Master of Cybersecurity

University of Information Technology and Management

Poland Flag Poland


1088 views

Scholarship
Internship

Description

The Master of Science (MSc) in Cybersecurity will develop your knowledge and skills in information security and information systems security. Our integrated study program provides not only knowledge, but above all else, it is practical in nature and equips students with a set of certificates desired by employers, which results in faster career development. The program focuses on the technical security aspects in order to develop skills related to monitoring and mitigating threats. In addition, we equip students with knowledge and skills in the field of security management, taking into account its social and legal aspects. Thanks to this, graduates have a broader view of the problem of data security during their processing, transport and storage. Additionally, the following certificates are available in the program: Cisco CCNA Security, Cisco CCNA Cybersecurity Operations, Linux Professional Institute Certificate (LPIC-1), Linux Professional Institute Certificate (LPIC-2) and Microsoft Certified Solutions Associate (MCSA). The MSc in Cybersecurity is under the patronage of Cisco, who support the program through workshops, consultations and the organization of internships. Our teaching staff are practitioners and experts who already successfully operating in the industry

Teaching and Learning 

The programme focuses on a practical approach to teaching, reflected in the practice-oriented coursework. Active student learning in the form of laboratories, seminars, workshops and problem-based projects are designed to engage your interest and enable you to become autonomous and continuous learners. Assessment methods include projects, reports, presentations and skill tests, as well as time-keyed in-class tests and exams. Classes are held on weekdays in small cohorts to ensure that you receive the full support to get the best out of the programme and increase the effectiveness of the educational process.

Why study Cybersecurity at UITM?

Direct knowledge from industry experts

The classes are taught by experienced network security specialists – not only academics, but also representatives of partner companies of the course, such as: CISCO Networking Academy, 4 Prime, TÜV NORD Polska.

Practice-oriented curriculum

The study programme is developed under the watchful eye of experts from partner companies. The emphasis on practical classes provides maximum opportunities to develop the skills necessary for your future career. Attractive certificates, which can be obtained during the education, provide support for the competences gained.

International environment

Being part of an international academic community prepares you to interact and work with people from around the world. Participation in engaging events, specialised courses and the opportunity to choose a specialisation taught in English will prepare you to become an industry expert.

Double-degree

Choosing this specialization will also give you an opportunity to take advantage of the Double degree program. Studies at the home university will be enriched by several semesters of study in Great Britain. Thanks to this you will get diplomas of two universities at the same time.

 

Example subjects

  • Information systems engineering
  • Autonomous systems
  • Computational methods in science and technology
  • Authentication, Authorisation and Digital Signatures
  • Sociological and legal aspects of security
  • Software and technical security measures
  • Resource virtualisation and distributed computing
  • Security auditing and monitoring of information systems
  • Security policies – design and implementation
  • Acquisition and recovery of electronic data

Discover your career Possibilities

  • Security Analyst
  • Threat Analyst
  • Incident Response Engineer
  • Security Administrator
  • Pentester
  • Process Security Specialist
  • Cyber Security Specialist
  • Chief Information Security Officer
  • Application Security Engineer
  • Cyber Threat Hunter

 

Search for courses