Laurea Triennale Sicurezza dei sistemi e delle reti informatiche online
DURATION
3 Years
LANGUAGES
Italian
PACE
Full time
APPLICATION DEADLINE
Request application deadline
EARLIEST START DATE
Oct 2025
TUITION FEES
Request tuition fees
STUDY FORMAT
Distance Learning
Introduction
The degree program, taught in Italian, aims to provide a broad and in-depth technological and methodological preparation in the IT area, with specific attention to topics in the cybersecurity and information privacy areas as well as a solid and methodological knowledge of the main areas of mathematics, physics, and the like, thus offering adequate preparation for assimilating, understanding and evaluating the impact of scientific and technological progresses within the Information technology area with particular focus on the cybersecurity and privacy fields. The graduate in Systems and Network Security will be able to face all the problems deriving from the creation of secure services both at infrastructural and application level. The course also aims to provide in-depth operational knowledge that allows graduates to be engaged by professional subjects, either private or public, interested in the adoption of methodological and technological tools for improving the security of their IT services and infrastructures.
Admissions
Curriculum
Year: 1
- Continuum Mathematics
First four-month period
- Computer Programming
- Discrete Mathematics
Second four-month period
- Computer Architecture
- Cybercrime Legal Framework
Third four-month period
- Cybersecurity Management
- Web and Mobile Programming
- Open sessions
- English Assessment B1
Year: 2
First four-month period
- Algorithms and Data Structures
- Operating Systems I
- Operating Systems II
Second four-month period
- Computer Networks
- Databases
Third four-month period
- Cryptography
- Statistics and Data Analysis
Year: 3
First four-month period
- Computer Forensics
- System and Network Security
Second four-month period
- Biometric Systems
- Secure Software Design
Third four-month period
- Web E Mobile System Security
Program Tuition Fee
Career Opportunities
These professional figures operate in the business consultancy sector as support to companies in the analysis and resolution of IT security issues related to information systems, data processing, system and network management, and applications development.
They are professionals with specific skills in the field of technologies and methods for IT security that can understand the business and organizational dynamics in which they operate. They can work in structured projects and heterogeneous business contexts by offering highly qualified knowledge for security-related problem-solving, technology selection, and innovation.
They carry out highly specialized professional activities in the field of business consultancy for both private and public companies which lack adequate computer security skills for correct and effective management of information systems as well as data processing systems.
IT technicians specialized in systems, networks, and mobile device security. Cyber security experts that are inserted in the staff of a company bring the required skills for the secure management of databases, systems, network equipment, PCs, and mobile devices. The functions covered include the management of access control policies and systems, the secure configuration and management of specific IT systems, the monitoring of a company's IT systems, and the management of technologies for disaster recovery and business continuity.
These professional figures are specialists in information technology and specific technologies and methods of cyber security. They can operate as IT experts but with knowledge of the main critical issues relating to IT security. They are also able to provide technological solutions aimed at guaranteeing an adequate level of protection for business resources and operations.
The secure management of systems, networks, and mobile devices is a corporate requirement spread horizontally on the large part of the industrial, public administration, and services sectors. All large companies as well as small and medium-sized enterprises have an internal staff to manage their information systems, including proprietary data and managerial and commercial transactions. Security and business continuity requirements are at the basis of the well-functioning of such systems.
Specialized technicians in the analysis and development of secure software applications. The professional profiles included in this category belong to the professional profiles of software analysts and designers with particular skills regarding the use of methodologies aimed at identifying security vulnerabilities and preventing security problems in applications. They are also experts in cryptographic techniques (algorithms and protocols) to be used for the protection of data.
These professionals integrate traditional software development and programming skills with specific knowledge of the main security problems that software can present. In the development cycle of software, these professionals are therefore able to integrate the main methodologies for software security from the design and planning phases, towards the development and testing. They are also skilled in the verification of software vulnerabilities and the identification of suitable countermeasures.
Developing software according to security criteria and verifying the security of third-party software are necessities now common to most software houses where this job profile is particularly required.
Specialized technicians in the analysis and development of secure web applications, multimedia, interactive, and mobile applications
The professional profiles included in this category are web applications analysts and designers with specific skills regarding the security of applications characterized by strong interactivity and the use of mobile devices. These professionals integrate the ability to develop web applications with knowledge of security problems and contribute to protecting company assets from what is today the main channel of malicious code propagation, unauthorized accesses, and computer crimes. These professional figures know the main methodologies used in the creation of interactive web applications based on mobile devices, taking care of both their security design and verifying their degree of security through testing and monitoring tools and techniques. Expertise in cryptographic techniques is used to secure network communications and to protect data managed through web applications. They are also very oriented towards technological innovation, considering the rapid evolutionary dynamics that characterize web technologies.
The increasing spread of e-commerce, web transactions between companies, and the development of mobile apps for providing customer services makes these professional figures more and more relevant for all companies, both private and public and of any size and industrial sector, which have adopted web services as one of the main communication channels for their commercial presence or for the provision of services.
Technicians specialized in information and communication technologies. The professional profiles included in this category are experts in the management, deployment, and use of information and communication technologies in various operational contexts. These professionals integrate the ability to develop and maintain computer applications, even complex, with the knowledge of various application contexts (industrial automation, information systems, digital communication, decision support, etc.). These professionals possess a broad spectrum of knowledge and skills in the various fields of information technology and telecommunications. They are familiar with the scientific method of investigation, have good modeling skills, and can understand and use mathematical tools to support their computing skills. They can work in a team, operate independently, and integrate rapidly in the working environment. Graduates can operate in the many ICT application fields for the design, deployment, and management of IT systems, and for the study of new architecture and/or applications