

B-TECH in Computer Science Engineering Cyber Security 9 38 at Siksha 'O' Anusandhan


Khordha, Odisha
.png&w=1920&q=75)
About the Specialization
What is Computer Science & Engineering (Cyber Security) [9, 38] at Siksha 'O' Anusandhan Khordha?
This Computer Science & Engineering (Cyber Security) program at Siksha ''''O'''' Anusandhan focuses on equipping students with deep knowledge and practical skills to combat evolving cyber threats. With a curriculum covering cryptography, network security, digital forensics, and ethical hacking, the program addresses the critical demand for skilled cybersecurity professionals in India''''s rapidly digitizing economy. It emphasizes both foundational computing principles and advanced defensive and offensive security techniques.
Who Should Apply?
This program is ideal for aspiring engineers with a strong aptitude for problem-solving and an interest in protecting digital assets. Fresh graduates from 10+2 with a science background seeking entry into the high-demand cybersecurity field will find this curriculum comprehensive. It also suits individuals passionate about ethical hacking, digital forensics, and network defense, offering a clear pathway to a specialized technical career in India''''s growing IT sector.
Why Choose This Course?
Graduates of this program can expect to pursue rewarding careers as Security Analysts, Cyber Forensics Experts, Penetration Testers, Security Architects, or Cyber Consultants in India. Entry-level salaries typically range from INR 4-7 LPA, with experienced professionals earning upwards of INR 15-25 LPA. The program aligns with industry certifications like CompTIA Security+, CEH, and CISSP, providing a strong foundation for professional growth in Indian cybersecurity firms, government agencies, and IT companies.

Student Success Practices
Foundation Stage
Master Programming & Data Structures Fundamentals- (Semester 1-2)
Dedicate significant time to understanding core programming concepts (C/Java) and data structures (arrays, linked lists, trees, graphs). Solve problems consistently on coding platforms. This forms the bedrock for all advanced cybersecurity algorithms and tools.
Tools & Resources
HackerRank, LeetCode, GeeksforGeeks, NPTEL courses on Data Structures
Career Connection
Strong fundamentals are crucial for developing secure software and understanding how exploits work, directly impacting future roles in secure coding and reverse engineering.
Build a Strong Mathematical & Logical Foundation- (Semester 1-2)
Focus on Discrete Mathematics and Engineering Mathematics. Cryptography and algorithm analysis heavily rely on these concepts. Participate in logic-building exercises and puzzles to sharpen analytical thinking.
Tools & Resources
Khan Academy, MIT OpenCourseWare for Discrete Mathematics, Competitive programming problems
Career Connection
Essential for understanding cryptographic algorithms, designing efficient security protocols, and analyzing the complexity of attacks.
Cultivate Early Cyber Awareness- (Semester 1-2)
Beyond academics, start exploring general cybersecurity news, basic concepts of network security, and privacy online. Follow reputable cybersecurity blogs and news outlets to build initial awareness of the landscape.
Tools & Resources
The Hacker News, Dark Reading, OWASP website for basics, Basic Linux commands
Career Connection
Develops an early interest and contextual understanding, which is vital for choosing specialization tracks and performing well in initial interviews.
Intermediate Stage
Hands-on Lab Practice & Tool Proficiency- (Semester 3-5)
Actively engage in all lab sessions for Operating Systems, Databases, Networks, and especially Cyber Security & Cryptography. Get comfortable with Linux, command-line tools, virtual machines (VirtualBox/VMware), and basic network utilities. Practice implementing algorithms taught in class.
Tools & Resources
Kali Linux, Wireshark, Nmap, VirtualBox, Official lab manuals, GitHub for open-source security tools
Career Connection
Practical skills are highly valued. Proficiency with industry-standard tools and environments directly translates to roles in security operations, network defense, and system administration.
Participate in CTFs & Security Challenges- (Semester 4-5)
Join Capture The Flag (CTF) competitions, online hackathons, and security challenges. These provide real-world problem-solving experience in areas like web exploitation, forensics, reverse engineering, and cryptography.
Tools & Resources
TryHackMe, Hack The Box, CTFTime.org, Local college cybersecurity clubs
Career Connection
Develops critical thinking under pressure, exposes students to various attack vectors, and builds a practical portfolio, highly attractive to recruiters for penetration testing and incident response roles.
Build a Project Portfolio & Network- (Semester 4-5)
Start working on small security-focused projects (e.g., a simple encryption tool, a network scanner, a secure web application). Attend industry webinars, workshops, and connect with professionals on LinkedIn. Explore internships.
Tools & Resources
GitHub, LinkedIn, Local cybersecurity meetups, Faculty guidance for project ideas
Career Connection
A strong project portfolio showcases applied skills, making candidates stand out in placements. Networking opens doors to mentorship and internship opportunities.
Advanced Stage
Specialization & Advanced Certifications- (Semester 6-7)
Deep dive into chosen elective areas (e.g., Cloud Security, Ethical Hacking, Malware Analysis). Pursue recognized industry certifications like CompTIA Security+, CEH (Certified Ethical Hacker), or entry-level SANS certifications to validate specialized skills.
Tools & Resources
Official certification study guides, Online training platforms (Cybrary, eLearnSecurity), Industry workshops
Career Connection
Certifications significantly boost employability and salary potential, especially for roles requiring specific expertise like cloud security architects or ethical hackers.
Capstone Project & Research- (Semester 6-8)
Engage deeply in major projects (Project I, II, III/Dissertation) with real-world cybersecurity challenges. Consider research opportunities under faculty mentorship, aiming for publications or presentations at student conferences.
Tools & Resources
Academic research papers (IEEE Xplore, ACM Digital Library), Faculty supervisors, Advanced security tools specific to the project
Career Connection
Demonstrates ability to undertake complex projects, conduct independent research, and contribute innovation, which is valuable for R&D roles, higher studies, or leadership positions.
Placement Preparedness & Interview Skills- (Semester 7-8)
Systematically prepare for interviews by practicing technical questions related to cybersecurity, operating systems, networking, and programming. Work on soft skills, group discussions, and mock interviews. Tailor resume and cover letter for target roles.
Tools & Resources
Career services cell, Online interview preparation platforms (InterviewBit), Mock interview sessions with peers/mentors
Career Connection
Directly prepares students for the competitive placement process, ensuring they can effectively articulate their skills and knowledge to potential employers in the Indian job market.
Program Structure and Curriculum
Eligibility:
- Candidates must have passed 10+2 or equivalent examination with Physics and Mathematics as compulsory subjects along with one of the following subjects: Chemistry / Computer Science / Information Technology / Biotechnology / Biology / Technical Vocational Subject / Engineering Graphics / Business Studies / Entrepreneurship. The candidate should have obtained at least 45% marks (40% in case of candidates belonging to reserved category) in the above subjects taken together. Additionally, a valid score in SAAT/JEE Main/SAT/OJEE is usually required.
Duration: 4 years (8 semesters)
Credits: 160 Credits
Assessment: Internal: 50%, External: 50%
Semester-wise Curriculum Table
Semester 1
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| BTBS1101 | Engineering Mathematics-I | Core | 4 | Differential Calculus, Integral Calculus, Ordinary Differential Equations, Partial Differential Equations, Vector Calculus |
| BTBS1102 | Engineering Physics | Core | 4 | Wave Optics, Quantum Mechanics, Solid State Physics, Lasers and Fiber Optics, Electromagnetic Theory |
| BTES1101 | Basic Electrical Engineering | Core | 3 | DC Circuits, AC Circuits, Transformers, Electrical Machines, Power Systems Basics |
| BTES1102 | Programming for Problem Solving | Core | 3 | Introduction to C Programming, Control Structures, Functions, Arrays and Pointers, Structures and Unions |
| BTHS1101 | English | Core | 2 | Communication Skills, Reading Comprehension, Writing Skills, Grammar and Vocabulary, Presentation Skills |
| BTES1103 | Basic Electrical Engineering Lab | Lab | 1 | Verification of Circuit Laws, Measurement of Electrical Quantities, Characteristics of Diodes/Transistors, Study of Electrical Machines, AC/DC Circuits Experiments |
| BTES1104 | Programming for Problem Solving Lab | Lab | 1 | C Programming Exercises, Conditional Statements and Loops, Functions and Recursion, Arrays and Strings, Pointers and Structures |
| BTBS1103 | Engineering Physics Lab | Lab | 1 | Experiments on Optics, Electricity and Magnetism, Semiconductor Devices, Lasers and Fiber Optics |
| BTES1105 | Engineering Graphics & Design | Lab | 2 | Orthographic Projections, Isometric Projections, Sectional Views, Development of Surfaces, Introduction to AutoCAD |
Semester 2
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| BTBS1201 | Engineering Mathematics-II | Core | 4 | Matrices, Vector Spaces, Eigenvalues and Eigenvectors, Laplace Transforms, Fourier Series |
| BTBS1202 | Engineering Chemistry | Core | 4 | Water Treatment, Electrochemistry, Corrosion, Polymers, Fuels and Combustion |
| BTES1201 | Basic Electronics Engineering | Core | 3 | Semiconductor Diodes, Transistors (BJT, FET), Amplifiers, Oscillators, Operational Amplifiers |
| BTES1202 | Data Structure & Algorithms | Core | 3 | Arrays and Linked Lists, Stacks and Queues, Trees and Graphs, Sorting Algorithms, Searching Algorithms |
| BTHS1201 | Environmental Science | Core | 2 | Ecosystems and Biodiversity, Environmental Pollution, Natural Resources, Waste Management, Environmental Policies |
| BTBS1203 | Engineering Chemistry Lab | Lab | 1 | Volumetric Analysis, pH-metry and Conductometry, Viscosity Measurement, Water Quality Testing, Instrumental Methods |
| BTES1203 | Basic Electronics Engineering Lab | Lab | 1 | Experiments with Diodes and Rectifiers, Transistor Characteristics, Amplifier Circuits, Oscillator Circuits, Logic Gates |
| BTES1204 | Data Structure & Algorithms Lab | Lab | 1 | Implementation of Arrays and Linked Lists, Stack and Queue Operations, Tree Traversal Algorithms, Graph Algorithms, Sorting and Searching Implementations |
| BTHS1202 | Language Lab | Lab | 1 | Phonetics and Pronunciation, Group Discussion Techniques, Public Speaking, Interview Skills, Presentation Techniques |
Semester 3
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| BTCS2301 | Discrete Mathematics | Core | 3 | Mathematical Logic, Set Theory and Relations, Functions and Counting, Graph Theory, Algebraic Structures |
| BTCS2302 | Computer Organization & Architecture | Core | 3 | Digital Logic Circuits, CPU Design and Instruction Set, Memory Hierarchy, Input/Output Organization, Pipelining and Parallelism |
| BTCS2303 | Operating System | Core | 3 | Process Management, CPU Scheduling, Memory Management, File Systems, Deadlocks and Concurrency |
| BTCS2304 | Object Oriented Programming with Java | Core | 3 | OOP Concepts (Classes, Objects, Inheritance), Polymorphism and Abstraction, Exception Handling, Multithreading, GUI Programming (Swing/JavaFX) |
| BTCS2305 | Database Management System | Core | 3 | Relational Model and SQL, ER Model and Schema Design, Normalization, Transaction Management, Concurrency Control and Recovery |
| BTES2301 | Analog & Digital Electronics | Core | 3 | Diode Circuits and Transistors, Operational Amplifiers, Logic Gates and Boolean Algebra, Combinational Circuits, Sequential Circuits |
| BTCS2306 | Object Oriented Programming with Java Lab | Lab | 1 | Java Programming Exercises, Implementation of OOP Concepts, File I/O and Exception Handling, Multithreading Applications, GUI Development |
| BTCS2307 | Database Management System Lab | Lab | 1 | SQL Queries and Commands, Database Schema Design, PL/SQL Programming, Joins and Subqueries, Trigger and View Implementation |
| BTCS2308 | Operating System Lab | Lab | 1 | Shell Programming, Process Management in Linux, Memory Allocation Techniques, Inter-process Communication, Thread Synchronization |
| BTCS2309 | Industrial Orientation (CSE) | Project/Seminar | 1 | Introduction to IT Industry Practices, Software Development Life Cycle, Emerging Technologies in CSE, Professional Ethics, Career Pathways |
Semester 4
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| BTCS2401 | Design & Analysis of Algorithms | Core | 3 | Algorithm Analysis and Asymptotic Notations, Divide and Conquer Algorithms, Dynamic Programming, Greedy Algorithms, Graph Algorithms |
| BTCS2402 | Microprocessors & Microcontrollers | Core | 3 | 8085/8086 Microprocessor Architecture, Assembly Language Programming, Interrupts and I/O Interfacing, Memory Interfacing, Introduction to Microcontrollers |
| BTCS2403 | Theory of Computation | Core | 3 | Finite Automata, Regular Expressions and Languages, Context-Free Grammars, Pushdown Automata, Turing Machines and Undecidability |
| BTCS2404 | Computer Networks | Core | 3 | OSI and TCP/IP Models, Network Topologies and Devices, IP Addressing and Routing, Transport Layer Protocols (TCP/UDP), Application Layer Protocols (HTTP, DNS, FTP) |
| BTCS2405 | Software Engineering | Core | 3 | Software Development Life Cycle Models, Requirements Engineering, Software Design Principles, Software Testing Techniques, Software Project Management |
| BTCS2406 | Cyber Security & Cryptography | Specialization Core | 3 | Introduction to Cyber Security, Classical Cryptography, Symmetric Key Cryptography (AES, DES), Asymmetric Key Cryptography (RSA), Hash Functions and Digital Signatures |
| BTCS2407 | Computer Networks Lab | Lab | 1 | Network Configuration and Troubleshooting, Socket Programming, Network Traffic Analysis with Wireshark, Routing Protocols Implementation, Client-Server Application Development |
| BTCS2408 | Microprocessors & Microcontrollers Lab | Lab | 1 | Assembly Language Programming (8085/8086), Interfacing Peripherals (LED, LCD), Timer/Counter Programming, Serial Communication, Microcontroller Experiments |
| BTCS2409 | Cyber Security & Cryptography Lab | Specialization Lab | 1 | Implementation of Cryptographic Algorithms, Network Security Tools Usage, Vulnerability Scanning with Nmap, Packet Sniffing and Analysis, Password Cracking Techniques |
Semester 5
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| BTCS3501 | Artificial Intelligence | Core | 3 | Introduction to AI and Intelligent Agents, Search Algorithms (informed/uninformed), Knowledge Representation and Reasoning, Introduction to Machine Learning, Natural Language Processing Basics |
| BTCS3502 | Professional Elective – I | Elective | 3 | Options include: Computer Graphics (Graphics Primitives, Transformations, Rendering); Data Warehousing & Data Mining (DW Concepts, OLAP, Classification); Distributed Systems (Architecture, Communication, Consistency); Big Data Analytics (Hadoop, Spark, NoSQL). |
