Cyber Security

Master of Science in Computer Science with specialization in Cyber security course offered by the Indian Institute of Information Technology and Management-Kerala, aims at offering a high standard curriculum in allied disciplines of Computer Science. The  course opens to candidates a wide range of job opportunities in the vast arena of the cyber world both nationally as well as internationally. This include IT and govt. organizations, cyber forensics labs, cyber crime investigation agencies, banks, research labs and so on. The course offers employment prospects in areas of network security, digital forensics, ethical hacking, cryptography, computer system security, bio-metrics, mobile phone security, etc.. It aims to provide candidates a foundation for preparing them in becoming professionals as well as empowered citizens who aid in protecting data and making the world cyber-attack free.

Some of the job profiles which the graduates can aim for after completion of the course are: Chief Information Security Officer (CISO), Information Security Analyst, Cyber Security Analyst, Application Security Analyst, Infrastructure Security Analyst, Computer Crime Investigator, Incident Responder, ethical hacker, malware analyst, forensic investigator, penetration tester, cryptologist, security software developer, Disaster Recovery Analyst, Network Security Engineer, Security Architect, Security Analyst, Security Engineer, Security Code Auditor, etc..

The duration of the programme is 2 years and the courses are carefully designed to attain technical aspects that enable the students to grow into competent Cyber Security professionals. There are 11 core courses, 4 electives and five lab courses. The students are required to do a minor project of 2 credits each during 2nd and 3rd semester. The students are also required to take one elective course during second semester and three elective courses during the third semester of 3 credits. The 4th semester is for project/internship of 18 credits. Students are required to undergo an industry or research oriented project in any leading IT or R &D organizations. The total requirement for the programme is 72 credits.

Eligibility

Entry-level requirement is a minimum score of 60 percentage marks OR CPI/CGPA of 6.5  or above in 10 points in the  Bachelor’s degree in any branch  of Engineering / Technology / Science  with  Mathematics as  a Subject of study

A candidate with CGPA less than 6.5 will also be eligible if the equivalent percentage for graduation is above 60% as per the respective university norms for conversion from CGPA to percentage. In such a case, the candidate will have to produce the official document or percentage equivalence certificate from the respective university showing CGPA to percentage conversion norms, at the time of admission. Students who have scored less than 60% in their graduation degree are not eligible for admission to the courses of IIITM-K.

Candidates belonging to SC/ST communities are eligible for applying if they have minimum pass marks in the qualifying examination. SEBC candidates of Kerala State who are certified as belonging to non-creamy layer are eligible for 5% relaxation in the minimum required marks for qualifying examination, provided that the candidates have passed the examination.

Number of Seats

The number of seats for this program is 40.

Courses

The student is required to earn 33 credits from the following 11 core courses:

Elective courses

The elective courses are offered in the 2nd and the 3rd semesters. There will be only one elective in the second semester and three electives in the third semester.

Core courses

  • Computer Architecture and Organization
  • Problem Solving and Programming in C
  • Data Structure and Algorithm
  • Introduction to Cyber Security
  • Mathematical Foundations for Cyber Security
  • Operating system
  • Computer Networking
  • Database Management System
  • Object Oriented Programming
  • Soft Engineering
  • Internet Technologies

Electives for semester II

  • Number Theory and Cryptography
  • Digital Image Processing
  • Biometrics
  • Soft Computing
  • Steganography and Digital Watermarking
  • Theory of Computation
  • Pattern Recognition
  • Artificial Intelligence
  • Embedded Systems
  • Security in Distributed Environments
  • Data Analytics

Electives for semester III

  • Network Security & Information Retrieval
  • Digital Forensics
  • Ethical Hacking and Network Defense
  • Security in Mobile Phone Applications
  • Advanced Topics in Cryptography
  • Cryptanalysis
  • Secure Internet Programming
  • Object Oriented Analysis and Design
  • Principles of Management
  • Computational Linguistics