B.Sc Data Science and Cyber Security


OPEN


3 years


Full-time

Entry Requirements
The eligibility for admission to B.Sc. Cyber Security Degree is a pass in Plus Two with Mathematics as one of the optional, and a minimum of 50% aggregate.

Programme Highlights

Course Structure

Semester 1

Course Title

Semester 2

Course Title

Semester 3

Course Title

Semester 4

Course Title

Semester 5

Course Title

Elective-I

Elective-II

Semester 6

Course Title

Elective-III

Elective – IV

Semester 7

Course Title

Semester 8

Course Title

In addition to the above courses, our curriculum includes the following courses powered by Coursera and industry partners.

Semester 1

Certificate courses by University /Industry Partner

Computational Thinking for Problem Solving

Programming for Everybody (Getting Started with Python)

Introduction to Genetics and Evolution

C for Everyone: Programming Fundamentals

Operating Systems Fundamentals

Introduction to Electronics

Economics of Money and Banking

English for Science, Technology, Engineering, and Mathematics

Successful Presentation

Semester 2

Certificate courses by University /Industry Partnerx

The Bits and Bytes of Computer Networking

Data Structures

The Bits and Bytes of Computer Networking

C++ For C Programmers, Part A,Part B

Introduction to Back-End Development

Computer Architecture

Modern Art & Ideas

Write Professional Emails in English

Semester 3

Certificate courses by University /Industry Partner

Introduction to Cybersecurity Tools & Cyber Attacks

Software Security

Fundamentals of Digital Image and Video Processing

Using Databases with Python
Cloud Computing Concepts: Part 2

Career Decisions: From Insight to Impact

Semester 4

Certificate courses by University /Industry Partner

Operating Systems and You: Becoming a Power User

Using Python to Interact with the Operating System

Bioinformatics I- Finding Hidden Messages in DNA

Genome Sequencing (Bioinformatics II)

Visual Analytics with Tableau
Applications of Everyday Leadership

Learn to Speak Korean 1

Semester 5

Certificate courses by University /Industry Partner

Introduction to R Programming and Tidyverse

Machine Learning With Big Data

Excel Power Tools for Data Analysis

Semester 6

Certificate courses by University /Industry Partner

Successful Presentation
 

University System of Georgia

Work Smarter, Not Harder: Time Management for Personal & Professional Productivity

Disease Screening in Public Health

Fee Structure for the Academic Year 2025-26

Domestic / NRI Fee Structure

Programmes

BSDC

Course Duration

3 years

1st Installment

INR 45,000

5 Subsequent Installments

INR 72,000

International Fee Structure

Programmes

BSDC

Course Duration

3 years

1st Installment

$ 900

5 Subsequent Installments

$ 900

OTHER FEES

CAUTION DEPOSIT : Rs. 5000/- to be paid by all the  students.

(Rs 3000/- will be refunded deducting incidental expenses and alumni membership.)

EXAMINATION FEES PER SEMESTER

UG Programs: Rs.3000/-

 

Job Opportunities

Upon completion of the programme, Graduates could take roles such as:

Career Path

After completing your B.Sc. Data Science and Cyber Security programme at Garden City University (GCU), these are some of the most trending and lucrative career options in the field of Data Science and Cyber Security.

Cyber Security Analyst: Cyber security analysts are responsible for ensuring the security of computer systems, networks, and data. They identify and analyze potential threats, implement security measures, conduct vulnerability assessments, and respond to security incidents. Recruiting Companies: Deloitte, Ernst & Young, IBM Security, Symantec, Cisco, Quick Heal, Wipro, HCL Technologies.

Ethical Hacker: Ethical hackers or penetration testers, identify vulnerabilities in computer systems and networks by conducting authorized hacking attempts. They provide recommendations for enhancing security and protecting organizations from malicious attacks. Recruiting Companies: Infosys, Tata Consultancy Services (TCS), IBM Security, HCL Technologies, KPMG, PwC, Accenture, Ernst & Young.

Digital Forensics Analyst: Digital forensics analysts investigate and analyze digital evidence to uncover cybercrime and support legal proceedings. They recover, preserve, and analyze digital data using specialized tools and techniques. Recruiting Companies: Cognizant, KPMG, PwC, Deloitte, Ernst & Young, Wipro, IBM Security.

