Admission Open for MTech @ Amrita Vishwa Vidyapeetham
Contact: 8606878111 Chat on WhatsApp mtech@amrita.edu
All Programs are AICTE Approved
Cyber security is a very fast moving field. A program in security that aims to be on the forefront has to necessarily have a companion-advanced program that has a good balance between theoretical and practical aspects, analytical methods and system architectures, academic ideas and industry practices.
The Center for Cyber Security was identified by TIFAC (Department of Science and Technology, Govt. of India) as a CORE in Cyber Security in September 2005. The TIFAC-CORE in Cyber Security gives significant thrust to the frontier areas of Cyber Security, including technology, practice, management, and policy issues. Research areas of the TIFAC-CORE in Cyber Security are organized into four broad categories, namely: Enterprise Wide Security, Data Center Security, Language-Based Security, and Hardware and Embedded Systems Security. These categories represent four horizontal layers of security in a typical information system /network that a practitioner would normally encounter in today’s industrial settings and corporate environments. CORE also focuses on theory and practice of authentication, authorization, and access control techniques.
This M. Tech program provides a good blend of theory and industrial practice; necessary theoretical background, insight into general and technical aspects of Cyber Security, analytical methods and management practices in the field of Cyber Security are the areas receiving detailed attention. It aims at moulding the student into an Information Security professional. Practicing industry professionals and enterprise experts with little or no knowledge in Cyber Security too can benefit from this program.
Duration : Two years
Eligibility : A Pass with Minimum 60% in B.E./B.Tech in the relevant area of specialization or equivalent qualification.
Cyber Security lab, IoT VAPT lab, High performance lab for Cryptanalysis
Centre for International Programs facilitates foreign internship with scholarship and higher education. Students can even opt for dual degree programs.
First Semester | ||||||
---|---|---|---|---|---|---|
Course Code | Type | Course | L | T | P | C |
20MA601 | FC | Mathematical Foundations for Cyber Security | 3 | 1 | 0 | 4 |
20CY602 | FC | Concepts in System Security | 3 | 0 | 0 | 3 |
20CY603 | FC | Cryptography | 3 | 0 | 3 | 4 |
20CY626 | SC | Internet Protocol lab | 0 | 0 | 6 | 2 |
E | Elective 1 | 2 | 0 | 3 | 3 | |
20CY627 | SC | Secure Coding lab | 0 | 0 | 6 | 2 |
18HU601 | HU | Amrita Values Program * | P/F | |||
18HU602 | HU | Career Competency I * | P/F | |||
Credits | 18 | |||||
* Non-Credit Course |
Second Semester | ||||||
---|---|---|---|---|---|---|
Course Code | Type | Course | L | T | P | C |
20CY621 | SC | Cyber Forensics | 2 | 0 | 3 | 3 |
20CY622 | SC | Applied Cryptography | 3 | 0 | 3 | 4 |
20CY624 | SC | Web Application Security | 2 | 0 | 3 | 3 |
20CY623 | SC | Network Security | 3 | 0 | 0 | 3 |
E | Elective II | 2 | 0 | 3 | 3 | |
20CY628 | SC | Cyber Security Lab | 0 | 0 | 6 | 2 |
18HU603 | HU | Career Competency II | 1 | 0 | 0 | 1 |
20RM600 | SC | Research Methodology | 2 | 0 | 0 | 2 |
Credits | 21 |
Third Semester | ||||||
---|---|---|---|---|---|---|
Course Code | Type | Course | L | T | P | C |
E | Elective III | 2 | 0 | 3 | 3 | |
