|University website:||Information Systems and Cyber Security|
|Annual tuition (EEA)||4,900 EUR|
|Annual tuition (non-EEA)||4,900 EUR|
The study programme in Information Systems and Cyber Security aims to prepare professionals in information systems and cyber security who will have the fundamental and applied knowledge in informatics engineering and develop skills required for secure analysis, design, structuring and maintenance of information systems.
This programme is the first and only cybersecurity study programme in Lithuania.
There is a considerable demand for cyber security specialists with higher education in the European Union and international labour markets.
In the future, the demand will undoubtedly grow due to 1) tightening of the legal environment of a growing data and information security in the European Union and other countries; 2) a growing number of forensics and expansion of their scale; 3) the growing demand of the international enterprises and states to be better protected against economic espionage; 4) the threat of e-war between the states.
The graduate is able to analyse and formalize the information flows in a business enterprise; technologically justify the directions of the implementation of IT; work out an adequate instrumentarium; is able to design, implement, structure, maintain and professionally assess the secure IS; understands computer architecture; is able to employ programming languages, technologies of providing information on the Internet; to design the IS architecture and data bases, create IS both with the use of traditional and modern mobile technologies; knows security components, basic structure, assessment criteria and administration basics, effective firewall concepts, architecture, content scanning; is able to detect the cases of hacking and carry out prevention; is able to identify the gaps of incorrect programming, access to the files of cyberattacks DoS and DDoS, knows the Burp Suite; understands the security of WEB components – forms, session management, cookies, configuration of authentification.
Knows the security context of a particular OS, recognises the cases of phishing and understands the subtleties of session management and replay attacks; is able to perform manual and half-automatic systems and software testing by identifying security gaps and security vulnerabilities; to employ the innovative methods and instrumentarium for the proactive gap identification. Knows the legal regulations of cyber security, the specificity of information security management and management of security risk.