Informatics Security
The training path is aimed at creating professionals with high-level scientific and technological skills, methodological and operational skills and an open and critical vision of the problems connected to the adoption and use of information technologies, with particular reference to the use of scientific and technological solutions relating to cybersecurity.
The educational objectives described above are acquired through participation in lectures, personal study and classroom or laboratory exercises. Graduates who have sufficient credits in appropriate groups of disciplinary sectors will be able to access the teaching profession in secondary schools, according to the provisions in force.
Role in a work context
Experts in advanced cybersecurity issues related to the design, configuration and management of IT networks and infrastructures for critical systems and resources. These professional figures deal with technological aspects for which an extremely in-depth knowledge of the technologies and evolutionary trends for cybersecurity at a global level is required. They are therefore indispensable in cases where the ability to analyze highly complex and specific technological scenarios is required, including architectures based on IoT, cyber-physical systems, cloud/fog/edge computing, mobile architectures and data intensive architectures.
Skills associated with the role
These professional figures are advanced level specialists who have studied in particular all the aspects, even the most detailed ones, of the scientific, methodological, technological and application aspects of cybersecurity in networks and infrastructures. Advanced skills of this type are required for the detection, analysis, defense and prevention of intrusions, cyber attacks and malware.
Career opportunities
They carry out specialized professional activities in the field of design and management of secure IT networks and infrastructures. This activity may be carried out, even as a freelancer, in all areas of the private and public sector that operate in the design, development, management, maintenance or use of IT networks and infrastructures in a wide range of sectors, including information and communication technologies and all application sectors that use them. This activity may also be carried out in research institutions and universities as technical support for research and experimentation activities in the fields of knowledge and skills of this professional profile.
Specialists in the design and management of solutions for the secure processing and protection of data
Function in a work context
Experts in advanced data protection issues in the context of data management, analysis and sharing. These professional figures address issues that require extremely in-depth knowledge of the scientific, methodological, technological and applicative aspects related to data security and privacy. They are therefore indispensable in cases where the ability to analyze highly complex and specific scenarios is required, including IoT, cyber-physical, cloud/fog/edge, mobile and data-intensive architecture scenarios.
Skills associated with the role
These professional figures are advanced level specialists who have studied in particular all the aspects, even the most detailed ones, of the scientific, methodological, technological and application aspects of data security and privacy. Advanced skills of this type are required to ensure the management, analysis, use and sharing of data, guaranteeing its protection.
Career opportunities
They carry out specialized professional activities in the field of design and management of solutions for the secure processing of data that are increasingly necessary in the modern digital society based on the collection, sharing, and analysis of large collections of data and which therefore requires guarantees of correct protection and use of data in compliance with legislation, regulations, and protection requirements by citizens, businesses and companies. This activity may be carried out, even as a freelancer, in all areas of the private and public sector that operate in the design, development, management, maintenance or use of information systems, applications, or data processing scenarios in a wide range of sectors, including information and communication technologies and all application sectors that use them. This activity may also be carried out in research institutions and universities as technical support for research and experimentation activities in the areas of knowledge and skills of this professional profile.
Specialists in the design and management of IT systems, information systems and applications with security and privacy guarantees
Function in a work context
Experts in advanced cybersecurity issues relating to both the systems and critical resources of a company (data centers, high-reliability systems, intellectual property, sensitive data) and those arising from the most innovative technological solutions. These professional figures deal with technological aspects for which an extremely in-depth knowledge of technologies and evolutionary trends at a global level is required. They are therefore indispensable in cases where the ability to analyze highly complex and specific technological scenarios is required.
Skills associated with the role
These professional figures are advanced level specialists who have studied in particular all the aspects, even the most detailed ones, of some innovative technologies. Advanced skills of this type may be required in all typical areas of cybersecurity, from secure programming with the application of advanced static and dynamic analysis methodologies, the analysis of malicious code continuously released on the Internet, advanced encryption techniques, advanced techniques for protecting data and ensuring their security and confidentiality, advanced artificial intelligence techniques with consideration of their security as well as the application of such techniques in security solutions and testing and monitoring methodologies of innovative applications.
Career opportunities
The information technology sector is characterized by the presence in many companies, both large and small but highly specialized, as well as in the consulting sector, of technological excellence that involves the continuous research and application of the most innovative solutions. In all these cases, the management of corporate information systems requires highly specialized professionals capable of dealing with complex scenarios in which technologies that present highly difficult problems are used. This activity may be carried out, even as a freelancer, in all areas of the private and public sector that operate in the design, development, management, maintenance or use of computer and information systems, or applications in a wide range of sectors, including information and communication technologies and all application sectors that use them. This activity may also be carried out in research institutions and universities as technical support for research and experimentation activities in the areas of knowledge and skills of this professional profile.
Information and communication technology specialists
Function in a work context
The professions included in this category belong to the professional profiles of experts in the use, in various operational contexts, of the information and communication technologies, on which the LM-66 course of study is largely based.
These professional figures integrate the ability to develop sophisticated IT applications with knowledge of operational issues in various application contexts (including IoT, cloud/fog/edge computing and data intensive architectures) by designing, managing and maintaining complex and articulated IT applications.
Skills associated with the function
These professional figures possess excellent fundamental knowledge and a broad spectrum of knowledge and skills in the various sectors of IT, are familiar with the scientific method of investigation, have high modelling skills, know how to understand and use mathematical tools to support IT skills, are able to manage group activities, operate autonomously and fit in quickly in work environments.
Career opportunities
Graduates can work in the most varied application areas for the design and management of complex IT systems and for the study and research of new systems and applications. This activity can be carried out, even as a freelancer, in all areas of the private and public sector that operate in the design, development, management, maintenance or use of IT systems, or applications in a wide range of sectors, including information and communication technologies and all the application sectors that use them. This activity can also be carried out in research institutions and universities as technical support for research and experimentation activities in the areas of knowledge and skills of this professional profile.
Employment statistics (Almalaurea)
Erasmus: the coordinator for the Department of Informatics is Prof. Fabio Scotti.
International Programs: the coordinator for the Department of Informatics is Prof. Davide Rocchesso.
More information are available at the following link: https://di.unimi.it/it/rapporti-internazionali/mobilita-internazionale/opportunita-internazionali
- graduates of the degree class in Computer Science and Technology (L-31) and of the corresponding class relating to Ministerial Decree 509/99;
- graduates of other classes provided that they have acquired at least the following in their previous studies:
48 credits in the INF/01 or ING-INF/05 sector
12 credits in the MAT/01- 09 sectors
The degree course may also be accessed by those in possession of another qualification obtained abroad and recognized as suitable on the basis of equivalence who have acquired skills and knowledge equivalent to those of the above-mentioned requirements.
To verify the curricular requirements and personal preparation, the candidate must provide the following documents: degree certificate with grade, list of exams passed with grade and number of credits.
Verification of the adequacy of personal preparation will be based on the results reported in the exams of the scientific-disciplinary sectors indicated among the access requirements. When this does not demonstrate the full adequacy of the personal preparation, the candidate will also be required to pass an individual interview.
Admission
Application for admission: from 22/01/2025 to 31/10/2025
Application for matriculation: from 02/04/2025 to 15/01/2026
Admissions A.Y. 2026/2027
Admission applications for Academic Year 2026/2027 are now open. Non-EU students visa applicants are required to apply for admission no later than 30 April 2026.
| Courses or activities | Max ECTS | Total hours | Language | SSD |
|---|---|---|---|---|
| Compulsory | ||||
| Cryptography | 6 | 42 | Italian | INF/01 |
| Privacy and Data Protection | 6 | 42 | Italian | INF/01 |
| Secure Data Management | 6 | 42 | Italian | INF/01 |
| Courses or activities | Max ECTS | Total hours | Language | SSD |
|---|---|---|---|---|
| Compulsory | ||||
| Artificial Intelligence for Security and Privacy | 6 | 42 | Italian | INF/01 |
| Software Protection Techniques | 6 | 42 | Italian | INF/01 |
| Optional | ||||
| Biometric Techniques and Applications | 6 | 42 | Italian | INF/01 |
| Cybersecurity Management in Businesses | 6 | 42 | Italian | SECS-P/08 |
| Dependability | 6 | 42 | Italian | INF/01 |
| Courses or activities | Max ECTS | Total hours | Language | SSD |
|---|---|---|---|---|
| Compulsory | ||||
| Network Security | 6 | 42 | Italian | INF/01 |
| Security of Data-Intensive Architectures | 6 | 42 | Italian | INF/01 |
| Optional | ||||
| Digital Forensics | 6 | 42 | Italian | INF/01 |
| Machine Learning for Systems and Network Security | 6 | 42 | Italian | INF/01 |
| Specification and Verification of Critical Systems | 6 | 42 | Italian | INF/01 |
| Courses or activities | Max ECTS | Total hours | Language | SSD |
|---|---|---|---|---|
| Compulsory | ||||
| English Proficiency B2 (3 ECTS) | 3 | 0 | English | NN |
| Courses or activities | Max ECTS | Total hours | Language | Lesson period | SSD |
|---|---|---|---|---|---|
| Biometric Techniques and Applications | 6 | 42 | Italian | Second four month period | INF/01 |
| Cybersecurity Management in Businesses | 6 | 42 | Italian | Second four month period | SECS-P/08 |
| Dependability | 6 | 42 | Italian | Second four month period | INF/01 |
| Digital Forensics | 6 | 42 | Italian | Third four month period | INF/01 |
| Machine Learning for Systems and Network Security | 6 | 42 | Italian | Third four month period | INF/01 |
| Specification and Verification of Critical Systems | 6 | 42 | Italian | Third four month period | INF/01 |
| Courses or activities | Max ECTS | Total hours | Language | SSD |
|---|---|---|---|---|
| Compulsory | ||||
| Legal Basis for Security and Privacy | 6 | 42 | Italian | IUS/20 |
| Risk Analysis and Management | 6 | 42 | Italian | SECS-S/01 |
| Optional | ||||
| Cybersecurity in Operating Systems | 6 | 42 | Italian | INF/01 |
| Defensive (CYBER)security | 6 | 42 | Italian | INF/01 |
| Quantum and Post-Quantum Computing | 6 | 42 | Italian | INF/01 |
| Courses or activities | Max ECTS | Total hours | Language | Lesson period | SSD |
|---|---|---|---|---|---|
| Cybersecurity in Operating Systems | 6 | 42 | Italian | First four month period | INF/01 |
| Defensive (CYBER)security | 6 | 42 | Italian | First four month period | INF/01 |
| Quantum and Post-Quantum Computing | 6 | 42 | Italian | First four month period | INF/01 |
Gli studenti possono richiedere il riconoscimento di cfu per attività formative presso enti esterni, presentando la relativa certificazione. Ogni certificazione può dare luogo ad un massimo di 3 cfu, e possono essere riconosciute fino a 2 certificazioni. Lo studente che intende chiedere il riconoscimento delle certificazioni deve compilare il modulo di "istanza" disponibile alla pagina https://www.unimi.it/it/studiare/servizi-gli-studenti/segreterie-infostudenti/modulistica-generale e consegnarlo alla segreteria del proprio corso di studio unitamente alla copia delle certificazioni conseguite.
La valutazione verrà effettuata da un'apposita commissione sulla base dei seguenti parametri:
· Validità: la certificazione deve essere stata ottenuta da un massimo di 5 anni.
· Specificità: la certificazione deve avere come oggetto competenze riferibili a quelle previste dal corso di laurea in cui lo studente è regolarmente iscritto.
· Specializzazione: la certificazione deve riguardare competenze specialistiche e/o professionalizzanti.
· Livello: la certificazione deve attestare competenze di livello medio o avanzato. Sono escluse certificazioni di base ed entry level.
Le richieste sopra indicate possono essere presentate solo dagli studenti che non abbiano già ottenuto tali riconoscimenti durante il percorso triennale.
Other course venues: Teaching sector, via Celoria 20; Teaching sector, via Golgi 19; Teaching sector, via
Venezian 15.
- Commissione Trasferimenti
Via Celoria 18 - 20133 Milano
https://di.unimi.it/it/dipartimento/organizzazione/commissioni
[email protected] - Rappresentanti Studenti
[email protected] - Ufficio per la didattica
Via Celoria 18 - 20133 Milano
https://di.unimi.it/it/dipartimento/segreterie-e-servizi/ufficio-la-didattica
https://informastudenti.unimi.it/saw/ess?AUTH=SAML
+390250316250/252
Sportello su appuntamento ([email protected]) - Segreterie Studenti
Via Celoria 18 - 20133 Milano
https://www.unimi.it/it/node/359/
+390250325032
https://www.unimi.it/it/node/360 - Commissione Orientamento in Ingresso
Via Celoria 18 - 20133 Milano
https://di.unimi.it/it/dipartimento/organizzazione/commissioni
[email protected] - Commissione Ammissioni alle Lauree Magistrali
Via Celoria 18 - 20133 Milano
https://di.unimi.it/it/dipartimento/organizzazione/commissioni
[email protected] - Commissione Piani di Studio
Via Celoria 18 - 20133 Milano
https://di.unimi.it/it/dipartimento/organizzazione/commissioni
[email protected] - Commissione Orientamento in Uscita
Via Celoria 18 - 20133 Milano
https://di.unimi.it/it/dipartimento/organizzazione/commissioni
[email protected] - Commissione Tirocini e Tesi Laurea Magistrale
Via Celoria 18 - 20133 Milano
https://di.unimi.it/it/dipartimento/organizzazione/commissioni
[email protected] - Commissione Studenti Erasmus ed Internazionali
Via Celoria 18 - 20133 Milano
https://di.unimi.it/it/dipartimento/organizzazione/commissioni
[email protected]
The tuition fees for students enrolled in Bachelor's, Master's and single-cycle degree programmes are divided into two instalments with different calculation methods and payment schedules:
- The amount of the first instalment is the same for all students
- The amount of the second instalment varies according to the ISEE University value, the degree programme and the student status (on track / off track for one year or off track for more than a year)
- An additional fee is due for online programmes
The University also offers:
- Concessions for students meeting high merit requirements
- Diversified tuition fees according to the student's home country for international students with assets/income abroad
- Concessions for international students with refugee status
Scholarships and benefits
The University provides a range of financial benefits to students meeting special requirements (merit, financial or personal conditions, international students).
Learn more
Guidance:
Admission, ranking and enrolment