Gojan School of Business and Technology

GOJAN SCHOOL OF BUSINESS AND TECHNOLOGY

Approved by A.I.C.T.E. New Delhi & Affiliated to Anna University, Chennai

NAAC Accredited Institution Recognized by UGC u/s 2(f) & 12(B) of the UGC Act

80 Feet Road, Edapalayam, Redhills, Chennai – 600 052

ADMISSION OPEN FOR 2024-2025 APPLY NOW         ACADEMIC CALANDER 2024-2025         TRANSPORT DETAILS 2024

GOJAN
SCHOOL OF BUSINESS AND TECHNOLOGY

Your Webpage Title

Approved by A.I.C.T.E. New Delhi & Affiliated to Anna University, Chennai NAAC Accredited Institution Recognized by UGC u/s 2(f) & 12(B) of the UGC Act

80 Feet Road, Edapalayam, Redhills, Chennai – 600 052

ADMISSION OPEN FOR 2024-2025 CLICK HERE TO APPLY NOW

B.E-CSE (Cyber Security)

About The Department

The Department of Computer Science and Engineering-Cyber Security was established in the year 2022. The current intake students are 30 for UG Programme. UG Programmes are conducted based on the syllabus prescribed by the Anna University, Chennai. In today’s increasingly digital world, the need for skilled cyber security experts has never been greater. The Bachelor of Engineering (B.E.) in Computer Science and Engineering with a specialization in Cyber Security at Gojan School of Business and Technology is designed to meet the growing demand for professionals who can protect and secure the digital infrastructure of organizations, ensuring the confidentiality, integrity, and availability of sensitive information. The department is equipped with well qualified and experienced faculty members to improve and enhance the knowledge of the student community. The department has good computing facilities with latest and updated versions of the software. The department conducts periodic workshop, seminar and conferences to help students, research scholars and industries to share a common platform and thereby strengthen the industry institution fusion. The department has highly qualified faculty with a blend of academic experience. The faculty helps the students to present papers in different Seminars, Symposium and also encourage the students for these activities

Vision & Mission

Vision

Mission

HOD & Faculty

Department Faculty

S.NO Name Designation
1
Mrs. Pushpasheela E
Assistant Professor
2
Mrs. Saranya S
Assistant Professor
3
Ms. Deva Jenifer C
Assistant Professor

PEOs, PSOs,POs

Mr.P.Senthil is the Head of the Department for the Department of Computer Science and Engineering at Gojan School of Business and Technology. He obtained his B.E (CSE) at Dhanalakshmi Srinivasan College of Engineering & Technology, Chennai in 2011, M.Tech (Computer Science and Engineering) at Bharath University. Chennai in 2013 He has an academic experience of around 9 years in teaching various computer related subjects. He has participated in many national and international conferences held around India. He has published many SCOPUS Indexed Journals. He is an expertise in the area of Artificial Intelligence and Machine Learning and has guided many students to excel in their IBM Projects

Program Educational Objectives (PEOs)

PEO1 : Apply their technical competence in computer science to solve real world problems, with technical and people leadership.
PEO2 : Conduct cutting edge research and develop solutions on problems of social relevance
PEO3 : Work in a business environment, exhibiting team skills, work ethics, adaptability and lifelong learning

Program Outcomes (POs)

PO1 : Engineering Knowledge: Apply the knowledge of mathematics, science, engineering fundamentals and an engineering specialization to the solution of complex engineering problems.
PO2 : Problem Analysis: Identify, formulate, review research literature, and analyze complex engineering problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and engineering sciences.
PO3 : Design / Development of solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for the public health and safety, and the cultural, societal, and environmental considerations.
PO4 : Conduct investigations of complex problems: Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions.
PO5 : Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools including prediction and modeling to complex engineering activities with an understanding of the limitations.
PO6 : The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional engineering practice.
PO7 : Environment and sustainability: Understand the impact of the professional engineering solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development.
PO8 : Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering practice.
PO9 : Individual and team work: Function effectively as an individual and as a member or leader in diverse teams, and in multidisciplinary settings.
PO10 : Communication: Communicate effectively on complex engineering activities with the engineering community and with society at large, such as, being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions.
PO11 : Project management and finance: Demonstrate knowledge and understanding of the engineering management principles and apply these to one’s own work, as a member and leader in a team, to manage projects and in multidisciplinary environments.
PO12 : Life-long learning: Recognize the need for and have the preparation and ability to engage in independent and lifelong learning in the broadest context of technological change.

Program Specific Outcomes (PSOs)

PSO1 : Exhibit design and programming skills to build and automate business solutions using cutting edge technologies
PSO2 : Strong theoretical foundation leading to excellence and excitement towards research, to provide elegant solutions to complex problems.

Course Outcomes

Gojan School Of Business And Technology Department Of Cse – Cyber Security Course Outcomes

Third Semester

MA3354-DISCRETE MATHEMATICS

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Have knowledge of the concepts needed to test the logic of a program
CO2
Have an understanding in identifying structures on many levels.
CO3
Be aware of a class of functions which transform a finite set into another finite set which relates to input and output functions in computer science
CO4
Be aware of the counting principles
CO5
Be exposed to concepts and properties of algebraic structures such as groups, rings and fields.

CS3351-DIGITAL PRINCIPLES AND COMPUTER ORGANIZATION

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Design various combinational digital circuits using logic gates
CO2
Design sequential circuits and analyze the design procedures
CO3
State the fundamentals of computer systems and analyze the execution of an instruction.
CO4
Analyze different types of control design and identify hazards
CO5
Identify the characteristics of various memory systems and I/O communication

CS3352-FOUNDATIONS OF DATA SCIENCE

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Define the data science process
CO2
Understand different types of data description for data science process
CO3
Gain knowledge on relationships between data
CO4
Use the Python Libraries for Data Wrangling
CO5
Apply visualization Libraries in Python to interpret and explore data

CD3291-DATA STRUCTURES AND ALGORITHMS

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Explain abstract data types
CO2
Design, implement, and analyze linear data structures, such as lists, queues, and stacks, according to the needs of different applications
CO3
Design, implement, and analyze efficient tree structures to meet requirements such as searching, indexing, and sorting
CO4
Model problems as graph problems and implement efficient graph algorithms to solve them
CO5
Analyze the various searching and sorting algorithms.

CS3391-OBJECT ORIENTED PROGRAMMING

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Apply the concepts of classes and objects to solve simple problems
CO2
Develop programs using inheritance, packages and interfaces
CO3
Make use of exception handling mechanisms and multithreaded model to solve real world problems
CO4
Build Java applications with I/O packages, string classes, Collections and generics concepts
CO5
Integrate the concepts of event handling and Java FX components and controls for developing GUI based applications

CD3281-DATA STRUCTURES AND ALGORITHMS LABORATORY

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Implement ADTs as Python classes
CO2
Design, implement, and analyse linear data structures, such as lists, queues, and stacks, according to the needs of different applications
CO3
Design, implement, and analyse efficient tree structures to meet requirements such as searching, indexing, and sorting
CO4
Model problems as graph problems and implement efficient graph algorithms to solve them
CO5
Analyze the various searching and sorting algorithms

CS3381-OBJECT ORIENTED PROGRAMMING LABORATORY

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Design and develop java programs using object oriented programming concepts
CO2
Develop simple applications using object oriented concepts such as package, exceptions
CO3
Implement multithreading, and generics concepts
CO4
Create GUIs and event driven programming applications for real world problems
CO5
Implement and deploy web applications using Java

CS3361- DATA SCIENCE LABORATORY

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Make use of the python libraries for data science
CO2
Make use of the basic Statistical and Probability measures for data science.
CO3
Perform descriptive analytics on the benchmark data sets
CO4
Perform correlation and regression analytics on standard data sets
CO5
Present and interpret data using visualization packages in Python.

Fourth Semester

CS3452- THEORY OF COMPUTATION 

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Construct automata theory using Finite Automata
CO2
Write regular expressions for any pattern
CO3
Design context free grammar and Pushdown Automata
CO4
Design Turing machine for computational functions
CO5
Differentiate between decidable and undecidable problems

CS3491-ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Use appropriate search algorithms for problem solving
CO2
Apply reasoning under uncertainty
CO3
Build supervised learning models
CO4
Build ensembling and unsupervised models
CO5
Build deep learning neural network models

CB3401-DATABASE MANAGEMENT SYSTEMS AND SECURITY

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Model an application’s data requirements using conceptual modeling and design database schemas based on the conceptual model.
CO2
Formulate solutions to a broad range of query problems using relational algebra/SQL.
CO3
Demonstrate an understanding of normalization theory and apply such knowledge to the normalization of a database
CO4
Run transactions and estimate the procedures for controlling the consequences of concurrent data access
CO5
Understand and handle security issues in database management systems

CB3402 –OPERATING SYSTEM AND SECURITY

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
To gain understanding on the concepts of Operating Systems.
CO2
To acquire knowledge on process management concepts including scheduling, synchronization, threads and deadlock.
CO3
To have understanding on memory, file and I/O management activities of OS
CO4
To understand security issues in operating systems and appreciate the need for security models
CO5
To gain exposure to the operating systems security models of WINDOWS and UNIX OS.

CB3491- CRYPTOGRAPHY AND CYBER SECURITY

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Understand the fundamentals of networks security, security architecture, threats and vulnerabilities
CO2
Apply the different cryptographic operations of symmetric cryptographic algorithms
CO3
Apply the different cryptographic operations of public key cryptography
CO4
Apply the various Authentication schemes to simulate different applications.
CO5
Understand various cyber crimes and cyber security

GE3451-ENVIRONMENTAL SCIENCES AND SUSTAINABILITY

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
To recognize and understand the functions of environment, ecosystems and biodiversity and their conservation.
CO2
To identify the causes, effects of environmental pollution and natural disasters and contribute to the preventive measures in the society.
CO3
To identify and apply the understanding of renewable and non-renewable resources and contribute to the sustainable measures to preserve them for future generations.
CO4
To recognize the different goals of sustainable development and apply them for suitable technological advancement and societal development
CO5
To demonstrate the knowledge of sustainability practices and identify green materials, energy cycles and the role of sustainable urbanization.

CB3411- CRYPTOGRAPHY AND CYBER SECURITY LABORATORY

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Develop a code for classical encryption techniques.
CO2
Build a symmetric and asymmetric algorithms.
CO3
Construct a code for various Authentication schemes
CO4
Apply the principles of digital signature.

CB3412 DATABASE MANAGEMENT SYSTEMS & SECURITY
LABORATORY

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Create databases with different types of key constraints.
CO2
Write simple and complex SQL queries using DML and DCL commands.
CO3
Realize database design using 3NF and BCNF.
CO4
Use advanced features such as stored procedures and triggers.
CO5
Secure databases and mitigate attacks on databases.

Fifth Semester

CS3591 COMPUTER NETWORKS

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Explain the basic layers and its functions in computer networks.
CO2
Understand the basics of how data flows from one node to another.
CO3
Analyze routing algorithms.
CO4
Describe protocols for various functions in the network.
CO5
Analyze the working of various application layer protocols.

CB3591 ENGINEERING SECURE SOFTWARE SYSTEMS

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Identify various vulnerabilities related to memory attacks
CO2
Apply security principles in software development.
CO3
Evaluate the extent of risks.
CO4
Involve selection of testing techniques related to software security in the testing phase of software development.
CO5
Use tools for securing software.

CS3551 DISTRIBUTED COMPUTING

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Explain the foundations of distributed systems.
CO2
Solve synchronization and state consistency problem.
CO3
Use resource sharing techniques in distributed systems.
CO4
Apply working model of consensus and reliability of distributed systems.
CO5
Explain the fundamentals of cloud computing.

