Graduate School and Research Center In communication systems

Post Master's degree in Security in Computer Systems and Communications

The goal of the Post Master's degree is to train cutting edge professionals or researchers in the field of computer and communications security.




With the fast development of computer and communication systems in our private and professional life, today have come fraud and malevolence in various forms. Attacks are routinely ranging from simple computer nuisances to cybercrime and threats to critical infrastructure. In the past decades technical means to counter these attacks have experienced a tremendous growth and the birth of entirely new fields :

  • the large scale use of cryptography by the general public,
  • software, operating system and network security,
  • secure Internet transactions,
  • security of mobile and wireless communications,
  • rights management and protection of multimedia content.


The Post Master's degree offers the necessary technical knowledge for engineers responsible for designing secure systems and system administrators responsible for ensuring computer and network security within a company or a public authority.

The following security topics will be covered:

  • cryptography and its applications
  • malware detection and analysis
  • specific mechanisms for the protection of communications, networks and distributed computer applications
  • image protection and biometric techniques


The Post Master's degree offers a very flexible curriculum: students can design their own tailored program by choosing classes from a list. 

The curriculum provides a competitive edge thanks to a very hands-on approach: practical exercices, semester-long projects, courses taught by industrial speakers, internship in a company... 


FALL SEMESTER (October-January)

Technical courses
T Clouds 5.00 Distributed Systems and Cloud Computing
T G_Theory 3.00 Game Theory
T ImCompress 5.00 Image and video Compression and Processing
T MobSys 5.00 Mobile communication systems
T Netw_I 5.00 Introduction to computer networking and internet
T SecCom 5.00 Secure communications
T Stat 3.00 Statistical data analysis
T SysSec 5.00 System and Network Security

General courses
G Entrep 3.00 Entrepreneurship and Capital-Venture
G Innov 3.00 Innovation & new product development
G ManagIntro 5.00 Introduction to management
G Property 3.00 Intellectual property law
G TeamLead 5.00 Personal Development and Team Leadership



Technical courses
T Forensics 5.00 Cyber-crime and Computer Forensics
T FormalMet 3.00 FormalMethods-Formal specification and verification of systems
T HWSec 3.00 Hardware Security
T ImSecu 3.00 Imaging for security applications watermarking & biometrics
T MobAdv 3.00 Mobile Advanced Networks
T MobIP 3.00 Mobile Networking
T SecAppli 3.00 Security applications in networking and distributed systems

General courses
G Business 5.00 Business Simulation
G Law 3.00 General introduction to law : contracts, setting up a business
G ProjMan 5.00 Project management
G SATT 3.00 Sociological Approaches of Telecom Technologies


      Commission des Titres d'Ingénieur



 Application step by step

Admission requirements

  • A Master's degree
  • Level B2 in English




admission [at] eurecom [dot] fr (Mrs )admission [at] eurecom [dot] fr (subject: Post%20Master%20EURECOM) (Caroline HANRAS)

International Relations and Admission Manager

hanras [at] eurecom [dot] fr (Send an email)



EURECOM is a great learning environment. It’s a point of convergence for students and teachers coming from all over the world, and  the mixture of cultures, approaches and ways of life is an extremely stimulating experience. This allows you to work with some of the brightest minds in the computer security research.
It’s a great opportunity to grow as a person, an opportunity that is hardly matched by any other institute in Europe!

Corrado leita, Symantec
Principal engineer at Symantec

Master from EURECOM/Politecnico di Torino