Entry points, 1st year, Common Courses
Academic year 2025/2026
Eötvös Loránd University (ELTE)
Programme Coordinator: Dr. Viktoria Villanyi
FIRST SEMESTER
Compulsory Courses (18 ECTS) | ECTS |
Research Methodology | 5 |
Symmetric Key Cryptography | 4 |
Introduction to Offensive Security I. | 4 |
Privacy-enhancing Technologies | 4 |
Introductory Mathematics for Cybersecurity Specialisation | 1 |
I&E (10 ECTS) | |
I&E Basics | 6 |
Business Development Lab I. | 4 |
SECOND SEMESTER
Compulsory Courses (18 ECTS) | ECTS |
Design and Analysis of Algorithms | 4 |
Public Key Cryptography | 4 |
Introduction to Data Security | 4 |
Advanced Software Technology | 4 |
Network Security | 2 |
I&E (14 ECTS) | |
Innosocial Aspects of the Entrepreneurship | 6 |
Thematic Innovation & Entrepreneurship project | 4 |
Business Development Lab II. | 4 |
Babeș-Bolyai University (UBB)
Programme Lead: Assoc. prof. Darius Bufnea: darius.bufnea@ubbcluj.ro, cyber-master@cs.ubbcluj.ro
FIRST SEMESTER
Compulsory Courses (17 ECTS) | ECTS |
Cryptography | 7 |
Quality Aspects of Security in Software Testing | 6 |
Computer Ethics and Academic Integrity | 4 |
I&E Compulsory Course (8 ECTS) | |
Digital Economy Principles - I&E basics | 8 |
I&E Elective Courses (5 ECTS) | |
Agile Project Management | 5 |
Strategic Business Process Automation | 5 |
Business Forecasting and Predictive Modelling | 5 |
SECOND SEMESTER
Compulsory Courses (12 ECTS) | ECTS |
Web and Internet Security | 6 |
Security Audit and Risk Management | 6 |
I&E Compulsory Courses (11 ECTS) | |
Innovation Management - I&E Business Dev Lab | 7 |
Thematic Project with Innovation Challenge - EIT Digital Summer School | 4 |
Elective Courses (7 ECTS) | |
Network Security and Administration | 7 |
Blockchain Security | 7 |
Complex Networks in Security | 7 |
Quantum Cryptography | 7 |
University of Rennes (UR)
FIRST SEMESTER
Compulsory Courses (20 ECTS) | ECTS |
Basic Cryptography | 5 |
Low-Level Programming | 5 |
System Security | 5 |
Network Security | 5 |
I&E Courses (10 ECTS) | |
Innovation and Entrepreneurship | 5 |
Business Development Laboratory 1 | 5 |
SECOND SEMESTER
Compulsory Courses (20 ECTS) | ECTS |
Research Project | 5 |
Privacy | 5 |
System Security | 5 |
Software Exploitation | 5 |
I&E Courses (10 ECTS) | |
Business Development Laboratory 2 | 5 |
Knowledge and Intangible Assets Management | 5 |
University of Trento (UniTN)
Programme Lead: Bruno Crispo, bruno.crispo@unitn.it
FIRST & SECOND SEMESTER
Compulsory Courses (36 ECTS) | ECTS |
Introduction to Computer and Network Security | 6 |
Applied Cryptography | 6 |
Security Testing | 6 |
Cyber Security Risk Assessment | 6 |
Network Security | 6 |
Privacy and IPR | 6 |
Advanced and Eligible Courses | |
Machine Learning | 6 |
Formal Techniques for Crypto Protocol Analysis | 6 |
Introduction to Computer and Network Security | 6 |
Ethics for computer science and engineering | 6 |
Ethical Hacking | 6 |
Blockchain | 6 |
Challenge-Based Activity | 6 |
Multimedia Data Security | 6 |
Innovation and Entrepreneurship Courses 24 ECTS | |
Innovation and Entrepreneurship Basics (Economics and Management) | 6 |
Business Development Lab | 9 |
ICT Innovation | 9 |
University of Turku (UTU)
Academic Coordinator: Dr Seppo Virtanen, seppo.virtanen@utu.fi
FIRST & SECOND SEMESTER
Compulsory Courses (31 ECTS) | ECTS |
System and Application Security | 5 |
Network Infrastructure Technologies and Security | 5 |
Human Element in Information Security | 5 |
Management of Information System Security | 6 |
