The center offers various courses that can be opted for by students during the course

of their study.


Provide an overall view of what Computer and Network Security is all about and generate interest in this field to be able to take this as a further specialization area or a career path.


Introduction of Perimeter Security (Firewall, IDS, IPSEC), Understand various access roles of an organization, helps in protecting personal data of clients existing on network. 


If there are various computers attached to a network, there may be some computers that may have greater access to information than others.


Private networks can be provided protection from external attacks by closing them off from internet. Network Security makes them safe from virus attacks, etc.

Prerequisite: Computer Network Security


Learn the challenges and pitfalls of Software Development and Secure Programming, across the Web, Mobile Devices and IoT.


Learn the possible attacks and available remedies.


Learn about security design and testing best practices.


Learn how to use some common security testing strategies and Penetration Testing.


Learn basic Security etiquette on how to prevent themselves from being compromised by a malicious attacker.


Learn to Find security issues in the various Web based or Mobile based Applications


The purpose of Advanced Computer Networks course is to help students design networks that meet a customer’s business and technical goals. This course provides students with tested processes and tools to help understand traffic flow, protocol behavior, and internetworking technologies. After completing this course, students will be equipped to design enterprise networks that meet a customer’s requirements for functionality, capacity, performance, availability, scalability, affordability, security, and manageability.


Illustrate various Public key cryptographic techniques. Evaluate the authentication and hash algorithms. Discuss authentication applications. Illustrate various Public key cryptographic techniques. Evaluate the authentication and hash algorithms. Discuss authentication applications.



Computer Networks is an introduction to the design and analysis of computer communication networks.


Topics include application layer protocols, Internet protocols, network interfaces, local and wide area networks, wireless networks, bridging and routing, and current topics.


The course objectives include learning about computer network organization and implementation, obtaining a theoretical understanding of data communication and computer networks, and gaining practical experience in installation, monitoring, and troubleshooting of current LAN systems.


This course covers computer networks concepts, Internet, application layer, transport layer protocols, network layer and routing, data link layer and IEEE 802.11 wireless LAN.


The intent of this courrse is to make students learn the cyber security breaches and how the forensics analysis is made.


The topics include the Digital Forensics process and the Hard disk structure, The process of Data Acquisition and the structure of FAT and NTFS file system on Windows operating system,The Structure of Linux File system (EXT3/EXT4) and the file carving process,The Android Mobile device forensics and Multimedia Steganography procedures,The procedure for Email Forensics Analysis and Final report writing as per the court of law.


Web technologies course is proposed to students to make me then understand the work behind a rich web application.


They will understand what are the basic web technologies,Learn building blocks of a website using HTML, CSS and JavaScript.Also they will learn about the core concepts of HTML5, Advanced JavaScript, JQuery and AJAX through hands-on exercise.


They are itntroduced to the industry trending MERN (MongoDB, ExpressJS, ReactJS and NodeJS) stack and Build an UI of the application using React JS,understand the binding of an UI to the MongoDB through NodeJS. and deal with API's using iddleware Express JS.




Secure programming course outlines an in-depth engineering analysis of programming errors in C Programming language that have led to system vulnerabilities while using strings,dynamic memory allocation, integer arithmetic. The course also discusses the relevant mitigation strategies that can be effectively and pragmatically applied to reduce or eliminate the risk of exploitation


Software Defined Networking (SDN) has become one of the industries most talked technologies.


This course provides a strong knowledge of the technology evolution leading to SDN as well as the Open Source role in SDN.It makes student to understand the architecture of SDN traffic through Control and Data planes.


This course cuts through the hype and looks at the technology, architecture and products available for SDN along with the security analysis of the network.


This course provides the fundamentals of cloud computing architectures based on current standards, protocols, and best practices intended for delivering Cloud based enterprise IT services and business applications. It also provides a comprehensive review of the knowledge required for understanding cloud computing and its information security risks and mitigation strategies.


Students can understand the approaches to designing cloud services that meets essential Cloud infrastructure characteristics and also designs security architectures that assures secure isolation of physical and logical infrastructures including compute, network and storage, comprehensive data protection at all layers, end-to-end identity and access management, monitoring and auditing processes and compliance with industry and regulatory mandates.


Wireless Network is the backbone network for all the smart communication domains like Internet of Things and Machine to machine communication.


This course Introduces different wireless network technologies for various applications. It familiarizes with the Mobile radio propagation, fading, diversity concepts and the channel modelling. It helps to learn the impact of various factors on communication, link design, smart antenna, beam forming and MIMO systems. It will provide an analysis capability with respect to various design parameters like Multi-carrier system, Single carrier, Multiuser system, Network planning and OFDM Concepts. It also helps students identify different attacks on wireless network and security mechanisms.



Internet of Things is for real word entities and role of IoT in various domains of Industry. This course will help understand the concepts of Internet of Things and can help students build IoT applications.


Build a small low-cost embedded system using Arduino / Raspberry Pi or equivalent boards. Evaluate different infrastructure components and network systems and design the basic network for IoT solutions.Employ the need of Data Analytics and Security in IoT. Analyse applications of Internet of Things in real world scenario.