Please ensure Javascript is enabled for purposes of website accessibility

Siber Güvenlik Yüksek Lisans Programı

Thesis-Based Master’s Program
To graduate, students must successfully complete:

  •  6 elective (S) courses (18 credits)
  • 1 core course (3 credits): Research Methods and Ethics
  • Non-credit graduate seminar
  • Master’s thesis (non-credit)
  • Minimum requirement: 21 credits and 120 ECTS

Non-Thesis Master’s Program
To graduate, students must successfully complete:

  • 9 elective (S) courses (27 credits)
  • 1 core course (3 credits): Research Methods and Ethics
  • Non-credit master’s project
  • Minimum requirement: 30 credits and 100 ECTS
     

This course aims to develop students’ research skills, helping them plan, conduct, and present their research effectively. Topics include:

  • Research planning, execution, and reporting
  • Topic selection and research question formulation
  • Literature review and evaluation techniques
  • Data collection and analysis
  • Interpretation and discussion of research results
  • Academic writing and presentation skills
     

Focuses on designing, managing, and securing computer systems and networks. Topics include:

  • Definition, importance, and objectives of information security
  • Threats, attack methods, and prevention techniques
  • Network security (firewalls, VPNs, wireless security)
  • Data security (confidentiality, integrity, storage, and backup)
  • Cybersecurity policies, risk management, and incident response
     

Teaches techniques and tools for analyzing network vulnerabilities and enhancing security:

  •  Network security fundamentals (topologies, protocols, configurations)
  •  Security audits, risk analysis, and firewall management
  • Network security tools (port scanning, vulnerability scanning, intrusion detection)
     

Explores modern encryption technologies:

  • Classical encryption methods (Caesar cipher, Vigenere cipher)
  • Modern encryption (symmetric, asymmetric, hybrid encryption)
  • Cryptanalysis techniques (frequency analysis, differential cryptanalysis)
  • Applications (VPNs, SSL/TLS, HTTPS)
     

Covers digital evidence collection, analysis, and response to cyberattacks:

  • Digital evidence types and handling
  • Data analysis and forensic tools
  • Cyberattack detection and incident response techniques
     

Provides insights into software security and threat mitigation:

  • Software security risks and attack vectors
  • Secure software development and testing
  • Web application security (threats, penetration testing, risk mitigation)

Teaches risk assessment and mitigation strategies for securing information systems:
 

  • Threat analysis, security policies, and risk assessment
  • Risk communication and control
  • Cybersecurity compliance and governance
     

Focuses on security risks and defense strategies for wireless and ad hoc networks:

  • Encryption and access control for wireless networks
  • Threats and countermeasures for mobile and IoT networks
  • Network security audits and penetration testing
     

Explores legal and technical aspects of personal data protection:

  • Data privacy regulations and compliance
  • Security techniques for online communications
  • Prevention and mitigation of data breaches
     

Covers security challenges and solutions in cloud environments:

  • Cloud service models and security risks
  • Encryption, authentication, and access controls
  • Regulatory compliance and security policies
     

Focuses on securing databases and large-scale data processing systems:

  • Threats to database and big data systems
  • Security measures for social media platforms
  • Data encryption and access management
     

A hands-on project where students conduct research on a cybersecurity topic, develop a solution, or analyze system performance

Teaches strategies for disaster recovery, business continuity, and emergency response:

  • Risk assessment and contingency planning
  • Disaster mitigation and response coordination
  • Crisis communication and media management
     

Focuses on strategic planning and security governance:

  • Cybersecurity risk assessment and mitigation strategies
  •  Incident monitoring, response, and threat intelligence
  •  Security policies, compliance, and awareness training
     

Covers offensive and defensive security methodologies:
 

  • Attack vectors, penetration testing, and vulnerability analysis
  • Defensive strategies (firewalls, IDS, encryption)
  •  Cyber threat intelligence and risk mitigation
     

Focuses on ethical hacking and security testing:

  • Network and web application penetration testing techniques
  • Security auditing and reporting
  • Vulnerability scanning and exploitation
     

Explores emerging cybersecurity trends such as AI security, IoT risks, blockchain vulnerabilities, and advanced threat defense mechanisms.

Students conduct original research in cybersecurity, focusing on a real-world security challenge and contributing to the field through theoretical or applied solutions.

Covers security audit frameworks and methodologies:

  • Risk assessment and compliance auditing
  • Security policies, governance, and vulnerability assessment
  •  Incident investigation and remediation planning
     

Teaches scientific research techniques while emphasizing ethical considerations in cybersecurity:

  •  Academic research methodologies
  • Data security, privacy, and compliance
  • Ethical hacking and responsible disclosure


This program equips students with the skills to analyze, secure, and manage cybersecurity challenges, preparing them for careers in cyber defense, risk management, penetration testing, forensic analysis, and security auditing.