Program Details
Choose your track
The programs are in alignment with the National Education Policy (NEP)
​
(Link: https://www.education.gov.in/sites/upload_files/mhrd/files/NEP_Final_English_0.pdf)
Program Duration (as per UGC norms)
Program Dates
Prerequisite Semester
Classes commence every June
Audit & PG-Diploma Programs
-
Odd Semester - January to May
-
Even Semester - August to December
​
Masters Program
Classes commence every January (6th Jan, 2024)​
Schedule
Course Pedagogy
The program will be instructor-led classes and it will be supplemented with Videos, Quizzes, Assignments, Hands-on Practical Labs, and Capstone Projects with Real-world Case Studies.
Evaluation:
50% Weightage for Internal Assessment - Quizzes, Assignments, Labs and Projects
50% Weightage for Final Examination
​
Please note: Evaluation metrics will vary with the course.
Curriculum
Prerequisite Semester (for non-engineering candidates only)
-
Data Structure and Algorithm Using C (4 credits)
-
Operating Systems, System Programming and Bash Scripting (4 credits)
-
Computer Networks (4 credits)
-
Web Technologies (4 credits)
-
Python Programming (4 credits)
Semester 1 (Jan to May | 12 Credits)
-
Cybersecurity Essentials​
-
​This introductory course revisits concepts of OS, Scripting, Networking, and programming essentials
-
-
Network Security​
-
This course deals with various aspects of Network security – Wired and Wireless; packet capture, security issues in various network protocols like TCP, DNS etc.
-
-
Software Security
-
​This course explores various aspects of software vulnerabilities like Buffer overflows, Malware and Application security
-
Semester 2 (Aug to Dec | 12 Credits)
-
Topics in Cryptography
-
Understand the evolution from classical to modern cryptography; Learn about the underlying mathematical foundations and the concepts of Symmetric, Asymmetric cryptography, Hash, and related topics
-
-
Applied Cryptography​
-
Learn about the application of various Crypto techniques and tools in modern day applications – Data Encryption, TLS, Digital Signature, Non-repudiation, Email Security etc.
-
-
Block Chain and Applications
-
Learn fundamentals of blockchain technology and its architecture. Understand the attributes of Blockchain like immutability, Merkel trees and consensus algorithms with real world application use cases in Supply chain, food source, fintech and reality
-
Semester 3 (Jan to May | 12 Credits)
-
Digital Forensics 1
-
Introduces the history and evolution of Digital forensics, principles of Digital Forensics and its challenges. Students also learn about Computer memory and file forensics and practice with applicable tools. Understand Incidence response types, Industry standards and reporting.
-
-
Digital Forensics 2
-
Learn about digital investigative techniques and challenges
-
Learn to effectively acquire forensic data from various digital devices such as desktops, portables, Network and Cloud
-
-
Cyber Law and Data Privacy
-
Understand Privacy needs as per GDPR, California Privacy act, and Indian laws
-
Focuses on many compliance issues under information security and privacy mandates such as GDPR, HIPAA, FISMA, GLBA, and PCI-DSS
-
Develop the appropriate vocabulary for better legal results in policies, contracts, and incidents
-
Semester 4 (Aug to Dec | 12 Credits)
-
Cloud Security
-
More than ever, businesses are moving sensitive data and shifting mission-critical workloads to the cloud – typically a multicloud platform, including Amazon Web Services, Azure, Google Cloud, and others
-
Understand and identify the risks and risk controls based on the deployment models – IaaS, PaaS, and SaaS
-
Evaluate the trustworthiness of service providers based on their security documentation, service features, third-party attestations, and position in the global cloud ecosystem
-
Articulate the business and security implications of a multicloud strategy applying CIS controls
-
-
​Applied Data Science & Artificial Intelligence for Cybersecurity​
-
​Students explore the intersection of Cybersecurity, Data Science and Artificial Intelligence and apply DS and AI/ML techniques to enhance Security solutions
-
-
Ethical hacking and Exploit Development
-
Learn penetration testing using repeatable frameworks like OWASP and tools like ZAP and Burp suite, NMap, Nessus, Kali, Metaspoilt etc.
-
Apply the learnings to perform penetration testing on live sites and find vulnerabilities
-
Write exploits​
-
Semester 5 (Jan to May | 20 Credits)
Capstone Project
In this semester students will do an individual capstone project. Students can pick a project of their choice from their work place or from the ISFCR center. Continuous guidance is provided along with periodic assessment.
The capstone project is an opportunity to apply all your learnings to solve real problems.
Admission Details
Eligibility Criteria for PG-Diploma & Masters
-
Graduation in BE/B.Tech/M.Sc (Mathematics)/MCA from a recognized university, and at least 50% in the undergraduate degree.
Note: Candidates with a non-engineering background (bachelor's degree in science, commerce, arts and equivalent with 50% and above) are required to attend a prerequisite semester before the commencement of the Masters/PG Diploma program
AND
-
Candidates need to have a minimum work experience of 24 months by the time of commencement of the program
​
Admission is subject to clearing an interview with the University panel. The interview will evaluate the candidate's understanding of the relevant concepts of Computer Science.
​
Note: Candidates shall submit the documents regarding graduation, transcripts and work experience for verification to the admissions office. Candidates will have to submit pay-slip, experience certificate, and Form 16 filing as proof of the work experience. If the candidate is unable to produce documents meeting the eligibility criteria, the admission process will not progress. Selected candidates will receive a letter of offer for admission from the University.​​
Eligibility Criteria for Audit
Learners interested in knowing more about cybersecurity can enroll for this program.​
Method of Admission
Please visit admissions.pes.edu for more information
Admissions Deadline
Fees Details
Prerequisite Semester Program Fees (For non-engineering candidates)
₹1,00,000
Masters Program Fees
₹6,00,000
(₹1,50,000 per semester, 4 instalments)
​
PG-Diploma Program Fees
₹1,50,000 per semester
​
Audit Semester Program Fees
₹1,50,000 per semester
Scholarships
-
All PESU alumni are eligible for scholarships
-
Scholarships available for other deserving students
The university will provide all necessary documents for the candidates to procure educational loans
Program Faculty
Prasad B Honnavalli
Professor, Computer Science and Engineering
GISF Certified, GIAC Advisory Board
Director, PESU C-ISFCR
Director, PESU C-IoT
Founder, abhayasecure.com
​
Leads the Teaching, Research, Executive Education, Industry partnership and Consultancy in his areas of focus - Cybersecurity and Internet of Things.
Adjunct Faculty
Raj Gopalakrishna
Adjunct Faculty Member, PES University
Co-Founder & Chief Product Architect, Acalvio Technologies
​
Raj wears multiple hats – he is an Entrepreneur, Inventor, Technologist, and thought leader.
​
At Acalvio, Raj is leading the efforts to build the nextgen Advanced Threat Detection using deception techniques to quickly and accurately detect true positive cybersecurity events and delay malicious attackers access to valuable assets with prioritized hunting and proactive remediation efforts.
Previously, Raj was a Distinguished Engineer and SVP at CA Technologies.
K S Shashank
Adjunct Faculty Member, PES University
Senior Security Analyst at Elastic
Shashank brings several years of hands-on security experience with tools and services for the Cloud - infrastructure, Orchestration, Storage and applications; with a focus on reducing Cyber Risk by early detection and response to Cyber security incidents and threats.
​
​
Ramakant Mohapatra
Adjunct Faculty Member, PES University
​
He is a leader in Data Privacy and Data Protection with over two decades of experience in the Data Privacy and Information Security domain with a track record of developing privacy strategies, policies, frameworks, planning, implementing, governing and maintaining Privacy programs with defined KPIs to enable business growth while managing privacy risks for large and small enterprises.
The courses will be delivered by experienced faculty from PESU C-ISFCR and augumented by faculty from the industry.
The center aims to provide students with conceptual learning, experiential training and hands-on skilling for engineers and non-engineers, needed by industry for technical and managerial roles.
C-ISFCR by the numbers
23
courses
26
faculty members
3000+
students
72+
publications
Program Highlights
Presenting an integrated entrepreneurship opportunity in cybersecurity!
Signing up for PES University M.Tech in Cybersecurity Engineering can get you more than just the MTech degree, it can help you own a potential unicorn in cybersecurity.
​
You can build your own cyber security startup as part of your course by leveraging Pesu Venture Labs (PVL), our in-house venture studio & start-up fund.
​
Bring your own Cybersecurity idea or choose from our curated list of ideas. Leverage resources, funding & support available from PESU Venture Labs (PVL) for converting the idea to a product & build a business. PESU Venture Labs (PVL) will handhold you in your journey.
​
If you have a great idea around Cybersecurity, this is the great way to build your startup while you continue to pursue your masters!
Job Outlook and Future
Mainstream and professional media highlight almost on a daily basis, the ever-growing issues and concerns around data breaches, data integrity and privacy and other aspects of cyber security. One of the reasons is because demand for cyber professional far outstrips the supply. This is true in India and across the globe. Several Industry and recruitment agencies have estimated the supply-demand gap to be in the order of millions of jobs. Importantly, cybersecurity skills and knowledge are globally applicable.
​
Choose your program
Choose your track to explore and learn cybersecurity,
an Audit, PG-Diploma or a Masters degree.
Cybersecurity starts
with you
Futureproof your career. Build a security mindset. Secure yourself before you secure your company.
Use what you learn today, in the industry tomorrow
Each course aims to cover core concepts and their practical applications augmented with numerous hands-on laboratory work and short format projects using relevant tools and framework. Tackle real-world problems.
Comprehensive Curriculum
The curriculum is contemporary and is a unique blend of conceptual and Hands on learning.
This learning can be immediately applied to real problems on the job.
Dedicated Learning Management System
An in-house, custom-built Learning Management System (LMS) will be deployed to effectively manage the learning and outcome measurement of our students – giving us an edge to ensure and track progress along with giving the students the ability to learn in a hybrid model, enabling both online and offline learning.
Scholarships
All PESU alumni are eligible for scholarships. Scholarships are also available for other deserving students
Cybersecurity for everyone
Now, engineers and non-engineers ​can take up a career in cybersecurity and master the skills required by the industry.
Upskill, while working
Earn a Master's degree in Cybersecurity Engineering, while still working. There is a large demand for cybersecurity professionals all across the globe.
Highly qualified faculty with industry experience
Faculty who have the right blend of academic and industry experience in addition to having relevant industry leading certifications like SANS, COMPTIA, EC-Council and CISSP
Access to Resources
Full access to the University Library at all times along with its various electronic databases and resources.
Career Assistance and Support
Resume Builder: Professional help from the centralised placement cell of the University to help each student to develop a professional resume.
Placements: Placements has always been the USP of PES University since long. Professional placement assistance will be provided from the centralised placement cell of the University.
Small Class Size
20 students per batch leading to highly personalized attention.
​
A uniquely programmed one to one mentorship for every student designed to help them discover their true potential.
What our students say
Hello, I'm Suresh with a background in telecom, and I'm completely new to cybersecurity. Entering the cybersecurity field felt like an uphill battle, but after extensive research, I discovered the PES EXE MTech in cybersecurity. I want to express my gratitude to the entire PES team for structuring this course to cater to working professionals like me who are also new to cybersecurity.
The course covers everything, starting with the fundamentals of cybersecurity, network security, and software security basics. It gradually progresses to advanced topics such as identifying cybersecurity threats, cryptography, blockchain, digital forensics, and even Ethical Hacking.
What sets this course apart is the hands-on experience provided through lab practical’s, which is not commonly found in other programs . The faculty is good, comprising certified professionals and industry experts who share their valuable insights.
The labs are designed to align with industry standards, ensuring that we gain practical skills that are in demand in the market. If there are any updates or enhancements in the field, the course curriculum is adjusted accordingly.
This comprehensive course has covered all the latest technologies in cybersecurity.
Suresh R
Software Development Manager
The field of Information Security is constantly evolving and there is much to research and learn for security professionals. Learning is sometimes ad-hoc and unstructured. I was looking for a structured approach to study, learning from experts and provide me with respected credentials which will serve as a platform to advance and progress in my career.
​
I chose PES after careful evaluation and measured consideration, by comparing with other institutes across India. What appealed to me most importantly, was the syllabus. I found it to be contemporary, relevant and useful for working professionals. All subjects and topics were focused purely on security, while also keeping it relevant to industry trends and standards. The scheme of study provides good flexibility to working professionals in attending lectures, while the timely and regular internal assessments provide motivation for students to study manageable portions on a daily basis. The case studies discussion is especially engaging and offer insights into analysing security events, while also promoting healthy discussions amongst the students to express their views and share their experiences. The labs are intensive and raise the standards of the program, while also igniting a technical mindset within the students. The faculty are highly accomplished and have good overall blend of both academia and industry.
​
To summarise, the Executive M.Tech program at PES is definitely of top-notch quality. I would strongly recommend this as a program for professionals to pursue, in order to enhance their knowledge and advance in their career.
Arjun BM
Chief Security Architect at a leading global FinTech company
17+ years of experience
The field of Information Security is constantly evolving and there is much to research and learn for security professionals. Learning is sometimes ad-hoc and unstructured. I was looking for a structured approach to study, learning from experts and provide me with respected credentials which will serve as a platform to advance and progress in my career.