B.Sc Digital and Cyber forensics impart knowledge about the body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access.

Cyber forensics is a branch of digital forensic science pertaining to legal evidence found in cyberspace and digital storage media. The program addresses the underlying need for cyber experts as the country is heading towards an internet explosion mostly fueled by e-commerce, e-banking, e-governance, and social media.

With the rapid expansion of the internet, cybercrime and malicious software deployments are on the increase. There is a need for security professionals who can protect assets and information by securing networks and computer systems. The Bachelor of Digital and Cyber Forensics also develops skills in discovering and recording digital forensic evidence of crimes and malicious behavior by extracting data from networks, hard drives, cell phones, and other digital devices.

Program Educational Objectives (PEO):

PEO1 To prepare the graduates as successful professionals ready for Industry, Government sectors, Academia, Research, Entrepreneurial Pursuit, and Consultancy firms.
PEO2 Apply and continuously acquire knowledge, theoretical and applied, related to core areas of Information Technology.
PEO3 Demonstrate the ability to work effectively as a team member and/or leader in an ever-changing professional environment
PEO4 To prepare the graduates to adapt themselves for life-long learning through professional activities on the latest technology and trends needed for a successful career
PEO5 To prepare graduates the ability to gain multidisciplinary knowledge through real-time projects and industry internship training and providing a sustainable competitive edge in R&D and meeting industry needs.

Program Outcomes (PO):

PO1 Acquire knowledge of Computing Fundamentals, Basic Mathematics, Computing Specialization, and Domain Knowledge of proper computing models from defined problems.
PO2 Apply Research-based knowledge and methodologies to design, analyze and interpretation of data and find the solutions for complex problems by applying the right tools
PO3 Capable of evaluating personal and professional choices in terms of codes of ethics and ethical theories and understanding the impact of their decisions on themselves, their professions, and on society.
PO4 Find out the right opportunity for entrepreneurship and create and add value for the betterment of an individual and society at large
PO5 Function effectively as a team member or a leader to accomplish a common goal in a multidisciplinary team
PO6 Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change.
PO7 Engage in independent and life-long learning for continuous professional development.
PO8 Confidence for self and continuous learning to improve knowledge and competence as a computing professional
PO9 Identify, invent, research activities to provide solutions for complex computing problems using fundamental concepts of Mathematics, Computing Science and Relevant Domains

Program Specific Outcome (PSO):

PSO1 To develop the undergraduate level students with the specific knowledge of handling different types of evidences and their examinations.
PSO2 To develop the laboratory skills in examining different types of evidences found at the crime scene.
PSO3 To prepare the students to compete for employment in State and central level Organizations

Click Here to Download Course Outcome

S.No. SEM Part Sub Type Course Code Course Name Credit Hours INT EXT Total
1 1 1 L1   Language – I 3 5 50 50 100
2 1 2 L2   English – I 3 5 50 50 100
3 1 3 Core    Core  Course – I Theory:  Programming in C 4 5 50 50 100
4 1 3 Core     Core  Course – II  Practical: Programming Lab – C  4 4 50 50 100
5 1 3 Allied   Allied-I Mathematics for Computer Science 4 5 50 50 100
6 1 4 SEC   Skill Enhancement Courses – I   Database Management System / Practical – Database Management system Lab 4 4 50 50 100
7 1 4 AEC   Ability Enhancement Course I Environmental Studies or Universal Human Values & Professional Ethics 2 2 50 0 50
            24 30 350 300 650
                     
1 2 1 L1   Language – II 3 5 50 50 100
2 2 2 L2   English – II 3 5 50 50 100
3 2 3 Core    Core Course – III Theory: Data Communication and Computer Network 4 5 50 50 100
4 2 3 Core     Core Course – IV Practical: Computer Networks Lab 4 4 50 50 100
5 2 3 Elective   Elective  – I Entrepreneurship Development 4 4 50 50 100
6 2 3 Allied   Allied-II: Fundamentals of Statistics 4 5 50 50 100
7 2 4 AEC   Ability Enhancement Course II Design Thinking 2 2 50 0 50
8 2 5 Ext   Extension Activity – I (NASA) 1 0 25 0 25
            25 30 375 300 675
                     
