Curriculum

Master of Technology (M.Tech) in Cyber Security

The Department of Computer Science and Engineering, SRM University-AP, Amaravati offers M.Tech Computer Science and Engineering with Cyber Security Data science as specialization Cyber security program aims to be on the forefront and has to necessarily have a good balance between theoretical and practical aspects, analytical methods and system architectures, academic ideas and industry practices. It gives significant thrust to technology, practice, management, and policy issues. This M. Tech course is of four semesters. It aims at providing necessary theoretical background, insight into general and technical aspects of Cyber Security, analytical methods and management practices in the field of Cyber Security and related areas for moulding the student into an Information security professional. The entire program will focus on cryptology and communication security, big and streaming data analytics, Data Center Security, Cryptanalysis, Digital forensic, Security audit, ethical hacking, statistical learning, machine learning, and hardware and embedded systems security. These courses will also focuses on theory and practice of authentication, authorization, and access control techniques.

 

  • Semester 1

    Credits
  • Mathematical Foundations for cyber security

    3
  • Machine Learning Techniques

    3
  • Number theory and Cryptography

    3
  • Advanced Algorithms and Analysis

    3
  • Elective I

    3
  • Cryptography Lab

    2
  • Machine Learning Lab

    2
  • Semester 2

    Credits
  • Cloud Security

    3
  • Internetworking – Security Protocols

    3
  • Cyber Forensic

    3
  • Elective-I

    3
  • Elective II

    3
  • Internet Security Protocols Lab

    2
  • Cyber Forensic Lab

    2
  • Semester 3

    Credits
  • Project work- Phase I

    12
  • Semester 4

    Credits
  • Project Work –Phase II

    12
  • 62

List of Electives

  • Data Security
  • Big Data Analytics
  • Cloud Computing
  • Data Mining & Applications
  • Secure E-Commerce
  • Web Services
  • Agent Systems and Security
  • Biometric Security
  • Cyber Security Standards and Best Practices
  • Database and Application Security
  • Information Security Management
  • Intrusion Detection Systems
  • Legal issues in Information Security
  • Mobile and Wireless Security
  • Object Oriented System Design
  • PKI and Trust Management
  • Secure Coding
TOP