Master of Technology

Information Technology (Information Security) | M.Tech IT(IS)

This is a 2 years full time post graduate program, offered under Somaiya Vidyavihar University. The PG course is spread over two years in four semesters and inclusion of specialized laboratories, mandatory non-credit courses, open electives and dissertation are the special features of the curriculum. The students are also exposed to learn IPR/ research methodology to understand importance and process of creation of patents through research.

The students have an opportunity to do an industry internship of 5 months in their Sem-IV which can lead to a job offer from the same company. The exercise of drafting our PG curriculum has been undertaken along with feedback from experts from industry, research organizations and alumni to make it relevant, dynamic and updated. The embedded internship leading to placement offers a unique opportunity to apply the skills learnt on real-life projects. This, in turn, prepares graduates of the programme for successful careers in both the information security and digital forensics professions. Our information Security engineers are working in industries, including Banks, Digital Forensics, Security solutions….

show more... show less...

Key Information


The teaching-learning-evaluation (TLE) paradigm is a mix of traditional as well as active learning pedagogy and use of contemporary ICT tools. The TLE process is facilitated by faculty members with the use of active learning strategies and ICT like Do-it-Yourself, Think Pair Share, Google Classroom, LMS – Moodle etc. The MOOCs courses are used for blended learning of the students. The projects are assigned as per students’ choice mapped with Information Security domain. Evaluation is done by a variety of tools including Open book test, MCQ, Study of Research paper, Internal Assessment tools etc. Laboratory courses are offered to encourage project-based learning among students. Specialized Laboratory with a dedicated leased line for carrying out various information security-related tasks such as Penetration Testing and Vulnerability Analysis, Digital forensics and Advanced Offensive Security is used to make learning interesting for students.



First Curriculum revision under Somaiya Vidyavihar University.


Formation of Somaiya Vidyavihar University. Second curriculum revision


First curriculum revision


Excellent PG (first batch) placements


Commencement of M Tech Programme. Received autonomous status from University of Mumbai


Got AICTE Approval. Commencement of M.E Programme

Eminent Alumni

Career Paths

  • IT Security Analyst
  • IT Security Consultant
  • Chief Information Security Officer
  • IT Security Auditor
  • Information Analyst
  • Lead Security & Compliance Engineer
  • IT Security Manager (Incident Management)
  • Penetration and Vulnerability Tester
  • Computer Forensic Analyst
  • Secure Software Architect


Semester I Semester II
Digital Forensics and Analysis Information Security Compliance
Secure Software Development Modeling and Analysis of Security Protocols
Digital Forensics Laboratory Applied Cryptography
  Core Elective 1
Vulnerability Analysis and Penetration Testing Laboratory Cyber laws and Cyber Crime Investigation Cloud Computing Security
Application and Web Security Laboratory Elective Laboratory I
Programming Techniques (Shell Scripting) Advanced Offensive Security Laboratory
Research Methodology & Intellectual property Rights Professional Communication and Practices
Mandatory Non Credit Course Mandatory Non Credit Course


Semester Long Industrial Internship

Compulsory 5 month long internship in information security related industry in the fourth semester leading to placement.

Specialized Laboratory to Promote Development of Industry Specific Skillset
  • Laboratory with the dedicated leased line - For developing information security industry-specific skill set in students
  • Extensive Laboratory-based courses
  • Availability of licensed tools such as Encase, Oxygen, Burpsuite, Metasploit, Canvas for laboratory use
  • Extensive use of Open Sources Technologies
Collaboration with Open Security Communities like Nullcon, Cyber Peace Foundation
  • Exposes students to an extensive platform for the exchange of information about zero-day vulnerabilities, latest attack vectors, and other cyber threats. Also students can participate in events and conferences where security researchers and experts from various fields discuss information security, along with showcasing multiple offensives and defensive security technologies.
Consistent Placements
  • Excellent Placement record
All Round Development of Students
  • The choice for branch-specific electives, more number of open or interdisciplinary electives
  • The platform for Professional growth - CodeCell, CSI Council, e-Outreach etc.
  • Inclusive Education
  • Active Learning Strategies
  • Use of ICT tools for teaching-learning and evaluation
  • Choice-based Audit Courses, Add on Credit Courses, Add on Audit Courses, Exposure Courses, etc.

Programme Outcomes

Independently carry out research /investigation and development work to solve practical problems.

Write and present a substantial technical report/document.

Demonstrate a degree of mastery over the area as per the specialization of the program. The mastery should be at a level higher than the requirements in the appropriate bachelor program.

Acquaint security measures and contemporary tools for information security management.

Apprehend legal aspects of cyber security, risk assessment, security audit, incidence response, regulations and compliance.

Manifest professional prowess and lifelong learning.

You may also be interested in ?

Apply Now Enquire Now