• Ph.D. 2023-24 Admissions Open Now! (January 2024 Batch) Click Here to apply +91 9033001244
  • UID Admissions 2024-25 Application Window Open CLICK HERE to Apply Call 9266663225 to know more.
  • KUAT (Karnavati University Admission Test) Admissions 2024-25 Application Window Open Click Here to Apply- To know more call 9667048555
  • KU Admissions FEE Payment Click Here
  • Karnavati University invites applications for teaching positions Click here for details

KUAT 2022-23 Admissions Open Now! Click here to apply +91 9667048555

Announcement Admission

M.Sc. in Cyber Security

Semester – 1

Program Courses

Cyber Fortress – Information Security Management System

Students will gain in-depth knowledge of information security management principles and best practices. Students will be able to design, implement, and manage information security programs within organizations. Students will learn how to assess and mitigate risks associated with information security.

WebVigilant: Explore the Unexplored Web Application Security

Students will acquire skills in identifying and analyzing vulnerabilities in web applications. Students will learn how to develop and implement effective web application security strategies. Students will be able to conduct comprehensive web application security assessments and testing.

NetWizard

Students will gain expertise in networking protocols, technologies, and best practices. Students will learn how to design, implement, and manage secure network infrastructure. Students will be able to analyze and mitigate network security threats and attacks.

ReverseRealm: Applied Reverse Engineering

Students will acquire skills in reverse engineering techniques and tools. Students will learn how to analyze malware and other malicious code for detection and mitigation. Students will be able to identify vulnerabilities in software and develop effective countermeasures.

Mandatory Certifications

VAPT Certification by Reputed OEM

Students will gain a professional certification in Vulnerability Assessment and Penetration Testing (VAPT) from a reputed Original Equipment Manufacturer (OEM).
Students will acquire practical skills in conducting VAPT assessments to identify and mitigate vulnerabilities in computer systems, networks, and applications.
Students will be prepared for careers in the field of ethical hacking and penetration testing.

Program Electives

Blockchain Architecture

Students will gain a deep understanding of blockchain technology, including its architecture, protocols, and applications.
Students will learn how to design and implement secure blockchain systems for various use cases. Students will be prepared for careers in blockchain development, consulting, and management.
OR

Metasploit-Framework

Students will acquire expertise in using Metasploit-Framework, a popular penetration testing tool.
Students will learn how to conduct ethical hacking and penetration testing using Metasploit-Framework.
Students will be prepared for careers in ethical hacking, penetration testing, and cybersecurity consulting.
Overall, upon completion of Semester 1 in the M.Sc. in Cyber Security program, students will have a solid foundation in information security management, web application security, networking, reverse engineering, and VAPT. They will also have the opportunity to specialize in either blockchain architecture or Metasploit-Framework, depending on their interests and career goals. Students will be well-equipped with the knowledge and skills necessary to pursue careers in various cybersecurity roles, such as information security manager, ethical hacker, penetration tester, cybersecurity consultant, and more.
Read MoreRead Less
Semester – 2

Program courses

Mobile Vigilant

Mobile Application Security: Students will be able to understand the intricacies of mobile application security, including mobile threat landscape, secure coding practices, encryption, authentication, and authorization for mobile applications. They will learn to identify and mitigate mobile security risks, and implement best practices for securing mobile applications.

360° Surveillance with Security Operations Center

Students will gain a comprehensive understanding of Security Operations Center (SOC) operations, including threat detection, incident response, security monitoring, and security incident management. They will learn to design, implement, and manage SOC operations, including security tools and technologies, log analysis, and incident reporting.

Malware Maverick

Malware Analysis: Students will develop expertise in analyzing malware, including reverse engineering, behavior analysis, and static and dynamic analysis techniques. They will learn to identify and classify different types of malware, understand their behavior, and develop effective strategies for malware mitigation and remediation.

Cloud Ninjas

Mastering Cloud Security: Students will acquire advanced knowledge of cloud security, including cloud architecture, cloud service models, and cloud deployment models. They will learn to design and implement secure cloud environments, including securing cloud storage, virtualization, and network security in the cloud. They will also understand cloud security risks, compliance, and governance.

Program Electives

Elective-2: MITRE or ISO/IEC 27017

Students will have the option to choose between two elective courses. In the MITRE course, students will learn about the MITRE ATT&CK framework, which is a comprehensive knowledge base of adversary tactics, techniques, and procedures (TTPs). They will gain practical experience in using the framework for threat intelligence, detection, and response. Alternatively, in the ISO/IEC 27017 course, students will learn about the ISO/IEC 27017 standard, which provides guidelines for information security controls in cloud computing environments. They will understand cloud-specific security issues, risk management, and best practices for securing cloud-based services.

Mandatory Certifications

Malware Analysis Certification by Reputed OEM

Students will have the opportunity to obtain a certification in malware analysis from a reputed Original Equipment Manufacturer (OEM). This certification will validate their skills and expertise in analyzing malware, and enhance their employability in the cyber security field.
Read MoreRead Less
Semester – 3

Project

Internship Project 1

The course includes a full-time internship project that allows students to gain real-world experience in the field of cyber security. Students can choose from different options such as industry attachment, startup incubation, or dissertation, based on their interests and career goals. This project provides hands-on experience in applying cyber security concepts, tools, and techniques in a professional environment, helping students to develop practical skills and understanding of the field.

Mandatory Certifications

SIEM Certification by Reputed OEM

The course also includes certification in Security Information and Event Management (SIEM) by a reputed Original Equipment Manufacturer (OEM). This certification validates the students’ expertise in managing security information and events, including threat detection, incident response, and security monitoring using SIEM tools. This certification adds value to the students’ resume and enhances their employability in the cyber security industry.
Overall, the course specific outcome for M.Sc. in Cyber Security for Semester 3 focuses on providing students with practical experience through internships and certifications, allowing them to apply cyber security concepts in real-world scenarios and develop specialized skills for their career in the field of cyber security.
Read MoreRead Less
Semester – 4

Project

Internship Project 1 – Full-time – Industry Attachment/Startup Incubation/Dissertation

In this course, students will be required to complete an internship project, which could involve working full-time with an industry partner, participating in a startup incubation program, or conducting an in-depth dissertation on a cyber security topic. The specific outcome of this course is to provide students with practical experience in applying the knowledge and skills gained throughout their M.Sc. in Cyber Security program in a real-world setting. Students will have the opportunity to work on actual cyber security projects, develop solutions to real-world cyber security challenges, and gain hands-on experience in implementing cyber security measures in a professional environment.

Research

Research Methodology

This course will focus on providing students with the necessary skills and knowledge to conduct research in the field of cyber security. Students will learn various research methodologies, including quantitative and qualitative research methods, data collection techniques, data analysis, and interpretation of research findings. The specific outcome of this course is to equip students with the skills required to design, conduct, and report on cyber security research projects effectively. Students will learn how to critically evaluate existing research, design their research projects, collect and analyze data, and interpret and present their findings in a scholarly manner.
Overall, the course-specific outcome for Semester 4 of the M.Sc. in Cyber Security program is to provide students with practical experience through an internship project, and equip them with research methodology skills to conduct cyber security research effectively. This will prepare students for real-world cyber security challenges and enable them to contribute to the field of cyber security through their research and practical experience
Read MoreRead Less
icon