Master of Cybersecurity

School of School of Science and Technology

Study Level:
MA/MSc
Tuition Fee:
$5000 Per Year
Program Language:
English
Semester/Intake:
Spring/Fall
Program Duration:
2 Years
Program Capacity:
120 Credits (ECTS)

Official Syllabus:

 

Program goals:

The objective of the program is to prepare highly qualified and competitive cybersecurity specialists equipped with knowledge and skills that meet international standards and labor market demands, both locally and globally. The program provides students with a solid and systematic understanding of both theoretical foundations and practical applications in cybersecurity, enabling graduates to independently and effectively address the challenges and issues in the modern technological world related to cybersecurity.

Upon successful completion of the program, graduates will be qualified to work in various roles, including but not limited to: security auditor, analyst, cloud security specialist, cybersecurity operations specialist, software security engineer, penetration testing expert, and other related positions.


Methods for Attaining Learning Outcomes:

  • Lecture–seminar

  • Interactive lectures

  • Explanatory method

  • Demonstration method

  • Practical work

  • Critical analysis

  • Teamwork / Group work

  • Problem-oriented exercises

  • Case study and analysis

  • Literature review

  • Working with textbooks

  • Searching for relevant materials in electronic format or library

  • Written work method

  • Verbal (oral) method

  • Discussions / Debates

  • Simulation

  • Role-playing

  • Induction, deduction, analysis and synthesis

  • Presentation


Learning outcomes

Knowledge and understanding

  • Describes the requirements of software and cloud security, as well as the methods of threat modeling within relevant cybersecurity contexts.

  • Discusses the role, functions, and risk assessment methods of auditing.

  • Describes the core principles of systems theory and the systems approach, explains the processes involved in assessing the operability and reliability of complex systems.

Skills

  • Develops security requirements for software systems in accordance with cybersecurity standards and best practices;

  • Ensures the security of cloud-based solutions, including network configuration, identity and access management, infrastructure protection, and data security;

  • Plans and conducts audits of information systems to evaluate compliance, performance, and risk;

  • Identifies cybersecurity threats and responds appropriately to related incidents.

Responsibility and autonomy

  • Independently addresses security-related issues and develops appropriate problem-solving strategies;

  • Ensures compliance with organizational governance structures, IT and information security policies, procedures and standards;

  • Adheres to security protocols and safeguards the security of cloud-based solutions, networks and infrastructure.


Program Administration

Date of approval: 02-28-2025
Approval protocol number: 3PCD6067-01
Date of program update:
Update protocol number:


Program details

Teaching Process Characteristics

The program consists of 120 ECTS credits, with 102 ECTS allocated to core subjects and 18 ECTS to elective subjects. The total number of elective subjects amounts to 102 ECTS, from which the student must choose 18 ECTS. In the core part of the program, the student is required to complete a Master’s thesis (30 ECTS).


Program Core (Course Titles Only)

  • Information Security Management – Governance, Risk and Compliance

  • Cyber Threat Analysis, Research and Education

  • Cybersecurity in Computing

  • Physical Security

  • Application Security

  • Network Security

  • Structural Analysis of Systems

  • Mathematical Statistics

  • Cloud Security

  • Offensive Cybersecurity

  • Cyber Threat Intelligence

  • Manual Testing and Automation of Software

  • Master’s Project


Program Elective (Course Titles Only)

  • Cybersecurity Architecture and Management in the Microsoft Ecosystem

  • AWS Cloud Infrastructure Security

  • IAC (Infrastructure as Code) Terraform

  • IAC (Infrastructure as Code) Bicep

  • Operation System Linux

  • Cryptology

  • Flask

  • Agile Software Development Project Management

  • IT Service Strategy and Design

  • Transition of IT Services

  • Personal Data Protection in the Digital Age

  • IT Project Management

  • Security Methods in Blockchain and Cryptocurrency Systems

  • Incident Response and Forensics

  • Logging and Monitoring

  • Big Data Systems

  • Artificial Intelligence Based Machine Learning Algorithms

Scroll to Top