Master in Digital Technology Management / Cyber Security

Overcoming obstacles to opportunity

The Cyber Security track of the Master in Digital Technology Management gives companies the support they need in terms of cyber security, which, in today’s world, represents a challenge that cannot be ignored given the technical and economic implications of cyber security management for businesses.

The program trains young managers to understand the vulnerabilities that companies face as a result of their reliance on IT systems, and to plan interventions to prevent and protect businesses against attacks, safeguarding the integrity and availability of company data, networks and systems.

The Master in Digital Technology Management in Cyber Security equips students with technical skills related to cryptographic protocols and access control as well as elements such as the network, the cloud and IoT security, which are vital for identifying potential threats and developing appropriate countermeasures. The course also focuses on methodological, legal and regulatory aspects of risk management, giving students the ability to deal with problems by adopting a systematic approach.

Along with the two other tracks (Artificial Intelligence and Digital Project Management), this program ensures that the educational offer for Bologna Business School in digital experience is truly exceptional. The course will appeal to professionals who are keen to get in on the Cyber Security trend, and recognize that it will give them the opportunity to establish themselves as leaders in the digital transformation of companies.

The master, which will be held in English, is structured into two classroom-based lessons and one final internship period over a total of 12 months. Participants will undertake the first term of lessons – an introduction to management in Digital Technology – alongside students from the other two specialist tracks of the Master.

Increasingly, the need to safeguard companies’ technology assets can only be met by specialized managers. Contact the master Program Manager to be one of them.

THE MASTER IS AN INVESTMENT.THE HONOR LOAN IS THE WAY TO FUND IT.

PerTe Prestito Con Lode”, a long-term and low-interest honor loan, with no collateral required to cover the full amount of the tuition fee.
With the Patronage of the Cybersecurity National Lab

 

 

 

In collaboration with

schneider_LIO_Life-Green_RGB    Master Digital Technology_Spindox

 


Maurizio Gabbrielli

Maurizio Gabbrielli

Director of Studies
maurizio.gabbrielli@unibo.it

" Cyber security is today one of the most relevant and challenging issue for any organization, including SMEs, due to the increasing reliance on computer systems and communications. Managers are more and more confronted with the need to understand the possible vulnerabilities and threats - and their technical and economic implications - in order to define appropriate countermeasures. This master provides the knowledge which is required for such a task, covering a rather wide spectrum of topics, ranging from basic competences on cryptographic protocols and access control, to more advanced aspects such as network, cloud and IoT security. Specific courses will focus on legal and normative aspects, as well as on methodologies for the management of risk, which are essential skills for any manager dealing with IT security. "

Structure

The Master in Digital Technology Management is a full-time program structured in 1,500 hours of learning activities over 12 months of study, divided into: 400 hours of lecturing, an estimated 600 hours of independent study, and 500 hours of internship.

The structure of the Master is divided into two terms:

  • First term: December 2017 – April 2018
  • Second term: April 2018 – July 2018
  • Internship: September 2018 – December 2018

The first term students will face the fundamentals of management, applied to digital technology, while the second term will deal with track specific practical aspects.

The two terms are followed by an internship period of 500 hours. This internship can be carried out at various companies and agencies in Italy or abroad. Students will have the chance to put into practice the theory and techniques learned during the two academic terms and have the opportunity to directly learn from professionals of their specific sector.

At the end of the internship you will be required to hand in a ‘Final Report’, which you will present to the Director of Studies showcasing your activities and analyzing the theories and lessons learned during the academic part.

Students who are interested can also choose to take an extracurricular course of Italian.

Classroom participation is about 30 hours per week structured in order to allow time to work in groups, while not neglecting individual students focus and management of interpersonal relationships.

 

COURSES

Systems security is a prerequisite to achieve information security to the fullest extent. This module deals with the two broad "classical" themes of host security and network security, and their specific characterization in the context of cloud computing. 

The steps to secure a host, whether connected to a network or not, will be illustrated starting from physical security and access control, and proceeding to analyze the most common methods used by attackers to break the configured barriers, as well as the tools that, as a last but fundamental resort, allow to detect a successful break-in. 

Network security will mainly be investigated in terms of tools that add protection layers to host security (since the protection of network traffic between applications is one of the subjects of the Cryptography module). Firewalls and VPNs are the two main subjects discussed in this part of the module.

The same concepts will be expanded with a specific focus on cloud systems, where the concentration of business activities on remote platforms, the total delegation of infrastructural management and the high degree of resource sharing exacerbate the issues of  availability, trust, and authentication/authorization.



Cryptography provides important building blocks for ensuring the privacy, authenticity, and integrity of the increasingly sensitive information involved in modern networked systems. Nowadays, core cryptographic tools, including encryption, message authentication codes, digital signature, .. are used behind millions of daily on-line transactions and various web and cloud services.

 

This course provides an introduction to core cryptography mechanisms and security protocols. It focuses on how basic cryptographic algorithms, authentication protocols and security infrastructures work and how to use them.

 

The course also explores main cryptographic mechanisms and protocols within real-life applications, such as e-mail, on-line banking, digital signature systems with legal implications.



The course will cover a variety of themes which are emerging as the most prominent ones in the context of digital culture.The following is a preliminary list of the topics that will be considered.

1. Computing: Meaning and Limitations (from Kurt Godel & Alan Turing to Quantum and Beyond).

2. Counter Culture vs. Cyber Culture (Stewart Brand & Bob Taylor, a la' carte).

3. Coding: Meaning and Perspectives.

4. The Internet: Lo and Behold.

5. History of Computation.

6. The New Rise of AI: Of Men and Machines.

7. Text Digitization + Literary Analysis + Maps + Interactive Media + Games + Design + Media Art = Digital Humanities?

8. Big Brother in Action: Surveillance, Hacking, Privacy, Cyber-security and Data.

9. Ethics, Moral Responsibility and Accountability of Computing.

10. The Economics of the New Web.







Since the first mechanical automations of the 17th century, one of the great dreams of the humanity has been the construction of machines exhibiting human behaviors and intelligence. Artificial intelligence (AI) is a discipline whose goal is to realize this dream by using the most different techniques, from symbolic computation based on logic to sub-symbolic models inspired by the structure of the brain, such as neural networks.

The last few years have witnessed a sensational exploit of AI applications in many different fields - with a relevant growth of investments - inducing many experts to believe that the dream will come true in a short time.

This is inducing many companies to reconsider their business strategies and, more generally, requires a deep rethinking of several crucial aspects of our society.

The course will provide an introductory overview of the various existing AI techniques, focusing on their industrial applications, discussing future opportunities and challenges, touching also on some social, economic and ethic implications.



It’s undeniable that mankind strive to build unbreakable systems, even if human history has demonstrated so far that this is nothing more than a myth. The real world is mainly made of fragile systems, so that reality is much different from the expectations.

The goal of this course is to provide a basic knowledge concerning the main concepts and principles of computer security (e.g. risk, tools for risk assessment and evaluation, attacks and their typical structure, resources, functional systems requirements, human component). In this way, the course will provide the basic tools for the design and implementation of reasonably secure systems. During this process, either methodological, technological and behavioral (i.e. operation security) aspects will be considered.

After the course, the students should be able to critically evaluate the security of a (computer) system considering both the system as a whole and its main separated components (e.g. authentication and authorization mechanisms and procedures). They will also be able to find the main vulnerabilities of such a system and to identify the more appropriate countermeasures to allow the mitigation of vulnerabilities and reduce the risk to an acceptable level.

The goals described above will be obtained not only by teaching some of the main theoretical aspects of computer security but also by describing and discussing many real world examples in detail.

The approach and the tools learned during this course are prerequisites for the following “Cryptographic Protocols” and “Computer, Network and Cloud Security” courses.



The course provides a global overview about the problem of mapping the cybernetic risks and their management, showing the current regulations and the situation in Italy. The course will focus on the following topics:

1)     Introduction to the Cybersecurity problem: Aims and extent of the problem; Incident examples; Corporate Risks; Motivation of the Attackers; Inability to find global solutions.

2)     Cybersecurity and Cyberspace: Definitions; CIA properties and attacks against them.

3)     Malware and Cyberattacks: Definitions; Case studies and known Malware;

4)     Cyberwar: Evolution of the attackers; From the worm to the Advanced Persistent Threat. Numbers and Countries behind the cyberwar.

5)     Privacy in communications: End-to-end encoded channels; Encoded e-mails; Visible services not for intelligence purposes.

6)     Cyber Risk Management: Definitions; Top-down and bottom-up risk approach. ISO 27001, NIST sp800-53 and other standards; Cybersecurity frameworks; National Framework for Cybersecurity and Essential PMI Management; Italian national regulations.



In this course, we discuss on one hand how cybercriminals actually operate, and on the other hand the legal framework that underpins the regulatory and privacy aspects that managers have to be aware of.

In the first part, we will start discussing the technical attack vectors (XSS, SQL Injections, XSRF, drive-by download) and how these vectors are embodied in complex attacks (malware, spyware, ransomware, botnets) Then, we will see how these attacks are used in the cybercrime economy (spam, phishing, infections and money laundering), and we will touch on the economic aspects of cyber criminality, and on the markets of cybercrime as a service. Finally, we will discuss attacks sophistication, state-sponsored attacks and the emergence of a grey-market. We will make use of case-studies (e.g., Hacking Team, Stuxnet, Flame, etc).

In the second part, we will discuss the national, European and international legal framework on privacy and the protection of personal data. Particular attention will be devoted to the EU General Data Protection Regulation – which will become applicable as of May 2018 - and on the EU-US-Privacy Shield, in consideration of the relevance of the transfer of personal data to the United States. The rules will be examined in the light of roles and responsibilities of Digital Technology Managers, who have to make crucial technical and organizational choices on security and data protection, such as in the selection of cloud service providers.
Then we will touch on other legal aspects of interest for the managers of IT- and IT-based companies, such as Intellectual Property Rights, IT contracts, administrative and criminal responsibility for cybercrimes.



The goal of the course is to give the participants an exhaustive overview of ICT hardware, software and services currently used within companies, as well as to illustrate some trend directions and next-generation technologies which might be adopted in business.

Starting from traditional tools like ERP and DBMS, the course introduces the area of information systems, presenting up-to-date techniques and software enabling the data storage, retrieval and knowledge extraction.

Then, it investigates the business opportunities, potential and applications within companies of emerging areas like mobile applications, cloud technologies and the Internet of Things.



This course develops a foundation of concepts and solutions that supports the planning, scheduling, controlling, resource allocation, and performance measurement activities required for successful completion of a project. Provides training and experience with project management tools and techniques, including work breakdown structures, network diagrams, risk management, earned value management, and other tools.

The course also addresses the main organizational issues in managing projects and leading project teams. It is fully aligned with Project Management Institute (PMI) standards.



Cryptonet Labs

The hallmark of last year’s attack on the Ukrainian power grid was the extensive reconnaissance, performed by attackers on their target’s control networks, used to maximize system disruption. Situational awareness, incident response and recovery all depend on an accurate understanding of control system inventories, including normal process behavior. The Ukrainian attack has led our community to a key question; do we know our industrial control networks as well as our adversaries?

Despite the emergence of technologies that monitor data flows of industrial control networks, energy operators consistently cite inadequate real time views to control system the topology, devices, and behavior as a fundamental obstacle to securing their operations.   Historically, gathering and maintaining this information has proven incredibly labor intensive and disruptive to economic operations for energy operators.

The course will explore emerging technology and process-centric analytics that can facilitate more automated, passive methods of inventory collection, network monitoring and the definition of normal behavior of industrial control systems.  These emergent technologies can enable operators to baseline normal operational process behavior and measure network loading.  The course will explore the operational and safety benefits of automated inventory technologies such as improved visibility to misconfigurations and early detection of device failures. While improving operability, these technologies also hold the promise of expedited detection of adversaries’ reconnaissance activities and improved recovery times



This course focuses on the study of processes required to create value for a final consumer, through the contribution of a network of companies (generally labelled as “supply chain”). Basic as well as more advanced elements of supply chain structure and management, purchasing processes and supplier management will be analysed. Special focus will be devoted to concepts and applications of “digital supply chains.



Learning method

The main aim of our teaching staff is to first lay down a solid grounding of theory and then to build on this foundation by introducing more practical aspects. This method will result in you confidently entering the work environment of this industry, ready to deal with any scenario you will face.

The courses are structured to give the maximum freedom to learn to the students and allow the professors to teach and assess the students in the best way possible. Assessments can take the form of individual/group presentations, projects, oral and written exams as well as, of course, class participation.

The teaching sessions are organized to help students grasp these concepts and techniques through the use of lectures and seminars; group projects and company visits; guest speakers and case studies; videos and presentations; as well as individual assignments and assisted private studying. The teaching program is completed by masters lectures given by professionals coming from specific sectors, different universities or politics. Students will have this way the possibility to directly interact with experts through the analysis of case history.

CAREER DEVELOPMENT

Building synergies with businesses is a priority and a distinguishing characteristic of all programs of Bologna Business School, including the Master in Digital Technology Management.
The School is fully dedicated to preparing students for the job market and it accomplishes this through systematic career development, with an ongoing commitment to combine the best professional projects by students with the demands of businesses.

The internship is an excellent springboard to the professional world, evidenced by the fact that six months after completing the full-time master at Bologna Business School, an average of 90% of alumni are working in a company.

COMPANIES

Over the years, our partners have been constantly involved in the activities, which make up the structure of our programs. Companies belonging to our network take part in project works and master’s lectures; they actively contribute by engaging with students through guest lecture sessions and by organizing company visits.

Our partners are the first supporters of our students by providing scholarships, internships and professional opportunities.

Bologna Business School’s partner companies for the Master in Digital Technology Management are:

ANCORA SERVIZI AUTOMOBILI LAMBORGHINI BVM LES COPAINS CAMST CAREGIVING CARPIGIANI CHAMPION CINECA CNA di BOLOGNA COLOMER GROUP COOP CENTRALE ADRIATICA CRIF DATALOGIC DUCATI EGS ENGINEERING FREELANDS NETWORK GA OPERATION - Gruppo Giorgio Armani GMPR COMUNICAZIONE GRAPHIC STORE GRUPPO MAX MARA GRUPPO MONTENEGRO GRUPPO TREVI HAVAIANAS HAYS HERA IMOLA IBM ICONSULTING IMA IOSA GHINI IREN LIU JO MOLLUSCO & BALENA COMUNICAZIONE NIKE ITALY PDFOR Consulenza PUCCI BERNI REMEMBRANE SCS CONSULTING SIGMA SPORT LAB STS ACADEMY TECHNOGYM TETRAPACK UNIGRA' VALSOIA VODAFONE VOSSLOCH

CONTACT US

CONTACT

Oops! We could not locate your form.

DOWNLOAD BROCHURE

FEES

The tuition fees for the Master is 14,800 euro (VAT free) to be paid in three installments:

  • First installment: 1,850 euros
  • Second installment: 7,000 euros
  • Third installment: 5,950 euros

The fee includes participation in the Master, all the study material available through the online platform, and access to the services and facilities of Bologna Business School such as: personal account for the Alma wi-fi, use of the PCs in the Computer Lab, access to the study areas, access to the internal gym, special rates for the School restaurant. Furthermore, the fee gives participants the right to take advantage of the supporting activities of the School, such as the language courses and the master lectures by invitation.
Free parking is also available within BBS Campus.

