Computer & IT – Cyber Security
Introduction to course
Welcome to our M.Tech. program in Computer & IT – Cyber Security, where we dive deep into the critical realm of safeguarding digital assets and protecting against cyber threats. This program is tailored for individuals passionate about ensuring the security and integrity of digital systems and networks. Through a comprehensive curriculum, hands-on projects, and industry collaborations, students explore cutting-edge techniques in cyber defence, cryptography, network security, and risk management.
Mission
- To provide an advanced and adaptive curriculum that integrates core computing principles with emerging digital technologies, equipping students to excel in a global technological landscape.
- To foster a collaborative research environment where students and faculty address complex technological challenges, contributing to advancements in recent trends of the computer era.
- To develop ethical and responsible leaders who are committed to making a positive impact on society through innovative technological solutions.
- To build strong industry and community partnerships, offering students practical learning experiences and promoting entrepreneurship and sustainable technological practices.
Vision
To lead in the creation of digital innovators and ethical technologists who drive
sustainable development and societal advancement through excellence in
education, research, and industry collaboration

Course objective
- Explore emerging technologies and trends in cybersecurity, including threat intelligence and incident response.
- Gain hands-on experience in conducting vulnerability assessments, penetration testing, and security audits.
- Develop critical thinking and problem-solving abilities to analyze and mitigate cybersecurity threats effectively.
- Collaborate with industry partners on real-world projects to apply cybersecurity concepts in practical scenarios.
- Cultivate ethical and professional values to uphold the integrity and confidentiality of digital systems and data.
- Stay updated with evolving cybersecurity standards and regulations through continuous learning and professional development.
Course outcome
- Analyze and assess cybersecurity risks, vulnerabilities, and threats in various IT environments.
- Develop and implement effective cybersecurity strategies, policies, and procedures to protect digital assets.
- Conduct ethical hacking and penetration testing to identify and mitigate security weaknesses.
- Communicate cybersecurity findings, recommendations, and solutions effectively to diverse stakeholders.
- Collaborate in multidisciplinary teams to address complex cybersecurity challenges and develop innovative solutions.
- Adhere to ethical and professional standards in cybersecurity practice, including privacy and compliance regulations.
Admission procedure
Check Eligibility (Physics + Maths + Chemistry / Computer)
Board |
Category |
Theory Marks |
Theory + Practical Marks |
---|---|---|---|
GSEB |
Open |
135 / 300 |
180 / 400 |
GSEB |
Reserve |
120 / 300 |
180 / 400 |
Other Boards |
Open |
108 / 240 |
135 / 300 |
Other Boards |
Reserve |
96 / 240 |
120 / 300 |
Required Documents
- SSC
- HSC
- GUJCET mark-sheet
- Leaving certificate (applicable for all)
- Income certificate
- Caste certificate, NCL (if applicable)
Curriculum
- Duration: 4 years
- Fees: Rs. 70,000
- Intake: 60
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
GTU Code | Subject | Theory(Hrs) | Tutorial(Hrs) | Practical(Hrs) | Credits |
---|---|---|---|---|---|
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
3110000 | Lorem Ipsum | 0 | 0 | 0 | 0 |
Faculty
Labs and facilities

Photo gallery

