• Course Duration :

    2 Years

  • Semester Fee :

    ₹65000*

  • Mode of Learning :

    Online

  • Medium of Instruction :

    English


Campus Immersion Opportunity: One week per year

Online MTech in Cyber Security


The Online MTech in Cyber Security program equips students with the expertise to protect digital systems, detect vulnerabilities, and implement defense strategies against cyber threats. Designed as an MTech for working professionals, this program blends hands-on labs and real-world projects, covering ethical hacking, cryptography, cloud security, and digital forensics. The curriculum ensures a balance between theoretical knowledge and practical applications, including AI-driven threat detection and blockchain security. Graduates from this MTech online program will be prepared for high-demand Cyber Security roles, ensuring the safety of data and networks in an increasingly digital world.

Commencement Date: 5th July (Saturday)
Campus Immersion Opportunity: One week per year
Alumni Status: Earn IIIT Sri City alumni status upon completion, with access to the Alumni Portal and exclusive networking opportunities

Talk to an Expert

 I hereby authorize the personalized counsellor to contact me

Course Eligibility:


  • Applicants should have a B.Tech / BE /BS/ M.Tech / MSc (4 semester program) / MCA (4-semester program) / MS Degree (min. 4 semester) / equivalent degree in the relevant discipline with at least 55% marks or 5.5/10 CPI. In the case of the candidate belonging to SC, ST, or Persons with Disability (PwD) category, this is relaxed to 50% or equivalent 5.0 CGPA/CPI
  • For MCA/MSC passed graduates, the percentage score of MCA/MSC would be considered. For BE/BTech Engineering graduates without PG specialization, the percentage score of the undergraduate degree would be considered. For a post-graduation in the Engineering field of study,
  • PG score qualification can be considered.
  • GATE is not mandatory.
  • Selection process will be scheduled post-counseling & application process, depending on the number of eligible applications as per seat availability for the program. This entire process will be online.
  • Candidates who do not meet the minimum CGPA or percentage requirement, can still be considered if they provide relevant work experience in the technical field.

Key Benefits of Online MTech in Cyber Security


Mba International Business

Hands-on Learning

Gain practical experience through labs, ethical hacking simulations, and real-world projects.

Comprehensive Curriculum

Covers cybersecurity fundamentals, cryptography, cloud security, and digital forensics, ensuring a robust MTech online learning experience.

Mba International Business

Industry-Relevant Skills

Develop expertise in penetration testing, network security, and cyber regulations, making it a top choice for MTech for working professionals.

Mba International Business

Capstone & Projects

Work on real-world applications to build a strong portfolio for career advancement.

Mba International Business

AI & Blockchain Integration

Learn how machine learning and blockchain enhance cybersecurity measures.

Program Objectives:


    • To provide a strong foundation in cybersecurity concepts, cryptography, and ethical hacking through a specialized MTech online program.
    • To equip students with the ability to identify network vulnerabilities and implement defense mechanisms.
    • To integrate AI and machine learning techniques for detecting and preventing cyber threats.
    • To develop practical skills in cloud security, blockchain applications, and digital forensics.
    • To prepare students for industry challenges through hands-on projects and real-world case studies, a core feature of this MTech online program.

Program Highlights:


  • Live sessions by the prestigious and renowned IIIT Sri City faculty
  • An Esteemed Degree from IIIT Sri City
  • Hands-on experience with modern tools
  • Flexible online learning environment
  • Industry-aligned curriculum
  • IIIT Sri City Alumni Status
  • Placement Guidance

    Program Outcome:


    • Demonstrate proficiency in cybersecurity principles and cryptographic techniques.
    • Identify and mitigate security risks in networks, cloud systems, and mobile platforms through an advanced online MTech curriculum.
    • Apply ethical hacking methods and penetration testing to strengthen system security.
    • Utilize AI-driven solutions to detect cyber threats and enhance digital protection.
    • Conduct digital forensic investigations and implement security policies effectively.
    • Design and develop secure applications through capstone and major project work.

