MA in IT Cyber Security

Apply

Area of Studies

mathematics, informatics

Degree

Master

Degree (in English)

Master

Language(s)
  • English
Course Duration

2 years/4 semesters

www

umcs.pl

Department

Maria Curie-Sklodowska University in Lublin

Tuition and Other Fees

https://rekrutacja.umcs.pl/en/fees/

Application Deadline(s)

April - September

Course Description

Course Profile

IT Cyber Security is a program for those who wish to combine knowledge of computer science with knowledge of political science and administration.

The knowledge related to political science and administration includes:

1) the place of cybersecurity in the contemporary understanding of security;

2) the complexity of security threats in cyberspace;

3) diversity of areas of activities to ensure security in cyberspace, taking into account political science, but also legal, economic and sociological approaches.

Knowledge related to computer science includes:

1) The principles of operation of the operating system, its tasks and weaknesses;

2) basic programming structures and rules of designing programming scripts;

3) functioning of web applications and knowledge about the basic weaknesses of web applications;

4) principles of operation of computer networks and, weaknesses of protocols and mechanisms operating in all layers of the OSI model;

5) principles and best practices for safe web application programming;

6) principles of operation of cryptographic modules and the manner of their application in IT Systems;

7) the process of performing penetration tests and ability to describe each stage;

8) standards for information security management.

Computer science skills include:

1) efficient performance of tasks in the Linux operating system; 2) designing a simple algorithm and creating its implementation using Python;

3) conducting security tests for Web applications based on the OWASP standard;

4) analyzing the weaknesses of the computer network and applying a security mechanism to protect against potential attacks;

5) finding security bugs in web applications and applying corrections to eliminate them;

6) performance of the required analysis regarding the application of cryptographic methods and the use of appropriate cryptographic modules;

7) performing all stages of penetration testing;

8) creating process documentation of the IT system and conducting a risk analysis of such a system.

https://itcybersecurity.umcs.pl/

Apply