B.Tech. in Computer Science and Engineering on Cloud Technology and Information Security

4 Years Degree Programme

Our Approach

Industry-Academia Collaboration

Programme Details

icons Images
4 Years Programme

icons Images
Upto 100% Scholarship

icons Images
100% Placement Assistance

icons Images
Eligibility
Minimum 45% in

Read More

B Tech in Cloud Technology and Information programme, at Assam down town University, deals with the latest advancement in the field of could computing and information security. With the rising threat of data breach, the demand for skilled professionals in the segment is growing and we intend to bridge this gap with a skilled workforce that can take up future industry challenges.

Curriculum Details

Year wise Course Details

Odd Semester

Courses for this semester

Course Overview

Workshop practice provides the basic working knowledge of the production and properties of different materials used in the industry. It also explains the use of different tools, equipments, machinery and techniques of manufacturing, which ultimately facilitate shaping of these materials into various usable forms. This course will train the students into competent persons for such mechanical works .

Course Outcomes

  • Perform various manufacturing methods like casting, Forming, machining etc.
  • Apply computer coding in automation of Machines.
  • Learn Carpentry & fitting operations and its application in industries.
  • Learn different machine operations like turning, milling.
  • Learn the different types of welding and its field of application.

Course Overview

Workshop practice is a very vast one and it provides the basic working knowledge of the production and properties of different materials used in the industry. It also explains the use of different tools, equipments, machinery and techniques of manufacturing, which ultimately facilitate shaping of these materials into various usable forms.

Course Outcomes

  • Learn about various manufacturing methods like casting, Forming, machining etc.
  • Apply computer coding in automation of Machines.
  • Learn Carpentry & fitting operations and its application in industries.
  • Learn Different machining operations like turning, milling.
  • Learn different types of welding and its field of application.
Show More

Even Semester

Courses for this semester

Course Overview

In this course students will learn the C programming language and its fundamental programming concepts.It includes simple C language applications and variables, data types, functions, control structures, pointers, strings, arrays and dynamic allocation principles.

Course Outcomes

  • List the use of different data types, operators and expressions.
  • Define the control flow statements, looping structures
  • Implement recursion, iteration concepts in programming
  • Classify pointers and function arguments
  • Use Conditional compilation directives

Course Overview

This course will introduce basic problem solving using computer programming languages and basic organization of computers, C programming language, developing programming aptitude. It includes knowledge of basic programming environments.

Course Outcomes

  • Learn formulation of simple algorithms for arithmetic and logical problems.
  • Translate the algorithms into programs (in C language)
  • Use derived types for problem solving
  • Use control structures for problem solving
  • Use functions and pointers for problem solving

Course Overview

This course supports exploration in careers related to the design, development, support, and management of hardware, software, multimedia, and systems integration services. Students will acquire knowledge and skills enabling them to succeed in a technology-driven society and career pathway. Learners apply reading, writing, computing, communication, and critical thinking throughout this project-based learning experience.

Course Outcomes

  • Define technologies like HTML, CSS, XML, PHP
  • Classify static and simple dynamic web pages
  • Explain web application deployment and software architectures
  • Implement web Application Monitor in Web Servers
  • Illustrate browser life cycle for real time web application

Course Overview

The objective of the Engineering Chemistry is to acquaint the students with the basic phenomenon/concepts of chemistry, the student face during course of their study in the industry and Engineering field. The student with the knowledge of the basic chemistry, will understand and explain scientifically the various chemistry related problems in the industry/engineering field. The student will able to understand the new developments and breakthroughs efficiently in engineering and technology. The introduction of the latest (R&D oriented) topics will make the engineering student upgraded with the new technologies

Course Outcomes

  • Understand atomic and molecular structure.
  • Develop an understanding of the concepts of spectroscopic techniques and their applications.
  • Understand the use of free energy in chemical equilibrium.
  • Develop in-depth knowledge of phase rules and alloys.
  • Understand the basic concepts of stereochemistry, organic reactions, and synthesis of a drug molecule.

Course Overview

The topics in this course include: Sample spaces; probability, conditional probability and independence; Bayes' theorem; probability distributions; probability densities; algebra of expected values; descriptive statistics; inferences concerning means, variances, and proportions; curve fitting, the method of least squares and correlation. An introduction to quality control and reliability is also provided i this course.

Course Outcomes

  • Solve Differential Equations and their applications in engineering problems.
  • Implement the techniques of vector calculus in Problems.
  • Use the fundamentals of complex analytic functions and their properties.
  • Translate knowledge in evaluating improper integrals using the Residue theorem
  • Explain Cauchy’s integral formulae and Taylor’s expansions

Course Overview

The concepts developed in this course will aid in quantification of several concepts in chemistry that have been introduced at the 10+2 levels in schools. Technology is being increasingly based on the electronic, atomic and molecular level modifications. Quantum theory is more than 100 years old and to understand phenomena at nanometer levels, one has to base the description of all chemical processes at molecular levels.

Course Outcomes

  • Analyse microscopic chemistry in terms of atomic and molecular orbitals and intermolecular forces.
  • Rationalise bulk properties and processes using thermodynamic considerations
  • Distinguish the ranges of the electromagnetic spectrum used for exciting different molecular energy levels in various spectroscopic techniques
  • Rationalise periodic properties such as ionization potential, electronegativity, oxidation states and electronegativity
  • List major chemical reactions that are used in the synthesis of molecules.

Course Overview

All engineering activities (design/ manufacturing/ operation/ servicing) for any product from any discipline involve a team of people who communicate graphically. Hence, every engineer must have exposure and some competence in presenting ideas as pictures, and be able to unambiguously interpret drawing from others. This course will help develop basic visualization competency as well as ability to representing ideas on both paper and computer.

Course Outcomes

  • Demonstrate the basic components of simple vapour compression refrigeration cycle.
  • Prepare heat balance sheet for single cylinder 4 stroke diesel engine.
  • Interpolate the operating characteristics of Francis Turbine.
  • Demonstrate the heat transfer in natural convection.
  • Illustrate radiation heat transfer by using black plate and test plate.

Course Overview

This course provides free hand drawing techniques for various kind of geometrical constructions. This course also includes scales and dimensioning techniques to draw various projections such as orthographic projections and isometric projections. Sectional views of geometrical solids also form a part of the course.

Course Outcomes

  • Understand principles of engineering graphics and usage of drawing instruments.
  • Apply concepts of orthographic projections.
  • Classify different dimensioning methods and scales.
  • Understand sectional views for different geometrical solids.
  • Illustrate examples of isometric views by using isometric scales.
Show More

Odd Semester

Courses for this semester

Course Overview

The student should be made to: Gives a view of computer system from user’s perspective.Types of instructions. Understand the basic structure and operation of digital computers Familiarize the students with the implementation of fixed-point and floating-point arithmetic operations. Computer architecture is the science and art of selecting and interconnecting hardware components to create a computer that meets functional, performance and cost goals. This course qualitatively and quantitatively examines computer design trade-offs, teaches the fundamentals of computer architecture and organization, including CPU, memory, registers, arithmetic unit, control unit, and input/output components. Topics include a reduced instruction set computer architectures (RISC), using the MIPS central processor as an example, the interface between assembly and high-level programming constructs and hardware, instruction and memory cache systems, performance evaluation, benchmarks, and use of the SPIM/WinDLX/Verilog Simulators for the MIPS architecture. ECE 369A serves students in two ways.

Course Outcomes

  • Describe the architecture of the 8086 microprocessors.
  • Duplicate assembly language program for given task for 8086 microprocessors.
  • Classify control unit operations in parallelism.
  • List arithmetic operations on integer and real numbers.
  • Explain the function of each element of a memory hierarchy

Course Overview

This course imparts the basic concepts of data structures and algorithms. It includes concepts about searching and sorting techniques and basic concepts about stacks, queues, lists, trees and graphs. This course will enable the students to write algorithms for solving problems with the help of fundamental data Structures.

Course Outcomes

  • List types of data structures
  • Classify Iterative and Recursive methods
  • Discuss the computational efficiency of the principal algorithms for sorting, searching, and hashing.
  • Demonstrate Array representation of queue
  • Explain the concept of Binary Tree

Course Overview

This course introduces students to the Object Oriented Programming paradigm. It will familiarize the use of standard tools and techniques for software development, using object oriented approach. The course includes fundamental concepts of OOP to solve different problems of varied nature. To introduce event driven GUI applications using Java

Course Outcomes

  • Identify classes, objects, members of a class, and relationships among them needed for a specific problem
  • Define Overloading methods in Stack Class
  • Explain the concepts of polymorphism and inheritance
  • Implement error-handling techniques
  • Discuss real-world problems using OOP techniques. Able to understand the use of abstraction

Course Overview

This course covers combinational and sequential logic circuits. Topics include number systems, Boolean algebra, logic families, medium scale integration (MSI) and large scale integration (LSI) circuits, analog to digital (AD) and digital to analog (DA) conversion, and other related topics. Upon completion, students should be able to construct, analyze, verify, and troubleshoot digital circuits using appropriate techniques and test equipment.

