Overview
According to the projections from the Statistics of U.S. Business, the need for labor in the field of cybersecurity will increase by 37% between 2012 and 2022. At the IDC’s Cybersecurity Summit held in Istanbul as of February 2018, it was stated that the number of cybersecurity specialists currently needed worldwide was 1,200,000. The annual need for specialists in the field of cybersecurity is higher than the sum of all the graduates from electrical electronics and engineering departments. It is a consensus among all the specialists that this need will increase incrementally. Trade has been substantially transferred to the electronic environments (such as Amazon and Alibab). On the other hand, social media platforms (Facebook, WhatsApp, Twitter etc.) have become something indispensable for people. As the governmental services are increasingly becoming electronic, the need of any type of organizations/corporations and companies for data, information security and cybersecurity specialist is further increasing. Electronic systems are becoming more exposed to cyber-attacks as the cities are becoming “smart” through electronic services, the applications in the field of Internet of Things (IoT) are becoming more popular, industrial control systems and SCADA systems are being preferred in the national critical infrastructures and, the increase in digitalization of transportation and communication at an unprecedented pace. For these reasons and more, it is obvious that the need for cybersecurity specialists will increase day by day.
Cyber Security (Non Thesis) is delivered at Kadir Has University.
Qualifications
1- Ability to reach knowledge deeply and widely and to evaluate, interpret and apply it, by doing research in the following fields: Information Systems, Computer networks, operating systems, information-system and data security
2- Comprehensive knowledge in contemporary techniques and methods in the following fields: Information systems, computer networks, operating systems, information-system and data securityand their constraints
3- Ability to integrate and apply knowledge using scientific methods on uncertain, limited or incomplete data; ability to use knowledge from different disciplines
4- Awareness of new and emerging applications in the following fields: Information systems, computer networks, operating systems, information-system and data security, ability to analyze and learn them whenever necessary
5- Ability to identify and formulate problems related to application of information systems, computer networks, operating systems, information-system and data security, to develop methods for their solutions and to use innovative techniques in the solutions
6- Ability to develop original ideas and methods, to design complex systems or processes and to present innovative/alternative solutions in these designs
7- Ability to design and apply theoretical, experimental and model-based research; ability to interpret and analyze complex problems in such processes
8- Ability to work in and lead single- or multi-disciplinary teams and to develop solution approaches for complexities; ability to work and take responsibilities independently
9- Ability to communicate in written and oral English at level B2 of European Language Portfolio
10- Ability to communicate the progress and results of her/his studies openly and systematically in the national and international circles of the same or other disciplines
11- Knowledge about the social, environmental, health, security, and legal aspects of application of information systems to management, project management and industrial applications and, awareness of limitations brought by them on management
12- Ability to observe social, scientific and ethical values in collecting, storing, interpreting, application management functions and disseminating data and all other professional activities
Programme Structure
Courses include:
- Scripting Languages for Cybersecurity
- Computer Networks and Security
- Computer Networks and Security
- Operating Systems and System Programming
- Web Application Security Fundamentals
- System Scanning and Penetration Testing
Key information
Duration
- Full-time
- 18 months
Start dates & application deadlines
- Starting
- Apply before , National
- Apply before , International
-
- Starting
- Apply before , National
- Apply before , International
-
Language
Credits
Delivered
Campus Location
- Istanbul, Turkey
Disciplines
Cyber Security View 12 other Masters in Cyber Security in TurkeyWhat students do after studying
Academic requirements
We are not aware of any specific GRE, GMAT or GPA grading score requirements for this programme.
English requirements
Other requirements
General requirements
- Bachelor's Degree (Equivalence certificate for those with foreign diplomas)
- Undergraduate Transcript
- Postgraduate Application Form
- Resume
- Letter of Intent
- 2 Professional Reference Letters
- Professional Portfolio
- We welcome all young professionals who want to shape the future of advertising and marketing to BrandMaster.
Student Insurance via Studyportals Partner
Make sure to cover your health, travel, and stay while studying abroad. Even global coverages can miss important items like Additional medical costs, Repatriation, Liability etc. Make sure your student insurance covers your needs.
Studyportals partnered with Aon to provide you with the best affordable student insurance, for a carefree experience away from home.
Get your student insurance nowStarting from €0.53/day, free cancellation any time.
Remember, countries and universities may have specific insurance requirements. To learn more about how student insurance work at Kadir Has University and/or in Turkey, please visit Student Insurance Portal.
Tuition Fees
-
International Applies to you
Applies to youNon-residents20000 USD / year≈ 20000 USD / year
Living costs
Istanbul
The living costs include the total expenses per month, covering accommodation, public transportation, utilities (electricity, internet), books and groceries.
Funding
In order for us to give you accurate scholarship information, we ask that you please confirm a few details and create an account with us.
Scholarships Information
Below you will find Master's scholarship opportunities for Cyber Security (Non Thesis).
Available Scholarships
You are eligible to apply for these scholarships but a selection process will still be applied by the provider.
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility