The information and program qualifications related to the Cybersecurity Engineering and Cryptography Doctor of Philosophy Program, under the Department of Applied Informatics of the Informatics Institute, are summarized below.
Information About The Program
The courses and research conducted within the Information Security Engineering and Cryptography PhD Program aim to protect critical data such as in the fields of health and education, against cyberattacks. The program is designed to equip students with in‑depth academic knowledge and practical skills in information security, system security, and network and web application security. Through the development of new algorithms and scientific studies, the program will contribute to the advancement of the field, while the creation of national software solutions will help reduce external dependency.
Click here for the program's website.
Active Student Count
Program Profile
The PhD Program in Cybersecurity Engineering and Cryptography is designed as a comprehensive academic framework that equips students with advanced knowledge, skills, and research capabilities for ensuring the security of critical and private data. The primary aim of the program is to train innovative, research‑oriented scholars who can specialize in information security, system security, network security, and cryptography in an era where cyber threats are becoming increasingly complex.
In this direction, the program aims to:
• Train experts capable of analyzing security vulnerabilities and designing and implementing new security mechanisms
• Support original scientific research on cryptographic algorithms, secure software development, and cyber‑defense technologies
• Develop national and domestic solutions tailored to the country’s security needs
• Promote academic knowledge production and contribute to the field at an international level
The program ultimately seeks to cultivate highly qualified specialists who can take leadership roles in both academia and industry, actively contribute to research and development processes, and provide strategic value to the information security ecosystem.
Registration Requirements
Application Term : Previous Application / 2025-2026 Spring Semester
2025-2026 Bahar Dönemi / There is no quota available for T.C Nationality.
2025-2026 Bahar Dönemi / There is no quota available for international applicants. Click here for quotas and conditions for all semesters.
Application requirements, application dates, and quotas are updated in real-time from the Application System.
Program Learning Environments
The PhD Program in Cybersecurity Engineering and Cryptography offers a rich and multifaceted learning environment where students can transform theoretical knowledge into practical expertise. Within the program:
• Advanced laboratory infrastructures including cryptography workspaces, and network simulation environments enable hands‑on work with real attack scenarios.
• Modern software tools, security testing platforms, and open‑source analysis environments support the development of practical skills.
• Project‑based learning allows students to produce original solutions both individually and in teams.
• Academic seminars, workshops, and events featuring expert speakers help students stay up to date with current developments in the field.
• A research‑oriented academic culture encourages students to develop new algorithms, produce scientific publications, and take active roles in national and international projects.
• Industry collaborations provide opportunities to work on real‑world problems and gain direct exposure to sector‑specific applications.
These learning environments aim to equip students with deep expertise in information security and cryptography, enabling them to develop innovative solutions and establish strong academic or industry careers.
English Proficiency
Regulations and Guidelines
Academic Calendar
Course Plans
Course Schedules
Course Adjustment and Exemption Procedures
Program Educational Objectives
To have comprehensive knowledge on fundamental cryptographic methods and algorithms
To have the state of the art skill in system security, network security and cloud security areas
To be able to develop new algorithms and protocols
Train competent personnel in areas of cyber security and information security
Measurement and Evaluation
Evaluating Student Success
The student success is evaluated considering Articles 56, 57, 58, and 59 of the Istanbul Technical University Graduate Education and Training Regulation Senate Principles.
ARTICLE 56 - Before the enrollment for the courses begins, the faculty member who offers the course informs the Program Executive Committee about the types, number and contribution percentage to the final grade of the studies within the semester, as well as requirements for a right to take the semester final exam. These requirements shall be finalized by approval of the Program Executive Committee and approval of the chair of the department, who declares them to the student and informs the Graduate School.
ARTICLE 57 - A student may appeal the final grade of a course within one week following the announcement of the grades. Appeals must be submitted to the Graduate School in writing. The relevant faculty member shall re-evaluate the student's success status and submit the result to the Graduate School within one week. Appeals not submitted within the prescribed time frame shall not be considered by the Graduate School.
ARTICLE 58 - Courses in graduate programs shall be evaluated according to the following grading system.
| Grade Description |
Grade |
Scale |
| Excellent |
AA |
4.00 |
| Very good plus |
BA+ |
3.75 |
| Very good |
BA |
3.50 |
| Good plus |
BB+ |
3.25 |
| Good |
BB |
3.00 |
| Conditional Pass |
CB+ |
2.75 |
| Conditional Pass |
CB |
2.50 |
| Conditional Pass |
CC+ |
2.25 |
| Conditional Pass |
CC |
2.00 |
| Fail |
FF |
0.00 |
| Fail(No Exam) |
VF |
0.00 |
ARTICLE 59 - Students who wish to improve their cumulative grade point average may retake courses during the course-taking period. The most recent grade will be counted for the repeated courses.
Internship
There is no internship in this program.
Graduation Requirements
To complete 21 credits in total
To have taken at least cc for each course
30% English requirement (at least 6.3 credits)
GPA at least 3.0
To take at least 50% of the courses from 600 code courses
SEMINAR, BGK YET and BGK DRT courses are BL
One journal article (SCI index) has been published
The Awarded Degree and Title
Degree : Doctor of Philosophy Title : Doctor of Philosophy
Program Employment Opportunities
Graduate students will be able to participate in research groups. They will be able to work in reputable institutions (government-private) in the areas of information security, cyber security and cryptographic engineering.
Number of Graduates
Graduate Statistics (Last Five Years)
| Year | Number of Graduates |
| 2020 | 1 |
| 2022 | 3 |
| 2024 | 4 |
Program Outcomes
P.O.1 Contributing to cryptographic algorithms
P.O.2 Development of national algorithms and software
P.O.3 Training of competent personnel in Cyber Security and Information Security
Turkish Qualifications Database
The qualification has not yet been incorporated into the TYÇ.
Program Coordinator
Head of the Department