0% found this document useful (0 votes)
39 views3 pages

PG Cyber Security

Uploaded by

mutuh67
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views3 pages

PG Cyber Security

Uploaded by

mutuh67
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Post-Graduate Programs in Cyber Security

Degree Names

Sl. Full Name Short Name Remarks

1 Master of Science in Cyber M. Sc. (Cyber 18 Credit courses + 18 Credits


Security Security) Thesis
2 30 Credit courses + 6 Credits
Master of Cyber Security M. Cyber Security
Project
3 Doctor of Philosophy Ph.D. Program Name: Cyber Security

Admission Requirements

For Master’s Degrees

There are two groups who will be eligible for admission for the Master’s programs and the
admission requirements are as follows.

1. [Group A] 4-year B.Sc. in Computer Science and Engineering (CSE) or Electrical and
Electronic Engineering (EEE) or Computer Science (CS) or Computer Engineering (CE)
or Electrical and Computer Engineering (ECE) or equivalent field.
2. [Group B] 4-year Bachelor’s degree in any other engineering or mathematical science
or natural science or business information systems or related field.

For Ph.D. Degrees

The admission requirement for the Ph.D. program is as follows:

1. [Group A] Master’s degree in Cyber Security or Computer Science and Engineering


(CSE) or Electrical and Electronic Engineering (EEE) or Computer Science (CS) or
Computer Engineering (CE) or Electrical and Computer Engineering (ECE) or equivalent
field.
2. [Group B] Master’s degree in any other engineering or mathematical science or
natural science or business information systems or related field.
Degree Requirements
1. For students satisfying Group A entry requirements:

Courses

Total Number of Minimum Thesis/


Total
Program Mode Number of Foundation Number of Project
Credit
Courses Courses Core Courses Credit
(Credit)

M. Sc.
Thesis 6 Courses 18 36
(Cyber 0 4
Based (18 Credit) Credit Credit
Security)

M. Cyber Course 10 Courses 36


0 6 6 Credit
Security Based (30 Credit) Credit

Ph.D. N/A 3 Courses (9 45 54


0 2
Credit) Credit Credit

2. For students satisfying only Group B entry requirements:

Courses

Total Number of Minimum Thesis/


Total
Program Mode Number of Foundation Number of Project
Credit
Courses Courses Core Courses Credit
(Credit)

M. Sc. Thesis
6 Courses 2 (Audit 18 36
(Cyber Based 4
(18 Credit) course) Credit Credit
Security)

M. Cyber Course 10 Courses 2 (Audit 36


6 6 Credit
Security Based (30 Credit) course) Credit

Ph.D. N/A 3 Courses (9 2 (Audit 45 54


2
Credit) course) Credit Credit

NOTES:
1. Audit courses may be waived by BPGS depending on the background of a student upon
application.
2. The remaining required courses (i.e., courses other than the Foundation courses and
Core courses) can be taken from any PG courses.
3. The thesis/project must be on a topic relevant to the program area.

Courses
Foundation Courses

1. CSE 5401: Computing Foundation – I


2. CSE 5601: Computer Networking and Operating Systems

Core Courses

1. CSE 6207: Advanced Dependable and Fault-Tolerant Computer Systems


2. CSE 6608: Blockchain Technologies and Systems
3. CSE 6807: Elements of Cryptography
4. CSE 6813: Network Security
5. CSE 6814: Cloud Security
6. CSE 6815: Biometric Security
7. CSE 6816: Security in IoT
8. CSE 6817: Software and Application Security
9. CSE 6818: Digital Forensics
10. CSE 6819: Human Factors in Cyber Security
11. CSE 6820: Industrial Cyber Security
12. CSE 6821: Ethical Hacking and Penetration Testing
13. CSE 6822: Malware Analysis
14. CSE 6823: Information Security Management

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy