CYBERSECURITY ENGINEERING
The information listed below should be considered as provisional. Official curricula are going to be published in June 2025.
Cryptography expert
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYKWQ | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWQ | Information systems security |
![]() |
1 | 8 |
02UEWWQ
14OBWWQ |
Challenge
or Choice from table 1 (view Full curriculum) |
![]() - |
1,2
1,2 |
8
6 |
01NXIWQ | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWQ | Cryptography |
![]() |
2 | 6 |
01GYSWQ | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWQ | Web Applications |
![]() |
2 | 8 |
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYRWQ | Advanced cryptography |
![]() |
1 | 6 |
02GYYWQ
02TYAWQ |
Advanced Information systems security
or Security verification and testing |
![]() ![]() |
1
1 |
8
8 |
01GYZWQ
01NXUWQ |
AI and Cybersecurity
or Data protection, Privacy and Anonymity |
![]() ![]() |
1
1 |
6
6 |
01GZBWQ | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01GZDWQ
02NYTWQ |
Computer Forensics and cyber crime analysis
or Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
01GZEWQ | Post-quantum Cryptography |
![]() |
2 | 6 |
10FWYWQ
11MBRWQ 17MBRWQ |
Internship
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Analyst
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYKWQ | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWQ | Information systems security |
![]() |
1 | 8 |
02UEWWQ
30OBWWQ |
Challenge
or Choice from table 1 (view Full curriculum) |
![]() - |
1,2
1,2 |
8
6 |
01NXIWQ | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWQ | Cryptography |
![]() |
2 | 6 |
01GYSWQ | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWQ | Web Applications |
![]() |
2 | 8 |
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYZWQ | AI and Cybersecurity |
![]() |
1 | 6 |
02GYYWQ
01GYRWQ 01NXUWQ |
Advanced Information systems security
or Advanced cryptography or Data protection, Privacy and Anonymity |
![]() ![]() ![]() |
1
1 1 |
8
6 6 |
01GZBWQ | Cybersecurity laws and regulations |
![]() |
1 | 6 |
02TYAWQ | Security verification and testing |
![]() |
1 | 8 |
01GZDWQ
02NYTWQ |
Computer Forensics and cyber crime analysis
or Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
10FWYWQ
11MBRWQ 17MBRWQ |
Internship
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
01NXEWQ | Threat Intelligence and Incident Management |
![]() |
2 | 6 |
Cyber Designer
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYKWQ | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWQ | Information systems security |
![]() |
1 | 8 |
02UEWWQ
05OBWWQ |
Challenge
or Choice from table 1 (view Full curriculum) |
![]() - |
1,2
1,2 |
8
6 |
01NXIWQ | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWQ | Cryptography |
![]() |
2 | 6 |
01GYSWQ | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWQ | Web Applications |
![]() |
2 | 8 |
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
02GYYWQ | Advanced Information systems security |
![]() |
1 | 8 |
01GYZWQ
01GYRWQ 02TYAWQ |
AI and Cybersecurity
or Advanced cryptography or Security verification and testing |
![]() ![]() ![]() |
1
1 1 |
6
6 8 |
01GZBWQ | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01NXUWQ | Data protection, Privacy and Anonymity |
![]() |
1 | 6 |
01GZDWQ
02NYTWQ |
Computer Forensics and cyber crime analysis
or Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
01NWLWQ | Offensive Security |
![]() |
2 | 6 |
10FWYWQ
11MBRWQ 17MBRWQ |
Internship
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Legal and Compliance Officer
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYKWQ | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWQ | Information systems security |
![]() |
1 | 8 |
02UEWWQ
14OBWWQ |
Challenge
or Choice from table 1 (view Full curriculum) |
![]() - |
1,2
1,2 |
8
6 |
01NXIWQ | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWQ | Cryptography |
![]() |
2 | 6 |
01GYSWQ | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWQ | Web Applications |
![]() |
2 | 8 |
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GZBWQ | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01NXUWQ | Data protection, Privacy and Anonymity |
![]() |
1 | 6 |
01GYZWQ
02GYYWQ 01GYRWQ 02TYAWQ |
AI and Cybersecurity
or Advanced Information systems security or Advanced cryptography or Security verification and testing |
![]() ![]() ![]() ![]() |
1
1 1 1 |
6
8 6 8 |
01GZDWQ | Computer Forensics and cyber crime analysis |
![]() |
2 | 8 |
02NYTWQ | Technology and Innovation Management in Cybersecurity |
![]() |
2 | 6 |
10FWYWQ
11MBRWQ 17MBRWQ |
Internship
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
CYBERSECURITY ENGINEERING
The information listed below should be considered as provisional. Official curricula are going to be published in June 2025.
Cryptography expert
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYKWR | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWR | Information systems security |
![]() |
1 | 8 |
02UEWWR
14OBWWR |
Challenge
or Choice from table 1 (view Full curriculum) |
![]() - |
1,2
1,2 |
8
6 |
01NXIWR | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWR | Cryptography |
![]() |
2 | 6 |
01GYSWR | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWR | Web Applications |
![]() |
2 | 8 |
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYRWR | Advanced cryptography |
![]() |
1 | 6 |
01GYZWR
01NXUWR |
AI and Cybersecurity
or Data protection, Privacy and Anonymity |
![]() ![]() |
1
1 |
6
6 |
01GZBWR | Cybersecurity laws and regulations |
![]() |
1 | 6 |
02GYYWR
02TYAWR |
Advanced Information systems security
or Security verification and testing |
![]() ![]() |
1
1 |
8
8 |
01GZDWR
02NYTWR |
Computer Forensics and cyber crime analysis
or Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
01GZEWR | Post-quantum Cryptography |
![]() |
2 | 6 |
10FWYWR
11MBRWR 17MBRWR |
Internship
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Analyst
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYKWR | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWR | Information systems security |
![]() |
1 | 8 |
02UEWWR
30OBWWR |
Challenge
or Choice from table 1 (view Full curriculum) |
![]() - |
1,2
1,2 |
8
6 |
01NXIWR | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWR | Cryptography |
![]() |
2 | 6 |
01GYSWR | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWR | Web Applications |
![]() |
2 | 8 |
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYZWR | AI and Cybersecurity |
![]() |
1 | 6 |
02GYYWR
01GYRWR 01NXUWR |
Advanced Information systems security
or Advanced cryptography or Data protection, Privacy and Anonymity |
![]() ![]() ![]() |
1
1 1 |
8
6 6 |
01GZBWR | Cybersecurity laws and regulations |
![]() |
1 | 6 |
02TYAWR | Security verification and testing |
![]() |
1 | 8 |
01GZDWR
02NYTWR |
Computer Forensics and cyber crime analysis
or Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
10FWYWR
11MBRWR 17MBRWR |
Internship
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
01NXEWR | Threat Intelligence and Incident Management |
![]() |
2 | 6 |
Cyber Designer
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYKWR | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWR | Information systems security |
![]() |
1 | 8 |
02UEWWR
05OBWWR |
Challenge
or Choice from table 1 (view Full curriculum) |
![]() - |
1,2
1,2 |
8
6 |
01NXIWR | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWR | Cryptography |
![]() |
2 | 6 |
01GYSWR | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWR | Web Applications |
![]() |
2 | 8 |
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
02GYYWR | Advanced Information systems security |
![]() |
1 | 8 |
01GYZWR
01GYRWR 02TYAWR |
AI and Cybersecurity
or Advanced cryptography or Security verification and testing |
![]() ![]() ![]() |
1
1 1 |
6
6 8 |
01GZBWR | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01NXUWR | Data protection, Privacy and Anonymity |
![]() |
1 | 6 |
01GZDWR
02NYTWR |
Computer Forensics and cyber crime analysis
or Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
01NWLWR | Offensive Security |
![]() |
2 | 6 |
10FWYWR
11MBRWR 17MBRWR |
Internship
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Legal and Compliance Officer
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYKWR | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWR | Information systems security |
![]() |
1 | 8 |
02UEWWR
14OBWWR |
Challenge
or Choice from table 1 (view Full curriculum) |
![]() - |
1,2
1,2 |
8
6 |
01NXIWR | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWR | Cryptography |
![]() |
2 | 6 |
01GYSWR | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWR | Web Applications |
![]() |
2 | 8 |
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GZBWR | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01NXUWR | Data protection, Privacy and Anonymity |
![]() |
1 | 6 |
01GYZWR
02GYYWR 01GYRWR 02TYAWR |
AI and Cybersecurity
or Advanced Information systems security or Advanced cryptography or Security verification and testing |
![]() ![]() ![]() ![]() |
1
1 1 1 |
6
8 6 8 |
01GZDWR | Computer Forensics and cyber crime analysis |
![]() |
2 | 8 |
02NYTWR | Technology and Innovation Management in Cybersecurity |
![]() |
2 | 6 |
10FWYWR
11MBRWR 17MBRWR |
Internship
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |