M.Tech in Computer Science & Engineering (Specialization: Cybersecurity)
The M.Tech in Computer Science & Engineering (Specialization in Cybersecurity) is a two-year online postgraduate program crafted for students and working professionals aspiring to gain deep expertise in digital protection, ethical hacking, and cyber defense mechanisms. This program combines strong academic foundations, hands-on research, and practical industry applications to prepare learners to tackle modern cyber threats with confidence. Graduates will be equipped to design and lead cybersecurity strategies across sectors, safeguarding data, ensuring privacy, and strengthening digital ecosystems in an ever-connected world.
Eligibility Criteria:
- Educational Qualification : B.E. / B.Tech / M.Sc / MCA degree.
- Employment Status : Candidate should be currently employed.
- Academic Performance:
- General / OBC category
- Minimum CGPA/CPI: 6.5 on a 10-point scale, or Minimum aggregate percentage: 60%.
- SC / ST / PwD category
- Minimum CGPA/CPI: 6.0 on a 10-point scale, or Minimum aggregate percentage: 55%.
- Check Eligibility
Program Objectives
Develop Advanced Cybersecurity Expertise
Gain comprehensive knowledge in network security, cryptography, ethical hacking, and system protection to combat modern cyber threats.
Master Threat Detection and Response
Build the ability to detect vulnerabilities, evaluate risks, and design resilient defense mechanisms to safeguard digital infrastructures.
Foster Research and Innovation in Cyber Defense
Encourage critical thinking and innovation through hands-on research in emerging areas like digital forensics, AI-driven security, and cyber resilience.
Strengthen Practical and Technical Proficiency
Enhance hands-on skills through virtual labs, simulations, and real-world cybersecurity investigations.
Uphold Ethical and Legal Cyber Practices
Understand and apply cybersecurity ethics, compliance, and global cyber laws to ensure responsible digital defense strategies.
Prepare for Global Career Opportunities
Equip professionals to lead cybersecurity functions in areas such as digital forensics, data privacy, threat intelligence, and security architecture across industries.
Learning Outcomes for Cybersecurity Experts
Architect Secure Digital Systems: Design and implement advanced protection mechanisms for networks, databases, applications, and cloud environments.
Detect and Mitigate Cyber Threats: Apply analytical and technical expertise to identify, assess, and neutralize security vulnerabilities and attacks.
Conduct Digital Forensics and Investigations: Perform in-depth forensic analysis, recover digital evidence, and contribute to cybercrime prevention and investigation.
Integrate AI with Cybersecurity: Utilize artificial intelligence and machine learning tools to enhance predictive threat analysis and automated response systems.
Ensure Ethical and Legal Compliance: Implement cybersecurity strategies that align with international legal frameworks, ethical guidelines, and data privacy norms.
Collaborate Across Technical and Business Domains: Work effectively with interdisciplinary teams to design end-to-end cybersecurity solutions for modern enterprises.
Drive Innovation and Strategic Impact: Deliver measurable outcomes through applied research, capstone projects, and real-world cybersecurity initiatives that advance digital trust and resilience.
Program Highlights
Prestigious M.Tech Degree
Earn a highly respected M.Tech in Computer Science & Engineering with specialization in AI and ML from an Institute of National Importance.
Hands-On Campus Immersion
Attend a 7-day on-campus immersion at IIIT Dharwad, engaging in practical labs, workshops, and sessions led by cybersecurity professionals and academic experts.
Capstone Project
Work on a research-oriented, real-world cybersecurity project to develop and demonstrate your expertise in securing systems and responding to cyber threats effectively.
Career Readiness
This program also offers a career readiness workshop focused on resume building and LinkedIn profile optimization to enhance professional visibility and job readiness.
Advanced, Industry-Relevant Curriculum
Gain mastery over key cybersecurity domains including Network Security, Ethical Hacking, Cryptography, Digital Forensics, and Cyber Threat Intelligence, supported by strong computer science foundations.
Expert Faculty Guidance
Learn from IIIT Dharwad’s accomplished faculty and industry practitioners who provide deep insights into emerging security technologies and real-world defense mechanisms.
IIIT Dharwad Alumni Status
Join IIIT Dharwad’s prestigious alumni network of cybersecurity specialists and technology innovators shaping secure digital ecosystems worldwide.
