Entry Requirements
The eligibility for admission to B.Sc. Cyber Security Degree is a pass in Plus Two with Mathematics as one of the optional, and a minimum of 50% aggregate.
Computational Thinking for Problem Solving
Programming for Everybody (Getting Started with Python)
Introduction to Genetics and Evolution
C for Everyone: Programming Fundamentals
Operating Systems Fundamentals
Introduction to Electronics
Economics of Money and Banking
English for Science, Technology, Engineering, and Mathematics
Successful Presentation
The Bits and Bytes of Computer Networking
Data Structures
The Bits and Bytes of Computer Networking
C++ For C Programmers, Part A,Part B
Introduction to Back-End Development
Computer Architecture
Modern Art & Ideas
Write Professional Emails in English
Introduction to Cybersecurity Tools & Cyber Attacks
Software Security
Fundamentals of Digital Image and Video Processing
Career Decisions: From Insight to Impact
Operating Systems and You: Becoming a Power User
Using Python to Interact with the Operating System
Bioinformatics I- Finding Hidden Messages in DNA
Genome Sequencing (Bioinformatics II)
Learn to Speak Korean 1
Introduction to R Programming and Tidyverse
Machine Learning With Big Data
Excel Power Tools for Data Analysis
University System of Georgia
Work Smarter, Not Harder: Time Management for Personal & Professional Productivity
Disease Screening in Public Health
BSDC
3 years
INR 45,000
INR 72,000
BSDC
3 years
$ 900
$ 900
CAUTION DEPOSIT : Rs. 5000/- to be paid by all the students.
(Rs 3000/- will be refunded deducting incidental expenses and alumni membership.)
UG Programs: Rs.3000/-
Upon completion of the programme, Graduates could take roles such as:
After completing your B.Sc. Data Science and Cyber Security programme at Garden City University (GCU), these are some of the most trending and lucrative career options in the field of Data Science and Cyber Security.
Cyber Security Analyst: Cyber security analysts are responsible for ensuring the security of computer systems, networks, and data. They identify and analyze potential threats, implement security measures, conduct vulnerability assessments, and respond to security incidents. Recruiting Companies: Deloitte, Ernst & Young, IBM Security, Symantec, Cisco, Quick Heal, Wipro, HCL Technologies.
Ethical Hacker: Ethical hackers or penetration testers, identify vulnerabilities in computer systems and networks by conducting authorized hacking attempts. They provide recommendations for enhancing security and protecting organizations from malicious attacks. Recruiting Companies: Infosys, Tata Consultancy Services (TCS), IBM Security, HCL Technologies, KPMG, PwC, Accenture, Ernst & Young.
Digital Forensics Analyst: Digital forensics analysts investigate and analyze digital evidence to uncover cybercrime and support legal proceedings. They recover, preserve, and analyze digital data using specialized tools and techniques. Recruiting Companies: Cognizant, KPMG, PwC, Deloitte, Ernst & Young, Wipro, IBM Security.
List of companies where UG & PG Commerce and Management students of GCU got placement opportunities:
Biocon, Syngene, LifeCell, Cryoviva, HCG, Indigene, Anand Diagnostics, Indo-American Hybrid Seeds, Molecular Connections, Dr. Reddy’s Laboratories.
Copyright © Garden City University | Developed by Pathway Productions
B.Sc Data Science, Cyber Security
After completing your B.Sc. Data Science and Cyber Security programme at Garden City University (GCU), these are some of the most trending and lucrative career options in the field of Data Science and Cyber Security.
Cyber Security Analyst: Cyber security analysts are responsible for ensuring the security of computer systems, networks, and data. They identify and analyze potential threats, implement security measures, conduct vulnerability assessments, and respond to security incidents. Recruiting Companies: Deloitte, Ernst & Young, IBM Security, Symantec, Cisco, Quick Heal, Wipro, HCL Technologies.
Ethical Hacker: Ethical hackers or penetration testers, identify vulnerabilities in computer systems and networks by conducting authorized hacking attempts. They provide recommendations for enhancing security and protecting organizations from malicious attacks. Recruiting Companies: Infosys, Tata Consultancy Services (TCS), IBM Security, HCL Technologies, KPMG, PwC, Accenture, Ernst & Young.
Digital Forensics Analyst: Digital forensics analysts investigate and analyze digital evidence to uncover cybercrime and support legal proceedings. They recover, preserve, and analyze digital data using specialized tools and techniques. Recruiting Companies: Cognizant, KPMG, PwC, Deloitte, Ernst & Young, Wipro, IBM Security.
Security Consultant: Security consultants provide expert advice and recommendations to organizations on improving their overall security posture. They assess risks, develop security strategies, implement controls, and assist in incident response planning. Recruiting Companies: IBM Security, Accenture, KPMG, Deloitte, Ernst & Young, PwC, Wipro, TCS.
Data Analyst: Data analysts analyze large datasets, identify trends, and extract meaningful insights. They use statistical techniques, data visualization tools, and programming skills to support decision-making processes. Recruiting Companies: Genpact, American Express, IBM, Mu Sigma, Fractal Analytics, Amazon, Flipkart, TCS.
Security Operations Center (SOC) Analyst: SOC analysts monitor and respond to security events and incidents in real-time. They investigate alerts, coordinate with incident response teams, and mitigate potential threats. Recruiting Companies: IBM Security, Wipro, HCL Technologies, TCS, Infosys, Accenture, Deloitte, Ernst & Young.
Risk Analyst: Risk analysts assess and manage potential risks to an organization’s data and systems. They identify vulnerabilities, evaluate threats, and develop risk mitigation strategies. Recruiting Companies: Deloitte, EY, PwC, KPMG, IBM Security, Accenture, Wipro, TCS.
Cryptographer: Cryptographers design and develop cryptographic algorithms and protocols to secure data transmission and storage. They work on encryption and decryption techniques to ensure the confidentiality and integrity of sensitive information. Recruiting Companies: Intel, Microsoft, Infosys, IBM Security, TCS, Wipro, Accenture, ThoughtWorks.
Security Architect: Security architects design and implement robust security frameworks and solutions. They develop security policies, design secure network architectures, and ensure compliance with industry standards and regulations. Recruiting Companies: IBM Security, Cisco, TCS, Wipro, Accenture, Infosys, HCL Technologies, Capgemini.