Image by Jefferson Santos

Cybersecurity starts with you.

Secure yourself before you secure your company.

Program Details

 
Program Duration - 2.5 years (as per UGC norms)
Program Dates
  • Two Sessions every year
     

  • Spring Session
    Classes commence on 5th March 2022

     

  • Fall Session – Classes commence in August
     

Schedule
Program Schedule Cybersecurity Engineering PES University
Course Pedagogy

The program will be instructor-led classes and it will be supplemented with Videos, Quizzes, Assignments, Hands-on Practical Labs, and Capstone Projects with Real-world Case Studies.

Course Pedagogy | Cybersecurity Engineering

Evaluation:

60% Weightage for Internal Assessment - Quizzes, Assignments, Labs and Projects

40% Weightage for Final Examination

Please note: Evaluation metrics will vary with the course.

Curriculum
Semester 1 (12 Credits)
  1. Cybersecurity Essentials​

    • This introductory course revisits concepts of OS, Scripting, Networking, and programming essentials
       

  2. Network Security Essentials

    • This course deals with various aspects of Network security – Wired and Wireless; packet capture, security issues in various network protocols like TCP, DNS etc.
       

  3. Software Security Essentials

    • ​This course explores various aspects of software vulnerabilities like Buffer overflows, Malware and Application security

Semester 2 (12 Credits)
  1. Cryptography Essentials

    • Understand the evolution from classical to modern cryptography; Learn about the underlying mathematical foundations and the concepts of Symmetric, Asymmetric cryptography, Hash, and related topics
       

  2. Applied Cryptography

    • Learn about the application of various Crypto techniques and tools in modern day applications – Data Encryption, TLS, Digital Signature, Non-repudiation, Email Security etc.
       

  3. Block Chain Essentials

    • Learn fundamentals of blockchain technology and its architecture. Understand the attributes of Blockchain like immutability, Merkel trees and consensus algorithms with real world application use cases in Supply chain, food source, fintech and reality

Semester 3 (12 Credits)
  1. Digital Forensics Essentials

    • Introduces the history and evolution of Digital forensics, principles of Digital Forensics and its challenges. Students also learn about Computer memory and file forensics and practice with applicable tools. Understand Incidence response types, Industry standards and reporting.
       

  2. Digital Investigation and Data Evidence

    • Learn about digital investigative techniques and challenges

    • Learn to effectively acquire forensic data from various digital devices such as desktops, portables, Network and Cloud
       

  3. Cloud Computing and Cloud Security Essentials

    • More than ever, businesses are moving sensitive data and shifting mission-critical workloads to the cloud – typically a multicloud platform, including Amazon Web Services, Azure, Google Cloud, and others

    • Understand and identify the risks and risk controls based on the deployment models – IaaS, PaaS, and SaaS

    • Evaluate the trustworthiness of service providers based on their security documentation, service features, third-party attestations, and position in the global cloud ecosystem

    • Articulate the business and security implications of a multicloud strategy applying CIS controls

Semester 4 (12 Credits)
  1. Applied Data Science and Artificial Intelligence for Cybersecurity

    • Students explore the intersection of Cybersecurity, Data Science and Artificial Intelligence and apply DS and AI/ML techniques to enhance Security solutions
       

  2. Ethical hacking and Exploit Development

    • Learn penetration testing using repeatable frameworks like OWASP and tools like ZAP and Burp suite, NMap, Nessus, Kali, Metaspoilt etc.

    • Apply the learnings to perform penetration testing on live sites and find vulnerabilities

    • Write exploits
       

  3. Cyber Law and Data Privacy

    • Understand Privacy needs as per GDPR, California Privacy act, and Indian laws

    • Focuses on many compliance issues under information security and privacy mandates such as GDPR, HIPAA, FISMA, GLBA, and PCI-DSS

    • Develop the appropriate vocabulary for better legal results in policies, contracts, and incidents

Semester 5 (20 Credits)

Capstone Project
In this semester students will do an individual capstone project. Students can pick a project of their choice from their work place or from the ISFCR center.  Continuous guidance is provided along with periodic assessment.

 

The capstone project is an opportunity to apply all your learnings to solve real problems.

Admission Details

 
Eligibility Criteria
  1. Graduation in BE/B.Tech/M.Sc (Mathematics)/MCA from a recognized university, and at least 50% in the undergraduate degree
    AND

  2. Candidates need to have a minimum work experience of 24 months by the time of commencement of the program

Admission is subject to clearing an interview with the University panel. The interview will evaluate the candidate's understanding of the relevant concepts of Computer Science.

Note: Candidates shall submit the documents regarding graduation, transcripts and work experience for verification to the admissions office. Candidates will have to submit pay-slip, experience certificate, and Form 16 filing as proof of the work experience. If the candidate is unable to produce documents meeting the eligibility criteria, the admission process will not progress. Selected candidates will receive a letter of offer for admission from the University.

