
B-SC in Cyber Security at SRM Institute of Science and Technology


Chengalpattu, Tamil Nadu
.png&w=1920&q=75)
About the Specialization
What is Cyber Security at SRM Institute of Science and Technology Chengalpattu?
This B.Sc. Cyber Security program at SRM Institute of Science and Technology focuses on equipping students with essential knowledge and practical skills to combat evolving cyber threats. With India''''s rapid digital transformation, there''''s immense demand for cybersecurity professionals. The program emphasizes a blend of theoretical foundations and hands-on training, preparing graduates for real-world challenges in national and global contexts.
Who Should Apply?
This program is ideal for recent 10+2 graduates with a strong interest in computer science and problem-solving, aiming for a career in cybersecurity. It also suits individuals looking to acquire specialized skills for entry-level roles in network security, ethical hacking, or digital forensics. Prerequisite backgrounds in basic programming and logical reasoning are beneficial for success.
Why Choose This Course?
Graduates of this program can expect to pursue rewarding India-specific career paths such as Security Analyst, Ethical Hacker, Cyber Forensic Investigator, or Network Security Administrator. Entry-level salaries typically range from INR 3-6 lakhs annually, with significant growth potential up to INR 10-20 lakhs for experienced professionals. The curriculum aligns with industry certifications like CompTIA Security+ and CEH.

Student Success Practices
Foundation Stage
Master Core Programming & Logic- (Semester 1-2)
Dedicate significant time to understanding C/C++ programming fundamentals, data structures, and discrete mathematics. Practice coding problems daily on platforms like HackerRank and GeeksforGeeks to build a strong logical foundation, which is critical for cybersecurity problem-solving.
Tools & Resources
HackerRank, GeeksforGeeks, Visual Studio Code
Career Connection
Strong programming and logical skills are the bedrock for understanding vulnerabilities, developing secure code, and analyzing malware, directly impacting roles in secure development and analysis.
Build a Linux Command Line Proficiency- (Semester 1-2)
Familiarize yourself with Linux/Unix operating systems and their command-line interface. Install a Linux distribution (e.g., Ubuntu, Kali Linux) on a virtual machine and spend time navigating, managing files, and executing commands, as cybersecurity tools often run on Linux.
Tools & Resources
VirtualBox, Ubuntu/Kali Linux, Linux Command Line Tutorials
Career Connection
Most cybersecurity tools and environments are Linux-based. Proficiency here is essential for penetration testing, forensic analysis, and server management roles.
Engage in Early Problem-Solving Challenges- (Semester 2)
Participate in beginner-friendly Capture The Flag (CTF) competitions or online security challenges. This fosters practical application of theoretical knowledge and introduces students to common vulnerabilities and attack techniques in a safe, learning-oriented environment.
Tools & Resources
TryHackMe, Hack The Box (Academy), CTFlearn
Career Connection
Early exposure to security challenges hones critical thinking and problem-solving skills, highly valued in ethical hacking and incident response roles.
Intermediate Stage
Deep Dive into Networking Fundamentals- (Semester 3-4)
Beyond classroom learning, explore advanced networking concepts. Set up small home networks, experiment with routing protocols, and use tools like Wireshark to analyze network traffic. Understand how data flows and potential points of interception.
Tools & Resources
Cisco Packet Tracer, Wireshark, Network+ certification study guides
Career Connection
A profound understanding of computer networks is indispensable for network security, intrusion detection, and perimeter defense roles.
Hands-on with Ethical Hacking Tools- (Semester 4-5)
Actively use ethical hacking tools like Nmap, Metasploit, and Burp Suite on isolated lab environments. Practice vulnerability scanning, exploitation, and web application testing. Focus on understanding the ''''why'''' behind each tool''''s function.
Tools & Resources
Kali Linux (pre-installed tools), OWASP Juice Shop, VulnHub VMs
Career Connection
Direct experience with these tools is crucial for roles like Penetration Tester, Vulnerability Assessor, and Security Consultant, making candidates job-ready.
Contribute to Open-Source Security Projects- (Semester 4-5)
Seek out open-source cybersecurity projects on GitHub. Start with documentation, bug reports, or small code contributions. This builds practical development experience, exposes you to real-world security codebases, and helps in networking with developers.
