M.TECH-CS.-1
M.TECH-CS.-1
UNIVERSITY
An Institution of National Importance
(Pioneering National Security and Police University of India)
Lavad, Dehgam, Gandhinagar-382305, Gujarat, India
Semester I
Programme 2 years
Duration
Effective from Academic 2021-22 Effective for the batch Admitted in 2021
Year
Teaching scheme Examination scheme (Marks)
Code Subject
Name Credit Hours (per week) Theory Practical
Lecture Practical Lecture Practical Int Ext Total Int Ext Total
(Lab.)
L Tu Total P Total L Tu Total P Total
Semester II
Lecture Practical Lecture Practical Int Ext Total Int Ext Total
(Lab.)
L Tu Total P Total L Tu Total P Total
M2B13RMA Reverse 3 0 3 1 1 3 0 3 2 2 20 50 70 10 20 30
Engineering &
Malware
Analysis
M2B14IFA Information 3 0 3 1 1 3 0 3 2 2 20 50 70 10 20 30
Assurance
M2B15MLR Machine 3 0 3 1 1 3 0 3 2 2 20 50 70 10 20 30
Learning
Common Papers (Research Methodology and Research Writing; Skill and Ability Enhancement Papers)
University Elective as per cbcs – 2 credits
UE UE 1 1 2 0 0 1 2 3 0 0
Lecture Practical Lecture Practical Int Ext Total Int Ext Total
(Lab.)
L Tu Total P Total L Tu Total P Total
Project
M3A17VAP Vulnerability 3 0 3 1 1 3 0 3 2 2 20 50 70 10 20 30
Assessment &
Penetration
Testing
M3B21DBS Database 3 0 3 1 1 3 0 3 2 2 20 50 70 10 20 30
security
Complimentary/Discipline Specific Elective Courses - TYPE 2 ELECTIVE IV
M3B22ACR Advance 3 0 3 1 1 3 0 3 2 2 20 50 70 10 20 30
Cryptology
M3BD23PG Principle of 3 0 3 1 1 3 0 3 2 2 20 50 70 10 20 30
I Geoinformatic
s
Common Papers (Research Methodology and Research Writing; Skill and Ability Enhancement Papers)
1- University Elective as per cbcs of 4 credit
University 3 0 3 1 1 3 0 3 2 2
Elective
Open/General Elective Papers
M3A24INT Industry
Tour
TOTAL 12 0 12 10 10 12 0 12 20 20 60 150 210 60 130 190
Semester IV
Lecture Practical Lecture Practical Int Ext Total Int Ext Total
(Lab.)
L Tu Total P Total L Tu Total P Total
Common Papers (Research Methodology and Research Writing; Skill and Ability Enhancement Papers)
NA
NA
TOTAL 0 0 0 12 12 0 0 0 24 24 0 0 0 30 70 100
Programme Structure
Semester I II III IV
Total Credits 24 22 22 12
Theory (Marks) 350 350 210 0
Practical (Marks) 150 150 190 100
Total Marks of 1500 + UE in SEM I, II, III
Entire Programme
Syllabus
Semester-I
RASHTRIYA RAKSHA UNIVERSITY
An Institution of National Importance
Lavad, Dehgam, Gandhinagar-382305, Gujarat, India
Practical Content:
Reference Books:
1.
Practical Content:
Reference Books:
1. Mastering Python for Networking and Security, by Justin Seitz
2. Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and
Security Engineers, by TJ O'Connor
3. Hands-On Machine Learning for Cyber Security, Book by Sinan Ozdemir and Soma Halder
Reference Books:
1. Introduction to Algorithms, Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest and
Clifford Stein, PHI.
