M.Tech CSE (Internet of Things)

School of Engineering & Technology

At Jaipur National University offers a Two-year Post-graduate M.Tech CSE with Specialization in Internet of Things course which aims to develop a strong foundation that will allow students to learn comprehensive approaches to protect infrastructure including data and information. Cyber security plays pivotal role in today’s information era. The demand for security and privacy of data is growing with each passing hour as effectiveness of a business relies on real time secure processing of data. The program will equip students with ability to perform risk analysis, mitigation techniques, architecting cloud-based security, along with gaining deep understanding of compliance standards with its best-in-class program.

Learning Perspective

This course is best suited for students seeking to build world-class expertise in the field of Ethical hacking, Cyber security, Digital Forensics, IT data and application security, Network security and data encryption. This will position students to make immediate impact as well as long term success as a cyber-security professional.

In this course, the focus will be on classroom activities that are designed to encourage students to play an active role in the designing of their learning strategies. This will include group case studies in the area of security, designing effective solutions to those challenging cases. Students will be exposed to a wide range of latest security techniques including cryptographic mechanisms and managing a range of systems from personal laptop to large scale infrastructures, to address the modern challenges in cyber security. The practical knowledge imparted to students will enable them to build robust systems to address increasingly sophisticated cyber threats amid advancing technologies.

Key Information

Duration

2 Years

Eligibility

Min. 55% Aggregate in B.Tech (CS/IT/ECE)

Selection Procedure

EntranceTest+PI

Scholarship

As per University norms

Tuition Fee

100000

Caution Money

2000

Note

*Lab & Library fee will be charged separately
#Program Proposed from Session 2024-25

Programme Structure

  • Computational Methods
  • Principles of IoT
  • Intelligent Agents andLearning Machines
  • Artificial Neural Networks and Machine Learning
  • Principles of IoT Lab
  • Intelligent Agents andLearning Machines Lab
  • Program Elective -1
  • Embedded Systems & Technology
  • Biocomputing System
  • Modern Sensors and Transducers
  • Program Elective – 2
  • Machine Vision
  • Filtering Techniques
  • Wireless Sensor Networks
  • Research Methodology
  • IoT Security
  • Industrial Internet of things
  • Mathematical foundation course for data analytics
  • IoT Security Lab
  • Industrial Internet of things Lab
  • Program Elective 3
  • 1.Data Analytics and Visualization
  • 2.Industrial IoT for Smart Places
  • Program Elective 4
  • IoT Design for Connected Health Care
  • Edge Computing
  • Real Time Embedded systems
  • IoT Applications and Web Development
  • Human resource planning
  • Customer Relationship Management
  • Minor Project
  • Mandatory Non-Credit Course
  • National Security Policy of India
  • Entrepreneurship
  • Human rights and Indian Constitutions
  • Consumer Behavior
  • Dissertation

Career Prospects

With the increase in the generation of digital data, it is anticipated that cyber attacks will quadruple shortly. This proves that growth in the number of cyber security jobs will only increase as organizations will need professionals who can ensure data security. Some of the job requirements in the industry can be brought down under the following categories:

  • Security Analyst: A security analyst does the work of installing software like firewalls for protecting computer networks.
  • Cryptographer: Cryptographers secure various information technology and computer systems by forming algorithms and ciphers for the encryption of data.
  • Security Engineer: Security Engineers execute tests, as well as screening security software for monitoring various systems and networks for security intrusions and breaches.
  • Security Software Developer: A security software developer writes various computer programs and focuses on safeguarding computer data, information and systems.
  • Cryptanalyst: Cryptanalysts develop mathematical codes and methods and protect data from numerous computer hackers present.