The information and program qualifications related to the Cybersecurity Engineering and Cryptography Doctor of Philosophy Program, under the Department of Applied Informatics of the Graduate School, are summarized below.
Information About The Program
The Cyber Security Engineering and Cryptography Doctoral Program aims to train highly qualified individuals to gain comprehensive knowledge and skills on information security, system security and network security. With the trained individuals, new algorithms and protocols will be designed to protect sensitive data. The program offers wide variety of courses that prepare students for further development in the general area of cyber security.
Click here for the program's website.
Registration Requirements
Application Term : 2024-2025 Spring Semester
Application Dates : 06.12.2024 09:00:00 - 03.02.2025 17:00:00 ( UTC/GMT+3 )
Application Requirements (For T.C Nationality) ALES Numerical must be minimum 75 (old system GRE Quantitative minimum 700, new system GRE minimum 155 ). Graduate GPA must be minimum 3.00/4 (76.66/100). Minimum GPA from undergraduate to doctorate must be 3.2/4 (81.33/100). An initial letter co-drafted with an ITU faculty member outlining a research proposal.
Quota (For T.C Nationality): 3
Application Requirements (For International Students) ALES Numerical must be minimum 75 (old system GRE Quantitative minimum 700, new system GRE minimum 155 ). Graduate GPA must be minimum 3.00/4 (76.66/100). Minimum GPA from undergraduate to doctorate must be 3.2/4 (81.33/100). An initial letter co-drafted with an ITU faculty member outlining a research proposal.
Quota (For International Students): 3
Application Page Graduate Education and Training Regulation Senate Principles
Application requirements, application dates, and quotas are updated in real-time from the Application System.
English Proficiency
Regulations and Guidelines
Academic Calendar
Course Plans
Course Schedules
Course Adjustment and Exemption Procedures
Program Educational Objectives
To have comprehensive knowledge on fundamental cryptographic methods and algorithms
To have the state of the art skill in system security, network security and cloud security areas
To be able to develop new algorithms and protocols
Train competent personnel in areas of cyber security and information security
Measurement and Evaluation
Evaluating Student Success
The student success is evaluated considering Articles 56, 57, 58, and 59 of the Istanbul Technical University Graduate Education and Training Regulation Senate Principles.
ARTICLE 56 - Before the enrollment for the courses begins, the faculty member who offers the course informs the Program Executive Committee about the types, number and contribution percentage to the final grade of the studies within the semester, as well as requirements for a right to take the semester final exam. These requirements shall be finalized by approval of the Program Executive Committee and approval of the chair of the department, who declares them to the student and informs the Graduate School.
ARTICLE 57 - A student may appeal the final grade of a course within one week following the announcement of the grades. Appeals must be submitted to the Graduate School in writing. The relevant faculty member shall re-evaluate the student's success status and submit the result to the Graduate School within one week. Appeals not submitted within the prescribed time frame shall not be considered by the Graduate School.
ARTICLE 58 - Courses in graduate programs shall be evaluated according to the following grading system.
Grade Description |
Grade |
Scale |
Excellent |
AA |
4.00 |
Very good plus |
BA+ |
3.75 |
Very good |
BA |
3.50 |
Good plus |
BB+ |
3.25 |
Good |
BB |
3.00 |
Conditional Pass |
CB+ |
2.75 |
Conditional Pass |
CB |
2.50 |
Conditional Pass |
CC+ |
2.25 |
Conditional Pass |
CC |
2.00 |
Fail |
FF |
0.00 |
Fail(No Exam) |
VF |
0.00 |
ARTICLE 59 - Students who wish to improve their cumulative grade point average may retake courses during the course-taking period. The most recent grade will be counted for the repeated courses.
Internship
There is no internship in this program.
Graduation Requirements
To complete 21 credits in total
To have taken at least cc for each course
30% English requirement (at least 6.3 credits)
GPA at least 3.0
To take at least 50% of the courses from 600 code courses
SEMINAR, BGK YET and BGK DRT courses are BL
One journal article (SCI index) has been published
The Awarded Degree and Title
Degree : Doctor of Philosophy Title : Doctor of Philosophy
Program Employment Opportunities
Graduate students will be able to participate in research groups. They will be able to work in reputable institutions (government-private) in the areas of information security, cyber security and cryptographic engineering.
Number of Graduates
Graduate Statistics
Year | Number of Graduates |
2020 | 1 |
2022 | 3 |
2024 | 4 |
Program Outcomes
P.O.1 Contributing to cryptographic algorithms
P.O.2 Development of national algorithms and software
P.O.3 Training of competent personnel in Cyber Security and Information Security
Program Coordinator
Head of the Department