2. Fundamental of Algorithms by Gills Brassard, Paul Bratley, PHI.
3. Introduction to Design and Analysis of Algorithms, Anany Levitin, Pearson.
4. Foundations of Algorithms, Shailesh R Sathe, Penram
5. Design and Analysis of Algorithms, Dave and Dave, Pearson.
Subject Code M1AD05SAC Subject Name Security Auditing, Risk & Compliance
Reference Books:
1. Network Security, Kaufman, Perlman, and Speciner , PHI
2. Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Ronald L. Krutz, Russell Dean
Vines, Wiley Publishing
3. Security Information and Event Management (SIEM) Implementation (Network Pro Library) by David
R. Miller, Shon Harris, Alan Harper, Stephen VanDyke, and Chris Blask
4. Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding
Logging and Log Management by Anton A. Chuvakin and Kevin J. Schmidt
5. Guide to Intrusion Detection and Prevention Systems, National Institute of Science and Technology
Reference Books:
Main Books:
1. "Introduction to Embedded Systems – A Cyber–Physical Systems Approach" - E. A. Lee, Sanjit
Seshia
2. “Principles of Cyber-Physical Systems” - Rajeev Alur
3. Embedded System Security- Davis Kleidermacher, Mike Kleidermacher [Elsevier]
Reference Book:
4. Introduction to Embedded Systems by Shibu [Tata McGraw-Hill Education]
5. Practical Embedded Security – T. Stapko [Newnes]
Subject Code M2AD08CIP Subject Name Cyber Laws and Intellectual Property Rights
Practical Content:
Reference Books:
1. “Cyber law and intellectual property rights” by R Raghav from Cybertech
2. intellectual property rights and Cyber law by Joan Ruttenberg from Havard University
Reference Books:
1. Computer Security – M. Bishop [Addison-Wesley]
2. Introduction to Computer Security – Goodrich and Tamassia (Addison-Wesley)
Reference Books:
L TU P
03 00 01 04 20 50 70
Credit Theory
03 00 02 05 10 20 30
Hours Practical
Content:
Unit Course Content H
No. Rs
1 Security definition and quantification; protected objects and methods; memory and address 75
protection; access control
2 Trusted operating systems; security policies
3 Security definition and quantification; protected objects and methods; memory and address
protection; access control
4 Database security requirements
5 Evaluation Assurance Level: Introduction, Assurance levels, Implications of assurance levels,
Common Criteria Certification (CISCO, IBM, Microsoft).
Practical Content:
Reference Books:
1) Security Engineering -- Ross J. Anderson [Wiley]
2) Evolution Assurance Level: A Practical Guide – Gerard Blokdyk [Create
Space Independent Publishing Platform]
Subject M2B12WLS Subject Name Wireless Security
Code
Teaching scheme Examination scheme (Marks)
(Per Lecture Practical Total INT EXT Total
week) (Lab.)
L TU P
03 00 01 04 20 50 70
Credit Theory
03 00 02 05 10 20 30
Hours Practical
Content:
Unit Course Content H
No. Rs
1 Introduction to wireless security; wired equivalent privacy; WiFi protected access; rogue 75
access points, eavesdropping, interception, countermeasures. Securing Adhoc networks,
routing and security provisioning in adhoc environment, Key management issues, Public and
Private wireless networks, Security design challenges.
2 Extensible authentication protocol, WAP, Wireless security protocols (WEP, WPA,
WPA2, WPA3) and their security measures, WTLS, Port-based authentication (802.lx),
Denial of service at link, Wireless Attacks & Mitigation, monitoring, tracking.
3 Mobile communication security: 3G, 4G, 5G; 3GPP; platform security, apps security; phone
hardware security. Cellular Jamming, Attacks, Mitigation, Secure Mobile,VoIP Services
4 Real-time encryption for satellite data; tools and devices for wireless Security; Wireless
IoT Network Protocols.
5 RFID: Security, Privacy, Techniques, Protocols, MITM attacks, Securitysolutions in RFID.
Bluetooth: Attacks, Scanning, Vulnerability, Mitigation, Recon.
Zigbee: vulnerability and security protocols, Security Problems and Attacks on Smart Cars
Practical Content:
Reference Books:
1) Wireless Security – R. K. Nichols and P. C. Lekkas [McGraw-Hill]
2) Wireless Network Security: Second Edition - Wolfgang Osterhage [CRC Press]
L TU P
03 00 01 04 20 50 70
Credit Theory
03 00 02 05 10 20 30
Hours Practical
Content:
Unit Course Content H
No. Rs
1 Understanding x86 architectures, memory structures: stack, heap; memory segments- code, 75
data, static; memory corruption bugs; buffer overflow; format string threats
2 Secure coding; static and dynamic code analysis; binary analysis; debuggers; protection
mechanisms
3 Malicious Code Analysis, In- Process Dumping Tools, DLL Analysis
4 Malicious Websites Analysis, Browser script DE obfuscation using Debuggers, Depth
Malware Analysis
5 Recognizing Packed Malware, Malware Unpacking Approaches & Tools, Malware defenses
Practical
Reference Books
1) Reversing: Secrets of Reverse Engineering – E. Eilam [Wiley]
2) Hacking: The Art of Exploitation – J. Erickson [SPD]
3) Writing Secure Code -- David LeBlanc and Ben Howard [Microsoft Press]
4) Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious
Software Book by Andrew Honig and Michael Sikorski [NS press]
L TU P
03 00 01 04 20 50 70
Credit Theory
03 00 02 05 10 20 30
Hours Practical
Content:
Unit Course Content H
No. Rs
1 IA overview: concepts, trends, and challenges; Security principles and guidelines;Security 75
strategies; Privacy & Identity in Cyberspace; Physical and personal security, Security
Control Organization and Structure, Fundamental principles of assurance
2 Security Threats/Vulnerabilities; Securing Windows Systems – Windows Architecture,
Security Templates, Group Policies, Windows Applications Security, Patching; Securing
Linux-Based Systems - Architecture, Updating/Patching, Security Policy
3 Identification and Authentication, Access Control & Control enforcements, Access Log, Data
Handling & protection, System and communication protection
4 Reliability, Safety & Risk - IA Policy, Management, Legal and Ethical Issues; Intellectual
Property Rights; Contingency and disaster recovery planning; IA certification &
accreditation; IA Risk analysis and management; System and Information Integrity
Protection
5 Incident Management, Business continuity policy & procedures, Cyber Hygiene,
Importance, Cyber Hygiene assessment, Guidelines & case studies, Computer’s security in
Society & the Workplace
Practical
Reference Books
1. Defense-in-Depth: Foundations for Secure and Resilient Enterprises – Christopher May,
Josh Hammerstein, Kristopher Rush, Jeff Mattson [Software Engineering Institute, Free
from CMU]
2. First Responders Guide to Computer Forensics – Richard Nolan, Colin
O'Sullivan, Jake Branson, Cal Waits [Software Engineering Institute, Free from
CMU]
List of Learning Websites:1.
http://egovstandards.gov.in/sites/default/files/eSAFE%20GD200%20Catalog%20Of%20Se
curit y%20Controls%20Ver1.0.pdf
L TU P
03 00 01 04 20 50 70
Credit Theory
03 00 02 05 10 20 30
Hours Practical
Content:
Unit Course Content H
No. Rs
1 Introduction 75
● Brief Introduction to Machine Learning Well Posed Learning Problems, Motivation
to Machine Learning, Applications of Machine Learning, Designing a Learning
System, Perspective and Issues in Machine Learning, Concept Learning,
● Types of Machine Learning - Supervised Learning, Unsupervised Learning,
Reinforcement Learning
Probability Basics
● Linear Algebra, Statistical Decision Theory – Regression & Classification, Bias
– Variance
● Simple and Multiple Linear Regression – Gradient Descent and Normal
Equations Method, Non-Linear Regression, Linear Regression with
Regularization, Regression Trees, Support Vector Regression, Evaluation
Measures for Regression Analysis
Dimensionality Reduction
● Subset Selection, Shrinkage Methods, Principal Components Regression
● Linear Classification, Logistic Regression, Linear Discriminant Analysis
Optimization, Classification-Separating Hyperplanes Classification
3 Supervised and Unsupervised Learning
Supervised Learning:
Classification, Decision Trees, Random Forest Classifier, Bayes Optimal Classifier, Naïve
Bayes Classifier, Support Vector Machine, K - Nearest Neighbors, Ensemble Methods –
Bagging and Boosting
Unsupervised Learning:
Clustering, K-means, K-medoids, Hierarchical clustering, Density based clustering,
Association Rules, Dimensionality Reduction - Principal Component Analysis
Evaluation: Cross-Validation, Measures of Performance for Classification (Accuracy,
Confusion Matrix, Precision, Recall, F1-Score), Measures of Performance for Clustering
(Homogeneity, Completeness, V-Measure)
4 Semi supervised and Reinforcement Learning
Introduction to Semi-Supervised Learning
Generative Models, A Taxonomy for Semi-Supervised Learning Methods, Semi-
Supervised Text Classification Using EM, Risks of Semi-Supervised Learning,
Probabilistic Semi-Supervised Clustering with Constraints, Transductive Support Vector
Machines, Gaussian Processes and the Null-Category Noise Model, Semi- Supervised
Learning with Conditional Harmonic Mixing, Large-Scale Algorithms, Semi-Supervised
Protein Classification Using Cluster Kernels, Prediction of Protein Function from
Networks, Analysis of Benchmarks
Reinforcement learning
Q Learning, Non deterministic rewards and Actions
5 Artificial Neural Network
Artificial Neural Networks (Early models, Back Propagation, Initialization, Training &
Validation), Parameter Estimation (Maximum Likelihood Estimation, BayesianParameter
Estimation), Decision Trees, Evaluation Measures, Hypothesis Testing,Ensemble Methods,
Graphical Models
Deep Neural Networks
Introduction to Deep Learning, Deep Neural Network, Restricted Boltzmann machine, Convolution
Neural Network, Auto Encoders, Deep Belief Network, Recurrent Neural Network, Transfer
learning.
Applications and case studies for ML & DL
Practical
Reference Books
1) T. Hastie, R. Tibshirani, J. Friedman. The Elements of Statistical Learning, 2e, 2008.
2) Christopher Bishop. Pattern Recognition and Machine Learning. 2e.
3) Tom Mitchell, Machine Learning, TMH
4) R. O. Duda, P. E. Hart and D. G. Stork, Pattern Classification and Scene Analysis,
Wiley
5) Kishan Mehrotra, Chilukuri Mohan and Sanjay Ranka, Elements of Artificial Neural
Networks, Penram International
6) Rajjan Shinghal, Pattern Recognition, Techniques and Applications, OXFORD
7) Athem Ealpaydin, Introduction to Machine Learning, PHI
8) Andries P. Engelbrecht, Computational Intelligence - An Introduction, Wiley
Publication
9) Prince, Computer Vision: Models, Learning, and Inference, Cambridge University
Press, Theodoridis and Koutroumbas
10) Theodoridis, Pikrakis, Koutroumbas, and Cavouras, “Pattern Recognition”, 4th ed.,
Academic Press.
Syllabus
Semester-III
RASHTRIYA RAKSHA UNIVERSITY
An Institution of National Importance
Lavad, Dehgam, Gandhinagar-382305, Gujarat, India
Subject Code 3A17VAP Subject Name Vulnerability Assessment & Penetration Testing
Reference Books:
1. Learning Nessus for Penetration Testing, by Himanshu Kumar
2. The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws,
3. 2nd Mastering Modern Web Penetration Testing by Prakhar Prasad
4. Burp Suite Essentials by Akash Mahajan
5. Rich Bowen, Ken Coar, “Apache Cookbook”, O’Reilly
6. Burp Suite Cookbook
7. Metasploit Penetration testing Cookbook
Reference Books:
Reference Books:
1. Analyzing Computer Security -- Pfleeger and Pfleeger [Prentice Hall]
2. Security in Computing – Pfleeger, Pfleeger, Shah {Pearson]
3. Introduction to Computer Security -- Matt Bishop [Addison-Wesley
Reference Books:
1. Computer Forensics -- Robert C. Newman [Auerbach Publications]
2. Incident Response and Computer Forensics -- Chris Prosise and Kevin Mandia [McGraw-
Hill].
3. Some additional materials needed
L TU P
03 00 01 04 20 50 70
Credit Theory
03 00 02 05 10 20 30
Hours Practical
Content:
Unit Course Content H
No. Rs
1 Introduction to databases; ACID properties; database security lifecycle; dataclassification; data 75
risk assessment; database security architecture; feedback mechanisms.
2 Database installation and configuration: profiles, passwords, privileges, and roles;
databases security controls, security models, user administration.
3 Database application security models: Take-Grant Model; PN model; Bell and LaPadula
Model, Biba Model, Clack-Wilson model; Lattice Model, Roll-based access control, XML
databases.
4 Database Vulnerabilities, Threats & Physical Security: external and internal database threats;
flaws in perimeter security; database security hierarchy; security in distributed databases;
evaluate database security; evaluate organization’s asset; system event triggers; flaws fixes and
security patches; managing USB ports and USB enabled devices; database obscurity; virtual
private database; SQL injection; backup mechanisms.
5 Data security policy: database security risks; database security testing; database auditing
models and tools; user management strategies; maintenance policy, assessmentand (counter)
measures.
Practical Content:
Reference Books:
1. Database Security – A. Basta andM. Zgola [Cengage Learning]
2. Database Security -- Castano, Fugini, Martella [Pearson]
3. Database Security and Auditing-- Hassan Afyouni [Cengage Learning]
4. Effective Oracle Database 10g Security by Design -- David C. Knox [McGraw-Hill]
Subject M3B22ACR Subject Name Advanced Cryptology
Code
Teaching scheme Examination scheme (Marks)
(Per Lecture Practica Total INT EXT Total
week) l (Lab.)
L TU P
20 50 70
Credit Theory
03 00 01 04
10 20 30
Hours 03 00 02 05 Practical
Content:
Unit Course Content H
No. rs
Data encryption standard. Double encryption. Triple encryption. Linear feedback
(8)
shift register.
1 Non-linear feedback shift register. Modern stream ciphers- Grain V1. Security in
mobile telephony.
Design specification of ZUC cipher (4G standard).
Pilling up lemma. Discussion on CPA & CCA security. Cryptanalysis on block (10)
2 ciphers- linear and differential. Cryptanalysis on stream ciphers- correlation and
algebraic.
Number Theory: Elliptic curve group. Square and multiply algorithm. Baby step (04)
3
giant step algorithm.
Public key encryption: Discussion about formulating security model, semantic
security, indistinguishability and decisional & search version of Diffie-Hellman
assumption. RSA encryption and its security proof. Elgamal encryption and its
4 security proof. Bilinear pairing. Digital Signature- security model, RSA digital (12)
signature and its security proof, elliptic curve digital signature algorithm (ECDSA).
Identity based encryption. Attribute based encryption. Fully homomorphic
encryption. Predicate encryption. Functional encryption.
Signal protocol. Commitment schemes. Zero knowledge proofs. Introduction to (11)
post quantum cryptography: Mathematical assumptions- SVP, CVP, SIS, LWE.
5
Regev’s encryption. GPV signature scheme and its security proof. Gentry-Sahai-
Waters(GSW) fully homomorphic encryption scheme.
