Cybersecurity Engineering and Cryptography Doctor of Philosophy Program




The information and program qualifications related to the Cybersecurity Engineering and Cryptography Doctor of Philosophy Program, under the Department of Applied Informatics of the Informatics Institute, are summarized below.

Information About The Program

The courses and research conducted within the Information Security Engineering and Cryptography PhD Program aim to protect critical data such as in the fields of health and education, against cyberattacks. The program is designed to equip students with in‑depth academic knowledge and practical skills in information security, system security, and network and web application security. Through the development of new algorithms and scientific studies, the program will contribute to the advancement of the field, while the creation of national software solutions will help reduce external dependency.

Click here for the program's website.

Active Student Count

Click for detailed student count.



Program Profile

The PhD Program in Cybersecurity Engineering and Cryptography is designed as a comprehensive academic framework that equips students with advanced knowledge, skills, and research capabilities for ensuring the security of critical and private data. The primary aim of the program is to train innovative, research‑oriented scholars who can specialize in information security, system security, network security, and cryptography in an era where cyber threats are becoming increasingly complex.
In this direction, the program aims to:
• Train experts capable of analyzing security vulnerabilities and designing and implementing new security mechanisms
• Support original scientific research on cryptographic algorithms, secure software development, and cyber‑defense technologies
• Develop national and domestic solutions tailored to the country’s security needs
• Promote academic knowledge production and contribute to the field at an international level
The program ultimately seeks to cultivate highly qualified specialists who can take leadership roles in both academia and industry, actively contribute to research and development processes, and provide strategic value to the information security ecosystem.


Registration Requirements

Application Term : Previous Application / 2025-2026 Spring Semester

2025-2026 Bahar Dönemi / There is no quota available for T.C Nationality.

2025-2026 Bahar Dönemi / There is no quota available for international applicants.

Click here for quotas and conditions for all semesters.
Application requirements, application dates, and quotas are updated in real-time from the Application System.


Program Learning Environments

The PhD Program in Cybersecurity Engineering and Cryptography offers a rich and multifaceted learning environment where students can transform theoretical knowledge into practical expertise. Within the program:
• Advanced laboratory infrastructures including cryptography workspaces, and network simulation environments enable hands‑on work with real attack scenarios.
• Modern software tools, security testing platforms, and open‑source analysis environments support the development of practical skills.
• Project‑based learning allows students to produce original solutions both individually and in teams.
• Academic seminars, workshops, and events featuring expert speakers help students stay up to date with current developments in the field.
• A research‑oriented academic culture encourages students to develop new algorithms, produce scientific publications, and take active roles in national and international projects.
• Industry collaborations provide opportunities to work on real‑world problems and gain direct exposure to sector‑specific applications.
These learning environments aim to equip students with deep expertise in information security and cryptography, enabling them to develop innovative solutions and establish strong academic or industry careers.


English Proficiency



Regulations and Guidelines

Regulations and Guidelines


Academic Calendar

Academic Calendar


Course Plans



Course Schedules



Course Adjustment and Exemption Procedures

Course adjustment and exemption procedures are carried out in accordance with the Exemption and Adjustment Procedures Regulation of Istanbul Technical University.
Exemption and Adjustment Procedures Regulation


Program Educational Objectives

 To have comprehensive knowledge on fundamental cryptographic methods and algorithms
 To have the state of the art skill in system security, network security and cloud security areas
 To be able to develop new algorithms and protocols
 Train competent personnel in areas of cyber security and information security


Measurement and Evaluation

Evaluating Student Success
The student success is evaluated considering Articles 56, 57, 58, and 59 of the Istanbul Technical University Graduate Education and Training Regulation Senate Principles.

ARTICLE 56 - Before the enrollment for the courses begins, the faculty member who offers the course informs the Program Executive Committee about the types, number and contribution percentage to the final grade of the studies within the semester, as well as requirements for a right to take the semester final exam. These requirements shall be finalized by approval of the Program Executive Committee and approval of the chair of the department, who declares them to the student and informs the Graduate School.

ARTICLE 57 - A student may appeal the final grade of a course within one week following the announcement of the grades. Appeals must be submitted to the Graduate School in writing. The relevant faculty member shall re-evaluate the student's success status and submit the result to the Graduate School within one week. Appeals not submitted within the prescribed time frame shall not be considered by the Graduate School.

ARTICLE 58 - Courses in graduate programs shall be evaluated according to the following grading system.
Grade Description Grade Scale
Excellent AA 4.00
Very good plus BA+ 3.75
Very good BA 3.50
Good plus BB+ 3.25
Good BB 3.00
Conditional Pass CB+ 2.75
Conditional Pass CB 2.50
Conditional Pass CC+ 2.25
Conditional Pass CC 2.00
Fail FF 0.00
Fail(No Exam) VF 0.00

ARTICLE 59 - Students who wish to improve their cumulative grade point average may retake courses during the course-taking period. The most recent grade will be counted for the repeated courses.


Internship

There is no internship in this program.


Graduation Requirements

To complete 21 credits in total
 To have taken at least cc for each course
 30% English requirement (at least 6.3 credits)
 GPA at least 3.0
 To take at least 50% of the courses from 600 code courses
 SEMINAR, BGK YET and BGK DRT courses are BL
 One journal article (SCI index) has been published


The Awarded Degree and Title

Degree : Doctor of Philosophy    Title : Doctor of Philosophy


Program Employment Opportunities

Graduate students will be able to participate in research groups. They will be able to work in reputable institutions (government-private) in the areas of information security, cyber security and cryptographic engineering.


Number of Graduates

Graduate Statistics (Last Five Years)
YearNumber of Graduates
20201
20223
20244


Program Outcomes

P.O.1 Contributing to cryptographic algorithms
P.O.2 Development of national algorithms and software
P.O.3 Training of competent personnel in Cyber Security and Information Security


Turkish Qualifications Database

The qualification has not yet been incorporated into the TYÇ.



Program Coordinator

Doç. Dr. Enver Özdemir
E-mail: ozdemiren@itu.edu.tr
Business Phone : 0212-2857125
Web: https://research.itu.edu.tr/tr/persons/ozdemiren


Head of the Department

Prof. Dr. Behçet Uğur Töreyin
E-mail: toreyin@itu.edu.tr
Business Phone : 0212-2857392
Web: https://research.itu.edu.tr/tr/persons/toreyin