Programs

  • B.Sc (Hons) Food Science Technology and Processing Duration: 3 Years
  • Bachelor of Science (Food Science Technology and Processing) (Honours / Research) Duration: 4 Years
  • B.Sc.+ M.Sc (Hons) Food Science Technology and Processing - Integrated Duration: 5 Years

The Amity School of Engineering and Technology emphasizes hands-on, experiential learning and a flexible academic model enabling students to meet real-world demands and provide innovative solutions. With a diverse student body and a practical approach to teaching, the school prepares students to enter the global workforce with confidence. It offers a range of engineering specializations, providing students with opportunities to explore their interests and passions. The student-centric pedagogy, project-based approach, and design-driven curriculum encourage critical thinking, problem-solving, innovation, and a lifelong love of learning. Amity School of Engineering and Technology is committed to providing students with an exceptional educational experience that prepares them for a successful and rewarding career in engineering.

The Department of Computer Science and Engineering offers a 4-year B. Tech CSE programme in Computer Science and Engineering (Cyber Security).

This program has been designed to emphasise futuristic technologies such as network security, information security, cryptography, and web security. Along with the conceptual knowledge, the courses taught here impart research-driven and industry-led experience in all the domains of computer science.

Eligibility Criteria

  • B.Tech. Computer Science Engineering (Cyber Security) – 4 years

    Class (X & XII) aggregate 60% with (Physics + Mathematics + Chemistry/ Computer Science/ Electronics/ Information Technology/ Informatics Practices) minimum 55%

Fees:

First Year: 2,13,000

Apply Now

Specialisation in Cyber Security offers you the opportunity to gain a comprehensive and critical understanding of the theory and techniques of contemporary Cyber Security and how to apply these in response to “real-world” business problems. This specialist qualification in one of the most in-demand areas of IT, combines advanced aspects of security, its practical application and the implications of security within a business.

As we all know, the technology industry has taken huge strides in the 21st century with inventions that brought the whole world to our fingertips. While it has made our lives undeniably easier, it has also opened up a world of possibilities for criminals who could make use of the information that has been put online for the wrong reasons. This is where cybersecurity comes in.

After completion of an academic programme in computer applications, students will be able to:

  • Gain the capacity to use their knowledge of mathematics, computer science and management in real-world situations.
  • Apply professional skills in a range of computer applications, computer organizations, and utilize the techniques of network security, information security, cryptography, and web security.
  • Communicate more reliably, securely, and effectively with a larger audience.
  • Develop their programming skills so they can compete in the global IT industry.

Cyber Security is a branch of Digital Forensic Science pertaining to legal evidence found in the cyber space and digital storage media. Cyber Security technologies, processes and practices are designed to protect networks, computers, programs, and data from damage and unauthorized access.

There are many benefits to studying cyber security, which is indicative of the growing significance of technology across many industries. These are the main benefits:

  • Collaborative Work Environment: Many IT projects involve collaboration with diverse teams, promoting teamwork and effective communication skills.
  • Global Connectivity: The interconnected nature of the digital world enables professionals to collaborate with experts and organizations worldwide, fostering a global network.
  • Competitive Salaries: IT professionals often enjoy competitive salaries and benefits, reflecting the critical role they play in driving technological advancements and business success.
  • Entrepreneurial Opportunities: Knowledge in computer applications empowers individuals to start their own tech ventures or contribute to innovative startups, fostering entrepreneurship.
  • Continuous Learning: The field is dynamic, requiring professionals to stay updated on the latest technologies, providing a stimulating environment for continuous learning and skill enhancement.
  • Remote Work Opportunities: The nature of IT work often allows for remote work, providing flexibility and the ability to work from different locations.
  • Industry-Relevant Skills: Graduates acquire practical, industry-relevant skills, making them valuable assets to employers seeking professionals who can contribute immediately.

The faculty at our university has a stellar reputation around the country since they were hand-selected from the best universities. A sizable number of academics with a range of specialisations in computer sciences are currently employed by Amity University Mohali. They have a great deal of professional expertise and are extremely qualified. Additionally, they are enthusiastic about teaching. They apply their practical knowledge and creative teaching techniques in addition to their training and expertise.

Cyber Security is among the most promising domains with ample of opportunities across different industries. Some of the major career opportunities are:

  • Ethical Hacker
    An Ethical hacker is a cyber security specialist who can break security systems. They test computer networks and attempt to hack into them to gain unauthorized access to information.
  • Penetration Tester
    A Penetration tester is hired by businesses to improve information security by finding and resolving system flaws before criminal hackers may use them.
  • Security Software Develeper
    The responsibilities of a software developer include testing, operating, and implementing software that protects the company's data from hackers and theft.
  • Security Code Auditor
    A Security Code Auditor is responsible for analyzing source code to identify potential security flaws, vulnerabilities, exploits, or violations of programming standards.
  • Cyber Legal Service
    This includes supervising cyber laws, privacy, security, and other support rules and regulations.
  • Cryptographers
    A Cryptographer is one who analyzes and deciphers encrypted data to aid law enforcement or government agencies in the investigation of crimes, threats, or security concerns.