M.Tech Cyber Security and Computer Science Engineering

NOW OPEN

Admissions 2024

Unlock your future: Enroll Now for Admissions 2024

M.Tech

Computer Science and Engineering - Cyber Security

icon clock 2 Years

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

About the Course

A program in security that aims to be on the forefront has to necessarily have a companion-advanced program that has a good balance between theoretical and practical aspects, analytical methods and system architectures, academic ideas and industry practices.

Arrow

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

Outcomes

The course will enable students to:

  • Develop the knowledge, understanding and skills in cyber-security theory and hands-on by exploring a wide range of cutting edge techniques and tools.
  • Provide an opportunity for knowledge sharing, Internship, Research and Collaborative learning with Industry in India and Reputed Universities abroad.
  • Establish responsibility and accountability for information security in organizations.
  • Be proficient in various forensic tools and usage of tools for disk imaging and recovery processes.
  • Design security procedures and policies.
  • Be well versed in various security standards and security testing techniques.
Arrow

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

Salient Features

M.Tech Cyber Security program offers an advanced study on Cyber Security methodologies and their applications in real-time scenarios. The students are exposed to the advanced tools and technologies used to secure infra and network, cloud, IoT, blockchain, web communication and cyber threats. The program focuses on preparing expert cyber security professionals who can easily handle the real-life difficulties directly connected with the cyber security scenario.

Arrow

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

Scope

Possible opportunities for graduates include roles in information security such as network security engineers, forensic analysts, information security crime investigators, security architects, disaster recovery managers and security analysts. These jobs may be offered in organizations where large amounts of data have to be securely stored and cannot be intercepted during transmission between trading partners over the network. Since most operations are carried out in wireless mode it is the job of the network security engineers, forensic analysts, information security crime investigators, security architects, disaster recovery managers and security analysts to safeguard the information from any criminal activities.

Arrow