| BTCS3503 | Professional Elective – II | Elective | 3 | Options include: Advanced DBMS (Query Optimization, Distributed Databases, NoSQL); Human Computer Interaction (HCI Principles, UI Design, Usability); Cloud Computing (Cloud Architecture, Virtualization, Cloud Security); Internet of Things (IoT Architecture, Protocols, Security). |
| BTCS3504 | Open Elective – I | Open Elective | 3 | |
| BTCS3505 | Information Security | Specialization Core | 3 | Security Models and Principles, Access Control Mechanisms, Authentication and Authorization, Vulnerabilities and Threats, Security Policies and Standards |
| BTCS3506 | Digital Forensics | Specialization Core | 3 | Forensic Investigation Process, Evidence Collection and Preservation, Data Acquisition and Analysis, File System Forensics, Network and Mobile Forensics |
| BTCS3507 | Information Security Lab | Specialization Lab | 1 | Access Control Implementation, Authentication Systems Configuration, Security Tools Usage, Vulnerability Assessment, Intrusion Detection Basics |
| BTCS3508 | Digital Forensics Lab | Specialization Lab | 1 | Forensic Tool (e.g., Autopsy, FTK Imager) Usage, Evidence Acquisition and Imaging, File System Analysis, Data Recovery Techniques, Digital Crime Scene Investigation |
| BTCS3509 | Web & Mobile Application Development Lab | Lab | 2 | Front-end Development (HTML, CSS, JavaScript), Back-end Development (Node.js/Django/PHP), Database Integration, RESTful APIs, Mobile App Development Basics (Android/iOS) |
Semester 6
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| BTCS3601 | Professional Elective – III | Elective | 3 | Options include: Blockchain Technology (Fundamentals, Cryptocurrencies, Smart Contracts); High Performance Computing (Parallel Architectures, MPI, OpenMP); Machine Learning (Supervised/Unsupervised Learning, Deep Learning); Pattern Recognition (Statistical PR, Neural Networks, SVM). |
| BTCS3602 | Professional Elective – IV | Elective | 3 | Options include: Ad hoc & Sensor Networks (MANETs, WSNs, Routing); Parallel & Distributed Algorithms (Design, Graph Algorithms); Natural Language Processing (NLP Fundamentals, Parsing, Sentiment Analysis); Computer Vision (Image Processing, Object Recognition, Deep Learning for Vision). |
| BTCS3603 | Open Elective – II | Open Elective | 3 | |
| BTCS3604 | Cyber Law & Ethics | Specialization Core | 3 | Legal Aspects of Cyber Security, Information Technology Act, Data Privacy Laws (e.g., GDPR, India''''s DPDP Bill), Intellectual Property Rights in Digital World, Ethical Hacking and Professional Ethics |
| BTCS3605 | Network Security | Specialization Core | 3 | Network Security Threats and Attacks, Firewalls and Intrusion Detection Systems, Virtual Private Networks (VPNs), Wireless Network Security (Wi-Fi, Bluetooth), Email and Web Security |
| BTCS3606 | Malware Analysis | Specialization Core | 3 | Malware Types and Characteristics, Static Malware Analysis, Dynamic Malware Analysis, Reverse Engineering Fundamentals, Anti-Malware Techniques |
| BTCS3607 | Network Security Lab | Specialization Lab | 1 | Firewall Configuration and Rules, IDS/IPS Setup and Monitoring, VPN Implementation, Wireless Network Security Configuration, Penetration Testing Tools (e.g., Metasploit) |
| BTCS3608 | Malware Analysis Lab | Specialization Lab | 1 | Sandbox Environments for Malware Execution, Disassemblers and Debuggers (e.g., IDA Pro, x64dbg), Static Analysis Tools, Behavioral Analysis of Malware, Malware Signature Generation |
| BTCS3609 | Project – I | Project | 2 | Problem Identification and Literature Review, Project Planning and Design, Basic Implementation, Documentation and Reporting, Presentation of Work |
