Facebook Twitter Google+ YouTube Linkedin Instagram

MCA - Information Security Management Services

Why take this course?

Information Security is gaining a lot of importance nowadays in the increasingly networked world like understanding external and internal threats to an organization, working knowledge of mobile, wireless and VOIP security. The main goal of this course is to provide students with an in-depth understanding of how information security functions in an organization and to understand the background, foundation, and insight of information security. This knowledge will serve as a basis for further study in selected areas of the field or as an important component in their further studies.

What will I experience?

On this course you can:

  • Understand database security concepts & Information security governance and related legal and regulatory issues.
  • Exposure to the stages of ethical hacking for defending the organization from external and internal threats, discover, analyze and deal with IT threats to an organization, understand fundamentals of cryptography.

What opportunities might it lead to?

New research has found that job openings in the field of cyber security have grown by more than 100 percent in the past year. Those openings are only expected to grow in the coming year, jumping an additional 30 percent in 2014. The demands for security workers points to the importance companies are placing on responding to the growth of recent attacks on businesses of all sizes. Some of the job options include Corporate Sector (Information Security, Compliance, IT&IS Audit, Software Development etc.), Finance and Insurance Sector (IT and Data Security, E-Commerce and Net-banking Security, Compliance, Information Risk Management, IT&IS Audit etc.) Defense and Police (R&D, Investigation, and Forensics, IT Infrastructure Security etc.) Governance (E-Governance, Public Key Infrastructure Management, Forensic Science Labs etc.), Legal Department (Cyber Forensics Consultants, Cyber Law Expert, Expert witness etc.), Cyber Fraud Consultants / Management (Ethical Hacker, Penetration Testers, Cyber Fraud Detectives) etc.

Degree Awarded

Master of Computer Application

Course Commencement

June 2017

Eligibility

The minimum qualification required to apply is a bachelor’s degree from a recognized university. However the candidate should have studied Mathematics / Business Mathematics/ Statistics / Information Technology / Computer Science / Computer Application.The student must have qualified in a national level entrance test like PGCET / KMAT / or Jain Entrance Test.

Study Campus

  • School of Commerce Studies
  • #44/4, District Fund Road
  • Jayanagar 9th Block
  • Bangalore - 560069
  • P: +91 80 46501738

Admissions Office

  • JGI Knowledge Campus
  • #44/4, District Fund Road
  • Jayanagar 9th Block
  • Bangalore - 560069
  • P: +91 80 46501738


Curriculum Structure & Teaching

Semester I
  • Data Structures
  • Object Oriented Programming Using C ++
  • Computer System Organization
  • Discrete Mathematics
  • Introduction to Linux Programming
  • Learning Labs

    - Data Structures LAB

    - Object Oriented Programming Using C ++ LAB

    - Introduction to Linux Programming LAB

  • Communication Skills I
Semester II
  • Programming in Java
  • Database Management System
  • Introduction to Information Security
  • Advance Computer Networks
  • Operating System Fundamentals
  • Learning Labs

    - Programming in Java LAB

    - Database Management System LAB

    - Advance Computer Networks LAB

Semester III
  • Ethical Hacking Basics
  • Cyber Forensics Basics
  • Network Security Basics
  • Database Security Fundamentals
  • Security Threats and Trends
  • Learning Labs

    - Ethical Hacking Basics LAB

    - Cyber Forensics Basics LAB

    - Network Security Basics LAB

  • Communication Skills II
Semester IV
  • Virtualization and Cloud Security
  • OSI Layer and Security Protocols
  • Mobile Wireless and VOIP Security
  • Elective I
  • Application, Web Security and SDLC
  • Learning Labs

    - Virtualization and Cloud Security LAB

    - Application, Web Security and SDLC LAB

    - Mini Project/ LAB

  • IOT

Elective I

  • Android Security
  • COBIT VALIT and Risk IT
  • Advanced Network Security
  • IT Governance, Risk and Information Security Management
Semester V
  • Elective II
  • Disaster Recovery and Business Continuity Management
  • Project/ Internship

Elective II

  • Fundamentals of ITIL
  • Principles of RIMS
  • Datacenter Architecture
Semester VI
  • Final Project / Internship and Viva

Teaching and Assessment

A variety of engaging teaching methods like workshops, lectures, projects and seminars, are conducted from time to time at Jain University. Our highly knowledgeable professors always make themselves available to students outside of the classroom, even beyond office hours and help the students to bring out the best in them. The faculty makes it a point of connecting with their students to create a fulfilling academic experience. This allows building a closer student-professor relationship.

How are you assessed?

On this course, you will encounter a balance of formal examinations and varied methods of coursework assessment including:

  • - Internal tests
  • - Assignments
  • - Seminar presentation
  • - Class tests
  • - Preparatory theory and Practical examination
  • - End term theory and Practical examination