Course Outcomes

  • Introduce students to the Digital Systems, learn about number systems, Boolean algebra and logic gates.
  • Learn about the representation, manipulation, and minimization of Boolean functions.
  • Learn how to design combinational and sequential circuits.
  • Understand the concept of finite state machines, state minimization, and algorithmic state machines.
  • Learn about analysis and synthesis of asynchronous circuits.

Course Overview

This module will provide the students with a solid theoretical understanding of, as well as practical skills in, object-oriented programming. Practical skills will be learnt using the java programming language. The primary aim of the module is to enable the students to tackle complex programming problems, making good use of the object-oriented programming paradigm to simplify the design and implementation process.

Course Outcomes

  • Describe the meaning of the object-oriented paradigm, and create class hierarchies using the object-oriented design process
  • Design and implement java programs for complex problems, making good use of the features of the language such as classes, inheritance and templates
  • Demonstrate the behavior of programs involving the basic programming constructs like control structures, constructors, string handling and garbage collection
  • Use overloading methodology on methods and constructors to develop application programs.
  • Learn the concept of interface and abstract classes to define generic classes

Course Overview

This course gives an overview of data structure concepts, arrays, stack, queues, trees, and graphs. It includes discussion of various implementations of these data objects, programming styles, and run-time representations.The course also examines algorithms for sorting, searching and some graph algorithms.

Course Outcomes

  • Understand the concept of data structures and apply algorithm for solving problems like Sorting, searching, insertion and deletion of data.
  • Understand linear data structures for processing of ordered or unordered data.
  • Explore various operations on dynamic data structures like single linked list, circular linked list and doubly linked list.
  • Explore the concept of non linear data structures such as trees and graphs.
  • Understand the binary search trees, hash function, and concepts of collision and its resolution methods.

Course Overview

The course focuses on economic and cost analysis of engineering projects, giving insights on modern techniques and methods used on economic feasibility studies relating to design and implementation of engineering projects. The basic purpose of this course is to provide a sound undertaking of concepts and principles of engineering economy and to develop proficiency with methods for making rational decisions regarding problems likely to be encountered in professional practice.

Course Outcomes

  • Understand the basic concepts and terminology used in engineering economics
  • Use the concepts of cash flows, time value of money in evaluation of investments and projects in real life
  • Compare and evaluate alternatives based on present, annual, rate of return, and benefit over cost analyses
  • Identify and analyse the impact of depreciation, taxation and other economic factors on feasibility of real life projects.
  • Recognize the economic impact of engineering solutions and Conduct sensitivity analysis on key compounding parameters, so as make financially prudent decisions in everyday life.

Course Overview

This course introduces the concepts of Combinational circuits. It also includes concepts of flipflops, registers and counters.

Course Outcomes

  • Define different types of logic gates, identify their ICs and also verify their truth table.
  • Derive basic logic gates, adder, and subtractor using universal gates.
  • Illustrate realization of Boolean expression in SOP and POS form and design it using logic gates.
  • Design and test combinational circuits.
  • Design and develop sequential circuits.
Show More

Even Semester

Courses for this semester

Course Overview

This course covers information security, an area of study that engages in protecting the confidentiality, integrity, and availability of information. Information security continues to grow with advancements in technology – as technology advances, so do threats, attacks, and our efforts to mitigate them. In this course, we discuss the modes of threats and attacks on information systems. It will also discuss an important area of threat mitigation that saw rapid development in the twentieth century: cryptography. Information security is concerned with user identification and authentication and access control based on individual or group privileges. The basic access control models and the fundamentals of identification and authentication methods are included in this course.

Course Outcomes

  • Define the fundamental techniques of computer security
  • Understand User identity and Access Management
  • Learn CIA triad of Confidentiality, Integrity and Availability
  • Identify Desktop and Server Security
  • Implement Risk Assessment and Cyber Laws

Course Overview

This course will help students to learn the essential concepts behind relational databases and Relational Database Management Systems (RDBMS). They will study relational data models and discover how they are created and what benefits they bring, and how you can apply them to your own data.

Course Outcomes

  • Explain the concepts of SQL Databases
  • List the types of SQL Statement
  • Classify different conditional statement for Aggregating and grouping data
  • State the importance of multi table join operation
  • Identify ways to extract data from different tables in a database

Course Overview

The purpose of this course is to provide an overview of computer operating systems. Topics to be discussed include a brief history of OS’s and their design and development. The course will cover major components the and the algorithms and implementation techniques used to create them.

Course Outcomes

  • List the different components of OS.
  • Select system calls for managing processes, memory and the file system.
  • Classify the data structures and algorithms used to implement an OS.
  • Explain methods for Handling Deadlocks
  • Implement Contiguous memory Allocation

Course Overview

This course will help the sytudents understand the storage management concepts and understand all the protocols used in managing enterprise storages. This course simulates the storage management environment using Open Filer(Open Source based Enterprise Storage Appliance) and help students to build their understanding about the storage technologies.

Course Outcomes

  • Recognise the storage devices
  • Explain data center architecture and its requirements
  • Illustrate the storage at the network level
  • List and explain types of storage in the infrastructure
  • Compare and contrast SAN NAS and CAS.

Course Overview

The objective of the course is to present an introduction to database management systems, with and emphasis on how to organize, maintain and retrieve - efficiently, and effectively - information from a DBMS.

Course Outcomes

  • Construct problem definition statements for real life applications and implement a database for the same
  • Create and populate a RDBMS, using SQL
  • Retrieve any type of information from a data base.
  • Analyze and apply concepts of normalization to design an optimal database.
  • Learn the concept of user interfaces and report generation utilities of RDBMS products.

Course Overview

This lab complements the operating systems course. Students will gain practical experience with designing and implementing concepts of operating systems such as system calls, CPU scheduling, process management, memory management, file systems and deadlock handling using C language in Linux environment.

Course Outcomes

  • Understand and implement basic services and functionalities of the operating system using system Calls.
  • Use modern operating system calls and synchronization libraries in software/ hardware interfaces.
  • Understand the benefits of thread over process and implement synchronized programs using Multithreading concepts
  • Analyze and simulate CPU Scheduling Algorithms like FCFS, Round Robin, SJF, and Priority
  • Understand the concepts of deadlock in operating systems and implement them in multiprogramming System.

Course Overview

The course provides detailed knowledge, practical training and insight into the implementation and management of various storage technologies with a focus towards applying these technologies in an information lifecycle paradigm.

Course Outcomes

  • Search, retrieve and synthesize information from a variety of systems and sources.
  • Evaluate systems and technologies in terms of quality, functionality, cost-effectiveness and adherence to professional standards.
  • Integrate emerging technologies into professional practice.
  • Apply theory and principles to diverse information contexts.
  • Explain physical and logical components of a storage infrastructure including storage subsystems, RAID and intelligent storage systems

Course Overview

In this course the students get an introduction to environmental science. It covers biobased conversion and biorefinery processes and is intended to help scientists and individuals learn how how to tackle environmental problems by reducing their carbon footprint and making the switch from fossil fuels to alternative and renewable forms of energy.

Course Outcomes

  • Understand the relationships between natural and man-made systems
  • Apply statistical methods, ICT and innovative techniques in classroom, field and laboratory to analyze scientific data
  • Develop critical thinking for shaping strategies (scientific, social, economic, administrative, and legal) for environmental protection, conservation of biodiversity, environmental equity, and sustainable development.
  • Understand the consequences of human actions on the web of life, global economy, and quality of human life.
  • Gain empirical knowledge on the topic and contribute in decision making processes
Show More

Odd Semester

Courses for this semester

Course Overview

This course introduces the students to the core concepts of cloud computing. The students gain the foundational knowledge required for understanding cloud computing from a business perspective as also for becoming a cloud practitioner. The students will understand the definition and essential characteristics of cloud computing, its history, the business case for cloud computing, and emerging technology usecases enabled by cloud.

Course Outcomes

  • Explain cloud computing and its history
  • Classify cloud computing service providers
  • Define costing model on cloud platform
  • Define types of cloud models
  • Implement cloud dos and don’ts

Course Overview

This course provides an introduction to computer and network security. Students successfully completing this class will be able to evaluate works in academic and commercial security, and will have rudimentary skills in security research. The course begins with a tutorial of the basic elements of cryptography, cryptanalysis, and systems security, and continues by covering a number of seminal papers and monographs in a wide range of security areas.

Course Outcomes

  • Describe the importance of intrusion detection and Network attacks inside and outside the network.
  • Classify the sources of vulnerabilities and security threats motives
  • Define the importance of Database security in the Internet architecture
  • Explain virtual private network in real time projects
  • Define importance of managing the network security.

Course Overview

This course introduces the basic ideas of computing, networking, communications, security, and virtualization, and will provide the students with an important foundation for the rest of the course.

Course Outcomes

  • Identify SDDC using VMware products.
  • Select Fault tolerance and High availability for the Virtual machines
  • Identify Secure Virtual environment in VMware NSX
  • Discuss Optimization and monitoring in VMware NSX
  • Implement Monitor key storage performance metrics

Course Overview

This course will teach the students on how systems connect to and interact with the web and how the most common languages of the internet (HTML5, CSS3, and JavaScript) work to allow information to be shared worldwide.

