Type: 
University
Region: 
Lubelskie
Programme: 
Cybersecurity and Strategic Studies
Area: 
Social sciences
Level: 
Master's Programme
Mode of studies: 
full-time programme
Duration: 
2 years/ 4 semesters
Tuition fee: 
https://rekrutacja.umcs.pl/en/fees/
Degree awarded: 
MA in IT Cyber Security
Scholarships available: 
Rectors' Scholarship for the best students
Application deadline: 
Tuesday, 10 September, 2024
Language: 
EN
Day of semester start: 
Tuesday, 1 October, 2024
Credits (ECTS): 
120
Admission requirements: 
  1. Submission of complete set of application documents including certificate proving the applicant's English language skills or a document confirming that the Education was fully conducted in English (issued by the school/University) and/or based on an interview in English,
  2. The program welcomes candidates with a bachelor degree or equivalent, granting direct access to a master's degree in the country of issuance. It is open to both national and international students. Prospective students must register online and submit documents by the deadline or until all available spots are filled. List of requirements- https://rekrutacja.umcs.pl/en/how-to-apply/application-documents-bachelor-2/
Description: 

IT Cyber Security is a program for those who wish to combine knowledge of computer science with knowledge of political science and administration.

The knowledge related to political science and administration includes:
1) the place of cybersecurity in the contemporary understanding of security;
2) the complexity of security threats in cyberspace;
3) diversity of areas of activities to ensure security in cyberspace, taking into account political science, but also legal, economic and sociological approaches.

Knowledge related to computer science includes:

1) The principles of operation of the operating system, its tasks and weaknesses;
2) basic programming structures and rules of designing programming scripts;
3) functioning of web applications and knowledge about the basic weaknesses of web applications;
4) principles of operation of computer networks and, weaknesses of protocols and mechanisms operating in all layers of the OSI model;
5) principles and best practices for safe web application programming;
6) principles of operation of cryptographic modules and the manner of their application in IT Systems;
7) the process of performing penetration tests and ability to describe each stage;
8) standards for information security management.

Computer science skills include:
1) efficient performance of tasks in the Linux operating system; 2) designing a simple algorithm and creating its implementation using Python;
3) conducting security tests for Web applications based on the OWASP standard;
4) analyzing the weaknesses of the computer network and applying a security mechanism to protect against potential attacks;
5) finding security bugs in web applications and applying corrections to eliminate them;
6) performance of the required analysis regarding the application of cryptographic methods and the use of appropriate cryptographic modules;
7) performing all stages of penetration testing;
8) creating process documentation of the IT system and conducting a risk analysis of such a system.

STUDYFINDER