Computer & IT – Cyber Security
Introduction to course
Welcome to our M.Tech. program in Computer & IT – Cyber Security, where we dive deep into the critical realm of safeguarding digital assets and protecting against cyber threats. This program is tailored for individuals passionate about ensuring the security and integrity of digital systems and networks. Through a comprehensive curriculum, hands-on projects, and industry collaborations, students explore cutting-edge techniques in cyber defence, cryptography, network security, and risk management.
Mission
M.Tech. (Computer & IT – Cyber Security) program’s mission is to cultivate a cadre of cybersecurity professionals equipped with advanced technical skills, ethical principles, and a deep understanding of cybersecurity challenges. We are committed to providing a rigorous academic environment that fosters critical thinking, innovation, and collaboration. Our mission is to empower students to become proficient in identifying, analyzing, and mitigating cybersecurity threats, thereby safeguarding digital assets and ensuring the integrity of information systems.
Vision
Our M.Tech. (Computer & IT – Cyber Security) program aims to be a distinguished hub for cybersecurity education, celebrated for nurturing outstanding talent and pioneering research to defend digital assets. We envision an interactive learning space where students are empowered to delve into the latest technologies, collaborate on interdisciplinary ventures, and spearhead solutions to emerging cyber threats. Guided by our commitment to excellence, integrity, and ethical leadership, we endeavour to redefine the landscape of cybersecurity, ensuring a safer and more resilient digital world.
Course objective
- Explore emerging technologies and trends in cybersecurity, including threat intelligence and incident response.
- Gain hands-on experience in conducting vulnerability assessments, penetration testing, and security audits.
- Develop critical thinking and problem-solving abilities to analyze and mitigate cybersecurity threats effectively.
- Collaborate with industry partners on real-world projects to apply cybersecurity concepts in practical scenarios.
- Cultivate ethical and professional values to uphold the integrity and confidentiality of digital systems and data.
- Stay updated with evolving cybersecurity standards and regulations through continuous learning and professional development.
Course outcome
- Analyze and assess cybersecurity risks, vulnerabilities, and threats in various IT environments.
- Develop and implement effective cybersecurity strategies, policies, and procedures to protect digital assets.
- Conduct ethical hacking and penetration testing to identify and mitigate security weaknesses.
- Communicate cybersecurity findings, recommendations, and solutions effectively to diverse stakeholders.
- Collaborate in multidisciplinary teams to address complex cybersecurity challenges and develop innovative solutions.
- Adhere to ethical and professional standards in cybersecurity practice, including privacy and compliance regulations.
Admission procedure
Check Eligibility (Physics + Maths + Chemistry / Computer)
Board |
Category |
Theory Marks |
Theory + Practical Marks |
---|---|---|---|
GSEB |
Open |
135 / 300 |
180 / 400 |
GSEB |
Reserve |
120 / 300 |
180 / 400 |
Other Boards |
Open |
108 / 240 |
135 / 300 |
Other Boards |
Reserve |
96 / 240 |
120 / 300 |
Required Documents
- SSC
- HSC
- GUJCET mark-sheet
- Leaving certificate (applicable for all)
- Income certificate
- Caste certificate, NCL (if applicable)
Curriculum
- Duration: 4 years
- Fees: Rs. 70,000
- Intake: 60
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |