
- Home
- Programs
- Online MTech in Cyber Security
-
Course Duration :
2 Years
-
Semester Fee :
₹65000*
-
Mode of Learning :
Online
-
Medium of Instruction :
English
Campus Immersion Opportunity: One week per year
Online MTech in Cyber Security
The Online MTech in Cyber Security program equips students with the expertise to protect digital systems, detect vulnerabilities, and implement defense strategies against cyber threats. Designed as an MTech for working professionals, this program blends hands-on labs and real-world projects, covering ethical hacking, cryptography, cloud security, and digital forensics. The curriculum ensures a balance between theoretical knowledge and practical applications, including AI-driven threat detection and blockchain security. Graduates from this MTech online program will be prepared for high-demand Cyber Security roles, ensuring the safety of data and networks in an increasingly digital world.
Commencement Date: 5th July (Saturday)
Campus Immersion Opportunity: One week per year
Alumni Status: Earn IIIT Sri City alumni status upon completion, with access to the Alumni Portal and exclusive networking opportunities
Talk to an Expert
Course Eligibility:
- Applicants should have a B.Tech / BE /BS/ M.Tech / MSc (4 semester program) / MCA (4-semester program) / MS Degree (min. 4 semester) / equivalent degree in the relevant discipline with at least 55% marks or 5.5/10 CPI. In the case of the candidate belonging to SC, ST, or Persons with Disability (PwD) category, this is relaxed to 50% or equivalent 5.0 CGPA/CPI
- For MCA/MSC passed graduates, the percentage score of MCA/MSC would be considered. For BE/BTech Engineering graduates without PG specialization, the percentage score of the undergraduate degree would be considered. For a post-graduation in the Engineering field of study,
- PG score qualification can be considered.
- GATE is not mandatory.
- Selection process will be scheduled post-counseling & application process, depending on the number of eligible applications as per seat availability for the program. This entire process will be online.
- Candidates who do not meet the minimum CGPA or percentage requirement, can still be considered if they provide relevant work experience in the technical field.
Key Benefits of Online MTech in Cyber Security

Hands-on Learning
Gain practical experience through labs, ethical hacking simulations, and real-world projects.

Comprehensive Curriculum
Covers cybersecurity fundamentals, cryptography, cloud security, and digital forensics, ensuring a robust MTech online learning experience.

Industry-Relevant Skills
Develop expertise in penetration testing, network security, and cyber regulations, making it a top choice for MTech for working professionals.

Capstone & Projects
Work on real-world applications to build a strong portfolio for career advancement.

