{"id":24,"date":"2020-05-06T06:56:11","date_gmt":"2020-05-06T06:56:11","guid":{"rendered":"http:\/\/cybersecurity.di.unipi.it\/?page_id=24"},"modified":"2025-01-30T10:55:21","modified_gmt":"2025-01-30T10:55:21","slug":"excerpts-of-the-teaching-rules","status":"publish","type":"page","link":"https:\/\/cysec.unipi.it\/?page_id=24","title":{"rendered":"Admission and course structure"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Admission requirements<\/h2>\n\n\n\n<p>The degree program is free access.<\/p>\n\n\n\n<p>The general curricular requirement for admission is the possession of a three-year degree in Computer Science (Class L-31), or in Information Technology (Class L-8).<\/p>\n\n\n\n<p>Students with a 3-year Bachelor&#8217;s degree from another class obtained in Italy or equivalent qualifications obtained abroad can be admitted if they have acquired at least 54 ECTS (Italian equivalent CFU) credits in the following sectors:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>At least 36 credits in ING-INF\/01 (Electronics), ING-INF\/03 (Telecommunication), ING-INF\/05 (Computing Systems) sectors or INF\/01 (Computer Science sector)<\/li>\n\n\n\n<li>At least 18 credits in the mathematics or physics sectors.<\/li>\n<\/ul>\n\n\n\n<p>A good knowledge of English is required (Level B2 or higher).<\/p>\n\n\n\n<p><a href=\"https:\/\/cysec.unipi.it\/wp-content\/uploads\/2024\/02\/LM_CYBERSECURITY-2024.pdf\">The slides &#8211; in italian &#8211; of a short presentation can be found here<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Open calls for admission of non-EU students<\/h3>\n\n\n\n<p>Each year we publish calls for application for non-EU students not resident in Italy: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/cysec.unipi.it\/?page_id=140\">the call for applications is published here<\/a>,<\/li>\n\n\n\n<li>specific information for <a href=\"https:\/\/cysec.unipi.it\/?page_id=253\" data-type=\"page\" data-id=\"253\">enrolment of non-EU students is published here<\/a>.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.unipi.it\/index.php\/programmes-held-in-english\/item\/17286-master-of-science-in-cybersecurity\">The university page with a brochure and the link to the site of application is here<\/a>.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Course structure since Academic Year 2024\/25<\/h2>\n\n\n\n<p>This course structure is valid only for students enrolled in year 2024\/25 or later. The syllabus and other information about the courses can be found <a href=\"https:\/\/unipi.coursecatalogue.cineca.it\/corsi\/2024\/11291\">here<\/a> (please, select the appropriate academic year).<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Year of course<\/strong><\/td><td><strong>First semester<\/strong><\/td><td><strong>CFU<\/strong><\/td><td><strong>Second semester<\/strong><\/td><td><strong>CFU<\/strong><\/td><\/tr><tr><td>1<\/td><td>group A exam<\/td><td>12<\/td><td>Foundations of cybersecurity<\/td><td>9<\/td><\/tr><tr><td>1<\/td><td>Organizational sciences and information and technology law <\/td><td>12<\/td><td>Language-based technology for security<\/td><td>9<\/td><\/tr><tr><td>1<\/td><td>Data and system security<\/td><td>9<\/td><td>Hardware and embedded security<\/td><td>9<\/td><\/tr><tr><td><strong>Total<\/strong><\/td><td><\/td><td><strong>33<\/strong><\/td><td><\/td><td><strong>27<\/strong><\/td><\/tr><tr><td><\/td><td><\/td><td><\/td><td><\/td><td><\/td><\/tr><tr><td>2<\/td><td>group B exam 1<\/td><td>9<\/td><td>Free choice 2<\/td><td>6<\/td><\/tr><tr><td>2<\/td><td>group B exam 2<\/td><td>9<\/td><td>Final MsC thesis defense <\/td><td>23<\/td><\/tr><tr><td>2<\/td><td>Free choice 1<\/td><td>6<\/td><td>Further activities*<\/td><td>1<\/td><\/tr><tr><td>2<\/td><td>Artificial intelligence for security<\/td><td>6<\/td><td><\/td><td><\/td><\/tr><tr><td><strong>Total<\/strong><\/td><td><\/td><td><strong>30<\/strong><\/td><td><\/td><td><strong>30<\/strong><\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Distribution of the courses in the semesters. <\/figcaption><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Group A exams &#8211; one of:<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Electronics and communication technologies (12 CFU) &#8211; split into modules: Electronics systems (6 CFU) and Communication technologies (6 CFU);<\/li>\n\n\n\n<li>Systems and languages for informatics (12 CFU) &#8211; split into modules: Systems for informatics (6 CFU) and Languages for informatics (6 CFU).<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Group B exams &#8211; two of:<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Advanced software engineering (9 CFU);<\/li>\n\n\n\n<li>System and network hacking (9 CFU);<\/li>\n\n\n\n<li>Network security (9 CFU);<\/li>\n\n\n\n<li>Dependable and secure systems (9 CFU) &#8211; <strong>second <\/strong>semester.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Free choice exams:<\/h4>\n\n\n\n<p>The following free choice exams at the second year are already activated: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Electromagnetic Security (6 CFU);<\/li>\n\n\n\n<li>Biometrics systems (6 CFU).