Master in Computer science

Master in Computer science

Cybersecurity 2nd year

Presentation and goals

The global economic impact of losses due to cybercrime amounts to hundreds of billions of euros per year ($445 billion according to the McAfee/CSIS study of 2014) with a strong increase in attacks, especially for identity theft and digital data theft, as well as malicious attacks. Protection against these vulnerabilities includes :

  • Robustness to cyber attacks of sensitive infrastructure (e.g. stuxnet)
  • Robustness of security components against software vulnerabilities and data leaks (e.g. heartbleed)
  • Protection of privacy and security of cloud infrastructures
  • Robust design and evaluation of safety components
  • Fault detection in protocols or software and hardware components

The topics covered in the training cover the complementary areas of Cybersecurity, including cryptology, forensics, and privacy, in particular for embedded systems and distributed architectures.

Train cybersecurity experts (including data privacy aspects) with a bac + 5 degree, able to evolve immediately in an industrial environment and who can also pursue a thesis.

The course is labelled "Core AI" by MIAI.

Presentation

Presentation

Further information

Site du master parcours Cybersecurity

International dimension :

Internationally-oriented programmes
Partnerships:
Accredited organizational unit(s)
  • Polytechnic Institute of Grenoble
Other partner structure(s)

Programme

Programme

Program under construction - awaiting CFVU vote

Practica, projects, and missions

Internship: Mandatory
Duration: 6 months
Internship abroad: In France or abroad

The students of the common core General mathematics will have had a supervised research work at semester 10. The students of the common core Applied mathematics will have had a practicum and a project at semester 10.

Registration and scholarships

Registration and scholarships

Access condition

The second year master's is accessible to candidates according to their transcripts (and/or interview):- having validated the first year of a compatible course- or by validating studies or acquired experience according to the conditions determined by the university or the training.

Public continuing education : You are in charge of continuing education :

  • if you resume your studies after 2 years of interruption of studies
  • or if you followed a formation under the regime formation continues one of the 2 preceding years
  • or if you are an employee, job seeker, self-employed

If you do not have the diploma required to integrate the training, you can undertake a validation of personal and professional achievements (VAPP).

Candidature / Application

Do you want to apply and register? Note that the procedure differs depending on the degree considered, the degree obtained, or the place of residence for foreign students.

Find out which procedure applies to me and apply

And after

And after

Further studies

Depending on the nature of their practicum, students may wish to pursue research in a doctoral thesis.

Professions

- Cybersecurity engineer
- Information systems security engineer
- Engineer specialized in auditing security of information systems
- Technical sales engineer in computer security
- R & D engineer specialized in cybersecurity