ABOUT THE SCHOOL
THE FACULTY
RESEARCH STAFF
ADMINISTRATIVE OFFICES
VISITING, ADJUNCT AND EMERITUS RESOURCE FACULTY
PROGRAMMES & COURSE OBJECTIVES
BOARD OF STUDIES
RESEARCH
RESEARCH BENCH
RESEARCH PROJECTS
PARTNERSHIP & SERVICES
CERTIFICATE PROGRAMMES
STUDENT DEVELOPMENT CELL
STUDENT COUNSELLOR
1ST YEAR BATCH COORDINATORS
INTERNSHIP
PLACEMENT
SCHOOL OF INFORMATION TECHNOLOGY, ARTIFICIAL INTELLIGENCE AND CYBER SECURITY
(SITAICS)
Centre for Geoinformatics
Centre for Geoinformatics addresses the demands of national security missions. Government agencies can assess hazards and vulnerabilities to vital infrastructure and the populace using Geoinformatics technology. Major components of geoinformatics are Geographic information system, Remote sensing technology, global navigation satellite system, photogrammetry, geodesy, cartography and computer science. The primary functions of the centre are:
- Create applications to manage and mitigate issues of resource and management for several law enforcement teams
- Proposing research with the indigenous resources that can be used in reconnaissance and surveillance
- Capacity building for those who opt to work in geoinformatics, including land use management, military, crime analysis, transport network planning and management, agriculture, location planning, and other remote sensing applications.
Research Centre for Applied Cryptology
Research Centre for Applied Cryptology (RCAC) aims to promote interdisciplinary research activities in the field of Cryptology, Network Security, Computer Science, Mathematics and Statistics. Further, this centre provides teaching and training activities in the field of Cryptology and Network Security. RCAC offers short-term and long-term certificate courses on Cryptology and relevant areas for Government and Non-Government officials. It acts as a centre point of research, training, and teaching activities in all related fields. Moreover, RCAC organizes a series of lectures and workshops in the related area of Cryptology on a time to time basis. RCAC acts as a national centre of excellence for cryptographic solutions, state-of-the-art research and also promotes atma nirbharta in the relevant areas. RCAC offers fundamental and advanced courses in Cryptology and other relevant topics to the UG and PG students of any national institute. The centre also offers PhD program in Cryptology and in other relevant areas.
RCAC aspires to produce highly trained and talented researchers, developers and experts with non-linear thinking in the relevant areas of Cryptology who can fulfill the growing security and privacy demands in the national and international arena.
Vision
To contribute to the security requirements by developing, delivering and conducting research in the fields of cyberworld & digital forensics in order to protect critical IT infrastructure and build National Security; To be the number one Technological Institution, which encompasses Education, Research and Training; To nurture technologically empowered & enabled professionals that may contribute to the Internal and External Security of the Nation through valuable knowledge and by developing, delivering and conducting research in the fields of emerging technologies in cyber world & digital forensics; To transform our students into promising professionals, innovators and researchers who would carry forward the spirit of scientific thinking to address global challenges and provide solutions to real world complexities by integrating education and research.
Mission
To provide a world class infrastructure where innovation and research flourish and an ambience where intellectual capability stimulates. To transform our campus into a knowledge hub and a repository of data by collaborating with academic and research institutions, industries and communities in the country and across the globe. Build an excellent platform to transfer knowledge, impart education focusing on practical dimensions and inculcate ethical values & high morals amongst students.
To nurture talent aspiring to be visionary that can address unresolved problems and complexities of the world.
To collaborate with academia, research organizations & industry.
About Internship:
- Internships are invaluable opportunities for students to gain practical experience, develop essential skills, explore career options, and prepare for successful careers in their chosen fields. They are a critical component of the educational journey and can have a lasting impact on students’ lives and future career trajectories.
- Internships offer students the chance to apply theoretical knowledge gained in the classroom to real-world situations. This hands-on experience helps solidify concepts and deepen understanding in their field of study.
- Internships also serves as a bridge between academic life and the professional world, helping students make a smooth transition into their careers after graduation. Many internships lead to full-time job offers, and even if they don’t, the experience gained is highly beneficial for future job searches.
Internships Duration & Timeline:
Generally, students of Graduates & Post Graduates undergo summer internships, Winter internships during the semester breaks and during their last semester they undergo six months full time internships.
To encourage students to undergo internships, the University/School has rolled out the Extended Internship Programme (EIP) to do the internship during ongoing semester in addition to the regular internships breaks. The purpose of this extended internship programme is to gain worthwhile experience or to secure a job at the end of the internship or if it is an important internship under a prestigious organization. By utilising this programme students have shown their excellence in their domain and worked with many reputed government agencies/organizations and the multi giant corporates.
Organisations such as DRDO, MHA, CDAC, Corporates in India & Multinational, Cyber/IT Start-Ups, Cyber Crime Cells of State Police Forces to name a few.
About School of Information Technology, Artificial Intelligence and Cyber Security
The School of Information Technology, Artificial Intelligence and Cyber Security, offers an atmosphere for students to learn and carry out research. The well thought out curriculum requires the students to take up a broad spectrum of courses while simultaneously allowing them to emphasize on desired areas of specialization. The School aims to integrate education and research in order to cater to the real world complexities and provide solutions to the world’s challenges by building up the capacity and capability of the generations to come.
News Bulletin
Programmes & Course Objectives
- This course in Computer Science & Engineering with specialization “Cyber Security” will help in fulfilling the particular objective of this University to create trained, effective and efficient manpower which can help in the various sectors of Internal Security in India.
- Information Technology and Cyber security are emerging areas in the field of Computer Science & Engineering. Information Technology is the application of computers to store, study, retrieve, transmit, and manipulate data, or information, often in the context of a business or other enterprise which are under threat of technology crimes with advancement of new technology and use of technologies in daily life.
- Cyber security offers a solution which comprises processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cyber security and physical security.
- This program will offer many areas for specialization including securing network and allied infrastructure, securing applications, penetration testing, forensic investigation, digital forensics science etc.
- For more information: Click here
- M.Tech. Cyber Security is a 2 year full-time degree course that prepares students for leadership roles in the private sector, as well as government and military organizations, by providing technical expertise and contextual information.
- The curriculum includes Reverse Engineering, Vulnerability Assessment and Penetration Testing (VAPT), Cyber Forensics, Malware Analysis, the ethical, legal, and economic framework of cybersecurity. In addition, Students can also choose from a range of electives, including Wireless Security, Multimedia Security, and Information assurance.
Graduates of the program will be able to:
- Understand the vulnerabilities found in the network or in software, as well as how to prevent and protect against them;
- Recognize the most critical cybersecurity challenges;
- Define the method and policy that an enterprise would require to reduce cyber threats to a manageable level.
- For more information: Click here
- It is a course covering foundational concepts through hands-on learning of leading analytical tools. The program is a blend of Artificial Intelligence and machine learning, business analytics and visualization with the application of advanced analytics models for artificial intelligence, deep learning and cognitive computing.
- This course seeks to present you with a wide range of data analytic techniques and is structured around the broad contours of the different types of data analytics, namely, descriptive, inferential, predictive, and prescriptive analytics. Candidates will not only acquire theoretical knowledge of data science tools, but will also gain exposure to business perspectives and industry best practices through case studies, in-class projects, a live capstone project, hackathons, guest lectures and industry mentorship sessions.
- For more information: Click here
- M.Sc. in Digital Forensics is a 2-year full-time master’s degree course that prepares students for multiple roles in the private sector, as well as government and military organizations, by teaching processes and methods that are proven and tested in the field.
- Students are introduced to the advanced tools and techniques which are put into use to track Cyber Crime, find digital Forensic evidence and learn about advanced processes and methods involved. This course exposes students to not only technical aspects but legal aspects related to I.T. which is essential for digital investigators working on real-time cases.
- After studying this course, the students will have a wide range of opportunities in the vast arena of the cyber world both nationally as well as internationally. There are employment prospects in the areas of network security, digital forensics, cybersecurity, computer system security, Security Auditor and much more both in governmental organizations as well as in the private sector.
- For more information: Click here
- Post Graduate Diploma in Cyber Security & Digital Forensics is a 1-year full-time certificate course that prepares students for multiple roles in the private sector, as well as government and military organizations, by teaching processes and methods that are proven and tested in the field.
- Students are introduced to the advanced tools and techniques which are put into use to track Cyber Crime, find digital Forensic evidence and learn about advanced processes and methods involved. This certificate course exposes students to not only technical aspects but legal aspects related to I.T. which is essential for digital investigators working on real-time cases.
- After studying this course, the students will have a wide range of opportunities in the vast arena of the cyber world both nationally as well as internationally. There are employment prospects in the areas of network security, digital forensics, cybersecurity, computer system security, Security Auditor and much more both in governmental organizations as well as in the private sector.
- For more information: Click here
Faculty
Certificate Programmes
- Bharat CISO
- National Cyber Security Scholar Program
- OSINT Analysis
- Social Media Analysis
- GIS
- Web Development
- Full Stack Development
- CCNA
- CCNP
- CEH
- Certification Partner with AWS, RHEL and others
- Social Media Analytics & Threat Mitigation
- Essentials of Cyber Crime & Digital Forensics
- Smartphone Forensics & Evidence Collection
- Cyber Incident Response & Data Acquisition
- Artificial Intelligence, Vulnerability Assessment & Risk Management
- Multimedia Forensics for New Age Crimes
- Malware Exploits & Incident Handling
- Video database system
1st year Batch Coordinators
Sr. No | Name of Programme | Name of Coordinators | Email Id | Contact No. |
---|---|---|---|---|
1 | B.Tech. in Computer science and Engineering with Specialization in Cyber Security | Dr. Himanshu Patel | himanshu.patel@rru.ac.in | 9925715472 |
2 | M.Tech. in Cyber Security | Ms. Aakansha Saxena | aakansha.saxena@rru.ac.in | 7016668183 |
3 | M.Tech in Data Science and Machine Learning | Dr. Brijesh Kumar Sinha | brijeshkumar.sinha@rru.ac.in | 9450774911 |
4 | M.Sc. In Cyber Security and Digital Forensics/ Post Graduate Diploma in Cyber Security and Digital Forensics | Mr. Dhaval Deshkar | dhaval.deshkar@rru.ac.In | 6357436762 |
Student Counsellor
Mr. Raunak Kishore Sinhaa Course: BTech CSE 2022-26 22bcscs055@student.rru.ac.in |
Ms. Rohini Singh Course: BTech CSE 2021-2025 21bcscs026@student.rru.ac.in |
Ms. Prachi Verma Course: Msc CS & DF 2023-2025 23mcsdf018@student.rru.ac.in |
Mr. Harshwardhan Dhananjayrao Shingare Course: Msc CS & DF 2023-2025 23mcsdf038@student.rru.ac.in |
Mr. Vedantgiri Gosai Course: M.Tech CS 2023-2025 23mcscs002@student.rru.ac.in |
Administrative Office
Mr. Keyur Shah Head ICTB |
Mr. Sagar Sorathiya System Administrator |
Mr. Akash Raval IT Support Executive |
Mr. Dushyant Atram Manager-SITAICS |
Ms. Khushali Patel Executive-SITAICS |
Mr. Pratik Parmar Office Assistant |
Mr. Kiran Office Assistant |
Mr. Amit Desai Office Assistant |
Mr. Dipak Chavada Office Assistant |
Board of Studies
Academia & Industry
- Prof (Dr) Amit Ganatra, Vice Chancellor (Provost), Parul University
- Prof (Dr) Dhanya Pramod, Dean – Faculty of Computer Science & Director – Symbiosis Centre for Information Technology
- Prof (Dr) N J Kothari, Professor, Department of EC Engineering, DDU, Nadiad
- Mr Rajmohan R, Head – Information Security and IT Infrastructure, Titan Company Ltd
- Mr Indukuri Krishna, Security Risk and Compliance Consultant, Amazon Web Services
- Mr Samir Datt, CEO & Founder, Forensicsguru.com
- Mr Navaneetham M, Senior Vice President & Chief Information Security Officer(CISO) & Head of IT at PayU
- Dr Priyanka Sharma, Vice President Projects-Artificial Intelligence, Samyak Infotech Pvt. Ltd
- Lt Col (Dr.) Santosh Khadsare, Vice President- Digital Forensics and Incident Response at eSec Forte Technologies
- Col Nidhish Bhatnagar, Chief Mentor, School of Information Technology, Artificial Intelligence and Cyber Security Rashtriya Raksha University
- Dr. Jatin Patel, Director I/c, School of Information Technology, Artificial Intelligence and Cyber Security
Eminent Speakers
Visiting, Adjunct and Emeritus Resource Faculty
Dr. Chintan Patel Visiting Faculty (Asst. Prof) |
- Col (Dr) Milan Pattnaik, Adjunct Faculty
- Col (Dr) Santosh Khadsare, Adjunct Faculty
Partenship and Services
Aarogya Setu
Makers Lab
Indian Army
ISAC
Cyberlaws.Net
CybExer Technologies
Headquarters Integrated Defence Staff
IIT Madras, Pravartak Technologies Foundation
MCTE
NSG
SVNIT
TECH MAHINDRA
Aarogya Setu | Makers Lab |
Indian Army | ISAC |
Cyberlaws.Net | CybExer Technologies |
Headquarters Integrated Defence Staff | IIT Madras, Pravartak Technologies Foundation |
MCTE | NSG |
SVNIT | TECH MAHINDRA |
UPCOMING EVENTS
Tools and Technology
Cyber Forensics Tools:
1. Paraben’s Electronic Evidence Examiner::Drive Acquisition Network Monitoring Volatile Data Acquisition Telnet Network Searching Client Snapshot P2 Navigator Reporting.
2. X-Ways Forensic Investigator: :Disk Editor, File Editor, RAM EditorDirectory Browser for FAT, NTFS, Ext2/Ext3, ReiserFS, CDFS/ISO9660, UDFDisk Cloning/Disk Imaging under DOS and Window Data Recovery Partition Recovery/Boot Record Recovery Hard Drive Cleansing/Disk Wiping Capturing Data Analysis Checksums, CRC16, CRC32, MD5, SHA-1, SHA-256, PSCHF.
3. Belkasoft Evidence Center:Mobile and Computer Acquisition.Mobile and Computer Device Examination, Smart and Comprehensive Analysis, Powerful Carving, Native SQLite Parsing, Live Ram Analysis, Remote Acquisition.
4. Nessus Professional: Compatibility with computers and servers of all sizes.Detection of security holes in local or remote hosts.Detection of missing security updates and patches.Simulated attacks to pinpoint vulnerabilities.Execution of security tests in a contained environment.Scheduled security audits.
5. COM-SUR CCTV Video footage Auditing Software: CCTV Video Footage Analysis Software .
6. Passware-Kit Forensic:Recover File, Password Find, Encrypted files Memory Analysis, Internet And Network Analysis, Standalone System, Full Disc Encryption Mobile and Cloud Windows Password Find.
Cyber Forensics Tools (Being Procured)
1. UFED Ultimate – Cellebrite – 4PC2. EnCase
3. Forensic Falcon
4. Blackbag Analyst Solution
5. Paladion’s Threat Anticipation Service
6. X1 Social Discovery
7. Intella Pro
8. Advik CDR analyzer
Cyber Forensic Workstation:
Intel(R) Core(TM) i7-7700 CPU @ 3.60GHz, 32 GB DDR4 SD RAM PC4-19207,4 Gb NVDIA Graphics Card,4 TB HDD, An integrated Write-Blocked Forensic Bridge, With USB 3.0, SATA, IDE, SAS and FireWire Connections, Supports IDE, SATA and Notebook drives, A Multi-Piece Toolkit to assist inDigital Evidence Collection
State of the Art Laboratories
General Computer Programming Lab (GCPL):
This lab helps to understand the basic terminology used in computer programming by using different data types in a computer program. Students can also design programs involving decision structures, loops and functions. Students can perform various practicals of different programming language like C, C++, JAVA. HTML, Python, PHP, etc.
REVERSE ENGINEERING AND MALWARE ANALYSIS:
REMA lab provides hands-on experience in reverse engineering and malware analysis. In this lab, students learn various techniques and tools to perform reverse engineering and malware analysis to identify the behaviour and capabilities of malicious software.
Objectives:
- Familiarize with the basic concepts of reverse engineering and malware analysis.
- Develop skills in using different tools and techniques for reverse engineering and malware analysis.
- Analyse malware samples to understand their behaviour and potential impacts.
This lab will provide a foundation for future work in the field of information security and malware analysis domain.
Vulnerability Assessment and Penetration Testing (VAPT) Lab:
VAPT is a systematic and simulated process of evaluating the security of a computer system or network. The objective of VAPT is to identify and quantify the potential vulnerabilities and security threats that could be exploited by an attacker.
Objectives:
- Familiarize yourself with the basic concepts of vulnerability assessment and penetration testing.
- Develop your skills in using various tools and techniques for vulnerability assessment and penetration testing.
- Assess the security of a simulated network environment and identify potential vulnerabilities and threats.
- Perform penetration testing to validate the presence of vulnerabilities and quantify their potential impact.
This lab gives hands-on experience in vulnerability assessment and penetration testing. Students will learn how to use various tools and techniques to identify and quantify security risks in a network environment.
Network Lab:
Network Security Lab is to conduct basic and applied research in the security of critical networks and network components. The network environment used to test and develop network configurations and solutions. The laboratory provides a safe and controlled environment to experiment with network designs and configurations, troubleshoot network and security issues, and develop new skills. Students performing various practical’s in the areas of network scanning, network and systems reliability, robust protocol design, peer-to-peer systems; mobile and wireless systems, high-performance, scalable cluster-based systems; the measurement of deployed, wide-area systems, such as the Web and content distribution networks; pervasive computing; cloud computing; and virtual machine technology.
Digital Forensics Lab Introduction :
A digital forensics lab is a specialized laboratory used for the examination and analysis of digital evidence in support of legal or criminal investigations. The lab provides a controlled environment for the preservation, collection, analysis, and presentation of digital evidence.
Components of a Digital Forensics Lab:
Forensic Workstations: Forensic workstations are specialized computers used for the examination and analysis of digital evidence. They are equipped with forensic software and hardware tools.
Storage Devices: Storage devices, such as hard drives and flash drives, are used to store digital evidence and to preserve the integrity of the evidence.
Forensic Imaging Devices: Forensic imaging devices are used to create a forensically sound copy of digital evidence.
Network Analyzers: Network analyzers are used to examine and analyze network traffic and to recover data from network devices.
Mobile Device Analyzers: Mobile device analyzers are used to examine and analyze mobile devices, such as smartphones and tablets, and to recover data from them.
Advantages of a Digital Forensics Lab:
Controlled Environment: The lab provides a controlled environment for the examination and analysis of digital evidence, ensuring the preservation of the evidence’s integrity.
Specialized Tools and Software: The lab is equipped with specialized tools and software for the examination and analysis of digital evidence, providing the ability to recover and analyze data from a variety of sources.
Expertise: The lab is staffed by trained and experienced digital forensics professionals, providing expert analysis and interpretation of digital evidence.
Reliable Evidence: The examination and analysis of digital evidence in a digital forensics lab provides reliable evidence that can be used in legal or criminal investigations.
IoT and Wireless Security Lab:
With an aim to create an IoT Ecosystem for research oriented experimental analysis and solution designs for security and privacy challenges, the IoT and Wireless Security Lab collaborates with Industries, academic institutions and researchers around the world. This Lab enables research activities in different application areas like smart home, smart village, smart healthcare, smart grid, smart agriculture, industry 4.0 and wearable IoT devices, wireless network security, mobile communications, lightweight cryptography protocol designing, privacy preservation using Blockchain, secure fog and edge computing etc.
AI LAB:
AI Lab is an advanced research lab focused on Artificial Intelligence and its applications in various industries. The goal of the lab is to develop innovative AI solutions that can solve real-world problems and make a positive impact on society.
At AI Lab, researchers work on cutting-edge AI technologies such as machine learning, deep learning, computer vision, and natural language processing. They explore the potential of AI to revolutionize industries like healthcare, finance, education, and more. The lab also fosters collaboration between academia, industry, and government, promoting the transfer of research findings into practical applications.
The research projects at AI Lab range from developing new AI algorithms to addressing complex societal challenges. For example, the lab might work on a project to improve medical diagnosis through the use of AI, or another project to make financial services more accessible to underserved communities using AI. The lab also conducts basic research aimed at advancing the field of AI and its underlying theory.
The AI Lab is equipped with state-of-the-art computing infrastructure, including high-performance computing systems, data storage and management systems, and specialized software tools. The lab also has access to large data sets, which are essential for training and evaluating AI models.
AI Lab is a leading research institution dedicated to advancing the field of Artificial Intelligence and its applications. Its focus on innovation, collaboration, and impact make it a valuable player in the AI research community and a potential partner for organizations seeking to leverage AI for positive change.
Academic Programme
- B.Tech. in CS&E with specialization in Cyber Security.
- M.Tech. in Cyber Security.
- M.Tech. in Artificial Intelligence and Machine Learning.
- M.Sc. in Digital Forensics.
- Post Graduate Diploma in Cyber Security and Cyber Forensics.
- Post Graduate Diploma in Security Communication & Technology.
Student Development Cell
Students Development Cell is an epitome of knowledge sharing at SITAICS, for students and faculty interested in innovation and technologies. Students from all programs with an interest in growing as a reformer are being nurtured here through round-the-clock activities in association with professional bodies. By joining this cell, students grow their knowledge in a peer-to-peer learning environment and build solutions by their creativity, leadership quality, add-on skills, civic virtues.
Core Committee:
- Col. Nidhish Bhatnagar, Chief Mentor – SITAICS
- Dr. Jatin Patel, Director I/C -SITAICS
- Administrative Office, SITAICS
List of Clubs:
S No | Club Name | Faculty Mentor |
---|---|---|
1 | Developers Student Club | Dr. Jatin Patel |
2 | The Cyber Alliance (TCA) | Mr. Vivek Joshi |
3 | AI Forum | Mr. Pradip Rusiya |
4 | Speak to Lead!! | Ms. Aakansha Saxena |
5 | Full Stack Development Club | Mr. Ashish Revar |
6 | Cyber Forensics Club | Dr. Akash Thakar |
7 | Drone Club | Dr. Himanshu Patel |
8 | Outdoor Activities Club | Mr. Prasann Barot |
RESEARCH BENCH
The idea of Research Bench is to create a group of people to carry out the research in the emerging fields of Science & Technology. This gives the platform to students as well as faculty members to find solutions for the existing modern age challenges, gain in depth knowledge about a specific field, enhance their skill sets and develop a “Build & Learn” Culture.
RESEARCH BENCH 1:
Further to the MoU between RRU and Maker’s Lab- The Research, Development & Innovation Hub of Tech Mahindra, this Research Bench 1 is established to work on mutually beneficial areas of IoT, Robotics, AI, ML, VR and Algorithms…. It comprises of 1 Faculty Member and 7 students from B.Tech and M.Tech Programs. Currently, these students are doing 3-month internship with Maker’s Lab.
FAQs
1. What is SITAICS? |
SITAICS is a School of Information Technology, Artificial Intelligence and Cyber Security running technical courses in the field of cyber security and cyber forensics. It is affiliated to Rashtriya Raksha University. For more details please refer link: http://rru.ac.in/school-of-information-technology-and-cyber-security/. |
2. What is the status of SITAICS? Is it a university, a college affiliated to any recognized university or any private institute still seeking for recognition/affiliation? |
It is a School of Rashtriya Raksha University which is UGC recognized university. The university status has been conferred on it through a State Act of the Government of Gujarat. And soon it will become a university of national importance. |
3. How would I know it is recognized by UGC? |
The University Grants Commission (UGC) of the Government of India has notified the inclusion of RRU in the list of universities maintained by the UGC under Section of the UGC Act. For further information please refer the link: http://rru.ac.in/wp-content/uploads/2020/03/Raksha-Shakti-University-Act-New.pdf. |
4. Where is SITAICS located? |
Please note the full address: Rashtriya Raksha University, Lavad, Dahegam, Gandhinagar, 382305. |
5. Can I have details of all courses run by SITAICS? |
Yes, please refer link: http://rru.ac.in/school-of-information-technology-and-cyber-security/ Please feel free to write to on email ID: admisstion@rru.ac.in for any further information. |
6. What is the fee structure of all the courses/B.Tech.-CSE/M.Tech. CS/PGDICS&CF/PGDIPC&T/PGDIDS&ML/M.Sc.-DF run by SITAICS? |
Please refer link : http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf Please feel free to write to on email ID: admisstion@rru.ac.in for any further information. |
7. Am I eligible for a scholarship? |
Depends upon certain factors. You can check your eligibility here: http://rru.ac.in/wp-content/uploads/2020/03/scholarship15052017.pdf |
8. How seats are distributed for Gujarat and All India category admissions in B. Tech. CSE? |
60 seats shall be filed by Raksh Shakti University (All India Quota seats).More details refer link http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf |
9. When and how can I apply for B.Tech. CSE Admissions in SITAICS? |
40 seats shall be filed by Raksh Shakti University (All India Quota seats).More details refer link http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf |
10. When and how can I apply for M.Tech Admissions in SITAICS? |
60 seats shall be filed by Raksh Shakti University (All India Quota seats).More details refer link http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf |
11. I have passed my std. XII (10 + 2) examination with Physics, Chemistry and Mathematics (science stream) subjects in 2019 from a state board other than Gujarat State Higher Secondary Education Board. May I apply for B. Tech. CSE at SITAICS? |
You can apply in the All India Quota seats. 20 seats shall be filed by Raksh Shakti University (All India Quota seats). More details refer link http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf |
12. If I am awarded Letter Grade/performance indices/graded point average instead of percentage of marks/percentile in standard 12th mark sheet. Do I need to submit equivalency, separately? |
Yes |
13. How merit list is prepared for B. Tech. CSE admissions at SITAICS? |
60 seats shall be filed by Raksh Shakti University (All India Quota seats). The merit list shall be prepared for B. Tech.- CS (All India Quota seats) for the students who have qualified JEE main examination only with 50% marks in PCM, and if seats remain vacant than it shall be filled by the students who have not qualified JEE main examination but having a minimum of 60 % marks in PCM. More details refer link http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf |
14. How merit list is prepared for M. Tech. CS admissions at SITAICS? |
60 seats shall be filed by Raksh Shakti University (All India Quota seats). All seats of M.Tech.-CS (All India Quota seats) shall be filled by the merit of CGPA/Percentage-marks and preference shall be given to GATE qualified students. http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf |
15. How merit list is prepared for PGDICS&CF admissions at SITAICS? |
As per the RSU norms. Please refer link : http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf |
16. How to get admission in PGDICS&CF course? |
As per the RRU norms. Please refer link : http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf |
17. How to get admission in M.Sc. in Digital Forensics course? |
As per the RRU norms. Please refer link : http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf |
18. How merit list is prepared for PGDIPC&T Admissions at SITAICS? |
As per the RRU norms. Please refer link : http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf |
19. How merit list is prepared for PGDIDS&ML Admissions at SITAICS? |
As per the RRU norms. Please refer link : http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf |
20. Is there any possibility for an NRI candidate to apply for any course at SITAICS? |
Yes, You may refer Information brochure available on website. Please refer link : http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf |
21. Can I have details of faculties who are associated with SITAICS? |
Faculty details are available on: http://rru.ac.in/school-of-information-technology-and-cyber-security/. You may write to any faculty to his/her email id for further information. |
22. What is basic qualification of the faculties in SITAICS? |
Faculty details are available on: http://rru.ac.in/school-of-information-technology-and-cyber-security/. You may write to any faculty to his/her email id for further information. |
23. Can I do B. Tech. in CSE / M.Tech. in CS / PGDICS&CF / M.Sc. in Digital Forensics part time? |
No, we only offer full time courses. |
24. What are the technical activities conducted in your school? |
SITAICS is organizing seminar, workshop, expert talks, technical quiz and conference on regular interval during the semester/year. Students are also being motivated to participate in such technical event organized by other university or institutions. |
25. What is the minimum knowledge I need to have when I join your school? |
Basic knowledge of computer architecture and computer networking will surely help you to understand syllabus topics easily and effectively. |
26. What are minimum qualifications required in B. Tech. CSE program? |
40 seats (All India Quota seats) qualified as per 12th Pass in Science Stream with 50% of subjects Physics, Chemistry, Mathematics for the JEE Mains qualified candidates or 12th Pass in Science Stream with 60% of subjects Physics, Chemistry, Mathematics. For the admission, preference will be given to JEE Mains qualified candidates in merit list. More details refer link http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf |
27. What are minimum qualifications required in M.Tech. CSE program? |
40 seats (All India Quota seats) qualified as per Any Graduate in B.E./B.Tech. in CE/ IT/ EC/ ICT/Electronics with 60% or equivalent to 60% CGPA/CPI. For the admission, preference will be given to GATE qualified candidates in merit list. More details refer link http://rsuadmission.in/Images/Home/Brochure/RSU_Admission%20Brochure_2020.pdf |
28. What are minimum qualifications required in M.Sc. in Digital Forensics program? |
B.E./B.TECH. in Computer Engineering/ Technology or Computer Science and Engineering or Information Technology Engineering or Information and Communication technology or B.Sc. (IT/CS/Math/Electronics/ Forensic Science with computer forensics) or Bachelor of Computer Applications (BCA) or equivalent qualification from recognized University. |
29. What are minimum qualifications required in PGDICS&CF course? |
Post Graduate/Graduate in Science, Commerce, Computer, Engineering or any relevant Stream/ nominated candidates from central or state government, semi-governmental, including public sector undertakings, police/military/paramilitary, and security agencies. |
30. What are minimum qualifications required in PGDIPC&T course? |
Any graduate (BE/B.Tech/B.Sc./BCA) or post graduate (ME/M.Tech/M.Sc./MCA) With Physics, Electronics, EC, Computer Science, It Or Computer Applications / Nominated Candidates From Central Or State Government, Semi-Governmental, Including Public Sector Undertakings, Police/Military/Para-Military, Security Agencies. |
31. What are minimum qualifications required in PGDIDS&ML course? |
Any graduate (BE/B.Tech/B.Sc./BCA) Or post graduate (ME/M.Tech/M.Sc./MCA) With Physics, Electronics, EC, Computer Science, It Or Computer Applications/ Nominated Candidates From Central Or State Government, Semi-Governmental, Including Public Sector Undertakings, Police/Military/Para-Military, Security Agencies. |
32. How many seats available in M.Tech. CS program? |
University offers 40 seats in M.Tech. CS program. |
33. How many seats available in B.Tech. CSE program? |
University offers 40 seats in B.Tech. CSE program. |
34. How many seats available in M.Sc. in Digital Forensics program? |
University offers 20 seats in M. Sc. in Digital Forensics program. |
35. How many seats available in PGDICS&CF program? |
University offers 20 seats in PGDICS&CF Program. |
36. Which are the tools being taught in cyber security and cyber forensic? |
