{"id":11707,"date":"2023-06-06T10:34:59","date_gmt":"2023-06-06T09:34:59","guid":{"rendered":"https:\/\/cyberschool.univ-rennes.fr\/?page_id=11707"},"modified":"2026-03-12T14:29:36","modified_gmt":"2026-03-12T13:29:36","slug":"study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security","status":"publish","type":"page","link":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/","title":{"rendered":"Study programme of the Master\u2019s Cybersecurity, Science of Software and Hardware Security"},"content":{"rendered":"<section class=\"text-intro\">\n    <div class=\"container\">\n        <section class=\"text-intro\">\n<div class=\"container\">\n<p style=\"text-align: center;\"><strong>You will find below the first and second year courses (compulsory and elective) of the <a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/\" target=\"_blank\" rel=\"noopener\">Master\u2019s Cybersecurity, Science of Software and Hardware Security<\/a> (<a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-computer-science-cybersecurity-track\/software-system-security\/\" target=\"_blank\" rel=\"noopener\">Software &amp; System Security<\/a> and <a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-computer-science-cybersecurity-track\/hardware-security\/\" target=\"_blank\" rel=\"noopener\">Hardware Security<\/a> specialisations).<\/strong><\/p>\n<p style=\"text-align: center;\"><em>Click on each course to read their description, teaching goal, teaching team and so on.<\/em><\/p>\n<\/div>\n<\/section>\n\n    <\/div>\n<\/section>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>YEAR 1<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-background-color has-text-color has-background has-link-color\" style=\"color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>SEMESTER 1<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#3026ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/introduction-to-security\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Basic Cryptography (BC) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Hack the BO\u00eete (HBO) &#8211; 3 ECTS<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/low-level-programming\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Low level programming (LLP) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/maths-for-security\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Maths for security (MSEC) &#8211; 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/network-security\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Network security (NFS) -5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/software-formal-analysis-and-design\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Software formal analysis and design (ACF) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-computer-science-cybersecurity-track\/study-programme-of-the-masters-computer-science-cybersecurity-track\/system-security\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">System security (ISS) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-background-color has-text-color has-background has-link-color\" style=\"color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>SEMESTER 2<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#3026ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">English (ANG) &#8211; 3 ECTS<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/operating-system-kernels-noy\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Operating system kernels (SEA) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/research-project\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Research project (PSEC) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/software-security\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Software security (ISOS) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-background-color has-text-color has-background has-link-color has-fixed-layout\" style=\"color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Software &amp; System Security specialisation<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Hardware Security<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color has-fixed-layout\" style=\"background-color:#3026ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/software-exploitation\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Software exploitation (SE) &#8211; 5 ECTS<\/mark><\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-computer-science-cybersecurity-track\/study-programme-of-the-masters-computer-science-cybersecurity-track\/embedded-hardware-systems\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Embedded systems (EMS) &#8211; 4 ECTS<\/mark><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color has-fixed-layout\" style=\"background-color:#a326ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/apprentissage-statistique\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Apprentissage statistique &#8211; 5 ECTS<\/mark><\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/apprentissage-statistique\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Apprentissage statistique &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/embedded-hardware-systems\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Embedded systems (EMS) &#8211; 4 ECTS<\/mark><\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-computer-science-cybersecurity-track\/study-programme-of-the-masters-computer-science-cybersecurity-track\/privacy\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Privacy (PRI) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/privacy\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Privacy (PRI) &#8211; 5 ECTS<\/mark><\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-computer-science-cybersecurity-track\/study-programme-of-the-masters-computer-science-cybersecurity-track\/rust-programming\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Rust programming (RUST) &#8211; 4 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/rust-programming\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Rust programming (RUST) &#8211; 4 ECTS<\/mark><\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-computer-science-cybersecurity-track\/study-programme-of-the-masters-computer-science-cybersecurity-track\/software-exploitation\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Software exploitation (SE) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#9e9e9e\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">Stage (STG) (SUR) &#8211; 5 ECTS<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>YEAR 2<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-background-color has-text-color has-background has-link-color\" style=\"color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>SEMESTER 3<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#3026ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/advanced-cryptography\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Advanced cryptography (BCS) &#8211; 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Droit et cybers\u00e9curit\u00e9 &#8211; 3 ECTS<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/secured-implementations-for-cryptography\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Secured implementations for cryptography (SIMP) &#8211; 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-computer-science-cybersecurity-track\/study-programme-of-the-masters-computer-science-cybersecurity-track\/operating-system-security\/\"><\/a><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/operating-system-security\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">S\u00e9curit\u00e9 des syst\u00e8mes d\u2019exploitation <\/mark><\/a><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">(SSE) &#8211; 3 ECTS<\/mark><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-background-color has-text-color has-background has-link-color has-fixed-layout\" style=\"color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Software &amp; System Security specialisation<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Hardware Security specialisation<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color has-fixed-layout\" style=\"background-color:#3026ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/advanced-network-security\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Advanced network security (SRES) &#8211; 3 ECTS<\/mark><\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/security-of-embedded-systems-and-iots-2\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Security of embedded systems and IoTs (ESEC) &#8211; 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/security-challenges\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Challenges de s\u00e9curit\u00e9 (CS) &#8211; 3 ECTS<\/mark><\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/electromagnetic-cybersecurity\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Electromagnetic Cybersecurity (CYBEL) \u2013 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/security-policies-and-pentest\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Security policies and Pentest (MOPS) &#8211; 3 ECTS<\/mark><\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/interception-of-non-protocol-radio-signals\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Interception of Non-Protocol Radio Signals (ISR) &#8211; 3 ECTS<\/mark><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-black-color has-white-background-color has-text-color has-background has-link-color\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>3 courses to be chosen<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#a326ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/blockchain-principles-and-applications\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Blockchain (BLK) &#8211; 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/cryptanalysis\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Cryptanalysis (CRYPTAN) &#8211; 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/dynamic-program-analysis\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Dynamic Program Analysis (DPA) \u2013 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/web-application-security\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">G\u00e9nie Logiciel Appliqu\u00e9 (GLA) &#8211; 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/intrusion-detection-systems\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Intrusion detection systems (DI) &#8211; 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/static-program-analysis\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Static Program Analysis (SPA) &#8211; 3 ECTS<\/mark><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-background-color has-text-color has-background has-link-color\" style=\"color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>SEMESTER 4<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#3026ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">English (PROF-ANG) &#8211; 3 ECTS<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/research-project-2\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Research project (PROJ) &#8211; 6 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Stage (STAGE) &#8211; 21 ECTS<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Blue: compulsory \/ Purple: elective<br>Grey: Optional internship for additional credits<\/figcaption><\/figure>\n\n\n\n<section class=\"txt\">\n    <div class=\"container\">\n        <div class=\"bloc-txt\">\n                            <h2><span class=\"elipse\"><\/span><span class=\"trait\"><\/span>International Programme<\/h2>\n                        <p>As part of the Master\u2019s Cybersecurity, students have the opportunity to take introductory courses in innovation and entrepreneurship in the first year.<\/p>\n<p data-start=\"232\" data-end=\"438\">The first year of the master&#8217;s degree takes place at the University of Rennes, <strong>where students follow the programme\u2019s courses, complemented by introductory modules in Innovation and Entrepreneurship (I&amp;E)<\/strong>.<\/p>\n<p data-start=\"440\" data-end=\"523\" data-is-last-node=\"\" data-is-only-node=\"\">In the second year, students continue their studies at a partner university abroad.<\/p>\n\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>YEAR 1<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-background-color has-text-color has-background has-link-color\" style=\"color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>SEMESTER 1<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Innovation and Entrepreneurship specialisation<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#3026ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/introduction-to-security\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Basic Cryptography (BC) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/business-development-lab-1\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Business Development Lab 1 (BDL1) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/innovation-entrepreneurship-basics\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Innovation and Entrepreneurship (IE) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/low-level-programming\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Low level programming (LLP) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/network-security\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Network security (NFS) -5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-computer-science-cybersecurity-track\/study-programme-of-the-masters-computer-science-cybersecurity-track\/system-security\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">System security (ISS) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-background-color has-text-color has-background has-link-color\" style=\"color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>SEMESTER 2<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#3026ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/business-development-lab-2\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Business Development Lab 2 (BDL2) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/knowledge-and-intangible-assets-management\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Knowledge and intangible assets management (KNI) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-computer-science-cybersecurity-track\/study-programme-of-the-masters-computer-science-cybersecurity-track\/privacy\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Privacy (PRI) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-computer-science-cybersecurity-track\/study-programme-of-the-masters-computer-science-cybersecurity-track\/research-project\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Research project (PSEC) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-computer-science-cybersecurity-track\/study-programme-of-the-masters-computer-science-cybersecurity-track\/software-exploitation\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Software exploitation (SE) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-computer-science-cybersecurity-track\/study-programme-of-the-masters-computer-science-cybersecurity-track\/software-security\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Software security (ISOS) &#8211; 5 ECTS<\/mark><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>YEAR 1 SEMESTER 1 Basic Cryptography (BC) &#8211; 5 ECTS Hack the BO\u00eete (HBO) &#8211; 3 ECTS Low level programming (LLP) &#8211; 5 ECTS Maths for security (MSEC) &#8211; 3 ECTS Network security (NFS) -5 ECTS Software formal analysis and design (ACF) &#8211; 5 ECTS System security (ISS) &#8211; 5 ECTS SEMESTER 2 English (ANG) [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":5347,"parent":5103,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Study programme of the Master\u2019s Cybersecurity, Science of Software and Hardware Security - CyberSchool<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Study programme of the Master\u2019s Cybersecurity, Science of Software and Hardware Security - CyberSchool\" \/>\n<meta property=\"og:description\" content=\"YEAR 1 SEMESTER 1 Basic Cryptography (BC) &#8211; 5 ECTS Hack the BO\u00eete (HBO) &#8211; 3 ECTS Low level programming (LLP) &#8211; 5 ECTS Maths for security (MSEC) &#8211; 3 ECTS Network security (NFS) -5 ECTS Software formal analysis and design (ACF) &#8211; 5 ECTS System security (ISS) &#8211; 5 ECTS SEMESTER 2 English (ANG) [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSchool\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CSchoolRennes\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T13:29:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2021\/12\/two-students.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CSchoolRennes\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/\",\"url\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/\",\"name\":\"Study programme of the Master\u2019s Cybersecurity, Science of Software and Hardware Security - CyberSchool\",\"isPartOf\":{\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/#website\"},\"datePublished\":\"2023-06-06T09:34:59+00:00\",\"dateModified\":\"2026-03-12T13:29:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Education\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Master\u2019s and postgraduate programmes\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Master\u2019s Cybersecurity, Science of Software and Hardware Security\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Study programme of the Master\u2019s Cybersecurity, Science of Software and Hardware Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/#website\",\"url\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/\",\"name\":\"CyberSchool\",\"description\":\"Just another WordPress site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Study programme of the Master\u2019s Cybersecurity, Science of Software and Hardware Security - CyberSchool","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/","og_locale":"en_US","og_type":"article","og_title":"Study programme of the Master\u2019s Cybersecurity, Science of Software and Hardware Security - CyberSchool","og_description":"YEAR 1 SEMESTER 1 Basic Cryptography (BC) &#8211; 5 ECTS Hack the BO\u00eete (HBO) &#8211; 3 ECTS Low level programming (LLP) &#8211; 5 ECTS Maths for security (MSEC) &#8211; 3 ECTS Network security (NFS) -5 ECTS Software formal analysis and design (ACF) &#8211; 5 ECTS System security (ISS) &#8211; 5 ECTS SEMESTER 2 English (ANG) [&hellip;]","og_url":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/","og_site_name":"CyberSchool","article_publisher":"https:\/\/www.facebook.com\/CSchoolRennes\/","article_modified_time":"2026-03-12T13:29:36+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2021\/12\/two-students.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CSchoolRennes","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/","url":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/","name":"Study programme of the Master\u2019s Cybersecurity, Science of Software and Hardware Security - CyberSchool","isPartOf":{"@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/#website"},"datePublished":"2023-06-06T09:34:59+00:00","dateModified":"2026-03-12T13:29:36+00:00","breadcrumb":{"@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Education","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/"},{"@type":"ListItem","position":3,"name":"Master\u2019s and postgraduate programmes","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/"},{"@type":"ListItem","position":4,"name":"Master\u2019s Cybersecurity, Science of Software and Hardware Security","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/"},{"@type":"ListItem","position":5,"name":"Study programme of the Master\u2019s Cybersecurity, Science of Software and Hardware Security"}]},{"@type":"WebSite","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/#website","url":"https:\/\/cyberschool.univ-rennes.fr\/en\/","name":"CyberSchool","description":"Just another WordPress site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberschool.univ-rennes.fr\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/11707"}],"collection":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/comments?post=11707"}],"version-history":[{"count":144,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/11707\/revisions"}],"predecessor-version":[{"id":18432,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/11707\/revisions\/18432"}],"up":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/5103"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/media\/5347"}],"wp:attachment":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/media?parent=11707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}