Code | POL_ITX_S2 |
---|---|
Organizational unit | Faculty of Political Science and Journalism |
Field of studies | IT Cyber security |
Form of studies | Full-time |
Level of education | Second cycle (MA) |
Educational profile | academic |
Language(s) of instruction | English |
Admission limit | 20 |
Duration | 2 years |
Required document | |
Ask a question |
IT Cyber Security is a program for those who wish to combine knowledge of computer science with knowledge of political science and administration.
The knowledge related to political science and administration includes:
- the place of cybersecurity in the contemporary understanding of security;
- the complexity of security threats in cyberspace;
- diversity of areas of activities to ensure security in cyberspace, taking into account political science, but also legal, economic and sociological approaches.
Knowledge related to computer science includes:
- The principles of operation of the operating system, its tasks and weaknesses;
- basic programming structures and rules of designing programming scripts;
- functioning of web applications and knowledge about the basic weaknesses of web applications;
- principles of operation of computer networks and, weaknesses of protocols and mechanisms operating in all layers of the OSI model;
- principles and best practices for safe web application programming;
- principles of operation of cryptographic modules and the manner of their application in IT Systems;
- the process of performing penetration tests and ability to describe each stage;
- standards for information security management.
Computer science skills include:
- efficient performance of tasks in the Linux operating system; 2) designing a simple algorithm and creating its implementation using Python;
- conducting security tests for Web applications based on the OWASP standard;
- analyzing the weaknesses of the computer network and applying a security mechanism to protect against potential attacks;
- finding security bugs in web applications and applying corrections to eliminate them;
- performance of the required analysis regarding the application of cryptographic methods and the use of appropriate cryptographic modules;
- performing all stages of penetration testing;
- creating process documentation of the IT system and conducting a risk analysis of such a system.
Qualification rules
- Admission is open to both Polish citizens and international students.
- Programme is offered on a tuition fee-paying basis to candidates holding a bachelor degree or any other equivalent degree which entitles them to undertake the Master’s degree programme in the country where the documents were issued.
- A candidate must submit a complete set of application documents (visit Application Procedure Tab), including the certificate proving the applicant’s English language skills (list of recognized certificates: https://rekrutacja.umcs.pl/en/language-proficiency-certifications/) or a document confirming that the Education was fully conducted in English (issued by the school/University) and/or based on an interview in English.
- Registration is open within the admission period or until all the vacancies are filled.
- Academic documents should be translated into Polish. Visit database of recognized sworn translators in Poland HERE.
NB: Please contact the Admissions Office for further guidance.
The required registration fee payment is PLN 85. Please check the instructions on how to make a payment in the system.
Tuition fee:
1st year € 3520
2nd year € 3300
Admission enquiries: studyinenglish@umcs.pl