sl. No.: 5 Course Name: Image Processing and Pattern Recognition
Sl. No.: 6 Course Name: Students will choose from the GE Basket
Sl. No.: 7 Course Name: Students will choose from the GE Basket
Sl. No. Course Name
Sl. No.: 1 Course Name: Computer Forensic
Sl. No.: 2 Course Name: Computer Forensic Lab
Sl. No.: 3 Course Name: Preserving and Recovering Digital Evidence
Sl. No.: 4 Course Name: Preserving and Recovering Digital Evidence Lab
Sl. No.: 5 Course Name: Students will choose from the DSE Basket
Sl. No.: 6 Course Name: Students will choose from the DSE Basket
Sl. No.: 7 Course Name: Project Work
Sl. No. Course Name
Sl. No.: 1 Course Name: Mobile Forensic and Wireless Security
Sl. No.: 2 Course Name: Mobile Forensic and Wireless Security Lab
Sl. No.: 3 Course Name: Malware Analysis
Sl. No.: 4 Course Name: Malware Analysis Lab
Sl. No.: 5 Course Name: Students will choose from the DSE Basket
Sl. No.: 6 Course Name: Students will choose from the DSE Basket
Sl. No.: 7 Course Name: Project Work
Sl. No. Course Name
Sl. No.: 1 Course Name: Research Work
Sl. No. Course Name
Sl. No.: 1 Course Name: Internship cum On Job Training

Upcoming Session starting from June 2025

Apply Now

FAQs

The course duration is 4 years (8 Semesters).

The course is administered in equal measures of practical and theory.

10+2 from any recognized board having any stream - Science or Arts or Commerce.

India is confronted with a scarcity of cyber security professionals, especially at the top corporate levels. Hence the field has seen increased salaries offered for such roles by 25-35% over the past year.

Freshers are offered starting salary of 30k per month to 2 lakhs per month. As per Nasscom, INDIA needs 5lac cyber security professional over coming 5 years. Currently INDIA has only 50,000. Click on APPLY NOW to check ACTIVE CYBER SECURITY JOBS.