By using our website you’re agreeing to use of cookies for better user experience. Check our Privacy Policy for details.

Cyber Security

Harbour.Space students gain knowledge of the most sophisticated encryption methods and threat detection techniques under the capable leadership of cyber security giant Kaspersky Lab.

Programme overview

  • 3 years
  • Full-time Duration
  • 19 900 EUR Tuition Fee/Year
  • 180 ECTS ECTS
  • English Language of Instruction
  • All Year Round Application Period

As enterprise is becoming focused on the security of its information systems, the demand for cybersecurity specialists continues to expand.  The Bsc in Cybersecurity prepares students to handle the full variety of threats and challenges faced by the modern enterprise. Students start with foundations in mathematics and computer science, continue with programming and security tools and arrive at the understanding of the full range of current cyber threats, enterprise security architecture as well as legal and ethical aspects of security.

See full curriculum Programme structure

In the first year, students obtain the foundational theoretical knowledge they need to become cybersecurity professionals. The programme builds the mathematical basis upon which students will develop understanding of programming, computer networks and enterprise information systems during following years. The courses are mostly given in a form of lectures and takeaway coursework.

  • Combinatorics & Graphs - 1
  • Foundations of programming – 1
  • Calculus – 1
  • Foundations of mathematical logic
  • Linear algebra -1
  • Data structures and algorithms – 1
  • Combinatorics and graphs – 2
  • Calculus – 2
  • Data structures and algorithms – 2
  • Linear algebra – 2
  • Computer Organisation and Systems
  • Combinatorics
  • Operating systems
  • Calculus – 3
  • Capstone Project
  • Seminars & Workshops

In the second year, students complete the foundations with courses in programming, scripting, machine learning and databases and continue to study security of operating systems and networks. The second year also offers a fundamental courses in cryptography and principles of secure programming. Most courses require practical coursework and a course project enabling students to get a feel for the challenges and approaches used in this field. The students will also begin developing software for the Capstone project.

  • Probability theory
  • Introduction to Statistics
  • Java
  • Practical Unix
  • Parallel and Disrtibuted Computing - 1
  • Introduction to Cyber Security
  • Machine learning – 1
  • Secure Programming
  • Compilers
  • Introduction to Computer Networking
  • Database Systems Principles
  • Windows Administration
  • Introduction to Cryptography
  • Scripting Languages
  • Web Applications
  • Captstone Project
  • Seminars & Workshops

During the third, the final year, students focus on veriety of cybersecurity topics including advanced network management, operating system security, policy analysis and implementation, vulnerability analysis and legal environment. The courses are taught by researchers and professionals who practice the material they teach either academically or professionally. This is the best time to learn cybersecurity first hand from leading practitioners. The goal of the final year is to expose students to a range of real-world security challenges and mitigation strategies and to ensure seamless transition into a professional roles.

  • Linux Administration
  • Human Aspects of Cybersecurity: Law, Ethics and Privacy
  • Disaster Recovery
  • Advanced Network Management & Security
  • Operating Systems Security
  • Policy Analysis and Implementation
  • Enterprise Information Systems & Clouds
  • Ethical Hacking
  • Risk Management
  • Vulnerability Analysis, Penetration Testing
  • Data Visualization
  • Mobile Application Development
  • Technical Project Management
  • Performance Oriented Computing
  • Computer Forensics
  • Software Testing, Verification and Validation
  • Leadership & Group Dynamics
  • Writing, Documentation, TeX, JavaDoc, Academic
  • Captstone Project
  • Seminars & Workshops
  • 2 years
  • Full-time Duration
  • 22 900 EUR Tuition Fee/Year
  • 90 ECTS ECTS
  • English Language of Instruction
  • All Year Round Application Period

The MSc programme is designed for those who want to extend their technical and programming skills to handling enterprise security challenges. Our comprehensive courses will provide a solid foundation in key technology including computer and network security, cryptography, enterprise security architecture analysis, etc.  The graduates will learn to stay current on rapidly changing technology, adapt and control to new threats and start a successful career in enterprise security.

See full curriculum Programme structure

During the first year students quickly recap basics of computer science and then focus on fundamentals of cybersecurity including computer architecture, operating systems security, secure programming, networks, and cryptography.

  • Computer Architecture
  • Secure Programming
  • Algorithms and Data Structures
  • Practical Unix
  • Windows Administration
  • Operating Systems
  • Computer Networking
  • Human Aspects of Cybersecurity: Law, Ethics and Privacy
  • Cryptography
  • Software Engineering & Design
  • Scripting Languages
  • Java Programming
  • Identity and Access Management
  • Technical Writing and Presenting
  • Introduction to Interaction Design
  • Leadership and Group Dynamics
  • Secure Data management
  • Captstone Project
  • Seminars & Workshops

The second year exposes students to different dimensions of cybersecurity field. Subjects range from Mobile and Cloud Security to Digital Forensics and Quantum Communication and Cryptography. Additionally students participate in communication and leadership modules preparing them for the career as a successful member of a professional team. At the end of the programme, graduates will be ready to take on responsibilities to safeguard an organization’s information and technology assets.

  • Technical Project Management
  • Application Security
  • Mobile Security
  • Network Security
  • Enterprise Security Architecture and Design
  • Software Testing
  • Reverse Software Engineering
  • Vulnerability Analysis, Penetration Testing, Intrusion Detection and Incident Handling
  • Ethical Hacking and Response
  • Cyber Warfare
  • Security Tools for Information Security
  • Digital Forensics
  • Quantum Communication and Cryptography
  • Parallel and Distributed Computing
  • Cloud Computing
  • Advanced computer networks
  • Distributed Databases
  • Global Cyber Capabilities and Trends
  • Enterprise Security Threats
  • Enterprise Security Case Studies
  • Economics of Security
  • Cyber Risk Management

Faculty Cyber Security

We're delighted to introduce some of our excellent teachers. Keep track of more news about who's coming to share their expertise at Harbour.Space on our Twitter and Facebook.

Programme leadership

PhD, Faculty Leader

Konstantin Mertsalov is European Director of Development at Rational Enterprise, a globally leading software development company specialising in enterprise information management.

Career path projection

  • Junior security engineer 
    Junior security engineer conducts incident/event investigation analysis and tests security products and systems to detect security weaknesses.
  • Security Engineer
    Security Engineer builds and maintain IT security solutions for an organisation, develops technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks. 
  • Security Director
    Security Director oversees the implementation of all IT security measures throughout an organisation required to ensure the security of equipment, information, and personnel from fraud, internet hacking, physical assault, industrial espionage, terrorism or robbery.
  • Security Architect
    Security Architect creates complex security structures and thinks like a hacker would, because he/she must anticipate all of the moves and tactics that hackers will use to try and gain unauthorized access to the computer system. 
  • Chief Information Security Officer (CISO)
    A Chief Information Security Officer (CISO) establishes and maintains the enterprise vision, strategy and programmes to ensure information assets and technologies are adequately protected. 
  • There are two types of companies: those who have been hacked, and those who don't yet know they have been hacked.
  • As the world is increasingly interconnected, everyone shares the responsibility of securing cyberspace.
  • Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted, because none of these measures address the weakest link in the security chain.

Apply for 2020-2021

Go to Admissions
Leave your e-mail
And we addition will send you a link to the programme, so you will not lose it

No, thanks
Request a call
If you are thinking to apply to Harbour.Space university just get in touch. We'd love to talk.

Thank you!
We call soon
Keep an eye out for an activation email in your inbox. Once you’ve followed the link in our email.
Request free information about Harbour.Space
1 minute to complete and fast response time

Thank you!
We call soon
Keep an eye out for an activation email in your inbox. Once you’ve followed the link in our email.

Get Full Curriculum

Master in interaction design

Please enter the name

Please enter a correct email address


We have just sent the full curriculum of the Interaction Design Master’s Programme to the email you have provided

Request free information about Harbour.Space
1 minute to complete and fast response time

Thank you!
We call soon
Keep an eye out for an activation email in your inbox. Once you’ve followed the link in our email.
Log in

Forgot your password?

New To Harbour.Space?
I Already Have An Account
Create an account to get the access to the application process and more.

Password recovery
Enter your email and we’ll get back to you right away.
Thank you.
You're almost there.
Keep an eye out for an activation email in your inbox. Once you’ve followed the link in our email, you're all set.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt.


Purple Friday
is coming!

Register now and apply between Friday, November 27th to Monday, November 30th and get a 32% discount on the application fee and €3,000 off the tuition fee upon acceptance.

In case that wasn’t enough, all applications completed during that period will be at the top of our list for scholarship consideration.

Apply now

*Restrictions apply if you’re considered for one of our scholarships.