Bachelor of Science in Information Technology on Cloud Technology and Information Security

3 Years Degree Programme

Our Approach

Industry-Academia Collaboration

Programme Details

icons Images
3 Years Programme

icons Images
Upto 100% Scholarship

icons Images
100% Placement Assistance

icons Images
Eligibility
Minimum 45% in

Read More

B.Sc.IT in Cloud Technology and Information Security programme will enable students to understand the basics of Cloud Technology and Information Security. As an evolving industry, this field will attract many career prospects and in order to fulfill industry demand Assam down town University encourages interested applicants to consider and enroll for this programme for a better career opportunity.

Curriculum Details

Year wise Course Details

Odd Semester

Courses for this semester

Course Overview

.

Course Outcomes

Show More

Even Semester

Courses for this semester

Course Overview

This course includes the fundamentals of Operating Systems, mechanisms of OS to handle processes and threads and their communication, mechanisms involved in memory management in contemporary OS. It also covers distributed operating system concepts that includes architecture, mutual exclusion algorithms, deadlock detection algorithms and agreement protocols.

Course Outcomes

  • Understand the functions, facilities, structure of operating systems and fundamental operating system abstractions.
  • Analyze the structure of operating system and design the applications to run in parallel either using process or thread models of different OS.
  • Analyze the performance and apply different algorithms used in major components of operating systems, such as scheduler, memory manager, concurrency control manager and mass-storage manager, I/O manager
  • Analyze and justify the various device and resource management techniques, managing deadlock situations for time-sharing and distributed systems.
  • Develop a high-level understanding of the structure of operating systems, applications, and the relationship between them.

Course Overview

This course describes the procedural and object oriented paradigm with concepts of streams, classes, functions, data and objects.

Course Outcomes

  • Describe OOPs concepts
  • Use functions and pointers in your C++ program
  • Understand tokens, expressions, and control structures
  • Explain arrays and strings and create programs using them
  • Describe and use constructors and destructors

Course Overview

Decompose the problem into a set of objects ? Objects interact with each other to solve the problem ? create new type of objects to model elements from the problem space

Course Outcomes

  • Apply the object-oriented programming approach in connection with C++
  • Illustrate the process of data file manipulations using C++
  • Apply virtual and pure virtual function & complex programming situations
  • Write an error free program of minimum 200 lines of code
  • Allow programmers to think in terms of the structure of the problem rather than in terms of the structure of the computer.

Course Overview

This course is about basic data structures using C. It includes lessons on how to apply linear and non-linear data structures in problem solving.

Course Outcomes

  • Write basic and advanced programs in C
  • Implement functions and recursive functions in C
  • Learn to implement functions and recursive functions by means of data structures
  • Implement searching and sorting algorithms
  • Implement data structures using C

Course Overview

To help fight procrastination, acquire precise goal setting abilities, efficiently manage time, become self-motivated, and complete critical activities. To understand digital world etiquettes.

Course Outcomes

  • Gain an understanding of the nature, process, and relevance of communication
  • To improve one's comprehension of communication skills and cultivate effective communication skills
  • Understand the meaning of the terms "personality" and "personality development"
  • Understand the ability to create the multiple personality traits that is necessary for personality development
  • To read others' body language and to decipher what your own body is communicating.

Course Overview

JavaScript (js) is a light-weight object-oriented programming language which is used by several websites for scripting the webpages. It is an interpreted, full-fledged programming language that enables dynamic interactivity on websites when applied to an HTML document.

Course Outcomes

  • Use an integrated development environment to write, compile, run, and test simple object-oriented Java programs.
  • Read and make elementary modifications to Java programs that solve real-world problems.
  • Validate input in a Java program.
  • Identify and fix defects and common security issues in code.
  • Document a Java program using Javadoc.
Show More

Odd Semester

Courses for this semester

Course Overview

Introduction to Information Security is a graduate-level introductory course in information security. It teaches the basic concepts and principles of information security and the fundamental approaches to secure computers and networks. Its main topics include: security basics; security management and risk assessment; software security; operating systems security; database security; cryptography algorithms and protocols; network authentication and secure network applications; malicious malware; network threats and defenses; web security; mobile security; legal and ethical issues; and privacy.

