Program Information:
Eligibility: | Applicants should have passed the 10+2 or equivalent examination with minimum aggregate marks of 50% marks (45% in case of reserved category) |
---|---|
Duration: | 3 years |
No. of Seats: | 60 |
Program Objective:
The program objectives are:
- To prepare graduates as leading professionals in government, academia, and corporate along with entrepreneurial pursuits.
- To prepare graduates with an ability to articulate and solve problems in the field of Computer Applications specifically in the field of Cloud Technology and Information Security.
- To prepare the graduates with strong learning quotients having adaptability to the constantly changing technological environment.
- To prepare the graduates to lead and initiate ethically the professional and organizational goals in an interdisciplinary team and obtain desired results.
Why Study BCA in CTIS?
The information technology sector has been rapidly transforming in the recent times. Cloud Technology and Information Security are two of the IT Industries which have seen growth in multi-folds. BCA with Cloud Technology and Information Security as Specialization aims to impart fundamental knowledge in computer applications along with thorough learning in specialty streams. This programme comprises of both theoretical and practical sessions which can help students become successful professionals in the IT industry.
Suited to your Career:
Fast growing information technology and communication systems have become critical components of almost every company’s strategic plan. Companies which want to take advantage of the new information technologies and communication systems require expert professionals, who can apply computer science principles to solve problems produced by the interface between business and technology. BCA Course is an undergraduate program where students are exposed to various areas of computer applications including the latest developments in the industry.
This unique course provides dual career options for the students in the fast growing technology sectors of Cloud Technology and Information Security. In addition to all the mandatory subjects of a traditional BCA, this specialized course offers in-depth practical know-how of the current trends. These sectors have the potential to grow exponentially and they provide challenging job opportunities for young professionals with the right skill sets.
On the Cloud Technology front, the course will provide students with the fundamental knowledge of all aspects of Cloud Technology. The course focuses on Virtualization Technology, Cloud Technology, Datacenters, Networking and Operating Systems. On the Information Security front, this course equips the students with the concepts and the technical skills in Information Security. The focus of the course is on the models, tools and techniques for enforcement of Security Policies, with emphasis on Cryptography, Ethical Hacking, Computer Forensics and Virtualization and Cloud Security.
Career Prospect:
BCA graduates can start up their career in either Government sector or private sector since there are a lot of employment Opportunity in both these sectors. This degree helps the students to get a sound knowledge on computer applications with the help of which they can have a perfect launch pad for challenging career in the field of IT.
The courses of BCA with CTIS specialization will provide jobs in IT sectors. The renowned companies Wipro, TCS, Tech-Mahindra, Accenture, etc.
If one wishes to become a Professional in Cloud and information security, then this program is the best course to get an early start for their careers. Job opportunity can be found in both large and small software organizations as well as hardware companies.
Syllabus
SEMESTER I
A. THEORY/PRACTICAL |
|||||||
S. No. |
CODE |
SUBJECT NAME |
SUBJECT TYPE | HOURS / WEEK |
CREDITS |
||
L | T | P | |||||
1 | Data Structure using C | CC-1 | 4 | 0 | 4 |
6 |
|
2 | Computer Architecture &
Organization |
CC-2 | 4 | 0 | 0 |
4 |
|
3 | Operating System | CC-3 | 4 | 0 | 2 |
5 |
|
4 | Communication Skills | AECC-1 | 2 | 0 | 0 |
2 |
|
5 | Theory of Mathematics/Discrete
Mathematics |
GE-1 | 3 | 1 | 0 |
4 |
|
Total of Theory and Tutorial |
18 |
||||||
Total of Practical |
3 |
||||||
Total of Semester |
21 |
SEMESTER II
A. THEORY/PRACTICAL |
|||||||
S.No. | CODE | SUBJECT NAME | SUBJECT
TYPE |
PERIODS/WEEK |
CREDITS |
||
L | T | P | |||||
1 | Database Management
System |
CC-4 | 4 | 0 | 2 |
5 |
|
2 | Object Oriented
Programming Using Java |
CC-5 | 4 | 0 | 2 |
5 |
|
3 | Computer Networking | CC-6 | 4 | 0 | 2 |
5 |
|
4 | Professional Skills | AECC-2 | 2 | 0 | 0 |
2 |
|
5 | Probability and
Statistics/Numerical Methods |
GE-2 |
3 |
1 |
0 |
4 |
|
Total of Theory and Tutorial |
18 |
||||||
Total of Practical |
3 |
||||||
Total of Semester |
21 |
SEMESTER III
