Search results
Results from the WOW.Com Content Network
The Master of Science in Cyber Security is a one to three years Master Degree, depending on the program, some may even start with two-year preparation classes and covers various areas of computer science, Internet security, Computer security, and or Information Assurance. Programs are offered online, on-campus, or a hybrid style.
The Master of Science in Information Assurance is a one to three years Master Degree; depending on the program, some may even start with two-year preparation classes and covers various areas of computer science, Internet security, Computer security, and or cyber security. Topics of study may include: Business continuity planning; CobiT
The university offers Integrated MTech [Dual Degree (BTech+MTech)], Master of Technology (MTech), Master of Science in Research, Doctor of Philosophy (Ph.D.) and MSc (Digital Society) degrees with various specializations. It also offers post-graduate diploma and certificate programs in various specializations. [9] [10] [11]
Postgraduate Diploma courses last 24 months. Master's degree courses last thirty months. In addition, the university offers in excess of 70 short courses, lasting a few weeks to a few months.
Post-graduate diplomas in Management, [8] [9] Post-graduate diploma in Banking & Finance, Remote Sensing & GIS, [10] Robotics, Industrial Maintenance Engineering and Advanced Manufacturing Technology, [11] are examples of courses offered in India. Certain institutes provide postgraduate diploma programs which satisfies the credit requirement ...
Diploma in Computer Science; Diploma in CyberSecurity; Diploma in Data Science; The Department of Computer Science also offers postgraduate programs with the help of their School of Graduate Studies and Research. The following postgraduate programs are offered by the department.
The topic of this article may not meet Wikipedia's notability guidelines for companies and organizations. Please help to demonstrate the notability of the topic by citing reliable secondary sources that are independent of the topic and provide significant coverage of it beyond a mere trivial mention.
Additionally, the organisation organised a learning tour to Cyber Security Brunei, offering an insight about the cybersecurity industry. [10] CCCT organised a drone -focused technology lecture in association with K-MAS Management with the goal of improving students' employability and equipping them for next industry advancements. [ 11 ]