Cybersecurity Technologies
Study location | Lithuania, Vilnius |
---|---|
Type | Undergraduate, full-time |
Area of study | Professions and applied sciences |
Nominal duration | 3 years (180 ECTS) |
Study language | English |
Awards | (Professional Bachelors in Informatics) |
Accreditation | Acredited by Ministry of Education and Science of Lithuania |
Tuition fee | €4,200 per year |
---|---|
Application fee | €200 one-time Please note, that the Application fee includes all the administrative fees for additional services in double legalization of the documents for students. |
Entry qualification | High school / secondary education (or higher) Applicants interested in pursuing an undergraduate degree at Vilnius Business College must have completed their secondary or high school education. Required Subjects: A pass of 80% in Mathematics Additional Requirements: Applicants from the following countries are required to complete one year of post-secondary education before applying: Nigeria For citizens of Uzbekistan: Either one year of post-secondary education is required, or you must pass an additional exam administered by Vilnius Business College. The entry qualification documents are accepted in the following languages: English. Often you can get a suitable transcript from your school. If this is not the case, you will need official translations along with verified copies of the original. The entry qualification documents must be submitted in English. In cases where your school does not provide transcripts in these languages, you must provide official translations along with verified copies of the original documents. You must take the original entry qualification documents along with you when you finally go to the university. You are required to bring the original entry qualification documents with you when you arrive at Vilnius Business College. |
---|
Territory requirements | Applications are accepted from the following territories (based on citizenship): World. |
---|
Language requirements | English To demonstrate your English language proficiency, you must provide proof of one of the following: FCE (First Certificate in English) Alternatively, you can submit one of the following: LanguageCert IESOL: B1 or higher Exemption Applicants who have completed their previous education in English are not required to submit separate proof of English language proficiency, except applicants from these countries: Nepal, Pakistan and Sri Lanka. |
---|
Other requirements | Specific requirements for Non-EU applicants: official recognition of your qualification conducted by www.skvc.lt |
---|
Overview
Objectives of the study programme:
To prepare qualified cybersecurity specialists capable of developing and implementing secure software, exploring new applications of computer systems, and designing effective data and information processing solutions aimed at protecting organizational data and digital assets from cyber threats by applying artificial intelligence solutions, cloud computing platforms, and data analysis tools.
Learning Outcomes:
1. Demonstrate knowledge of algorithm design and analysis principles, programming paradigms, languages and technologies, data processing and analysis, systems modeling and optimization, as well as concepts and methods of artificial intelligence, the typical stages of the software lifecycle, and methods for software development and maintenance;
2. Understand the theoretical foundations of cybersecurity, including the principles of computer networks, operating systems, programming, and cryptography;
3. Apply technologies for network, software, and data protection, as well as incident management, to safeguard the organization’s digital infrastructure;
4. Apply artificial intelligence and machine learning methods to solve cybersecurity problems;
5. Analyze the needs and architecture of an organization’s information systems, identify security risks and vulnerabilities, define requirements for secure systems, and design reliable information systems that meet business security needs;
6. Identify and manage cybersecurity incidents, conduct penetration testing, and implement intrusion detection and prevention systems to prevent attacks and respond promptly to security breaches;
7. They will be able to apply cybersecurity legislation, standards, and principles of professional ethics to ensure compliance with data protection law and to deal ethically with cybersecurity issues in their professional practice;
8. Work effectively in teams, communicate with IT and non-IT professionals, plan projects, and lead workgroups;
9. Think critically, solve problems, independently improve their knowledge, adapt to the constantly evolving technological environment, and embrace lifelong learning.
Programme structure
To encourage students to be active participants in the study process, the Cybersecurity Technologies study program within the field of Informatics will apply a variety of student-centered teaching and learning methods. These methods are designed to enable students to achieve learning outcomes by not only acquiring knowledge but also developing learning skills and preparing them for independent professional practice.
Throughout the studies, the following teaching and learning activities will be used:
problem-based teaching, case analysis, project-based work, individual assignments, small group work, interactive lectures, demonstrations, pair programming, algorithm visualization, video lecture viewing, self-assessment tests, reflection, guest lecture, outgoing lecture, and others.
Eastern European Time
Eastern European Time