The Cyber Security track of the Master in Digital Technology Management gives companies the support they need in terms of cyber security, which, in today’s world, represents a challenge that cannot be ignored given the technical and economic implications of cyber security management for businesses.
The program trains young managers to understand the vulnerabilities that companies face as a result of their reliance on IT systems, and to plan interventions to prevent and protect businesses against attacks, safeguarding the integrity and availability of company data, networks and systems.
The Master in Digital Technology Management in Cyber Security equips students with technical skills related to cryptographic protocols and access control as well as elements such as the network, the cloud and IoT security, which are vital for identifying potential threats and developing appropriate countermeasures. The course also focuses on methodological, legal and regulatory aspects of risk management, giving students the ability to deal with problems by adopting a systematic approach.
Along with the two other tracks (Artificial Intelligence and Digital Project Management), this program ensures that the educational offer for Bologna Business School in digital experience is truly exceptional. The course will appeal to professionals who are keen to get in on the Cyber Security trend, and recognize that it will give them the opportunity to establish themselves as leaders in the digital transformation of companies.
The master, which will be held in English, is structured into two terms of classroom-based lessons and one final internship period over a total of 12 months. Participants will undertake the first term of lessons – an introduction to management in Digital Technology – alongside students from the other two specialist tracks of the Master.
Increasingly, the need to safeguard companies’ technology assets can only be met by specialized managers. Contact the master Program Manager to be one of them.
THE MASTER IS AN INVESTMENT. THE HONOR LOAN IS THE WAY TO FUND IT.
“PerTe Prestito Con Lode”, a long-term and low-interest honor loan, with no collateral required to cover the full amount of the tuition fee.
With the Patronage of the Cybersecurity National Lab
In collaboration with
Director of Studies
" Cyber security is today one of the most relevant and challenging issue for any organization, including SMEs, due to the increasing reliance on computer systems and communications. Managers are more and more confronted with the need to understand the possible vulnerabilities and threats - and their technical and economic implications - in order to define appropriate countermeasures. This master provides the knowledge which is required for such a task, covering a rather wide spectrum of topics, ranging from basic competences on cryptographic protocols and access control, to more advanced aspects such as network, cloud and IoT security. Specific courses will focus on legal and normative aspects, as well as on methodologies for the management of risk, which are essential skills for any manager dealing with IT security. "
AVERAGE WORK EXPERIENCE
The Master in Digital Technology Management is a full-time program structured in 1,500 hours of learning activities over 12 months of study, divided into: 400 hours of lecturing, an estimated 600 hours of independent study, and 500 hours of internship.
The structure of the Master is divided into two terms:
The first term students will face the fundamentals of management, applied to digital technology, while the second term will deal with track specific practical aspects.
The two terms are followed by an internship period of 500 hours. This internship can be carried out at various companies and agencies in Italy or abroad. Students will have the chance to put into practice the theory and techniques learned during the two academic terms and have the opportunity to directly learn from professionals of their specific sector.
At the end of the internship you will be required to hand in a ‘Final Report’, which you will present to the Director of Studies showcasing your activities and analyzing the theories and lessons learned during the academic part.
Students who are interested can also choose to take an extracurricular course of Italian.
Classroom participation is about 30 hours per week structured in order to allow time to work in groups, while not neglecting individual students focus and management of interpersonal relationships.
Over the last decade sustainability and corporate social responsibility (CSR) practices have become paramount for companies as well as for the society at large. Although most companies have developed sustainability programs over the years, as they are cutting carbon emissions, reducing waste, and otherwise enhancing operational efficiency, we are witnessing a mishmash of sustainability tactics that does not add up to a sustainable strategy. To endure, a sustainable strategy has to cope with the competing – and apparently divergent – interests of all stakeholders: investors, employees, customers, governments, NGOs, society and the natural environment.
The purpose of this course is to initiate a debate around the role and functioning of modern corporations as sustainability challenges, opportunities and solutions emerge. In particular, the objective of the course is to detail and disentangle the links between sustainability, CSR and the key role that digital technologies can play as a mean to translate sustainable strategies into effective outcomes.
Within this perspective, three major learning outcomes are expected:
In order to achieve these objectives the course will combine (i) case studies and whole class discussion; (ii) talks by business leaders and managers dealing with sustainability issues; (iii) lectures.
Systems security is a prerequisite to achieve information security to the fullest extent. This module deals with the two broad "classical" themes of host security and network security, and their specific characterization in the context of cloud computing.
The steps to secure a host, whether connected to a network or not, will be illustrated starting from physical security and access control, and proceeding to analyze the most common methods used by attackers to break the configured barriers, as well as the tools that, as a last but fundamental resort, allow to detect a successful break-in.
Network security will mainly be investigated in terms of tools that add protection layers to host security (since the protection of network traffic between applications is one of the subjects of the Cryptography module). Firewalls and VPNs are the two main subjects discussed in this part of the module.
The same concepts will be expanded with a specific focus on cloud systems, where the concentration of business activities on remote platforms, the total delegation of infrastructural management and the high degree of resource sharing exacerbate the issues of availability, trust, and authentication/authorization.
Cryptography provides important building blocks for ensuring the privacy, authenticity, and integrity of the increasingly sensitive information involved in modern networked systems. Nowadays, core cryptographic tools, including encryption, message authentication codes, digital signature, .. are used behind millions of daily on-line transactions and various web and cloud services.
This course provides an introduction to core cryptography mechanisms and security protocols. It focuses on how basic cryptographic algorithms, authentication protocols and security infrastructures work and how to use them.
The course also explores main cryptographic mechanisms and protocols within real-life applications, such as e-mail, on-line banking, digital signature systems with legal implications.
The course will cover a variety of themes which are emerging as the most prominent ones in the context of digital culture.The following is a preliminary list of the topics that will be considered.
1. Computing: Meaning and Limitations (from Kurt Godel & Alan Turing to Quantum and Beyond).
2. Counter Culture vs. Cyber Culture (Stewart Brand & Bob Taylor, a la' carte).
3. Coding: Meaning and Perspectives.
4. The Internet: Lo and Behold.
5. History of Computation.
6. The New Rise of AI: Of Men and Machines.
7. Text Digitization + Literary Analysis + Maps + Interactive Media + Games + Design + Media Art = Digital Humanities?
8. Big Brother in Action: Surveillance, Hacking, Privacy, Cyber-security and Data.
9. Ethics, Moral Responsibility and Accountability of Computing.
10. The Economics of the New Web.
The course study in deep the topic of digital transformation in the business environment. It explores the organizational methods and impacts of a digital transformation process, analyzing the stakeholders, the types of innovation and the tools.
The activity is aimed at proposing innovative business processes focused on digital technologies and new business models.
The course provides the application of the skills students improved during the classes by developing a practical project based on a real company case.
Companies involvement will be one of the pillars of this course. Companies will assign the project guidelines to the students, building them around the class profile, and will supervise the development of their projects, giving help if needed.
Since the first mechanical automations of the 17th century, one of the great dreams of the humanity has been the construction of machines exhibiting human behaviors and intelligence. Artificial intelligence (AI) is a discipline whose goal is to realize this dream by using the most different techniques, from symbolic computation based on logic to sub-symbolic models inspired by the structure of the brain, such as neural networks.
The last few years have witnessed a sensational exploit of AI applications in many different fields - with a relevant growth of investments - inducing many experts to believe that the dream will come true in a short time.
This is inducing many companies to reconsider their business strategies and, more generally, requires a deep rethinking of several crucial aspects of our society.
The course will provide an introductory overview of the various existing AI techniques, focusing on their industrial applications, discussing future opportunities and challenges, touching also on some social, economic and ethic implications.
It’s undeniable that mankind strive to build unbreakable systems, even if human history has demonstrated so far that this is nothing more than a myth. The real world is mainly made of fragile systems, so that reality is much different from the expectations.
The goal of this course is to provide a basic knowledge concerning the main concepts and principles of computer security (e.g. risk, tools for risk assessment and evaluation, attacks and their typical structure, resources, functional systems requirements, human component). In this way, the course will provide the basic tools for the design and implementation of reasonably secure systems. During this process, either methodological, technological and behavioral (i.e. operation security) aspects will be considered.
After the course, the students should be able to critically evaluate the security of a (computer) system considering both the system as a whole and its main separated components (e.g. authentication and authorization mechanisms and procedures). They will also be able to find the main vulnerabilities of such a system and to identify the more appropriate countermeasures to allow the mitigation of vulnerabilities and reduce the risk to an acceptable level.