Course Outcomes

  • Explain the CIA triad of Confidentiality, Integrity and Availability and its need
  • Demonstrate foundation knowledge of information security/assurance within the organization
  • Examine the fundamental techniques of computer security.
  • Demonstrate knowledge of security objectives and policy development
  • Identify the five leading-edge resources that have up-to-date information on information security

Course Overview

This course introduces the students to the core concepts of cloud computing. The students gain the foundational knowledge required for understanding cloud computing from a business perspective as also for becoming a cloud practitioner. The students will understand the definition and essential characteristics of cloud computing, its history, the business case for cloud computing, and emerging technology usecases enabled by cloud.

Course Outcomes

  • Explain cloud computing and its history
  • Explain the core concepts of the cloud computing paradigm.
  • Apply fundamental concepts in cloud infrastructures to understand the trade-offs in power, efficiency and cost.
  • Discuss system, network and storage virtualization and outline their role in enabling the cloud computing system model.
  • Illustrate the fundamental concepts of cloud storage and demonstrate their use in storage systems

Course Overview

The objective of the course is to present an introduction to database management systems, with an emphasis on how to organize, maintain and retrieve - efficiently, and effectively - information from a DBMS.

Course Outcomes

  • Describe the fundamental elements of relational database management systems
  • Understand the basic concepts of relational data model, entity-relationship model, relational database design, relational algebra and SQL.
  • Design ER-models to represent simple database application scenarios
  • Convert the ER-model to relational tables, populate relational database and formulate SQL queries on data.
  • Learn basic database storage structures and access techniques: file and page organizations, indexing methods including B tree, and hashing.

Course Overview

This course provides the fundamental concepts of computer networking and communications, how to make use of IEEE standards in the construction of LAN, build the skills of subnetting and supernetting. It includes concepts of protocols of Transport Layer, QoS and Congestion control mechanisms and demonstrates different protocols of Application Layer.

Course Outcomes

  • Describe the functions of each layer in OSI and TCP/IP model
  • Analyze the functions of Application layer and Presentation layer paradigms and Protocols
  • Apply the Session layer design issues and Transport layer services
  • Classify the routing protocols and analyse how to assign the IP addresses for the given network
  • Demonstrate the functions of data link layer and explain the protocols

Course Overview

The major objective of this lab is to provide a strong formal foundation in database concepts, technology and groom them into well-informed database application developers. The topics include how to present SQL and procedural interfaces to SQL comprehensively, introduction to systematic database design approaches covering conceptual design, logical design and an overview of physical design and a good formal foundation on the relational model of data.

Course Outcomes

  • Understand, appreciate and effectively explain the underlying concepts of database technologies.
  • Design and implement a database schema for a given problem-domain.
  • Populate and query a database using SQL DML/DDL commands
  • Declare and enforce integrity constraints on a database using a state-of-the-art RDBMS.
  • Develop Programming PL/SQL including stored procedures, stored functions, cursors, packages.

Course Overview

This course covers software design, implementation, and testing using Java. It Introduces object-oriented design techniques and problem solving. It emphasizes development of secure, well-designed software projects that solve practical, real-world problems.

Course Outcomes

  • Develop programs using abstract classes
  • Develop programs for solving real world problems using java collection frame work.
  • Develop multi threaded programs.
  • Develop GUI programs using swing controls in Java.
  • Impart hands on experience with java programming.

Course Overview

This subject aims to introduce students to the Java programming language. Upon successful completion of this subject, students should be able to create Java programs that leverage the object-oriented features of the Java language, such as encapsulation, inheritance and polymorphism; use data types, arrays and other data collections; implement error-handling techniques using exception handling, create and event-driven GUI using Swing components.

Course Outcomes

  • Understand the principles and practice of object oriented analysis and design in the construction of robust, maintainable programs which satisfy their requirements
  • Design, write, compile, test and execute straightforward programs using a high level language
  • Implement, compile, test and run Java programs comprising more than one class, to address a particular software problem
  • Demonstrate the ability to use simple data structures like arrays in a Java program
  • Make use of members of classes found in the Java API (such as the Math class)
Show More

Even Semester

Courses for this semester

Course Overview

This course covers all details of application software selection and installation, hardware and software upgrades, planning and testing for hardware and software upgrades. It includes LAN utilities software, and network interconnections. At least one leading LAN system will be used as a class and laboratory example.

Course Outcomes

  • Prepare for the installation of Windows 2000 Server. Perform an attended installation and an unattended installation of Windows 2000 Server.
  • Identify the various types of Windows 2000 file systems and their components, and perform common disk management tasks.
  • Configure NTFS security and configure security for shared folders. Create Dfs roots and links.
  • Create and administer various types of user accounts and group accounts. Administer group policies, and manage group policy objects.
  • Identify network protocols and services supported by Windows 2000 Server. Configure TCP/IP, DHCP, WINS, and DNS.

Course Overview

Ethical hacking course involves the study of an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.

Course Outcomes

  • Understand the basics of ethical hacking
  • Elaborate on the hacking methodology
  • Demonstrate the hacking process on different platforms
  • Illustrate the various application of attacks on different wireless platforms
  • Create formal reports for the security attacks launched

Course Overview

This course covers all the fundamental knowledge required to operate Data center Networks which consist of Cisco devices, Standard, and Cisco preparatory Data center technologies. Cisco Data center Networking Fundamentals Course Covers Networking, Network Virtualization, Switch Virtualization, and Machine Virtualization technologies and the protocols. This course not only helps students to be prepared for the Cisco Data center exams but also provides a very broad level of knowledge on Cisco Data center Fundamentals technologies.

Course Outcomes

  • Introduction to data centers data center types, sizes, and priorities
  • Data Center types & sizes
  • Summarized history of technology
  • Differing priorities of data centers, from financial to search engines to blockchain
  • Supporting equipment, systems, and controls

Course Overview

This course introduces the basic ideas of computing, networking, communications, security, and virtualization, and will provide the students with an important foundation .

Course Outcomes

  • Identify SDDC using VMware products.
  • Understand Fault tolerance and High availability for the Virtual machines
  • Identify Secure Virtual environment in VMware NSX
  • Learn Optimization and monitoring in VMware NSX
  • Implement Monitor key storage performance metrics

Course Overview

This course provides an introduction to computer and network security. Students successfully completing this course will be able to evaluate works in academic and commercial security, and will have rudimentary skills in security research. The course begins with a tutorial of the basic elements of cryptography, cryptanalysis, and systems security, and continues by covering a number of seminal papers and monographs in a wide range of security areas.

Course Outcomes

  • Describe the importance of intrusion detection and Network attacks inside and outside the network.
  • Classify the sources of vulnerabilities and security threats motives
  • Learn the importance of Database security in the Internet architecture
  • Learn about virtual private network in real time projects
  • Define importance of managing the network security.

Course Overview

Cybercrime poses serious economic and security threats to individuals, businesses, and governments. Cyberattacks have continued to increase in quantity as well as sophistication. In this course students will develop a solid understanding of the most common types of attacks used in cybercrime and cyberwarfare. Each session will begin with a lecture covering the basics of an area of technology and how that technology has been misused in the past followed by lab classes, where with the guidance of the instructor and assistants, students will learn and practice various techniques and tools for hacking into insecure systems. By learning about some of the most popular hacking techniques, students will develop an understanding of how to prevent them.

Course Outcomes

  • An insider perspective on cyber security
  • The most common cyber attacks
  • Hacking tools and techniques
  • The importance of cyber security
  • practice hacking into insecure systems

Course Overview

The new lab will give students a comprehensive way to build and manage a Windows Server 2022 server environment and explore how these core technologies can help organizations be more efficient, agile, and cost-effective.

Course Outcomes

  • Installing Windows Server 2022, Perform Post-Install Tasks
  • Setting up your first DC
  • Installing WAC and Joining a Workstation to the Domain
  • Building Trusts between Forests ,Network Key Concepts
  • Manging AD DS Objects

Course Overview

Encryption algorithms all do the same job but can do it in very different ways. However, some features can be found across multiple families of crypto systems. This course discusses some of the mathematical operations and structural design elements that can be found in many different cryptographic algorithms.

