Masters Programs in IT Security

Compare 14 Masters Programs in IT Security

IT Security

A master’s degree is awarded to students who complete an in-depth postgraduate degree program, which typically spans one to three years and features a high level of research and hands-on experience. Pursuing a master’s degree can help students improve their knowledge of a chosen specialization and become qualified for new job opportunities.

What is a Master in IT Security? The coursework for this program focuses on IT systems, networks, security protocols, forensics and risk analysis. Students generally gain a better understanding of the security protocols and protections that are widely used today by learning about cryptography, encryption standards and biometrics. Many degree programs also delve into legal aspects of cyber security, including regulations and compliance. Generally, the ultimate goal of this program is to teach graduates to assess and mitigate cyber security risks.

A Master in IT Security can help information security professionals keep current with modern security threats and means of addressing those threats. Graduates may also enjoy access to extensive employment opportunities, since cyber crime poses a growing source of concern for most modern organizations.

The expenses associated with earning this degree, which may include tuition and living costs, depend on the institution, the geographic area and the program length. As a result, it is advisable for students to directly contact any institutions that they are considering attending and ask a representative for a cost estimate. 

People who hold a Master in IT Security may pursue jobs with government agencies, private companies and even non-profit organizations. These professionals may work as information security managers, cyber forensics investigators or network security advisors. Graduates may also pursue employment as cyber security or risk analysis consultants. Professionals who prefer academic careers may become researchers or pursue more advanced degrees within related fields.

Like many master’s degrees, a Master in IT Security can now be earned entirely online. Prospective students who are interested in reducing their expenses, studying from the location of their choice or working while earning their degrees may benefit from comparing the available online degree programs. Search for your program below and contact directly the admission office of the school of your choice by filling in the lead form.

Read More

Master Security Business Information

OBS Business School
Online Full time Part time 12 months May 2017 Spain Barcelona + 1 more

The graduate in Business Information Security professionals and managers to facilitate the definition of strategies and knowledge of tools to work around the security of the data. Information has become the most valuable to many organizations active at present data are an essential element to generate competitiveness ... [+]

Masters in IT Security. Master in Business Information Security The graduate in Business Information Security professionals and managers to facilitate the definition of strategies and knowledge of tools to work around the security of the data. Information has become the most valuable to many organizations, today data are essential to competitiveness and generate high profit margins for active element of modern business. Companies, regardless of size, are making great efforts to keep the information from its source to its use for operations and decision-making, which is a given amount of data being generated daily function and understandable from different sources. Social networks, mobile devices, e-commerce, the era of big data, etc., are some of the factors that have driven the fact that security in information security management and IT management have become factors key to today's organizations. Companies need to implement solutions and processes to ensure their information, both internal and external threats, it is why the Business Information Security currently represents one aspect to be considered in the Strategic Plan of the entire organization. Professional outings Systems Auditor Computer specialists Network Administrator Database Manager IT Security Consultant Security Manager Information Security Analyst IT risks Systems Developer Infrastructure Manager Project Manager IT Security Objectives of the Master in Business Information Security What goals are going to get? Professionally train managers in leadership and management systems information security companies. Define the necessary keys to interact with consultants and security experts. Promote and implement strategies capable of shielding the knowledge of companies. Leveraging knowledge assets imperative for improvement and development in the framework of the information society and knowledge. Get a second accredited by the most reputable business school in Spain, EAE Business School, as ranked Merco (2014) and guaranteed qualification for a major public universities in Spain, the University of Barcelona (UB), with more than 560 year history. Curriculum Master in Business Information Security The program lasts 12 months and can be started in May or November of each year month. It comprises a total of 10 modules, divided into 3 blocks, and a final project being developed along the Master. Security Requirements Master of Business Information The fundamental goal of our admissions process is to ensure the suitability of candidates. All participants must get the most out of this learning experience, through a context in which it is possible to develop a long-term relationship with classmates, teachers and alumni. These are the stages of the admission process: 1. Prerequisites for admission in February. Admission 3. Personal Interview 4. Cover letter in May. 6 Assessment Admissions Committee. Matriculation Master degree in Corporate Information Security People who pass the evaluation of the program and meet the academic requirements established by the UB, will be awarded the UB (University of Barcelona). In addition, all persons who pass the assessment will receive the degree of EAE Business School. To obtain the degree of UB is necessary to have University Degree (Engineering Degree or Diploma). Failure to have a University Degree, once passed the different assessments, a diploma of university extension of UB is obtained. Financial Aid Master in Business Information Security OBS offers candidates the scholarship program to promote continuing education for professionals, entrepreneurs and managers. To apply for one of these grants, which fund part of the program, candidates must be admitted to the program and meet the specified requirements. The Admissions and Scholarship Committee will assess the adequacy of the profile and the career of the candidates, the reasons given in the letter of scholarship application and the candidate's professional and academic recommendations. [-]

Master in Information Security

Harbour.Space
Campus Full time September 2017 Spain Barcelona

Programme Description The Information Security Master Degree program is designed for those who want to extend their technical and programming skills to handling enterprise security challenges. Our comprehensive courses will provide a solid foundation in key technology including computer and network security, cryptography, enterprise security architecture analysis, etc. The graduates will learn to stay current on rapidly changing technology, adapt and control to new threats and start a successful career in enterprise security. [+]

Programme Description This program is taught in ENGLISH. The Information Security Master Degree program is designed for those who want to extend their technical and programming skills to handling enterprise security challenges. Our comprehensive courses will provide a solid foundation in key technology including computer and network security, cryptography, enterprise security architecture analysis, etc. The graduates will learn to stay current on rapidly changing technology, adapt and control to new threats and start a successful career in enterprise security. PROGRAMME STRUCTURE Year 1 During the first year students quickly recap basics of computer science and then focus on fundamentals of cyber security including computer architecture, operating systems security, secure programming, networks, and cryptography. Modules Computer Architecture Secure Programming Algorithms and Data Structures Practical Unix Windows Administration Operating Systems Computer Networking Human Aspects of Cyber security: Law, Ethics and Privacy Cryptography Software Engineering & Design Scripting Languages Java Programming Identity and Access Management Technical Writing and Presenting Introduction to Interaction Design Leadership and Group Dynamics Secure Data management Capstone Project Seminars & Workshops Year 2 The second year exposes students to different dimensions of cyber security field. Subjects range from Mobile and Cloud Security to Digital Forensics and Quantum Communication and Cryptography. Additionally students participate in communication and leadership modules preparing them for the career as a successful member of a professional team. At the end of the program, graduates will be ready to take on responsibilities to safeguard an organization’s information and technology assets. Modules Technical Project Management Application Security Mobile Security Network Security Enterprise Security Architecture and Design Software Testing Reverse Software Engineering Vulnerability Analysis, Penetration Testing, Intrusion Detection and Incident Handling Ethical Hacking and Response Cyber Warfare Security Tools for Information Security Digital Forensics Quantum communication and cryptography Parallel and Distributed Computing Cloud Computing Advanced computer networks Distributed Databases Global Cyber Capabilities and Trends Enterprise Security Threats Enterprise Security Case Studies Economics of Security Cyber Risk Management Information Governance Cyber security Governance and Compliance Cyber security Law & Policy Captstone Project Seminars & Workshops Programme Leadership RICHARD BUCKLAND PhD,Chair of the Academic Board of the Australian Computer Society Education, Member of UNSW Academic Board LIVING IN BARCELONA Studying in Barcelona has the following advantages: Barcelona is #1 in Europe for quality of life and clearness of environment (2012 Quality of Life City Rankings – Mercer Survey) Barcelona is #1 in the world for the level of infrastructure and urban development (2011, Ernst & Young). The region of Catalonia, where Barcelona is the capital, contributes significantly to the Spanish GDP. The growth of Catalonia’s GDP is currently 3.3%, much higher than in Europe on average. Catalonia’s exports are €42.2 billion, higher than in any other region of Spain. 7,000+ innovation and technological companies during the last 10 years. Barcelona is 6th in Europe for attractiveness and comfort for doing business (European Attractiveness Survey 2011, Ernst & Young), Barcelona is 2nd in Europe (after London) for being promoted as a business center (European Cities Monitor 2011); Barcelona is 2nd in the world for hosting different international conferences and congresses (City and Country World Report 2011, ICCA ). Barcelona is the host of the annual World Mobile Congress, which attracts thousands of international companies that work in the mobile industry. 7,000,000 + millions of tourists / year 20° C - average temperature during the day 2437 hours of sunshine/ year Cost of living 550 euro / month [-]

Master in Mathematics: Mathematics for Information Technologies

Charles University Faculty of Mathematics and Physics
Campus Full time 2 years October 2017 Czech Republic Prague

This Master Program focuses on deeper knowledge of various mathematical disciplines and their algorithmic aspects. The student can get specialized either in Mathematics for Information Security or in Computer Geometry. [+]

Masters in IT Security. This Master Program focuses on deeper knowledge of various mathematical disciplines and their algorithmic aspects. The student can get specialized either in Mathematics for Information Security or in Computer Geometry. The direction Mathematics for Information Security is focused on deepening the theoretical knowledge of number theory, probability theory, theory of error correcting codes, complexity theory, theory of elliptic curves, and computer algebra applied to some of these subjects. Attention is also given to practical aspects such as internet security, standards in cryptography, and legal aspects of data security. The direction Computer Geometry deepens theoretical knowledge in various algebraic and geometric subjects together with their applications in geometry of computer vision and robotics, computer graphics and image processing, optimization methods, and numerical linear algebra. Entrance examination – Master's programme Applicants who will not sufficiently demonstrate the necessary background listed above by 9 May 2016, or with their application, will be invited to take the entrance examination in Prague. The entrance examination for a Master's programme at the Faculty of Mathematics and Physics at Charles University consists of four problems, each worth 25 points. In case of an incomplete solution a proportional number of points will be given. The maximum total score is 100. The minimum score for admission is 40 points out of 100. Depending on the study programme and study branch, the examination has the following structure: Mathematics (4 problems) Master’s Entry Requirements The goal of the admissions review process is to select from the pool of applicants those individuals who have shown the best capability and diligence expected of Charles University students. To apply for our Mathematics or Computer Science Master's programmes delivered in English you must - hold or be working towards a Bachelor’s or Master’s diploma and provide a certified copy thereof; in cases required by law, a certification of equivalence of education must accompany the application, - have sufficient academic background in the relevant fields (see below for details); this can be demonstrated by passing the specialized entrance examination in June 2016 in Prague that is organized by the Faculty of Mathematics and Physics, Charles University, or by providing transcripts (academic records) of your previous education accompanied by syllabi of the completed courses; promising students who do not have this background may be admitted with the provision that they complete the missing knowledge from Bachelor's courses, - have sufficient command of the English language; this can be demonstrated by providing your results in one of the standardized English tests that we recognize (see below for details). You are also welcome to accompany your application by - a statement of purpose in which you describe your reasons for applying to the proposed programme, your study and possibly also research interests and future career plans, - letters of recommendation as recent as possible from professors and employers who can comment on your recent professional accomplishments and your qualifications for pursuing a Master's degree in mathematics or computer science. English Language Proficiency All applicants must have an adequate command of English in order to enrol at Charles University. An applicant’s proficiency level in English may be demonstrated by various language tests; any language test results should not be older than two years. The only exemption from this requirement is for students who have completed at least two years of their previous education with English as the sole language of instruction in one of the following countries: Australia, Canada, Ireland, New Zealand, UK, or USA. The table below summarizes the minimum requirements in the various tests of English that we recognize; you must meet the minimum score for at least one of the tests listed here, or provide us comparable results for other recognized qualifications (if in doubt please contact us to obtain specific required scores for other internationally recognized English Language qualifications). Test Minimum score TOEFL Paper / Computer / Internet based - 550 / 213 / 80 SAT Critical Reading and Writing - 550 in each part ACT English and Reading - 24 International Baccalaureate English - 6 The International English Language Testing System (IELTS) - 6.5 Cambridge ESOL FCE A level Cambridge ESOL CPE, or Cambridge ESOL CAE - Passed City&Guilds International ESOL, or City&Guilds International Spoken ESOL - Expert level The European Language Certificates - Level TELC English C1 UNIcert English for Mathematicians - Level C1 Melab - 77 Examination for the Certificate of Proficiency in English (ECPE) - Pass Test of English for International Communication (TOEIC) - 605 Vancouver English Centre (VEC) level / online score - 13-14 / 74 General State Language Examination in English in the Czech Republic - Pass Conditions for admission without entrance examination Academic background In this paragraph we summarize the minimum knowledge required for applicants in the various study programmes and study branches offered at our faculty. Master of Mathematics Common requirements: A sound background in linear algebra, real and complex analysis, measure theory and probability theory. Mathematics for Information Technologies: + commutative and computer algebra, theoretical and applied cryptography. Academic records demonstrating the necessary background must show the dates of enrolment and the subjects or courses taken, together with the units of credit or time allotted to each subject. The records must also include a complete description of the institution's grading scale or other standard of evaluation. Unless academic records and diplomas are routinely issued in English by the institution, the official records in their original language must be submitted with an authorized, complete, and exact English translation. Information on the exercise of graduates Graduates have a broad knowledge of advanced algebra, geometry and logic, and can apply it to solve advanced problems of mathematical information security and computer geometry. Graduates specialized in Mathematics for |Information Security are well acquainted with both the present and prospective systems of data security and encryption, including their mathematical principles, practical applications and standards. The mathematical knowledge covers the theoretical background of cryptography in full breadth (number theory, self-correcting codes, complexity of algorithms, elliptic curves, one-way functions). Graduates also understand the structure of cryptographic protocols and are aware of basic legal aspects of data security. Graduates specialized in Computer Geometry have deep knowledge of algebra and geometry subjects that are applied in information technologies processing geometric information and data. The graduates are well prepared for various jobs in information technologies where understanding and processing new knowledge and big data is needed. They are also prepared for academic career. [-]

Master's Programme in Information Security

Stockholm University, Department of Computer and System Sciences (DSV)
Campus Full time 2 years September 2017 Sweden Stockholm

Graduates of this programme are ready to work in the area of information security and related fields in both private and public sector organisations as managers, advisors, and specialists providing professional and expert know-how. [+]

