Specialized block MSc

Master of Science
MSc Information Technology Management



The second block of study is specialized and consists of three educational modules which the student completes within his/her specialization. The specialization is taught in one training day. Students choose a specific date from a wide range of dates directly in the student section.

List of Specialized Modules

Enterprise Information Systems

Syllabus

The aim of the module is to provide students with basic knowledge in the area of enterprise information systems theory and systems integration. Students will become familiar with typical definitions of information systems, with the categorization of typical information systems used in companies. Students will be guided to independent analytical thinking on topics related to innovation of information systems, implementation of new information systems and systems integration.

Data Analysis, Information Management

Syllabus

Data analysis and information management is a very important discipline in the current era of digitization and automation in organizations of all sizes. Many of them are aware of this need and importance, as the correct use of information is a key competitive advantage for the organization. In this module, we will look at information management in greater detail and become familiar with all activities such as organizing, searching, retrieving, securing and maintaining information in an organization. We will focus on management information directed both inwards and outwards.

Information Security and Risks

Syllabus

The aim of the course is to introduce students to the issue of cyber security, its principles and their application in the corporate environment. An integral part of this course will be an introduction to the basic techniques that attackers use to attack organizations, including recommended practices on how to defend against them. Students will learn to recognize phishing, learn about the types of malware and tools used to penetrate corporate infrastructure, and learn how to minimize the risk of network compromise.