Students
Tuition Fee
Not Available
Start Date
Not Available
Medium of studying
Not Available
Duration
Not Available
Details
Program Details
Degree
Masters
Major
Cybersecurity | Information Technology | Network Security
Area of study
Information and Communication Technologies | Security Services
Course Language
English
About Program

Program Overview


Program Overview

The Sťcuritť des SystŤmes d'information program is designed to equip students with the knowledge and skills necessary to conceive and implement cybersecurity devices.


Program Description

The program focuses on the security of information systems, aiming to provide students with a comprehensive understanding of the concepts and techniques required to ensure the security and integrity of digital systems.


Program Objectives

  • To provide students with a deep understanding of cybersecurity principles and practices
    • Including threat analysis and risk management
    • Cryptography and secure communication protocols
    • Security policies and compliance
  • To enable students to design and implement effective cybersecurity measures
    • Including security architectures and frameworks
    • Incident response and disaster recovery
    • Security testing and vulnerability assessment

Research Areas

  • Cybersecurity threat analysis and mitigation
  • Secure communication protocols and cryptography
  • Information system security architectures and frameworks
  • Incident response and disaster recovery planning

Admission Criteria

The program is open to students who meet the specified admission requirements, which typically include a relevant undergraduate degree and a demonstrated interest in cybersecurity.


Tuition Fees

Tuition fees for the program are determined by the university and may vary depending on the student's residency status and other factors.


Program Requirements

Students in the program are required to complete a set of core courses and electives, which may include:


  • Foundations of cybersecurity
  • Cryptography and secure communication
  • Security policies and compliance
  • Incident response and disaster recovery
  • Security testing and vulnerability assessment
See More