• log in
  • create an account

Postgraduate studies

switch registrations cancel selection

The offer displayed on this page is limited to the selected registration. If you want to see the rest of the offer, select a different registration.

Cyberbezpieczeństwo

Details
Code P_C
Organizational unit Faculty of Computer Science and Information Technology
Field of studies Cyberbezpieczeństwo
Form of studies Part-time
Level of education Postgraduate (post diploma)
Educational profile academic
Required document
  • Tertiary Education
  Ask a question
There is currently no active phase.

Past phases in this registration:
  • Phase 1 (15.07.2024 00:00 – 23.09.2024 23:59)

Postgraduate studies in Cybersecurity are aimed at graduates of the fields of technical informatics and telecommunications or computer science, as well as graduates of other fields working in IT or with relevant knowledge and skills in information technology. The study is specialized in nature and is intended for those who wish to deal professionally with issues related to the technical aspects of cybersecurity and for those who wish to expand their competence in this area. Candidates should have basic skills and knowledge in the following areas: administration of Linux and Windows systems in a network infrastructure, scripting in Linux and Windows, programming in at least one language, and knowledge of configuring network devices. The study program was jointly developed by Westpomeranian University of Technology, Bydgoszcz University of Technology, Bialystok University of Technology and Cracow University of Technology.

Purpose of the study:

The main objective of the Cybersecurity postgraduate program is to impart specialized theoretical knowledge and acquire practical skills in the field of cybersecurity. A major part of the study consists of specialized laboratories to learn how to defend against cyber attacks. These laboratories will take place in a virtual cloud environment enabling simulation of cyber attacks.

Classes will be taught by specialists working at the university as well as those currently working in industry. The study includes the following subjects:

Semester 1:

1. Threat Analysis Platform 1 (Lab 10 hrs.) - Capture The Flag (CTF) introductory class.

2. Security of Linux systems (Lab. 32 hrs, Lecture 16 hrs).

3. Windows systems security (Lab. 32 hrs, Lecture 16 hrs).

4. Information security management (Lecture 10 hrs).

5. Cybersecurity threats (Lecture 10 hrs).

Semester 2:

1. LDAP security (Lab. 20 hrs, Lecture 10 hrs).

2. communication security mechanisms (Lab. 10 hrs, Lecture 8 hrs).

3. SIEM-type tools (Lab. 16 hrs, Lecture 8 hrs).

4. Penetration testing (Lab. 20 hrs, Lecture 10 hrs).

6. Threat Analysis Platform 2 (Lab 10 hrs) - Capture The Flag (CTF) type summary class.

Upon completion, the participants will receive a postgraduate certificate.