SRM IST-image

M-SC in Cyber Security at SRM Institute of Science and Technology

SRM Institute of Science and Technology, a premier deemed university established in 1985 in Chennai, Tamil Nadu, is renowned for academic excellence. Accredited with an A++ grade by NAAC, it offers diverse undergraduate, postgraduate, and doctoral programs, including strong engineering and management courses. The institute attracts over 52,000 students and consistently achieves high placements, with a notable highest package of INR 52 LPA for the 2023-24 batch.

READ MORE
location

Chengalpattu, Tamil Nadu

Compare colleges

About the Specialization

What is Cyber Security at SRM Institute of Science and Technology Chengalpattu?

This M.Sc. Cyber Security program at SRM Institute of Science and Technology focuses on providing advanced knowledge and practical skills in protecting digital assets. It addresses the growing need for skilled professionals to combat cyber threats in the Indian digital landscape, offering a blend of theoretical foundations and hands-on experience crucial for industry readiness.

Who Should Apply?

This program is ideal for engineering or science graduates with a background in Computer Science or IT seeking entry into the cyber security domain. It also caters to working professionals aiming to upskill in areas like ethical hacking, cloud security, or digital forensics, and career changers transitioning into the rapidly expanding cyber security industry in India.

Why Choose This Course?

Graduates of this program can expect to pursue dynamic career paths as Security Analysts, Ethical Hackers, Forensics Investigators, or Cloud Security Architects within Indian organizations and MNCs. Entry-level salaries typically range from INR 4-7 LPA, with significant growth potential up to INR 15-25 LPA for experienced professionals, aligning with certifications like CEH, CISSP, and CompTIA Security+.

Student Success Practices

Foundation Stage

Master Fundamental Security Concepts- (Semester 1-2)

Focus on building a strong foundation in advanced data structures, operating systems, networking, and mathematical concepts relevant to cybersecurity. Understand the core principles of cryptography and network security early on.

Tools & Resources

NPTEL courses on Data Structures and Algorithms, Cryptography, HackerRank for coding challenges, Academic textbooks

Career Connection

A robust understanding of these fundamentals is critical for all advanced cybersecurity roles, ensuring a solid base for specialized learning and problem-solving.

Hands-on Lab Skill Development- (Semester 1-2)

Actively participate in all practical labs, focusing on implementing cryptographic algorithms, using network security tools, and performing ethical hacking exercises. Document all lab work thoroughly and understand the practical implications.

Tools & Resources

Wireshark, Nmap, Metasploit, Virtual labs, Online tutorials for practical exercises

Career Connection

Practical skills gained in labs directly translate to job requirements for security analyst, pen-tester, and incident response roles, enabling immediate application of knowledge.

Engage in Cyber Security Communities- (Semester 1-2)

Join campus cybersecurity clubs or online communities (e.g., OWASP local chapters, Null Community) to learn from peers, participate in hackathons, and stay updated on the latest threats and technologies.

Tools & Resources

Discord/Telegram groups, LinkedIn professional groups, Local cybersecurity meetups

Career Connection

Networking within the cybersecurity community opens doors to mentorship, internships, and job opportunities, while participation builds reputation and practical experience.

Intermediate Stage

Specialized Skill Acquisition through Electives- (Semester 3-4)

Strategically choose elective subjects (e.g., Cloud Security, IoT Security, Malware Analysis) that align with specific career interests. Deep dive into the chosen area through self-study, certifications, and practical projects beyond coursework.

Tools & Resources

Official documentation for AWS/Azure security, IoT development kits, Malware analysis tools (IDA Pro, Ghidra), Relevant online certification courses (e.g., CompTIA CySA+, CCSP)

Career Connection

Specialization enhances employability by demonstrating expertise in high-demand areas, making candidates more attractive for niche roles like Cloud Security Engineer or IoT Security Analyst.

Undertake Industry-Relevant Mini and Major Projects- (Semester 3-4)

Focus mini and major projects on solving real-world cybersecurity problems, ideally in collaboration with industry partners or based on identified vulnerabilities. Document the entire process, including research, implementation, and results.

Tools & Resources

Project management tools (Jira, Trello), Version control (Git), Collaboration platforms (GitHub), Industry contacts for mentorship

Career Connection

Strong project experience is highly valued by employers, showcasing problem-solving abilities, technical prowess, and the capacity to contribute meaningfully to a team.

Prepare for Professional Certifications- (Semester 3-4)

Begin preparing for globally recognized cybersecurity certifications (e.g., CompTIA Security+, CEH, AZ-500, CCSP) alongside academic studies. These certifications validate practical skills and significantly boost job prospects in the Indian market.

Tools & Resources

Official certification study guides, Practice exams, Online training platforms (Coursera, Udemy, Pluralsight), Professional forums

Career Connection

Certifications are often prerequisites or strong advantages for entry to mid-level cybersecurity roles, providing a competitive edge in placements and career progression.

Develop Strong Communication and Reporting Skills- (Semester 3-4)

Practice articulating complex technical concepts clearly, both verbally and in written reports. This is crucial for presenting security assessments, incident reports, and interacting with non-technical stakeholders in a corporate environment.

Tools & Resources

Technical writing workshops, Presentation practice, Participation in debates or public speaking events, Peer review of reports

Career Connection

Effective communication is vital for roles like Security Consultant, Auditor, and Incident Responder, where explaining risks and solutions to management is a daily task.

Seek Internships and Industry Exposure- (Semester 3-4)

Actively search for and complete internships at cybersecurity firms or IT departments with robust security teams. This provides invaluable real-world experience, mentorship, and often leads to pre-placement offers.

Tools & Resources

University placement cell, LinkedIn, Internshala, Company career pages, Networking events

Career Connection

Internships bridge the gap between academic learning and industry demands, building a professional network and providing practical work experience that is highly valued by recruiters.

Stay Updated with Emerging Threats and Technologies- (Semester 3-4)

Regularly read industry news, follow leading cybersecurity experts and organizations, and understand emerging threats like AI-driven attacks or quantum cryptography. Attend webinars and conferences whenever possible.

Tools & Resources

Cybersecurity news sites (e.g., The Hacker News, Dark Reading), Cybersecurity blogs, Threat intelligence reports, Industry conferences (e.g., c0c0n, Nullcon)

Career Connection

Remaining current with industry trends demonstrates proactive learning and adaptability, essential for a rapidly evolving field, and positions graduates as forward-thinking professionals.

Advanced Stage

Program Structure and Curriculum

Eligibility:

  • B.Sc. in Computer Science / Computer Science and Engineering / Information Technology / Software Engineering / BCA with Mathematics as one of the subjects at 10+2 level or at Graduation. Minimum 50% aggregate marks.

Duration: 2 years / 4 semesters

Credits: 90 Credits

Assessment: Internal: 50%, External: 50%

Semester-wise Curriculum Table

Semester 1

Subject CodeSubject NameSubject TypeCreditsKey Topics
P21CS101Advanced Data Structures and AlgorithmsCore4Abstract Data Types, Hashing Techniques, Tree Structures, Graph Algorithms, Sorting and Searching
P21CS102Mathematical Foundations of Cyber SecurityCore4Number Theory, Group Theory, Ring and Field Theory, Probability and Statistics, Boolean Algebra
P21CS103Advanced Operating SystemsCore4Distributed Operating Systems, Process Management, Distributed File Systems, Distributed Shared Memory, Security in OS
P21CS104Database Management SystemsCore4Relational Model, SQL and Query Processing, Transaction Management, Concurrency Control, Database Security
P21CS105Advanced Data Structures and Algorithms LabLab2Array and List Operations, Tree and Graph Traversals, Sorting and Searching Algorithms, Dynamic Programming, Hashing Implementations
P21CS106Database Management Systems LabLab2SQL Queries (DDL, DML, DCL), PL/SQL Programming, Database Design, Transaction Operations, Security Role Management

Semester 2

Subject CodeSubject NameSubject TypeCreditsKey Topics
P21CS201Cryptography and Network SecurityCore4Symmetric and Asymmetric Cryptography, Hash Functions and Digital Signatures, Network Security Protocols (IPSec, SSL/TLS), Firewalls and IDS, Key Management
P21CS202Ethical Hacking and Penetration TestingCore4Reconnaissance, Scanning and Enumeration, Vulnerability Analysis, Exploitation Techniques, Reporting and Remediation
P21CS203Secure Coding PracticesCore4Software Security Principles, Buffer Overflows, Input Validation, Injection Attacks, Secure Development Lifecycle
P21CS204Advanced Computer NetworksCore4Network Topologies, TCP/IP Model, Routing Protocols, Network Management, Wireless Networks
P21CS205Cryptography and Network Security LabLab2Cryptographic Algorithms (DES, AES, RSA), Network Scanner Tools (Nmap), Firewall Configuration, Packet Analysis (Wireshark), VPN Setup
P21CS206Ethical Hacking and Penetration Testing LabLab2Vulnerability Scanning, Exploitation Tools (Metasploit), Web Application Hacking, Wireless Network Attacks, Post-Exploitation Techniques

Semester 3

Subject CodeSubject NameSubject TypeCreditsKey Topics
P21CS301Cloud SecurityCore4Cloud Computing Architecture, Cloud Security Threats, Identity and Access Management, Data Security in Cloud, Cloud Security Best Practices
P21CS302Digital Forensics and Incident ResponseCore4Forensic Readiness, Evidence Collection and Preservation, Disk Forensics, Network Forensics, Incident Response Plan
P21CS303Professional Elective I (Cyber Crime and Law / IoT Security / Intrusion Detection and Prevention Systems / Web Application Security / Machine Learning for Cyber Security / Biometric Security)Elective4Cybercrime categories, Digital evidence, Indian IT Act, Cyber law challenges, Intellectual property rights
P21CS304Professional Elective II (Cyber Crime and Law / IoT Security / Intrusion Detection and Prevention Systems / Web Application Security / Machine Learning for Cyber Security / Biometric Security)Elective4IoT architecture, Security challenges in IoT, Attack surfaces, Secure IoT protocols, Privacy concerns
P21CS305Digital Forensics and Incident Response LabLab2Forensic Imaging, Registry Analysis, Memory Forensics, Malware Analysis, Log File Analysis
P21CS306Mini ProjectProject2Problem Identification, Requirement Analysis, Design and Implementation, Testing and Debugging, Report Writing

Semester 4

Subject CodeSubject NameSubject TypeCreditsKey Topics
P21CS401Professional Elective III (Security in Data Science / Block Chain and Crypto Currency Security / Malware Analysis / Digital Rights Management / Incident Management and Disaster Recovery / Mobile Computing and Security)Elective4Malware types, Static analysis, Dynamic analysis, Debugging tools, Reverse engineering
P21CS402Professional Elective IV (Security in Data Science / Block Chain and Crypto Currency Security / Malware Analysis / Digital Rights Management / Incident Management and Disaster Recovery / Mobile Computing and Security)Elective4Blockchain fundamentals, Cryptocurrency security, Smart contract vulnerabilities, Consensus mechanisms, DApp security
P21CS403Project WorkProject14Literature Survey, Project Design, Implementation and Testing, Result Analysis, Thesis Preparation and Defense
whatsapp

Chat with us