{"id":107116,"date":"2026-05-08T15:58:55","date_gmt":"2026-05-08T10:28:55","guid":{"rendered":"https:\/\/www.rset.edu.in\/gscc\/?page_id=107116"},"modified":"2026-05-08T21:12:12","modified_gmt":"2026-05-08T15:42:12","slug":"bsc-cybersecurity-operations","status":"publish","type":"page","link":"https:\/\/www.rset.edu.in\/gscc\/bsc-cybersecurity-operations\/","title":{"rendered":"Bachelor of Science (Cybersecurity Operations)"},"content":{"rendered":"<p>[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; css=&#8221;.vc_custom_1576674377712{background: #d7f1fb url(https:\/\/www.rset.edu.in\/dgmc\/wp-content\/uploads\/sites\/4\/2019\/12\/ag-square.png?id=1082) !important;background-position: 0 0 !important;background-repeat: repeat !important;}&#8221;][vc_column][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;107179&#8243; img_size=&#8221;full&#8221; insomniacs_css_animation=&#8221;&#8221;][vc_empty_space]<div id=\"ultimate-heading-987369fe26fba2535\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-987369fe26fba2535 uvc-238 \" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-987369fe26fba2535 h2'  data-responsive-json-new='{\"font-size\":\"desktop:30px;\",\"line-height\":\"\"}' ><h2 style=\"font-weight:bold;\">Top Bachelor of Science (Cybersecurity Operations) College in Mumbai - GSCC<\/h2><\/div><\/div>[vc_column_text]The B.Sc. Cyber Security program is an undergraduate course designed to equip students with the knowledge and skills required to protect computer systems, networks, and data from cyber threats and attacks. With the rapid growth of digital technologies and increasing dependence on the internet, cyber security has become a critical area in today\u2019s world.<\/p>\n<p>This course provides a strong foundation in computer systems, networking, and information security concepts. It introduces students to various aspects of cyber security such as ethical hacking, network security, cryptography, digital forensics, and secure application development. Students also gain practical exposure to identifying vulnerabilities, preventing cyber-attacks, and implementing security measures.<\/p>\n<p>The program aims to develop professionals who can safeguard digital assets and ensure data privacy in organizations. It also prepares students for careers in areas such as security analysis, penetration testing, cyber law, and risk management.<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Course Name: Bachelor of Science (Cybersecurity Operations) <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Duration: 3 Years<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mode: Full-Time<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Eligibility: The admission to the program will be given based on class XII marks. Mathematics\/Computer Science subject is mandatory for BSc Cyber Ops.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Learn more about the <\/span><a href=\"http:\/\/rs.rajasthani.org.in\/new_gsc_form\/\"><b>GSCC admission process<\/b><\/a><span style=\"font-weight: 400;\">.<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; el_id=&#8221;admission&#8221; css=&#8221;.vc_custom_1576674390536{padding-top: 30px !important;padding-bottom: 30px !important;background: #d7f1fb url(https:\/\/www.rset.edu.in\/dgmc\/wp-content\/uploads\/sites\/4\/2019\/12\/ag-square.png?id=1082) !important;background-position: 0 0 !important;background-repeat: repeat !important;}&#8221;][vc_column]<div id=\"advanced-tabs-desc-wrap-5489\" class=\"ult_tabs \" style=\" \" data-tabsstyle=\"style1\"\r\n data-titlebg=\"#00afef\" data-titlecolor=\"#ffffff\" data-fullheight=\"off\"\r\n data-titlehoverbg=\"#0096ed\" data-titlehovercolor=\"#ffffff\"\r\n data-rotatetabs=\"0\" data-responsivemode=\"Both\" data-animation=\"Slide\"\r\ndata-activetitle=\"#ffffff\" data-activeicon=\"\" data-activebg=\"#0096ed\"  data-respmode=\"Accordion\" data-respwidth=\"767\" data-scroll = \"on\" data-activeindex=\"1\"><ul id=advanced-tabs-wrap-2200 class=\"ult_tabmenu style1 \" style=\"\"><li class=\"ult_tab_li   \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#00afef;border-color:transparent;border-width:0px;border-style:solid;border-top-left-radius:8px;\">\r\n\t\t\t\t\t<a href=\"#course-structure6cf6-e9a0\" id=\"course-structure6cf6-e9a0\" style=\"color:#ffffff;;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-2200 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Course Structure<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li   \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#00afef;border-color:transparent;border-width:0px;border-style:solid;\">\r\n\t\t\t\t\t<a href=\"#eligibility\" id=\"eligibility\" style=\"color:#ffffff;;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-2200 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Eligibility<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li   \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#00afef;border-color:transparent;border-width:0px;border-style:solid;border-top-right-radius:8px;\">\r\n\t\t\t\t\t<a href=\"#1576677187099-2-1\" id=\"1576677187099-2-1\" style=\"color:#ffffff;;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-2200 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Programme Outcome<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><\/ul><div  data-ultimate-target='#advanced-tabs-desc-wrap-5489 .ult_tabcontent .ult_tab_min_contain  p'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' class=\"ult_tabcontent ult-responsive style1\" style=\"background-color:#ffffff;color:#74777b;\"><div class=\"ult_tab_min_contain \" >\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t[vc_column_text]<\/p>\n<table width=\"610\">\n<tbody>\n<tr>\n<td width=\"66\">Semester<\/td>\n<td width=\"223\">Vertical<\/td>\n<td width=\"274\">Subject Title<\/td>\n<td width=\"47\">Credits<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"12\" width=\"66\">I<\/td>\n<td width=\"223\">Major<\/td>\n<td width=\"274\">Fundamentals of Computer Science<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td width=\"274\">Basics of Python programing<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td width=\"274\">Introduction to Cybersecurity<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Minor<\/td>\n<td width=\"274\">Practical in Computer Sc<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Minor<\/td>\n<td width=\"274\">Practical in Python Programing<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Open Elective<\/td>\n<td width=\"274\">Introduction to Google tools<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Vocational Skill Courses (VSC)<\/td>\n<td width=\"274\">Fundamentals of digital communication<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Skill Enhancement Course (SEC)<\/td>\n<td width=\"274\"><\/td>\n<td width=\"47\">0<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Ability Enhacement Course (AEC)<\/td>\n<td width=\"274\">PROFESSIONAL COMMUNICATION SKILLS-I<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">\u00a0Value Education Course (VEC)<\/td>\n<td width=\"274\">Humanities &#8211; ENVIRONMENT EDUCATION-I<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Indian Knowledge System \u2013 I (IKS)<\/td>\n<td width=\"274\">INDIAN KNOWLEDGE SYSTEM<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Co-curricular Course (CC)<\/td>\n<td width=\"274\">NSS\/NCC\/DLLE\/Sports\/Cultural\/Music\/Dance\/ Yoga\/Certificate Course \/ Internship<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"66\"><\/td>\n<td width=\"223\"><\/td>\n<td width=\"274\">TOTAL<\/td>\n<td width=\"47\">22<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"12\">II<\/td>\n<td width=\"223\">Major<\/td>\n<td>Data Structures &amp; Algorithms<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Operating Systems<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Computer Networks \u2013 I<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Minor<\/td>\n<td>Practical for DSC1<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>Practical for DSC2<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Open Elective<\/td>\n<td>Introduction to Google tools &#8211; II<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Vocational Skill Courses (VSC)<\/td>\n<td>Basics of Web development<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Skill Enhancement Course (SEC)<\/td>\n<td>Power BI<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Ability Enhacement Course (AEC)<\/td>\n<td>PROFESSIONAL COMMUNICATION SKILLS-II<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">\u00a0Value Education Course (VEC)<\/td>\n<td>Cyber Wellness<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Indian Knowledge System \u2013 I (IKS)<\/td>\n<td><\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Co-curricular Course (CC)<\/td>\n<td>NSS\/NCC\/DLLE\/Sports\/Cultural\/Rotaract\/ Music\/ Yoga\/Dance\/Certificate Course<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\">TOTAL<\/td>\n<td width=\"47\">22<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"13\">III<\/td>\n<td width=\"223\">Major<\/td>\n<td>Ethical hacking 1<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Cyber Ethics, Laws &amp; Policies<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Advanced network security<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Minor<\/td>\n<td>Practical for Ethical hacking 1<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>Web technology<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>Practical on web technology<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Open Elective<\/td>\n<td>Problem solving basics<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Vocational Skill Courses (VSC)<\/td>\n<td>Data structures using python<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Skill Enhancement Course (SEC)<\/td>\n<td>Business Communication<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Ability Enhacement Course (AEC)<\/td>\n<td>Hindi \/ Marathi \u2013 I<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>\u00a0Value Education Course (VEC)<\/td>\n<td>Communication &amp; Academic Writing (VAC)<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Indian Knowledge System \u2013 I (IKS)<\/td>\n<td>Indian Business Value System<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Co-curricular Course (CC)<\/td>\n<td>NSS\/NCC\/DLLE\/Sports\/Cultural\/Music\/Dance\/ Yoga\/Certificate Course \/ Internship<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\">TOTAL<\/td>\n<td width=\"47\">22<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\"><\/td>\n<td width=\"47\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"14\">IV<\/td>\n<td width=\"223\">Major<\/td>\n<td>Ethical hacking &amp; Penetration hacking<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Cloud security<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Database management<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Minor<\/td>\n<td>Practicals for Ethical hacking<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>Projects on Ethical hacking<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>Advanced Web Tech<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>Practicals of Web Tech<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Open Elective<\/td>\n<td>SQL database\/ Mongo DB<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Vocational Skill Courses (VSC)<\/td>\n<td>Data structures using python<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Skill Enhancement Course (SEC)<\/td>\n<td>Business Communication<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Ability Enhacement Course (AEC)<\/td>\n<td>Hindi \/ Marathi \u2013 I<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>\u00a0Value Education Course (VEC)<\/td>\n<td>Communication &amp; Academic Writing (VAC)<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Indian Knowledge System \u2013 I (IKS)<\/td>\n<td>Indian Business Value System<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Co-curricular Course (CC)<\/td>\n<td>NSS\/NCC\/DLLE\/Sports\/Cultural\/Music\/Dance\/ Yoga\/Certificate Course \/ Internship<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\">TOTAL<\/td>\n<td width=\"47\">22<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\"><\/td>\n<td width=\"47\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"15\">V<\/td>\n<td width=\"223\">Major<\/td>\n<td>Digital Forensic -1<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Malware Analysis<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Cyber Threat Intelligence<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Practical for Digital forensic<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Practical for malware analysis<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>IOT \u2013 Introduction<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>Practical for IOT<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Open Elective<\/td>\n<td>Blockchain<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>Practical for Blockchain<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Vocational Skill Courses (VSC)<\/td>\n<td>Statistical Method<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Skill Enhancement Course (SEC)<\/td>\n<td>Business Communication<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Ability Enhacement Course (AEC)<\/td>\n<td>Hindi \/ Marathi \u2013 I<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">\u00a0Value