1 3 1 L1   Language – III 3 4 50 50 100
2 3 2 L2   English – III 3 4 50 50 100
3 3 3 Core    Core  Course – V Theory: Digital Forensics 4 6 50 50 100
4 3 3 Core     Core  Course – VI Practical: Digital Forensics Lab 4 4 50 50 100
5 3 3 Allied   Allied-III: Cyber security and Applied Mathematics 4 5 50 50 100
6 3 4 SEC   Skill Enhancement Courses – II Practical / Training: Python for Networking and Penetration Testing  4 5 50 50 100
7 3 4 AEC   Ability Enhancement Course III Soft Skill-1 2 2 50 0 50
8 3 3 ITR   Internship / Industrial Training (Summer vacation at the end of II semester activity) 2 0 50 0 50
9 3 5 Ext   Extension Activity – II (NASA) 1 0 25 0 25
            27 30 425 300 725
                     
1 4 1 L1   Language – IV 3 4 50 50 100
2 4 2 L2   English – IV 3 4 50 50 100
3 4 3 Core    Core  Course – VII Theory : Linux System Administration 4 6 50 50 100
4 4 3 Core     Core  Course – VIII Practical: Linux System Administration Lab 4 4 50 50 100
5 4 3 Allied   Allied-IV : Discrete Mathematics 4 5 50 50 100
8 4 3 Elective    Elective  – II i) Fundamentals of Cyber Crime ii) Cyber Policing iii) Web Application Security 4 5 50 50 100
7 4 4 AEC   Ability Enhancement Course IV Soft Skill-2 2 2 50 0 50
8 4 5 Ext   Extension Activity – III (NASA) 1 0 25 0 25
            25 30 375 300 675
                     
1 5 3 Core    Core  Course – IX Theory : Ethical hacking 4 6 50 50 100
2 5 3 Core     Core  Course – X  Practical: Ethical hacking Lab 4 6 50 50 100
3 5 3 Elective    Elective  – III i) AI in Cloud Computing ii) Deep Learning iii) Crypotography  4 6 50 50 100
  5 3 PRJ   Project 0 6 0 0 0
4 5 4 SEC   Skill Enhancement Courses – III Practical / Training :  Java programming  4 6 50 50 100
5 5 3 ITR   Internship / Industrial Training (Summer vacation at the end of IV semester activity) 2 0 50 0 50
6 5 5 Ext   Extension Activity – IV (NASA) 1 0 25 0 25
            19 30 275 200 475
                     
1 6 3 Core    Core  Course – XI Theory : Cryptography and Network Security 4 6 50 50 100
2 6 3 Core     Core  Course – XII Practical: Cryptography and Network Security Lab 4 4 50 50 100
3 6 3 Elective    Elective – IV i) Internet of Things ii) Operating system iii) Cyber Law 4 6 50 50 100
4 6 3 PRJ   Core Project 8 8 100 100 200
5 6 4 SEC   Skill Enhancement Courses – IV Practical / Training: Blockchain and the Internet of Things 4 6 50 50 100
            24 30 300 300 600
          Total credit 144 180 2100 1700 3800

 

Additional Credits
S.No. Sem Part Sub Type Course Code Course Name Credit Hours INT EXT Total
1 2 6 VAC   VAC – Microsoft CoE Course / NPTEL 2 2 50 0 50
3 4 6 IDC   VAC – Microsoft CoE Course / NPTEL 2 2 50 0 50
4 5 6 VAC   VAC – Microsoft CoE Course / NPTEL 2 2 50 0 50
                     
Certificate on Minor Discipline
S.No. Sem Part Sub Type Course Code Course Name Credit Hours INT EXT Total
1 2 6 MD   Course – I 5 2 0 100 100
2 3 6 MD   Course – II 5 2 0 100 100
3 4 6 MD   Course – III 5 2 0 100 100
4 5 6 MD   Course – IV 5 2 0 100 100

 

Our course emphasizes a hands-on, practical approach to learning digital forensic investigation, computer networking, and other essential computing techniques using commercial and open-source forensic tools. Our dedicated specialist Digital Forensics Laboratory hosts professional digital forensics tools, including EnCase, FTK, XRY, Cellebrite, and other industry-standard tools.