Part time Master's Degree in Cyber Security

View Part time Masters Programs in Cyber Security 2017

Cyber Security

In order to successfully obtain a Masters qualification, you will need to obtain a number of credits by passing individual modules. Most taught Masters will have a number of core modules which you must take and pass in order to obtain the qualification. The assessment of research Masters is almost always entirely by a single dissertation module or project.

As more of the world relies on connecting through computers, the danger of theft and damage aimed at disrupting networks, software, or hardware grows. Cyber security is an industry that must adapt quickly to changing technology and safety concerns by safeguarding computers at every level.

Request Information Part time Masters Degrees in Cyber Security 2017

Read More

Master in Information Security

Harbour.Space
Campus September 2017 Spain Barcelona

Programme Description The Information Security Master Degree program is designed for those who want to extend their technical and programming skills to handling enterprise security challenges. Our comprehensive courses will provide a solid foundation in key technology including computer and network security, cryptography, enterprise security architecture analysis, etc. The graduates will learn to stay current on rapidly changing technology, adapt and control to new threats and start a successful career in enterprise security. [+]

Best Part time Masters in Cyber Security 2017. Programme Description This program is taught in ENGLISH. The Information Security Master Degree program is designed for those who want to extend their technical and programming skills to handling enterprise security challenges. Our comprehensive courses will provide a solid foundation in key technology including computer and network security, cryptography, enterprise security architecture analysis, etc. The graduates will learn to stay current on rapidly changing technology, adapt and control to new threats and start a successful career in enterprise security. PROGRAMME STRUCTURE Year 1 During the first year students quickly recap basics of computer science and then focus on fundamentals of cyber security including computer architecture, operating systems security, secure programming, networks, and cryptography. Modules Computer Architecture Secure Programming Algorithms and Data Structures Practical Unix Windows Administration Operating Systems Computer Networking Human Aspects of Cyber security: Law, Ethics and Privacy Cryptography Software Engineering & Design Scripting Languages Java Programming Identity and Access Management Technical Writing and Presenting Introduction to Interaction Design Leadership and Group Dynamics Secure Data management Capstone Project Seminars & Workshops Year 2 The second year exposes students to different dimensions of cyber security field. Subjects range from Mobile and Cloud Security to Digital Forensics and Quantum Communication and Cryptography. Additionally students participate in communication and leadership modules preparing them for the career as a successful member of a professional team. At the end of the program, graduates will be ready to take on responsibilities to safeguard an organization’s information and technology assets. Modules Technical Project Management Application Security Mobile Security Network Security Enterprise Security Architecture and Design Software Testing Reverse Software Engineering Vulnerability Analysis, Penetration Testing, Intrusion Detection and Incident Handling Ethical Hacking and Response Cyber Warfare Security Tools for Information Security Digital Forensics Quantum communication and cryptography Parallel and Distributed Computing Cloud Computing Advanced computer networks Distributed Databases Global Cyber Capabilities and Trends Enterprise Security Threats Enterprise Security Case Studies Economics of Security Cyber Risk Management Information Governance Cyber security Governance and Compliance Cyber security Law & Policy Captstone Project Seminars & Workshops Programme Leadership RICHARD BUCKLAND PhD,Chair of the Academic Board of the Australian Computer Society Education, Member of UNSW Academic Board LIVING IN BARCELONA Studying in Barcelona has the following advantages: Barcelona is #1 in Europe for quality of life and clearness of environment (2012 Quality of Life City Rankings – Mercer Survey) Barcelona is #1 in the world for the level of infrastructure and urban development (2011, Ernst & Young). The region of Catalonia, where Barcelona is the capital, contributes significantly to the Spanish GDP. The growth of Catalonia’s GDP is currently 3.3%, much higher than in Europe on average. Catalonia’s exports are €42.2 billion, higher than in any other region of Spain. 7,000+ innovation and technological companies during the last 10 years. Barcelona is 6th in Europe for attractiveness and comfort for doing business (European Attractiveness Survey 2011, Ernst & Young), Barcelona is 2nd in Europe (after London) for being promoted as a business center (European Cities Monitor 2011); Barcelona is 2nd in the world for hosting different international conferences and congresses (City and Country World Report 2011, ICCA ). Barcelona is the host of the annual World Mobile Congress, which attracts thousands of international companies that work in the mobile industry. 7,000,000 + millions of tourists / year 20° C - average temperature during the day 2437 hours of sunshine/ year Cost of living 550 euro / month [-]

Master in Cyber Security

Harbour.Space
Campus September 2017 Spain Barcelona

Programme Description The MS program is designed for those who want to extend their technical and programming skills to handling enterprise security challenges. Our comprehensive courses will provide a solid foundation in key technology including computer and network security, cryptography, enterprise security architecture analysis, etc. The graduates will learn to stay current on rapidly changing technology, adapt and control to new threats and start a successful career in enterprise security. [+]

Programme Description This program is taught in ENGLISH. The MS program is designed for those who want to extend their technical and programming skills to handling enterprise security challenges. Our comprehensive courses will provide a solid foundation in key technology including computer and network security, cryptography, enterprise security architecture analysis, etc. The graduates will learn to stay current on rapidly changing technology, adapt and control to new threats and start a successful career in enterprise security. PROGRAMME STRUCTURE Year 1 During the first year students quickly recap basics of computer science and then focus on fundamentals of cyber security including computer architecture, operating systems security, secure programming, networks, and cryptography. Modules Computer Architecture Secure Programming Algorithms and Data Structures Practical Unix Windows Administration Operating Systems Computer Networking Human Aspects of Cyber security: Law, Ethics and Privacy Cryptography Software Engineering & Design Scripting Languages Java Programming Identity and Access Management Technical Writing and Presenting Introduction to Interaction Design Leadership and Group Dynamics Secure Data management Capstone Project Seminars & Workshops Year 2 The second year exposes students to different dimensions of cyber security field. Subjects range from Mobile and Cloud Security to Digital Forensics and Quantum Communication and Cryptography. Additionally students participate in communication and leadership modules preparing them for the career as a successful member of a professional team. At the end of the program, graduates will be ready to take on responsibilities to safeguard an organization’s information and technology assets. Modules Technical Project Management Application Security Mobile Security Network Security Enterprise Security Architecture and Design Software Testing Reverse Software Engineering Vulnerability Analysis, Penetration Testing, Intrusion Detection and Incident Handling Ethical Hacking and Response Cyber Warfare Security Tools for Information Security Digital Forensics Quantum communication and cryptography Parallel and Distributed Computing Cloud Computing Advanced computer networks Distributed Databases Global Cyber Capabilities and Trends Enterprise Security Threats Enterprise Security Case Studies Economics of Security Cyber Risk Management Information Governance Cybersecurity Governance and Compliance Cybersecurity Law & Policy Captstone Project Seminars & Workshops Programme Leadership RICHARD BUCKLAND PhD,Chair of the Academic Board of the Australian Computer Society Education, Member of UNSW Academic Board LIVING IN BARCELONA Studying in Barcelona has the following advantages: Barcelona is #1 in Europe for quality of life and clearness of environment (2012 Quality of Life City Rankings – Mercer Survey) Barcelona is #1 in the world for the level of infrastructure and urban development (2011, Ernst & Young). The region of Catalonia, where Barcelona is the capital, contributes significantly to the Spanish GDP. The growth of Catalonia’s GDP is currently 3.3%, much higher than in Europe on average. Catalonia’s exports are €42.2 billion, higher than in any other region of Spain. 7,000+ innovation and technological companies during the last 10 years. Barcelona is 6th in Europe for attractiveness and comfort for doing business (European Attractiveness Survey 2011, Ernst & Young), Barcelona is 2nd in Europe (after London) for being promoted as a business center (European Cities Monitor 2011); Barcelona is 2nd in the world for hosting different international conferences and congresses (City and Country World Report 2011, ICCA ). Barcelona is the host of the annual World Mobile Congress, which attracts thousands of international companies that work in the mobile industry. 7,000,000 + millions of tourists / year 20° C - average temperature during the day 2437 hours of sunshine/ year Cost of living 550 euro / month [-]

Master in Security and Privacy (S&P)

EIT Digital Master School
Campus 2 years September 2017 France Paris Sweden Stockholm Italy Trento Germany Berlin Hungary Budapest Netherlands Eindhoven Spain Madrid Finland Espoo United Kingdom London + 15 more

The programme in Security and Privacy focusses on the study of the design, development and evaluation of secure computer systems, which are also capable of ensuring privacy for future ICT systems. It follows a constructive security approach to teach the very complex and challenging field of information assurance. [+]

Best Part time Masters in Cyber Security 2017. Why study the EIT Digital Security & Privacy programme? The EIT Digital Security & Privacy programme offers: Front line technical content within the field. Studies at two of Europe´s foremost technical universities leading to a double degree. A good integration with tailored Business courses in Innovation and Entrepreneurship. A thesis work well grounded in industrial problems. Access to the competence of eight EIT Digital innovation action lines, not least through a summer school between the two years. Access to the co-location centers and innovation ecosystems of the nine EIT Digital nodes. What is the programme all about? The programme in Security and Privacy focusses on the study of the design, development and evaluation of secure computer systems, which are also capable of ensuring privacy for future ICT systems. It follows a constructive security approach to teach the very complex and challenging field of information assurance. The aim is to provide students with an understanding of the concepts and technologies for achieving confidentiality, integrity, authenticity, and privacy protection for information processed across networks. What are the career opportunities for graduates from the programme? Graduates from the Security & Privacy master’s programme will qualify for jobs in international and local organizations in both technical and business roles. Typical titles are: (Cyber) Security consultant; Security Analyst; (Information) Security Architect; Operation Manager; Product Manager. Through their multidisciplinary attitude graduates are valuable in open innovation settings where different aspects (market, users, social aspects, media technologies) come together. They will easily find jobs within companies that provide value-added products and services, such as telecom companies, game companies, e-learning, web developers, and entertainment. An alternative path would be to start your own company to provide product or technology development, media content, business development or consultancy services. How is the programme structured? The programme is a double degree programme with studies at a university in one country in the first year (entry) and studies at a university in another country the second year (exit). The programme has an integrated technical content (Technical major) and business content (Innovation & Entrepreneurship – I&E minor). The I&E minor is shared between all programmes (link). An integral part of the second year is a Master’s thesis (30 ECTS). The structure and content of the technical major is given below. Where can I study if I choose Security and Privacy? Entry - 1st year UNITN in Trento, Italy UT, Twente, The Netherlands Exit - 2nd year, specialization ELTE Budapest, Hungary Saarland University, Germany TUD, Darmstadt, Germany UNITN in Trento, Italy UT, Twente, The Netherlands Specific Admission Requirements A B.Sc. degree in computer science, electrical engineering, computer engineering or information systems sciences with solid skills in mathematics, electrical engineering, software design and programming is required. The average grade must be at least 75% of the scale maximum. [-]

Master of Cyber Security

The University of Waikato
Campus 12 - 18 months March 2017 New Zealand Hamilton

Studying for the Master of Cyber Security allows you to develop the skills you'll need to become a specialist in this area. There's an increasing international demand for trained cyber security professionals, and graduates of this programme help meet the New Zealand Government's Cyber Security Strategy. This masters degree is the first of its kind to be offered in New Zealand. [+]

Master of Cyber Security Studying for the Master of Cyber Security allows you to develop the skills you'll need to become a specialist in this area. There's an increasing international demand for trained cyber security professionals, and graduates of this programme help meet the New Zealand Government's Cyber Security Strategy. This masters degree is the first of its kind to be offered in New Zealand. As you work towards your Master of Cyber Security (MCS), you'll develop a thorough understanding of the technical, legal, policy and management aspects of cyber security. You'll learn about cloud computing technologies and computer infrastructure, as well as the law relating to cyber security. You'll gain skills relating to detecting security breaches, preventative security and offensive security. This includes computer system penetration testing. You'll learn how to think innovatively and develop the ability to apply your knowledge so you can work at an advanced level as a professional in cyber security. When you study cyber security at Waikato, you'll have the opportunity to work with, and learn from award-winning cyber security experts such as Dr Ryan Ko. Our academics also have strong international connections with industry and government, such as the National Cyber Policy Office and INTERPOL. Computing facilities at Waikato The computing facilities at the University of Waikato are among the best in New Zealand. You'll have 24 hour access to computer labs running the latest industry standard software. The University of Waikato is also home to New Zealand’s first cyber security lab, where the Cybersecurity Researchers of Waikato (CROW) operate from – the creators of the annual New Zealand Cyber Security Challenge. Build a successful career Demand for trained professionals in cyber security is increasing globally at 3.5 times the rate of the overall job market. Once you've completed your training in this area, you'll be qualified to do a number of different types of roles in an industry with a 'near zero' unemployment rate. Our graduates are in high demand and most of our alumni work in the top public and private organisations in New Zealand and internationally – like Sjoerd de Feijter, who is now a Junior Software Engineer for multinational corporation Gallagher. Career opportunities Chief Information Security Officer Entrepreneurs of new security products and service Penetration Testers/ Security Assessment Consultants IT Security Consultant Admission and enrolment For admission into the MCS, students will need to have completed a relevant bachelor's degree or postgraduate diploma, normally in Computer Science or Computer Engineering. You will need an average of at least B in your 300 level or higher Computer Science papers. International students will need to have an IELTS score of 6.5 with at least 6.0 in the writing band. International students can email international@waikato.ac.nz for more information or help with the application process. [-]

Master of Technology in Cyber Security and Digital Forensics

K L University
Campus July 2017 India Guntur

To make the students achieve a level of competency, cognition and knowledge in the acquisition of theoretical foundations in the stated specializations related to Computer Science and Engineering at post graduate level. [+]

Best Part time Masters in Cyber Security 2017. Program Educational Objectives To make the students achieve a level of competency, cognition and knowledge in the acquisition of theoretical foundations in the stated specializations related to Computer Science and Engineering at post graduate level Must be able to conduct research and undertake development in the focused and emerging areas and domains shortlisted for the discipline - Computer Science and Engineering Specify, design, develop, prototype and test the applications that are related to the domains finalized for the program Be able to achieve hands on practice in using different type of tools which are related to theoretical aspects covered in the program, and be able to conduct research, and undertake project development using the tools. Understand and practice professional ethics Recognize professional and personal responsibility to the community and undertake all the activities that benefit the society Pursue lifelong learning as a means of enhancing knowledge and skills necessary to contribute to the betterments of profession. Must learn to work in teams especially for undertaking project execution Program Outcomes Apply knowledge, concepts, methods, and algorithms, techniques in implementing solutions to the problems that are related to the domain areas that are shortlisted for the discipline Computer Science and Engineering. Identify, formulate, research literature and find solutions to the problems and critically evaluate the solutions to the problems that are related to the fields of specialization shortlisted for the discipline “Computer Science and Engineering” Specify, design and develop solutions for complex engineering problems related to specialisation areas and domains shortlisted for the program Conduct experimentation using different types of tools, that help analyzing, designing evaluating and testing applications related to specialization areas Be able to innovative and incubate the research findings through development of pilots and be able to promote the commercialization by interacting with eco system in association with the faculty specializing in similar areas. Function effectively as an individual and as a team member to design and develop applications, conduct research and find solutions to the burning problems. Demonstrate the understanding of the societal, health, safety, legal and cultural issues through incorporating and implementing relevant engineering practices during project and LAB execution. Understand and commit to professional ethics through adaption of norms and standards Be able to bring in the societal issues such as energy minimization, pollution elimination etc., into the engineering solutions designed for solving complex problems Demonstrate knowledge and understanding of management and business practices that are related to the field of specialization [-]

