1. #1
    Unregistered

    Which specialization should I take for M.Tech having interest in communication and networking field? Can anyone furnish details regarding M.Tech (Cyber Security) course?

    selection of m.tech branch after b.tech in ece.
    i have completed my b.tech in ECE. i want to do m.tech but not in ece b'coz i m not interested in vlsi design and embedded system. my interest is in communication and networking. so kindly guide me for which branch should i select for m.tech matching my area of interest and also i want to know about m.tech cyber security?





  2. Related:
  3. #2
    Siva mechanical
    Join Date
    Jan 2013
    Posts
    502

    Re: Which specialization should I take for M.Tech having interest in communication and networking field? Can anyone furnish details regarding M.Tech (Cyber Security) course?

    Quote Originally Posted by Unregistered View Post
    selection of m.tech branch after b.tech in ece.
    i have completed my b.tech in ECE. i want to do m.tech but not in ece b'coz i m not interested in vlsi design and embedded system. my interest is in communication and networking. so kindly guide me for which branch should i select for m.tech matching my area of interest and also i want to know about m.tech cyber security?
    Hello friend,

    >> Most colleges including IIT will not allow you to write other stream instead of your ECE stream. But, You can try in some colleges which can allow this decision.

    CYBER-SECURITY COURSE:-

    >> Cyber-security course is the course which comes under Computer Science & Engineering stream.

    >> It mostly deals in the cyber crime and privacy system.

    >> Creating programs and algorithms for the privacy system like captcha.

    >> There is more demand for the candidates who have right qualification in Cyber-security. There will be bright future for the above candidates. Because, world is in fear of privacy leaking.


    >> The various subjects which these candidates will study are as follows:-

    > Blended attack.

    > Cryptographic Protocols.

    > Cryptography.

    > Data-mining.

    > Database and application security.

    > Digital Hardware Modelling.

    > Digital Watermarking.

    > Hacker techniques, exploit and incident handling.

    > Multimedia systems.

    > Non-malware threats.

    > Pattern recognition for computer security.

    > Server software.

    > Tracking Cookies.

    > Web technologies.

    > Viruses, Worms, Trojan Horses, Malicious Mobile Code.


    Good Luck!!!!!!!!!!!




+ Reply to Thread

Quick Reply Any Question?