Course Outcomes

  • Explain the objectives of information security
  • Explain the importance and application of each of confidentiality, integrity, authentication and availability
  • Understand various cryptographic algorithms
  • Discuss Web security and Firewalls
  • Describe the enhancements made to IPv4 by IPSec
Show More

Odd Semester

Courses for this semester

Course Overview

This course introduces the basics of cloud computing and Azure, and how to get started with Azure's subscriptions and accounts.

Course Outcomes

  • Describe the basic concepts of cloud computing.
  • Determine whether Azure is the right solution for your business needs.
  • Differentiate between the different methods of creating an Azure subscription.
  • Describe the basic concepts used in Azure
  • Implement Azure account

Course Overview

This course helps to implement Azure, and teach how to get started with Azure's subscriptions and accounts.

Course Outcomes

  • Implement basic concepts of cloud computing.
  • Implement Azure as the right solution for business needs.
  • Apply different components for azure
  • Implement different methods of creating an Azure subscription.
Show More

Even Semester

Courses for this semester

Course Overview

ITIL is a library of best practices for managing IT services and improving IT support and service levels. One of the main goals of ITIL is to ensure that IT services align with business objectives, even as business objectives change. ITIL stands for Information Technology Infrastructure Library.

Course Outcomes

  • To help students understand the need for ITIL.
  • ITIL-compatible tools offer better integration, interaction and compatibility with your global partners, and in addition, sticking to strict ITIL standards from a single vendor can help process integrations go seamlessly and ensure all parties are speaking the same technical language.
  • It is always an advantage to understand what types of ITIL tools your global partners are working with and how they rate them.
  • ITIL frameworks provide a homogenous IT environment and eases interactions with other global companies using similar preapproved tools. Managing staff, providing services to customers and creating efficiencies for less money can be daunting tasks for any IT organization.
  • ITIL Service strategy aids in the development of strategic assets that bring value to the business by guiding the whole Service Design, Service Transition, and Service Operation processes in a logical and consistent manner for efficient service operations.

Course Overview

ITIL-compatible tools offer better integration, interaction and compatibility with your global partners, and in addition, sticking to strict ITIL standards from a single vendor can help process integrations go seamlessly and ensure all parties are speaking the same technical language. It is always an advantage to understand what types of ITIL tools your global partners are working with and how they rate them. ITIL frameworks provide a homogenous IT environment and eases interactions with other global companies using similar preapproved tools. Managing staff, providing services to customers and creating efficiencies for less money can be daunting tasks for any IT organization.

Course Outcomes

  • To help students understand the need for governance in information security.
  • To make it possible for students to learn how important concepts of IT governance is integrated with information security.
  • To facilitate students to learn key frameworks used in information security and risk management and need for a metrics-based approach for effective information security.
  • Explain how security is integrated with IT governance.
  • Justify the need for using standard frameworks in establishing a robust information security and risk management.
Show More

Common Scholarship Test

Apply Scholarship through CST

CST- Common scholarship test is a national and international level online MCQ based examination funded for intellectual empowerment by Assam down town University.

CST- Maximum enrolment each year is 269 seats and any 10+2 students can apply. Adtu is northeast India’s first placement driven university to provide 100% scholarship benefits worth 35 cr.

CST aims to inspire brilliant and competent students to pursue further education. Accredited with a prestigious grade by NAAC, UGC and AICTE.

Apply Scholarship Through

Explore more scholarships that can help you reach out your goal with financial aid.

This scholarship is valid on the basis of the board/university examination

95% & above 100% Scholarship on all semester
90%-94.9% 50% Scholarship on all semester
80%-89.9% 25% Scholarship on all semester

This scholarship is valid on the basis of the board/university exam

National & International Level 100% Scholarship on all semester
State Level 50% Scholarship on all semester
District Level 25% Scholarship on all semester

This scholarship is valid on the basis of the board/university exam

National & International Level 100% Scholarship on all semester
State Level 50% Scholarship on all semester
District Level & NCC Certificate Holder 25% Scholarship on all semester

A 50% scholarship on total semester fees is provided to all specially abled students.

