Informatics Security

Cavi di rete
Informatics Security
Course sheet
A.Y. 2025/2026
Master programme
LM-66 R - Sicurezza informatica
Master programme
120
ECTS
Access
Open with entry requirements examination
2
Years
Course location
Milan
Language
Italian
The Master's Degree in Cybersecurity aims to provide solid scientific, methodological and technological foundations for carrying out research, design, implementation, verification, coordination and management of computer systems relating to the various fields of application of computer science and technology in the field of security and protection of systems, networks and computer infrastructures, and the secure and confidential processing of data. The Master's Degree graduate in Cybersecurity carries out design, implementation, verification, usability, maintenance, control and management of secure and protected computer systems and infrastructures. The fundamental objective of his activity is the constant improvement of secure and protected computer systems, also with reference to the secure management of sensitive data, accompanied by the ability to understand and propose in the application fields in which he operates the innovations that continually characterize the discipline.
The training path is aimed at creating professionals with high-level scientific and technological skills, methodological and operational skills and an open and critical vision of the problems connected to the adoption and use of information technologies, with particular reference to the use of scientific and technological solutions relating to cybersecurity.
The educational objectives described above are acquired through participation in lectures, personal study and classroom or laboratory exercises. Graduates who have sufficient credits in appropriate groups of disciplinary sectors will be able to access the teaching profession in secondary schools, according to the provisions in force.
Specialists in the design and management of secure IT networks and infrastructures
Role in a work context
Experts in advanced cybersecurity issues related to the design, configuration and management of IT networks and infrastructures for critical systems and resources. These professional figures deal with technological aspects for which an extremely in-depth knowledge of the technologies and evolutionary trends for cybersecurity at a global level is required. They are therefore indispensable in cases where the ability to analyze highly complex and specific technological scenarios is required, including architectures based on IoT, cyber-physical systems, cloud/fog/edge computing, mobile architectures and data intensive architectures.
Skills associated with the role
These professional figures are advanced level specialists who have studied in particular all the aspects, even the most detailed ones, of the scientific, methodological, technological and application aspects of cybersecurity in networks and infrastructures. Advanced skills of this type are required for the detection, analysis, defense and prevention of intrusions, cyber attacks and malware.
Career opportunities
They carry out specialized professional activities in the field of design and management of secure IT networks and infrastructures. This activity may be carried out, even as a freelancer, in all areas of the private and public sector that operate in the design, development, management, maintenance or use of IT networks and infrastructures in a wide range of sectors, including information and communication technologies and all application sectors that use them. This activity may also be carried out in research institutions and universities as technical support for research and experimentation activities in the fields of knowledge and skills of this professional profile.

Specialists in the design and management of solutions for the secure processing and protection of data
Function in a work context
Experts in advanced data protection issues in the context of data management, analysis and sharing. These professional figures address issues that require extremely in-depth knowledge of the scientific, methodological, technological and applicative aspects related to data security and privacy. They are therefore indispensable in cases where the ability to analyze highly complex and specific scenarios is required, including IoT, cyber-physical, cloud/fog/edge, mobile and data-intensive architecture scenarios.
Skills associated with the role
These professional figures are advanced level specialists who have studied in particular all the aspects, even the most detailed ones, of the scientific, methodological, technological and application aspects of data security and privacy. Advanced skills of this type are required to ensure the management, analysis, use and sharing of data, guaranteeing its protection.
Career opportunities
They carry out specialized professional activities in the field of design and management of solutions for the secure processing of data that are increasingly necessary in the modern digital society based on the collection, sharing, and analysis of large collections of data and which therefore requires guarantees of correct protection and use of data in compliance with legislation, regulations, and protection requirements by citizens, businesses and companies. This activity may be carried out, even as a freelancer, in all areas of the private and public sector that operate in the design, development, management, maintenance or use of information systems, applications, or data processing scenarios in a wide range of sectors, including information and communication technologies and all application sectors that use them. This activity may also be carried out in research institutions and universities as technical support for research and experimentation activities in the areas of knowledge and skills of this professional profile.

Specialists in the design and management of IT systems, information systems and applications with security and privacy guarantees
Function in a work context
Experts in advanced cybersecurity issues relating to both the systems and critical resources of a company (data centers, high-reliability systems, intellectual property, sensitive data) and those arising from the most innovative technological solutions. These professional figures deal with technological aspects for which an extremely in-depth knowledge of technologies and evolutionary trends at a global level is required. They are therefore indispensable in cases where the ability to analyze highly complex and specific technological scenarios is required.
Skills associated with the role
These professional figures are advanced level specialists who have studied in particular all the aspects, even the most detailed ones, of some innovative technologies. Advanced skills of this type may be required in all typical areas of cybersecurity, from secure programming with the application of advanced static and dynamic analysis methodologies, the analysis of malicious code continuously released on the Internet, advanced encryption techniques, advanced techniques for protecting data and ensuring their security and confidentiality, advanced artificial intelligence techniques with consideration of their security as well as the application of such techniques in security solutions and testing and monitoring methodologies of innovative applications.
Career opportunities
The information technology sector is characterized by the presence in many companies, both large and small but highly specialized, as well as in the consulting sector, of technological excellence that involves the continuous research and application of the most innovative solutions. In all these cases, the management of corporate information systems requires highly specialized professionals capable of dealing with complex scenarios in which technologies that present highly difficult problems are used. This activity may be carried out, even as a freelancer, in all areas of the private and public sector that operate in the design, development, management, maintenance or use of computer and information systems, or applications in a wide range of sectors, including information and communication technologies and all application sectors that use them. This activity may also be carried out in research institutions and universities as technical support for research and experimentation activities in the areas of knowledge and skills of this professional profile.

Information and communication technology specialists
Function in a work context
The professions included in this category belong to the professional profiles of experts in the use, in various operational contexts, of the information and communication technologies, on which the LM-66 course of study is largely based.
These professional figures integrate the ability to develop sophisticated IT applications with knowledge of operational issues in various application contexts (including IoT, cloud/fog/edge computing and data intensive architectures) by designing, managing and maintaining complex and articulated IT applications.
Skills associated with the function
These professional figures possess excellent fundamental knowledge and a broad spectrum of knowledge and skills in the various sectors of IT, are familiar with the scientific method of investigation, have high modelling skills, know how to understand and use mathematical tools to support IT skills, are able to manage group activities, operate autonomously and fit in quickly in work environments.
Career opportunities
Graduates can work in the most varied application areas for the design and management of complex IT systems and for the study and research of new systems and applications. This activity can be carried out, even as a freelancer, in all areas of the private and public sector that operate in the design, development, management, maintenance or use of IT systems, or applications in a wide range of sectors, including information and communication technologies and all the application sectors that use them. This activity can also be carried out in research institutions and universities as technical support for research and experimentation activities in the areas of knowledge and skills of this professional profile.
The education program can be enriched by educational activities abroad both to deepen some topics and as socialization experience in international environments. Within the Erasmus+ program study periods can be taken in over 50 universities in Belgium, Czech Republic, Finland, France, Germany, Greece, Hungary, Lithuania, Norway, Netherlands, Poland, Portugal, Romania, Slovenia, Spain, Switzerland, Turkey. Courses will be recognized in the personalized study plan. These periods abroad are typically 5-month long and include courses for about 30 CFU, in the area of information and communication technology and related applications. Recognition of these educational activities will be based on the Learning Agreement, to be defined in advance by the student and the Erasmus coordinator at the Computer Science Department before starting the period abroad: course in the learning agreement with passed exams will replace the educational activities of the study plan ("manifesto"), either by covering the same topics or complementing the acquired basic competences. The Erasmus Committee at the Computer Science Department will perform the recognition of CFU obtained abroad and the definition of the personalized study plan. Similarly, stages to prepare the final dissertation are allowed in the same foreign universities. Recognition will be performed by the Department Erasmus Committee.
Erasmus: the coordinator for the Department of Informatics is Prof. Fabio Scotti.
International Programs: the coordinator for the Department of Informatics is Prof. Davide Rocchesso.
More information are available at the following link: https://di.unimi.it/it/rapporti-internazionali/mobilita-internazionale/opportunita-internazionali
Attendance is strongly recommended for both courses and laboratories.
Enrolment
The following may access the master's degree course:
- graduates of the degree class in Computer Science and Technology (L-31) and of the corresponding class relating to Ministerial Decree 509/99;
- graduates of other classes provided that they have acquired at least the following in their previous studies:
48 credits in the INF/01 or ING-INF/05 sector
12 credits in the MAT/01- 09 sectors
The degree course may also be accessed by those in possession of another qualification obtained abroad and recognized as suitable on the basis of equivalence who have acquired skills and knowledge equivalent to those of the above-mentioned requirements.
To verify the curricular requirements and personal preparation, the candidate must provide the following documents: degree certificate with grade, list of exams passed with grade and number of credits.
Verification of the adequacy of personal preparation will be based on the results reported in the exams of the scientific-disciplinary sectors indicated among the access requirements. When this does not demonstrate the full adequacy of the personal preparation, the candidate will also be required to pass an individual interview.

Admission

Application for admission: from 22/01/2025 to 31/10/2025

Application for matriculation: from 02/04/2025 to 15/01/2026


Attachments and documents

Admission notice

Learn more:
Programme description and courses list
First four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Artificial Intelligence for Security and Privacy 6 42 Italian INF/01
Cryptography 6 42 Italian INF/01
Privacy and Data Protection 6 42 Italian INF/01
Second four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Secure Data Management 6 42 Italian INF/01
Software Protection Techniques 6 42 Italian INF/01
Optional
Biometric Techniques and Applications 6 42 Italian INF/01
Dependability 6 42 Italian INF/01
Gestione della sicurezza nelle imprese 6 42 Italian SECS-P/08
Third four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Network Security 6 42 Italian INF/01
Security of Data-Intensive Architectures 6 42 Italian INF/01
Optional
Digital Forensics 6 42 Italian INF/01
Machine Learning for Systems and Network Security 6 42 Italian INF/01
Specification and Verification of Critical Systems 6 42 Italian INF/01
Open sessions
There are no specific sessions for these activities (e.g. open online courses).
Courses or activities Max ECTS Total hours Language SSD
Compulsory
English Proficiency B2 (3 ECTS) 3 0 English
be activated by the A.Y. 2026/2027
First four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Fondamenti giuridici per la sicurezza e la privatezza 6 42 Italian IUS/20
Risk Analysis and Management 6 42 Italian SECS-S/01
Optional
Cybersecurity in Operating Systems 6 42 Italian INF/01
Defensive (CYBER)security 6 42 Italian INF/01
Quantum and Post-Quantum Computing 6 42 Italian INF/01
Open sessions
There are no specific sessions for these activities (e.g. open online courses).
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Final Exam 39 0 Italian
Optional activities and study plan rules
1 - Per i 12 CFU a scelta guidata, lo studente deve scegliere fra gli insegnamenti della seguente tabella.
Courses or activities Max ECTS Total hours Language Lesson period SSD
Biometric Techniques and Applications 6 42 Italian Second four month period INF/01
Dependability 6 42 Italian Second four month period INF/01
Digital Forensics 6 42 Italian Third four month period INF/01
Gestione della sicurezza nelle imprese 6 42 Italian Second four month period SECS-P/08
Machine Learning for Systems and Network Security 6 42 Italian Third four month period INF/01
Specification and Verification of Critical Systems 6 42 Italian Third four month period INF/01
2 - Ulteriori insegnamenti per la scelta guidata attivati a partire dall'a.a. 2026/27.
Courses or activities Max ECTS Total hours Language Lesson period SSD
Cybersecurity in Operating Systems 6 42 Italian First four month period INF/01
Defensive (CYBER)security 6 42 Italian First four month period INF/01
Quantum and Post-Quantum Computing 6 42 Italian First four month period INF/01
3 - Lo studente è tenuto ad acquisire 12 cfu a libera scelta attingendo dalla tabella della scelta guidata, oppure scegliendo fra quelli erogati da altri corsi di studio del Collegio Didattico di Informatica, nonché fra tutti gli insegnamenti attivati dall'Ateneo purché coerenti con il progetto formativo e i cui contenuti non siano sovrapposti a quelli di insegnamenti erogati dal CdS in Sicurezza Informatica o da altri corsi di studio di cui è referente il Dipartimento di Informatica.
Gli studenti possono richiedere il riconoscimento di cfu per attività formative presso enti esterni, presentando la relativa certificazione. Ogni certificazione può dare luogo ad un massimo di 3 cfu, e possono essere riconosciute fino a 2 certificazioni. Lo studente che intende chiedere il riconoscimento delle certificazioni deve compilare il modulo di "istanza" disponibile alla pagina https://www.unimi.it/it/studiare/servizi-gli-studenti/segreterie-infostudenti/modulistica-generale e consegnarlo alla segreteria del proprio corso di studio unitamente alla copia delle certificazioni conseguite.
La valutazione verrà effettuata da un'apposita commissione sulla base dei seguenti parametri:
· Validità: la certificazione deve essere stata ottenuta da un massimo di 5 anni.
· Specificità: la certificazione deve avere come oggetto competenze riferibili a quelle previste dal corso di laurea in cui lo studente è regolarmente iscritto.
· Specializzazione: la certificazione deve riguardare competenze specialistiche e/o professionalizzanti.
· Livello: la certificazione deve attestare competenze di livello medio o avanzato. Sono escluse certificazioni di base ed entry level.
Le richieste sopra indicate possono essere presentate solo dagli studenti che non abbiano già ottenuto tali riconoscimenti durante il percorso triennale.
Learn more
Location
Milan
Course locations
IT course venues: via Celoria 18 - Milan.
Other course venues: Teaching sector, via Celoria 20; Teaching sector, via Golgi 19; Teaching sector, via
Venezian 15.
Laboratory locations
Computer laboratory (Silab) at the Department of Computer Science, via Celoria 18, Milan.
Head of study programme
Academic guidance tutor
Quality Assurance Delegate
Contacts

The tuition fees for students enrolled in Bachelor's, Master's and single-cycle degree programmes are divided into two instalments with different calculation methods and payment schedules:

  • The amount of the first instalment is the same for all students
  • The amount of the second instalment varies according to the ISEE University value, the degree programme and the student status (on track / off track for one year or off track for more than a year) 
  • An additional fee is due for online programmes

The University also offers:

  • Concessions for students meeting high merit requirements
  • Diversified tuition fees according to the student's home country for international students with assets/income abroad
  • Concessions for international students with refugee status

Scholarships and benefits

The University provides a range of financial benefits to students meeting special requirements (merit, financial or personal conditions, international students).

Learn more