H a l t o n A c a d e m y

About Us

Our goal is simple: we help you grow to be your best. Whether you’re a student, working professional, corporate organization or institution, we have tailored initiatives backed by industry specific expertise to meet your unique needs.

Contact Info

Halton Academy For Management and Technology Private Limited,
39/2475-B1 LR Towers, South Janatha Road, Palarivattom, Ernakulam, Kerala - 682025, India.

+91-7511-1890-01

4 Francis Street, le2 2bd, England,
United Kingdom.

hello@haltonacademy.com

M.Tech in Cyber security

Semester-wise syllabus for an M.Tech in Cyber security

 

Semester 1: Core Foundations 

Courses: 

1. Cryptography and Network Security 

   - Symmetric/asymmetric encryption (AES, RSA), hash functions, PKI, SSL/TLS, VPNs, and firewall configurations. 

2. Ethical Hacking and Penetration Testing 

   - Reconnaissance, vulnerability scanning, Metasploit, OWASP Top 10, and Kali Linux tools. 

3. Cyber security Fundamentals 

   - CIA triad, threat modeling, risk assessment, and security policies (NIST, ISO 27001). 

4. Operating System Security 

   - Hardening Windows/Linux systems, SELinux, auditd, and privilege escalation techniques. 

5. Research Methodology 

   - Technical writing, threat intelligence analysis, and ethical considerations. 

Labs: 

- Penetration Testing Lab (Kali Linux, Burp Suite, Nmap) 

- Network Security Lab (Wireshark, Snort IDS/IPS, firewall configuration) 

 

Semester 2: Advanced Topics & Electives 

Core Courses: 

1. Malware Analysis and Reverse Engineering 

   - Static/dynamic analysis, disassembly (IDA Pro, Ghidra), and sandboxing (Cuckoo Sandbox). 

2. Digital Forensics

   - Disk imaging, memory forensics (Volatility), chain of custody, and forensic tools (FTK, Autopsy). 

Electives (Examples): 

- Cloud Security (AWS/Azure/GCP security, CASB, SASE) 

- IoT and Embedded System Security 

- Blockchain and Cryptocurrency Security 

- Incident Response and Disaster Recovery 

- Cyber security Law and Compliance (GDPR, HIPAA, Cyber Law) 

Labs: 

- Malware Analysis Lab (Cuckoo Sandbox, REMnux) 

- Digital Forensics Lab (Autopsy, Sleuth Kit, Wireshark) 

 

Semester 3: Specialization & Project Work 

Electives (Examples):

- AI/ML in Cyber security (threat detection, anomaly detection) 

- Industrial Control System (ICS) Security (SCADA, Modbus) 

- Advanced Persistent Threats (APT) Analysis 

- Red Team/Blue Team Operations (adversary emulation, SOC workflows) 

- Quantum Cryptography (post-quantum algorithms, QKD) 

Project/Dissertation: 

- Phase 1: Topic selection (e.g., ransomware detection, zero-day exploit analysis, secure IoT framework), literature review, and proposal. 

- Seminars: Presentations on trends like AI-driven attacks, deep fake threats, or cyber warfare. 

 

Semester 4: Thesis/Project Completion 

Thesis/Project: 

- Full-time focus on implementation (e.g., building a secure system, malware analysis toolkit, or threat intelligence platform). 

- Final documentation, viva voce defense, and industry collaboration (if applicable). 

Additional Components:

- Industrial Internship (optional, with firms like Palo Alto Networks, CrowdStrike, or CERT-In). 

- Workshops: Training in *SIEM tools* (Splunk, ELK Stack), *threat hunting, or **OSINT frameworks* (Maltego, Shodan). 

 

Elective Tracks (Specializations): 

1. Ethical Hacking & Offensive Security 

   - Pen testing, exploit development, and red teaming. 

2. Digital Forensics & Incident Response (DFIR) 

   - Cybercrime investigation, forensic tools, and IR playbooks. 

3. Cloud & IoT Security 

   - Securing cloud-native apps, IoT device hardening, and edge security. 

4. AI-Driven Cybersecurity 

   - ML-based anomaly detection, adversarial ML defense.   

More Related Course