Tools & Resources
GitHub, OWASP Projects, Security-focused communities
Career Connection
Demonstrating open-source contributions showcases initiative, coding ability, and collaboration skills, highly attractive to tech recruiters.
Advanced Stage
Undertake Industry-Relevant Projects- (Semester 5-6)
Focus your final year projects on complex, real-world cybersecurity problems, potentially in collaboration with industry partners or faculty research. This could involve developing a new security tool, analyzing a novel threat, or implementing a secure system.
Tools & Resources
Advanced programming languages (Python, Go), Cloud platforms (AWS, Azure), Security frameworks
Career Connection
A strong project portfolio is a key differentiator for placements, showcasing problem-solving, technical depth, and practical application to employers.
Pursue Advanced Certifications & Internships- (Semester 5-6)
Work towards professional certifications like Certified Ethical Hacker (CEH), CompTIA CySA+, or Google Cybersecurity Professional Certificate. Simultaneously, actively seek and complete internships at cybersecurity firms or IT companies in their security departments.
Tools & Resources
Official certification study materials, LinkedIn Jobs, College placement cell
Career Connection
Certifications validate specialized skills, while internships provide invaluable industry exposure and often lead to pre-placement offers, accelerating career entry.
Network and Attend Security Conferences- (Semester 5-6)
Regularly attend virtual or in-person cybersecurity conferences, webinars, and meetups in India. Engage with industry leaders, recruiters, and fellow enthusiasts. This expands your professional network and keeps you updated on the latest trends and threats.
Tools & Resources
NullCon, Black Hat India, DefCamp, Cyber Security Council of India events
Career Connection
Networking opens doors to mentorship, job opportunities, and insights into industry needs, crucial for long-term career growth and leadership roles.
Program Structure and Curriculum
Eligibility:
- Candidates should have passed 10+2 or its equivalent examination with Physics, Chemistry and Mathematics / Computer Science / Statistics / Business Mathematics as one of the subjects.
Duration: 6 semesters / 3 years
Credits: 140 Credits
Assessment: Internal: 40%, External: 60%
Semester-wise Curriculum Table
Semester 1
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| 21LEH101J | Communicative English | Core | 3 | Reading Comprehension, Writing Skills, Listening and Speaking, Grammar Fundamentals, Vocabulary Building |
| 21LHS101J | Value Education | Core | 1 | Ethics and Morality, Human Values, Social Responsibility, Professional Ethics, Sustainable Development |
| 21CSC101J | Introduction to Information Technology | Core | 3 | Computer Fundamentals, Hardware and Software, Operating Systems Basics, Networking Concepts, Internet and Web Technologies |
| 21CSC102J | Programming in C | Core | 3 | C Language Basics, Data Types and Operators, Control Structures, Functions and Arrays, Pointers and Structures |
| 21CSC103J | Digital Logic and Computer Organization | Core | 3 | Digital Logic Gates, Boolean Algebra, Combinational Circuits, Sequential Circuits, Computer Organization Principles |
| 21CSC104J | Computer Architecture and Microprocessors | Core | 3 | CPU Design, Instruction Set Architecture, Memory Hierarchy, I/O Organization, Microprocessor Fundamentals |
| 21CSC105J | Programming in C Lab | Lab | 2 | C Program Implementation, Conditional and Loop Structures, Function and Array Usage, Pointer and Structure Applications, Basic File Handling |
| 21CSC106J | Digital Logic and Computer Organization Lab | Lab | 2 | Logic Gates Realization, Boolean Function Implementation, Combinational Circuit Design, Sequential Circuit Design, Assembly Language Programming Basics |
Semester 2
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| 21CSC201J | Data Structures and Algorithms | Core | 3 | Arrays and Linked Lists, Stacks and Queues, Trees and Graphs, Sorting Algorithms, Searching Techniques |
