Logo

M.Tech in Computer Science & Engineering (Specialization: Cybersecurity)

The M.Tech in Computer Science & Engineering (Specialization in Cybersecurity) is a two-year online postgraduate program crafted for students and working professionals aspiring to gain deep expertise in digital protection, ethical hacking, and cyber defense mechanisms. This program combines strong academic foundations, hands-on research, and practical industry applications to prepare learners to tackle modern cyber threats with confidence. Graduates will be equipped to design and lead cybersecurity strategies across sectors, safeguarding data, ensuring privacy, and strengthening digital ecosystems in an ever-connected world.

Course Duration
2 years
Semester Fees
88,500 (Easy EMI options Available)
Mode of Learning
(Online + Campus Immersion)
Total Credit
60

Eligibility Criteria:
  • Educational Qualification : B.E. / B.Tech / M.Sc / MCA degree.
  • Employment Status : Candidate should be currently employed.
  • Academic Performance:
  • General / OBC category
  • Minimum CGPA/CPI: 6.5 on a 10-point scale, or Minimum aggregate percentage: 60%.
  • SC / ST / PwD category
  • Minimum CGPA/CPI: 6.0 on a 10-point scale, or Minimum aggregate percentage: 55%.
  • Check Eligibility

Program Objectives

Develop Advanced Cybersecurity Expertise

Gain comprehensive knowledge in network security, cryptography, ethical hacking, and system protection to combat modern cyber threats.

Master Threat Detection and Response

Build the ability to detect vulnerabilities, evaluate risks, and design resilient defense mechanisms to safeguard digital infrastructures.

Foster Research and Innovation in Cyber Defense

Encourage critical thinking and innovation through hands-on research in emerging areas like digital forensics, AI-driven security, and cyber resilience.

Card Image

Strengthen Practical and Technical Proficiency

Enhance hands-on skills through virtual labs, simulations, and real-world cybersecurity investigations.

Uphold Ethical and Legal Cyber Practices

Understand and apply cybersecurity ethics, compliance, and global cyber laws to ensure responsible digital defense strategies.

Prepare for Global Career Opportunities

Equip professionals to lead cybersecurity functions in areas such as digital forensics, data privacy, threat intelligence, and security architecture across industries.

Learning Outcomes for Cybersecurity Experts

Architect Secure Digital Systems: Design and implement advanced protection mechanisms for networks, databases, applications, and cloud environments.

Detect and Mitigate Cyber Threats: Apply analytical and technical expertise to identify, assess, and neutralize security vulnerabilities and attacks.

Conduct Digital Forensics and Investigations: Perform in-depth forensic analysis, recover digital evidence, and contribute to cybercrime prevention and investigation.

Integrate AI with Cybersecurity: Utilize artificial intelligence and machine learning tools to enhance predictive threat analysis and automated response systems.

Ensure Ethical and Legal Compliance: Implement cybersecurity strategies that align with international legal frameworks, ethical guidelines, and data privacy norms.

Collaborate Across Technical and Business Domains: Work effectively with interdisciplinary teams to design end-to-end cybersecurity solutions for modern enterprises.

Drive Innovation and Strategic Impact: Deliver measurable outcomes through applied research, capstone projects, and real-world cybersecurity initiatives that advance digital trust and resilience.

Program Highlights

Prestigious M.Tech Degree

Earn a highly respected M.Tech in Computer Science & Engineering with specialization in AI and ML from an Institute of National Importance.

Hands-On Campus Immersion

Attend a 7-day on-campus immersion at IIIT Dharwad, engaging in practical labs, workshops, and sessions led by cybersecurity professionals and academic experts.

Capstone Project

Work on a research-oriented, real-world cybersecurity project to develop and demonstrate your expertise in securing systems and responding to cyber threats effectively.

Advanced, Industry-Relevant Curriculum

Gain mastery over key cybersecurity domains including Network Security, Ethical Hacking, Cryptography, Digital Forensics, and Cyber Threat Intelligence, supported by strong computer science foundations.

Expert Faculty Guidance

Learn from IIIT Dharwad’s accomplished faculty and industry practitioners who provide deep insights into emerging security technologies and real-world defense mechanisms.

IIIT Dharwad Alumni Status

Join IIIT Dharwad’s prestigious alumni network of cybersecurity specialists and technology innovators shaping secure digital ecosystems worldwide.

