News

IT cyber security (MA)

We cordially invite you to apply for IT Cyber Security at the Faculty of Political Science and Journalism at UMCS. These are second-cycle studies for those who want to combine IT knowledge with political science and administration.

Knowledge in the field of political science and administration covers issues in the field of:

  • Cybersecurity places in the contemporary understanding of security
  • The complexity of cyberspace security threats
  • Diversification of areas of activities to ensure security in cyberspace, taking into account political science and legal, economic, and sociological approaches

On the other hand, knowledge related to IT includes:

  • The principles of operation of the operating system, its tasks and weaknesses
  • Basic programming structures and rules of designing programming scripts
  • Functioning of internet applications and knowledge about basic weaknesses of internet applications
  • Principles of operation of computer networks and weaknesses of protocols and mechanisms operating in all OSI model layers
  • Principles and good practices of safe web application programming
  • The principles of operation of cryptographic modules and the manner of their application in information systems
  • Penetration testing process and the ability to describe each stage
  • Standards of information security management

IT skills are:

  • Efficient performance of tasks in the Linux operating system
  • Designing a simple algorithm and creating its implementation in Python
  • Conducting web application security tests based on the OWASP standard
  • Analyzing the weaknesses of the computer network and applying a mechanism to protect against potential attacks
  • Finding security bugs in web applications and applying patches to fix them
  • Performing the required analysis regarding the application of cryptographic methods and the use of appropriate cryptographic modules
  • Performing all stages of penetration testing
  • Creating process documentation of an IT system and carrying out a risk analysis of such a system

This could be your way to the future!

We invite you to apply!

    News

    Author
    Monika Kusiej
    Date of addition
    7 June 2021