The MS (Cyber Security) program is of 2-years duration offered in the evening. It requires 33 credit hours, including 4 core courses (4 x 3 Credits) and 5 elective courses (5 x 3 Credits). To earn MS (Cyber Security) degree, the student has to complete a thesis (2 x 3 Credits). The maximum time limit to complete the MS (Cyber Security) degree is 4 years.
NSC 5164 Applied Cryptography |
NSC 5163 Network Security |
NSC 5162 Information Security |
CCS xxxx Digital Forensics |
CCS xxxx Elective-I |
CCS xxxx Elective-II |
CCS xxxx Elective-III |
CCS xxxx Elective-IV |
CCS xxxx Thesis (Part-1) |
CCS xxxx Elective-V |
CCS xxxx Thesis (Part-II) |
Course type | Min No. of Courses | Min No. of Credit Hours |
Core Courses | 4 x 3 | 12 |
Electives | 5 x 3 | 15 |
Thesis | 2 x 3 | 06 |
Total | 33 |
Core Courses | (4×3=12) | Credit Hours | Pre-Requisite (s) | ||
NSC 5163 | Network Security | 3 | (3, | 0) | – |
NSC 5162 | Information Security | 3 | (3, | 0) | – |
CSC xxxx | Digital Forensics | 3 | (3, | 0) | – |
NSC 5164 | Applied Cryptography | 3 | (3, | 0) | – |
MS Thesis | (2×3=6) | Credit Hours | Pre-Requisite (s) | ||
CCS xxxx | MS Thesis I (Mandatory) | 3 | (3, | 0) | – |
CCS xxxx | MS Thesis II (Mandatory) | 3 | (3, | 0) | – |
Deficiency Courses Programming Fundamentals (Core Programming Course) Data Structures & Algorithms OR Design & Analysis of Algorithms Computer Networks |
CCS xxx | Network Penetration Testing and Countermeasures |
CCS xxx | Security in Mobile and Wireless Networks |
CCS xxx | Ethical Hacking |
CCS xxx | Malware Detection and Analysis |
CCS xxx | Blockchain and Crypto Assets |
CCS xxx | Intrusion Detection and Firewalls |
CCS xxx | Reverse Engineering and Malware Analysis |
CCS xxx | Security and Privacy for the Smart Grid |
CCS xxx | Machine Learning for Cyber Security |
CCS xxx | Security Modelling and Analysis of Mobile Agent Systems |
CCS xxx | Security in Ad Hoc Sensor Networks |
CCS xxx | Security in Cloud Environment |
CCS xxx | Advanced Topic in Cyber Security – I |
CCS xxx | Advanced Topic in Cyber Security – II |