Master in Mathematics and applications

Master in Mathematics and applications

Cybersecurity

Presentation and goals

The global economic impact of losses due to cybercrime amounts to hundreds of billions of euros per year ($445 billion according to the McAfee/CSIS study of 2014) with a strong increase in attacks, especially for identity theft and digital data theft, as well as malicious attacks.

Protection against these vulnerabilities includes :

  • Robustness to cyber attacks of sensitive infrastructure (e.g. stuxnet)
  • Robustness of security components against software vulnerabilities and data leaks (e.g. heartbleed)
  • Protection of privacy and security of cloud infrastructure
  • Robust design and evaluation of safety components
  • Fault detection in protocols or software and hardware components

The topics covered in the training cover the complementary areas of Cybersecurity, including cryptology, forensics, and privacy, in particular for embedded systems and distributed architecture.

The objective of this program is to train cybersecurity experts (including data privacy aspects) with a bac + 5 degree, able to evolve immediately in an industrial environment and who can also pursue a thesis.

Presentation

Presentation

Further information

Site du parcours Cybersecurity

International dimension :

Internationally-oriented programmes

Internationally oriented training

Partnerships:
Accredited organizational unit(s)
  • Polytechnic Institute of Grenoble
Other partner structure(s)

    Programme

    Programme

    Program under construction - awaiting CFVU vote

    Practica, projects, and missions

    Internship: Mandatory
    Duration: 6 months
    Internship abroad: In France or abroad

    The students of the common core General mathematics will have had a supervised research work at semester 10. The students of the common core Applied mathematics will have had a practicum and a project at semester 8.

    Registration and scholarships

    Registration and scholarships

    Access condition

    The first year master's is accessible to candidates according to their transcripts (and/or interview) :

    • Proof of a national degree conferring the degree of bachelor in a field compatible with that of the Master's degree- or by validation of studies or acquired experience according to the conditions determined by the university or the training

    The second year master's is accessible to candidates according to their transcripts (and/or interview) :

    • Having validated the first year of a compatible course (the course is accessible from the two common trunks General mathematics and Applied mathematics provided that the students have taken the appropriate optional courses)
    • Or by validation of studies or acquired experience according to the conditions determined by the university or the training.

    Public continuing education : You are in charge of continuing education :

    • if you resume your studies after 2 years of interruption of studies
    • or if you followed a formation under the regime formation continues one of the 2 preceding years
    • or if you are an employee, job seeker, self-employed

    If you do not have the diploma required to integrate the training, you can undertake a validation of personal and professional achievements (VAPP)

    Candidature / Application

    Do you want to apply and register? Note that the procedure differs depending on the degree considered, the degree obtained, or the place of residence for foreign students.

    Find out which procedure applies to me and apply

    And after

    And after

    Further studies

    Depending on the nature of their practicum, students may wish to pursue research in a doctoral thesis.

    Professions

    - Cybersecurity engineer
    - Information systems security engineer
    - Engineer specialized in auditing security of information systems
    - Technical sales engineer in computer security
    - R & D engineer specialized in cybersecurity