MSc Cybersecurity & New Technologies

MSc Cybersecurity & New Technologies

DURATION OF STUDIES

1 year

LANGUAGE OF TEACHING AND ASSESSMENT

Greek

START

October 2022

ATTENDANCE

Full-time

LOCATION

Athens, Greece

ACADEMIC PARTNER

Description

Cyber security is now an essential part of almost every business and the demand for highly skilled and knowledgeable professionals is constantly increasing. In the postgraduate program MSc Cybersecurity & New Technologies we provide you with the skills and knowledge you need to be able to create secure and compatible systems that meet the needs of employers, preparing you for a long and successful career.

The knowledge and skills that you will acquire in this program are in great demand in the modern labor market. In the field of cybersecurity and at a time when the threats, legal and commercial consequences of insufficient security are increasing, there is a significant gap in knowledge and skills. Emerging sites and industries such as the Internet of Things and Smart Cities offer new opportunities for all of us, but also new vulnerabilities to accidental or malicious actions.

Cyber security is about understanding attack methods and learning how to protect individuals and organizations from them. By attending this postgraduate program, you will receive extensive and in-depth training on how to detect and exploit vulnerabilities in computer networks and systems, and learn how to protect against hacker attacks.

This graduate program is designed to guide and specialize your future career in protecting software and hardware from malicious threats. The courses of the program are designed in such a way that, not only will they give you the theoretical background in computer science, but also they will provide you with practical and specialized knowledge in a field that includes sub-modules, such as network security, ethical hacking etc. and will prepare you thoroughly so that, after the end of the program, you will be able to work in the Cybersecurity industry as a professional with a high level of knowledge and excellent efficiency in your field. »

Educational Objectives

Why choose MSc CyberSecurity & New Technologies at IST College?

We offer many more incentives and opportunities to stand out in today’s competitive job market. Upon completion of your studies, you will have the opportunity and the opportunity to attend specialized seminars and receive certifications recognized by the IT industry, as IST College is an Academic Partner with internationally renowned certification bodies such as:

And, as an IST graduate, you will have preferential discounts and offers on certifications such as:

Curriculum Structure

MODULES

Secure Internet of Things Applications (Semester 1)

COURSE DESCRIPTION

The Secure Internet of Things Applications course addresses data security, addressing privacy concerns, software and hardware security, strengthening physical security, and more. This course also provides an introduction to the Internet of Things (IoT) and microcontroller architectures for IoT devices, connectivity capabilities and design approaches for secure IoT devices.

Educational Objectives

AI & Big Data Analysis (Semester 1)

COURSE DESCRIPTION

This module aims to explore the principles of AI and Big Data analytics, how the data is gathered, processed, analysed and converted into knowledge, various computational platforms supporting Big Data Applications, the challenges in Big Data Computing and ways to overcome them. Students will explore big data applications and will learn how to responsibly design, build and maintain complex Big Data resources. Students will develop a critical awareness of the legal, ethical and environmental impact of current and emerging big data technologies and applications.

Educational Objectives

Mobile Forensics (Semester 1)

COURSE DESCRIPTION

This module covers areas of mobile device forensics including mobile malware and security, risk and vulnerabilities, detection methods and legal and technical parts of the discipline. Additionally, it covers the forensic investigation of mobile phones, GPS devices, digital cameras, and notebooks.

Educational Objectives

Cloud Security (Semester 1)

COURSE DESCRIPTION

In the ever-changing world of the cloud, you face unique security challenges every day — from new threats to sensitive data, to uneducated internal teams. The Course aims to give the knowledge and competency to apply best practices to cloud security architecture, design, operations and service orchestration. This course will provide you with the knowledge and skills to protect your organization’s cloud environment. With more and more companies moving information to the cloud, it has become crucial to have experts in cloud computing.

Educational Objectives

Secure Software Lifecycle (Semester 1)

COURSE DESCRIPTION

The course objective is to provide a comprehensive review of the knowledge required to incorporate security practices – authentication, authorization and auditing – into each phase of the Software Development Lifecycle (SDLC), from software design and implementation to testing and deployment.

The module will allow students to understanding and apply the theory and practice of exploiting vulnerabilities in software as well as key skills of design and implementation of secure software. Students will learn the ability to implement secure systems and environments to support software security. Additionally, they will explore the use of secure programming languages and the effects on secure software. The use obfuscation and encryption in the protection of software will also be investigated.

Educational Objectives

Network and Communications Security (Semester 2)

COURSE DESCRIPTION

Network and communication security includes security methods, techniques and tools utilized in the design, implementation, and audit of a network security policy. The theoretical part of the course includes the analysis of security vulnerabilities in communication protocols for all the layers of the TCP/IP network stack and the definition of a network security policy. The practical part of the course includes the implementation of network security controls such as firewalls, intrusion detection/prevention (IDS/IPS) systems and virtual private networks

Educational Objectives

Cybersecurity Programs and Policies (Semester 2)

COURSE DESCRIPTION

This module is aimed at providing students with the understanding of security risks associated with information assets and the security programmes designed to protect them from security threats. This module will focus on the identification of security risks, the application of risk control and risk management measures, the appreciation of security technology, and critical understanding of security policies, standards and practices. The legal, ethical, and professional issues in security management are also covered in this module.

Educational Objectives

Digital Forensics (Semester 2)

COURSE DESCRIPTION

This module will introduce students to the principles of digital forensics to gather and analyse evidence from computer systems and communications. Students will learn the techniques, technologies and tools required to gather information within practical environments, and effectively report the results for consideration within legal and commercial situations.

Educational Objectives

Ethical Hacking & Penetration Testing (Semester 2)

COURSE DESCRIPTION

The module aims to give students a solid and professional level of competence in the field of ethicalhacking and penetration testing, which is predominantly led by the coverage of tools, techniques and systems that allow penetration testing to be carried out on computer systems and networks. Much of the module material follows the footsteps of a would-be intruder and thus includes coverage of the communication and social side of computer attacks as well as the technological. Having been led to understand how systems, software and devices can be vulnerable to unwanted penetration, students will then investigate countermeasures and organisational strategies to mitigate these risks.

Educational Objectives

Secure Software Lifecycle (Semester 2)

COURSE DESCRIPTION

The course objective is to provide a comprehensive review of the knowledge required to incorporate security practices – authentication, authorization and auditing – into each phase of the Software Development Lifecycle (SDLC), from software design and implementation to testing and deployment.

The module will allow students to understanding and apply the theory and practice of exploiting vulnerabilities in software as well as key skills of design and implementation of secure software. Students will learn the ability to implement secure systems and environments to support software security. Additionally, they will explore the use of secure programming languages and the effects on secure software. The use obfuscation and encryption in the protection of software will also be investigated.

Educational Objectives

Dissertation (Semester 3)

COURSE DESCRIPTION

After completing the courses of the programme, you are required to prepare your Dissertation under the guidance of your supervisor. The aim is to apply the knowledge and skills acquired during the MSc Cybersecurity & New Technologies course. Completing the Dissertation will help you to extend, support and enhance learning through identifying a business-related problem that requires theoretical research, collection of structured data and subsequent analysis leading to conclusions and recommendations.

Educational Objectives

Career prospects

Cybersecurity is a highly competitive industry that requires professionals with advanced technical and personal skills. A wide range of career opportunities exist in this rapidly growing field. Cybersecurity professionals are in huge demand, particularly since the General Data Protection Regulation (GDPR) and the Data Protection Act 2018 came into force, where a plethora of excellent job opportunities in the industry have emerged.

This demand for cyber professionals will have an ever-increasing trend as the digital revolution takes shape. The Internet of Things and smart environments (e.g. smart homes, streets and cities) will create new risks to be addressed and therefore new needs and new job opportunities. When you graduate from the MSc Cybersecurity & New Technologies program, you will be able to take on positions of responsibility in the cybersecurity industry such as:

Attendance

The curriculum is offered with a physical presence at IST but also enables a more flexible way of attending through a modern, and dynamic educational platform, combining in class teaching with online learning.

  • Online participationthe classroom during the lesson following the syllabus.
  • Elearning withon demand monitoring videotaped courses in your own time with a personalized study program, through the dynamic platform of IST College.
  • Blended Learning: Create your own flexible study program by combining the above ways of attending.

Furthering your Studies

Το MSc Cybersecurity & New Technologies gives you the opportunity to continue your studies at the doctoral level.

Registration requirements

University degree or at least 3 years of substantial professional experience in managerial positions.

Registration procedure

The registration process is simpler and shorter than ever!

You can register through the following ways:

Α) Online

You can download the registration form hereand send it completed to [email protected], along with the necessary documents (to see them press here) and with the proof of deposit (to see the bank accounts press here.)

B) By visiting IST

IST Administrative Staff will be at your disposal to assist you with your registration. All you need to do is come to the IST, having with you the necessary registration documents, to see them press here.

Funding & Scholarship Programme

The method of payment for the already affordable IST tuition fees is very flexible. In consultation with the financial services of IST, there is the possibility of installments or one-off payment where a corresponding discount is given.

Also, the Education Counselor will inform you about the economic and social criteria that will ensure you a tuition subsidy of up to 30%, supported by the Student Welfare Fund of IST.

You can also apply for one of the Scholarships offered by, in collaboration with well-known companies and organizations. For more information click here.

It is important to note that with your tuition fees, in addition to the modules taught on the programme, you will enjoy a range of extra benefits and services at no extra charge such as:

  • Registration
  • Use of IST’s Library
  • Use of IST’s computer labs
  • Participation in the examinations
  • Use of IST’s educational platform
  • All certificates of study, grades, transcripts, and other certificates requested from students from time to time.
  • Participation in seminars, events, and conferences organized by IST College.
  • A student card which offers you special offers and prices in collaboration with affiliated shops and services of various sectors.

Download the Study Guide (here)

SHARE ON

Make the first step

Book today

Testimonials

Related courses

Gallery

IST at a Glance!

Φόρμα επικοινωνίας