Add-On Programs
B.Tech – CSE (Cyber Security)
Securing the Digital World — One System at a Time
The Cyber Security programme at BRIL is strengthened through add-on training that addresses current security challenges, threat intelligence, and ethical hacking practices. Students learn to think like attackers so they can defend like experts.
Add-On Programmes
Ethical Hacking & Penetration Testing
Structured training in offensive security techniques used by certified ethical hackers and red teams.
- Reconnaissance & Footprinting
- Exploitation using Metasploit
- Web Application Penetration Testing
- Kali Linux & Security Tools
Network Security & Firewall Configuration
Practical training in securing network infrastructure — a core requirement for security operations roles.
- Firewall Rules & IDS/IPS Configuration
- VPN & Secure Tunnelling
- Network Traffic Analysis (Wireshark)
- Zero Trust Architecture Basics
Cryptography & Secure Communication
Understanding the mathematical and practical foundations of data protection and secure protocols.
- Symmetric & Asymmetric Encryption
- PKI & Digital Certificates
- TLS/SSL Protocol Analysis
- Hashing & Message Authentication
Digital Forensics
Training in evidence collection, analysis, and incident investigation — skills valued in law enforcement, banking, and enterprise security.
- Disk & Memory Forensics
- Log Analysis & Timeline Reconstruction
- Autopsy & Forensic Tools
- Chain of Custody & Legal Aspects
Security Information & Event Management (SIEM)
Hands-on exposure to the monitoring platforms used in Security Operations Centres (SOC) across enterprises.
- Splunk & ELK Stack Basics
- Log Correlation & Alert Rules
- Incident Response Workflows
Vulnerability Assessment & Risk Analysis
Systematic identification and prioritisation of security weaknesses in systems and applications.
- Nessus & OpenVAS Scanning
- OWASP Top 10 Vulnerabilities
- Risk Scoring & Remediation Planning
Placement Impact
Outcome
Students develop the capabilities to secure digital systems, identify vulnerabilities, and respond to cyber threats effectively — in a field where demand consistently outpaces supply.