The information and program qualifications related to the Cybersecurity Engineering and Cryptography Doctor of Philosophy  Program, under the Department of Applied Informatics of the Informatics Institute, are summarized below.
  Information About The Program
  Information About The Program
							
	
	 The Cyber Security Engineering and Cryptography Doctoral Program aims to train highly qualified individuals to gain comprehensive knowledge and skills on information security, system security and network security. With the trained individuals, new algorithms and protocols will be designed to protect sensitive data. The program offers wide variety of courses that prepare students for further development in the general area of cyber security.
 Click here for the program's website.  
 Registration Requirements
  Registration Requirements
Application Term :   Previous Application  /   2025-2026 Fall Semester 
Application Requirements  (For T.C Nationality) ALES Numerical must be minimum 80 (old system GRE Quantitative minimum 720, new system GRE minimum 156 ).  Graduate GPA must be minimum 3.00/4 (76.66/100). Minimum GPA from undergraduate to doctorate must be 3.2/4 (81.33/100). Graduation must be All Engineering, Cybersecurity Engineering and Cryptography, Mathematic, Mathematics and Computer Science. It is required to have the statement of purpose approved by a faculty member of the Informatics Institute.
Quota  (For T.C Nationality): 3
Application Requirements  (For International Students) ALES Numerical must be minimum 80 (old system GRE Quantitative minimum 720, new system GRE minimum 156 ).  Graduate GPA must be minimum 3.00/4 (76.66/100). Minimum GPA from undergraduate to doctorate must be 3.2/4 (81.33/100). Graduation must be All Engineering, Cybersecurity Engineering and Cryptography, Mathematic, Mathematics and Computer Science. It is required to have the statement of purpose approved by a faculty member of the Informatics Institute.
Quota  (For International Students): 3
 Application Page Graduate Education and Training Regulation Senate Principles
 Application requirements, application dates, and quotas are updated in real-time from the Application System.
 
 English Proficiency
  English Proficiency
	
 Regulations and Guidelines
   Regulations and Guidelines
	
 Academic Calendar
   Academic Calendar
	
 Course Plans
  Course Plans
 Course Schedules
 Course Schedules
	
 Course Adjustment and Exemption Procedures
  Course Adjustment and Exemption Procedures
	
 Program Educational Objectives
 Program Educational Objectives
			
			To have comprehensive knowledge on fundamental cryptographic methods and algorithms
	To have the state of the art skill in system security, network security and cloud security areas
	To be able to develop new algorithms and protocols
	Train competent personnel in areas of cyber security and information security
		
 Measurement and Evaluation
 Measurement and Evaluation
			
			Evaluating Student Success
			The student success is evaluated considering Articles 56, 57, 58, and 59 of the Istanbul Technical University Graduate Education and Training Regulation Senate Principles.
			
ARTICLE 56 - Before the enrollment for the courses begins, the faculty member who offers the course informs the Program Executive Committee about the types, number and contribution percentage to the final grade of the studies within the semester, as well as requirements for a right to take the semester final exam. These requirements shall be finalized by approval of the Program Executive Committee and approval of the chair of the department, who declares them to the student and informs the Graduate School.
			
ARTICLE 57 - A student may appeal the final grade of a course within one week following the announcement of the grades. Appeals must be submitted to the Graduate School in writing. The relevant faculty member shall re-evaluate the student's success status and submit the result to the Graduate School within one week. Appeals not submitted within the prescribed time frame shall not be considered by the Graduate School.
			
ARTICLE 58 - Courses in graduate programs shall be evaluated according to the following grading system.
			
				
								
							
																							
													
														| Grade Description | Grade | Scale | 
												
												
											
												| Excellent | AA | 4.00 | 
							
											
												| Very good plus | BA+ | 3.75 | 
											
											
												| Very good | BA | 3.50 | 
											
												
												| Good plus | BB+ | 3.25 | 
											
												| Good | BB | 3.00 | 
											
												| Conditional Pass | CB+ | 2.75 | 
											
											
												| Conditional Pass | CB | 2.50 | 
											
											
												| Conditional Pass | CC+ | 2.25 | 
											
												| Conditional Pass | CC | 2.00 | 
											
											
												| Fail | FF | 0.00 | 
										
											
											
												| Fail(No Exam) | VF | 0.00 | 
	
											
												
												
				ARTICLE 59 -  Students who wish to improve their cumulative grade point average may retake courses during the course-taking period. The most recent grade will be counted for the repeated courses.
 
 Internship
 Internship
		There is no internship in this program.
 Graduation Requirements
 Graduation Requirements
To complete 21 credits in total
   To have taken at least cc for each course
   30% English requirement (at least 6.3 credits)
   GPA at least 3.0
   To take at least 50% of the courses from 600 code courses
   SEMINAR, BGK YET and BGK DRT courses are BL
   One journal article (SCI index) has been published
 
  The Awarded Degree and Title
 The Awarded Degree and Title 
Degree : Doctor of Philosophy    Title :  Doctor of Philosophy
 Program Employment Opportunities
   Program Employment Opportunities
			
		Graduate students will be able to participate in research groups. They will be able to work in reputable institutions (government-private) in the areas of information security, cyber security and cryptographic engineering.
		
 Number of Graduates
  Number of Graduates 
 Graduate Statistics
				
					
						| Year | Number of Graduates | 
| 2020 | 1 | 
| 2022 | 3 | 
| 2024 | 4 | 
  
 
 Program Outcomes
 Program Outcomes 
P.O.1 Contributing to cryptographic algorithms
 
P.O.2 Development of national algorithms and software 
P.O.3 Training of competent personnel in Cyber Security and Information Security 
 Program Coordinator
 Program Coordinator
			
 Head of the Department
 Head of the Department