Mastère Spécialisé SIS : Sécurité de l’Information et des Systèmes

ESIEA Graduate Engineering School
Campus 12 months October 2017 France Paris

Le Mastère Spécialisé® SIS s’adresse à tous ceux qui souhaitent devenir experts de la sécurité de l’information et des systèmes, disposant d’une vision globale du système d’information – et plus généralement de l’information – qu’ils doivent protéger, et capables de répondre de manière rapide et efficace aux situations très variées d’insécurité, liées à des attaques externes ou internes, auxquelles ils se trouvent confrontés. [+]

Le Mastère Spécialisé® SIS s’adresse à tous ceux qui souhaitent devenir experts de la sécurité de l’information et des systèmes, disposant d’une vision globale du système d’information – et plus généralement de l’information – qu’ils doivent protéger, et capables de répondre de manière rapide et efficace aux situations très variées d’insécurité, liées à des attaques externes ou internes, auxquelles ils se trouvent confrontés. Face à ces phénomènes, le spécialiste doit avoir une vision globale. Le Mastère Spécialisé® SIS est destiné à des profils Bac+5 (ou éventuellement Bac+4) sachant programmer, et ayant un socle technique solide. Le Mastère Spécialisé® SIS est notamment ouvert aux cadres déjà en activité qui souhaitent se spécialiser en sécurité informatique. À l’issue de la formation, les étudiants sont capables d’évaluer la sécurité d’un système d’information, de définir un plan de protection des installations qui leur sont confiées, d’élaborer et de mettre en oeuvre les dispositifs techniques correspondants, et d’en assurer l’exploitation opérationnelle. Ils interviendront en tant que responsables opérationnels, ingénieurs, consultants ou chefs de projets dans la sécurité des systèmes d’information ou des réseaux, le développement d’applications sécurisées, le reverse engineering ou encore l’audit et l’évaluation des risques. La Sécurité de l’Information & des Systèmes : du code au réseau Le Mastère Spécialisé SIS a pour objectif de former les spécialistes de la sécurité de l’information que les entreprises attendent. Les points forts du Mastère Spécialisé Sécurité de l’Information et des Systèmes 1. Un Mastère Spécialisé est une formation Bac+6 d’une durée d’au moins deux semestres. Elle inclut des enseignements théoriques, un travail personnel de recherche en entreprise et la soutenance d’une thèse professionnelle. Cette formation est accréditée par la Conférence des Grandes Écoles. 2. Le Mastère Spécialisé SIS – ESIEA est une formation exhaustive et exigeante qui va de l’ISO 27001 jusqu’au Reverse Engineering, la virologie et la cryptologie, en passant par la programmation sécurisée, l’intelligence économique, la sécurité Windows ou la programmation de cartes à puce. 3. La pédagogie repose sur une mise en pratique constante, où l’étudiant est véritablement acteur de sa formation. Afin de se placer dans des situations proches de la réalité des entreprises, des scénarios d’urgence sont reproduits en temps réel dans notre laboratoire de sécurité, ou opposent des équipes qui défendent et attaquent alternativement un système ou une application. 4. Le Mastère Spécialisé SIS – ESIEA fait intervenir une cinquantaine d’experts, souvent internationalement reconnus. 5. Créé en 2004, le Mastère Spécialisé SIS – ESIEA a diplômé plus de 350 étudiants. 6. L’ESIEA est un acteur reconnu de la formation et de la recherche en matière de cybersécurité. L’école fait partie des rares acteurs de l’enseignement cités par le rapport d’information sur la cyberdéfense du Sénateur Bockel (Juillet 2012). Son équipe de cryptologie et virologie opérationnelles a été à l’origine du projet DAVFI, de développement d’un antivirus open source « made in France”, soutenu par l’État dans le cadre des Investissements d’Avenir. 7. Le Mastère Spécialisé SIS – ESIEA figure : Dans les quatre formations retenues dans la catégorie « Réseaux, Télécoms, NTIC » par le Palmarès 2014 des meilleurs Mastères Spécialisés du journal Le Figaro- Étudiant. Comme seule formation en sécurité retenue dans le banc d’essai 2014 des MS et MBA spécialisés en Systèmes d’Information du journal Le Parisien Pré-requis La formation exige des pré-requis techniques, une forte motivation et une grande disponibilité : Savoir élaborer un programme en C et Java Connaître et savoir utiliser les commandes UNIX Posséder des notions générales sur l’architecture d’un système, hors matériels, (processeur, mémoire, système d’entrée, sortie) : rôles et relations. De très bonnes capacités d’expression orale et écrite en langue française sont aussi exigées, ainsi qu’un bon niveau en langue anglaise. Candidatures (année universitaire 2017/2018) Les demandes de Dossier de Candidature doivent être faites par courrier, accompagné d’un CV qui permet à la Direction du Programme de statuer sur la recevabilité de votre candidature. Si votre candidature est jugée recevable, nous vous adressons un Dossier de Candidature, qui doit nous être retourné dûment complété. La première session de recrutement pour le Mastère Spécialisé SIS porte sur les dossiers déposés avant le 31 mai 2017. Il est recommandé à tous les candidats de faire leur demande, et leur dépôt, de dossier au plus tôt – et notamment pour les candidats salariés, qui feront une demande d’aide du FONGECIF, ou les candidats étrangers, qui devront faire des démarches d’obtention de visa. Une vingtaine de places seulement sont ouvertes. En fonction des places restant disponibles, une session de recrutement supplémentaire se terminera le 30 juin 2017, et éventuellement une troisième, avant le 25 septembre 2017. Après étude du dossier de candidature, les candidats déclarés admissibles, sont convoqués pour deux entretiens (ou, pour les candidats résidant à l’étranger, pour un rendez-vous Skype ou téléphonique) : un entretien avec Vincent GUYOT, directeur scientifique du Mastère Spécialisé de Paris, ou Eric FILIOL Directeur de Recherche, laboratoire CVO (Cryptologie et Virologie Opérationnelle) axe CNS (Confiance Numérique et Sécurité). un entretien avec un autre membre de l’équipe pédagogique. La décision d’admission est notifiée au candidat par écrit à la suite de ces entretiens, dans le mois qui suit la date limite de dépôt de dossier. Cette décision relève du directeur général de l’ESIEA, sur proposition motivée du Directeur de Programme. L’inscription définitive est soumise au règlement de la scolarité. [-]