Course Structure

Course Type Course Name Credits
DisCore Applied Mathematics for Computer Science
Unit 1: Linear Algebra
Unit 2: Optimization
Unit 3: Probability and Stochastic Process
3
DisCore Advanced Data Structures and Algorithms
Unit 1: Growth Functions
Unit 2: Trees
Unit 3: Graph Algorithms
Unit 4: Algorithm Design Strategies
Unit 5: Complexity Classes
3
DisCore Programming Paradigms Lab
Unit 1: Procedural Programming
Unit 2: Object-Oriented Programming (OOP)
Unit 3: Functional Programming
Unit 4: Concurrent & Parallel Execution
Unit 5: Declarative and Logic Programming
Unit 6: Scripting & Automation
2
Elective Introduction to AI/ML
Unit 1: Introduction to AI
Unit 2: Problem Solving using Search
Unit 3: Knowledge Representation
Unit 4: Introduction to Machine Learning
Unit 5: Supervised Learning
Unit 6: Unsupervised Learning
Unit 7: Applications of AI & ML
1
Elective Introduction to Cybersecurity
Unit 1: Introduction to Cybersecurity
Unit 2: Identity & Access Management
Unit 3: Standards & Regulations
1
Elective Introduction to Cloud Computing
Unit 1: Introduction to Cloud Computing
Unit 2: Cloud Service Models and Deployment Models
1
Master’s Core Introduction to Research
Unit 1: Introduction
Unit 2: Literature Review
Unit 3: Research Exploration
Unit 4: Patenting and Publications
Unit 5: Presentation, Report and Thesis Writing
Unit 6: Conclusions and Future Scope
Unit 7: Principles & Ethics in Research
2
Project Project-I 3

Course Type Course Name Credits
DisCore Advanced Computing Lab 2
Master’s Core Literature Review and Seminar 2
Elective Electives (1/2/3/4 credits) 5
Project Project-II 6

Course Type Course Name Credits
Project Project-III 9
Elective Electives (1/2/3/4 credits) 6

Course Type Course Name Credits
Project Project-IV 12
Elective Electives (1/2/3 credits) 3

Sl. no Course name
1Computer System Security
2Security in Cloud Computing
3AI for Cybersecurity
4Biometric Security and Forensics
5Forensic Data Recovery
6Deep Learning
7DevSecOps

Alumni Privileges

Students will receive an official Institute Email ID and ID card, and will be eligible to participate in institute events and activities. Upon completion, they become part of the institute’s alumni network.

Tools You'll Master

TensorFlow logo
Keras logo
PyTorch logo
scikit-learn logo
Wireshark logo
Packet Tracer logo
AWS logo
Azure logo
Git logo
Jenkins logo
GitLab logo
JupyterLab logo
Kubernetes logo
Jira logo

*Tool exposure varies by specialization; students may not work with all tools listed.

Assessment & Evaluation

Students will be evaluated through a combination of quizzes, assignments, case studies, and end-term examinations. These diverse assessment methods ensure continuous learning and a well-rounded understanding of the subject.

Attendance Policy

Participants are required to maintain a minimum of 75% attendance to successfully complete the program, structured as follows:

60% Synchronous Attendance: Participation in live lectures, discussions, and interactive sessions.

15% Asynchronous Engagement: Completion of recorded content and self-paced learning activities.

Pedagogy & Delivery

The program follows a blended learning approach, combining multiple instructional methods to enhance learning outcomes:
Interactive Live Sessions

Engage with faculty and peers through discussions, Q&A, and case study analysis.

Self-Paced Learning

Access recorded lectures, readings, and practice exercises to reinforce concepts.

Experiential Learning

Apply knowledge through projects, simulations, and hands-on assignments.

Collaborative Activities

Participate in group exercises, peer learning, and forums to foster teamwork and practical understanding.

highlight image

Admission Process

Program Certificate

PG Certification: Complete 15 credits in foundational courses
PG Diploma: Complete 30 credits, including core and elective courses
M.Tech Degree: Complete 60 credits, including thesis and capstone project

Program Fee Details

2,000

Application Fee

3,54,000

Total Fee

EMI Starting INR 10,534/month


EMI Starting INR 10,546/month


Application Fee: ₹ 2,000

Program Fee (Inclusive of Application Fee) : ₹ 3,56,000

Semester Fee Total
Sem 1 88500 88500
Sem 2 88500 88500
Sem 3 88500 88500
Sem 4 88500 88500
Total 3,54,000 3,54,000

*Easy EMI Options are Available

*The application fees is strictly non-refundable and non-transferable.

