1 |
IS-810 |
Secure Coding |
3+0 |
|
|
2 |
IS-820 |
Computer Security |
3+0 |
|
|
3 |
IS-822 |
Wireless Network Security |
3+0 |
9,16 |
|
4 |
IS-824 |
Biometrics |
3+0 |
|
|
5 |
IS-825 |
Vulnerability Exploitation And Defense |
3+0 |
9,16,17 |
|
6 |
IS-826 |
Cyber Warfare |
3+0 |
|
|
7 |
IS-827 |
Electronic Warfare - Principles And Techniques |
3+0 |
|
|
8 |
IS-830 |
Information Security Management |
3+0 |
|
|
9 |
IS-831 |
Information Security Project Management |
3+0 |
|
|
10 |
IS-833 |
It Security Evaluation & Auditing |
3+0 |
|
|
11 |
IS-844 |
Cryptanalysis |
3+0 |
|
|
12 |
IS-890 |
Advanced Topics In Information Security |
3+0 |
4,9,11,16,17 |
|
13 |
SE-802 |
Pattern Recognition |
3+0 |
|
|
14 |
SE-805 |
Advance Artificial Intelligence |
3+0 |
4,9 |
|
15 |
IS-842 |
Advanced Cryptography-I |
3+0 |
4,9,16 |
|
16 |
IS-871 |
Os & File System Forensics |
3+0 |
|
|
17 |
IS-823 |
Computer Forensics |
3+0 |
|
|
18 |
IS-845 |
Quantum Cryptography |
3+0 |
|
|
19 |
IS-821 |
Network Security |
3+0 |
|
|
20 |
IS-893 |
Advanced Topics In Systems Security |
3+0 |
|
|
21 |
IS-891 |
Advanced Topics In Cryptology |
3+0 |
4,9,11,16 |
|
22 |
IS-873 |
Malware Analysis And Reverse Engineering |
3+0 |
|
|
23 |
IS-838 |
Advanced Simulation and Modeling |
3+0 |
7,9,11 |
|
24 |
IS-843 |
Adv Cryptography II |
3+0 |
|
|
25 |
IS-999 |
Phd Thesis |
30+0 |
|
|
26 |
IS-854 |
Advanced Web Security |
3+0 |
4,9,16 |
|
27 |
IS-855 |
Information Hiding |
3+0 |
|
|
28 |
IS-859 |
Information Security Engineering |
3+0 |
|
|
29 |
IS-861 |
Secure Electronics Commerce |
3+0 |
|
|
30 |
IS-851 |
Secure Communications |
3+0 |
|
|
31 |
IS-852 |
Data Communication Networks & Security |
3+0 |
|
|
32 |
IS-853 |
Cloud Computing Security |
3+0 |
|
|
33 |
IS-856 |
Access Control and Database Security |
3+0 |
9 |
|
34 |
IS-863 |
Cellular and Mobile Network Security |
3+0 |
|
|
35 |
is-846 |
Formal Methods for Information Security |
3+0 |
|
|
36 |
is-832 |
Legal Aspects of Information Security |
3+0 |
|
|
37 |
is-834 |
Security Planning and Incident Management |
3+0 |
|
|
38 |
IS-835 |
Security Risk Analysis and Management |
3+0 |
|
|
39 |
IS-836 |
Auditing Networks, Perimeters and Systems |
3+0 |
|
|
40 |
IS-837 |
Security and Privacy of Information and Information Systems |
3+0 |
|
|
41 |
IS-894 |
Advanced Topics in Information Security Management |
3+0 |
9 |
|
42 |
IS-839 |
Critical Infrastructure Protection and Incident Management |
3+0 |
|
|
43 |
IS-872 |
Forensics Incident Response |
3+0 |
|
|
44 |
IS-874 |
Intrusion Detection |
3+0 |
|
|
45 |
IS-895 |
Advanced Topics in Digital Forensics and Incident Response |
3+0 |
9,16,17 |
|
46 |
CE-838 |
Analysis of Stochastic Systems |
3+0 |
|
|
47 |
IS-870 |
Network Forensics |
3+0 |
|
|