

BCA in Cyber Security at Manipal University Jaipur


Jaipur, Rajasthan
.png&w=1920&q=75)
About the Specialization
What is Cyber Security at Manipal University Jaipur Jaipur?
This Cyber Security specialization program at Manipal University Jaipur focuses on equipping students with essential skills to combat evolving digital threats, critical for India''''s rapidly expanding digital economy. The curriculum is meticulously designed to cover both foundational computing principles and advanced cyber security methodologies, preparing graduates for complex roles in safeguarding digital assets. It emphasizes a practical, hands-on approach to incident response, ethical hacking, and secure system design.
Who Should Apply?
This program is ideal for fresh graduates with a background in 10+2 (Science or Commerce with Math/CS) seeking entry into the high-demand field of cyber security. It also caters to individuals passionate about digital defense, ethical hacking, and protecting online infrastructure. Aspiring security analysts, penetration testers, forensic specialists, and those keen on pursuing advanced studies in information security will find this program particularly beneficial.
Why Choose This Course?
Graduates of this program can expect promising career paths in India as Cyber Security Analysts, Ethical Hackers, Security Consultants, Forensic Investigators, and SOC Analysts. Entry-level salaries typically range from INR 4-7 lakhs per annum, with experienced professionals commanding significantly higher packages. The program aligns with professional certifications like CEH, CompTIA Security+, and CISSP, fostering growth trajectories in both Indian startups and multinational corporations operating in India.

Student Success Practices
Foundation Stage
Master Programming Fundamentals- (Semester 1-2)
Focus on building a strong foundation in C and C++ programming. Regularly practice coding challenges on platforms like HackerRank and LeetCode to solidify logic and problem-solving skills.
Tools & Resources
HackerRank, LeetCode, GeeksforGeeks, Sololearn
Career Connection
Strong programming skills are crucial for understanding system vulnerabilities and developing secure applications, directly aiding in placement for developer and entry-level security roles.
Understand Digital Logic & Computer Architecture- (Semester 1-2)
Grasp the core concepts of digital electronics and computer organization. This foundational knowledge is critical for understanding how hardware vulnerabilities arise and how operating systems function securely.
Tools & Resources
NPTEL courses, logic simulators (e.g., Logisim), CPU architecture emulators
Career Connection
Essential for roles in embedded security, hardware security, and low-level system defense, offering a deeper understanding beyond software.
Engage in Peer Learning & Communication- (Semester 1-2)
Form study groups to discuss complex topics and collaborate on lab assignments. Actively participate in communication skill-building exercises to enhance presentation and technical writing abilities.
Tools & Resources
Group project work, college debate clubs, public speaking workshops
Career Connection
Effective communication and teamwork are highly valued in security incident response teams and client-facing roles, improving employability.
Intermediate Stage
Hands-on with Network & OS Security- (Semester 3-4)
Deep dive into operating system concepts (Linux particularly) and network security principles. Set up virtual labs using tools like VirtualBox/VMware to experiment with firewalls, intrusion detection systems, and network attacks in a controlled environment.
Tools & Resources
VirtualBox, VMware, Kali Linux, Wireshark, Nmap, Snort
Career Connection
Direct application in roles like Network Security Engineer, SOC Analyst, and System Administrator, crucial for practical cyber defense.
Explore Ethical Hacking & Forensics- (Semester 4-5)
Actively engage in ethical hacking labs and penetration testing exercises. Participate in Capture The Flag (CTF) competitions to gain practical experience in identifying and exploiting vulnerabilities and performing digital forensics.
Tools & Resources
Kali Linux, Metasploit, OWASP ZAP, Autopsy, CTF platforms (e.g., TryHackMe, Hack The Box)
Career Connection
Directly prepares students for roles as Ethical Hackers, Penetration Testers, and Cyber Forensics Investigators, which are high-demand positions.
