Admission Assistant

x

Hey, I am MITS Admission Assistant Chatbot, May I help you?

x


A premier engineering college in the State, located at Kochi

COLLEGE CODE : MUT

Affiliated to APJ Abdul Kalam Technological University
Approved by AICTE

[email protected] | 0484-2883300/0484-2732100/111

Relentless passion for excellence...

(Promoted by The Muthoot Group)

DEPARTMENT OF Cyber Security

Department profile

 

 

The Department of Cyber Security, established in 2021, is a dynamic academic unit at MITS offering a full-time undergraduate program:

B.Tech in Computer Science and Engineering (Cyber Security) – 60 seats

This program is designed to meet the growing global need for cybersecurity professionals by providing students with a rigorous foundation in computer science, network technologies, and information security principles, integrated with specialized training in cryptography, ethical hacking, digital forensics, malware analysis, and secure software development.

The department follows an outcome-based education model, combining theoretical knowledge with hands-on learning through modern laboratories, industry-relevant tools, and project-based learning (PBL) modules. It emphasizes technical excellence, ethical responsibility, and continuous innovation to produce industry-ready graduates.

Visit us on Facebook Follow us in Instagram We are also on Youtube

Why #mitscse

We believe in delivering a holistic experience to every student undertaking our programmes. We attempt to aid their 360° experience through various methods like:

#Strong pedagogical practices involving use of technologies like subversioning (local version control systems / GitHub), project based learning, exposure to content management systems (Drupal), improving debugging skills, and reverse engineering.

#State-of-the-art add-on courses to supplement regular curriculum.

#Enabling participation in technical and non-technical events within and outside Kerala.

#Development of prototyping skills with the help of hackathons and competitions by professional bodies.

#Improvement in soft skills by regular interventions. 

#Collaboration with industries for add-on courses and projects.

Click here for Department Gallery

Dr. Vicky Nair
Associate Professor
Head of the Department

[email protected]

Message from the HoD

The Department of Cyber Security was established in the year 2021 with the vision of fostering a generation of professionals capable of securing the digital future. As the youngest department in our institution, we currently offer a B.Tech program in Cyber Security, designed with a unique blend of  computer science, electronics, and core cyber security domains.
Our department is powered by a team of highly qualified and passionate faculty members, state- of-the-art laboratories, and a forward-thinking curriculum that evolves with the dynamic needs of the cyber ecosystem. The academic structure emphasizes not only theoretical learning but also hands-on project-based learning (PBL), ensuring that our students are well-prepared to tackle real-world security challenges.
We maintain a carefully designed subject flow that progresses from computing fundamentals to advanced topics such as cryptography, ethical hacking, malware analysis, and security operations, aligned with current industry demands. Our students are actively engaged in internships, workshops, capture-the-flag (CTF) events, and collaborative projects that bridge the gap between academia and industry.
At the heart of our efforts lies a commitment to professional excellence, innovation, and ethical responsibility. We are shaping cybersecurity professionals who can anticipate threats, develop intelligent countermeasures, and contribute meaningfully to the safety of digital infrastructure—both nationally and globally.
We look forward to growing as a hub of academic excellence and innovation in the field of Cyber Security.

Vision

To emerge as a center of excellence in cybersecurity education and research, empowering graduates to secure digital ecosystems and address emerging security challenges with technical expertise and ethical responsibility.

Mission

Design and deliver experiential learning methods that strengthen students’ foundations in secure computing, ethical hacking, cryptography, and digital forensics.
1. Foster critical thinking and analytical problem-solving to address evolving cyber threats using advanced tools and threat modeling techniques.
2. Build strong professional and interdisciplinary networks to remain current with global security standards, policies, and practices.
3. Promote research and innovation in privacy, secure system design, threat intelligence, and AI-driven cybersecurity applications.
4. Encourage socially responsible practices by advocating cyber hygiene, digital rights, and secure use of technologies in communities.

Program Outcomes (POs)

PO1: Engineering Knowledge: Apply knowledge of mathematics, natural science, computing, engineering fundamentals and an engineering specialization as specified in WK1 to WK4 respectively to develop to the solution of complex engineering
problems.
PO2: Problem Analysis: Identify, formulate, review research literature and analyze complex engineering problems reaching substantiated conclusions with consideration for sustainable development. (WK1 to WK4)
PO3: Design/Development of Solutions: Design creative solutions for complex
engineering problems and design/develop systems/components/processes to meet identified needs with consideration for the public health and safety, whole-life cost, net zero carbon, culture, society and environment as required. (WK5)
PO4: Conduct Investigations of Complex Problems: Conduct investigations of
complex engineering problems using research-based knowledge including design of experiments, modelling, analysis & interpretation of data to provide valid conclusions. (WK8).
PO5: Engineering Tool Usage: Create, select and apply appropriate techniques,
resources and modern engineering & IT tools, including prediction and modelling recognizing their limitations to solve complex engineering problems. (WK2 and WK6)
PO6: The Engineer and The World: Analyze and evaluate societal and environmental aspects while solving complex engineering problems for its impact on sustainability with reference to economy, health, safety, legal framework, culture and environment. (WK1, WK5, and WK7).
PO7: Ethics: Apply ethical principles and commit to professional ethics, human values, diversity and inclusion; adhere to national & international laws. (WK9)
PO8: Individual and Collaborative Team work: Function effectively as an individual, and as a member or leader in diverse/multi-disciplinary teams.
PO9: Communication: Communicate effectively and inclusively within the engineering community and society at large, such as being able to comprehend and write effective reports and design documentation, make effective presentations considering cultural, language, and learning differences
PO10: Project Management and Finance: Apply knowledge and understanding of engineering management principles and economic decision-making and apply these to one’s own work, as a member and leader in a team, and to manage projects and in multidisciplinary environments.
PO11: Life-Long Learning: Recognize the need for, and have the preparation and ability for i) independent and life-long learning ii) adaptability to new and emerging technologies and iii) critical thinking in the broadest context of technological change.
(WK8)

Program Educational Objectives (PEOs)

PEO1: Graduates will demonstrate professional competence by contributing to secure system design, threat mitigation, and cyber defense strategies in diverse work environments.
PEO2: Graduates will take leadership roles in addressing complex cybersecurity challenges and advocating for security-first digital practices.
PEO3: Graduates will commit to continuous learning and ethical responsibility, actively promoting cyber awareness, regulatory compliance, and resilience in a connected society.

Program Specific Outcomes (PSOs)

PSO1: Apply core principles of computer science, cryptography, and networking to design, analyze, and implement secure systems and protocols for varied computing environments.
PSO2: Utilize tools and techniques in ethical hacking, digital forensics, malware analysis, and risk assessment to detect, prevent, and respond to cybersecurity incidents.