Executive-Friendly Program | High Impact Format

Key Highlights of IIT Kanpur Masters in Cybersecurity

  • SelectionBased on academic and professional background and test, interview where necessary. No GATE required.
  • High Impact Format Weekend-only Live interactive sessions coupled with self-paced learning.
  • Executive Friendly Schedule Learn while you earn, with the flexibility to complete the program between 1 - 3 years.
  • Career Advancement and Networking Support for placement and facilitation of incubation at IIT Kanpur's Incubation Centre.
  • IIT Kanpur Alumni Status Become an IIT Kanpur alumni with access to all the alumni privileges.
  • Credits Transfer Waiver of upto 60 credits for higher education (MTech/PhD) at IIT Kanpur.

Admission Process

  • Application
    Register with Mobile Number
    Submit Details
    Remit Application Fee
    Upload Documents
  • Selection
    Application Review
    Selection Test *
  • Admission

Class Start - January 2025

* Selection test differs for every programme

e-Masters Degree in Cyber Security Overview

Elevate Your Career in Cybersecurity with IIT Kanpur e-Masters Degree Program.

With a growing number of cyber attacks on information systems, critical infrastructures, and personal devices, there is a high demand for proficient cyber security professionals. Our comprehensive IIT Kanpur Masters program in Cybersecurity offers online education, equipping you with the latest tools, technologies, and concepts in the field. By earning a Masters degree in Cybersecurity from IIT Kanpur, you can take your career to the next level and be ready to tackle the ever-evolving landscape of cybersecurity.

Explore our e-Masters program in Cybersecurity and join the ranks of top cyber security professionals in India and worldwide. Enroll now and enhance your mastery of the subject with our well-researched curriculum and hands-on experience through projects and case studies.


Graduation Ceremony at IIT Kanpur Campus

Outcomes

  • Get eMasters Degree from
    IIT Kanpur
  • Build world-class
    Cyber Security expertise
  • Learn from the leading
    research faculty
  • Receive mentorship and career support from the
    IIT Kanpur placement cell
  • Incubation support for promising
    startup initiatives
  • Become a part of IIT Kanpur's
    alumni network

Why do participants choose the eMasters degree?

  • "I have been managing the technical aspect of Digital & Core banking functions of a banking company (Africa region) over the last decade. Presently, I am working on architecture plans for the secure adoption of On-Prem Cloud solutions & I believe eMasters would augment my skills in this domain."
    Jaiesh, Lead, Technical Delivery (Digital & Core Banking) for a leading British Bank (Africa region) with 12 years of experience
  • "My aspiration to enroll in this program and advance in my IT career is motivated by the fact that I have a strong interest in cyber security. This presents an unmissable opportunity to deepen my knowledge and advance in the chosen discipline and pursue a career in it in the long run."
    Anudeep, IT Professional working with a leading IT Consulting Company with 8 years of experience

Hear from our Program Alumni

Faculty

Learn from the experts working at the forefront of well-researched curriculum research and technology
in Cyber Security.

  • Manindra Agrawal
    B.Tech. and Ph.D. in Computer Science and Engineering from IIT Kanpur

    Computational Complexity Theory, Security, Theoretical Computer Science and Algorithms
  • Sandeep K. Shukla
    Ph.D., State University of New York at Albany
    M.S., State University of New York at Albany


    Application of Formal Methods to Embedded and Cyberphysical Systems and Embedded Computing
  • Urbi Chatterjee
    M.Tech in Computer Applications, Indian School of Mines, Dhanbad
    Ph. D., IIT Kharagpur


    Hardware Security, Physically Unclonable Functions, Secure Authentication Protocols Design and Internet of Things Security
  • Debapriya Basu Roy
    Ph.D., IIT Kharagpur
    M.S. in Computer Science (Cryptography and VLSI design), IIT Kharagpur
    B.Tech. in Electronics & Communication Engineering, RCCIIT, Kolkata


    Post-Quantum Cryptography, Side Channel Countermeasure, Efficient Hardware Accelerator for Cryptography, FPGA Architectures, Side Channel Attack and Evaluation, Hardware for Physically Unclonable Function and TRNG, RISC-V based HW/SW Codesign, Efficient Hardware Accelerator for Cryptography and Elliptic Curve Cryptography
  • Amitangshu Pal
    Ph.D. in Electrical and Computer Engineering, University of North Carolina
    M.S. in Electrical and Computer Engineering, University of North Carolina
    B.E. in Computer Science and Engineering, Jadavpur University, Kolkata


    IoT, Energy Harvesting Wireless Sensor Networks, Perishable Food Quality Sensing and Communication, Disaster Management Networks, Wireless-Optical Access Networks, Multihop Wireless Networks, Data Center Networks and Enterprise Networks
  • Debadatta Mishra
    Ph.D., IIT Bombay

    Operating Systems, Virtualization and Cloud Computing and Computer Networks
  • aditya-imgAdithya Vadapalli
    Ph.D, Computer Science at Indiana University, Bloomington
    Assistant Professor, Department of Computer Science and Engineering


    Cryptography, Private Information Retrieval, Algorithms, Distributed Algorithms
  • Angshuman-imgAngshuman Karmakar
    Ph.D. in Computer Science and Engineering from KU Leuven
    Assistant Professor, Department of Computer Science and Engineering


    Post Quantum Cryptography, Side-Channel attacks and Computation on encrypted data and Cryptology.
  • priyankaPriyanka Bagade
    Ph.D. in Computer Science, Arizona State University, U.S.A
    Assistant Professor, Department of Computer Science and Engineering


    Internet of the things, Sensors, Mobile Computing and Deep Learning

e-Masters in Cyber Security Curriculum

The eMasters in Cybersecurity features a comprehensive curriculum divided into Core and Elective modules. The program has 4C+(3/4 out of 4 from Basket I) +(4/5 out of 10 from Basket II) structure.

  • Introduction to Cryptography
  • Operating System Principles
  • Computer Networking I
  • Introduction to Application Security, Mobile Security, and Critical Infrastructure Security

Basket I Elective

  • Computer Networking II
  • Introduction to Linear Algebra
  • Introduction to Web Security, Network Security and Defenses
  • Machine Learning for Cyber Security

Basket II Elective

  • Introduction to Hardware Security
  • Introduction to Cryptography
  • Embedded and Cyber Physical Systems, and IoT Security
  • Cyber laws, Case studies and Trends
  • Advanced Topics in Cryptography
  • Advanced Critical Infrastructure Security
  • Introduction to Blockchain Technology
  • Computational number theory for cryptographers
  • Introduction to malware analysis
  • Game theory
  • Honeypots and deception technology for advanced protection

Detailed Curriculum

Immersive Learning Format

  • Live Interactive Sessions
  • Projects
  • Online Examination
  • Campus Visit
  • Online LIVE and self-paced sessions are delivered
    through AI-powered iPearl.ai
  • Live interaction as per the
    faculty availability
  • Apply learnings through projects while working in teams and
    establish a peer network
  • Final module-level exams will be
    conducted online
  • Opportunity to meet experts and experience the IITK campus
    during campus visits

Eligibility

  • Bachelor's degree (4 years program) or a Master's degree in appropriate discipline with at least 55% marks or 5.5/10 CPI + 2 years of work experience (an applicant need not be employed to be eligible).
  • Minimum of 2 years of full time work experience (You need not be currently employed to be eligible).
  • Candidates with relevant experience and coding knowledge will be preferred.

Cyber Security Masters: Fees

Application fee ₹1500 (to be paid during application submission)

Fee structure for candidates opting to complete the program in 1 year.

Details Amount
Registration Fee
To be paid within 1 week of selection
₹40,000
Admission Fee
To be paid to complete enrollment
₹1,60,000
Module Fee
To be paid at the beginning of every quarter based on no. of modules selected
(Total 12 Modules)
₹5,40,000
₹45,000 per module
Quarter Fee*
To be paid at the beginning of every quarter
₹60,000
₹15,000 per quarter
Total Fee ₹8,00,000

*For every additional quarter, fees of Rs 15,000 will be applicable.

For Example

Candidates opting to complete the program in 5 quarters need to pay an additional fee of ₹15,000

Candidates opting to complete the program in 11 quarters need to pay an additional fee of ₹1,05,000

All other fees remain the same.

Fees paid are non-refundable (after a certain time period) and non-transferable.

About IIT Kanpur

Established in 1959 by the Government of India, Indian Institute of Technology Kanpur (IIT Kanpur) is a globally acclaimed university for world-class education and research in science, engineering, management and humanities. We aim to provide leadership in technological innovation for the growth of India.

  • Ranked 5th in Innovation, 4th in Engineering and 4th in Overall Category by NIRF 2023
  • Built on world-class academic research culture
  • Offers various undergraduate, post-graduate, integrated, and research programs in the field of engineering, science, management, and design
IIT Kanpur Online Masters Degree Courses

State-of-the-Art Digital Learning Platform

The eMasters Program by IIT Kanpur will be delivered on iPearl.ai, a State-of-the-Art digital learning platform, powered by TalentSprint. iPearl.ai, highly rated for its user experience, is a direct-to-device platform that works seamlessly on any internet-connected device and provides a single-sign on experience for all your learning needs including recorded videos, reading material, live interactive sessions, assignments, quizzes, discussion forums, virtual lounges and more.