A 100% scholarship on the last semester fee is provided to all the alumni of Assam down town University.

A 100% scholarship on total semester fee for Economically Backward Classes

Campus Life

Our Facilities

World Class Facilities

Discover a multitude of world-class amenities and cutting-edge resources at Assam down town University, enhancing your academic journey to new heights.

Some of our Facilities
  • Gym
  • ATM
  • Sports
  • Hostels
  • Transport
  • Healthcare
  • Yoga Center
  • Media Centre
  • Swimming Pool
  • Central Library
  • Canteen & Cafeterias
  • ICT Enabled Classrooms
  • Well Equipped Laboratories
  • Auditorium & Seminar Halls

Start-Up &
Incubation Centre

The Start-Up & Incubation Centre at Assam down town University provides a supportive environment for young entrepreneurs to develop and grow their business ideas. The center provides mentorship, funding, and networking opportunities to help innovative ideas become successful businesses.

Rural Empowerment with SFURTI scheme

SFURTI scheme to support rural entrepreneurs and innovators, an initiative by the Ministry of MSME

TIDE 2.0 scheme for ICT-based startups

TIDE 2.0 scheme for ICT-based startups which provides a grant of Rs. 4L and Rs. 7L under EiR and Grant categories respectively, an initiative by the Ministry of MeitY.

dtVL Ideation interest-free loans up to Rs. 2 lakhs.

dtVL Ideation, an incubation program for early-stage entrepreneurs with a market-ready solution/product, offering interest-free loans up to Rs. 2 lakhs.

Innovation with Sprout UP program

Sprout UP, an incubation program for students, faculties, and researchers with innovative business ideas, prototypes, or technology solutions.

Icons Images
Job Creation
Icons Images
Support Start Ups
Icons Images
Govt and MSME Collaboration
Icons Images
International Tie-ups

Top Recruiters

What our Students say

Kailash Timsina
Student

"I am a BBA student of 3rd semester. I hail from Bhutan. I vow that I am having a great experience i...

Juliush Mushahary
Student

"AdtU is amazing. I am a BBA student of 2019-22 batch and I am just grateful for the amount of oppor...

Reshi Prasad Pokhrel
Student

Let us be grateful to the people and place who makes us happy. They are the charming gardeners whom ...

Debapriya Paul
Student

Currently I am pursuing MBA in Assam Down Town University. MBA is the professional course through wh...

Priti Jain
Student

AdtU is a university that focuses on giving knowledge, education and simultaneously making the stude...

Madhurya Bujar Barua
Student

The Assam downtown University has been a great learning experience. The university has provided me w...

Naeem Hussain
Student

My experience with AdtU has been splendid one indeed. Little needs to said about its scenic infrastr...

Dr Dipanjali Hazarika
Student

As a student I am very glad that I have got an opportunity to study here in Assam downtown universi...

Sakhyajit Roy
Student

My name is Sakhyajit Roy. I?m from Tripura. I joined the university on Auguest, 2017 as a student of...

Runi Bharadwaj
Student

I share immense pleasure to share my post graduate program experience in Assam down town University....

Jenifer Dhar
Student

AdtU is a platform where I got golden opportunities to feed my zeal for knowledge through the dynami...

Salehah Hussain Uthman
Student

I am fortunate to get an opportunity to study here in Assam Downtown University. The best thing abou...

Nisha Nirola
Student

Our university is one of the best place for developing ourselves in the field of research and acedem...

Liangsi Hallam
Student

ADTU is a university that is very good interms of infrastructure, academics and placements. Our tea...

Anushmita Kashyap
Student

It is one of best private colleges in North East India, it also provides a good environment for ed...

Dasanibha Mawphlang
Student

ADTU is a good University which provides the students with best quality lectures and ensures comfort...

Farhin zakia
Student

The environment of Assam downtown university is very pleasant.The department of BMLT is very good a...

Anamika Das
Student

The university has all the necessary facilities and amenities for students . The classrooms and the ...

Susmita Sinha
Student

Assam downtown University is well recognised all over india. In the ongoing pandemic situation it ha...

Alumni of the Month

Get Free Counselling Now