1 |
CS-837 |
Advanced Operating Systems |
3+0 |
4,9 |
|
|
2 |
IS-822 |
Wireless Network Security |
3+0 |
9,16 |
|
|
3 |
IS-825 |
Vulnerability Exploitation And Defense |
3+0 |
9,16,17 |
|
|
4 |
IS-826 |
Cyber Warfare |
3+0 |
3,8,9,16,17 |
|
|
5 |
IS-827 |
Electronic Warfare - Principles And Techniques |
3+0 |
4,9,11,16 |
|
|
6 |
IS-833 |
IT Security Evaluation & Auditing |
3+0 |
9,16,17 |
|
|
7 |
IS-843 |
Advanced Cryptography - II |
3+0 |
9 |
|
|
8 |
IS-844 |
Cryptanalysis |
3+0 |
4,9 |
|
|
9 |
IS-890 |
Advanced Topics In Information Security |
3+0 |
4,9,11,16,17 |
|
|
10 |
IS-871 |
Os & File System Forensics |
3+0 |
9,16 |
|
|
11 |
IS-823 |
Computer Forensics |
3+0 |
9,16 |
|
|
12 |
IS-845 |
Quantum Cryptography |
3+0 |
4,9,16 |
|
|
13 |
IS-893 |
Advanced Topics In Systems Security |
3+0 |
4,9,16 |
|
|
14 |
IS-891 |
Advanced Topics In Cryptology |
3+0 |
4,9,11,16 |
|
|
15 |
IS-854 |
Advanced Web Security |
3+0 |
4,9,16 |
|
|
16 |
IS-859 |
Information Security Engineering |
3+0 |
4,9 |
|
|
17 |
IS-861 |
Secure Electronics Commerce |
3+0 |
8,9,16 |
|
|
18 |
IT-863 |
Internet of Things |
3+0 |
9,11 |
|
|
19 |
IS-852 |
Data Communication Networks & Security |
3+0 |
4,9,11,16 |
|
|
20 |
IT-864 |
Software Defined Networking |
3+0 |
9 |
|
|
21 |
IS-846 |
Formal Methods for Information Security |
3+0 |
4,8,9,11 |
|
|
22 |
IS-839 |
Critical Infrastructure Protection and Incident Management |
3+0 |
9,16,17 |
|
|
23 |
IS-874 |
Intrusion Detection |
3+0 |
9,16 |
|
|
24 |
IS-895 |
Advanced Topics in Digital Forensics and Incident Response |
3+0 |
9,16,17 |
|
|
25 |
IS-870 |
Network Forensics |
3+0 |
9,16 |
|
|
26 |
IS-853 |
Cloud Computing Security |
3+0 |
|
|
|
27 |
CS-886 |
Number Theory |
3+0 |
4 |
|
|
28 |
CS-887 |
Ethical Hacking |
3+0 |
4,9,16 |
|
|
29 |
CS-888 |
Block Chain and Crypto Currencies |
3+0 |
9,16 |
|
|
30 |
IS-880 |
Information Assurances |
3 |
16,17 |
|
|