The goals described above will be obtained not only by teaching some of the main theoretical aspects of computer security but also by describing and discussing many real world examples in detail.
The approach and the tools learned during this course are prerequisites for the following “Cryptographic Protocols” and “Computer, Network and Cloud Security” courses.
The course provides a global overview about the problem of mapping the cybernetic risks and their management, showing the current regulations and the situation in Italy. The course will focus on the following topics:
1) Introduction to the Cybersecurity problem: Aims and extent of the problem; Incident examples; Corporate Risks; Motivation of the Attackers; Inability to find global solutions.
2) Cybersecurity and Cyberspace: Definitions; CIA properties and attacks against them.
3) Malware and Cyberattacks: Definitions; Case studies and known Malware;
4) Cyberwar: Evolution of the attackers; From the worm to the Advanced Persistent Threat. Numbers and Countries behind the cyberwar.
5) Privacy in communications: End-to-end encoded channels; Encoded e-mails; Visible services not for intelligence purposes.
6) Cyber Risk Management: Definitions; Top-down and bottom-up risk approach. ISO 27001, NIST sp800-53 and other standards; Cybersecurity frameworks; National Framework for Cybersecurity and Essential PMI Management; Italian national regulations.
In this course, we discuss on one hand how cybercriminals actually operate, and on the other hand the legal framework that underpins the regulatory and privacy aspects that managers have to be aware of.
In the first part, we will start discussing the technical attack vectors (XSS, SQL Injections, XSRF, drive-by download) and how these vectors are embodied in complex attacks (malware, spyware, ransomware, botnets) Then, we will see how these attacks are used in the cybercrime economy (spam, phishing, infections and money laundering), and we will touch on the economic aspects of cyber criminality, and on the markets of cybercrime as a service. Finally, we will discuss attacks sophistication, state-sponsored attacks and the emergence of a grey-market. We will make use of case-studies (e.g., Hacking Team, Stuxnet, Flame, etc).
In the second part, we will discuss the national, European and international legal framework on privacy and the protection of personal data. Particular attention will be devoted to the EU General Data Protection Regulation – which will become applicable as of May 2018 - and on the EU-US-Privacy Shield, in consideration of the relevance of the transfer of personal data to the United States. The rules will be examined in the light of roles and responsibilities of Digital Technology Managers, who have to make crucial technical and organizational choices on security and data protection, such as in the selection of cloud service providers.
Then we will touch on other legal aspects of interest for the managers of IT- and IT-based companies, such as Intellectual Property Rights, IT contracts, administrative and criminal responsibility for cybercrimes.
The goal of the course is to give the participants an exhaustive overview of ICT hardware, software and services currently used within companies, as well as to illustrate some trend directions and next-generation technologies which might be adopted in business.
Starting from traditional tools like ERP and DBMS, the course introduces the area of information systems, presenting up-to-date techniques and software enabling the data storage, retrieval and knowledge extraction.
Then, it investigates the business opportunities, potential and applications within companies of emerging areas like mobile applications, cloud technologies and the Internet of Things.
The course is aimed at introducing the basic concept of marketing and distribution channel management. In detail, after an introduction to the marketing concept and orientation, the strategic approach to marketing is presented (i.e. innovation and new product development, managing the product life-cycle, the strategic sequence STP – segmentation, targeting and positioning), and then the 4 Ps (Product, Place, Price and Promotion) are analyzed focusing on distribution decisions. Practical application are presented by analyzing data on sales in grocery stores in the business to consumer context (modeled with linear and multinomial legit models), and data on buyer-seller relationships in the business to business framework.
This course develops a foundation of concepts and solutions that supports the planning, scheduling, controlling, resource allocation, and performance measurement activities required for successful completion of a project. Provides training and experience with project management tools and techniques, including work breakdown structures, network diagrams, risk management, earned value management, and other tools.
The course also addresses the main organizational issues in managing projects and leading project teams. It is fully aligned with Project Management Institute (PMI) standards.
The hallmark of last year’s attack on the Ukrainian power grid was the extensive reconnaissance, performed by attackers on their target’s control networks, used to maximize system disruption. Situational awareness, incident response and recovery all depend on an accurate understanding of control system inventories, including normal process behavior. The Ukrainian attack has led our community to a key question; do we know our industrial control networks as well as our adversaries?
Despite the emergence of technologies that monitor data flows of industrial control networks, energy operators consistently cite inadequate real time views to control system the topology, devices, and behavior as a fundamental obstacle to securing their operations. Historically, gathering and maintaining this information has proven incredibly labor intensive and disruptive to economic operations for energy operators.
The course will explore emerging technology and process-centric analytics that can facilitate more automated, passive methods of inventory collection, network monitoring and the definition of normal behavior of industrial control systems. These emergent technologies can enable operators to baseline normal operational process behavior and measure network loading. The course will explore the operational and safety benefits of automated inventory technologies such as improved visibility to misconfigurations and early detection of device failures. While improving operability, these technologies also hold the promise of expedited detection of adversaries’ reconnaissance activities and improved recovery times
The course is focused on the main strategic control concepts and tools to support the decision-making process as well as the strategic planning and budgeting. A brief introduction to the main concepts of finance and accounting is included. The course will combine front lectures, guest speakers’ lectures, case studies and team work. The whole course will based on a practical approach, although based on the general theoretical concepts of management accounting.
This course focuses on the study of processes required to create value for a final consumer, through the contribution of a network of companies (generally labelled as “supply chain”). Basic as well as more advanced elements of supply chain structure and management, purchasing processes and supplier management will be analysed. Special focus will be devoted to concepts and applications of “digital supply chains.
The main aim of our teaching staff is to first lay down a solid grounding of theory and then to build on this foundation by introducing more practical aspects. This method will result in you confidently entering the work environment of this industry, ready to deal with any scenario you will face.
The courses are structured to give the maximum freedom to learn to the students and allow the professors to teach and assess the students in the best way possible. Assessments can take the form of individual/group presentations, projects, oral and written exams as well as, of course, class participation.
The teaching sessions are organized to help students grasp these concepts and techniques through the use of lectures and seminars; group projects and company visits; guest speakers and case studies; videos and presentations; as well as individual assignments and assisted private studying. The teaching program is completed by masters lectures given by professionals coming from specific sectors, different universities or politics. Students will have this way the possibility to directly interact with experts through the analysis of case history.
The integration with companies is a priority and an ever-present feature of all programs of the Bologna Business School, hence for the Master in Digital Technology Management too.
The School is fully committed to creating employability, by way of a systematic career service action, constantly focused on matching at best the students’ professional projects with the needs companies have.
The internship is an exceptional springboard, suffice it to say that six months after the end of the full-time masters at Bologna Business School on average 90% of students work in a company.
The BBS Career Service assists and supports students since the very beginning, along a training and professional development path. This is accomplished by organizing a series of workshops, with the aim of providing the fundamental tools and resources to be appropriately prepared for the labor market.
To achieve this goal, students are involved in several workshops, among which we may list:
In addition to this, thanks to the collaboration with professional career counselors, students receive a customized service, in order to understand their strengths and to build a professional development plan, which will turn out to be helpful when looking for an internship. Here follow some of the activities:
Finally, all students can use Job Teaser, a career platform allowing them to be constantly updated on events and job postings in our partners companies, and much more.
The goal of the Career Service is also to allow students to connect with national and international companies. Over the years, Bologna Business School has managed to establish a wide-ranging network and a sound partnership with leading companies in Italy, thanks to a personalized approach, based on each company’s needs. The collaboration features the following activities:
If you need more information regarding the composition of the class such as age, geographic origin and students’ background, you can download the class profile, clicking here: class profile_DigitalTec
Our partners are the foremost supporters of our students, with the provision of scholarships, internships and professional opportunities.
