SlideShare a Scribd company logo
INSTITUTE OF FORENSIC SCIENCE
GUJARAT FORENSIC SCIENCES
UNIVERSITY
ADMISSION OPEN AT :
www.gfsu.edu.in
COURSE: M.TECH. CYBER
SECURITY & INCIDENT RESPONSE
DURATION: 2 YEARS (FULL TIME)
Criteria for admission
Eligibility Criteria:
B.E./B.Tech.
Computer Science/ Electronics & Communication/ Electrical/ Information Technology or equivalent
OR
M.Sc.
Computer Science/ Electronics & Communication/ Information Technology or equivalent
OR
MCA or equivalent
Percentage Needed:
Minimum aggregate 55% for General & OBC and 50% for SC/ST candidate. The candidates must
furnish a valid GATE (CS/EC) score card or a copy of their Admit Card.
GATE score and marks of qualifying degree would be considered for merit preparation in 60:40 ratio. In
case GATE applications get exhausted Non GATE candidates may be considered and merit would be
prepared considering nil weightage for GATE score and 40% for the qualifying degree.
Note: Last year candidates who awaited their results can also apply.
Total No. of Seat: 50 Seats (42 for General Candidates + 8 Seats for NRI/ NRI Sponsored/
Foreign Students)
Tuition Fees: Rs. 65,000/- (Per Semester)
Facilities
▸ A dedicated high
tech Computer
Laboratory.
▸ Every student is
provided individual
high end computer
▸ Threat Shield laboratory
A unique Threat Shield
Laboratory for Managing the
latest Vulnerabilities &
Incident Response related
with Cyber Security & new
technology development. To
create a strong talent pool of
Cyber Security Professionals
as per Global Standards
Semester wise Syllabus
Semester - I
Paper 1: Cyber Security Fundamentals and Cyber Audit Essentials
Paper 2: Threats to Digital Infrastructure, its Defense and
Resilience
Paper 3: Digital Forensics & Analytics
Paper 4: Cyber Law, Policies and Compliance
Paper 5: Basics of Spoken English and Communication Skills
Semester - II
Paper 1: Advanced Malware Taxonomy and Analysis
Paper 2: Mobile Phone Security and Forensics
Paper 3: Incident Response and Recovery
Paper 4: E-Discovery, EDRM and Cyber Threat Intelligence
Paper 5: Elective Subject
Elective 1: Forensics of Distributed Systems Environment
Elective 2: Social Network Analysis and Investigation
Elective 3: Big Data Analytics
Elective 4: Applied Cryptography
Elective 5: Introduction to SCADA System
Elective 6: Multimedia Vulnerability Analysis
Elective 7: Hardware Security & Forensics
Semester –III and IV
Project Work/Dissertation and/ or Field Work/Internship
“The rapid and dramatic advances in information technology (IT) in
recent years have beyond doubt benefited the society at large.
However, they have created significant and unprecedented risks to
National Security, Human Rights, Cyber Safety, Corporate Safety and
Cyber Investigation. Computer security has, in turn, become much
more important as all levels of an organization to utilize information
systems security measures. The infestation of Digital Devices into the
environment is on the increase so is the challenge of Incident
Response and management of digital investigation in the field of
Cyber Security. Hacking has become a common terminology among
even the less prominent Cyber users. Hence obviates the need for
Incident Response by means of investigation and further culminating
into proactive and reactive Security Measures.
About Course
AIM
The programme is aimed at imbibing the students
with the skills to tackle cyber security and also
prepare them for the challenges in cyber security
managements and limited skills in digital
investigation management.
Objective of the
Programme
This course will ensure that the students are adequately
exposed to Cyber Space, Information Security, Standards and
Practices, Laws governing the Cyber Space, Incident Response,
Evidence Handling, Digital Investigation Management, Digital
Forensics, Cyber Defence, Network Centric Warfare, Soft Skill
development and Board Room Managements in the domain of
Cyber Space. The students will become Cyber Security experts
with Investigation Skills and will be useful to the
environment, both in the Government and Corporate sectors.
The course has been designed for Industry specific
needs and will be conducted in close collaboration
with the Industry, hence the initial off-take standard
of the students need to be at the highest degree of
proficiency to handle high level teaching
methodology and syllabus. Students with such
proficiency should opt for this course.
Prerequisite Knowledge
Course Conduct
Faculties of IFS and visiting faculties from national and
international reputed and meritorious representation from
Industry and Academia will be made available. Trained staff from
DFS will also be incorporated to provide hands-on experience and
also real-life situation sharing.
M.Tech. Cyber Security Placements - 2016
THANKS!
Any questions?
Contact us at:
Gujarat Forensic Sciences University
Sector 9
Gandhinagar-382007
Gujarat – India
Ph: 07923977171
Email: nilaymistry30@gmail.com
msdahiya49@rediffmail.com

More Related Content

What's hot

Technology millage district_needs_2013_-_final_draft
Technology millage district_needs_2013_-_final_draftTechnology millage district_needs_2013_-_final_draft
Technology millage district_needs_2013_-_final_draftTreyBurke679
 
Student college alert system to parents by their entry at the college premise...
Student college alert system to parents by their entry at the college premise...Student college alert system to parents by their entry at the college premise...
Student college alert system to parents by their entry at the college premise...
Khadarbaba Shaik
 
Week 2 assignment 4 slide presentation
Week 2 assignment 4 slide presentationWeek 2 assignment 4 slide presentation
Week 2 assignment 4 slide presentationLKiphen
 
Week 2 assignment 4 slide presentation
Week 2 assignment 4 slide presentationWeek 2 assignment 4 slide presentation
Week 2 assignment 4 slide presentationLKiphen
 
MS in Computer Engineering - MITAOE
MS in Computer Engineering - MITAOEMS in Computer Engineering - MITAOE
MS in Computer Engineering - MITAOE
MITAcademy1
 
Why universities are under attack by hackers
Why universities are under attack by hackersWhy universities are under attack by hackers
Why universities are under attack by hackers
warmretort6556
 
Apt 502 a1 m1 powerpoint,,,
Apt 502 a1 m1 powerpoint,,,Apt 502 a1 m1 powerpoint,,,
Apt 502 a1 m1 powerpoint,,,
cloder6416
 
Cybersecurity NCPN Presentation 10-2014 FINAL
Cybersecurity NCPN Presentation 10-2014 FINALCybersecurity NCPN Presentation 10-2014 FINAL
Cybersecurity NCPN Presentation 10-2014 FINALKathy K. Duer
 
Slide Show: Careers in Technology
Slide Show: Careers in Technology Slide Show: Careers in Technology
Slide Show: Careers in Technology
MTI College
 
Ict paper1
Ict paper1Ict paper1
Ict paper1
balol ismail
 
IJNSA Citation Details (2009 - 2016)
IJNSA Citation Details (2009 - 2016)IJNSA Citation Details (2009 - 2016)
IJNSA Citation Details (2009 - 2016)
IJNSA Journal
 
Qatechmillage
QatechmillageQatechmillage
Qatechmillagebutzowan
 

What's hot (17)

Technology millage district_needs_2013_-_final_draft
Technology millage district_needs_2013_-_final_draftTechnology millage district_needs_2013_-_final_draft
Technology millage district_needs_2013_-_final_draft
 
Student college alert system to parents by their entry at the college premise...
Student college alert system to parents by their entry at the college premise...Student college alert system to parents by their entry at the college premise...
Student college alert system to parents by their entry at the college premise...
 
Week 2 assignment 4 slide presentation
Week 2 assignment 4 slide presentationWeek 2 assignment 4 slide presentation
Week 2 assignment 4 slide presentation
 
Week 2 assignment 4 slide presentation
Week 2 assignment 4 slide presentationWeek 2 assignment 4 slide presentation
Week 2 assignment 4 slide presentation
 
MS in Computer Engineering - MITAOE
MS in Computer Engineering - MITAOEMS in Computer Engineering - MITAOE
MS in Computer Engineering - MITAOE
 
wireless communication
wireless communicationwireless communication
wireless communication
 
ITSS course spec
ITSS course specITSS course spec
ITSS course spec
 
Why universities are under attack by hackers
Why universities are under attack by hackersWhy universities are under attack by hackers
Why universities are under attack by hackers
 
M.Tech digital-communication-and-vlsi-design
M.Tech digital-communication-and-vlsi-designM.Tech digital-communication-and-vlsi-design
M.Tech digital-communication-and-vlsi-design
 
Apt 502 a1 m1 powerpoint,,,
Apt 502 a1 m1 powerpoint,,,Apt 502 a1 m1 powerpoint,,,
Apt 502 a1 m1 powerpoint,,,
 
JP RESUME
JP RESUMEJP RESUME
JP RESUME
 
Cybersecurity NCPN Presentation 10-2014 FINAL
Cybersecurity NCPN Presentation 10-2014 FINALCybersecurity NCPN Presentation 10-2014 FINAL
Cybersecurity NCPN Presentation 10-2014 FINAL
 
Slide Show: Careers in Technology
Slide Show: Careers in Technology Slide Show: Careers in Technology
Slide Show: Careers in Technology
 
Toc.cw.la1.as02.1
Toc.cw.la1.as02.1Toc.cw.la1.as02.1
Toc.cw.la1.as02.1
 
Ict paper1
Ict paper1Ict paper1
Ict paper1
 
IJNSA Citation Details (2009 - 2016)
IJNSA Citation Details (2009 - 2016)IJNSA Citation Details (2009 - 2016)
IJNSA Citation Details (2009 - 2016)
 
Qatechmillage
QatechmillageQatechmillage
Qatechmillage
 

Viewers also liked

Deep Dive into the Microsoft OpenStack CI Infrastructure (Alessandro Pilotti)
Deep Dive into the Microsoft OpenStack CI Infrastructure (Alessandro Pilotti)Deep Dive into the Microsoft OpenStack CI Infrastructure (Alessandro Pilotti)
Deep Dive into the Microsoft OpenStack CI Infrastructure (Alessandro Pilotti)
ITCamp
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Lancope, Inc.
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUMohit Rampal
 
sebis research profile
sebis research profilesebis research profile
sebis research profile
sebistum
 
ToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android InfectionsToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android Infections
Aditya K Sood
 
Hide Android applications in images
Hide Android applications in imagesHide Android applications in images
Hide Android applications in images
Ange Albertini
 
Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...
Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...
Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...
viaForensics
 
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
Aditya K Sood
 
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
viaForensics
 
Via forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linuxVia forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linuxviaForensics
 
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got StolenOne Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
OpenDNS
 
Emirates Forensic Presentation
Emirates Forensic PresentationEmirates Forensic Presentation
Emirates Forensic PresentationEmirates Forensic
 
Cyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptCyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptMohit Rampal
 
Digital Forensic
Digital Forensic Digital Forensic
Digital Forensic
Ravi Nayak
 
Dracos forensic flavor
Dracos forensic flavorDracos forensic flavor
Dracos forensic flavor
Satria Ady Pradana
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
Jacqueline Fick
 
BDO Forensic Services
BDO Forensic ServicesBDO Forensic Services
BDO Forensic Services
BDO Indonesia
 
MobilePolicing –Investing in Mobile Technology to Produce an Efficient and Ag...
MobilePolicing –Investing in Mobile Technology to Produce an Efficient and Ag...MobilePolicing –Investing in Mobile Technology to Produce an Efficient and Ag...
MobilePolicing –Investing in Mobile Technology to Produce an Efficient and Ag...
Govnet Events
 
Raising performance in composites bonding - Highlight
Raising performance in composites bonding - HighlightRaising performance in composites bonding - Highlight
Raising performance in composites bonding - Highlight
Huntsman Advanced Materials Europe
 
Blackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationBlackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream Presentation
OpenDNS
 

Viewers also liked (20)

Deep Dive into the Microsoft OpenStack CI Infrastructure (Alessandro Pilotti)
Deep Dive into the Microsoft OpenStack CI Infrastructure (Alessandro Pilotti)Deep Dive into the Microsoft OpenStack CI Infrastructure (Alessandro Pilotti)
Deep Dive into the Microsoft OpenStack CI Infrastructure (Alessandro Pilotti)
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSU
 
sebis research profile
sebis research profilesebis research profile
sebis research profile
 
ToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android InfectionsToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android Infections
 
Hide Android applications in images
Hide Android applications in imagesHide Android applications in images
Hide Android applications in images
 
Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...
Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...
Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...
 
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
 
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
 
Via forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linuxVia forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linux
 
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got StolenOne Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
 
Emirates Forensic Presentation
Emirates Forensic PresentationEmirates Forensic Presentation
Emirates Forensic Presentation
 
Cyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptCyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-ppt
 
Digital Forensic
Digital Forensic Digital Forensic
Digital Forensic
 
Dracos forensic flavor
Dracos forensic flavorDracos forensic flavor
Dracos forensic flavor
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
BDO Forensic Services
BDO Forensic ServicesBDO Forensic Services
BDO Forensic Services
 
MobilePolicing –Investing in Mobile Technology to Produce an Efficient and Ag...
MobilePolicing –Investing in Mobile Technology to Produce an Efficient and Ag...MobilePolicing –Investing in Mobile Technology to Produce an Efficient and Ag...
MobilePolicing –Investing in Mobile Technology to Produce an Efficient and Ag...
 
Raising performance in composites bonding - Highlight
Raising performance in composites bonding - HighlightRaising performance in composites bonding - Highlight
Raising performance in composites bonding - Highlight
 
Blackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationBlackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream Presentation
 

Similar to M.Tech. Cyber Security & Incident Response

Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
ThowfeekFayees
 
Master in information technology
Master in information technologyMaster in information technology
Master in information technology
sanzida01
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
CAS
 
Cyber Security Courses in Kerala
Cyber Security Courses in KeralaCyber Security Courses in Kerala
Cyber Security Courses in Kerala
ofnso123
 
Integrated microsystemscurriculum
Integrated microsystemscurriculumIntegrated microsystemscurriculum
Integrated microsystemscurriculum
Hoopeer Hoopeer
 
Saint Leo University by Study Metro
Saint Leo University by Study MetroSaint Leo University by Study Metro
Saint Leo University by Study Metro
Abhishek Bajaj
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
imtnoida112
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
Tyrone Grandison
 
ISI Master of Technology in Cryptology and Security (M. Tech CrS) Information
ISI Master of Technology in Cryptology and Security (M. Tech CrS) InformationISI Master of Technology in Cryptology and Security (M. Tech CrS) Information
ISI Master of Technology in Cryptology and Security (M. Tech CrS) Information
SOURAV DAS
 
M.Tech computer-science-and-software-engineering
M.Tech computer-science-and-software-engineeringM.Tech computer-science-and-software-engineering
M.Tech computer-science-and-software-engineering
JECRC UNIVERSITY, RAJASTHAN
 
Cyber Law and Security
Cyber Law and SecurityCyber Law and Security
Cyber Law and Security
IMT CDL
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
Mehedi Hasan
 
Information Technology Program: JCU Singapore
Information Technology Program: JCU SingaporeInformation Technology Program: JCU Singapore
Information Technology Program: JCU Singapore
Jcu Singapore
 
Digital Business and Education with Dimension Data
Digital Business and Education with Dimension DataDigital Business and Education with Dimension Data
Digital Business and Education with Dimension Data
Dimension Data Asia Pacific
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degrees
ERAUWebinars
 
Become a Master of Cybersecurity with Real World Business Challenges
Become a Master of Cybersecurity with Real World Business ChallengesBecome a Master of Cybersecurity with Real World Business Challenges
Become a Master of Cybersecurity with Real World Business Challenges
Mitedu
 
Proposal for IT Security Team
Proposal for IT Security TeamProposal for IT Security Team
Proposal for IT Security Team
Rishabh Gupta
 
ISA.pdf
ISA.pdfISA.pdf
ISA.pdf
timbadiyaved
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
CSCJournals
 
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final YearKapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Dezyneecole
 

Similar to M.Tech. Cyber Security & Incident Response (20)

Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
 
Master in information technology
Master in information technologyMaster in information technology
Master in information technology
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
 
Cyber Security Courses in Kerala
Cyber Security Courses in KeralaCyber Security Courses in Kerala
Cyber Security Courses in Kerala
 
Integrated microsystemscurriculum
Integrated microsystemscurriculumIntegrated microsystemscurriculum
Integrated microsystemscurriculum
 
Saint Leo University by Study Metro
Saint Leo University by Study MetroSaint Leo University by Study Metro
Saint Leo University by Study Metro
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
ISI Master of Technology in Cryptology and Security (M. Tech CrS) Information
ISI Master of Technology in Cryptology and Security (M. Tech CrS) InformationISI Master of Technology in Cryptology and Security (M. Tech CrS) Information
ISI Master of Technology in Cryptology and Security (M. Tech CrS) Information
 
M.Tech computer-science-and-software-engineering
M.Tech computer-science-and-software-engineeringM.Tech computer-science-and-software-engineering
M.Tech computer-science-and-software-engineering
 
Cyber Law and Security
Cyber Law and SecurityCyber Law and Security
Cyber Law and Security
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
 
Information Technology Program: JCU Singapore
Information Technology Program: JCU SingaporeInformation Technology Program: JCU Singapore
Information Technology Program: JCU Singapore
 
Digital Business and Education with Dimension Data
Digital Business and Education with Dimension DataDigital Business and Education with Dimension Data
Digital Business and Education with Dimension Data
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degrees
 
Become a Master of Cybersecurity with Real World Business Challenges
Become a Master of Cybersecurity with Real World Business ChallengesBecome a Master of Cybersecurity with Real World Business Challenges
Become a Master of Cybersecurity with Real World Business Challenges
 
Proposal for IT Security Team
Proposal for IT Security TeamProposal for IT Security Team
Proposal for IT Security Team
 
ISA.pdf
ISA.pdfISA.pdf
ISA.pdf
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final YearKapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
 

Recently uploaded

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 

Recently uploaded (20)

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 

M.Tech. Cyber Security & Incident Response

  • 1. INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ADMISSION OPEN AT : www.gfsu.edu.in COURSE: M.TECH. CYBER SECURITY & INCIDENT RESPONSE DURATION: 2 YEARS (FULL TIME)
  • 2. Criteria for admission Eligibility Criteria: B.E./B.Tech. Computer Science/ Electronics & Communication/ Electrical/ Information Technology or equivalent OR M.Sc. Computer Science/ Electronics & Communication/ Information Technology or equivalent OR MCA or equivalent Percentage Needed: Minimum aggregate 55% for General & OBC and 50% for SC/ST candidate. The candidates must furnish a valid GATE (CS/EC) score card or a copy of their Admit Card. GATE score and marks of qualifying degree would be considered for merit preparation in 60:40 ratio. In case GATE applications get exhausted Non GATE candidates may be considered and merit would be prepared considering nil weightage for GATE score and 40% for the qualifying degree. Note: Last year candidates who awaited their results can also apply. Total No. of Seat: 50 Seats (42 for General Candidates + 8 Seats for NRI/ NRI Sponsored/ Foreign Students) Tuition Fees: Rs. 65,000/- (Per Semester)
  • 3. Facilities ▸ A dedicated high tech Computer Laboratory. ▸ Every student is provided individual high end computer ▸ Threat Shield laboratory A unique Threat Shield Laboratory for Managing the latest Vulnerabilities & Incident Response related with Cyber Security & new technology development. To create a strong talent pool of Cyber Security Professionals as per Global Standards
  • 4. Semester wise Syllabus Semester - I Paper 1: Cyber Security Fundamentals and Cyber Audit Essentials Paper 2: Threats to Digital Infrastructure, its Defense and Resilience Paper 3: Digital Forensics & Analytics Paper 4: Cyber Law, Policies and Compliance Paper 5: Basics of Spoken English and Communication Skills Semester - II Paper 1: Advanced Malware Taxonomy and Analysis Paper 2: Mobile Phone Security and Forensics Paper 3: Incident Response and Recovery Paper 4: E-Discovery, EDRM and Cyber Threat Intelligence Paper 5: Elective Subject Elective 1: Forensics of Distributed Systems Environment Elective 2: Social Network Analysis and Investigation Elective 3: Big Data Analytics Elective 4: Applied Cryptography Elective 5: Introduction to SCADA System Elective 6: Multimedia Vulnerability Analysis Elective 7: Hardware Security & Forensics Semester –III and IV Project Work/Dissertation and/ or Field Work/Internship
  • 5. “The rapid and dramatic advances in information technology (IT) in recent years have beyond doubt benefited the society at large. However, they have created significant and unprecedented risks to National Security, Human Rights, Cyber Safety, Corporate Safety and Cyber Investigation. Computer security has, in turn, become much more important as all levels of an organization to utilize information systems security measures. The infestation of Digital Devices into the environment is on the increase so is the challenge of Incident Response and management of digital investigation in the field of Cyber Security. Hacking has become a common terminology among even the less prominent Cyber users. Hence obviates the need for Incident Response by means of investigation and further culminating into proactive and reactive Security Measures. About Course
  • 6. AIM The programme is aimed at imbibing the students with the skills to tackle cyber security and also prepare them for the challenges in cyber security managements and limited skills in digital investigation management.
  • 7. Objective of the Programme This course will ensure that the students are adequately exposed to Cyber Space, Information Security, Standards and Practices, Laws governing the Cyber Space, Incident Response, Evidence Handling, Digital Investigation Management, Digital Forensics, Cyber Defence, Network Centric Warfare, Soft Skill development and Board Room Managements in the domain of Cyber Space. The students will become Cyber Security experts with Investigation Skills and will be useful to the environment, both in the Government and Corporate sectors.
  • 8. The course has been designed for Industry specific needs and will be conducted in close collaboration with the Industry, hence the initial off-take standard of the students need to be at the highest degree of proficiency to handle high level teaching methodology and syllabus. Students with such proficiency should opt for this course. Prerequisite Knowledge
  • 9. Course Conduct Faculties of IFS and visiting faculties from national and international reputed and meritorious representation from Industry and Academia will be made available. Trained staff from DFS will also be incorporated to provide hands-on experience and also real-life situation sharing.
  • 10. M.Tech. Cyber Security Placements - 2016
  • 11. THANKS! Any questions? Contact us at: Gujarat Forensic Sciences University Sector 9 Gandhinagar-382007 Gujarat – India Ph: 07923977171 Email: nilaymistry30@gmail.com msdahiya49@rediffmail.com