1 |
CS-863 |
Artificial Intelligence with Applications |
3 |
12 |
|
|
2 |
IS-817 |
IoT Security |
3 |
|
|
|
3 |
IS-818 |
Blockchain |
3 |
|
|
|
4 |
IS-810 |
Secure Coding |
3+0 |
9 |
|
|
5 |
IS-820 |
Computer Security |
3+0 |
4,8,9 |
|
|
6 |
IS-822 |
Wireless Network Security |
3+0 |
9,16 |
|
|
7 |
IS-824 |
Biometrics |
3+0 |
3,9 |
|
|
8 |
IS-825 |
Vulnerability Exploitation And Defense |
3+0 |
9,16,17 |
|
|
9 |
IS-826 |
Cyber Warfare |
3+0 |
3,8,9,16,17 |
|
|
10 |
IS-827 |
Electronic Warfare - Principles And Techniques |
3+0 |
4,9,11,16 |
|
|
11 |
IS-830 |
Information Security Management |
3+0 |
4,9,16,17 |
|
|
12 |
IS-831 |
Information Security Project Management |
3+0 |
9,12 |
|
|
13 |
IS-833 |
IT Security Evaluation & Auditing |
3+0 |
9,16,17 |
|
|
14 |
IS-843 |
Advanced Cryptography - II |
3+0 |
9 |
|
|
15 |
IS-844 |
Cryptanalysis |
3+0 |
4,9 |
|
|
16 |
IS-890 |
Advanced Topics In Information Security |
3+0 |
4,9,11,16,17 |
|
|
17 |
SE-805 |
Advance Artificial Intelligence |
3+0 |
4,9,11 |
|
|
18 |
IS-842 |
Advanced Cryptography-I |
3+0 |
4,9,16 |
|
|
19 |
IS-871 |
Os & File System Forensics |
3+0 |
9,16 |
|
|
20 |
IS-823 |
Computer Forensics |
3+0 |
9,16 |
|
|
21 |
IS-845 |
Quantum Cryptography |
3+0 |
4,9,16 |
|
|
22 |
IS-821 |
Network Security |
3+0 |
4,9 |
|
|
23 |
IS-893 |
Advanced Topics In Systems Security |
3+0 |
4,9,16 |
|
|
24 |
IS-891 |
Advanced Topics In Cryptology |
3+0 |
4,9,11,16 |
|
|
25 |
IS-873 |
Malware Analysis and Reverse Engineering |
3+0 |
9,16 |
|
|
26 |
IS-999 |
PhD Thesis |
0+300 |
4 |
|
|
27 |
IS-854 |
Advanced Web Security |
3+0 |
4,9,16 |
|
|
28 |
IS-855 |
Information Hiding |
3+0 |
9,12 |
|
|
29 |
IS-861 |
Secure Electronics Commerce |
3+0 |
8,9,16 |
|
|
30 |
IS-851 |
Secure Communications |
3+0 |
9 |
|
|
31 |
IS-853 |
Cloud Computing Security |
3+0 |
4,9,11,12 |
|
|
32 |
IS-856 |
Access Control and Database Security |
3+0 |
9 |
|
|
33 |
IS-863 |
Cellular and Mobile Network Security |
3+0 |
9,11 |
|
|
34 |
CS-827 |
Applied Game Theory |
3+0 |
9 |
|
|
35 |
IS-846 |
Formal Methods for Information Security |
3+0 |
4,8,9,11 |
|
|
36 |
IS-832 |
Legal Aspects of Information Security |
3+0 |
8,10 |
|
|
37 |
IS-834 |
Security Planning and Incident Management |
3+0 |
9,11 |
|
|
38 |
IS-837 |
Security and Privacy of Information and Information Systems |
3+0 |
9 |
|
|
39 |
IS-894 |
Advanced Topics in Information Security Management |
3+0 |
9 |
|
|
40 |
IS-839 |
Critical Infrastructure Protection and Incident Management |
3+0 |
9,16,17 |
|
|
41 |
IS-872 |
Forensics Incident Response |
3+0 |
9,16 |
|
|
42 |
IS-895 |
Advanced Topics in Digital Forensics and Incident Response |
3+0 |
9,16,17 |
|
|
43 |
IS-870 |
Network Forensics |
3+0 |
9,16 |
|
|