CYBERSECURITY ENGINEERING
Le informazioni contenute in questa pagina sono da considerarsi provvisorie. I piani di studi ufficiali sono attesi per il mese di giugno 2025.
Cryptography expert
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYKWQ | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWQ | Information systems security |
![]() |
1 | 8 |
02UEWWQ
14OBWWQ |
Challenge (vedi Piano di studi completo)
oppure Choice from table 1 (vedi Piano di studi completo) |
-
- |
1,2
1,2 |
8
6 |
01NXIWQ | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWQ | Cryptography |
![]() |
2 | 6 |
01GYSWQ | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWQ | Web Applications |
![]() |
2 | 8 |
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYRWQ | Advanced cryptography |
![]() |
1 | 6 |
02GYYWQ
02TYAWQ |
Advanced Information systems security
oppure Security verification and testing |
![]() ![]() |
1
1 |
8
8 |
01GYZWQ
01NXUWQ |
AI and Cybersecurity
oppure Data protection, Privacy and Anonymity |
![]() ![]() |
1
1 |
6
6 |
01GZBWQ | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01GZDWQ
02NYTWQ |
Computer Forensics and cyber crime analysis
oppure Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
01GZEWQ | Post-quantum Cryptography |
![]() |
2 | 6 |
10FWYWQ
11MBRWQ 17MBRWQ |
Internship
oppure Thesis oppure Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Analyst
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYKWQ | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWQ | Information systems security |
![]() |
1 | 8 |
02UEWWQ
30OBWWQ |
Challenge (vedi Piano di studi completo)
oppure Choice from table 1 (vedi Piano di studi completo) |
-
- |
1,2
1,2 |
8
6 |
01NXIWQ | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWQ | Cryptography |
![]() |
2 | 6 |
01GYSWQ | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWQ | Web Applications |
![]() |
2 | 8 |
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYZWQ | AI and Cybersecurity |
![]() |
1 | 6 |
02GYYWQ
01GYRWQ 01NXUWQ |
Advanced Information systems security
oppure Advanced cryptography oppure Data protection, Privacy and Anonymity |
![]() ![]() ![]() |
1
1 1 |
8
6 6 |
01GZBWQ | Cybersecurity laws and regulations |
![]() |
1 | 6 |
02TYAWQ | Security verification and testing |
![]() |
1 | 8 |
01GZDWQ
02NYTWQ |
Computer Forensics and cyber crime analysis
oppure Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
10FWYWQ
11MBRWQ 17MBRWQ |
Internship
oppure Thesis oppure Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
01NXEWQ | Threat Intelligence and Incident Management |
![]() |
2 | 6 |
Cyber Designer
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYKWQ | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWQ | Information systems security |
![]() |
1 | 8 |
02UEWWQ
05OBWWQ |
Challenge (vedi Piano di studi completo)
oppure Choice from table 1 (vedi Piano di studi completo) |
-
- |
1,2
1,2 |
8
6 |
01NXIWQ | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWQ | Cryptography |
![]() |
2 | 6 |
01GYSWQ | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWQ | Web Applications |
![]() |
2 | 8 |
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
02GYYWQ | Advanced Information systems security |
![]() |
1 | 8 |
01GYZWQ
01GYRWQ 02TYAWQ |
AI and Cybersecurity
oppure Advanced cryptography oppure Security verification and testing |
![]() ![]() ![]() |
1
1 1 |
6
6 8 |
01GZBWQ | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01NXUWQ | Data protection, Privacy and Anonymity |
![]() |
1 | 6 |
01GZDWQ
02NYTWQ |
Computer Forensics and cyber crime analysis
oppure Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
01NWLWQ | Offensive Security |
![]() |
2 | 6 |
10FWYWQ
11MBRWQ 17MBRWQ |
Internship
oppure Thesis oppure Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Legal and Compliance Officer
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYKWQ | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWQ | Information systems security |
![]() |
1 | 8 |
02UEWWQ
14OBWWQ |
Challenge (vedi Piano di studi completo)
oppure Choice from table 1 (vedi Piano di studi completo) |
-
- |
1,2
1,2 |
8
6 |
01NXIWQ | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWQ | Cryptography |
![]() |
2 | 6 |
01GYSWQ | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWQ | Web Applications |
![]() |
2 | 8 |
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GZBWQ | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01NXUWQ | Data protection, Privacy and Anonymity |
![]() |
1 | 6 |
01GYZWQ
02GYYWQ 01GYRWQ 02TYAWQ |
AI and Cybersecurity
oppure Advanced Information systems security oppure Advanced cryptography oppure Security verification and testing |
![]() ![]() ![]() ![]() |
1
1 1 1 |
6
8 6 8 |
01GZDWQ | Computer Forensics and cyber crime analysis |
![]() |
2 | 8 |
02NYTWQ | Technology and Innovation Management in Cybersecurity |
![]() |
2 | 6 |
10FWYWQ
11MBRWQ 17MBRWQ |
Internship
oppure Thesis oppure Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
CYBERSECURITY ENGINEERING
Le informazioni contenute in questa pagina sono da considerarsi provvisorie. I piani di studi ufficiali sono attesi per il mese di giugno 2025.
Cryptography expert
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYKWR | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWR | Information systems security |
![]() |
1 | 8 |
02UEWWR
14OBWWR |
Challenge (vedi Piano di studi completo)
oppure Choice from table 1 (vedi Piano di studi completo) |
-
- |
1,2
1,2 |
8
6 |
01NXIWR | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWR | Cryptography |
![]() |
2 | 6 |
01GYSWR | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWR | Web Applications |
![]() |
2 | 8 |
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYRWR | Advanced cryptography |
![]() |
1 | 6 |
01GYZWR
01NXUWR |
AI and Cybersecurity
oppure Data protection, Privacy and Anonymity |
![]() ![]() |
1
1 |
6
6 |
01GZBWR | Cybersecurity laws and regulations |
![]() |
1 | 6 |
02GYYWR
02TYAWR |
Advanced Information systems security
oppure Security verification and testing |
![]() ![]() |
1
1 |
8
8 |
01GZDWR
02NYTWR |
Computer Forensics and cyber crime analysis
oppure Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
01GZEWR | Post-quantum Cryptography |
![]() |
2 | 6 |
10FWYWR
11MBRWR 17MBRWR |
Internship
oppure Thesis oppure Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Analyst
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYKWR | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWR | Information systems security |
![]() |
1 | 8 |
02UEWWR
30OBWWR |
Challenge (vedi Piano di studi completo)
oppure Choice from table 1 (vedi Piano di studi completo) |
-
- |
1,2
1,2 |
8
6 |
01NXIWR | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWR | Cryptography |
![]() |
2 | 6 |
01GYSWR | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWR | Web Applications |
![]() |
2 | 8 |
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYZWR | AI and Cybersecurity |
![]() |
1 | 6 |
02GYYWR
01GYRWR 01NXUWR |
Advanced Information systems security
oppure Advanced cryptography oppure Data protection, Privacy and Anonymity |
![]() ![]() ![]() |
1
1 1 |
8
6 6 |
01GZBWR | Cybersecurity laws and regulations |
![]() |
1 | 6 |
02TYAWR | Security verification and testing |
![]() |
1 | 8 |
01GZDWR
02NYTWR |
Computer Forensics and cyber crime analysis
oppure Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
10FWYWR
11MBRWR 17MBRWR |
Internship
oppure Thesis oppure Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
01NXEWR | Threat Intelligence and Incident Management |
![]() |
2 | 6 |
Cyber Designer
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYKWR | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWR | Information systems security |
![]() |
1 | 8 |
02UEWWR
05OBWWR |
Challenge (vedi Piano di studi completo)
oppure Choice from table 1 (vedi Piano di studi completo) |
-
- |
1,2
1,2 |
8
6 |
01NXIWR | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWR | Cryptography |
![]() |
2 | 6 |
01GYSWR | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWR | Web Applications |
![]() |
2 | 8 |
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
02GYYWR | Advanced Information systems security |
![]() |
1 | 8 |
01GYZWR
01GYRWR 02TYAWR |
AI and Cybersecurity
oppure Advanced cryptography oppure Security verification and testing |
![]() ![]() ![]() |
1
1 1 |
6
6 8 |
01GZBWR | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01NXUWR | Data protection, Privacy and Anonymity |
![]() |
1 | 6 |
01GZDWR
02NYTWR |
Computer Forensics and cyber crime analysis
oppure Technology and Innovation Management in Cybersecurity |
![]() ![]() |
2
2 |
8
6 |
01NWLWR | Offensive Security |
![]() |
2 | 6 |
10FWYWR
11MBRWR 17MBRWR |
Internship
oppure Thesis oppure Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Legal and Compliance Officer
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GYKWR | Computer architectures and operating systems |
![]() |
1 | 8 |
02TYMWR | Information systems security |
![]() |
1 | 8 |
02UEWWR
14OBWWR |
Challenge (vedi Piano di studi completo)
oppure Choice from table 1 (vedi Piano di studi completo) |
-
- |
1,2
1,2 |
8
6 |
01NXIWR | Networks & Cloud Technologies and Security |
![]() |
1,2 | 12 |
07LPYWR | Cryptography |
![]() |
2 | 6 |
01GYSWR | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOWR | Web Applications |
![]() |
2 | 8 |
Codice | Insegnamento | Lingua | Periodo | Crediti |
---|---|---|---|---|
01GZBWR | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01NXUWR | Data protection, Privacy and Anonymity |
![]() |
1 | 6 |
01GYZWR
02GYYWR 01GYRWR 02TYAWR |
AI and Cybersecurity
oppure Advanced Information systems security oppure Advanced cryptography oppure Security verification and testing |
![]() ![]() ![]() ![]() |
1
1 1 1 |
6
8 6 8 |
01GZDWR | Computer Forensics and cyber crime analysis |
![]() |
2 | 8 |
02NYTWR | Technology and Innovation Management in Cybersecurity |
![]() |
2 | 6 |
10FWYWR
11MBRWR 17MBRWR |
Internship
oppure Thesis oppure Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |