Computer Systems and Networks Security - online

Cavi: particolare
Computer Systems and Networks Security - online
Course sheet
A.Y. 2025/2026
Bachelor
L-31 R - Scienze e tecnologie informatiche
Bachelor
180
ECTS
Access
Limited enrolment with admission test
3
Years
Course location
Milan
Language
Italian
The degree aims to provide future graduates in Computer Systems and Network Security with a broad, solid and in-depth cultural, technological and methodological preparation in the IT area, with specific attention to the issues of security and privacy to enable them to address all the issues related to the creation of secure services/software at an infrastructural and application level.

The degree course aims to provide a solid basic mathematical and methodological cultural preparation in order to: i) know and master the foundational aspects of computer systems, ii) familiarize themselves with the basics of the scientific method, iii) analyze problems and develop computer models and solutions independently or in work groups, iv) possess adequate technological skills to support the various applications, v) understand and evaluate the impact, including ethical, of constant scientific and technological progress in the discipline itself, vi) develop communication skills relating to the solutions developed and the problems faced, suitable for both specialist and non-specialist interlocutors.
The degree course also aims to provide specific skills in the field of security and privacy. In particular, it aims to i) provide skills to understand the evolution of threats to security and privacy also by consulting advanced scientific and regulatory documentation, in order to apply specific countermeasures and protection tools, especially in the context of modern web/cloud and mobile system networks, ii) develop skills for the development of secure software and infrastructure solutions, iii) develop skills in the field of corporate management/organization of IT security.
System, data and network security consultants

Role in a work context
The professional figures included in this category operate in the vast sector of business consultancy offered to companies to support them in the analysis and resolution of IT security issues relating to management of information systems, data processing, communications via networks, both intranet and Internet, and the development of interactive applications.
Skills associated with the role
They are professional figures with specific skills in the field of IT security technologies and methods and able to understand the business and organizational dynamics of the production environments in which they are called to operate. They are able to work by inserting themselves into structured projects and in heterogeneous business contexts, offering specialized knowledge that is usually not present in companies, operating both in the resolution of IT security issues pertaining to company information systems, and as support for technological innovation and the selection of IT security technologies.
Career opportunities
They carry out highly specialized professional activities in the field of business consultancy aimed at companies, public bodies and professional firms which often lack adequate IT security skills for the correct and effective management of information systems, including data processing in accordance with current regulations, the protection of company resources from violations and compromises of systems and the maintenance of the operation of systems, networks and applications in the event of computer intrusions or accidental malfunctions.

Technicians specialized in information technologies for the secure management of systems, networks and mobile devices

Role in a work context
IT security experts suitable for joining the corporate information systems staff to provide essential skills in the secure management of the data center, databases, architecture and network equipment, personal computers and company mobile devices.
The roles covered include: management of access procedures to systems and IT resources, secure configuration of equipment, configuration and management of specific technologies for IT security, monitoring the operation of company IT systems and management of technologies for disaster recovery and business continuity in the event of service interruption.
Skills associated with the role
These professional figures are specialists in both information technology and specific IT security technologies and methods. They are able to perform the typical functions of an IT expert, integrating them with knowledge of the main critical issues relating to IT security and technological solutions designed to guarantee an adequate level of protection of company resources and operations.
Career opportunities
The secure management of systems, networks and mobile devices is a corporate requirement that is widespread horizontally across most industrial, public administration and service sectors. All large companies and most small and medium-sized companies have an internal staff for the management of their information systems, including proprietary data and management and commercial transactions. Security and operational guarantee requirements are present and relevant in all business and production environments equipped with an information system.

Technicians specialized in the analysis and development of software for business management with the application of IT security methodologies

Role in a work context
The professional figures included in this category belong to the professional profiles of Software Analysts and Designers, but have specific skills regarding secure development and programming, testing and analysis methodologies aimed at identifying security vulnerabilities, and correction and prevention systems for software security problems. They are also experts in cryptographic techniques (algorithms and protocols) to be used to protect data maintained in company databases.
Skills associated with the role
These professional figures integrate traditional software development and programming skills with specific knowledge of the main security issues that software may present. In the development cycle of software, these professional figures are therefore able to integrate the main methodologies for software security right from the design and planning phases, and then in the development and testing phases. Further skills are exercised in verifying the presence of software vulnerabilities in third-party products or management applications, defining, if necessary, the most suitable countermeasures
Career opportunities
Software development according to security criteria and verification of the security of third-party software are now common needs for most companies, public administrations and services. The professionalism of this profile is used in all corporate and production entities equipped with an information system or that develop software for third parties.

Technicians specialized in IT security methodologies adopted in the analysis and development of web/cloud applications/services and for mobile devices

Role in a work context
The professional figures included in this category belong to the professional profiles of Web application analysts and designers for whom it is now essential to have specific skills regarding the security of applications characterized by strong interactivity, by operating on an open network and, increasingly frequently, through the use of mobile devices.
These professional figures integrate the ability to develop web applications with knowledge of security issues, dealing with protecting corporate networks and individual users from what is now the main channel for the propagation of malicious code, unauthorized access to resources and cyber crimes.
Skills associated with the role
These professionals know the main methodologies used in the creation of web, interactive and mobile-based applications, dealing with both supporting their secure design and verifying their level of security through testing and monitoring tools and techniques. Skills in cryptographic techniques are used in the security of network communications and in the protection of data managed through web applications. They are also professionals who are very oriented towards technological innovation, considering the rapid evolutionary dynamics that characterize web technologies.
Career opportunities
The ever-increasing spread of web/cloud services, the evolution of e-commerce and the development of services for customers with mobile devices makes these professionals increasingly relevant in the context of production, sales and service provision. In addition, security in these contexts is becoming a decidedly priority considering the ever-increasing spread of scams or computer violations carried out via the web and on mobile devices and the consequences that such events can have on commercial reputation, in addition to direct economic damage.
These professional figures are therefore indispensable for all companies, both private and public and of all sizes and industrial sectors, that have adopted web services as one of the main communication channels for their commercial presence or for the provision of their services to third parties.

Technicians specialized in information and communication technologies
Role in a work context
The professional figures included in this category belong to the professional profiles of experts in the use of information and communication technologies in the various operational contexts, on which the L-31 course of study is based. These professional figures integrate the ability to develop IT applications with knowledge of operational problems in the various application contexts (industrial automation, information systems, digital communication, decision support, etc.) by designing, managing and maintaining even complex IT applications.
Skills associated with the role
These professional figures have a good basic knowledge and a broad spectrum of knowledge and skills in the various sectors of IT and telecommunications. They are familiar with the scientific method of investigation, have good modeling skills and know how to understand and use mathematical tools to support IT skills, are able to work in a group, operate autonomously, use the most appropriate technologies and fit quickly into work environments.
Career opportunities
Graduates can work in the most varied application areas for the design and management of IT and telematics systems and for the study of new systems and applications.
The education program can be enriched by educational activities abroad both to deepen some topics and as socialization experience in international environments. Within the Erasmus+ program study periods can be taken in over 50 universities in Belgium, Czech Republic, Finland, France, Germany, Greece, Hungary, Lithuania, Norway, Netherlands, Poland, Portugal, Romania, Slovenia, Spain, Switzerland, Turkey. Courses will be recognized in the personalized study plan. These periods abroad are typically 5-month long and include courses for about 30 CFU, in the area of information and communication technology and related applications. Recognition of these educational activities will be based on the Learning Agreement, to be defined in advance by the student and the Erasmus coordinator at the Computer Science Department before starting the period abroad: course in the learning agreement with passed exams will replace the educational activities of the study plan ("manifesto"), either by covering the same topics or complementing the acquired basic competences. The Erasmus Committee at the Computer Science Department will perform the recognition of CFU obtained abroad and the definition of the personalized study plan. Similarly, stages to prepare the final dissertation are allowed in the same foreign universities. Recognition will be performed by the Department Erasmus Committee.
Erasmus: the coordinator for the Department of Informatics is Prof. Fabio Scotti.
International Programs: the coordinator for the Department of Informatics is Prof. Davide Rocchesso.
More information are available at the following link: https://di.unimi.it/it/rapporti-internazionali/mobilita-internazionale/opportunita-internazionali
Attendance is strongly recommended for both courses and laboratories.
Enrolment
Requirements and knowledge required for admission

To be admitted to the Degree Course, candidates must have a secondary school diploma or another qualification obtained abroad, recognized as suitable, as well as having adequate initial preparation. In particular, knowledge of basic scientific disciplines and understanding of elementary logic with a level of depth equal to that deriving from secondary school preparation are required.

Methods of verification of knowledge and personal preparation

The methods of access are established by the Admission Notice published on the page: https://informatica.cdl.unimi.it/it/iscriversi.
The course has a limited number of places in order to guarantee the quality of the educational offer in relation to the available resources and requires a TOLC (CISIA Online Test) as a test for admission. For enrollment in the first year, 150 places are available, of which 5 are reserved for non-EU students not residing in Italy. The TOLC can be taken at the University of Milan or any other university belonging to CISIA (Interuniversity Consortium for Integrated Access Systems). Registration for the TOLC must be done on the CISIA website (https://www.cisiaonline.it/).
The TOLC valid for registration is the TOLC-S, composed of the following sections: Basic mathematics (20 questions - 50 minutes), Reasoning, problems and text comprehension (15 questions - 30 minutes). Score: +1 for each correct answer, -0.25 for each incorrect answer, 0 for each unanswered question. The TOLC contains some additional sections (Biology, Chemistry, Physics, Geology, English). The results of these sections do not contribute to the test score.
After taking the TOLC-S, students must register for the selection for admission to the Degree Course, as indicated in the announcement. They will then be included in the merit ranking that will be formulated on the basis of the score obtained in the test, weighted, for each section, according to the criteria indicated in the announcement. The winners will be able to enroll within the established deadlines.
The selection is divided into distinct periods starting in February and ending in the first days of September.
Enrolled students who have not achieved a score greater than or equal to 10 in the Basic Mathematics module of the TOLC will be assigned Additional Training Obligations (OFA).

Additional training obligations and OFA recovery methods

For students with OFA, support activities will be organized in the period October-December, followed by a recovery test with which the student will have to demonstrate that he/she has improved his/her preparation. In the absence of this evidence, the student will not be able to take any second-year exams before passing the Mathematics I exam. Information: https://ssrionline.cdl.unimi.it/it/studiare/le-matricole

Transfers and second degrees

Students already enrolled in a degree course at the University of Milan, at another University or already graduated, can be exempted from the test only if they meet the following requirements to be verified during the pre-evaluation of their career:
- if the student, during the pre-evaluation phase, is recognized at least 30 credits, he/she is admitted to the second year or third year with exemption from the test;
- if the student is recognized less than 30 credits, he/she must register for the test and selection as indicated above.
To access the pre-evaluation, a specific request for preventive evaluation of the career must be submitted by accessing the online service indicated in the admission notice. Those interested must declare all the exams taken with the relative sectors, credits and grades and attach the course programs. For further details on the procedure, please refer to the announcement. The request for career evaluation must be submitted without fail by the date indicated in the announcement. The outcome of the evaluation will be communicated via email by the date indicated in the announcement.
Students admitted to years subsequent to the first must enroll by the deadlines and in the manner specified in the announcement.

Part-time enrollment

Part-time enrollment is also possible. The relevant Regulations can be found at the following link https://www.unimi.it/it/ateneo/normative/regolamenti/regolamento-le-iscrizioni-tempo-parziale

Places available: 150 + 5 reserved for non-EU citizens

Call for applications

Please refer to the call for admission test dates and contents, and how to register.

Session: 1

Application for admission: from 13/03/2025 to 29/05/2025

Application for matriculation: from 09/06/2025 to 19/06/2025

Read the Call


CALL FOR APPLICATIONS - NOTICE The call for applications is the only official document for admission to degree programmes. Please read it carefully. If you are reading this notice is because the call is available only in Italian as the programme is offered in Italian. Students wishing to enrol must be proficient in Italian.

Session: 2

Application for admission: from 23/06/2025 to 17/07/2025

Application for matriculation: from 21/07/2025 to 31/07/2025

Read the Call


CALL FOR APPLICATIONS - NOTICE The call for applications is the only official document for admission to degree programmes. Please read it carefully. If you are reading this notice is because the call is available only in Italian as the programme is offered in Italian. Students wishing to enrol must be proficient in Italian.

Session: 3

Application for admission: from 05/08/2025 to 11/09/2025

Application for matriculation: from 17/09/2025 to 24/09/2025

Read the Call


CALL FOR APPLICATIONS - NOTICE The call for applications is the only official document for admission to degree programmes. Please read it carefully. If you are reading this notice is because the call is available only in Italian as the programme is offered in Italian. Students wishing to enrol must be proficient in Italian.

Programme description and courses list
First four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Computer Programming 12 96 Italian INF/01
Mathematics I 9 72 Italian MAT/03 MAT/05
Second four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Computer Architecture 6 48 Italian INF/01
Cybercrime Legal Framework 6 48 Italian IUS/17
Mathematics Ii 9 72 Italian MAT/03 MAT/05
Third four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Cybersecurity Management 6 48 Italian ING-IND/35
Web and Mobile Programming 6 60 Italian INF/01
Open sessions
There are no specific sessions for these activities (e.g. open online courses).
Courses or activities Max ECTS Total hours Language SSD
Compulsory
English Assessment B1 (3 ECTS) 3 0 English
be activated by the A.Y. 2026/2027
First four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Algorithms and Data Structures 12 96 Italian INF/01
Operating Systems I 6 48 Italian INF/01
Operating Systems Ii 6 48 Italian ING-INF/05
Second four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Computer Networks 12 96 Italian INF/01
Databases 12 96 Italian INF/01
Third four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Biometric Systems 6 48 Italian INF/01
Statistics and Data Analysis 6 48 Italian INF/01
be activated by the A.Y. 2027/2028
First four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Computer Forensics 6 48 Italian IUS/20
Fundamentals in Cryptography and Network Security 6 48 Italian INF/01
Second four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Secure Software Design 6 48 Italian INF/01
Third four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Offensive Security 6 48 Italian INF/01
Web E Mobile System Security 6 48 Italian INF/01
Conclusive activities
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Economical, Ethical, Social, and Legal Aspects of It 3 24 Italian
Conclusive activities
There are no specific sessions for these activities (e.g. open online courses).
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Training 15 0 Italian
Final Exam 3 0 Italian
Optional activities and study plan rules
1 - Lo studente è tenuto ad acquisire 12 cfu a libera scelta fra gli insegnamenti attivati dal Collegio Didattico o fra tutti gli insegnamenti attivati dall'Ateneo purché i contenuti non si sovrappongano ai contenuti di insegnamenti erogati dal corso di studio di Sicurezza dei Sistemi e delle Reti Informatiche o da altri corsi di studio di cui è referente il Dipartimento di Informatica, e a patto che siano coerenti con il piano formativo.

Gli studenti possono richiedere il riconoscimento di cfu per attività formative presso enti esterni, presentando la relativa certificazione. Ogni certificazione può dare luogo ad un massimo di 3 cfu, e possono essere riconosciute fino a 2 certificazioni. Lo studente che intende chiedere il riconoscimento delle certificazioni deve compilare il modulo di "istanza" disponibile alla pagina https://www.unimi.it/it/studiare/servizi-gli-studenti/segreterie-infostudenti/modulistica-generale e consegnarlo alla segreteria del proprio corso di studio unitamente alla copia delle certificazioni conseguite.
La valutazione verrà effettuata da un'apposita commissione sulla base dei seguenti parametri:
- Validità: la certificazione deve essere stata ottenuta da un massimo di 5 anni.
- Specificità: la certificazione deve avere come oggetto competenze riferibili a quelle previste dal corso di laurea in cui lo studente è regolarmente iscritto.
- Specializzazione: la certificazione deve riguardare competenze specialistiche e/o professionalizzanti.
- Livello: la certificazione deve attestare competenze di livello medio o avanzato. Sono escluse certificazioni di base ed entry level.
Prescribed foundation courses
Learning activityPrescribed foundation courses
Algorithms and Data Structures Computer Programming (compulsory)
Databases Computer Programming (compulsory)
Operating Systems I Computer Programming (compulsory)
Operating Systems Ii Computer Programming (compulsory)
Statistics and Data Analysis Mathematics I (compulsory)
Learn more
Location
Milan
Course locations
Exams are usually held at the Teaching Sector in via Celoria 18, Milan.
Other venues: Teaching sector, via Celoria 20; Teaching sector, via Golgi 19; Teaching sector, via
Venezian 15.
Head of study programme
Quality Assurance Delegate
Contacts

The tuition fees for students enrolled in Bachelor's, Master's and single-cycle degree programmes are divided into two instalments with different calculation methods and payment schedules:

  • The amount of the first instalment is the same for all students
  • The amount of the second instalment varies according to the ISEE University value, the degree programme and the student status (on track / off track for one year or off track for more than a year) 
  • An additional fee is due for online programmes

The University also offers:

  • Concessions for students meeting high merit requirements
  • Diversified tuition fees according to the student's home country for international students with assets/income abroad
  • Concessions for international students with refugee status

Scholarships and benefits

The University provides a range of financial benefits to students meeting special requirements (merit, financial or personal conditions, international students).

Learn more