Informatics Security

Cavi di rete
In-person programme
Informatics Security
Course sheet
A.Y. 2026/2027
Master programme
LM-66 R - Sicurezza informatica
Master programme
120
ECTS
Access
Open with entry requirements examination
2
Years
Course location
Milan
Language
Italian
The Master's Degree in Cybersecurity aims to provide solid scientific, methodological and technological foundations for carrying out research, design, implementation, verification, coordination and management of computer systems relating to the various fields of application of computer science and technology in the field of security and protection of systems, networks and computer infrastructures, and the secure and confidential processing of data. The Master's Degree graduate in Cybersecurity carries out design, implementation, verification, usability, maintenance, control and management of secure and protected computer systems and infrastructures. The fundamental objective of his activity is the constant improvement of secure and protected computer systems, also with reference to the secure management of sensitive data, accompanied by the ability to understand and propose in the application fields in which he operates the innovations that continually characterize the discipline.
The training path is aimed at creating professionals with high-level scientific and technological skills, methodological and operational skills and an open and critical vision of the problems connected to the adoption and use of information technologies, with particular reference to the use of scientific and technological solutions relating to cybersecurity.
The educational objectives described above are acquired through participation in lectures, personal study and classroom or laboratory exercises. Graduates who have sufficient credits in appropriate groups of disciplinary sectors will be able to access the teaching profession in secondary schools, according to the provisions in force.
Specialists in the design and management of secure IT networks and infrastructures
Role in a work context
Experts in advanced cybersecurity issues related to the design, configuration and management of IT networks and infrastructures for critical systems and resources. These professional figures deal with technological aspects for which an extremely in-depth knowledge of the technologies and evolutionary trends for cybersecurity at a global level is required. They are therefore indispensable in cases where the ability to analyze highly complex and specific technological scenarios is required, including architectures based on IoT, cyber-physical systems, cloud/fog/edge computing, mobile architectures and data intensive architectures.
Skills associated with the role
These professional figures are advanced level specialists who have studied in particular all the aspects, even the most detailed ones, of the scientific, methodological, technological and application aspects of cybersecurity in networks and infrastructures. Advanced skills of this type are required for the detection, analysis, defense and prevention of intrusions, cyber attacks and malware.
Career opportunities
They carry out specialized professional activities in the field of design and management of secure IT networks and infrastructures. This activity may be carried out, even as a freelancer, in all areas of the private and public sector that operate in the design, development, management, maintenance or use of IT networks and infrastructures in a wide range of sectors, including information and communication technologies and all application sectors that use them. This activity may also be carried out in research institutions and universities as technical support for research and experimentation activities in the fields of knowledge and skills of this professional profile.

Specialists in the design and management of solutions for the secure processing and protection of data
Function in a work context
Experts in advanced data protection issues in the context of data management, analysis and sharing. These professional figures address issues that require extremely in-depth knowledge of the scientific, methodological, technological and applicative aspects related to data security and privacy. They are therefore indispensable in cases where the ability to analyze highly complex and specific scenarios is required, including IoT, cyber-physical, cloud/fog/edge, mobile and data-intensive architecture scenarios.
Skills associated with the role
These professional figures are advanced level specialists who have studied in particular all the aspects, even the most detailed ones, of the scientific, methodological, technological and application aspects of data security and privacy. Advanced skills of this type are required to ensure the management, analysis, use and sharing of data, guaranteeing its protection.
Career opportunities
They carry out specialized professional activities in the field of design and management of solutions for the secure processing of data that are increasingly necessary in the modern digital society based on the collection, sharing, and analysis of large collections of data and which therefore requires guarantees of correct protection and use of data in compliance with legislation, regulations, and protection requirements by citizens, businesses and companies. This activity may be carried out, even as a freelancer, in all areas of the private and public sector that operate in the design, development, management, maintenance or use of information systems, applications, or data processing scenarios in a wide range of sectors, including information and communication technologies and all application sectors that use them. This activity may also be carried out in research institutions and universities as technical support for research and experimentation activities in the areas of knowledge and skills of this professional profile.

Specialists in the design and management of IT systems, information systems and applications with security and privacy guarantees
Function in a work context
Experts in advanced cybersecurity issues relating to both the systems and critical resources of a company (data centers, high-reliability systems, intellectual property, sensitive data) and those arising from the most innovative technological solutions. These professional figures deal with technological aspects for which an extremely in-depth knowledge of technologies and evolutionary trends at a global level is required. They are therefore indispensable in cases where the ability to analyze highly complex and specific technological scenarios is required.
Skills associated with the role
These professional figures are advanced level specialists who have studied in particular all the aspects, even the most detailed ones, of some innovative technologies. Advanced skills of this type may be required in all typical areas of cybersecurity, from secure programming with the application of advanced static and dynamic analysis methodologies, the analysis of malicious code continuously released on the Internet, advanced encryption techniques, advanced techniques for protecting data and ensuring their security and confidentiality, advanced artificial intelligence techniques with consideration of their security as well as the application of such techniques in security solutions and testing and monitoring methodologies of innovative applications.
Career opportunities
The information technology sector is characterized by the presence in many companies, both large and small but highly specialized, as well as in the consulting sector, of technological excellence that involves the continuous research and application of the most innovative solutions. In all these cases, the management of corporate information systems requires highly specialized professionals capable of dealing with complex scenarios in which technologies that present highly difficult problems are used. This activity may be carried out, even as a freelancer, in all areas of the private and public sector that operate in the design, development, management, maintenance or use of computer and information systems, or applications in a wide range of sectors, including information and communication technologies and all application sectors that use them. This activity may also be carried out in research institutions and universities as technical support for research and experimentation activities in the areas of knowledge and skills of this professional profile.

