Master Informatique
Parcours Cybersecurity 2e année
Présentation et objectifs
Cybersecurity is a second year program (semesters 9 and 10) of the Mathematics and Computer science masters. Courses are in English and the program follows a first year master 1 in mathematics or Computer science or equivalent.
The economical impact of losses due to cybercriminality is estimated to several hundreds of billions of euros per year (445 billions of dollars, according to a McAfee/CSIS study in 2014) wih a large increase in attacks, for instance identity and data thefts and malicious attacks.
Vulnerabilities and Protections are covered, with for instance:
- Robustness of critical infrastructures when facing cyberattacks (e.g., stuxnet, wannacry)
- Robustness of security components when facing software vulnerabilities and data leakage (e. g., heartbleed)
- Privacy protection and cloud infrastructure security
- Robust design and evaluation of security components
- Detection of vulnerabilities in protocols for hardware and software components
Topics covered in the training include additional areas of Cybersecurity, such as cryptology, forensics, fuzzing or anonymization, especially for embedded systems and distributed architectures
Train cybersecurity experts (including data privacy aspects) with a bac + 5 degree, able to evolve immediately in an industrial environment and who can also pursue a thesis.
The course is labelled "Core AI" by MIAI.
Présentation
Présentation
Informations complémentaires
Site du master parcours Cybersecurity
Dimension internationale :
Formation tournée vers l’internationalEtudier à l’international en échange
Dans le cadre de cette formation, vous avez la possibilité de partir étudier durant un semestre ou une année dans un établissement partenaire de l’UGA à l’international.
Le correspondant relations internationales de votre composante pourra vous renseigner.
Plus d’informations sur : https://international.univ-grenoble-alpes.fr/partir-a-l-international/partir-etudier-a-l-etranger-dans-le-cadre-d-un-programme-d-echanges/
Possibilité de faire un double diplôme avec l'Université de Swansea.
Partenariats:
Établissement(s) co-accrédité(s)
- Institut Polytechnique de Grenoble
Autres(s) structure(s) partenaire(s)
Programme
Programme
Program under construction - pending CFVU vote
Master 2e année parcours classique
- Semestre 9
- UE Software security, secure programming and computer forensics 3 crédits ECTS
- UE Security architectures 6 crédits ECTS
- UE Cryptographic engineering, protocols and security models, data privacy, coding and applications 6 crédits ECTS
- UE Threat and risk analysis, IT security audit and norms 3 crédits ECTS
- UE Physical Security : Embedded, Smart Card, Quantum & Biometrics 6 crédits ECTS
- UE Advanced Security 6 crédits ECTS
1 option(s) au choix parmi 2
- UE Advanced Cryptology 6 crédits ECTS
- UE Stage Cybersecurité 30 crédits ECTS
Master 2e année parcours Graduate School
- Semestre 9
- UE GS_MSTIC_Ethique de la recherche 6 crédits ECTS
- UE Software security, secure programming and computer forensics 3 crédits ECTS
- UE Security architectures 6 crédits ECTS
- UE Cryptographic engineering, protocols and security models, data privacy, coding and applications 6 crédits ECTS
- UE Threat and risk analysis, IT security audit and norms 3 crédits ECTS
- UE Physical Security : Embedded, Smart Card, Quantum & Biometrics 6 crédits ECTS
1 option(s) au choix parmi 1
- UE Advanced Security 6 crédits ECTS
- UE Advanced Cryptology 6 crédits ECTS
- UE Stage Cybersecurité 30 crédits ECTS
Stages, projets et missions
Stage: ObligatoireDurée : 6 months
Stage à l'étranger : En France ou à l'étranger
The students of the common core General mathematics will have had a supervised research work at semester 10. The students of the common core Applied maths will have had a practicum and a project at semester 10.
Admission
Admission
Condition d'accès
The second year is accessible on file (and / or interview) to candidates who have validated the 1st year of a compatible course or through a validation of studies or acquired under the conditions determined by the university or training
Public continuing education : You are in charge of continuing education :
- if you resume your studies after 2 years of interruption of studies
- or if you followed a formation under the regime formation continues one of the 2 preceding years
- or if you are an employee, job seeker, self-employed
If you do not have the diploma required to integrate the training, you can undertake a validation of personal and professional achievements (VAPP)
Candidature
Do you want to apply and register? Note that the procedure differs depending on the degree considered, the degree obtained, or the place of residence for foreign students.
Et après ?
Et après ?
Poursuite d'études
Depending on the nature of their practicum, students may wish to pursue research in a doctoral thesis.
Métiers visés
- Ingénieur en cybersécurité
- Ingénieur en sécurité des systèmes d’information
- Ingénieur spécialisé en audit sécurité des systèmes d’information
- Ingénieur technico-commercial en sécurité informatique
- Ingénieur R&D spécialisé en cybersécurité.
Candidature
Do you want to apply and register? Note that the procedure differs depending on the degree considered, the degree obtained, or the place of residence for foreign students.
Télécharger
Contacts
Responsable pédagogique
Laurent Mounier
Clement Pernet
Secrétariat de scolarité
Elise Ros
Sur le web
En bref
Discipline : Informatique, Mathématiques, Sciences et technologies de l'information et de la communicationModalités : Formation initiale / continue
Langues : Anglais
Bi-Langues : Partiellement en anglais
Lieux : Grenoble - Domaine universitaire
Dimension internationale : Oui
Durée des études : 1 an
Niveau de recrutement : Bac +4