Computer Systems and Networks Security (Classe L-31)-Enrolled from 2018/19 Academic Year
The degree program aims to provide a broad and in-depth technological and methodological preparation in the IT area, with specific attention to topics in the cybersecurity and information privacy areas as well as a solid and methodological knowledge of the main areas of mathematics, physics, and the like, thus offering adequate preparation for assimilating, understanding and evaluating the impact of scientific and technological progresses within the Information technology area with particular focus on the cybersecurity and privacy fields. The graduate in Systems and Network Security will be able to face all the problems deriving from the creation of secure services both at infrastructural and application level. The course also aims to provide an in-depth operational knowledge that allows graduates to be engaged by professional subjects, either private or public, interested in the adoption of methodological and technological tools for improving the security of their IT services and infrastructures.
Cybersecurity Consultants
These professional figures operate in the business consultancy sector as a support to
companies in the analysis and resolution of IT security issues related to information system, data processing, system and network management, and applications development.
They carry out highly specialized professional activities in the field of business consultancy for both private and public companies which lack adequate computer security skills for correct and effective management of information systems as well as data processing systems.
IT technicians specialized in systems, networks and mobile devices security
Cyber security experts that inserted in the staff of a company bring the required skills for the secure management of databases, systems and networks equipment, PCs and mobile devices. The functions covered include: the management of access control policies and systems, the secure configuration and management of specific IT systems, the monitoring of a company IT systems and the management of technologies for disaster recovery and
business continuity.
The secure management of systems, networks and mobile devices is a corporate requirement spread horizontally on the large part of the industrial, public administration and services sectors. All large companies as well as small and medium-sized enterprises have an internal staff to manage their information systems, including proprietary data
and managerial and commercial transactions. Security and business continuity requirements are at the basis of the well functioning of such systems.
Specialized technicians in the analysis and development of secure software applications
The professional profiles included in this category belong to the professional profiles of software analysts and designers with particular skills regarding the use of methodologies
aimed at identifying security vulnerabilities and preventing security problems
in application. They are also experts in cryptographic techniques (algorithms and protocols) to be used for the protection of data.
Developing software according to security criteria and verifying the security of third party software are necessities now common to most software houses where this job profile is particularly required.
Specialized technicians in the analysis and development of secure web applications, multimedia, interactive and mobile applications
The professional profiles included in this category are web applications analysts and designers with specific skills regarding the security of applications characterized by strong interactivity and the use of mobile devices. These professionals integrate the ability to develop web applications with knowledge of the security problems and contribute to protect company assets from what is today the main channel of malicious code propagation, unauthorized accesses and computer crimes.
The increasing spread of e-commerce, web transactions between companies and the development of mobile apps for providing customer services makes these professional figures more and more relevant for all companies, both private and public and of any size and industrial sector, which have adopted web services as one of the main communication channels for their commercial presence or for the provision of services.
Technicians specialized in information and communication technologies
The professional profiles included in this category are experts in the management, deployment and use of information and communication technologies in the various operational contexts. These professionals integrate the ability to develop and maintain computer applications, even complex, with the knowledge of various application contexts (industrial automation, information systems, digital communication, decision support, etc.).
Graduates can operate in the many ICT application fields for the design, deployment and management of IT systems, and for the study of new architecture and/or applications
Employment statistics (Almalaurea)
These professional figures operate in the business consultancy sector as a support to
companies in the analysis and resolution of IT security issues related to information system, data processing, system and network management, and applications development.
They carry out highly specialized professional activities in the field of business consultancy for both private and public companies which lack adequate computer security skills for correct and effective management of information systems as well as data processing systems.
IT technicians specialized in systems, networks and mobile devices security
Cyber security experts that inserted in the staff of a company bring the required skills for the secure management of databases, systems and networks equipment, PCs and mobile devices. The functions covered include: the management of access control policies and systems, the secure configuration and management of specific IT systems, the monitoring of a company IT systems and the management of technologies for disaster recovery and
business continuity.
The secure management of systems, networks and mobile devices is a corporate requirement spread horizontally on the large part of the industrial, public administration and services sectors. All large companies as well as small and medium-sized enterprises have an internal staff to manage their information systems, including proprietary data
and managerial and commercial transactions. Security and business continuity requirements are at the basis of the well functioning of such systems.
Specialized technicians in the analysis and development of secure software applications
The professional profiles included in this category belong to the professional profiles of software analysts and designers with particular skills regarding the use of methodologies
aimed at identifying security vulnerabilities and preventing security problems
in application. They are also experts in cryptographic techniques (algorithms and protocols) to be used for the protection of data.
Developing software according to security criteria and verifying the security of third party software are necessities now common to most software houses where this job profile is particularly required.
Specialized technicians in the analysis and development of secure web applications, multimedia, interactive and mobile applications
The professional profiles included in this category are web applications analysts and designers with specific skills regarding the security of applications characterized by strong interactivity and the use of mobile devices. These professionals integrate the ability to develop web applications with knowledge of the security problems and contribute to protect company assets from what is today the main channel of malicious code propagation, unauthorized accesses and computer crimes.
The increasing spread of e-commerce, web transactions between companies and the development of mobile apps for providing customer services makes these professional figures more and more relevant for all companies, both private and public and of any size and industrial sector, which have adopted web services as one of the main communication channels for their commercial presence or for the provision of services.
Technicians specialized in information and communication technologies
The professional profiles included in this category are experts in the management, deployment and use of information and communication technologies in the various operational contexts. These professionals integrate the ability to develop and maintain computer applications, even complex, with the knowledge of various application contexts (industrial automation, information systems, digital communication, decision support, etc.).
Graduates can operate in the many ICT application fields for the design, deployment and management of IT systems, and for the study of new architecture and/or applications
Employment statistics (Almalaurea)
The education program can be enriched by educational activities abroad both to deepen some topics and as socialization experience in international environments. WIthin the Erasmus+ program study periods can be taken in over 50 universities in Belgium, Finland, France, Germany, Greece, Lithuania, Norway, Netherlands, Poland, Portugal, Czech Republic, Romania, Spain, Switzerland, Hungary. Courses will be recognized in the personalized study plan. These periods abroad are typically 5-month long and include courses for about 30 CFU, in the area of information and communication technology and related applications. Recognition of these educational activities will be based on the Learning Agreement, to be defined in advance by the student and the Erasmus coordinator at the Computer Science Department before starting the period abroad: course in the learning agreement with passed exams will replace the educational activities of the study plan ("manifesto"), either by covering the same topics or complementing the acquired basic competences. The Erasmus Committee at the Computer Science Department will perform the recognition of CFU obtained abroad and the definition of the personalized study plan. Similarly, stages to prepare the final dissertation are allowed in the same foreign universities. Recognition will be performed by the Department Erasmus Committee.
La frequenza non è obbligatoria ma fortemente consigliata.
Courses list
First year
Courses or activities | Max ECTS | Total hours | Language | SSD |
---|---|---|---|---|
Compulsory | ||||
Continuum Mathematics | 12 | 120 | Italian | MAT/01 MAT/02 MAT/03 MAT/04 MAT/05 MAT/06 MAT/07 MAT/08 MAT/09 |
First semester
Courses or activities | Max ECTS | Total hours | Language | SSD |
---|---|---|---|---|
Compulsory | ||||
Computer Architecture | 6 | 60 | Italian | INF/01 |
Computer Programming | 12 | 120 | Italian | INF/01 |
Discrete Mathematics | 6 | 56 | Italian | MAT/01 MAT/02 MAT/03 MAT/04 MAT/05 MAT/06 MAT/07 MAT/08 MAT/09 |
Second semester
Courses or activities | Max ECTS | Total hours | Language | SSD |
---|---|---|---|---|
Compulsory | ||||
Cybercrime Legal Framework | 6 | 48 | Italian | IUS/17 |
Web and Mobile Programming | 6 | 48 | Italian | INF/01 |
Web and Mobile Systems Security | 6 | 56 | Italian | INF/01 |
Open sessions
There are no specific sessions for these activities (e.g. open online courses).
Courses or activities | Max ECTS | Total hours | Language | SSD |
---|---|---|---|---|
Compulsory | ||||
English Assessment B1 (3 ECTS) | 3 | 0 | Italian | L-LIN/12 |
First semester
Courses or activities | Max ECTS | Total hours | Language | SSD |
---|---|---|---|---|
Compulsory | ||||
Algorithms and Data Structures | 12 | 120 | Italian | INF/01 |
Operating Systems I | 6 | 48 | Italian | INF/01 |
Operating Systems Ii | 6 | 72 | Italian | ING-INF/05 |
Statistics and Data Analysis | 6 | 60 | Italian | INF/01 |
Second semester
Courses or activities | Max ECTS | Total hours | Language | SSD |
---|---|---|---|---|
Compulsory | ||||
Computer Networks | 12 | 120 | Italian | INF/01 |
Cryptography | 6 | 48 | Italian | INF/01 |
Databases | 12 | 120 | Italian | INF/01 |
be activated by the A.Y. 2020/2021
First semester
Courses or activities | Max ECTS | Total hours | Language | SSD |
---|---|---|---|---|
Compulsory | ||||
Biometric Systems | 6 | 48 | Italian | INF/01 |
Secure Software Design | 6 | 60 | Italian | INF/01 |
System and Network Security | 12 | 96 | Italian | INF/01 |
Optional | ||||
Model-Driven Software Design | 6 | 60 | Italian | INF/01 |
Second semester
Courses or activities | Max ECTS | Total hours | Language | SSD |
---|---|---|---|---|
Compulsory | ||||
Computer Forensics | 6 | 48 | Italian | ING-INF/05 |
Conclusive activities
Courses or activities | Max ECTS | Total hours | Language | SSD |
---|---|---|---|---|
Compulsory | ||||
Economical, Ethical, Social, and Legal Aspects of It | 3 | 24 | Italian |
Conclusive activities
There are no specific sessions for these activities (e.g. open online courses).
Courses or activities | Max ECTS | Total hours | Language | SSD |
---|---|---|---|---|
Compulsory | ||||
Final Stage | 15 | 0 | Italian | |
Final Exam | 3 | 0 | Italian |
Optional activities and study plan rules
1 - Free choice courses.
Students will have to achieve 12 free cfu among the courses of the previous tables, among the following courses activated by the Department, or among all the courses activated by the university.
Students can request the recognition of credits for training activities at external institutions, presenting a certification. Each certification can give rise to a maximum of 3 credits, and up to 2 certifications can be recognized. The students who intend to request the recognition of the certifications must complete the "application" form available on the page http://www.unimi.it/studenti/segreterie/963.htm and send ver to the secretary of his / her degree together with a copy of the certifications achieved.
The evaluation will be carried out by a special commission based on the following parameters:
- Validity: the certification must have been obtained for a maximum of 5 years.
- Specificity: the object of the certification must be those referable to those required by the degree course in which the student is regularly enrolled.
- Specialization: the certification must concern specialized and / or professional skills.
- Level: the certification must attest to skills of a medium or advanced level. Basic and entry level certifications are excluded.
ADDITIONAL COURSES ACTIVATED BY THE EDUCATIONAL EDUCATIONAL COLLECTION OF INFORMATICS AVAILABLE FOR THE FREE SELECTION:
Students will have to achieve 12 free cfu among the courses of the previous tables, among the following courses activated by the Department, or among all the courses activated by the university.
Students can request the recognition of credits for training activities at external institutions, presenting a certification. Each certification can give rise to a maximum of 3 credits, and up to 2 certifications can be recognized. The students who intend to request the recognition of the certifications must complete the "application" form available on the page http://www.unimi.it/studenti/segreterie/963.htm and send ver to the secretary of his / her degree together with a copy of the certifications achieved.
The evaluation will be carried out by a special commission based on the following parameters:
- Validity: the certification must have been obtained for a maximum of 5 years.
- Specificity: the object of the certification must be those referable to those required by the degree course in which the student is regularly enrolled.
- Specialization: the certification must concern specialized and / or professional skills.
- Level: the certification must attest to skills of a medium or advanced level. Basic and entry level certifications are excluded.
ADDITIONAL COURSES ACTIVATED BY THE EDUCATIONAL EDUCATIONAL COLLECTION OF INFORMATICS AVAILABLE FOR THE FREE SELECTION:
Courses or activities | Max ECTS | Total hours | Language | Lesson period | SSD |
---|---|---|---|---|---|
Model-Driven Software Design | 6 | 60 | Italian | First semester | INF/01 |
Vengono illustrate le propedeuticità obbligatorie e consigliate tra i corsi che garantiscono un percorso d'apprendimento ottimale.
Course location
Milano
Presidente del Collegio Didattico
Prof. Giovanni Pighizzini
Tutors professors
Reference structures
Contacts
- Segreteria Didattica
Via Celoria 18, Milano
https://ssri.cdl.unimi.it/
[email protected]
+390250316250/252 - IMMATRICOLAZIONI E AMMISSIONI
http://www.unimi.it/studenti/matricole/77598.htm - Segreterie Studenti
Via Celoria 18, Milano
https://www.unimi.it/it/studiare/servizi-gli-studenti/segreterie-infostudenti
+39199 188 128
https://www.unimi.it/it/studiare/servizi-gli-studenti/segreterie-infostudenti/sedi-e-orari-segreterie-studenti - Commissione Piani di Studio
Via Celoria 18, Milano
http://www.di.unimi.it/ecm/home/organizzazione/organi-di-governo/altre-commissioni/content/piani-di-studio.0000.UNIMIDIR
[email protected]
A.Y. 2025/2026
A.Y. 2024/2025
A.Y. 2023/2024
A.Y. 2022/2023
A.Y. 2021/2022
A.Y. 2020/2021
A.Y. 2019/2020
A.Y. 2018/2019
Official documents