Education Course (VEC)<\/td>\n<td>Project<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Indian Knowledge System \u2013 I (IKS)<\/td>\n<td>Indian Business Value System<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Co-curricular Course (CC)<\/td>\n<td>OJT<\/td>\n<td>4<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\">TOTAL<\/td>\n<td width=\"47\">24<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\"><\/td>\n<td width=\"47\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"13\">VI<\/td>\n<td width=\"223\">Major<\/td>\n<td>Emerging Technologies &amp; threat landscape<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Information Security Governance ( ISO, GDPR)<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Cyber Crime and Analysis<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Minor<\/td>\n<td>AI driven threat detection<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Minor<\/td>\n<td>Projects on AI application<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Open Elective<\/td>\n<td>Vulnerability assessment &amp; Penetration testing<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Open Elective<\/td>\n<td>Practical &#8211; Vulnerability assessment<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Vocational Skill Courses (VSC)<\/td>\n<td>Statistical Method<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Skill Enhancement Course (SEC)<\/td>\n<td>Business Communication<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Ability Enhacement Course (AEC)<\/td>\n<td>Hindi \/ Marathi \u2013 I<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">\u00a0Value Education Course (VEC)<\/td>\n<td>Use of AI tools<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Indian Knowledge System \u2013 I (IKS)<\/td>\n<td>Indian Business Value System<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Co-curricular Course (CC)<\/td>\n<td>OJT<\/td>\n<td>4<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\">TOTAL<\/td>\n<td width=\"47\">24<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text]\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t[vc_column_text]<\/p>\n<div class=\"theme-block-detail about-detail2\">\n<div class=\"theme-scrollbar\">\n<div class=\"theme-block-item\">\n<p class=\"para\"><strong>Eligibility<\/strong> : The admission to the program will be given based on class XII marks. Mathematics\/Computer Science subject is mandatory for BSc Cyber Ops.<\/p>\n<p class=\"para\"><strong>Available Seats<\/strong> : 60 (50% Reserved for Hindi -speaking linguistic minority).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text]\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t[vc_column_text]<\/p>\n<div class=\"theme-block-detail about-detail2\">\n<div class=\"theme-scrollbar\">\n<div class=\"theme-block-item\">\n<h4>Program Outcomes<\/h4>\n<ul class=\"bullet-type\">\n<li>BSc (Cybersecurity Operations) is primarily focused on Cybersecurity, Network Security, Ethical Hacking, Security Operations, and Digital Forensics.<\/li>\n<li>Students who graduate with BSc ((Cybersecurity Operations)) background are able to monitor, detect, analyze and respond to cybersecurity threats, protect systems and data, and ensure the security of IT infrastructure.<\/li>\n<li>Syllabus is designed to be practical and industry oriented.<\/li>\n<li>It is a 3 years course program as compared to other courses like B.E., B.Tech. etc.<\/li>\n<li>Students get opportunities to work in various sectors such as in IT Security, SOC (Security Operations Center), Government Agencies, Finance, Healthcare, E-commerce, and more.<\/li>\n<li><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text]\n\t\t\t<\/div><\/div><\/div><\/div><div class=\"ult_acord advanced-tabs-desc-wrap-5489\">\r\n   <div class=\"ult-tabto-accordion \" style=\"width:;\"\r\n    data-titlecolor=\"#ffffff\"  data-titlebg=\"#00afef\"\r\n     data-titlehoverbg=\"#0096ed\" data-titlehovercolor=\"#ffffff\" data-animation=\"Slide\"\r\n     data-activetitle=\"#ffffff\" data-activeicon=\"\" data-activebg=\"#0096ed\" data-scroll = \"on\" data-activeindex=\"1\" >\r\n     <dl><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"course-structure6cf6-e9a0\" style=\"color:#ffffff;;background-color:#00afef;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#course-structure6cf6-e9a0\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-2200 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Course Structure<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"background-color:#ffffff;color:#74777b;\">\r\n\t\t\t               [vc_column_text]<\/p>\n<table width=\"610\">\n<tbody>\n<tr>\n<td width=\"66\">Semester<\/td>\n<td width=\"223\">Vertical<\/td>\n<td width=\"274\">Subject Title<\/td>\n<td width=\"47\">Credits<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"12\" width=\"66\">I<\/td>\n<td width=\"223\">Major<\/td>\n<td width=\"274\">Fundamentals of Computer Science<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td width=\"274\">Basics of Python programing<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td width=\"274\">Introduction to Cybersecurity<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Minor<\/td>\n<td width=\"274\">Practical in Computer Sc<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Minor<\/td>\n<td width=\"274\">Practical in Python Programing<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Open Elective<\/td>\n<td width=\"274\">Introduction to Google tools<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Vocational Skill Courses (VSC)<\/td>\n<td width=\"274\">Fundamentals of digital communication<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Skill Enhancement Course (SEC)<\/td>\n<td width=\"274\"><\/td>\n<td width=\"47\">0<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Ability Enhacement Course (AEC)<\/td>\n<td width=\"274\">PROFESSIONAL COMMUNICATION SKILLS-I<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">\u00a0Value Education Course (VEC)<\/td>\n<td width=\"274\">Humanities &#8211; ENVIRONMENT EDUCATION-I<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Indian Knowledge System \u2013 I (IKS)<\/td>\n<td width=\"274\">INDIAN KNOWLEDGE SYSTEM<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Co-curricular Course (CC)<\/td>\n<td width=\"274\">NSS\/NCC\/DLLE\/Sports\/Cultural\/Music\/Dance\/ Yoga\/Certificate Course \/ Internship<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"66\"><\/td>\n<td width=\"223\"><\/td>\n<td width=\"274\">TOTAL<\/td>\n<td width=\"47\">22<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"12\">II<\/td>\n<td width=\"223\">Major<\/td>\n<td>Data Structures &amp; Algorithms<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Operating Systems<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Computer Networks \u2013 I<\/td>\n<td width=\"47\">2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Minor<\/td>\n<td>Practical for DSC1<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>Practical for DSC2<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Open Elective<\/td>\n<td>Introduction to Google tools &#8211; II<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Vocational Skill Courses (VSC)<\/td>\n<td>Basics of Web development<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Skill Enhancement Course (SEC)<\/td>\n<td>Power BI<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Ability Enhacement Course (AEC)<\/td>\n<td>PROFESSIONAL COMMUNICATION SKILLS-II<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">\u00a0Value Education Course (VEC)<\/td>\n<td>Cyber Wellness<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Indian Knowledge System \u2013 I (IKS)<\/td>\n<td><\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Co-curricular Course (CC)<\/td>\n<td>NSS\/NCC\/DLLE\/Sports\/Cultural\/Rotaract\/ Music\/ Yoga\/Dance\/Certificate Course<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\">TOTAL<\/td>\n<td width=\"47\">22<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"13\">III<\/td>\n<td width=\"223\">Major<\/td>\n<td>Ethical hacking 1<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Cyber Ethics, Laws &amp; Policies<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Advanced network security<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Minor<\/td>\n<td>Practical for Ethical hacking 1<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>Web technology<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>Practical on web technology<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Open Elective<\/td>\n<td>Problem solving basics<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Vocational Skill Courses (VSC)<\/td>\n<td>Data structures using python<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Skill Enhancement Course (SEC)<\/td>\n<td>Business Communication<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Ability Enhacement Course (AEC)<\/td>\n<td>Hindi \/ Marathi \u2013 I<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>\u00a0Value