Department of Computer Science & Engineering - Cyber Security

Overview
The B.E. Computer Science and Engineering with Specialization in Cyber Security (CSCS) is an undergraduate engineering degree program focused on equipping students with the knowledge and skills needed to protect computer systems, networks, and data from cyber threats and attacks. With the increasing reliance on digital infrastructure across sectors, cyber security has become a critical field, and this course is designed to meet the growing demand for professionals in this area.
- Objective: To develop experts in the field of information security, ethical hacking, and digital forensics.
Key Features
- Specialized Curriculum
- Focused on security principles, network security, cryptography, ethical hacking, and digital forensics.
- Includes foundational courses in computer science (e.g., Data Structures, Algorithms, and Operating Systems).
- Hands-on Learning
- Labs and simulation environments for penetration testing, secure coding, and threat analysis.
- Capstone projects, internships, and real-world problem-solving.
- Legal and Ethical Foundations
- Cyber laws and ethics, compliance, and governance integrated into the curriculum.
- Emerging Technologies
- Security in AI, IoT, Cloud computing, and Block chain.
Top Recruiters
- Government & Defense Agencies (DRDO, CERT-IN, etc.)
- IT and Cyber Security Firms (TCS, Infosys, Accenture, Palo Alto Networks, IBM Security)
- Banks and Financial Institutions
- Healthcare and Insurance Companies
- E-commerce and Cloud Service Providers
Why B.E. in CSE - Cyber Security?
- Industry-aligned skills in a high-demand domain
- Greater job security and compensation potential
- Opportunity to contribute to national and corporate security
- Global relevance and international career pathways
Programme
Duration:
4 years (Regular) / 3 years (Lateral Entry)
No. of Semesters:
8 (Regular) / 6 (Lateral Entry)
Intake / No. of Seats:
Total - 30 (Government - 15, Management - 15)
Eligibility:
10+2 system of Education. Must have secured a pass in Physics, Chemistry and Mathematics in the qualifying examination.
For more information Click here
Vision
To be a centre of excellence for transforming students into proficient Cyber Security Specialists through sustainable practices.
Mission
M1. Impart core fundamental knowledge and necessary skills in Cyber Security through innovative teaching and learning methodology.
M2. Inculcate critical thinking, ethics, lifelong learning and creativity needed for industry and society.
M3. Cultivate the students with all-round competencies, for career, higher education and self-employability.
PEOs / PSOs / PO
Programme Educational Objectives (PEOs)
PEO1. | Graduates will be prepared for analysing, designing, developing and testing the software solutions and products with creativity and sustainability |
PEO2. | Graduates will be skilled in the use of modern tools for critical problem solving and analyzing industrial and societal requirements |
PEO3. | Graduates will be prepared with managerial and leadership skills for career and starting up own firms |
Program Specific Outcomes (PSOs)
Engineering Graduates will be able to
PSO1. | Develop creative solutions by adapting emerging technologies / tools for real time applications of Industry |
PSO1. | Apply the acquired knowledge to develop software solutions and innovative mobile apps for various automation applications |
Programme Outcomes (PO)
PO1. | Engineering Knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an engineering specialization to the solution of complex engineering problems. |
PO2. | Problem Analysis:Identify, formulate, review research literature, and analyze complex engineering problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and engineering sciences. |
PO3. | Design/Development Of Solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for the public health and safety, and the cultural, societal, and environmental considerations. |
PO4. | Conduct Investigations of Complex Problems:Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions. |
PO5. | Modern Tool Usage:Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools including prediction and modeling to complex engineering activities with an understanding of the limitations. |
PO6. | The Engineer and Society: Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional engineering practice. |
PO7. | Environment and Sustain ability: Understand the impact of the professional engineering solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development. |
PO8. | Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering practice. |
PO9. | Individual and Team Work: Function effectively as an individual, and as a member or leader in diverse teams, and in multi disciplinary settings. |
PO10. | Communication: Communicate effectively on complex engineering activities with the engineering community and with society at large, such as, being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions. |
PO11. | Project Management and Finance: Demonstrate knowledge and understanding of the engineering and management principles and apply these to one's own work, as a member and leader in a team, to manage projects and in multi disciplinary environments. |
PO12. | Life-long Learning: Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change. |
Job Profiles
Employment Growth in Cyber Security in India by 2025 – 2030
The Cyber security sector in India is expected to experience strong growth over the next five years (2025–2030) due to the increasing frequency and sophistication of cyber attacks, the rapid digitization of businesses, and the expansion of digital infrastructures in various industries. As businesses and government organizations continue to embrace digital transformation, the demand for cyber security professionals will rise significantly.
