Zostałeś wylogowany z powodu braku aktywności!

MA IT Cyber Security


Degree awarded:

Mode of study: 

Duration of study:

Language of instruction:

ECTS points:

Faculty of Political Science and Journalism
Maria Curie-Skłodowska University 
Głęboka 45
20-612 Lublin, Poland

Master of Arts (MA)

Full time studies

2 years / 4 semesters




Application Period: 1st April- 30th September

Academic Year begins: October 1st, 2023

Academic year ends: 1st July

Tuition Fees 2023/24

Euro: Year 1 – 3420 
           Year 2- 3200 


IT Cyber Security is a program for those who wish to combine knowledge of computer science with knowledge of political science and administration. 
The knowledge related to political science and administration includes: 
1) the place of cybersecurity in the contemporary understanding of security; 2) the complexity of security threats in cyberspace; 3) diversity of areas of activities to ensure security in cyberspace, taking into account political science, but also legal, economic and sociological approaches. 

Knowledge related to computer science includes: 

1) The principles of operation of the operating system, its tasks and weaknesses; 2) basic programming structures and rules of designing programming scripts; 3) functioning of web applications and knowledge about the basic weaknesses of web applications; 4) principles of operation of computer networks and, weaknesses of protocols and mechanisms operating in all layers of the OSI model; 5) principles and best practices for safe web application programming; 6) principles of operation of cryptographic modules and the manner of their application in IT Systems; 7) the process of performing penetration tests and ability to describe each stage; 8) standards for information security management. 

Computer science skills include: 

1) efficient performance of tasks in the Linux operating system; 2) designing a simple algorithm and creating its implementation using Python; 3) conducting security tests for Web applications based on the OWASP standard; 4) Analysing the weaknesses of the computer network and applying a security mechanism to protect against potential attacks; 5) Finding security bugs in web applications and applying corrections to eliminate them; 6) performance of the required analysis regarding the application of cryptographic methods and the use of appropriate cryptographic modules; 7) performing all stages of penetration testing; 8) creating process documentation of the IT system and conducting a risk analysis of such a system.