{"id":1503,"date":"2025-05-16T10:18:04","date_gmt":"2025-05-16T10:18:04","guid":{"rendered":"https:\/\/www.kmct.org\/academics\/?page_id=1503"},"modified":"2026-02-02T12:07:34","modified_gmt":"2026-02-02T12:07:34","slug":"b-tech-in-computer-science-and-engineering-cyber-security","status":"publish","type":"page","link":"https:\/\/kmct.org\/academics\/engineering\/b-tech-in-computer-science-and-engineering-cyber-security\/","title":{"rendered":"B.Tech in Computer Science and Engineering Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1503\" class=\"elementor elementor-1503\">\n\t\t\t\t<div class=\"elementor-element elementor-element-187fc46 e-flex e-con-boxed e-con e-parent\" data-id=\"187fc46\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-86197ae jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"86197ae\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">B.Tech in Computer Science and Engineering (Cyber Security)<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70290be9 e-flex e-con-boxed e-con e-parent\" data-id=\"70290be9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4d90d6d2 e-con-full e-flex e-con e-child\" data-id=\"4d90d6d2\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-53c52c80 e-con-full e-flex e-con e-child\" data-id=\"53c52c80\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5958e459 jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"5958e459\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"668\" src=\"https:\/\/kmct.org\/academics\/wp-content\/uploads\/2025\/05\/cyber-security.jpg\" class=\"attachment-large size-large wp-image-1621\" alt=\"\" srcset=\"https:\/\/kmct.org\/academics\/wp-content\/uploads\/2025\/05\/cyber-security.jpg 1000w, https:\/\/kmct.org\/academics\/wp-content\/uploads\/2025\/05\/cyber-security-300x200.jpg 300w, https:\/\/kmct.org\/academics\/wp-content\/uploads\/2025\/05\/cyber-security-768x513.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c19a784 e-con-full e-flex e-con e-child\" data-id=\"1c19a784\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25b1d051 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"25b1d051\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">B.Tech in Computer Science and Engineering (Cyber Security)<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a57b062 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"6a57b062\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Introduction to the Course<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b90f97b jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"b90f97b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In an era where digital threats are escalating, the B.Tech in Computer Science and Engineering (Cyber Security) at KMCT Institute of Emerging Technology and Management is an all-rounded course which offers a forward-thinking means for those aiming to safeguard and protect the virtual realm. The course was introduced in 2022 in KMCT, which is affiliated with APJ Abdul Kalam Technological University (KTU) and approved by the AICTE, New Delhi. The department forms part of a robust academic framework and the course aligns with the larger industry standards to equip students to become versatile professionals in the future. The programme is backed by experienced faculty and state-of-the-art infrastructure, and seamlessly blends core engineering principles with specialised study in cybersecurity. The students gain a comprehensive understanding of everything from programming and software engineering to advanced topics like artificial intelligence, data science, and cyber defence, which prepares them not just for today&#8217;s threats, but for tomorrow\u2019s challenges in an ever-evolving digital landscape.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c679193 e-flex e-con-boxed e-con e-parent\" data-id=\"7c679193\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45f5ff7f jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"45f5ff7f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Overview of the Curriculum<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29aefdd2 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"29aefdd2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The curriculum integrates core computer science principles with specialised cybersecurity topics, ensuring a holistic and comprehensive learning experience for the students:\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff9fd86 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"ff9fd86\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Core Subjects<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-507c1c5c jltma-glass-effect-no elementor-widget elementor-widget-ucaddon_list\" data-id=\"507c1c5c\" data-element_type=\"widget\" data-widget_type=\"ucaddon_list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start List -->\n\t\t<link id='font-awesome-css' href='https:\/\/kmct.org\/academics\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/kmct.org\/academics\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: List *\/\n\n\n\n#uc_list_elementor_507c1c5c{\n  display:grid;\n  position:relative;\n}\n\n#uc_list_elementor_507c1c5c .ue-list-item{\n  display:flex;\n}\n\n#uc_list_elementor_507c1c5c .ue-list-item-title{\n  display:flex;\n  align-items: center;\n} \n\n\n\n#uc_list_elementor_507c1c5c .ue-list-item-image img{\n  max-width:100%;\n}\n\n#uc_list_elementor_507c1c5c .ue-list-item-text *{\n  transition: inherit;\n}\n\n#uc_list_elementor_507c1c5c .ue-list-item-index{\n  flex-grow:0;\n  flex-shrink:0;\n  display:flex;\n  align-items:center;\n  justify-content:center;\n  line-height:1em;\n}\n\n#uc_list_elementor_507c1c5c .ue-list-item-index svg{\n  height:1em;\n  width:1em;\n}\n\n#uc_list_elementor_507c1c5c .ue-list-item-content{\n  flex-grow:1;\n}\n\n.ue_badge{\n  font-size:13px;\n}\n\n<\/style>\n\n<div id=\"uc_list_elementor_507c1c5c\" class=\"ue-list uc-items-wrapper  \"  >\n  <a class=\"ue-list-item elementor-repeater-item-5684ea9\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Programming Languages \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The students are trained to write, analyse, and optimise code in multiple languages, which helps them build a strong foundation for software development and problem-solving.<br \/><br \/><\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-2958489\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Data Structures and Algorithms \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The curriculum focuses on organising data efficiently and algorithmic thinking. This enables the students to think beyond the books, and solve complex computing problems with speed and precision.<br \/><br \/><\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-162a28d\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Computer Networks \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The programme covers a multitude of topics, including the principles of network design, communication protocols, and security measures, that are deemed essential for building and maintaining reliable digital communication systems.<br \/><br \/><\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-f1c0c19\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Operating Systems \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The course helps students explore how operating systems manage hardware, software, and resources. This ensures a smooth and secure functioning of computers and networks.<\/p><\/div>          <\/div>\n<\/a>\n\n<\/div>\n<!-- end List -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5953d8a e-flex e-con-boxed e-con e-parent\" data-id=\"5953d8a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8af8e2e jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"8af8e2e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security Specializations<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1937ffe jltma-glass-effect-no elementor-widget elementor-widget-ucaddon_list\" data-id=\"1937ffe\" data-element_type=\"widget\" data-widget_type=\"ucaddon_list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start List -->\n\n<style>\/* widget: List *\/\n\n\n\n#uc_list_elementor_1937ffe{\n  display:grid;\n  position:relative;\n}\n\n#uc_list_elementor_1937ffe .ue-list-item{\n  display:flex;\n}\n\n#uc_list_elementor_1937ffe .ue-list-item-title{\n  display:flex;\n  align-items: center;\n} \n\n\n\n#uc_list_elementor_1937ffe .ue-list-item-image img{\n  max-width:100%;\n}\n\n#uc_list_elementor_1937ffe .ue-list-item-text *{\n  transition: inherit;\n}\n\n#uc_list_elementor_1937ffe .ue-list-item-index{\n  flex-grow:0;\n  flex-shrink:0;\n  display:flex;\n  align-items:center;\n  justify-content:center;\n  line-height:1em;\n}\n\n#uc_list_elementor_1937ffe .ue-list-item-index svg{\n  height:1em;\n  width:1em;\n}\n\n#uc_list_elementor_1937ffe .ue-list-item-content{\n  flex-grow:1;\n}\n\n.ue_badge{\n  font-size:13px;\n}\n\n<\/style>\n\n<div id=\"uc_list_elementor_1937ffe\" class=\"ue-list uc-items-wrapper  \"  >\n  <a class=\"ue-list-item elementor-repeater-item-5684ea9\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Intrusion Detection & Prevention  \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The course trains students in techniques to detect, analyse, and block cyber-attacks, which ensure system integrity and continuous protection against any potential threats.<\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-2958489\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Cloud Computing & Security \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The programme introduces students to cloud infrastructure and security strategies in order to learn how to protect data, applications, and services hosted on cloud platforms.<\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-162a28d\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Cryptography \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The curriculum delves extensively into encryption techniques and secure communication methods to protect information against any and all unauthorised access and breaches.<\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-f1c0c19\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Ethical Hacking \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The students learn how to ethically test systems for vulnerabilities, using hacking skills in a responsible fashion to strengthen cybersecurity defences.<br \/><br \/><\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-9fc1c6a\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Digital Forensics \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The course also simultaneously focuses on investigating cybercrimes by collecting, analysing, and preserving digital evidence to support legal proceedings and security measures.<\/p><\/div>          <\/div>\n<\/a>\n\n<\/div>\n<!-- end List -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e5f5de jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"5e5f5de\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Students are also encouraged to engage in lab sessions, workshops, and projects that provide hands-on experience in real-world cybersecurity scenarios.\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-63faebe8 e-flex e-con-boxed e-con e-parent\" data-id=\"63faebe8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42d81d6e jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"42d81d6e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Career Opportunities After the Course<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ba728e8 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"4ba728e8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Graduates can pursue various roles in the cybersecurity domain, including:\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e47a42c jltma-glass-effect-no elementor-widget elementor-widget-ucaddon_list\" data-id=\"4e47a42c\" data-element_type=\"widget\" data-widget_type=\"ucaddon_list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start List -->\n\n<style>\/* widget: List *\/\n\n\n\n#uc_list_elementor_4e47a42c{\n  display:grid;\n  position:relative;\n}\n\n#uc_list_elementor_4e47a42c .ue-list-item{\n  display:flex;\n}\n\n#uc_list_elementor_4e47a42c .ue-list-item-title{\n  display:flex;\n  align-items: center;\n} \n\n\n\n#uc_list_elementor_4e47a42c .ue-list-item-image img{\n  max-width:100%;\n}\n\n#uc_list_elementor_4e47a42c .ue-list-item-text *{\n  transition: inherit;\n}\n\n#uc_list_elementor_4e47a42c .ue-list-item-index{\n  flex-grow:0;\n  flex-shrink:0;\n  display:flex;\n  align-items:center;\n  justify-content:center;\n  line-height:1em;\n}\n\n#uc_list_elementor_4e47a42c .ue-list-item-index svg{\n  height:1em;\n  width:1em;\n}\n\n#uc_list_elementor_4e47a42c .ue-list-item-content{\n  flex-grow:1;\n}\n\n.ue_badge{\n  font-size:13px;\n}\n\n<\/style>\n\n<div id=\"uc_list_elementor_4e47a42c\" class=\"ue-list uc-items-wrapper  \"  >\n  <a class=\"ue-list-item elementor-repeater-item-70fb205\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-chevron-right'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Cybersecurity Analyst \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The course equips students to monitor, analyse, and respond to security incidents, which protects organisational data and systems from potential cyber threats.<\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-1060208\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-chevron-right'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Information Security Manager \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The students are trained to develop and enforce security policies, managing teams and strategies to ensure the protection of sensitive information and assets.<\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-f8af767\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-chevron-right'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Network Security Engineer \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The curriculum is versatile, thus ensuring that the students can design and maintain secure network infrastructures, while implementing firewalls, encryption, and security protocols to defend against cyberattacks.<\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-4cff054\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-chevron-right'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Penetration Tester \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The programme trains the students to ethically hack systems to identify vulnerabilities, helping organisations fix weaknesses before malicious hackers can exploit them.<\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-7448cd8\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-chevron-right'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Security Consultant \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The students are equipped with the practical hands-on knowledge to advise businesses on best practices, risk management, and strategies to strengthen cybersecurity measures and ensure regulatory compliance.<\/p><\/div>          <\/div>\n<\/a>\n\n<\/div>\n<!-- end List -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64193401 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"64193401\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With the increasing reliance on digital platforms, the demand for cybersecurity professionals is on the rise across sectors like finance, healthcare, IT, and government agencies.\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-59714972 e-con-full e-flex e-con e-parent\" data-id=\"59714972\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1f1d9793 e-flex e-con-boxed e-con e-child\" data-id=\"1f1d9793\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-338b67fa e-con-full e-flex e-con e-child\" data-id=\"338b67fa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50dd4df0 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"50dd4df0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key Features of Studying at KMCT<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-415ea9a2 jltma-glass-effect-no elementor-widget elementor-widget-ucaddon_list\" data-id=\"415ea9a2\" data-element_type=\"widget\" data-widget_type=\"ucaddon_list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start List -->\n\n<style>\/* widget: List *\/\n\n\n\n#uc_list_elementor_415ea9a2{\n  display:grid;\n  position:relative;\n}\n\n#uc_list_elementor_415ea9a2 .ue-list-item{\n  display:flex;\n}\n\n#uc_list_elementor_415ea9a2 .ue-list-item-title{\n  display:flex;\n  align-items: center;\n} \n\n\n\n#uc_list_elementor_415ea9a2 .ue-list-item-image img{\n  max-width:100%;\n}\n\n#uc_list_elementor_415ea9a2 .ue-list-item-text *{\n  transition: inherit;\n}\n\n#uc_list_elementor_415ea9a2 .ue-list-item-index{\n  flex-grow:0;\n  flex-shrink:0;\n  display:flex;\n  align-items:center;\n  justify-content:center;\n  line-height:1em;\n}\n\n#uc_list_elementor_415ea9a2 .ue-list-item-index svg{\n  height:1em;\n  width:1em;\n}\n\n#uc_list_elementor_415ea9a2 .ue-list-item-content{\n  flex-grow:1;\n}\n\n.ue_badge{\n  font-size:13px;\n}\n\n<\/style>\n\n<div id=\"uc_list_elementor_415ea9a2\" class=\"ue-list uc-items-wrapper  \"  >\n  <a class=\"ue-list-item elementor-repeater-item-5684ea9\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Affiliated with APJ Abdul Kalam Technological University (KTU):  \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>Since the University is affiliated with APJ Abdul Kalam Technological University, it ensures that the academic framework of the course and the rigorous quality standards of the same are met.<\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-2958489\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Approved by AICTE \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>B.Tech in Computer Science and Engineering is recognized by the All-India Council for Technical Education (AICTE), thereby ensuring adherence to national academic and professional standards.<\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-162a28d\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">State-of-the-art laboratories and infrastructure \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The students have access to advanced technological infrastructure and modern laboratories. This enables hands-on learning for the students while facilitating high-quality academic and research activities.<\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-f1c0c19\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Experienced faculty with industry exposure: \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The faculty comprises seasoned academicians and professionals with substantial industry experience, bridging theoretical learning with real-world technological practices.<\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-e383280\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Emphasis on research and innovation \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The course also encourages a research-oriented outlook towards computational challenges. This helps students to engage in innovative projects which address contemporary technological challenges.<\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-98c7067\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\">Industry collaborations for internships and projects \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>The students have significant opportunities for internships, live projects, and experiential learning initiatives because of the strategic partnerships with leading industries nurtured by the University.<\/p><\/div>          <\/div>\n<\/a>\n\n<\/div>\n<!-- end List -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bb02930 e-flex e-con-boxed e-con e-parent\" data-id=\"bb02930\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1bb662 e-con-full e-flex e-con e-child\" data-id=\"1bb662\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5f8ad977 e-con-full e-flex e-con e-child\" data-id=\"5f8ad977\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c61c658 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"5c61c658\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Eligibility Criteria<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6555a0c1 jltma-glass-effect-no elementor-widget elementor-widget-ucaddon_list\" data-id=\"6555a0c1\" data-element_type=\"widget\" data-widget_type=\"ucaddon_list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start List -->\n\n<style>\/* widget: List *\/\n\n\n\n#uc_list_elementor_6555a0c1{\n  display:grid;\n  position:relative;\n}\n\n#uc_list_elementor_6555a0c1 .ue-list-item{\n  display:flex;\n}\n\n#uc_list_elementor_6555a0c1 .ue-list-item-title{\n  display:flex;\n  align-items: center;\n} \n\n\n\n#uc_list_elementor_6555a0c1 .ue-list-item-image img{\n  max-width:100%;\n}\n\n#uc_list_elementor_6555a0c1 .ue-list-item-text *{\n  transition: inherit;\n}\n\n#uc_list_elementor_6555a0c1 .ue-list-item-index{\n  flex-grow:0;\n  flex-shrink:0;\n  display:flex;\n  align-items:center;\n  justify-content:center;\n  line-height:1em;\n}\n\n#uc_list_elementor_6555a0c1 .ue-list-item-index svg{\n  height:1em;\n  width:1em;\n}\n\n#uc_list_elementor_6555a0c1 .ue-list-item-content{\n  flex-grow:1;\n}\n\n.ue_badge{\n  font-size:13px;\n}\n\n<\/style>\n\n<div id=\"uc_list_elementor_6555a0c1\" class=\"ue-list uc-items-wrapper  \"  >\n  <a class=\"ue-list-item elementor-repeater-item-70fb205\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\"> \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>Candidates must have passed the 10+2 examination with Physics and Mathematics as compulsory subjects, along with one of the Chemistry\/Biotechnology\/Biology\/Technical Vocational subjects.<\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-808ee67\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\"> \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>Minimum 45% marks (40% for reserved categories) in the above subjects. \u200b<\/p><\/div>          <\/div>\n<\/a>\n\n<\/div>\n<!-- end List -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-760a3199 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"760a3199\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Admission Process<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c33feed jltma-glass-effect-no elementor-widget elementor-widget-ucaddon_list\" data-id=\"6c33feed\" data-element_type=\"widget\" data-widget_type=\"ucaddon_list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start List -->\n\n<style>\/* widget: List *\/\n\n\n\n#uc_list_elementor_6c33feed{\n  display:grid;\n  position:relative;\n}\n\n#uc_list_elementor_6c33feed .ue-list-item{\n  display:flex;\n}\n\n#uc_list_elementor_6c33feed .ue-list-item-title{\n  display:flex;\n  align-items: center;\n} \n\n\n\n#uc_list_elementor_6c33feed .ue-list-item-image img{\n  max-width:100%;\n}\n\n#uc_list_elementor_6c33feed .ue-list-item-text *{\n  transition: inherit;\n}\n\n#uc_list_elementor_6c33feed .ue-list-item-index{\n  flex-grow:0;\n  flex-shrink:0;\n  display:flex;\n  align-items:center;\n  justify-content:center;\n  line-height:1em;\n}\n\n#uc_list_elementor_6c33feed .ue-list-item-index svg{\n  height:1em;\n  width:1em;\n}\n\n#uc_list_elementor_6c33feed .ue-list-item-content{\n  flex-grow:1;\n}\n\n.ue_badge{\n  font-size:13px;\n}\n\n<\/style>\n\n<div id=\"uc_list_elementor_6c33feed\" class=\"ue-list uc-items-wrapper  \"  >\n  <a class=\"ue-list-item elementor-repeater-item-808ee67\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\"> \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>Admissions are based on the Kerala Engineering Architecture Medical (KEAM) entrance examination.<\/p><\/div>          <\/div>\n<\/a>\n<a class=\"ue-list-item elementor-repeater-item-cf5cdc0\" >\n  <div class=\"ue-list-item-index\">\n                              <i class='fas fa-check'><\/i>\n                    \n  <\/div>\n  <div class=\"ue-list-item-content\">\n    <h6 class=\"ue-list-item-title\"> \n                  <\/h6>\n          <div class=\"ue-list-item-text\"><p>Candidates must apply through the official KEAM portal and select KMCT Institute of Emerging Technology and Management as their preferred college.\u200b<\/p><\/div>          <\/div>\n<\/a>\n\n<\/div>\n<!-- end List -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2bb5ec6d e-con-full e-flex e-con e-child\" data-id=\"2bb5ec6d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16d8156e jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"16d8156e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1000\" height=\"668\" src=\"https:\/\/kmct.org\/academics\/wp-content\/uploads\/2025\/05\/16452.jpg\" class=\"attachment-large size-large wp-image-1627\" alt=\"\" srcset=\"https:\/\/kmct.org\/academics\/wp-content\/uploads\/2025\/05\/16452.jpg 1000w, https:\/\/kmct.org\/academics\/wp-content\/uploads\/2025\/05\/16452-300x200.jpg 300w, https:\/\/kmct.org\/academics\/wp-content\/uploads\/2025\/05\/16452-768x513.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a6da107 e-con-full e-flex e-con e-parent\" data-id=\"5a6da107\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-171ee9c e-con-full e-flex e-con e-child\" data-id=\"171ee9c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6082e81d e-con-full e-flex e-con e-child\" data-id=\"6082e81d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71d4deb jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"71d4deb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQs<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71cf1a99 jltma-glass-effect-no elementor-widget elementor-widget-elementskit-accordion\" data-id=\"71cf1a99\" data-element_type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69e046fbdea3e\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-71cf1a99\">\n                        <a href=\"#collapse-1e6c42269e046fbdea3e\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-1e6c42269e046fbdea3e\" aria-expanded=\"true\" aria-controls=\"Collapse-1e6c42269e046fbdea3e\">\n                            \n                            <span class=\"ekit-accordion-title\">Does the programme offer practical training in cybersecurity tools?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow1\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-1e6c42269e046fbdea3e\" class=\" show collapse\" aria-labelledby=\"primaryHeading-0-71cf1a99\" data-parent=\"#accordion-69e046fbdea3e\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Yes, the curriculum includes hands-on training with tools used in the industry, ensuring students are job-ready upon graduation.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-1-71cf1a99\">\n                        <a href=\"#collapse-697360a69e046fbdea3e\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-697360a69e046fbdea3e\" aria-expanded=\"false\" aria-controls=\"Collapse-697360a69e046fbdea3e\">\n                            \n                            <span class=\"ekit-accordion-title\">Are there opportunities for industry certifications?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow1\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-697360a69e046fbdea3e\" class=\" collapse\" aria-labelledby=\"primaryHeading-1-71cf1a99\" data-parent=\"#accordion-69e046fbdea3e\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>KMCT encourages students to pursue relevant certifications and provides guidance and resources to achieve them.\u200b<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-302b878 e-con-full e-flex e-con e-child\" data-id=\"302b878\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d0955cb jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"6d0955cb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Admissions Open<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26e98891 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"26e98891\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Embark on a journey to become a cybersecurity expert. Apply now to KMCT Institute of Emerging Technology and Management and play a pivotal role in safeguarding the digital world.\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-234cd00d jltma-glass-effect-no elementor-widget elementor-widget-button\" data-id=\"234cd00d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.kmctemergingtechnology.org\/course-detail\/b-tech-in-computer-science-and-engineering-cyber-security\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Apply Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>B.Tech in Computer Science and Engineering (Cyber Security) B.Tech in Computer Science and Engineering (Cyber Security) Introduction to the Course In an era where digital threats are escalating, the B.Tech in Computer Science and Engineering (Cyber Security) at KMCT Institute of Emerging Technology and Management is an all-rounded course which offers a forward-thinking means for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1643,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1503","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/kmct.org\/academics\/wp-json\/wp\/v2\/pages\/1503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kmct.org\/academics\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kmct.org\/academics\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kmct.org\/academics\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kmct.org\/academics\/wp-json\/wp\/v2\/comments?post=1503"}],"version-history":[{"count":26,"href":"https:\/\/kmct.org\/academics\/wp-json\/wp\/v2\/pages\/1503\/revisions"}],"predecessor-version":[{"id":1638,"href":"https:\/\/kmct.org\/academics\/wp-json\/wp\/v2\/pages\/1503\/revisions\/1638"}],"up":[{"embeddable":true,"href":"https:\/\/kmct.org\/academics\/wp-json\/wp\/v2\/pages\/1643"}],"wp:attachment":[{"href":"https:\/\/kmct.org\/academics\/wp-json\/wp\/v2\/media?parent=1503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}