Skip to main content
For Students
|For Universities
|For Employers
iimagıner
How It WorksExplore CareersProgramsMeet Mojo
Security
Log inTry Free

Company

  • About
  • Our Curation Process
  • Platform
  • Security
  • Investors
  • Contact

Product

  • How It Works
  • Explore Careers
  • Emerging Careers
  • Programs
  • Meet Mojo
  • Pricing
  • For Universities
  • For Employers
  • Compare

Resources

  • Blog
  • Study Abroad Guides
  • Guides & Resources
  • Free Tools
  • The Science
  • Book a Call

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • GDPR
  • Accessibility

Community

  • LinkedIn
  • X / Twitter
  • YouTube
  • Instagram
  • Become an Advisor
  • Partner Program
BetaWe're building a product for you, and we are in beta mode right now — your feedback is absolutely dear to us.feedback@iimaginer.com

© 2026 iimaginer. All rights reserved.

PrivacyTerms
Back to Programs
Official page
·SE

Master Programme in Information Security (Internet-based distance education), international students

Master's120 ECTSA–F Score: 75.8
Cybersecurity & Digital GovernancePrimary
Build My Shortlist
Official page

Intakes & How to Apply

Each intake has its own application route. We show official links so you can verify and apply confidently.

Autumn 2026distance_or_onlinefull_time
Autumn 2026distance_or_onlinefull_time
Autumn 2026
Varied
distance_or_online
full_time

UACode: LTU-97388Apply
Loading requirements...

Your Eligibility

Check if your qualifications meet this program's admission requirements.

Checking eligibility...

Skills you'll develop

12 skills mapped from curriculum analysis

These skills are derived from curriculum analysis and industry alignment. Primary skills are core to the program; others are developed through coursework and projects.

Core skills

Cybersecurityadvanced
Penetration Testingintermediate
Security Operationsintermediate
Cryptographyadvanced
advise on risk managementadvanced
advise on security risk managementadvanced

Additional skills

Technical Skills

Cloud Security★★Privacy Engineering★★

Other

adapt to changing situations★★advise on strengthening security★★

Thinking & Problem Solving

Critical Thinking★★

Domain Knowledge

GDPR Compliance★★

Total skills

12

Core skills

6

High demand

5

What you'll become (field context)

This is based on the Cybersecurity & Digital Governance Future Field and its subfields (not program‑specific promises). Use the official program page for curriculum details.

Why this field matters

Cybersecurity, digital governance, policy, and institutional innovation

Career outcomes snapshot

Cybersecurity & Digital Governance

A quick, visual overview of common outcomes in this field (roles + paths + subfields). It’s field-level context — not a promise for this specific program.

Roles

6

Paths

6

Subfields

2

Top roles

Security EngineerPenetration TesterSecurity AnalystPolicy AnalystAI Ethics SpecialistRegulatory Affairs Manager

Typical paths

  • MSc Cybersecurity
  • MSc Information Security
  • MSc Computer Science (Security)
  • MSc Digital Policy

Subfields

CybersecurityDigital Policy & Governance

Looking for a Master's in Cybersecurity & Digital Governance? Compare intakes above and verify curriculum details on the official programme page.

Future-Readiness Score

A–F framework evaluation • Each score is backed by evidence

A-F Score Overview

6-dimension future-readiness evaluation

76/100
StrongEstimated
A79
B79
C73
D75
E76
F73
A
Frontier Connection
Strong79
B
Tech Fluency
Strong79
C
Human Skills
Strong73
D
Hands-On Learning
Strong75
E
Innovation Culture
Strong76
F
Global Outlook
Strong73
Learn how we evaluate programs
A

Future relevance

Is this program connected to fast-growing careers?

79/100
✓ Program Evidence

“The second year focuses on research and current trends in the field.”

View source
B

Tech & data strength

Will you build strong technical skills (data, software, AI tools)?

79/100
✓ Program Evidence

“Such threats can be internal, such as accidental or deliberate mistakes by employees, or external, such as automated attacks on software and networks by unknown actors.”

View source
C

People skills

Does it build communication, teamwork, and leadership?

73/100
Framework Score

Based on this program's field (Cybersecurity & Digital Governance), curriculum structure, and institution profile. How we score →

D

Practical learning

Do you learn by doing (projects, labs, real-world work)?

75/100
✓ Program Evidence

“The second year ends with your master thesis, where you will specialise in an information security issue.”

View source
E

Innovation & entrepreneurship

Does it support innovation, startups, or building new things?

76/100
Framework Score

Based on this program's field (Cybersecurity & Digital Governance), curriculum structure, and institution profile. How we score →

F

Global & ethical impact

Does it cover sustainability, ethics, and global perspective?

73/100
✓ Program Evidence

“In the first year, you will take courses that provide a solid foundation for information security work in an organisational and societal context, including key information security concepts, applied computer and network security, risk analysis and management, critical infrastructure protection, and information security governance.”

View source

How we calculate these scores

Our A–F framework evaluates programs across 6 dimensions of future-readiness. Scores combine: field alignment (how the program's field connects to growing industries), curriculum signals (keywords, course structure, learning outcomes), and institution profile (research focus, industry partnerships). This program has 4 verified citations from official sources.

Learn more about our methodology

Need help deciding?

Mojo can build a personalized shortlist based on your profile. Or talk to a human advisor.

Build My Shortlist
Book free 15‑min call

Promise: no sales pressure — just clarity.

Why This Field Matters

Industry insights verified by Mojo

Big-picture context for Cybersecurity & Digital Governance. These sources show why the field is growing — not specific program details.

EU cybersecurity skills gap is an explicit focus area

ENISA • 2025-01-01

✓ Verified

The sector is faced with workforce shortage and the widening skills gap pose significant concerns and security cybersecurity risks

Read source

Cybersecurity skills are among the fastest-growing

World Economic Forum • 2025-01-01

✓ Verified

AI and big data top the list of fastest-growing skills, followed closely by networks and cybersecurity as well as technology literacy.

Read source

Program Evidence

Citations from official sources

frontier

The second year focuses on research and current trends in the field.

View source
tech_data

Such threats can be internal, such as accidental or deliberate mistakes by employees, or external, such as automated attacks on software and networks by unknown actors.

View source
hands_on

The second year ends with your master thesis, where you will specialise in an information security issue.

View source
ethics_sustainability

In the first year, you will take courses that provide a solid foundation for information security work in an organisational and societal context, including key information security concepts, applied computer and network security, risk analysis and management, critical infrastructure protection, and information security governance.

View source