Practical Content:
Triple DES, Linear cryptanalysis, Differential cryptanalysis, (10)
1
Correlation attack, Algebraic attack
2 Square & multiply algorithm and Baby step-Giant step algorithm (02)
3 RSA Digital signature, ECDSA (04)
4 Signal Protocol (06)
5 Zero knowledge proofs (04)
Regev’s encryption and GPV signature
6 (04)
Reference Books:
1. Cryptography theory and practice, by D. R. Stinson.
2. Handbook of applied cryptography, by A. Menezes, P. V. Oorschot, and S. Vanstone.
3. Introduction to modern cryptography, by J. Katz and Y. Lindell.
4. The foundations of cryptography (Volume I), by O. Goldreich.
5. A graduate course in applied cryptography, by D. Boneh and V. Shoup.
6. Lecture notes on cryptography, by S. Goldwasser and M. Bellare.
7. Algorithmic cryptanalysis, A. Joux.
8. https://signal.org/en/.
9. http://www.is.cas.cn/ztzl2016/zouchongzhi/201801/W020180126529970733243.pdf.
10. https://www.gsma.com/aboutus/wp-content/uploads/2014/12/eea3eia3zucv16.pdf.
11. A Decade of Lattice cryptography by Chris Peikert. https://eprint.iacr.org/2015/939.pdf.
Pre-requisites:
This course requires mathematical maturity and you must have completed the first course “Introduction to
Cryptography”. The course will be self-complete but you should be comfortable with the following
mentioned courses- Elementary Number Theory, Linear Algebra, Probability & Statistics, Abstract
Algebra, Discrete Mathematics and Algorithms.
Learning Outcomes:
On successful completion of this course, students should be able to understand
■ security definition and its types, and be familiar with cryptanalysis on stream and block ciphers.
They should also be able to implement the cryptanalysis on stream and block ciphers
■ security in mobile communication (4G) and end to end encryption
■ security reduction in public key encryption. They will also learn an algorithm (exponential
time) to solve discrete logarithm problem
■ computation in elliptic curve group and bilinear pairing
■ digital signature and its security model & security proof
■ commitment schemes and zero knowledge proofs. They will also explore the security in post
quantum era.
L TU P
20 50 70
Credit 03 00 01 04 Theory
10 20 30
Hours 03 00 02 05 Practical
Content:
Unit Course Content H
No. rs
Basics of Geoinformatics: Definition, Components of Geoinformatics-Geodesy; (5)
Cartography; Photogrammetry; Remote Sensing; Global Navigation Satellite System
1
(GNSS); Geographic Information System (GIS), Evolution of Geoinformatics as a
multidisciplinary area, Applications of Geoinformatics.
Geographic Information System (GIS): Definition, Historical evolution of GIS, (20)
Components of GIS, Spatial vs non-spatial data, Spatial data models–Raster &
Vector, Thematic map creation, Legend creator, Symbology, Symbol management,
Raster data analysis, Vector data analysis (Geoprocessing function)–Buffering;
2
Union; Intersection; Thiessen polygon; Triangulation; Distance measurements;
Analyzing geographic relationship; Overlay analysis; Errors arising through
processing; Vector data analysis, Statistical data analysis tools, and errors arising
from the overlay and boundary intersections. Applications of GIS.
Remote Sensing Technology: History of Remote sensing, Definition; (20)
Electromagnetic Radiation (EMR) and its characteristics, Radiometric laws,
Wavelength regions and their significance, Interaction of EMR with Atmosphere
and Earth’s surface-Absorption; Reflectance; Scattering, Atmospheric windows,
3
Energy balance equation, Spectral response and spectral signature; Platform and
sensors-satellite characteristics, Types of resolutions-Spectral; Spatial; Temporal;
Radiometric resolutions, Global Positioning System and other Global Navigation
Satellite System (GNSS), Applications of Remote sensing.
Cartography: Definition, the spheroid, concept of geoid, ellipsoid, Coordinate (10)
system, map projections, Principles of construction of standard projections-
cylindrical; conical; azimuthal; spherical projections, plane coordinates, the
4
projection used in Survey of India, topographical sheets, map scale, methods of
mapping, relief maps, thematic maps: Unique Values, Quantile, Single symbol,
Map Layout.
