Computer Science – Concentrations: 1. Cyber Security, 2. Mobile Systems, 3. Blockchain Technologies
Program Overview
Computer Science – Concentrations: 1. Cyber Security, 2. Mobile Systems, 3. Blockchain Technologies (MSc, 3 Semesters) – E-Learning/Distance Learning (Online)
Duration
3 Semesters
Qualification Awarded
Master of Science in Computer Science, Master of Science in Computer Science – Cyber Security, Master of Science in Computer Science – Mobile Systems, Master of Science in Computer Science – Blockchain Technologies
Level of Qualification
Master Degree (2nd Cycle)
Language of Instruction
English
Mode of Study
E-Learning/Distance Learning (Online)
Minimum ECTS Credits
90
Profile of the Programme
The Master degree in Computer Science advances the students’ knowledge in core areas of computer science beyond the undergraduate level and exposes them to current and emerging trends.
The program provides an introduction to research within the field while strengthening the candidate’s effective application of computer science methods. The proposed Master degree in Computer Science is designed to have the learning outcomes related to: knowledge and understanding, application of knowledge and understanding for the analysis, design and development of computer systems. The curriculum prepares the student for a wide variety of computer-oriented careers, such as research, development, management, and teaching.
The degree constitutes an independent and terminal study in addition to providing the basis for acceptance to, and continued studies towards, a doctoral degree in computer science.
The program aims of the specialization in Cyber Security focus on the impact of cyber warfare in the contemporary digital era and the analysis of threats, vulnerabilities and risks in a network environment. It also focuses on penetration testing principles and approaches to mitigate potential network attacks.
The program aims of the specialization in Mobile Systems focus on the fundamental concepts of Mobile Computing and wireless technology as well as on the development of software and applications for mobile platforms.
The program aims of the specialization in Blockchain Technologies focus on the fundamentals of digital currencies and the underlying blockchain technology. It also focuses on programmable smart contracts and the associated architectures such as Ethereum. It aims to prepare students on the possible impact of these technologies on various applications including those based on Artificial Intelligence, Machine Learning and Internet of Things.
Career Prospects
Graduates of the MSc programme should be able to:
- hold managerial positions in the ICT industry or government offices;
- become senior technical developers or administrators in the ICT marketplace;
- become entrepreneurs and establish their own enterprises;
- continue studying towards a doctoral degree.
In addition, graduates of the Cyber Security concentration will be well-suited for positions within government and private industry and should be able to:
- work as Chief Information Security Officers
- become System, Network, and/or Web Penetration Testers
- become Computer Network Defense Analysts
- hold positions such as Security Consultants as well as System and Application Developers
The specialization in Mobile Systems, will enable graduates to:
- become senior technical developers and Mobile Systems Experts providing Mobile computing solutions
- hold managerial positions in the Mobile Systems industry
- hold critical positions in Mobile industry operators
Alternatively, the specialization in Blockchain Technologies, will enable graduates to:
- work as senior Blockchain engineers developing new decentralized solutions
- work as Blockchain Architects designing new blockchain systems
- hold positions like Blockchain Advisors or Consultants
Access to Further Studies
Graduates of the programme can be accepted into Third Cycle degrees (Doctorate Degree)
Admission
General Admission Criteria
Applications for admission to the program will be considered only from candidates that fulfill the minimum entrance criteria as described below:
- A Bachelor Degree in Computer Science, Computer Engineering, or any other related field from a recognized university (i.e. American, European, or another recognized equivalent qualification) with a CPA of at least 2.0. Applicants with lower CPA will be considered on an individual basis. Applicants with a non-computer science background may be admitted into the program but they may have to take preparatory foundation courses (the list of courses depends on the applicant’s background).
- Proficiency in the English Language: Students satisfy the English requirements if their first degree was taught in English. Otherwise, they would need to present at least a TOEFL score of 550 paper-based or 213 computer-based, or GCSE “O” Level with “C” or IELTS with a score of 6.0 or score placement at the ENGL-100 level of the University of Nicosia Placement Test.
Specific Admission Criteria:
- A Curriculum Vitae indicating the student’s education, academic and professional experience, any publications, awards, etc.;
- Letters of Recommendation: Two recommendation letters from academic or professional advisors.
- Personal Statement: A letter highlighting the applicant’s individual competences and strengths and providing his/her reflections regarding the expectations and value of the program as well as to his/her personal advancement and career development.
Assessment
Course assessment usually comprises of a comprehensive final exam and continuous assessment. Continuous assessment can include amongst others, mid-terms, projects etc.
Letter grades are calculated based on the weight of the final exam and the continuous assessment and the actual numerical marks obtained in these two assessment components. Based on the course grades the student’s semester grade point average (GPA) and cumulative point average (CPA) are calculated.
Graduation
The student must complete 90 ECTS and all programme requirements.
A minimum cumulative grade point average (CPA) of 2.0 is required. Thus, although a ‘D-‘ is a PASS grade, in order to achieve a CPA of 2.0 an average grade of ‘C’ is required.
Learning Outcomes
Upon successful completion of this program, the students should be able to:
- Critically evaluate computer-based systems, processes and programs, and apply theory, practices and tools for their specification, design, implementation and maintenance;
- Critically analyze and evaluate software solutions from the perspective of software architecture and design patterns;
- Δemonstrate initiative and originality in the specification, design and implementation of computer-based systems, processes, and programs, as well as in the implementation of software project management to meet desired functional and quality requirements;
- Critically analyze and evaluate the security risks that may be involved in the operation of computing equipment within a given context;
- Deploy effectively the tools used for the construction and documentation of software, and in particular in the process involved in using computers to solve practical problems;
- Communicate clearly and analytically using techniques derived from scientific practice in group meetings, presentations, lectures, written reports, and research papers;
- Exhibit such skills that are required to participate in research and development work or to independently work in other qualified areas as well as be able to continue studies towards a doctoral degree
Specific Learning Outcomes per Specialization
Cyber Security
Upon successful completion of this concentration, the students should be able to:
- Employ advanced skills to conduct attacks on networks and systems in a controlled setting to gain practical experience with attack methodologies;
- Integrate complex key technologies to formulate a set of strategic approaches to defend and countermeasure attacks on networks and systems;
- Critically analyze and evaluate the cyber warfare landscape, including targets, attack techniques and tools, defense tactics, legislations, and ethical dilemmas;
- Innovatively practice security as an integral part in the system development lifecycle rather than an add-on feature.
Mobile Systems
Upon successful completion of this concentration, the students should be able to:
- Act with initiative in decision-making for the most appropriate methodology in analyzing and critically assessing existing Services and Protocols in Mobile environments;
- Employ critical thinking for the key issues in designing applications in cross-platform operating systems and achieve a deep and systematic understanding of the technical aspects for platform dependent and platform independent applications;
- Synthesize novel implementations for the efficient utilization of components across platforms, which facilitates scalability and extensibility of mechanisms and applications on different platforms;
- Design and undertake substantial investigations to address significant areas of theory and/or practice, synthesize and construct new knowledge for various Mobile and Wireless networking issues and assess the key methodologies for monitoring Mobile Systems’ performance;
- Build, test, and critically evaluate Mobile software solutions collaboratively (in a group) or autonomously, in order to develop a project in the area of Mobile Systems.
Blockchain Technologies
Upon successful completion of this concentration, the students should be able to:
- Systematically analyze decentralized digital currencies and the underlying blockchain technology;
- Analyze and critically assess the architecture of the bitcoin system, including the data structure used for the bitcoin blockchain;
- Use the Bitcoin Script language to develop different type of scripts using the provided API;
- Systematically analyze the horizontal and vertical application areas of blockchains, beyond digital currencies;
- Envision the disruptive potential of blockchains in combination with other technological developments (IoT, AI, etc.), in the field of money and commerce;
- Provide a deep understanding of smart contracts and their role in the emergence of decentralized applications;
- Critically assess and develop innovative DApps (Decentralized application development).
Academic Path
Section: A – Major Requirements
Min. ECTS Credits: 34 Max. ECTS Credits: 34
- COMP-500D | Research Seminars and Methodology | 4
- COMP-513DL | Cyber-Physical Systems and the Internet of Things | 10
- COMP-514DL | Cryptography and Network Security | 10
- COMP-515DL | Distributed Systems | 10
Section: B – Concentration 1: Cyber Security
Min. ECTS Credits: 26 Max. ECTS Credits: 26
- COMP-527DL | Cyber Warfare | 10
- COMP-535DL | Ethical Hacking | 10
- COMP-595D | Project in Cyber Security | 6
Section: C – Concentration 2: Mobile Systems
Min. ECTS Credits: 26 Max. ECTS Credits: 26
- COMP-525DL | Mobile Computing | 10
- COMP-528DL | Mobile Platforms and Software Development | 10
- COMP-596D | Project in Mobile Systems | 6
Section: D – Concentration 3: Blockchain Technologies
Min. ECTS Credits: 26 Max. ECTS Credits: 26
- COMP-537DL | Digital Currencies | 10
- COMP-538DL | Blockchain Applications | 10
- COMP-594D | Project in Blockchain Technologies | 6
Section: E – Thesis
Min. ECTS Credits: 30 Max. ECTS Credits: 30
- COMP-599DL | Thesis | 20
Section: F – Unallocated Courses
Min. ECTS Credits: 0 Max. ECTS Credits: 20
Semester Breakdown
Semester 1
- COMP-513DL | Cyber-Physical Systems and the Internet of Things | 10
- COMP-514DL | Cryptography and Network Security | 10
- COMP-515DL | Distributed Systems | 10
Semester 2
- COMP-500D | Research Seminars and Methodology | 4
- COMP-527DL | Cyber Warfare | 10
- COMP-535DL | Ethical Hacking | 10
- COMP-595D | Project in Cyber Security | 6
Semester 3
- COMP-599D | Thesis | 30
The above semester breakdown is an indicative one. A few of the courses are electives and can be substituted by others. Students may contact their academic advisor and consult their academic pathway found on this website under “Schools & Programmes”.
