Contact Us Report about mistake Sign In Help

Compare

International Cybersecurity and Cyberintelligence

Language of instruction

english

Qualification degree and (or) qualification to be awarded

No data

Place of delivery

Vilnius, Universiteto g. 3, LT-01131

Institution that has carried out assessment

Studijų kokybės vertinimo centras

Institution that has performed accreditation, accreditation term

Studijų kokybės vertinimo centras, 6/30/2027

Data provided or updated (date)

4/25/2024

Order on accreditation

S-135
More about programme

Institutions providing this programme

Programmes with similar name

Programmes granting same qualifications

Summary of the Profile

General Description:
Objective(s) of a study programme:

The study programme aims at qualifying students for a professional career in the cybersecurity field with emphasis in international relations and the cyberintelligence domain. Based on an interdisciplinary and international range of courses, students will acquire capabilities to understand global cybersecurity and cyberintelligence mechanisms and leverage cooperation among international actors.

Learning outcomes:
1.1: Analyses threat information from multiple sources, disciplines, and agencies across the Intelligence Community.
1.2: Synthesizes and places intelligence information in context; draws insights about the possible implications.
1.3: Analyses collected information to identify vulnerabilities and potential for exploitation.
1.4: Identifies and assesses the capabilities and activities of cybersecurity criminals or foreign intelligence entities.
2.1: Executes collection using appropriate strategies and within the priorities established through the collection management process.
2.2: Performs activities to gather evidence on criminal or foreign intelligence entities to mitigate possible or real-time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.
3.1: Collects, processes, preserves, analyses, and presents computer-related evidence in support of network vulnerability mitigation and/or criminal, fraud, counterintelligence, or law enforcement investigations.
4.1: Installs, configures, tests, operates, maintains, and manages networks and their firewalls, including hardware and software that permit the sharing and transmission of all spectrum transmissions of information to support the security of information and information systems.
4.2: Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability.
4.3: Manages accounts, firewalls, and patches.
4.4: Studies an organisation's current computer systems and procedures, and designs information systems solutions to help the organisation operate more securely, efficiently, and effectively.
5.1: Oversees the cybersecurity program of an information system or network, including managing information security implications within the organisation, specific program, or other areas of responsibility, to include strategic, personnel, infrastructure, requirements, policy enforcement, emergency planning, security awareness, and other resources.
5.2: Develops policies and plans and/or advocates for changes in policy that support organisational cyberspace initiatives or required changes/enhancements.
6.1: Uses defensive measures and information collected from a variety of sources to identify, analyse, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.
6.2: Responds to crises or urgent situations within the pertinent domain to mitigate immediate and potential threats.
6.3: Conducts assessments of threats and vulnerabilities; determines deviations from acceptable configurations, enterprise or local policy; assesses the level of risk; and develops and/or recommends appropriate mitigation countermeasures in operational and nonoperational situations.
7.1: Ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives.
7.2: Develops and writes/codes new (or modifies existing) computer applications, software, or specialised utility programs following software assurance best practices.
7.3: Develops and conducts tests of systems to evaluate compliance with specifications and cybersecurity requirements by applying principles and methods for cost-effective planning.
8.1: Communicates conclusions, and the knowledge and rationale underpinning these, to specialist and non-specialist audiences clearly and unambiguously.
8.2: Continues to study and learn in a manner that may be largely self directed or autonomous.
8.3: Collaborates with others, participating effectively as a member of a technical or management team.

Activities of teaching and learning:

Mostly used study methods are: literature reading, information search and analysis, case studies, consultations, discussions, group work, inclusive lectures, laboratory tasks with examples and exercises, preparation and writing of report or some special kind of document, presentation preparation and delivery, problem-based learning, project work, self-assessment and self-study, virtual learning environment.

Methods of assessment of learning achievements:

All subjects except the final thesis and the professional practice have an accumulative assessment. Each assessment strategy is worth a particular amount of points in the final evaluation. The Virtual Learning Environment and online teaching resources that provide technical environments developed by individual university partners enable feedback from the mid-term tasks. The feedback can be provided for each task and each student.

Framework:
Study subjects (modules), practical training:
The core of the curriculum consists of the following mandatory classes:
1. Fundamentals of cryptography (I semester, Padova)
2. Digital Forensics (I semester, Padova)
3. Secure software development (I semester, Padova)
4. Fundamentals on international cybersecurity (I semester, Minho)
5. Operating systems security (II semester, Vilnius)
6. Security of applications (II semester, Vilnius)
7. International management of cybersecurity (II semester, Vilnius)
8. Research projects (II semester, Vilnius)
9. Ethical hacking (III semester, Granada)
10. Cyberprotection systems (III semester, Granada)
11. Network security (III semester, Granada)
12. International cyberintelligence (III semester, Granada)
Specialisations:

Optional courses:
1. Mobile security (I semester, Padova)
2. Cyberphysical and IoT security (I semester, Padova)
3. Machine Learning techniques for event correlation (I semester, Padova)
4. Formal methods for cyberphysical systems (I semester, Padova)
5. Quantum cryptography and security (I semester, Padova)
6. Privacy preserving information access (I semester, Padova)
7. Law and data (I semester, Padova)
1. Malware (II semester, Vilnius)
2. Rapid reaction and first response (II semester, Vilnius)
1. International cooperation in cyberspace (III semester, Granada)
2. Cyberwarfare (III semester, Granada)
3. Post-quantum cryptography (III semester, Granada)

Distinctive features of a study programme:

Joint degree study programme;
Interdisciplinary field of studies - Computer Science, Computer Engineering, Management, Sociology and Psychology, and even Law;
Mobility between four partner universities in Spain, Lithuania, Italy and Portugal.

Access to professional activity or further study:
Access to professional activity:
Graduate will have opportunities to be employed at both public and private sectors, as
● Chief Information Security Officer (CISO)
● Cyber Incident Responder
● Cyber Legal, Policy & Compliance Officer
● Cyber Threat Intelligence Specialist
● Cybersecurity Architect
● Cybersecurity Auditor
● Cybersecurity Educator
● Cybersecurity Implementer
● Cybersecurity Researcher
● Cybersecurity Implementer
● Cybersecurity Risk Manager
● Digital Forensics Investigator
● Penetration Tester
Access to further study:

Graduates will be able to continue their studies as doctoral students in computing, mathematics, nature sciences, engineering.