SRM IST-image

B-SC in Cyber Security at SRM Institute of Science and Technology

SRM Institute of Science and Technology, a premier deemed university established in 1985 in Chennai, Tamil Nadu, is renowned for academic excellence. Accredited with an A++ grade by NAAC, it offers diverse undergraduate, postgraduate, and doctoral programs, including strong engineering and management courses. The institute attracts over 52,000 students and consistently achieves high placements, with a notable highest package of INR 52 LPA for the 2023-24 batch.

READ MORE
location

Chengalpattu, Tamil Nadu

Compare colleges

About the Specialization

What is Cyber Security at SRM Institute of Science and Technology Chengalpattu?

This B.Sc. Cyber Security program at SRM Institute of Science and Technology focuses on equipping students with essential knowledge and practical skills to combat evolving cyber threats. With India''''s rapid digital transformation, there''''s immense demand for cybersecurity professionals. The program emphasizes a blend of theoretical foundations and hands-on training, preparing graduates for real-world challenges in national and global contexts.

Who Should Apply?

This program is ideal for recent 10+2 graduates with a strong interest in computer science and problem-solving, aiming for a career in cybersecurity. It also suits individuals looking to acquire specialized skills for entry-level roles in network security, ethical hacking, or digital forensics. Prerequisite backgrounds in basic programming and logical reasoning are beneficial for success.

Why Choose This Course?

Graduates of this program can expect to pursue rewarding India-specific career paths such as Security Analyst, Ethical Hacker, Cyber Forensic Investigator, or Network Security Administrator. Entry-level salaries typically range from INR 3-6 lakhs annually, with significant growth potential up to INR 10-20 lakhs for experienced professionals. The curriculum aligns with industry certifications like CompTIA Security+ and CEH.

Student Success Practices

Foundation Stage

Master Core Programming & Logic- (Semester 1-2)

Dedicate significant time to understanding C/C++ programming fundamentals, data structures, and discrete mathematics. Practice coding problems daily on platforms like HackerRank and GeeksforGeeks to build a strong logical foundation, which is critical for cybersecurity problem-solving.

Tools & Resources

HackerRank, GeeksforGeeks, Visual Studio Code

Career Connection

Strong programming and logical skills are the bedrock for understanding vulnerabilities, developing secure code, and analyzing malware, directly impacting roles in secure development and analysis.

Build a Linux Command Line Proficiency- (Semester 1-2)

Familiarize yourself with Linux/Unix operating systems and their command-line interface. Install a Linux distribution (e.g., Ubuntu, Kali Linux) on a virtual machine and spend time navigating, managing files, and executing commands, as cybersecurity tools often run on Linux.

Tools & Resources

VirtualBox, Ubuntu/Kali Linux, Linux Command Line Tutorials

Career Connection

Most cybersecurity tools and environments are Linux-based. Proficiency here is essential for penetration testing, forensic analysis, and server management roles.

Engage in Early Problem-Solving Challenges- (Semester 2)

Participate in beginner-friendly Capture The Flag (CTF) competitions or online security challenges. This fosters practical application of theoretical knowledge and introduces students to common vulnerabilities and attack techniques in a safe, learning-oriented environment.

Tools & Resources

TryHackMe, Hack The Box (Academy), CTFlearn

Career Connection

Early exposure to security challenges hones critical thinking and problem-solving skills, highly valued in ethical hacking and incident response roles.

Intermediate Stage

Deep Dive into Networking Fundamentals- (Semester 3-4)

Beyond classroom learning, explore advanced networking concepts. Set up small home networks, experiment with routing protocols, and use tools like Wireshark to analyze network traffic. Understand how data flows and potential points of interception.

Tools & Resources

Cisco Packet Tracer, Wireshark, Network+ certification study guides

Career Connection

A profound understanding of computer networks is indispensable for network security, intrusion detection, and perimeter defense roles.

Hands-on with Ethical Hacking Tools- (Semester 4-5)

Actively use ethical hacking tools like Nmap, Metasploit, and Burp Suite on isolated lab environments. Practice vulnerability scanning, exploitation, and web application testing. Focus on understanding the ''''why'''' behind each tool''''s function.