| 21CSC202J | Database Management Systems | Core | 3 | DBMS Concepts, ER Model, Relational Model and SQL, Normalization, Transaction Management |
| 21CSC203J | Object Oriented Programming with C++ | Core | 3 | OOP Concepts, Classes and Objects, Inheritance and Polymorphism, Virtual Functions, Exception Handling |
| 21CSC204J | Operating Systems | Core | 3 | OS Functions, Process Management, CPU Scheduling, Memory Management, File Systems |
| 21CSC205J | Discrete Mathematics | Core | 3 | Logic and Proofs, Set Theory, Relations and Functions, Graph Theory, Combinatorics |
| 21CSC206J | Data Structures and Algorithms Lab | Lab | 2 | Implementation of Stacks, Implementation of Queues, Implementation of Linked Lists, Sorting Algorithm Practice, Searching Algorithm Practice |
| 21CSC207J | Database Management Systems Lab | Lab | 2 | SQL Query Writing, Database Creation and Manipulation, ER Diagram Implementation, Normalization Practice, Report Generation using SQL |
| 21CSC208J | Object Oriented Programming with C++ Lab | Lab | 2 | C++ Program Development, Class and Object Implementation, Inheritance Concepts, Polymorphism Practice, File Handling in C++ |
Semester 3
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| 21CSC301J | Computer Networks | Core | 3 | Network Topologies, OSI and TCP/IP Models, IP Addressing and Routing, Transport Layer Protocols, Application Layer Protocols |
| 21CSC302J | Cyber Security Fundamentals | Core | 3 | Security Principles, Threats and Vulnerabilities, Cryptography Basics, Network Security Concepts, Access Control Mechanisms |
| 21CSC303J | Data Communication | Core | 3 | Analog and Digital Transmission, Data Encoding Techniques, Multiplexing and Switching, Error Detection and Correction, Modulation Techniques |
| 21CSC304J | Computer Forensics and Investigation | Core | 3 | Digital Forensics Process, Evidence Collection and Preservation, Data Acquisition Techniques, Forensic Tools, Incident Response Phases |
| 21CSC305J | Theory of Computation | Core | 3 | Finite Automata, Regular Expressions, Context-Free Grammars, Pushdown Automata, Turing Machines |
| 21CSC306J | Computer Networks Lab | Lab | 2 | Network Configuration Practice, IP Addressing Schemes, Routing Protocols Implementation, Socket Programming, Network Troubleshooting |
| 21CSC307J | Cyber Security Fundamentals Lab | Lab | 2 | Cryptography Tool Usage, Network Scanning, Vulnerability Assessment, Firewall Configuration, Intrusion Detection Systems |
Semester 4
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| 21CSC401J | Web Technologies | Core | 3 | HTML and CSS, JavaScript Programming, Client-Server Architecture, Web Servers, XML and AJAX |
| 21CSC402J | Cryptography and Network Security | Core | 3 | Symmetric and Asymmetric Ciphers, Hashing and Digital Signatures, Public Key Infrastructure (PKI), Firewalls and VPNs, IDS and IPS |
| 21CSC403J | Malware Analysis and Reverse Engineering | Core | 3 | Malware Types, Static Malware Analysis, Dynamic Malware Analysis, Reverse Engineering Tools, Obfuscation Techniques |
| 21CSC404J | Ethical Hacking and Penetration Testing | Core | 3 | Reconnaissance, Scanning and Enumeration, Vulnerability Exploitation, Post-Exploitation Techniques, Penetration Testing Reporting |
| 21CSC405J | Linux/Unix Programming | Core | 3 | Shell Scripting, Linux Commands and Utilities, File System Management, Process Management, System Calls and IPC |
| 21CSC406J | Web Technologies Lab | Lab | 2 | HTML/CSS Web Page Design, JavaScript Dynamic Content, Client-Side Scripting, Database Integration with Web, AJAX Implementation |
| 21CSC407J | Ethical Hacking and Penetration Testing Lab | Lab | 2 | Network Scanning Tools (Nmap), Vulnerability Exploitation (Metasploit), Web Application Hacking, Wireless Network Attacks, Social Engineering Techniques |
Semester 5
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| 21CSC501J | Cloud Security | Core | 3 | Cloud Computing Models, Cloud Security Threats, Data Security in Cloud, Identity and Access Management, Cloud Compliance and Governance |
