Contact Us Report about mistake Sign In Help

Compare

Information and Information Technology Security

Language of instruction

lithuanian

Qualification degree and (or) qualification to be awarded

Master of Computing

Place of delivery

Kaunas, K. Donelaičio g. 73, LT-44249

Institution that has carried out assessment

Studijų kokybės vertinimo centras

Institution that has performed accreditation, accreditation term

Studijų kokybės vertinimo centras, 9/1/2020

Data provided or updated (date)

8/17/2023

Order on accreditation

SV6-43
More about programme

Institutions providing this programme

Programmes with similar name

Programmes granting same qualifications

Summary of the Profile

General Description:
Objective(s) of a study programme:
To provide knowledge of research methodology, information security methods, technologies and management, legal regulation of cyberspace. To develop skills of applying these methods and technologies. The graduates can evaluate, design and implement secure systems of information technologies, solve the issues of software security.

Learning outcomes:
Knowledge and its Application:
A1 Is able to explain in detail the concepts and scientific principles related to information and information technology security sciences based on the results of basic or applied research.
A2 Is able to explain in detail formal information security models, computer security mechanisms, basics of cryptographic theory, algorithms and protocols for secure information transmission, security mechanisms of operating systems, security principles of virtual architectures.
A3 Is able to summarize the meaning and context of the engineering tasks to be solved and the ongoing research in information and information technology security.
A4 Is able to apply the general knowledge of computer science deepened or broadened in the field of informatics engineering to solve the information security problems, carrying out research and experimental development.
Research Skills:
B1 Is able to define in detail information and information technology security problems and their complexity at different levels of abstraction, taking into account the importance of relevant legal, business, industrial, economic and / or social contexts.
B2 Is able to investigate the scientific or professional problem of information security and its possible solutions, analyse and evaluate information and IT security systems using effective methods.
B3 Is able to justify and select the methods and tools for the implementation of the solution of the information security problem, based on the research data.
B4 Is able to critically evaluate the data, information, results, developed and alternative solutions to information and information technology security problems collected and obtained during the research and their impact on the environment with reasoned conclusions and recommendations.
B5 Is able to professionally summarize research results, prepare scientific publications and research results reports.
Specific Skills:
C1 Is able to formulate complex tasks in various fields of information security, integrating relevant knowledge and innovative methods in computer science and other fields, adopt pre-project engineering decisions, initiate new and innovative information and information technology security solutions.
C2 Is able to design information and information technology security solutions, conduct research using appropriate information security and other fields methods and tools.
C3 Is able to implement information and information technology security solutions, including secure computer networks, virtual architectures, data and electronic document databases, software and electronic service systems.
C4 Is able to solve information security management issues: analyse and assess information security threats and risks, perform information security system audit and certification procedures, apply information security management systems, incident and configuration management tools.
C5 Is able to evaluate as an expert existing or being developed information and information technology security products and services, provide recommendations for further improvement and development.
Social Skills:
D1 Is able to present information security problems and solutions for specialists as well as broad auditorium in written and oral form, using correct Lithuanian language and at least one of the foreign languages.
D2 Is able to work effectively in information security systems development, maintenance and auditing teams and lead them in accordance with the principles and rules of professional, ethical behaviour and social responsibility.
Personal Skills:
E1 Is able to study systematically and independently to achieve continuous personal, professional and scientific development in the field of information security.
E2 Is able to work independently, systematically and responsibly in the field of information security, taking initiative and personal responsibility.
E3 Is able to demonstrate creativity in solving problems of professional and scientific activity in the field of information security.


Activities of teaching and learning:
The studies include classroom work (lectures, practical work, laboratory work, consultation seminars, outgoing visits to enterprises, etc.) and individual work for mastering theoretical material, preparation for classroom work, intermediate and final assessments and performing other activities. The studies of each study module are completed by the assessment of the student’s knowledge and skills – an examination or another final assessment; the study programme is completed by the final degree project and its defence.
The study methods of active learning, such as design (programming), design thinking, challenge-based learning, creative workshops, group work, experiential learning, discussion, problem-based learning, reflective learning, idea (mind) mapping, etc. are applied to encourage the active participation and creativity of students in the study process. The achievements are assessed using the traditional assessment methods, such as laboratory examination, assignments, laboratory or project report, as well as other methods: work or competency file (portfolio), problem-solving task, engineering project, reflection on action, self-assessment, etc.

Methods of assessment of learning achievements:
The applied cumulative assessment system of the learning outcomes ensures constant and involving work of students during the entire semester of studies; the final evaluation of the study module consists of the sum of the grades of intermediate assessments and the final assessment multiplied by the weighting coefficients (percentages of components).
The number of intermediate assessments and their expression in percentage are chosen by the study module’s coordinating lecturer. Besides the usual forms of assessment (for example, examination, oral presentation, project report, laboratory examination), an additional form of assessment “Assessment of student activity (level)” may be applied (up to 10% of the final grade) for the assessment of the student’s preparation for case analysis, an active discussion, participation in debates, etc.

Framework:
Study subjects (modules), practical training:
Cybercrime and Computer Forensics, Computer Networks Security, Cryptographic Systems, Databases and Electronic Documents Security, Ethical Hacking and Vulnerability Detection Methods, Information Security Management, Information Technology Security Methods, Master’s Degree Final Project, Methodology of Security Systems Design, Model-Based Systems Development, Research Project 1, Research Project 2, Research Project 3, Security of Electronic Services, Software Security, Virtual Infrastructure Security.

Specialisations:
-
Optional courses:

Distinctive features of a study programme:
A graduate has knowledge of research methodology for information technology, fundamentals and methods of information security, security technologies for information and information technology, information security management, regulatory framework of cyberspace. The graduate is able to work independently and professionally in the field of information security assurance: to assess, plan, design and implement secure information technology systems, solve software security issues, as well as security issues related to social engineering, to design and implement information security management systems, plan and implement business continuity and computer system recovery.

Access to professional activity or further study:
Access to professional activity:
The graduate can perform research, analytical, managerial or other engineering work in the area of security of information and information technology at companies and educational or research institutions.
Access to further study:
S/he has access to the third cycle studies.