Course Objectives
In today's interconnected world, the proliferation of digital technologies has brought about unprecedented convenience and efficiency. However, this digital transformation has also led to an increase in cyber threats, making cyber security an essential field. Cyber-attacks can cause significant harm to individuals, businesses, and national security. As a result, there is a growing demand for skilled cyber security professionals who can protect sensitive information and critical infrastructure.
To Develop Proficiency in Cyber Security: Equip students with the skills to protect• Information systems against cyber threats and vulnerabilities. To provide hands-on experience with current security technologies and tools.• To an understanding of the ethical, legal, and societal implications of cyber security• practices. To encourage innovative problem-solving and critical analysis of security issues.• To develop an understanding of the global context and cultural dimensions of cyber security
Career Growth Pathway
Use B.Sc. Cyber and Digital Science
Job Opportunities
Use B.Sc. Cyber and Digital Science
Eligibility
Higher secondary school certificate (10+2) or its equivalent examination with English
Higher secondary school certificate (10+2) with Science
or its equivalent examination with English
OR
Three-year diploma course from the board of technical
education conducted by Government of Maharashtra or its
equivalent
Syllabus
First Year SIICS Course Syllabus
| Course Code | Course Name | |
|---|---|---|
| CYS101MJ | Fundamentals of Linux Administration | |
| CYS102MJ | Foundations of C programming | |
| CYS103MJ | Information Technology 2 | |
| CYS104MJP | Practical based on CYS101MJ | |
| CYS105MJP | Practical based on CYS102MJ | |
| CYS106MJP | Practical based on CYS103MJ | |
| CYS101IKS | Computing in ancient India | |
| OE101CYS | Office Automation/ Introduction to Google Tools | |
| SEC101CYS | Basics of Digital Communication (P) | |
| AEC101MAR/ HIN/ENG | MIL-I (Hindi) / MIL-I(Marathi)/ MIL I (ENGLISH) | |
| VEC101ENV | EVS-I | |
| Course Code | Course Name | |
|---|---|---|
| CYS151MJ | Cyber Security Fundamentals | |
| CYS152MJ | Computer Networks | |
| CYS153MJ | Python Programming | |
| CYS154MJP | Practical based on CYS151MJ | |
| CYS155MJP | Practical based on CYS152MJ | |
| CYS156MJP | Practical based on CYS153MJ | |
| OE152CYSP | Office Automation/ Introduction to Google Tools | |
| SEC151CYS | Statistical Methods-I | |
| AEC151MAR / HIN/ENG | MIL-I(Hindi) / MIL-I(Marathi)/ MIL I(ENGLISH) | |
| VEC151ENV | EVS-II | |
| CC151PE/ NSS/ NCC | University Basket | |
Let’s make something awesome together
Every pleasure is to be welcomed and every pain avoided. certain
circumstances and owing to the claims welcomed and every pain avoided
certain circumstances
- 30-day money back guarantee
- Web site Marketing Solutions
- Unlimited Application
- 24/7 system Monitoring
Career Growth Pathway
Graduate students of Suryadatta have bright future
prospects & have multiple options to pursue their master
degree (M.Sc. Cyber Security, M.Sc.Data Science, M.Sc.CA,
MCA & PGDM)
Job Opportunities
- Lead and Internal Auditor for information security management systems in surveillance agencies, Assistantship with cyber lawyers and advocates.
- Network Engineer
- Information Security Analyst • Ethical Hacker Job Roles
- Security Architect
- Chief Information security officer (CISO)
Your Marketing Solutions Happy Clients Says?
Esther Howard
Nursing AssistantThere are many variations of passages of the Lorem Ipsum available, but the majority have suffered alteration in some form, by injected humour, or randomised words which don't look even slightly believable.
Courtney Henry
Nursing AssistantThere are many variations of passages of the Lorem Ipsum available, but the majority have suffered alteration in some form, by injected humour, or randomised words which don't look even slightly believable.

