Cryptography expert
Year 1
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYKUV | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMUV | Information systems security |
![]() |
1 | 8 |
02UEWUV
14OBWUV |
Challenge (view Full curriculum)
or Choice from table 1 (view Full curriculum) |
![]() - |
1,2
1,2 |
8
6 |
01NXIUV | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
06LPYUV | Cryptography |
![]() |
2 | 6 |
01GYSUV | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOUV | Web Applications |
![]() |
2 | 8 |
Year 2
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYRUV | Advanced cryptography |
![]() |
1 | 6 |
02GYYUV
02TYAUV |
Advanced Information systems security
or Security verification and testing |
![]() ![]() |
1
1 |
8
8 |
01GYZUV
01NXUUV |
AI and Cybersecurity
or Data protection, Privacy and Anonymity |
![]() ![]() |
1
1 |
6
6 |
01GZBUV | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01GZDUV
01NYTUV |
Computer Forensics and cyber crime analysis
or Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
01GZEUV | Post-quantum Cryptography |
![]() |
2 | 6 |
10FWYUV
11MBRUV 17MBRUV |
Internship
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Analyst
Year 1
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYKUV | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMUV | Information systems security |
![]() |
1 | 8 |
02UEWUV
30OBWUV |
Challenge (view Full curriculum)
or Choice from table 1 (view Full curriculum) |
![]() - |
1,2
1,2 |
8
6 |
01NXIUV | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
06LPYUV | Cryptography |
![]() |
2 | 6 |
01GYSUV | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOUV | Web Applications |
![]() |
2 | 8 |
Year 2
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYZUV | AI and Cybersecurity |
![]() |
1 | 6 |
02GYYUV
01GYRUV 01NXUUV |
Advanced Information systems security
or Advanced cryptography or Data protection, Privacy and Anonymity |
![]() ![]() ![]() |
1
1 1 |
8
6 6 |
01GZBUV | Cybersecurity laws and regulations |
![]() |
1 | 6 |
02TYAUV | Security verification and testing |
![]() |
1 | 8 |
01GZDUV
01NYTUV |
Computer Forensics and cyber crime analysis
or Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
10FWYUV
11MBRUV 17MBRUV |
Internship
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
01NXEUV | Threat Intelligence and Incident Management |
![]() |
2 | 6 |
Cyber Designer
Year 1
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYKUV | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMUV | Information systems security |
![]() |
1 | 8 |
02UEWUV
05OBWUV |
Challenge (view Full curriculum)
or Choice from table 1 (view Full curriculum) |
![]() - |
1,2
1,2 |
8
6 |
01NXIUV | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
06LPYUV | Cryptography |
![]() |
2 | 6 |
01GYSUV | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOUV | Web Applications |
![]() |
2 | 8 |
Year 2
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
02GYYUV | Advanced Information systems security |
![]() |
1 | 8 |
01GYZUV
01GYRUV 02TYAUV |
AI and Cybersecurity
or Advanced cryptography or Security verification and testing |
![]() ![]() ![]() |
1
1 1 |
6
6 8 |
01GZBUV | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01NXUUV | Data protection, Privacy and Anonymity |
![]() |
1 | 6 |
01GZDUV
01NYTUV |
Computer Forensics and cyber crime analysis
or Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
01NWLUV | Offensive Security |
![]() |
2 | 6 |
10FWYUV
11MBRUV 17MBRUV |
Internship
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Legal and Compliance Officer
Year 1
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GYKUV | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMUV | Information systems security |
![]() |
1 | 8 |
02UEWUV
14OBWUV |
Challenge (view Full curriculum)
or Choice from table 1 (view Full curriculum) |
![]() - |
1,2
1,2 |
8
6 |
01NXIUV | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
06LPYUV | Cryptography |
![]() |
2 | 6 |
01GYSUV | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOUV | Web Applications |
![]() |
2 | 8 |
Year 2
Code | Course | Language | Semester | Credits |
---|---|---|---|---|
01GZBUV | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01NXUUV | Data protection, Privacy and Anonymity |
![]() |
1 | 6 |
01GYZUV
02GYYUV 01GYRUV 02TYAUV |
AI and Cybersecurity
or Advanced Information systems security or Advanced cryptography or Security verification and testing |
![]() ![]() ![]() ![]() |
1
1 1 1 |
6
8 6 8 |
01GZDUV | Computer Forensics and cyber crime analysis |
![]() |
2 | 8 |
01NYTUV | Technology and Innovation Management in Cybersecurity |
![]() |
2 | 6 |
10FWYUV
11MBRUV 17MBRUV |
Internship
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |