
Cyber Security Engineering
Campus universitaire d'Óbuda, Hongrie
Graduate engineers will be able to carry out research and development tasks in their field of specialisation and to manage such teams independently, and will be able to understand the interrelationships and challenges between several areas of cyber security, such as information security, audit requirements, security requirements for critical infrastructures, and technical and technological protection solutions (processes and technologies in a security operations centre, security of communications, security of data storage, protection of assets). The Master’s degree will entitle the holder to undertake doctoral studies.
a) knowledge
Knowledge of the general and specific features of cyber security (cryptography and information security policies, attack methods and tools, theoretical and practical tools, solutions and limits of a security operations centre. Familiarity with the main trends (traffic and log analysis and malware analysis techniques and research methodologies supported by artificial intelligence). Understand the impact of cybersecurity on other ICT technologies (mobile networks, IoT, cybersecurity challenges of cloud computing systems). In-depth knowledge of the intricacies and interconnections of the complex system of information security, cryptography, endpoint protection, audit, risk management, traffic and log analysis, terminology that builds up the cybersecurity disciplines. Basic communication, leadership, process organisation and project management skills. Basic knowledge of quality assurance, information security legislation and standards. Possess the range of knowledge required for entry to doctoral studies in the relevant field and in other fields of study. Knowledge of a wide range of problem-solving techniques for research or academic work.
b) skills
The ability to apply scientific and technical knowledge to the design and development of cybersecurity systems and techniques, and to analyse and evaluate the performance, effectiveness, adequacy and conclusions of these systems. Ability to apply the ‘secure by design’ principle when designing security requirements for IT systems. Ability to organise processes and manage teams at different levels (incident handler, analyst and manager) in a security operations centre. Ability to manage research and development projects. Continuously train and keep abreast of cyber security developments. Ability to communicate on technical issues in both English and Hungarian with both users and professional colleagues.
c) attitude
Open to professional training for self-learning and self-development, and is committed to practice-oriented, precise, methodical and quality work. Ability to manage and implement research, development and innovation objectives. Commitment to compliance with and enforcement of IT security, institutional security and information security requirements. Ability to work collaboratively, as part of a team and, after appropriate training, to take on leadership responsibilities. Dedicated to educating the next generation of professionals and to promoting a security-aware approach and use. The ability to apply and put into practice the knowledge acquired. In relation to the specialisation completed, be able to: plan, organise and manage the development of technologies, processes and roles in a security operations centre and apply the necessary interdisciplinary knowledge. Ability to apply quality assurance of systems, technologies and processes used in cybersecurity, as well as relevant information security legislation and standards.
d) their autonomy and responsibility
It takes a responsible approach to cybersecurity principles, and plays an independent and proactive role in technical issues and development directions. He/she takes responsibility for the findings and professional judgements in his/her opinion and for the work processes carried out by him/her or under his/her supervision. In making professional decisions, he/she has a responsible attitude towards and observance of the principles of environmental protection, quality assurance, health and safety at work, and takes account of the principles of technical, economic and legal regulation.
Programmes similaires
Master et études supérieures
24 mois
Gestion des risques de cybersécurité (MBA)
Université Seton Hill, Greensburg, États-Unis
Première session
juin 2026
Frais de scolarité bruts
28350 $
Licence
12 mois
Cybersécurité (Recharge)
Université de Roehampton, Londres, Royaume-Uni
Première session
janvier 2026
Frais de scolarité bruts
17628 £
Licence
48 mois
Cybersecurity BS MS
Université de la Miséricorde, Bronx, États-Unis
Première session
février 2026
Frais de scolarité bruts
23650 $
Licence
48 mois
Opérations cybernétiques - Défense et criminalistique (BAS)
Université d'Arizona, Tucson, États-Unis
Première session
mai 2026
Frais de scolarité bruts
39958 $
Licence
48 mois
Opérations cybernétiques - Ingénierie cybernétique (BAS)
Université d'Arizona, Tucson, États-Unis
Première session
janvier 2026
Frais de scolarité bruts
39958 $
Assistant IA Uni4Edu



