College of Engineering, Pune-image

M-TECH in Cyber Security at COEP Technological University

COEP Technological University, Pune is a premier unitary public university located in Pune, Maharashtra, established in 1854. Recognized for its academic prowess and strong industry connections, it offers a diverse range of undergraduate, postgraduate, MBA, and PhD programs. The university is accredited with an 'A+' grade by NAAC and was ranked 77th in the NIRF 2024 Engineering category, boasting a highest placement package of ₹50.50 LPA in 2023.

READ MORE
location

Pune, Maharashtra

Compare colleges

About the Specialization

What is Cyber Security at COEP Technological University Pune?

This Cyber Security program at COEP Technological University focuses on equipping students with advanced knowledge and practical skills to combat evolving cyber threats. It delves into critical areas like cryptography, network security, secure software development, and digital forensics, reflecting the pressing need for cybersecurity professionals in India''''s rapidly digitizing economy. The program emphasizes an interdisciplinary approach to secure digital infrastructures.

Who Should Apply?

This program is ideal for fresh engineering graduates (B.E./B.Tech in Computer, IT, E&TC) with a valid GATE score who aspire to build a career in cybersecurity. It also caters to working professionals seeking to upskill, specialize in advanced security domains, or transition into cybersecurity roles. Individuals with a keen analytical mind and a strong interest in safeguarding digital assets are particularly suited.

Why Choose This Course?

Graduates of this program can expect to pursue lucrative career paths in India as Security Analysts, Penetration Testers, Security Architects, Digital Forensic Investigators, and Cybersecurity Researchers. Entry to mid-level salaries typically range from INR 6 LPA to 15 LPA, with significant growth potential in burgeoning sectors like fintech, e-commerce, and defense. The curriculum aligns with requirements for professional certifications like CEH, CISSP, and CompTIA Security+.

Student Success Practices

Foundation Stage

Master Foundational Cyber Security Skills- (Semester 1-2)

Focus rigorously on core subjects like Advanced Cryptography, Secure Operating Systems, and Data Structures. Dedicate significant time to laboratory sessions to gain hands-on proficiency with security tools, vulnerability assessment, and cryptographic implementations. Actively participate in coding challenges and CTF (Capture The Flag) events.

Tools & Resources

OWASP ZAP, Wireshark, Metasploit, VirtualBox, CTFTime.org, GeeksforGeeks

Career Connection

Builds a strong technical base essential for entry-level security analyst, security engineer, and penetration testing roles. Solidifies understanding required for higher-level certifications.

Engage in Early Research & Academic Collaboration- (Semester 1-2)

Proactively identify potential research interests by reading academic papers and attending departmental seminars. Form study groups with peers to discuss complex topics and collaborate on assignments. Seek guidance from faculty on mini-project ideas or potential dissertation topics, aligning with current industry trends.

Tools & Resources

IEEE Xplore, ACM Digital Library, Google Scholar, Zotero

Career Connection

Develops critical thinking, problem-solving, and technical writing skills crucial for research-oriented roles, PhD aspirations, or advanced R&D positions in cybersecurity firms.

Build Industry Awareness & Networking- (Semester 1-2)

Attend webinars, workshops, and cybersecurity conferences (online or local if possible) to stay updated on emerging threats and technologies. Connect with industry professionals via LinkedIn and explore potential mentors. Understand the career landscape and required skill sets in the Indian cybersecurity market.

Tools & Resources

LinkedIn, NASSCOM, DSCI (Data Security Council of India) reports, The Hacker News

Career Connection

Facilitates informed career decisions, opens doors to internship opportunities, and helps in understanding industry expectations for placements.

Intermediate Stage

Advanced Stage

Deepen Specialization Through Electives and Projects- (Semester 3-4)

Strategically choose electives that align with your career goals, such as Digital Forensics, Cloud Security, or Ethical Hacking. Leverage the Dissertation Phase I & II to undertake an in-depth research project addressing a significant cybersecurity challenge, applying theoretical knowledge to practical solutions.

Tools & Resources

Autopsy, AWS Security Hub, advanced penetration testing suites, academic journals relevant to chosen specialization

Career Connection

Creates a portfolio of specialized skills and practical experience, making graduates highly competitive for roles requiring specific expertise (e.g., Cloud Security Engineer, Forensic Analyst).

Pursue Professional Certifications & Internships- (Semester 3-4)

Prepare for and attempt industry-recognized certifications like CompTIA Security+, CEH, or even OSCP, which are highly valued in the Indian job market. Actively seek out and complete internships with leading cybersecurity firms, defense organizations, or IT companies to gain real-world experience.

Tools & Resources

Official certification study guides, virtual labs for practice, Internshala, LinkedIn Jobs, COEP placement cell

Career Connection

Significantly boosts employability and salary prospects. Certifications validate skills, and internships provide crucial industry exposure and networking for full-time roles.

Develop Communication & Presentation Skills for Thesis Defense and Interviews- (Semester 3-4)

Practice presenting research findings effectively through regular interactions with advisors and mock presentations. Refine technical writing skills for the dissertation. Participate in mock interviews, focusing on behavioral and technical questions, to prepare for final placements.

Tools & Resources

Grammarly, LaTeX, Toastmasters International, COEP career services

Career Connection

Essential for successfully defending the M.Tech dissertation, excelling in job interviews, and effectively communicating complex technical information in a professional setting.

Program Structure and Curriculum

Eligibility:

  • Bachelor’s degree in Engineering/Technology (B.E./B.Tech.) in Computer Engineering/Information Technology/Electronics Engineering/Electronics & Telecommunication Engineering or equivalent degree with a minimum of 50% marks (45% for reserved categories) and a valid GATE score in Computer Science and Information Technology (CS)/Electronics and Communication Engineering (EC)/Electrical Engineering (EE) as per AICTE norms.

Duration: 4 semesters / 2 years

Credits: 80 Credits

Assessment: Internal: 50%, External: 50%

Semester-wise Curriculum Table

Semester 1

Subject CodeSubject NameSubject TypeCreditsKey Topics
PCCY101Advanced Cryptography and Network SecurityCore4Number Theory and Algebraic Structures, Symmetric Key Cryptography (AES, DES), Asymmetric Key Cryptography (RSA, ECC), Hash Functions and Digital Signatures, Network Security Protocols (SSL/TLS, IPsec), Key Management and Public Key Infrastructure
PCCY102Secure Operating Systems and System SecurityCore4Operating System Security Fundamentals, Malware Analysis and Classification, Buffer Overflows and Exploitation, Rootkits and Stealth Techniques, Virtualization Security, Access Control Models (DAC, MAC, RBAC)
PCCY103Advanced Data Structures and Algorithms for SecurityCore4Amortized Analysis and Advanced Trees, Graph Algorithms for Network Analysis, Hashing Techniques for Data Integrity, String Matching Algorithms for Pattern Detection, Complexity Analysis and Optimization, Randomized Algorithms in Cryptography
PCCY104Research Methodology and IPRCore2Research Problem Formulation, Data Collection and Analysis Techniques, Statistical Methods for Research, Technical Report Writing and Ethics, Intellectual Property Rights (Patents, Copyrights), Plagiarism and Research Integrity
PCLCY105Cyber Security Lab ILab2Cryptography Tool Implementation, Operating System Security Hardening, Network Traffic Analysis with Wireshark, Vulnerability Scanning with Nmap/OpenVAS, Linux Security Practices, Basic Penetration Testing Tools
PSPCY106Seminar ISeminar2Literature Review on Cybersecurity Topics, Identification of Research Gaps, Effective Presentation Skills, Technical Report Structuring, Problem Statement Development, Academic Paper Analysis

Semester 2

Subject CodeSubject NameSubject TypeCreditsKey Topics
PCCY201Secure Software EngineeringCore4Secure Software Development Life Cycle (SSDLC), Threat Modeling (STRIDE, DREAD), Input Validation and Output Encoding, Static and Dynamic Application Security Testing, Web Application Security Vulnerabilities (OWASP Top 10), Secure Coding Practices and Code Review
PCCY202Cloud and IoT SecurityCore4Cloud Computing Security Architecture, Data Privacy and Compliance in Cloud, IoT Communication Protocols Security, IoT Device Security and Firmware Analysis, Threat Landscape in Cloud and IoT Ecosystems, Cloud Security Best Practices and Tools
PECY203Elective I (e.g., Digital Forensics and Incident Response)Elective4Principles of Digital Forensics, Evidence Collection and Preservation, Network Forensics and Log Analysis, Malware Forensics and Reverse Engineering, Incident Handling and Response Process, Legal and Ethical Aspects of Forensics
PECY204Elective II (e.g., Ethical Hacking and Penetration Testing)Elective4Reconnaissance and Footprinting, Scanning and Enumeration Techniques, Vulnerability Assessment Methodologies, Exploitation Frameworks (Metasploit), Web Application Hacking, Wireless Network Security and Hacking
PCLCY205Cyber Security Lab IILab2Web Application Penetration Testing, Network Vulnerability Exploitation, Forensic Imaging and Analysis Tools, Security Information and Event Management (SIEM) Configuration, Malware Analysis Techniques, Practical Threat Modeling Exercises
PSPCY206Mini Project with SeminarProject4Problem Definition and Literature Survey, System Design and Architecture, Implementation of Security Solutions, Testing and Evaluation of Security Systems, Technical Report Writing, Project Presentation and Demonstration

Semester 3

Subject CodeSubject NameSubject TypeCreditsKey Topics
PSPCY301Dissertation Phase IProject12In-depth Problem Formulation, Extensive Literature Review and Gap Identification, Methodology Design and Research Plan, Preliminary Data Collection and Analysis, Initial System Design/Architectural Model, Research Paper/Synopsis Writing
PECY302Elective III (e.g., Blockchain and Cryptocurrency Security)Elective4Blockchain Fundamentals and Architecture, Consensus Mechanisms (PoW, PoS), Smart Contract Security and Vulnerabilities, Cryptocurrency Transaction Security, Distributed Ledger Technologies, Attacks on Blockchain Systems
PECY303Elective IV (e.g., Security Analytics and Machine Learning)Elective4Security Big Data Analytics, Anomaly Detection in Network Traffic, Machine Learning Algorithms for Malware Detection, AI in Threat Intelligence and Prediction, Feature Engineering for Security Datasets, Data Visualization for Security Insights

Semester 4

Subject CodeSubject NameSubject TypeCreditsKey Topics
PSPCY401Dissertation Phase IIProject20System Implementation and Development, Extensive Experimentation and Data Collection, Performance Evaluation and Comparative Analysis, Result Interpretation and Discussion, Comprehensive Thesis Writing, Viva Voce Preparation and Defense
whatsapp

Chat with us