About Us

Our goal is simple: we help you grow to be your best. Whether you’re a student, working professional, corporate organization or institution, we have tailored initiatives backed by industry specific expertise to meet your unique needs.

Contact Info

Halmonds University Center For Management Studies,
W. C /7A, Near Poornima Tower, North Shankarsheth Road, Pune. Maharashtra-411042, India.

+91 9778313343

128 City Road, London, EC1V 2NX,
United Kingdom.

hello@lordhalmondsuniversity.com

M.Tech in Cyber security

Semester-wise syllabus for an M.Tech in Cyber security

 

Semester 1: Core Foundations 

Courses: 

1. Cryptography and Network Security 

   - Symmetric/asymmetric encryption (AES, RSA), hash functions, PKI, SSL/TLS, VPNs, and firewall configurations. 

2. Ethical Hacking and Penetration Testing 

   - Reconnaissance, vulnerability scanning, Metasploit, OWASP Top 10, and Kali Linux tools. 

3. Cyber security Fundamentals 

   - CIA triad, threat modeling, risk assessment, and security policies (NIST, ISO 27001). 

4. Operating System Security 

   - Hardening Windows/Linux systems, SELinux, auditd, and privilege escalation techniques. 

5. Research Methodology 

   - Technical writing, threat intelligence analysis, and ethical considerations. 

Labs: 

- Penetration Testing Lab (Kali Linux, Burp Suite, Nmap) 

- Network Security Lab (Wireshark, Snort IDS/IPS, firewall configuration) 

 

Semester 2: Advanced Topics & Electives 

Core Courses: 

1. Malware Analysis and Reverse Engineering 

   - Static/dynamic analysis, disassembly (IDA Pro, Ghidra), and sandboxing (Cuckoo Sandbox). 

2. Digital Forensics

   - Disk imaging, memory forensics (Volatility), chain of custody, and forensic tools (FTK, Autopsy). 

Electives (Examples): 

- Cloud Security (AWS/Azure/GCP security, CASB, SASE) 

- IoT and Embedded System Security 

- Blockchain and Cryptocurrency Security 

- Incident Response and Disaster Recovery 

- Cyber security Law and Compliance (GDPR, HIPAA, Cyber Law) 

Labs: 

- Malware Analysis Lab (Cuckoo Sandbox, REMnux) 

- Digital Forensics Lab (Autopsy, Sleuth Kit, Wireshark) 

 

Semester 3: Specialization & Project Work 

Electives (Examples):

- AI/ML in Cyber security (threat detection, anomaly detection) 

- Industrial Control System (ICS) Security (SCADA, Modbus) 

- Advanced Persistent Threats (APT) Analysis 

- Red Team/Blue Team Operations (adversary emulation, SOC workflows) 

- Quantum Cryptography (post-quantum algorithms, QKD) 

Project/Dissertation: 

- Phase 1: Topic selection (e.g., ransomware detection, zero-day exploit analysis, secure IoT framework), literature review, and proposal. 

- Seminars: Presentations on trends like AI-driven attacks, deep fake threats, or cyber warfare. 

 

Semester 4: Thesis/Project Completion 

Thesis/Project: 

- Full-time focus on implementation (e.g., building a secure system, malware analysis toolkit, or threat intelligence platform). 

- Final documentation, viva voce defense, and industry collaboration (if applicable). 

Additional Components:

- Industrial Internship (optional, with firms like Palo Alto Networks, CrowdStrike, or CERT-In). 

- Workshops: Training in *SIEM tools* (Splunk, ELK Stack), *threat hunting, or **OSINT frameworks* (Maltego, Shodan). 

 

Elective Tracks (Specializations): 

1. Ethical Hacking & Offensive Security 

   - Pen testing, exploit development, and red teaming. 

2. Digital Forensics & Incident Response (DFIR) 

   - Cybercrime investigation, forensic tools, and IR playbooks. 

3. Cloud & IoT Security 

   - Securing cloud-native apps, IoT device hardening, and edge security. 

4. AI-Driven Cybersecurity 

   - ML-based anomaly detection, adversarial ML defense.