{"id":1232,"date":"2024-10-16T03:11:49","date_gmt":"2024-10-16T03:11:49","guid":{"rendered":"https:\/\/esst.atechcloudz.com\/?page_id=1232"},"modified":"2025-12-31T10:34:09","modified_gmt":"2025-12-31T10:34:09","slug":"master-cybersecurite","status":"publish","type":"page","link":"https:\/\/esst.cloud\/en\/master-cybersecurite\/","title":{"rendered":"Master&#039;s in Cybersecurity"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1232\" class=\"elementor elementor-1232\" data-elementor-post-type=\"page\">\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-233c57c e-con-full e-flex e-con e-parent\" data-id=\"233c57c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-5a500d2 e-flex e-con-boxed e-con e-child\" data-id=\"5a500d2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5ace77 elementor-widget elementor-widget-spacer\" data-id=\"c5ace77\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-016e138 e-flex e-con-boxed e-con e-parent\" data-id=\"016e138\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-f2ecdeb e-con-full e-flex e-con e-child\" data-id=\"f2ecdeb\" data-element_type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-8a34a5b e-con-full e-flex e-con e-child\" data-id=\"8a34a5b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-092880f e-con-full e-flex e-con e-child\" data-id=\"092880f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8051a78 elementor-widget elementor-widget-image\" data-id=\"8051a78\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/vlcsnap-2025-12-27-15h47m17s856-768x432.png\" class=\"attachment-medium_large size-medium_large wp-image-2531\" alt=\"\" srcset=\"https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/vlcsnap-2025-12-27-15h47m17s856-768x432.png 768w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/vlcsnap-2025-12-27-15h47m17s856-300x169.png 300w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/vlcsnap-2025-12-27-15h47m17s856-1024x576.png 1024w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/vlcsnap-2025-12-27-15h47m17s856-1536x864.png 1536w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/vlcsnap-2025-12-27-15h47m17s856-2048x1152.png 2048w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/vlcsnap-2025-12-27-15h47m17s856-18x10.png 18w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-305e80e e-con-full e-flex e-con e-child\" data-id=\"305e80e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57ef4d5 elementor-widget elementor-widget-text-editor\" data-id=\"57ef4d5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Master&#039;s Degree in Cybersecurity<\/strong><\/p><p>The Master&#039;s in Cybersecurity trains experts capable of protecting information systems against digital threats. This program covers a wide range of skills, including risk management, network security, cryptography, and security incident response.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-dd566fd e-con-full e-flex e-con e-parent\" data-id=\"dd566fd\" data-element_type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-8fb1768 e-con-full e-flex e-con e-child\" data-id=\"8fb1768\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-730f930 e-grid e-con-full e-con e-child\" data-id=\"730f930\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cbc29c6 ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"cbc29c6\" data-element_type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <a href=\"#\" class=\"ekit_global_links\">\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-\">\n                            <div class=\"elementskit-box-header\">\n                <div class=\"elementskit-info-box-icon\">\n                    <img decoding=\"async\" width=\"148\" height=\"148\" src=\"https:\/\/esst.cloud\/wp-content\/uploads\/2024\/10\/Ellipse-1.png\" class=\"attachment- size-\" alt=\"\" srcset=\"https:\/\/esst.cloud\/wp-content\/uploads\/2024\/10\/Ellipse-1.png 148w, https:\/\/esst.cloud\/wp-content\/uploads\/2024\/10\/Ellipse-1-100x100.png 100w\" sizes=\"(max-width: 148px) 100vw, 148px\" \/>                <\/div>\n          <\/div>\n                <div class=\"box-body\">\n                            <h1 class=\"elementskit-info-box-title\">\n                    ACCESS CERTIFICATE                <\/h1>\n                        \t\t  \t<p>The Master&#039;s in Cybersecurity is open to candidates holding a Bac+3 level diploma in computer science, mathematics, statistics or related disciplines. <\/p>\n                                <\/div>\n        \n        \n                <\/div>\n                <\/a>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc25a80 ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"bc25a80\" data-element_type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <a href=\"#\" class=\"ekit_global_links\">\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-\">\n                            <div class=\"elementskit-box-header\">\n                <div class=\"elementskit-info-box-icon\">\n                    <img decoding=\"async\" width=\"148\" height=\"148\" src=\"https:\/\/esst.cloud\/wp-content\/uploads\/2024\/10\/Ellipse-1.png\" class=\"attachment- size-\" alt=\"\" srcset=\"https:\/\/esst.cloud\/wp-content\/uploads\/2024\/10\/Ellipse-1.png 148w, https:\/\/esst.cloud\/wp-content\/uploads\/2024\/10\/Ellipse-1-100x100.png 100w\" sizes=\"(max-width: 148px) 100vw, 148px\" \/>                <\/div>\n          <\/div>\n                <div class=\"box-body\">\n                            <h1 class=\"elementskit-info-box-title\">\n                    Alternation                <\/h1>\n                        \t\t  \t<p>Thanks to our partnerships, we offer an unpaid apprenticeship, with a limited number of places available. This opportunity allows students to combine theory and practice, thus enhancing their professional experience.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n                <\/a>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc5405f ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"fc5405f\" data-element_type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <a href=\"#\" class=\"ekit_global_links\">\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-\">\n                            <div class=\"elementskit-box-header\">\n                <div class=\"elementskit-info-box-icon\">\n                    <img decoding=\"async\" width=\"148\" height=\"148\" src=\"https:\/\/esst.cloud\/wp-content\/uploads\/2024\/10\/Ellipse-1.png\" class=\"attachment- size-\" alt=\"\" srcset=\"https:\/\/esst.cloud\/wp-content\/uploads\/2024\/10\/Ellipse-1.png 148w, https:\/\/esst.cloud\/wp-content\/uploads\/2024\/10\/Ellipse-1-100x100.png 100w\" sizes=\"(max-width: 148px) 100vw, 148px\" \/>                <\/div>\n          <\/div>\n                <div class=\"box-body\">\n                            <h1 class=\"elementskit-info-box-title\">\n                    DURATION OF TRAINING                <\/h1>\n                        \t\t  \t<p>This Master&#039;s program lasts two years, in accordance with the LMD system.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n                <\/a>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-a58fc52 e-flex e-con-boxed e-con e-parent\" data-id=\"a58fc52\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-c6d00f8 e-con-full e-flex e-con e-child\" data-id=\"c6d00f8\" data-element_type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-b4229ea e-con-full e-flex e-con e-child\" data-id=\"b4229ea\" data-element_type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-cd66357 e-con-full e-flex e-con e-child\" data-id=\"cd66357\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-aea4cba e-con-full e-flex e-con e-child\" data-id=\"aea4cba\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e157510 elementor-widget elementor-widget-image\" data-id=\"e157510\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/vlcsnap-2025-12-27-15h45m42s683-768x432.png\" class=\"attachment-medium_large size-medium_large wp-image-2530\" alt=\"\" srcset=\"https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/vlcsnap-2025-12-27-15h45m42s683-768x432.png 768w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/vlcsnap-2025-12-27-15h45m42s683-300x169.png 300w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/vlcsnap-2025-12-27-15h45m42s683-1024x576.png 1024w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/vlcsnap-2025-12-27-15h45m42s683-1536x864.png 1536w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/vlcsnap-2025-12-27-15h45m42s683-2048x1152.png 2048w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/vlcsnap-2025-12-27-15h45m42s683-18x10.png 18w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-f9540f6 e-con-full e-flex e-con e-child\" data-id=\"f9540f6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a846a4 elementor-widget elementor-widget-heading\" data-id=\"3a846a4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">General organization of the training<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6e0302 elementor-widget elementor-widget-text-editor\" data-id=\"d6e0302\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The program is structured over two years and combines theoretical courses with practical workshops and a company internship to guarantee comprehensive training: <br \/><br \/>**1st year:** <br \/>\u2013 **Semester 1:** <br \/>\u2013 Introduction to cybersecurity <br \/>\u2013 Network and system security <br \/>\u2013 Applied Cryptography <br \/>\u2013 Law and regulation in cybersecurity <br \/><br \/>\u2013 **Semester 2:** <br \/>\u2013 Risk management and organizational security <br \/>\u2013 Ethical hacking and penetration testing <br \/>\u2013 Security of web and mobile applications <br \/>\u2013 Threat monitoring and detection <br \/><br \/>**2nd year:** <br \/>\u2013 **Semester 3:** <br \/>\u2013 Security in the cloud and critical infrastructures <br \/>\u2013 Incident management and crisis response <br \/>\u2013 Digital forensics and investigations <br \/>\u2013 Secure system design <br \/><br \/>\u2013 **Semester 4:** <br \/>\u2013 Final year project <br \/>\u2013 Company internship <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-b9ac3ca e-con-full e-flex e-con e-child\" data-id=\"b9ac3ca\" data-element_type=\"container\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-02071ad e-con-full e-flex e-con e-child\" data-id=\"02071ad\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-cb7180e e-con-full e-flex e-con e-child\" data-id=\"cb7180e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8573f89 elementor-widget elementor-widget-heading\" data-id=\"8573f89\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Sectors of activity and career opportunities<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5730b5 elementor-widget elementor-widget-text-editor\" data-id=\"e5730b5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Graduates of the Master&#039;s program in Cybersecurity are prepared for key roles in various sectors, including: <br \/>\u2013 **Computer Security Engineer** <br \/>\u2013 **Cybersecurity Consultant** <br \/>\u2013 **Chief Information Security Officer (CISO)** <br \/>\u2013 **Threat Analyst** <br \/>\u2013 **Digital Forensics Expert**<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-c6e5cd4 e-con-full e-flex e-con e-child\" data-id=\"c6e5cd4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62694c8 elementor-widget elementor-widget-image\" data-id=\"62694c8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"575\" src=\"https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/esst-651-1-768x575.jpg\" class=\"attachment-medium_large size-medium_large wp-image-2529\" alt=\"\" srcset=\"https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/esst-651-1-768x575.jpg 768w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/esst-651-1-300x225.jpg 300w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/esst-651-1-1024x767.jpg 1024w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/esst-651-1-1536x1151.jpg 1536w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/esst-651-1-16x12.jpg 16w, https:\/\/esst.cloud\/wp-content\/uploads\/2025\/12\/esst-651-1.jpg 2048w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Master&#039;s in Cybersecurity The Master&#039;s in Cybersecurity trains experts capable of protecting information systems against digital threats. This program covers a wide range of skills, including risk management, network security, cryptography, and security incident response. ADMISSION REQUIREMENTS The Master&#039;s in Cybersecurity is open to [\u2026]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_eb_attr":"","footnotes":""},"class_list":["post-1232","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/esst.cloud\/en\/wp-json\/wp\/v2\/pages\/1232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esst.cloud\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/esst.cloud\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/esst.cloud\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/esst.cloud\/en\/wp-json\/wp\/v2\/comments?post=1232"}],"version-history":[{"count":13,"href":"https:\/\/esst.cloud\/en\/wp-json\/wp\/v2\/pages\/1232\/revisions"}],"predecessor-version":[{"id":2535,"href":"https:\/\/esst.cloud\/en\/wp-json\/wp\/v2\/pages\/1232\/revisions\/2535"}],"wp:attachment":[{"href":"https:\/\/esst.cloud\/en\/wp-json\/wp\/v2\/media?parent=1232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}