
B-SC in Cyber Security at SRM Institute of Science and Technology (Deemed to be University)


Chengalpattu, Tamil Nadu
.png&w=1920&q=75)
About the Specialization
What is Cyber Security at SRM Institute of Science and Technology (Deemed to be University) Chengalpattu?
This B.Sc Cyber Security program at SRM Institute of Science and Technology focuses on equipping students with essential skills to protect digital assets and infrastructure from evolving cyber threats. It covers fundamental concepts of computer science alongside specialized areas like cryptography, network security, digital forensics, and ethical hacking. The curriculum is designed to meet the growing demand for cybersecurity professionals in India, addressing critical areas of national digital security and industry-specific protection challenges.
Who Should Apply?
This program is ideal for fresh graduates from 10+2 with a keen interest in computer science and a strong aptitude for problem-solving. It also suits individuals passionate about digital safety, ethical hacking, and defending against cyber warfare. Aspiring cybersecurity analysts, incident responders, and security architects who want to build a foundational and practical understanding of cybersecurity concepts for a career in the Indian tech industry will find this program beneficial.
Why Choose This Course?
Graduates of this program can expect to pursue dynamic career paths in India as cybersecurity analysts, network security engineers, security consultants, and digital forensics specialists. Entry-level salaries typically range from INR 4-7 LPA, with experienced professionals earning significantly more. The program prepares students for industry certifications like CompTIA Security+, CEH, and provides a strong base for roles in IT companies, government organizations, and defense sectors across India.

Student Success Practices
Foundation Stage
Master Programming Fundamentals- (Semester 1-2)
Solidify your programming base, especially in Python and C/C++, by regular coding practice. Focus on data structures and algorithms, as they are crucial for understanding security vulnerabilities and developing secure code.
Tools & Resources
HackerRank, LeetCode, GeeksforGeeks, Python documentation
Career Connection
Strong programming skills are foundational for any cyber role, enabling automation, script development for security tools, and understanding malware functionality for analysis and defense.
Engage with Digital Fundamentals- (Semester 1-2)
Dive deep into digital logic, computer organization, and networking concepts. Understand how computers work at a fundamental level, including hardware components, operating systems, and network protocols, which are the targets of cyber attacks.
Tools & Resources
Logic.ly simulator, Packet Tracer for network simulations, online courses on OS basics
Career Connection
A strong grasp of underlying system architecture and networking is essential for identifying vulnerabilities, configuring secure systems, and performing effective network forensics.
Participate in Introductory Workshops & Clubs- (Semester 1-2)
Join college cybersecurity clubs or participate in introductory workshops. These provide practical exposure to tools, ethical hacking basics, and build a peer network. Engage in mini-projects to apply theoretical knowledge.
Tools & Resources
College CSI/Cybersecurity club, basic Kali Linux tutorials, online CTF (Capture The Flag) challenges for beginners
Career Connection
Early practical exposure and networking can open doors to mentorship, collaborative learning, and enhance your resume for internships in later years.
Intermediate Stage
Hands-on Security Tool Proficiency- (Semester 3-5)
Beyond theory, gain practical experience with essential cybersecurity tools. Master tools for network scanning, vulnerability assessment, cryptographic operations, and basic malware analysis. Understand their functionality and limitations.
Tools & Resources
Nmap, Wireshark, Metasploit, OpenSSL, VirtualBox with Kali Linux, TryHackMe/Hack The Box
Career Connection
Employers highly value practical tool experience. Proficiency in these tools directly translates to roles in security operations, penetration testing, and incident response.
Develop Project-Based Expertise- (Semester 3-5)
Undertake small to medium-sized cybersecurity projects, individually or in teams. This could involve building a secure application, setting up a secure network, or conducting a mock penetration test on a controlled environment.
Tools & Resources
GitHub for version control, project management tools, open-source security libraries, cloud platforms (AWS/Azure free tier)
Career Connection
Projects demonstrate applied skills, problem-solving abilities, and initiative. They are crucial portfolio items for showcasing competence during interviews and for securing internships.
Engage in Industry-Relevant Certifications & Contests- (Semester 3-5)
Explore and prepare for entry-level industry certifications like CompTIA Security+, or participate in cybersecurity competitions (CTFs). These validate your skills and keep you updated with industry standards.
Tools & Resources
Official certification study guides, online practice exams, CTF platforms like Root-Me, OverTheWire
Career Connection
Certifications enhance credibility and improve employability. Competitive participation hones real-world problem-solving under pressure, highly valued by employers.
Advanced Stage
Specialized Internship and Major Project- (Semester 5-6)
Secure a relevant internship in a cybersecurity domain (e.g., SOC, GRC, AppSec, Forensics). Apply learned skills in a real-world setting and dedicate significant effort to your final year project, focusing on innovation and practical impact.
