Cyber security is a very fast-moving field. A program in security that aims to be on the forefront must necessarily have a companion-advanced a program that has a good balance between theoretical and practical aspects, analytical methods and system architectures, academic ideas and industry practices.
This program provides a good blend of theory and industrial practice; necessary theoretical background, insight into general and technical aspects of Cyber Security, analytical methods and management practices in the field of Cyber Security are the areas receiving detailed attention. It aims at moulding the student into an Information Security professional. Practicing industry professionals and enterprise experts with little or no knowledge in Cyber Security too can benefit from this program.
Career Opportunities in Cybersecurity
Cybersecurity Ventures predicts there will be 3.5 million unfilled cybersecurity positions globally by 2021. Data from Burning Glass Technologies Research found that cyber security professionals tend to make about 9 percent more compared to other IT workers, yet there remains a lack of enough qualified professionals in the field. Read our comprehensive report on cybersecurity as a career choice covering the various types of roles, the skillsets required, and the career roadmap for cybersecurity professionals.
GTU-GSET Students . Moreover, they are encouraged to attend and explore GTU- International Experience Program (IEP) in the field of cyber security such as Cyber Security Summer Training Program at Tel Aviv University, Israel. All the students get 100% placement in various esteemed industries and organization such as Deloitte India, KPMG India, National Technical Research Organisation (NTRO). Net-Square Solutions Pvt. Ltd., BlueInfy Solutions Pvt. Ltd., TrasVista-Pune, Cloud24x7 Pvt. Ltd., Sophos Technologies Pvt. Ltd., etc.
This AICTE approved Post Graduate ME course of two years duration has an intake of 30 students per year and the admissions are done through ACPC, Gujarat on the basis of PGSET/GATE and the score at BE.
Subject code | Branch code | Eff_from | Subject Name | Category | Sem /Year | L. | T. | P. | Total | E | M | I | V | Total |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3700001 | 59 | 2018-19 | English for Research Paper Writing | Audit Course | 1 | 2 | 0 | 0 | 0 | 50 | 0 | 0 | 0 | 50 |
3700005 | 59 | 2018-19 | Constitution of India | Audit Course | 1 | 2 | 0 | 0 | 0 | 50 | 0 | 0 | 0 | 50 |
3710001 | 59 | 2018-19 | Research Methodology and IPR | MLC | 1 | 1 | 0 | 2 | 2 | 0 | 0 | 20 | 80 | 100 |
3715901 | 59 | 2018-19 | Mathematical Foundation for Cyber Security | Core I | 1 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3715901 | 59 | 2018-19 | Introduction to Cryptography | Program Elective I | 1 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3715905 | 59 | 2018-19 | Cyber Crimes, Ethics and Laws | Program Elective II | 1 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3715906 | 59 | 2018-19 | Cyber Security: Administration and Management | Program Elective II | 1 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3715907 | 59 | 2018-19 | Defense Programming in Python | Core II | 1 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3715908 | 59 | 2018-19 | Digital Forensic | Program Elective I | 1 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3715909 | 59 | 2018-19 | Intrusion Detection | Program Elective I | 1 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3715910 | 59 | 2018-19 | Secure Software Design and Enterprise Computing | Program Elective II | 1 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3700001 | 59 | 2018-19 | English for Research Paper Writing | Audit Course | 2 | 2 | 0 | 0 | 0 | 50 | 0 | 0 | 0 | 50 |
3700005 | 59 | 2018-19 | Constitution of India | Audit Course | 2 | 2 | 0 | 0 | 0 | 50 | 0 | 0 | 0 | 50 |
3720001 | 59 | 2018-19 | Mini Project with Seminar | Core | 2 | 0 | 0 | 4 | 2 | 0 | 0 | 100 | 0 | 100 |
3722323 | 59 | 2018-19 | Information Theory & Coding | Program Elective III | 2 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3725611 | 59 | 2018-19 | Steganography & Digital Watermarking | Program Elective III | 2 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3725902 | 59 | 2018-19 | Internetworking and security | Program Elective IV | 2 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3725903 | 59 | 2018-19 | Ethical Hacking | Program Elective IV | 2 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3725904 | 59 | 2018-19 | Web and Database Security | Program Elective III | 2 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3725905 | 59 | 2018-19 | Security Assessment and Risk Analysis | Program Elective IV | 2 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3725908 | 59 | 2018-19 | Malware Analysis | Core IV | 2 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3725910 | 59 | 2018-19 | Operating system and Host Security | Core III | 2 | 3 | 0 | 2 | 4 | 70 | 30 | 20 | 30 | 150 |
3730002 | 59 | 2018-19 | Internal Review 1 | Internal Review 1 | 3 | 0 | 0 | 4 | 2 | 0 | 0 | 100 | 0 | 100 |
3730003 | 59 | 2018-19 | Dissertation Phase I | Dissertation | 3 | 0 | 0 | 16 | 8 | 0 | 0 | 0 | 100 | 100 |
3730005 | 59 | 2018-19 | Business Analytics | Open Elective | 3 | 3 | 0 | 0 | 3 | 70 | 30 | 0 | 0 | 100 |
3730006 | 59 | 2018-19 | Industrial Safety | Open Elective | 3 | 3 | 0 | 0 | 3 | 70 | 30 | 0 | 0 | 100 |
3730007 | 59 | 2018-19 | Operation Research | Open Elective | 3 | 3 | 0 | 0 | 3 | 70 | 30 | 0 | 0 | 100 |
3735903 | 59 | 2018-19 | Advance Algorithms | Program Elective V | 3 | 3 | 0 | 0 | 3 | 70 | 30 | 0 | 0 | 100 |
3735904 | 59 | 2018-19 | Machine Learning | Program Elective V | 3 | 3 | 0 | 0 | 3 | 70 | 30 | 0 | 0 | 100 |
3735905 | 59 | 2018-19 | Mobile and Wireless Communication Security | Program Elective V | 3 | 3 | 0 | 0 | 3 | 70 | 30 | 0 | 0 | 100 |
3740001 | 59 | 2018-19 | Internal Review - 2 | Dissertation | 4 | 0 | 0 | 4 | 2 | 0 | 0 | 100 | 0 | 100 |
3740002 | 59 | 2018-19 | Dissertation Phase II | Dissertation | 4 | 0 | 0 | 28 | 14 | 0 | 0 | 0 | 100 | 100 |
Tokyo
Tokyo is the capital of Japan.