Print this page

MSc in Cybersecurity

How to apply

The Programme

The Programme

All modern organizations face security risks that threaten their valuable assets; this program aims to provide high quality training and formal education in cybercrime analysis while gain advanced knowledge to protect organizations against cyber security risks. It is also designed to deliver cutting-edge, up-to-date cybercrime investigation techniques, strategies and tactics that allow students to understand and tackle emerging trends in cybercrime.

This program enhances knowledge and develop practical skills in cybercrime while offers in-depth study, develop critical, analytical and technical skills involving the principles, practices and techniques of Cybercrime Investigation. The courses include lectures and laboratories exercises with the later technologies by leading academics from Greece and abroad, along with projects and dissertation work, which ensures that graduate students equipped with state-of-the-art scientific knowledge and modern practical skills, on their way to become highly competitive at international level.

The main subject areas included in the taught modules:

  • Digital Forensics
  • Intrusion detection and Network Security
  • Security Audit & Compliance

This program is designed for University graduates of Informatics/Computer Science, Electrical Engineering but also of Natural Sciences, Economic and Business Departments, with a background in ICT and a strong motivation to pursue a career in Cyber Security.


The Structure

The MSc in Cybersecurity (full-time) is a 14-month programme taught over three terms. Lectures mainly take place on weekday evenings. It is also available in part-time mode over 26 months for those who cannot commit to a full-time programme either for work or other reasons. The programme is also available through distance learning.

Distance Learning teaching methods involve:

(a) Face-to-face or classroom based learning: Students will be required to be physically present at the University for a weekend at the beginning of each semester

(b) Synchronous learning: Student will have to attend remotely the classes which will be held regularly during each semester, weekday afternoons (about 2-4 times per week depending on the mode, always after 17:00)

(c) Asynchronous learning: Students will use online learning resources and will be assessed through a variety of diagnostic tools and formative assessment techniques

(d) Summative assessment: Students will be required to be physically present at the University for the final exams at the end of each semester.

Upon arrival at the IHU all students attend foundation courses in Java and SQL, that aims to bring all incoming students to the same level with respect to some of the programming knowledge that is required. During the first term, all students are required to follow five (5) mandatory core courses. During the second term, all students follow a further three (3) required courses combined with two (2) elective courses. Finally, during the third term, work is dedicated exclusively to the Master's dissertation.


Applications are open!


Programme brochure


Programme announcement





INTERNATIONAL HELLENIC UNIVERSITY - CompTIA Authorized Academy Partner. Please contact Dr. Baltatzis for further information/details.




During the second term students tailor their programme further by choosing elective courses. The choice of elective courses must sum up to 12 ECTS (2 courses). Some of the elective courses may not be offered in a particular year, depending entirely on student demand.


1st Term Core Courses


2nd Term Core Courses


2nd Term Elective Courses

Part-timers attend the following courses during the two (2) years of studies:

1st Year

Term 1: Computer Networks, Information Systems Security, Data Protection and Cryptography | Term 2: Computer Forensics, Intrusion Detection and Event Management

2nd Year

Term 1: Cybercrime and Incident Response, Legal and Ethical Foundations of Privacy and Security | Term 2: Penetration Testing, Two (2) electives | Term 3: Dissertation




During the third term, students work on their Masters Dissertation project, the thematic area of which is relevant to their programme of studies and their interests. The dissertation provides a good opportunity to apply theory and concepts learned in different courses to a real-world Cybersecurity problem or challenge. Students are supervised throughout their projects by a member of the academic faculty and the academic assistants. After submission of the dissertation, students present their projects to classmates and faculty at a special event.


Career paths

Career paths

Throughout history, communications security, data protection and information assurance have always been issues of outmost importance to every company, organization and government. The internet revolution boosted the role of information (and its protection) to an unparalleled level of significance, as virtually every individual or organization is storing or transmitting increasing volumes of sensitive data electronically. Even though communications and security specialists were always sought after, the rapid evolution of relevant technologies and the penetration of their applications to every aspect of human life have increased the level of complexity of the required solutions. In the US alone, the Bureau of Labor Statistics projects 36.5% employment growth for this profession by 2022.

What is also important, for a prospective security specialist to know, is that security specialists are working in close collaboration with the management of their organization, which gives their job a burden of responsibility but also provides great opportunities for longevity and promotion to the higher levels of the hierarchy. Today, the role of a company's CIO (Chief Information Officer) has been recognized as a strategic position that creates an interface between the management and the ICT.

Graduates from the MSc in Cybersecurity programme can play a pivotal role in the unremitting operation of virtually any company or organization, by safeguarding their most valuable asset, their information. Therefore, a multitude of employment opportunities are envisaged for graduates of this programme. Indicatively they include:


  • ICT companies
  • Government organisations and institutions
  • Multinational Corporations and Small and Medium Enterprises (SMEs)
  • e-business companies
  • Mobile network providers and broadband Internet providers
  • Sensor networks and telematics companies
  • Consulting and auditing companies
  • Research institutes
  • Education, training and certification
  • Defense industry


In addition to technical skills gained through study, our students benefit from the University's excellent Careers Office, in order to attain essential soft skills (e.g. communication skills, interview preparation, CV writing etc.) to better prepare for the job market.