top of page
Image by Jefferson Santos

Cybersecurity starts with you.

Secure yourself before you secure your company.

Program Details

Choose your track

The programs are in alignment with the National Education Policy (NEP)


Program Duration (as per UGC norms)
Program Dates

Prerequisite Semester
Classes commence every June


Audit & PG-Diploma Programs

  • Odd Semester - January to May

  • Even Semester - August to December

Masters Program
Classes commence every January (6th Jan, 2024)

Program Schedule Cybersecurity Engineering PES University
Course Pedagogy

The program will be instructor-led classes and it will be supplemented with Videos, Quizzes, Assignments, Hands-on Practical Labs, and Capstone Projects with Real-world Case Studies.

Course Pedagogy | Cybersecurity Engineering


50% Weightage for Internal Assessment - Quizzes, Assignments, Labs and Projects

50% Weightage for Final Examination

Please note: Evaluation metrics will vary with the course.

Prerequisite Semester (for non-engineering candidates only)
  1. Data Structure and Algorithm Using C (4 credits)

  2. Operating Systems, System Programming and Bash Scripting (4 credits)

  3. Computer Networks (4 credits)

  4. Web Technologies (4 credits)

  5. Python Programming (4 credits)

Semester 1 (Jan to May | 12 Credits)
  1. Cybersecurity Essentials​

    • This introductory course revisits concepts of OS, Scripting, Networking, and programming essentials

  2. Network Security

    • This course deals with various aspects of Network security – Wired and Wireless; packet capture, security issues in various network protocols like TCP, DNS etc.

  3. Software Security

    • ​This course explores various aspects of software vulnerabilities like Buffer overflows, Malware and Application security

Semester 2 (Aug to Dec | 12 Credits)
  1. Topics in Cryptography

    • Understand the evolution from classical to modern cryptography; Learn about the underlying mathematical foundations and the concepts of Symmetric, Asymmetric cryptography, Hash, and related topics

  2. Applied Cryptography

    • Learn about the application of various Crypto techniques and tools in modern day applications – Data Encryption, TLS, Digital Signature, Non-repudiation, Email Security etc.

  3. Block Chain and Applications

    • Learn fundamentals of blockchain technology and its architecture. Understand the attributes of Blockchain like immutability, Merkel trees and consensus algorithms with real world application use cases in Supply chain, food source, fintech and reality

Semester 3 (Jan to May | 12 Credits)
  1. Digital Forensics 1

    • Introduces the history and evolution of Digital forensics, principles of Digital Forensics and its challenges. Students also learn about Computer memory and file forensics and practice with applicable tools. Understand Incidence response types, Industry standards and reporting.

  2. Digital Forensics 2

    • Learn about digital investigative techniques and challenges

    • Learn to effectively acquire forensic data from various digital devices such as desktops, portables, Network and Cloud

  3. Cyber Law and Data Privacy

    • Understand Privacy needs as per GDPR, California Privacy act, and Indian laws

    • Focuses on many compliance issues under information security and privacy mandates such as GDPR, HIPAA, FISMA, GLBA, and PCI-DSS

    • Develop the appropriate vocabulary for better legal results in policies, contracts, and incidents

Semester 4 (Aug to Dec | 12 Credits)
  1. Cloud Security

    • More than ever, businesses are moving sensitive data and shifting mission-critical workloads to the cloud – typically a multicloud platform, including Amazon Web Services, Azure, Google Cloud, and others

    • Understand and identify the risks and risk controls based on the deployment models – IaaS, PaaS, and SaaS

    • Evaluate the trustworthiness of service providers based on their security documentation, service features, third-party attestations, and position in the global cloud ecosystem

    • Articulate the business and security implications of a multicloud strategy applying CIS controls

  2. ​Applied Data Science & Artificial Intelligence for Cybersecurity​

    • Students explore the intersection of Cybersecurity, Data Science and Artificial Intelligence and apply DS and AI/ML techniques to enhance Security solutions

  3. Ethical hacking and Exploit Development

    • Learn penetration testing using repeatable frameworks like OWASP and tools like ZAP and Burp suite, NMap, Nessus, Kali, Metaspoilt etc.

    • Apply the learnings to perform penetration testing on live sites and find vulnerabilities

    • Write exploits​

Semester 5 (Jan to May | 20 Credits)

Capstone Project
In this semester students will do an individual capstone project. Students can pick a project of their choice from their work place or from the ISFCR center.  Continuous guidance is provided along with periodic assessment.


The capstone project is an opportunity to apply all your learnings to solve real problems.

