Overview
The Bachelor of Computer Applications (BCA) with a specialization in Cyber Security(CyS) is a 3 years innovative program designed for students passionate about technology and determined to protect the digital world. With the rapid growth of cybercrime and reliance on digital systems, skilled cybersecurity professionals are in high demand. This programme provides a strong foundation in computer applications along with specialized training to secure networks, systems, and data from cyber threats.
What You’ll Learn
- This specialized BCA program delves into topics such as
- Cyber Law and Digital Forensics
- Penetration testing
- Cryptography
- Cyber security
- Cyber Threat and Vulnerabilities,
Empowering students to tackle real-world challenges in diverse domains such as banking, healthcare, cloud services, telecommunications, and smart technologies.
Practical Skills
With a strong emphasis on hands-on training and industry-relevant coursework, graduates of the BCA in Cyber Security program emerge as skilled professionals capable of securing digital systems, detecting and mitigating cyber threats, and ensuring data integrity in an increasingly connected digital world.
Career Pathways
- Cyber security analysts
- Security engineers
- Penetration testers
- Digital forensics analysts
- Information security professionals
- Ethical hackers
- Security administrators
- SOC professionals.
- Network Security Engineer
- System Security Administrator
- Cyber Crime Analyst
- Incident Response Analyst
- Cyber Law & Compliance Executive
Programme Education Objectives
| PEOs | Programme Educational Objectives |
|---|---|
| PEO1 | To equip students with a strong foundation in computer applications, emphasizing cyber security concepts to meet evolving industry requirements |
| PEO2 | To provide in-depth practical knowledge to apply modern techniques of problem solving to create cutting-edge technology in various domains. |
| PEO3 | To develop technical expertise in cyber security principles and practices, including cryptography, ethical hacking, computer forensics, and cloud security |
| PEO4 | To foster creative thinking, problem-solving, and interpersonal communication to enable effective teamwork and leadership in high-growth IT domains |
| PEO5 | To prepare graduates for career opportunities and entrepreneurship in cyber security, supporting further studies and research |
Programme Outcomes (POs)
| POs | Programme Outcomes |
|---|---|
| PO1 | Proficiently design, implement, and manage security applications and infrastructure using current technologies and industry-standard tools. |
| PO2 | Demonstrate strong knowledge of cybersecurity practices to protect data, identify threats, evaluate vulnerabilities, and enforce security policies across modern computer networks and cloud environments. |
| PO3 | Analyze, design, and evaluate software solutions and systems that address complex real-world computing and information security challenges. |
| PO4 | Effectively communicate technical concepts and collaborate in multidisciplinary teams, preparing for roles as professionals or entrepreneurs in cloud and security sectors. |
| PO5 | Engage in lifelong learning and independent upskilling to keep pace with technological advancements in cloud computing and security, adapting to changing industry landscapes. |
Programme Structure
| Semester I | Semester II | Semester III | Semester IV | Semester V | Semester VI |
|---|---|---|---|---|---|
| Language I – Kannada: Saahitya Sangama – I, Hindi: Gadya Sampada, Additional English: Translations selected from South India | Language I – Kannada: Saahitya Sangama – II, Hindi: Gadya Deep, Additional English: Translations selected from East and North East India | Language I | Language I | Artificial Intelligence in Cybersecurity | Data Privacy and Security |
| Language II – Generic English: Readings from Literature and Language Skills | Language II – Generic English: Interpretations of Literature and Language Skills | Generic English | Generic English | Cyber Law and Digital Forensics | Cryptography and Cyber Security Management |
| Discrete Mathematics | Computer Architecture | Essentials of Cyber Security | Computer Networks and Security | Penetration Testing | Internet of Things Security |
| Problem Solving Techniques using C | Data Structures | Operating Systems and Linux Administration | Software Engineering | Digital Forensics Tools Lab | Data Privacy and Security Lab |
| Database Management Systems | Object Oriented Programming Using Java | Python Programming | Full Stack Web Development | Penetration Testing Lab | Main Project |
| C Programming Lab | Data Structures Lab | Python Programming Lab | Cyber Threat and Vulnerabilities Lab | Mini Project | Professional Business Communication |
| DBMS Lab | Java Lab | Unix Shell Programming Lab | Full Stack Web Development Lab | Elective III: 1.Cloud Security 2.Cybercrime Investigation Techniques 3.Wireless and VOIP Security |
- |
| Constitutional Moral Values –I | Environmental Studies | Elective I 1.Cloud Computing 2.Computer Animation 3.OOAD Using UML |
Elective II 1.Block Chain Technology 2.Ethical Hacking 3. E-Commerce and E-Business |
Aptitude and Reasoning | - |
| - | - | Constitutional Moral Values | - | - | - |
Semester I
| Course Code | Name of Course | Teaching Hours | Credits |
|---|---|---|---|
| 25SKN 1.1 / 25SHN 1.1 / 25ADE 1.1 | Language I – Kannada: Saahitya Sangama – I, Hindi: Gadya Sampada, Additional English: Translations selected from South India | 60 | 3 |
| 25GEN 1.1 | Language II – Generic English: Readings from Literature and Language Skills | 60 | 3 |
| 26CYSDC 1.1 | Discrete Mathematics | 56 | 4 |
| 26CYSDC 1.2 | Problem Solving Techniques using C | 56 | 4 |
| 26CYSDC 1.3 | Database Management Systems | 56 | 4 |
| 26CYSDC 1.4 | C Programming Lab | 45 | 2 |
| 26CYSDC 1.5 | DBMS Lab | 45 | 2 |
| 24VBC 1.1 | Constitutional Moral Values –I | 30 | 2 |
| Total Credits | 24 |
Semester II
| Course Code | Name of Course | Teaching Hours | Credits |
|---|---|---|---|
| 25SKN 2.1 / 25SHN 2.1 / 25ADE 2.1 | Language I – Kannada: Saahitya Sangama – II, Hindi: Gadya Deep, Additional English: Translations selected from East and North East India | 60 | 3 |
| 25GEN 2.1 | Language II – Generic English: Interpretations of Literature and Language Skills | 60 | 3 |
| 26CYSDC 2.1 | Computer Architecture | 56 | 4 |
| 26CYSDC 2.2 | Data Structures | 56 | 4 |
| 26CYSDC 2.3 | Object-Oriented Programming Using Java | 56 | 4 |
| 26CYSDC 2.4 | Data Structures Lab | 45 | 2 |
| 26CYSDC 2.5 | Java Lab | 45 | 2 |
| 24VBC 2.1 | Environmental Studies | 30 | 2 |
| Total Credits | 24 |
Value Added Courses (VACs)
| S.No | Name of the VAC |
|---|---|
| 1 | Mobile Application Development |
| 2 | 2D Animation |
| 3 | Hands on cloud computing on AWS |
| 4 | Cyber Security |
| 5 | Data Analysis using Spreadsheet |
| 6 | Ethical hacking |
| 7 | Web Application development- Front end |
| 8 | Web Application development- Back end |
Eligibility Criteria
Candidates who have completed two-years pre-university programme of Karnataka State or its equivalent of any state or country or a candidate who has passed JODC/three-year diploma in engineering (Government of Karnataka) are eligible for admission into this programme.
- Pass in 10 + 2 are eligible for BCA (Cyber security) admission.