Information security is primarily concerned with the protection of information assets. Today, most of the information resides in - and is communicated via IT systems. Hence, these systems need to be protected from various threats and attacks. The goal of information security is to protect with respect to the information its confidentiality, integrity and availability. Naturally, it all depends on the business needs and legal requirements. The area of information security is both exciting and overreaching since it also entails the protection of the essential and critical cyber infrastructure, trying to prevent or solve a wide range of computer crimes and other illicit activities, as well as protecting human rights, freedom and democracy. One of the many objectives is to devise new methods and strategies for cyber readiness and defence. At Stockholm University, we approach the subject area from both the business side and the technical side. This masters programme includes courses such as: Introduction to Digital and Information Security, Secure Software, Information Security in Organisations, Network Security, Information Security Project Management, Cyber Security, Legal aspects of information security and Cyber Forensics. Career The job market for information security professionals is very good. Information security graduates from Stockholm University work, among other, as information security managers (CISO), information security consultants, cyber security specialists, cyber and digital forensics professionals. Some graduates choose to pursue their careers in research education that eventually leads to a doctoral degree in this exciting field. What’s your ambition? Graduates of this programme are ready to work in the area of information security and related fields in both private and public sector organisations as managers, advisors, and specialists providing professional and expert know-how. More information about the programme Credits: 120 Language: English Duration: 2 years Study form: On campus Begins: Autumn Read more about this programme on our website here! http://dsv.su.se/en/education/courses-and-programmes/masters/security More info at: www.dsv.su.se/en/ Qualification requirement A Bachelor degree or a degree equal to 180 ECTS Language proficiency Swedish upper secondary school course English B or: IELTS (International English Language Testing Service)- Academic Module: Overall minimum score of 6.5 (with no section below 5.5). TOEFL (Test of English as a Foreign Language) Paper Based: Overall minimum score of 575 (with minimum score 4.5 in the written test) Internet based : Overall minimum score of 90 (with minimum score 20 in the written test) University of Cambridge and Oxford: Certificate in Advanced English or Diploma of English Studies Selection The selection of students is based on grades of academic courses. This means that you don’t have to submit recommendation letters or motivation letter when applying to this specific programme. Application Application is done online at: www.universityadmissions.se Note! The application deadline for all applicants is January 15th. [-]

Upc-viu Joint Masters In Computer Security

VIU Valencian International University
Online Part time 1 year October 2017 Spain Valencia

Students who successfully complete this dual degree will have the chance to learn the methodologies and techniques necessary to manage, plan, design and implement the necessary procedures to optimize the safety of different assets, taking into consideration the latest emerging threats. [+]

Masters in IT Security. UPC-VIU Joint Masters in Computer Security It is indisputable increasing technological presence in our environment. As a consequence, the need to maintain all information assets secure arises. Infrastructure protection security incidents are not just value for themselves and need trained professionals who know how to manage them in the most optimal way. The increasing number of threats, as well as the large number of protection and detection devices implanted, have exponentially increased the demand for experts in the design and safety management in any organization. In order to train these professionals, this Joint Masters in Computer Security in conjunction with the Universitat Politècnica de Catalunya is organized. Students who successfully complete this dual degree will have the chance to learn the methodologies and techniques necessary to manage, plan, design and implement the necessary procedures to optimize the safety of different assets, taking into consideration the latest emerging threats. GOALS Check the security status of an entity auditing the various assets that compose and estimating priorities in order to minimize the risks Proactively detect an attack on an entity by monitoring tools, applying data mining techniques on large amounts of information Planning contingency plans and respond to security indicentes applying recognized forensic techniques to maintain the chain of custody, analyze and retrieve information malware Identify those critical assets of an entity and determine the necessary measures to protect Manage digital security of an entity, establishing appropriate methodologies, designing a consistent architecture with business needs and minimizing the risks to which they may expose the different assets Use the tools and protocols required to maintain the confidentiality, integrity and availability of data Identify the necessary measures to ensure the proper functioning of the systems Career prospects Security analyst Cybersecurity consultant ethical hacker Malware analyst Director ICT security Risk analyst ICT security chief research Safe development specialist Manager secure systems and networks Admission Profile Graduate, Degree or Computer Engineering or Telecommunications Engineers and scientific-technical graduates interested in obtaining internationally recognized qualification to demonstrate their knowledge of computer security and its ability to protect its facilities from cyber attacks IT administrators Members of the security forces and state Consultants computer security companies Consultants incident response teams security Technicians critical infrastructures IT directors and managers Lawyers who want to specialize in computer crime [-]

MSc in IT Management

Wilhelm Buechner University of Applied Sciences Darmstadt
Online Part time 2 - 3 years Open Enrollment Germany Germany Online

IT managers work in companies at the interface between information-technology and business processes. They plan, steer, and monitor company IT, including its allocated resources, thus helping to improve the effectiveness and efficiency of the enterprise. Moreover, they are in a position to evaluate modern information technologies and show where they can be of benefit in the design and optimization of the value creation process, whether locally or in an international business environment. [+]

