Brive logo
Explore
image/svg+xml
Discover programs that best match your skills and preferences
Find out which study programs best match your qualifications and criteria
Schedule a call and let us help you find the right program
Apply online to universities all over the world through Brive
We support you, every step of the way, to get you into one of your top choices
Collect points and receive cashback when applying through Brive
Search
Masters
image/svg+xml
Computer Science & IT
image/svg+xml
Master in Cybersecurity (MSc, Online)
Apply through Brive
We are official partners! Complete your application for free and earn benefits!
Free review on your application
1:1 counselling by certified consultants
Higher acceptance rate on your top choices
MASTERS

Master in Cybersecurity (MSc, Online)

DEI College
ThessalonikiGreece
Online
Full-time
Duration
1 Year
Language
Greek

Program Description

The Master’s in Computing with a specialization in Cyber Security at DEI College is a high-standard, modern postgraduate program offered both on-campus and online. It is designed to effectively prepare students for a dynamic career in one of the fastest-growing fields, driven by the continuous rise of cybercrime and digital threats.

Offered in collaboration with the University of Sunderland, the program focuses on key areas such as network security and organizational cyber protection. Students gain the essential knowledge, methodologies, and protocols required to design and implement secure, effective, and reliable information systems.

Entry Requirements

Are you eligible to apply?

Sign up, check the entry requirements, and find out your compatibility with the program.

Curriculum

1st Term

Fundamentals of Cybersecurity

Students will cover a range of governance and management topics which will enable them to determine, establish and maintain appropriate governance, delivery and creation of cybersecurity solutions for information, systems and network security. They will understand the underlying technologies of secure systems and gain a critical awareness of the inherent risks and related privacy issues of their use in the cybersecurity environment by applying concepts such as the principles of least privilege, separation of risk, defence in depth and secrecy.


Technology Management for Organisations

Students will learn to apply the principles, policies and procedures of cybersecurity and data science to provide resilient and robust organisational solutions for secure and valuable information. They will develop techniques and use tools that will enable them to undertake critical analysis of the challenges and opportunities of using cybersecurity to mitigate and manage risk to data and enable business continuity in the case of data breaches.

2nd Term

Cyber Resilience and Incident Response

Students will consider cybersecurity in design and development using the concepts of secure design across a range of platforms and problem areas. They will study applied cryptography, secure programming and defensive programming. They will gain the knowledge and skills to undertake first-response in cyber breach and associated incidents. They will acquire the technical knowledge and skills to respond to breaches and implement proactive measures to potentially prevent their occurrence.


Cybersecurity and User Experience Design

Students will study the two themes of cybersecurity and usability in software design. They will learn to understand the trade-offs and challenges these themes present. They will research challenges in the areas of usable security through a survey of past and recent research in usable cybersecurity. They will examine the nature of usability and the user experience, as it applies to cybersecurity, the impact of user psychology, user models, usage contents and usability evaluation techniques.


Computing Masters Project

Students will develop a practical deliverable and investigate an area of academic research through the support of a sponsor for example: an IT strategy; an investigative study; a technically challenging artefact (e.g. a feasibility study, design, implementation, re-engineered solution); or undertake a theoretical review based on a novel research question (provided by a research active member of staff). They will underpin the project with a literature review that is a conceptual framework of their study – a systematic synthesis of concepts, assumptions, expectations, beliefs, and theories that supports and informs their research.


* Modules may change each year

Jobs - Careers

  • Creator/Programmer (developers) of interactive technologies
  • Designer of integrated systems, mobile interfaces and Internet of Things applications
  • Creator/Designer of "smart" interactive systems
  • Interactive Technologies Data Analyst
  • Technical Leader/director of IT projects
  • Project Manager in the broad IT and media industries
  • Interaction Designer and UX specialist
  • Database Designer
More
Fresh Content
The content has been updated in the last 6 months

Need help applying to this program?

Schedule a free 20-minute counseling session today!

Similar programs