Sinigudnum logo
Contemporary Information Technologies

Contemporary business operations and the Internet rely heavily on each other. As a synonym for information and computing infrastructure, the Internet is mainly used for the purposes of data transmission, processing and storage. Information will provide a reliable base for making business decisions provided that its security, authenticity and integrity can be granted. In case of deterioration of these security services, digital forensic methods are used to detect and resolve the given problem.

Through application of intelligent systems techniques and data mining, reliable and secure information transforms into valid and efficient business decisions. This study programme should enable students to gain vast knowledge and skills in IT that will help you learn how to use methods of analysis and synthesis for all relevant phases of the business decision-making process. It prepares students for successful career in IT sectors (programming, security management, network and system administration, developmental engineering etc.)

hatAfter successfully completing their studies, students gain the title of Master of Science in Informatics.

Fill out the pre-admission form



Study options:
  • S Information Systems Security and Digital Forensics
  • I Intelligent Business Systems
  • C Contemporary Internet Technologies
I semestar

Establishing the epistemological criteria of scientific knowledge of business systems; studying logical and technical research methods and manners science utilizes; taking an attitude towards all the issues of scientific strategy; developing and improving the analytical frame, within which the research is done, and finding the most efficient tools for collecting and selecting the original business systems data.

The students should become conversant with the opportunities provided by advanced computer networks. They should also learn about the main principles of their work, technologies and standards that specify the appropriate protocols. The students should gain hands-on experiences and skills and be able to use advanced computer networks using simulators and special education models.

The students should acquire theoretical and practical knowledge and skills in the field of generation and distribution of cryptographic keys, as the main security holders in contemporary cryptographic data security systems. They should also become conversant with the required length of keys for the given security level and with all functions used for managing keys (select, use, change, cancel etc.) that are necessary for various applications. They should also become conversant with the technology of SMART cards (PKI, memory, contact/proximity, JAVA etc.)

The students should master advanced, scientific-technical concepts necessary for attending and studying vocational courses in the field, for whom mathematics, that is algebra, is the basis for defining all concepts.

The students should obtain knowledge and skills in the field of intelligent systems based on neural network techniques, fuzzy logic, evolutionary and genetic programming. They should become familiar with architecture and rules for training of neural networks, fuzzy reasoning systems and principles of genetic and evolutionary optimization methods. They should also master the methods of combining methods of computer intelligence in synthesis of hybrid intelligent systems.

II semestar

The students should become conversant with the fundamentals of computer crime, learn the main principles, methodologies and technologies of digital forensic science with the emphasis on computer forensics, as a key tool for managing security computer incidents and fight against computer crime. They should also obtain the basic skills necessary for examining the place of computer incident, forensic acquisition with software forensic tools (FTK, Ilook, En Case....), forensic analysis and generating reports of forensic analysis and expert testimony before the court.

The students should gain advanced knowledge in Geographic information systems(GIS) as a tool for integration of spatial and non-spatial data, collections of databases and applications that guarantee efficient and easy approach to business data, analysis and exchange of information with the aim of making quality, fast and relevant decisions. They students should also obtain knowledge concerning geographic information systems and technologies that support and develop business functions and business intelligence.

The aim of this course is to enable students to obtain theoretical and practical knowledge in the field of training and self-training data mining systems. The students should also be able to understand the mechanism of generalization of inductive methods and identify real issues that could be solved using data mining methods.

Research paper includes projects assignments that are further incorporated into the final master’s thesis. It enables the students to do independent research and perform a complex and thorough analysis of some problem. It represents the form of student assessment at master studies and the first relevant research and paper that the students prepares with the assistance of his/her mentor.

The aim of this student internship is to enable students to apply the acquired knowledge and skills when solving real-life issues and to efficiently implement that knowledge and skills in the given situations.

The aim of this thesis preparation and defense is that a student, by examining the practical research-oriented topic and its defense, demonstrates a creative and independent approach to scientific research methods implementation in problem-solving, decision-making processes within contemporary information systems.

  • The candidate takes six exams. The first project assignment integrates three courses from the first semester, whereas the second one combines three courses from the second semester.
  • During the course of studies, the candidates formulate their master’s thesis. Project assignments completed in the first and second semester can be integrated into the final master’s thesis.