A. THEORY/PRACTICAL |
|||||||
S.No. | CODE | SUBJECT NAME | SUBJECT
TYPE |
PERIODS/WEEK |
CREDITS |
||
L | T | P | |||||
1 | Cloud Computing and
Information Security |
CC-7 | 4 | 0 | 0 |
4 |
|
2 | Fundamentals of Storage and
Data Centres |
CC-8 | 4 | 0 | 0 |
4 |
|
3 | Linux Administration | CC-9 | 3 | 0 | 2 |
4 |
|
4 | Software Engineering | CC-10 | 3 | 0 | 0 |
3 |
|
5 | Network Security | CC-11 | 3 | 0 | 4 |
5 |
|
6 | Leadership and Management
Skills |
AECC-3 | 2 | 0 | 0 |
2 |
|
7 | Design Thinking/Project
Management |
GE-3 | 2 | 0 | 0 |
2 |
|
Total of Theory & Tutorial |
21 |
||||||
Total of Practical |
3 |
||||||
Total of Semester |
24 |
SEMESTER IV
A. THEORY/PRACTICAL |
|||||||
S.No. | CODE | SUBJECT NAME | SUBJECT TYPE | PERIODS/WEEK |
CREDITS |
||
L | T | P | |||||
1 | Automation and
Configuration Management |
CC-12 | 3 | 0 | 2 |
4 |
|
2 | Principles of Virtualization | CC-13 | 3 | 0 | 2 |
4 |
|
3 | Database Security | DSE-1 | 3 | 0 | 2 |
4 |
|
4 | Ethical Hacking | DSE-2 | 3 | 0 | 2 |
4 |
|
5 | Server Side Scripting | SEC-1 | 3 | 0 | 2 |
4 |
|
6 | Logical Reasoning and
Thinking |
AECC-4 | 2 | 0 | 0 |
2 |
|
7 | Environmental Science | GE-4 | 2 | 0 | 0 |
2 |
|
Total of Theory & Tutorial |
19 |
||||||
Total of Practical |
5 |
||||||
Total of Semester |
24 |
SEMESTER V
A. THEORY/PRACTICAL |
|||||||
S.No. | CODE | SUBJECT NAME | SUBJECT TYPE | PERIODS/WEEK |
CREDITS |
||
L | T | P | |||||
1 | Containerization using
Docker |
CC-14 | 3 | 0 | 2 |
4 |
|
2 | Cloud Security | CC-15 | 3 | 0 | 4 |
5 |
|
3 | Cloud Web Services | DSE-3 | 3 | 0 | 2 |
4 |
|
4 | Digital Forensics and
Investigation |
DSE-4 | 3 | 0 | 2 |
4 |
|
5 | Technical Training for
Placement |
AECC-5 | 0 | 0 | 4 |
2 |
|
6 | Entrepreneurship/MIS | GE-6 | 3 | 0 | 2 |
4 |
|
Total of Theory & Tutorial |
15 |
||||||
Total of Practical |
8 |
||||||
Total of Semester |
23 |
SEMESTER VI
A. THEORY |
|||||||
S.No. | CODE | COURSE NAME | SUBJECT TYPE | PERIODS/WEEK |
CREDITS |
||
L | T | P | |||||
1 | IT Governance, Risk & Information Security
Management |
DSC-5 |
4 |
0 |
0 |
4 |
|
2 | Major Project / Internship | 0 | 0 | 28 |
14 |
||
3 | Universal Human Values | AECC-6 | 2 | 0 | 0 |
2 |
|
Total of Theory |
6 |
||||||
Total of Practical |
14 |
||||||
Total of Semester |
20 |
Specialization Electives
Domain Specific Electives: | |||||
Subject Name | L | T | P | Credits | |
1 | Database Security | 3 | 0 | 2 | 4 |
2 | Ethical Hacking | 3 | 0 | 2 | 4 |
3 | Cloud Web Security | 3 | 0 | 2 | 4 |
4 | Digital Forensics and Investigation | 3 | 0 | 2 | 4 |
Program Outcomes (POs)
- Critical Thinking: Take informed actions after identifying the assumptions that frame our thinking and actions, checking out the degree to which these assumptions are accurate and valid, and looking at our ideas and decisions (intellectual, organizational, and personal) from different perspectives.
- Effective Communication and Social Interaction: Speak, read, write and listen clearly in person and through electronic media and make meaning of the world by connecting people, ideas, books, media and technology. Also, elicit views of others, mediate disagreements and help reach conclusions in group settings.
- Design/development of solutions: Design cloud infrastructure solutions for the industry and to provide end to end security solutions.
- Modern tool usage: Modern engineering has taken its evolution to next level using comprehensive cloud computing techniques like Virtualization (Hyper-V) and providers like Amazon web services (AWS) and IT tools including Kubernetes which helps in complex engineering activities.
- Ethics: Recognize different value systems including your own, understand the moral dimensions of your decisions, and accept responsibility for them.
- Environment and Sustainability: Understand the issues of environmental contexts and sustainable development.
- Self-directed and Life-long Learning: Acquire the ability to engage in independent and life-long learning in the broadest context socio-technological changes
Program Specific Outcomes (PSOs)
- Apply knowledge to solve complex problems in the field of cloud technology, virtualization, cyber and information security by analyzing, formulating sub- tasks, and proposing innovative solutions.
- Apply creative and innovative techniques to identify and explain the core issues of cloud computing such as security, privacy, and interoperability.
- Work with various cloud services like SaaS, PaaS and IaaS moreover they will also be able to provide the appropriate cloud computing solutions and make recommendations as per the use case on a particular cloud infrastructure level.
- Apply fundamentals of cyber forensics such as cryptography, security policies (authentication, integrity and confidentiality) and protocols to implement such policies in the form of message exchanges, and able to resolve security breach incidents.