Course Outcomes

  • Learn technologies like HTML, CSS, XML, PHP
  • Classify static and simple dynamic web pages
  • Understand web application deployment and software architectures
  • Implement web Application Monitor in Web Servers
  • Learn browser life cycle for real time web application

Course Overview

This course introduces general standards of good reasoning and offers tools to improve critical thinking skills. These skills will help to determine when an argument is being given, what its crucial parts are, and what it assumes implicitly. Students will also learn how to apply deductive and inductive standards for assessing arguments and how to detect and avoid fallacies.

Course Outcomes

  • List various methods of reasoning to solve problems
  • Define the concepts for Logical Reasoning – I & II.
  • List the various concepts of Measures of Central Tendency
  • Classify Reasoning and Thinking
  • Implement median of grouped and ungrouped data merit

Course Overview

In this course the students will learn how to secure open source and commercial database platforms against modern threats and attack vectors. This course includes a mix of conceptual lectures and detailed screen casts outlining all the steps involved with conducting test attacks and subsequently securing database platforms.

Course Outcomes

  • Describe the importance of Database and protective measures for ORACLE and SQL
  • Classify types of SQL injection attacks and Countermeasures
  • Define the importance of Database security in the Internet architecture
  • Duplicate the vulnerability management process in Database security.
  • Implement profiler to audit SQL server access

Course Overview

In this course the students will learn and explore the working principles and utilities of various cryptographic algorithms including secret key cryptography, hashes and message digests, and public key algorithms. They will explore the design issues and working principles of various authentication Protocols. And explore various secure communication standards including Kerberos, IPsec, and SSL/TLS and email.

Course Outcomes

  • Apply the knowledge of cryptographic checksums and evaluate the performance of different message digest algorithms for verifying the integrity of varying message sizes.
  • Apply different digital signature algorithms to achieve authentication and create secure applications
  • Understand, compare and apply different encryption and decryption techniques to solve problems related to confidentiality and authentication
  • Apply network security basics, analyze different attacks on networks and evaluate the performance of firewalls and security protocols like SSL, IPSec, and PGP.
  • Apply the knowledge of cryptographic utilities and authentication mechanisms to design secure application

Course Overview

This course will cover client server architecture and impart knowledge on how to develop a web application using PHP technologies. Students will gain the skills and project-based experience needed for entry into web application and development careers.

Course Outcomes

  • Develop a dynamic web page by the use of java script
  • Learn to write a well formed / valid XML document.
  • Learn to write a server side PHP application called PHP to catch form data sent from client and store it on database.
  • Learn to write a server side PHP application
  • Connect a PHP program to a DBMS and perform insert, update and delete operations on DBMS table
Show More

Even Semester

Courses for this semester

Course Overview

The course is about the fundamentals of the Linux operating system, including installation, configuration, administration, file management, and security.

Course Outcomes

  • Learn the different distribution of Linux and the reason for open source
  • Use Linux commands to manage files and file systems
  • Create and execute BASH scripts
  • Explain the structure of the Linux operating system
  • Establish user accounts and permissions

Course Overview

This course enables the students to gain in-depth knowledge in the field of Computer forensics & Cyber Crime. Learning Outcomes: After completion of the course the students will be able to learn investigation tools and techniques, analysis of data to identify evidence, Technical Aspects & Legal Aspects related to cyber crime.

Course Outcomes

  • Explain the importance of computer forensic in achieving the goals of information security
  • Discuss steps involved in recovering data stored in various devices
  • Define the need for meticulous documentation in computer forensics
  • Implement Monitoring Services for Forensic analysis
  • Select an adequate legal framework when dealing with computer forensics

Course Overview

Ethical hacking course involves the study of an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.

Course Outcomes

  • Understand the basics of ethical hacking
  • Elaborate on the hacking methodology
  • Demonstrate the hacking process on different platforms
  • Illustrate the various application of attacks on different wireless platforms
  • Create formal reports for the security attacks launched

Course Overview

Ethical hacking course involves the study of an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.

Course Outcomes

  • Discuss the basics of ethical hacking
  • Elaborate on the hacking methodology
  • Demonstrate the hacking process on different platforms
  • Illustrate the various application of attacks on different wireless platforms
  • Create formal reports for the security attacks launched

Course Overview

The course will introduce and cover the topics of cloud infrastructures, virtualization, software defined networks and storage, cloud storage, and programming models. As an introduction, we will discuss the motivating factors, benefits and challenges of the cloud, as well as service models, service level agreements (SLAs), security, example cloud service providers and use cases. Modern data centers enable many of the economic and technological benefits of the cloud paradigm; hence, we will describe several concepts behind data center design and management and software deployment. Next, we will focus on virtualization as a key cloud technique for offering software, computation and storage services. We will study how CPU, memory and I/O resources are virtualized, with examples from Xen and VMWare, and present real use cases such as Amazon EC2. Within the same theme of virtualization, students will also be introduced to Software Defined Networks and Storage (SDN and SDS). Subsequently, students will learn about different cloud storage concepts including data distribution, durability, consistency and redundancy. We will discuss distributed file systems, NoSQL databases and object storage. HDFS, CephFS, HBASE, MongoDB, Cassandra, DynamoDB, S3, Swift and Ceph Object Gateway will be presented as case studies. Finally, students will understand the details of the MapReduce programming model and gain a broad overview of the Spark, GraphLab programming models as well as message queues and stream processing.

Course Outcomes

  • Explain the core concepts of the cloud computing paradigm: how and why this paradigm shift came about, the characteristics, advantages and challenges brought about by the various models and services in cloud computing.
  • Apply fundamental concepts in cloud infrastructures to understand the tradeoffs in power, efficiency and cost, and then study how to leverage and manage single and multiple datacenters to build and deploy cloud applications that are resilient, elastic and cost-efficient
  • Understand system, network and storage virtualization and outline their role in enabling the cloud computing system model.
  • Illustrate the fundamental concepts of cloud storage and demonstrate their use in storage systems such as Amazon S3 and HDFS.
  • Analyze various cloud programming models and apply them to solve problems on the cloud.
Show More

Odd Semester

Courses for this semester

Course Overview

This course covers the different types of service and deployment models of cloud computing. In this module, you will learn about the three main service models available on the cloud—Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS).

Course Outcomes

  • Students will be able to understand and articulate the key concepts, models, and architecture of cloud computing, including the different service models (IaaS, PaaS, SaaS) and deployment models (public, private, hybrid).
  • Students will demonstrate the ability to deploy, configure, and manage cloud-based applications and services using popular cloud platforms (e.g., AWS, Azure, Google Cloud), focusing on scalability, reliability, and performance optimization.
  • Students will understand the security challenges associated with cloud computing and be able to implement best practices for securing cloud environments, including data protection, access control, and compliance with relevant regulations.
  • Students will be able to analyze and optimize the cost of cloud services by utilizing cloud pricing models, monitoring tools, and resource management strategies to ensure cost-effective use of cloud infrastructure.
  • Students will develop skills in integrating and automating cloud services using APIs, microservices, and DevOps tools, enabling continuous integration and delivery (CI/CD) pipelines to streamline cloud operations and development workflows.

Course Overview

In this course, student learn how to apply automation to manage fleets of computers and understand how to automate the process for deploying new computers, keeping those machines updated, managing large-scale changes, and a lot more.

Course Outcomes

  • Students will be able to explain the key concepts, benefits, and best practices of automation and configuration management, including the role of these practices in modern IT environments.
  • Students will demonstrate the ability to use industry-standard automation tools (e.g., Ansible, Puppet, Chef) to automate the deployment, configuration, and management of infrastructure and applications, reducing manual intervention and errors.
  • Students will gain hands-on experience in implementing Infrastructure as Code (IaC) principles, enabling them to write, test, and maintain code that automates the provisioning and management of infrastructure in a consistent and repeatable manner.
  • Students will develop the skills to integrate configuration management tools with CI/CD pipelines, ensuring that infrastructure and application configurations are consistently applied across development, testing, and production environments.
  • Students will be able to implement monitoring and logging solutions for automated environments, enabling them to proactively manage infrastructure, detect configuration drift, and ensure that systems are operating efficiently and securely.

Course Overview

This course provides a comprehensive analysis of individual and group behavior in organizations. Its purpose is to provide an understanding of how organizations can be managed more effectively and at the same time enhance the quality of employees work life. Topics include motivation, rewarding behavior, stress, individual and group behavior, conflict, power and politics, leadership, job design, organizational structure, decision making, communication and organizational change and development.

Course Outcomes

  • Explain the importance of computer forensic in achieving the goals of information security.
  • Discuss steps involved in recovering data stored in various devices
  • Define the need for meticulous documentation in computer forensics
  • Students will be able to understand and evaluate the legal and ethical issues related to cyber forensics, including laws governing digital evidence, privacy concerns, and the ethical responsibilities of forensic professionals.
  • Students will demonstrate the ability to perform incident response and conduct forensic investigations, including identifying, collecting, and analyzing digital evidence from various sources such as computers, networks, and mobile devices.

