S. No
|
Course Code
|
Course Title
|
Cr Hrs
|
Group A: Software Security and Information Assurance
|
1.
|
CY300
|
Cyber Security Management
|
2-0-2
|
CY300L
|
Cyber Security Management Lab
|
0-1-1
|
2.
|
CY301
|
Cyber Ethics
|
3-0-3
|
3.
|
CY302
|
Human Behaviors in Cyber Security
|
3-0-3
|
4.
|
CY303
|
Cyber Security and Governance
|
3-0-3
|
5.
|
CY404
|
Cyber Warfare
|
3-0-3
|
6.
|
CY405
|
Operating System Security
|
2-0-2
|
CY405L
|
Operating System Security Lab
|
0-1-1
|
7.
|
CY306
|
Secure Web Development
|
2-0-2
|
CY306L
|
Secure Web Development Lab
|
0-1-1
|
8.
|
CY407
|
Compliance and Auditing in Defense Systems
|
2-0-2
|
CY407L
|
Compliance and Auditing in Defense Systems Lab
|
0-1-1
|
9.
|
CY308
|
Generating Software Security Tests
|
2-0-2
|
CY308L
|
Generating Software Security Tests Lab
|
0-1-1
|
10.
|
CY409
|
Automated Debugging
|
2-0-2
|
CY409L
|
Automated Debugging Lab
|
0-1-1
|
Group B: Cryptography
|
1.
|
CY210
|
Number Theory
|
2-0-2
|
CY210L
|
Number Theory Lab
|
0-1-1
|
2.
|
CY312
|
Cryptography
|
2-0-2
|
CY312L
|
Cryptography Lab
|
0-1-1
|
3.
|
CY313
|
Cryptanalysis
|
2-0-2
|
CY313L
|
Cryptanalysis Lab
|
0-1-1
|
4.
|
CY314
|
Cryptomining
|
2-0-2
|
CY314L
|
Cryptomining Lab
|
0-1-1
|
5.
|
CY414
|
Blockchain Security
|
2-0-2
|
CY414L
|
Blockchain Security Lab
|
0-1-1
|
6.
|
CY415
|
Steganography
|
2-0-2
|
CY415L
|
Steganography Lab
|
0-1-1
|
7.
|
CY416
|
Quantum Cryptography
|
2-0-2
|
CY416L
|
Quantum Cryptography Lab
|
0-1-1
|
8.
|
CY317
|
Applied Cryptography
|
2-0-2
|
CY317L
|
Applied Cryptography Lab
|
0-1-1
|
Group C: Digital Forensics and Incident Response
|
1.
|
CY220
|
Reverse Engineering and Vulnerability Assessment
|
2-0-2
|
CY220L
|
Reverse Engineering and Vulnerability Assessment Lab
|
0-1-1
|
2.
|
CY321
|
Computer Forensics
|
2-0-2
|
CY321L
|
Computer Forensics Lab
|
0-1-1
|
3.
|
CY322
|
Network Forensics
|
2-0-2
|
CY322L
|
Network Forensics Lab
|
0-1-1
|
4.
|
CY323
|
Smart Devices Forensics
|
2-0-2
|
CY323L
|
Smart Devices Forensics Lab
|
0-1-1
|
5.
|
CY326
|
Social Media Forensics
|
2-0-2
|
CY326L
|
Social Media Forensics Lab
|
0-1-1
|
6.
|
CY327
|
Database Security
|
2-0-2
|
CY327L
|
Database Security Lab
|
0-1-1
|
7.
|
CY328
|
Malware Analysis
|
2-0-2
|
CY328L
|
Malware Analysis Lab
|
0-1-1
|
8.
|
CY429
|
Cyber Threat Intelligence
|
2-0-2
|
CY429L
|
Cyber Threat Intelligence Lab
|
0-1-1
|
Group D: Network and Infrastructure Security
|
1.
|
CY330
|
Ethical Hacking and Defense
|
2-0-2
|
CY330L
|
Ethical Hacking and Defense Lab
|
0-1-1
|
2.
|
CY331
|
Wireless Networks Security
|
2-0-2
|
CY331L
|
Wireless Networks Security Lab
|
0-1-1
|
3.
|
CY332
|
Linux Fundamentals
|
2-0-2
|
CY332L
|
Linux Fundamentals Lab
|
0-1-1
|
4.
|
CY433
|
Penetration Testing
|
2-0-2
|
CY433L
|
Penetration Testing Lab
|
0-1-1
|
5.
|
CY434
|
Business Infrastructure and Security
|
2-0-2
|
CY434L
|
Business Infrastructure and Security Lab
|
0-1-1
|
6.
|
CY435
|
Internet Security
|
2-0-2
|
CY435L
|
Internet Security Lab
|
0-1-1
|
7.
|
CY437
|
Privacy-Enhancing Technologies
|
2-0-2
|
CY437L
|
Privacy-Enhancing Technologies Lab
|
0-1-1
|
Group E: Cyber Physical and Embedded System Security
|
1.
|
CY340
|
Embedded System Security
|
2-0-2
|
CY340LL
|
Embedded System Security Lab
|
0-1-1
|
2.
|
CY341
|
Smart and Autonomous Vehicle Security
|
2-0-2
|
CY341L
|
Smart and Autonomous Vehicle Security Lab
|
0-1-1
|
3.
|
CY342
|
OT Security
|
2-0-2
|
CY342L
|
OT Security Lab
|
0-1-1
|
4.
|
CY443
|
Cyber Physical System Security
|
2-0-2
|
CY443L
|
Cyber Physical System Security Lab
|
0-1-1
|
5.
|
CY444
|
UAV Security
|
2-0-2
|
CY444L
|
UAV Security Lab
|
0-1-1
|
6.
|
CY445
|
Distributed Control System Security
|
2-0-2
|
CY445L
|
Distributed Control System Security Lab
|
0-1-1
|
7.
|
CY449
|
Applied Physical Attacks and Hardware Pen testing
|
2-0-2
|
CY449L
|
Applied Physical Attacks and Hardware Pen testing Lab
|
0-1-1
|
Group F: Applied Cyber Security
|
1.
|
CY350
|
Machine Learning in Cyber Security
|
2-0-2
|
CY350L
|
Machine Learning in Cyber Security Lab
|
0-1-1
|
2.
|
CY351
|
Web Application Security
|
2-0-2
|
CY351L
|
Web Application Security Lab
|
0-1-1
|
3.
|
CY352
|
Cloud Computing Security
|
2-0-2
|
CY352L
|
Cloud Computing Security Lab
|
0-1-1
|
4.
|
CY353
|
Cyber Security Tool Development
|
2-0-2
|
CY353
|
Cyber Security Tool Development Lab
|
0-1-1
|
5.
|
CY454
|
Cyber Security for AI and AI for Cyber Security
|
2-0-2
|
CY454L
|
Cyber Security for AI and AI for Cyber Security Lab
|
0-1-1
|
6.
|
CY455
|
Usable Security and Privacy
|
2-0-2
|
CY455L
|
Usable Security and Privacy Lab
|
0-1-1
|
7.
|
CY356
|
Cyber Security Analytics
|
2-0-2
|
CY356L
|
Cyber Security Analytics Lab
|
0-1-1
|
8.
|
CY358
|
Financial Systems Security
|
2-0-2
|
CY358L
|
Financial Systems Security Lab
|
0-1-1
|
9.
|
CY359
|
Space Systems Cyber Security
|
2-0-2
|
Cy359L
|
Space Systems Cyber Security Lab
|
0-1-1
|