B.Tech (Cloud Technology and Information Security)
- Home
- B.Tech (Cloud Technology and Information Security)
B.Tech (Cloud Technology and Information Security)
OVERVIEW
B.Tech in Cloud Technology and Information Security is a four-year undergraduate program that combines the fields of cloud computing and information security. The program focuses on providing students with a strong foundation in cloud computing, including cloud architecture, cloud services, cloud economics, and cloud migration. It also provides students with an in-depth understanding of information security, covering topics such as network security, cryptography, incident response, and ethical hacking.
The program is designed to prepare students for careers in the field of cloud technology and information security, as well as related areas such as cloud governance, economics, and migration. Graduates of the program will be well-prepared to work in a variety of roles, including cloud architect, cloud security engineer, information security analyst, and IT auditor. To achieve these goals, the program includes a variety of core courses that cover both cloud computing and information security. These courses are designed to provide students with a comprehensive understanding of the field, covering both theoretical concepts and practical skills. By the end of the program, students will have the knowledge and skills necessary to design, implement, and manage secure cloud computing environments.
The program combines core courses in cloud computing and cybersecurity with elective courses in related areas such as data analytics, networking, and virtualization.
The core courses in the program include:
- Cloud Computing: Students will learn about the fundamentals of cloud computing, including cloud architecture, deployment models, and service models. They will also learn about cloud security and privacy issues.
- Information Security: Students will learn about the principles of information security, including access control, authentication, encryption, and risk management. They will also learn about emerging threats and vulnerabilities in the digital age.
- Network Security: Students will learn about the principles of network security, including firewalls, intrusion detection and prevention, and virtual private networks. They will also learn about the latest trends in network security and emerging threats.
- Cloud Infrastructure: Students will learn about the infrastructure that underlies cloud computing, including servers, storage, and networking. They will also learn about virtualization and containerization technologies.
- Cloud Application Development: Students will learn about the development of cloud applications, including software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). They will also learn about application security and testing.
- Data Analytics and Visualization: This elective course will cover data analytics and visualization techniques, including data modeling, data warehousing, and data mining. Students will learn about big data technologies, including Apache Hadoop and Spark, and they will gain hands-on experience with data analytics tools such as Tableau and Power BI.
- Machine Learning Fundamentals: This course covers the basic principles of machine learning, including supervised and unsupervised learning, decision trees, and neural networks. Students will also learn how to develop and evaluate machine learning models.
- Cloud Service Management: This course will cover the management of cloud services, including service level agreements (SLAs), service catalogues, and service desks. Students will learn about service management frameworks such as ITIL and COBIT, as well as cloud service management tools such as ServiceNow and BMC Remedy.
- Cloud Security Engineering: This course will provide an in-depth understanding of cloud security engineering, including security by design, security testing, and security operations. Students will learn about security frameworks such as the Cloud Security Alliance (CSA) and the National Institute of Standards and Technology (NIST), as well as security tools such as Nessus and Metasploit.
- Cloud Governance and Compliance: This course will cover the governance and compliance issues related to cloud computing, including legal and regulatory requirements, privacy and data protection, and risk management. Students will learn about governance frameworks such as ISO/IEC 38500 and the Cloud Controls Matrix (CCM), as well as compliance standards such as GDPR and HIPAA.
- Cloud Migration and Integration: This course will cover the strategies and tools for migrating and integrating applications and data to the cloud, including lift-and-shift, re-platforming, and re-architecting. Students will learn about cloud migration frameworks such as the Cloud Adoption Framework (CAF) and the AWS Well-Architected Framework, as well as integration platforms such as MuleSoft and Dell Boomi.
- Cryptography and Network Security: This course will provide an in-depth understanding of cryptography and its role in network security. Students will learn about symmetric and asymmetric encryption, digital signatures, and key management. They will also learn about network security protocols such as IPsec, SSL/TLS, and SSH.
- Incident Response and Forensics: This course will cover incident response and forensics techniques for responding to security incidents and conducting investigations. Students will learn about incident response frameworks such as NIST SP 800-61 and ISO/IEC 27035, as well as forensic tools such as EnCase and FTK.
- Security Operations and Management: This course will cover the management of security operations, including security information and event management (SIEM), security operations center (SOC) management, and security metrics. Students will learn about security operations frameworks such as the Security Operations Maturity Model (SOMM) and the SOC 2 framework.
- Web and Mobile Application Security: This course will cover the security issues related to web and mobile application development, including secure coding practices, input validation, and session management. Students will learn about web application security frameworks such as OWASP Top 10 and mobile application security frameworks such as MASVS.
