Contact Us Report about mistake Sign In Help

Compare

Information Systems and Cyber Security

Language of instruction

lithuanian

Qualification degree and (or) qualification to be awarded

Bachelor of Computing

Place of delivery

Vilnius, Universiteto g. 3, LT-01131
Muitinės g. 8, 44280 Kaunas

Institution that has carried out assessment

No data

Institution that has performed accreditation, accreditation term

Studijų kokybės vertinimo centras, 7/1/2021

Data provided or updated (date)

4/6/2020

Order on accreditation

SV6-22
More about programme

Institutions providing this programme

Programmes with similar name

Programmes granting same qualifications

Summary of the Profile

General Description:
Objective(s) of a study programme:
The study programme Information Systems and Cyber Security aims at the preparation of professionals in information systems and cyber security who will have the fundamental and applied knowledge in informatics engineering and develop skills required for a secure analysis, design, structuring and maintenance of information systems.
Learning outcomes:
The graduate is able to analyse and formalize the information flows in a business enterprise; technologically justify the directions of the implementation of IT; work out an adequate instrumentarium; is able to design, implement, structure, maintain and professionally assess the secure IS; understands computer architecture; is able to employ programming languages, technologies of providing information on the Internet; to design the IS architecture and data bases, create IS both with the use of traditional and modern mobile technologies; knows security components, basic structure, assessment criteria and administration basics, effective firewall concepts, architecture, content scanning; is able to detect the cases of hacking and carry out prevention; is able to identify the gaps of incorrect programming, access to the files of cyberattacks DoS and DDoS, knows the Burp Suite; understands the security of WEB components – forms, session management, cookies, configuration of authentification. Knows the security context of a particular OS, recognises the cases of phishing and understands the subtleties of session management and replay attacks; is able to perform a manual and half-automatic systems and software testing by identifying security gaps and security vulnerabilities; to employ the innovative methods and instrumentarium for the proactive gap identification. Knows the legal regulations of cyber security, the specificity of information security management and management of security risk.
Activities of teaching and learning:
The programme provides lectures, seminars, workshops, individual tasks and internship. Studies are organized by applying both the classical teaching methods (lectures, video and audio demonstrations, illustrations, etc.) and active learning and teaching methods (interactive lectures, problem teaching, etc.). Seminars and workshops are held in small groups of up to 20 students where student-centered approaches are developed, such as brainstorming, group discussion, preparation and presentation of reports, problem-solving and team tasks.
Methods of assessment of learning achievements:
The assessment requirement common of all the courses is to work out a cumulative score. A particular form of study assessment is provided in the course description: tests, homework, colloquiums and papers. A written examination is the most common type of assessment.
Framework:
Study subjects (modules), practical training:
Study subjects (modules), practical training:
Algorithm Theory and Data Structures;
Fundamentals of Information System Security;
Computer Architecture;
Introduction to Programming;
Higher Mathematics;
IT Processses according to ITIL Methodology;
Legal Regulations for Cyber Security;
Programming Languages and Object-oriented Programming;
Operational Systems and Their Security;
Analysis and Specification of IS Requirements;
Geographical Information Systems;
Computer Graphics;
Discrete Mathematics in Computer Science;
Data Security and Criptography; Internet Technologies;
Information Systems and Data Bases;
Programming of Mobile Technologies;
Creation of Information Systems on the Basis of Team Work;
Computer Networks and Their Security;
E-transactions and Their Security;
Graphic Models of Business Processes;
Methods of Ethical Hackings;
Information Security and Risk Management;
Digital Forensics and Methods of Their Analysis;
Virtual Systems and Their Security;
Design of Secure Computer Infrastructures;
Theory of Systems;
Statistics;
Basics in Artificial Intellect;
Term Paper; Technologies of Data Mining;
Information Systems Testing and Quality Assuarance;
Forensic Analysis of Digital Content and Analysis of Malware;
Internship;
Final Bachelor Thesis.
Distinctive features of a study programme:
This programme is the first and the only cybersecurity study programme in Lithuania.
There is a considerable demand for cyber security specialists with higher education both in the Lithuanian and international labour markets. In the future, the demand will undoubtfully grow due to:
1) tightening of the legal environment of a growing data and information security in the EU and other countries;
2) a growing number of forensics and expansion of their scale;
3) the growing demand of the international enterprises and states to be better protected against economic espionage;
4) the threat of e-war between the states.
The specialists knowing the technologies of information systems security are able to successfully compete both locally, within the Lithuanian labour market, and globally, in the world labour market. Today, the concept of ‘distant workplace’ has been embeded in Lithuania which ensures the possibility to do distant working in international enterprises. Such work requires special education. Therefore international enterprises greatly value the specialists who have the skills of adequate specialization that may confirm their competences. Hence the given study programme allow the students to acquire knowledge and develop skills that are necessary to receive the Information Technology Infrastructure Library (or similar) type certificates.
Access to professional activity or further study:
Access to professional activity:
The graduate of this study programme is able to work as an information systems security professional in government organizations and business enterprises of various size. The graduate may pursue a professional career as an information systems analyst or architect, programmer, tester, database administrator, project manager in the field of information systems; information security analyst; security management professional or manager and IT security auditor in organizations. The graduate is able to develop the own business initiatives, provide consulting services or carry out a qualitative analysis of information systems design and management.

Access to further study:
A graduate of the study programme can continue studies in the postgraduate study programmes of Computing.