Frequently Asked Questions

Core Modules

  • Introduction to Cryptography
    The module covers the basics of finite field Arithmetic, private and public-key cryptography, existing cryptosystems and their security, Cryptanalysis of existing systems and more.
  • Operating System Principles
    The module covers the computer organization interface, the concept of a process, threads, scheduling, process synchronization, deadlocks, memory management, and more.
  • Computer Networking I
    The module covers the introduction, history, and development of computer networks, networks topologies, various aspects of layering and protocols, physical layer, MAC layer, data link layer, and more.
  • Introduction to Application Security, Mobile Security, and Critical Infrastructure Security
    The module covers various aspects of Security in Mobile Platforms, Application Security, and Issues in Critical Infrastructure and SCADA Security.

Elective Module

Basket I Elective

  • Computer Networking II
    The module covers the network layer, transport layer, design issues in protocols at different layers, network programming, socket programming, and application layer.
  • Introduction to Linear Algebra
    The module covers vector spaces, examples, Rn, Cn; subspaces, linear independence, dependence and dimension, linear transformations, matrices, matrix algebra, determinants, properties of matrices and determinants, systems of linear equations, and more.
  • Introduction to Web Security, Network Security and Defenses
    The module covers Security Issues in TCP/IP, Wireless Security, Network Defense tools, DNSSec, NSec3, Distributed Firewalls, Intrusion Detection tools, Threat Models, Denial of Service Attacks, DOS-proof network architecture, Security architecture of World Wide Web, Security Architecture of Web Servers, and Web Clients and more.
  • Machine Learning for Cyber Security
    The module covers an introduction to data classification, Supervised vs. Unsupervised Learning, Linear Regression, Multivariate Regression., Logistic Regression, Hypothesis Testing, Maximum Likelihood Estimation, Bayesian Classification, Model Selection, Regularization, Generalization, Cross Validation and more.

Basket II Elective

  • Introduction to Hardware Security
    The module provides an in-depth understanding of Internet of Things (IoT) ecosystem and security vulnerabilities, attacks on cyber-physical systems, reverse engineering, side-channel attacks, intellectual property (IP) piracy, Hardware Trojan, electronic counterfeiting, Physical Unclonable Function (PUF) and more.
  • Embedded and Cyber Physical Systems, and IOT Security
    The module covers the modeling, implementation, and verification issues related to developing a cyber-physical system. In addition, through the discussion of implementing an embedded control system, the module will cover the basic design principles of an embedded system.
  • Cyber laws, Case studies and Trends
  • Advanced Topics in Cryptography
    The module covers zero-knowledge protocols, one-way functions, advanced protocols for different applications, network, and system-level security issues, post-quantum Cryptography, and more.
  • Advanced Critical Infrastructure Security
    The module covers Stuxnet worm and its aftereffects in the Critical Infrastructure security, Game Theory and other analytical modeling of the security problems of critical infrastructures, security of the Networked Infrastructure, event monitoring, Event Correlation, and Situational Awareness, vulnerability Database and its importance and more.
  • Introduction to Blockchain Technology
    The module covers Basic Cryptographic primitives used in Blockchain – Secure, Collision-resistant hash functions, digital signature, public-key cryptosystems, zero-knowledge proof systems, basic Distributed System concepts, Blockchain 2.0, Blockchain 3.0, E-Governance and other contract enforcement mechanisms, and more.
  • Computational Number Theory for Cryptographers
    The module covers Elementary Operations, Polynomials, Integer Lattices, Elliptic Curves, and more.
  • Introduction to Malware Analysis
    The module covers malware classification, types, and platform-specific issues with malware, Intrusion into IT and operational network (OT) and their signs, manual malware infection analysis, signature-based malware detection and classification – pros and cons, and need for machine learning-based techniques, and more.
  • Game Theory
    The module covers non-cooperative game theory, complete information sequential move games, complete information simultaneous move games, incomplete information games, cooperative Game Theory, and more.
  • Honeypots and Deception Technologies for Advanced Protection
    The module covers Cyber Threat Intelligence Collection Techniques, OSINT, Deception Technology for Monitoring Cyber Threat, Client-Side Deception Techniques, Service side Deception techniques, IT honeypots, OT honeypot, ICS Honeypots and more.