{"id":17052,"date":"2016-03-28T11:36:38","date_gmt":"2016-03-28T10:36:38","guid":{"rendered":"http:\/\/www.metropolitan.edu.rs\/?page_id=17052&#038;lang=en"},"modified":"2025-02-07T13:45:58","modified_gmt":"2025-02-07T12:45:58","slug":"information-technology-and-systems-2-specialization-cybersecurity","status":"publish","type":"page","link":"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/","title":{"rendered":"INFORMATION TECHNOLOGY AND SYSTEMS #2 SPECIALIZATION: CYBERSECURITY"},"content":{"rendered":"<div class=\"fit-container\">\n<div class=\"fullbanner\">\n<div class=\"grupa-naslova\">\n<h1 class=\"u-glavni t-bela\">MASTER STUDIES<\/h1>\n<h2 class=\"u-podnaslov bg-bela\" style=\"color: #ffffff !important;background-color: rgb(5, 202, 233) !important;\">INFORMATION TECHNOLOGY AND SYSTEMS<br \/>#2 SPECIALIZATION: <b>CYBERSECURITY<\/b><\/h2>\n<p><span class=\"akreditovano-sert\" style=\"color:#fff;\"><b>ACCREDITED<\/b><\/span>\n<\/div>\n<p><img decoding=\"async\" src=\"https:\/\/www.metropolitan.ac.rs\/files\/2024\/03\/bezbednost-infromacija.jpg\" class=\"naslovnafotka\"><\/div>\n<\/div>\n<div class=\"fit-container mas-si fit-mas\">\n<div class=\"sadrzaj-sve\">\n<div class=\"w-content firasans\">\n<div class=\"uokvireno bg-fit bi-mas\">\n<div class=\"mla-flex list-flex\">\n<div><i class=\"fal fa-calendar-alt\"><\/i> Duration of Studies: 1 year<\/div>\n<div><i class=\"fal fa-file-certificate\">\uf5f3<\/i> ECTS Credits: 60 ECTS<\/div>\n<div><i class=\"fal fa-id-card\"><\/i> Degree Title: Master Engineer of Information Technology Systems<\/div>\n<div><i class=\"fal fa-university\"><\/i> Field: Technical and Technological Sciences<\/div>\n<div><i class=\"fal fa-laptop-code\"><\/i> Area: Electrical and Computer Engineering<\/div>\n<div><i class=\"fal fa-file-code\"><\/i> Subarea: Information Technology and Systems<\/div>\n<\/div>\n<div class=\"clearfix\"> <\/div>\n<\/div>\n<\/div>\n<div class=\"w-content firasans mt__20 bgbela sekcijabg fix-responsive\" style=\"padding-bottom: 20px;\">\n<h2 class=\"u-glavni\">PROGRAM DESCRIPTION<\/h2>\n<p>The Master&#8217;s program in Information Technology and Systems aims to equip students with the necessary skills for designing, maintaining, organizing, managing, implementing, and securing information systems. Additionally, it prepares students to address issues related to information system security, protecting information from unauthorized access and misuse. The program\u2019s objective is to educate highly skilled professionals with comprehensive academic knowledge in information systems, as well as expertise in information security, cryptographic protection, and digital forensics.<\/p>\n<p>The Cybersecurity specialization focuses on equipping students <span class=\"mla-bold\">with the ability to develop software using modern tools for designing information protection methods<\/span>. The increased interconnectivity and expansion of new services, along with the emergence of new telecommunications and information technologies in the past decade, have enabled technically advanced attackers to launch various cyberattacks, compromising system integrity and user privacy. This module trains students to <span class=\"mla-bold\">develop security solutions for computer networks, databases, web service infrastructure, and software design while integrating security measures. It also covers intrusion detection and defense methods, cryptography and cryptographic technologies, and computer forensics.<\/span><\/p>\n<\/div>\n<div class=\"bg-fit sekcijabg prvapozadina mas-bi\">\n<div class=\"w-content firasans fix-responsive\">\n<h2 class=\"u-glavni\" style=\"margin-top: 60px;\">LEARNING OUTCOMES <\/h2>\n<p style=\"font-size:20px;\"><b>By completing this program, students will acquire the following general competencies:<\/b><\/p>\n<div class=\"mla-lista-box\">\n<div class=\"mla-lista-child\">\n<div>Understanding, analyzing, and applying techniques and methods for solving a wide range of problems in the field of information systems and cybersecurity.<\/div>\n<\/div>\n<div class=\"mla-lista-child\">\n<div>Evaluating the security features of hardware and software components within an organization.<\/div>\n<\/div>\n<div class=\"mla-lista-child\">\n<div>Planning, implementing, and maintaining a secure information and communication system within an organization.<\/div>\n<\/div>\n<div class=\"mla-lista-child\">\n<div>Defining and setting personal educational goals for continuous learning and long-term career planning in the fields of information systems and\/or cybersecurity.<\/div>\n<\/div>\n<\/div>\n<p style=\"margin-top: 40px;font-size:20px;\"><b>Upon completion of the program, students will gain the following specific learning outcomes:<\/b><\/p>\n<ul class=\"content-lista transparent-lista\">\n<li>Applying standard and advanced cryptographic protocols to computer systems or their components.<\/li>\n<li>Understanding concepts of authorization, authentication, and accountability in the context of computer system security.<\/li>\n<li>Identifying vulnerabilities in modern computer systems and potential exploitation methods.<\/li>\n<li>Detecting and preventing possible cyberattacks on computer systems.<\/li>\n<li>Utilizing hardware-based security features at the architectural level.<\/li>\n<li>Designing and implementing privacy policies for user accounts and groups within an organization&#8217;s computer network.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"w-content firasans mt__20 bgbela sekcijabg fix-responsive\">\n<h2 class=\"u-glavni\">CURRICULUM \u2013 MASTER&#8217;S PROGRAM IN INFORMATION TECHNOLOGY AND SYSTEMS<\/h2>\n<table class=\"mla-mastbl\">\n<tbody>\n<tr>\n<th>Sem<\/th>\n<th>RB<\/th>\n<th>2 SPECIALIZATION: CYBERSECURITY (60 ESPB),<br \/>CURRICULUM 2024\/25.<\/th>\n<th>ESPB<\/th>\n<\/tr>\n<tr>\n<td rowspan=\"5\" class=\"tc\">\n1\n<\/td>\n<td class=\"tc\">1<\/td>\n<td>CS531 Information and Computer Network Security <\/td>\n<td class=\"tc\">6<\/td>\n<\/tr>\n<tr>\n<td class=\"tc\">2<\/td>\n<td>CS532 Advanced Operating System Security <\/td>\n<td class=\"tc\">6<\/td>\n<\/tr>\n<tr>\n<td class=\"tc\">3<\/td>\n<td>CS505 Applied Cryptography <\/td>\n<td class=\"tc\">6<\/td>\n<\/tr>\n<tr>\n<td class=\"tc\">4<\/td>\n<td>Elective Course 1<\/td>\n<td class=\"tc\">6<\/td>\n<\/tr>\n<tr>\n<td class=\"tc\">5<\/td>\n<td>Elective Course 2<\/td>\n<td class=\"tc\">6<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" class=\"tc\">\n2\n<\/td>\n<td class=\"tc\">6<\/td>\n<td>IT585 IT Application Project <\/td>\n<td class=\"tc\">6<\/td>\n<\/tr>\n<tr>\n<td class=\"tc\">7<\/td>\n<td>IT590 Professional Practice <\/td>\n<td class=\"tc\">3<\/td>\n<\/tr>\n<tr>\n<td class=\"tc\">8<\/td>\n<td>IT595 Zavr\u0161ni rad master studija &#8211; istra\u017eiva\u010dki rad<\/td>\n<td class=\"tc\">15<\/td>\n<\/tr>\n<tr>\n<td class=\"tc\">9<\/td>\n<td>IT595 Master&#8217;s Thesis \u2013 Research Work <\/td>\n<td class=\"tc\">6<\/td>\n<\/tr>\n<tr class=\"mla-table-head\">\n<th colspan=\"4\">IT596 Master&#8217;s Thesis \u2013 Development and Defense <\/th>\n<\/tr>\n<tr>\n<td rowspan=\"5\" class=\"tc\">1<\/td>\n<td rowspan=\"5\" class=\"tc\">4,5<\/td>\n<td>CS533 Advanced Cyber Forensics <\/td>\n<td class=\"tc\">6<\/td>\n<\/tr>\n<tr>\n<td>CS534 Advanced Hacking Prevention <\/td>\n<td class=\"tc\">6<\/td>\n<\/tr>\n<tr>\n<td>CS545 Cybersecurity and Blockchain <\/td>\n<td class=\"tc\">6<\/td>\n<\/tr>\n<tr>\n<td>CS538 Software Vulnerabilities and Security <\/td>\n<td class=\"tc\">6<\/td>\n<\/tr>\n<tr>\n<td>OM545 Entrepreneurship and Innovation <\/td>\n<td class=\"tc\">6<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2 class=\"u-glavni\">Master&#8217;s Program in Information Technology and Systems \u2013 Cybersecurity Specialization<\/h2>\n<div class=\"accordian\">\n<h5 class=\"toggle glavni-panel fit-panel\">CS505 Applied Cryptography<\/h5>\n<div class=\"toggle-content\" style=\"display: block;\">\n<p>Students are introduced to the fundamental principles of modern cryptography. This course deepens knowledge of mathematical applications in cryptographic methods and systems. It covers common cryptographic algorithms, pseudorandom generators, and encryption techniques. Students learn about the key characteristics of block ciphers, both with and without keys, as well as techniques for digital signatures and key exchange. The course also addresses cryptographic system applications and assessments, including defense against attacks and vulnerabilities. Case studies will explore various modern applications rooted in strong cryptographic principles, such as cloud security and cryptocurrencies.<\/p>\n<\/div>\n<h5 class=\"toggle glavni-panel fit-panel\">CS531 Information and Computer Network Security<\/h5>\n<div class=\"toggle-content\" style=\"display: block;\">\n<p>This course introduces students to the concepts of computer network security. Students first learn to analyze network vulnerabilities by studying Internet architecture and network protocols. They then explore security measures at different layers, including the data link, network, transport, and application layers. Through independent assignments, students gain the ability to explore specific topics related to computer network security in more depth.<\/p>\n<\/div>\n<h5 class=\"toggle glavni-panel fit-panel\">CS532 Advanced Operating System Security<\/h5>\n<div class=\"toggle-content\" style=\"display: block;\">\n<p>Students gain an understanding of basic and advanced concepts of operating system security. The course begins with an introduction to potential vulnerabilities in various operating systems and how to differentiate between threats and attacks. Students explore formal models of secure systems and their application to different operating systems, as well as commonly used cryptographic algorithms embedded in operating systems. They learn about various attack methods and corresponding defense techniques. Through independent assignments, students develop a deeper understanding of Linux, Android, and modern Windows operating system security while enhancing their problem-solving skills in these environments.<\/p>\n<\/div>\n<h5 class=\"toggle glavni-panel fit-panel\">Elective Courses 1 i 2<\/h5>\n<div class=\"toggle-content\" style=\"display: block;\">\n<p><strong>CS533 Advanced Cyber Forensics<\/strong><br \/>\nStudents learn the principles and applications of cyber forensics across various computing environments. The course revisits different classes of cryptographic systems and foundational cryptanalytic attacks with relevant mathematical background. Students study cyber forensics within operating systems, computer networks, and web applications. The course also covers cyber forensics in cloud computing and Software-as-a-Service (SaaS) environments. Independent assignments allow students to explore specific topics in computer forensics in greater depth.<\/p>\n<p><strong>CS534 Advanced Hacking Prevention<\/strong><br \/>\nThis course introduces students to advanced principles of ethical hacking for identifying and preventing vulnerabilities in computer systems and networks. Students explore advanced techniques for securing network traffic and modern methods for detecting user data breaches in wireless networks. They simulate cyberattacks in virtual environments, analyze vulnerabilities, and evaluate the security of different systems. Through group and independent assignments, as well as scientific research papers, students gain in-depth knowledge of computer system vulnerabilities.<\/p>\n<p><strong>CS545 Cybersecurity and Blockchain<\/strong><br \/>\nStudents are introduced to blockchain technology in the context of data security, current Internet security policies, and vulnerabilities in modern computer systems. The course enables students to identify appropriate blockchain applications for security purposes and recognize security threats associated with different blockchain technologies. They learn about protective mechanisms for preventing attacks and securing data. Independent assignments allow for a more detailed exploration of blockchain security concepts.<\/p>\n<p><strong>CS538 Software Vulnerabilities and Security<\/strong><br \/>\nStudents learn about common security flaws in programming, system configuration, and software design. The course includes case studies on general and specific programming errors. Through group and independent assignments, as well as access to relevant research papers, students gain the ability to analyze and discuss software security vulnerabilities and issues in system development.<\/p>\n<p><strong>OM545 Entrepreneurship and Innovation<\/strong><br \/>\nThe course focuses on creating new businesses, entering new markets, and increasing organizational efficiency through innovation and process transformation. Emerging technologies, evolving processes, competition, and globalization require entrepreneurs and companies to move beyond traditional methods, fostering innovation and agility. This course examines successful strategies, business models, financing methods, barriers, and risks associated with launching innovative products and services. Topics include business model innovation, strategic leadership, human-centered and design-focused innovation, knowledge management, and change management. Upon completion, students will be able to develop skills and insights for evaluating, refining, and presenting new product or service ideas, either as startups or new initiatives within existing companies.<\/p>\n<\/div>\n<h5 class=\"toggle glavni-panel fit-panel\">IT585 IT Application Project<\/h5>\n<div class=\"toggle-content\" style=\"display: block;\">\n<p>This course covers key aspects of IT project management, including:<br \/>\n\u2022\tGeneral IT project management principles<br \/>\n\u2022\tDesigning an IT project and selecting appropriate development methods, implementation strategies, and planning phases<br \/>\n\u2022\tSystem architecture design and component structuring<br \/>\n\u2022\tDevelopment, monitoring, management, and implementation<br \/>\n\u2022\tTesting, verification, and validation phases<br \/>\n\u2022\tTeamwork, report writing, and project analysis<br \/>\nStudents will explore fundamental development principles through case studies of specific IT projects. Depending on the chosen project topics, instructors may provide specialized lectures if necessary.\n<\/p>\n<\/div>\n<h5 class=\"toggle glavni-panel fit-panel\">IT590 Professional Practice<\/h5>\n<div class=\"toggle-content\" style=\"display: block;\"><\/div>\n<h5 class=\"toggle glavni-panel fit-panel\">IT595 Master&#8217;s Thesis \u2013 Research Work<\/h5>\n<div class=\"toggle-content\" style=\"display: block;\"><\/div>\n<h5 class=\"toggle glavni-panel fit-panel\">IT596 Master&#8217;s Thesis \u2013 Development and Defense<\/h5>\n<div class=\"toggle-content\" style=\"display: block;\"><\/div>\n<\/div>\n<\/div>\n<div class=\"akcija-dugme\">\n<h2 class=\"u-glavni nas-centar mla-nas-h2\">JOIN BELGRADE METROPOLITAN UNIVERSITY AND BUILD THE FOUNDATION FOR A SUCCESSFUL INTERNATIONAL CAREER!<\/h2>\n<p>&nbsp;<br \/>\n<a href=\"https:\/\/www.metropolitan.ac.rs\/master-studije\/upis\/\" class=\"dugme\">ONLINE APPLICATION >><\/a>\n<\/div>\n<div class=\"w-content firasans mt__20 bgbela sekcijabg fix-responsive\">\n<h2 class=\"u-glavni nas-centar\">Annual tuition<\/h2>\n<table class=\"tg cenovnik tabelafont\" style=\"width: 100%\">\n<tbody>\n<tr>\n<th class=\"tg-944b\">STUDY PROGRAM<\/th>\n<th class=\"tg-6tsg\" colspan=\"2\">Annual tuition<\/th>\n<\/tr>\n<tr>\n<td class=\"tg-c7f5\" colspan=\"7\"><strong>Faculty of Information Technology<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"tg-yw4l\">Information Technology and Systems<\/td>\n<td class=\"tg-baqh bor\" colspan=\"2\">2.990 \u20ac<\/td>\n<\/tr>\n<tr>\n<td class=\"tg-b7b8\">Inteligent and Advanced Software Systems<\/td>\n<td class=\"tg-dzk6 bor\" colspan=\"2\">2.990 \u20ac<\/td>\n<\/tr>\n<tr>\n<td class=\"tg-qil1\" colspan=\"7\"><strong>Faculty of Management<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"tg-yw4l\">Digital Business<\/td>\n<td class=\"tg-baqh bor\" colspan=\"2\">2.490 \u20ac<\/td>\n<\/tr>\n<tr>\n<td class=\"tg-i7di\" colspan=\"6\"><strong>Faculty of Digital Arts<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"tg-yw4l\">Visual Communication<\/td>\n<td class=\"tg-baqh bor\" colspan=\"2\">3.690 \u20ac<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span class=\"tbl-npm\">*Tuition can be paid in multiple monthly installments.<\/span>\n<\/div>\n<div class=\"bg-fit sekcijabg trecapozadina fix-responsive\" id=\"pitajte-nas\">\n<div class=\"w-content firasans mt__20\">\n<h2 class=\"u-glavni nas-centar\">INTERESTED IN MORE INFORMATION ABOUT THIS PROGRAM?<\/h2>\n<div class=\"w-content\">\n<div class=\"one_half\">\n<div class=\"text-standard veliki-font\">\n<h3 class=\"naslovi-border\">Contact<\/h3>\n<p style=\"font-size:16px;\"><strong>E-mail<\/strong><\/p>\n<p><a href=\"mailto:upis@metropolitan.ac.rs\"><strong>upis@metropolitan.ac.rs<\/strong><\/a><br \/>\n&nbsp;<\/p>\n<p style=\"font-size:16px;\"><strong>Phone<\/strong><\/p>\n<p><a href=\"tel:0112030885\"><strong>011 20 30 885<\/strong><\/a> \/\/ <a href=\"tel:018551000\"><strong>018 551 000<\/strong><\/a><br \/>\n&nbsp;<\/p>\n<div class=\"ikonice\">\n<a href=\"https:\/\/www.facebook.com\/UniverzitetMetropolitan\" class=\"ikonica-drustvene\" target=\"_blank\" rel=\"noopener noreferrer\"><i class=\"fab fa-facebook\"><\/i><\/a><a href=\"https:\/\/www.instagram.com\/univerzitet_metropolitan\/\" class=\"ikonica-drustvene\" target=\"_blank\" rel=\"noopener noreferrer\"><i class=\"fab fa-instagram\"><\/i><\/a><a href=\"https:\/\/www.youtube.com\/user\/fitmetropolitan\" class=\"ikonica-drustvene\" target=\"_blank\" rel=\"noopener noreferrer\"><i class=\"fab fa-youtube\"><\/i><\/a><a href=\"https:\/\/www.linkedin.com\/groups\/3812045\/profile\" class=\"ikonica-drustvene\" target=\"_blank\" rel=\"noopener noreferrer\"><i class=\"fab fa-linkedin-in\"><\/i><\/a>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"one_half last\">\n<div class=\"text-standard\">\n<h3 class=\"naslovi-border\">Ask Us<\/h3>\n\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f162602-o1\" lang=\"sr-RS\" dir=\"ltr\" data-wpcf7-id=\"162602\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/17052#wpcf7-f162602-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"162602\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.0.2\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"sr_RS\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f162602-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_hidden_group_fields\" value=\"[]\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_hidden_groups\" value=\"[]\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_visible_groups\" value=\"[]\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_repeaters\" value=\"[]\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_steps\" value=\"{}\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_options\" value=\"{&quot;form_id&quot;:162602,&quot;conditions&quot;:[],&quot;settings&quot;:{&quot;animation&quot;:&quot;yes&quot;,&quot;animation_intime&quot;:200,&quot;animation_outtime&quot;:200,&quot;conditions_ui&quot;:&quot;normal&quot;,&quot;notice_dismissed&quot;:false,&quot;notice_dismissed_update-cf7-5.8&quot;:true,&quot;notice_dismissed_rollback-cf7-6.0.2&quot;:true,&quot;notice_dismissed_update-cf7-6.1.2&quot;:true}}\" \/>\n<input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/div>\n<p>Name *<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"Ime\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"Ime\" \/><\/span>\n<\/p>\n<p>Surname *<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"Prezime\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"Prezime\" \/><\/span>\n<\/p>\n<p>E-mail *<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"E-adresa\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"E-adresa\" \/><\/span>\n<\/p>\n<p>Ask us *<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"Pitanje\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" name=\"Pitanje\"><\/textarea><\/span>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"SEND\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<style>.mla-lista-box .mla-lista-child {width:39%;min-height:125px;} .list-flex div {width:29%;}  @media only screen and (max-width: 600px) {.mla-mastbl th {font-size: 17px;border: 1px solid #9f7a84;} } .naslovnafotka {position: absolute;right: 0;margin-right: auto;top: 0;z-index: 0;max-width: 1920px;left: 50%;transform: translateX(-50%);}<\/style>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":17049,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-17052","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>INFORMATION TECHNOLOGY AND SYSTEMS #2 SPECIALIZATION: CYBERSECURITY - Univerzitet Metropolitan<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"INFORMATION TECHNOLOGY AND SYSTEMS #2 SPECIALIZATION: CYBERSECURITY - Univerzitet Metropolitan\" \/>\n<meta property=\"og:description\" content=\"[&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Univerzitet Metropolitan\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-07T12:45:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.metropolitan.ac.rs\/files\/2024\/03\/bezbednost-infromacija.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/\",\"url\":\"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/\",\"name\":\"INFORMATION TECHNOLOGY AND SYSTEMS #2 SPECIALIZATION: CYBERSECURITY - Univerzitet Metropolitan\",\"isPartOf\":{\"@id\":\"https:\/\/www.metropolitan.ac.rs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.metropolitan.ac.rs\/files\/2024\/03\/bezbednost-infromacija.jpg\",\"datePublished\":\"2016-03-28T10:36:38+00:00\",\"dateModified\":\"2025-02-07T12:45:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.metropolitan.ac.rs\/files\/2024\/03\/bezbednost-infromacija.jpg\",\"contentUrl\":\"https:\/\/www.metropolitan.ac.rs\/files\/2024\/03\/bezbednost-infromacija.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.metropolitan.ac.rs\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MASTER STUDIES\",\"item\":\"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"INFORMATION TECHNOLOGY AND SYSTEMS #2 SPECIALIZATION: CYBERSECURITY\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.metropolitan.ac.rs\/#website\",\"url\":\"https:\/\/www.metropolitan.ac.rs\/\",\"name\":\"Univerzitet Metropolitan\",\"description\":\"Student u centru pa\u017enje\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.metropolitan.ac.rs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"INFORMATION TECHNOLOGY AND SYSTEMS #2 SPECIALIZATION: CYBERSECURITY - Univerzitet Metropolitan","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"INFORMATION TECHNOLOGY AND SYSTEMS #2 SPECIALIZATION: CYBERSECURITY - Univerzitet Metropolitan","og_description":"[&hellip;]","og_url":"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/","og_site_name":"Univerzitet Metropolitan","article_modified_time":"2025-02-07T12:45:58+00:00","og_image":[{"url":"https:\/\/www.metropolitan.ac.rs\/files\/2024\/03\/bezbednost-infromacija.jpg","type":"","width":"","height":""}],"twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/","url":"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/","name":"INFORMATION TECHNOLOGY AND SYSTEMS #2 SPECIALIZATION: CYBERSECURITY - Univerzitet Metropolitan","isPartOf":{"@id":"https:\/\/www.metropolitan.ac.rs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.metropolitan.ac.rs\/files\/2024\/03\/bezbednost-infromacija.jpg","datePublished":"2016-03-28T10:36:38+00:00","dateModified":"2025-02-07T12:45:58+00:00","breadcrumb":{"@id":"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/#primaryimage","url":"https:\/\/www.metropolitan.ac.rs\/files\/2024\/03\/bezbednost-infromacija.jpg","contentUrl":"https:\/\/www.metropolitan.ac.rs\/files\/2024\/03\/bezbednost-infromacija.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/information-technology-and-systems-2-specialization-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.metropolitan.ac.rs\/en\/"},{"@type":"ListItem","position":2,"name":"MASTER STUDIES","item":"https:\/\/www.metropolitan.ac.rs\/en\/master-studies\/"},{"@type":"ListItem","position":3,"name":"INFORMATION TECHNOLOGY AND SYSTEMS #2 SPECIALIZATION: CYBERSECURITY"}]},{"@type":"WebSite","@id":"https:\/\/www.metropolitan.ac.rs\/#website","url":"https:\/\/www.metropolitan.ac.rs\/","name":"Univerzitet Metropolitan","description":"Student u centru pa\u017enje","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.metropolitan.ac.rs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.metropolitan.ac.rs\/en\/wp-json\/wp\/v2\/pages\/17052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.metropolitan.ac.rs\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.metropolitan.ac.rs\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.metropolitan.ac.rs\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.metropolitan.ac.rs\/en\/wp-json\/wp\/v2\/comments?post=17052"}],"version-history":[{"count":12,"href":"https:\/\/www.metropolitan.ac.rs\/en\/wp-json\/wp\/v2\/pages\/17052\/revisions"}],"predecessor-version":[{"id":162720,"href":"https:\/\/www.metropolitan.ac.rs\/en\/wp-json\/wp\/v2\/pages\/17052\/revisions\/162720"}],"up":[{"embeddable":true,"href":"https:\/\/www.metropolitan.ac.rs\/en\/wp-json\/wp\/v2\/pages\/17049"}],"wp:attachment":[{"href":"https:\/\/www.metropolitan.ac.rs\/en\/wp-json\/wp\/v2\/media?parent=17052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}