Back to Curriculum
major track12 mapped coursesSemesters 3, 4, 5, 6, 7, 8

Cyber Security

Focuses on information security, cryptography, network defense, digital forensics, and secure application engineering.

Track structure

Required specialization courses

These are the required courses that define the major specialization journey.

CY201Semester 33 (3-0-0)

Information Security Fundamentals

The CIA Triad (Confidentiality, Integrity, Availability). Security Attacks: Passive (Interception, Traffic Analysis) vs. Active (Modification, Masquerade, Replay, DoS). Security Services (X.800) and Mechanisms. The Mo...

Data StructuresAlgorithmsComputer NetworksCyber Security
View course
CY202Semester 43 (2-1-0)

Cryptography & Network Security

Security services (confidentiality, integrity, authentication, non-repudiation), Classical ciphers (Caesar, Vigenère, Playfair, Hill), Cryptanalysis techniques (frequency analysis, known-plaintext attacks), Block vs....

Data StructuresAlgorithmsComputer NetworksCyber SecurityRobotics
View course
CY301Semester 53 (3-0-0)

Secure Network Protocols

CIA triad in networked environments, Threat modeling for protocols (STRIDE methodology), Secure protocol design patterns (encrypt-then-authenticate, stateful/stateless protocols), Cryptographic agility and algorithm l...

Data StructuresAlgorithmsComputer NetworksCyber SecurityDatabases
View course
CY401Semester 53 (2-0-2)

Ethical Hacking & Penetration Testing

Cybersecurity kill chain and MITRE ATT&CK framework, Legal and ethical considerations (ROE, NDA, scope agreements), Passive reconnaissance (OSINT, WHOIS, DNS enumeration, Shodan), Active reconnaissance (port scanning,...

SQLData StructuresComputer NetworksCyber SecurityCloud Computing
View course
CY501Semester 63 (3-0-0)

Advanced Cryptography

Differential cryptanalysis principles and attack complexity, Linear cryptanalysis and correlation matrices, Integral cryptanalysis and multidimensional characteristics, Truncated differential attacks, Impossible diffe...

Data StructuresAlgorithmsCyber SecurityGIS
View course
CY601Semester 63 (2-0-2)

Web & Application Security

OWASP Top 10 methodology and risk rating, Threat modeling (STRIDE, DREAD, PASTA), Authentication flaws (weak passwords, credential stuffing, broken session management), Authorization bypass techniques (IDOR, missing a...

MongoDBSQLNoSQLData StructuresAlgorithms
View course

Advanced elective pool

These electives are available within the same major specialization pathway.

CY-EL1Semesters 7, 84 (3-0-2)

Digital Forensics & Incident Response

Forensic science principles (Locard's exchange principle, scientific method), Digital evidence types and characteristics (volatile, non-volatile, latent), Chain of custody requirements, Legal considerations (admissibi...

Data StructuresComputer NetworksCompiler DesignCyber SecurityCloud Computing
View course
CY-EL2Semesters 7, 84 (3-0-2)

Cloud Security Architecture

Cloud service models (IaaS, PaaS, SaaS) and deployment models (public, private, hybrid, multi-cloud), Shared responsibility model across providers (AWS, Azure, GCP), Cloud security principles (CIA triad extension, def...

Computer NetworksCyber SecurityCloud ComputingDevOpsDatabases
View course
CY-EL3Semesters 7, 84 (3-0-2)

Malware Analysis & Reverse Engineering

Malware types classification (viruses, worms, trojans, ransomware, APTs), Infection vectors (phishing, drive-by, supply chain), Malware evolution (polymorphic, metamorphic, fileless), Kill chain models (Cyber Kill Cha...

Data StructuresComputer NetworksCompiler DesignCyber SecurityEmbedded Systems
View course
CY-EL4Semesters 7, 84 (3-0-2)

Blockchain & Decentralized Identity

Distributed ledger technology principles, Cryptographic hash functions (SHA-256, Keccak), Digital signatures (ECDSA, EdDSA), Merkle trees and Patricia tries, Consensus mechanisms (PoW, PoS, PBFT, Tendermint), Byzantin...

Data StructuresCyber SecurityDatabasesRoboticsBlockchain
View course
CY-EL5Semesters 7, 84 (3-0-2)

Mobile & Wireless Security

Android security model (sandboxing, app permissions, SELinux), iOS security (code signing, sandbox, XNU kernel), App lifecycle and inter-process communication (Intents, AIDL, XPC), Secure boot chain and verified boot,...

Computer NetworksCyber SecurityEmbedded SystemsGISSemiconductor Design
View course
CY-EL6Semesters 7, 84 (4-0-0)

Cyber Law, Risk & Compliance

Information Technology Act 2000 (amendments), Section 43/43A/65/66/66A-66F offenses, Digital Personal Data Protection Act 2023 (DPDP), Reasonable security practices and SOPs, Cyber Appellate Tribunal, Electronic signa...

Cyber SecurityRoboticsSemiconductor Design
View course