BCA – Cloud Technology Information Security

BCA-CTIS Header

Program Information:

Eligibility: Applicants should have passed the 10+2 or equivalent examination with minimum aggregate marks of 50% marks (45% in case of reserved category)
Duration: 3 years
No. of Seats: 60

emi option img

For more details

Click to Call Now: 1800-120-2546

CLICK HERE TO FILL ADMISSION FORM

Program Objective:

The program objectives are:

  • To prepare graduates as leading professionals in government, academia, and corporate along with entrepreneurial pursuits.
  • To prepare graduates with an ability to articulate and solve problems in the field of Computer Applications specifically in the field of Cloud Technology and Information Security.
  • To prepare the graduates with strong learning quotients having adaptability to the constantly changing technological environment.
  • To prepare the graduates to lead and initiate ethically the professional and organizational goals in an interdisciplinary team and obtain desired results.

Why Study BCA in CTIS?

The information technology sector has been rapidly transforming in the recent times. Cloud Technology and Information Security are two of the IT Industries which have seen growth in multi-folds. BCA with Cloud Technology and Information Security as Specialization aims to impart fundamental knowledge in computer applications along with thorough learning in specialty streams. This programme comprises of both theoretical and practical sessions which can help students become successful professionals in the IT industry.

Suited to your Career:

Fast growing information technology and communication systems have become critical components of almost every company’s strategic plan. Companies which want to take advantage of the new information technologies and communication systems require expert professionals, who can apply computer science principles to solve problems produced by the interface between business and technology. BCA Course is an undergraduate program where students are exposed to various areas of computer applications including the latest developments in the industry.

This unique course provides dual career options for the students in the fast growing technology sectors of Cloud Technology and Information Security. In addition to all the mandatory subjects of a traditional BCA, this specialized course offers in-depth practical know-how of the current trends. These sectors have the potential to grow exponentially and they provide challenging job opportunities for young professionals with the right skill sets.

On the Cloud Technology front, the course will provide students with the fundamental knowledge of all aspects of Cloud Technology. The course focuses on Virtualization Technology, Cloud Technology, Datacenters, Networking and Operating Systems. On the Information Security front, this course equips the students with the concepts and the technical skills in Information Security. The focus of the course is on the models, tools and techniques for enforcement of Security Policies, with emphasis on Cryptography, Ethical Hacking, Computer Forensics and Virtualization and Cloud Security.

Career Prospect:

BCA graduates can start up their career in either Government sector or private sector since there are a lot of employment Opportunity in both these sectors. This degree helps the students to get a sound knowledge on computer applications with the help of which they can have a perfect launch pad for challenging career in the field of IT.
The courses of BCA with CTIS specialization will provide jobs in IT sectors. The renowned companies Wipro, TCS, Tech-Mahindra, Accenture, etc.

If one wishes to become a Professional in Cloud and information security, then this program is the best course to get an early start for their careers. Job opportunity can be found in both large and small software organizations as well as hardware companies.

Syllabus

A. THEORY/PRACTICAL

 

S. No.

 

CODE

 

SUBJECT NAME

SUBJECT TYPE HOURS / WEEK  

CREDITS

L T P
1   Data Structure using C CC-1 4 0 4

6

2   Computer Architecture &

Organization

CC-2 4 0 0

4

3   Operating System CC-3 4 0 2

5

4   Communication Skills AECC-1 2 0 0

2

5   Theory of Mathematics/Discrete

Mathematics

GE-1 3 1 0

4

Total of Theory and Tutorial

18

Total of Practical

3

Total of Semester

21

A. THEORY/PRACTICAL

S.No. CODE SUBJECT NAME SUBJECT

TYPE

PERIODS/WEEK

CREDITS

L T P
1   Database Management

System

CC-4 4 0 2

5

2   Object Oriented

Programming Using Java

CC-5 4 0 2

5

3   Computer Networking CC-6 4 0 2

5

4   Professional Skills AECC-2 2 0 0

2

5   Probability and

Statistics/Numerical Methods

 

GE-2

 

3

 

1

 

0

 

4

Total of Theory and Tutorial

18

Total of Practical

3

Total of Semester

21

A. THEORY/PRACTICAL

S.No. CODE SUBJECT NAME SUBJECT

TYPE

PERIODS/WEEK

CREDITS

L T P
1   Cloud Computing and

Information Security

CC-7 4 0 0

4

2   Fundamentals of Storage and

Data Centres

CC-8 4 0 0

4

3   Linux Administration CC-9 3 0 2

4

4   Software Engineering CC-10 3 0 0

3

5   Network Security CC-11 3 0 4

5

6   Leadership and Management

Skills

AECC-3 2 0 0

2

7   Design Thinking/Project

Management

GE-3 2 0 0

2

Total of Theory & Tutorial

21

Total of Practical

3

Total of Semester

24

A. THEORY/PRACTICAL

S.No. CODE SUBJECT NAME SUBJECT TYPE PERIODS/WEEK

CREDITS

L T P  
1   Automation and

Configuration Management

CC-12 3 0 2

4

2   Principles of Virtualization CC-13 3 0 2

4

3   Database Security DSE-1 3 0 2

4

4   Ethical Hacking DSE-2 3 0 2

4

5   Server Side Scripting SEC-1 3 0 2

4

6   Logical Reasoning and

Thinking

AECC-4 2 0 0

2

7   Environmental Science GE-4 2 0 0

2

Total of Theory & Tutorial

19

Total of Practical

5

Total of Semester

24

A. THEORY/PRACTICAL

S.No. CODE SUBJECT NAME SUBJECT TYPE PERIODS/WEEK

CREDITS

    L T P  
1   Containerization using

Docker

CC-14 3 0 2

4

2   Cloud Security CC-15 3 0 4

5

3   Cloud Web Services DSE-3 3 0 2

4

4   Digital Forensics and

Investigation

DSE-4 3 0 2

4

5   Technical Training for

Placement

AECC-5 0 0 4

2

6   Entrepreneurship/MIS GE-6 3 0 2

4

Total of Theory & Tutorial

15

Total of Practical

8

Total of Semester

23

A. THEORY

S.No. CODE COURSE NAME SUBJECT TYPE PERIODS/WEEK

CREDITS

L T P
1   IT Governance, Risk & Information Security

Management

DSC-5  

4

 

0

 

0

 

4

2   Major Project / Internship   0 0 28

14

3   Universal Human Values AECC-6 2 0 0

2

Total of Theory

6

Total of Practical

14

Total of Semester

20

Domain Specific Electives:
Subject Name L T P Credits
1 Database Security 3 0 2 4
2 Ethical Hacking 3 0 2 4
3 Cloud Web Security 3 0 2 4
4  Digital Forensics and Investigation 3 0 2 4

  1. Critical Thinking: Take informed actions after identifying the assumptions that frame our thinking and actions, checking out the degree to which these assumptions are accurate and valid, and looking at our ideas and decisions (intellectual, organizational, and personal) from different perspectives.
  2. Effective Communication and Social Interaction: Speak, read, write and listen clearly in person and through electronic media and make meaning of the world by connecting people, ideas, books, media and technology. Also, elicit views of others, mediate disagreements and help reach conclusions in group settings.
  3. Design/development of solutions: Design cloud infrastructure solutions for the industry and to provide end to end security solutions.
  4. Modern tool usage: Modern engineering has taken its evolution to next level using comprehensive cloud computing techniques like Virtualization (Hyper-V) and providers like Amazon web services (AWS) and IT tools including Kubernetes which helps in complex engineering activities.
  5. Ethics: Recognize different value systems including your own, understand the moral dimensions of your decisions, and accept responsibility for them.
  6. Environment and Sustainability: Understand the issues of environmental contexts and sustainable development.
  7. Self-directed and Life-long Learning: Acquire the ability to engage in independent and life-long learning in the broadest context socio-technological changes

  1. Apply knowledge to solve complex problems in the field of cloud technology, virtualization, cyber and information security by analyzing, formulating sub- tasks, and proposing innovative solutions.
  2. Apply creative and innovative techniques to identify and explain the core issues of cloud computing such as security, privacy, and interoperability.
  3. Work with various cloud services like SaaS, PaaS and IaaS moreover they will also be able to provide the appropriate cloud computing solutions and make recommendations as per the use case on a particular cloud infrastructure level.
  4. Apply fundamentals of cyber forensics such as cryptography, security policies (authentication, integrity and confidentiality) and protocols to implement such policies in the form of message exchanges, and able to resolve security breach incidents.