No. 1 quality assurance system in Croatia

Creating a digital future in Croatia for 25 years

Institutional exchange agreements with more than 100 institutions

96% of alumni employed 3 months after graduation

The Cyber Security study programme equips students with the knowledge and skills needed for cyber security careers and for the roles of systems and network administrators.

This study programme is ideal for individuals who like to think outside of the box, and are committed to continuous learning, as well as excel at solving complex problems.

Upon completing the study programme, students will have acquired all necessary skills to implement and maintain sophisticated information systems built on the latest technology. The four-year Professional Bachelor Study Programme in Cyber Security offers students the expertise required to build a successful career in the IT industry, with a particular focus on cyber security, applicable worldwide. The curriculum integrates theoretical knowledge with practical skills in computing and cyber security. It includes analytical skills for threat assessment, techniques for data collection and analysis for security purposes, as well as the use of modern tools and technologies to implement robust security controls and policies in ICT environments. Additionally, the mandatory internship with leading companies enables students to apply their skills in real-world settings, further enhancing their readiness for the labour market.

Curriculum Structure

This programme equips you with the skills and knowledge needed to launch a career in cyber security, both in Croatia and internationally. Here’s a brief overview of what you’ll learn:

The Computer Architecture module offers an in-depth study of the hardware components that form the foundation of every computer system. Students will explore computer architecture, including processors, motherboards, memory, and storage devices, and understand how these components interact. This module establishes the essential foundation for comprehending more complex IT systems and is critical for anyone pursuing a career in the technical areas of computing.
The Networks module provides students with an understanding of the structure, design, implementation, and management of computer networks. Special emphasis is placed on protocols, network topologies, devices such as routers and switches, and security measures that protect data in transit. Mastering networking is essential for maintaining and optimizing communication within and between information systems.
The Operating Systems module explores the functionality and management of modern operating systems. Students will learn about process management, memory management, and input-output systems, as well as how the OS interacts with hardware. This module is essential for those looking to develop skills in IT support, systems integration, or software engineering.
The Information Theory and Finite Automata module covers mathematical models that describe the processing, transmission, and perception of information. Students will explore information theory, finite automata, and their applications in data encoding and process automation. This foundational course is essential for understanding algorithms and software development.
The Cyber Law and Ethics module introduces students to the legal framework governing cyberspace and explores the ethical dilemmas faced by cyber security professionals. The module covers data protection laws, intellectual property rights, and ethical practices within the digital environment.
The DevOps module focuses on automation, orchestration, and continuous integration/deployment processes. Students will develop the skills necessary to manage software development lifespan, enabling faster releases of higher-quality software while reducing production risks.
The Cyber Security Defences module explores the strategies and techniques necessary to secure information and communication technologies. The module focuses on identifying and preventing security threats, managing risks, and implementing policies and procedures to ensure business continuity.
The Ethical Hacking module teaches students how to ethically test and assess the security of IT systems using techniques similar to those employed by attackers, but within a lawful and controlled environment. The module covers the stages of ethical hacking—from reconnaissance to maintaining access and clearing traces—preparing students for careers in security assessment.
The Penetration Testing module focuses on simulating attacks on computer networks, applications, or other components to identify security vulnerabilities that real attackers could exploit. Students will develop skills needed to conduct comprehensive security tests and prepare detailed reports on their findings.
The Cyber Security Management module prepares students for managing security policies, procedures, and teams to protect organizations from cyber threats. Emphasis is placed on a strategic approach to developing security policies, incident management, and ensuring compliance with regulatory and industry standards.

Examples of jobs we’re preparing you for

Cyber Incident Responder

A Cyber Incident Responder monitors an organization’s security posture, manages incidents during cyberattacks, and ensures the continuous operation of ICT systems. In addition to developing and maintaining an incident response plan, this expert identifies the root causes of incidents, conducts analysis and mitigation, and restores the functionality of systems and processes.

Cyber Threat Intelligence Specialist

A Cyber Threat Intelligence Specialist oversees the threat intelligence lifecycle, from data collection to analysis and production of actionable reports. This role involves identifying the tactics, techniques, and procedures used by cyber attackers, providing critical information for organizational defences.

Cyber Security Implementer

A Cyber Security Implementer develops, deploys, and manages cyber security solutions. Responsible for the technical development, integration, testing, implementation, and maintenance of these solutions, this role ensures adherence to specifications and compliance requirements.

Cyber Security Architect

A Cyber Security Architect plans and designs security solutions based on security and privacy principles. This expert develops architectural models, coordinates secure development, integration, and maintenance of cyber security components, and ensures compliance with standards and requirements.

Digital Forensics Investigator

A Digital Forensics Investigator ensures that cybercrime investigations uncover all digital evidence to substantiate malicious activity. This role includes connecting digital artifacts to individuals, documenting, and analysing digital evidence.

Penetration Tester

A Penetration Tester evaluates the efficiency of security controls by identifying and exploiting vulnerabilities. They plan, design, conduct, and execute penetration testing activities to assess the efficacy of implemented security measures.

Cyber Security Auditor

A Cyber Security Auditor conducts audits of an organization’s ecosystem to ensure compliance with legal and regulatory requirements. This expert independently assesses the effectiveness of processes and controls, as well as overall alignment with organizational policies.

Network Administrator

A Network Administrator manages, maintains, and monitors organization’s computer networks. They are responsible for implementing and configuring network equipment, ensuring continuous operation and optimal network performance, as well as addressing issues and security challenges.

Systems Administrator

A Systems Administrator manages, maintains, and configures servers and computer systems. They ensure the stability and efficiency of the IT infrastructure, perform updates and upgrades, and implement security policies to protect data and resources.

Cloud Administrator

A Cloud Administrator manages cloud infrastructure and services. Responsible for configuring, monitoring, and managing cloud resources, they ensure the scalability, availability, and security of cloud services. They also provide technical support and advise on best practices for cloud optimization and security.

Module Example

Cyber Security Defences

In this module, students gain both practical skills and theoretical knowledge necessary for protecting, detecting, and responding to security threats within network systems. The module covers topics such as fundamentals of network infrastructure, advanced defence techniques, network security policies and procedures, as well as security incident analysis and response. Students will also learn to implement and manage security devices, secure wireless networks, and threat management.

Study type

On campus

Medium of instruction

Croatian, English

Study programme duration

8 semesters (4 years)

Semester duration

15 weeks of active teaching
+ 4 examination weeks

Total number of ECTS points

240

Algebra University Title

bacc. ing. comp.

Bachelor in Cyber Security

Certifications obtained during studies

ITIL

Red Hat Certified System Administrator – RHCSA

RHCE

AZ-900 Microsoft Azure Fundamentals

AZ-305

FORTINET

CND

Cisco Certified Network Administrator – CCNA

CEH

CPENT

MS AZ-500 Microsoft Azure Security Technologies

CISSP (additional cost)