M Tech (Computer Science and Applications):Information SecurityThapar University
Price on request
Frequent Asked Questions
Admission to M. Tech. (Computer Science and Applications) will be open to a candidate who obtains at least 50% marks in aggregate in the qualifying examination from a recognized university.
Advanced Data Structures
Data Communication and Computer Networks
Computer Organization and Operating Systems
Computational Algorithms in Optimization
Statistical Methods and Algorithms
Database Management and Administration
Object Oriented Analysis and Design
Logic and its applications
Computer Graphics and Multimedia Technologies
Web Technologies and E-Governance
Introduction to cryptography: Encryption schemes, Cryptanalysis, Block ciphers, Stream ciphers, Affine ciphers, DES and AES algorithms,
Public Key Encryption: RSA cryptosystem, Rabin Encryption, Diffie-Hellman Key Exchange, ElGamal Encryption, Cryptographic hash functions,
Network security: Network security issues, Sniffing, IP spoofing, Common threats, E-Mail security, IPSec, SSL, PGP, Intruders, Virus, Worms, Firewalls-need and features of firewall, Types of firewall, Intruder Detection Systems.
Digital Signatures: RSA signatures, Signatures from public key systems, ElGamal Signatures, Digital Signature Algorithm, Undeniable Signatures, Blind Signatures, Digital certificates.
Cyber Security: Cyber Crime and security, Security tools, Introduction to Digital Forensic, OS fingerprinting, TCP/IP stack masking, Social engineering.
Laboratory: The lab work will be based on the setting up of network firewalls, Intruder Detection systems, implementation of cryptography algorithms and digital signature algorithms, tcpdump.