Course Curriculum

Course Curriculum-Master of Technology in Information Security

Master of Technology in Information Security

1-Introduction to Computer Security

Introduction to techniques for defending against hostile adversaries in modern computer systems and computer networks.

Operating system security; network security, including cryptography and cryptographic protocols, firewalls, and network denial-of-service attacks and defenses; user authentication technologies; security for network servers; web security; and security for mobile code technologies - Java and Javascript.

Intrusion detection; techniques to provide privacy in Internet applications; and protecting digital content (music, video, software) from unintended use.

2-Security Engineering: Dependable Distributed Systems

Distributed Systems and Fault Tolerance, Security Architecture for FT Systems, Security Architecture for Services, Algorithms, Techniques for Fault Tolerance and high integrity Services, Tools and Environments for building higher integrity service.

3- Mathematical Models for Internet

Design and control communication networks that respond to: randomly fluctuating demands and failures by adapting rates, by rerouting traffic and by reallocating resources, stability and fairness of rate control algorithms for the Internet; economic issues, scalable models of simulation of such networks.

4-Digital Defense: Issues in Security, and Critical Infrastructure Protection

Threats of viruses, worms, malicious codes, etc., models of propagation and their epidemic spread, dos attacks, defenses against hacking, DDoS, design of scalable testbeds for simulation of attacks against critical infrastructures, architectures for robust and flexible Internet, ubiquitous, dependable and indestructible storage.

5-Cryptography foundations, probabilistic proofs and pseudo randomness

Theory, foundations, and applications of modern cryptography. Steganography, One-way functions; pseudo-randomness and random number generators; encryption; authentication; symmetric cryptography, asymmetric cryptography: public-key cryptosystems; digital signatures, message authentication codes, remote user authentication, notions of security,; zero- knowledge/interactive proofs, multi-party cryptographic protocols, key exchange and applications; cryptanalysis of cryptographic primitives and protocols, such as by side-channel attacks, differential cryptanalysis, or replay attacks; and cryptanalytic techniques on deployed systems etc.

6-Intrusion Detection

Introduction to data and methodologies of computer intrusion detection. Statistical and machine approaches to detection of attacks on computers - Techniques for studying the Internet and estimating the number and severity of attacks, network based attacks such as probes and denial of service attacks, host based attacks such as buffer overflows and race conditions, malicious code such as virus and worms. Statistical pattern recognition for detection and classification of attacks. Techniques for visualizing network data etc.

7-Game theory and its applications

Basics of game theory; Different types of games: two party, multi party games, coalition games ongraphs; Nash equilibrium; Walsarian and other equilibria, Analysis of optimal strategies; Applications of game theory (network economics, bandwidth allocations, etc).

8-Public Key Infrastructure and Trust Management

Digital Certificates and PKIs

Different PKIs:

  • PGP (Pretty Good Privacy)- Web of trust, applications
  • X.509: X.500, Certification Authority (CA), Registration Authority
  • (RA), Root - CA, X.509 Protocols, Hierarchy of Trust, Simple PKI
  • (SPKI) / Simple Distributed Security Infrastructure (SDSI); Access
  • Control Mechanisms including Role based access control.

Issues of revocation, Anonymity and Privacy issues

Smartcard integration with PKIs

Trust Management Systems, Risks

Impact on E-Commerce and E- Business

9-Mobile and Wireless Network Security

Wired/wireless networks; Effect of mobility on networks, & systems; impact on IP stack from MAC layer and up; ad-hoc and sensor networks; wireless broadcast, IP broadcast, Satellite broadcast; issues of information capacity; distinction between wired and wireless networks from information theory;

Issues of security in wireless; issues of 802.11 protocols; routing in wireless . networks, design of secure protocols: key distribution for access control, source authentication of transmissions, and non-repudiation; Power management and selfishness issues, attacks in wireless networks; DOS and DDOS attacks, reaction to attacks, information processing for sensor networks.

10-Optical Network Security

Opto-electronic networks, all optical networks: fibers, amplifiers and wavelength selective switches (WSSs), QoS, security architectures, Physical security, vulnerabilities and attacks, service disruption (SD), tapping, jamming, reaction to attacks.

11-Information Warfare

Nature of information warfare, including computer crime and information terrorism; Threats to information resources, including military and economic espionage, communications eavesdropping, computer break-ins, denial-of- service, destruction and modification of data, distortion and fabrication of information, forgery, control and disruption of information flow, electronic bombs, and psyops and perception management. Countermeasures, including authentication, encryption, auditing, monitoring, intrusion etection, and firewalls, and the limitations of those countermeasures.
Cyberspace law and law enforcement, information warfare and the military, and intelligence in the information age. Information warfare policy and ethical issues.

12-Technical Foundations for E-Commerce

Auctions and Trading Mechanisms, safe exchange, payment mechanisms and protocols, Searching hyperlinked structures, data mining, copyright protection and security, web software infrastructure, personalization and tracking, integration of catalogs and other trading information.

13- Biometric Security

Security via biometrics, Spaced Domain based biometric and recognition techniques; Correlation based biometric filters, Basic theory of Correlation filters; Design of advanced correlation filters that offer tolerance to expected impairments; Methods to implement digital correlations; Applications of correlation filters.

14-Computer Crime Investigation and Forensics

Industrial espionage and cyber-terrorism, principles of criminal law, computer forensic investigation, elements of personnel security and investigations, principles of risk and security management, conspiracy in computer crime, and computer fraud investigation.

15-Financial Mathematics

Analytical models for decision making and their applications, E-markets, supply chain formations, Auctions, e-auctions: classical, combinatorial, multi unit, proxy bidding, options trades, security issues, trust model for P2P e-commerce communities, micro and macro transactions.

Computer Science and Communication courses

1. Design of Survivable and Dependable Distributed Systems

Issues in the design of distributed systems, distributed OS, high-level protocols, distributed shared memory, OO distributed systems, distributed directory services, fault tolerance issues, issues of survivability, dependability, robustness.

2.Advanced Networks: Computers, Telecommunication and Packet

   Switching:Standard course in CS departments

3. Formal Techniques for Software Reliability :

Standard course in CS departments.

4-Databases and Data Mining:

Database design and use of DBMS, Relational models and Relational algebra and design principles, network models, object-oriented design, transaction processing, Datalog, temporal databases, advanced topics from data warehousing, knowledge discovery, data mining, middleware etc.

5-Advanced Operating System Design

Comparative study of OS; UNIX, Multics, Unix File System + Measurements, The Log-Structured File System, Server less Network File Systems, The Coda File System, AFS, Virtual Memory, User-Level Virtual Memory, Software Fault Isolation, On-Demand Distillation, X-Kernel, Active Messages, Global Network Scheduling, Network Optimization, Synchronization, Scheduling, Extensible Operating Systems, Issues of Security in OS, Cryptographic file systems.

6-Information theory and Coding

Overview; Basic Concepts - Entropy and Mutual information; Lossless Source Coding - Source entropy rate; Kraft inequality; Huffman code; Asymptotic equipartition property; Universal coding; Noisy Channel Coding - Channel capacity; Random channel codes; Noisy channel coding theorem for discrete memoryless channels; Typical sequences; Error exponents; Feedback; Continuous and Gaussian channels; Lossy Source Coding - Rate- Distortion functions; Random source codes; Joint source-channel coding and the separation theorem.

7-Machine Learning

Overview of Machine Learning. Concept Learning. Version Spaces. Inductive Bias. Induction of Decision Trees, overfitting, pruning. Evaluating Hypotheses. Bayesian Learning, Bayes Optimal Classifier, Naive Bayes Classifier, Bayesian Networks. Computational Learning Theory. Instance- Based Learning, k-Nearest Neighbor Learning, Locally Weighted Linear Regression. Genetic Algorithms, Genetic Programming. Learning Sets of Rules. Analytical Learning. Reinforcement Learning., PAC models, hidden Markov models, Genetic algorithms.

8-Embedded Systems:

Standard course in CS departments.

9- Quantum Information Processing

Quantum computing models, quantum algorithms, quantum tree search, quantum wavelets, quantum information theory, quantum cryptography, breaking RSA system, quantum teleportation, circuit design, quantum error correction, case studies.


1.Information Security Risk Management

Development of concepts required for risk-based planning and risk management of computer and information systems (Risk analysis, risk perception, risk communication, risk mitigation); Objectives and methods for vulnerability assessment for natural disaster, technological hazards, and terrorist threats; implications for emergency response, vulnerability of critical infrastructures;

2. Decision Support Systems and Methods

Computer-based decision-making aids and simulations. Issues in effective implementation of decision support systems. Review and analysis of various expert systems, including tools and generators, classification vs. diagnostic type systems, and building modules. Design of decision support and expert systems. Use of the Management Decision Center to investigate group dynamics in decision making. Methods of dealing with unstructured and under-specified problems from management and organizational perspectives. The role of the facilitator in group decision-making.

3.Cyber laws and rights in today's digital age

IT Act; The rights the various parties have with respect to creating, modifying, using distributing, storing and copying digital data - concurrent responsibilities and potential liabilities; Intellectual Property Issues connected with use and management of Digital Data. The similar Acts of other countries will also be discussed.

4. Computer Security Audit and Assurance

Security Policy frameworks: practices, and procedures, business practice disclosures, Policy authority and practices, information security practices, personal and physical security practices, operation management practices, PKIs and key management schemes, key generation, key storage, backup, recovery and distribution, XML frameworks for security policy specification, certificate management life cycle.

5.Strategic Computing and Communication Technology

(Competitive strategies for the information economy, network economics) Telecommunications and networking as applied to enterprises in the commercial and public sector. A survey of the technologies and applications of telecommunications systems with emphasis on LANs and Internet technologies. Selection of technologies and configurations necessary to support business applications. Competitive, economic, and political factors that influence technology innovation in public and private organizations, domestically and internationally. Management of research and development: project selection, resource allocation, technology planning, management of development projects. Quality, manufacturing, and intellectual property issues.

Major Project

The Students will do major project in Information Security.

Content owned & provided by Ministry Of Electronics & Information Technology, Government Of India

GIGW Certificate, The National Portal of India : External website that opens in a new window

  • Site Counter: 10,544,020