<\/li>\n<\/ul>\n\n\n\n<p>* &#8220;Further activities&#8221; consist in  the acquisition of further competences such as those necessary to initiate the thesis. For this reason they can be considered included in the thesis work. <\/p>\n\n\n\n<p>** Each ECTS credit corresponds to 8 hours of face-to-face lectures and 17 hours of self-study. The only exeptions are the courses: System and network hacking, Dependable and secure systems, Foundations of cybersecurity. For these three courses, that are shared with the M.Sc. in Computer Engineering, each ETCS credit corresponds to 9 hours of face-to-face lectures and 16 hours of self-study.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Course structure up to Academic Year 2023\/24<\/h2>\n\n\n\n<p>This course structure is valid only for students enrolled up to year 2023\/24.The syllabus of the courses can be found <a href=\"https:\/\/esami.unipi.it\/programmi_insegnamenti.php?did=19&amp;cid=353\">here<\/a> (please, select the appropriate academic year).<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Year of course<\/strong><\/td><td><strong>First semester<\/strong><\/td><td><strong>CFU<\/strong><\/td><td><strong>Second semester<\/strong><\/td><td><strong>CFU<\/strong><\/td><\/tr><tr><td>1<\/td><td>at choice &#8211; group A<\/td><td>12<\/td><td>Applied cryptography<\/td><td>9<\/td><\/tr><tr><td>1<\/td><td>Organizational sciences and information and technology law <\/td><td>12<\/td><td>Language-based technology for security<\/td><td>9<\/td><\/tr><tr><td>1<\/td><td>Data and system security<\/td><td>9<\/td><td>Hardware and embedded security<\/td><td>9<\/td><\/tr><tr><td><\/td><td><\/td><td><\/td><td><\/td><td><\/td><\/tr><tr><td><strong>Total<\/strong><\/td><td><\/td><td><strong>33<\/strong><\/td><td><\/td><td><strong>27<\/strong><\/td><\/tr><tr><td>2<\/td><td>Secure software engineering<\/td><td>9<\/td><td>Dependability<\/td><td>6<\/td><\/tr><tr><td>2<\/td><td>Network security<\/td><td>9<\/td><td>Free choice 2<\/td><td>6<\/td><\/tr><tr><td>2<\/td><td>Free choice 1<\/td><td>6<\/td><td>Further activities<\/td><td>1<\/td><\/tr><tr><td>2<\/td><td>Artificial intelligence for security<\/td><td>6<\/td><td>Final MSc thesis defense <\/td><td>17<\/td><\/tr><tr><td><strong>Total<\/strong><\/td><td><\/td><td><strong>30<\/strong><\/td><td><\/td><td><strong>30<\/strong><\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Distribution of the courses in the semesters<\/figcaption><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Group A exams:<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Electronics and communication technologies &#8211; ECT (12 CFU)<\/li>\n\n\n\n<li>Systems and languages for informatics &#8211; SLI (12 CFU)<\/li>\n<\/ul>\n\n\n\n<p>Electronics and communication technologies (ECT) is split in two modules:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Electronics systems (6 CFU);<\/li>\n\n\n\n<li>Communication technologies (6 CFU);<\/li>\n<\/ul>\n\n\n\n<p>Systems and languages for informatics (SLI) is split in two modules:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Systems for informatics (6 CFU);<\/li>\n\n\n\n<li>Languages for informatics (6 CFU);<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Free choice exams:<\/h4>\n\n\n\n<p>The following free choice exams at the second year are already activated: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Electromagnetic Security (6 CFU)<\/li>\n\n\n\n<li>Penetration and defence laboratory (6 CFU)<\/li>\n\n\n\n<li>Biometrics systems (6 CFU)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Additional information<\/h2>\n\n\n\n<p><strong>Erasmus<\/strong> \u2013 Students taking part in the ERASMUS project and students who have applied for a transfer from another course of study, or abbreviation or career reunification, should contact the secretary of the master programme.<\/p>\n\n\n\n<p><strong>Degree marks system<\/strong> \u2013 The final mark is determined by summing the average mark for all examinations, weighted with respect to the number of CFUs, an evaluation of the curriculum and the discussion of the thesis.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Admission requirements The degree program is free access. The general curricular requirement for admission is the possession of a three-year&hellip;<\/p>\n<p><a class=\"btn btn-dark btn-sm unipi-read-more-link\" href=\"https:\/\/cysec.unipi.it\/?page_id=24\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-24","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=\/wp\/v2\/pages\/24","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=24"}],"version-history":[{"count":38,"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=\/wp\/v2\/pages\/24\/revisions"}],"predecessor-version":[{"id":632,"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=\/wp\/v2\/pages\/24\/revisions\/632"}],"wp:attachment":[{"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=24"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}