Education Course (VEC)<\/td>\n<td>Communication &amp; Academic Writing (VAC)<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Indian Knowledge System \u2013 I (IKS)<\/td>\n<td>Indian Business Value System<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Co-curricular Course (CC)<\/td>\n<td>NSS\/NCC\/DLLE\/Sports\/Cultural\/Music\/Dance\/ Yoga\/Certificate Course \/ Internship<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\">TOTAL<\/td>\n<td width=\"47\">22<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\"><\/td>\n<td width=\"47\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"14\">IV<\/td>\n<td width=\"223\">Major<\/td>\n<td>Ethical hacking &amp; Penetration hacking<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Cloud security<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Database management<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Minor<\/td>\n<td>Practicals for Ethical hacking<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>Projects on Ethical hacking<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>Advanced Web Tech<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>Practicals of Web Tech<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Open Elective<\/td>\n<td>SQL database\/ Mongo DB<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Vocational Skill Courses (VSC)<\/td>\n<td>Data structures using python<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Skill Enhancement Course (SEC)<\/td>\n<td>Business Communication<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Ability Enhacement Course (AEC)<\/td>\n<td>Hindi \/ Marathi \u2013 I<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>\u00a0Value Education Course (VEC)<\/td>\n<td>Communication &amp; Academic Writing (VAC)<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Indian Knowledge System \u2013 I (IKS)<\/td>\n<td>Indian Business Value System<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Co-curricular Course (CC)<\/td>\n<td>NSS\/NCC\/DLLE\/Sports\/Cultural\/Music\/Dance\/ Yoga\/Certificate Course \/ Internship<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\">TOTAL<\/td>\n<td width=\"47\">22<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\"><\/td>\n<td width=\"47\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"15\">V<\/td>\n<td width=\"223\">Major<\/td>\n<td>Digital Forensic -1<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Malware Analysis<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Cyber Threat Intelligence<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Practical for Digital forensic<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Practical for malware analysis<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>IOT \u2013 Introduction<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Minor<\/td>\n<td>Practical for IOT<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Open Elective<\/td>\n<td>Blockchain<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>Practical for Blockchain<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Vocational Skill Courses (VSC)<\/td>\n<td>Statistical Method<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Skill Enhancement Course (SEC)<\/td>\n<td>Business Communication<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Ability Enhacement Course (AEC)<\/td>\n<td>Hindi \/ Marathi \u2013 I<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">\u00a0Value Education Course (VEC)<\/td>\n<td>Project<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Indian Knowledge System \u2013 I (IKS)<\/td>\n<td>Indian Business Value System<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Co-curricular Course (CC)<\/td>\n<td>OJT<\/td>\n<td>4<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\">TOTAL<\/td>\n<td width=\"47\">24<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\"><\/td>\n<td width=\"47\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"13\">VI<\/td>\n<td width=\"223\">Major<\/td>\n<td>Emerging Technologies &amp; threat landscape<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Information Security Governance ( ISO, GDPR)<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Major<\/td>\n<td>Cyber Crime and Analysis<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Minor<\/td>\n<td>AI driven threat detection<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">Minor<\/td>\n<td>Projects on AI application<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Open Elective<\/td>\n<td>Vulnerability assessment &amp; Penetration testing<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Open Elective<\/td>\n<td>Practical &#8211; Vulnerability assessment<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Vocational Skill Courses (VSC)<\/td>\n<td>Statistical Method<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Skill Enhancement Course (SEC)<\/td>\n<td>Business Communication<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>Ability Enhacement Course (AEC)<\/td>\n<td>Hindi \/ Marathi \u2013 I<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td width=\"223\">\u00a0Value Education Course (VEC)<\/td>\n<td>Use of AI tools<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Indian Knowledge System \u2013 I (IKS)<\/td>\n<td>Indian Business Value System<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Co-curricular Course (CC)<\/td>\n<td>OJT<\/td>\n<td>4<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td width=\"274\">TOTAL<\/td>\n<td width=\"47\">24<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text]\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"eligibility\" style=\"color:#ffffff;;background-color:#00afef;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#eligibility\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-2200 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Eligibility<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"background-color:#ffffff;color:#74777b;\">\r\n\t\t\t               [vc_column_text]<\/p>\n<div class=\"theme-block-detail about-detail2\">\n<div class=\"theme-scrollbar\">\n<div class=\"theme-block-item\">\n<p class=\"para\"><strong>Eligibility<\/strong> : The admission to the program will be given based on class XII marks. Mathematics\/Computer Science subject is mandatory for BSc Cyber Ops.<\/p>\n<p class=\"para\"><strong>Available Seats<\/strong> : 60 (50% Reserved for Hindi -speaking linguistic minority).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text]\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1576677187099-2-1\" style=\"color:#ffffff;;background-color:#00afef;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1576677187099-2-1\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-2200 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Programme Outcome<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"background-color:#ffffff;color:#74777b;\">\r\n\t\t\t               [vc_column_text]<\/p>\n<div class=\"theme-block-detail about-detail2\">\n<div class=\"theme-scrollbar\">\n<div class=\"theme-block-item\">\n<h4>Program Outcomes<\/h4>\n<ul class=\"bullet-type\">\n<li>BSc (Cybersecurity Operations) is primarily focused on Cybersecurity, Network Security, Ethical Hacking, Security Operations, and Digital Forensics.<\/li>\n<li>Students who graduate with BSc ((Cybersecurity Operations)) background are able to monitor, detect, analyze and respond to cybersecurity threats, protect systems and data, and ensure the security of IT infrastructure.<\/li>\n<li>Syllabus is designed to be practical and industry oriented.<\/li>\n<li>It is a 3 years course program as compared to other courses like B.E., B.Tech. etc.<\/li>\n<li>Students get opportunities to work in various sectors such as in IT Security, SOC (Security Operations Center), Government Agencies, Finance, Healthcare, E-commerce, and more.<\/li>\n<li><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text]\r\n\t\t\t            <\/div>\r\n        \t<\/dd>\r\n    \t<\/dl>\r\n    <!--<div class=\"extraborder\" style=\"background-color:#0096ed\"><\/div>-->\r\n<\/div>\r\n\r\n<\/div>[\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_raw_html]JTNDc2NyaXB0JTIwdHlwZSUzRCUyMmFwcGxpY2F0aW9uJTJGbGQlMkJqc29uJTIyJTNFJTBBJTIwJTIwJTdCJTBBJTIwJTIwJTIwJTIwJTIyJTQwY29udGV4dCUyMiUzQSUyMCUyMmh0dHBzJTNBJTJGJTJGc2NoZW1hLm9yZyUyMiUyQyUwQSUyMCUyMCUyMCUyMCUyMiU0MHR5cGUlMjIlM0ElMjAlMjJDb3Vyc2UlMjIlMkMlMEElMjAlMjAlMjAlMjAlMjJuYW1lJTIyJTNBJTIwJTIyQi5Db20lMjBCYW5raW5nJTIwJTI2JTIwSW5zdXJhbmNlJTIwJTI4QkJJJTI5JTIyJTJDJTBBJTIwJTIwJTIwJTIwJTIyZGVzY3JpcHRpb24lMjIlM0ElMjAlMjJUaGUlMjBCYWNoZWxvciUyMG9mJTIwQ29tbWVyY2UlMjBpbiUyMEJhbmtpbmclMjAlMjYlMjBJbnN1cmFuY2UlMjAlMjhCQkklMjklMjBwcm9ncmFtJTIwYXQlMjBHU0NDJTIwaXMlMjBkZXNpZ25lZCUyMGZvciUyMHN0dWRlbnRzJTIwd2hvJTIwYXNwaXJlJTIwdG8lMjBidWlsZCUyMGNhcmVlcnMlMjBpbiUyMGJhbmtpbmclMkMlMjBpbnN1cmFuY2UlMkMlMjBmaW5hbmNlJTJDJTIwYW5kJTIwZmluYW5jaWFsJTIwc2VydmljZXMuJTIwQXMlMjBvbmUlMjBvZiUyMHRoZSUyMGxlYWRpbmclMjBCQkklMjBjb2xsZWdlcyUyMGluJTIwTXVtYmFpJTJDJTIwR1NDQyUyMG9mZmVycyUyMGElMjBjdXJyaWN1bHVtJTIwdGhhdCUyMGNvbWJpbmVzJTIwc3Ryb25nJTIwZnVuZGFtZW50YWxzJTIwaW4lMjBjb21tZXJjZSUyMHdpdGglMjBzcGVjaWFsaXplZCUyMGtub3dsZWRnZSUyMGluJTIwYmFua2luZyUyMG9wZXJhdGlvbnMlMjBhbmQlMjBpbnN1cmFuY2UlMjBtYW5hZ2VtZW50LiUyMiUyQyUwQSUyMCUyMCUyMCUyMCUyMnByb3ZpZGVyJTIyJTNBJTIwJTdCJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIyJTQwdHlwZSUyMiUzQSUyMCUyMk9yZ2FuaXphdGlvbiUyMiUyQyUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMm5hbWUlMjIlM0ElMjAlMjJHaGFuc2h5YW1kYXMlMjBTYXJhZiUyMENvbGxlZ2UlMjBvZiUyMEFydHMlMjAlMjYlMjBDb21tZXJjZSUyMiUyQyUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMnNhbWVBcyUyMiUzQSUyMCUyMmh0dHBzJTNBJTJGJTJGd3d3LnJzZXQuZWR1LmluJTJGZ3NjYyUyRmJjb20tYmFua2luZy1pbnN1cmFuY2UlMkYlMjIlMEElMjAlMjAlMjAlMjAlN0QlMEElMjAlMjAlN0QlMEElM0MlMkZzY3JpcHQlM0U=[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; css=&#8221;.vc_custom_1576674377712{background: #d7f1fb url(https:\/\/www.rset.edu.in\/dgmc\/wp-content\/uploads\/sites\/4\/2019\/12\/ag-square.png?id=1082) !important;background-position: 0 0 !important;background-repeat: repeat !important;}&#8221;][vc_column][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;107179&#8243; img_size=&#8221;full&#8221; insomniacs_css_animation=&#8221;&#8221;][vc_empty_space][vc_column_text]The B.Sc. Cyber Security program is an undergraduate course designed to equip students with the knowledge and skills required to protect computer systems, networks,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full_width.php","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Bachelor of Science (Cybersecurity Operations) - GSCC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rset.edu.in\/gscc\/bsc-cybersecurity-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bachelor of Science (Cybersecurity Operations) - GSCC\" \/>\n<meta property=\"og:description\" content=\"[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; css=&#8221;.vc_custom_1576674377712{background: #d7f1fb url(https:\/\/www.rset.edu.in\/dgmc\/wp-content\/uploads\/sites\/4\/2019\/12\/ag-square.png?id=1082) !important;background-position: 0 0 !important;background-repeat: repeat !important;}&#8221;][vc_column][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;107179&#8243; img_size=&#8221;full&#8221; insomniacs_css_animation=&#8221;&#8221;][vc_empty_space][vc_column_text]The B.Sc. Cyber Security program is an undergraduate course designed to equip students with the knowledge and skills required to protect computer systems, networks,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rset.edu.in\/gscc\/bsc-cybersecurity-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"GSCC\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-08T15:42:12+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\">\n\t<meta name=\"twitter:data1\" content=\"rsetadmin\">\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data2\" content=\"5 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rset.edu.in\/gscc\/#website\",\"url\":\"https:\/\/www.rset.edu.in\/gscc\/\",\"name\":\"GSCC\",\"description\":\"Top Colleges For B Com\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.rset.edu.in\/gscc\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rset.edu.in\/gscc\/bsc-cybersecurity-operations\/#webpage\",\"url\":\"https:\/\/www.rset.edu.in\/gscc\/bsc-cybersecurity-operations\/\",\"name\":\"Bachelor of Science (Cybersecurity Operations) - GSCC\",\"isPartOf\":{\"@id\":\"https:\/\/www.rset.edu.in\/gscc\/#website\"},\"datePublished\":\"2026-05-08T10:28:55+00:00\",\"dateModified\":\"2026-05-08T15:42:12+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rset.edu.in\/gscc\/bsc-cybersecurity-operations\/\"]}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.rset.edu.in\/gscc\/wp-json\/wp\/v2\/pages\/107116"}],"collection":[{"href":"https:\/\/www.rset.edu.in\/gscc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.rset.edu.in\/gscc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.rset.edu.in\/gscc\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rset.edu.in\/gscc\/wp-json\/wp\/v2\/comments?post=107116"}],"version-history":[{"count":4,"href":"https:\/\/www.rset.edu.in\/gscc\/wp-json\/wp\/v2\/pages\/107116\/revisions"}],"predecessor-version":[{"id":107180,"href":"https:\/\/www.rset.edu.in\/gscc\/wp-json\/wp\/v2\/pages\/107116\/revisions\/107180"}],"wp:attachment":[{"href":"https:\/\/www.rset.edu.in\/gscc\/wp-json\/wp\/v2\/media?parent=107116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}