Master’s in Cybersecurity
As Cambodia undergoes a rapid digital transformation, the need for advanced cyber defense has never been more critical. Our Master’s in Cybersecurity program bridges the gap between foundational knowledge and elite technical expertise. We prepare you to design, implement, and manage robust security architectures while fostering a culture of innovation and research to solve modern digital threats.
About Program
Protect the Digital Frontier
Our Master’s in Cybersecurity program is designed to transform IT professionals into high-level security architects. By integrating globally recognized certifications with advanced technical training, we equip you with the skills to protect national infrastructure and private enterprises. Our mission is to foster a new generation of researchers and entrepreneurs capable of developing local cybersecurity solutions in an increasingly AI-driven world.
Program Summary
Class: Full-time, Monday – Friday
Time: 8:30AM – 4:30PM
Language: Khmer & English
Duration: 6 trimesters (2 years) – 12 Weeks (maximum) / trimester
Modality: On Campus
Location: Bridge 2, National Road 6A, Sangkat Prek Leap, Khan Chroy, Phnom Penh
Open Application: 1 April 2026 – 13 July 2026
Exam: 27-30 July 2026
Interview: 10-13 August 2026
Enrolment: 24-28 August 2026
Orientation: 1 September 2026
Start Academic Year: 1 September 2026
Learning Outcome
Beyond Education
Our program is built on four comprehensive domains designed to bridge the gap between classroom learning and national security. Master offensive operations, navigate complex global regulations, and protect the physical systems that power our world.
Defensive Security
Designing, building, and maintaining resilient digital systems while effectively responding to security incidents. Emphasizes security-by-design, system hardening, proactive threat mitigation, and incident response for IT and OT environments.
Offensive Security
Adopting the “think like a hacker” mindset to identify and analyze vulnerabilities. Covers ethical hacking, penetration testing, adversarial testing, and threat intelligence to strengthen system defenses.
Governance, Risk, Compliance (GRC)
Aligning cybersecurity with organizational strategy, legal frameworks, and ethical standards. Includes professional and ethical behavior, risk management, and compliance.
Cyber-Industrial Systems, Research & Innovation
Securing industrial and enterprise systems while turning research into practical solutions. Focuses on IT/OT security, critical infrastructure protection, AI-driven defenses, and entrepreneurial innovation.
Career Path
Blue Team (Defensive)
-
- Cybersecurity Analyst
- Security Architect
- Incident Response Specialist
- Cloud Security Engineer
- DevSecOps Engineer
Red Team (Offensive)
-
- Penetration Tester
- Ethical Hacker
- Vulnerability Analyst
GRC
-
- IT Security Manager
- Security Auditor
- Risk & Compliance Officer
Research, Innovation & Entrepreneurship
-
- Cybersecurity Researcher
- Lecturer
- Tech Startup Founder
Other Opportunity
Beyond the
Classroom
Our commitment to your success extends far past graduation. From national infrastructure roles to global tech leadership, we empower our students to find their place in the evolving digital landscape.
Job opportunities at CADT, MPTC, and partner companies
Secure a pathway into leading institutional roles. Our graduates are top-tier candidates for specialized positions within CADT, MPTC, and our growing network of industry partners.
Job opportunities in various companies (local and international)
Whether it’s a local tech firm or an international cybersecurity giant, our curriculum prepares you for the highest standards of the global job market.
Ph.D. scholarship
Continue your journey into research and innovation. Exceptional students may qualify for Ph.D. scholarship opportunities to drive the next wave of cybersecurity advancements.
Curriculum
Term 1
Network Security
Master the strategies for defending interconnected systems. This course covers the design of secure network architectures, firewall implementation, and the protocols required to protect data in transit from unauthorized access and interception.
Credit: 2 Hour: 45 Course: 15 Lab: 30
Penetration Testing
Adopt the “think like a hacker” mindset to identify and exploit system vulnerabilities. You will learn professional ethical hacking methodologies, from initial reconnaissance to post-exploitation, ensuring organizations stay one step ahead of attackers.
