Vilnius Gediminas Technical University
Information and Information Technologies Security
Vilnius, Lithuania
DURATION
2 Years
LANGUAGES
English
PACE
Full time
APPLICATION DEADLINE
15 Jun 2024
EARLIEST START DATE
01 Sep 2024
TUITION FEES
EUR 5,410 / per year *
STUDY FORMAT
On-Campus
* For non-EU students
Introduction
Information and Information Technologies Security
The program aims at preparing highly qualified information and information technology security specialists, by forming the systematic view on root causes of information security issues, their prevention, solving and compensation methods, providing students with the newest knowledge and abilities from the professional and scientific point of view on modern information security insurance methods and technologies, developing original and critical thinking, managerial, research and innovation skills.
Admissions
Scholarships and Funding
Several scholarship options are available. Please check the University website for more information.
Several scholarship options are available. Please check the University website for more information:
Deadline: April 20th
Curriculum
1 semester
- Information Technology Security Methods
- Master Graduation Thesis 1
- Ethical, Legal and Human Aspects of Information Security
- Cryptographic Systems
- Fundamentals of Scientific Research and Innovations
2 semester
- Master Graduation Thesis 2
- Computer Networks and Operating System Security
- Virtual Infrastructure and Cloud Computing Security
- Ethical Hacking Techniques (with course work)
- Malware Analysis Methods
- Software Security
- SOC Methods and Technologies for Information System Defense
3 semester
- Master Graduation Thesis 3
- Cyber Forensics (with course work )
- Information Security Management
- Secure Programming
- Free choice obligatory course
4 semester
Master Graduation Thesis 4
Program Outcome
Knowledge
- Knowledge of modern cyberthreats, vulnerabilities, risks and attack vectors, covering, but not limited to technological, physical security and social areas, ability to identify and neutralize them, minimize the consequences.
- Understanding of information and information technology security principles and concepts, covering, but not limited to technological, organizational, social and legal aspects, knowledge of modern information systems security mechanisms and ability to apply them, perception of secure information system design and development methods and ability to integrate information security mechanisms into information security systems and processes.
Ability to Perform Research
- Proficiency in defining perspective research areas, ability to perform literature analysis and cite the literature sources, to plan and to carry out the experiment in the defined problem area, to apply different analytical, modelling and experimental methods, to evaluate qualitative and quantitative information, to apply the experimental results for solving practical problems.
- Ability to perform analysis, logical reasoning, to formulate constructive, reasoned conclusions and recommendations, to understand and criticize ideas and results of other researchers, to prepare scientific research publications, to participate in a scientific discussion.
Special Skills
- Ability to integrate security mechanisms into software, information systems and processes, to apply cryptographic, secure programming and code security analysis, ethical hacking, cyberforensics, secure network and virtual infrastructure design methods, understanding of specific security aspects of different operating systems, DBMS and other information systems.
- Ability to evaluate the maturity of information systems and organisations from the security perspective, to apply risk management methods and requirements of information security standards and other regulating documents while organizing the business processes, ability to insure organization's compliance and certification processes according to the security standards requirements, to maintain information security management processes, integrate them with other business processes, projects, to insure business process continuity.
Social Skills
- Ability to work individually and in a team, to work with colleagues having different educational and professional background, to communicate orally and in writing, to submit proposals and effectively communicate with professionals from other areas.
- To express and defend the opinion, to respect other opinions.
Personal Skills
- Ability to think critically, independently and constructively, to implement innovative solutions and evaluate their consequences.
- Ability for self-improvement, forming and increasing the knowledge base, to plan the study process, labour and time, to seek the result.
Program Tuition Fee
Career Opportunities
Graduatescan join PhD studies or will have the following carrier opportunities:
- Chief information security officer
- Information security auditor
- Penetration-tester
- Security analyst
- Cybercrimes investigator
- IT security project manager
- Security-oriented programmer
- Security-oriented information system architecture
- Security-specialized system administrator
Program delivery
2 years (4 semesters) graduation is finalized with the defense of Final project