Key Drivers of Employment Growth in Cyber Security in India (2025–2030):
- Increasing Cyber security Threats
- With more data moving online and increasing cyber threats, the demand for cyber security experts is projected to rise. Organizations will need CSE professionals to design secure systems, prevent data breaches, and mitigate cyber risks.
- Government Initiatives and Regulations
- Personal Data Protection Bill and National Cyber Security Strategy, best practices in data security, creating more demand for professionals.
- Digital India and Smart Cities.
- CERT-In and NCIIPC: Indian government agencies such as CERT-In (Indian Computer Emergency Response Team) and NCIIPC (National Critical Information Infrastructure Protection Centre) will continue to push for enhanced cyber security protocols, encouraging private sector adoption.
- Growth of Cloud Computing and IoT
- Cloud Adoption: As companies migrate to the cloud, professionals skilled in cloud computing platforms like AWS, Azure, and Google Cloud will be in high demand. The cloud computing market in India is expected to grow at a strong pace.
- Smart Devices: The rise of IoT devices in sectors like healthcare, agriculture, manufacturing, and home automation will create demand for CSE professionals to develop IoT platforms, design systems for device connectivity, and ensure data management and security
- Digital Payments and Financial Services
- Fin Tech Boom: As India’s fin tech sector grows, there will be an increasing need for cyber security professionals to protect digital payment systems, mobile banking apps, and block chain-based solutions.
- Regulatory authorities like the RBI and SEBI are implementing stricter cyber security regulations for financial institutions, driving demand for cyber security professionals in the banking and financial services sectors.
- Data Privacy and GDPR compliance experts to manage data privacy and security.
- Regulatory Compliance: As the government enforces stronger data protection regulations, such as the Personal Data Protection Bill, companies will require professionals with expertise in data security and privacy laws.
- Digital Transformation Across Industries
- Digital India Initiative: Government programs like Digital India, which aims to digitally empower the population, will boost demand for computer scientists and engineers.
- Smart Cities and IoT: Increasing implementation of smart city projects, IoT devices, and automation will drive the need for software developers, system integrators, and data engineers.
- Automation and AI Adoption: As businesses increasingly adopt artificial intelligence, machine learning, and automation, CSE professionals will be essential for developing, integrating, and managing these technologies.
Employment Opportunities in High Demand (2025–2030)
- Cyber security Analyst
- Responsibilities:Monitor network traffic, identify security breaches, and implement protective measures. Cyber security analysts are the first line of defense in identifying threats and responding to incidents.
- Skills Required: Network security, incident response, SIEM (Security Information and Event Management) tools, firewall management, penetration testing.
- Security Architect
- Responsibilities:Design and implement complex security infrastructures to protect IT systems, networks, and data. This role often involves setting up secure frameworks for cloud, IoT, and enterprise networks.
- Skills Required:Network architecture, security frameworks, risk management, cloud security (AWS, Azure), firewalls, encryption technologies.
- Penetration Tester (Ethical Hacker)
- Responsibilities:Conduct penetration tests to identify and exploit vulnerabilities in an organization’s systems. They simulate cyber attacks to help organizations find weaknesses before malicious hackers can exploit them.
- Skills Required: Kali Linux, Meta sploit, Wire shark, nmap, vulnerability scanning tools, ethical hacking certification (CEH, OSCP).
- Security Operations Center (SOC) Analyst
- Responsibilities:Monitor an organization's network for potential security threats and respond to security incidents. SOC analysts work in real-time to ensure minimal downtime and risk.
- Skills Required: Threat analysis, log analysis, incident detection and response, SIEM systems (Splunk, IBM QRadar).
- Cloud Security Specialist
- Responsibilities::Ensure the security of cloud infrastructures and applications. Cloud security specialists focus on preventing unauthorized access, data breaches, and ensuring compliance with cloud-specific security protocols.
- Skills Required: AWS, Azure, Google Cloud, cloud security best practices, identity and access management (IAM), encryption.
- Cyber security Consultant
- Responsibilities: Provide expertise to organizations on how to improve their overall cyber security posture. Consultants assess vulnerabilities, provide strategic recommendations, and help implement security solutions.
