{"id":25043,"date":"2026-04-29T13:50:44","date_gmt":"2026-04-29T08:20:44","guid":{"rendered":"https:\/\/www.srms.ac.in\/cetr\/?page_id=25043"},"modified":"2026-04-29T15:35:27","modified_gmt":"2026-04-29T10:05:27","slug":"vision-and-mission","status":"publish","type":"page","link":"https:\/\/www.srms.ac.in\/cetr\/department-of-computer-science-engineering-cyber-security\/vision-and-mission\/","title":{"rendered":"Vision and Mission"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"25043\" class=\"elementor elementor-25043\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23118bb wd-section-stretch e-flex e-con-boxed e-con e-parent\" data-id=\"23118bb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4695d52 e-con-full e-flex e-con e-child\" data-id=\"4695d52\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ace7f0 eael-hamburger--none eael_simple_menu_hamburger_disable_selected_menu_no eael-simple-menu-hamburger-align-right elementor-widget elementor-widget-eael-simple-menu\" data-id=\"9ace7f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-simple-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div data-hamburger-icon=\"&lt;svg aria-hidden=&quot;true&quot; class=&quot;e-font-icon-svg e-fas-bars&quot; viewBox=&quot;0 0 448 512&quot; xmlns=&quot;http:\/\/www.w3.org\/2000\/svg&quot;&gt;&lt;path d=&quot;M16 132h416c8.837 0 16-7.163 16-16V76c0-8.837-7.163-16-16-16H16C7.163 60 0 67.163 0 76v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16z&quot;&gt;&lt;\/path&gt;&lt;\/svg&gt;\" data-indicator-icon=\"&lt;svg aria-hidden=&quot;true&quot; class=&quot;e-font-icon-svg e-fas-angle-down&quot; viewBox=&quot;0 0 320 512&quot; xmlns=&quot;http:\/\/www.w3.org\/2000\/svg&quot;&gt;&lt;path d=&quot;M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z&quot;&gt;&lt;\/path&gt;&lt;\/svg&gt;\" data-dropdown-indicator-icon=\"&lt;svg class=&quot;e-font-icon-svg e-fas-angle-down&quot; viewBox=&quot;0 0 320 512&quot; xmlns=&quot;http:\/\/www.w3.org\/2000\/svg&quot;&gt;&lt;path d=&quot;M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z&quot;&gt;&lt;\/path&gt;&lt;\/svg&gt;\" class=\"eael-simple-menu-container eael-simple-menu--loading eael-simple-menu-align-center eael-simple-menu-dropdown-align-left preset-2\" data-hamburger-breakpoints=\"{&quot;mobile&quot;:&quot;Mobile Portrait (&gt; 767px)&quot;,&quot;tablet&quot;:&quot;Tablet Portrait (&gt; 1024px)&quot;,&quot;desktop&quot;:&quot;Desktop (&gt; 2400px)&quot;,&quot;none&quot;:&quot;None&quot;}\" data-hamburger-device=\"none\">\n                <ul id=\"menu-side-mneu-of-cyber-security\" class=\"eael-simple-menu eael-simple-menu-dropdown-animate-to-top eael-simple-menu-indicator eael-simple-menu-vertical\"><li id=\"menu-item-25197\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-25197\"><a href=\"https:\/\/www.srms.ac.in\/cetr\/department-of-computer-science-engineering-cyber-security\/\">About the Department<\/a><\/li>\n<li id=\"menu-item-25079\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-25079\"><a href=\"https:\/\/www.srms.ac.in\/cetr\/department-of-computer-science-engineering-cyber-security\/vision-and-mission\/\">Vision and Mission<\/a><\/li>\n<li id=\"menu-item-25078\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-25078\"><a href=\"https:\/\/www.srms.ac.in\/cetr\/department-of-computer-science-engineering-cyber-security\/program-educational-objectives-peos\/\">Program Educational Objectives (PEO&#8217;s)<\/a><\/li>\n<li id=\"menu-item-25077\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-25077\"><a href=\"https:\/\/www.srms.ac.in\/cetr\/department-of-computer-science-engineering-cyber-security\/program-outcomes-pos\/\">Program Outcomes (PO&#8217;s)<\/a><\/li>\n<li id=\"menu-item-25076\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-25076\"><a href=\"https:\/\/www.srms.ac.in\/cetr\/department-of-computer-science-engineering-cyber-security\/program-specific-outcomes-psos\/\">Program Specific Outcomes (PSO&#8217;s)<\/a><\/li>\n<\/ul>                <button class=\"eael-simple-menu-toggle\">\n                    <span class=\"sr-only \">Hamburger Toggle Menu<\/span>\n                    <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-bars\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M16 132h416c8.837 0 16-7.163 16-16V76c0-8.837-7.163-16-16-16H16C7.163 60 0 67.163 0 76v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16z\"><\/path><\/svg>                <\/button>\n            <\/div>\n            \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9026b96 e-con-full e-flex e-con e-child\" data-id=\"9026b96\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4f21aa elementor-widget elementor-widget-elementskit-heading\" data-id=\"c4f21aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Vision<\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider ekit-dotted\"><div class=\"elementskit-border-divider ekit-dotted\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b880ad elementor-widget__width-inherit color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"5b880ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To become a center of excellence in Cyber Security education and research, producing skilled professionals capable of safeguarding digital infrastructure, ensuring data privacy, and addressing emerging cyber threats with innovation, ethics, and global competence.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bc2cb5 elementor-widget elementor-widget-elementskit-heading\" data-id=\"2bc2cb5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Mission<\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider ekit-dotted\"><div class=\"elementskit-border-divider ekit-dotted\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3de1716 elementor-widget__width-inherit color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"3de1716\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>To provide strong theoretical and practical knowledge in computer science and cyber security through a modern, industry-oriented curriculum.<\/li><li>To equip students with hands-on expertise in areas such as ethical hacking, network security, cryptography, digital forensics, and secure software development.<\/li><li>To promote research, innovation, and development in cyber security technologies to address real-world challenges.<\/li><li>To build partnerships with industry and organizations for internships, live projects, and exposure to current cyber security practices.<\/li><li>To instill professional ethics, legal awareness, and social responsibility in handling cyber systems and sensitive data.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>About the Department Vision and Mission Program Educational Objectives (PEO&#8217;s) Program Outcomes (PO&#8217;s) Program Specific Outcomes (PSO&#8217;s) Hamburger Toggle Menu<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":25025,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-25043","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.srms.ac.in\/cetr\/wp-json\/wp\/v2\/pages\/25043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.srms.ac.in\/cetr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.srms.ac.in\/cetr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.srms.ac.in\/cetr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.srms.ac.in\/cetr\/wp-json\/wp\/v2\/comments?post=25043"}],"version-history":[{"count":7,"href":"https:\/\/www.srms.ac.in\/cetr\/wp-json\/wp\/v2\/pages\/25043\/revisions"}],"predecessor-version":[{"id":25206,"href":"https:\/\/www.srms.ac.in\/cetr\/wp-json\/wp\/v2\/pages\/25043\/revisions\/25206"}],"up":[{"embeddable":true,"href":"https:\/\/www.srms.ac.in\/cetr\/wp-json\/wp\/v2\/pages\/25025"}],"wp:attachment":[{"href":"https:\/\/www.srms.ac.in\/cetr\/wp-json\/wp\/v2\/media?parent=25043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}