BSc in Cyber Security in Kolkata & Siliguri
The course is offered by Techno India Group and ISOAH Data Securities Pvt. Ltd. Arts Students can also Apply.
Download SyllabusThe course is offered by Techno India Group and ISOAH Data Securities Pvt. Ltd. Arts Students can also Apply.
Download Syllabusgrade grade grade grade grade
5.0 Google Review (1500+)
people
50+ Students cleared CEH Exam
verified
100% Job Placement
account_box
Faculty are working professionals from industry. Best in the Cyber Security.
settings
ICS, SCADA, PLC; HMI based attacks, Side-Channel attacks.
group
CID & Kolkata Police officers are trained here. Get a Chance to Work with Government Security Industries.
devices
While you study, you work in our LIVE projects to get hands on industry experience.
engineering
Internship at a Security Audit firm.
school
From leading Government Institute in West Bengal.
badge
Opportunities in Multinational Companies. Job Ready Program With 100% placement assistance.
payments
Get a Chance to Earn Good Salary – upto 6 lakhs.
book
The most advance Syllabus made by industry experts. Immersive Learning with100% Practical.
There is a requirement of 25 lakhs of cyber security and digital forensics experts in India every year.
As per NASSCOM survey, only 1 Lakh experts are present in India. Huge scope to make a career here.
3 Years (6 Semesters)
10+2 in Science or Commerce or Arts (Any One Can Join). There is no prerequisite on percentage.
Download Syllabusaccount_circle
3 Years of in-depth Training by the Best Cyber Security Experts.
library_books
Lifetime Access to resources (50+ pdf, 100+ videos).
record_voice_over
7 days doubt clearing session.
switch_account
On-Campus Placement Opportunities in Multinational Companies.
school
Bachelor's Degree from Govt University.
SL No | Paper |
---|---|
Theory | |
SL No: 1 | Paper: Fundamental of Computing |
SL No: 2 | Paper: Mathematics for Computing Professionals |
SL No: 3 | Paper: English Communication |
SL No: 4 | Paper: Digital Principles and System Design |
SL No: 5 | Paper: Computational Statistics |
Practical | |
SL No: 1 | Paper: Fundamental of Computing |
SL No: 2 | Paper: Digital Principles and System Design |
SL No: 3 | Paper: Computational Statistics - (Lab) |
SL No | Paper |
---|---|
Theory | |
SL No: 1 | Paper: Computer Architecture & Organization |
SL No: 2 | Paper: Data Structures and Algorithms |
SL No: 3 | Paper: Environmental Science |
SL No: 4 | Paper: Cyber Law and Ethics |
SL No: 5 | Paper: Object Oriented Concepts |
Practical | |
SL No: 1 | Paper: Data Structures and Algorithms |
SL No: 2 | Paper: Object Oriented Concepts |
SL No | Paper |
---|---|
Theory | |
SL No: 1 | Paper: Database Management Systems & Distributed Databases |
SL No: 2 | Paper: Security Architecture and Models |
SL No: 3 | Paper: Operating System & System Programming |
SL No: 4 | Paper: Computer Networks |
SL No: 5 | Paper: Cyber Threat and Modelling |
Practical | |
SL No: 1 | Paper: Database Management Systems |
SL No: 2 | Paper: Operating System & System Programming (Linux) |
SL No: 3 | Paper: Computer Networks |
SL No | Paper |
---|---|
Theory | |
SL No: 1 | Paper: Cryptography & Information Security |
SL No: 2 | Paper: Parallel and Distributing Computing (including Cloud Computing) |
SL No: 3 | Paper: Ethical Hacking & Systems Defence |
SL No: 4 | Paper: Software Engineering & Software Design with UML |
SL No: 5 | Paper: Advanced Computer Network & Security (TCP/IP, Wireless, Mobile) |
Practical | |
SL No: 1 | Paper: Ethical Hacking & Systems Defence |
SL No: 2 | Paper: Software Engineering & Software Design with UML |
SL No: 3 | Paper: Advanced Computer Network & Security |
SL No | Paper |
---|---|
Theory | |
SL No: 1 | Paper: Cyber Forensics |
SL No: 2 | Paper: Vulnerability Analysis, Penetration Testing and Incident Handling |
SL No: 3 | Paper: Malware Analysis |
SL No: 4 | Paper: Enterprise Security Architecture and Design |
Paper: Virtualisation and Cloud Security | |
Paper: Intrusion Detection and Prevention System | |
Paper: Auditing IT Infrastructures for Compliance | |
SL No: 5 | Paper: Big data & IoT Security |
Paper: Disaster Recovery & Business Continuity Management | |
Paper: Data Science, Algorithms and Complexity in the Cyber Context | |
Paper: Biometric Security | |
Practical | |
SL No: 1 | Paper: Cyber Forensics |
SL No | Paper |
---|---|
Theory | |
SL No: 1 | Paper: Artificial Intelligence in Cyber Security & Industry Use Cases |
SL No: 2 | Paper: Advanced Ethical Hacking |
Paper: Block Chain & Cryptocurrency | |
Paper: Penetration Testing | |
Paper: Risk Management | |
Practical | |
SL No: 1 | Paper: Project |
SL No: 2 | Paper: Artificial Intelligence in Cyber Security & Industry Use Cases |
check_box
They analyze and assess vulnerabilities in the infrastructure, detect vulnerabilities, and recommend solutions and best practices.
check_box
These professionals perform security monitoring and investigations and utilize new technologies and processes to.
check_box
They use encryption to secure information or build security software. They can also develop stronger encryption algorithms.
check_box
Designs a security system or major components of a security system, and heads a security design team building in a new security system.
check_box
These professionals Install and manage organization-wide security systems.
check_box
They develop security software and integrate or implement security into applications software.
With over 27 years of experience in Information Technology and Cyber Security, Mr. Sandeep Sengupta has made significant contributions to the field, providing solutions across India and internationally, including Singapore (2009-2010) and New Zealand (2002-2003). He is a certified lead auditor for standards such as ISO 27001 (Information Security), ISO 22301 (Business Continuity), ISO 9001 (Quality Management), and ISO 27701 (Data Protection & Privacy/GDPR). Additionally, he holds certifications as a Certified Ethical Hacker (CEH) and a Certified Information Systems Auditor (CISA).
Mr. Sengupta has conducted audits for organizations such as PwC, KPMG, Tata Steel, SAIL, Capgemini, Genpact, ITC, Airtel, Vodafone, ONGC, National Power Grid, Bandhan Bank, PayU, Vedanta, and Accenture, among others. He collaborates with law enforcement agencies, including the CID and Lal Bazar Police Cyber Cell, on cybercrime investigations.
Mr. Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.
Average Salary
Hiring Partners
Average Salary Hike
Our students are placed at CID, Kolkata Police, Siliguri Police, Sales Tax Dept. Furthermore, we have working CA & Lawyers taking up our course. With rise in cybercrime, Cyber Security professionals will be the most in demand experts in the industry.
They will find good opportunity as "Penetration Tester, ISO 27001 Auditor / Implementer, System Administrator, Web/Mobile Application Penetration Tester, Software Developer, Malware Analyst, Information Security Researcher (ML & AI), etc".
Salary index in this field has risen by 25 to 35% in the last few years. Governmental initiative for digital India is a further impetus for increased demand for Cyber Security jobs.
Financial services institutions including banks, payment gateways and ecommerce organisations are the biggest employers in digital Forensic, according to Sunil Goel, managing director at Global Hunt. In certain cases, digital Forensic experts are reporting to the company boards directly.
Upcoming Batch
starting from
September 2022
grade grade grade grade grade
"The Great Infrastructure and teachers are all very good and teaching is aslo excellent."
grade grade grade grade grade
"ISOEH has helped me to grow into a promising software professional by superb courseware, excellent faculty and latest development tools. Now I am working in Infosys Ltd and very much confident to face any challenge."
grade grade grade grade grade
"Excellent course material and well qualified faculty at ISOEH has helped me a lot to score good marks in college semesters."
The course duration is 3 years (6 Semesters).
The course is administered in equal measures of practical and theory.
Eligibility is 10+2 in Science or Commerce (with Maths, Statistics and Computer science as one of the subjects). There is no prerequisite on percentage.
India is confronted with a scarcity of Cyber Security professionals, especially at the top corporate levels. Hence the field has seen increased salaries offered for such roles by 25-35% over the past year.
Freshers are offered starting salary of 30k per month to 2 lakhs per month. As per Nasscom, INDIA needs 5 lakhs Cyber Security professional over coming 5 years. Currently INDIA has only 50,000.
ISO 27001:2022 & ISO 9001:2015
Certified by BSI
By accessing the website at https://www.isoeh.com/, you are agreeing to be bound by these terms of service, all applicable laws and regulations, and agree that you are responsible for compliance with any applicable local laws. If you do not agree with any of these terms, you are prohibited from using or accessing this site. The materials contained in this website are protected by applicable copyright and trademark law.
In no event shall Indian School of Ethical Hacking or its suppliers be liable for any damages (including, without limitation, damages for loss of data or profit, or due to business interruption) arising out of the use or inability to use the materials on Indian School of Ethical Hacking's website, even if Indian School of Ethical Hacking or a Indian School of Ethical Hacking authorized representative has been notified orally or in writing of the possibility of such damage. Because some jurisdictions do not allow limitations on implied warranties, or limitations of liability for consequential or incidental damages, these limitations may not apply to you.
The materials appearing on Indian School of Ethical Hacking's website could include technical, typographical, or photographic errors. Indian School of Ethical Hacking does not warrant that any of the materials on its website are accurate, complete or current. Indian School of Ethical Hacking may make changes to the materials contained on its website at any time without notice. However Indian School of Ethical Hacking does not make any commitment to update the materials.
Indian School of Ethical Hacking has not reviewed all of the sites linked to its website and is not responsible for the contents of any such linked site. The inclusion of any link does not imply endorsement by Indian School of Ethical Hacking of the site. Use of any such linked website is at the user's own risk.
Indian School of Ethical Hacking may revise these terms of service for its website at any time without notice. By using this website you are agreeing to be bound by the then current version of these terms of service.
These terms and conditions are governed by and construed in accordance with the laws of Kolkata and you irrevocably submit to the exclusive jurisdiction of the courts in that State or location.
Thank you for choosing to be part of our community at Indian School of Anti Hacking, doing business as ISOAH (“ISOAH”, “we”, “us”, or “our”). We are committed to protecting your personal information and your right to privacy. If you have any questions or concerns about this privacy notice, or our practices with regards to your personal information, please contact us at [email protected].
When you visit our website https://www.isoeh.com/ (the "Website"), and more generally, use any of our services (the "Services", which include the Website), we appreciate that you are trusting us with your personal information. We take your privacy very seriously. In this privacy notice, we seek to explain to you in the clearest way possible what information we collect, how we use it and what rights you have in relation to it. We hope you take some time to read through it carefully, as it is important. If there are any terms in this privacy notice that you do not agree with, please discontinue use of our Services immediately.
This privacy notice applies to all information collected through our Services (which, as described above, includes our Website), as well as any related services, sales, marketing or events.
Please read this privacy notice carefully as it will help you understand what we do with the information that we collect.
Information collected from other sources
In Short: We may collect limited data from public databases, marketing partners, and other outside sources.
In order to enhance our ability to provide relevant marketing, offers and services to you and update our records, we may obtain information about you from other sources, such as public databases, joint marketing partners, affiliate programs, data providers, as well as from other third parties. This information includes mailing addresses, job titles, email addresses, phone numbers, intent data (or user behavior data), Internet Protocol (IP) addresses, social media profiles, social media URLs and custom profiles, for purposes of targeted advertising and event promotion.
In Short: We process your information for purposes based on legitimate business interests, the fulfillment of our contract with you, compliance with our legal obligations, and/or your consent.
We use personal information collected via our Website for a variety of business purposes described below. We process your personal information for these purposes in reliance on our legitimate business interests, in order to enter into or perform a contract with you, with your consent, and/or for compliance with our legal obligations. We indicate the specific processing grounds we rely on next to each purpose listed below.
We use the information we collect or receive:
In Short: We only share nformation with your consent, to comply with laws, to provide you with services, to protect your rights, or to fulfill business obligations.
We may process or share your data that we hold based on the following legal basis:
More specifically, we may need to process your data or share your personal information in the following situations:
In Short: We may use cookies and other tracking technologies to collect and store your information.
We may use cookies and similar tracking technologies (like web beacons and pixels) to access or store information. Specific information about how we use such technologies and how you can refuse certain cookies is set out in our Cookie Notice.
In Short: Yes, we use Google Maps for the purpose of providing better service.
This Website uses Google Maps APIs which is subject to Google's Terms of Service. You may find the Google Maps APIs Terms of Service here. To find out more about Google’s Privacy Policy, please refer to this link.
In Short: We may transfer, store, and process your information in countries other than your own.
Our servers are located in. If you are accessing our Website from outside, please be aware that your information may be transferred to, stored, and processed by us in our facilities and by those third parties with whom we may share your personal information (see "WILL YOUR INFORMATION BE SHARED WITH ANYONE?" above), in and other countries.
If you are a resident in the European Economic Area, then these countries may not necessarily have data protection laws or other similar laws as comprehensive as those in your country. We will however take all necessary measures to protect your personal information in accordance with this privacy notice and applicable law.
In Short: We keep your information for as long as necessary to fulfill the purposes outlined in this privacy notice unless otherwise required by law.
We will only keep your personal information for as long as it is necessary for the purposes set out in this privacy notice, unless a longer retention period is required or permitted by law (such as tax, accounting or other legal requirements). No purpose in this notice will require us keeping your personal information for longer than 1 year.
When we have no ongoing legitimate business need to process your personal information, we will either delete or anonymize such information, or, if this is not possible (for example, because your personal information has been stored in backup archives), then we will securely store your personal information and isolate it from any further processing until deletion is possible.
In Short: We aim to protect your personal information through a system of organizational and technical security measures.
We have implemented appropriate technical and organizational security measures designed to protect the security of any personal information we process. However, despite our safeguards and efforts to secure your information, no electronic transmission over the Internet or information storage technology can be guaranteed to be 100% secure, so we cannot promise or guarantee that hackers, cybercriminals, or other unauthorized third parties will not be able to defeat our security, and improperly collect, access, steal, or modify your information. Although we will do our best to protect your personal information, transmission of personal information to and from our Website is at your own risk. You should only access the Website within a secure environment.
In Short: You may review, change, or terminate your account at any time.
If you are resident in the European Economic Area and you believe we are unlawfully processing your personal information, you also have the right to complain to your local data protection supervisory authority. You can find their contact details here: http://ec.europa.eu/justice/data-protection/bodies/authorities/index_en.htm.
If you are resident in Switzerland, the contact details for the data protection authorities are available here: https://www.edoeb.admin.ch/edoeb/en/home.html.
Cookies and similar technologies: Most Web browsers are set to accept cookies by default. If you prefer, you can usually choose to set your browser to remove cookies and to reject cookies. If you choose to remove cookies or reject cookies, this could affect certain features or services of our Website. To opt-out of interest-based advertising by advertisers on our Website visit http://www.aboutads.info/choices/.
Most web browsers and some mobile operating systems and mobile applications include a Do-Not-Track (“DNT”) feature or setting you can activate to signal your privacy preference not to have data about your online browsing activities monitored and collected. At this stage, no uniform technology standard for recognizing and implementing DNT signals has been finalized. As such, we do not currently respond to DNT browser signals or any other mechanism that automatically communicates your choice not to be tracked online. If a standard for online tracking is adopted that we must follow in the future, we will inform you about that practice in a revised version of this privacy notice.
In Short: Yes, we will update this notice as necessary to stay compliant with relevant laws.
We may update this privacy notice from time to time. The updated version will be indicated by an updated "Revised" date and the updated version will be effective as soon as it is accessible. If we make material changes to this privacy notice, we may notify you either by prominently posting a notice of such changes or by directly sending you a notification. We encourage you to review this privacy notice frequently to be informed of how we are protecting your information.
If you have questions or comments about this notice, you may email us at
[email protected] or by post to:
Indian School of Anti Hacking
ISOAH, Kariwala Towers, 4th Floor, Plot J/1-5, Block EP,
Sector - V, Saltlake City
Kolkata, West Bengal 700091
India
HOW CAN YOU REVIEW, UPDATE, OR DELETE THE DATA WE COLLECT FROM YOU?
Based on the applicable laws of your country, you may have the right to request access to the personal information we collect from you, change that information, or delete it in some circumstances. To request to review, update, or delete your personal information, please submit a request form by clicking here. We will respond to your request within 30 days.