E | Elective IV | 2 | 0 | 3 | 3 | |
20CY798 | P | Dissertation | 8 | |||
Credits | 18 |
Fourth Semester | ||||||
---|---|---|---|---|---|---|
Course Code | Type | Course | L | T | P | C |
20CY799 | P | Dissertation | 12 | |||
Credits | 12 |
Total Credits | 65 |
---|
Foundation Core | ||||||
---|---|---|---|---|---|---|
Course Code | Course | L | T | P | C | |
20MA601 | Mathematical Foundations for Cyber Security | 3 | 1 | 0 | 4 | |
20CY602 | Concepts in System Security | 3 | 0 | 0 | 3 | |
20CY603 | Cryptography | 3 | 0 | 3 | 4 |
Subject Core | ||||||
---|---|---|---|---|---|---|
Course Code | Course | L | T | P | C | |
20CY621 | Cyber Forensics | 2 | 0 | 3 | 3 | |
20CY622 | Applied Cryptography | 3 | 0 | 3 | 4 | |
20CY623 | Network Security | 2 | 0 | 3 | 3 | |
20CY624 | Web Application Security | 2 | 0 | 3 | 3 |
Laboratory | ||||||
---|---|---|---|---|---|---|
Course Code | Course | L | T | P | C | |
20CY626 | Internet Protocol lab | 0 | 0 | 6 | 2 | |
20CY627 | Secure Coding Lab | 0 | 0 | 6 | 2 | |
20CY628 | Cyber Security Lab | 0 | 0 | 6 | 2 |
Course Code | Course | L | T | P | C |
---|---|---|---|---|---|
20RM600 | Research Methodology | 2 | 0 | 0 | 2 |
Project | ||||||
---|---|---|---|---|---|---|
Course Code | Course | L | T | P | C | |
20CY798 | Dissertation | 8 | ||||
20CY799 | Dissertation | 12 |
Electives | ||||||
---|---|---|---|---|---|---|
Course Code | Course | L | T | P | C | |
Elective I | ||||||
20CY701 | Data Mining and Machine Learning in Cyber Security | 2 | 0 | 3 | 3 | |
20CY702 | Design and Analysis of Algorithms | 2 | 0 | 3 | 3 | |
Elective II | ||||||
20CY703 | Security of Cyber physical Systems | 3 | 0 | 0 | 3 | |
20CY704 | Steganography and Program Obfuscation | 2 | 0 | 3 | 3 | |
20CY705 | Cryptographic Hardware and Embedded Systems | 2 | 0 | 3 | 3 | |
Elective III | ||||||
20CY706 | Coding and Information Theory | 3 | 0 | 0 | 3 | |
20CY707 | Formal Methods for Security | 3 | 0 | 0 | 3 | |
20CY708 | Android Security | 2 | 0 | 3 | 3 | |
20CY709 | Wireless Networking and Security | 2 | 0 | 3 | 3 | |
Elective IV | ||||||
20CY710 | Security in Cloud Computing | 2 | 0 | 3 | 3 | |
20CY711 | Special Topics in Cryptography | 2 | 0 | 3 | 3 | |
20CY712 | Blockchain Technology | 2 | 0 | 3 | 3 | |
20CY713 | Secure Systems Engineering | 2 | 0 | 3 | 3 | |
20CY714 | Special Topics in Cyber Security | 2 | 0 | 3 | 3 |
Core Courses | ||
---|---|---|
Computer Science & Engineering | Information Technology | Electronics & Communication Engineering |
Foundation Core | Subject Core |
---|---|
Mathematical Foundations for Cyber Security | Internet Protocols |
Concepts in System Security | Cyber Forensics |
Cryptography | Applied Cryptography |
Secure Coding | Network Security |
Cyber Security Lab | |
Research Methodology | |
Electives | |
---|---|
Data Mining and Machine Learning in Cyber Security | Distributed and Cloud Computing |
Design and Analysis of Algorithms | Wireless Networking and Security |
Coding and Information Theory | Cryptographic Hardware and Embedded Systems |
Steganography and Obfuscation | Formal Methods for Security |
Android Security | Secure System Engineering |
Security in Cloud Computing | Special Topics in Cryptography |
Blockchain Technology | Secure Systems Engineering |
Visit TIFAC-CORE in Cyber Security (Coimbatore Campus) Website
If you wish to know more about the course please mail to,
mtech@amrita.edu
2020 |