Master in Cybersecurity and Cyber Defence
Esch-sur-Alzette, Luxembourg
DURATION
2 Years
LANGUAGES
English
PACE
Full time
APPLICATION DEADLINE
Request application deadline
EARLIEST START DATE
Request the earliest start date
TUITION FEES
EUR 200 / per semester
STUDY FORMAT
On-Campus
Introduction
Program at a glance
- Duration: 2-year full-time program / 4 semesters (120 ECTS)
- Registration fees: 200 € /semester
- Language: English
- Format: Full-time
- Application period:
- EU: 1 February 2024 – 31 July 2024
- Non-EU: 1 February 2024 – 30 April 2024
The Master in Cybersecurity and Cyber Defence at the University of Luxembourg offers training in different and complementary academic disciplines to ensure a foundational understanding of information security as well as information security management and cyber defense operational skills.
Strengths
- Interdisciplinary theoretical and practical training and education
- Innovative foresighted program on cybersecurity and cyber defence
- Research- and operation-oriented profiles
- Compliant with the European Cybersecurity Skill Framework
- Strong connection with cybersecurity organizations for professional development
Admissions
Curriculum
Cybersecurity and cyber defense are interdisciplinary fields with theoretical and operational aspects.
Students will acquire a large body of knowledge covering theory, research methods, practices, policies, and tools. This will prepare them to identify, understand, report, mitigate, and resolve cybersecurity incidents, while also developing state-of-the-art technologies to increase preparedness and resilience in the face of increasing cyber threats worldwide.
Academic contents
Semester 1 provides a set of common courses for all students that establish the foundation for more specialized courses. Semesters 2 and 3 offer a mix of compulsory and recommended courses to suit students’ interests and specializations. In Semester 4, students prepare a master's thesis, usually in the context of a research project.
Semester 1 (ECTS 30)
Module 1.1: Common/Mandatory – Computer, Software, and System Security I
This mandatory module offers foundational knowledge on computer, software, and systems security, such as:
- Information Security Basics
- Security Modelling
Module 1.2: Common/Mandatory – Cybersecurity Systems, Risks, and Threats I
This mandatory module offers an overview of basic vulnerabilities and threats in cybersecurity, such as:
- AI and Cybersecurity
- Software Vulnerabilities
Module 1.3: Common/Mandatory – Design & Analysis Methods in Cybersecurity
This mandatory module offers an introduction to methods of design and analysis in cybersecurity, such as:
- Structural Analysis Techniques and Methods
- Security Protocols
Semester 2 (ECTS 30)
Module 2.1: Common/Mandatory – Cybersecurity Engineering
This mandatory module offers advanced knowledge in computer security, such as:
- Principles of Security Engineering
Module 2.2: Common/Elective – Computer, Software, and System Security II
This module is about advanced knowledge of System Architecture Security, such as:
- Introduction to Static Program Analysis
Module 2.3: Common/Mandatory – Cybersecurity and Cyber Defense Focused Activities I: Distinguished Lectures, Hackathons, and Challenges
This module offers lectures on frontline topics in cybersecurity and cyber defense, delivered by guest distinguished lecturers. Besides, it offers students specific training, hands-on sessions, catch-the-flag exercises, and challenges, such as:
- Reporting & Communication
- Cybersecurity Foresight Methods
- Cybersecurity Threats and Forensics
- Cybersecurity and Cyber Defence History
- Incident Simulation
- Catch the Flag / Cyber Range
Profile a: Cybersecurity: Software, Network, and Infrastructure
Module 2.4.a: Profile Specific/Mandatory – Cryptography
This module offers subjects about the theoretical foundations of cryptography, such as:
- Symmetric Key Cryptography and Security of Communications
- Algorithms for Numbers and Public-Key Cryptography
Module 2.5.a: Profile Specific/Elective – Advanced System Security
This module offers insights on specific topics in system security, such as:
- Microkernel Systems and Microhypervisor Systems
Profile b: Cybersecurity and Cyber Defence: Operations and Tools
Module 2.4.b: Profile Specific/Mandatory – Cyber Defence and Cyber Policies
This module offers subjects for basic preparation in cybersecurity business development and management, such as:
- Introduction to Cyber Defence
- Cyber policies
Module 2.5.b: Profile Specific/Elective – Data Processing and Communication
This module offers subjects to prepare students to work with data, visualize data, and communicate results, such as:
- Communicating Science
- Data Science in R and Data Visualization
Semester 3 (ECTS 30)
Module 3.1: Common/Mandatory – Cybersecurity Business and Management
This module offers preparation on cybersecurity information and project management, such as:
- Practical Aspects of Entrepreneurship
- Information Security Management Systems
- Advanced Project Management
Module 3.2: Common/Elective – Cybersecurity Systems, Risks, and Threats II
This mandatory module offers advanced knowledge on cybersecurity vulnerabilities and threats in cybersecurity, such as:
- Digital Wallets
- Modeling and Simulation of Complex Systems
- Information Theory and Cyber Risk
Module 3.3: Common/Mandatory – Advanced Network Communication Security
This module offers preparation on advanced topics on secure network communications, such as:
- Quantum Communications and Quantum Key Distribution
- Open Network Security
Module 3.4: Common/Mandatory – Cybersecurity and Cyber Defense Focused Activities II: Distinguished Lectures, Hackathons, and Challenges
This module offers lectures on frontline topics in cybersecurity delivered by guest distinguished lecturers.