Master of Engineering in Cybersecurity

University of Maryland, A. James Clark School of Engineering
Campus Part time September 2017 USA College Park

We recognize that technical experts working in Cybersecurity have diverse academic and professional backgrounds. Therefore, our admissions requirements allow for diversity but also must ensure that qualified students are prepared to succeed in this highly technical academic program. We offer three levels of admission depending upon the academic background, academic performance, and professional experience of the applicant. [+]

Best Part time Masters in Cyber Security 2017. Admissions Requirements We recognize that technical experts working in Cybersecurity have diverse academic and professional backgrounds. Therefore, our admissions requirements allow for diversity but also must ensure that qualified students are prepared to succeed in this highly technical academic program. We offer three levels of admission depending upon the academic background, academic performance, and professional experience of the applicant. Please note that three letters of recommendation (preferably professional letters) are required for admission. Prerequisite requirement: ENEE 150 or equivalent. Further admissions requirements. Full Admission: applicants must have a bachelor's degree in Engineering, Computer Science, Applied Mathematics, or Physics, from an accredited institution, with a GPA of 3.0 or better. Provisional Admission: applicants who have a degree in a closely related field of study (i.e. Information Technology, Information Assurance, Computer Information Systems), and a GPA of 3.0 or better must also possess at least one (1) of the following certifications: CompTIA Security+, GIAC GSEC, or Certified Ethical Hacker certification. Applicants admitted with Provisional Admission will need to complete two core courses with at least a B or better in each course. Advanced Special Student Admission: applicants with a bachelor’s degree in other fields of study with a minimum 3.0 GPA, one of the above mentioned certifications, and 2+ years work experience in Information Technology or other closely related field. To qualify for this admission, applicants must submit a detailed description of their technical work experience as a personal statement attached to the Applicant Supplement Form (ASF). Applicants admitted as Advanced Special Students will need to complete two core courses with at least a B or better in each course in order to be considered for Provisional Admission later on. [-]

Masters In Cybersecurity

laSalle Barcelona Postgraduate
Campus September 2017 Spain Barcelona

The Master in Cybersecurity (MCS) created with the aim of responding to this business need and train experts in the security of information and communications technology. [+]

Growing concerns about cybersecurity is a fact more and more companies. In 2014, the number of companies that have invested in protected from cyberthreats has increased by 33%, and only in Spain it takes up 20,000 professionals dedicated to this science and their posts are not covered by lack of training and specialization in the field. According to several reports, the labor market security environment is expected to grow exponentially in the coming years. According to the Report Annual Security 2014 Cisco, lack of nearly one million professional computer experts worldwide security is impacting the ability of organizations to monitor and secure networks, while vulnerabilities and threats in general reached their highest levels since 2000. The Master in Cybersecurity (MCS) created with the aim of responding to this business need and train experts in the security of information and communications technology. The Master in Cybersecurity includes the following certification exams: D-CREATE (Deloitte Reverse Engineer Certified Associate) D-CFIA (Deloitte Certified Forensic Investigator Associate) These certifications are obtained by finishing the master and pass the exams. What do you prepare? Train experts in the security of information and communications technology capable of performing security audits, analyze the facts and safety information collected, reverse engineer and Cyber ​​Intelligence and conduct a proper forensic analysis. Ensuring the safe development of applications, either both web platforms and mobile environments. Train to implement defensive security from the point of view of system administrator or web architecture. Knowing how to apply the offensive security from attack methodologies. To whom it May concern? Grade graduates, official master, superior engineering and technical degrees and diplomas related (telematics engineering, information engineering, telecommunications, engineering ICT organization, etc.). Should not have university degrees, professional experience in the environment of telematics and security systems will be evaluated. Output Profile: Reverse engineering expert ethical hacker Cybersecurity consultant Analyst Information Security Malware analyst forensic analyst Safe Software Engineer Safety engineer on mobile devices Safety Auditor Security Manager [-]

Masters in Cyber Security Engineering

Estonian Information Technology College
Campus Part time 3 years September 2017 Estonia Tallinn

Education: professional higher education [+]

Best Part time Masters in Cyber Security 2017. Education: professional higher education Language of instruction: English Official length of programme: 3 years, 180 ECTS (European Credit Transfer and Accumulation System) credits Study form: daily study Tuition fee: 2400 € per academic year Start of studies: September 2016 Admission period for foreigners is open: until 1 May 2016 application deadline for Non-EU until 7 July 2016 application deadline for EU Curriculum comprises the following modules: Basic Skills and Competences (16 ECTS) Basics of Information Technology (24 ECTS) IT Systems Development (38 ECTS) IT Systems Administration (22 ECTS) Cyber Security (16 ECTS) Elective subjects (32 ECTS, spread into different modules, selected from a total of 91 ECTS) Internship (27 ECTS) Diploma Thesis (5 ECTS) Admission requirements The prerequisite for admission is secondary education acquired in Estonia or a corresponding level of education acquired in a foreign state. Recognition of an education certificate issued abroad is decided by the Admissions Committee based on the statement and recommendations by the Estonian ENIC/NARIC Centre (Academic Recognition Information Centre). Ranking criteria result of at least level B2 in an internationally recognised English proficiency test: Estonian state examination in English language – 66 points (1997-2013); TOEFL (Test of English as a Foreign Language) – 550/213/79 points; IELTS (The International English Language Testing System) – 6,5 points; PET (Preliminary English Test); FCE (First Certificate in English); CAE (Certificate in Advanced English); CPE (Certificate of Proficiency in English). Admission documents application (filled in the admission system); motivation letter; certificate of secondary education, incl. results report (certified copy); certificate that demonstrates the required language proficiency (original or certified copy); 1 document photo (dimensions of a digital photo: 307 x 372 pixels, recommended resolution: min 300 dpi); passport or ID-card (copy). The required documents can be entered to the admission information system (scanned versions) during admission period. The entry qualification documents are accepted in the following languages: English/Estonian. Often you can receive a suitable transcript from your school. If this is not the case, you will need official translations along with verified copies of the original. It is required that you send verified copies of the entry qualification documents directly to the IT College by postal mail. NB! Never send original documents by post! The Admissions Committee may interview a student candidate via Skype. Study loads at IT College Full-time study: the student meets the requirements of at least 75 % of the extent of the curriculum by the end of each academic year. Part-time study: the student meets the requirements of 50% to 75% of the extent of the curriculum by the end of each academic year. [-]

Master in Embedded Systems

Masaryk University
Campus 2 years September 2017 Czech Republic Brno

This study field is taught only in English language. It is a comprehensive study programme of programmable structures which overlapps with parallel and distributed systems, computer networks, and cryptography. [+]

This study field is taught only in English language. It is a comprehensive study programme of programmable structures which overlapps with parallel and distributed systems, computer networks, and cryptography. The programme covers basic theories, research methodology, analysis, and comparative studies of the relevant computing devices. An emphasis is placed on balancing theoretical and practical subjects that apply to the design, implementation, analysis, testing and operation of embedded systems based on FPGA, one chip microcomputers and DSP. Working on projects in small teams is an integral part of these studies. Projects are oriented towards experimental and prototype solutions and to practical issues that emerge from the research and development activities of the faculty. It is possible to cooperate with potential employers to learn about the design of specific embedded systems and their developmental tools. [-]

Máster en Ciberseguridad UCAV-DELOITTE *

Universidad Católica de Ávila
Online & Campus Combined Part time September 2017 Spain Ávila

El Máster en Ciberseguridad UCAV-DELOITTE ofrece un programa técnico y práctico con un plan de estudios enfocado al hacking ético, Ciber Inteligencia, análisis forense, desarrollo seguro, tecnologías SIEM y criminalidad [+]

Best Part time Masters in Cyber Security 2017. El Máster en Ciberseguridad UCAV-DELOITTE ofrece un programa técnico y práctico con un plan de estudios enfocado al hacking ético, Ciber Inteligencia, análisis forense, desarrollo seguro, tecnologías SIEM y criminalidad informática. El Máster está orientado al diseño, desarrollo y análisis de componentes y sistemas de información donde la seguridad juega un papel primordial. El alumno conocerá las amenazas en la Red, sus implicaciones en el ciclo de vida de la Ingeniería de Sistemas de Información y la creación de mecanismos de defensa que hagan frente a las nuevas amenazas tecnológicas Para el desarrollo de cada asignatura, los alumnos contarán con un entorno virtual de pruebas específico, desarrollado en Deloitte, con acceso a internet en todo momento. Para las clases de participación remota, emitidas desde las aulas de la CyberSOC Academy (emitidas vía web conference) el máximo de alumnos será de 20. Con más alumnos se repartirían las clases en varias sesiones. Y las sesiones presenciales obligatorias tendrán lugar en las aulas de la CyberSOC Academy. Metodología Todas las asignaturas serán teórico-prácticas desde la primera sesión. El instructor se servirá de un presentación que también servirá de guion para el alumno, durante el desarrollo de las clases y durante el trabajo personal que éste desarrolle individualmente. Para el desarrollo de cada asignatura, los alumnos han de tener instalado un entorno virtual de pruebas específico, desarrollado en Deloitte, y deben de tener acceso a internet en todo momento. Para las clases de participación remota, emitidas desde las aulas de la CyberSOC Academy (emitidas vía web conference) el máximo de alumnos será de 20. Con más alumnos se repartirían las clases en varias sesiones. Las sesiones presenciales obligatorias tendrán lugar en las aulas de la CyberSOC Academy, situadas en C/ Caléndula 93, 28109 La Moraleja. Parque Empresarial MiniParc III Edificio D. Madrid. [-]