Foundations of Cryptography | 5 |
Cryptography I | 5 |
Innovation and Entrepreneurship | |
Introduction to Innovation and Business | 5 |
Lean Digital Business Design | 10 |
Summer School | 4 |
Elective Courses (choose one) | |
Knowledge and Innovation Management | 5 |
Enterprise Architecture | 6 |
Digital Business + Digital Business Models | 6 |
Elective major subject studies | |
Chosen individually for each student from the selection of annually available qualifying courses when the personal study plan is made so that the entry year total is 60 ECTS. |
University of Twente (UT)
Academic Coordinator: Dr Florian Hahn, f.w.hahn@utwente.nl
FIRST SEMESTER
Compulsory Major Courses (15 ECTS) | ECTS |
Cyber Risk Management | 5 |
Security and Cryptography | 5 |
Software Security | 5 |
Compulsory I&E Courses (15 ECTS) | |
I&E Basics: Innovation Management for EIT | 5 |
Business Development Lab I | 5 |
Computer Ethics | 5 |
Optional Courses | |
System Validation (only in comb. w/ SeV) | 5 |
Basic Machine Learning | 5 |
I&E: Brand Management | 5 |
Introduction to Biometrics | 5 |
Privacy-Enhancing Technologies Bootcamp | 5 |
I&E: Empirical Methods for Designers | 5 |
I&E: Smart Industry | 5 |
SECOND SEMESTER
Compulsory Major Courses (10 ECTS) | ECTS |
Internet Security | 5 |
System Security | 5 |
Compulsory I&E Courses (5 ECTS) | |
Business Development Lab II | 5 |
Optional Courses | |
Automated Vulnerability Research and Mitigation | 5 |
Software Testing and Reverse Engineering | 5 |
Blockchain & Distributed Ledger Tech | 5 |
Cyber Data Analytics | 5 |
Distributed Systems | 5 |
E-Law | 5 |
Security Services for the Internet of Things | 5 |
I&E for Venture Creation | 4 |
Exit points, 2nd year, Specialisation
Academic year 2026/2027
Eötvös Loránd University (ELTE)
Programme Coordinator: Dr. Viktoria Villanyi
THIRD SEMESTER
- SPECIALISATION #1: Advanced Cryptography
The specialisation focuses on the general ideas, techniques and methods of applied cryptography as well as on the theoretical background and solid knowledge, putting security in a wider context. Security and privacy are considered both from the technological and from the economic point of view, which supports decisions in many practical cases. Applied cryptography serves as a base for most of the secure IT systems (e.g. in Future Media and Content Delivery, Smart Spaces, Digital cities, Health and ICT-Mediated Human Activity, and Enabling the Internet of the Future).
Compulsory Courses (24 ECTS) | ECTS |
Secure Multiparty Computation | 4 |
Zero-knowledge proofs and application | 4 |
Penetration testing | 6 |
Cryptographic Protocols | 6 |
Provably Secure Modular Design of Cryptographic Protocols | 4 |
I&E (6 ECTS) | |
I&E Study | 6 |
- SPECIALISATION #2: Quantum-resistant Cryptography
The specialisation focuses on the general ideas, techniques and methods of security in the coming era of quantum technology. The theoretical background gives a solid understanding of cryptographic aspects and supports technological and economic decisions on security. In order to maintain the security and privacy of IT systems (e.g. in Future Media and Content Delivery, Smart Spaces, Digital cities, Health and ICT-Mediated Human Activity, and Enabling the Internet of the Future) when quantum devices are around, new physical communication layers, novel computational architecture and cryptographic protocols may be used. Quantum-resistant cryptography serves as a base to understanding and overcoming these challenges.
Compulsory Courses (24 ECTS) | ECTS |
Introduction to Quantum Information | 4 |
Post-quantum Cryptography | 4 |
Penetration testing | 6 |
Cryptographic Protocols | 6 |
Provably Secure Modular Design of Cryptographic Protocols | 4 |
I&E (6 ECTS) | |
I&E Study | 6 |
FOURTH SEMESTER
- Master thesis (30 ECTS)
EURECOM
Academic Coordinator: Prof. Dr. Antonio Faonio, master-eit-cse@eurecom.fr
Dr. Antonio Faonio is a « Maître de Conférences » at EURECOM since July 2020. Previously, he held a postdoctoral researcher position at IMDEA Software Institute and Aarhus University. He got a Ph.D. in Computer Science at "Sapienza" Univ. of Rome. His research interest is in cryptography.
SPECIALISATION: Big Data Security
EURECOM is offering a specialization in Big Data Security that aims at providing a solid knowledge of security in cloud computing and networking combined with practical design and management skills. The students learn how to identify threats, vulnerabilities and privacy problems in networks and cloud systems including the Internet of Things. They learn to integrate security solutions to a cloud computing platform and explore methods for holding cloud stakeholders accountable for the privacy and confidentiality of data in cloud systems.
The curriculum has a hands-on approach that combines laboratory work with classroom education, makes use of high-profile industry speakers to introduce the latest technologies, and includes a supervised semester-long team project on a topic of industrial relevance. One focus area is communication and organizational skills together with project planning and implementation competencies. A mandatory management course fosters an entrepreneurial mindset, and the elective courses enable students to further explore data science or networking.
FIRST SEMESTER
Semester (30 ECTS) | ECTS |
UE Fundamentals EIT Digital Security (5 ECTS) | |
Security and Privacy for Big Data and Cloud | 2.5 |
Multipary Computation and Blockchains | 2.5 |
Mobile Systems and Smartphone Security | 5 |
UE Electives EIT Digital Security (10 ECTS) | |
Machine Learning and Intelligent Systems | 5 |
Distributed Systems and Cloud Computing | 5 |
Quantum Information Science | 5 |
Digital Image Processing | 5 |
System and Network Security | 5 |
Mobile Communication Systems | 5 |
UE I&E (6 ECTS) | |
Fundamental in Innovation and Entrepreneurship | 6 |
Semester Project (8 ECTS) | 8 |
UE Languages (1 ECTS) | 1 |
SECOND SEMESTER: MASTER THESIS (30 ECTS)
Babeș-Bolyai University (UBB)
Programme Lead: Assoc. prof. Darius Bufnea: darius.bufnea@ubbcluj.ro, cyber-master@cs.ubbcluj.ro
SPECIALISATION: Software Security
The master’s programme offers a multiple perspective on the field of cyber security, addressing issues related to its various components: operating system security, network security, organisation and business process security, with a strong emphasis in the second year on the security of the software itself.
The courses in the 2nd year will have a strong focus on knowledge about 'Software Security', which is also the specialisation of the exit year. Students will be able to take courses like Advanced Software Security, Securing Mobile Applications, Program Analysis for Software Security, and Cloud Application and Infrastructure Security. These courses will address advanced topics such as software quality models, security as a quality factor in software, security analysis and verification of software, design of security checking tools, and cloud and mobile application security. The overall goal of this specialisation is for students to understand the secure by design principles and assess different software security issues, in order to learn how to detect security vulnerabilities as soon as possible in the development cycle and to develop a more secure software from design to implementation. Also, a new course on XDR (Extended Detection and Response) is offered in cooperation with an industry partner, and students have the opportunity to learn how to technically address security incidents.
The programme also has a strong emphasis on practical knowledge in the field of cyber security, the curricula being discussed with several companies that offer services and solutions in this field. Some of the students’ activities, such as the internship or the thematic projects, can be carried out in partnership with the partner companies/industry in the field. The latter has a strong local presence, the city of Cluj-Napoca, Romania, being known as a strong development hub in the field of IT&C.
THIRD SEMESTER
Compulsory Courses (24 ECTS) | ECTS |
Advanced Software Security | 6 |
Securing Mobile and IoT Software | 6 |
Program Analysis for Software Security | 6 |
Cloud Application and Infrastructure Security | 6 |
I&E Compulsory Course (6 ECTS) | |
Entrepreneurship in IT - I&E Study | 6 |
Optional Course (5 ECTS) | |
Extended Detection and Response | 5 |
FOURTH SEMESTER
Compulsory Course (30 ECTS) | ECTS |
Internship in Specialisation | 20 |
Project in Cybersecurity | 6 |
Elaboration of the Dissertation Thesis | 4 |
University of Trento (UniTN)
Programme Lead: Bruno Crispo, bruno.crispo@unitn.it
SPECIALISATION: System Security
In recent years, the most popular computing and communications platforms have changed dramatically from old desktops and personal computers to a myriad of new devices, often embedded and personal usually interconnected using several communications technologies. Such novel platforms have pervaded all economic sectors, as well as those traditionally relying on analogue technology. This revolution has touched private, business and governmental domains (e.g., industry 4.0, smart homes, critical infrastructures, automotive, smart cities, etc.). This in turn has created entire new ecosystems that include technical, social and economic factors.
The specialisation System Security focuses on addressing security and privacy for these new ecosystems trying a holistic approach that does not focus only on technical issues. Of course, it covers the technological aspects such as investigating and experimenting with a new class of threats and vulnerabilities, developing new technology to establish trust, and designing novel ways to authenticate users and machines. But it covers also, methodology to assess and enhance the security of the software development process and the economic aspects that are crucial to understanding attackers, and their motivations and designing effective defence strategies
THIRD & FOURTH SEMESTER
Specialisation Courses | ECTS |
Multimedia Data Security | 6 |
Security Testing | 6 |
Privacy and Intellectual Property Rights | 6 |
Network Intrusion and Anomaly Detection with Machine Learning | 6 |
Embedded Systems | 6 |
Security experiments: attacks and defenses | 12 |
Applied Cryptography | 6 |
Advanced Programming | 6 |
Embedded Software for the Internet of Things | 6 |
Project course | 6 |
Machine learning | 6 |
Research Project | 12 |
High-Performance Computing for Data Science | 6 |
Innovation and Entrepreneurship Courses | |
Innovation and Entrepreneurship Studies in ICT | 6 |
University of Turku (UTU)
Programme Lead: Dr Seppo Virtanen, seppo.virtanen@utu.fi
SPECIALISATION: Security Technologies and Intelligence
The Security Technologies and Intelligence specialisation focuses on researching pre-emptive, reactive and analytical security technologies to protect systems from cyber threats and malicious exploitation attempts in the era of artificial intelligence and machine learning. The compulsory studies are on intelligent technologies for protecting systems and networks (firewalls and intrusion prevention), ethical hacking (penetration testing) and analysing digital traces of malicious activity (digital forensics).
The specialisation gives its students profound and substantial education and expertise in the field. Optional studies selected personally for each student build a special individual information security expertise profile. The curriculum consists of both theoretical and hands-on study modules. Also, a large group project module called 'Capstone project' can be included in the studies.
The graduates of this specialisation will have a strong technological, theoretical and practical understanding of security technologies for protecting systems and environments against cyber threats. With these new skills and knowledge, graduates can proceed to building a successful career in securing and protecting the ICT intensive industry. The graduate’s unique expertise profile may lead to a career title of, for example, one of the following: Cyber Security Analyst, Penetration and Vulnerability Tester, Cyber Security Consultant, Cyber Security Manager, Network Security Specialist, Cyber Security Entrepreneur, System / Network Administrator, Business Information Security Officer, Chief Information Officer, Chief Information Security Officer, Head of Corporate IT.
THIRD & FOURTH SEMESTER
Compulsory Courses (15 ECTS) | ECTS |
Firewall and IPS Technology | 5 |
Ethical Hacking | 5 |
Digital Forensics | 5 |
Master's Thesis in Technology | 30 |
I&E (6 ECTS) | |
I&E Study | 6 |
Elective Courses | |
Communication Technologies and Security in IoT | 5 |
Capstone Project | 10 |
Cryptography 2 | 5 |
Algebraic Structures in Cryptography | 5 |
Privacy and Security for Software Systems | 5 |
Protocol Processing and Security | 5 |
Security Engineering | 5 |
Seminar 1 (TurkuSec meetings) | 1-5 |
In addition to the courses listed above, a variety of courses qualifying as elective studies are available annually. Electives are chosen individually for each student when their personal study plan is made so that the degree total is 120 ECTS. |
Dr Seppo Virtanen is Professor of Cyber Security Engineering and Vice Head of the Department of Computing at University of Turku, Finland. Dr Virtanen received his MSc degree in Electronics and Information Technology in 1998 and DSc (Tech.) degree in Communication Systems in 2004 from the University of Turku. He serves regularly as a program committee member and referee for international journals and conferences. He is a senior member of the IEEE. He has supervised or examined 10 PhD theses, 160 Master’s theses and 40 Bachelor’s theses. He has taught more than 80 instances of 25 different university courses in the field of ICT. His current research interests are the application of artificial intelligence and machine learning to cyber security, cyber security in smart environments and technologies for network and IoT security.
University of Twente (UT)
Academic Coordinator: Dr Florian Hahn, f.w.hahn@utwente.nl
SPECIALISATION: Circular Security
With the transformation into a digital society, our world is relying more and more on interconnected ICT systems. Despite this increasing dependency on computer systems, cybersecurity is still often an afterthought and only considered at the end of the development process or even later during deployment; think about IoT devices that are installed in isolated networks or zero-day exploits that are patched in live systems.
It is common practice to offer only time-limited support after release and end-of-life products do not receive further (security) updates. This planned obsolescence does not only lead to wasteful consumption of resources but also exposes computer networks with outdated systems to significant security risks.
Contradicting this practice, the adoption of computer systems into long-living facilities such as power plants or cars leads to the new challenge of secure systems that stand the test of time. Notably, many risks for such systems are not solely of a technical nature. Thus, we address the challenge of circular security from the technical perspective and complement it with the socio-economic context.
Our specialisation looks at the many risks in the above-mentioned setting and provides mitigations that can be used already at the beginning of the design phase. Additionally, students get introduced to approaches for subsequent monitoring of live systems, while taking into account the specific requirements and the impact of various risks over the system’s complete lifecycle.
THIRD SEMESTER
Compulsory I&E Courses (15 ECTS) | ECTS |
Computer Ethics | 5 |
I&E Study Tour | 6 |
Research Topics EIT | 4 |
Specialisation Courses | |
Secure Data Management | 5 |
Secure Cloud Computing | 5 |
Cloud Networking | 5 |
Advanced Networking | 5 |
Empirical Security Analysis & Engineering | 5 |
Introduction to Biometrics | 5 |
Cyber Risk Management | 5 |
System Validation | 5 |
Design of Software Architectures | 5 |
Machine Learning 1 | 5 |
Security Verification | 5 |
Internet of Things | 5 |
Quantum Information | 5 |
FOURTH SEMESTER: Master Thesis (30 ECTS)
The University of Twente (UT) holds the title of the most entrepreneurial university in Europe. As such, it has an extremely large network in the industry that includes around 1000 university spin-offs (e.g., Booking.com was founded by a UT alumni). This provides excellent opportunities to connect to industry and access to a multitude of internship offers. Of particular interest for cybersecurity students is the Twente University Centre for Cybersecurity Research (TUCCR); a public-private partnership where experts, professionals, entrepreneurs, researchers, and students from industry and knowledge partners collaborate.