Build a Specialization Portfolio- (Semester 3-5)
Work on small projects related to cyber security, such as developing a secure application, implementing a cryptographic algorithm, or analyzing a malware sample. Document these projects thoroughly on GitHub.
Tools & Resources
GitHub, personal cloud labs, specific security tools
Career Connection
A strong project portfolio demonstrates practical skills to potential employers, significantly boosting internship and placement chances.
Advanced Stage
Undertake a Major Industry Project- (Semester 6)
Collaborate with faculty or industry mentors on a significant cyber security project, focusing on real-world problems like threat intelligence, cloud security, or mobile security. Aim for publication or presentation.
Tools & Resources
Research papers, industry standards (e.g., NIST), advanced security frameworks
Career Connection
Showcases advanced problem-solving and research capabilities, critical for high-level security roles and postgraduate studies.
Prepare for Certifications & Placements- (Semester 6)
Begin preparing for industry-recognized certifications like CompTIA Security+, CEH, or AWS Certified Security - Specialty. Attend placement drives, practice technical interviews, and refine soft skills.
Tools & Resources
Certification study guides, online practice tests, MUJ''''s placement cell resources, mock interviews
Career Connection
Certifications validate expertise, enhancing employability and opening doors to specialized roles and better salary packages in Indian companies.
Network with Professionals & Alumni- (Semester 6)
Actively participate in professional security conferences, workshops, and alumni meetups. Leverage LinkedIn to connect with industry experts and seek mentorship opportunities.
Tools & Resources
LinkedIn, industry events, alumni network platforms
Career Connection
Professional networking can lead to valuable internship offers, job referrals, and insights into current industry trends, crucial for career launch and growth in the Indian market.
Program Structure and Curriculum
Eligibility:
- 10+2 with minimum 50% marks, with Mathematics/Computer Science/Information Practice/Statistics/Engineering Drawing/Business Mathematics as one of the subjects.
Duration: 3 years (6 semesters)
Credits: 140 Credits
Assessment: Internal: 50%, External: 50%
Semester-wise Curriculum Table
Semester 1
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| BCAC1101 | Programming Fundamentals using C | Core | 4 | Introduction to C Programming, Operators and Expressions, Control Structures, Functions and Pointers, Arrays and Strings, Structures, Unions and File Handling |
| BCAC1102 | Digital Electronics | Core | 3 | Number Systems, Boolean Algebra and Logic Gates, Combinational Circuits, Sequential Circuits, Memory Devices |
| BCAC1103 | Computer Organization & Architecture | Core | 3 | Basic Computer Organization, Data Representation, CPU Organization, Control Unit Design, Memory Organization, Input/Output Organization |
| BCAC1104 | Discrete Mathematics | Core | 4 | Set Theory and Logic, Relations and Functions, Permutations and Combinations, Graph Theory, Trees, Algebraic Structures |
| BCAC1105 | Professional Communication | Core | 2 | Communication Process, Oral Communication, Written Communication, Non-Verbal Communication, Presentation Skills |
| BCAC1121 | Programming Fundamentals using C Lab | Lab | 2 | C Programming Exercises, Control Flow Implementation, Functions and Pointers Practice, Array and String Manipulation, File Operations in C |
| BCAC1122 | Digital Electronics Lab | Lab | 1 | Logic Gates Implementation, Boolean Algebra Verification, Combinational Circuit Design, Sequential Circuit Design |
| BCAC1123 | Communication Skills Lab | Lab | 1 | Listening and Speaking Practice, Reading Comprehension, Writing Skills Enhancement, Group Discussion and Presentation |
| BCAC1124 | Computer Workshop and PC Hardware Lab | Lab | 1 | PC Assembly and Disassembly, Operating System Installation, Hardware Troubleshooting, Basic Network Configuration |
Semester 2
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| BCAC1201 | Object Oriented Programming using C++ | Core | 4 | OOP Concepts, Classes and Objects, Inheritance and Polymorphism, Virtual Functions, Exception Handling, Templates and STL |
| BCAC1202 | Operating System Concepts | Core | 3 | OS Overview and Types, Process Management and Scheduling, Deadlocks, Memory Management, Virtual Memory, File Systems and I/O Management |
| BCAC1203 | Data Structures | Core | 4 | Arrays and Linked Lists, Stacks and Queues, Trees and Binary Search Trees, Graphs and Graph Traversal, Sorting and Searching Algorithms, Hashing |
| BCAC1204 | Database Management Systems | Core | 3 | DBMS Architecture, ER Model, Relational Model and Algebra, SQL Queries and Constraints, Normalization, Transaction Management and Concurrency Control |
| BCAC1205 | Fundamentals of Network Security | Core | 3 | Network Basics and Models, Types of Security Attacks, Basic Cryptographic Principles, Network Protocols and Security, Firewalls and Intrusion Detection Systems |
| BCAC1221 | Object Oriented Programming using C++ Lab | Lab | 2 | C++ Object-Oriented Programming Exercises, Class and Object Implementation, Inheritance and Polymorphism Practice, Exception Handling in C++, STL Usage |
| BCAC1222 | Data Structures Lab | Lab | 2 | Implementation of Linked Lists, Stacks, Queues, Tree and Graph Operations, Sorting and Searching Algorithms, Hashing Techniques |
| BCAC1223 | Database Management Systems Lab | Lab | 1 | SQL Query Practice, Database Schema Design, PL/SQL Programming, Data Definition and Manipulation |
| BCAC1224 | Network Security Lab | Lab | 1 | Network Scanning Tools, Firewall Configuration, Cryptography Tools Usage, Network Traffic Analysis |
Semester 3
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| BCAC2301 | Web Technologies | Core | 3 | HTML and CSS, JavaScript and DOM, Web Servers (Apache/Nginx), PHP Programming, Database Connectivity (MySQL), AJAX |
| BCAC2302 | Cyber Laws and Ethics | Core | 3 | Information Technology Act 2000/2008, Cyber Crimes and Penalties, Digital Evidence, Intellectual Property Rights, Privacy and Data Protection, Ethics in Computing |
| BCAC2303 | Cryptography & Network Security | Core | 4 | Symmetric Key Cryptography (DES, AES), Asymmetric Key Cryptography (RSA), Hash Functions and Digital Signatures, Digital Certificates and PKI, IPSec and SSL/TLS, Firewalls and VPNs |
| BCAC2304 | Linux Environment | Core | 3 | Linux Operating System Basics, Shell Scripting, File System Management, User and Group Management, Process Management, Network Configuration in Linux |
| BCAC2331 | Internet of Things | Elective | 3 | IoT Architecture, Sensors and Actuators, IoT Communication Protocols (MQTT, CoAP), IoT Data Analytics, IoT Security and Privacy |
| BCAC2332 | Advanced Python Programming | Elective | 3 | Advanced Data Structures in Python, Object-Oriented Programming in Python, File Handling and Regular Expressions, Web Scraping with Python, GUI Programming (Tkinter/PyQt), Database Connectivity |
| BCAC2333 | Blockchain Fundamentals | Elective | 3 | Blockchain Architecture, Cryptographic Primitives in Blockchain, Consensus Mechanisms (PoW, PoS), Smart Contracts, Decentralized Applications (DApps), Types of Blockchains (Public, Private) |
| BCAC2321 | Web Technologies Lab | Lab | 2 | HTML and CSS Design, Client-Side Scripting with JavaScript, Server-Side Scripting with PHP, Database Integration for Web Applications |
