Entry Requirements
The eligibility for admission to B.Sc. Cyber Security Degree is a pass in Plus Two with Mathematics as one of the optional, and a minimum of 50% aggregate.
Computational Thinking for Problem Solving
Programming for Everybody (Getting Started with Python)
Introduction to Genetics and Evolution
C for Everyone: Programming Fundamentals
Operating Systems Fundamentals
Introduction to Electronics
Economics of Money and Banking
English for Science, Technology, Engineering, and Mathematics
Successful Presentation
The Bits and Bytes of Computer Networking
Data Structures
The Bits and Bytes of Computer Networking
C++ For C Programmers, Part A,Part B
Introduction to Back-End Development
Computer Architecture
Modern Art & Ideas
Write Professional Emails in English
Introduction to Cybersecurity Tools & Cyber Attacks
Software Security
Fundamentals of Digital Image and Video Processing
Career Decisions: From Insight to Impact
Operating Systems and You: Becoming a Power User
Using Python to Interact with the Operating System
Bioinformatics I- Finding Hidden Messages in DNA
Genome Sequencing (Bioinformatics II)
Learn to Speak Korean 1
Introduction to R Programming and Tidyverse
Machine Learning With Big Data
Excel Power Tools for Data Analysis
University System of Georgia
Work Smarter, Not Harder: Time Management for Personal & Professional Productivity
Disease Screening in Public Health
BSIC
3 years
INR 65,000
INR 72,000
BSIC
3 years
$ 900
$ 900
CAUTION DEPOSIT : Rs. 5000/- to be paid by all the students.
(Rs 3000/- will be refunded deducting incidental expenses and alumni membership.)
UG Programs: Rs.3000/-
Upon completion of the programme, Graduates could take roles such as:
A B.Sc. in Information Technology with Computer Applications provides students with a strong foundation in IT concepts, programming, software development, and emerging technologies. Graduates of this program have diverse career opportunities in the tech industry, including:
Software Developer
Software developers design, develop, and maintain applications and systems software. They work with programming languages like Python, Java, and C++ to create innovative software solutions for businesses.
Web Developer
Web developers specialize in designing and building websites and web applications. They use technologies such as HTML, CSS, JavaScript, and frameworks like React and Angular to create user-friendly digital experiences.
Database Administrator
Database administrators manage and maintain databases, ensuring data integrity, security, and efficiency. They work with SQL and NoSQL databases like MySQL, PostgreSQL, and MongoDB.
Cybersecurity Analyst
Cybersecurity analysts protect organizations from cyber threats by implementing security measures, monitoring network activity, and responding to security incidents. They work with tools like firewalls, encryption, and intrusion detection systems.
Cloud Solutions Architect
Cloud architects design and implement cloud computing solutions for businesses using platforms like AWS, Google Cloud, and Microsoft Azure, ensuring scalability, security, and efficiency in IT infrastructure.
IT Support Specialist
IT support specialists troubleshoot technical issues, provide assistance with hardware and software, and ensure smooth IT operations within organizations. They work in industries ranging from healthcare to finance.
Data Analyst
Data analysts collect, analyze, and interpret data to help businesses make informed decisions. They use tools like SQL, Excel, Python, and data visualization software such as Tableau and Power BI.
Entrepreneur / Tech Startup Founder
Graduates can leverage their IT knowledge to start their own software development firm, tech consultancy, or innovative startup in fields like app development, e-commerce, or AI-driven solutions.
Overall, a B.Sc. in Information Technology with Computer Applications opens up numerous career paths, allowing graduates to specialize based on their interests and expertise in the ever-expanding IT industry.
List of companies where UG & PG Commerce and Management students of GCU got placement opportunities:
Biocon, Syngene, LifeCell, Cryoviva, HCG, Indigene, Anand Diagnostics, Indo-American Hybrid Seeds, Molecular Connections, Dr. Reddy’s Laboratories.
Copyright © Garden City University | Developed by Pathway Productions
B.Sc Data Science, Cyber Security
After completing your B.Sc. Data Science and Cyber Security programme at Garden City University (GCU), these are some of the most trending and lucrative career options in the field of Data Science and Cyber Security.
Cyber Security Analyst: Cyber security analysts are responsible for ensuring the security of computer systems, networks, and data. They identify and analyze potential threats, implement security measures, conduct vulnerability assessments, and respond to security incidents. Recruiting Companies: Deloitte, Ernst & Young, IBM Security, Symantec, Cisco, Quick Heal, Wipro, HCL Technologies.
Ethical Hacker: Ethical hackers or penetration testers, identify vulnerabilities in computer systems and networks by conducting authorized hacking attempts. They provide recommendations for enhancing security and protecting organizations from malicious attacks. Recruiting Companies: Infosys, Tata Consultancy Services (TCS), IBM Security, HCL Technologies, KPMG, PwC, Accenture, Ernst & Young.
Digital Forensics Analyst: Digital forensics analysts investigate and analyze digital evidence to uncover cybercrime and support legal proceedings. They recover, preserve, and analyze digital data using specialized tools and techniques. Recruiting Companies: Cognizant, KPMG, PwC, Deloitte, Ernst & Young, Wipro, IBM Security.
Security Consultant: Security consultants provide expert advice and recommendations to organizations on improving their overall security posture. They assess risks, develop security strategies, implement controls, and assist in incident response planning. Recruiting Companies: IBM Security, Accenture, KPMG, Deloitte, Ernst & Young, PwC, Wipro, TCS.
Data Analyst: Data analysts analyze large datasets, identify trends, and extract meaningful insights. They use statistical techniques, data visualization tools, and programming skills to support decision-making processes. Recruiting Companies: Genpact, American Express, IBM, Mu Sigma, Fractal Analytics, Amazon, Flipkart, TCS.
Security Operations Center (SOC) Analyst: SOC analysts monitor and respond to security events and incidents in real-time. They investigate alerts, coordinate with incident response teams, and mitigate potential threats. Recruiting Companies: IBM Security, Wipro, HCL Technologies, TCS, Infosys, Accenture, Deloitte, Ernst & Young.
Risk Analyst: Risk analysts assess and manage potential risks to an organization’s data and systems. They identify vulnerabilities, evaluate threats, and develop risk mitigation strategies. Recruiting Companies: Deloitte, EY, PwC, KPMG, IBM Security, Accenture, Wipro, TCS.
Cryptographer: Cryptographers design and develop cryptographic algorithms and protocols to secure data transmission and storage. They work on encryption and decryption techniques to ensure the confidentiality and integrity of sensitive information. Recruiting Companies: Intel, Microsoft, Infosys, IBM Security, TCS, Wipro, Accenture, ThoughtWorks.
Security Architect: Security architects design and implement robust security frameworks and solutions. They develop security policies, design secure network architectures, and ensure compliance with industry standards and regulations. Recruiting Companies: IBM Security, Cisco, TCS, Wipro, Accenture, Infosys, HCL Technologies, Capgemini.