Admission Closed
Looking to transition into cyber security roles
Aiming to build advanced capabilities in secure system architecture
Seeking to deepen expertise in threat detection and defence
Managing security, compliance, and organizational risk
Interested in offensive security, digital forensics, SOC, or threat intelligence
Develop advanced expertise in cyber security frameworks required to design resilient digital infrastructure.
Prepare professionals to lead security initiatives by developing effective risk strategies and policies.
Strengthen understanding of cyber laws, regulatory frameworks, and ethical practices governing security operations.
Build expertise across offensive approaches like penetration testing and defensive practices like SOC operations.
Enhance analytical and investigative capabilities required to assess complex security incidents and malware.
Nurture an adaptable learning approach to stay ahead of the continuously evolving global threat landscape.
| Course Code | Course Name |
|---|---|
| EMCY101 | Foundations of Cyber Security |
| EMCY102 | Computer Networks & Communication Protocols |
| EMCY103 | Network Security & Firewalls |
| EMCY104 | Secure Programming & Code Analysis |
| EMCY105 | Cyber Laws, Ethics & Compliance |
| Course Code | Course Name |
|---|---|
| EMCY201 | Applied Cryptography |
| EMCY202 | Operating System & Endpoint Security |
| EMCY203 | Vulnerability Assessment and Penetration Testing (VAPT) |
| EMCY204 | AI & ML for Cyber Security |
| EMCY205 | Data Science for Security Analytics |
| Course Code | Course Title |
|---|---|
| EMCY301 | Cloud Security Architecture and Operations |
| EMCY302 | Elective-1 |
| EMCY303 | Elective-2 |
| EMCY304 | Elective-3 |
| EMCY305 | Elective-4 |
| Course Code | Course Title |
|---|---|
| EMCY401 | Elective-5 |
| EMCY402 | Elective-6 |
| EMCY403 | Project Work / Research + Dissertation |
| Elective Pool - 3 from each pool - Mandatory | ||
|---|---|---|
| Sr no | Offensive Security & Threat Intelligence | Defensive Security & GRC |
| 1 | Malware Analysis & Reverse Engineering | Security Operations Center (SOC) Management |
| 2 | Network Exploitation and Forensics | Threat Hunting & Deception Technologies |
| 3 | Wireless & IOT Security | Cloud Native Security Operations & Resilience |
| 4 | Web and Mobile Application Exploitation | Information Security Risk Management |
| 5 | Advanced Penetration Testing and Exploit Development | Security Auditing & Compliance Frameworks |
| 6 | Digital Forensics & Incident Response | Identity and Access Management (IAM) |
| 7 | Advanced Threat Intelligence and Hunting | Data Loss Prevention (DLP) |
| 8 | Application Security Testing (DAST/SAST) | Third Party RisK Management |


























Earn a recognised M.Tech degree from IIIT Vadodara, strengthening your academic credentials and long-term professional credibility.
Become part of the IIIT Vadodara alumni network and strengthen professional connections.
The program’s hybrid learning model with live online sessions enables professionals to pursue advanced education while continuing their careers.
Gain exposure to critical domains such as network security, cryptography, digital forensics, cloud security, penetration testing, and threat intelligence.
Develop expertise across offensive security techniques such as penetration testing and threat hunting, as well as defensive security practices including SOC operations and incident response.
Work on practical assignments, security labs, and a final project or dissertation focused on solving real-world cyber security problems.
Learn from experienced IIIT Vadodara faculty and researchers specialising in cyber security, distributed systems, and information security.
Participate in on-campus learning sessions designed to enhance peer collaboration, faculty interaction, and practical exposure.
Ability to design and implement secure computing environments using principles of network security, cryptography, and secure system engineering.
Ability to identify system vulnerabilities, conduct penetration testing, and implement appropriate mitigation strategies.
Ability to leverage security analytics, machine learning techniques, and threat intelligence to detect and analyse cyber threats.
Ability to secure enterprise IT environments including networks, operating systems, endpoints, and cloud infrastructure.
Ability to conduct digital forensic investigations, analyse security breaches, and implement structured incident response mechanisms.
Understanding of professional ethics, legal obligations, and regulatory frameworks relevant to cyber security operations and governance.
Become part of a growing network of technology professionals and graduates.
Connect with alumni across industry, academia, startups, and government sectors.
Explore partnerships in industry projects, research initiatives, and consulting engagements.
Engage with experienced professionals for continuous knowledge exchange and insights.
Stay updated with evolving technologies through ongoing alumni interactions.
Build meaningful connections that support long-term career growth.
Note : Alumni status is granted only to M.Tech graduates
Experience a mandatory 5-day on-campus immersion at Indian Institute of Information Technology Vadodara, scheduled in July or December based on your cohort. Hosted at the IIITV-ICD campus in Diu, this immersion is designed to enable in-person learning, peer interaction, and deeper academic engagement.
Hostel accommodation at IIITV-ICD campus, Diu provided on a shared basis.
| Fees Components | Sem I | Sem II | Sem III | Sem IV | ||||
| Institute Registration Fees | 1,000 | 1,000 | 1,000 | 1,000 | ||||
| Tuition Fee | 85,000 | 85,000 | 85,000 | 85,000 | ||||
| Caution Deposit (Refundable) | 10,000 | - | - | - | ||||
| Academic Charges Inc (Convocation Fee, Alumni Fee, Insurance, ID card Fee) | 3,600 | 2,000 | 3,500 | 2,000 | ||||
| Campus Immersion Fee | 5,000 | - | - | - | ||||
| Total | 1,04,600 | 88,000 | 89,500 | 88,000 | ||||
Note:
|
||||||||
Associate Professor
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.