Profile of the Programme
The Master degree in Computer Science advances the students’ knowledge in core areas of computer science beyond the undergraduate level and exposes them to current and emerging trends.
The program provides an introduction to research within the field while strengthening the candidate’s effective application of computer science methods. The proposed Master degree in Computer Science is designed to have the learning outcomes related to: knowledge and understanding, application of knowledge and understanding for the analysis, design and development of computer systems. The curriculum prepares the student for a wide variety of computer-oriented careers, such as research, development, management, and teaching. The degree constitutes an independent and terminal study in addition to providing the basis for acceptance to, and continued studies towards, a doctoral degree in computer science.
The program aims of the specialization in Cyber Security focus on the impact of cyber warfare in the contemporary digital era and the analysis of threats, vulnerabilities and risks in a network environment. It also focuses on penetration testing principles and approaches to mitigate potential network attacks.
The program aims of the specialization in Mobile Systems focus on the fundamental concepts of Mobile Computing and wireless technology as well as on the development of software and applications for mobile platforms.
The program aims of the specialization in Blockchain Technologies focus on the fundamentals of digital currencies and the underlying blockchain technology. It also focuses on programmable smart contracts and the associated architectures such as Ethereum. It aims to prepare students on the possible impact of these technologies on various applications including those based on Artificial Intelligence, Machine Learning and Internet of Things.
Upon successful completion of this program, the students should be able to:
– Critically evaluate computer-based systems, processes and programs, and apply theory, practices and tools for their specification, design, implementation and maintenance;
– Critically analyze and evaluate software solutions from the perspective of software architecture and design patterns;
demonstrate initiative and originality in the specification, design and implementation of computer-based systems, processes, and programs, as well as in the implementation of software project management to meet desired functional and quality requirements;
– Critically analyze and evaluate the security risks that may be involved in the operation of computing equipment within a given context;
– Deploy effectively the tools used for the construction and documentation of software, and in particular in the process involved in using computers to solve practical problems;
– Communicate clearly and analytically using techniques derived from scientific practice in group meetings, presentations, lectures, written reports, and research papers;
– Exhibit such skills that are required to participate in research and development work or to independently work in other qualified areas as well as be able to continue studies towards a doctoral degree
Specific Learning Outcomes per Specialization
Cyber Security
Upon successful completion of this concentration, the students should be able to:
1. Employ advanced skills to conduct attacks on networks and systems in a controlled setting to gain practical experience with attack methodologies;
2. Integrate complex key technologies to formulate a set of strategic approaches to defend and countermeasure attacks on networks and systems;
3. Critically analyze and evaluate the cyber warfare landscape, including targets, attack techniques and tools, defense tactics, legislations, and ethical dilemmas;
4. Innovatively practice security as an integral part in the system development lifecycle rather than an add-on feature.
Mobile Systems
Upon successful completion of this concentration, the students should be able to:
– Act with initiative in decision-making for the most appropriate methodology in analyzing and critically assessing existing Services and Protocols in Mobile environments;
– Employ critical thinking for the key issues in designing applications in cross-platform operating systems and achieve a deep and systematic understanding of the technical aspects for platform dependent and platform independent applications;
– Synthesize novel implementations for the efficient utilization of components across platforms, which facilitates scalability and extensibility of mechanisms and applications on different platforms;
– Design and undertake substantial investigations to address significant areas of theory and/or practice, synthesize and construct new knowledge for various Mobile and Wireless networking issues and assess the key methodologies for monitoring Mobile Systems’ performance;
– Build, test, and critically evaluate Mobile software solutions collaboratively (in a group) or autonomously, in order to develop a project in the area of Mobile Systems.
Blockchain Technologies
Upon successful completion of this concentration, the students should be able to:
– Systematically analyze decentralized digital currencies and the underlying blockchain technology;
– Analyze and critically assess the architecture of the bitcoin system, including the data structure used for the bitcoin blockchain;
– Use the Bitcoin Script language to develop different type of scripts using the provided API;
– Systematically analyze the horizontal and vertical application areas of blockchains, beyond digital currencies;
– Envision the disruptive potential of blockchains in combination with other technological developments (IoT, AI, etc.), in the field of money and commerce;
– Provide a deep understanding of smart contracts and their role in the emergence of decentralized applications;
– Critically assess and develop innovative DApps (Decentralized application development).