Information and communication technology specialists
Function in a work context
The professions included in this category belong to the professional profiles of experts in the use, in various operational contexts, of the information and communication technologies, on which the LM-66 course of study is largely based.
These professional figures integrate the ability to develop sophisticated IT applications with knowledge of operational issues in various application contexts (including IoT, cloud/fog/edge computing and data intensive architectures) by designing, managing and maintaining complex and articulated IT applications.
Skills associated with the function
These professional figures possess excellent fundamental knowledge and a broad spectrum of knowledge and skills in the various sectors of IT, are familiar with the scientific method of investigation, have high modelling skills, know how to understand and use mathematical tools to support IT skills, are able to manage group activities, operate autonomously and fit in quickly in work environments.
Career opportunities
Graduates can work in the most varied application areas for the design and management of complex IT systems and for the study and research of new systems and applications. This activity can be carried out, even as a freelancer, in all areas of the private and public sector that operate in the design, development, management, maintenance or use of IT systems, or applications in a wide range of sectors, including information and communication technologies and all the application sectors that use them. This activity can also be carried out in research institutions and universities as technical support for research and experimentation activities in the areas of knowledge and skills of this professional profile.

Employment statistics (Almalaurea)
The education program can be enriched by educational activities abroad both to deepen some topics and as socialization experience in international environments. Within the Erasmus+ program study periods can be taken in over 50 universities in Belgium, Czech Republic, Finland, France, Germany, Greece, Hungary, Lithuania, Norway, Netherlands, Poland, Portugal, Romania, Slovenia, Spain, Switzerland, Turkey. Courses will be recognized in the personalized study plan. These periods abroad are typically 5-month long and include courses for about 30 CFU, in the area of information and communication technology and related applications. Recognition of these educational activities will be based on the Learning Agreement, to be defined in advance by the student and the Erasmus coordinator at the Computer Science Department before starting the period abroad: course in the learning agreement with passed exams will replace the educational activities of the study plan ("manifesto"), either by covering the same topics or complementing the acquired basic competences. The Erasmus Committee at the Computer Science Department will perform the recognition of CFU obtained abroad and the definition of the personalized study plan. Similarly, stages to prepare the final dissertation are allowed in the same foreign universities. Recognition will be performed by the Department Erasmus Committee.
Erasmus: the coordinator for the Department of Informatics is Prof. Fabio Scotti.
International Programs: the coordinator for the Department of Informatics is Prof. Davide Rocchesso.
More information are available at the following link: https://di.unimi.it/it/rapporti-internazionali/mobilita-internazionale/opportunita-internazionali
Attendance is strongly recommended for both courses and laboratories.
Enrolment
The following may access the master's degree course:
- graduates of the degree class in Computer Science and Technology (L-31) and of the corresponding class relating to Ministerial Decree 509/99;
- graduates of other classes provided that they have acquired at least the following in their previous studies:
48 credits in the INF/01 or ING-INF/05 sector
12 credits in the MAT/01- 09 sectors
The degree course may also be accessed by those in possession of another qualification obtained abroad and recognized as suitable on the basis of equivalence who have acquired skills and knowledge equivalent to those of the above-mentioned requirements.
To verify the curricular requirements and personal preparation, the candidate must provide the following documents: degree certificate with grade, list of exams passed with grade and number of credits.
Verification of the adequacy of personal preparation will be based on the results reported in the exams of the scientific-disciplinary sectors indicated among the access requirements. When this does not demonstrate the full adequacy of the personal preparation, the candidate will also be required to pass an individual interview.

Admission

Application for admission: from 22/01/2026 to 30/10/2026

Application for matriculation: from 05/05/2026 to 15/01/2027


Attachments and documents

Admission notice


Admissions A.Y. 2026/2027

Admission applications for Academic Year 2026/2027 are now open. Non-EU students visa applicants are required to apply for admission no later than 30 April 2026.

Learn more:
Programme description and courses list
First four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Cryptography 6 42 Italian INFO-01/A
Privacy and Data Protection 6 42 Italian INFO-01/A
Secure Data Management 6 42 Italian INFO-01/A
Second four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Artificial Intelligence for Security and Privacy 6 42 Italian INFO-01/A
Software Protection Techniques 6 42 Italian INFO-01/A
Optional
Biometric Techniques and Applications 6 42 Italian INFO-01/A
Cybersecurity Management in Businesses 6 42 Italian ECON-07/A
Dependability 6 42 Italian INFO-01/A
Third four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Network Security 6 42 Italian INFO-01/A
Security of Data-Intensive Architectures 6 42 Italian INFO-01/A
Optional
Digital Forensics 6 42 Italian INFO-01/A
Information Management 6 42 Italian INFO-01/A
Machine Learning for Systems and Network Security 6 42 Italian INFO-01/A
Specification and Verification of Critical Systems 6 42 Italian INFO-01/A
Open sessions
There are no specific sessions for these activities.
Courses or activities Max ECTS Total hours Language SSD
Compulsory
English Proficiency B2 (3 ECTS) 3 0 English NN
Optional activities and study plan rules
1 - For the 12 guided‑choice ECTS credits, the student must choose from the courses listed in the following table
Courses or activities Max ECTS Total hours Language Lesson period SSD
Biometric Techniques and Applications 6 42 Italian Second four month period INFO-01/A
Cybersecurity Management in Businesses 6 42 Italian Second four month period ECON-07/A
Dependability 6 42 Italian Second four month period INFO-01/A
Digital Forensics 6 42 Italian Third four month period INFO-01/A
Information Management 6 42 Italian Third four month period INFO-01/A
Machine Learning for Systems and Network Security 6 42 Italian Third four month period INFO-01/A
Specification and Verification of Critical Systems 6 42 Italian Third four month period INFO-01/A
be activated by the A.Y. 2027/2028
First four month period
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Legal Basis for Security and Privacy 6 42 Italian GIUR-17/A
Risk Analysis and Management 6 42 Italian STAT-01/A
Optional
Iot Systems Security 6 42 Italian INFO-01/A
Quantum and Post-Quantum Computing 6 42 Italian INFO-01/A
Systems for the Protection and Defense Against Cyber Attacks 6 42 Italian INFO-01/A
Conclusive activities
There are no specific sessions for these activities.
Courses or activities Max ECTS Total hours Language SSD
Compulsory
Final Exam 39 0 Italian NN
Optional activities and study plan rules
2 - Additional teaching activities for guided choice activated starting from the academic year 2027/28.
Courses or activities Max ECTS Total hours Language Lesson period SSD
Iot Systems Security 6 42 Italian First four month period INFO-01/A
Quantum and Post-Quantum Computing 6 42 Italian First four month period INFO-01/A
Systems for the Protection and Defense Against Cyber Attacks 6 42 Italian First four month period INFO-01/A
Optional activities and study plan rules
3 - The student is required to earn 12 elective ECTS credits by choosing from the guided-choice list, or by selecting courses offered by other degree programmes within the Computer Science Teaching Board, as well as from all courses activated by the University, provided that they are consistent with the student's educational plan and that their content does not overlap with courses offered by the Bachelor's Programme in Computer Security or by other degree programmes overseen by the Department of Computer Science.
Students may request recognition of ECTS credits for training activities carried out at external institutions, by submitting the relevant certification. Each certification may grant a maximum of 3 ECTS credits, and up to 2 certifications may be recognized. Students who intend to request recognition of such certifications must fill out the "application" form available at
https://www.unimi.it/it/studiare/servizi-gli-studenti/segreterie-infostudenti/modulistica-generale
and submit it to the Student Office of their degree programme together with a copy of the obtained certifications.
The evaluation will be carried out by a dedicated committee on the basis of the following criteria:

Validity: the certification must have been obtained no more than 5 years earlier.
Specificity: the certification must concern skills relevant to the degree programme in which the student is officially enrolled.
Specialisation: the certification must pertain to specialist and/or professional skills.
Level: the certification must attest to intermediate or advanced skills. Basic or entry-level certifications are excluded.

The above requests may be submitted only by students who have not already obtained such recognitions during their Bachelor's degree programme.
Learn more
Milan
Course locations
IT course venues: via Celoria 18 - Milan.
Other course venues: Teaching sector, via Celoria 20; Teaching sector, via Golgi 19; Teaching sector, via
Venezian 15.
Laboratory locations
Computer laboratory (Silab) at the Department of Computer Science, via Celoria 18, Milan.
Academic guidance tutor
Quality Assurance Delegate
Contacts

For students enrolled in Bachelor's, Master's and single-cycle degree programmes, tuition fees are to be paid in two instalments:

  • the amount of the first instalment is the same for all students and is due upon enrolment
  • the amount of the second instalment varies according to each student's ISEE University value and the degree programme in which they are enrolled
  • for international students with income and assets abroad, the second instalment varies according to their country of origin.

Education incentive programmes and other benefits

The University offers scholarships, cafeterias, subsidised accommodation and other forms of financial support to students meeting specific economic and merit requirements.

More information