MA IT Cyber Security
Mode of study:
Duration of study:
Language of instruction:
Faculty of Political Science and Journalism
Maria Curie-Skłodowska University
20-612 Lublin, Poland
Master of Arts (MA)
Full time studies
2 years / 4 semesters
APPLICATION AND ADMISSION DATES
Application Period: 1st April- 30th September
Academic Year begins: October 1st, 2022
Academic year ends: 1st July
Tuition Fees 2022/23
Euro: Year 1 – 3420
Year 2- 3420
IT Cyber Security is a program for those who wish to combine knowledge of computer science with knowledge of political science and administration.
The knowledge related to political science and administration includes:
1) the place of cybersecurity in the contemporary understanding of security; 2) the complexity of security threats in cyberspace; 3) diversity of areas of activities to ensure security in cyberspace, taking into account political science, but also legal, economic and sociological approaches.
Knowledge related to computer science includes:
1) The principles of operation of the operating system, its tasks and weaknesses; 2) basic programming structures and rules of designing programming scripts; 3) functioning of web applications and knowledge about the basic weaknesses of web applications; 4) principles of operation of computer networks and, weaknesses of protocols and mechanisms operating in all layers of the OSI model; 5) principles and best practices for safe web application programming; 6) principles of operation of cryptographic modules and the manner of their application in IT Systems; 7) the process of performing penetration tests and ability to describe each stage; 8) standards for information security management.
Computer science skills include:
1) efficient performance of tasks in the Linux operating system; 2) designing a simple algorithm and creating its implementation using Python; 3) conducting security tests for Web applications based on the OWASP standard; 4) Analysing the weaknesses of the computer network and applying a security mechanism to protect against potential attacks; 5) Finding security bugs in web applications and applying corrections to eliminate them; 6) performance of the required analysis regarding the application of cryptographic methods and the use of appropriate cryptographic modules; 7) performing all stages of penetration testing; 8) creating process documentation of the IT system and conducting a risk analysis of such a system.