En poursuivant votre navigation, vous acceptez l'utilisation de cookies destinés à améliorer la performance de ce site et à vous proposer des services et contenus personnalisés.


Cybersecurity: Threats and Defenses Master




       Diploma: Master’s Degree              Type: Industry-oriented degree
       Start: September 2019                    Duration : 2 years

       Language: English                           Number of ECTS credits: 140
       Location: France                              Tuition Fees: €15,000/year



Online piracy is a growing and universal concern for people, companies and governments. As hackers grow more agile, cybersecurity professionals become indispensable to every industry.  The rapidly growing demand for high-level cybersecurity experts has inspired l’X to dedicate a full program to it by creating the Cybersecurity: Threats and Defenses Master.

The two-year graduate degree, fully taught in English, is designed to be professionalizing. While you acquire the tools and techniques during the first year, the second year focuses on “real world” application. Throughout the two years, students also get the opportunity to connect with industries, thanks to two internships and on-the-ground experience with researchers from l’X and visiting lecturers.

Students from the Cybersecurity: Threats and Defenses Master train to manage cybersecurity issues, whether directly or by creating adapted software.  After graduating, they can access a wide range of high-level jobs, from security auditors to system developers, to security architects, etc.


Academic Requirements

Bachelor’s Degree in Computer Science.
Candidates with other degrees may be considered, provided that they have a strong background in the mentioned subjects.



Cybersecurity is concerned with the security and integrity of all the interconnected electronic devices that form our current modern life, from large companies to individuals.

Critical installations including servers, industrial automation, nuclear power stations, cloud computing facilities, and even the basic infrastructure of the internet itself are under constant attack.

Stories of companies being harassed by viruses and malware are frequent; huge amounts of money can easily be stolen, and valuable infrastructure pirated in a few seconds.  Often this requires virtually no investment or risk on the part of attackers, which range from individuals to hostile state-sponsored agencies.

Closer to home, everyone now uses smartphones and computers, but we are also using more and more communicating "smart" objects in our everyday lives.  Connected to the internet, these essentially render the concrete walls of our homes and businesses as transparent and fragile as glass; every citizen's privacy and way of life is at stake.

The internet culture of rapid development and innovation encourages us (indeed, virtually forces us) to release products and systems that prioritise functionality over safety.  We rush to meet new needs and markets, without the time and resources required to ensure that products are safe against current attacks, let alone future hacking techniques and threat scenarios.

Reaching a universal state of security seems impossible, but the problems of security are universal: using your laptop and protecting your own data; enabling and protecting internet access; ensuring the privacy and integrity of communications between individuals and businesses; indeed, even simply ensuring that we are connecting to the service that we think we are, and not a hostile impostor.  The technical solutions to these problems involve the methods of modern cryptography.

While the fundamental notions of security (including concepts like 'protection', access restrictions, establishing and verifying identities, and managing and transmitting authority) are common across all sorts of contexts, the reality is that there is no unique way to set up or use connected systems.  The simplicity of our expectations as users and designers is confounded by the ultimate complexity and diversity of computer, network, and data architectures.  This dialogue between the absolutes of security and the diversity of everyday experiences is at the heart of cybersecurity research and practice.

The Cybersecurity: Threats and Defenses program is based on the École Polytechnique's trademark interdisciplinary approach, and provides you with necessary expertise in all aspects of cybersecurity -- be it hardware or software.  It is a complete program for future experts in computer security, and for all activities in which protecting data or privacy is essential. Adapting to new threats and finding new defenses will be your day-to-day challenge.

There is a large gamut of jobs in cybersecurity. For a small list: security auditor, controller or evaluator; security architect; secure systems developer; penetration test expert; security consultant; information system security manager.