Bachelor of Science in Information Technology

3 Years Degree Programme

Our Apporach

Global Education, Global Acceptance

  • Innovative teaching, affable mentoring, and knowledge creation.
  • Regular Workshops equipped with cutting-edge technology.
  • Provides impetus to innovation and entrepreneurship to provide sustainable solutions to societal needs.

Industry-Academia Collaboration

Programme Details

icons Images
3 Years Programme

icons Images
Upto 100% Scholarship

icons Images
100% Placement Assistance

icons Images
Eligibility
45% in 10+2 Any

Learn More

B.Sc.IT programme will enable students to understand the basics of Cloud Technology and Information Security. As an evolving industry, this field will attract many career prospects and in order to fulfil industry demand Assam down town University encourages interested applicants to consider and enrol for this programme for a better career opportunity.

  • To become successful Data Science process enablers who are competent, innovative and productive in addressing the needs of the Industry, Society and/or pursue higher education and research.
  • To grow professionally with their knowledge and skills and develop a passion for lifelong learning.
  • To demonstrate high standards of ethical conduct, positive attitude, and societal responsibilities.

  • Take informed actions after identifying the assumptions that frame our thinking and actions, checking out the degree to which these assumptions are accurate and valid, and looking at our ideas and decisions (intellectual, organizational, and personal) from different perspectives.
  • Speak, read, write and listen clearly in person and through electronic media and make meaning of the world by connecting people, ideas, books, media and technology. Also, elicit the views of others, mediate disagreements and help reach conclusions in group settings.
  • Design and develop computing solutions for the industry and provide the end-to-end implementation.
  • Recognize different value systems including your own, understand the moral dimensions of your decisions, and accept responsibility for them.
  • Acquire modern engineering and its evolution while taking it to next level using comprehensive computing techniques and tools which help in complex engineering activities.

  • Recognize different value systems including your own, understand the moral dimensions of your decisions, and accept responsibility for them.
  • Develop and understand the issues of environmental contexts and ensure sustainable development.
  • Acquire the ability to engage in independent and life-long learning in the broadest context of socio-technological changes

Curriculum Details

Year wise Course Details

Even Semester

Courses for this semester

Course Overview

The course ‘Logic and Mathematical Reasoning’ enables students to student to apply and logical thinking skills, an understanding of numbers, to various real-world applications. They will improve their reasoning skills as required by them in fulfilling their individual and organizational goals. The course exposes the students to ‘logical tools’ and ‘quantitative reasoning methods’ and enables them to apply these logical strategies in business decision-making.

Course Outcomes

  • Learn to explore and apply key concepts in logical thinking to business problems.
  • Learn to enable students to critically analyze material (information) to order to evaluate evidence, construct reasoned arguments, and communicate inferences and conclusions.
  • Learn to effectively communicate the substance and meaning of mathematical problems and solutions.

Course Overview

The Storage Fundamentals course provides students with a broad survey of the current state of network storage. By focusing on concepts, terms, and technologies and avoiding product-specific features, this course provides foundation knowledge that applies to the further study of storage products.

Course Outcomes

  • Learn to define and differentiate between types of network storage configurations and the types of logical storage configurations.
  • Learn to apply a specific network storage configuration to an application by choosing the configuration that best meets the requirement.
  • Learn to define data services and their storage application.

Course Overview

Introduction to Operating Systems is a graduate-level introductory course in operating systems. This course teaches the basic operating system abstractions, mechanisms, and their implementations. The core of the course contains concurrent programming (threads and synchronization), inter-process communication, and an introduction to distributed operating systems. The course is split into four sections: (1) Introduction, (2) Process and Thread Management, (3) Resource Management and Communication, and (4) Distributed Systems.

Course Outcomes

  • Acquire knowledge on the evolution of OS over the years and different components of OS.
  • Learn to use system calls for managing processes, memory, and the file system.
  • Learn to comprehend the data structures and algorithms used to implement an OS.

Course Overview

C++ is a programming language with a special focus on the concepts of OOPs and their implementation. It has object-oriented features, which allow the programmer to create objects within the code. This makes programming easier, more efficient, and some would even say more fun. The Star C++ Programming certification course provides in-depth knowledge about C++. The course helps acquire a fundamental understanding of the OOPs concepts, input/output data management, arrays in C++, functions, classes, objects, pointers, and much more. The course has been designed with a uniform structured series of modules enumerating various pertinent concepts.

Course Outcomes

  • Learn to describe OOPs concepts.
  • Learn to use functions and pointers in your C++ program.
  • Learn and understand tokens, expressions, and control structures.

Course Overview

This Data Structures in C course covers the following topics with C language implementation: Algorithm Analysis, Big O notation, Time complexity, Singly linked list, Reversing a linked list, Doubly linked list, Circular linked list, Linked list concatenation, Sorted linked list.

Course Outcomes

  • Learn to implement abstract data types using arrays and linked list.
  • Learn to apply the different linear data structures like stack and queue to various computing problems.
  • Learn to implement different types of trees and apply them to problem solutions.

Course Overview

This course will introduce you to modern operating systems. We will focus on UNIX-based operating systems, though we will also learn about alternative operating systems, including Windows. The course will begin with an overview of the structure of modern operating systems. Throughout the subsequent units, we will discuss the history of modern computers, analyze in detail each of the major components of an operating system (from processes to threads), and explore more advanced topics in the field, including memory management and file input/output. The class will conclude with a discussion of various system-related security issues.

Course Outcomes

  • Acquire knowledge on the evolution of OS over the years and different components of OS.
  • Learn to use system calls for managing processes, memory, and the file system.
  • Learn to comprehend the data structures and algorithms used to implement an OS.

Course Overview

This course will help develop applications for a range of problems using object-oriented programming techniques.

Course Outcomes

  • Learn to introduce object-oriented programming concepts using the C++ language.
  • Learn to introduce the principles of data abstraction, inheritance, and polymorphism.
  • Learn to introduce the principles of virtual functions and polymorphism.

Course Overview

The course aims to equip students with a comprehensive understanding of data structures and algorithms. Through this course, students will learn about different data representation techniques that are commonly used in real-world scenarios. They will also gain practical experience in implementing both linear and non-linear data structures. Additionally, the course will provide students with the skills needed to analyze algorithms based on their time and space complexity. With this knowledge, students will be able to develop real-time applications using appropriate data structures. Finally, the course will enable students to identify the most suitable data structure to solve various computing problems.

Course Outcomes

  • Learn and understand the concept of data structures, python, and apply the algorithms for solving problems like Sorting, searching, insertion, and deletion of data.
  • Learn and understand linear data structures for processing ordered or unordered data.
  • Learn to explore various operations on dynamic data structures like a single linked lists, circular linked list and doubly linked list.
Show More

Odd Semester

Courses for this semester

Course Overview

Introduction to Information Security is a graduate-level introductory course in information security. It teaches the basic concepts and principles of information security and the fundamental approaches to securing computers and networks. Its main topics include security basics; security management and risk assessment; software security; operating systems security; database security; cryptography algorithms and protocols; network authentication and secure network applications; malicious malware; network threats and defenses; web security; mobile security; legal and ethical issues; and privacy.

Course Outcomes

  • Learn to explain the CIA triad of Confidentiality, Integrity, and Availability and its need.
  • Learn to demonstrate foundation knowledge of information security/assurance within the organization.
  • Learn to examine the fundamental techniques of computer security.

Course Overview

This course will help students gain experience in various processes used in the Software industry for the development of a software product. They also learn about testing and maintenance of software products.

Course Outcomes

  • Learn to decompose the given project in various phases of a life cycle.
  • Learn to choose appropriate process models depending on the user requirements.
  • Learn to perform various life cycle activities like Analysis, Design, Implementation, Testing, and Maintenance.

Course Overview

This course provides students to understand of the fundamental concepts of computer networking and communications make use of IEEE standards in the construction of LAN, build the skills of subnetting and super netting, explain the concepts of protocols of Transport Layer, QoS, and Congestion control mechanisms, and demonstrate different protocols of the Application Layer.

Course Outcomes

  • Learn to describe the functions of each layer in the OSI and TCP/IP model.
  • Learn to analyze the functions of the Application layer and Presentation layer paradigms and Protocols.
  • Learn to apply the Session layer design issues and Transport layer services.

Course Overview

This subject aims to introduce students to the Java programming language. Upon successful completion of this subject, students should be able to create Java programs that leverage the object-oriented features of the Java language, such as encapsulation, inheritance, and polymorphism; use data types, arrays, and other data collections; implement error-handling techniques using exception handling, create and event-driven GUI using Swing components.

Course Outcomes

  • Learn and understand the principles and practice of object-oriented analysis and design in the construction of robust, maintainable programs which satisfy their requirements.
  • Develop competence to design, write, compile, test, and execute straightforward programs using a high-level language.
  • Learn to implement, compile, test, and run Java programs comprising more than one class, to address a particular software problem.

Course Overview

This course is an introduction to routing technology, routing theory, and router configuration including RIP and IGRP routing protocols, distance vector and link state routing theory, routing loop issues, routing concepts, TCP/IP basics, IP addressing, router IOS, access lists, and basic router configuration. Students will get hands-on experience configuring Cisco routers. This course also provides additional information on routing theory and protocols beyond that of the basic Cisco Networking Academy semester two course, leading to a more detailed understanding of routing.

Course Outcomes

  • Learn to design a basic LAN network.
  • Configure a router's IOS from a pre-designed template
  • Learn to analyze router troubleshooting scenarios.

Course Overview

This course covers software design, implementation, and testing using Java. It introduces object-oriented design techniques and problem-solving. The course emphasizes the development of secure, well-designed software projects that solve practical, real-world problems.

Course Outcomes

  • Learn to write programs using abstract classes.
  • Learn to write programs for solving real-world problems using the java collection framework.
  • Learn to write multi-threaded programs.

Course Overview

The objective of the course is to present an introduction to database management systems, with an emphasis on how to organize, maintain and retrieve - efficiently, and effectively - information from a DBMS.

Course Outcomes

  • Learn to describe the fundamental elements of relational database management systems.
  • Learn to explain the basic concepts of the relational data model, entity-relationship model, relational database design, relational algebra, and SQL.
  • Learn to design ER models to represent simple database application scenarios.

Course Overview

The major objective of this lab is to provide a strong formal foundation in database concepts, technology, and to groom the students into well-informed database application developers. It also presents SQL and procedural interfaces to SQL comprehensively .The course gives an introduction to systematic database design approaches covering conceptual design, logical design, and an overview of physical design.

Course Outcomes

  • Learn and understand, appreciate, and effectively explain the underlying concepts of database technologies.
  • Learn to design and implement a database schema for a given problem domain.
  • Learn to populate and query a database using SQL DML/DDL commands.
Show More

Even Semester

Courses for this semester

Course Overview

The Cyber Security and Blockchain program aims to train efficient Computer Science graduates with a comprehensive knowledge of cyber-crime, network security, threat intelligence, and Cryptography. The focus of the program is on data protection and smart contract enforcement mechanisms. This field is quickly transforming from a niche to a necessity in any organization. Students in the B.Tech program can begin their careers in this fast-paced industry.

Course Outcomes

  • Learn to discuss the basics of ethical hacking.
  • Learn to elaborate on the hacking methodology.
  • Learn to demonstrate the hacking process on different platforms.

Course Overview

This course introduces the core concepts of cloud computing. It helps to gain the foundational knowledge required for understanding cloud computing from a business perspective and becoming a cloud practitioner. The students can understand the definition and essential characteristics of cloud computing, its history, the business case for cloud computing, and emerging technology use cases enabled by the cloud. It introduces some of the prominent service providers (e.g. AWS, Google, IBM, Microsoft, etc.) and the services they offer, and look at some case studies of cloud computing across industry verticals.

Course Outcomes

  • Learn to understand the various distributed system models and evolving computing paradigms.
  • Gain knowledge in the virtualization of computer resources.
  • Learn to realize the reasons for migrating into the cloud.

Course Overview

This course continues NTNW 2351(CIS 2303, LAN Hardware and Software I). It covers all application software selection and installation details, hardware and software upgrades, and planning and testing for hardware and software upgrades. LAN utility software, and network interconnections. At least one leading LAN system will be used as a class and laboratory example.

Course Outcomes

  • Learn to prepare for the installation of Windows 2000 Server. Perform an attended installation and an unattended installation of the Windows 2000 Server.
  • Learn to identify the various types of Windows 2000 file systems and their components, and perform common disk management tasks.
  • Learn to configure NTFS security and configure security for shared folders. Create Dfs roots and links.

Course Overview

Encryption algorithms all do the same job but can do it in very different ways. However, some features can be found across multiple families of cryptosystems. This course discusses some of the mathematical operations and structural design elements that can be found in many different cryptographic algorithms.

Course Outcomes

  • Learn to explain the objectives of information security.
  • Learn to explain the importance and application of each of confidentiality, integrity, authentication, and availability.
  • Learn and understand various cryptographic algorithms.

Course Overview

This course covers all the fundamental knowledge required to operate Datacenter Networks which consist of Cisco devices, Standard, and Cisco preparatory Data center technologies. Cisco Datacenter Networking Fundamentals Course Covers Networking, Network Virtualization, Switch Virtualization, and Machine Virtualization technologies and protocols. This course not only helps students to be prepared for the Cisco Data center exams but also provides a very broad level of knowledge on Cisco Data center Fundamentals technologies.

Course Outcomes

  • Learn the data centers data center types, sizes, and priorities
  • Acquire knowledge of data Center types & sizes.
  • Acquire knowledge of the summarized history of technology.

Course Overview

With this course, we begin networking. There are so many functions that need to be performed to be able to interwork different systems, a structure is required to be able to categorize and separate functions so that it is possible to discuss separate issues separately and not mix things up. The most commonly used structure is the ISO OSI 7-layer Reference Model. We’ll begin our discussion with some definitions, then an overview of the OSI model, introducing layers, layered architectures, and protocol stacks. In subsequent lessons, we’ll go through the layers individually and give examples of protocols like IP, TCP, LANs, and DSL to see where they fit into the stack. We’ll finish off understanding how a protocol stack works in operation, and conclude the course with a review of different active standards organizations.

Course Outcomes

  • Acquire knowledge of the introduction to Broadband Converged IP Telecom.
  • Acquire knowledge of Wireless Telecommunications.
  • Acquire knowledge of the fundamentals of Voice over IP.

Course Overview

Cybercrime poses serious economic and security threats to individuals, businesses, and governments. Cyberattacks have continued to increase in quantity as well as sophistication. In this course, the student will develop a solid understanding of the most common types of attacks used in cybercrime and cyberwarfare. Each session will begin with a lecture covering the basics of an area of technology and how that technology has been misused in the past. The student will then have the opportunity to participate in a hands-on lab, where with the guidance of the instructor and assistants, also learn and practice various techniques and tools to practice hacking into insecure systems. By learning about some of the most popular hacking techniques, you will develop an understanding of how to prevent them.

Course Outcomes

  • Develop an insider perspective on cyber security.
  • Acquire knowledge of the most common cyber attacks.
  • Acquire knowledge of hacking tools and techniques.

Course Overview

In this course, the new lab will give students a comprehensive way to build and manage a Windows Server 2022 server environment and explore how these core technologies can help organizations be more efficient, agile, and cost-effective.

Course Outcomes

  • Learn to install Windows Server 2022, Perform Post-Install Tasks.
  • Learn to set up your first DC.
  • Learn to Install WAC and Join a Workstation to the Domain.
Show More

Odd Semester

Courses for this semester

Course Overview

This course is designed for the student who wants to go into the field of Computer Forensics or Digital Forensics. Computer Forensic is a comprehensive program focusing on the latest ways for data acquisition techniques and data retrieval techniques in a forensically sound manner so that the evidence can be presented in court. Real-time demonstration of the latest forensic techniques, methodologies, tools, tricks, and integrity measures.

Course Outcomes

  • Learn to explain the importance of computer forensics in achieving the goals of information security.
  • Learn to identify steps involved in recovering data stored in various devices and various techniques used in windows, Linux, network, and web application forensics.
  • Learn to justify the need for meticulous documentation in computer forensics.

Course Overview

Virtualization translates to creating a virtual counterpart of an existing system such as a desktop, server, network resource, or operating system. Holistically speaking, it is a technique that allows multiple users or organizations to make use of a single resource thread or an application among themselves. The course helps to understand the technologies and applications of cloud computing and its virtualization foundation is used in servers, along with data security tools.

Course Outcomes

  • Learn to explain how security is implemented in virtualization and cloud computing.
  • Learn to discover the importance of security principles in achieving trust and privacy in the Cloud.
  • Learn to elaborate on the need for understanding the legal aspects of security and privacy in Cloud computing.

Course Overview

This course is designed to introduce students, working professionals, and the community to the exciting field of cybersecurity. Throughout the course, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains. They will engage with expertly produced videos, gain insight from industry experts, participate in knowledge assessments, practice assessing their environmental awareness, and gain access to materials that address governance and risk management, compliance, business continuity and disaster recovery, cryptography, software development security, access control, network security, security architecture, security operations, and physical and environmental security. Learning will be assessed using strategies aligned with knowledge and understanding. You do not need prior experience in IT security to do well in this course.

Course Outcomes

  • Learn to explain how security is integrated with IT governance.
  • Learn to justify the need for using standard frameworks in establishing robust information security and risk management.
  • Learn to discover various Strategic planning ideas for IT.

Course Overview

The course Linux Administration helps the students to work with Linux systems. Linux is an operating system, which is available as free and open-source software. Linux system administration is one of the most in-demand skills in the IT industry. This course will help the students to understand the fundamentals of Linux, Linux commands, and the manipulation of files and also how to install Linux, network and process management, and the Unix file system.

Course Outcomes

  • Learn to list the advantages and disadvantages of a Multi-user Operating System.
  • Learn to identify various features and benefits provided by the Unix operating system.
  • Learn to compare various text processing commands based on their usage and functionalities.

Course Overview

IT Infrastructure Library - (ITIL) is the most widely adopted framework for IT Service Management in the world. It is a practical approach to identifying, planning, delivering, and supporting IT services to the business. It describes how IT resources should be organized to deliver business value, documenting the processes, functions, and roles of IT Service Management (ITSM). ITIL principles are used by several organizations in both the public and private sectors such as NASA, IBM, HP, British Telecom, HSBC bank, and L'Oreal.

Course Outcomes

  • Learn to identify opportunities to develop IT processes using ITIL guidelines.
  • Learn to interact with IT teams using ITIL terminology and concepts.
  • Learn to explore IT service management processes.

Course Overview

Cloud Computing (CC) represents a recent major strategic shift in computing and Information Technology. This course explores the fundamental principles, foundational technologies, architecture, design, and business values of CC. Understanding will be reinforced through multiple angles including analysis of real-world case studies, hands-on projects, and in-depth study of research developments.

Course Outcomes

  • Learn and understand the principles of virtualization and Cloud Computing.
  • Learn the architectures and models of Cloud Computing.
  • Learn the Service Oriented Architecture (SOA).

Course Overview

This course will help correctly define and cite appropriate instances for the application of computer forensics and Correctly collect and analyze computer forensic evidence. Also to identify the essential and up-to-date concepts, algorithms, protocols, tools, and methodology of Computer Forensic.

Course Outcomes

  • Learn and understand the threats in networks and security concepts.
  • Acquire knowledge of vulnerability tests and penetration tests in the security testing system.
  • Learn to apply authentication applications in different networks.

Course Overview

This course will give a strong foundation in fundamental utilities needed for daily work on modern operating systems. It will develop the ability to write effective shell scripts that enhance the usefulness of computers for programmers and application developers. In addition, the course will enhance a good understanding of various OS-related concepts from a programmer's perspective, such as files, directories, kernels, inodes, APIs, system calls, processes, signals, and more. Students will have the ability to develop applications that require communication between multiple processes to complete tasks, using different IPC ways such as Message Queues, Semaphores, and Shared Memories. They will also develop the skills to write programs that employ advanced concepts like multithreading and useful programs for networking purposes.

Course Outcomes

  • Learn to list the basic commands of the Unix operating system and use them in a Linux environment (ubuntu, fedora, etc.).
  • Learn and understand commands related to processing control and apply them to manage processes.
  • Learn and understand the concepts of control structure, loops, cases, and functions in shell programming and apply them to create shell scripts.
Show More

Even Semester

Courses for this semester

Course Overview

This course aims to approach network security for Mobile, Wireless, and VoIP networks. It talks about the basics of mobile and wireless communication giving the students complete knowledge about the working, protocols, and methods employed to achieve end-to-end network security. Wireless networks are prone to severe security threats. This course covers security methods used in Mobile, Wireless, and VoIP networks, the methods and techniques used in mobile forensics, and their importance.

Course Outcomes

  • Outline the fundamental terminology, principles, architecture and working of mobile and wireless communication.
  • Understand the concepts of Mobile communication.
  • Outline the security features of mobile communication.

Course Overview

Microsoft Azure is a collection of online services that organizations can use to build, host, and deliver applications. The students don’t need to have their own data center because Azure runs in Microsoft’s data centers around the world. Not only does this approach save them the trouble of having to build and maintain their own on-premises IT infrastructure, but it can also save their money, because the students only have to pay for what they use, and they can scale their Azure resources up and down as needed. In this course, the students will not only get an overview of the Azure services available in various categories, such as compute, storage, and networking, but they will also follow hands-on examples showing how to create virtual machines and web apps using Azure Portal and Azure command-line interface.

Course Outcomes

  • Learn to describe some of the Azure services available in various categories.
  • Learn to describe the basic concepts of cloud computing.
  • Learn to use the Azure command line.
Show More

Scholarship

Apply Scholarship through CST

CST- Common scholarship test is a national and international level online MCQ based examination funded for intellectual empowerment by Assam down town University.

CST- Maximum enrolment each year is 120 seats and any 10+2 students can apply. Adtu is northeast India’s first placement driven university to provide 100% scholarship benefits worth 10 cr.

CST aims to inspire brilliant and competent students to pursue further education. Accredited with a prestigious grade by NAAC, UGC and AICTE.

Apply Scholarship Through

Explore more scholarships that can help you reach out your goal with financial aid.

This scholarship is valid on the basis of the board/university examination

95% & above 100% Scholarship on all semester
90%-94.9% 50% Scholarship on all semester
80%-89.9% 25% Scholarship on all semester

This scholarship is valid on the basis of the board/university exam

National & International Level 100% Scholarship on all semester
State Level 50% Scholarship on all semester
District Level 25% Scholarship on all semester

This scholarship is valid on the basis of the board/university exam

National & International Level 100% Scholarship on all semester
State Level 50% Scholarship on all semester
District Level & NCC Certificate Holder 25% Scholarship on all semester

A 50% scholarship on total semester fees is provided to all specially abled students.

A 100% scholarship on the last semester fee is provided to all the alumni of Assam down town University.

A 100% scholarship on total semester fee for Economically Backward Classes

Campus Life

Our Facilities

World Class Facilities

Discover a multitude of world-class amenities and cutting-edge resources at Assam down town University, enhancing your academic journey to new heights.

Some of our Facilities
  • Library
  • Swimming Pool
  • Play Ground
  • Amphitheatre
  • Basketball Court
  • Cinema Hall
  • Cafeteria
  • Canteen
  • Indoor stadium
  • Yoga Studio
  • Gym
  • ATM

Start-Up &
Incubation Centre

The Start-Up & Incubation Centre at Assam down town University provides a supportive environment for young entrepreneurs to develop and grow their business ideas. The center provides mentorship, funding, and networking opportunities to help innovative ideas become successful businesses.

Rural Empowerment with SFURTI scheme

SFURTI scheme to support rural entrepreneurs and innovators, an initiative by the Ministry of MSME

TIDE 2.0 scheme for ICT-based startups

TIDE 2.0 scheme for ICT-based startups which provides a grant of Rs. 4L and Rs. 7L under EiR and Grant categories respectively, an initiative by the Ministry of MeitY.

dtVL Ideation interest-free loans up to Rs. 2 lakhs.

dtVL Ideation, an incubation program for early-stage entrepreneurs with a market-ready solution/product, offering interest-free loans up to Rs. 2 lakhs.

Innovation with Sprout UP program

Sprout UP, an incubation program for students, faculties, and researchers with innovative business ideas, prototypes, or technology solutions.

Icons Images

Job Created
Icons Images

Start Ups
Icons Images

Govt and MSME Collaboration
Icons Images

International Tie-ups

Our Recruiters

What our Students say

Kailash Timsina
Student

"I am a BBA student of 3rd semester. I hail from Bhutan. I vow that I am having a great experience i...

Juliush Mushahary
Student

"AdtU is amazing. I am a BBA student of 2019-22 batch and I am just grateful for the amount of oppor...

Reshi Prasad Pokhrel
Student

Let us be grateful to the people and place who makes us happy. They are the charming gardeners whom ...

Debapriya Paul
Student

Currently I am pursuing MBA in Assam Down Town University. MBA is the professional course through wh...

Priti Jain
Student

AdtU is a university that focuses on giving knowledge, education and simultaneously making the stude...

Madhurya Bujar Barua
Student

The Assam downtown University has been a great learning experience. The university has provided me w...

Naeem Hussain
Student

My experience with AdtU has been splendid one indeed. Little needs to said about its scenic infrastr...

Dr Dipanjali Hazarika
Student

As a student I am very glad that I have got an opportunity to study here in Assam downtown universi...

Sakhyajit Roy
Student

My name is Sakhyajit Roy. I?m from Tripura. I joined the university on Auguest, 2017 as a student of...

Runi Bharadwaj
Student

I share immense pleasure to share my post graduate program experience in Assam down town University....

Jenifer Dhar
Student

AdtU is a platform where I got golden opportunities to feed my zeal for knowledge through the dynami...

Salehah Hussain Uthman
Student

I am fortunate to get an opportunity to study here in Assam Downtown University. The best thing abou...

Nisha Nirola
Student

Our university is one of the best place for developing ourselves in the field of research and acedem...

Liangsi Hallam
Student

ADTU is a university that is very good interms of infrastructure, academics and placements. Our tea...

Anushmita Kashyap
Student

It is one of best private colleges in North East India, it also provides a good environment for ed...

Dasanibha Mawphlang
Student

ADTU is a good University which provides the students with best quality lectures and ensures comfort...

Farhin zakia
Student

The environment of Assam downtown university is very pleasant.The department of BMLT is very good a...

Anamika Das
Student

The university has all the necessary facilities and amenities for students . The classrooms and the ...

Susmita Sinha
Student

Assam downtown University is well recognised all over india. In the ongoing pandemic situation it ha...

Alumni of the Month

Get Free Counselling Now