‘Cybersecurity Ventures’ projected that the cost of cyber-threats will rise to $6 trillion annually by 2021. It isn’t just the number of cyber security attacks that is increasing but the degree of these attacks is also on rise. According a PwC report, these attacks are “becoming progressively destructive and target a broadening array of information and attack vectors.”Increase in the prevalence of cybercrime attacks on business organizations, government infrastructures and individuals, has emphasized the importance of Cyber Security. In fact Cybersecurity is becoming an increasingly central facet of national security strategy. Both private and public sectors are relying on cyber security professionals to keep personal and professional information safe.A recent CSIS survey of IT decision makers across eight countries found that 82 percent of employers report a shortage of cyber security skills and 71 percent believe this talent gap causes direct and measurable damage to their organizations. Also Global Information Security Workforce Study reveals that the global cybersecurity workforce shortage would reach around 1.8 million unfilled positions. Specialization in Cyber Security will equip students with right set of skills to combat ever increasing cyber-crimes. Further, this specialization aims to enhance the value of graduate degree in terms of career advancement, higher income and increased job security.

Learning outcomes of this track: 
By the end of this course, students will develop skills to:

  • Design cyber security tools and security applications in the field of Information technology and security analysis
  • Apply penetration testing to exploit and investigate vulnerable systems
  • Forensically investigate Linux and Windows systems
  • Carry out in-depth analysis of modern malware samples using Static and Dynamic analysis techniques
  • Perform Quantitative and Qualitative risk assessment on the identified risk

Career Options:

  • Web application security analyst
  • Network security engineer
  • Technical Security Analyst
  • Cyber Forensic Investigator
  • Information Security Consultant

Contact Us

"By using the IT and related network resources of the NCU, you are hereby accepting to abide by all the laws of the Government of India and all rules and regulations under the Information Technology and Network Resources Policy of the NCU. Acts of any misuse or unlawful are strictly prohibited and will be dealt under the applicable laws and IT and Network Resources Policy of the NCU. "

Follow Us

Virtual Tour