Cryptography expert
1° anno
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYKUV | Computer architectures and operating systems |
![]() |
1 | 8 |
01TYMUV | Information systems security |
![]() |
1 | 6 |
09UEWUV
14OBWUV |
Challenge (vedi Piano di studi completo)
oppure Choice from table 1 (vedi Piano di studi completo) |
-
![]() |
1,2
1,2 |
8
6 |
01GYLUV | Networks, cloud and application security |
![]() |
1,2 | 12 |
06LPYUV | Cryptography |
![]() |
2 | 6 |
01GYSUV | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOUV | Web Applications |
![]() |
2 | 8 |
2° anno
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYRUV | Advanced cryptography |
![]() |
1 | 6 |
01GZDUV | Computer Forensics and cyber crime analysis |
![]() |
1 | 8 |
01GZCUV | Corporate cybersecurity evaluation |
![]() |
1 | 6 |
01GZBUV | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01GYYUV
02TYAUV |
Advanced Information systems security
oppure Security verification and testing |
![]() ![]() |
1
1 |
8
8 |
01GZEUV | Post-quantum Cryptography |
![]() |
2 | 6 |
19MSYUV
11MBRUV 17MBRUV |
Professional Training
oppure Thesis oppure Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Analyst
1° anno
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYKUV | Computer architectures and operating systems |
![]() |
1 | 8 |
01TYMUV | Information systems security |
![]() |
1 | 6 |
09UEWUV
14OBWUV |
Challenge (vedi Piano di studi completo)
oppure Choice from table 1 (vedi Piano di studi completo) |
-
![]() |
1,2
1,2 |
8
6 |
01GYLUV | Networks, cloud and application security |
![]() |
1,2 | 12 |
06LPYUV | Cryptography |
![]() |
2 | 6 |
01GYSUV | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOUV | Web Applications |
![]() |
2 | 8 |
2° anno
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYYUV | Advanced Information systems security |
![]() |
1 | 8 |
01GYRUV | Advanced cryptography |
![]() |
1 | 6 |
01GZDUV
01GZCUV 01GZBUV |
Computer Forensics and cyber crime analysis
oppure Corporate cybersecurity evaluation oppure Cybersecurity laws and regulations |
![]() ![]() ![]() |
1
1 1 |
8
6 6 |
02TYAUV | Security verification and testing |
![]() |
1 | 8 |
01GYZUV | AI and Cybersecurity |
![]() |
2 | 6 |
19MSYUV
11MBRUV 17MBRUV |
Professional Training
oppure Thesis oppure Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Designer
1° anno
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYKUV | Computer architectures and operating systems |
![]() |
1 | 8 |
01TYMUV | Information systems security |
![]() |
1 | 6 |
09UEWUV
14OBWUV |
Challenge (vedi Piano di studi completo)
oppure Choice from table 1 (vedi Piano di studi completo) |
-
![]() |
1,2
1,2 |
8
6 |
01GYLUV | Networks, cloud and application security |
![]() |
1,2 | 12 |
06LPYUV | Cryptography |
![]() |
2 | 6 |
01GYSUV | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOUV | Web Applications |
![]() |
2 | 8 |
2° anno
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYYUV | Advanced Information systems security |
![]() |
1 | 8 |
01GYRUV | Advanced cryptography |
![]() |
1 | 6 |
01GZDUV
01GZCUV 01GZBUV |
Computer Forensics and cyber crime analysis
oppure Corporate cybersecurity evaluation oppure Cybersecurity laws and regulations |
![]() ![]() ![]() |
1
1 1 |
8
6 6 |
02TYAUV | Security verification and testing |
![]() |
1 | 8 |
01GZAUV | Advanced data protection, and methods for privacy and anonymity |
![]() |
2 | 6 |
19MSYUV
11MBRUV 17MBRUV |
Professional Training
oppure Thesis oppure Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Legal and Compliance Officer
1° anno
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYKUV | Computer architectures and operating systems |
![]() |
1 | 8 |
01TYMUV | Information systems security |
![]() |
1 | 6 |
09UEWUV
14OBWUV |
Challenge (vedi Piano di studi completo)
oppure Choice from table 1 (vedi Piano di studi completo) |
-
![]() |
1,2
1,2 |
8
6 |
01GYLUV | Networks, cloud and application security |
![]() |
1,2 | 12 |
06LPYUV | Cryptography |
![]() |
2 | 6 |
01GYSUV | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOUV | Web Applications |
![]() |
2 | 8 |
2° anno
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYRUV | Advanced cryptography |
![]() |
1 | 6 |
01GZDUV | Computer Forensics and cyber crime analysis |
![]() |
1 | 8 |
01GZCUV | Corporate cybersecurity evaluation |
![]() |
1 | 6 |
01GZBUV | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01GYYUV
02TYAUV |
Advanced Information systems security
oppure Security verification and testing |
![]() ![]() |
1
1 |
8
8 |
01GZAUV | Advanced data protection, and methods for privacy and anonymity |
![]() |
2 | 6 |
19MSYUV
11MBRUV 17MBRUV |
Professional Training
oppure Thesis oppure Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |