Executive-Friendly Program | High Impact Format |

IIT Kanpur eMasters Degree Program

eMasters in Cyber Security

Build Capabilities for an Evolving Threat Landscape

  • No GATE Score
    required
  • Placement Support and
    Alumni Benefits from IIT Kanpur
  • Earn Masters Degree
    without leaving your job
  • Top Faculty from Dept. of
    Computer Science and Engg.

Apply Now

IITK

eMasters Highlights

  • SelectionBased on academic and professional background and test, interview where necessary. No GATE required.
  • High Impact Format Weekend-only Live interactive sessions coupled with self-paced learning.
  • Executive Friendly Schedule Learn while you earn, with the flexibility to complete the program between 1 - 3 years.
  • Career Advancement and Networking Access to IIT Kanpur placement cell and incubation centre.
  • IIT Kanpur Alumni Status Become an IIT Kanpur alumni with access to all the alumni privileges.
  • Credits Transfer Waiver of upto 60 credits for higher education (MTech/PhD) at IIT Kanpur.

Admission Process

  • Application
    Register with Mobile Number
    Submit Details
    Remit Application Fee
    Upload Documents
  • Selection
    Application Review
    Selection Test *
    Interview
  • Admission

Class Start - Jan 9, 2023

* Selection test differs for every programme

About eMasters in Cyber Security

With the growing number of cyber attacks on important information systems, critical infrastructures, personal devices, etc. there is an urgent and massive need for cyber security professionals with the right capabilities. Our comprehensive IIT Kanpur eMasters program will train you in the latest tools and technologies, techniques, and concepts in Cyber Security. Prepare yourself to successfully navigate the changing landscape of Cyber Security.

Outcomes

  • Get eMasters Degree from IIT Kanpur
  • Build world-class Cyber Security expertise
  • Learn from the leading research faculty
  • Receive mentorship, career support from IIT Kanpur placement cell
  • Incubation support for promising startup initiatives
  • Become a part of IIT Kanpur's alumni network

Faculty

Learn from the experts working at the forefront of cutting-edge research and technology in Cyber Security.

  • Manindra Agrawal
    B.Tech. and Ph.D. in Computer Science and Engineering from IIT Kanpur

    Computational Complexity Theory, Security, Theoretical Computer Science and Algorithms
  • Sandeep K. Shukla
    Ph.D., State University of New York at Albany
    M.S., State University of New York at Albany


    Application of Formal Methods to Embedded and Cyberphysical Systems and Embedded Computing
  • Urbi Chatterjee
    M.Tech in Computer Applications, Indian School of Mines, Dhanbad
    Ph. D., IIT Kharagpur


    Hardware Security, Physically Unclonable Functions, Secure Authentication Protocols Design and Internet of Things Security
  • Nitin Saxena
    B.Tech. and Ph.D. in Computer Science and Engineering from IIT Kanpur

    Computational Complexity Theory, Algebra, Algebraic Geometry, Theoretical Computer Science and Algorithms
  • Debapriya Basu Roy
    Ph.D., IIT Kharagpur
    M.S. in Computer Science (Cryptography and VLSI design), IIT Kharagpur
    B.Tech. in Electronics & Communication Engineering, RCCIIT, Kolkata


    Post-Quantum Cryptography, Side Channel Countermeasure, Efficient Hardware Accelerator for Cryptography, FPGA Architectures, Side Channel Attack and Evaluation, Hardware for Physically Unclonable Function and TRNG, RISC-V based HW/SW Codesign, Efficient Hardware Accelerator for Cryptography and Elliptic Curve Cryptography
  • Amitangshu Pal
    Ph.D. in Electrical and Computer Engineering, University of North Carolina
    M.S. in Electrical and Computer Engineering, University of North Carolina
    B.E. in Computer Science and Engineering, Jadavpur University, Kolkata


    IoT, Energy Harvesting Wireless Sensor Networks, Perishable Food Quality Sensing and Communication, Disaster Management Networks, Wireless-Optical Access Networks, Multihop Wireless Networks, Data Center Networks and Enterprise Networks
  • Debadatta Mishra
    Ph.D., IIT Bombay

    Operating Systems, Virtualization and Cloud Computing and Computer Networks

Curriculum

A well-researched real-world curriculum by IIT Kanpur’s subject matter experts that fosters hands-on learning and helps you master the desired capabilities by combining deep formal rigor and an intense practical approach.

Modules

  • Introduction
    to Cryptography
  • Operating System
    Principles
  • Computer
    Networking I
  • Introduction to Application Security, Mobile Security, and Critical Infrastructure Security
  • Computer
    Networking II
  • Introduction to
    Linear Algebra
  • Introduction to Web Security,
    Network Security and Defenses
  • Machine Learning for
    Cyber Security
  • Introduction
    to Hardware Security
  • Embedded and Cyber Physical
    Systems, and IoT Security
  • Advanced Topics in
    Cryptography
  • Advanced Critical
    Infrastructure Security

Immersive Learning Format

  • Live Interactive Sessions
  • Projects
  • Online Examination
  • Campus Visit
  • Online LIVE and self-paced sessions are delivered through AI-powered iPearl.ai
  • Live interaction as per the faculty availability
  • Apply learnings through projects while working in teams and establish a peer network
  • Final module-level exams will be conducted across major cities in India
  • Opportunity to meet experts and experience the IITK campus during campus visits

Eligibility

  • Bachelor's Degree (4 years program) or a Masters Degree in the relevant discipline (Computer Science/Information Technology/MCA, etc) with at least 55% marks or 5.5/10 CPI.
  • Minimum of 2 years of work experience (You need not be currently employed to be eligible).
  • Candidates with relevant experience will be preferred.

Program Fee

Application fee ₹1500 (to be paid during application submission)

Fee structure for candidates opting to complete the program in 1 year.

Details Amount
Registration Fee
To be paid within 1 week of selection
₹40,000
Admission Fee
To be paid to complete enrollment
₹1,60,000
Module Fee
To be paid at the beginning of every quarter based on no. of modules selected
(Total 12 Modules)
₹5,40,000
₹45,000 per module
Quarter Fee*
To be paid at the beginning of every quarter
₹60,000
₹15,000 per quarter
Total Fee ₹8,00,000

*For every additional quarter, fees of Rs 15,000 will be applicable.

For Example

Candidates opting to complete the program in 5 quarters need to pay an additional fee of ₹15,000

Candidates opting to complete the program in 11 quarters need to pay an additional fee of ₹1,05,000

All other fees remain the same.

