Admission open for 2025-26

UG and PG programs | B.E – CET : E139 | M.Tech – PGCET : T962 | MBA – PGCET : B186

ICEAS

Department Computer Science and Engineering- Cyber Security

Overview

Cybersecurity is tailored to meet the growing need for proficient security professionals in both the public and private sectors, encompassing expertise in Data Security as well as Network/Cloud Security domains.

The curriculum includes fundamental computer science topics alongside specialized cybersecurity courses. The program focuses on fostering students with the requisite knowledge and abilities to safeguard computer systems, identify and analyze threats and attacks, respond effectively, and formulate security policies, procedures, and standards.

The undergraduate program spans four years and provides a solid foundation in Basic Sciences, Mathematical Principles, Cybersecurity, Cryptography, Network Security, Secure Programming, and Ethical Hacking.

The designed curriculum instills 21st-century skills through various components: Liberal education for holistic development, courses fostering contemporary skills, project-based learning, specialized topics with expert mentoring, opportunities for Massive Open Online Courses (MOOCs), undergraduate research projects, product development, and internships. It emphasizes liberal arts, foundation courses, professional subjects, and electives to cultivate expertise in specialized domains. Additionally, the curriculum underscores design-oriented thinking, communication, collaboration, and creativity from the first year onward.

Vision

Inspire and cultivate young learners to establish a sustainable, compassionate, and research-driven educational framework within the cybersecurity domain, aiming to construct a secure, resilient, and threat-free digital realm.

Mission

To offer dedicated and proficient faculty alongside educational infrastructure to impart both theoretical knowledge and practical skills in cybersecurity to the emerging generation.

To Set up Memorandums of Understanding (MoUs) in collaboration with the Information Technology sector to produce cybersecurity graduates equipped with industry-ready skills and a cultivated research mindset, fostering the sustainable development of young learners.

To Establish an environment for project-based learning that prioritizes collaboration and teamwork, aimed at tackling global challenges while upholding human and ethical values.

Motivate young individuals to educate society and ensure nationwide human safety and security in the digital realm.

Vision

To serve as a hub of excellence in Artificial Intelligence and Machine Learning, offering high-quality education and research that addresses the demands of both industry and society.

Mission

  1. To attain academic excellence by implementing innovative teaching and learning methods.
  2. To foster a culture of innovation, creativity, and research.
  3. To improve job readiness through skill enhancement and fostering interaction between academia and industry.
  4. To cultivate individuals with a strong sense of ethics and social accountability.

Computer Science and Engineering- Cyber Security

Program Educational Objectives (PEOs)

PEO1: Tackle real-world problems and challenges within the field of cybersecurity.

PEO2: Create, analyze, assess, and implement resilient and secure cyber-physical systems to fulfill specified requirements.

PEO3: Efficiently operate across various sectors such as academia, industry, research and development, entrepreneurship, and startup initiation, either independently or collaboratively, leveraging interpersonal skills.

PEO4: Uphold ethical standards in professional conduct, societal interactions, and environmental considerations.

Programme Specific Outcomes (PSOs)

PSO1: Acquire proficiency in comprehending, analyzing, and creating computer programs within domains such as networking, cryptography, web development, and database management, following the software development life cycle.

PSO2: Possess the capability to formulate strategies for safeguarding data, resources, and assets of organizations, processes, individuals, and communities utilizing Cybersecurity-focused expertise.

Overview Of the Curriculum

3rd SEM

  1. Mathematics for Computer Science
  2. Data Structures and Applications
  3. Digital Design & Computer Organization
  4. Operating Systems
  5. Data Structures Laboratory
  6. Object Oriented Programming with Java
  7. PHP Programming

4th SEM

  1. Analysis & Design of Algorithms
  2. Database Management Systems
  3. Microcontrollers
  4. Design and Analysis of Algorithm Laboratory
  5. Discrete Mathematical Structures
  6. Scala

5th SEM

  1. Software Engineering & Project Management
  2. Computer Networks (NS-2/3)
  3. Theory of Computation
  4. Data Visualization Lab
  5. Principles of Artificial Intelligence
  6. Mathematics for Machine Learning
  7. Artificial Intelligence Laboratory
  8. DBMS Laboratory with mini

6th SEM

  1. Big Data Analytics
  2. Artificial Intelligence & Machine Learning
  3. Devops
  4. Machine Learning Laboratory
  5. Mobile Application Development Laboratory

7th SEM

  1. Scalable Computing
  2. Statistical Machine Learning for Data Science
  3. Information & Network Security
  4. IOT Analytics
  5. Software Engineering

8th SEM

  1. Data Security and Privacy
  2. System Modelling and Simulation

ICEAS

Value Added Courses

Skill development courses

  1. Data Structures and Applications 
  2. Design and Analysis of Algorithms
  3. PHP Programming
  4. Database Management System 
  5. Java for Mobile Applications
  6.  Mobile Application Development Laboratory
  7.  Big Data Analytics      

Faq

What are the job opportunities after a degree in Cyber Security?

Students can work as Security Analysts, Ethical Hackers, Security Engineers, Forensic Experts, and Compliance Officers.

Which industries recruit Cyber Security professionals?

Industries like banking, defense, IT, telecom, and e-commerce actively hire cybersecurity specialists.

What are the core skills taught?

Skills include ethical hacking, network defense, cryptography, malware analysis, and penetration testing.

What tools are used for training?

Tools like Wireshark, Metasploit, Kali Linux, Burp Suite, and Nessus are taught.

Are there dedicated labs for Cyber Security students?

Yes, Cyber Labs equipped with simulation and testing tools are provided.

. Are international collaborations offered?

Yes, students can participate in global exchange and research programs.

How does the curriculum align with industry standards?

It aligns with global frameworks like NIST, ISO 27001, and CIS Controls.

How does the department assist with placements?

Training programs, mock tests, and pre-placement talks are organized.

Are cloud security concepts taught?

Yes, modules cover AWS and Azure security practices.

Is cyber security a high-demand career?

Yes. Cyber security is one of the fastest growing fields globally due to the rise in cyber attacks, digitalization, cloud adoption, and AI-driven threats.

Are internships available in Cyber Security?

Yes. Most colleges partner with IT companies, cybersecurity firms, and start-ups offering internships in SOC operations, security testing, and vulnerability analysis.

Will the course include practical training?

Yes. Students gain hands-on experience through:

  • Cyber labs

  • Penetration testing simulations

  • Real-time attack-defense scenarios

  • Workshops & hackathons

What are the placement prospects?

Graduates earn average packages of ₹6–12 LPA with top security firms and MNCs.

Are internships compulsory?

Yes, internships with cybersecurity firms or government agencies are mandatory.

Are ethical hacking workshops conducted?

Regular workshops and Capture The Flag (CTF) competitions are conducted.

What higher education options are available?

Students can pursue M.Tech in Cyber Security, Information Assurance, or Digital Forensics.

Are students trained in digital forensics?

Yes, digital evidence handling and investigation are part of the curriculum.

EVENTS

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

MBA Students Industrial  visit to Bangalore Metro stations(25-08-2023) to know the startup issues – Entrepreneurship opportunities and Challenges

MBA students Participated in the “Business plan-Inter collegiate competition” -ideate 2023 held in Koshys college(28-09-23)-To orient on Business Planning and Launching an Enterprise 

 Industrial visit  to Coorg Coffee Estate -to make the aware Coffee industry and opportunities(27-29, October 23)

ICEAS

Admissions

Welcome to the ICEAS Admission Cell. Please fill in the application form below, ensuring all mandatory details are completed. Submit the form, and our team will contact you.

Welcome to the ICEAS Admission Cell. Please fill in the application form below, ensuring all mandatory details are completed. Submit the form, and our team will contact you.

ICEAS

Life@ICEAS

error: Content is protected !!

Enquiry Form

"*" indicates required fields

Name*
Gender*
This field is for validation purposes and should be left unchanged.