
Symbiosis Skills University launches BTech in defence technology
Speaking to the media on Saturday, Swati Mujumdar, pro-chancellor of the university, said that about 70% of the course would be practical-based. In addition, the university has signed MoUs with several companies working in the sector, which will enable internships for students.
Mujumdar further said that the syllabus is being designed in coordination with industry experts to ensure students are equipped for emerging job roles in the defence industry as well as for entrepreneurship, if they choose to pursue it.
Manish Bharadwaj, technical advisor to the chairman of Defence Research and Development Organisation (DRDO), spoke about the importance of technology in warfare, as reflected in Operation Sindoor, and how DRDO products performed well across various sectors.
"With all the networking and drones, it is a technological milestone that India achieved, and the world witnessed the power of our systems," he said. In this context, a BTech in defence technology is highly significant. He also emphasised the need for more research and innovation in the defence sector and called for greater collaboration among academia, industry, and govt for the benefit of the nation.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


India.com
2 hours ago
- India.com
India's deadliest weapon set to become more powerful, to be equipped with..., will destroy enemies with top speed...
The indigenous TEJAS MK-2 fighter jet will be equipped with the latest and most sophisticated Meteor missile (Meteor Beyond-Visual-Range Air-to-Air Missile – BVRAAM). This will substantially improve the air-to-air attack capability of the Indian Air Force using TEJAS MK-2. It is viewed as a 4.5-generation fighter; the TEJAS MK-2 has numerous features that make it a strong competitor to the Rafale. It can be equipped with modern AESA radar systems and advanced weaponry. The TEJAS MK-2 developed by DRDO will also be integrated with the BrahMos supersonic cruise missile, adding to the striking ability and lethality. The Meteor missile's biggest strength is the large No Escape Zone (NEZ) — the distance an enemy aircraft cannot evade the missile once it enters the range. This zone is many times bigger than conventional missiles. According to the media reports, their strike range is officially stated as over 100 km, but many estimate it can range 200 km or more. This capability gives the TEJAS MK-2 a crucial first-strike advantage, enabling it to engage and neutralize enemy aircraft before they come within their own attack range. The Meteor missile's two-way data link enables the Uttam AESA radar or other sensors in the TEJAS MK-2 network to receive real-time data to update the missile mid-course and re-target. This will provide accuracy and lethality in a highly contested electronic jamming environment. With this capability, the TEJAS MK-2 can launch attacks not only using its own radar but also by acquiring target information from third-party platforms, enabling fully network-centric warfare. The indigenous Uttam AESA radar installed in the TEJAS MK-2 will have Gallium Nitride (GaN) technology which will allow it to point fighter-sized targets at more than 200 km. It will even make it a efficient power usage radar and then it will also be better for electronic jamming. The sensor fusion and seamless link with the Meteor missile means the TEJAS MK-2 has a far better capability to detect, track and kill enemies at long ranges. The Meteor missile is already found on advanced multi-role combat aircraft such as the Rafale, Gripen, Eurofighter Typhoon, and F-35. And with India's integration of the Meteor on the TEJAS MK-2, India will have essentially, if not better, BVR capabilities recognized with its operational requirements. The introduction of the Meteor to the TEJAS MK-2 would command a long-range enemy target under attack capability while keeping the TEJAS MK-2 out of reach from armaments. This increase in distance to destroy the enemy target gives the pilot increased confidence to 'shoot first, kill first,' which seriously improves survivability, even in a high-threat environment. The Meteor missile capability combined with the Uttam AESA radar gives the Indian Air Force a critical advantage in 21st-century air combat.


