| 1 |
CS-837 |
Advanced Operating Systems |
3+0 |
4,9 |
|
 |
| 2 |
IS-822 |
Wireless Network Security |
3+0 |
9,16 |
|
|
| 3 |
IS-825 |
Vulnerability Exploitation And Defense |
3+0 |
9,16,17 |
|
|
| 4 |
IS-826 |
Cyber Warfare |
3+0 |
3,8,9,16,17 |
|
|
| 5 |
IS-827 |
Electronic Warfare - Principles And Techniques |
3+0 |
4,9,11,16 |
|
|
| 6 |
IS-833 |
IT Security Evaluation & Auditing |
3+0 |
9,16,17 |
|
|
| 7 |
IS-843 |
Advanced Cryptography - II |
3+0 |
9 |
|
|
| 8 |
IS-844 |
Cryptanalysis |
3+0 |
4,9 |
|
|
| 9 |
IS-890 |
Advanced Topics In Information Security |
3+0 |
4,9,11,16,17 |
|
|
| 10 |
IS-871 |
Os & File System Forensics |
3+0 |
9,16 |
|
|
| 11 |
IS-823 |
Computer Forensics |
3+0 |
9,16 |
|
|
| 12 |
IS-845 |
Quantum Cryptography |
3+0 |
4,9,16 |
|
|
| 13 |
IS-893 |
Advanced Topics In Systems Security |
3+0 |
4,9,16 |
|
|
| 14 |
IS-891 |
Advanced Topics In Cryptology |
3+0 |
4,9,11,16 |
|
|
| 15 |
IS-854 |
Advanced Web Security |
3+0 |
4,9,16 |
|
|
| 16 |
IS-859 |
Information Security Engineering |
3+0 |
4,9 |
|
|
| 17 |
IS-861 |
Secure Electronics Commerce |
3+0 |
8,9,16 |
|
|
| 18 |
IT-863 |
Internet of Things |
3+0 |
9,11 |
|
 |
| 19 |
IS-852 |
Data Communication Networks & Security |
3+0 |
4,9,11,16 |
|
|
| 20 |
IT-864 |
Software Defined Networking |
3+0 |
9 |
|
 |
| 21 |
IS-846 |
Formal Methods for Information Security |
3+0 |
4,8,9,11 |
|
|
| 22 |
IS-839 |
Critical Infrastructure Protection and Incident Management |
3+0 |
9,16,17 |
|
|
| 23 |
IS-874 |
Intrusion Detection |
3+0 |
9,16 |
|
|
| 24 |
IS-895 |
Advanced Topics in Digital Forensics and Incident Response |
3+0 |
9,16,17 |
|
|
| 25 |
IS-870 |
Network Forensics |
3+0 |
9,16 |
|
|
| 26 |
IS-853 |
Cloud Computing Security |
3+0 |
|
|
|
| 27 |
CS-886 |
Number Theory |
3+0 |
4 |
|
|
| 28 |
CS-887 |
Ethical Hacking |
3+0 |
4,9,16 |
|
|
| 29 |
CS-888 |
Block Chain and Crypto Currencies |
3+0 |
9,16 |
|
|
| 30 |
IS-880 |
Information Assurances |
3 |
16,17 |
|
|