- Cybersecurity Tools
- Usability and User Experience
- Dual Use in Cybersecurity
- Digital Ethics
- EU Cybersecurity Regulatory Framework
- Incident Response Practices
Profile a: Cybersecurity: Software, Network, and Infrastructure
Module 3.5.a: Profile Specific/Mandatory – Advanced Cybersecurity Analysis
This module offers preparation on advanced topics on software and system vulnerability analysis and forensics, such as:
- Static and Dynamic Software Security Analysis
- Resilient Computing
- Log Analysis
Module 3.6.a: Profile Specific/Elective – Advanced Security Communication and Cryptography
This module offers preparation on advanced topics on network security and secure communication, such as:
- Wireless Sensor Network Security
- Algorithmic Number Theory
- Fault and Intrusion Tolerant Systems
Profile b: Cybersecurity and Cyber Defence: Operations and Tools
Module 3.5.b: Profile Specific/Mandatory – Regulations, Ethics, and Human Aspects in Cybersecurity
This module prepares EU regulations, ethics, and human-centered approaches to cybersecurity. It includes subjects such as:
- EU Digital Sovereignty
- Human Aspects in Cybersecurity
- Philosophy and Ethics of AI
Module 3.6.b: Profile Specific/Elective – Advanced Cybersecurity Modelling and Analysis
This module offers preparation on advanced topics on secure system modeling and analysis, such as:
- Post-quantum Cryptography
- Log Analysis
Semester 4 (ECTS 30)
Master’s thesis based on a research project or an internship.
Program Outcome
On completion of the program, graduates will:
- Have acquired profound and applicable knowledge in information security theory, covering fields such as cryptography, operating systems security, computer networks security, computer security, software cybersecurity, security engineering, and information assurance;
- Have acquired profound and applicable knowledge of methods in threat assessment, data analysis, and management, including but not limited to social research methods, structured analysis techniques, and other formal methods;
- Have acquired knowledge in fields such as digital ethics, dual-use, and research integrity, as well as on relevant professional codes of conduct and best practices, thereby allowing them to assess field-specific challenges from perspectives beyond the purely technical; and
- Have acquired the operational skills to master relevant risk assessment and incident management tasks.
Specifically, they will be able to:
- Analyze security threats and vulnerabilities, identifying and containing security breaches;
- Investigate incidents, devise responses, and restore systems to regular operations;
- Assess cybersecurity risks and determine the best actions to mitigate them;
- Define and implement information security management frameworks;
- Understand key dimensions of human psychology in security (social engineering, online deception), allowing them to undertake intelligence analysis, organize user experiments, carry out penetration tests and forensics analyses;
- Integrate historical cyberwar and cyber incidents and attacks in their decision-making;
- Understand and implement field-specific policies and regulations;
- Prepare systems or institutions for cybersecurity audits; and
- Create cybersecurity communication and training elements such as incident data sharing platforms, and cybersecurity and cyber defence training.
Career Opportunities
Graduates will receive a highly interdisciplinary education and will have opportunities to remain in Luxembourg and/or in Europe as experts in cybersecurity and cyber defense. Luxembourg is a major financial center with ever-increasing needs for highly qualified staff. Employment opportunities in the public sector, local industries, and public research institutes are available to graduates.
Career perspectives
Collectively, the foundational and technical courses offered through the program, in combination with hands-on training via internships and placements. The degree will prepare students for the following professional and research profiles in cybersecurity and cyber defense:
- Cybersecurity and cyber defence socio-technical researcher
- Cybersecurity software and system engineer
- Cybersecurity tools operator and developer
- Cybersecurity information officer (CISO)
- Cybersecurity and cyber defense intelligence and forensic analyst and auditor
- Cybersecurity risk and incident manager
- Cybersecurity and cyber defense advisor, educator, and policymaker
- Cybersecurity research officer or team leader
Program Admission Requirements
Show your commitment and readiness for Grad school by taking the GRE - the most broadly accepted exam for graduate programs internationally.