Tools & Resources

Kali Linux (pre-installed tools), OWASP Juice Shop, VulnHub VMs

Career Connection

Direct experience with these tools is crucial for roles like Penetration Tester, Vulnerability Assessor, and Security Consultant, making candidates job-ready.

Contribute to Open-Source Security Projects- (Semester 4-5)

Seek out open-source cybersecurity projects on GitHub. Start with documentation, bug reports, or small code contributions. This builds practical development experience, exposes you to real-world security codebases, and helps in networking with developers.

Tools & Resources

GitHub, OWASP Projects, Security-focused communities

Career Connection

Demonstrating open-source contributions showcases initiative, coding ability, and collaboration skills, highly attractive to tech recruiters.

Advanced Stage

Undertake Industry-Relevant Projects- (Semester 5-6)

Focus your final year projects on complex, real-world cybersecurity problems, potentially in collaboration with industry partners or faculty research. This could involve developing a new security tool, analyzing a novel threat, or implementing a secure system.

Tools & Resources

Advanced programming languages (Python, Go), Cloud platforms (AWS, Azure), Security frameworks

Career Connection

A strong project portfolio is a key differentiator for placements, showcasing problem-solving, technical depth, and practical application to employers.

Pursue Advanced Certifications & Internships- (Semester 5-6)

Work towards professional certifications like Certified Ethical Hacker (CEH), CompTIA CySA+, or Google Cybersecurity Professional Certificate. Simultaneously, actively seek and complete internships at cybersecurity firms or IT companies in their security departments.

Tools & Resources

Official certification study materials, LinkedIn Jobs, College placement cell

Career Connection

Certifications validate specialized skills, while internships provide invaluable industry exposure and often lead to pre-placement offers, accelerating career entry.

Network and Attend Security Conferences- (Semester 5-6)

Regularly attend virtual or in-person cybersecurity conferences, webinars, and meetups in India. Engage with industry leaders, recruiters, and fellow enthusiasts. This expands your professional network and keeps you updated on the latest trends and threats.

Tools & Resources

NullCon, Black Hat India, DefCamp, Cyber Security Council of India events

Career Connection

Networking opens doors to mentorship, job opportunities, and insights into industry needs, crucial for long-term career growth and leadership roles.

Program Structure and Curriculum

Eligibility:

  • Candidates should have passed 10+2 or its equivalent examination with Physics, Chemistry and Mathematics / Computer Science / Statistics / Business Mathematics as one of the subjects.

Duration: 6 semesters / 3 years

Credits: 140 Credits

Assessment: Internal: 40%, External: 60%

Semester-wise Curriculum Table

Semester 1

Subject CodeSubject NameSubject TypeCreditsKey Topics
21LEH101JCommunicative EnglishCore3Reading Comprehension, Writing Skills, Listening and Speaking, Grammar Fundamentals, Vocabulary Building
21LHS101JValue EducationCore1Ethics and Morality, Human Values, Social Responsibility, Professional Ethics, Sustainable Development
21CSC101JIntroduction to Information TechnologyCore3Computer Fundamentals, Hardware and Software, Operating Systems Basics, Networking Concepts, Internet and Web Technologies
21CSC102JProgramming in CCore3C Language Basics, Data Types and Operators, Control Structures, Functions and Arrays, Pointers and Structures
21CSC103JDigital Logic and Computer OrganizationCore3Digital Logic Gates, Boolean Algebra, Combinational Circuits, Sequential Circuits, Computer Organization Principles
21CSC104JComputer Architecture and MicroprocessorsCore3CPU Design, Instruction Set Architecture, Memory Hierarchy, I/O Organization, Microprocessor Fundamentals
21CSC105JProgramming in C LabLab2C Program Implementation, Conditional and Loop Structures, Function and Array Usage, Pointer and Structure Applications, Basic File Handling
21CSC106JDigital Logic and Computer Organization LabLab2Logic Gates Realization, Boolean Function Implementation, Combinational Circuit Design, Sequential Circuit Design, Assembly Language Programming Basics

Semester 2

Subject CodeSubject NameSubject TypeCreditsKey Topics
21CSC201JData Structures and AlgorithmsCore3Arrays and Linked Lists, Stacks and Queues, Trees and Graphs, Sorting Algorithms, Searching Techniques
21CSC202JDatabase Management SystemsCore3DBMS Concepts, ER Model, Relational Model and SQL, Normalization, Transaction Management
21CSC203JObject Oriented Programming with C++Core3OOP Concepts, Classes and Objects, Inheritance and Polymorphism, Virtual Functions, Exception Handling
21CSC204JOperating SystemsCore3OS Functions, Process Management, CPU Scheduling, Memory Management, File Systems
21CSC205JDiscrete MathematicsCore3Logic and Proofs, Set Theory, Relations and Functions, Graph Theory, Combinatorics
21CSC206JData Structures and Algorithms LabLab2Implementation of Stacks, Implementation of Queues, Implementation of Linked Lists, Sorting Algorithm Practice, Searching Algorithm Practice
21CSC207JDatabase Management Systems LabLab2SQL Query Writing, Database Creation and Manipulation, ER Diagram Implementation, Normalization Practice, Report Generation using SQL
21CSC208JObject Oriented Programming with C++ LabLab2C++ Program Development, Class and Object Implementation, Inheritance Concepts, Polymorphism Practice, File Handling in C++

Semester 3

Subject CodeSubject NameSubject TypeCreditsKey Topics
21CSC301JComputer NetworksCore3Network Topologies, OSI and TCP/IP Models, IP Addressing and Routing, Transport Layer Protocols, Application Layer Protocols
21CSC302JCyber Security FundamentalsCore3Security Principles, Threats and Vulnerabilities, Cryptography Basics, Network Security Concepts, Access Control Mechanisms
21CSC303JData CommunicationCore3Analog and Digital Transmission, Data Encoding Techniques, Multiplexing and Switching, Error Detection and Correction, Modulation Techniques
21CSC304JComputer Forensics and InvestigationCore3Digital Forensics Process, Evidence Collection and Preservation, Data Acquisition Techniques, Forensic Tools, Incident Response Phases
21CSC305JTheory of ComputationCore3Finite Automata, Regular Expressions, Context-Free Grammars, Pushdown Automata, Turing Machines
21CSC306JComputer Networks LabLab2Network Configuration Practice, IP Addressing Schemes, Routing Protocols Implementation, Socket Programming, Network Troubleshooting
21CSC307JCyber Security Fundamentals LabLab2Cryptography Tool Usage, Network Scanning, Vulnerability Assessment, Firewall Configuration, Intrusion Detection Systems

Semester 4

Subject CodeSubject NameSubject TypeCreditsKey Topics
21CSC401JWeb TechnologiesCore3HTML and CSS, JavaScript Programming, Client-Server Architecture, Web Servers, XML and AJAX
21CSC402JCryptography and Network SecurityCore3Symmetric and Asymmetric Ciphers, Hashing and Digital Signatures, Public Key Infrastructure (PKI), Firewalls and VPNs, IDS and IPS
21CSC403JMalware Analysis and Reverse EngineeringCore3Malware Types, Static Malware Analysis, Dynamic Malware Analysis, Reverse Engineering Tools, Obfuscation Techniques
21CSC404JEthical Hacking and Penetration TestingCore3Reconnaissance, Scanning and Enumeration, Vulnerability Exploitation, Post-Exploitation Techniques, Penetration Testing Reporting
21CSC405JLinux/Unix ProgrammingCore3Shell Scripting, Linux Commands and Utilities, File System Management, Process Management, System Calls and IPC
21CSC406JWeb Technologies LabLab2HTML/CSS Web Page Design, JavaScript Dynamic Content, Client-Side Scripting, Database Integration with Web, AJAX Implementation
21CSC407JEthical Hacking and Penetration Testing LabLab2Network Scanning Tools (Nmap), Vulnerability Exploitation (Metasploit), Web Application Hacking, Wireless Network Attacks, Social Engineering Techniques

Semester 5

Subject CodeSubject NameSubject TypeCreditsKey Topics
21CSC501JCloud SecurityCore3Cloud Computing Models, Cloud Security Threats, Data Security in Cloud, Identity and Access Management, Cloud Compliance and Governance
21CSC502JIncident Response and Disaster RecoveryCore3Incident Handling Process, Forensics Readiness, Disaster Recovery Planning, Business Continuity, BCP and DRP Testing
21CSC503JSecurity Operations and ManagementCore3Security Policy Development, Risk Management, Security Audits, SIEM Fundamentals, Security Governance
21CSC504JPython ProgrammingCore3Python Language Basics, Data Structures in Python, Functions and Modules, File Handling, Object-Oriented Programming
21CSL501JCloud Security LabLab2Cloud Environment Setup, Security Configuration Practices, IAM Policy Implementation, Data Encryption in Cloud, Cloud Monitoring Tools
21CSL502JPython Programming LabLab2Python Script Development, Data Manipulation with Pandas, Web Scraping with Beautiful Soup, Network Programming with Sockets, Automation Tasks
21CSP501JProject Work - IProject2Project Planning and Scoping, Literature Review, Problem Identification, Design and Architecture, Initial Implementation
21CSCE501JIoT Security (Elective I)Elective3IoT Architecture, IoT Security Challenges, Device Security, Network Security in IoT, Data Privacy in IoT
21CSCE502JCyber Law and Ethics (Elective I)Elective3Indian IT Act, Cybercrime Laws, Digital Evidence, Intellectual Property Rights, Ethical Principles in Cyber
21CSCE503JSecurity for Web Services (Elective I)Elective3Web Service Architecture, SOAP and REST Security, Authentication and Authorization, API Security, XML Security
21CSCE504JDistributed Systems Security (Elective I)Elective3Distributed System Concepts, Security Challenges in Distributed Systems, Authentication Protocols, Access Control in Distributed Systems, Distributed Ledger Technologies
21CSCE505JDigital Forensics with Python (Elective I)Elective3Python for Forensics, Disk Imaging with Python, Memory Forensics, Network Forensics Tools, Report Automation
21CSCE506JData Security and Privacy (Elective I)Elective3Data Encryption, Data Masking, Privacy Enhancing Technologies, GDPR and Data Protection Acts, Data Governance

Semester 6

Subject CodeSubject NameSubject TypeCreditsKey Topics
21CSC601JArtificial Intelligence for Cyber SecurityCore3AI and Machine Learning Basics, Anomaly Detection, Threat Intelligence, Predictive Analytics, AI in Malware Detection
21CSC602JApplication SecurityCore3OWASP Top 10, Secure Coding Practices, Web Application Firewalls, API Security, Mobile Application Security
21CSP601JProject Work - IIProject8Advanced Project Implementation, Testing and Validation, Documentation and Reporting, Presentation Skills, Research and Development
21CSCE601JWireless and Mobile Security (Elective II)Elective3Wireless Network Protocols, Mobile Device Security, Mobile OS Security, Wireless Attack Vectors, Mobile Application Security
21CSCE602JBiometric Security (Elective II)Elective3Biometric Authentication, Physiological Biometrics, Behavioral Biometrics, Biometric System Design, Biometric Attacks and Countermeasures
21CSCE603JVulnerability Assessment and Penetration Testing (VAPT) (Elective II)Elective3VAPT Methodologies, Automated VAPT Tools, Manual Penetration Testing, Vulnerability Reporting, Remediation Strategies
21CSCE604JBlockchain and Cryptocurrency Security (Elective II)Elective3Blockchain Fundamentals, Cryptocurrency Mechanisms, Smart Contract Security, Decentralized Applications, Blockchain Attacks and Defenses
21CSCE605JDatabase Security (Elective II)Elective3Database Security Threats, Access Control in Databases, SQL Injection Prevention, Data Encryption at Rest and In Transit, Database Auditing
21CSCE606JDevOps Security (Elective II)Elective3DevOps Principles, Security in CI/CD Pipeline, Automated Security Testing, Container Security, Infrastructure as Code Security
whatsapp

Chat with us