Due to the settings of your browser and in order to facilitate the functioning of the umcs.pl webpage, the cookies have been installed. By continuing to use this webpage, you accept their usage. You can change this in the settings of you browser.
We cordially invite you to apply for IT Cyber Security at the Faculty of Political Science and Journalism at UMCS. These are second-cycle studies for those who want to combine IT knowledge with political science and administration.
Knowledge in the field of political science and administration covers issues in the field of:
Cybersecurity places in the contemporary understanding of security
The complexity of cyberspace security threats
Diversification of areas of activities to ensure security in cyberspace, taking into account political science and legal, economic, and sociological approaches
On the other hand, knowledge related to IT includes:
The principles of operation of the operating system, its tasks and weaknesses
Basic programming structures and rules of designing programming scripts
Functioning of internet applications and knowledge about basic weaknesses of internet applications
Principles of operation of computer networks and weaknesses of protocols and mechanisms operating in all OSI model layers
Principles and good practices of safe web application programming
The principles of operation of cryptographic modules and the manner of their application in information systems
Penetration testing process and the ability to describe each stage
Standards of information security management
IT skills are:
Efficient performance of tasks in the Linux operating system
Designing a simple algorithm and creating its implementation in Python
Conducting web application security tests based on the OWASP standard
Analyzing the weaknesses of the computer network and applying a mechanism to protect against potential attacks
Finding security bugs in web applications and applying patches to fix them
Performing the required analysis regarding the application of cryptographic methods and the use of appropriate cryptographic modules
Performing all stages of penetration testing
Creating process documentation of an IT system and carrying out a risk analysis of such a system