Semester 7
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| BTCS4701 | Professional Elective – V | Elective | 3 | Options include: Image Processing (Enhancement, Restoration, Compression); Soft Computing (Fuzzy Logic, Neural Networks, Genetic Algorithms); Quantum Computing (Quantum Gates, Algorithms, Cryptography); Robotics (Kinematics, Dynamics, Control). |
| BTCS4702 | Professional Elective – VI | Elective | 3 | Options include: Operations Research (Linear Programming, Queuing Theory); Business Analytics (Data Visualization, Predictive Modeling); Deep Learning (CNN, RNN, GANs); Speech and Audio Processing (Speech Recognition, Audio Features). |
| BTCS4703 | Open Elective – III | Open Elective | 3 | |
| BTCS4704 | Cloud Security | Specialization Core | 3 | Cloud Computing Architectures, Cloud Security Challenges and Solutions, Data Security and Privacy in Cloud, Identity and Access Management (IAM) in Cloud, Incident Response and Forensics in Cloud |
| BTCS4705 | Ethical Hacking & Penetration Testing | Specialization Core | 3 | Hacking Methodologies (Reconnaissance, Scanning), Vulnerability Exploitation, Post-Exploitation Techniques, Web Application Hacking, Mobile Application Hacking |
| BTCS4706 | Intrusion Detection & Prevention Systems | Specialization Core | 3 | IDS/IPS Architectures and Types, Signature-based Detection, Anomaly-based Detection, Evasion Techniques, Log Analysis and SIEM |
| BTCS4707 | Cloud Security Lab | Specialization Lab | 1 | Cloud Security Configuration (AWS/Azure/GCP), IAM Policy Implementation, Data Encryption in Cloud, Cloud Logging and Monitoring, Incident Response Simulation in Cloud |
| BTCS4708 | Ethical Hacking & Penetration Testing Lab | Specialization Lab | 1 | Network Scanning with Nmap, Vulnerability Assessment with Nessus/OpenVAS, Exploitation with Metasploit, Web Penetration Testing with Burp Suite, SQL Injection and Cross-Site Scripting |
| BTCS4709 | Project – II | Project | 2 | Advanced Project Design, Implementation of Complex Modules, Testing and Debugging, Technical Report Writing, Oral Presentation and Demonstration |
| BTCS4710 | Industrial Training / Internship | Practical/Training | 2 | Practical Industry Exposure, Application of Academic Knowledge, Skill Development in a Professional Environment, Problem Solving in Real-world Scenarios, Report Submission and Viva-voce |
Semester 8
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| BTCS4801 | Professional Elective – VII | Elective | 3 | Options include: Cryptographic Engineering (Secure Hardware, Side Channel Attacks); Digital Image Security (Steganography, Watermarking); Cyber Physical Systems Security (SCADA, ICS Security); Vehicle Cyber Security (In-Vehicle Networks, ECU Security). |
| BTCS4802 | Professional Elective – VIII | Elective | 3 | Options include: Operations Management (Production Planning, Supply Chain); Entrepreneurship & Start-up Management (Business Plan, Funding); Financial Engineering (Financial Markets, Risk Management); Digital Marketing (SEO, SEM, Social Media). |
| BTCS4803 | Open Elective – IV | Open Elective | 3 | |
| BTCS4804 | Wireless and Mobile Security | Specialization Core | 3 | Mobile Operating System Security, Mobile Application Security, Wireless Network Attacks (GSM, 4G/5G), Mobile Device Management (MDM), IoT Device Security |
| BTCS4805 | Secure Software Development | Specialization Core | 3 | Secure Coding Principles, OWASP Top 10, Threat Modeling, Static and Dynamic Code Analysis, Secure Development Life Cycle (SDLC) |
| BTCS4806 | Project – III / Dissertation | Project | 8 | Independent Research and Development, Comprehensive System Design and Implementation, Rigorous Testing and Evaluation, Professional Dissertation Writing, Final Presentation and Viva-voce |




