Market Size by 2026
Future jobs by 2026
Market Size in 2021
The BCA program from ICRI specializes in Data Science built on Computer Science and Engineering. It is a unique combination of interdisciplinary program work designed for those who seek to become 'Data Scientists'.
The curriculum design and structure are guided both by recent work on the relation of Data Science to the other domains and the need for talent to meet the demands of the data-driven economy of the future. Graduates of the BCA program in Computer Science will be uniquely positioned to pursue a career in industry, academia, or research in this rapidly growing and all-pervasive field of Data Science.
India’s first & largest institute in new age careers
Real time exposure in data analysis with practical training
Industry trainings embedded in course curriculum
19000+ alumni network working across the globe
Learn and explore the best of both worlds with India’s top ranked university
Workshop on robotics and certification in Data Science by top industry bodies and ICRI university partners.
What will you learn?
A cryptographer is a person who uses mathematical algorithms to encode and decode data. Cryptography is used in a variety of applications, including email, file sharing, and secure communications. Cryptographers use a variety of techniques to create and break codes, including symmetric-key cryptography, public-key cryptography, and Steganography.
Chief Information Security Officer
The Chief data security specialist is known as the CISO (Chief Information Security Officer) or CSO (Chief Security Officer). The purpose of the profile is to protect assets, infrastructure, and IT security as well as individual and corporate data. With a focus on the company's best interests, the CISO plays a crucial role in risk assessment, mitigation, and solution.
Forensic professionals use a variety of techniques to solve crimes. They may use physical evidence, such as fingerprints or hair samples, to help them identify suspects. They may also use forensic tools, such as a computer or microscope, to analyze evidence.
Security Software Developer
Security software developers are responsible for creating and maintaining software that protects networks, systems, and data from unauthorized access. They may also be responsible for creating software that detects and blocks malicious cyber activity. Security software developers must have a strong understanding of computer security principles, cryptography, and network protocols.
Security Administrator / Security Consultant
A security administrator is responsible for protecting the information and assets of a company or organization by implementing and maintaining a secure network and system. They also work to identify and prevent security breaches. A security administrator should have a strong knowledge of computer security and experience working with various software and hardware platforms.
Scope of data science: