DURATION OF STUDIES
1 year
LANGUAGE OF TEACHING AND ASSESSMENT
Greek
START
October 2022
ATTENDANCE
Full-time
LOCATION
Athens, Greece
ACADEMIC PARTNER
Description
Cyber security is now an essential part of almost every business and the demand for highly skilled and knowledgeable professionals is constantly increasing. In the postgraduate program MSc Cybersecurity & New Technologies we provide you with the skills and knowledge you need to be able to create secure and compatible systems that meet the needs of employers, preparing you for a long and successful career.
The knowledge and skills that you will acquire in this program are in great demand in the modern labor market. In the field of cybersecurity and at a time when the threats, legal and commercial consequences of insufficient security are increasing, there is a significant gap in knowledge and skills. Emerging sites and industries such as the Internet of Things and Smart Cities offer new opportunities for all of us, but also new vulnerabilities to accidental or malicious actions.
Cyber security is about understanding attack methods and learning how to protect individuals and organizations from them. By attending this postgraduate program, you will receive extensive and in-depth training on how to detect and exploit vulnerabilities in computer networks and systems, and learn how to protect against hacker attacks.
This graduate program is designed to guide and specialize your future career in protecting software and hardware from malicious threats. The courses of the program are designed in such a way that, not only will they give you the theoretical background in computer science, but also they will provide you with practical and specialized knowledge in a field that includes sub-modules, such as network security, ethical hacking etc. and will prepare you thoroughly so that, after the end of the program, you will be able to work in the Cybersecurity industry as a professional with a high level of knowledge and excellent efficiency in your field. »
Educational Objectives
Why choose MSc CyberSecurity & New Technologies at IST College?
We offer many more incentives and opportunities to stand out in today’s competitive job market. Upon completion of your studies, you will have the opportunity and the opportunity to attend specialized seminars and receive certifications recognized by the IT industry, as IST College is an Academic Partner with internationally renowned certification bodies such as:
- EC Council
- CompTIA
- CISCO
- (ISC)²
And, as an IST graduate, you will have preferential discounts and offers on certifications such as:
Curriculum Structure
- Year 1
MODULES
Secure Internet of Things Applications (Semester 1)
COURSE DESCRIPTION
The Secure Internet of Things Applications course addresses data security, addressing privacy concerns, software and hardware security, strengthening physical security, and more. This course also provides an introduction to the Internet of Things (IoT) and microcontroller architectures for IoT devices, connectivity capabilities and design approaches for secure IoT devices.
Educational Objectives
- Manage risks in the Internet of Things, Web and Cloud interface security
- Ensure data security
- Control access to IoT resources
- Secure IoT networks
- Secure IoT data
AI & Big Data Analysis (Semester 1)
COURSE DESCRIPTION
This module aims to explore the principles of AI and Big Data analytics, how the data is gathered, processed, analysed and converted into knowledge, various computational platforms supporting Big Data Applications, the challenges in Big Data Computing and ways to overcome them. Students will explore big data applications and will learn how to responsibly design, build and maintain complex Big Data resources. Students will develop a critical awareness of the legal, ethical and environmental impact of current and emerging big data technologies and applications.
Educational Objectives
- Synthesise the fundamentals of Data Science and Big Data Analytics
- Appreciate and assess various Big Data technology infrastructures, platforms and applications
- Critically evaluate the challenges in Big Data application design, data organization, retrieval, and data modelling
- Make informed judgement by critically evaluating security, legal, ethical and privacy issues in current and future Big Data application environment
Mobile Forensics (Semester 1)
COURSE DESCRIPTION
This module covers areas of mobile device forensics including mobile malware and security, risk and vulnerabilities, detection methods and legal and technical parts of the discipline. Additionally, it covers the forensic investigation of mobile phones, GPS devices, digital cameras, and notebooks.
Educational Objectives
- Analytically argue the forensically significant data stored on a mobile device and the means to recover it using a variety of advanced industrial standard techniques.
- Diagnostically analyze and appraise recovered digital evidence from a mobile device to determine a history of events to reconstruct the evidence
- Establish a systematic level of understanding in using digital analysis tools and techniques and associated scientific risks and proper use of ACPO guidelines within mobile device investigations
- Advance analytical knowledge of mobile malware, infection mechanisms, and defense tools and strategies.
Cloud Security (Semester 1)
COURSE DESCRIPTION
In the ever-changing world of the cloud, you face unique security challenges every day — from new threats to sensitive data, to uneducated internal teams. The Course aims to give the knowledge and competency to apply best practices to cloud security architecture, design, operations and service orchestration. This course will provide you with the knowledge and skills to protect your organization’s cloud environment. With more and more companies moving information to the cloud, it has become crucial to have experts in cloud computing.
Educational Objectives
- Building and implementing infrastructures for cloud environments
- Operating and overseeing infrastructures for cloud environments
- Managing physical infrastructures for cloud environments
- Building and operating logical infrastructures for cloud environments
- Ensuring compliance with regulation and controls
- Conducting risk assessments of physical and logical infrastructures
- Understanding how to acquire, collect and preserve digital evidence
- Managing communication with and identifying relevant parties
- Auditing and monitoring of tools, mechanisms, and facilities
Secure Software Lifecycle (Semester 1)
COURSE DESCRIPTION
The course objective is to provide a comprehensive review of the knowledge required to incorporate security practices – authentication, authorization and auditing – into each phase of the Software Development Lifecycle (SDLC), from software design and implementation to testing and deployment.
The module will allow students to understanding and apply the theory and practice of exploiting vulnerabilities in software as well as key skills of design and implementation of secure software. Students will learn the ability to implement secure systems and environments to support software security. Additionally, they will explore the use of secure programming languages and the effects on secure software. The use obfuscation and encryption in the protection of software will also be investigated.
Educational Objectives
- Incorporate security requirements in the development of software to produce software that is reliable, resilient and recoverable
- Understand the importance of programming concepts that can effectively protect software from vulnerabilities. Learners will touch on topics such as software coding vulnerabilities, defensive coding techniques and processes, code analysis and protection, and environmental security considerations that should be factored into software
- You will be able to identify the software methodologies needed to develop software that is secure and resilient to attacks
- Understand how to ensure that software security requirements are included in the design of the software, gain knowledge of secure design principles and processes, and gain exposure to different architectures and technologies for securing software
- Address issues pertaining to proper testing of software for security, including the overall strategies and plans. Learners will gain an understanding of the different types of functional and security testing that should be performed, the criteria for testing, concepts related to impact assessment and corrective actions, and the test data lifecycle
- Understand the requirements for software acceptance, paying specific attention to compliance, quality, functionality and assurance. Participants will learn about pre- and post-release validation requirements as well as pre-deployment criteria
- Understand the deployment, operations, maintenance, and disposal of software from a secure perspective. This is achieved by identifying processes during installation and deployment, operations and maintenance, and disposal that can affect the ability of the software to remain reliable, resilient, and recoverable in its prescribed manner
- You will understand how to perform effective assessments on an organization's cyber-supply chain and describe how security applies to the supply chain and software acquisition process. You will understand the importance of supplier sourcing and being able to validate vendor integrity, from third-party vendors to complete outsourcing.
- Finally, you will understand how to manage risk through the adoption of standards and best practices for proper development and testing across the entire lifecycle of products
Network and Communications Security (Semester 2)
COURSE DESCRIPTION
Network and communication security includes security methods, techniques and tools utilized in the design, implementation, and audit of a network security policy. The theoretical part of the course includes the analysis of security vulnerabilities in communication protocols for all the layers of the TCP/IP network stack and the definition of a network security policy. The practical part of the course includes the implementation of network security controls such as firewalls, intrusion detection/prevention (IDS/IPS) systems and virtual private networks
Educational Objectives
- Critically analyze security threats in the digital world within a professional and ethical context
- Apply a range of security tools and algorithms related to computer security
- Design and synthesise security protocols and algorithms
- Analyse security vulnerabilities in communication
- Able to implement network security controls
Cybersecurity Programs and Policies (Semester 2)
COURSE DESCRIPTION
This module is aimed at providing students with the understanding of security risks associated with information assets and the security programmes designed to protect them from security threats. This module will focus on the identification of security risks, the application of risk control and risk management measures, the appreciation of security technology, and critical understanding of security policies, standards and practices. The legal, ethical, and professional issues in security management are also covered in this module.
Educational Objectives
- Understand the issues with information security and security risks.
- Identify the security risks and risk and security control strategies in a particular context.
- Evaluate various security technologies
- Understand and apply business continuity planning for a given scenario.
- Understand and apply security policy, standard, and practices
- Discuss issues related to legal, ethical, and professional issues in security management
Digital Forensics (Semester 2)
COURSE DESCRIPTION
This module will introduce students to the principles of digital forensics to gather and analyse evidence from computer systems and communications. Students will learn the techniques, technologies and tools required to gather information within practical environments, and effectively report the results for consideration within legal and commercial situations.
Educational Objectives
- Select, justify and explain a range of digital forensics techniques and tools used to discover information within computer systems
- Make informed judgements by critically evaluating the use of a variety of approaches to digital forensics
- Critically evaluate computer systems and networks to identify and analyse useful information in an ethically sound manner
- Use and adapt digital forensics techniques to analyse existing systems and retrieve pertinent information
- Reflect upon, document and evaluate digital forensics outcomes in a legal, ethical and commercial compliant manner
Ethical Hacking & Penetration Testing (Semester 2)
COURSE DESCRIPTION
The module aims to give students a solid and professional level of competence in the field of ethicalhacking and penetration testing, which is predominantly led by the coverage of tools, techniques and systems that allow penetration testing to be carried out on computer systems and networks. Much of the module material follows the footsteps of a would-be intruder and thus includes coverage of the communication and social side of computer attacks as well as the technological. Having been led to understand how systems, software and devices can be vulnerable to unwanted penetration, students will then investigate countermeasures and organisational strategies to mitigate these risks.
Educational Objectives
- Select and explain an appropriate range of hacking methods used in attacking computer systems and networks.
- Identify, analyse, evaluate and test computer security vulnerabilities using suitable tools and techniques
- Identify, select and plan appropriate procedures, solutions and counter measures to defend and minimise computer security attacks
- Make and justify decisions requiring an awareness of ethical, professional and legal issues connected with hacking
- Extend and improve knowledge in the subject leading to further academic and professional progression in this area.
Secure Software Lifecycle (Semester 2)
COURSE DESCRIPTION
The course objective is to provide a comprehensive review of the knowledge required to incorporate security practices – authentication, authorization and auditing – into each phase of the Software Development Lifecycle (SDLC), from software design and implementation to testing and deployment.
The module will allow students to understanding and apply the theory and practice of exploiting vulnerabilities in software as well as key skills of design and implementation of secure software. Students will learn the ability to implement secure systems and environments to support software security. Additionally, they will explore the use of secure programming languages and the effects on secure software. The use obfuscation and encryption in the protection of software will also be investigated.
Educational Objectives
- Incorporate security requirements in the development of software to produce software that is reliable, resilient and recoverable
- Understand the importance of programming concepts that can effectively protect software from vulnerabilities. Learners will touch on topics such as software coding vulnerabilities, defensive coding techniques and processes, code analysis and protection, and environmental security considerations that should be factored into software
- You will be able to identify the software methodologies needed to develop software that is secure and resilient to attacks
- Understand how to ensure that software security requirements are included in the design of the software, gain knowledge of secure design principles and processes, and gain exposure to different architectures and technologies for securing software
- Address issues pertaining to proper testing of software for security, including the overall strategies and plans. Learners will gain an understanding of the different types of functional and security testing that should be performed, the criteria for testing, concepts related to impact assessment and corrective actions, and the test data lifecycle
- Understand the requirements for software acceptance, paying specific attention to compliance, quality, functionality and assurance. Participants will learn about pre- and post-release validation requirements as well as pre-deployment criteria
- Understand the deployment, operations, maintenance, and disposal of software from a secure perspective. This is achieved by identifying processes during installation and deployment, operations and maintenance, and disposal that can affect the ability of the software to remain reliable, resilient, and recoverable in its prescribed manner
- You will understand how to perform effective assessments on an organization's cyber-supply chain and describe how security applies to the supply chain and software acquisition process. You will understand the importance of supplier sourcing and being able to validate vendor integrity, from third-party vendors to complete outsourcing.
- Finally, you will understand how to manage risk through the adoption of standards and best practices for proper development and testing across the entire lifecycle of products
Dissertation (Semester 3)
COURSE DESCRIPTION
After completing the courses of the programme, you are required to prepare your Dissertation under the guidance of your supervisor. The aim is to apply the knowledge and skills acquired during the MSc Cybersecurity & New Technologies course. Completing the Dissertation will help you to extend, support and enhance learning through identifying a business-related problem that requires theoretical research, collection of structured data and subsequent analysis leading to conclusions and recommendations.
Educational Objectives
- Accurately identify the nature, characteristics and variables associated with a problem or research topic
- Design and write a methodologically sound research proposal
- Select and apply the elements of methodological research to your chosen research topic
Career prospects
Cybersecurity is a highly competitive industry that requires professionals with advanced technical and personal skills. A wide range of career opportunities exist in this rapidly growing field. Cybersecurity professionals are in huge demand, particularly since the General Data Protection Regulation (GDPR) and the Data Protection Act 2018 came into force, where a plethora of excellent job opportunities in the industry have emerged.
This demand for cyber professionals will have an ever-increasing trend as the digital revolution takes shape. The Internet of Things and smart environments (e.g. smart homes, streets and cities) will create new risks to be addressed and therefore new needs and new job opportunities. When you graduate from the MSc Cybersecurity & New Technologies program, you will be able to take on positions of responsibility in the cybersecurity industry such as:
- Data recovery expert
- Ethical hacker/penetration tester
- Forensic investigator and consultant
- Network administrator
- Secure system architect
- Security consultant
- Security engineer
- Security research assistant
- ΙT system manager
Attendance
The curriculum is offered with a physical presence at IST but also enables a more flexible way of attending through a modern, and dynamic educational platform, combining in class teaching with online learning.
- Online participationthe classroom during the lesson following the syllabus.
- E–learning withon demand monitoring videotaped courses in your own time with a personalized study program, through the dynamic platform of IST College.
- Blended Learning: Create your own flexible study program by combining the above ways of attending.
Furthering your Studies
Το MSc Cybersecurity & New Technologies gives you the opportunity to continue your studies at the doctoral level.
Registration requirements
University degree or at least 3 years of substantial professional experience in managerial positions.
Registration procedure
The registration process is simpler and shorter than ever!
You can register through the following ways:
Α) Online
You can download the registration form hereand send it completed to [email protected], along with the necessary documents (to see them press here) and with the proof of deposit (to see the bank accounts press here.)
B) By visiting IST
IST Administrative Staff will be at your disposal to assist you with your registration. All you need to do is come to the IST, having with you the necessary registration documents, to see them press here.
Funding & Scholarship Programme
The method of payment for the already affordable IST tuition fees is very flexible. In consultation with the financial services of IST, there is the possibility of installments or one-off payment where a corresponding discount is given.
Also, the Education Counselor will inform you about the economic and social criteria that will ensure you a tuition subsidy of up to 30%, supported by the Student Welfare Fund of IST.
You can also apply for one of the Scholarships offered by, in collaboration with well-known companies and organizations. For more information click here.
It is important to note that with your tuition fees, in addition to the modules taught on the programme, you will enjoy a range of extra benefits and services at no extra charge such as:
- Registration
- Use of IST’s Library
- Use of IST’s computer labs
- Participation in the examinations
- Use of IST’s educational platform
- All certificates of study, grades, transcripts, and other certificates requested from students from time to time.
- Participation in seminars, events, and conferences organized by IST College.
- A student card which offers you special offers and prices in collaboration with affiliated shops and services of various sectors.
Download the Study Guide (here)
SHARE ON
Make the first step
Book today
Testimonials
Related courses
Gallery
IST at a Glance!
-
For more than 30 years, IST has been collaborating with leading foreign Universities, offering Bachelor’s and Master’s degree programmes while studying in Greece.
Study in Greece, Graduate Abroad!
-
We promote Entrepreneurship and Innovation. We help you to develop an entrepreneurial mindset, regardless the programme you study!
Think Business!
-
Quality in education with practical learning and workshops We focus on the cultivation of skills while aiming at linking education with the labour market.
You study at IST!
-
You are a member of a pioneering community with distinguished Professors, Entrepreneurs with a vision, ambitious Students, dynamic Start uppers, and a successful Alumni.
How high can you reach?
-
Here, you begin your journey to evolve into your best future self
Brand Yourself. Brand Your Future!
-
Your studies are easier than ever! Combining psysical presence with e-learning and on demand through our modern educational platform.
Modes of Study: On-Demand, Online, In Class