Tools & Resources
Internship portals (LinkedIn, Internshala), company career pages, academic project guidance from faculty mentors, specialized software for your project domain
Career Connection
Internships are often direct pathways to full-time employment and provide invaluable industry experience. A strong project showcases your ability to deliver substantial work.
Master Advanced Security Concepts & Certifications- (Semester 6)
Deepen your knowledge in advanced topics like advanced persistent threats, ethical hacking methodologies, and incident response frameworks. Consider pursuing more advanced certifications relevant to your desired career path (e.g., CEH, PenTest+).
Tools & Resources
Advanced cybersecurity textbooks, SANS reading materials, official certification training providers, professional networking events
Career Connection
Advanced certifications differentiate you in a competitive job market and prepare you for specialized roles and higher responsibilities within cybersecurity teams.
Strategic Networking and Placement Preparation- (Semester 6)
Actively network with industry professionals, attend cybersecurity conferences, and refine your resume, cover letter, and interview skills. Practice technical and behavioral interview questions specific to cybersecurity roles.
Tools & Resources
LinkedIn, career fairs, alumni network, mock interview sessions, company websites for current job openings
Career Connection
Effective networking can lead to referrals and insights into hiring trends. Polished interview skills are critical for converting opportunities into successful placements.
Program Structure and Curriculum
Eligibility:
- A pass in 10+2 or Equivalent Examination with a minimum of 50% aggregate marks.
Duration: 3 years / 6 semesters
Credits: 122 Credits
Assessment: Internal: 50%, External: 50%
Semester-wise Curriculum Table
Semester 1
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| 21HSB101J | Communicative English | Core | 3 | Communication Skills, Grammar and Vocabulary, Reading Comprehension, Writing Skills, Listening and Speaking |
| 21HSB102J | Mathematics for Computer Science | Core | 4 | Sets and Relations, Logic and Proofs, Number Theory, Matrices and Determinants, Combinatorics |
| 21CSB101J | Problem Solving and Python Programming | Core | 3 | Algorithmic Problem Solving, Python Fundamentals, Data Types and Operators, Control Flow, Functions |
| 21CSB102L | Problem Solving and Python Programming Lab | Lab | 2 | Python Programming Practice, Algorithmic Implementation, Debugging Techniques, Data Structures in Python, Project Development |
| 21CSB103J | Digital Computer Fundamentals | Core | 3 | Number Systems, Boolean Algebra, Logic Gates, Combinational Circuits, Sequential Circuits |
| 21CSB104J | Computer Organization and Architecture | Core | 3 | Basic Computer Operations, CPU Design, Memory Hierarchy, I/O Organization, Pipelining |
Semester 2
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| 21HSB201J | Professional English | Core | 3 | Workplace Communication, Technical Writing, Presentation Skills, Group Discussion, Interview Skills |
| 21CSB201J | Data Structures and Algorithms | Core | 4 | Array and Linked Lists, Stacks and Queues, Trees and Graphs, Hashing, Sorting and Searching Algorithms |
| 21CSB202L | Data Structures and Algorithms Lab | Lab | 2 | Implementing Data Structures, Algorithm Design, Performance Analysis, Recursion, Problem Solving |
| 21CSB203J | Database Management Systems | Core | 3 | Database Concepts, Relational Model, SQL Queries, Normalization, Transaction Management |
| 21CSB204L | Database Management Systems Lab | Lab | 2 | SQL Practice, Database Design, Data Manipulation, Stored Procedures, PL/SQL |
| 21CYB201J | Fundamentals of Cyber Security | Core | 3 | Introduction to Cyber Security, Threat Landscape, Security Principles, Cyber Attacks, Cyber Law and Ethics |
| 21CYB202L | Fundamentals of Cyber Security Lab | Lab | 2 | Security Tools, Malware Analysis Basics, Network Scanning, Vulnerability Assessment, OS Security |
Semester 3
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| 21HSB011J | Environmental Science and Sustainable Engineering | Core | 3 | Ecosystems, Environmental Pollution, Natural Resources, Biodiversity, Sustainable Development |
| 21HSB301J | Aptitude I & Reasoning I | Core | 1 | Quantitative Aptitude, Logical Reasoning, Data Interpretation, Verbal Reasoning, Critical Thinking |
| 21CSB301J | Operating Systems | Core | 3 | OS Structure, Process Management, CPU Scheduling, Memory Management, File Systems |