Credit: 2 Hour: 45 Course: 15 Lab: 30
Digital Forensics
Learn the science of recovering and investigating material found in digital devices. This course focuses on the preservation of evidence, forensic analysis of cybercrime scenes, and the technical procedures required for legal and investigative reporting.
Credit: 1 Hour: 15 Course: 15 Lab: 0
Professionalism in Computing and Ethics
Explore the ethical responsibilities of cybersecurity professionals. This module addresses the legal frameworks, privacy concerns, and moral dilemmas inherent in managing sensitive data and protecting digital infrastructures in a global society.
Credit: 2 Hour: 30 Course: 30 Lab: 0
Research Methodology and Experimental Evaluation
Develop the analytical skills necessary for advanced cybersecurity research. You will learn how to design rigorous experiments, evaluate security solutions through data-driven evidence, and document findings to contribute to the global knowledge base.
Credit: 2 Hour: 30 Course: 30 Lab: 0
Soft Skills (Communication & Critical Thinking)
Bridge the gap between technical expertise and organizational leadership. This course focuses on translating complex security risks into actionable business insights and developing the critical thinking skills needed to solve high-pressure security crises.
Credit: 1 Hour: 15 Course: 15 Lab: 0
Colloquium I
Engage with industry experts and peers through a series of seminars and discussions. This interactive forum explores current trends, emerging threats, and the latest innovations in the cybersecurity landscape to broaden your professional perspective.
Credit: 0.25 Hour: 4 Course: 4 Lab: 0
Term 2
HSI (Human-Systems Integration)
Explore the critical intersection between human behavior and digital systems. This course focuses on designing security interfaces that minimize human error, understanding social engineering psychology, and ensuring that security protocols are both effective and user-friendly.
Credit: 2 Hour: 30 Course:30 Lab: 0
Security Benchmarking and Hardening
Learn how to systematically secure systems against known threats. You will master industry-standard benchmarks (such as CIS) to evaluate system security and apply rigorous hardening techniques to operating systems, applications, and network devices.
Credit: 1.5 Hour: 30 Course: 15 Lab: 15
Advanced Security Analyze
Explore the ethical responsibilities of cybersecurity professionals. This module addresses the legal frameworks, privacy concerns, and moral dilemmas inherent in managing sensitive data and protecting digital infrastructures in a global society.
Credit: 2 Hour: 45 Course: 15 Lab: 30
Advanced Penetration Testing
Take your offensive skills to the next level by simulating complex, multi-stage attacks. This course covers advanced evasion techniques, pivoting through compromised networks, and breaching modern security perimeters in highly controlled, realistic environments.
Credit: 1.5 Hour: 30 Course: 15 Lab: 15
AI and Data Science for Cybersecurity
Leverage the power of machine learning to automate threat detection and response. You will study how to train models to recognize malicious patterns, analyze large-scale security datasets, and use AI to stay ahead of automated, high-velocity cyber attacks.
Credit: 2.5 Hour: 45 Course: 30 Lab: 15
Colloquium II
Continue your engagement with the global security community. This second forum focuses on emerging research and the “entrepreneurial mindset,” encouraging students to discuss innovative solutions to the latest high-profile breaches and industry trends.
Credit: 0.25 Hour: 4 Course: 4 Lab: 10
Term 3
Information Security Mangement System
Learn how to design and implement a comprehensive framework to protect organizational information assets. This course covers the establishment of security policies, risk management methodologies, and the implementation of international standards like ISO/IEC 27001.
Credit: 2 Hour: 45 Course: 15 Lab: 30
IT Audit and Compliance
Master the techniques for evaluating an organization’s internal controls and adherence to regulatory requirements. You will learn how to conduct thorough security audits, assess risks, and ensure the organization remains compliant with global and local legal frameworks.
Credit: 1.5 Hour: 30 Course: 15 Lab: 15
IT/OT engineering and Security
Bridge the gap between Information Technology (IT) and Operational Technology (OT). This course explores the unique challenges of securing industrial control systems, critical infrastructure, and factories, focusing on protecting the hardware and software that monitor physical devices.
Credit: 2 Hour: 45 Course: 15 Lab: 30
Software Security
Integrate “security by design” into the software development lifecycle (SDLC). You will learn how to identify application-level vulnerabilities, perform secure code reviews, and implement defensive programming techniques to protect software from modern exploits.
Credit: 2 Hour: 45 Course: 15 Lab:30
IT Project Management
Develop the skills needed to lead technical teams and manage complex security projects. This module focuses on project planning, resource allocation, and risk mitigation strategies specifically tailored for the fast-paced and high-stakes environment of cybersecurity.
Credit: 1 Hour: 15 Course: 15 Lab: 0
Colloquium III
Deepen your professional network and knowledge through advanced seminars. This third installment focuses on aligning technical security solutions with organizational business goals, preparing you to communicate effectively with executive leadership.
Credit: 0.25 Hour: 4 Course: 4 Lab: 0
Term 4
Capstone Project
This is the practical culmination of your academic journey. You will work on an intensive, real-world project to solve a complex security challenge, demonstrating your ability to design and implement a robust security architecture from the ground up.
Credit: 1 Hour: 30 Course: 0 Lab: 30
Incident Response and Cyber Threat Intelligence
Master the art of detecting, containing, and neutralizing active security breaches. This course teaches you to utilize threat intelligence to anticipate adversarial moves and develop rapid response strategies to minimize organizational impact.
Credit: 2 Hour: 45 Course: 15 Lab: 30
Applied Cryptography
Go beyond the basics of encryption. This module focuses on the practical implementation of cryptographic protocols to secure data at rest and in transit, covering modern algorithms, digital signatures, and the architecture of secure communication systems.
Credit: 2 Hour: 45 Course: 15 Lab: 30
Cloud Architecture and Security
Explore the security complexities of virtualized environments. You will learn to design secure cloud infrastructures, manage identity and access in the cloud, and implement defensive controls across major platforms like AWS, Azure, and Google Cloud.
Credit: 2 Hour: 45 Course: 15 Lab: 30
Technology Transfer & Entrepreneurship
Turn your technical innovations into viable security products. This course focuses on the “Build in Public” philosophy, teaching you how to protect intellectual property, find early adopters, and launch your own cybersecurity startup or venture.
Credit: 1 Hour: 15 Course: 15 Lab: 0
Colloquium IV
Deepen your professional network and knowledge through advanced seminars. This third installment focuses on aligning technical security solutions with organizational business goals, preparing you to communicate effectively with executive leadership.
Credit: 0.25 Hour: 4 Course: 4 Lab: 0
Term 5 + 6
Research or Professional Project
This year-long intensive module represents the pinnacle of the Master’s program. You will choose between conducting original academic research or executing a complex professional security implementation. Under the guidance of an expert mentor, you will apply advanced methodologies to solve a significant cybersecurity problem, contributing new knowledge or practical innovations to the digital ecosystem.
Credit: 15 Hour: 700 Course: 0 Lab: 700
Admission
Application Process
We are looking for ambitious professionals and graduates ready to secure the digital frontier. Our application process is designed to identify candidates with the technical foundation and drive to succeed in this intensive master’s program. Follow these steps to prepare your documentation and begin your online application.
1
2
Requirement
- Passport or National Identification Card
- Curriculum Vitae (CV) and Motivation Letter
- Certified Copy of Bachelor’s degree certificate in Computer Science, Network, Telecoms or a related field
- Certified copy of Bachelor’s transcript (minimum CGPA of 3.0)
- English proficiency certified (IELTS 5.0 or equivalent)
Application Procedure
- Apply online via: https://graduate-school.cadt.edu.kh/apply-now/
- Take an entrance examination on Data Structures and Algorithms, and English language
- Shortlisted candidates will be contacted via email for an interview
- Certified copy of Bachelor’s transcript (minimum CGPA of 3.0)
Fee & Funding
Program Fee
Tuition Fee
4000$/year
Admin Fee
200$/year
Financial Aid
Scholarship 100%
4000$/year
Fellowship (Work Contract in Laboratory)
