M.Tech in Cyber Security is a 2-year industry linked programme divided into 4 semesters of six months each. The programme focuses on advanced courses on algorithms, operating systems and various aspects of computer security. This programme will be operated in an experiential, application-oriented and learner-friendly environment.
Semester 1:The first semester is an on-campus semester. The students will be taught 5 compulsory papers. The primary objective of this semester is to give students the necessary exposure to the core subjects of Computer Science necessary for understanding other aspects of cyber security in subsequent semesters.
Semester 2: This is also an on-campus semester. During this semester every student has to take 2 compulsory and 3 elective papers. The choice of elective papers will be guided by the choice of the vertical a student wants to specialise in.
Semester 3: The entire 3rd semester is carried over doing internship at PwC. This semester is an extremely important aspect of the programme. Students get to tackle and learn from real challenges and issues the industry is dealing with. Every student gets a real-life problem to work on. This gives them hands-on experience even before they complete their studies and formally join the company as employees. During this semester, every student will also complete one elective paper.
Semester 4: This semester is again back to the campus. Every student is supposed to work on an R&D Project under the supervision of a faculty member of NU in collaboration with an industry mentor. Every student will also take one elective paper in this semester.
This course offers specialisation in any one of the three verticals. In second semester, a candidate has an option to choose the area of specialisation and pursue studies accordingly. The three verticals identified by the industry where major expertise is required are as follows:
Threat Intelligence: Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used toinform decisions regarding the subject’s response to that menace or hazard.
Application Security: Application security encompasses measures taken throughout the life-cycle of a program/code written to prevent gaps in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, deployment, upgrade, or maintenance of the application.
Security Analytics: Businesses are responding to the growing sophistication and number of information security threats by deploying tools that extend the capabilities of their current security infrastructures. For smaller companies, this means deploying deeper network defences and endpoint protections. For large and midsize enterprises, however, it means deploying security analysis tools and analytics software to collect, filter, integrate and link diverse types of security event information in order to gain a more comprehensive view of the security of their infrastructure.
Core and elective courses are listed below:
Algorithms and Programming
Systems and Network Security
Information Security Risk Assessment and Assurance
Analytics and Big Data
Cyber Security Tools
Advanced Cyber Security Tools
Advanced Network Security
Cyber Laws & Cyber Crimes
Social Media, Behavioural Aspects
Programme Course Handout
Students will be provided with Course Handouts for all the courses which will be uploaded on the learning Management System (LMS). Course Handout is a document that furnishes the complete plan for any course in detail. It contains Course Description (as approved by the Academic Council of the University), the Learning Outcomes of the course (divided into Knowledge, Skills and Attitude as applicable), Course-in-charge and other instructors, Session Plan with topics, pre-reading, pedagogy and experiential component for each one-hour session, Learning Resources (including textbook(s), reference books, web-resources, articles, and research papers), Evaluation Components and their description for each component, Course-in-charge consultancy hour, and policy related matters such as those for Make-up examinations and plagiarism. All sessions and evaluation components in the course are mapped to the learning outcomes given in the course. Every student is expected to diligently go through the Course Handouts and understand what they can get from the course and what is expected from them. To summarise, course hand-out is an agreement between students and teacher. Broadly, the course hand out will contain the following:
Prerequisites, if any
Evaluation Components and weights
Session Plan (Date & Time, Topics, Pre-reading, Pedagogy, Experiential component)
The academic programmes are delivered by a team of eminent full-time faculty members supported by adjunct and visiting faculty members who are industry practitioners and experts in niche and specialised domains. In addition, students are enlightened with the current trends and technological advancements through regular interactions with industry leaders and practitioners.
Other resources available to the students include the Central Library, Central Computing Resources, the Remote-classroom Network that is connected to premier institutions, Microsoft Innovation Centre, Synchronous Learning Technology Broadcast studio and the Incubation Lab for budding entrepreneurs etc.
The University Campus provides a richer and vibrant life through a combination of student activities, community projects and group-work.