Program Outline
Detailed Extraction of Program Information:
Degree Overview:
- Overview: The Master of Science in Computer Science program aims to advance students' knowledge in core computer science areas beyond the undergraduate level and expose them to current and emerging trends.
- Objectives:
- Strengthen students' effective application of computer science methods.
- Introduce students to research within the field.
- Prepare students for diverse careers in research, development, management, and teaching.
- Provide a foundation for further studies towards a doctoral degree in computer science.
- Program Description:
- The program is designed to equip students with the skills and knowledge necessary for various computer-oriented careers.
- Students will gain a strong understanding of theoretical and practical aspects of computer science, including programming, algorithms, data structures, networks, and security.
- The program is offered in three specializations:
- Cyber Security: Focuses on the impact of cyber warfare, threat analysis, vulnerabilities, risk management, and penetration testing.
- Mobile Systems: Explores fundamental concepts of mobile computing, wireless technology, and development for mobile platforms.
- Blockchain Technologies: Delves into digital currencies, blockchain technology, smart contracts, and its applications.
- The program prepares graduates for a wide range of positions, including:
- Research and development roles in technology companies
- Management positions in the ICT industry or government offices
- Senior technical developers or administrators
- Entrepreneurs in the technology sector
- Doctoral studies in computer science
Outline:
- Section A: Major Requirements (36 ECTS Credits):
- COMP-500DL Research Seminars and Methodology (6 ECTS)
- COMP-513DL Cyber-Physical Systems and the Internet of Things (10 ECTS)
- COMP-514DL Cryptography and Network Security (10 ECTS)
- COMP-515DL Distributed Systems (10 ECTS)
- Section B: Concentration 1: Cyber Security (34 ECTS):
- COMP-527DL Cyber Warfare (10 ECTS)
- COMP-529DL Network Defence and Countermeasures (10 ECTS)
- COMP-535DL Ethical Hacking (10 ECTS)
- COMP-595DL Project in Cyber Security (4 ECTS)
- Section C: Concentration 2: Mobile Systems (34 ECTS):
- COMP-525DL Mobile Computing (10 ECTS)
- COMP-528DL Mobile Platforms and Software Development (10 ECTS)
- COMP-531DL Mobile and Wireless Networks (10 ECTS)
- COMP-596DL Project in Mobile Systems (4 ECTS)
- Section D: Concentration 3: Blockchain Technologies (34 ECTS):
- COMP-537DL Digital Currencies (10 ECTS)
- COMP-538DL Blockchain Applications (10 ECTS)
- COMP-539DL Smart Contracts (10 ECTS)
- COMP-594DL Project in Blockchain Technologies (4 ECTS)
- Section E: Electives (0-20 ECTS Credits):
- Students can choose from a variety of elective courses to tailor their program to their interests and career goals.
- Available electives include:
- COMP-511DL Database Systems (10 ECTS)
- COMP-512DL Software Engineering (10 ECTS)
- COMP-521DL Cloud Computing (10 ECTS)
- COMP-522DL Machine Learning and Data Mining (10 ECTS)
- (and more)
- Section F: Thesis (0-20 ECTS Credits):
- Students who choose to write a thesis are exempt from two elective courses.
- The thesis must be based on original research and demonstrate a deep understanding of the chosen field.
Assessment:
- Course assessment typically comprises a final exam and continuous assessment.
- Continuous assessment may include assignments, quizzes, presentations, and participation.
- The final exam and continuous assessment are weighted to determine the final grade for each course.
- A minimum cumulative grade point average (CPA) of 2.0 is required to graduate.
Teaching:
- The program utilizes a variety of teaching methods, including lectures, seminars, tutorials, and project work.
- The program is taught by a team of experienced and qualified faculty members with expertise in various areas of computer science.
- The University of Nicosia also offers a range of student support services, including academic advising, career counseling, and tutoring.
Careers:
- Graduates of the program are well-prepared for a wide range of careers in the computer science field.
- Potential career paths include:
- Chief Information Security Officer
- System, Network, and Web Penetration Tester
- Computer Network Defense Analyst
- Security Consultant
- Blockchain Engineer
- Blockchain Architect
- Blockchain Advisor/Consultant
- Senior Technical Developer
- Mobile Systems Expert
- Mobile industry operator
- and many more
- The program also provides a strong foundation for further studies towards a doctoral degree in computer science.
Other:
- The program is offered in a distance learning format, allowing students to study from anywhere in the world.
- The program is designed to be flexible and cater to the needs of working professionals.
- Students can complete the program in three semesters (1.5 years).
- The program is accredited by the Cyprus Agency of Quality Assurance and Accreditation in Higher Education (CYQAA).
Note:
This is a very detailed extraction of the program information. Please note that some sections may not be relevant to your specific needs.