Master in IT Security in Europe

Compare Masters Programs in IT Security in Europe 2017

IT Security

The benefits of a Masters extend beyond improving your earning potential. They can provide you with personal and professional skills to accelerate your development. They are also an opportunity to differentiate yourself from your peers, many of whom will have similar A-level and undergraduate qualifications.

Students who are skilled in technology may be interested in IT security, which is the study and practice of protecting electronic systems from various threats. It includes everything from software programming to hardware design to user training.

In all, there are over 4000 Higher Education Institutions in Europe offering a wide range of courses at Bachelor, Masters and Doctorate level. With more and more of these organizations offering English as the language of education for at least some of their degree programs, universities in Europe are now of higher quality than ever before. Universities in Europe offer a friendly welcome to foreign students and to give a course of knowledge that meets their profession needs in today’s global demand.

View all Master Programs in IT Security in Europe 2017

Read More

Master Security Business Information

OBS Business School
Online Full time Part time 12 months May 2017 Spain Barcelona + 1 more

The graduate in Business Information Security professionals and managers to facilitate the definition of strategies and knowledge of tools to work around the security of the data. Information has become the most valuable to many organizations active at present data are an essential element to generate competitiveness ... [+]

Masters in IT Security in Europe 2017. Master in Business Information Security The graduate in Business Information Security professionals and managers to facilitate the definition of strategies and knowledge of tools to work around the security of the data. Information has become the most valuable to many organizations, today data are essential to competitiveness and generate high profit margins for active element of modern business. Companies, regardless of size, are making great efforts to keep the information from its source to its use for operations and decision-making, which is a given amount of data being generated daily function and understandable from different sources. Social networks, mobile devices, e-commerce, the era of big data, etc., are some of the factors that have driven the fact that security in information security management and IT management have become factors key to today's organizations. Companies need to implement solutions and processes to ensure their information, both internal and external threats, it is why the Business Information Security currently represents one aspect to be considered in the Strategic Plan of the entire organization. Professional outings Systems Auditor Computer specialists Network Administrator Database Manager IT Security Consultant Security Manager Information Security Analyst IT risks Systems Developer Infrastructure Manager Project Manager IT Security Objectives of the Master in Business Information Security What goals are going to get? Professionally train managers in leadership and management systems information security companies. Define the necessary keys to interact with consultants and security experts. Promote and implement strategies capable of shielding the knowledge of companies. Leveraging knowledge assets imperative for improvement and development in the framework of the information society and knowledge. Get a second accredited by the most reputable business school in Spain, EAE Business School, as ranked Merco (2014) and guaranteed qualification for a major public universities in Spain, the University of Barcelona (UB), with more than 560 year history. Curriculum Master in Business Information Security The program lasts 12 months and can be started in May or November of each year month. It comprises a total of 10 modules, divided into 3 blocks, and a final project being developed along the Master. Security Requirements Master of Business Information The fundamental goal of our admissions process is to ensure the suitability of candidates. All participants must get the most out of this learning experience, through a context in which it is possible to develop a long-term relationship with classmates, teachers and alumni. These are the stages of the admission process: 1. Prerequisites for admission in February. Admission 3. Personal Interview 4. Cover letter in May. 6 Assessment Admissions Committee. Matriculation Master degree in Corporate Information Security People who pass the evaluation of the program and meet the academic requirements established by the UB, will be awarded the UB (University of Barcelona). In addition, all persons who pass the assessment will receive the degree of EAE Business School. To obtain the degree of UB is necessary to have University Degree (Engineering Degree or Diploma). Failure to have a University Degree, once passed the different assessments, a diploma of university extension of UB is obtained. Financial Aid Master in Business Information Security OBS offers candidates the scholarship program to promote continuing education for professionals, entrepreneurs and managers. To apply for one of these grants, which fund part of the program, candidates must be admitted to the program and meet the specified requirements. The Admissions and Scholarship Committee will assess the adequacy of the profile and the career of the candidates, the reasons given in the letter of scholarship application and the candidate's professional and academic recommendations. [-]

Master in Information Security

Harbour.Space
Campus Full time September 2017 Spain Barcelona

Programme Description The Information Security Master Degree program is designed for those who want to extend their technical and programming skills to handling enterprise security challenges. Our comprehensive courses will provide a solid foundation in key technology including computer and network security, cryptography, enterprise security architecture analysis, etc. The graduates will learn to stay current on rapidly changing technology, adapt and control to new threats and start a successful career in enterprise security. [+]

Programme Description This program is taught in ENGLISH. The Information Security Master Degree program is designed for those who want to extend their technical and programming skills to handling enterprise security challenges. Our comprehensive courses will provide a solid foundation in key technology including computer and network security, cryptography, enterprise security architecture analysis, etc. The graduates will learn to stay current on rapidly changing technology, adapt and control to new threats and start a successful career in enterprise security. PROGRAMME STRUCTURE Year 1 During the first year students quickly recap basics of computer science and then focus on fundamentals of cyber security including computer architecture, operating systems security, secure programming, networks, and cryptography. Modules Computer Architecture Secure Programming Algorithms and Data Structures Practical Unix Windows Administration Operating Systems Computer Networking Human Aspects of Cyber security: Law, Ethics and Privacy Cryptography Software Engineering & Design Scripting Languages Java Programming Identity and Access Management Technical Writing and Presenting Introduction to Interaction Design Leadership and Group Dynamics Secure Data management Capstone Project Seminars & Workshops Year 2 The second year exposes students to different dimensions of cyber security field. Subjects range from Mobile and Cloud Security to Digital Forensics and Quantum Communication and Cryptography. Additionally students participate in communication and leadership modules preparing them for the career as a successful member of a professional team. At the end of the program, graduates will be ready to take on responsibilities to safeguard an organization’s information and technology assets. Modules Technical Project Management Application Security Mobile Security Network Security Enterprise Security Architecture and Design Software Testing Reverse Software Engineering Vulnerability Analysis, Penetration Testing, Intrusion Detection and Incident Handling Ethical Hacking and Response Cyber Warfare Security Tools for Information Security Digital Forensics Quantum communication and cryptography Parallel and Distributed Computing Cloud Computing Advanced computer networks Distributed Databases Global Cyber Capabilities and Trends Enterprise Security Threats Enterprise Security Case Studies Economics of Security Cyber Risk Management Information Governance Cyber security Governance and Compliance Cyber security Law & Policy Captstone Project Seminars & Workshops Programme Leadership RICHARD BUCKLAND PhD,Chair of the Academic Board of the Australian Computer Society Education, Member of UNSW Academic Board LIVING IN BARCELONA Studying in Barcelona has the following advantages: Barcelona is #1 in Europe for quality of life and clearness of environment (2012 Quality of Life City Rankings – Mercer Survey) Barcelona is #1 in the world for the level of infrastructure and urban development (2011, Ernst & Young). The region of Catalonia, where Barcelona is the capital, contributes significantly to the Spanish GDP. The growth of Catalonia’s GDP is currently 3.3%, much higher than in Europe on average. Catalonia’s exports are €42.2 billion, higher than in any other region of Spain. 7,000+ innovation and technological companies during the last 10 years. Barcelona is 6th in Europe for attractiveness and comfort for doing business (European Attractiveness Survey 2011, Ernst & Young), Barcelona is 2nd in Europe (after London) for being promoted as a business center (European Cities Monitor 2011); Barcelona is 2nd in the world for hosting different international conferences and congresses (City and Country World Report 2011, ICCA ). Barcelona is the host of the annual World Mobile Congress, which attracts thousands of international companies that work in the mobile industry. 7,000,000 + millions of tourists / year 20° C - average temperature during the day 2437 hours of sunshine/ year Cost of living 550 euro / month [-]

Master in Mathematics: Mathematics for Information Technologies

Charles University Faculty of Mathematics and Physics
Campus Full time 2 years October 2017 Czech Republic Prague

This Master Program focuses on deeper knowledge of various mathematical disciplines and their algorithmic aspects. The student can get specialized either in Mathematics for Information Security or in Computer Geometry. [+]

Masters in IT Security in Europe 2017. This Master Program focuses on deeper knowledge of various mathematical disciplines and their algorithmic aspects. The student can get specialized either in Mathematics for Information Security or in Computer Geometry. The direction Mathematics for Information Security is focused on deepening the theoretical knowledge of number theory, probability theory, theory of error correcting codes, complexity theory, theory of elliptic curves, and computer algebra applied to some of these subjects. Attention is also given to practical aspects such as internet security, standards in cryptography, and legal aspects of data security. The direction Computer Geometry deepens theoretical knowledge in various algebraic and geometric subjects together with their applications in geometry of computer vision and robotics, computer graphics and image processing, optimization methods, and numerical linear algebra. Entrance examination – Master's programme Applicants who will not sufficiently demonstrate the necessary background listed above by 9 May 2016, or with their application, will be invited to take the entrance examination in Prague. The entrance examination for a Master's programme at the Faculty of Mathematics and Physics at Charles University consists of four problems, each worth 25 points. In case of an incomplete solution a proportional number of points will be given. The maximum total score is 100. The minimum score for admission is 40 points out of 100. Depending on the study programme and study branch, the examination has the following structure: Mathematics (4 problems) Master’s Entry Requirements The goal of the admissions review process is to select from the pool of applicants those individuals who have shown the best capability and diligence expected of Charles University students. To apply for our Mathematics or Computer Science Master's programmes delivered in English you must - hold or be working towards a Bachelor’s or Master’s diploma and provide a certified copy thereof; in cases required by law, a certification of equivalence of education must accompany the application, - have sufficient academic background in the relevant fields (see below for details); this can be demonstrated by passing the specialized entrance examination in June 2016 in Prague that is organized by the Faculty of Mathematics and Physics, Charles University, or by providing transcripts (academic records) of your previous education accompanied by syllabi of the completed courses; promising students who do not have this background may be admitted with the provision that they complete the missing knowledge from Bachelor's courses, - have sufficient command of the English language; this can be demonstrated by providing your results in one of the standardized English tests that we recognize (see below for details). You are also welcome to accompany your application by - a statement of purpose in which you describe your reasons for applying to the proposed programme, your study and possibly also research interests and future career plans, - letters of recommendation as recent as possible from professors and employers who can comment on your recent professional accomplishments and your qualifications for pursuing a Master's degree in mathematics or computer science. English Language Proficiency All applicants must have an adequate command of English in order to enrol at Charles University. An applicant’s proficiency level in English may be demonstrated by various language tests; any language test results should not be older than two years. The only exemption from this requirement is for students who have completed at least two years of their previous education with English as the sole language of instruction in one of the following countries: Australia, Canada, Ireland, New Zealand, UK, or USA. The table below summarizes the minimum requirements in the various tests of English that we recognize; you must meet the minimum score for at least one of the tests listed here, or provide us comparable results for other recognized qualifications (if in doubt please contact us to obtain specific required scores for other internationally recognized English Language qualifications). Test Minimum score TOEFL Paper / Computer / Internet based - 550 / 213 / 80 SAT Critical Reading and Writing - 550 in each part ACT English and Reading - 24 International Baccalaureate English - 6 The International English Language Testing System (IELTS) - 6.5 Cambridge ESOL FCE A level Cambridge ESOL CPE, or Cambridge ESOL CAE - Passed City&Guilds International ESOL, or City&Guilds International Spoken ESOL - Expert level The European Language Certificates - Level TELC English C1 UNIcert English for Mathematicians - Level C1 Melab - 77 Examination for the Certificate of Proficiency in English (ECPE) - Pass Test of English for International Communication (TOEIC) - 605 Vancouver English Centre (VEC) level / online score - 13-14 / 74 General State Language Examination in English in the Czech Republic - Pass Conditions for admission without entrance examination Academic background In this paragraph we summarize the minimum knowledge required for applicants in the various study programmes and study branches offered at our faculty. Master of Mathematics Common requirements: A sound background in linear algebra, real and complex analysis, measure theory and probability theory. Mathematics for Information Technologies: + commutative and computer algebra, theoretical and applied cryptography. Academic records demonstrating the necessary background must show the dates of enrolment and the subjects or courses taken, together with the units of credit or time allotted to each subject. The records must also include a complete description of the institution's grading scale or other standard of evaluation. Unless academic records and diplomas are routinely issued in English by the institution, the official records in their original language must be submitted with an authorized, complete, and exact English translation. Information on the exercise of graduates Graduates have a broad knowledge of advanced algebra, geometry and logic, and can apply it to solve advanced problems of mathematical information security and computer geometry. Graduates specialized in Mathematics for |Information Security are well acquainted with both the present and prospective systems of data security and encryption, including their mathematical principles, practical applications and standards. The mathematical knowledge covers the theoretical background of cryptography in full breadth (number theory, self-correcting codes, complexity of algorithms, elliptic curves, one-way functions). Graduates also understand the structure of cryptographic protocols and are aware of basic legal aspects of data security. Graduates specialized in Computer Geometry have deep knowledge of algebra and geometry subjects that are applied in information technologies processing geometric information and data. The graduates are well prepared for various jobs in information technologies where understanding and processing new knowledge and big data is needed. They are also prepared for academic career. [-]