- Ethical Hacking and Penetration Testing: This course will provide hands-on experience with ethical hacking and penetration testing techniques, including vulnerability assessment, penetration testing, and exploit development. Students will learn about hacking tools such as Kali Linux and Metasploit, as well as ethical hacking frameworks such as the Penetration Testing Execution Standard (PTES).
In addition to the above courses, students will also be required to take general education courses in areas such as mathematics, physics, and humanities. They will also have opportunities for hands-on learning through internships and research projects.
The tools, libraries, and technologies:
- Cloud Computing Platforms: The program covers various cloud computing platforms such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).
- Virtualization: The program covers various virtualization technologies such as VMware, Hyper-V, and Xen.
- Containerization: The program covers containerization technologies such as Docker and Kubernetes.
- Cloud Storage: The program covers cloud storage technologies such as Amazon S3, Azure Blob Storage, and Google Cloud Storage.
- Cloud Networking: The program covers various cloud networking technologies such as Amazon VPC, Azure Virtual Network, and Google Cloud Virtual Private Cloud.
- Information Security: The program covers various information security technologies such as firewalls, intrusion detection and prevention systems, and encryption. Like OpenSSH, Python Cryptography
- Cryptography: The program covers various cryptographic algorithms and techniques such as symmetric key encryption, public key encryption, digital signatures, and hash functions.
- Identity and Access Management tools: The program covers various identity and access management technologies such as single sign-on (SSO), multi-factor authentication (MFA), and identity federation.
- Metasploit: A popular open-source framework for developing and executing exploit code against remote targets.
- Networking and penetration testing tools: Nmap, Burp Suite, Wireshark, John the Ripper ,Hydra, SQLMap, Nikto, Social-Engineer Toolkit (SET)
- Cyber Forensics tools: EnCase, FTK (Forensic Toolkit), Autopsy, Volatility, The Sleuth Kit: ,Wireshark, OSForensics, X-Ways Forensics, dd, ddrescue
Intake Capacity: 60
Eligibility: Candidates must have completed 10+2 or an equivalent examination from
a recognized board with a minimum aggregate of 50% in PCM (Physics, Chemistry, and Mathematics)
subjects
Duration: 4 Year
Graduates of the B.Tech in Cloud Technology and Information Security program can expect a wide range of career opportunities in the rapidly-growing fields of cloud computing and cybersecurity. Here are some potential career paths for graduates:
- Cloud Architect: Cloud architects design and implement cloud-based solutions for businesses and organizations. They are responsible for ensuring the security and scalability of cloud infrastructure, and may work with a variety of cloud service providers and technologies.
- Cloud Security Engineer: Cloud security engineers are responsible for implementing and maintaining security controls for cloud-based environments. They may work with cloud access control, network security, data encryption, and other security-related technologies.
- Network Security Analyst: Network security analysts monitor and maintain the security of an organization’s network. They may be responsible for configuring firewalls and intrusion detection systems, conducting vulnerability assessments, and responding to security incidents.
- Cybersecurity Consultant: Cybersecurity consultants work with businesses and organizations to identify and mitigate security risks. They may conduct security assessments, develop security policies and procedures, and provide training and education to employees.
- Data Security Analyst: Data security analysts are responsible for ensuring the security of an organization’s data. They may work with encryption technologies, access control systems, and other security-related technologies to protect sensitive data.
- Incident Responder: Incident responders are responsible for investigating security incidents and responding to cybersecurity threats. They may work with forensic tools to analyze digital evidence, and develop incident response plans to minimize the impact of security incidents.
- Security Operations Center (SOC) Analyst: SOC analysts work in a security operations center, monitoring and responding to security events in real-time. They may work with security information and event management (SIEM) tools, conduct threat intelligence analysis, and collaborate with incident responders to mitigate security threats.
- Machine Learning Engineer: Machine learning engineers build and deploy machine learning models for various applications. They work with large data sets and use programming languages such as Python and R to develop algorithms and build models that can predict outcomes or classify data.
- Data Analyst: Data analysts are responsible for collecting, organizing, and analyzing large sets of data to identify patterns and trends. They may use tools such as Excel, SQL, and Tableau to extract insights from data and present them in a clear and concise manner.
- Data Scientist: Data scientists are responsible for collecting, cleaning, and analyzing large sets of data to develop predictive models and algorithms. They may use programming languages such as Python or R to build and test models, and may work with machine learning algorithms to develop predictive models for various applications.
- Data Security Analyst: Data security analysts are responsible for ensuring the security of an organization’s data. They may work with encryption technologies, access control systems, and other security-related technologies to protect sensitive data.
- Cloud Data Engineer: Cloud data engineers are responsible for designing and implementing data solutions on cloud-based platforms such as AWS, Azure, or Google Cloud. They work with a variety of data storage and processing tools and may collaborate with other cloud professionals to ensure the security and scalability of cloud-based data solutions.
|
|
|
|