| 21CSC502J | Incident Response and Disaster Recovery | Core | 3 | Incident Handling Process, Forensics Readiness, Disaster Recovery Planning, Business Continuity, BCP and DRP Testing |
| 21CSC503J | Security Operations and Management | Core | 3 | Security Policy Development, Risk Management, Security Audits, SIEM Fundamentals, Security Governance |
| 21CSC504J | Python Programming | Core | 3 | Python Language Basics, Data Structures in Python, Functions and Modules, File Handling, Object-Oriented Programming |
| 21CSL501J | Cloud Security Lab | Lab | 2 | Cloud Environment Setup, Security Configuration Practices, IAM Policy Implementation, Data Encryption in Cloud, Cloud Monitoring Tools |
| 21CSL502J | Python Programming Lab | Lab | 2 | Python Script Development, Data Manipulation with Pandas, Web Scraping with Beautiful Soup, Network Programming with Sockets, Automation Tasks |
| 21CSP501J | Project Work - I | Project | 2 | Project Planning and Scoping, Literature Review, Problem Identification, Design and Architecture, Initial Implementation |
| 21CSCE501J | IoT Security (Elective I) | Elective | 3 | IoT Architecture, IoT Security Challenges, Device Security, Network Security in IoT, Data Privacy in IoT |
| 21CSCE502J | Cyber Law and Ethics (Elective I) | Elective | 3 | Indian IT Act, Cybercrime Laws, Digital Evidence, Intellectual Property Rights, Ethical Principles in Cyber |
| 21CSCE503J | Security for Web Services (Elective I) | Elective | 3 | Web Service Architecture, SOAP and REST Security, Authentication and Authorization, API Security, XML Security |
| 21CSCE504J | Distributed Systems Security (Elective I) | Elective | 3 | Distributed System Concepts, Security Challenges in Distributed Systems, Authentication Protocols, Access Control in Distributed Systems, Distributed Ledger Technologies |
| 21CSCE505J | Digital Forensics with Python (Elective I) | Elective | 3 | Python for Forensics, Disk Imaging with Python, Memory Forensics, Network Forensics Tools, Report Automation |
| 21CSCE506J | Data Security and Privacy (Elective I) | Elective | 3 | Data Encryption, Data Masking, Privacy Enhancing Technologies, GDPR and Data Protection Acts, Data Governance |
Semester 6
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| 21CSC601J | Artificial Intelligence for Cyber Security | Core | 3 | AI and Machine Learning Basics, Anomaly Detection, Threat Intelligence, Predictive Analytics, AI in Malware Detection |
| 21CSC602J | Application Security | Core | 3 | OWASP Top 10, Secure Coding Practices, Web Application Firewalls, API Security, Mobile Application Security |
| 21CSP601J | Project Work - II | Project | 8 | Advanced Project Implementation, Testing and Validation, Documentation and Reporting, Presentation Skills, Research and Development |
| 21CSCE601J | Wireless and Mobile Security (Elective II) | Elective | 3 | Wireless Network Protocols, Mobile Device Security, Mobile OS Security, Wireless Attack Vectors, Mobile Application Security |
| 21CSCE602J | Biometric Security (Elective II) | Elective | 3 | Biometric Authentication, Physiological Biometrics, Behavioral Biometrics, Biometric System Design, Biometric Attacks and Countermeasures |
| 21CSCE603J | Vulnerability Assessment and Penetration Testing (VAPT) (Elective II) | Elective | 3 | VAPT Methodologies, Automated VAPT Tools, Manual Penetration Testing, Vulnerability Reporting, Remediation Strategies |
| 21CSCE604J | Blockchain and Cryptocurrency Security (Elective II) | Elective | 3 | Blockchain Fundamentals, Cryptocurrency Mechanisms, Smart Contract Security, Decentralized Applications, Blockchain Attacks and Defenses |
| 21CSCE605J | Database Security (Elective II) | Elective | 3 | Database Security Threats, Access Control in Databases, SQL Injection Prevention, Data Encryption at Rest and In Transit, Database Auditing |
| 21CSCE606J | DevOps Security (Elective II) | Elective | 3 | DevOps Principles, Security in CI/CD Pipeline, Automated Security Testing, Container Security, Infrastructure as Code Security |