Admission Details

Eligibility Criteria for PG-Diploma & Masters
  1. Graduation in BE/B.Tech/M.Sc (Mathematics)/MCA from a recognized university, and at least 50% in the undergraduate degree.
    Note: Candidates with a non-engineering background (bachelor's degree in science, commerce, arts and equivalent with 50% and above) are required to attend a prerequisite semester before the commencement of the Masters/PG Diploma program


  2. Candidates need to have a minimum work experience of 24 months by the time of commencement of the program

Admission is subject to clearing an interview with the University panel. The interview will evaluate the candidate's understanding of the relevant concepts of Computer Science.

Note: Candidates shall submit the documents regarding graduation, transcripts and work experience for verification to the admissions office. Candidates will have to submit pay-slip, experience certificate, and Form 16 filing as proof of the work experience. If the candidate is unable to produce documents meeting the eligibility criteria, the admission process will not progress. Selected candidates will receive a letter of offer for admission from the University.​​

Eligibility Criteria for Audit

Learners interested in knowing more about cybersecurity can enroll for this program.​

Method of Admission

Candidate to register for PESSAT on and take a personal interview

Admissions Deadline

Apply before 2nd January 2024 for the Masters Program - January Intake
Classes commence on 6th January 2024

All admissions on first-come-first-serve basis subject to fulfilment of eligibility and selection criteria

Fees Details

Prerequisite Semester Program Fees (For non-engineering candidates)


Masters Program Fees

(₹1,50,000 per semester, 4 instalments)

PG-Diploma Program Fees
₹1,50,000 per semester

Audit Semester Program Fees

₹1,50,000 per semester


  • All PESU alumni are eligible for scholarships

  • Scholarships available for other deserving students

The university will provide all necessary documents for the candidates to procure educational loans

Program Faculty

Prof. Prasad Honnavalli
Prasad B Honnavalli

Professor, Computer Science and Engineering

GISF Certified, GIAC Advisory Board

Director, PESU C-ISFCR

Director, PESU C-IoT


Leads the Teaching, Research, Executive Education, Industry partnership and Consultancy in his areas of focus - Cybersecurity and Internet of Things.

Other faculty members who will be delivering the program
Adjunct Faculty
raj passport photo.jpg
Raj Gopalakrishna

Adjunct Faculty Member, PES University
Co-Founder & Chief Product Architect, Acalvio Technologies

Raj wears multiple hats – he is an Entrepreneur, Inventor, Technologist, and thought leader.

At Acalvio, Raj is leading the efforts to build the nextgen Advanced Threat Detection using deception techniques to quickly and accurately detect true positive cybersecurity events and delay malicious attackers access to valuable assets with prioritized hunting and proactive remediation efforts.

Previously, Raj was a Distinguished Engineer and SVP at CA Technologies.

WhatsApp Image 2022-06-13 at 12.01.28 PM.jpeg
K S Shashank

Adjunct Faculty Member, PES University
Senior Security Analyst at Elastic


Shashank brings several years of hands-on security experience with tools and services for the Cloud - infrastructure, Orchestration, Storage and applications; with a focus on reducing Cyber Risk by early detection and response to Cyber security incidents and threats.

Ramakant Mohapatra

Adjunct Faculty Member, PES University

He is a leader in Data Privacy and Data Protection with over two decades of experience in the Data Privacy and Information Security domain with a track record of developing privacy strategies, policies, frameworks, planning, implementing, governing and maintaining Privacy programs with defined KPIs to enable business growth while managing privacy risks for large and small enterprises.

The courses will be delivered by experienced faculty from PESU C-ISFCR and augumented by faculty from the industry.

The center aims to provide students with conceptual learning, experiential training and hands-on skilling for engineers and non-engineers, needed by industry for technical and managerial roles.

C-ISFCR by the numbers




faculty members





Program Highlights

Program Highlights

Presenting an integrated entrepreneurship opportunity in cybersecurity!

Signing up for PES University M.Tech in Cybersecurity Engineering can get you more than just the MTech degree, it can help you own a potential unicorn in cybersecurity. 

You can build your own cyber security startup as part of your course by leveraging Pesu Venture Labs (PVL), our in-house venture studio & start-up fund.

Bring your own Cybersecurity idea or choose from our curated list of ideas. Leverage resources, funding & support available from PESU Venture Labs (PVL) for converting the idea to a product & build a business. PESU Venture Labs (PVL) will handhold you in your journey.

If you have a great idea around Cybersecurity, this is the great way to build your startup while you continue to pursue your masters!

Job Outlook and Future

Mainstream and professional media highlight almost on a daily basis, the ever-growing issues and concerns around data breaches, data integrity and privacy and other aspects of cyber security. One of the reasons is because demand for cyber professional far outstrips the supply. This is true in India and across the globe.  Several Industry and recruitment agencies have estimated the supply-demand gap to be in the order of millions of jobs. Importantly, cybersecurity skills and knowledge are globally applicable.


Image by Kelly Sikkema
Choose your program

Choose your track to explore and learn cybersecurity,

an Audit, PG-Diploma or a Masters degree.

Cybersecurity starts
with you

Futureproof your career. Build a security mindset. Secure yourself before you secure your company.

Image by Sigmund
Use what you learn today, in the industry tomorrow 

Each course aims to cover core concepts and their practical applications augmented with numerous hands-on laboratory work and short format projects using relevant tools and framework. Tackle real-world problems.

Comprehensive Curriculum

The curriculum is contemporary and is a unique blend of conceptual and Hands on learning.


This learning can be immediately applied to real problems on the job.

Image by Kelly Sikkema
Dedicated Learning Management System

An in-house, custom-built Learning Management System (LMS) will be deployed to effectively manage the learning and outcome measurement of our students – giving us an edge to ensure and track progress along with giving the students the ability to learn in a hybrid model, enabling both online and offline learning.

Image by Kelly Sikkema

All PESU alumni are eligible for scholarships. Scholarships are also available for other deserving students

person using black laptop computer_edite
Cybersecurity for everyone

Now, engineers and non-engineers can take up a career in cybersecurity and master the skills required by the industry.

Upskill, while working

Earn a Master's degree in Cybersecurity Engineering, while still working. There is a large demand for cybersecurity professionals all across the globe.

Image by Kelly Sikkema
Highly qualified faculty with industry experience

Faculty who have the right blend of academic and industry experience in addition to having relevant industry leading certifications like SANS, COMPTIA, EC-Council and CISSP

Image by Kelly Sikkema
Access to Resources

Full access to the University Library at all times along with its various electronic databases and resources.

Image by Kelly Sikkema
Career Assistance and Support

Resume Builder: Professional help from the centralised placement cell of the University to help each student to develop a professional resume.

Placements: Placements has always been the USP of PES University since long. Professional placement assistance will be provided from the centralised placement cell of the University.

Image by Kelly Sikkema
Small Class Size

20 students per batch leading to highly personalized attention.

A uniquely programmed one to one mentorship for every student designed to help them discover their true potential.


What our students say


Hello, I'm Suresh with a background in telecom, and I'm completely new to cybersecurity. Entering the cybersecurity field felt like an uphill battle, but after extensive research, I discovered the PES EXE MTech in cybersecurity. I want to express my gratitude to the entire PES team for structuring this course to cater to working professionals like me who are also new to cybersecurity.

The course covers everything, starting with  the fundamentals of cybersecurity, network security, and software security basics. It gradually progresses to advanced topics such as identifying cybersecurity threats, cryptography, blockchain, digital forensics, and even Ethical Hacking.

What sets this course apart is the hands-on experience provided through lab practical’s, which is not commonly found in other programs . The faculty is good, comprising certified professionals and industry experts who share their valuable insights.

The labs are designed to align with industry standards, ensuring that we gain practical skills that are in demand in the market. If there are any updates or enhancements in the field, the course curriculum is adjusted accordingly.

This comprehensive course has covered all the latest technologies in cybersecurity.

Suresh R
Software Development Manager

The field of Information Security is constantly evolving and there is much to research and learn for security professionals. Learning is sometimes ad-hoc and unstructured. I was looking for a structured approach to study, learning from experts and provide me with respected credentials which will serve as a platform to advance and progress in my career.

I chose PES after careful evaluation and measured consideration, by comparing with other institutes across India. What appealed to me most importantly, was the syllabus. I found it to be contemporary, relevant and useful for working professionals. All subjects and topics were focused purely on security, while also keeping it relevant to industry trends and standards. The scheme of study provides good flexibility to working professionals in attending lectures, while the timely and regular internal assessments provide motivation for students to study manageable portions on a daily basis. The case studies discussion is especially engaging and offer insights into analysing security events, while also promoting healthy discussions amongst the students to express their views and share their experiences. The labs are intensive and raise the standards of the program, while also igniting a technical mindset within the students. The faculty are highly accomplished and have good overall blend of both academia and industry.

To summarise, the Executive M.Tech program at PES is definitely of top-notch quality. I would strongly recommend this as a program for professionals to pursue, in order to enhance their knowledge and advance in their career.

Arjun BM
Chief Security Architect at a leading global FinTech company
17+ years of experience

The field of Information Security is constantly evolving and there is much to research and learn for security professionals. Learning is sometimes ad-hoc and unstructured. I was looking for a structured approach to study, learning from experts and provide me with respected credentials which will serve as a platform to advance and progress in my career.

Screenshot 2022-06-29 at 4.49.10 PM.png
Ashish Nandan
Python Developer | Alif Semiconductor


Virtual Campus Tour

Note: Contact hours will be in PESU RR Campus only.