The international Master’s programme in Cyber Security aims to provide students with skills in all aspects of the security of information systems. It gives students a unique chance to study under high-level cyber security practitioners from Estonian banks, telecoms, CERT and the NATO Cooperative Cyber Defence Centre of Excellence. The programme introduces students to this exciting environment and provides them with an opportunity to conduct research within the Estonian Centre of Excellence in Computer Science.
By choosing electable courses, it is possible to specialize in one of the following aspects or a suitable mix of those:
- Organizational aspects - Law, organization, psychology, standards, etc.
- Technological aspects - Networking, attack/defence technology, cryptography.
|Foundations and Management of Cyber Security||Cyber security – foundations, management methods and principles, COBIT, ITIL, ISO 27000.|
|Legal Aspects of Cyber Security||Criminal law, information security, electronic communications. International cooperation. Soft-law. Conceptions and terminology.|
|History of Art of War: From Ancient World to Network-Centric Warfare||Evolution of warfare, role of cyberspace in the modern warfare|
|Information Systems Mass Attacks and Defence||Methods and strategies of defence, teamwork in defence|
|Principles of Secure Software Design||Compromises between functional and security requirements, fault detection and recovery, integrity protection|
|Malware||Worms, trojans, rootkits, botnets. Early detection|
|Introduction to Combinatorics and Elementary Cryptography||Cryptographic algorithms, crypto-analytic techniques, ciphers, Diffie-Hellman key exchange, RSA cryptosystem, digital signatures and Hash functions|
Please find detailed information about curriculum.
Most of the courses will take place in Tallinn, several courses will take place in Tartu. The suggested guide for location is as follows:
1. semester (fall): Tallinn University of Technology
2. semester (spring): University of Tartu
3. semester (fall): Tallinn University of Technology
4. semester (spring): Tallinn University of Technology or University of Tartu, devoted to Master’s thesis.
Students who are not focusing on cryptographic methods will have a possibility of conducting a significant part of the 2. semester studies in Tallinn.
The programme conveys the specialist knowledge and professional skills needed on a career path leading to high-end technical roles (e.g. security analyst, architect or research engineer) or managerial roles (e.g. project/team leader or technology officer). Great networking possibilities and collaboration with leading specialists in the field will present graduates with a range of career opportunities.
The studies can also be continued at doctoral level. The direct follow-up curriculum at TUT is Information and Communication Technology (IAQD).
Please pay attention as this programme you are applying for, has specific prerequisites:
- Bachelor's degree in IT, ICT or Economics or a related field (degree in other field is accepted only if candidate has either previous work experience or in-service training in IT).
- Motivation letter (1-5 points)
- Online lab
- Online interview (1-5 points)
For the programme you apply to, an individual motivation letter (statement of purpose) must be inserted.
Please include following:
- Describe your professional goals. How does the degree programme you are applying for will support your professional profile?
- Why do you apply for the chosen programme? Which of the courses offered in this programme are particularly beneficial in pursuing your professional goals?
- List previous experience (including work experience) in the fields of cyber security, digital forensics, security management or strategies or if you have any law-background or programming experience.
- List achievements that you are very proud of. For example, this might include the development of open-source tools; published academic papers; etc.
- Please point out 1-2 potential research questions of your interest, about which you might consider writing your final MSc thesis.
Candidate must collect at least 2.5 points to continue in the competition.
PS! It is important to properly cite any sources (quotations, publications, ideas which are not your own etc.) used in your motivation letter, because to do otherwise would be plagiarism and result in disqualification.
Questionnaire type of test (mostly multiple choice answers) is a simple Google form. After you have completed the questionnaire, you will be given access to a virtual lab environment.
A good Internet connection is recommended in order to access the virtual lab. The virtual lab is cloud-based so no special hardware or software is required. More detailed information will be sent to your email after completing the initial questionnaire.
After completing both parts of the online test (questionnaire and simulation) you will be informed by e-mail whether you passed the test and may proceed for the online interview or whether your application will no longer be considered. The purpose of the interview is to verify the candidate's suitability for the program. This is to ensure your success in this program. We are trying to understand your academic potential, motivation and suitability for your chosen course. For this reason, the interview will include some technical questions.
Questions are composed to assess your:
- problem-solving abilities;
- intellectual flexibility and analytical skills;
- assimilation of new ideas and information.
Some of the questions are very simple, and some are more intended to make you think. It is not a problem, if you do not know the answer to a specific question. We will ask alternative questions from the same topic area before points are lost. Also a good idea is to speak out loud what goes through your head.
Topics that are covered during interview
Interviews are discussion-based, mainly academic and program-related:
- personal motivation and information provided in the written application;
- engagement with the cyber security area;
- algorithms and scripting/programming;
- network security;
- digital forensics;
- security management & strategies;
- legal and ethical aspects of cyber security;
- potential project idea for thesis topic.
The length of an interview vary between 10-15 minutes and will be conducted by the specialists in the program you have applied for.
Threshold 7 points - applicants receiving at least 7 points on their entrance exams get admissions to TTÜ.
For general admission requirements please visit the Admissions section.
The yearly fee for a typical student is calculated based on 60 ECTS per year (full study load). The following is an estimation based on 2018/2019 fees:
- 1 ECTS is 100 EUR
- first study year is 6000 EUR
PS! Non-EU students must pay in advance for 60 ECTS (yearly load) before starting their studies.
A tuition fee waiver is a non-monetary scholarship granted automatically to the best ranked candidates, according to the points earned in the course of admission. There is no separate application required. Decisions are made based on the Dreamapply application. Scholarship is awarded for the whole study period. Recipients of the scholarships are required to study full-time, i.e. with the workload of at least 60 ECTS per year. If the student starts studying part-time, he/she will lose the tuition fee waiver and will start paying for studies.
Please check here for scholarship options.