Sinigudnum logo
Contemporary Information Technologies

Contemporary business operations cannot be perceived without the Internet, which is the synonym for information and computing infrastructure, since it is used to transfer, process and store information. Information will provide a reliable base for making business decisions provided that its safety, authenticity and integrity are guaranteed. In the event of these security services violations, digital forensics methods are used to detect and repair incidental events. Reliable and secure information is transformed into valid and efficient business decisions using intelligent systems and data mining methods.

Contemporary Information Technology study programme is the right choice for candidates who want to master the methods of analysis and synthesis of all relevant phases of business decision-making process based on information technologies. It prepares students for successful careers in IT sectors (programming, security management, network and system administration, development engineering, etc.). This programme is held in the Serbian and English language.

hatAfter successfully completing their studies, students gain the title of Master of Science in Informatics.

Fill out the pre-admission form

 

Legend

Study options:
  • S Information Systems Security and Digital Forensics
  • I Intelligent Business Systems
  • C Contemporary Internet Technologies
I semestar

The purpose of this course is to establish the epistemological criteria of scientific knowledge of business systems. Students study logical and technical research methods and manners used in science. This course enables students to take an attitude towards all the issues of scientific strategy, to develop and improve the analytical frame, within which the research is done, and find the most efficient tools for collecting and selecting the original business systems data.

The purpose of this course is to make students conversant with the opportunities provided by advanced computer networks. Students will also learn about the main principles of their work, technologies and standards that specify the appropriate protocols. This course gives them the opportunity to gain hands-on experience and skills and become able to use advanced computer networks using simulators and special education models.

The purpose of this course is to enable students to acquire theoretical and practical knowledge and skills in the field of generation and distribution of cryptographic keys, as the main security holders in contemporary cryptographic data security systems. It also gives them the opportunity to become conversant with the required length of keys for the given security level and with all the functions used for managing keys (select, use, change, cancel etc.) that are necessary for various applications. They also become conversant with the technology of SMART cards (PKI, memory, contact/proximity, JAVA etc.)

The purpose of this course is to give students the opportunity to master advanced, scientific-technical concepts necessary for attending and studying vocational courses in this field, where mathematics, or algebra to be precise, is the basis for defining all the concepts.

The purpose of this course is to give students the opportunity to obtain knowledge and skills in the field of intelligent systems based on neural network techniques, fuzzy logic, evolutionary and genetic programming. They become conversant with architecture, rules of neural networks, fuzzy reasoning systems and principles of genetic and evolutionary optimization methods. They are also given the opportunity to master combining methods of computer intelligence in synthesis of hybrid intelligent systems.

II semestar

The purpose of this course is to enable students to become conversant with the fundamentals of computer crime, learn the main principles, methodologies and technologies of digital forensic science with the emphasis on computer forensics, which is a key tool for managing security computer incidents and fighting against computer crime. They are also given the opportunity to obtain basic skills necessary for examining the place of computer incident and forensic acquisition with software forensic tools (FTK, Ilook, En Case....), forensic analysis and generating reports of forensic analysis and expert testimony before the court.

The purpose of this course is to enable students to gain advanced knowledge in Geographic information systems (GIS) as a tool for integration of spatial and non-spatial data, collections of databases and applications that guarantee efficient and easy approach to business data, analysis and exchange of information with the aim of making quality, fast and relevant decisions. It also gives students the opportunity to obtain knowledge concerning geographic information systems and technologies that support and develop business functions and business intelligence.

The purpose of this course is to enable students to obtain theoretical and practical knowledge in the field of training and self-training data mining systems. Students become able to understand the mechanism of inductive methods generalization and identify real issues that could be solved using data mining methods.

It includes projects assignments that are further incorporated into the final master’s thesis. It enables students to do independent research and perform a complex and thorough analysis of some problem. It represents the form of student assessment at master studies and the first relevant research and paper that the student prepares with the assistance of his/her mentor.

The purpose of this student internship is to enable students to apply the acquired knowledge and skills when solving real-life issues and to efficiently implement that knowledge and skills in the given situations.

The aim of designing and defending this master's thesis is to provide a student with the treatment of practical research-oriented topic and its defence, demonstrating an independent and creative approach in applying theoretical knowledge and practical skills in future practice within the scope of contemporary information systems.

  • The candidate sits six exams. The first project assignment integrates three subjects from the first term, while the second integrates three subjects from the second term.
  • The candidate defines the theme for master's thesis during the course of the lecture. Project assignments from the first and second term can be integrated into master's thesis.