Image for Cyber Security

Cyber Security

Cyber security experts are one of the most sought-after computer experts. With the increasing number of cyber threats and attacks, there is a growing need for specialized professionals who can respond to all these challenges.

  • No.1 professional study program in Croatia
  • Creating a digital future in Croatia for 23 years
  • International exchange with more than 100 institutions
  • 96% of alumni employed 3 months after graduation

Upon completion of your studies, you will become experts with the knowledge and skills that will enable you to protect any information and telecommunication infrastructure from various and numerous cyber attacks. To achieve this, you will use risk analysis, threat management, implement various security technologies and conduct various security controls and penetration testing of ICT systems, and perform forensic investigations during and after cyber-attacks. In addition to acquiring the necessary technological knowledge and skills, you will also develop the skills of systematic analysis and problem-solving in the context of complex ICT systems, and all the necessary skills of critical thinking and understanding of modern business.

Course content and teaching methods are continuously adapted to technological trends and labor market needs so that you will have acquired instantly applicable knowledge and skills at the time of graduation. These skills and knowledge will enable you to quickly find your place on the job market that primarily fits your career development plans.

Student guide

What are the takeaways from the graduate Computer Engineering program?

Graduate studies allow you to further perfect your know-how of your favorite field. We’ll transfer the latest industry trends, insights and skills that employers demand onto to you. Here is a snapshot of some of them:

The graduate course program has been conceived based on recommendations from the European SOCRATES network and satisfies the criteria based on ASIIN accreditation agency recommendations, which are applicable in the field of computer engineering.

Cyber Security Defenses

Design a secure cyber environment using security best practices and business continuity and disaster recovery plans.

Threat Management and Incident Response

Analyze internal and external security threats and implement security mechanisms to protect an organization’s data and establish incidence response procedures.

Ethical Hacking and Penetration Testing

Take pre-emptive measures against malicious attacks using ethical hacking techniques and by attacking the system themselves within legal limits.

Digital Forensics

Perform an effective digital forensics investigation.

Applied Cryptography

Apply cryptographic algorithms to real problems.

Cyber Security Management

Establish rules in design, implementation and maintenance of security in information systems and learn how to transform practical experience into managing role in cyber security.

Examples of jobs we're preparing you for:

  • Cyber Security Analyst
    As a security analyst, you will be in charge of monitoring network and computer logs, drawing conclusions based on research and documentation and reporting security incidents.
  • Security Specialist
    As a security specialist, you will oversee testing and maintaining firewalls and antivirus software, conducting employee security training, and proposing improvements for security vulnerabilities.
  • Digital Forensics Investigator
    Digital forensics investigators retrieve information from computers and other digital devices to discover how unauthorized persons gained access to a system or gather evidence for legal purposes.
  • IT Auditor
    As an IT auditor, you will assess your organization’s technology for potential issues with security, efficiency and compliance.
  • Security Systems Administrator
    You are typically in charge of the day-to-day operations of an organization’s cybersecurity.

Example Class

Ethical Hacking

This module is designed for students to gain insight into the current global security situation and the increasing number of hacking attempts on various information systems. The goal of ethical hacking is to assist organizations in taking pre-emptive measures against malicious attacks by simulating tactics, techniques and procedure used by attackers, while remaining within legal limits. This module provides students with an in-depth understanding of different hacking phases, various attack vectors as well as pre-emptive countermeasures. This module was developed to incorporate a practical environment and a systematic process across all ethical hacking domains and methodologies. This gives students the opportunity to demonstrate the knowledge and skills required to perform the job of an ethical hacker.

See more

Learn all about the study program

Download our brochure, reach your full potential and discover how to create your own world. Learn all there is to know about the study program, student experience and Croatia as a study abroad destination.

  • This field is for validation purposes and should be left unchanged.