| 21CSB302L | Operating Systems Lab | Lab | 2 | Linux Commands, Shell Scripting, Process Management, Thread Programming, System Calls |
| 21CYB301J | Cryptography and Network Security | Core | 4 | Classical Cryptography, Symmetric Key Cryptography, Asymmetric Key Cryptography, Network Security Protocols, Digital Signatures |
| 21CYB302L | Cryptography and Network Security Lab | Lab | 2 | Cryptographic Tool Implementation, Network Sniffing, Firewall Configuration, VPN Setup, Intrusion Detection |
| 21CYB303J | Introduction to Information Security Management | Core | 3 | Information Security Concepts, Risk Management, Security Policies, Legal and Regulatory Aspects, Incident Management |
| 21CYB304L | Introduction to Information Security Management Lab | Lab | 2 | Security Policy Creation, Risk Assessment Tools, Compliance Auditing, Incident Response Planning, Business Continuity |
Semester 4
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| 21HSB401J | Aptitude II & Reasoning II | Core | 1 | Advanced Quantitative Aptitude, Complex Logical Reasoning, Advanced Data Interpretation, Critical Reasoning, Problem Solving Strategies |
| 21CSB401J | Computer Networks | Core | 3 | Network Topologies, OSI/TCP-IP Models, Data Link Layer, Network Layer, Transport Layer |
| 21CSB402L | Computer Networks Lab | Lab | 2 | Network Configuration, Packet Sniffing, Socket Programming, Network Protocols, Troubleshooting |
| 21CYB401J | Cyber Laws and Ethics | Core | 3 | Indian IT Act 2000, Cyber Crime Categories, Intellectual Property Rights, Data Privacy Laws, Ethical Hacking Principles |
| 21CYB402J | Cyber Threat Intelligence | Core | 4 | Threat Intelligence Cycle, Threat Actors, Open Source Intelligence, Cyber Kill Chain, Threat Hunting |
| 21CYB403L | Cyber Threat Intelligence Lab | Lab | 2 | OSINT Tools, Threat Feed Analysis, SIEM Log Analysis, Malware Information Gathering, Report Generation |
| 21CYB404J | Cloud and IoT Security | Core | 3 | Cloud Security Models, Cloud Identity Management, IoT Architecture, IoT Security Challenges, Secure IoT Communication |
| 21CYB405L | Cloud and IoT Security Lab | Lab | 2 | Cloud Security Configuration, AWS/Azure Security, IoT Device Security, Secure Communication Protocols, IoT Penetration Testing |
| 21EBS0xx | Elective | Elective | 3 | To be chosen from elective basket |
Semester 5
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| 21HSB501J | Professional Skills & Values | Core | 1 | Soft Skills, Professional Etiquette, Values and Ethics, Time Management, Teamwork |
| 21CSB0XX | Open Elective | Open Elective | 3 | To be chosen from Open Elective basket |
| 21CYB501J | Digital Forensics and Incident Response | Core | 4 | Digital Evidence, Forensic Imaging, File System Analysis, Network Forensics, Incident Response Process |
| 21CYB502L | Digital Forensics and Incident Response Lab | Lab | 2 | Forensic Tools (Autopsy, FTK Imager), Evidence Acquisition, Data Recovery, Log Analysis, Incident Handling Simulation |
| 21CYB503J | Web Application Security | Core | 3 | OWASP Top 10, SQL Injection, Cross-Site Scripting, Authentication Attacks, Session Management |
| 21CYB504L | Web Application Security Lab | Lab | 2 | Web Vulnerability Scanners, Penetration Testing Tools (Burp Suite), Exploiting Web Flaws, Secure Coding Practices |
| 21CYB0XX | Program Elective | Elective | 3 | To be chosen from Program Elective basket |
| 21CYB0XX | Program Elective | Elective | 3 | To be chosen from Program Elective basket |
| 21CYB588J | Project I / Industrial Training | Project/Internship | 2 | Project Planning, Literature Review, Problem Definition, Design and Implementation, Report Writing |
Semester 6
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| 21HSB601J | Personality Development and Soft Skills | Core | 1 | Self-Awareness, Communication Styles, Interpersonal Skills, Stress Management, Leadership Qualities |
| 21CYB601J | Security Operations Center (SOC) Fundamentals | Core | 4 | SOC Roles, Security Monitoring, Threat Detection, Vulnerability Management, Compliance and Auditing |
| 21CYB602L | Security Operations Center (SOC) Lab | Lab | 2 | SIEM Tools, Log Analysis, Incident Triage, Playbook Execution, Threat Hunting |
| 21CYB0XX | Program Elective | Elective | 3 | To be chosen from Program Elective basket |
| 21CYB0XX | Program Elective | Elective | 3 | To be chosen from Program Elective basket |
| 21CYB699J | Project II | Project | 6 | Advanced Project Planning, System Design, Implementation, Testing, Project Documentation and Presentation |