Refund Policy
A refund is applicable after a deduction of 10000 before commencement of the batch, provided the course material has not been accessed or downloaded. No refund will be provided on or after the batch commencement date.

Dr. Sunil Kumar P V

Program Director

Dr. Sunil Kumar P V

Assistant Professor
Indian Institute of Information Technology, Dharwad

Dr. Sunil Kumar P V is an accomplished academician and researcher in the field of Computer Science and Engineering, with a specialization in Machine Learning for Bioinformatics. He completed his PhD from NIT Calicut and has over 15 years of experience in teaching, research, and industry collaboration. Currently serving as an Assistant Professor at Indian Institute of Information Technology, Dharwad, Dr. Sunil has previously held faculty positions at CMR Institute of Technology, Vellore Institute of Technology, MES College of Engineering, and MEA Engineering College. He has published extensively in peer-reviewed journals and international conferences and has delivered numerous invited lectures and workshops on advanced computing, AI, and bioinformatics. With strong expertise in AI, ML, data analytics, and computational biology, he brings a rich blend of research excellence, teaching acumen, and industry engagement to lead and inspire the next generation of technology professionals.

Program Faculty

Dr. Abdul Wahid

Assistant Professor

Ph.D. (IIT Dhanbad)

Dr. Animesh Roy

Assistant Professor

Ph.D. (IIEST)

Dr. Dibyajyoti Guha

Assistant Professor

Ph.D. (IIT Bhubaneswar)

Dr. Girish G N

Assistant Professor

Ph.D. (NITK)

Dr. Krishnendu Ghosh

Assistant Professor

Ph.D. (IIT Kharagpur)

Dr. Malay Kumar

Assistant Professor

Ph.D. (NIT Raipur)

Dr. Milind Chabbi

Professor of Practice

Rice Univeristy
Team Member Image

Dr. Pavan Kumar C

Assistant Professor

Ph.D. (VIT Vellore)
Team Member Image

Dr. Prabhu Prasad B M

Assistant Professor

Ph.D. (IIT Bhubaneswar)
Team Member Image

Dr. Pramod Yelmewad

Assistant Professor

Ph.D. (NITK Surathkal)
Team Member Image

Dr. Shrinivas Kulkarni

Professor of Practice

PhD - University of Edinburgh
Team Member Image

Dr. Sunil C K

Assistant Professor

Ph.D. (NITK Surathkal)
Team Member Image

Dr. Sunil Kumar P V

Assistant Professor

Ph.D. (NIT, Calicut)
Team Member Image

Dr. Suvadip Hazra

Assistant Professor

Ph.D. (NIT Durgapur)
Team Member Image

Dr. Vivekraj V K

Assistant Professor

Ph.D. (IIT Roorkee)
Team Member Image

Prof. Rajesh Vasa

Adjunct Professor

PhD - Swinburne Univ. of Technology

Frequently Asked Questions

01 What is the focus of the M.Tech in Cybersecurity at IIIT Dharwad?

The M.Tech in Cyber Security program at IIIT Dharwad equips learners with advanced skills in network security, digital forensics, ethical hacking, and cryptography. The curriculum emphasizes hands-on projects and research, preparing professionals to defend digital infrastructures and lead cybersecurity initiatives.

02 Do I need prior cybersecurity experience or certifications to apply?

No prior certifications are required. Applicants should hold a B.E./B.Tech in Computer Science, IT, Electronics, or related disciplines. Relevant professional experience enhances learning but is not mandatory for enrollment in the M.Tech in Cyber Security for working professionals.

03 How is the Cyber Security M.Tech delivered?

The program follows a flexible online format, combining live interactive sessions, self-paced modules, hands-on labs, and a 7-day on-campus immersion at IIIT Dharwad. This blended approach ensures working professionals can balance learning with their careers while gaining practical experience.

04 Will I receive a degree upon completion?

Yes. Graduates earn an M.Tech in Computer Science & Engineering (Specialization in Cybersecurity) from IIIT Dharwad, an Institute of National Importance recognized for academic and research excellence.

05 Can this program help me move into leadership roles in cybersecurity?

Absolutely. The curriculum focuses on strategic thinking, risk assessment, ethical compliance, and incident response, enabling graduates to lead cybersecurity teams, manage enterprise security programs, and design secure organizational infrastructures.

06 Are there opportunities to collaborate with industry or peers?

Yes. The program emphasizes networking through on-campus immersions, collaborative projects, peer interactions, and engagement with faculty and industry experts, enabling real-world problem-solving and professional connections.