{"id":7070,"date":"2025-02-11T14:30:55","date_gmt":"2025-02-11T09:00:55","guid":{"rendered":"https:\/\/cmscollege.edu.in\/sc\/?page_id=7070"},"modified":"2026-04-03T20:04:58","modified_gmt":"2026-04-03T14:34:58","slug":"digital-and-cyber-forensic-science","status":"publish","type":"page","link":"https:\/\/cmscollege.edu.in\/sc\/digital-and-cyber-forensic-science\/","title":{"rendered":"Department of  Digital and Cyber Forensic Science"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7070\" class=\"elementor elementor-7070\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ec991bc elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"ec991bc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-28e757c\" data-id=\"28e757c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a958125 elementor-widget elementor-widget-image\" data-id=\"a958125\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"390\" src=\"https:\/\/cmscollege.edu.in\/sc\/wp-content\/uploads\/2023\/03\/computer-banner.jpg\" class=\"attachment-large size-large wp-image-1755\" alt=\"\" srcset=\"https:\/\/cmscollege.edu.in\/sc\/wp-content\/uploads\/2023\/03\/computer-banner.jpg 1000w, https:\/\/cmscollege.edu.in\/sc\/wp-content\/uploads\/2023\/03\/computer-banner-300x117.jpg 300w, https:\/\/cmscollege.edu.in\/sc\/wp-content\/uploads\/2023\/03\/computer-banner-768x300.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5656775 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"5656775\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c4073e8\" data-id=\"c4073e8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e3a3461 elementor-widget elementor-widget-heading\" data-id=\"e3a3461\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Department of Digital and Cyber Forensic Science <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-4dad9b5 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"4dad9b5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-87e5aa5 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"87e5aa5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-406cfbd e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"406cfbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"67555261\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"forensic\" data-tab-title-id=\"e-n-tab-title-675552611\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-675552611\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tDigital and Cyber Forensic Science\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"faculty\" data-tab-title-id=\"e-n-tab-title-675552612\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-675552612\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tFaculty\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"download\" data-tab-title-id=\"e-n-tab-title-675552613\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-675552613\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tDownload Brochure\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-675552611\" role=\"tabpanel\" aria-labelledby=\"forensic\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-3f1fece e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"3f1fece\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b5eec79 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"b5eec79\" data-element_type=\"container\" data-e-type=\"container\" id=\"forensic\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a7335ce elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"a7335ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-a7335ce\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"a7335ce\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"basic-course-details\" class=\"elementor-tab-title eael-accordion-header active-default\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-1751\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Basic Course Details<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1751\" class=\"eael-accordion-content clearfix active-default\" data-tab=\"1\" aria-labelledby=\"basic-course-details\"><p><strong>Course:<\/strong> B.Sc Digital and Cyber Forensic Science<br \/><strong>Level:<\/strong> Undergraduate (UG)<br \/><strong>Duration:<\/strong> 3 Years<br \/><strong>Eligibility:<\/strong> Higher Secondary (10+2) Pass<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"course-overview\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-1752\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Course Overview<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1752\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"course-overview\"><p><strong>B.Sc Digital and Cyber Forensic Science<\/strong> is a specialized program that focuses on cybersecurity, cybercrime investigation, and digital evidence analysis.<\/p><p>The course provides a strong foundation in programming, analytical skills, and forensic techniques used to detect, analyze, and prevent cyber threats. Students gain both theoretical knowledge and practical exposure to real-world cyber investigations.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"why-choose-this-course\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-1753\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Why Choose This Course<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1753\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"why-choose-this-course\"><ul><li>Academic excellence and structured curriculum<\/li><li>Highly qualified faculty<\/li><li>State-of-the-art forensic laboratories<\/li><li>Strong industry collaboration<\/li><li>Focus on student skill development<\/li><li>Career-oriented training<\/li><li>Community and outreach activities<\/li><\/ul><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"what-will-you-learn\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-1754\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">What Will You Learn<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1754\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"what-will-you-learn\"><p><strong>Core Learning Areas:<\/strong><\/p><ul><li>Digital Forensics fundamentals<\/li><li>Cybercrime investigation techniques<\/li><li>Computer &amp; mobile forensics<\/li><li>Network and cloud forensics<\/li><li>Cybersecurity principles<\/li><li>Ethical hacking basics<\/li><li>Malware analysis &amp; incident response<\/li><li>Legal aspects (cyber laws, evidence handling)<\/li><\/ul><p><strong>Practical Skills:<\/strong><\/p><ul><li>Forensic tools usage<\/li><li>Log analysis<\/li><li>Memory and email forensics<\/li><li>Report writing and case analysis<\/li><\/ul><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"unique-features\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"5\" aria-controls=\"elementor-tab-content-1755\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Unique Features<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1755\" class=\"eael-accordion-content clearfix\" data-tab=\"5\" aria-labelledby=\"unique-features\"><ul><li>Practical and technical skill development<\/li><li>Focus on legal admissibility of evidence<\/li><li>Specialized cyber forensic domains<\/li><li>High-demand career-oriented program<\/li><\/ul><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"value-added-courses-vac\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"6\" aria-controls=\"elementor-tab-content-1756\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Value Added Courses (VAC)<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1756\" class=\"eael-accordion-content clearfix\" data-tab=\"6\" aria-labelledby=\"value-added-courses-vac\"><p><strong>Ethical Cybersecurity (with industry collaboration)<\/strong><\/p><ul><li>Duration: 30 Hours<\/li><li>Credits: 2<\/li><li>Skills Gained: Cybersecurity fundamentals and practical knowledge<\/li><li>Certification: Cyber Security<\/li><\/ul><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"certification-add-on-programs\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"7\" aria-controls=\"elementor-tab-content-1757\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Certification \/ Add-On Programs<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1757\" class=\"eael-accordion-content clearfix\" data-tab=\"7\" aria-labelledby=\"certification-add-on-programs\"><ul><li>Certificate in Cyber Security<\/li><li>Certificate in Cyber Forensics<\/li><\/ul><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"career-opportunities\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"8\" aria-controls=\"elementor-tab-content-1758\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Career Opportunities<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1758\" class=\"eael-accordion-content clearfix\" data-tab=\"8\" aria-labelledby=\"career-opportunities\"><p><strong>Job Roles:<\/strong><\/p><ul><li>Digital Forensics Analyst<\/li><li>Cybersecurity Analyst<\/li><li>Ethical Hacker \/ Penetration Tester<\/li><li>Network Security Engineer<\/li><li>Incident Response Specialist<\/li><li>Malware Analyst<\/li><li>Forensic Investigator<\/li><li>Data Recovery Specialist<\/li><li>IT Auditor<\/li><\/ul><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"industries\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"9\" aria-controls=\"elementor-tab-content-1759\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Industries<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1759\" class=\"eael-accordion-content clearfix\" data-tab=\"9\" aria-labelledby=\"industries\"><ul><li>Cybersecurity companies<\/li><li>IT and software firms<\/li><li>Investigation agencies<\/li><li>Government cybercrime units<\/li><li>Organizations like Cisco, HPE, Microland<\/li><\/ul><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"higher-studies\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"10\" aria-controls=\"elementor-tab-content-17510\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Higher Studies<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-17510\" class=\"eael-accordion-content clearfix\" data-tab=\"10\" aria-labelledby=\"higher-studies\"><ul><li>M.Sc Cyber Security<\/li><li>M.Sc Digital Forensics<\/li><li>M.Sc Information Security<\/li><li>Cyber Forensics &amp; Information Security<\/li><li>M.Sc Computer Science (Cyber specialization)<\/li><li>Research opportunities<\/li><\/ul><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"programme-outcomes\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"11\" aria-controls=\"elementor-tab-content-17511\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Programme Outcomes<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-17511\" class=\"eael-accordion-content clearfix\" data-tab=\"11\" aria-labelledby=\"programme-outcomes\"><ul><li>Strong programming and logical thinking skills<\/li><li>Ability to solve real-world cyber problems<\/li><li>Development of analytical and investigative mindset<\/li><li>Professional skills for