Second cycle degree in

International cybersecurity and cyberintelligence

Class: LM-66 - Computer systems safety

Class LM-66 - Computer systems safety
Duration 2 years
Branch Padova
Language English
Access Restricted
Reference structures Department of mathematics, School of science

The course prepares students to become professionals in the management of information security systems in international environments and to support relationships between companies, organizations, governments, and national and supranational security agencies. Held in English, the course proposes a joint program with the University of Granada (Spain), Vilnius University (Lithuania), and the University of Minho (Portugal). Graduates of the course may pursue careers at companies, organizations and agencies that supply cybersecurity products and services or set up an internal structure dedicated to security management.

  Find out more

Characteristics and objectives
The Master's Degree Program in International Cybersecurity and Cyberintelligence is a joint program with the University of Granada (Spain), the University of Vilnius (Lithuania), and the University of Minho (Portugal), in which the skills and methodologies of the four institutions are coordinated in a transnational and transdisciplinary manner to train knowledgeable professionals and aware citizens in the field of information protection.
The course aims to train a new generation of cybersecurity and cyberintelligence professionals who will differ from the traditional expert in the sector due to a strong vocation for transnational collaboration and the sharing of skills, competences and information, and for the ability to manage cybersecurity in international environments and in relations between companies, organizations, governments and national and supranational security agencies.

Occupational opportunities
Graduates will easily find work within companies, organizations and agencies that provide cybersecurity products and services, or that make use of such products and services and have an internal structure dedicated to security management. Among the possible professional profiles:
• Chief Information Security Officer (CISO) manages an organization's security strategy and implementation to ensure adequate protection of information assets.
• Cyber Incident Responder monitors the security status of the organization, manages incidents during attacks and ensures the continuous operation of information systems.
• Cyber Threat Intelligence (CTI) Specialist collects, processes, analyzes data and information to produce and distribute intelligence reports useful to interested parties. by the attackers and their evolutions.
• Cybersecurity Architect plans and designs security-by-design solutions (infrastructure, systems, assets, software, hardware and services) and cybersecurity controls.
• Cybersecurity Implementer develops, distributes and manages information security solutions (systems, resources, software, controls and services) on infrastructures and products.
• Cybersecurity Risk Manager Manages the organization's cybersecurity risks by aligning them with the organization's strategy. Develop, maintain and communicate risk management processes and reports.
• Ethical Hacker / Penetration Tester Evaluate the effectiveness of security controls, reveal and exploit information security vulnerabilities, assessing their criticality if exploited by threat actors.