News18
2 hours ago
- News18
Not F-35 or SU-57… India Eyeing This Deadly Fighter Jet Feared Across Borders
The IAF has identified the Rafale as the most suitable platform to strengthen its fleet under the long-delayed Multi Role Fighter Aircraft (MRFA) programme In the wake of Operation Sindoor, which underscored the precision-strike capability of the Rafale in combat, the Indian Air Force (IAF) has renewed its push to acquire additional units of the French-made fighter. While India's air dominance was once again on display during the operation earlier this year, the IAF continues to face a critical shortfall in combat squadrons, a gap that senior commanders say must be addressed urgently. Rejecting the American F-35 and Russian Su-57 for the moment, the IAF has identified the Rafale as the most suitable platform to strengthen its fleet under the long-delayed Multi Role Fighter Aircraft (MRFA) programme. Senior officials have 'strongly advocated a government-to-government agreement with France" to fast-track procurement, most of which would be manufactured domestically in partnership with foreign firms. This would mean that 'very soon the Indian Air Force will get 'desi Rafale'." Current Strength and the Gap India's requirement stands at a minimum of 42 fighter squadrons. At present, the IAF operates only 29, compared to Pakistan's 25 and China's formidable 66 squadrons. Both rivals already possess 5th-generation fighters, while India's most advanced combat aircraft, the Rafale, belongs to the 4.5-generation class. The IAF currently fields two squadrons of Rafales. According to a The Times of India report, the IAF is set to push the MRFA proposal to the stage of Initial Acceptance of Requirement (AON), the first formal step in the procurement process. The Defence Acquisition Council (DAC), chaired by Defence Minister Rajnath Singh, is expected to take up the matter within the next two months. Sources say the final decision will rest with the government when the MRFA case reaches the DAC, but the urgency is clear that the IAF is keen to prevent any further decline in squadron numbers. Momentum After Operation Sindoor The renewed push for Rafales comes just two months after Operation Sindoor, which ran from May 7 to 10 as a retaliatory action following the Pahalgam attack in April. Rafales played a central role, carrying out long-range precision strikes across the border. The MRFA programme has been in limbo for seven to eight years, with its initial estimated cost pegged at over Rs 1.2 lakh crore. The IAF currently maintains 31 fighter squadrons, each comprising 16-18 jets. With the impending retirement of the MiG-21 fleet next month, that figure will drop to its lowest-ever 29 squadrons. The 5th-Gen Requirement The IAF has also acknowledged the need to induct 5th-generation fighters, with the Russian Sukhoi Su-57 and the American F-35 under consideration. However, talks on this front have not begun. From a cost-efficiency and maintenance standpoint, the IAF believes more Rafales under a direct government-to-government deal with France would be the most viable solution. The last such deal was signed in September 2016, worth Rs 59,000 crore, for 36 jets now stationed at Ambala and Hasimara air bases. If approved, the MRFA push could ensure the IAF does not just maintain its current edge but also narrows the gap with regional rivals in the years ahead. view comments First Published: News india Not F-35 or SU-57… India Eyeing This Deadly Fighter Jet Feared Across Borders Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.


Indian Express
4 hours ago
- Indian Express
India's cyber doctrine has an ambitious vision, but there are implementation challenges
On August 7 this year, the Chief of Defence Staff of India, General Anil Chauhan, released the Joint Doctrine for Cyberspace Operations. The unveiling of this declassified document represents India's formal acknowledgement that future warfare will be as much about bytes as bullets. While the doctrine articulates laudable strategic ambitions, its success will ultimately depend on addressing several practical challenges that need to be discussed, explored and harmonised. The doctrine's core premise — that cyber threats transcend traditional service boundaries — reflects hard-learned lessons from global conflicts. The 2007 cyber attacks on Estonia, which paralysed the nation's digital infrastructure, demonstrated how adversaries could achieve strategic objectives without firing a single shot. Similarly, the 2010 Stuxnet attack on Iran's nuclear facilities showed how cyber operations could achieve kinetic effects, blurring the lines between digital and physical warfare. India's own experience reinforces this reality. The 2020 Mumbai power grid attack, allegedly linked to Chinese hackers, illustrated how critical infrastructure vulnerabilities could be exploited during military tensions. Not to miss the recent info war using digital media and cyber attacks during Operation Sindoor. The doctrine's emphasis on 'threat-informed planning and real-time intelligence integration' acknowledges cyber warfare's unique characteristics. Unlike conventional military operations that follow established patterns, cyber attacks can emerge from state actors, criminal networks, or lone hackers with equal destructive potential. The 2017 WannaCry ransomware attack, which affected over 300,000 computers globally within days, exemplifies how rapidly cyber threats can escalate beyond traditional containment strategies. However, the doctrine's most ambitious goal — achieving true jointness in cyberspace — faces significant structural obstacles. The Indian military's historical tendency toward service-specific cultures runs deep. Each service has developed distinct procurement systems, operational protocols, and technological preferences over decades. The Army's focus on tactical cyber capabilities, the Navy's emphasis on maritime domain awareness, and the Air Force's space-cyber integration represent fundamentally different approaches to the same domain. Consider the ongoing challenges with India's Defence Cyber Agency, established in 2019. Despite its mandate to coordinate tri-service cyber operations, reports suggest that resource allocation, operational authority, and intelligence sharing still remain non-optimal. The doctrine's success will require overcoming these institutional barriers that have proven resistant to reform efforts. The US offers a cautionary tale. Despite establishing Cyber Command in 2009, American forces still struggle with inter-service coordination in cyberspace. The complexity of integrating Army network operations, Navy information warfare, and Air Force cyber capabilities has required constant organizational adjustments. If the world's most technologically advanced military faces such challenges, India's path toward cyber jointness will likely be even more complex. The doctrine's emphasis on human capital development reveals perhaps its most critical vulnerability. India faces a severe cybersecurity talent shortage, with industry estimates suggesting a deficit of over 10 lakh skilled professionals. The military's ability to compete with private sector salaries and work conditions for top cyber talent remains challenging but not impossible. This challenge is compounded by the specialised nature of military cyber operations. Unlike traditional military skills that can be developed through established training programs, cyber warfare requires continuous adaptation to evolving threats. The half-life of cybersecurity knowledge is measured in months, not years, requiring unprecedented investment in continuous learning and development. The doctrine's call for 'indigenous cyber capabilities' also raises practical concerns about India's technological ecosystem. While initiatives like the more than decade old National Cyber Security Strategy emphasize self-reliance, India's cybersecurity industry remains heavily dependent on foreign technologies and expertise. Building truly indigenous capabilities would require massive investments in research and development, with uncertain timelines for operational readiness. No doubt many start-ups have come up but they are mostly acquired by deep pocket foreign IT giants. The doctrine's analysis of international approaches, while informative, may oversimplify complex realities. China's cyber doctrine, for instance, isn't just about 'comprehensive national power' — it reflects a fundamentally different relationship between state and society. China's ability to mobilise private sector cyber capabilities through national intelligence laws has no equivalent in India's democratic framework. Similarly, the Russian model of leveraging 'non-state actors' for strategic objectives operates within a governance structure that tolerates criminal cyber activities when they serve state interests. India's approach to cyber deterrence must account for these fundamental differences in political systems and strategic cultures. The US model of 'persistent engagement' has also faced criticism for its potential to escalate conflicts and blur attribution lines. India's adoption of similar approaches could complicate its relationships with neighbors and create new vulnerabilities in an already complex regional security environment. Despite these challenges, the doctrine represents necessary progress in India's cyber evolution. Its public release serves important strategic communication purposes, signaling serious intent while maintaining operational ambiguity. However, several critical gaps require urgent attention. First, the doctrine lacks specific timelines and resource commitments for implementation. Without concrete benchmarks, it risks becoming another aspirational document rather than an operational blueprint. Second, the integration of civilian cybersecurity infrastructure with military operations remains underexplored. Given that most of India's critical infrastructure operates in the private sector, effective cyber defence requires unprecedented civil-military cooperation. Finally, the doctrine's deterrence strategy needs clearer articulation. Unlike nuclear deterrence, cyber deterrence operates in a domain where attribution is often uncertain and escalation dynamics are poorly understood. Translating doctrinal ambitions into operational capabilities, therefore, will require sustained political commitment, significant resource allocation, and institutional reforms that extend far beyond military structures. The writer, a defence and cyber security analyst, is former country head of General Dynamics