- Skills Required: Risk assessment, security audits, compliance frameworks (ISO 27001, NIST), penetration testing, security policy development.
- Incident Responder
- Responsibilities::Investigate and respond to cybersecurity incidents, including data breaches and malware attacks. Incident responders work quickly to mitigate damage and prevent further issues.
- Skills Required: Incident handling, forensics, malware analysis, root cause analysis, digital forensics tools.
- Cyber security Engineer
- Responsibilities: Build and maintain security systems, firewalls, and encryption technologies to protect organizational assets. This role involves proactively designing systems to prevent breaches.
- Skills Required: Firewall configuration, endpoint protection, network security protocols, security software development.
- Chief Information Security Officer (CISO)
- Responsibilities: Oversee an organization’s entire cybersecurity strategy, including policies, systems, and incident response. The CISO ensures the company is compliant with relevant regulations and industry standards.
- Skills Required: Leadership skills, risk management, compliance knowledge (GDPR, PCI DSS), security program management, business continuity planning.
- IoT Security Expert
- Responsibilities: Protect connected devices in IoT ecosystems from cyber threats. This includes ensuring that IoT devices are secure, encrypted, and do not pose risks to organizational infrastructure.
- Skills Required: IoT protocols, embedded security, network security, data encryption, IoT device security.
Sectors with High Employment Potential for Cyber security Professionals
- IT and IT Services
- Companies offering IT solutions and managed services will continue to need cyber security experts to protect their own systems and those of their clients.
- Financial Services and Fintech
- Banks, insurance companies, digital payment providers, and fin tech startups will invest in cyber security to safeguard transactions, customer data, and comply with financial regulations.
- E-Commerce
- With the rise in online shopping and digital payments, e-commerce platforms will require professionals to safeguard customer data, payment systems, and business operations from cyber threats.
- Government and Defense
- The government’s focus on digital governance and smart cities will increase the need for cyber security experts to protect critical infrastructures like energy, transportation, and healthcare.
- Telecommunications
- As 5G technology is rolled out and more devices become connected, telecom companies will require network security experts to protect data and ensure infrastructure reliability.
- Healthcare
- With the digitalization of healthcare systems, the need for healthcare cyber security specialists will grow, ensuring that sensitive health records and telemedicine systems are secure.
- Cloud Services
- Companies providing cloud solutions (e.g., AWS, Azure, Google Cloud) will require professionals skilled in securing cloud platforms and ensuring compliance with data protection laws.
Key Skills Required for Cyber security Roles
- Network Security
- Understanding of Networking: Knowledge of TCP/IP, network protocols, and firewalls is essential for any cybersecurity role.
- Tools: Proficiency in tools like Wireshark, nmap, and Snort for network analysis and intrusion detection.
- Ethical Hacking and Penetration Testing
- Penetration Testing: Skills to simulate cyberattacks on systems and networks to uncover vulnerabilities.
- Tools: Master tools like Kali Linux, Metasploit, Burp Suite, Nessus, and Aircrack-ng for security testing.
- Knowledge: Expertise in ethical hacking, vulnerability scanning, and exploitation techniques.
- Cloud Security
- Cloud Security Best Practices: Knowledge of securing cloud environments (AWS, Azure, Google Cloud) is critical, especially with increasing cloud adoption.
- IAM (Identity and Access Management), encryption, and data protection in cloud services are highly sought-after skills.
- Incident Response and Forensics
- Incident Handling: Skills to detect, respond, and recover from cybersecurity incidents like breaches or data leaks.
- Forensics: Expertise in digital forensics tools and techniques to analyze attacks and find their root causes.
- Data Encryption and Cryptography
- Encryption Methods: A strong understanding of cryptography principles and how to apply encryption to protect data in transit and at rest.
- Tools: Familiarity with tools like OpenSSL, GPG, and AES for data encryption.
- Risk Management and Compliance
- Cyber Risk Assessment: Identifying and evaluating potential risks to systems and data, and implementing protective measures.
- Compliance: Understanding of frameworks like ISO 27001, GDPR, HIPAA, and PCI DSS is valuable, especially for roles in banking, fintech, and healthcare.
- SIEM (Security Information and Event Management)
- Proficiency in using SIEM tools such as Splunk, IBM QRadar, or ArcSight to detect, monitor, and respond to security threats in real-time.
- Security Automation and Scripting
- Knowledge of automation tools (e.g., Puppet, Ansible) and scripting languages (e.g., Python, Bash) for automating security tasks and incident responses.
- Threat Intelligence
- Skills in identifying, analyzing, and responding to emerging cyber threats using threat intelligence platforms.
- Security in IoT and Mobile Devices
- As IoT devices become more pervasive, understanding IoT security and mobile device security will become increasingly important.
Cyber security Certifications
Certifications can greatly enhance your credibility and job prospects in the cyber security field.
- Certified Ethical Hacker (CEH) : Certification Body: EC-Council.
- Certified Information Systems Security Professional (CISSP) :Certification Body: (ISC)².
- Certified Information Security Manager (CISM) : Certification Body: ISACA.
- Certified Information Systems Auditor (CISA) : Certification Body: ISACA.
- CompTIA Security+ : Certification Body: CompTIA.
- Certified Cloud Security Professional (CCSP) : Certification Body: (ISC)².
- Certified Penetration Testing Engineer (CPTE) : Certification Body: EC-Council.
- Certified SOC Analyst (CSA) : Certification Body: EC-Council.
- Cisco Certified CyberOps Associate : Certification Body: Cisco.
- GIAC Security Essentials (GSEC) : Certification Body: Global Information Assurance Certification (GIAC).
Learning Paths for Cyber security Careers.
- Beginner Level
- Certifications: CompTIA Security+, Certified Ethical Hacker (CEH) Foundation.
- Skills Focus: Network security basics, firewall setup, and vulnerability scanning.
- Training Resources: Online platforms like Udemy, Coursera, edX for beginner courses.
- Intermediate Level
- Certifications: CISSP, CISM, Certified Cloud Security Professional (CCSP).
- Skills Focus: Advanced network security, cloud security, penetration testing, and risk management.
- Training Resources: Cybrary, Plural sight, SANS Institute for more in-depth training.
- Advanced Level
- Certifications: Certified Information Systems Auditor (CISA), Certified Penetration Testing Engineer (CPTE).
- Skills Focus: Ethical hacking, penetration testing, security management, incident response.
- Training Resources: EC-Council, GIAC, SANS Institute for specialized and advanced cyber security training.
Additional Resources to Enhance Your Skills.
- Capture The Flag (CTF) Challenges: Participate in CTF challenges to practice your penetration testing, forensics, and cryptography skills. Platforms like Hack The Box, Try Hack Me, and Over The Wire offer hands-on practice environments.
- Cyber security Blogs and Podcasts: Stay updated on the latest trends, vulnerabilities, and best practices.
- Follow blogs like Krebs On Security, Dark Reading, and SANS Internet Storm Center.
- Webinars and Conferences: Attend cyber security conferences like Black Hat, DEFCON, and RSA Conference to network with experts and stay updated on emerging threats and technologies.
- Open-Source Tools: Familiarize yourself with tools like Wireshark, Metasploit, Kali Linux, and Burp Suite to enhance your practical skills.
Top Online Cyber security Courses.
- CompTIA Security+ (SY0-601)
- Platform: Udemy, LinkedIn Learning, Cybrary
- Overview: This is a beginner-friendly course covering core cyber security principles such as network security, risk management, and cryptography.
- Ideal For: Beginners in cyber security.
- Certification: CompTIA Security+
- Certified Ethical Hacker (CEH)
- Platform: EC-Council, Udemy
- Overview: Learn penetration testing techniques, ethical hacking methodologies, and security analysis.
- Ideal For: Aspiring penetration testers and ethical hackers.
- Certification: Certified Ethical Hacker (CEH)
- Cisco CCNA Security
- Platform: Cisco Networking Academy, Udemy
- Overview: Focuses on network security, firewall technologies, VPNs, and intrusion prevention.
- Ideal For:Those interested in network security and Cisco certifications.
- Certification:Cisco CCNA Security
- Certified Information Systems Security Professional (CISSP)
- Platform: Udemy, LinkedIn Learning, Cybrary
- Overview: Focuses on security management, risk management, and architecture, and is ideal for those with managerial aspirations in cyber security.
- Ideal For:Experienced professionals and those seeking leadership roles.
- Certification:CISSP
- Certified Cloud Security Professional (CCSP)
- Platform: (ISC)², Udemy, LinkedIn Learning
- Overview: Specializes in cloud security, including how to secure cloud services, comply with cloud standards, and handle identity and access management (IAM).
- Ideal For:Professionals working with cloud computing and security.
- Certification:CCSP
- GIAC Security Essentials (GSEC)
- Platform:SANS Institute
- Overview: Covers basic cyber security skills, network security, cryptography, and security policies.
- Ideal For: Professionals looking to strengthen their foundation in security.
- Certification: GSEC
- Cyber security Specialization by University of Maryland
- Platform: Coursera
- Overview: A comprehensive course focusing on fundamental cyber security topics such as cryptography, security protocols, and network security.
- Ideal For: Beginners looking to build a strong foundation.
- Certification: Certificate of completion.
- Advanced Penetration Testing and Ethical Hacking
- Platform: Offensive Security (OffSec), Udemy
- Overview: Learn advanced penetration testing skills, ethical hacking, and exploitation techniques.
- Ideal For:Advanced learners and penetration testers.
- Certification:Offensive Security Certified Professional (OSCP)
- Certified Information Security Manager (CISM)
- Platform: ISACA, Udemy
- Overview: Focuses on information security management, risk management, and governance of IT systems.
- Ideal For:Professionals seeking managerial roles in cybersecurity.
- Certification:CISM
- Cyber security for Business Specialization
- Platform: Coursera (University of Colorado)
- Overview: Focuses on cyber security from a business perspective, addressing how to protect data, comply with regulations, and manage security risks in business contexts.
- Ideal For:Business professionals or those managing security teams.
- Certification:Certificate of completion.
Free and Low-Cost Cyber security Learning Resources
- Cybrary
- What it Offers: Free and paid courses ranging from beginner to advanced levels in network security, ethical hacking, cloud security, and incident response.
- Link: Cybrary
- Udemy
- What it Offers: Affordable cybersecurity courses (often discounted) covering topics like ethical hacking, cloud security, and CISSP.
- Link: Udemy Cybersecurity Courses
- Coursera
- What it Offers: Free courses on basic cybersecurity concepts from universities like the University of Maryland, University of California, and more. Certificates are available for a fee.
- Link: Coursera Cybersecurity Specializations
- SANS Cyber Aces
- What it Offers: Free introductory courses on network security, operating systems, and system administration.
- Link: SANS Cyber Aces
- OWASP (Open Web Application Security Project)
- What it Offers: Open-source resources and tutorials for web application security.
- Link: OWASP Resources
- TryHackMe
- What it Offers: Interactive, hands-on challenges for learning penetration testing, ethical hacking, and security analysis.
- Link: TryHackMe
- Hack The Box
- What it Offers: A platform to practice penetration testing and ethical hacking skills by solving challenges.
- Link: Hack The Box
- YouTube Channels
- The Cyber Mentor: Ethical hacking tutorials and real-world examples.
- NetworkChuck: A fun, engaging way to learn about networking, firewall configurations, and network security.
- Professor Messer: Free CompTIA Security+ videos and study materials.
Cyber security Career Path Resources.
- LinkedIn Learning
- Courses focusing on cybersecurity fundamentals, ethical hacking, risk management, and cloud security.
- Link: LinkedIn Learning - Cybersecurity
- Cybersecurity Podcasts
- Darknet Diaries: Explores real-life cyberattacks and security breaches.
- The CyberWire: Provides news and analysis of the latest cybersecurity threats.
- Security Now: A weekly podcast that covers cybersecurity news and tips.
- Cybersecurity Communities
- Reddit (r/cybersecurity): A community for cybersecurity news, jobs, and discussions.
- Stack Exchange: A platform where you can ask questions and share knowledge with fellow cybersecurity enthusiasts.
- Twitter: Follow cybersecurity experts like Troy Hunt (@troyhunt) and Brian Krebs (@briankrebs) for the latest updates.
- Books to Consider
- "The Web Application Hacker's Handbook" by Dafydd Stuttard and Marcus Pinto: A detailed guide on web application security.
- "Hacking: The Art of Exploitation" by Jon Erickson: A book focused on understanding hacking techniques and security vulnerabilities.
- "The CISSP All-in-One Exam Guide" by Shon Harris: A comprehensive guide for CISSP certification.
Faculty
Name | Qualification | Designation | Area of Specialization |
Dr. NAGASUBRAMANIAN R |
M.E.,Ph.D., | Head - PG | Computer Science Engineering |
Dr. SUBRAMANIAN P |
M.E.,Ph.D., | Head - UG | Wireless Sensor Networking and Image Processing |
Dr. PREMALATHA G |
M.E.,Ph.D., | Associate Professor | Image Processing and Machine Learning |
Mrs. SARANYA V |
M.Tech.,(Ph.D) | Assistant Professor | IOT and Cloud Computing |
Mrs. SASIKALA L |
M.E | Assistant Professor | Computer Science and Engineering |
Mrs. KIRUTHIKA S |
M.E | Assistant Professor | Computer Science and Engineering |
Mrs. ASRIN MAHMOOTHA A |
M.E | Assistant Professor | Computer Science Engineering |
Mr. PRAVEENKUMAR P |
M.E | Assistant Professor | Computer Science Engineering |
Mr. RAJAKUMAR B |
M.Tech.,(Ph.D) | Assistant Professor | IOT, AI, NLP and Image Processing |
Mr. RAJASEKAR R |
M.E.,(Ph.D) | Assistant Professor | IOT, Network Security |
Sl.No | Name of the Lab | Facility Available | Courses Offered | Virtual Link / ICT Tools | Soft copy of Lab Record |
---|---|---|---|---|---|
1 | C Programming Lab | View Details | CS8261 - C Programming | View | Download |
2 | Internet Programming Lab | View Details | CS8661 - Internet Programming | View | Download |
3 | Operating Systems Lab | View Details | CS8461 - Operating Systems | View | Download |
4 | Object Oriented Analysis and Design Lab | View Details | CS8461 - Object Oriented Analysis and Design | View | Download |
5 | Web Technology Lab | View Details | IT8511 - Web Technology | View | Download |
6 | Networks Lab | View Details | CS8581 Networks Lab | View | Download |
Academics
Anna university Regulation, Syllabus
BE - 2013 Syllabus | ![]() |
BE - 2017 Syllabus | ![]() |
ME - 2013 Syllabus | ![]() |
ME - 2017 Syllabus | ![]() |
BE - 2017 Regulation | ![]() |
Course Materials
SlNo. | Subject Code | Subject Name | Lesson Plan | Question Bank | Lecture Notes | ICT Tools |
---|---|---|---|---|---|---|
1 | GE8151 | Problem Solving and Python Programming | View | View | View | View |
2 | CS8251 | Programming in C | View | View | View | View |
3 | MA8351 | Discrete Mathematics | View | View | View | View |
4 | CS8351 | Digital Principles and System Design | View | View | View | View |
5 | CS8391 | Data Structures | View | View | View | View |
6 | CS8392 | Object Oriented Programming | View | View | View | View |
7 | EC8395 | Communication Engineering | View | View | View | View |
8 | MA8402 | Probability and Queueing Theory | View | View | View | View |
9 | CS8491 | Computer Architecture | View | View | View | View |
10 | CS8492 | Database Management Systems | View | View | View | View |
11 | CS8451 | Design and Analysis of Algorithms |
View | View | View | View |
12 | CS8493 | Operating Systems | View | View | View | View |
13 | CS8494 | Software Engineering | View | View | View | View |
14 | MA8551 | Algebra and Number Theory | View | View | View | View |
15 | CS8591 | Computer Networks | View | View | View | View |
16 | EC8691 | Microprocessors and Microcontrollers | View | View | View | View |
17 | CS8501 | Theory of Computation | View | View | View | View |
18 | CS8592 | Object Oriented Analysis and Design | View | View | View | View |
19 | Open Elective I | View | View | View | View | |
20 | CS8651 | Internet Programming | View | View | View | View |
21 | CS8691 | Artificial Intelligence | View | View | View | View |
22 | CS8601 | Mobile Computing | View | View | View | View |
23 | CS8602 | Compiler Design | View | View | View | View |
24 | CS8603 | Distributed Systems | View | View | View | View |
25 | Professional Elective I | View | View | View | View | |
26 | MG8591 | Principles of Management | View | View | View | View |
27 | CS8792 | Cryptography and Network Security | View | View | View | View |
28 | CS8791 | Cloud Computing | View | View | View | View |
29 | Open Elective II | View | View | View | View | |
30 | Professional Elective II | View | View | View | View | |
31 | Professional Elective III | View | View | View | View | |
32 | Professional Elective IV | View | View | View | View | |
33 | Professional Elective V | View | View | View | View |
PLACEMENT DETAILS
NEWS & EVENTS
Student Activities
Members of Alumni Association
infrastructures




