No. 1 quality assurance system in Croatia
Creating a digital future in Croatia for 25 years
Institutional exchange agreements with more than 100 institutions
96% of alumni employed 3 months after graduation
The Cyber Security study programme equips students with the knowledge and skills needed for cyber security careers and for the roles of systems and network administrators.
This study programme is ideal for individuals who like to think outside of the box, and are committed to continuous learning, as well as excel at solving complex problems.
Upon completing the study programme, students will have acquired all necessary skills to implement and maintain sophisticated information systems built on the latest technology. The four-year Professional Bachelor Study Programme in Cyber Security offers students the expertise required to build a successful career in the IT industry, with a particular focus on cyber security, applicable worldwide. The curriculum integrates theoretical knowledge with practical skills in computing and cyber security. It includes analytical skills for threat assessment, techniques for data collection and analysis for security purposes, as well as the use of modern tools and technologies to implement robust security controls and policies in ICT environments. Additionally, the mandatory internship with leading companies enables students to apply their skills in real-world settings, further enhancing their readiness for the labour market.
Curriculum Structure
This programme equips you with the skills and knowledge needed to launch a career in cyber security, both in Croatia and internationally. Here’s a brief overview of what you’ll learn:
Examples of jobs we’re preparing you for
Cyber Incident Responder
A Cyber Incident Responder monitors an organization’s security posture, manages incidents during cyberattacks, and ensures the continuous operation of ICT systems. In addition to developing and maintaining an incident response plan, this expert identifies the root causes of incidents, conducts analysis and mitigation, and restores the functionality of systems and processes.
Cyber Threat Intelligence Specialist
A Cyber Threat Intelligence Specialist oversees the threat intelligence lifecycle, from data collection to analysis and production of actionable reports. This role involves identifying the tactics, techniques, and procedures used by cyber attackers, providing critical information for organizational defences.
Cyber Security Implementer
A Cyber Security Implementer develops, deploys, and manages cyber security solutions. Responsible for the technical development, integration, testing, implementation, and maintenance of these solutions, this role ensures adherence to specifications and compliance requirements.
Cyber Security Architect
A Cyber Security Architect plans and designs security solutions based on security and privacy principles. This expert develops architectural models, coordinates secure development, integration, and maintenance of cyber security components, and ensures compliance with standards and requirements.
Digital Forensics Investigator
A Digital Forensics Investigator ensures that cybercrime investigations uncover all digital evidence to substantiate malicious activity. This role includes connecting digital artifacts to individuals, documenting, and analysing digital evidence.
Penetration Tester
A Penetration Tester evaluates the efficiency of security controls by identifying and exploiting vulnerabilities. They plan, design, conduct, and execute penetration testing activities to assess the efficacy of implemented security measures.
Cyber Security Auditor
A Cyber Security Auditor conducts audits of an organization’s ecosystem to ensure compliance with legal and regulatory requirements. This expert independently assesses the effectiveness of processes and controls, as well as overall alignment with organizational policies.
Network Administrator
A Network Administrator manages, maintains, and monitors organization’s computer networks. They are responsible for implementing and configuring network equipment, ensuring continuous operation and optimal network performance, as well as addressing issues and security challenges.
Systems Administrator
A Systems Administrator manages, maintains, and configures servers and computer systems. They ensure the stability and efficiency of the IT infrastructure, perform updates and upgrades, and implement security policies to protect data and resources.
Cloud Administrator
A Cloud Administrator manages cloud infrastructure and services. Responsible for configuring, monitoring, and managing cloud resources, they ensure the scalability, availability, and security of cloud services. They also provide technical support and advise on best practices for cloud optimization and security.
Module Example
Cyber Security Defences
In this module, students gain both practical skills and theoretical knowledge necessary for protecting, detecting, and responding to security threats within network systems. The module covers topics such as fundamentals of network infrastructure, advanced defence techniques, network security policies and procedures, as well as security incident analysis and response. Students will also learn to implement and manage security devices, secure wireless networks, and threat management.
Study type
On campus
Medium of instruction
Croatian, English
Study programme duration
8 semesters (4 years)
Semester duration
15 weeks of active teaching
+ 4 examination weeks
Total number of ECTS points
240
Algebra University Title
bacc. ing. comp.
Bachelor in Cyber Security
Certifications obtained during studies
ITIL
Red Hat Certified System Administrator – RHCSA
RHCE
AZ-900 Microsoft Azure Fundamentals
AZ-305
FORTINET
CND
Cisco Certified Network Administrator – CCNA
CEH
CPENT
MS AZ-500 Microsoft Azure Security Technologies
CISSP (additional cost)