| BCAC2322 | Cyber Laws & Ethics Lab | Lab | 1 | Cyber Law Case Studies, Legal Research on Digital Issues, Ethical Dilemma Discussions, Reporting Cyber Crimes |
| BCAC2323 | Cryptography & Network Security Lab | Lab | 2 | Implementation of Cryptographic Algorithms, Network Security Tool Usage (Nmap, Wireshark), Firewall and VPN Configuration, Digital Certificate Management |
| BCAC2324 | Linux Environment Lab | Lab | 1 | Linux Command Line Practice, Shell Scripting Development, User and Process Management, Network Services Configuration |
Semester 4
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| BCAC2401 | Advanced Data Structures | Core | 4 | Heaps and Priority Queues, AVL Trees and Red-Black Trees, B-Trees and B+ Trees, Advanced Hashing Techniques, Segment Trees and Fenwick Trees, Disjoint Set Union |
| BCAC2402 | Ethical Hacking & Penetration Testing | Core | 4 | Information Gathering (Reconnaissance), Vulnerability Scanning and Analysis, System Exploitation (Metasploit), Web Application Hacking (OWASP Top 10), Wireless Network Hacking, Post-Exploitation Techniques |
| BCAC2403 | Cloud Computing & Security | Core | 3 | Cloud Computing Models (IaaS, PaaS, SaaS), Virtualization Technologies, Cloud Security Architecture, Data Privacy and Compliance in Cloud, Identity and Access Management (IAM), Cloud Security Best Practices |
| BCAC2404 | Artificial Intelligence | Core | 3 | Introduction to AI Agents, Problem Solving and Search Algorithms, Knowledge Representation and Reasoning, Introduction to Machine Learning, Expert Systems, Natural Language Processing Basics |
| BCAC2431 | Data Mining & Warehousing | Elective | 3 | Data Warehousing Concepts, OLAP Operations, Data Preprocessing, Association Rule Mining, Classification Algorithms, Clustering Techniques |
| BCAC2432 | Machine Learning Fundamentals | Elective | 3 | Supervised Learning (Regression, Classification), Unsupervised Learning (Clustering), Model Evaluation Metrics, Neural Networks Basics, Introduction to Deep Learning |
| BCAC2433 | Digital Marketing | Elective | 3 | Search Engine Optimization (SEO), Search Engine Marketing (SEM), Social Media Marketing, Content Marketing, Email Marketing, Web Analytics |
| BCAC2421 | Advanced Data Structures Lab | Lab | 2 | Implementation of Heaps and Trees, Graph Algorithms Practice, Advanced Sorting Techniques, Problem Solving with Complex Data Structures |
| BCAC2422 | Ethical Hacking & Penetration Testing Lab | Lab | 2 | Kali Linux Tool Usage, Vulnerability Scanning with Nmap/OpenVAS, Exploitation with Metasploit, Web Application Penetration Testing |
| BCAC2423 | Cloud Computing & Security Lab | Lab | 1 | AWS/Azure Services Exploration, Virtual Machine Setup and Configuration, Cloud Storage and Networking Security, IAM Role Management |
| BCAC2424 | Artificial Intelligence Lab | Lab | 1 | AI Algorithm Implementation (Python), Logic Programming (Prolog), Basic Machine Learning Model Training, Expert System Development |
Semester 5
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| BCAC3501 | Big Data Security & Privacy | Core | 4 | Big Data Technologies (Hadoop, Spark), Hadoop Security Features, Data Anonymization Techniques, Privacy Preserving Data Mining, Big Data Governance and Compliance, Security in Distributed Systems |
| BCAC3502 | Cyber Forensics & Incident Response | Core | 4 | Digital Evidence Acquisition, Forensic Tools and Techniques, Operating System Forensics, Network Forensics, Incident Handling Process, Post-Incident Analysis and Reporting |
| BCAC3503 | Intrusion Detection & Prevention System | Core | 3 | IDS/IPS Architectures, Signature-Based Detection, Anomaly-Based Detection, Honeypots and Honeynets, Alert Correlation and Analysis, Deployment and Management of IDS/IPS |