List of companies where UG & PG Commerce and Management students of GCU got placement opportunities:

Biocon, Syngene, LifeCell, Cryoviva, HCG, Indigene, Anand Diagnostics, Indo-American Hybrid Seeds, Molecular Connections, Dr. Reddy’s Laboratories.

Programme Highlights
  • Comprehensive curriculum covering key courses in cyber law, investigation, digital data analysis, applied cryptography, and Unix programming.
  • Practical hands-on learning with exposure to biometric technologies, security systems, cybercrime investigation, ethical hacking, and digital forensics.
  • Specialized tools and technologies such as R Programming, Python for data science, Kali Linux, Weka Tool, Cisco Packet Tracing, and UI Path RPA.
  • Accreditation and collaboration with professional associations like IEEE, CSI, ACM, ACCS, CRA, and ACCS.
  • Professional certifications offered, including ISACA Cybersecurity Fundamentals, CompTIA Security+, GISF, and CCNA.
Career Path

B.Sc Data Science, Cyber Security

After completing your B.Sc. Data Science and Cyber Security programme at Garden City University (GCU), these are some of the most trending and lucrative career options in the field of Data Science and Cyber Security.

Cyber Security Analyst: Cyber security analysts are responsible for ensuring the security of computer systems, networks, and data. They identify and analyze potential threats, implement security measures, conduct vulnerability assessments, and respond to security incidents. Recruiting Companies: Deloitte, Ernst & Young, IBM Security, Symantec, Cisco, Quick Heal, Wipro, HCL Technologies.

Ethical Hacker: Ethical hackers or penetration testers, identify vulnerabilities in computer systems and networks by conducting authorized hacking attempts. They provide recommendations for enhancing security and protecting organizations from malicious attacks. Recruiting Companies: Infosys, Tata Consultancy Services (TCS), IBM Security, HCL Technologies, KPMG, PwC, Accenture, Ernst & Young.

Digital Forensics Analyst: Digital forensics analysts investigate and analyze digital evidence to uncover cybercrime and support legal proceedings. They recover, preserve, and analyze digital data using specialized tools and techniques. Recruiting Companies: Cognizant, KPMG, PwC, Deloitte, Ernst & Young, Wipro, IBM Security.

Security Consultant: Security consultants provide expert advice and recommendations to organizations on improving their overall security posture. They assess risks, develop security strategies, implement controls, and assist in incident response planning. Recruiting Companies: IBM Security, Accenture, KPMG, Deloitte, Ernst & Young, PwC, Wipro, TCS.

Data Analyst: Data analysts analyze large datasets, identify trends, and extract meaningful insights. They use statistical techniques, data visualization tools, and programming skills to support decision-making processes. Recruiting Companies: Genpact, American Express, IBM, Mu Sigma, Fractal Analytics, Amazon, Flipkart, TCS.

Security Operations Center (SOC) Analyst: SOC analysts monitor and respond to security events and incidents in real-time. They investigate alerts, coordinate with incident response teams, and mitigate potential threats. Recruiting Companies: IBM Security, Wipro, HCL Technologies, TCS, Infosys, Accenture, Deloitte, Ernst & Young.

Risk Analyst: Risk analysts assess and manage potential risks to an organization’s data and systems. They identify vulnerabilities, evaluate threats, and develop risk mitigation strategies. Recruiting Companies: Deloitte, EY, PwC, KPMG, IBM Security, Accenture, Wipro, TCS.

Cryptographer: Cryptographers design and develop cryptographic algorithms and protocols to secure data transmission and storage. They work on encryption and decryption techniques to ensure the confidentiality and integrity of sensitive information. Recruiting Companies: Intel, Microsoft, Infosys, IBM Security, TCS, Wipro, Accenture, ThoughtWorks.

Security Architect: Security architects design and implement robust security frameworks and solutions. They develop security policies, design secure network architectures, and ensure compliance with industry standards and regulations. Recruiting Companies: IBM Security, Cisco, TCS, Wipro, Accenture, Infosys, HCL Technologies, Capgemini.