The two-year Master of Computer Applications (MCA) in Cyber Security program emphasizes the design and development of information systems while providing a strong foundation in Information Technology and Cyber Security. Students gain a comprehensive understanding of the principles, concepts, and core foundations of computer science, IT, and related fields, along with extensive hands-on experience in programming and software development across various platforms and applications. The curriculum integrates theoretical concepts with practical lab components to ensure a well-rounded learning experience.
This specialization equips students with advanced skills and knowledge in defending digital systems, networks, and data from cyber threats. Throughout the program, students gain practical experience with essential cybersecurity tools and techniques, including penetration testing tools, encryption algorithms, and intrusion detection systems. They also learn to identify vulnerabilities, assess risks, and implement security measures to protect against cyberattacks.
Program Highlights
The MCA program offers an extensive curriculum that explores advanced topics such as Cyber Security, providing students with a deep understanding of this critical field. The program also includes specialized courses in soft skills development, a broad selection of elective options, and mandatory research-oriented courses, all aimed at preparing students for a variety of professional roles. This holistic approach ensures that graduates are thoroughly equipped to thrive in the dynamic and ever-evolving information technology landscape.
Graduates of the program are in high demand and often secure positions with leading multinational companies, accompanied by competitive salary packages.
Career Opportunities
Amrita Vishwa Vidyapeetham has not appointed any Agent or Third-Party Client for securing admission in any programme. Students are hereby requested to contact only the toll-free number on our website for any admission related queries.
– Issued In Public Interest By Directorate Of Admissions And Academic Outreach
2 Years- 4 Semester
Passed any graduation degree (e.g.: B.E. / B.Tech./ B.Sc / B.Com. / B.A./ B. Voc./ BCA etc.,) preferably with Mathematics at 10+2 level or at Graduation level. Obtained at least 50% marks in the qualifying examination.
Selection will be based on merit and interview process.
Program Fee for the year 2025-26 (Semester Wise)Tuition Fee: Rs. 60,500 Hostel Fee for the year 2025-26 (Semester Wise)Hostel Fee: Rs. 13,750 |
Sl. No. | Course Title | Theory / Practical | Credits |
1 | Object-Oriented Programming Using Java | T + P | 4 |
2 | Mathematical Foundations for Computer Applications | T | 4 |
3 | Data Structures | T + P | 4 |
4 | Advanced DBMS | T + P | 4 |
5 | Professional Elective I | T + P | 4 |
6 | Elective I | T | 3 |
7 | Mastery Over Mind | T | 2 |
8 | Glimpses of Indian Culture | T | P/F |
9 | Life Skills – 1 | T | 1 |
Credits (A) | 26 |
Sl. No. | Course Title | Theory / Practical | Credits |
1 | Design and Analysis of Algorithms | T | 4 |
2 | Software Engineering and Design Patterns | T | 4 |
3 | Problem Formulation and Research Tools | P | 1 |
4 | Professional Elective II | T + P | 4 |
5 | Professional Elective III | T + P | 4 |
6 | Elective II | T | 3 |
7 | Elective III | T | 3 |
8 | Open Lab I | P | 1 |
9 | Life Skills – II | T | 1 |
Credits (B) | 25 |
Sl. No. | Course Title | Theory / Practical | Credits |
1 | Professional Elective IV | T + P | 4 |
2 | Professional Elective V | T + P | 4 |
3 | Elective IV | T | 3 |
4 | Open Lab II | P | 1 |
5 | Open Lab III | P | 1 |
6 | Dissertation Phase I | 6 | |
Credits (C) | 19 |
Sl. No. | Course Title | Theory / Practical | Credits |
1 | Dissertation Phase II | 12 | |
Credits (D) | 12 | ||
Total Credits: 82 Credits |
Sl. No. | Course Title |
1 | Cryptography |
2 | Ethical Hacking and Information Security |
3 | System Security |
4 | Web Application Security |
5 | Network Security |
6 | VAPT (Vulnerability and Penetration Testing) |
Sl. No. | Course Title |
1 | Essentials of Cyber security |
2 | Malware Analysis |
3 | Blockchain and decentralized applications |
4 | Fundamentals of cyber security operations |
5 | Cloud and Infrastructure security |
6 | Cybersecurity Governance, Risk and Compliance |
7 | Cyber Security Law |
8 | Machine learning and artificial Intelligence in Cyber security |
9 | Mobile Security and Defense |
10 | Cyber Forensics |
11 | Security Architecture for Databases and Applications |
Sl. No. | Course Title |
1 | Python Scripting for Security |
2 | Ethical Hacking Lab |
3 | Python Programming |
4 | C#.Net |
5 | Android Programming |
6 | UI/ UX design |
7 | Linux Programming |
8 | Competitive programming |
9 | Edge computing |
10 | R programming |
11 | MATLAB Programming |
12 | High-Performance computing |
13 | Cyber Security |
14 | Algorithms Lab |
15 | Deep Learning Lab |
16 | SQLite |
The top reasons to choose Amrita for your career