The B.Sc. in Digital Forensics and Homeland Security (DFHS) is an innovative undergraduate program designed to equip students with the technical expertise, investigative skills, and legal knowledge required to tackle cybersecurity threats, digital crimes, and national security challenges.
The program offers a comprehensive curriculum covering digital forensics, cybersecurity, homeland security, cyber laws, and investigative methodologies. Students gain hands-on training through state-of-the-art forensic labs, real-world case studies, and industry collaborations, ensuring practical exposure to modern forensic techniques. Additionally, the program emphasizes legal and ethical aspects, providing a strong foundation in cyber laws, compliance, and ethical hacking. The B.Sc. DFHS program is ideal for those passionate about investigating cybercrimes, securing digital assets, and contributing to national security.
The Candidate must have passed 12th with Science and Mathematics from a recognized board
The admission is based on merit.
The B.Sc. Digital Forensics and Homeland Security (DFHS) program offers an interdisciplinary approach, integrating digital forensics, cybersecurity, homeland security, and cyber law. The industry-relevant curriculum equips students with technical, investigative, and legal expertise through hands-on training in advanced forensic labs, real-world case studies, and cutting-edge cybersecurity tools. With access to specialized forensic software and digital investigation frameworks, students gain practical exposure to emerging industry trends. This program prepares graduates for careers in law enforcement, intelligence agencies, corporate security, and forensic consulting, while also providing a strong foundation for higher studies and research.
Code | Subject | Credits | |||
Lecture | Tutorial | Practical | Total | ||
BDFHS103T | Technical Communication | 2 | 0 | 0 | 2 |
BSAD203T | Basics of Mathematics | 3 | 1 | 0 | 4 |
CE310T | Computer System Architecture | 3 | 0 | 0 | 3 |
CE310P | Computer System Architecture – Practical | 0 | 0 | 1 | 1 |
BCA404 | Cyber Security | 2 | 1 | 0 | 3 |
BDFHS101T | Fundamentals of Forensics Science | 3 | 0 | 0 | 3 |
BDFHS102T | Fundamentals in Computer Programming with C | 3 | 0 | 0 | 3 |
BDFHS102P | Fundamentals in Computer Programming with C – Practical | 0 | 0 | 2 | 2 |
Code | Subject | Credits | |||
Lecture | Tutorial | Practical | Total | ||
CE313T | Fundamentals of Computer Networks | 3 | 0 | 0 | 3 |
CE313P | Fundamentals of Computer Networks – Practical | 0 | 0 | 1 | 1 |
CE302T | Object Oriented Programming in C++ | 3 | 0 | 0 | 3 |
CE302P | Object Oriented Programming in C++ – Practical | 0 | 0 | 2 | 2 |
BDFHS201 | Cyber Threat Intelligence | 3 | 0 | 0 | 3 |
NIKS101T | Foundational Literature of Indian Civilization | 2 | 0 | 0 | 2 |
BDFHS202T | Principles of Investigation & Intelligence Analysis | 3 | 0 | 0 | 3 |
BDFHS202P | Principles of Investigation & Intelligence Analysis – Practical | 0 | 0 | 1 | 1 |
ENV101T | Environmental Science | 2 | 0 | 0 | 2 |
Code | Subject | Credits | |||
Lecture | Tutorial | Practical | Total | ||
CE312T | Operating Systems | 3 | 0 | 0 | 3 |
CE312P | Operating Systems – Practical | 0 | 0 | 1 | 1 |
CE311T | Database Management System | 3 | 0 | 0 | 3 |
CE311P | Database Management System – Practical | 0 | 0 | 1 | 1 |
BDFHS301T | Computer Forensics | 3 | 0 | 0 | 3 |
BDFHS301P | Computer Forensics – Practical | 0 | 0 | 1 | 1 |
BDFHS302T | Mastering Kali Linux | 3 | 0 | 0 | 3 |
BDFHS302P | Mastering Kali Linux – Practical | 0 | 0 | 1 | 1 |
CS604T | Core Java | 3 | 0 | 0 | 3 |
CS604P | Core Java – Practical | 0 | 0 | 1 | 1 |
Code | Subject | Credits | |||
Lecture | Tutorial | Practical | Total | ||
BDFHS401T | Database Security and Forensics | 3 | 0 | 0 | 3 |
BDFHS401P | Database Security and Forensics – Practical | 0 | 0 | 1 | 1 |
MIT201T | Data Structures | 3 | 0 | 0 | 3 |
MIT201P | Data Structures – Practical | 0 | 0 | 1 | 1 |
CE315T | Cryptography & Information Security | 3 | 0 | 0 | 3 |
CE315P | Cryptography & Information Security – Practical | 0 | 0 | 1 | 1 |
CE314T | Python Programming | 3 | 0 | 0 | 3 |
CE314P | Python Programming – Practical | 0 | 0 | 1 | 1 |
Indian Constitution -MOOC | 2 | 0 | 0 | 2 | |
CS402T | Cyber Security and Cyber Law | 3 | 0 | 1 | 3 |
Code | Subject | Credits | |||
Lecture | Tutorial | Practical | Total | ||
Summer Internship / Project (evaluation) | 0 | 0 | 6 | 6 | |
CS403T | Cyber Crime Investigation & Digital Forensics | 3 | 0 | 0 | 3 |
CS403P | Cyber Crime Investigation & Digital Forensics – Practical | 0 | 0 | 1 | 1 |
BDFHS501T | Fundamentals of IOT & SCADA Security | 3 | 0 | 0 | 3 |
BDFHS501P | Fundamentals of IOT & SCADA Security – Practical | 0 | 0 | 1 | 1 |
BDFHS502T | Security Operation Center | 3 | 0 | 0 | 3 |
BDFHS502P | Security Operation Center – Practical | 0 | 0 | 1 | 1 |
CS405T | Advanced JAVA | 3 | 0 | 0 | 3 |
CS405P | Advanced JAVA – Practical | 0 | 0 | 1 | 1 |
BDFHS503T | Elective-1: Personality Developement OR Elective-1: Corporate Communication | 2 | 0 | 0 | 2 |
Code | Subject | Credits | |||
Lecture | Tutorial | Practical | Total | ||
BDFHS601T | Mobile Forensics | 3 | 0 | 0 | 3 |
BDFHS601P | Mobile Forensics – Practical | 0 | 0 | 1 | 1 |
BDFHS602T | Cyber Security Audit & Compliance | 3 | 0 | 0 | 3 |
BDFHS603T | Vulnerability Analysis and Web Application Security | 3 | 0 | 0 | 3 |
BDFHS603P | Vulnerability Analysis and Web Application Security – Practical | 0 | 0 | 1 | 1 |
AI401T | Artificial Intelligence | 3 | 0 | 0 | 3 |
AI401P | Artificial Intelligence – Practical | 0 | 0 | 1 | 1 |
BDFHS604 | Incident Response & Risk Management | 3 | 0 | 0 | 3 |
BDFHS605 | Elective-2: Homeland Security Technology OR Elective-2:Contemporary Security Technologies | 3 | 0 | 0 | 3 |
Code | Subject | Credits | |||
Lecture | Tutorial | Practical | Total | ||
BDFHS701T | Information and Network Security | 3 | 0 | 0 | 3 |
BDFHS701P | Information and Network Security – Practical | 0 | 0 | 1 | 1 |
BDFHS702T | Malware Analysis | 3 | 0 | 0 | 3 |
BDFHS702P | Malware Analysis – Practical | 3 | 0 | 0 | 3 |
BDFHS703T | Cyber Terrorism, Cyber Warfare & Countermeasures | 0 | 0 | 1 | 1 |
BDFHS704T | Ethical Hacking Fundamentals | 3 | 0 | 0 | 3 |
BDFHS704P | Ethical Hacking Fundamentals – Practical | 0 | 0 | 1 | 1 |
BDFHS705T | National Security & Intelligence Operations | 3 | 0 | 0 | 3 |
BDFHS706T | AI & Machine Learning in Digital Forensics | 3 | 0 | 0 | 3 |
BDFHS706P | AI & Machine Learning in Digital Forensics – Practical | 3 | 0 | 0 | 3 |
Code | Subject | Credits | |||
Lecture | Tutorial | Practical | Total | ||
Research Methodology & Technical Writing | 5 | 0 | 0 | 5 | |
Internship Project | 15 | 0 | 0 | 15 |