Masters in Information and Information Technologies Security
DURATION
2 Years
LANGUAGES
English
PACE
Full time
APPLICATION DEADLINE
15 Jun 2025*
EARLIEST START DATE
Sep 2025
TUITION FEES
EUR 5,950 / per year **
STUDY FORMAT
On-Campus
* for Non-EU Applicants
** For non-EU students
Upcoming Open Day
event on March 20th 2025
Introduction
The program aims to prepare highly qualified information and information technology security specialists, by forming a systematic view of the root causes of information security issues, their prevention, solving, and compensation methods, providing students with the newest knowledge and abilities from the professional and scientific point of view on modern information security insurance methods and technologies, developing original and critical thinking, managerial, research and innovation skills.
Admissions
Scholarships and Funding
Several scholarship options are available. Please check the University website for more information.
Several scholarship options are available. Please check the University website for more information:
Deadline: April 20th
Curriculum
1 semester
- Information Technology Security Methods
- Master Graduation Thesis 1
- Ethical, Legal, and Human Aspects of Information Security
- Cryptographic Systems
- Fundamentals of Scientific Research and Innovations
2 semester
- Master Graduation Thesis 2
- Computer Networks and Operating System Security
- Virtual Infrastructure and Cloud Computing Security
- Ethical Hacking Techniques (with course work)
- Malware Analysis Methods
- Software Security
- SOC Methods and Technologies for Information System Defense
3 semester
- Master Graduation Thesis 3
- Cyber Forensics (with course work )
- Information Security Management
- Secure Programming
- Free choice obligatory course
4 semester
Master Graduation Thesis 4
Program Outcome
Knowledge
- Knowledge of modern cyber threats, vulnerabilities, risks, and attack vectors, covering, but not limited to technological, physical security, and social areas, ability to identify and neutralize them, and minimize the consequences.
- Understanding of information and information technology security principles and concepts, covering, but not limited to technological, organizational, social, and legal aspects, knowledge of modern information systems security mechanisms and ability to apply them, perception of secure information system design and development methods and ability to integrate information security mechanisms into information security systems and processes.
Ability to Perform Research
- Proficiency in defining perspective research areas, ability to perform literature analysis and cite the literature sources, plan and carry out the experiment in the defined problem area, apply different analytical, modeling, and experimental methods, evaluate qualitative and quantitative information, to apply the experimental results for solving practical problems.
- Ability to perform analysis, and logical reasoning, formulate constructive, reasoned conclusions and recommendations, understand and criticize ideas and results of other researchers, prepare scientific research publications, to participate in a scientific discussion.
Special Skills
- Ability to integrate security mechanisms into software, information systems, and processes, to apply cryptographic, secure programming and code security analysis, ethical hacking, cyber forensics, secure network, and virtual infrastructure design methods, and understanding of specific security aspects of different operating systems, DBMS and other information systems.
- Ability to evaluate the maturity of information systems and organizations from the security perspective, to apply risk management methods and requirements of information security standards and other regulating documents while organizing the business processes, ability to ensure the organization's compliance and certification processes according to the security standards requirements, to maintain information security management processes, integrate them with other business processes, projects, to ensure business process continuity.
Social Skills
- Ability to work individually and in a team, to work with colleagues having different educational and professional backgrounds, to communicate orally and in writing, to submit proposals, and to effectively communicate with professionals from other areas.
- To express and defend the opinion, and to respect other opinions.
Personal Skills
- Ability to think critically, independently, and constructively, to implement innovative solutions and evaluate their consequences.
- The ability for self-improvement, forming and increasing the knowledge base, planning the study process, labor, and time, to seek the result.
Program Tuition Fee
Career Opportunities
Graduatescan join PhD studies or will have the following carrier opportunities:
- Chief information security officer
- Information security auditor
- Penetration-tester
- Security analyst
- Cybercrimes investigator
- IT security project manager
- Security-oriented programmer
- Security-oriented information system architecture
- Security-specialized system administrator
Program delivery
2 years (4 semesters) of graduation is finalized with the defense of the Final project.
Program Admission Requirements
Show your commitment and readiness for Grad school by taking the GRE - the most broadly accepted exam for graduate programs internationally.