IT managers work in companies at the interface between business and information-technology processes. They plan, steer, and monitor company IT, including its allocated resources, thus helping to improve the effectiveness and efficiency of the enterprise. Moreover, they are in a position to evaluate modern information technologies and show where they can be of benefit in the design and optimization of the value creation process, whether locally or in an international business environment. This master’s program is designed for IT specialists, computer scientists, engineers, natural scientists, and economists who require background knowledge for implementing and managing IT services in managerial and executive positions. In this program you gain the expertise and competences you need to successfully master organizational tasks. Implementation of the measures that result from your work will be cost-efficient and effective. As a graduate, you will be able to formulate and put into practice an IT strategy based on company goals and business processes. As an IT manager in your firm, you are the vital link between IT and business policies. Therefore, our course of studies offers you the management skills and the expertise you need to plan and develop modern IT architectures. You gain the knowledge required in the subdisciplines relevant to IT environments and you develop the soft skills necessary in order to feel comfortable in executive positions and project management. Your expertise and management skills also form an excellent basis for a position in business consulting. With this master’s degree you are also eligible for senior civil service positions and for admission to Ph.D. programs. The level of innovation in IT and in processes supported by information systems is extremely high. The IT Management master’s degree course readies you for a wide range of possibilities and provides excellent long-term perspectives at home and in the international job market. Fundamentals and Core Area Fundamentals Quantitative Methods and Financial Mathematics 6 credits Project Management and Management Techniques 6 credits Organizational Development 6 credits Elective: (1 of 2) Corporate Management 6 credits Distributed Information Systems 6 credits Core Areas Strategic Information Management 6 credits International Management and Intercultural Communication 6 credits Management of IT Projects and Quality 6 credits IT Innovation Management 6 credits IT Service Management 6 credits Collaboration Engineering 6 credits Specialization and Application Specialization (Pick two modules) IT Controlling 6 credits IT Security Management 6 credits Software Architecture and Concepts 6 credits E-Business Management 6 credits Scientific Application and Project Studies Business Research Methods 6 credits Specialization Elective (in one of the chosen modules) 6 credits Project Work 6 credits Studying with Maximum Flexibility Wilhelm Büchner University leads the way in terms of distance/online learning technology and organization. With us, you can complete an MSc in Technology and Innovation Management alongside work – and study in the comfort of your own home. You learn whenever and wherever you want, and you can start studying at any time. All over the world. We are dedicated to giving you the support you need. So you can reach your goals. Distance and Online Learning We offer you an innovative mix of distance learning methods that combines study booklets with online study aids such as downloads, videos, webinars, and group forums. As these are accessible from PCs, tablets, and smartphones, you benefit from maximum flexibility. Furthermore, tutors and student advisors are always on hand to provide you with reliable, personalized online support. At Wilhelm Büchner University, you determine your own study rhythm to fit your personal circumstances. We offer you reliable and personalized support throughout your studies and are easily reached whenever you need us. [-]

Mastère Spécialisé SIS : Sécurité de l’Information et des Systèmes

ESIEA Graduate Engineering School
Campus Full time 12 months October 2017 France Paris

Le Mastère Spécialisé® SIS s’adresse à tous ceux qui souhaitent devenir experts de la sécurité de l’information et des systèmes, disposant d’une vision globale du système d’information – et plus généralement de l’information – qu’ils doivent protéger, et capables de répondre de manière rapide et efficace aux situations très variées d’insécurité, liées à des attaques externes ou internes, auxquelles ils se trouvent confrontés. [+]

Masters in IT Security. Le Mastère Spécialisé® SIS s’adresse à tous ceux qui souhaitent devenir experts de la sécurité de l’information et des systèmes, disposant d’une vision globale du système d’information – et plus généralement de l’information – qu’ils doivent protéger, et capables de répondre de manière rapide et efficace aux situations très variées d’insécurité, liées à des attaques externes ou internes, auxquelles ils se trouvent confrontés. Face à ces phénomènes, le spécialiste doit avoir une vision globale. Le Mastère Spécialisé® SIS est destiné à des profils Bac+5 (ou éventuellement Bac+4) sachant programmer, et ayant un socle technique solide. Le Mastère Spécialisé® SIS est notamment ouvert aux cadres déjà en activité qui souhaitent se spécialiser en sécurité informatique. À l’issue de la formation, les étudiants sont capables d’évaluer la sécurité d’un système d’information, de définir un plan de protection des installations qui leur sont confiées, d’élaborer et de mettre en oeuvre les dispositifs techniques correspondants, et d’en assurer l’exploitation opérationnelle. Ils interviendront en tant que responsables opérationnels, ingénieurs, consultants ou chefs de projets dans la sécurité des systèmes d’information ou des réseaux, le développement d’applications sécurisées, le reverse engineering ou encore l’audit et l’évaluation des risques. La Sécurité de l’Information & des Systèmes : du code au réseau Le Mastère Spécialisé SIS a pour objectif de former les spécialistes de la sécurité de l’information que les entreprises attendent. Les points forts du Mastère Spécialisé Sécurité de l’Information et des Systèmes 1. Un Mastère Spécialisé est une formation Bac+6 d’une durée d’au moins deux semestres. Elle inclut des enseignements théoriques, un travail personnel de recherche en entreprise et la soutenance d’une thèse professionnelle. Cette formation est accréditée par la Conférence des Grandes Écoles. 2. Le Mastère Spécialisé SIS – ESIEA est une formation exhaustive et exigeante qui va de l’ISO 27001 jusqu’au Reverse Engineering, la virologie et la cryptologie, en passant par la programmation sécurisée, l’intelligence économique, la sécurité Windows ou la programmation de cartes à puce. 3. La pédagogie repose sur une mise en pratique constante, où l’étudiant est véritablement acteur de sa formation. Afin de se placer dans des situations proches de la réalité des entreprises, des scénarios d’urgence sont reproduits en temps réel dans notre laboratoire de sécurité, ou opposent des équipes qui défendent et attaquent alternativement un système ou une application. 4. Le Mastère Spécialisé SIS – ESIEA fait intervenir une cinquantaine d’experts, souvent internationalement reconnus. 5. Créé en 2004, le Mastère Spécialisé SIS – ESIEA a diplômé plus de 350 étudiants. 6. L’ESIEA est un acteur reconnu de la formation et de la recherche en matière de cybersécurité. L’école fait partie des rares acteurs de l’enseignement cités par le rapport d’information sur la cyberdéfense du Sénateur Bockel (Juillet 2012). Son équipe de cryptologie et virologie opérationnelles a été à l’origine du projet DAVFI, de développement d’un antivirus open source « made in France”, soutenu par l’État dans le cadre des Investissements d’Avenir. 7. Le Mastère Spécialisé SIS – ESIEA figure : Dans les quatre formations retenues dans la catégorie « Réseaux, Télécoms, NTIC » par le Palmarès 2014 des meilleurs Mastères Spécialisés du journal Le Figaro- Étudiant. Comme seule formation en sécurité retenue dans le banc d’essai 2014 des MS et MBA spécialisés en Systèmes d’Information du journal Le Parisien Pré-requis La formation exige des pré-requis techniques, une forte motivation et une grande disponibilité : Savoir élaborer un programme en C et Java Connaître et savoir utiliser les commandes UNIX Posséder des notions générales sur l’architecture d’un système, hors matériels, (processeur, mémoire, système d’entrée, sortie) : rôles et relations. De très bonnes capacités d’expression orale et écrite en langue française sont aussi exigées, ainsi qu’un bon niveau en langue anglaise. Candidatures (année universitaire 2017/2018) Les demandes de Dossier de Candidature doivent être faites par courrier, accompagné d’un CV qui permet à la Direction du Programme de statuer sur la recevabilité de votre candidature. Si votre candidature est jugée recevable, nous vous adressons un Dossier de Candidature, qui doit nous être retourné dûment complété. La première session de recrutement pour le Mastère Spécialisé SIS porte sur les dossiers déposés avant le 31 mai 2017. Il est recommandé à tous les candidats de faire leur demande, et leur dépôt, de dossier au plus tôt – et notamment pour les candidats salariés, qui feront une demande d’aide du FONGECIF, ou les candidats étrangers, qui devront faire des démarches d’obtention de visa. Une vingtaine de places seulement sont ouvertes. En fonction des places restant disponibles, une session de recrutement supplémentaire se terminera le 30 juin 2017, et éventuellement une troisième, avant le 25 septembre 2017. Après étude du dossier de candidature, les candidats déclarés admissibles, sont convoqués pour deux entretiens (ou, pour les candidats résidant à l’étranger, pour un rendez-vous Skype ou téléphonique) : un entretien avec Vincent GUYOT, directeur scientifique du Mastère Spécialisé de Paris, ou Eric FILIOL Directeur de Recherche, laboratoire CVO (Cryptologie et Virologie Opérationnelle) axe CNS (Confiance Numérique et Sécurité). un entretien avec un autre membre de l’équipe pédagogique. La décision d’admission est notifiée au candidat par écrit à la suite de ces entretiens, dans le mois qui suit la date limite de dépôt de dossier. Cette décision relève du directeur général de l’ESIEA, sur proposition motivée du Directeur de Programme. L’inscription définitive est soumise au règlement de la scolarité. [-]

MSS in E-Business & Information Security

ESAIP Graduate School of Engineering
Campus Full time 2 years September 2017 France Angers

No need to speak French to attend our programs (taught entirely in English), however you will master French and French culture before you Graduate... [+]

No need to speak French to attend our programs (taught entirely in English), however you will master French and French culture before you Graduate. IN BRIEF: A 2 year programme Fall program from September Sping program from March Key modules : Software & Database Engineering Network & Security Management Cultural Integration Intensive French Courses (partnership with CIDEF) 4 certification Packs (1 choice) : Project Manager (ITIL, CMMI) Cyber-Security Expert (CEH, ECSA) Network & Systems Expert (CISCO CCNA, LPI or Windows Server) Mobile Development Expert (Android, IOS or Windows Mobile) MAKE THE DIFFERENCE ON THE MARKET No need to speak French to attend our programs (taught entirely in English), however you will master French and French culture before you Graduate. ESAIP has a unique partnership with the CIDEF French Language center, quality approved by the French State. Even more, you will have a significant experience the French companies and develop unique French Management skills! Furthermore, you will be able to interact with more than 247 million French speaking people in 80 countries located on the 5 continents. ADMISSIONS REQUIREMENTS Eligibility - Our International MSS is open to candidates holding a bachelor’s degree (or equivalent) in Computer Science or related fi elds. Application Deadlines - Fall Program: Application closes July 31. / Spring Program: Application closes January 31st. Application Process - Academic File Evaluation + Online Interview English Proficiency - Internationally recognized standardized tests of English are compulsory for all candidates who are neither native English speakers nor holders of a bachelor’s obtained from an English language institution of higher education. Minimum scores required: TOEFL (minimum score 550 ITP, 213 CBT, 80 IBT) or TOEIC (minimum score 750) or IELTS (minimum score 6.0) French Proficiency - ESAIP’s International MSS is taught exclusively in English. Students are not required to demonstrate French profi ciency upon program start. [-]

Online Master of Science in Information Technology

Boutique Universities Consortium
Online Part time September 2017 USA USA Online

The University of the Potomac is ranked #2 in the U.S for “Small Colleges that Cost the Least but Reap the Most Earnings” according to The Street, financial magazine. Potomac offers the full MBA degree curriculum at two convenient locations. Students can also choose to take their courses in the heart of Washington D.C. or at the Vienna, Virginia campuses. The Potomac faculty and staff work individually... [+]

Masters in IT Security. The University of the Potomac is ranked #2 in the U.S for “Small Colleges that Cost the Least but Reap the Most Earnings” according to The Street, financial magazine. Potomac offers the full MBA degree curriculum at two convenient locations. Students can also choose to take their courses in the heart of Washington D.C. or at the Vienna, Virginia campuses. The Potomac faculty and staff work individually with each of our students to establish an academic pathway that best satisfies his or her needs, and how these needs relate to their course of study as well as their ultimate professional goals. Potomac’s Masters of Science in Information Technology program gives students an advantageous mix of cyber/network preparation with marketable leadership skills for planning and implementing critical computer activities in an organization and managing IT professionals. Graduates from the MSIT degree program will be prepared in data analysis, data and information systems management, cyber and network security, leadership, and marketing. Graduates will be empowered with both the knowledge and skills required to work as IT managers or cyber security specialists in U.S. business organizations and government agencies, non-governmental organizations, and international entities. You can earn your MSIT online or at one of our convenient campuses. Available: Online Time to complete: 36 credits | 18 months Cost: On-Campus International - $900 per credit Approximately $16,200.00 per year (9 months) +applicable fees Online International - $721.00 per credit Approximately $12,978.00 per year (9 months) +applicable fees Transfer Credit: Students with credit from other institutions can submit their transcripts to the Registrar’s Office to determine if transfer credit for graduate coursework can be provided. Due to its accreditation requirements, University of the Potomac must evaluate each transcript on a case-by-case basis before granting any academic credit. Scholarships: Federal financial aid available to qualified students Admission Requirements: - Completed Admissions Application Form - $100 Application Fee - ALL Transcripts/Diplomas (translated if not in English) - Proof of English Proficiency - Proof of Financial Funds - Copy of passport with photo - Two letters of recommendation - Graduate Essay Concentrations: - Information Technology Management - Cyber Security Course Structure: To receive an MSIT, students must earn 36 semester credit hours. - Information Technology Core - 24 credits - Electives - 12 credits [-]

Executive Master in Information Technology

American University of Nigeria
Campus Part time 36 months March 2017 Nigeria Yola

The Masters degree in Information Technology will appeal to graduates who hold a primary degree in Computer Science or related course in computing and who wish to upgrade their qualification to Masters’ level. Our degree will also appeal to graduates with other science or engineering backgrounds who wish to work in the IT industry. The course is offered on a part-time basis leading to a diploma certificate or... [+]

Executive Master in Information Technology The Masters degree in Information Technology will appeal to graduates who hold a primary degree in Computer Science or related course in computing and who wish to upgrade their qualification to Masters’ level. Our degree will also appeal to graduates with other science or engineering backgrounds who wish to work in the IT industry. The course is offered on a part-time basis leading to a diploma certificate or Masters Degree in IT. This opportunity will appeal to students currently in employment as well as those who wish to progress after their primary degree program from AUN or other accredited University. It is a block-release course over three summer terms spanning 18 – 36 months for those interested in diploma or Masters Degree option. The course consists of a taught component and a project work relevant to the students’ industrial preferences or his/her choice of concentration. Certificate Options Candidates for the Diploma certificate in IT are expected to satisfactorily complete the listed modules and attain the grade point average (CGPA) of 2.0 or better. To proceed to the Masters degree program, students will be required to complete the listed modules and also attain minimum CGPA points of 3.0 on a scale of 4.0. In addition, candidates will also be expected to submit a dissertation based on practical research work completed by December of the second year, but no later than summer of the third year. Careers The Masters in Information Technology is designed to produce graduates with in-depth skills in contemporary computer systems and management. Prospective careers for such graduates include designing computer infrastructures, systems (hardware and software) management, planning, and research. Being an independent IT consultant is also a direct possibility. The course is modeled to facilitate a rewarding IT career in the banking, oil & gas, industrial, telecommunications and Government establishments. Program of Study The general course component of the masters’ degree course in IT is a three-year, part-time, taught postgraduate program. It consists of ten taught modules and a major project during the third year for those proceeding to the Masters Degree program. Each taught module is worth 1, 2 or 3 credit points and the final dissertation is worth 6 credit points. Each credit point is worth 15 hours of lecture time. The course runs over three years during the summer terms. Taught material is presented by certified instructors from AUN and top American and European Universities. For those proceeding to the Masters degree, the final year project must be completed by the end of the third academic year. In the first year of study, students will study five modules over a 5-week period and one week for exams. Lectures are delivered as block-release modules starting at 8:00am and ending at 5:00pm Monday through Friday (breaks inclusive). The same regime holds on the second summer. Students proceeding to the Masters program shall be required to conduct a significant research work in their final year project/dissertation in their selected areas of concentration as part of the condition for the award of AUN Masters degree in IT. Student would be required to defend the Masters dissertation before the award of the degree. Program Fees The fee for the IT program per year is N750,000.00. Entry Requirements The principal entry requirement for Higher Degree Courses in the School of Information Technology & Computing is a minimum of second class lower division degree or equivalent. Candidates with Higher National Diploma (HND) and substantial industry experience may be considered. An interview may be part of the admission process. Master’s degree is required to enroll in a PhD in IS/IT; and the School of IT & Computing’s PhD comprehensive examination given, after the taught compulsory graduate courses must be passed in order to progress to continue PhD research. [-]

Master of Information Security and Intelligence

Edith Cowan University
Campus Full time 3 semesters January 2017 Australia Perth

A professional course designed to meet the demand for security and intelligence professionals in government, law enforcement, and industry [+]

Master of Information Security and Intelligence

A professional course designed to meet the demand for security and intelligence professionals in government, law enforcement, and industry.

Related careers

Computer Security Consultant, Information Security Consultant

Further studies

Students interested in progressing further in this area can elect to study the Doctor of Philosophy.

Further courses

Doctor of Philosophy

Related studies

The Graduate Certificate of Information Security and Intelligence and Graduate Diploma of Information Security and Intelligence are also available in this discipline.... [-]


Master of Applied Science (Information Security and Assurance)

RMIT University
Campus Full time 2 years January 2017 Australia Melbourne

In an increasingly networked world, information security and assurance are fundamental to organisational success. From the latest internet worm to identity... [+]

Master of Applied Science (Information Security and Assurance)

In an increasingly networked world, information security and assurance are fundamental to organisational success. From the latest internet worm to identity theft, the danger is no more than a mouse-click away.This program develops the key skills and knowledge you need to meet online security challenges. You'll learn about:

wireless LAN security the Advanced Encryption Standard RSA elliptic curve cryptography smart cards biometrics information systems risk management.

The Master program is aimed at information security managers providing principles underlying the components of information security systems, and technical specialists who are interested in the implementation or critical evaluation of information security systems.Alternatively, those interested in the role of a systems administrator or risk analysis consultant can choose to exit the program at Graduate Diploma level.This Master program also offers opportunities for internships in the information security industry.... [-]


Master Program in Information Security

Luleå University of Technology
Campus or Online Full time 2 years September 2017 Sweden Luleå

This program is designed to provide the foundation for understanding the key issues associated with protecting information assets, and to emphasize the business considerations and consequences of effective information security management. [+]

Master Program in Information Security, 120.0 Credits

During the first year of your studies important concepts within the area will be defined, for example information security, safety, critical systems, information classification, and risk analysis. Other important issues are techniques to transfer information between users in business and how transferring can be made in a secure way. Internet Secutity is a course during the first year where you learn more about this. You also gain knowledge of professions and roles from a security perspective and important standards used. The first year is completed by project work in a company or a public authority. The function of cooperation and collaboration and the system for decision making are important when working with security. Therefore, during the second year you learn about information security management. Research within the area of information security is one other issue during the second year. Parallel to this, you can choose between various courses focused on technologies or management. The thesis is also written during the last year.... [-]


Master in Information Security Technology

Gjøvik University College (GUC)
Campus Full time 2 years January 2017 Norway Oslo

A Master of Science in Information Security will provide you with the knowledge and theoretical background as well as with the requisite skills and attitudes to succeed in this challenging yet eminently rewarding field. [+]

Information Security Information technology permeates all aspects of society and has become critical to industry, government, and individual well-being. Securing these vital services and structures and the availability of trustworthy information whenever and wherever it is required has become both an area of intensive research and also of burgeoning commercial activity.

Contents of the studyA Master of Science in Information Security will provide you with the knowledge and theoretical background as well as with the requisite skills and attitudes to succeed in this challenging yet eminently rewarding field.

Language of instruction is English.

Major areas of study:Crypthography and security mechanisms Network security Intrusion detection and prevention Security management Biometric authentication Information warfare Wireless communication security The Laboratories... [-]