Digital Image Processing: Pre-processing of images, Data formats: BSQ; BIL; (20)
BIP, Visual satellite image interpretation of significant landforms, Elements of
image interpretation, development of interpretation keys, Image interpretation for
LU/LC and vegetation mapping, Histogram, Sources of image degradation,
5 Radiometric, Atmospheric & Geometric correction techniques, linear and non-
linear transformation for geometric corrections, Look-up Tables (LUT) and Types
of image displays and FCC, Digital Elevation Model (DEM), Image transformation:
Indices; RGB to HIS; IHS to RGB, Classification, PAN sharpening, enhancement
technique, Image filtering, Mosaicking, Layer stacking, Reprojection
Practical Content:
Project creation, Project Management-Save, Backup/Restore, Delete, Close. (02)
1 View Management- Create, Delete, Rename etc. Layer creation, Layer
management – Delete, Sequencing, Backup/Restore, Copy etc.
2 Introduction to data sources of raster data and vector data. (02)
3 Familiarization with projections (Conical, Polyconic, Cylindrical) (02)
Import / Export of raster and vector data and Visual interpretation using different (02)
4
bands in satellite dataset
5 Digitization of point, line and polygon features (02)
6 Radiometric, Geometric and Atmospheric corrections (02)
7 Digital interpretation of earth surface features in Standard FCC, Natural color (02)
8 Supervised and Unsupervised classification (02)
9 Examine the DEM and contour data (02)
10 Geo-referencing of spatial data (02)
11 Interpretation of urban feature from aerial and/or satellite image (02)
2 6 Credits 00 00 30 30 70 00 70
3 4 Credits 10 10 10 30 20 50 70
1.4 Grading:
● The RRU adopts absolute grading system wherein the marks are converted to grades, and
every semester result will be declared with semester grade point average (SGPA) and
Cumulative Grade Point Average (CGPA). The CGPA will be calculated every semester,
except the first semester.
● The grading system is with the following letter grades as given below:
2.1 Grade Point: Grade point is an integer indicating the numerical equivalent of the letter grade.
2.2 Credit Point (P): Credit point is the value obtained by multiplying the grade point (G) by the credit
(C): P = G x C.
2.3 Semester Grade Point Average (SGPA): Semester Grade Point Average (SGPA) is the value
obtained by dividing the sum of credit points (P) earned by a student in various courses taken in a
semester by the total number of credits earned by the student in that semester. SGPA shall be rounded
off to two decimal places.
2.4 Cumulative Grade Point Average (CGPA): ‘Cumulative Grade Point Average’ (CGPA) is the value
obtained by dividing the sum of credit points in all the courses earned by a student for the entire
programme, by the total number of credits. CGPA shall be rounded off to two decimal places. CGPA
indicates the comprehensive academic performance of a student in a programme.
An overall letter grade (Cumulative Grade) for the entire programme shall be awarded to a student
depending on his/her CGPA.
2.5 Calculation of semester grade point average (SGPA) and cumulative grade point average
(CGPA):
● Performance in a semester will be expressed as Semester Grade Point Average (SGPA).
● Cumulative performance of all the semesters together will reflect performance in the whole
programme and will be known as Cumulative Grade Point Average (CGPA). Thus, CGPA
is the real indicator of a student’s performance.
● The formula for calculation of SGPA and CGPA is given below:
SGPA = (Ʃ Ci Mi) / (Ʃ Ci) CGPA = (Ʃ Ʃ Cni Gni) / (Ʃ Ʃ Cni) Where
Ci - number of credits for the ith course, Gi - grade point obtained in the ith course, Cni -
number of credits of the ith course of the nth semester, Gni - grade points of the ith course
of the nth semester
● Refer the following examples for better understanding of CGPA/SGPA.
Example:
Illustration No.2(a)