Additionally, with the Student Card of the University of Bologna, students have access to all of the university facilities, including over 100 libraries, digital resources and study halls (including databases and online subscriptions); the three city center canteens and all university student related discount offers. More information is available on the site of the University of Bologna: http://www.unibo.it/en/services-and-opportunities/index.html

HONOR LOAN

Thanks to the agreement between Bologna Business School and Intesa Sanpaolo, participants are eligible to apply for “PerTe Prestito Con Lode”,  a long-term and low-interest honor loan.Main characteristics:

  • Loan amount equal to the enrollment fee
  • Reduced interest rate
  • No collateral required
  • Repayable in 10 years
  • No early closing fees

SCHOLARSHIPS

At Bologna Business School we understand the importance of financial aid in supporting our students to achieve their educational goals. We are aware that an advanced, high quality training path can be a significant commitment, at the same time we also truly believe that investing in one’s future always pays back.

Bologna Business School is pleased to offer partial scholarships to the most meriting students. All of these scholarships are merit-based and will be awarded to the top-ranked candidates in the selection process. The students who come out on top in the selections will be students who not only come from strong academic or practical backgrounds but also those who display the strongest motivation to take part in this program.

There are scholarships of 6,000 euros and  scholarships of 4,000 euros. All applicants will be considered for a scholarship – no specific application is required. They are awarded over the course of every round of selection and if you have performed well enough to merit one of them, you will be informed at the moment of admission.

The scholarships act as tuition waivers, so that they result in a deduction of the total amount of the tuition fees due.

 

REQUIREMENTS

For the registration it is necessary:

  • a Bachelor’s Degree (must be obtained by the enrollment deadline)
  • English language proficiency

Admission to the program is subject to the positive assessment of your individual interview and English test, if it’s not the candidate’s native language.

APPLICATION PROCESS

This Master’s is open to all applicants with a bachelor’s degree obtained before the enrolment deadline of each round.
There are two rounds of admissions, the first round will be open for applications until September, 2017.
 The second round will open in September, 2017 and will close in November, 2017.

Application steps:

Documents to send to digitaltech@bbs.unibo.it:

  • CV
  • Degree certificate with accompanying transcript
  • Photocopy of you ID or passport
  • Motivation letter
  • Reference letter(s) (optional but advised)
  • Signed copies of your enrolment summary sheet and receipt for the application fee (both downloadable from ‘studenti online’ following registration)

The selection process will be held at  Bologna Business School. The selections for the first round will take place in October, 2017
 and the selections for the second round will take place in November, 2017.
In line with the number of available places, admission to the program is granted according to the position on the list of qualified candidates, drawn up on the basis of the total score awarded at the end of the admissions process.

Detailed information on the requirements and application process are available in the “Official Call for Applications” downloadable below.

FAQs

Of course we will. Non-EU citizens have to apply for a student visa before being able to commence their studies. We can provide you with a letter of admission as well as a letter of support, which you can use to make your visa application. In the case of particular problems our staff will be ready to contact embassies directly to discover the source of the problem and solutions to fix it.
After you arrive in Italy, you will be required to apply for a residence permit. Our staff will be able to help you fill out the forms and give you any support you need for this process as well.
If you do not live in Italy then you can participate via Skype. You will be contacted several days before the selection date to inform you of your time slot for the test and individual interview. At this point you can send us your Skype ID so that we can add you to the account that will be used for the interviews.
Yes. The course is open to people of all nationalities regardless of where their previous studies have taken place. Please note, however, that admission is dependent upon you presenting one of two potential documents. If you have graduated from a university in the European Union then you will be able to get a European Diploma Supplement directly from that university. If possible, this should be submitted with your application. If you have graduated from outside the European Union then you will need to request a Declaration of Value from the Italian embassy/consulate present in the country where you graduated. Details on how to obtain this document can be found on the website of the relevant Italian embassy/consulate. If possible, this declaration of value should be submitted with your application. If not possible then it can be submitted at a later date but you will only be provisionally admitted until you do so.
Yes. Don’t worry if you if you are unable to present a IELTS or TOEFL, your level of English will be assessed during the selection process. You can be excused from the need to present proof of your English level if you are a native English speaker.
Back To Top