Announcements
Colloquy4.0 Website Launch
Colloquy4.0 Website Launch
B. Voc. Time Table for Mid Semester Exam 2024-25 (EVEN)
B. Voc. Time Table for Mid Semester Exam 2024-25(EVEN)
Time Table for (Regular and Honours) Mid Semester Exam 2024-25 (EVEN)
Time Table for (Regular and Honours) Mid Semester Exam 2024-25 (EVEN)
Practical/Oral Timetable Odd Sem Oct 2024 AY:2024-25
SY Practical Oral Schedule TY Practical Oral Schedule B Tech Oral Practical Schedule
Internal Assessment – KT Examination Time Table 2024-25(ODD)
Internal Assessment - KT Examination Time Table 2024-25(ODD)
Direct Second Year Time Table for Mid Semester Exam 2024-25(ODD)
Direct Second Year Time Table for Mid Semester Exam 2024-25(ODD)
B. Voc. Time Table for Mid Semester Exam 2024-25 (ODD)
B. Voc. Time Table for Mid Semester Exam 2024-25(ODD)
Research Publications
Internships
Events
Books Published
UG Program in Computer Engineering and Information Technology are reaccredited by NBA for 3 years from AY 2022-23.
UG Program in Electronics and Telecommunication Engineering is accredited by NBA for 3 years from AY 2024-25.

Dr. Nilakshi Jain
I/c Head of Department
Ph.D. (Faculty of Computer Engineering – Digital Forensic)
Teaching Experience: 15 Years
Area of Specialization:Digital Forensic, Cyber Security, Artificial Intelligence
“True Cyber Security is to prepare what’s NEXT , not what was LAST.” -Neil Rerup
The key factor in today’s techno-savvy society is Education & knowledge is the greatest strength with which every nation progresses. SAKEC recognizes the need for this learning and in order to create a cyber secure world , “Cyber Security Department” came into existence in the year 2020 with initial intake of 60.
Cyber security is the field that focuses on protecting networks, companies, and individuals from attacks. Cyber-attacks can include unauthorized access, viruses, spyware, spam, botnets, phishing scams, and more. In other words, cyber security is an essential part of the Digital World.
With this course, you’ll learn computer security from both software and hardware perspective, with a focus on building and maintaining more secure systems.