Paraben’s Electronic Evidence Examiner, X-Ways Forensic Investigator, Belkasoft Evidence Center, Nessus Professional, COM-SUR CCTV Video footage Auditing Software, Passware-Kit Forensic, Autopsy, FTK imager, Bulk Extractor, volatility, NirSoft, HxD, Password recovery toolkit, and many more open-source tools. Tools are being procured: UFED Ultimate – Cellebrite – 4PC, EnCase, Forensic Falcon, Blackbag Analyst Solution, Paladion’s Threat Anticipation Service, X1 Social Discovery, Intella Pro, Advik CDR analyzer and other open source tools. more details are available on this link http://rru.ac.in/school-of-information-technology-and-cyber-security/. |
37. How many laboratories available at SITAICS? |
SITAICS has enough number of laboratories with essential IT infrastructure for imparting practical knowledge in the field of cyber security and cyber forensics, programming, telecommunication and security gadgets etc., http://rru.ac.in/school-of-information-technology-and-cyber-security/. |
38. Do you provide Assistance in Internship/Training Program? |
Yes we provide assistance to students for getting Internship in various Public and Private Institutes/Companies. We also encourage and assist students to opt Summer Internship. |
39. In which companies students are going to get internship |
There are many sectors such, FSL, IT companies, Banks, Cyber Cell, Insurance Sector, Training Institutes, Universities and many Public and Private sectors. |
40. Who are Recruiters of SITAICS students? |
Detail about Our Prime recruiters are available at: http://rru.ac.in/school-of-information-technology-and-cyber-security/ |
41. What is average Salary package of students of SITAICS? |
The average salary package is 3.5 Lakhs/annum. |
42. What is the probability of getting government jobs? |
The probability of getting government jobs increases in Cyber security field but you need to pass through employment process. |
43. What would be the job opportunity after completion of this course? |
Our students may find meaningful employment in Cyber security related industries, communication and network security enterprises and IT industry and International Research Institutions. Their job profile will include: Information system security officer Network security administrator IT auditor, system security engineer Information an communication security specialist IT Security Analyst Information Governance officer Information assurance engineer Information assurance analyst Academician or research. |
44. Is school providing facility to clear competitive examination? |
There is dedicated Training and Placement Cell in the university which supports in all the way for the internship and placement. |
45. Has SITAICS a library facility? |
No, SITAICS has not separate library, but University has
library having more than 7000 books and online database. For
more details please refer link
Library Facilities |
Value Added and Certifications Programmes
Certified Ethical Hacker (CEH) Version 11
- CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures.
- It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks.
Research Projects
- The development of “GIS based Decision Support System for Crime Mapping and Analysis” for which the University received “Indian Geospatial Excellence Award-2014”.
- The university faculty has registered patent on “A Portable Mobile Forensics Data Acquisition Tool” which performs a logical acquisition process and stores the data in the attached USB.
- Development of the mobile app COPS-G (Citizen’s Online Policemen Search for Gujarat) which provides basic information about the police personnel like Photograph, Area of duty, Designation which can help citizen to identify the police Personnel and catch the fake people who pose as policemen.
Contact us
Mr. Jogendrasingh Mehra
School of Information Technology, Artificial Intelligence and Cyber Security
Rashtriya Raksha University,
Lavad, Dahegam, Gandhinagar – 382305
Phone No. – +91 63572 44815
WhatsApp No. – +91 63572 44815
Email – sitaics@rru.ac.in
Contact us
Dr. Jatin Patel
School of Information Technology, Artificial Intelligence and Cyber Security
Rashtriya Raksha University,
Lavad, Dahegam, Gandhinagar – 382305
Phone No. –
WhatsApp No. –
Email – jatin.patel@rru.ac.in
Research Scholars
Title: STUDY, DESIGN AND DEVELOPMENT OF UAS BASED CYBER-PHYSICAL SYSTEMS FRAMEWORK FOR LAND MANAGEMENT
Batch: 2019-20
Mode: Part Time
Guide: Dr. Priyanka Sharma
Title: ENHANCING EXTRACTION OF ARTIFACTS FROM SSD FOR EFFECTIVE CYBER INVESTIGATION
Batch: 2019-20
Mode: Full Time
Guide: Dr. Priyanka Sharma
Title:
Batch: 2020-21
Mode: Part Time
Guide: Dr. Priyanka Sharma
Title:
Batch: 2020-21
Mode: Part Time
Guide: Dr. Priyanka Sharma
Col Nidhish Bhatnagar
Chief Mentor, School of Information Technology, Artificial Intelligence and Cyber Security
Profile Send Message ContactDr. Jatin Patel
Director I/c, School of Information Technology, Artificial Intelligence and Cyber Security
Profile Send Message Contact