Mandya, Karnataka | Approved By : AICTE,UGC,NCTE,BCI,PCI,MCI | Estd: 2018
Adichunchanagiri University is Situated State of Karnataka India. Adichunchanagiri University is Central institute. Adichunchanagiri University is Established in 2018. Adichunchanagiri University is Approved by AICTE,UGC,NCTE,BCI,PCI,MCI. Adichunchanagiri University is Provide B.Tech in Information Security is 4 year Completed Programs. B.Tech in information security is a undergraduate course. The course enables students to explore vulnerabilities in a system or network and deploy ways to patch the data breaches. The eligibility criterion of the course B.tech information security is students must have to clear 10+2 with science as a stream from a recognized university. Adichunchanagiri University Offered facilities include Hostels, Cafeteria, Medical centres, Sports, Library, Laboratories, and internet facility.
Institute Name | Adichunchanagiri University Mandya |
Established Year | 2018 |
Approved By | AICTE,UGC,NCTE,BCI,PCI,MCI |
Type | Central |
Address | Mandya, Karnataka India 571448 |
E-Mail | info@acu.edu.in |
Official Website | https://acu.edu.in |
Admission in Adichunchanagiri University, students should appear in the entrance exam conducted by the university. Those Scholars, who clear the entrance exam only, will be qualified for the admission process.
The Admission form is provided in the official website of the Adichunchanagiri University – https://acu.edu.in
Open the application form and fill in all the required details accurately.
Candidates should upload their passport size photographs with 10th and 12th marksheet certificates.
Once the application form is filled, submit the application form by uploading the asked documents.
• Scanned copy of Passport size photograph
• Scanned copy of signature
• Matric (10th) Marksheet
• 10+2 Marksheet
• Migration Certificate
• Character Certificate
• Bonafide Resident Certificate, if applicable
• Income Certificate required for claiming benefits of EWS or SC / BC
Scholarships , if applicable
• Reserved Category Certificate, if applicable
• Gap Year Affidavit, if applicable
Candidate has passed his/her 10+2, they must also have a valid JEE score. The JEE mains or advance score plays a crucial role in securing a seat for the B.Tech in Information Security course in some of the best universitry in India.
Candidates with the JEE score can apply directly to the college for admission.
The admission team of the college usually takes the 10+2 score and JEE score, to decide if the candidate is eligible or good enough for the course, and after that, the candidates are invited to the campus for admission counseling.
The fee also differs if you have a significantly good cumulative score of both 10+2 and JEE. It also helps in securing scholarships, with good fee reduction.
Particulars | Details |
Course Name | B.Tech in Information Security |
Course Full Form | Bachelor of Technology in Information Security |
Course Level | Bachelor Degree Courses |
Eligibility | 10+2 with PCM or PCB with minimum 50% marks from any recognized board |
Duration | 4 years |
Job Positions | Security manager, System administrator, Computer technician, Network administrator, IT manager. |
Top Recruiters | MicroWorld Technologies, Quickheal, Instasafe, Paladion Network, etc. |
You can work in any field: You can work in any field except lawyers, accountants, and the film industry. Protecting data makes you an invaluable member of a team.
High Salary: Whatever your job, data protection is important to companies, so they hire information security professionals and pay them high salaries.
Job Openings: With thieves on the rise, there are plenty of job openings in information security.
Learn New Things: You will learn new things in this field because the ecosystem is dynamic and new technologies emerge and you need to adapt to them.
Interesting job: For those who want to help others protect their data, this is an interesting job. There are also high incentives.
High mobility: The demand for this job is high every day across the country. Private companies are also hiring cybersecurity personnel to protect their data.
Skills required to take the course: Candidates need some skills to take the course Information Security:
Students have to qualify 10+2 with minimum 50% marks from a recognized college or university.
5% Moderation is given to those students who are in reserved categories like SC/ST/OBC.
Science stream is preferable to having Physics, Chemistry, Biology, mathematics as subjects.
No receptacle is accepted in any subject. Students should be fully qualified in every subject.
Some colleges or universities have different eligibility criteria as a common entrance test for admission.
JEE Mains
JEE Advanced
BITSAT
VITEEE
SRMJEE
LPUNEST
HITSEEE
SAEEE
You should be clear about the subject of this course and the entrance exam.
Choose the subject as per your interest.
Find the best institute to prepare for your entrance exam. The conditions that vary with the choice of institute are fees, location, faculty, institute services, weekly tests, study materials, transportation etc.
Before preparing for the entrance exam, you should know the syllabus of the entrance exam.
You should know the exam pattern and the sections it contains.
You should know the exam marks, department marks, question marks, demerit marks etc.
To save and make the most of your study time, you should take the online test every week.
You should have general knowledge and good written and spoken English skills.
Study with the help of help books and study materials provided by the institute.
Semester 1 | Semester 2 |
Mathematics I Physics/Chemistry Introduction to Programming Engineering Graphics Basic Electrical Engineering Environmental Science Communication Skills Lab: Programming Lab: Physics/Chemistry | Mathematics II Data Structures Digital Electronics Discrete Mathematics Object-Oriented Programming Basic Electronics Lab: Data Structures Lab: Digital Electronics - |
Semester 3 | Semester 4 |
Mathematics III Computer Organization and Architecture Operating Systems Database Management Systems Principles of Information Security Network Fundamentals Lab: Operating Systems Lab: DBMS | Probability and Statistics Algorithms Cryptography and Network Security Software Engineering Computer Networks Web Technologies Lab: Cryptography and Network Security Lab: Computer Networks |
Semester 5 | Semester 6 |
Information Security Policies and Procedures Secure Coding Practices Ethical Hacking and Penetration Testing Cyber Law and Ethics Elective I Minor Project I Lab: Ethical Hacking Lab: Secure Coding | Intrusion Detection Systems Cloud Security Digital Forensics Malware Analysis Elective II Minor Project II Lab: Digital Forensics Lab: Cloud Security |
Semester 7 | Semester 8 |
Network Security Management Application Security Advanced Cryptography Elective III Elective IV Major Project I Lab: Network Security Lab: Application Security | Security Audits and Risk Assessment Information Security Management Systems Industrial Training/Internship Major Project II Elective V Seminar/Workshop Lab: Risk Assessment Lab: ISMS |
Job profiles | Job Description |
Security manager | The role of the security manager is to develop and implement security policies, & procedures, control budget, monitor expenses. They recruit, train, and supervise the officers and guard. |
System administrator | The role of the system administrator is to identify the problems or issues in the system and repair them. They maintain the file server and make new users and give them access. |
Computer technician | The role of a computer technician is to set up hardware, installing and configuring drivers and software. They maintain and repair the devices. |
Network administrator | The role of a network administrator is to solve the problem occurring in the system and maintains computer networks; they install and configure networks and systems. |
IT manager | The role of the IT manager is to improve and updating software and systems. They develop and implement Its policy and procedures. |