Code | P_C |
---|---|
Organizational unit | Faculty of Computer Science and Information Technology |
Field of studies | Cyberbezpieczeństwo |
Form of studies | Part-time |
Level of education | Postgraduate (post diploma) |
Educational profile | academic |
Required document | |
Ask a question |
- Phase 1 (15.07.2024 00:00 – 23.09.2024 23:59)
Postgraduate studies in Cybersecurity are aimed at graduates of the fields of technical informatics and telecommunications or computer science, as well as graduates of other fields working in IT or with relevant knowledge and skills in information technology. The study is specialized in nature and is intended for those who wish to deal professionally with issues related to the technical aspects of cybersecurity and for those who wish to expand their competence in this area. Candidates should have basic skills and knowledge in the following areas: administration of Linux and Windows systems in a network infrastructure, scripting in Linux and Windows, programming in at least one language, and knowledge of configuring network devices. The study program was jointly developed by Westpomeranian University of Technology, Bydgoszcz University of Technology, Bialystok University of Technology and Cracow University of Technology.
Purpose of the study:
The main objective of the Cybersecurity postgraduate program is to impart specialized theoretical knowledge and acquire practical skills in the field of cybersecurity. A major part of the study consists of specialized laboratories to learn how to defend against cyber attacks. These laboratories will take place in a virtual cloud environment enabling simulation of cyber attacks.
Classes will be taught by specialists working at the university as well as those currently working in industry. The study includes the following subjects:
Semester 1:
1. Threat Analysis Platform 1 (Lab 10 hrs.) - Capture The Flag (CTF) introductory class.
2. Security of Linux systems (Lab. 32 hrs, Lecture 16 hrs).
3. Windows systems security (Lab. 32 hrs, Lecture 16 hrs).
4. Information security management (Lecture 10 hrs).
5. Cybersecurity threats (Lecture 10 hrs).
Semester 2:
1. LDAP security (Lab. 20 hrs, Lecture 10 hrs).
2. communication security mechanisms (Lab. 10 hrs, Lecture 8 hrs).
3. SIEM-type tools (Lab. 16 hrs, Lecture 8 hrs).
4. Penetration testing (Lab. 20 hrs, Lecture 10 hrs).
6. Threat Analysis Platform 2 (Lab 10 hrs) - Capture The Flag (CTF) type summary class.
Upon completion, the participants will receive a postgraduate certificate.