The two-year Master of Computer Applications (MCA) program focuses on the design and development of information systems while providing a strong foundation in Information Technology and Computer Science.
The program combines strong computing foundations, advanced laboratory training, open labs, and a structured two-phase dissertation model, preparing graduates for leadership roles in modern technology ecosystems.
Digital Security, Ethical Hacking & Cyber Defense
2 Years | 4 Semesters | 82 Credits


Amrita Vishwa Vidyapeetham has not appointed any Agent or Third-Party Client for securing admission in any programme. Students are hereby requested to contact only the toll-free number on our website for any admission related queries.
– Issued in Public Interest by Directorate of Admissions and Academic Outreach
The MCA curriculum follows a progressive, research-integrated architecture.
(Aligned with Curriculum 2026)
Students build conceptual and technical depth in:
This stream develops professionals capable of protecting digital infrastructure and managing cyber threats. Graduates gain expertise in cyber defense, penetration testing, and secure system architecture.
Graduates develop strong enterprise-level development and system architecture capabilities.
| Course Code | Course Title | L T P | Credits |
| 26CSA502 | Object-Oriented Programming Using Java | 3 0 0 | 3 |
| 26MAT501 | Mathematical Foundations for Computer Applications | 3 1 0 | 4 |
| 26CSA503 | Data Structures | 3 0 0 | 3 |
| 26CSA504 | Advanced DBMS | 3 0 0 | 3 |
| 26CSA581 | Object-Oriented Programming Using Java Lab | 0 0 2 | 1 |
| 26CSA582 | Data Structures Lab | 0 0 2 | 1 |
| 26CSA580 | Advanced DBMS Lab | 0 0 2 | 1 |
| 25AVP501 | Mastery Over Mind | 1 0 2 | 2 |
| 22ADM501 | Glimpses of Indian Culture | 2 0 1 | P/F |
| 24LSK502 | Life Skills – 1 | 0 0 2 | 1 |
| Elective I | 3 | ||
| Elective II | 4 | ||
| Total | 26 |
| Code | Title | L T P | Credit |
| 26CSA511 | Design and Analysis of Algorithms | 3 1 0 | 4 |
| 26CSA512 | Principles and Implementation of Design Patterns | 3 0 2 | 4 |
| 26CSA583 | Problem Formulation & Research Tools | 0 0 2 | 1 |
| 26CSA584 | Design and Analysis of Algorithms Lab | 0 0 2 | 1 |
| 24LSK512 | Life Skills – II | 0 0 2 | 1 |
| Elective III | 3 | ||
| Elective IV | 3 | ||
| Elective V | 4 | ||
| Elective VI | 4 | ||
| Total | 25 |
| Code | Title | L T P | Credit |
| Elective VII | 3 | ||
| Elective VIII | 4 | ||
| Elective IX | 4 | ||
| Open Lab I | 0 0 1 | 1 | |
| Open Lab II | 0 0 1 | 1 | |
| 26CSA698 | Dissertation Phase I | 6 | |
| Total | 19 |
| Code | Title | L T P | Credit |
| 26CSA699 | Dissertation Phase II | 12 | |
| Total | 12 | ||
| TOTAL CREDITS | 82 |
| Sl. No | Title |
| 1 | Python Programming |
| 2 | C Programming |
| 3 | SQL Basics |
* These courses can be for a duration of 10-15 days (about 2 weeks).
| Code | Title | L T P | Credit |
| 26CSA550 | Essentials of cyber security | 3 0 0 | 3 |
| 26CSA551 | Malware Analysis | 3 0 0 | 3 |
| 26CSA552 | Blockchain and decentralized applications | 3 0 0 | 3 |
| 26CSA553 | Fundamentals of cybersecurity operations | 3 0 0 | 3 |
| 26CSA554 | Cloud and Infrastructure security | 3 0 0 | 3 |
| 26CSA555 | Cybersecurity Governance, Risk and Compliance | 3 0 0 | 3 |
| 26CSA556 | Cyber Security Law | 3 0 0 | 3 |
| 26CSA557 | Machine learning and artificial Intelligence in Cyber security | 3 0 0 | 3 |
| 26CSA558 | Mobile Security and Defense | 3 0 0 | 3 |
| 26CSA559 | Cyber Forensics | 3 0 0 | 3 |
| Code | Title | L T P | Credit |
| 26CSA641 | Ethical Hacking and Information Security | 3 1 0 | 4 |
| 26CSA642 | System Security | 3 0 2 | 4 |
| 26CSA643 | Web Application Security | 3 0 2 | 4 |
| 26CSA644 | Advanced Network Security | 3 0 2 | 4 |
| 26CSA645 | VAPT (Vulnerability and Penetration Testing) | 3 0 2 | 4 |
| 26CSA646 | Computer Networks for Cyber Security | 3 0 2 | 4 |
| Code | Title | L T P | Credit |
| 26CSA585 | Python Scripting for Security | 0 0 2 | 1 |
| 26CSA586 | Ethical Hacking Lab | 0 0 2 | 1 |
| 26CSA587 | Python Programming | 0 0 2 | 1 |
| 26CSA588 | C#.Net | 0 0 2 | 1 |
| 26CSA589 | Android Programming | 0 0 2 | 1 |
| 26CSA680 | UI/ UX design | 0 0 2 | 1 |
| 26CSA681 | Linux Programming | 0 0 2 | 1 |
| 26CSA682 | Competitive programming | 0 0 2 | 1 |
| 26CSA683 | Edge computing | 0 0 2 | 1 |
| 26CSA684 | R programming | 0 0 2 | 1 |
| 26CSA685 | MATLAB Programming | 0 0 2 | 1 |
| 26CSA686 | Deep Learning Lab | 0 0 2 | 1 |
| 26CSA687 | SQLite | 0 0 2 | 1 |
Students graduate with strong research capability and enterprise-ready technical expertise.
MCA graduates from Amrita Mysuru can pursue roles such as:
Graduates find opportunities across IT services, product companies, startups, research organizations, fintech, and enterprise technology environments.

* Refund policy
| Merit (Yearly) | Management (Yearly) | |
| Tuition Fee | 1,75,000 | 2,51,000 |
| Caution Deposit (One time) | 4,000 | 4,000 |
| Total (₹) | 1,79,000 | 2,55,000 |
Hostel Fee Structure (for new admissions)
| Hostel | Yearly |
| Caution Deposit (One Time) | 3,000 |
| Hostel Fee | 35,000 |
| Mess Fee | 49,000 |
| Total (₹) | 87,000 |
| Mandatory Health Check up Card Payable to AKH Hosptal | 750 |
*Note: Hostel fee will be high, if only two students are accommodated in a room
| Additional School Fee |
| Examination fee (Rs.3,000/sem) |
| One-time Convocation Fee to be paid in the final year of the Degree Program |
| Included in the Fee |
| 1. Two sets of Uniform for All UG Students |
The top reasons to choose Amrita for your career
Admission Convenor
Mobile: +91 9945531123
Email: admissions@my.amrita.edu
Admission Team
Phone: +(0821) – 2548600
Mobile : +91 8792911234
+91 8951311234 +91 8296230123
+91 8296220123
Email: mysuruadmissions@amrita.edu