AI & Blockchain Integration
Learn how machine learning and blockchain enhance cybersecurity measures.
Program Objectives:
- To provide a strong foundation in cybersecurity concepts, cryptography, and ethical hacking through a specialized MTech online program.
- To equip students with the ability to identify network vulnerabilities and implement defense mechanisms.
- To integrate AI and machine learning techniques for detecting and preventing cyber threats.
- To develop practical skills in cloud security, blockchain applications, and digital forensics.
- To prepare students for industry challenges through hands-on projects and real-world case studies, a core feature of this MTech online program.
Program Highlights:
- Live sessions by the prestigious and renowned IIIT Sri City faculty
- An Esteemed Degree from IIIT Sri City
- Hands-on experience with modern tools
- Flexible online learning environment
- Industry-aligned curriculum
- IIIT Sri City Alumni Status
- Placement Guidance
- Demonstrate proficiency in cybersecurity principles and cryptographic techniques.
- Identify and mitigate security risks in networks, cloud systems, and mobile platforms through an advanced online MTech curriculum.
- Apply ethical hacking methods and penetration testing to strengthen system security.
- Utilize AI-driven solutions to detect cyber threats and enhance digital protection.
- Conduct digital forensic investigations and implement security policies effectively.
- Design and develop secure applications through capstone and major project work.
Program Outcome:
Program Structure
Introduction to Cyber Security
|
Number Theory
|
Operating Systems and Mobile Security
|
Penetration Testing
|
Cryptography
|
Internet Security
|
Cloud Security
|
Capstone Project: Securing a Real-World Application |
Blockchain Technology and Applications
|
Fusing ML and DL with Cyber Security
|
System Security
|
Minor Project |
Digital Forensics
|
Major Project |
Tools
Logos | Application |
---|---|
![]() |
Web application security testing Identifies vulnerabilities like SQL Injection, XSS, & CSRF. Automates scanning for OWASP Top 10 risks. Intercepts and modifies HTTP/S requests & responses. |
![]() |
Penetration Testing Framework Simulates real-world attacks to test system security. Automates exploitation using known vulnerabilities. Useful for vulnerability assessment & security research. |
![]() |
Network packet analysis Captures and inspects network traffic in real time. Identifies suspicious activities (e.g., MITM attacks). Analyzes protocols to detect vulnerabilities. |
![]() |
Web vulnerability scanning Detects outdated software, misconfigurations, & security flaws. Identifies default credentials and exposed files. Supports automated testing of web servers. |
![]() |
Password cracking Uses dictionary and brute-force attacks. Supports various encryption formats (MD5, SHA, etc.). Cracks passwords from Linux shadow files, Windows hashes, etc. |
![]() |
Web application security testing Open-source alternative to Burp Suite. Finds security misconfigurations and vulnerabilities. Automates web security scans. |
![]() |
Digital forensics and memory analysis Autopsy: Analyzes hard drives, emails, and deleted files. Volatility: Extracts information from RAM dumps (useful for malware analysis and rootkit detection). |
![]() |
Network exploitation & lateral movement Performs Pass-the-Hash & Pass-the-Ticket attacks. Exploits SMB, RDP, and LDAP vulnerabilities. Dumps NTLM hashes & Kerberos tickets. Executes remote commands (psexec, smbexec, wmiexec). |
![]() |
Active Directory attack mapping Graph-based attack path visualization. Detects privilege escalation paths in AD. Finds misconfigurations leading to domain admin takeover. Automates enumeration of AD objects (users, groups, computers). |
![]() |
Reverse engineering & malware analysis Performs binary analysis & disassembly. Decompiles binaries to C-like code. Analyzes malware behavior. Supports memory forensics & debugging. |
Exam & Assessment Structure
M.Tech online program in Cyber Security follows a structured evaluation system with mid-semester and end-semester exams assessing theoretical concepts. Continuous assessments, including lab work, assignments, projects, and quizzes, ensure ongoing evaluation aligned with course requirements.
Exam Type | Focus Areas |
---|---|
Mid-Sem Exam | Tests knowledge of fundamental security concepts like cryptography, network security protocols, and threat detection. |
End-Sem Exam | Focuses on advanced topics such as ethical hacking, penetration testing, malware analysis, and cyber laws. |
Continuous Assessments | Involves practical exercises, online quizzes, assignments on current security trends, and group discussions on emerging threats. |
This proposed examination structure ensures that students are thoroughly assessed on both their theoretical knowledge and their ability to apply these concepts in real-world scenarios.
Exam Type | Focus Areas |
---|---|
Mid Semester Exam – 30% | (MCQs + Fill in the Blanks + Descriptive Questions) |
End Semester Exam – 40% | (MCQs + Fill in the Blanks + Descriptive Questions) |
Continuous Evaluation -30% | (To be decided by faculty course wise) |
Fee Structure
Semester | Instalment 1 | Instalment 2 | Optional Campus Immersion | Optional Alumni Fee | Total |
---|---|---|---|---|---|
Sem 1 | 40000 | 25000 + 2000 | – | – | 67000 |
Sem 2 | 40000 | 25000 | Actuals | – | 65000 |
Sem 3 | 40000 | 25000 | – | 6000 | 65000 |
Sem 4 | 40000 | 25000 | Actuals | – | 65000 |
Total | 160000 | 102000 | – | 6000 | 262000 |
Cancellation & Fee Refund Policy:
Application Fee – Rs 5000 (Non-refundable)
Course Fee Refund:
- A refund of 80% of the paid course fee will be issued if a request is raised before the Batch commencement date.
- No refund will be provided on or after the batch commencement date.
Program Coordinator

Dr Kamalakanta Sethi
Cyber Security Faculty Coordinator
Dr. Kamalakanta Sethi is an Assistant Professor in the Department of Computer Science and Engineering at the Indian Institute of Information Technology (IIIT) Sri City. He earned his Ph.D. in Computer Science and Engineering from IIT Bhubaneswar, focusing on advanced cryptography and intrusion detection systems for cloud networks. He holds an M.Tech in Information Security from NIT Warangal and a B.Tech in Computer Science from the National Institute of Science and Technology, Berhampur.
Read more
His research interests include cryptographic techniques, homomorphic encryption, AI-driven intrusion detection systems, and cloud security. He is a member of the NextGen Cyber Security Research Group at IIIT Sri City.
Dr. Sethi has published research in leading journals, including papers on context-aware intrusion detection and reinforcement learning-based security solutions. Prior to joining IIIT Sri City, he held academic positions at NIT Warangal and IIT Bhubaneswar.
In The News
Frequently Asked Questions(FAQ’s)
- Cybersecurity Analyst
- Ethical Hacker & Penetration Tester
- Cloud Security Architect
- Blockchain Security Expert
- Digital Forensics Investigator
Absolutely! With a curriculum that combines hands-on learning, real-world projects, and flexible online lectures, this program stands out as one of the best ethical hacking courses. Designed as an m tech in cyber security for working professionals, it enables learners to upskill in cyber defense, penetration testing, and digital forensics without disrupting their careers.
Yes, upon successful completion, students will receive a postgraduate degree in MTech in Cyber Security, certifying their expertise in ethical hacking, cloud security, and cyber defense.