CS3691 EMBEDDED SYSTEMS AND IOT

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Explain the architecture of embedded processors.
CO2
Write embedded C programs
CO3
Design simple embedded applications
CO4
Compare the communication models in IOT
CO5
Design IoT applications using Arduino/Raspberry Pi /open platform

CCW331 BUSINESS ANALYTICS

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Explain the real world business problems and model with analytical solutions.
CO2
Identify the business processes for extracting Business Intelligence
CO3
Apply predictive analytics for business fore-casting
CO4
Apply analytics for supply chain and logistics management
CO5
Use analytics for marketing and sales

CCS334 BIG DATA ANALYTICS

COs
Course Outcome: The students, after the completion of the course, are expected to….
CO1
Describe big data and use cases from selected business domains
CO2
Explain NoSQL big data management
CO3
Install, configure, and run Hadoop and HDFS
CO4
Perform map-reduce analytics using Hadoop
CO5
Use Hadoop-related tools such as HBase, Cassandra, Pig, and Hive for big data analytics

Department Advisory Committee (DAC)

Gojan School Of Business And Technology Department Of Cse-cyber Security Department Advisory Committee

S.NO NAME OF FACULTY ROLE AND DESIGNATION
1
Dr.C.Selvakumar
PRINCIPAL
2
Dr.G.Arunsankar
DIRECTOR -Academic Affairs
3
Mr.R.Ramadhurai
DIRECTOR – Student Affairs
4
Mr.L.Suresh Raj
Faculty Member
5
Mrs. Puspa Sheela E
Faculty Member
6
Ms. DevaJenifar C
Faculty Member
7
Mr.Vivekram S
Faculty Member
8
Ms.Bhavani M
Faculty Member
9
Ms.Malliga Arjunan L
Faculty Member
10
Mr.RAJU S
Occupation- Welder – F/O VIGNESH R– II year Cyber

Board of Studies

1.Ms.Puspa Sheela E
2.Mr.Vivekram

1.Mr.Srinivasan,
Sr.Software Developer, Accenture,Chennai.

2.Akash E
Technology Analyst, Infosys, Chennai.

1.Vignesh R
II YEAR CYBER

2. Hemalatha S
II YEAR CYBER

Laboratory

The Department of CSE – Cyber Security has several well equipped laboratories catering to the needs of not only the CSE – Cyber Security students but also students from other departments. It provides a wide approach in various programming languages and enables to apply knowledge in latest computer technologies, programming Languages, Data structures, Data Science and Cryptography.

S.NO SEM/YEAR LABORATORY NAME SOFTWARE USED
1
I/I
GE3171 Problem Solving and Python Programming Lab
Python 3.11
2
II/I
CS3271 Programming in C
Linux Ubuntu 20 OSwith GNU compiler
3
III/II
CS3361 Data Science Lab
Python 3.9 or later, Anaconda DistributionScipy, statmodels, seaborn, plotly
4
III/II
CD3281 Data Structures and Algorithms Lab
Dev C++ / Eclipse CDT / Code Blocks / CodeLite
5
III/II
CS3381Object Oriented Programming Lab
Netbeans/ Eclipse CDT
6
IV/II
CB3411 Cryptography and Cyber Security Laboratory
DevC++ / NetBeans / Eclipse IDEs / Java or equivalent Compiler/Network simulator like NS2/Glomosim/OPNET/ Packet Tracer / Equivalent
7
IV/II
CB3412 Database Management Systems and Security Laboratory
Oracle Database 12 or higher, MySQL 5.7 or higher, SQL Server 2022(16.x),PostgresQL

Centre of Excellence

Our students become part of a global network of Cisco Networking Academy alumni, providing opportunities for networking, knowledge sharing, and career growth.

Our labs and equipment are updated regularly to keep pace with the latest advancements in networking technology.