Course Overview

The "Biology for Engineers" course provides engineering students with a foundational understanding of biological principles and their applications in engineering. This interdisciplinary course bridges the gap between biology and engineering, emphasizing how biological systems can inspire and inform innovative engineering solutions. Students will explore key concepts in biology, including cellular structure and function, genetics, molecular biology, and ecosystems, while learning how these principles are applied in various engineering fields such as biotechnology, biomedical engineering, environmental engineering, and synthetic biology.Through a combination of lectures, hands-on labs, and case studies, students will gain an appreciation for the complexity of living systems and learn how to leverage biological insights to solve real-world engineering challenges. By the end of the course, students will be equipped with the knowledge to integrate biological concepts into their engineering practice, fostering the development of cutting-edge technologies that address contemporary societal needs.

Course Outcomes

  • To familiarize the students with the basic biological concepts and their engineering applications.
  • To enable the students with an understanding of biodesign principles to create novel devices and structures.
  • To provide the students an appreciation of how biological systems can be re-designed as substitute products for natural systems.
  • To motivate the students to develop the interdisciplinary vision of biological engineering.
  • Students will be able to evaluate the ethical implications and environmental impact of engineering solutions that incorporate biological components, ensuring responsible and sustainable engineering practices.

Course Overview

The Cyber Forensics Lab course provides students with hands-on experience in the field of digital forensics, focusing on the practical application of forensic techniques and tools. This lab-based course complements theoretical knowledge by immersing students in real-world scenarios where they will investigate digital crimes, recover and analyze digital evidence, and follow the proper legal protocols to ensure the integrity of the evidence. Students will work on a variety of exercises and case studies that simulate real-life cyber incidents, such as data breaches, malware attacks, and insider threats. Using industry-standard forensic tools and software, students will learn to conduct forensic investigations on computers, mobile devices, and networks. They will practice techniques for data acquisition, evidence preservation, file system analysis, and the recovery of deleted or encrypted data. In addition to technical skills, students will also focus on the legal and ethical aspects of cyber forensics, understanding the importance of chain of custody, documentation, and the preparation of forensic reports that can be presented in legal contexts. By the end of the course, students will have developed the practical skills necessary to conduct thorough and legally sound forensic investigations, preparing them for careers in cybersecurity, law enforcement, and other fields where digital forensics is essential.

Course Outcomes

  • Students will be able to effectively use industry-standard digital forensic tools and software to collect, analyze, and interpret digital evidence from various devices and platforms, including computers, mobile devices, and networks.
  • Students will demonstrate the ability to accurately acquire and preserve digital evidence, ensuring its integrity and admissibility in legal proceedings by following best practices and maintaining a strict chain of custody.
  • Students will develop the skills to perform detailed forensic analyses, including recovering deleted files, analyzing file systems, and identifying signs of tampering or malicious activity. They will also be able to compile their findings into clear, concise forensic reports suitable for legal contexts.
  • Students will understand the legal frameworks and ethical considerations surrounding digital forensics, including privacy concerns, legal standards for evidence handling, and the responsibilities of a forensic investigator.
  • Students will be able to simulate and conduct comprehensive forensic investigations in response to various cyber incidents, such as data breaches or malware attacks, and effectively communicate their findings to stakeholders, including law enforcement and corporate management.
Show More

Even Semester

Courses for this semester

Course Overview

This course provides an overview of data science principles, techniques, and tools for extracting insights from data. The course covers essential topics such as data wrangling, exploratory data analysis, statistical modeling, machine learning, and data visualization. Students will learn to apply these concepts using real-world datasets and programming languages like Python or R. This course aims to equip students with the skills to solve data-driven problems and make data-informed decisions.

Course Outcomes

  • Understand the fundamentals of data science, including its workflow and applications across various domains.
  • Perform data cleaning, transformation, and exploratory data analysis to derive meaningful insights.
  • Apply statistical and machine learning techniques to analyze and model data.
  • Visualize data effectively using tools and libraries to communicate results clearly.
  • Use programming tools to implement data science solutions for real-world problems.
Show More

Common Scholarship Test

Apply Scholarship through CST

CST- Common scholarship test is a national and international level online MCQ based examination funded for intellectual empowerment by Assam down town University.

CST- Maximum enrolment each year is 269 seats and any 10+2 students can apply. Adtu is northeast India’s first placement driven university to provide 100% scholarship benefits worth 35 cr.

CST aims to inspire brilliant and competent students to pursue further education. Accredited with a prestigious grade by NAAC, UGC and AICTE.

Apply Scholarship Through

Explore more scholarships that can help you reach out your goal with financial aid.

This scholarship is valid on the basis of the board/university examination

95% & above 100% Scholarship on all semester
90%-94.9% 50% Scholarship on all semester
80%-89.9% 25% Scholarship on all semester

This scholarship is valid on the basis of the board/university exam

National & International Level 100% Scholarship on all semester
State Level 50% Scholarship on all semester
District Level 25% Scholarship on all semester

This scholarship is valid on the basis of the board/university exam

National & International Level 100% Scholarship on all semester
State Level 50% Scholarship on all semester
District Level & NCC Certificate Holder 25% Scholarship on all semester

A 50% scholarship on total semester fees is provided to all specially abled students.

A 100% scholarship on the last semester fee is provided to all the alumni of Assam down town University.

A 100% scholarship on total semester fee for Economically Backward Classes

Campus Life

Our Facilities

World Class Facilities

Discover a multitude of world-class amenities and cutting-edge resources at Assam down town University, enhancing your academic journey to new heights.

Some of our Facilities
  • Gym
  • ATM
  • Sports
  • Hostels
  • Transport
  • Healthcare
  • Yoga Center
  • Media Centre
  • Swimming Pool
  • Central Library
  • Canteen & Cafeterias
  • ICT Enabled Classrooms
  • Well Equipped Laboratories
  • Auditorium & Seminar Halls

Start-Up &
Incubation Centre

The Start-Up & Incubation Centre at Assam down town University provides a supportive environment for young entrepreneurs to develop and grow their business ideas. The center provides mentorship, funding, and networking opportunities to help innovative ideas become successful businesses.

Rural Empowerment with SFURTI scheme

SFURTI scheme to support rural entrepreneurs and innovators, an initiative by the Ministry of MSME

TIDE 2.0 scheme for ICT-based startups

TIDE 2.0 scheme for ICT-based startups which provides a grant of Rs. 4L and Rs. 7L under EiR and Grant categories respectively, an initiative by the Ministry of MeitY.

dtVL Ideation interest-free loans up to Rs. 2 lakhs.

dtVL Ideation, an incubation program for early-stage entrepreneurs with a market-ready solution/product, offering interest-free loans up to Rs. 2 lakhs.

Innovation with Sprout UP program

Sprout UP, an incubation program for students, faculties, and researchers with innovative business ideas, prototypes, or technology solutions.

Icons Images
Job Creation
Icons Images
Support Start Ups
Icons Images
Govt and MSME Collaboration
Icons Images
International Tie-ups

Top Recruiters

What our Students say

Kailash Timsina
Student

"I am a BBA student of 3rd semester. I hail from Bhutan. I vow that I am having a great experience i...

Juliush Mushahary
Student

"AdtU is amazing. I am a BBA student of 2019-22 batch and I am just grateful for the amount of oppor...

Reshi Prasad Pokhrel
Student

Let us be grateful to the people and place who makes us happy. They are the charming gardeners whom ...

Debapriya Paul
Student

Currently I am pursuing MBA in Assam Down Town University. MBA is the professional course through wh...

Priti Jain
Student

AdtU is a university that focuses on giving knowledge, education and simultaneously making the stude...

Madhurya Bujar Barua
Student

The Assam downtown University has been a great learning experience. The university has provided me w...

Naeem Hussain
Student

My experience with AdtU has been splendid one indeed. Little needs to said about its scenic infrastr...

Dr Dipanjali Hazarika
Student

As a student I am very glad that I have got an opportunity to study here in Assam downtown universi...

Sakhyajit Roy
Student

My name is Sakhyajit Roy. I?m from Tripura. I joined the university on Auguest, 2017 as a student of...

Runi Bharadwaj
Student

I share immense pleasure to share my post graduate program experience in Assam down town University....

Jenifer Dhar
Student

AdtU is a platform where I got golden opportunities to feed my zeal for knowledge through the dynami...

Salehah Hussain Uthman
Student

I am fortunate to get an opportunity to study here in Assam Downtown University. The best thing abou...

Nisha Nirola
Student

Our university is one of the best place for developing ourselves in the field of research and acedem...

Liangsi Hallam
Student

ADTU is a university that is very good interms of infrastructure, academics and placements. Our tea...

Anushmita Kashyap
Student

It is one of best private colleges in North East India, it also provides a good environment for ed...

Dasanibha Mawphlang
Student

ADTU is a good University which provides the students with best quality lectures and ensures comfort...

Farhin zakia
Student

The environment of Assam downtown university is very pleasant.The department of BMLT is very good a...

Anamika Das
Student

The university has all the necessary facilities and amenities for students . The classrooms and the ...

Susmita Sinha
Student

Assam downtown University is well recognised all over india. In the ongoing pandemic situation it ha...

Alumni of the Month

Get Free Counselling Now