Program Structure

Introduction to Cyber Security
  • Overview
  • Security Layer
  • Data Security and Access Control
  • Network Security
  • Operating System Security
  • Incidence Response
Number Theory
  • Fundamentals of Number Theory
  • Number Theoretic Functions and Theorems
  • Quadratic Residues and Reciprocity
  • Primitive Roots and Advanced Topics
  • Algebraic Structures and Finite Fields
  • Elliptic Curve Cryptography (ECC)
Operating Systems and Mobile Security
  • Introduction to OS Security
  • Security in Major Operating Systems
  • Security Goals
  • Attacks on Operating Systems
  • OWASP Mobile Security Attacks
  • Securing Mobile Applications
Penetration Testing
  • Introduction to Penetration Testing
  • Reconnaissance and Information Gathering
  • Vulnerability Assessment and Scanning
  • Exploitation Basics
  • Post-Exploitation and Reporting
  • Advanced Topics and Capstone Project
Cryptography
  • Number Theory Basics
  • Shannon’s Theory
  • Symmetric Key Cryptography
  • Public Key Cryptography
  • Digital Signatures
  • Applications
Internet Security
  • Introduction to Networking Principles
  • Cybersecurity Threats & Attack Vectors
  • Basic cryptography and techniques, symmetric-key encryption
  • Authentication, Authorization, Access Controls
  • Need of Network Security, Electronic Mail Security
  • Need of Firewalls, Types of Firewall
Cloud Security
  • Introduction to Cloud Computing
  • Virtualization
  • Cloud Computing Security
  • Attacks in Cloud Computing
  • Defense Techniques in Cloud
  • Tools/Simulators
Capstone Project: Securing a Real-World Application
Blockchain Technology and Applications
  • Foundations of Blockchain & Cryptography
  • Blockchain Structure & the Bitcoin Ecosystem
  • Consensus Mechanisms
  • Ethereum & Smart Contract Fundamentals
  • Smart Contract Development & Token Standards
  • Real-World Applications & Risks in Blockchain
Fusing ML and DL with Cyber Security
  • Introduction to Machine Learning in Cybersecurity
  • Supervised Learning for Cybersecurity
  • Unsupervised Learning & Anomaly Detection
  • Deep Learning for Cybersecurity
  • Practical Applications & Model Deployment
  • Ethical, Legal & Future Trends in AI-based Cybersecurity
System Security
  • Introduction to System Security
  • Active Directory Security
  • Cryptography & Password Security
  • Web & API Security
  • Social Engineering & Phishing
  • Traffic Analysis & Network Security
Minor Project
Digital Forensics
  • Introduction to Digital Forensics
  • Digital Evidence and Anti-Forensics
  • Data Acquisition and Storage Forensics
  • Mobile and Network Forensics
  • Memory Forensics and Malware Analysis
  • Incident Response and Practical Labs
Major Project

Tools


Logos Application
Web application security testing
Identifies vulnerabilities like SQL Injection, XSS, & CSRF. Automates scanning for OWASP Top 10 risks. Intercepts and modifies HTTP/S requests & responses.
Penetration Testing Framework
Simulates real-world attacks to test system security. Automates exploitation using known vulnerabilities. Useful for vulnerability assessment & security research.
Network packet analysis
Captures and inspects network traffic in real time. Identifies suspicious activities (e.g., MITM attacks). Analyzes protocols to detect vulnerabilities.
Web vulnerability scanning
Detects outdated software, misconfigurations, & security flaws. Identifies default credentials and exposed files. Supports automated testing of web servers.
Password cracking
Uses dictionary and brute-force attacks. Supports various encryption formats (MD5, SHA, etc.). Cracks passwords from Linux shadow files, Windows hashes, etc.
Web application security testing
Open-source alternative to Burp Suite. Finds security misconfigurations and vulnerabilities. Automates web security scans.
Digital forensics and memory analysis
Autopsy: Analyzes hard drives, emails, and deleted files. Volatility: Extracts information from RAM dumps (useful for malware analysis and rootkit detection).
Network exploitation & lateral movement
Performs Pass-the-Hash & Pass-the-Ticket attacks. Exploits SMB, RDP, and LDAP vulnerabilities. Dumps NTLM hashes & Kerberos tickets. Executes remote commands (psexec, smbexec, wmiexec).
Active Directory attack mapping
Graph-based attack path visualization. Detects privilege escalation paths in AD. Finds misconfigurations leading to domain admin takeover. Automates enumeration of AD objects (users, groups, computers).
Reverse engineering & malware analysis
Performs binary analysis & disassembly. Decompiles binaries to C-like code. Analyzes malware behavior. Supports memory forensics & debugging.