| BCAC3504 | Mobile Application Security | Core | 3 | Android/iOS Security Architecture, OWASP Mobile Top 10 Vulnerabilities, Mobile Malware Analysis, Reverse Engineering Mobile Apps, Secure Coding Practices for Mobile, Mobile Device Management (MDM) |
| BCAC3531 | Software Engineering | Elective | 3 | Software Development Life Cycle (SDLC), Requirements Engineering, Software Design Principles, Software Testing and Quality Assurance, Software Project Management, Agile Methodologies |
| BCAC3532 | Game Development | Elective | 3 | Game Design Principles, Game Engines (Unity/Unreal), Game Graphics and Animation, Game Physics, AI in Games, Monetization Strategies |
| BCAC3533 | Internet Programming | Elective | 3 | Java Servlets and JSP, JDBC and Database Connectivity, Spring Framework Basics, RESTful Web Services, Client-Server Architecture, Web Security Fundamentals |
| BCAC3521 | Big Data Security & Privacy Lab | Lab | 2 | Hadoop Security Configuration, Data Anonymization Tool Usage, Privacy-Preserving Data Processing, Security Policies in Big Data Ecosystems |
| BCAC3522 | Cyber Forensics & Incident Response Lab | Lab | 2 | Forensic Imaging and Data Recovery, Log Analysis for Incident Detection, Memory Forensics, Incident Response Playbook Execution |
| BCAC3523 | Intrusion Detection & Prevention System Lab | Lab | 1 | Snort/Suricata Configuration, SIEM Integration and Alert Monitoring, Honeypot Deployment, Traffic Analysis for Intrusion Detection |
| BCAC3524 | Mobile Application Security Lab | Lab | 1 | Mobile App Vulnerability Assessment, Android Studio/Xcode Security Features, Mobile Penetration Testing Tools, Secure Mobile App Development Practices |
| BCAC3525 | Project Stage – I | Project | 4 | Problem Identification and Formulation, Literature Review, Project Planning and Scheduling, Initial Design and Prototyping, Feasibility Study |
Semester 6
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| BCAC3601 | Information Security Audit | Core | 4 | Information Security Standards (ISO 27001), Audit Planning and Methodologies, Risk Assessment and Management, Vulnerability Management, Compliance Audits, Security Audit Reporting |
| BCAC3602 | Security Operations Center (SOC) | Core | 3 | SOC Models and Functions, Security Information and Event Management (SIEM), Threat Hunting, Security Playbooks, Security Automation and Orchestration, Incident Response in SOC |
| BCAC3603 | Threat Intelligence & Malware Analysis | Core | 4 | Cyber Threat Landscape, Indicators of Compromise (IOCs), Malware Types and Lifecycle, Static and Dynamic Malware Analysis, Reverse Engineering Malware, Threat Intelligence Platforms |
| BCAC3631 | Human Computer Interaction | Elective | 3 | Usability and User Experience (UX), Interface Design Principles, Interaction Styles, User Centered Design, HCI Evaluation Techniques, Accessibility in Design |
| BCAC3632 | Bioinformatics | Elective | 3 | Biological Databases, Sequence Alignment Algorithms, Phylogenetic Analysis, Proteomics, Drug Discovery using Bioinformatics, Genomic Data Analysis |
| BCAC3633 | Digital Image Processing | Elective | 3 | Image Transforms (Fourier, Wavelet), Image Enhancement, Image Restoration, Image Compression, Image Segmentation, Feature Extraction |
| BCAC3621 | Information Security Audit Lab | Lab | 2 | Security Audit Tools Usage, Compliance Checklists, Vulnerability Scanning and Assessment, Audit Reporting and Recommendations |
| BCAC3622 | Threat Intelligence & Malware Analysis Lab | Lab | 2 | Malware Sandboxing, Disassembly and Debugging Malware, IOC Extraction and Analysis, Threat Feed Integration and Analysis |
| BCAC3623 | Major Project | Project | 6 | Project Implementation and Development, Testing and Debugging, Documentation and Report Writing, Project Presentation and Demonstration, Deployment and Evaluation |