Upc-viu Joint Masters In Computer Security

VIU Valencian International University
Online Part time 1 year October 2017 Spain Valencia

Students who successfully complete this dual degree will have the chance to learn the methodologies and techniques necessary to manage, plan, design and implement the necessary procedures to optimize the safety of different assets, taking into consideration the latest emerging threats. [+]

UPC-VIU Joint Masters in Computer Security It is indisputable increasing technological presence in our environment. As a consequence, the need to maintain all information assets secure arises. Infrastructure protection security incidents are not just value for themselves and need trained professionals who know how to manage them in the most optimal way. The increasing number of threats, as well as the large number of protection and detection devices implanted, have exponentially increased the demand for experts in the design and safety management in any organization. In order to train these professionals, this Joint Masters in Computer Security in conjunction with the Universitat Politècnica de Catalunya is organized. Students who successfully complete this dual degree will have the chance to learn the methodologies and techniques necessary to manage, plan, design and implement the necessary procedures to optimize the safety of different assets, taking into consideration the latest emerging threats. GOALS Check the security status of an entity auditing the various assets that compose and estimating priorities in order to minimize the risks Proactively detect an attack on an entity by monitoring tools, applying data mining techniques on large amounts of information Planning contingency plans and respond to security indicentes applying recognized forensic techniques to maintain the chain of custody, analyze and retrieve information malware Identify those critical assets of an entity and determine the necessary measures to protect Manage digital security of an entity, establishing appropriate methodologies, designing a consistent architecture with business needs and minimizing the risks to which they may expose the different assets Use the tools and protocols required to maintain the confidentiality, integrity and availability of data Identify the necessary measures to ensure the proper functioning of the systems Career prospects Security analyst Cybersecurity consultant ethical hacker Malware analyst Director ICT security Risk analyst ICT security chief research Safe development specialist Manager secure systems and networks Admission Profile Graduate, Degree or Computer Engineering or Telecommunications Engineers and scientific-technical graduates interested in obtaining internationally recognized qualification to demonstrate their knowledge of computer security and its ability to protect its facilities from cyber attacks IT administrators Members of the security forces and state Consultants computer security companies Consultants incident response teams security Technicians critical infrastructures IT directors and managers Lawyers who want to specialize in computer crime [-]

MSc in IT Management

Wilhelm Buechner University of Applied Sciences Darmstadt
Online Part time 2 - 3 years Open Enrollment Germany Germany Online

IT managers work in companies at the interface between information-technology and business processes. They plan, steer, and monitor company IT, including its allocated resources, thus helping to improve the effectiveness and efficiency of the enterprise. Moreover, they are in a position to evaluate modern information technologies and show where they can be of benefit in the design and optimization of the value creation process, whether locally or in an international business environment. [+]

Masters in IT Security in Europe 2017. IT managers work in companies at the interface between business and information-technology processes. They plan, steer, and monitor company IT, including its allocated resources, thus helping to improve the effectiveness and efficiency of the enterprise. Moreover, they are in a position to evaluate modern information technologies and show where they can be of benefit in the design and optimization of the value creation process, whether locally or in an international business environment. This master’s program is designed for IT specialists, computer scientists, engineers, natural scientists, and economists who require background knowledge for implementing and managing IT services in managerial and executive positions. In this program you gain the expertise and competences you need to successfully master organizational tasks. Implementation of the measures that result from your work will be cost-efficient and effective. As a graduate, you will be able to formulate and put into practice an IT strategy based on company goals and business processes. As an IT manager in your firm, you are the vital link between IT and business policies. Therefore, our course of studies offers you the management skills and the expertise you need to plan and develop modern IT architectures. You gain the knowledge required in the subdisciplines relevant to IT environments and you develop the soft skills necessary in order to feel comfortable in executive positions and project management. Your expertise and management skills also form an excellent basis for a position in business consulting. With this master’s degree you are also eligible for senior civil service positions and for admission to Ph.D. programs. The level of innovation in IT and in processes supported by information systems is extremely high. The IT Management master’s degree course readies you for a wide range of possibilities and provides excellent long-term perspectives at home and in the international job market. Fundamentals and Core Area Fundamentals Quantitative Methods and Financial Mathematics 6 credits Project Management and Management Techniques 6 credits Organizational Development 6 credits Elective: (1 of 2) Corporate Management 6 credits Distributed Information Systems 6 credits Core Areas Strategic Information Management 6 credits International Management and Intercultural Communication 6 credits Management of IT Projects and Quality 6 credits IT Innovation Management 6 credits IT Service Management 6 credits Collaboration Engineering 6 credits Specialization and Application Specialization (Pick two modules) IT Controlling 6 credits IT Security Management 6 credits Software Architecture and Concepts 6 credits E-Business Management 6 credits Scientific Application and Project Studies Business Research Methods 6 credits Specialization Elective (in one of the chosen modules) 6 credits Project Work 6 credits Studying with Maximum Flexibility Wilhelm Büchner University leads the way in terms of distance/online learning technology and organization. With us, you can complete an MSc in Technology and Innovation Management alongside work – and study in the comfort of your own home. You learn whenever and wherever you want, and you can start studying at any time. All over the world. We are dedicated to giving you the support you need. So you can reach your goals. Distance and Online Learning We offer you an innovative mix of distance learning methods that combines study booklets with online study aids such as downloads, videos, webinars, and group forums. As these are accessible from PCs, tablets, and smartphones, you benefit from maximum flexibility. Furthermore, tutors and student advisors are always on hand to provide you with reliable, personalized online support. At Wilhelm Büchner University, you determine your own study rhythm to fit your personal circumstances. We offer you reliable and personalized support throughout your studies and are easily reached whenever you need us. [-]

Mastère Spécialisé SIS : Sécurité de l’Information et des Systèmes

ESIEA Graduate Engineering School
Campus Full time 12 months October 2017 France Paris

Le Mastère Spécialisé® SIS s’adresse à tous ceux qui souhaitent devenir experts de la sécurité de l’information et des systèmes, disposant d’une vision globale du système d’information – et plus généralement de l’information – qu’ils doivent protéger, et capables de répondre de manière rapide et efficace aux situations très variées d’insécurité, liées à des attaques externes ou internes, auxquelles ils se trouvent confrontés. [+]

Le Mastère Spécialisé® SIS s’adresse à tous ceux qui souhaitent devenir experts de la sécurité de l’information et des systèmes, disposant d’une vision globale du système d’information – et plus généralement de l’information – qu’ils doivent protéger, et capables de répondre de manière rapide et efficace aux situations très variées d’insécurité, liées à des attaques externes ou internes, auxquelles ils se trouvent confrontés. Face à ces phénomènes, le spécialiste doit avoir une vision globale. Le Mastère Spécialisé® SIS est destiné à des profils Bac+5 (ou éventuellement Bac+4) sachant programmer, et ayant un socle technique solide. Le Mastère Spécialisé® SIS est notamment ouvert aux cadres déjà en activité qui souhaitent se spécialiser en sécurité informatique. À l’issue de la formation, les étudiants sont capables d’évaluer la sécurité d’un système d’information, de définir un plan de protection des installations qui leur sont confiées, d’élaborer et de mettre en oeuvre les dispositifs techniques correspondants, et d’en assurer l’exploitation opérationnelle. Ils interviendront en tant que responsables opérationnels, ingénieurs, consultants ou chefs de projets dans la sécurité des systèmes d’information ou des réseaux, le développement d’applications sécurisées, le reverse engineering ou encore l’audit et l’évaluation des risques. La Sécurité de l’Information & des Systèmes : du code au réseau Le Mastère Spécialisé SIS a pour objectif de former les spécialistes de la sécurité de l’information que les entreprises attendent. Les points forts du Mastère Spécialisé Sécurité de l’Information et des Systèmes 1. Un Mastère Spécialisé est une formation Bac+6 d’une durée d’au moins deux semestres. Elle inclut des enseignements théoriques, un travail personnel de recherche en entreprise et la soutenance d’une thèse professionnelle. Cette formation est accréditée par la Conférence des Grandes Écoles. 2. Le Mastère Spécialisé SIS – ESIEA est une formation exhaustive et exigeante qui va de l’ISO 27001 jusqu’au Reverse Engineering, la virologie et la cryptologie, en passant par la programmation sécurisée, l’intelligence économique, la sécurité Windows ou la programmation de cartes à puce. 3. La pédagogie repose sur une mise en pratique constante, où l’étudiant est véritablement acteur de sa formation. Afin de se placer dans des situations proches de la réalité des entreprises, des scénarios d’urgence sont reproduits en temps réel dans notre laboratoire de sécurité, ou opposent des équipes qui défendent et attaquent alternativement un système ou une application. 4. Le Mastère Spécialisé SIS – ESIEA fait intervenir une cinquantaine d’experts, souvent internationalement reconnus. 5. Créé en 2004, le Mastère Spécialisé SIS – ESIEA a diplômé plus de 350 étudiants. 6. L’ESIEA est un acteur reconnu de la formation et de la recherche en matière de cybersécurité. L’école fait partie des rares acteurs de l’enseignement cités par le rapport d’information sur la cyberdéfense du Sénateur Bockel (Juillet 2012). Son équipe de cryptologie et virologie opérationnelles a été à l’origine du projet DAVFI, de développement d’un antivirus open source « made in France”, soutenu par l’État dans le cadre des Investissements d’Avenir. 7. Le Mastère Spécialisé SIS – ESIEA figure : Dans les quatre formations retenues dans la catégorie « Réseaux, Télécoms, NTIC » par le Palmarès 2014 des meilleurs Mastères Spécialisés du journal Le Figaro- Étudiant. Comme seule formation en sécurité retenue dans le banc d’essai 2014 des MS et MBA spécialisés en Systèmes d’Information du journal Le Parisien Pré-requis La formation exige des pré-requis techniques, une forte motivation et une grande disponibilité : Savoir élaborer un programme en C et Java Connaître et savoir utiliser les commandes UNIX Posséder des notions générales sur l’architecture d’un système, hors matériels, (processeur, mémoire, système d’entrée, sortie) : rôles et relations. De très bonnes capacités d’expression orale et écrite en langue française sont aussi exigées, ainsi qu’un bon niveau en langue anglaise. Candidatures (année universitaire 2017/2018) Les demandes de Dossier de Candidature doivent être faites par courrier, accompagné d’un CV qui permet à la Direction du Programme de statuer sur la recevabilité de votre candidature. Si votre candidature est jugée recevable, nous vous adressons un Dossier de Candidature, qui doit nous être retourné dûment complété. La première session de recrutement pour le Mastère Spécialisé SIS porte sur les dossiers déposés avant le 31 mai 2017. Il est recommandé à tous les candidats de faire leur demande, et leur dépôt, de dossier au plus tôt – et notamment pour les candidats salariés, qui feront une demande d’aide du FONGECIF, ou les candidats étrangers, qui devront faire des démarches d’obtention de visa. Une vingtaine de places seulement sont ouvertes. En fonction des places restant disponibles, une session de recrutement supplémentaire se terminera le 30 juin 2017, et éventuellement une troisième, avant le 25 septembre 2017. Après étude du dossier de candidature, les candidats déclarés admissibles, sont convoqués pour deux entretiens (ou, pour les candidats résidant à l’étranger, pour un rendez-vous Skype ou téléphonique) : un entretien avec Vincent GUYOT, directeur scientifique du Mastère Spécialisé de Paris, ou Eric FILIOL Directeur de Recherche, laboratoire CVO (Cryptologie et Virologie Opérationnelle) axe CNS (Confiance Numérique et Sécurité). un entretien avec un autre membre de l’équipe pédagogique. La décision d’admission est notifiée au candidat par écrit à la suite de ces entretiens, dans le mois qui suit la date limite de dépôt de dossier. Cette décision relève du directeur général de l’ESIEA, sur proposition motivée du Directeur de Programme. L’inscription définitive est soumise au règlement de la scolarité. [-]

MSS in E-Business & Information Security

ESAIP Graduate School of Engineering
Campus Full time 2 years September 2017 France Angers

No need to speak French to attend our programs (taught entirely in English), however you will master French and French culture before you Graduate... [+]

Masters in IT Security in Europe 2017. No need to speak French to attend our programs (taught entirely in English), however you will master French and French culture before you Graduate. IN BRIEF: A 2 year programme Fall program from September Sping program from March Key modules : Software & Database Engineering Network & Security Management Cultural Integration Intensive French Courses (partnership with CIDEF) 4 certification Packs (1 choice) : Project Manager (ITIL, CMMI) Cyber-Security Expert (CEH, ECSA) Network & Systems Expert (CISCO CCNA, LPI or Windows Server) Mobile Development Expert (Android, IOS or Windows Mobile) MAKE THE DIFFERENCE ON THE MARKET No need to speak French to attend our programs (taught entirely in English), however you will master French and French culture before you Graduate. ESAIP has a unique partnership with the CIDEF French Language center, quality approved by the French State. Even more, you will have a significant experience the French companies and develop unique French Management skills! Furthermore, you will be able to interact with more than 247 million French speaking people in 80 countries located on the 5 continents. ADMISSIONS REQUIREMENTS Eligibility - Our International MSS is open to candidates holding a bachelor’s degree (or equivalent) in Computer Science or related fi elds. Application Deadlines - Fall Program: Application closes July 31. / Spring Program: Application closes January 31st. Application Process - Academic File Evaluation + Online Interview English Proficiency - Internationally recognized standardized tests of English are compulsory for all candidates who are neither native English speakers nor holders of a bachelor’s obtained from an English language institution of higher education. Minimum scores required: TOEFL (minimum score 550 ITP, 213 CBT, 80 IBT) or TOEIC (minimum score 750) or IELTS (minimum score 6.0) French Proficiency - ESAIP’s International MSS is taught exclusively in English. Students are not required to demonstrate French profi ciency upon program start. [-]

Master's Programme in Information Security

Stockholm University, Department of Computer and System Sciences (DSV)
Campus Full time 2 years September 2017 Sweden Stockholm

Graduates of this programme are ready to work in the area of information security and related fields in both private and public sector organisations as managers, advisors, and specialists providing professional and expert know-how. [+]

Information security is primarily concerned with the protection of information assets. Today, most of the information resides in - and is communicated via IT systems. Hence, these systems need to be protected from various threats and attacks. The goal of information security is to protect with respect to the information its confidentiality, integrity and availability. Naturally, it all depends on the business needs and legal requirements. The area of information security is both exciting and overreaching since it also entails the protection of the essential and critical cyber infrastructure, trying to prevent or solve a wide range of computer crimes and other illicit activities, as well as protecting human rights, freedom and democracy. One of the many objectives is to devise new methods and strategies for cyber readiness and defence. At Stockholm University, we approach the subject area from both the business side and the technical side. This masters programme includes courses such as: Introduction to Digital and Information Security, Secure Software, Information Security in Organisations, Network Security, Information Security Project Management, Cyber Security, Legal aspects of information security and Cyber Forensics. Career The job market for information security professionals is very good. Information security graduates from Stockholm University work, among other, as information security managers (CISO), information security consultants, cyber security specialists, cyber and digital forensics professionals. Some graduates choose to pursue their careers in research education that eventually leads to a doctoral degree in this exciting field. What’s your ambition? Graduates of this programme are ready to work in the area of information security and related fields in both private and public sector organisations as managers, advisors, and specialists providing professional and expert know-how. More information about the programme Credits: 120 Language: English Duration: 2 years Study form: On campus Begins: Autumn Read more about this programme on our website here! http://dsv.su.se/en/education/courses-and-programmes/masters/security More info at: www.dsv.su.se/en/ Qualification requirement A Bachelor degree or a degree equal to 180 ECTS Language proficiency Swedish upper secondary school course English B or: IELTS (International English Language Testing Service)- Academic Module: Overall minimum score of 6.5 (with no section below 5.5). TOEFL (Test of English as a Foreign Language) Paper Based: Overall minimum score of 575 (with minimum score 4.5 in the written test) Internet based : Overall minimum score of 90 (with minimum score 20 in the written test) University of Cambridge and Oxford: Certificate in Advanced English or Diploma of English Studies Selection The selection of students is based on grades of academic courses. This means that you don’t have to submit recommendation letters or motivation letter when applying to this specific programme. Application Application is done online at: www.universityadmissions.se Note! The application deadline for all applicants is January 15th. [-]

Master Program in Information Security

Luleå University of Technology
Campus or Online Full time 2 years September 2017 Sweden Luleå

This program is designed to provide the foundation for understanding the key issues associated with protecting information assets, and to emphasize the business considerations and consequences of effective information security management. [+]

Master Program in Information Security, 120.0 Credits

During the first year of your studies important concepts within the area will be defined, for example information security, safety, critical systems, information classification, and risk analysis. Other important issues are techniques to transfer information between users in business and how transferring can be made in a secure way. Internet Secutity is a course during the first year where you learn more about this. You also gain knowledge of professions and roles from a security perspective and important standards used. The first year is completed by project work in a company or a public authority. The function of cooperation and collaboration and the system for decision making are important when working with security. Therefore, during the second year you learn about information security management. Research within the area of information security is one other issue during the second year. Parallel to this, you can choose between various courses focused on technologies or management. The thesis is also written during the last year.... [-]


Master in Information Security Technology

Gjøvik University College (GUC)
Campus Full time 2 years January 2017 Norway Oslo

A Master of Science in Information Security will provide you with the knowledge and theoretical background as well as with the requisite skills and attitudes to succeed in this challenging yet eminently rewarding field. [+]

Information Security Information technology permeates all aspects of society and has become critical to industry, government, and individual well-being. Securing these vital services and structures and the availability of trustworthy information whenever and wherever it is required has become both an area of intensive research and also of burgeoning commercial activity.

Contents of the studyA Master of Science in Information Security will provide you with the knowledge and theoretical background as well as with the requisite skills and attitudes to succeed in this challenging yet eminently rewarding field.

Language of instruction is English.

Major areas of study:Crypthography and security mechanisms Network security Intrusion detection and prevention Security management Biometric authentication Information warfare Wireless communication security The Laboratories... [-]