top of page

Our Courses

Computer Networks

UEXXCS253

Undergraduate

This is a foundation course on Computer Networking which focuses on building blocks of the Internet. We trace the journey of messages sent over the Internet from an application residing on one host machine (source) to another (Destination) using a top down layered approach. The course contents are organized based on TCP Protocol stack.

Internet of Things

UEXXCS313

Undergraduate

The Internet of Things is transforming our physical world into a complex and dynamic system of connected devices on an unprecedented scale. In this course, student will explore various components of Internet of things such as Sensors, internetworking and cyber space. In the end they will also be able to design and implement IoT circuits and solutions.

Fundamentals of Augmented and Virtual Reality

UEXXCS315

Undergraduate

This course presents an introduction to virtual and augmented reality technologies, with an emphasis on designing and developing interactive virtual and augmented reality experiences using blender and Unity3D.

Computer Network Security

UEXXCS326

Undergraduate

Give an overview and conceptual understanding of network related security aspects. Students will have opportunities to dwell well into technical “how to” with hands-on sessions and with case studies.

Cyber Forensics

UEXXCS336

Undergraduate

Cyber Forensics course provides a deep understanding of the techniques to gather, protect and report the digital confirmations.

Wireless Network Communication

UEXXCS347

Undergraduate

Wireless Networks Communication is a dynamic field that has spurred tremendous excitement and technological advances. This course provides a comprehensive understanding of the fundamental principles, characteristics, performance limits of wireless systems, their security issues and the insights associated with their design.

Topics in Computer and Network Security

UEXXCS563

Postgraduate

Computer Network security prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources by entailing the policies and practices adaptation. it is important to know about different kinds of vulnerabilities like buffer overflow, SQL Injection, Firewall injection attacks, etc.

Software Security

UEXXCS573

Postgraduate

The course presents the challenges and mechanisms to develop safe and secure software. The main focus of the course is to provide an insight of the software vulnerabilities, its consequences during exploitation and the procedure to harden the system against those attacks.

Cyber Security Essentials

UX221CS641A

Executive M.Tech

This course will cover the essentials of Cybersecurity, and students will learn about the characteristics of security principles, technologies, and procedures to secure networks, software and other assets of an organization. They will also gain an insight into Risk Management, Incident Management, Cryptography, Operations Security, Digital Forensics etc.

Software Security

Executive M.Tech

The course presents the challenges and mechanisms to develop safe and secure software. The main focus of the course is to provide an insight of the software vulnerabilities, its consequences during exploitation and the procedure to harden the system against those attacks.

Applied Cryptography

UX221CS642B

Executive M.Tech

Cryptography is the science of securing data by using mathematical concepts. Cryptography involves the authentication and verification of data in all domains by applying Cryptographic protocols.

Computer Networks Laboratory

UEXXCS255

Undergraduate

Computer Networks Laboratory helps students learn how to put "principles into practice," in a hands-on- networking lab course. These labs will be done in a networked lab setting with Ethernet switches, NICs, desktops and cables. Cisco Packet Tracer, a visual simulation tool designed by Cisco Systems allows students to create network topologies and imitate modern computer networks. Claynet, a network virtualization tool helps students realize large scale networks using routing and switching NFV technology.

Applied Cryptography (UG)

UEXXCS314

Undergraduate

Cryptography is the science of securing data by using mathematical concepts. Cryptography involves the authentication and verification of data in all domains by applying Cryptographic protocols.

Advanced Computer Networks

UEXXCS325

Undergraduate

Advanced Computer Networks course will help students design networks that meet a customer’s business and technical goals. This course provides tested processes and tools to help you understand traffic flow, protocol behaviour, and internetworking technologies. Students will be equipped to design enterprise networks that meet a customer’s requirements for functionality, capacity, performance, availability, scalability, affordability, security, and manageability.

Blockchain

UEXXCS335

Undergraduate

Blockchain having wide impact and potential growth for change around the world. It is changing how business is executed. It's important to understand why Blockchain is different and how it works in comparison with technologies of the past.

Information Security

UEXXCS346

Undergraduate

This course will present security aspects from a software life cycle process - requirement,

Architecture - Design, coding, and testing. Students will have opportunity well dwell in to technical "how to" with hands on sessions and some case studies.

Cyber Security Essentials

UEXXCS505

Postgraduate

This course will cover the essentials of Cybersecurity, and students will learn about the characteristics of security principles, technologies, and procedures to secure networks, software and other assets of an organization. They will also gain an insight into Risk Management, Incident Management, Cryptography, Operations Security, Digital Forensics etc.

Virtual Reality and its Applications

UEXXCS572

Postgraduate

Physical entity is simulated into virtual or imaginary environment which are designed as software or as a program that defy beliefs of a user compelling him/her to accept it as actual reality. Virtual Reality actually exploits and plays with the sensations & perceptions of our brain by simulating an artificial environment which actually doesn’t really exists but our brains thinks that it does it’s just like make belief.

Cryptography

UEXXCS583

Postgraduate

Cryptography is the science of securing data by using mathematical concepts. Cryptography involves the authentication and verification of data in all domains by applying Cryptographic protocols

Topics in Computer and Network Security

Executive M.Tech

Computer Network security prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources by entailing the policies and practices adaptation. it is important to know about different kinds of vulnerabilities like buffer overflow, SQL Injection, Firewall injection attacks, etc

Topics in Cryptography

Executive M.Tech

Cryptography is the science of securing data by using mathematical concepts. Cryptography involves the authentication and verification of data in all domains by applying Cryptographic protocols.

bottom of page