Exam & Assessment Structure


M.Tech online program in Cyber Security follows a structured evaluation system with mid-semester and end-semester exams assessing theoretical concepts. Continuous assessments, including lab work, assignments, projects, and quizzes, ensure ongoing evaluation aligned with course requirements.

Exam Type Focus Areas
Mid-Sem Exam Tests knowledge of fundamental security concepts like cryptography, network security protocols, and threat detection.
End-Sem Exam Focuses on advanced topics such as ethical hacking, penetration testing, malware analysis, and cyber laws.
Continuous Assessments Involves practical exercises, online quizzes, assignments on current security trends, and group discussions on emerging threats.

This proposed examination structure ensures that students are thoroughly assessed on both their theoretical knowledge and their ability to apply these concepts in real-world scenarios.

Exam Type Focus Areas
Mid Semester Exam – 30% (MCQs + Fill in the Blanks + Descriptive Questions)
End Semester Exam – 40% (MCQs + Fill in the Blanks + Descriptive Questions)
Continuous Evaluation -30% (To be decided by faculty course wise)

Fee Structure


Semester Instalment 1 Instalment 2 Optional Campus Immersion Optional Alumni Fee Total
Sem 1 40000 25000 + 2000 67000
Sem 2 40000 25000 Actuals 65000
Sem 3 40000 25000 6000 65000
Sem 4 40000 25000 Actuals 65000
Total 160000 102000 6000 262000

Cancellation & Fee Refund Policy:

Application Fee – Rs 5000 (Non-refundable)

Course Fee Refund:

  • A refund of 80% of the paid course fee will be issued if a request is raised before the Batch commencement date.
  • No refund will be provided on or after the batch commencement date.

Admission Process


Program Coordinator


Ramesh-Kumar
​Dr Kamalakanta Sethi
​Cyber Security Faculty Coordinator

Dr. Kamalakanta Sethi is an Assistant Professor in the Department of Computer Science and Engineering at the Indian Institute of Information Technology (IIIT) Sri City. He earned his Ph.D. in Computer Science and Engineering from IIT Bhubaneswar, focusing on advanced cryptography and intrusion detection systems for cloud networks. He holds an M.Tech in Information Security from NIT Warangal and a B.Tech in Computer Science from the National Institute of Science and Technology, Berhampur.
Read more

His research interests include cryptographic techniques, homomorphic encryption, AI-driven intrusion detection systems, and cloud security. He is a member of the NextGen Cyber Security Research Group at IIIT Sri City.

Dr. Sethi has published research in leading journals, including papers on context-aware intrusion detection and reinforcement learning-based security solutions. Prior to joining IIIT Sri City, he held academic positions at NIT Warangal and IIT Bhubaneswar.

Sample Certificate


In The News


Frequently Asked Questions(FAQ’s)


The MTech in Cyber Security program provides advanced knowledge in securing digital systems, ethical hacking, cryptography, and cyber defense strategies. It is designed for professionals and students looking to build expertise in cybersecurity and ethical hacking.

Applicants need a relevant B.Tech/BE/BS/M.Tech/MSc/MCA/MS (4 semesters) or equivalent degree with at least 55% marks (50% for SC/ST/PwD). GATE is not mandatory, and work experience may be considered for those with lower scores.The selection process is online and based on seat availability.Refer to the full eligibility criteria for a smooth admission process.

Graduates can pursue roles in IT security, cybersecurity consulting, digital forensics, and network security, such as:
  • Cybersecurity Analyst
  • Ethical Hacker & Penetration Tester
  • Cloud Security Architect
  • Blockchain Security Expert
  • Digital Forensics Investigator

Absolutely! With a curriculum that combines hands-on learning, real-world projects, and flexible online lectures, this program stands out as one of the best ethical hacking courses. Designed as an m tech in cyber security for working professionals, it enables learners to upskill in cyber defense, penetration testing, and digital forensics without disrupting their careers.

Yes, upon successful completion, students will receive a postgraduate degree in MTech in Cyber Security, certifying their expertise in ethical hacking, cloud security, and cyber defense.