Fee paid are non-refundable and non-transferable

Frequently Asked Questions

Core Modules

  • Introduction to Cryptography
    The module covers the basics of finite field Arithmetic, private and public-key cryptography, existing cryptosystems and their security, Cryptanalysis of existing systems and more.
  • Operating System Principles
    The module covers the computer organization interface, the concept of a process, threads, scheduling, process synchronization, deadlocks, memory management, and more.
  • Computer Networking I
    The module covers the introduction, history, and development of computer networks, networks topologies, various aspects of layering and protocols, physical layer, MAC layer, data link layer, and more.
  • Introduction to Application Security, Mobile Security, and Critical Infrastructure Security
    The module covers various aspects of Security in Mobile Platforms, Application Security, and Issues in Critical Infrastructure and SCADA Security.
  • Computer Networking II
    The module covers the network layer, transport layer, design issues in protocols at different layers, network programming, socket programming, and application layer.
  • Introduction to Linear Algebra
    The module covers vector spaces, examples, Rn, Cn; subspaces, linear independence, dependence and dimension, linear transformations, matrices, matrix algebra, determinants, properties of matrices and determinants, systems of linear equations, and more.
  • Machine Learning for Cyber Security
    The module covers an introduction to data classification, Supervised vs. Unsupervised Learning, Linear Regression, Multivariate Regression., Logistic Regression, Hypothesis Testing, Maximum Likelihood Estimation, Bayesian Classification, Model Selection, Regularization, Generalization, Cross Validation and more.
  • Introduction to Web Security, Network Security and Defenses
    The module covers Security Issues in TCP/IP, Wireless Security, Network Defense tools, DNSSec, NSec3, Distributed Firewalls, Intrusion Detection tools, Threat Models, Denial of Service Attacks, DOS-proof network architecture, Security architecture of World Wide Web, Security Architecture of Web Servers, and Web Clients and more.
  • Advanced Topics in Cryptography
    The module covers zero-knowledge protocols, one-way functions, advanced protocols for different applications, network, and system-level security issues, post-quantum Cryptography, and more.
  • Computational Number Theory for Cryptographers
    The module covers Elementary Operations, Polynomials, Integer Lattices, Elliptic Curves, and more.
  • Embedded and Cyber Physical Systems
    The module covers the modeling, implementation, and verification issues related to developing a cyber-physical system. In addition, through the discussion of implementing an embedded control system, the module will cover the basic design principles of an embedded system.
  • Introduction to Hardware Security
    The module provides an in-depth understanding of Internet of Things (IoT) ecosystem and security vulnerabilities, attacks on cyber-physical systems, reverse engineering, side-channel attacks, intellectual property (IP) piracy, Hardware Trojan, electronic counterfeiting, Physical Unclonable Function (PUF) and more.
  • Introduction to Malware Analysis
    The module covers malware classification, types, and platform-specific issues with malware, Intrusion into IT and operational network (OT) and their signs, manual malware infection analysis, signature-based malware detection and classification – pros and cons, and need for machine learning-based techniques, and more.
  • Game Theory
    The module covers non-cooperative game theory, complete information sequential move games, complete information simultaneous move games, incomplete information games, cooperative Game Theory, and more.
  • Advanced Critical Infrastructure Security
    The module covers Stuxnet worm and its aftereffects in the Critical Infrastructure security, Game Theory and other analytical modeling of the security problems of critical infrastructures, security of the Networked Infrastructure, event monitoring, Event Correlation, and Situational Awareness, vulnerability Database and its importance and more.
  • Honeypots and Deception Technologies for Advanced Protection
    The module covers Cyber Threat Intelligence Collection Techniques, OSINT, Deception Technology for Monitoring Cyber Threat, Client-Side Deception Techniques, Service side Deception techniques, IT honeypots, OT honeypot, ICS Honeypots and more.
  • Introduction to Blockchain Technology
    The module covers Basic Cryptographic primitives used in Blockchain – Secure, Collision-resistant hash functions, digital signature, public-key cryptosystems, zero-knowledge proof systems, basic Distributed System concepts, Blockchain 2.0, Blockchain 3.0, E-Governance and other contract enforcement mechanisms, and more.

Quarter 1

  • Introduction to Cryptography
  • Operating System Principles
  • Computer Networking I

Quarter 2

  • Introduction to Application Security, Mobile Security, and Critical Infrastructure Security
  • Computer Networking II
  • Introduction to Linear Algebra

Quarter 3

  • Introduction to Web Security, Network Security and Defenses
  • Machine Learning for Cyber Security
  • Introduction to Hardware Security

Quarter 4

  • Embedded and Cyber Physical Systems, and IoT Security
  • Advanced Topics in Cryptography
  • Advanced Critical Infrastructure Security
Quarter 1 Module Schedule
Module 1 Introduction to Cryptography Tutorial sessions by instructor or TAs (Teaching Assistants) from time to time. It will always be after 6:00 pm on weekends.
Module 2 Operating System Principles Tutorial sessions by instructor or TAs (Teaching Assistants) from time to time. It will always be after 6:00 pm on weekends.
Module 3 Introduction to Application Security, Mobile Security, and Critical Infrastructure Security Tutorial sessions by instructor or TAs (Teaching Assistants) from time to time. It will always be after 6:00 pm on weekends.

About IIT Kanpur

Established in 1959 by the Government of India, Indian Institute of Technology Kanpur (IIT Kanpur) is a globally acclaimed university for world-class education and research in science, engineering, management and humanities. We aim to provide leadership in technological innovation for the growth of India.

  • Ranked 4th by NIRF in the Engineering category, 2022
  • Built on world-class academic research culture
  • Offers various undergraduate, post-graduate, integrated, and research programs in the field of engineering, science, management, and design

State-of-the-Art Digital Learning Platform

The eMasters Program by IIT Kanpur will be delivered on iPearl.ai, a State-of-the-Art digital learning platform, powered by TalentSprint. iPearl.ai, highly rated for its user experience, is a direct-to-device platform that works seamlessly on any internet-connected device and provides a single-sign on experience for all your learning needs including recorded videos, reading material, live interactive sessions, assignments, quizzes, discussion forums, virtual lounges and more.