Program Overview:
The Bachelor of Computer Applications (BCA) in Cyber Security & Cyber Forensics is a unique 3-year undergraduate program designed to equip students with dual expertise in protecting digital systems and investigating cybercrimes. The course integrates core computer science subjects with advanced topics in cyber security, digital forensics, ethical hacking, and cyber law.
Course Highlights:
1. Investigate cyber incidents with forensic tools
2. Practical training on ethical hacking, malware analysis, and log analysis
3. Learn legal frameworks, cyber laws, and compliance
Duration: 3 Years
Fees: ₹32,000 INR (Annually)
Key Highlights
1. Cyber Forensics Lab and threat simulation tools
2. Real-time projects involving investigation & defense
3. Internship & placement support with cyber-focused firms
4. Modules on cybercrime law, dark web, and evidence handling
5. Certifications: CEH, CHFI, CompTIA Security+, Microsoft Security
6. Faculty with industry and law enforcement experience
Career Opportunities
Graduates can pursue roles like:
1. Cyber Forensic Analyst
2. Cyber Security Consultant
3. Ethical Hacker / Pen Tester
4. Digital Evidence Investigator
5. SOC Analyst
6. Graduate Studies (MCA, MSc in Forensics, Cyber Law)
Curriculum
Semester 1: Computer Fundamentals & Networking
Semester 2: Operating Systems & Information Security
Semester 3: Cyber Laws and Ethics
Semester 4: Digital Forensics Techniques
Semester 5: Malware Analysis and Incident Handling
Semester 6: Final Project + Forensic Lab Practice
Placement & Internship Partners
1. TCS
2. Infosys
3. Local Police Cyber Cells
4. Cybersecurity Startups
5. Digital Forensics Labs
Eligibility & Admission
Eligibility
10+2 from any stream (preferably with Mathematics/Computer Science)
Admission Process
1. Fill Online Application Form
2. Appear for Counseling/Interview (if required)
3. Submit Documents
4. Pay Admission Fee to confirm enrollment
FAQs
No, any student interested in cybersecurity and investigation can join.
You’ll get exposure to tools like FTK, Autopsy, Wireshark, Nessus, and others.
Yes, ethical hacking and vulnerability assessment are key modules.