Target level
Baccalaureate +5
ECTS
60 credits
Duration
1 year
Component
UFR IM2AG (informatique, mathématiques et mathématiques appliquées), Grenoble INP - Ensimag (Informatique, mathématiques appliquées et télécommunications), UGA
Language(s) of instruction
English
Dual language
Partially in english
Presentation
The global economic impact of losses due to cybercrime amounts to hundreds of billions of euros per year ($445 billion according to the McAfee/CSIS study of 2014) with a strong increase in attacks, especially for identity theft and digital data theft, as well as malicious attacks. Protection against these vulnerabilities includes :
- Robustness to cyber attacks of sensitive infrastructure (e.g. stuxnet)
- Robustness of security components against software vulnerabilities and data leaks (e.g. heartbleed)
- Protection of privacy and security of cloud infrastructures
- Robust design and evaluation of safety components
- Fault detection in protocols or software and hardware components
The topics covered in the training cover the complementary areas of Cybersecurity, including cryptology, forensics, and privacy, in particular for embedded systems and distributed architectures.
Train cybersecurity experts (including data privacy aspects) with a bac + 5 degree, able to evolve immediately in an industrial environment and who can also pursue a thesis.
The course is labelled "Core AI" by MIAI.
International education
Internationally-oriented programmes
International dimension
Possibility of doing a double degree with the University of Swansea
Organisation
Abroad intership
In France or abroad
Program
Specifics of the program
Program under construction - awaiting CFVU vote
Select a program
Master 2nd year
UE Software security, secure programming and computer forensics
3 creditsUE Security architecture
6 creditsUE Cryptographic engineering, protocols and security models, data privacy, coding and applications
6 creditsUE Threat and risk analysis, IT security audit and norms
3 creditsUE Physical Security : Embedded, Smart Card, Quantum & Biometrics
6 creditsChoice: 1 among 2
UE Advanced security
6 creditsUE Advanced cryptology
6 credits
Master 2nd Graduate School program
UE Software security, secure programming and computer forensics
3 creditsUE GS_MSTIC_Research ethics
6 creditsUE Cryptographic engineering, protocols and security models, data privacy, coding and applications
6 creditsUE Threat and risk analysis, IT security audit and norms
3 creditsUE Physical Security : Embedded, Smart Card, Quantum & Biometrics
6 creditsChoice: 1 among 2
UE Advanced security
6 creditsUE Advanced cryptology
6 credits
Admission
Access conditions
The second year master's is accessible to candidates according to their transcripts (and/or interview):- having validated the first year of a compatible course- or by validating studies or acquired experience according to the conditions determined by the university or the training.
Public continuing education : You are in charge of continuing education :
- if you resume your studies after 2 years of interruption of studies
- or if you followed a formation under the regime formation continues one of the 2 preceding years
- or if you are an employee, job seeker, self-employed
If you do not have the diploma required to integrate the training, you can undertake a validation of personal and professional achievements (VAPP).
Candidature / Application
Do you want to apply and register? Note that the procedure differs depending on the degree considered, the degree obtained, or the place of residence for foreign students.
Prerequisites
Language requirements :
-
Students are required to provide evidence of Competence in English.
English scores required for the MSIAM, programs: TOEFL IBT 78, CBT 210, Paper 547 / TOEIC 700 / Cambridge FCE / IELTS 6.0 min.
This is equivalent to CEFR level B2.If you have successfully completed a degree (or equivalent) course at a University in one of the following countries then you meet the English requirement automatically: Australia, Canada, Guyana, Ireland, New Zealand, South Africa, United Kingdom, United States of America, West Indies.
And after
Further studies
Depending on the nature of their practicum, students may wish to pursue research in a doctoral thesis.
Targeted trades
- Cybersecurity engineer
- Information systems security engineer
- Engineer specialized in auditing security of information systems
- Technical sales engineer in computer security
- R & D engineer specialized in cybersecurity