Program Duration - 2.5 years (as per UGC norms)
Two Sessions every year
Spring Session –
Classes commence on 5th March 2022
Fall Session – Classes commence in August
The program will be instructor-led classes and it will be supplemented with Videos, Quizzes, Assignments, Hands-on Practical Labs, and Capstone Projects with Real-world Case Studies.
60% Weightage for Internal Assessment - Quizzes, Assignments, Labs and Projects
40% Weightage for Final Examination
Please note: Evaluation metrics will vary with the course.
Semester 1 (12 Credits)
This introductory course revisits concepts of OS, Scripting, Networking, and programming essentials
Network Security Essentials
This course deals with various aspects of Network security – Wired and Wireless; packet capture, security issues in various network protocols like TCP, DNS etc.
Software Security Essentials
This course explores various aspects of software vulnerabilities like Buffer overflows, Malware and Application security
Semester 2 (12 Credits)
Understand the evolution from classical to modern cryptography; Learn about the underlying mathematical foundations and the concepts of Symmetric, Asymmetric cryptography, Hash, and related topics
Learn about the application of various Crypto techniques and tools in modern day applications – Data Encryption, TLS, Digital Signature, Non-repudiation, Email Security etc.
Block Chain Essentials
Learn fundamentals of blockchain technology and its architecture. Understand the attributes of Blockchain like immutability, Merkel trees and consensus algorithms with real world application use cases in Supply chain, food source, fintech and reality
Semester 3 (12 Credits)
Digital Forensics Essentials
Introduces the history and evolution of Digital forensics, principles of Digital Forensics and its challenges. Students also learn about Computer memory and file forensics and practice with applicable tools. Understand Incidence response types, Industry standards and reporting.
Digital Investigation and Data Evidence
Learn about digital investigative techniques and challenges
Learn to effectively acquire forensic data from various digital devices such as desktops, portables, Network and Cloud
Cloud Computing and Cloud Security Essentials
More than ever, businesses are moving sensitive data and shifting mission-critical workloads to the cloud – typically a multicloud platform, including Amazon Web Services, Azure, Google Cloud, and others
Understand and identify the risks and risk controls based on the deployment models – IaaS, PaaS, and SaaS
Evaluate the trustworthiness of service providers based on their security documentation, service features, third-party attestations, and position in the global cloud ecosystem
Articulate the business and security implications of a multicloud strategy applying CIS controls
Semester 4 (12 Credits)
Applied Data Science and Artificial Intelligence for Cybersecurity
Students explore the intersection of Cybersecurity, Data Science and Artificial Intelligence and apply DS and AI/ML techniques to enhance Security solutions
Ethical hacking and Exploit Development
Learn penetration testing using repeatable frameworks like OWASP and tools like ZAP and Burp suite, NMap, Nessus, Kali, Metaspoilt etc.
Apply the learnings to perform penetration testing on live sites and find vulnerabilities
Cyber Law and Data Privacy
Understand Privacy needs as per GDPR, California Privacy act, and Indian laws
Focuses on many compliance issues under information security and privacy mandates such as GDPR, HIPAA, FISMA, GLBA, and PCI-DSS
Develop the appropriate vocabulary for better legal results in policies, contracts, and incidents
Semester 5 (20 Credits)
In this semester students will do an individual capstone project. Students can pick a project of their choice from their work place or from the ISFCR center. Continuous guidance is provided along with periodic assessment.
The capstone project is an opportunity to apply all your learnings to solve real problems.
Graduation in BE/B.Tech/M.Sc (Mathematics)/MCA from a recognized university, and at least 50% in the undergraduate degree
Candidates need to have a minimum work experience of 24 months by the time of commencement of the program
Admission is subject to clearing an interview with the University panel. The interview will evaluate the candidate's understanding of the relevant concepts of Computer Science.
Note: Candidates shall submit the documents regarding graduation, transcripts and work experience for verification to the admissions office. Candidates will have to submit pay-slip, experience certificate, and Form 16 filing as proof of the work experience. If the candidate is unable to produce documents meeting the eligibility criteria, the admission process will not progress. Selected candidates will receive a letter of offer for admission from the University.
Apply before 30th January 2022 for the Spring (February) Session
Classes commence on 5th March 2022
For Fall (August) Session
Last date of admission on 5th July 2022
All admissions on first come first serve basis subject to fulfilment of eligibility and selection criteria
March 2022 Program Fees
(₹1,50,000 per semester,
All PESU alumni are eligible for scholarships
Scholarships available for other deserving students
The university will provide all necessary documents for the candidates to procure educational loans
Job Outlook and Future
Mainstream and professional media highlight almost on a daily basis, the ever-growing issues and concerns around data breaches, data integrity and privacy and other aspects of cyber security. One of the reasons is because demand for cyber professional far outstrips the supply. This is true in India and across the globe. Several Industry and recruitment agencies have estimated the supply-demand gap to be in the order of millions of jobs. Importantly, cybersecurity skills and knowledge are globally applicable.
Presenting an integrated entrepreneurship opportunity in cybersecurity!
Signing up for PES University M.Tech in Cybersecurity Engineering can get you more than just the MTech degree, it can help you own a potential unicorn in cybersecurity.
You can build your own cyber security startup as part of your course by leveraging Pesu Venture Labs (PVL), our in-house venture studio & start-up fund.
Bring your own Cybersecurity idea or choose from our curated list of ideas. Leverage resources, funding & support available from PESU Venture Labs (PVL) for converting the idea to a product & build a business. PESU Venture Labs (PVL) will handhold you in your journey.
If you have a great idea around Cybersecurity, this is the great way to build your startup while you continue to pursue your masters!
Build a security mindset. Secure yourself before you secure your company.
Use what you learn today, in the industry tomorrow
Each course aims to cover core concepts and their practical applications augmented with numerous hands-on laboratory work and short format projects using relevant tools and framework. Tackle real-world problems.
Highly Qualified Faculty with Industry Experience
Faculty who have the right blend of academic and industry experience in addition to having relevant industry leading certifications like SANS, COMPTIA, EC-Council and CISSP
The curriculum is contemporary and is a unique blend of conceptual and Hands on learning.
This learning can be immediately applied to real problems on the job.
Dedicated Learning Management System
An in-house, custom-built Learning Management System (LMS) will be deployed to effectively manage the learning and outcome measurement of our students – giving us an edge to ensure and track progress along with giving the students the ability to learn in a hybrid model, enabling both online and offline learning.
Upskill, while working
Earn a Master's degree in Cybersecurity Engineering, while still working. There is a large demand for cybersecurity professionals all across the globe.
All PESU alumni are eligible for scholarships. Scholarships are also available for other deserving students
Small Class Size
20 students per batch leading to highly personalized attention.
A uniquely programmed one to one mentorship for every student designed to help them discover their true potential.
Access to Resources
Full access to the University Library at all times along with its various electronic databases and resources.
Career Assistance and Support
Resume Builder: Professional help from the centralised placement cell of the University to help each student to develop a professional resume.
Placements: Placements has always been the USP of PES University since long. Professional placement assistance will be provided from the centralised placement cell of the University.
Why Executive Education at PES University?
In today’s competitive and knowledge-based economy, there is a premium for people with right skills and knowledge. Most people, particularly in the technology space feel the need to update their knowledge or upgrade their skills or acquire new certification and skills that are aligned with needs of the evolving job market.
This is not limited to the corporate world. Education is transforming as well – the National Education Policy, 2020, (NEP 2020) gives impetus to skills training and certifications
PES University is one of the country’s leading teaching and research-driven universities. With state of the art infrastructure and world class facilities, the university is committed to providing “Education for the Real World” that inspires students to realize their potential.
With the ever growing data, the demand for protecting it is growing leaps and bounds. Cyber security is amongst the top 10 fastest growing requirements from the industry. Earlier this year, the Harvard Business Review shared a report that summed up the plight: “The majority of chief information security officers around the world are worried about the cybersecurity skills gap, with 58 percent of CISOs believing the problem of not having an expert cyber staff will worsen.” (Source: https://hbr.org/sponsored/2019/06/the-public-private-partnership-thats-working-to-make-new-york-city-a-global-hub-of-cybersecurity-talent)
Who is this program ideal for?
This program is for professionals who want to develop a career in cybersecurity or looking for a change in career path to cybersecurity. It is also for those who are already in this field, but want to develop a strong foundation of concepts and desire exposure to current tools and hands on learning.
What are the program outcomes?
Participants will gain a solid exposure to the current threat landscape and how to manage cyber security risks. The conceptual underpinning and hands on exposure will prepare them to deal with emergent and future cyber threats successfully and enhance the security posture of their organisations.
Who will deliver the program?
Experienced professors from the PESU Center for Information Security, Forensics and Cyber Resilience (PESU C-ISFCR) and the Department of Computer Science and Engineering will deliver the program. Classroom sessions will be augmented by lectures from industry professionals.