Information and Information Technologies Security 24 months Postgraduate Programme By VILNIUS TECH (Vilnius Gediminas Technical University) |TopUniversities

Information and Information Technologies Security

Subject Ranking

# 701-750QS Subject Rankings

Programme Duration

24 monthsProgramme duration

Tuitionfee

5,950 EURTuition Fee/year

Application Deadline

15 Jun, 2026Application Deadline

Programme overview

Main Subject

Computer Science and Information Systems

Degree

MEng

Study Level

Masters

Study Mode

On Campus

The program is designed to prepare highly qualified specialists in information and information technology security. It focuses on fostering a systematic understanding of the root causes of information security issues, along with methods for their prevention, resolution, and mitigation. The curriculum is structured to impart the latest knowledge and skills from both a professional and scientific perspective, covering modern information security insurance methods and technologies. The program also aims to develop students' original and critical thinking, as well as managerial, research, and innovation skills.
What are the outcomes of this study programme? Knowledge
•    Knowledge of modern cyberthreats, vulnerabilities, risks and attack vectors, covering, but not limited to technological, physical security and social areas, ability to identify and neutralize them, minimize the consequences. •    Understanding of information and information technology security principles and concepts, covering, but not limited to technological, organizational, social and legal aspects, knowledge of modern information systems security mechanisms and ability to apply them, perception of secure information system design and development methods and ability to integrate information security mechanisms into information security systems and processes.
Ability to Perform Research
•    Proficiency in defining perspective research areas, ability to perform literature analysis and cite the literature sources, to plan and to carry out the experiment in the defined problem area, to apply different analytical, modelling and experimental methods, to evaluate qualitative and quantitative information, to apply the experimental results for solving practical problems. •    Ability to perform analysis, logical reasoning, to formulate constructive, reasoned conclusions and recommendations, to understand and criticize ideas and results of other researchers, to prepare scientific research publications, to participate in a scientific discussion.
Special Skills
•    Ability to integrate security mechanisms into software, information systems and processes, to apply cryptographic, secure programming and code security analysis, ethical hacking, cyberforensics, secure network and virtual infrastructure design methods,  understanding of specific security aspects of different operating systems, DBMS and other information systems. •    Ability to evaluate the maturity of information systems and organisations from the security perspective, to apply risk management methods and requirements of information security standards and other regulating documents while organizing the business processes, ability to insure organization's compliance and certification processes according to the security standards requirements, to maintain information security management processes, integrate them with other business processes, projects, to insure business process continuity.
Social Skills   •    Ability to work individually and in a team, to work with colleagues having different educational and professional background, to communicate orally and in writing, to submit proposals and effectively communicate with professionals from other areas. •    To express and defend the opinion, to respect other opinions.
Personal Skills
•    Ability to think critically, independently and constructively, to implement innovative solutions and evaluate their consequences. •    Ability for self-improvement, forming and increasing the knowledge base, to plan the study process, labour and time, to seek the result.
Graduates can join PhD studies or will have the following carrier opportunities:
•    Chief information security officer  •    Information security auditor •    Penetration-tester •    Security analyst •    Cybercrimes investigator •    IT security project manager •    Security-oriented programmer •    Security-oriented information system architecture •    Security-specialized system administrator

Programme overview

Main Subject

Computer Science and Information Systems

Degree

MEng

Study Level

Masters

Study Mode

On Campus

The program is designed to prepare highly qualified specialists in information and information technology security. It focuses on fostering a systematic understanding of the root causes of information security issues, along with methods for their prevention, resolution, and mitigation. The curriculum is structured to impart the latest knowledge and skills from both a professional and scientific perspective, covering modern information security insurance methods and technologies. The program also aims to develop students' original and critical thinking, as well as managerial, research, and innovation skills.
What are the outcomes of this study programme? Knowledge
•    Knowledge of modern cyberthreats, vulnerabilities, risks and attack vectors, covering, but not limited to technological, physical security and social areas, ability to identify and neutralize them, minimize the consequences. •    Understanding of information and information technology security principles and concepts, covering, but not limited to technological, organizational, social and legal aspects, knowledge of modern information systems security mechanisms and ability to apply them, perception of secure information system design and development methods and ability to integrate information security mechanisms into information security systems and processes.
Ability to Perform Research
•    Proficiency in defining perspective research areas, ability to perform literature analysis and cite the literature sources, to plan and to carry out the experiment in the defined problem area, to apply different analytical, modelling and experimental methods, to evaluate qualitative and quantitative information, to apply the experimental results for solving practical problems. •    Ability to perform analysis, logical reasoning, to formulate constructive, reasoned conclusions and recommendations, to understand and criticize ideas and results of other researchers, to prepare scientific research publications, to participate in a scientific discussion.
Special Skills
•    Ability to integrate security mechanisms into software, information systems and processes, to apply cryptographic, secure programming and code security analysis, ethical hacking, cyberforensics, secure network and virtual infrastructure design methods,  understanding of specific security aspects of different operating systems, DBMS and other information systems. •    Ability to evaluate the maturity of information systems and organisations from the security perspective, to apply risk management methods and requirements of information security standards and other regulating documents while organizing the business processes, ability to insure organization's compliance and certification processes according to the security standards requirements, to maintain information security management processes, integrate them with other business processes, projects, to insure business process continuity.
Social Skills   •    Ability to work individually and in a team, to work with colleagues having different educational and professional background, to communicate orally and in writing, to submit proposals and effectively communicate with professionals from other areas. •    To express and defend the opinion, to respect other opinions.
Personal Skills
•    Ability to think critically, independently and constructively, to implement innovative solutions and evaluate their consequences. •    Ability for self-improvement, forming and increasing the knowledge base, to plan the study process, labour and time, to seek the result.
Graduates can join PhD studies or will have the following carrier opportunities:
•    Chief information security officer  •    Information security auditor •    Penetration-tester •    Security analyst •    Cybercrimes investigator •    IT security project manager •    Security-oriented programmer •    Security-oriented information system architecture •    Security-specialized system administrator

Admission Requirements

60+

Bachelor's degree or its equivalent (official transcripts required) in a relevant field with minimum 60% CGPA and English language proficiency level B2.

Record an interview. 

15 Jun 2026
2 Years
Sep

  • Candidates are required to submit references or letter(s) of recommendation for acceptance
  • Candidates are required to submit an essay(s) for acceptance

Tuition fees

Domestic
5,500 EUR
International
5,950 EUR

Scholarships

TUITION-FREE AND PARTIAL SCHOLARSHIPS FOR MASTER'S DEGREE STUDIES

TUITION-FREE AND PARTIAL SCHOLARSHIPS FOR MASTER'S DEGREE STUDIES
Master Open

Value

100% tuition fee waiver

Deadline

20 Apr 2026

Application requirements

QS Event Attendance is NOT required

Entry requirements

You must be admitted to this school to be awarded

More programmes from the university

Postgrad Programmes 14346