cybersecurity careers<\/li><\/ul><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"additional-highlights\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"12\" aria-controls=\"elementor-tab-content-17512\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Additional Highlights<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-17512\" class=\"eael-accordion-content clearfix\" data-tab=\"12\" aria-labelledby=\"additional-highlights\"><ul><li>Programming (C, C++, Python, Java)<\/li><li>Data Structures &amp; Networking<\/li><li>Operating Systems &amp; Cloud Security<\/li><li>Cyber Forensics &amp; Ethical Hacking<\/li><li>Malware Analysis &amp; Cyber Policing<\/li><li>Web Applications &amp; Security Labs<\/li><\/ul><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-675552612\" role=\"tabpanel\" aria-labelledby=\"faculty\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-04996e4 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"04996e4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-72deb30 e-con-full e-grid wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"72deb30\" data-element_type=\"container\" data-e-type=\"container\" id=\"faculty\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1902058 wpr-promo-box-style-cover elementor-widget elementor-widget-wpr-promo-box\" data-id=\"1902058\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"wpr-promo-box-image\">\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-image wpr-bg-anim-zoom-in wpr-anim-timing-ease-default\" style=\"background-image:url(https:\/\/cmscollege.edu.in\/sc\/wp-content\/uploads\/2023\/03\/DP_Dr.-Madhu_BCA.jpg);\"><\/div>\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-overlay wpr-border-anim-oscar\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>Dr.P.Madhu\u00a0<br \/>MCA.,M.Phil.,Ph.D<br \/>Head of the Department<\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82d6112 wpr-promo-box-style-cover elementor-widget elementor-widget-wpr-promo-box\" data-id=\"82d6112\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"wpr-promo-box-image\">\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-image wpr-bg-anim-zoom-in wpr-anim-timing-ease-default\" style=\"background-image:url(https:\/\/cmscollege.edu.in\/sc\/wp-content\/uploads\/2023\/03\/DP_Dr.-S.-Swarnambga_BCA.jpg);\"><\/div>\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-overlay wpr-border-anim-oscar\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>Dr. S. Swornambiga<br \/>MCA.,M.Phil,Ph.D<br \/>Associate Professor<\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5a7be5 wpr-promo-box-style-cover elementor-widget elementor-widget-wpr-promo-box\" data-id=\"a5a7be5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"wpr-promo-box-image\">\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-image wpr-bg-anim-zoom-in wpr-anim-timing-ease-default\" style=\"background-image:url(https:\/\/cmscollege.edu.in\/sc\/wp-content\/uploads\/2023\/03\/DP_Saranya.-R_BCA.jpg);\"><\/div>\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-overlay wpr-border-anim-oscar\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>Dr.R .Saranya<br \/>M.Sc IT., MBA., M.Phil.,Ph.D<br \/>Asst. Professor<\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-675552613\" role=\"tabpanel\" aria-labelledby=\"download\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-422f699 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"422f699\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2db1e3a e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"2db1e3a\" data-element_type=\"container\" data-e-type=\"container\" id=\"download\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd3a0dc elementor-widget elementor-widget-button\" data-id=\"bd3a0dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cmscollege.edu.in\/sc\/wp-content\/uploads\/2025\/02\/DCFS.jpeg\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-file-pdf\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Click here to Download <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Department of Digital and Cyber Forensic Science Digital and Cyber Forensic Science Faculty Download Brochure Basic Course Details Course: B.Sc Digital and Cyber Forensic ScienceLevel: Undergraduate (UG)Duration: 3 YearsEligibility: Higher Secondary (10+2) Pass Course Overview B.Sc Digital and Cyber Forensic Science is a specialized program that focuses on cybersecurity, cybercrime investigation, and digital evidence analysis. The course provides a strong foundation in programming, analytical skills, and forensic techniques used to detect, analyze, and prevent cyber threats. Students gain both theoretical knowledge and practical exposure to real-world cyber investigations. Why Choose This Course Academic excellence and structured curriculum Highly qualified faculty State-of-the-art forensic laboratories Strong industry collaboration Focus on student skill development Career-oriented training Community and outreach activities What Will You Learn Core Learning Areas: Digital Forensics fundamentals Cybercrime investigation techniques Computer &amp; mobile forensics Network and cloud forensics Cybersecurity principles Ethical hacking basics Malware analysis &amp; incident response Legal aspects (cyber laws, evidence handling) Practical Skills: Forensic tools usage Log analysis Memory and email forensics Report writing and case analysis Unique Features Practical and technical skill development Focus on legal admissibility of evidence Specialized cyber forensic domains High-demand career-oriented program Value Added Courses (VAC) Ethical Cybersecurity (with industry collaboration) Duration: 30 Hours Credits: 2 Skills Gained: Cybersecurity fundamentals and practical knowledge Certification: Cyber Security Certification \/ Add-On Programs Certificate in Cyber Security Certificate in Cyber Forensics Career Opportunities Job Roles: Digital Forensics Analyst Cybersecurity Analyst Ethical Hacker \/ Penetration Tester Network Security Engineer Incident Response Specialist Malware Analyst Forensic Investigator Data Recovery Specialist IT Auditor Industries Cybersecurity companies IT and software firms Investigation agencies Government cybercrime units Organizations like Cisco, HPE, Microland Higher Studies M.Sc Cyber Security M.Sc Digital Forensics M.Sc Information Security Cyber Forensics &amp; Information Security M.Sc Computer Science (Cyber specialization) Research opportunities Programme Outcomes Strong programming and logical thinking skills Ability to solve real-world cyber problems Development of analytical and investigative mindset Professional skills for cybersecurity careers Additional Highlights Programming (C, C++, Python, Java) Data Structures &amp; Networking Operating Systems &amp; Cloud Security Cyber Forensics &amp; Ethical Hacking Malware Analysis &amp; Cyber Policing Web Applications &amp; Security Labs Dr.P.Madhu\u00a0MCA.,M.Phil.,Ph.DHead of the Department Dr. S. SwornambigaMCA.,M.Phil,Ph.DAssociate Professor Dr.R .SaranyaM.Sc IT., MBA., M.Phil.,Ph.DAsst. Professor Click here to Download Basic Course Details Course: B.Sc Digital and Cyber Forensic ScienceLevel: Undergraduate (UG)Duration: 3 YearsEligibility: Higher Secondary (10+2) Pass Course Overview B.Sc Digital and Cyber Forensic Science is a specialized program that focuses on cybersecurity, cybercrime investigation, and digital evidence analysis. The course provides a strong foundation in programming, analytical skills, and forensic techniques used to detect, analyze, and prevent cyber threats. Students gain both theoretical knowledge and practical exposure to real-world cyber investigations. Why Choose This Course Academic excellence and structured curriculum Highly qualified faculty State-of-the-art forensic laboratories Strong industry collaboration Focus on student skill development Career-oriented training Community and outreach activities What Will You Learn Core Learning Areas: Digital Forensics fundamentals Cybercrime investigation techniques Computer &amp; mobile forensics Network and cloud forensics Cybersecurity principles Ethical hacking basics Malware analysis &amp; incident response Legal aspects (cyber laws, evidence handling) Practical Skills: Forensic tools usage Log analysis Memory and email forensics Report writing and case analysis Unique Features Practical and technical skill development Focus on legal admissibility of evidence Specialized cyber forensic domains High-demand career-oriented program Value Added Courses (VAC) Ethical Cybersecurity (with industry collaboration) Duration: 30 Hours Credits: 2 Skills Gained: Cybersecurity fundamentals and practical knowledge Certification: Cyber Security Certification \/ Add-On Programs Certificate in Cyber Security Certificate in Cyber Forensics Career Opportunities Job Roles: Digital Forensics Analyst Cybersecurity Analyst Ethical Hacker \/ Penetration Tester Network Security Engineer Incident Response Specialist Malware Analyst Forensic Investigator Data Recovery Specialist IT Auditor Industries Cybersecurity companies IT and software firms Investigation agencies Government cybercrime units Organizations like Cisco, HPE, Microland Higher Studies M.Sc Cyber Security M.Sc Digital Forensics M.Sc Information Security Cyber Forensics &amp; Information Security M.Sc Computer Science (Cyber specialization) Research opportunities Programme Outcomes Strong programming and logical thinking skills Ability to solve real-world cyber problems Development of analytical and investigative mindset Professional skills for cybersecurity careers Additional Highlights Programming (C, C++, Python, Java) Data Structures &amp; Networking Operating Systems &amp; Cloud Security Cyber Forensics &amp; Ethical Hacking Malware Analysis &amp; Cyber Policing Web Applications &amp; Security Labs Dr.P.Madhu\u00a0MCA.,M.Phil.,Ph.DHead of the Department Dr. S. SwornambigaMCA.,M.Phil,Ph.DAssociate Professor Dr.R .SaranyaM.Sc IT., MBA., M.Phil.,Ph.DAsst. Professor Click here to Download<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","_joinchat":[],"footnotes":""},"class_list":["post-7070","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cmscollege.edu.in\/sc\/wp-json\/wp\/v2\/pages\/7070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmscollege.edu.in\/sc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cmscollege.edu.in\/sc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cmscollege.edu.in\/sc\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cmscollege.edu.in\/sc\/wp-json\/wp\/v2\/comments?post=7070"}],"version-history":[{"count":94,"href":"https:\/\/cmscollege.edu.in\/sc\/wp-json\/wp\/v2\/pages\/7070\/revisions"}],"predecessor-version":[{"id":8619,"href":"https:\/\/cmscollege.edu.in\/sc\/wp-json\/wp\/v2\/pages\/7070\/revisions\/8619"}],"wp:attachment":[{"href":"https:\/\/cmscollege.edu.in\/sc\/wp-json\/wp\/v2\/media?parent=7070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}