Master in Computer science

Master in Computer science

Cybersecurity 2nd year

Presentation and goals

The global economic impact of losses due to cybercrime amounts to hundreds of billions of euros per year ($445 billion according to the McAfee/CSIS study of 2014) with a strong increase in attacks, especially for identity theft and digital data theft, as well as malicious attacks. Protection against these vulnerabilities includes :

  • Robustness to cyber attacks of sensitive infrastructure (e.g. stuxnet)
  • Robustness of security components against software vulnerabilities and data leaks (e.g. heartbleed)
  • Protection of privacy and security of cloud infrastructures
  • Robust design and evaluation of safety components
  • Fault detection in protocols or software and hardware components

The topics covered in the training cover the complementary areas of Cybersecurity, including cryptology, forensics, and privacy, in particular for embedded systems and distributed architectures.

Train cybersecurity experts (including data privacy aspects) with a bac + 5 degree, able to evolve immediately in an industrial environment and who can also pursue a thesis.



Further information

Site du master parcours Cybersecurity

International dimension :

Internationally-oriented programmes
Accredited organizational unit(s)
  • Polytechnic Institute of Grenoble
Other partner structure(s)



    Practica, projects, and missions

    Internship: Mandatory
    Duration: 6 months
    Internship abroad: In France or abroad

    The students of the common core General mathematics will have had a supervised research work at semester 10. The students of the common core Applied mathematics will have had a practicum and a project at semester 10.

    Registration and scholarships

    Registration and scholarships

    Access condition

    The second year master's is accessible to candidates according to their transcripts (and/or interview):- having validated the first year of a compatible course- or by validating studies or acquired experience according to the conditions determined by the university or the training.

    Public continuing education : You are in charge of continuing education :

    • if you resume your studies after 2 years of interruption of studies
    • or if you followed a formation under the regime formation continues one of the 2 preceding years
    • or if you are an employee, job seeker, self-employed

    If you do not have the diploma required to integrate the training, you can undertake a validation of personal and professional achievements (VAPP).

    Candidature / Application

    Do you want to apply and register? Note that the procedure differs depending on the degree considered, the degree obtained, or the place of residence for foreign students.

    Find out which procedure applies to me and apply


    Tuition fees 2019-2020 : 243 €

    And after

    And after

    Further studies

    Depending on the nature of their practicum, students may wish to pursue research in a doctoral thesis.


    - Cybersecurity engineer
    - Information systems security engineer
    - Engineer specialized in auditing security of information systems
    - Technical sales engineer in computer security
    - R & D engineer specialized in cybersecurity