Program

M.Sc. IT in IT IMS & Cyber Security (B.Sc. + M.Sc.)

Program Code

MSCITIMSCS

Level

5 Years Integrated

Duration

5 Year

Department name

Department of Animation, ITIMS & Mobile Application
Semester Sr no CourseCode Course CourseCredit
Sem-10 1 IMS100-1 PROJECT 24
Sem-3 1 IDC-IMS-234P Database Management System 2
Sem-3 2 AEC-EFE-235-1 English for Excellence 2
Sem-3 3 SEC-BBP-236 Basics of Python Programming 2
Sem-3 4 VAC-IKS-237-1 Indic Knowledge System (IKS) 2
Sem-4 1 IMS401 Security With Linux 4
Sem-4 2 IMS402 Advanced Concepts of Networking - II 4
Sem-4 3 IMS403 Server Administration 4
Sem-4 4 IMS404 Administrating Virtualization - I 4
Sem-4 5 IMS405 Principles of Virtualization 4
Sem-4 6 IMS406 Fundamentals of IT Security 4
Sem-5 1 IMS501 ENABLING AND MANAGING OFFICE 365 4
Sem-5 2 IMS502 CONFIGURING ADVANCED SERVER SERVICES 4
Sem-5 3 IMS503 ADVANCED CONCEPTS OF NETWORKING - III 4
Sem-5 4 IMS504 IMPLEMENTING NETWORK SECURITY - I 4
Sem-5 5 IMS505 INTRODUCTION TO SCRIPTING LANGUAGE 4
Sem-5 6 IMS506 EMAIL SERVER ADMINISTRATION - I 4
Sem-6 1 IMS601 PROJECT MANAGEMENT & PLANNING 4
Sem-6 2 IMS602 IT SERVICE MANAGEMENT 4
Sem-6 3 IMS603 VULNERABILITY TESTING – I 4
Sem-6 4 IMS604 PROJECT – I 12
Sem-7 1 IMS701 Programming using Python – I 4
Sem-7 2 IMS702 Database Administration – I 4
Sem-7 3 IMS703 Sharepoint Administration 4
Sem-7 4 IMS704 Email Server Administration - II 4
Sem-7 5 IMS705 Vulnerability Testing - II 4
Sem-7 6 IMS706 Project-II 4
Sem-8 1 IMS801 Administrating Virtualization - II 4
Sem-8 2 IMS802 Automation with Open Source 4
Sem-8 3 IMS803 Computer Network Analysis 4
Sem-8 4 IMS804 IT Cloud Implementation - I 4
Sem-8 5 IMS805 Fundamentals of Cyber Law 4
Sem-8 6 IMS806 Project-III 4
Sem-9 1 IMS901 VULNERABILITY ASSESSMENT & PENETRATION TESTING 4
Sem-9 2 IMS902 MALWARE ANALYSIS 4
Sem-9 3 IMS903 IMPLEMENTING DATASECURITY 4
Sem-9 4 IMS904 Datacenter Management 4
Sem-9 5 IMS905 Programming using Python - II 4
Sem-9 6 IMS906 Project-IV 4
Intake
Eligibility Criteria
  • PO1: Graduates will be able to apply critical thinking and problem-solving skills to develop effective solutions for IT infrastructure and security challenges.
  • PO2: Graduates will be capable of assessing and managing risks associated with IT infrastructure and security, ensuring the protection of data and resources.
  • PO3: Graduates will be proficient in identifying, analyzing, and mitigating security threats and vulnerabilities in information systems.
  • PO4: Graduates will demonstrate technical skills in configuring and managing hardware and software systems essential for IT infrastructure and cyber security.
  • PO5: Graduates will have a thorough understanding of IT infrastructure, including networking, server management, and cloud computing.
  • PO6: Graduates will have the ability to plan, execute, and manage IT projects, ensuring they are completed on time and within budget.
  • PO7: Graduates will possess strong communication skills, enabling them to effectively convey technical information to both technical and non-technical stakeholders.
  • PO8: Graduates will understand the ethical and legal implications of IT infrastructure and cyber security practices and will adhere to professional standards and regulations.
  • PSO1: Ability to design, implement, and manage robust and scalable network infrastructures, ensuring optimal performance and security.
  • PSO2: Ability to implement data protection and privacy policies and practices to safeguard sensitive information.
  • PSO3: Expertise in managing cloud-based services and infrastructures, including virtualization, storage, and cloud security.
  • PSO4: Proficiency in deploying advanced cyber security measures such as encryption, firewalls, intrusion detection/prevention systems, and anti-malware tools.
  • PSO5: Skills in conducting security audits and penetration testing to identify and mitigate vulnerabilities in IT systems.
  • PSO6: Skills to develop and implement effective incident response and disaster recovery plans to maintain business continuity.
  • PSO7: Understanding and application of industry standards and regulatory requirements, such as GDPR, HIPAA, and ISO/IEC 27001, to ensure compliance and data protection.
Academy Year Title Download

Gujarat University

Online Admission PhD
Apply Information