Human aspects of cyber securityLegal aspects of cyber securityCyber security managementCryptographyCyber incident handlingPrinciples of secure software designThesis seminarResearch methods in cybersecuritySystem forensicsNetwork forensicsComputer programmingSystem administrationNetwork technology IEstonian language and cultureEntrepreneurship and business planningCyber security technologies IICyber security technologies ITeam-work projectComputer network securityNetwork protocol designInformation systems attacks and defenceHardening operating systems and servicesSpecial course in cyber security ISpecial course in cyber security IIMathematics for computer scienceSpecial topics of cryptographyMobile phone forensicsStrategic communications and cybersecurityData miningNetwork technology IICyber defense monitoring solutionsPrivacy-preserving technologiesIntroduction to blockchain technologyIntroduction to blockchain technology: practical assignmentWireless technologies and securityCryptology IICryptographic protocolsSecure programming techniquesSecure programming techniques: project workApplied cryptography
isPartOfProgramme
credits
degree
Master
@en
deliveryMethod
Presential
@en
description
The programme is taught jointl ...... ing studies as a Ph.D student.
@en
duration
2
@en
graduationCondition
hasTuitionFeeCitizen
no tuition, other costs may apply
hasTuitionFeeInCurrency
Euro
@en
hasTuitionFeeInternational
internship
Recommended
isJointProgramme
jobProspects
The programme conveys the spec ...... leader or technology officer).
@en
knowledgeDomain
numberOfSpecialisationTracks
scholarshipAvailable
sector
Midstream
@en
hasCourse
inLanguage
url
https://taltech.ee/en/masters-programmes/cybersecurity#p1817347
type
label
Master in Cybersecurity
@en