This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks.
Interest in information security has been spurred by the pervasive use of computer-based applications such as information systems, databases, and the Internet. Information security has also emerged as a national goal in many countries. Information security is enabled through securing data, computers, and networks.
In this course, we will look into such topics as fundamentals of information security, cyber security, cyber laws, access control mechanisms, cryptography algorithms, software security, physical security, and security management and risk assessment.
By the end of this course, student will be able to describe major information security issues and trends, and advise an individual seeking to protect his or her data.
Admission into Bachelor‟s degree programmes requires all applicants to present a proof that they have completed:
Applicants must have a Certificate of Secondary Education Examinations (CSEE) or equivalent with minimum 4 passes and atleast 2 passes in Advance Certificate of Secondary Education Examinations (ACSEE) in any stream.
Applicants must have a Certificate of Secondary Education Examinations (CSEE) or equivalent with minimum 4 passes and Oridinary Diploma with minimum 3.0 GPA from a recognized institution or its equivalent.
|CTU 07101||Electronics & Communication Technology||12|
|CTU 07102||Introduction to Digital Electronics||12|
|CTU 07103||Introduction to Programming||9|
|CTU 07104||Introduction to IT||9|
|CTU 07105||Mathematics – I||9|
|CTU 07106||Communication Skills||9|
|CTU 07207||Web Designing & Programming||12|
|CTU 07208||Microprocessors & Microcontrollers||9|
|CTU 07209||Introduction to Object Oriented Programming||12|
|CTU 07210||Data Communication & Networking||9|
|CTU 07211||Field Work||10|
|CTU 07212||Database Management Systems||9|
|CTU 07313||Advanced SQL||12|
|CTU 07314||Operating System||9|
|CTU 07315||Advanced Object Oriented Programming||12|
|CTU 07316||Logic & Discrete Mathematics||9|
|CTU 07317||Business Organization||6|
|CTU 07318||Computer Graphics||12|
|CTU 07419||Network Design & Management||9|
|CTU 07420||Embedded Systems||12|
|CTU 07421||Quantitative Techniques||9|
|CTU 07422||Programming and Data Structures||15|
|CTU 08101||Security Architecture||9|
|CTU 08102||System Analysis and Design||9|
|CTU 08103||IPR & Cyber Laws||12|
|CTU 08104||Enterprise Security and Risk Management||9|
|CTU 08105||Hacker Technique, Exploits and Incident handling||12|
|CTU 08106||Industrial Training||10|
|CTU 08207||Network Security Administration||9|
|CTU 08208||Disaster Recovery||9|
|CTU 08208||Ethical Hacking||12|
|CTU 08210||Digital Forensic||12|
|CTU 08211||Access control systems||9|
|CTU 08212||Project Work||10|