This feature allows you to view your educational path, if you enrolled in previous years

Curriculum(s) for 2025 - Cybersecurity (33516)

Single curriculum
Lesson [SSD] [Language] YearSemesterCFU
1047622 | CRYPTOGRAPHY [INF/01] [ENG]1st1st6

Educational objectives

General Objectives
The goal of the course is to hand down the foundations of cryptography, which is at the heart of security in nowadays digital applications.

Specific Objectives
The students will learn the methodology of provable security, which allows to prove security of modern cryptosystems in a mathematically sound way.

Knowledge and Understanding
-) Knowledge of the mathematical foundations of modern cryptography.
-) Knowledge of the main hardness assumptions, on which the security of cryptographic constructions is based.
-) Knowledge of the cryptographic schemes currently used in real life. Understanding of their (practical and theoretical) properties.

Applying knowledge and understanding:
-) How to select the right cryptographic scheme for a given application.
-) How to analyze the security of a given cryptographic scheme.

Autonomy of Judgement
The students will be able to judge whether a given cryptographic scheme is secure or not.

Communication Skills
How to describe the security of a cryptographic construction in the language of provable security.

Next Study Abilities
The students interested in research will learn what are the main open challenges in the area, and will obtain the necessary background for a deeper study of the subjects.

1027171 | NETWORK INFRASTRUCTURES [ING-INF/03] [ENG]1st1st6

Educational objectives

This course presents the basic concepts, protocols and architectures of the current network infrastructures. Specific attention is given to the broadband access, the optical backbone and the next-generation wireless networks. Furthermore, main technologies leading to the QoS support in a network infrastructure are described.

Expected learning results
At the end of the course the students will have competences in technologies and network infrastructures presented in the course like: xDSL, PON, LTE, 5G, SDH, OTN, SDN. Moreover, they will be able to configure and analyze an IP based network by using the Netkit tool. Specific projects carried out during the course will allow the students to apply their knowledge to innovative network scenarios and applications.

1022807 | Distributed Systems [ING-INF/05] [ENG]1st1st6

Educational objectives

Computing systems are at the heart of any information systems today. This course
aims to provide students with a clear characterization of concurrency in a
distributed system considering its characteristics like failures,
variable latencies and the absence of a global clock. The course will
analyze the main system models and abstractions for basic communications and
synchronization. Finally, we will provide the concepts related to distributed consensus and an introduction to distributed ledgers.

Knowledge and understanding
The student will be able to design systems and distributed algorithms on top of different system models such as synchronous, asynchronous and partially synchronous, while understanding impossibilities and limitations in performance. Students will also have the ability to abstract systems and platforms using models that are easier to treat.

1055043 | Statistics [SECS-S/01] [ENG]1st1st6

Educational objectives

The course includes topics and themes of specific relevance for cybersecurity. Intensive work is carried out on the computer, actually coding statistical algorithms, Monte Carlo Methods and simulations in order to acquire a solid
understanding of actual implementation of statistical methods.
Last generation OOP languages and IDEs are used. Students are also required to maintain a blog with all their researches carried out during the course upon indication of the instructor.

Knowledge and Understanding
To understand the fundamental statistical concepts including sampling, experimentation, variability, distribution, association, causation, estimation, confidence, hypothesis testing, and significance; to review and analyze statistical arguments, and to appreciate the relevance and importance of statistics.

Applying Knowledge and Understanding
The student will acquire the following skills: collecting, organizing and interpreting numerical data; interpreting and communicating the results of a statistical analysis. Understanding and making sensible decisions based on the analysis of numerical information.

Elective course [N/D] [ENG]1st1st12

Educational objectives

Provided for by the study plan, at the student's choice.

1055055 | Cyber and Computer Law [IUS/20] [ENG]1st2nd6

Educational objectives

General Objective
The aim of the course is to deepen on the main issues of legal regulation of computer activities, in companies and in public administration, with reference to the issues of computer security and Cybercrime, regulation on the development and processing of personal data and on e-commerce and intellectual property in computer matters. The course is structured in modules also with examination of practical cases.

Knowledge and Understanding
At the end of the course, the student is able to identify and develop the main legal knowledge in the field of data processing and therefore to operate effectively within public administrations in the relationship with judicial or police offices. It is also able to participate effectively in working groups or joint investigation teams having clear the essential notions and legal responsibilities. The course allows the student to connect technology skills with organizational, economic and legal skills regarding the use of computer science tools in business and public sector.

Application of Knowledge and Understanding
For the realization of the training objectives, the didactic activities are articulated in thematic study modules, for the definition and the intervention in specific contexts or in particular situations of risk or emergency and to understand the needs of operators, there will also be joint initiatives with other courses of study on the issues of security, resilience and methodology for the acquisition of traces and evidences of cyber crime also in the international environment.

1055682 | ETHICAL HACKING [INF/01] [ENG]1st2nd9

Educational objectives

General objectives
Ethical hackers are a category of professionals increasingly in demand by companies and governments aware of the need to effectively protect their infrastructure from possible cyberattacks. The course deals with the fundamentals of ethical hacking. In particular, it starts from the systematic study of the methodologies and tools used by hackers to carry out the various attacks in the cyberspace. Next, it illustrates how the professional of ethical hacking can carry out a series of legal and useful activities by subjecting the computer systems to vulnerability tests. These tests are intended to evaluate and prove the cybersecurity of an organization and to help owners and managers to become aware of, and solve their cybersecurity problems. Particular attention is paid to the practical application of the concepts learnt.

Specific objectives
The course explains in detail what hackers are doing, how hacking activities occur, how hackers illegally manage to enter a computer system protected by security measures, and how to defend against them.

Knowledge and understanding
Understanding the Ethical Hacking concepts and scope. Namelly, Casing the Establishment: the hacking techniques used to enumerate the targets completely. Endpoint and Server Hacking: the ultimate goals of any hacker including Advanced Persistent Threats. Infrastructure hacking: the way hackers attack the equipments our systems connect to. Application and Data Hacking: attacks to web/databases world as well as mobile hacking techniques. The countermeasures that can be used to hinder hackers' activities on the subsystems considered. Penetration testing execution standards.

Application of knowledge and understanding
At the end of the course, students will have the ability to analyze complex cybersystems and gain a better understanding of the target organization's vulnerabilities. Produce report in a manner that provides the most value to the target organization executives.

Wisdom of judgement
Students develop the ability to plan ethical hacking activities in a way that do not violate current applicable law. Ability to follow a code of ethical conduct and provide assurance of good intentions in conducting systems penetration testing activities.

Communicative Capabilities
Students will learn how to document their choices, including through the use of automated reporting tools. They will also have acquired the ability to prepare presentations on scientific subjects.

Ability to pursue learning independently
The notions acquired during the course will provide students with a solid knowledge in order to further investigate the most technical aspects, and to keep themselves informed about the continuous developments and updates of the ethical hacking sector.

1055681 | MALWARE ANALYSIS AND INCIDENT FORENSICS [ING-INF/05] [ENG]2nd1st9

Educational objectives

Today's cyber security scenario shows a relentless growth of malicious software used to perpetrate cyber attacks. This course aims to provide students with the knowledge, methods and basic tools to analyze, identify, categorize and understand the behavior of different classes of malicious software. The course will adopt a practical approach, with frequent application of the learned methods to real-world cases.

Expected learning results
Students will be able to analyze, both manually and through the use of automated tools, malicious software of different nature to identify all its salient features. They will be able to extract these characteristics and relate them with existing knowledge bases. Finally, students will be able to contextualize these activities as part of an overall process of threat intelligence and incident management caused by such malicious software.

1055061 | Security Governance [ING-INF/05] [ENG]2nd1st6

Educational objectives

General Objectives

The course has the main aim to provide students with the capability of analyzing and designing processes for cyber security management.

Knowledge and understanding

The main objective of the course is to provide an introduction to all the issues related to the security governance.
In particular, the student will learn how building up a security governance environment is a vertical problem with respect to the organization and that its management impacts different enterprise's levels.
Aspects related to laws, regulations and both international and national standards will be analyzed. It will then be discussed how, from a methodological point of view, these aspects are transposed and implemented through the definition of appropriate frameworks for cybersecurity management.

- Apply knowledge and understanding

Another fundamental aspect of the course is to provide students with methodologies and tools to let them able to face open problems with respect to the analysis, verification and certification of cybersecurity.

- Critical and judgment skills

The student will acquire the necessary tools to analyse, evaluate and compare different situations and design the appropriate countermeasures to improve the security status of the considered enterprise.

- Communication skills

The student will learn the domain specific language.

- Learning ability

The student will be able to adopt and re-apply all the methods discussed during the course

AAF1803 | Cyber Security Seminars [N/D, N/D] [ENG]2nd2nd6

Educational objectives

Organizations today are facing an increasing sophistication, stealth and persistence of cyber-attacks – from nation-states, organised crime, hacktivists, as well as threats from within the organisation.
The goal of the course is to describe the main critical challenges of protecting information systems and assets – financial information, customer data, intellectual property – and the implications of failing to do so.

AAF1028 | Final exam [N/D] [ITA]2nd2nd30

Educational objectives

The final exam consists in the discussion of a master thesis, composed of a document written in English, which presents the results of an original study conducted on a problem of an applicative, experimental or research nature. The preparation of the thesis takes place under the direction of a teacher in the second year of the course.

The final exam assesses the ability to apply the knowledge learnt to a specific problem, the ability to make autonomous decisions and to communicate the methodological and technical aspects of the work carried out.