The degree programme concludes with a Bachelor of Science (B. Sc) and as an expert in cyber security and information security you will then have excellent career prospects.
As a graduate of the degree programme, you will be able to
- Create risk analyses and develop strategies based on them to prevent security incidents. Develop or optimise concepts, structures and architectures in the field of IT security under supervision.
- Align the digital transformation in companies and administration with current security-specific standards and regulations. They assess the impact of corporate and administrative processes on IT security. You will be able to play an operational role in certification processes and risk management as part of an ISMS based on national and international standards.
- accompany IT measures in companies and administrations during the introduction to and operation of application systems with regard to information security.
- recognise specific cyber attacks, analyse them and develop suitable countermeasures.
- take over the administration of security-relevant components in the IT infrastructure (firewall, database, cloud systems, ...).
- provide employees in companies and administrations with professional and targeted training, education and awareness measures in the area of information security.
- to operate in interdisciplinary areas such as administrative and IT law, project management and to use relevant key qualifications such as teamwork, presentation techniques or rhetoric appropriately and purposefully.
With the skills you have acquired, graduates of the Cyber Security Management degree programme are able to take on important key tasks for companies in procedural and organisational information security, IT operations and information technology.
They deal with the design, development, selection and utilisation of IT security architectures, IT security procedures and technologies in companies and in administration. The studies will enable you to take on qualified and competent tasks at the interface between the specialist department and IT security in a company.
















