Cyber security is a very fast moving field. A program in security that aims to be on the forefront has to necessarily have a companion-advanced program that has a good balance between theoretical and practical aspects, analytical methods and system architectures, academic ideas and industry practices.
The Center for Cyber Security was identified by TIFAC (Department of Science and Technology, Govt. of India) as a CORE in Cyber Security in September 2005. The TIFAC-CORE in Cyber Security gives significant thrust to the frontier areas of Cyber Security, including technology, practice, management, and policy issues. Research areas of the TIFAC-CORE in Cyber Security are organized into four broad categories, namely: Enterprise Wide Security, Data Center Security, Language-Based Security, and Hardware and Embedded Systems Security. These categories represent four horizontal layers of security in a typical information system /network that a practitioner would normally encounter in today’s industrial settings and corporate environments. CORE also focuses on theory and practice of authentication, authorization, and access control techniques.
Amrita Vishwa Vidyapeetham has not appointed any Agent or Third-Party Client for securing admission in any programme. Students are hereby requested to contact only the toll-free number on our website for any admission related queries.
– Issued In Public Interest By Directorate Of Admissions And Academic Outreach
Course Code | Type | Course | L | T | P | C |
---|---|---|---|---|---|---|
21MA601 | FC | Mathematical Foundations for Cyber Security | 3 | 1 | 0 | 4 |
21CY602 | FC | Concepts in System Security | 3 | 0 | 0 | 3 |
21CY603 | FC | Cryptography | 3 | 0 | 3 | 4 |
21CY681 | SC | Internet Protocol lab | 0 | 0 | 6 | 2 |
E | Elective 1 | 2 | 0 | 3 | 3 | |
21CY682 | SC | Secure Coding lab | 0 | 0 | 6 | 2 |
21HU601 | HU | Amrita Values Program * | P/F | |||
21HU602 | HU | Career Competency I * | P/F | |||
Credits | 18 | |||||
* Non-Credit Course |
Course Code | Type | Course | L | T | P | C |
---|---|---|---|---|---|---|
21CY621 | SC | Cyber Forensics | 2 | 0 | 3 | 3 |
21CY622 | SC | Applied Cryptography | 3 | 0 | 3 | 4 |
21CY623 | SC | Network Security | 3 | 0 | 0 | 3 |
21CY624 | SC | Web Application Security | 2 | 0 | 3 | 3 |
E | Elective II | 2 | 0 | 3 | 3 | |
21CY683 | SC | Cyber Security Lab | 0 | 0 | 6 | 2 |
21HU603 | HU | Career Competency II | 1 | 0 | 0 | 1 |
21RM615 | SC | Research Methodology | 1 | 0 | 0 | 1 |
Credits | 20 |
Course Code | Type | Course | L | T | P | C |
---|---|---|---|---|---|---|
E | Elective III | 2 | 0 | 3 | 3 | |
E | Elective IV | 2 | 0 | 3 | 3 | |
21CY798 | P | Dissertation I | 10 | |||
Credits | 16 |
Course Code | Type | Course | L | T | P | C |
---|---|---|---|---|---|---|
21CY799 | P | Dissertation II | 16 | |||
Credits | 16 |
Course Code | Course | L | T | P | C |
---|---|---|---|---|---|
21MA601 | Mathematical Foundations for Cyber Security | 3 | 1 | 0 | 4 |
21CY602 | Concepts in System Security | 3 | 0 | 0 | 3 |
21CY603 | Cryptography | 3 | 0 | 3 | 4 |
Course Code | Course | L | T | P | C |
---|---|---|---|---|---|
21CY621 | Cyber Forensics | 2 | 0 | 3 | 3 |
21CY622 | Applied Cryptography | 3 | 0 | 3 | 4 |
21CY623 | Network Security | 2 | 0 | 3 | 3 |
21CY624 | Web Application Security | 2 | 0 | 3 | 3 |
21RM615 | Research Methodology | 1 | 0 | 0 | 1 |
Course Code | Course | L | T | P | C |
---|---|---|---|---|---|
21CY798 | Dissertation | 10 | |||
21CY799 | Dissertation | 16 |
Course Code | Course | L | T | P | C |
---|---|---|---|---|---|
21CY681 | Internet Protocol lab | 0 | 0 | 6 | 2 |
21CY682 | Secure Coding Lab | 0 | 0 | 6 | 2 |
21CY683 | Cyber Security Lab | 0 | 0 | 6 | 2 |
Course Code | Course | L | T | P | C |
---|---|---|---|---|---|
21RM615 | Research Methodology | 2 | 0 | 0 | 2 |
Course Code | Course | L | T | P | C |
---|---|---|---|---|---|
Elective I | |||||
21CY701 | Data Mining and Machine Learning in Cyber Security | 2 | 0 | 3 | 3 |
21CY702 | Design and Analysis of Algorithms | 2 | 0 | 3 | 3 |
Elective II | |||||
21CY703 | Security of Cyber physical Systems | 3 | 0 | 0 | 3 |
21CY704 | Steganography and Program Obfuscation | 2 | 0 | 3 | 3 |
21CY705 | Cryptographic Hardware and Embedded Systems | 2 | 0 | 3 | 3 |
Elective III | |||||
21CY706 | Coding and Information Theory | 3 | 0 | 0 | 3 |
21CY707 | Formal Methods for Security | 3 | 0 | 0 | 3 |
21CY708 | Android Security | 2 | 0 | 3 | 3 |
21CY709 | Wireless Networking and Security | 2 | 0 | 3 | 3 |
Elective IV | |||||
21CY710 | Security in Cloud Computing | 2 | 0 | 3 | 3 |
21CY711 | Special Topics in Cryptography | 2 | 0 | 3 | 3 |
21CY712 | Blockchain Technology | 2 | 0 | 3 | 3 |
21CY713 | Secure Systems Engineering | 2 | 0 | 3 | 3 |
21CY714 | Special Topics in Cyber Security | 2 | 0 | 3 | 3 |
B.Tech/BE in ECE, EEE, CS/IT
This M. Tech program provides a good blend of theory and industrial practice; necessary theoretical background, insight into general and technical aspects of Cyber Security, analytical methods and management practices in the field of Cyber Security are the areas receiving detailed attention. It aims at molding the student into an Information Security professional. Practicing industry professionals and enterprise experts with little or no knowledge in Cyber Security too can benefit from this program.
Two years
Centre for International Programs facilitates foreign internship with scholarship and higher education. Students can even opt for dual degree programs.
Internships
Amrita Vishwa Vidyapeetham is one of the top private universities in India offering a 2-year M.Tech in Cyber Security at its Amritapuri, Coimbatore, and Bengaluru campuses.
This multi-campus, prestigious academic institution offers multi-disciplinary, research-intensive courses across Engineering, Management, and Medical Sciences, including Ayurveda, Life Sciences, Physical Sciences, Agriculture Sciences, Arts & Humanities, and Social & Behavioural Sciences.
Amrita has emerged as the seventh-best university in the National Institutional Ranking Framework (NIRF) Rankings 2023 and is accredited with the highest possible ‘A++’ grade by NAAC.
With over 250 UG, PG, and Ph.D. courses, Amrita campuses imbibe value-based education to a vibrant student population of over 24,000, helmed by 1700+ strong faculty.
One of the top institutions for higher learning, Amrita has established 180+ collaborations with the top 500 world-ranked universities and is the first choice for corporate conglomerates in India and abroad for campus recruitment.
The curriculum of an M.Tech program in Cybersecurity typically covers a range of topics, including network security, cryptography, ethical hacking, cyber forensics, secure software development, risk management, cloud security, and legal aspects of cybersecurity. It often includes theoretical courses, practical laboratory sessions, and hands-on projects to provide students with comprehensive knowledge and skills.
Prerequisites for enrolling in an M.Tech program in Cybersecurity usually include a bachelor’s degree in computer science, information technology, electronics and communication engineering, or a related field. Some universities may also require applicants to have a certain GPA, relevant work experience, and proficiency in programming languages like Python, Java, or C++.
Completing an M.Tech in Cybersecurity opens up many career opportunities in the rapidly growing field of cybersecurity. Graduates can pursue roles such as cybersecurity analysts, security consultants, incident responders, security architects, penetration testers, IoT security analysts, cloud security experts, data privacy and compliance officers, and AI and machine learning cybersecurity experts.
The duration of an M.Tech program in Cybersecurity is 2 years, depending on the university and the specific curriculum structure. The M.Tech program at Amrita Vishwa Vidyapeetham offers hands-on projects that address contemporary cybersecurity challenges.
Students are given ample opportunities to work on industry-relevant scenarios and solutions, enabling them to gain practical experience and develop the skills necessary to navigate the complex cybersecurity landscape.
The top reasons to choose Amrita for your career
Email: mtech@amrita.edu