Our students graduate with the practical skills needed to succeed in the networking industry, ensuring they are job-ready from day one.

Events and Activities

DATE CHIEF GUEST TITLE OF THE EVENT
28.05.2022
Mr.Vivek Rajendran Senior Manager-HR Panasonic Appliances India Co Ltd Chennai.
NCRTET’22
13.05.2023
Mr.J.A.Nazar, Managing Director, Omega Sanitations PVT LTD,Chennai
NCRTET’23

The Guest Lecture on the topic of “Empowerment Seminar for female students: personality, Hygiene and Body Language” was organized by Gojan Women Grievance cell.

DATE TITLE OF THE EVENT CHIEF GUEST
23.09.2023
Chakaravyuha’23
Mr.Jaiganesh Suresh, Data Science Architect, Ericsson AI Research & Development, Freelance lead trainer, Speaker of India Book of Record

Workshop was conducted on the topic of “WEBSITE DESIGNING” by Mr.C.Suresh on 12.10.2023

DATE EVENT DETAILS No.Of Students Year of Study
31.10.2023
Code Bind Technologies, Coimbatore.
10
II year

Training

Achievements

⦁ Suresh C has participated one day FDP on “Innovative Teaching Methods” organized by Academic Planning and Review Committee on 12.02.2022

⦁ Suresh C has participated one week FDP on “Outcome based Education & Essential AI tools for Teachers organized by Carmel College in association with The Kerala State Higher Education Council (KSHEC) from 10.08.2023 to 18.08. 2023.

⦁ Suresh C has participated five days FDP on “Industry 4.0” organized by ACS College of Engineering on from 31.01.2022 to 04.02.2022

⦁ Suresh C has participated five days FDP on “Education 5.0” organized by Dr.MGR Educational and Research Institute from 15.05.2023 to 19.05.2023

⦁ Suresh C has participated one week online FDP on “Internet of Things” conducted by National Institute of Technical Teachers Training and Research (NITTTR), Chandigarh.

⦁ Suresh C has participated one week FDP on “Block Chain Course” organized by NSE Academy and TamilNadu Skill Development Corporation through Naan Mudhalvan Program at Vellore Institute of Technology

⦁ Suresh C has participated one week FDP on “Block Chain Course” organized by NSE Academy and TamilNadu Skill Development Corporation through Naan Mudhalvan Program at Vellore Institute of Technology

Mr.Vinith A, Mr.Sonu M, Mr.Pandian N of II year CSE-Cyber Students has participated in Symposium event at SRM college, Vadapalani Campus on 06.10.2023

Mr.Ajay A, Mr.ArunPandy P, Mr. Sheshatri A of II year CSE-Cyber Students has participated in Symposium event at Saveetha Engineering College, Chennai on 18.10.2023

Journal And Publications

JOURNAL NAME TITLE FACULTY NAME YEAR
International journal of Advances in Engineering and Management
A Composite Wormhole Intrusion Detection in Mobile Ad-Hoc Network (MANET)
Mr.C.Suresh
2022
International Research Journal of Modernization in Engineering Technology and Science
A Novel IoT based approach for vehicle accident prevention and detection
Mr.C.Suresh
2021
International Journal of Science and Management Studies
A Bridge Dual-Character Time-Perceptive Traditionalized Synergic Ranking Design For POI Proposal
Mr.C.Suresh
2020
International Journal for Research in Applied Science and Engineering Technology
Defending Phishing Attacks on E-Banking Websites using CaptchaAuthentication
Mr.C.Suresh
2020

Innovation and Start-up

Welcome to the CyberFrontiers Club, a dynamic and passionate community of cybersecurity enthusiasts at Gojan School of Business and Technology. We are the vanguards of digital defense, dedicated to exploring the ever-evolving frontiers of cyberspace, mastering the art of cybersecurity, and safeguarding the digital world.

At CyberFrontiers, our mission is clear:

  • To promote awareness and knowledge in the field of cybersecurity.
  • To foster a strong ethical foundation in cybersecurity practices.
  • To create a space for like-minded students to collaborate, learn, and innovate.
  • To prepare our members for promising careers in cybersecurity.
  • To contribute to a safer and more resilient digital ecosystem.

1. Cybersecurity Workshops: We organize workshops and training sessions where members can gain hands-on experience in various aspects of cybersecurity, such as ethical hacking, network security, cryptography, and more.

2. Capture The Flag (CTF) Competitions: Challenge your skills by participating in CTF competitions, where members tackle real-world cybersecurity scenarios, solve puzzles, and hone their problem-solving abilities.

3. Guest Lectures: We invite industry experts and cybersecurity professionals to share their insights and experiences, giving our members a glimpse into the practical applications of cybersecurity.

4. Research and Projects: Members have the opportunity to engage in research projects and collaborate on initiatives that explore cutting-edge cybersecurity technologies and contribute to the field.

5. Cybersecurity Events: We host events that promote cybersecurity awareness within the college and the wider community, showcasing the importance of cybersecurity in our daily lives.

6. Certifications and Training: We assist members in preparing for industry-recognized certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), and Certified Ethical Hacker (CEH).

7. Networking: CyberFrontiers provides a platform for students to connect with industry professionals and fellow cybersecurity enthusiasts, creating a supportive and knowledge-sharing community.

Awards and Recognition

⦁ Mr.C.Suresh received GOJAN EXCELLENCE AWARD for producing 100% results in Anna University Examination 2022-23.

Research and Consultancy

Welcome to the Research Consultancy page at Gojan School of Business and Technology. We are committed to fostering an environment of innovation and academic excellence, where research consultancy plays a pivotal role in advancing knowledge and providing valuable solutions to industry, government, and community partners.

At Gojan School of Business and Technology, we believe that research is not confined to the classroom or laboratory; it extends to the real world, where our expertise can make a tangible impact. Research consultancy is the bridge between academic excellence and practical applications. We approach research consultancy with the following core principles:

1. Interdisciplinary Collaboration: We encourage collaborations that transcend traditional academic boundaries. This approach enriches the research process by combining insights and expertise from various fields.

2. Industry Partnerships: We work closely with industry partners to address real-world challenges. Our research not only benefits our academic community but also brings value to our partners by offering innovative solutions.

3. Community Engagement: We believe in giving back to the community. Research consultancy projects often focus on addressing local and global issues, ensuring that the impact of our research extends to the betterment of society.

1. Project Consultation: We offer consultancy services to external organizations and agencies seeking expert guidance on research projects. Our faculty and researchers bring their expertise to the table, providing valuable insights and solutions.

2. Research Collaborations: We facilitate research collaborations between our academic experts and external partners. These collaborations result in cutting-edge projects that address pressing issues.

3. Knowledge Transfer: We help transfer academic knowledge and research findings to the practical world, assisting organizations in implementing innovative solutions.

4. Technical Expertise: Our consultants offer technical expertise in a wide range of disciplines, ensuring that we can provide solutions for diverse industries and challenges.

1. Academic Excellence: Gojan School of Business and Technology is renowned for its academic excellence, making us a reliable source of expertise and knowledge.

2. Multi-Disciplinary Approach: Our researchers come from diverse fields, allowing us to address complex problems from various angles.

3. Ethical Research: We uphold the highest ethical standards in our research consultancy, ensuring that our projects benefit society without compromising integrity.

4. Community Impact: Our commitment to community engagement means that our research has a direct and positive impact on local and global communities.

Whether you’re an industry partner seeking innovative solutions, a government agency looking for expert guidance, or a non-profit organization with research needs, Gojan School of Business and Technology is here to collaborate with you. We invite you to explore the world of research consultancy with us.

For inquiries and more information about our research consultancy services, please contact our office of research and consultancy. Together, we can embark on a journey of discovery and innovation, bringing academic expertise to address the challenges of our ever-evolving world.

Contact