Method of Admission

Candidate to register for PESSAT on www.pessat.com and take a personal interview

Admissions Deadline

Apply before 30th January 2022 for the Spring (February) Session
Classes commence on 5th March 2022

For Fall (August) Session
Last date of admission on 5th July 2022

All admissions on first come first serve basis subject to fulfilment of eligibility and selection criteria

Fees Details

March 2022 Program Fees
₹6,00,000

(₹1,50,000 per semester,

4 instalments)

Scholarships

  • All PESU alumni are eligible for scholarships

  • Scholarships available for other deserving students

The university will provide all necessary documents for the candidates to procure educational loans

Program Faculty

 
Prof. Prasad Honnavalli
Prasad B Honnavalli

Professor, Computer Science and Engineering

GISF Certified, GIAC Advisory Board

Director, PESU C-ISFCR

Director, PESU C-IoT

Founder, abhayasecure.com

Dr. Sivaraman E.
Dr. Sivaraman E

Associate Professor, Computer Science and Engineering

CompTIA Security+ Certified Professional

EC-Council Computer Hacking Forensic Investigator

Other faculty members who will be delivering the program
 

Program Highlights

Job Outlook and Future

Mainstream and professional media highlight almost on a daily basis, the ever-growing issues and concerns around data breaches, data integrity and privacy and other aspects of cyber security. One of the reasons is because demand for cyber professional far outstrips the supply. This is true in India and across the globe.  Several Industry and recruitment agencies have estimated the supply-demand gap to be in the order of millions of jobs. Importantly, cybersecurity skills and knowledge are globally applicable.

Source: https://www.bls.gov/opub/btn/volume-10/why-computer-occupations-are-behind-strong-stem-employment-growth.htm

Presenting an integrated entrepreneurship opportunity in cybersecurity!

Signing up for PES University M.Tech in Cybersecurity Engineering can get you more than just the MTech degree, it can help you own a potential unicorn in cybersecurity. 

You can build your own cyber security startup as part of your course by leveraging Pesu Venture Labs (PVL), our in-house venture studio & start-up fund.

Bring your own Cybersecurity idea or choose from our curated list of ideas. Leverage resources, funding & support available from PESU Venture Labs (PVL) for converting the idea to a product & build a business. PESU Venture Labs (PVL) will handhold you in your journey.

If you have a great idea around Cybersecurity, this is the great way to build your startup while you continue to pursue your masters!

Cybersecurity starts
with you

Build a security mindset. Secure yourself before you secure your company.

Use what you learn today, in the industry tomorrow

Each course aims to cover core concepts and their practical applications augmented with numerous hands-on laboratory work and short format projects using relevant tools and framework. Tackle real-world problems.

Highly Qualified Faculty with Industry Experience

Faculty who have the right blend of academic and industry experience in addition to having relevant industry leading certifications like SANS, COMPTIA, EC-Council and CISSP

IMG_2126.heic
Comprehensive Curriculum

The curriculum is contemporary and is a unique blend of conceptual and Hands on learning.

 

This learning can be immediately applied to real problems on the job.

Dedicated Learning Management System

An in-house, custom-built Learning Management System (LMS) will be deployed to effectively manage the learning and outcome measurement of our students – giving us an edge to ensure and track progress along with giving the students the ability to learn in a hybrid model, enabling both online and offline learning.

Upskill, while working

Earn a Master's degree in Cybersecurity Engineering, while still working. There is a large demand for cybersecurity professionals all across the globe.

Scholarships

All PESU alumni are eligible for scholarships. Scholarships are also available for other deserving students

Small Class Size

20 students per batch leading to highly personalized attention.

A uniquely programmed one to one mentorship for every student designed to help them discover their true potential.

Access to Resources

Full access to the University Library at all times along with its various electronic databases and resources.

Career Assistance and Support

Resume Builder: Professional help from the centralised placement cell of the University to help each student to develop a professional resume.

Placements: Placements has always been the USP of PES University since long. Professional placement assistance will be provided from the centralised placement cell of the University.

gallery-2.png

Gallery

Virtual Campus Tour

Note: Contact hours will be in PESU RR Campus only.

FAQs

 

Why Executive Education at PES University?

In today’s competitive and knowledge-based economy, there is a premium for people with right skills and knowledge. Most people, particularly in the technology space feel the need to update their knowledge or upgrade their skills or acquire new certification and skills that are aligned with needs of the evolving job market.

 

This is not limited to the corporate world. Education is transforming as well – the National Education Policy, 2020, (NEP 2020) gives impetus to skills training and certifications

(Source: https://www.education.gov.in/sites/upload_files/mhrd/files/NEP_Final_English_0.pdf)

PES University is one of the country’s leading teaching and research-driven universities. With state of the art infrastructure and world class facilities, the university is committed to providing “Education for the Real World” that inspires students to realize their potential.

Why cybersecurity?

With the ever growing data, the demand for protecting it is growing leaps and bounds. Cyber security is amongst the top 10 fastest growing requirements from the industry. Earlier this year, the Harvard Business Review shared a report that summed up the plight: “The majority of chief information security officers around the world are worried about the cybersecurity skills gap, with 58 percent of CISOs believing the problem of not having an expert cyber staff will worsen.” (Source: https://hbr.org/sponsored/2019/06/the-public-private-partnership-thats-working-to-make-new-york-city-a-global-hub-of-cybersecurity-talent)

Who is this program ideal for?

This program is for professionals who want to develop a career in cybersecurity or looking for a change in career path to cybersecurity. It is also for those who are already in this field, but want to develop a strong foundation of concepts and desire exposure to current tools and hands on learning.

What are the program outcomes?

Participants will gain a solid exposure to the current threat landscape and how to manage cyber security risks. The conceptual underpinning and hands on exposure will prepare them to deal with emergent and future cyber threats successfully and enhance the security posture of their organisations.

Who will deliver the program?

Experienced professors from the PESU Center for Information Security, Forensics and Cyber Resilience (PESU C-ISFCR) and the Department of Computer Science and Engineering will deliver the program. Classroom sessions will be augmented by lectures from industry professionals.

Contact Us

 
Interested in the program?