- Concentrations: 1. Cyber Security, 2. Mobile Systems (MSc, 1.5 Years or 3 Semesters)
- Duration (years): 1.5 years or 3 semesters
- Qualification Awarded: Computer Science (MSc, 1.5 years or 3 semesters)
- Level of Qualification: 2nd Cycle (Master’s Degree).
- Language of Instruction: English
- Mode of Study: Full-time/ Part-time
- Minimum ECTS Credits: 90
Profile of the Program
The Master degree advances the students’ knowledge in core areas of Computer Science beyond the undergraduate level and exposes them to current and emerging trends. The program provides an introduction to research within the field while strengthening the candidate's effective application of Computer Science methods. The degree is designed to have the learning outcomes related to the application of knowledge and understanding for the analysis, design, and development of computer systems. The curriculum prepares the student for a wide variety of computer-oriented careers, such as managerial positions in the ICT industry as well as technical development, administration or entrepreneurial positions in ICT. The degree constitutes an independent and terminal study in addition to providing the basis for acceptance to and continued studies towards, a doctoral degree in Computer Science. The content of the program is highly practical and experimental and allows the students to choose those elective courses that will meet their future career goals. The practical direction of the degree aims to address the current and anticipated needs of the local industry, this is achieved through close collaboration between the Department of Computer Science and industrial partners through joined projects, guest lecturers to courses, and open days organized by the University and industrial bodies. The program aims of the specialization in Cyber Security focus on the impact of cyber warfare in the contemporary digital era and the analysis of threats, vulnerabilities, and risks in a network environment. It also focuses on penetration testing principles and approaches to mitigate potential network attacks.
The program aims of the specialization in Mobile Systems focus on the fundamental concepts of Mobile Computing and wireless technology as well as on the development of software and applications for mobile platforms.
Graduates of the MSc program should be able to:
- hold managerial positions in the ICT industry or government offices;
- become senior technical developers or administrators in the ICT marketplace;
- become entrepreneurs and establish their own enterprises;
- continue studying towards a doctoral degree.
In addition, graduates of the Cyber Security concentration will be well-suited for positions within government and private industry and should be able to:
- work as Chief Information Security Officers;
- become System, Network, and/or Web Penetration Testers;
- become Computer Network Defense Analysts;
- hold positions such as Security Consultants as well as System and Application Developers.
Alternatively, the specialization in Mobile Systems will enable graduates to:
- become senior technical developers and Mobile Systems Experts providing Mobile computing solutions;
- hold managerial positions in the Mobile Systems industry;
- hold critical positions in Mobile industry operators.
Access to Further Studies
The graduate program provides the basis for acceptance to a doctoral degree in Computer Science.
Course assessment usually comprises of a comprehensive final exam and continuous assessment. Continuous assessment can include amongst others, mid terms, projects, and class participation.
Letter grades are calculated based on the weight of the final exam and the continuous assessment and the actual numerical marks obtained in these two assessment components. Based on the course grades the student’s semester grade point average (GPA) and cumulative point average (CPA) are calculated.
The student must complete 90 ECTS and all program requirements. The program is structured for three semesters, 30 ECTS per semester. There is a thesis option (20 ECTS) and a non-thesis option. In the latter case, the student will be required to take two additional elective courses to fulfill the degree requirements.
A minimum cumulative grade point average (CPA) of 2.0 is required. Thus, although a ‘D-‘ is a PASS grade, in order to achieve a CPA of 2.0 an average grade of ‘C’ is required.
Upon successful completion of this program, the students should be able to:
- Deploy appropriate theory, practices, and tools for the specification, design, implementation, and maintenance, as well as the evaluation of computer-based systems, processes, and programs;
- Analyse and evaluate software solutions from the perspective of software architecture and design patterns;
- Analyse and evaluate software processes from the perspective of established capability and maturity models;
- Specify, design and implement computer-based systems, processes, and programs, as well as implement software project management to meet desired functional and quality requirements;
- Identify security risks that may be involved in the operation of computing equipment within a given context;
- Deploy effectively the tools used for the construction and documentation of software, and in particular in the process involved in using computers to solve practical problems;
- Communicate clearly and analytically using techniques derived from scientific practice in group meetings, presentations, lectures, written reports, and research papers;
- Exhibit such skills that are required to participate in research and development work or to independently work in other qualified areas as well as be able to continue studies towards a doctoral degree.
In addition, graduates of the concentration in Cyber Security will be able to:
- Carry out attacks on networks and systems in a controlled setting to gain practical experience with attack methodologies;
- Deploy key technologies to defend and countermeasure attacks on networks and systems;
- Analyze the cyber warfare landscape, including targets, attack techniques and tools, defense tactics, legislation, and ethical dilemmas;
- Practice security as an integral part of the system development lifecycle rather than an add-on feature.
Graduates of the concentration in Mobile Systems will be able to:
- Analyze and critically assess existing Services and Protocols in Mobile environments;
- Identify the technical aspects of platform dependent and platform independent applications, and the keys issues for the design of applications in cross-platform operating systems;
- Institute a strict policy regarding the utilization of components across platforms, which facilitates scalability and extensibility across mechanisms and applications on different platforms;
- Demonstrate and analyze the various networking metrics and assess the key methodologies for monitoring Mobile Systems’ performance;
- Build, test, and deploy Mobile software solutions collaboratively (in a group) in order to develop a project in the area of ‘Mobile Systems’.
Scholarships - Financial Aid
The University offers scholarships and financial aid to full-time students, in the form of academic merit scholarships, financial-aid assistance, athletic scholarships, and on-campus work-study programs.
This school offers programs in:
Last updated December 30, 2017