Bologna Business School’s partner companies for the Master in Digital Technology Management are:
ANCORA SERVIZI AQSEPTENCE AUTOMOBILI LAMBORGHINI BVM LES COPAINS CAMST CAREGIVING CARPIGIANI CHAMPION CINECA CINI CNA di BOLOGNA COLOMER GROUP COOP CENTRALE ADRIATICA CRIF DATALOGIC DUCATI EGS ENGINEERING FREELANDS NETWORK GA OPERATION - Gruppo Giorgio Armani GMPR COMUNICAZIONE GRAPHIC STORE GRUPPO MAX MARA GRUPPO MONTENEGRO GRUPPO TREVI HAVAIANAS HAYS HERA IMOLA IBM ICONSULTING IMA IOSA GHINI IREN LIU JO MOLLUSCO & BALENA COMUNICAZIONE NIKE ITALY PDFOR Consulenza PUCCI BERNI REMEMBRANE SCHNEIDER ELECTRIC SCS CONSULTING SIGMA SPINDOX SPORT LAB STS ACADEMY TECHNOGYM TETRAPACK UNIGRA' VALSOIA VODAFONE VOSSLOCH
Oops! We could not locate your form.
The tuition fees for the Master is 14,800 euro (VAT free) to be paid in three installments:
The fee includes participation in the Master, all the study material available through the online platform, and access to the services and facilities of Bologna Business School such as: personal account for the Alma wi-fi, use of the PCs in the Computer Lab, access to the study areas, access to the internal gym, special rates for the School restaurant. Furthermore, the fee gives participants the right to take advantage of the supporting activities of the School, such as the language courses and the master lectures by invitation.
Free parking is also available within BBS Campus.
Additionally, with the Student Card of the University of Bologna, students have access to all of the university facilities, including over 100 libraries, digital resources and study halls (including databases and online subscriptions); the three city center canteens and all university student related discount offers. More information is available on the site of the University of Bologna: http://www.unibo.it/en/services-and-opportunities/index.html
Thanks to the agreement between Bologna Business School and Intesa Sanpaolo, participants are eligible to apply for “PerTe Prestito Con Lode”, a long-term and low-interest honor loan.Main characteristics:
Download the description document here
At Bologna Business School we understand the importance of financial aid in supporting our students to achieve their educational goals. We are aware that an advanced, high quality training path can be a significant commitment, at the same time we also truly believe that investing in one’s future always pays back.
Bologna Business School is pleased to offer partial scholarships to the most meriting students. All of these scholarships are merit-based and will be awarded to the top-ranked candidates in the selection process. The students who come out on top in the selections will be students who not only come from strong academic or practical backgrounds but also those who display the strongest motivation to take part in this program.
There are scholarships of 6,000 euros and scholarships of 4,000 euros. All applicants will be considered for a scholarship – no specific application is required. They are awarded over the course of every round of selection and if you have performed well enough to merit one of them, you will be informed at the moment of admission.
The scholarships act as tuition waivers, so that they result in a deduction of the total amount of the tuition fees due.
For the registration it is necessary:
Admission to the program is subject to the positive assessment of your individual interview and English test, if it’s not the candidate’s native language.
This Master’s is open to all applicants with a bachelor’s degree obtained before the enrolment deadline of each round.
Documents to send to firstname.lastname@example.org:
The selection process will be held at Bologna Business School. The selections for the first round will take place in July, 2018
while the selections for the second round and the third round will take place in October, 2018.
In line with the number of available places, admission to the program is granted according to the position on the list of qualified candidates, drawn up on the basis of the total score awarded at the end of the admissions process.
Detailed information on the requirements and application process are available in the “Official Call for Applications” downloadable below.
Faculty members at Bologna Business School work together offering outstanding teaching standards. An international and interdisciplinary approach is guaranteed by a joint team of distinguished national core professors, adjunct, visiting professors, guest speakers and top managers.
Assistant Professor of Engineering and Management
University of Bologna
President School of Science
Full Professor of Information Security and Networks Systems and Applications
University of Modena and Reggio Emilia
University of Bologna
Marco Di Felice
Associate Professor of Computer Science
University of Bologna
Eindhoven University of Technology
Full Professor of Computer Science
University of Bologna
Full Professor of Economics and Business Administration
University of Bologna
Associated professor of Industrial Logistic
University of Bologna
Full Professor - Head of Department of Computer Science and Engineering
University of Bologna
Partner at YourCFO Consulting Group
YourCFO Consulting Group
ICT Security Consultant
Associate Professor of Performance Management
University of Bologna
Strategic Designer - GELLIFY
University of Bologna
Freelance ICT security & audit consultant
Associate Professor of Marketing
University of Bologna
University of Bologna
Full- Professor Department of Computer Science and Engineering
University of Bologna