Course Structure
| Course Type | Course Name | Credits |
|---|---|---|
| DisCore |
Applied Mathematics for Computer Science Unit 1: Linear Algebra Unit 2: Optimization Unit 3: Probability and Stochastic Process |
3 |
| DisCore |
Advanced Data Structures and Algorithms Unit 1: Growth Functions Unit 2: Trees Unit 3: Graph Algorithms Unit 4: Algorithm Design Strategies Unit 5: Complexity Classes |
3 |
| DisCore |
Programming Paradigms Lab Unit 1: Procedural Programming Unit 2: Object-Oriented Programming (OOP) Unit 3: Functional Programming Unit 4: Concurrent & Parallel Execution Unit 5: Declarative and Logic Programming Unit 6: Scripting & Automation |
2 |
| Elective |
Introduction to AI/ML Unit 1: Introduction to AI Unit 2: Problem Solving using Search Unit 3: Knowledge Representation Unit 4: Introduction to Machine Learning Unit 5: Supervised Learning Unit 6: Unsupervised Learning Unit 7: Applications of AI & ML |
1 |
| Elective |
Introduction to Cybersecurity Unit 1: Introduction to Cybersecurity Unit 2: Identity & Access Management Unit 3: Standards & Regulations |
1 |
| Elective |
Introduction to Cloud Computing Unit 1: Introduction to Cloud Computing Unit 2: Cloud Service Models and Deployment Models |
1 |
| Master’s Core |
Introduction to Research Unit 1: Introduction Unit 2: Literature Review Unit 3: Research Exploration Unit 4: Patenting and Publications Unit 5: Presentation, Report and Thesis Writing Unit 6: Conclusions and Future Scope Unit 7: Principles & Ethics in Research |
2 |
| Project | Project-I | 3 |
| Course Type | Course Name | Credits |
|---|---|---|
| DisCore | Advanced Computing Lab | 2 |
| Master’s Core | Literature Review and Seminar | 2 |
| Elective | Electives (1/2/3/4 credits) | 5 |
| Project | Project-II | 6 |
| Course Type | Course Name | Credits |
|---|---|---|
| Project | Project-III | 9 |
| Elective | Electives (1/2/3/4 credits) | 6 |
| Course Type | Course Name | Credits |
|---|---|---|
| Project | Project-IV | 12 |
| Elective | Electives (1/2/3 credits) | 3 |
| Sl. no | Course name |
|---|---|
| 1 | Computer System Security |
| 2 | Security in Cloud Computing |
| 3 | AI for Cybersecurity |
| 4 | Biometric Security and Forensics |
| 5 | Forensic Data Recovery |
| 6 | Deep Learning |
| 7 | DevSecOps |
Alumni Privileges
Students will receive an official Institute Email ID and ID card, and will be eligible to participate in institute events and activities. Upon completion, they become part of the institute’s alumni network.
Tools You'll Master
























*Tool exposure varies by specialization; students may not work with all tools listed.
Assessment & Evaluation
Students will be evaluated through a combination of quizzes, assignments, case studies, and end-term examinations. These diverse assessment methods ensure continuous learning and a well-rounded understanding of the subject.
Pedagogy & Delivery
The program follows a blended learning approach, combining multiple instructional methods to enhance learning outcomes:Engage with faculty and peers through discussions, Q&A, and case study analysis.
Access recorded lectures, readings, and practice exercises to reinforce concepts.
Apply knowledge through projects, simulations, and hands-on assignments.
Participate in group exercises, peer learning, and forums to foster teamwork and practical understanding.
Admission Process
Admissions will be offered based on merit, as evaluated through the application and personal interview process.
Offers of admission will also follow a first-come, first-served basis, subject to meeting the eligibility and selection criteria and availability of seats.
Note:
- Admissions will be offered based on merit, as evaluated through the application and personal interview process.
- Offers of admission will also follow a first-come, first-served basis, subject to meeting the eligibility and selection criteria and availability of seats.
Program Certificate
Program Fee Details
Application Fee
Total Fee
| Installment | Sem 1 | Sem 2 | Sem 3 | Sem 4 |
|---|---|---|---|---|
| Installment I | ₹ 50,000 | ₹ 50,000 | ₹ 50,000 | ₹ 50,000 |
| Installment II | ₹ 38,500 | ₹ 38,500 | ₹ 38,500 | ₹ 38,500 |
| Total | ₹ 88,500 | ₹ 88,500 | ₹ 88,500 | ₹ 88,500 |
*Easy EMI Options are Available
*The application fee is strictly non-refundable and non-transferable.
Refund Policy
A refund is
applicable after a deduction of ₹ 10,000 before commencement of the batch, provided the
course
material has not been accessed or downloaded. No refund will be provided on or after the
batch
commencement date.
Application Fee: ₹ 2,000
Program Fee (Inclusive of Application Fee) : ₹ 3,56,000
Note: The institute is not responsible for EMI-related arrangements.
Campus Immersion
Experience structured on-campus immersions after every semester, designed to strengthen academic engagement, peer collaboration, and faculty interaction. These campus immersions complement the live online learning format by connecting structured online learning with in-person academic engagement within a nationally recognized institute of technology.
What’s Included
-
Academic EngagementFaculty-led sessions, discussions, and academic interactions aligned with the programme curriculum.
-
Peer NetworkingCollaborative learning and networking with fellow participants.
-
Campus ExperienceOpportunity to explore the IIIT Dharwad campus, engage with its academic ecosystem, and gain exposure to labs and research facilities.
What’s Not Included
-
TravelTravel to and from the campus.
-
Accommodation & MealsFood, lodging, and stay arrangements.
-
Personal ExpensesAny personal expenses incurred during the immersion period.
Program Coordinator
Dr. Krishnendu Ghosh
Assistant Professor
Indian Institute of Information Technology, Dharwad
Dr. Krishnendu Ghosh is an academician and researcher in the field of Computer Science and Engineering, with a specialization in Speech Processing, Natural Language Processing, and Artificial Intelligence. He earned his M.S. (2012) and Ph.D. (2021) from IIT Kharagpur, where his master’s research focused on text analysis modules for text-to-speech systems, and his doctoral work addressed multimodal and AI-supported enrichment of learning materials. With over 11 years of research experience and 6+ years of teaching experience, Dr. Ghosh is currently serving as an Assistant Professor at the Indian Institute of Information Technology (IIIT) Dharwad. His research interests include speech processing, natural language processing, artificial intelligence, information retrieval, and educational technology, where he has contributed extensively to peer-reviewed journals, international conferences, and funded research & academic projects. Passionate about bridging research, teaching, and real-world impact, Dr. Ghosh mentors undergraduate and postgraduate students in AI/ML and SNLP projects, fostering innovation, critical thinking, and applied research skills among future technology professionals.