SRMIST-image

B-TECH in Computer Science And Engineering With Cyber Security at SRM Institute of Science and Technology

S. R. M. Institute of Science and Technology, Chennai, established 1985 in Kattankulathur, is a premier deemed university. Awarded NAAC A++ and Category I MHRD status, it offers diverse programs like BTech CSE on its 250-acre campus. Renowned for academic excellence, high NIRF 2024 rankings, and strong placements.

READ MORE
location

Chengalpattu, Tamil Nadu

Compare colleges

About the Specialization

What is Computer Science and Engineering with Cyber Security at SRM Institute of Science and Technology Chengalpattu?

This B.Tech Computer Science and Engineering with Cyber Security program at SRM Institute of Science and Technology focuses on equipping students with advanced knowledge and practical skills to protect digital assets. Addressing the surging demand for cyber professionals in India, it integrates core CSE concepts with security protocols, ethical hacking, and digital forensics to mitigate evolving cyber threats.

Who Should Apply?

This program is ideal for fresh graduates with strong problem-solving skills and an interest in securing digital infrastructure, seeking entry into high-demand roles. It also caters to working professionals aiming to upskill in specialized cybersecurity areas, and career changers transitioning into India''''s dynamic cyber defense industry.

Why Choose This Course?

Graduates can expect promising career paths in India, including roles like Security Engineer, Cyber Forensics Investigator, and SOC Analyst. Entry-level salaries range from INR 4-7 LPA, with experienced professionals earning upwards of INR 15 LPA. The curriculum also prepares students for globally recognized certifications such as CompTIA Security+, CEH, and CISSP.

Student Success Practices

Foundation Stage

Master Programming Fundamentals- (Semester 1-2)

Dedicate early semesters to building strong programming foundations in C and Java. Practice extensively on online platforms to solidify logic and fundamental data structures. A strong base here is critical for advanced cybersecurity concepts.

Tools & Resources

HackerRank, LeetCode (for basic problems), GeeksforGeeks, NPTEL courses on Data Structures

Career Connection

Essential for cracking technical interviews for entry-level software development and security analysis roles, and understanding vulnerabilities in code.

Develop Strong Analytical and Problem-Solving Skills- (Semester 1-2)

Focus on understanding the ''''why'''' behind concepts in Calculus, Discrete Mathematics, and Algorithms. Participate in coding contests and puzzles to sharpen logical thinking and critical analysis. This forms the bedrock of security thinking.

Tools & Resources

CodeChef, TopCoder, MathWorks tutorials, University problem-solving clubs

Career Connection

Crucial for algorithm design in cybersecurity, efficient incident analysis, and developing robust, secure solutions to complex problems.

Engage in Peer Learning and Collaborative Projects- (Semester 1-2)

Form study groups, discuss complex topics, and work together on small programming assignments. Collaborative learning enhances understanding, exposes you to different perspectives, and builds vital teamwork abilities for the future.

Tools & Resources

GitHub for code sharing, Discord/Slack for group discussions, Departmental hackathons and coding challenges

Career Connection

Cultivates collaboration skills vital for working in SOC teams, incident response, and large-scale security projects within diverse professional environments.

Intermediate Stage

Gain Practical Experience in Cyber Security Labs- (Semester 3-5)

Beyond theoretical learning, actively engage in lab sessions for Network Security, Operating Systems, and Database Management. Experiment with tools, simulate attacks, and understand vulnerabilities hands-on to build practical defense skills.

Tools & Resources

VirtualBox/VMware for lab environments, Wireshark for network analysis, Nmap for scanning, SQL injection tools (e.g., SQLMap), Metasploit (under guided supervision)

Career Connection

Builds practical skills necessary for roles like Security Analyst, Penetration Tester, and Cyber Forensics Investigator, enhancing employability.

Pursue Relevant Certifications and Online Courses- (Semester 4-5)

Complement academic learning with industry-recognized certifications or specialized online courses in areas like network security, ethical hacking, or cloud security. This validates skills and shows initiative to potential employers.

Tools & Resources

Coursera, Udemy, eJPT, CompTIA Security+, CEH (Certified Ethical Hacker)

Career Connection

Enhances resume, validates specialized skills, and opens doors to niche cybersecurity job profiles in Indian and global IT/BFSI firms.

Participate in Hackathons and Capture The Flag (CTF) Events- (Semester 4-5)

Actively participate in cybersecurity competitions to apply learned concepts in challenging, time-bound scenarios. This fosters competitive spirit, quick problem-solving, and valuable networking with peers and industry experts.

Tools & Resources

CTFTime.org (for competition listings), Local college/university hackathon events, Regional cyber security conferences

Career Connection

Develops real-world defensive and offensive security skills, valuable for showcasing expertise to potential employers, and building a professional network.

Advanced Stage

Undertake Industry Internships and Live Projects- (Semester 6-7 (during breaks or dedicated project semester))

Secure internships with cybersecurity firms or IT departments in companies to gain exposure to real-world security operations, tools, and challenges. Prioritize projects directly related to cyber security.

Tools & Resources

Internshala, LinkedIn Jobs, Company career portals, University placement cell guidance

Career Connection

Provides invaluable experience, networking opportunities, and often leads to pre-placement offers, significantly boosting job prospects in the Indian market.

Specialize through Advanced Electives and Research- (Semester 6-8)

Choose advanced electives in areas like malware analysis, blockchain security, or data privacy. Engage in project work or minor research to deepen expertise and contribute to emerging cybersecurity domains.

Tools & Resources

Academic research papers and journals, Specialized tools for chosen domain (e.g., IDA Pro for reverse engineering), University research labs and faculty mentorship

Career Connection

Positions graduates for advanced and niche roles in cybersecurity R&D, specialized consulting, or pursuing higher education and research opportunities.

Focus on Communication and Professional Networking- (Semester 7-8)

Polish communication skills through technical presentations, clear report writing, and active networking at industry events. Practice interview skills and refine your resume to articulate your cybersecurity expertise effectively.

Tools & Resources

LinkedIn for professional networking, Industry meetups and webinars, Toastmasters clubs, University career services for mock interviews

Career Connection

Crucial for successful job interviews, effective team collaboration, securing leadership roles, and fostering long-term career growth in the competitive Indian job market.

Program Structure and Curriculum

Eligibility:

  • No eligibility criteria specified

Duration: 4 years / 8 semesters

Credits: 160 Credits

Assessment: Internal: 50%, External: 50%

Semester-wise Curriculum Table

Semester 1

Subject CodeSubject NameSubject TypeCreditsKey Topics
18LEM101TTechnical EnglishCore3Listening and Speaking Skills, Reading Comprehension, Writing Professional Documents, Grammar and Vocabulary, Presentation Skills
18MAB101TCalculus and Linear AlgebraCore4Differential Calculus, Multivariable Calculus, Matrices and Determinants, Vector Spaces, Eigenvalues and Eigenvectors
18PYB101TEngineering PhysicsCore4Lasers and Fiber Optics, Quantum Mechanics, Solid State Physics, Materials Science, Nanomaterials
18CHB101TEngineering ChemistryCore4Water Technology, Electrochemistry and Corrosion, Fuels and Combustion, Polymer Chemistry, Green Chemistry
18CSC101JProgramming in CCore3C Fundamentals and Operators, Control Structures, Functions and Pointers, Arrays and Strings, Structures and Unions, File Handling
18CSE101LEngineering Graphics and DesignPractical2Engineering Curves, Orthographic Projections, Sectional Views of Solids, Isometric Projections, CAD Basics
18CSC102LC Programming LaboratoryPractical2C Program Debugging, Conditional Statements Implementation, Loop Structures and Functions, Array and Pointer Operations, File Operations in C
18CSE102LPhysics and Chemistry LabPractical2Optics Experiments, Semiconductor Device Characteristics, Water Analysis Techniques, Corrosion Rate Determination, Polymer Synthesis

Semester 2

Subject CodeSubject NameSubject TypeCreditsKey Topics
18LEM201TProfessional CommunicationCore3Workplace Communication, Public Speaking and Presentations, Report and Proposal Writing, Group Discussions, Interview Skills
18MAB201TDifferential Equations and Complex AnalysisCore4Ordinary Differential Equations, Laplace Transforms, Partial Differential Equations, Complex Numbers and Functions, Conformal Mapping
18EEB101TBasic Electrical and Electronics EngineeringCore4DC and AC Circuits, Transformers, Diodes and Rectifiers, Transistors and Amplifiers, Logic Gates
18CSB201TData StructuresCore3Arrays and Linked Lists, Stacks and Queues, Trees and Binary Trees, Graphs and Graph Algorithms, Searching and Sorting, Hashing Techniques
18CSC201JObject Oriented ProgrammingCore3OOP Concepts (Java), Classes, Objects, Methods, Inheritance and Polymorphism, Abstract Classes and Interfaces, Exception Handling, Collections Framework
18CSC202JDigital SystemsCore3Number Systems and Codes, Boolean Algebra and Logic Gates, Combinational Circuits, Sequential Circuits, Registers and Counters, Memory Architectures
18CSB202LData Structures LaboratoryPractical2Implementation of Linked Lists, Stack and Queue Operations, Tree Traversal Algorithms, Graph Algorithms (BFS, DFS), Sorting and Searching Algorithms
18CSC203LObject Oriented Programming LaboratoryPractical2Java Program Development, Class and Object Creation, Inheritance and Polymorphism Exercises, GUI Application Development, Exception Handling Implementation
18EEL101LBasic Electrical and Electronics Engineering LaboratoryPractical2Verification of Circuit Laws, AC Circuit Analysis, Diode Characteristics, Transistor Amplifier Circuits, Logic Gate Verification

Semester 3

Subject CodeSubject NameSubject TypeCreditsKey Topics
18MAB301TProbability and StatisticsCore4Probability Theory, Random Variables and Distributions, Joint Probability Distributions, Sampling Distributions, Hypothesis Testing
18CSC301TDesign and Analysis of AlgorithmsCore3Algorithm Analysis, Divide and Conquer, Greedy Algorithms, Dynamic Programming, Graph Algorithms (BFS, DFS, MST, Shortest Path), Backtracking and Branch-and-Bound
18CSB302TDatabase Management SystemsCore3Relational Model, SQL Queries, ER Diagrams, Normalization, Transaction Management, Concurrency Control
18CSC302TOperating SystemsCore3OS Structure and Functions, Process Management, CPU Scheduling, Memory Management, File Systems, I/O Management
18CSC303TComputer NetworksCore3Network Models (OSI, TCP/IP), Physical Layer, Data Link Layer, Network Layer (IP, Routing), Transport Layer (TCP, UDP), Application Layer Protocols
18CSC304TDiscrete MathematicsCore3Logic and Proof Techniques, Set Theory and Functions, Combinatorics, Graph Theory, Trees, Algebraic Structures
18CSB303LDatabase Management Systems LaboratoryPractical2SQL Data Definition and Manipulation, Advanced SQL Queries, PL/SQL Programming, Database Design Exercises, Introduction to NoSQL Databases
18CSC305LOperating Systems LaboratoryPractical2Linux Shell Scripting, Process Management Commands, CPU Scheduling Algorithms Implementation, Deadlock Detection and Prevention, Memory Allocation Techniques
18CSC306JIntroduction to Cyber SecuritySpecialization Core3Security Principles and Concepts, Threats, Vulnerabilities, Attacks, Cryptography Basics, Network Security Fundamentals, Security Policies and Procedures, Cyber Law and Ethics

Semester 4

Subject CodeSubject NameSubject TypeCreditsKey Topics
18MAB401TNumerical Methods and Optimization TechniquesCore4Solutions of Equations, Interpolation and Approximation, Numerical Differentiation and Integration, Linear Programming, Non-Linear Programming
18CSC401TTheory of ComputationCore3Finite Automata, Regular Expressions and Languages, Context-Free Grammars, Pushdown Automata, Turing Machines, Decidability and Undecidability
18CSC402TCompiler DesignCore3Lexical Analysis, Syntax Analysis (Parsing), Semantic Analysis, Intermediate Code Generation, Code Optimization, Target Code Generation
18CSC403TSoftware EngineeringCore3Software Process Models, Requirements Engineering, Software Design Principles, Software Testing Strategies, Software Project Management, Software Quality Assurance
18CSC404TMicroprocessors and MicrocontrollersCore38086 Microprocessor Architecture, Assembly Language Programming, Memory and I/O Interfacing, Interrupts, Microcontroller Architectures, Peripheral Interfacing
18CSC405JSecure ProgrammingSpecialization Core3Secure Coding Principles, Input Validation and Sanitization, Buffer Overflows, SQL Injection, Cross-Site Scripting (XSS), Cryptographic API Misuse
18CSC406LCompiler Design LaboratoryPractical2Lexical Analyzer Implementation, Parser Implementation (LL, LR), Intermediate Code Generation, Symbol Table Management, Code Optimization Techniques
18CSC407LMicroprocessors and Microcontrollers LaboratoryPractical28086 Assembly Language Programming, Interfacing with Peripherals, Microcontroller Programming, Stepper Motor Control, ADC/DAC Interfacing

Semester 5

Subject CodeSubject NameSubject TypeCreditsKey Topics
18MAB002TProfessional Ethics and Human ValuesProfessional Core3Human Values and Morals, Engineering Ethics, Professionalism and Responsibility, Global Ethical Issues, Cyber Ethics
18CSC501TArtificial IntelligenceCore3Problem Solving Agents, Search Algorithms (Heuristic, Adversarial), Knowledge Representation, Machine Learning Basics, Natural Language Processing, AI Ethics
18CSC502JCryptography and Network SecuritySpecialization Core3Symmetric Key Cryptography (DES, AES), Asymmetric Key Cryptography (RSA), Hash Functions and Digital Signatures, Authentication Protocols, Network Security Protocols (SSL/TLS, IPsec), Firewalls and IDS/IPS
18CSC503JCyber Law and ForensicsSpecialization Core3Indian IT Act 2000/2008, Types of Cybercrimes, Digital Evidence Collection, Forensic Tools and Techniques, Incident Response Legal Aspects, Cyber Terrorism
18CSC504JSecurity Architecture and DesignSpecialization Core3Security Models (Bell-LaPadula, Biba), Enterprise Security Architecture, Cloud Security Architecture, IoT Security Design, Threat Modeling Methodologies, Security Controls Design
18CYB001TEthical HackingProgram Elective3Hacking Phases (Reconnaissance, Scanning), System Hacking Techniques, Malware Threats, Wireless Hacking, Web Application Hacking, Countermeasures
OE-1Open Elective - 1Open Elective3
18CSC505LArtificial Intelligence LaboratoryPractical2Python for AI, Implementation of Search Algorithms, Knowledge Representation using Prolog, Machine Learning Libraries (Scikit-learn), AI Project Development
18CSC506LNetwork Security LaboratorySpecialization Practical2Cryptography Tools (OpenSSL), Network Scanning (Nmap), Firewall Configuration, IDS/IPS Deployment, Web Application Penetration Testing Tools, Wireshark for Packet Analysis

Semester 6

Subject CodeSubject NameSubject TypeCreditsKey Topics
18CSC601JSecure Software Development Life CycleSpecialization Core3SSDLC Phases, Security Requirements Definition, Secure Design Principles, Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Security Testing and Auditing
18CSC602JCloud and IoT SecuritySpecialization Core3Cloud Computing Security Architecture, Virtualization Security, Cloud Security Best Practices, IoT Device Security, IoT Network Security, Data Privacy in Cloud and IoT
18CSC603JVulnerability Assessment and Penetration TestingSpecialization Core3VA/PT Methodologies, Information Gathering (Reconnaissance), Vulnerability Scanning, Exploitation Techniques, Post-Exploitation, Reporting and Remediation
18CYB002TWeb Application SecurityProgram Elective3OWASP Top 10, Injection Flaws (SQL, Command), Broken Authentication, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), Security Misconfiguration
18CYB003TAdvanced CryptographyProgram Elective3Elliptic Curve Cryptography, Homomorphic Encryption, Post-Quantum Cryptography, Zero-Knowledge Proofs, Cryptographic Protocols, Blockchain Cryptography
OE-2Open Elective - 2Open Elective3
18CSC604LSecure Software Development LaboratorySpecialization Practical2Static Analysis Tools (e.g., SonarQube), Dynamic Analysis Tools (e.g., OWASP ZAP), Security Unit Testing, Implementing Secure Coding Practices, Vulnerability Remediation
18CSC605LVulnerability Assessment and Penetration Testing LaboratorySpecialization Practical2Kali Linux Tool Usage, Nmap for Network Mapping, Metasploit Framework, Burp Suite for Web Testing, SQLMap for Database Exploitation, Reporting VA/PT Findings

Semester 7

Subject CodeSubject NameSubject TypeCreditsKey Topics
18CSC701JIncident Response and Disaster RecoverySpecialization Core3Incident Response Life Cycle, Detection and Analysis, Containment, Eradication, Recovery, Disaster Recovery Planning, Business Continuity Management, Forensic Readiness
18CSC702JSecurity Operations Center (SOC) FundamentalsSpecialization Core3SOC Models and Functions, SIEM Technologies, Threat Intelligence Platforms, Security Monitoring and Alerting, Incident Triage and Playbooks, Automation in SOC
18CYB004TData Privacy and ProtectionProgram Elective3GDPR and Indian Data Protection Laws, Privacy Principles, Data Masking and Anonymization, Privacy by Design, Data Auditing and Compliance, Consent Management
18CYB005TBlockchain Technology and SecurityProgram Elective3Blockchain Fundamentals, Consensus Mechanisms, Smart Contract Security, Cryptocurrency Security, Decentralized Applications (DApps) Security, Distributed Ledger Technology (DLT)
18CYB006TMalware Analysis and Reverse EngineeringProgram Elective3Malware Types and Characteristics, Static Analysis Techniques, Dynamic Analysis Techniques, Disassemblers and Debuggers (IDA Pro, x64dbg), Memory Forensics, Anti-Reversing Methods
18CSC703PProject Work IProject6Problem Identification and Scope, Literature Review, System Design and Architecture, Methodology Selection, Initial Prototype Development, Project Documentation

Semester 8

Subject CodeSubject NameSubject TypeCreditsKey Topics
18CSC801PProject Work II / InternshipProject / Internship10Advanced System Implementation, Testing and Validation, Deployment and Evaluation, Technical Report Writing, Presentation and Defense, Industry Problem Solving
PD-ElectiveProfessional Development ElectiveProfessional Development Elective3
whatsapp

Chat with us