2 Years
₹65000*
Online
One week per year
Gain practical experience through labs, ethical hacking simulations, and real-world projects.
Covers cybersecurity fundamentals, cryptography, cloud security, and digital forensics, ensuring a robust MTech online learning experience.
Develop expertise in penetration testing, network security, and cyber regulations, making it a top choice for MTech for working professionals.
Work on real-world applications to build a strong portfolio for career advancement.
Learn how machine learning and blockchain enhance cybersecurity measures.
To provide a strong foundation in cybersecurity concepts, cryptography, and ethical hacking through a specialized MTech online program.
To equip students with the ability to identify network vulnerabilities and implement defense mechanisms.
To integrate AI and machine learning techniques for detecting and preventing cyber threats.
To develop practical skills in cloud security, blockchain applications, and digital forensics.
To prepare students for industry challenges through hands-on projects and real-world case studies, a core feature of this MTech online program.
Equip learners to perform incident response, malware analysis, and digital forensics investigations across enterprise environments.
Demonstrate proficiency in cybersecurity principles and cryptographic techniques.
Identify and mitigate security risks in networks, cloud systems, and mobile platforms through an advanced online MTech curriculum.
Apply ethical hacking methods and penetration testing to strengthen system security.
Utilize AI-driven solutions to detect cyber threats and enhance digital protection.
Conduct digital forensic investigations and implement security policies effectively.
Design and develop secure applications through capstone and major project work.
Introduction to Cyber Security
|
Number Theory
|
Operating Systems and Mobile Security
|
Penetration Testing
|
Cryptography
|
Internet Security
|
Cloud Security
|
Capstone Project: Securing a Real-World Application |
Blockchain Technology and Applications
|
Fusing ML and DL with Cyber Security
|
System Security
|
Minor Project |
Digital Forensics
|
Major Project |
Experience structured on-campus immersions after every semester, designed to strengthen academic engagement, peer collaboration, and faculty interaction. These campus immersions complement the live online learning format by connecting structured online learning with in-person academic engagement within a nationally recognized institute of technology.
Faculty-led sessions, discussions, and academic interactions aligned with the programme curriculum.
Collaborative learning and networking with fellow participants.
Opportunity to explore the IIIT Sri City campus, engage with its academic ecosystem, and gain exposure to labs and research facilities.
Travel to and from the campus.
Food, lodging, and stay arrangements.
Any personal expenses incurred during the immersion period.
| Logos | Application |
|---|---|
|
Web application security testing Identifies vulnerabilities like SQL Injection, XSS, & CSRF. Automates scanning for OWASP Top 10 risks. Intercepts and modifies HTTP/S requests & responses. |
![]() |
Penetration Testing Framework Simulates real-world attacks to test system security. Automates exploitation using known vulnerabilities. Useful for vulnerability assessment & security research. |
![]() |
Network packet analysis Captures and inspects network traffic in real time. Identifies suspicious activities (e.g., MITM attacks). Analyzes protocols to detect vulnerabilities. |
|
Web vulnerability scanning Detects outdated software, misconfigurations, & security flaws. Identifies default credentials and exposed files. Supports automated testing of web servers. |
|
Password cracking Uses dictionary and brute-force attacks. Supports various encryption formats (MD5, SHA, etc.). Cracks passwords from Linux shadow files, Windows hashes, etc. |
|
Web application security testing Open-source alternative to Burp Suite. Finds security misconfigurations and vulnerabilities. Automates web security scans. |
|
Digital forensics and memory analysis Autopsy: Analyzes hard drives, emails, and deleted files. Volatility: Extracts information from RAM dumps (useful for malware analysis and rootkit detection). |
![]() |
Network exploitation & lateral movement Performs Pass-the-Hash & Pass-the-Ticket attacks. Exploits SMB, RDP, and LDAP vulnerabilities. Dumps NTLM hashes & Kerberos tickets. Executes remote commands (psexec, smbexec, wmiexec). |
![]() |
Active Directory attack mapping Graph-based attack path visualization. Detects privilege escalation paths in AD. Finds misconfigurations leading to domain admin takeover. Automates enumeration of AD objects (users, groups, computers). |
|
Reverse engineering & malware analysis Performs binary analysis & disassembly. Decompiles binaries to C-like code. Analyzes malware behavior. Supports memory forensics & debugging. |
M.Tech online program in Cyber Security follows a structured evaluation system with mid-semester and end-semester exams assessing theoretical concepts. Continuous assessments, including lab work, assignments, projects, and quizzes, ensure ongoing evaluation aligned with course requirements.
| Exam Type | Focus Areas |
|---|---|
| Mid-Sem Exam | Tests knowledge of fundamental security concepts like cryptography, network security protocols, and threat detection. |
| End-Sem Exam | Focuses on advanced topics such as ethical hacking, penetration testing, malware analysis, and cyber laws. |
| Continuous Assessments | Involves practical exercises, online quizzes, assignments on current security trends, and group discussions on emerging threats. |
This proposed examination structure ensures that students are thoroughly assessed on both their theoretical knowledge and their ability to apply these concepts in real-world scenarios.
| Exam Type | Focus Areas |
|---|---|
| Mid Semester Exam - 30% | (MCQs + Fill in the Blanks + Descriptive Questions) |
| End Semester Exam - 40% | (MCQs + Fill in the Blanks + Descriptive Questions) |
| Continuous Evaluation -30% | (To be decided by faculty course wise) |
| Semester | Instalment 1 | Instalment 2 | Optional Campus Immersion | Optional Alumni Fee | Total |
|---|---|---|---|---|---|
| Sem 1 | 40000 | 25000 + 2000 | - | - | 67000 |
| Sem 2 | 40000 | 25000 | Actuals | - | 65000 |
| Sem 3 | 40000 | 25000 | - | 6000 | 65000 |
| Sem 4 | 40000 | 25000 | Actuals | - | 65000 |
| Total | 160000 | 102000 | - | 6000 | 262000 |
Application Fee - Rs 5000 (Non-refundable)
1. Application Fee and Administrative Fee
The Application Fee and Administrative Fee are non-refundable under all circumstances.
2. Refund Scenarios
a. Student applies for refund before batch commencement
If a student requests a refund before the batch commencement date, an 80% refund of the paid
course fee will be provided. The Application Fee and Administrative Fee will remain
non-refundable.
b. Student application rejected by the institute
If a student’s application is rejected by the institute, the full course fee will be
refunded. The Application Fee and Administrative Fee will remain non-refundable.
3. Post Batch Commencement
No refund is applicable once the batch has commenced.
IIIT Sri City reserves the right to conduct the admissions process. By submitting the Application, the students agree that any decision regarding admissions from IIIT Sri City will be final and binding.
A student who has been admitted to the Program may be permitted to withdraw temporarily from the Institute on the grounds of prolonged illness, a grave calamity in the family, or similar contingencies, subject to the following conditions:
Requirements After Temporary Withdrawal:
Dr. Kamalakanta Sethi is an Assistant Professor in the Department of Computer
Science and Engineering at the Indian Institute of Information Technology (IIIT) Sri City. He earned
his Ph.D. in Computer Science and Engineering from IIT Bhubaneswar, focusing on advanced cryptography
and intrusion detection systems for cloud networks. He holds an M.Tech in Information Security from
NIT Warangal and a B.Tech in Computer Science from the National Institute of Science and Technology,
Berhampur.
Read more
His research interests include cryptographic techniques, homomorphic encryption, AI-driven intrusion detection systems, and cloud security. He is a member of the NextGen Cyber Security Research Group at IIIT Sri City.
Dr. Sethi has published research in leading journals, including papers on context-aware intrusion detection and reinforcement learning-based security solutions. Prior to joining IIIT Sri City, he held academic positions at NIT Warangal and IIT Bhubaneswar.
Absolutely! With a curriculum that combines hands-on learning, real-world projects, and flexible online lectures, this program stands out as one of the best ethical hacking courses. Designed as an m tech in cyber security for working professionals, it enables learners to upskill in cyber defense, penetration testing, and digital forensics without disrupting their careers.
Yes, upon successful completion, students will receive a postgraduate degree in MTech in Cyber Security, certifying their expertise in ethical hacking, cloud security, and cyber defense.