Academic year 2020/2021

CYBERSECURITY Degree Programme Profile

Basic Information

Qualification awarded

Master Degree in CYBERSECURITY

Qualification Type/Level

EHEA Second cycle, EQF level 7

Number of Years/credits

2 years; 120 ECTS

Mode of Study


*All Degree Programmes are planned and organised for full-time students. It is possible, however (without special arrangements), to proceed through the course of study at one's own pace. This makes it possible, if necessary, to accommodate employment or other non-university activities or obligations.

Name of the Course Director and other contact information

President of the Degree Course Council:


Internationalization Coordinator (CAI):
Prof. Prof. Luca Sanguinetti

Language of Teaching


Admission Requirements

Formal Requirements

A three-year degree in Computer Science (Class L-31), or in Information Technology (Class L-8).

Students with a 3-year Bachelor’s degree from another class obtained in Italy or equivalent qualifications obtained abroad can be admitted if they have acquired at least 54 ECTS (Italian equivalent CFU) credits in the following sectors:

At least 36 credits in ING-INF/01 (Electronics), ING-INF/03 (Telecommunication), ING-INF/05 (Computing Systems) sectors or INF/01 (Computer Science sector)
At least 18 credits in the mathematics or physics sectors.
A good knowledge of English is required (Level B2 or higher).

Possible assessment prior knowledge and competences

the assessment of prior knowledge is based on CV for EU students and, when necessary, on an interview.

Required knowledge and competences support programmes

Students whose curricula lacks of some competences may need to take extra first cycle course units before admission

General Information

Programme Profile

The Master’s Degree in Cybersecurity responds to the growing need for trained specialists with high scientific and technological expertise in the field of cybersecurity. To this end, it provides its graduates with a deep knowledge of the scientific foundations, methodologies and technologies of the area, which allows them to contribute to the advancement of knowledge and to be able to deal with cybersecurity in the most diverse application areas.

In particular, this is the first master’s degree in Italy that addresses the security aspects at both hardware and software levels.

The degree also addresses the context of cybersecurity, consisting of organizations and companies that need to protect themselves from security risks, and the legal aspects of information security.

The degree program is designed to be profitably attended by students with strong knowledge of computer science or computer engineering from different degree classes, including those of Information Engineering classes and Computer Science and Technology.

The course is entirely delivered in English.

The master is offered by the departments of Information Engineering and of Computer Science of the University of Pisa.

Key Learning Outcomes

- Knowledge of the scientific and technological aspects related to IT security and state-of-the-art solutions for the design, construction, verification and maintenance of safe and secure IT infrastructures and systems;

- knowledge of the aspects related to the organization of companies and the risk aspects related to the use of information technologies in the construction of their infrastructures and in data management;

- knowledge of the legal aspects regarding the protection of IT systems and treatment of data managed with digital tools; knowledge on the design of IT and data management systems in accordance with current legislation;

- ability to keep pace with technological innovation in cybersecurity, also by drawing on scientific publications in the field of cybersecurity

- ability to design and evaluate innovative IT security solutions

Occupational Profile/s of Graduates

Designer of secure IT systems and applications:
Design, development, evaluation, verification and management of complex communication systems and infrastructures meeting the most stringent security needs.
Skills: Deep knowledge of methodologies and technologies related to information security and of the legal aspects related to data processing and their security; ability to understand and integrate new technologies; strong capacity for critical analysis and evaluation of complex problems, also in relation to the many application areas mandating the adoption of secure IT systems; understanding of the company organization from the point of view of IT security.
Where: Companies, public bodies and public administrations operating in the field of production and IT services.

Cyber ​​security researcher:
Research on theories, methodologies and applications, in all areas of IT security.
Skills: deep knowledge of the scientific and technological foundations of IT security and secure data management; ability to abstract and model complex IT systems and networks; knowledge of the problems posed by the interaction between IT security and other scientific / technological disciplines.
Where: public and private bodies operating in the IT security research sector, and scientific research in general. It is also possible to access subsequent university study levels, such as the PhD in Computer Science, Information Engineering and doctorates in related disciplines.

Cyber ​​Security Specialist:
Supervision, coordination and management of IT security policies and activities for companies and public administrations relating to the analysis, design, management and maintenance of information systems and networks.
Skills: the IT security specialist is a skilled professional in technologies and methodologies for IT security and in the safe and reliable management of data. The specialist has also deep knowledge of the business organization and of the legal aspects of IT security, that allow him / her to cope with the various IT security needs of companies and public administrations. Specific skills concern the ability to analyze IT systems for the prevention, discovery, mitigation of and recovery from cyber attacks, and the ability to design or remodel the existing IT infrastructures to meet specific security needs.
Where: Companies, public bodies and public administrations operating in the field of production and IT services.

Access to further study

PhD studies in Computer Science/Computer Engineering

Assessment methods, examination regulations, and grading

Assessment is normally by means of an oral or written examination; in some cases there are intermediate exams during the course; other elements (participation in discussion, written or oral reports, commentary of texts etc. ) are foreseen in specific course units and are described in the Course Unit Profiles.
The grading system for the course units consists of 30 possible points, plus 'lode' (cum laude) in case of excellence. Marks are given by the lecturer based on the performance as ascertained in a public examination by a board of at least two teachers. The main exam sessions are held in June/July; September; and January; students may resit exams**. Actual grading curves differ in different degree programmes. The University of Pisa provides an ECTS Grading Table, which shows the actual distribution, of the examination and final grades among students for each degree programme, in order to facilitate the comparison with other grading systems. ---> Link to ECTS Grading Table
An overall mark is given on the occasion of the 'Final Exam', when a written research text is presented and discussed. The final overall mark is calculated based on the results of the marks obtained in the single course units and the final exam, and is based on 110 possible points, with the possible further mention of honours ("lode" or cum laude).

**The exam sessions are organised into sessions (the dates vary according to the Department and are published in the Department's academic calendar). In each session there are a certain number of 'appelli' [calls], or dates on which the examination for each course unit may be taken. The 'appelli' are fixed by the teacher. The students choose which of the appelli they wish to respond to. In most cases, it is obligatory to sign up before the specified date.

Requirements (regulations) to obtain the qualification

See course structure diagram and available courses.
For additional information, go to the programme website

Course structure diagram

Available courses, 2020/2021