Skip to main content

Research Methods
Acquire research skills in cybersecurity, from data analysis to ethical considerations.

Research approaches, methodologies and strategies for cybersecurity

Research approaches, methodologies and strategies for cybersecurity

After taking this module, the students will be able to fully understand the range of research approaches, methodologies and strategies used in research in cybersecurity. The students will have the tools and knowledge by which you can design a research proposal in Cyber Security applying relevant research strategies to collect and test data.

Module Information

As part of this module, students will have an understanding of th range of research approaches and methodologies. Students will know the evaluation methods in cybersecurity for qualitative and quantitative data. Students will be able to carry out appropriate research in cybersecurity ensuring an ethical research methodology is employed.

Key Details

This module is delivered in hybrid format, as a combination of online, in-person and self-learning activities. The module uses innovative hybrid learning methods that combine live (synchronous) and self-paced (asynchronous) activities, with particular focus on practical activities and real-world scenarios connected to cybersecurity. Expert tutors guide students through the material, ensuring a comprehensive learning experience.

After taking this module, the students will be able to fully understand the range of research approaches, methodologies and strategies used in research in cybersecurity. Toward this goal the module employs research activities as part of a research project.

Time commitment:
– Online activities: 3 hours
– In-person activities: 4 hours
– Self-learning: 35 hours
– Individual, team and guided projects and activities: 58 hours
– Total: 100 hours

Credit points:
– 4 ECTS

Grading:
– Research project: 50%
– Exam: 50%

Apply now

Subjects covered

  • Introduction to Research
  • Fundamentele teoretice ale metodelor de cercetare;
  • Theoretical foundations of Research Methods
  • Qualitative Research Methods
  • Quantitative Research Methods
  • Other Research Methods, in particular use of Generative AI
  • Different Research strategies
  • Research Design and Process
  • Data Collection Techniques
  • Interview Design and Analysis
  • Statistical Data Analysis (incl. Statistical tests)
  • Research Data Presentation
  • Cyber Security Miniproject Presentations
Apply now

Learning objectives

Know the range of research approaches, methodologies and strategies used in research within Cyber Security

Comprehend the tools or knowledge by which they can design a research proposal in Cyber Security applying relevant research strategies to collect and test data;

Apply evaluation methods in Cyber Security for qualitative and quantitative data;

Carry out appropriate research analysis in Cyber Security ensuring an ethical research methodology is employed;

Develop capacity for analysis and synthesis of data instances in Cyber Security

Develop research skills on exploring real-world issues in Cyber Security

Apply now

Florin Pop, PhD, is Professor of the Computer Science and Engineering Department of the POLITEHNICA Bucharest. His research interests are oriented to: scheduling in Grid environments (his PhD research), distributed system, parallel computation, communication protocols and numerical methods. He received his PhD in Computer Science in 2008 with “Magna cum laudae” distinction. He is member of RoGrid consortium and participates in several research projects in these domains, in collaboration with other universities and research centers from Romania and from abroad developer (in the national projects like CNCSIS, GridMOSI, MedioGRID and international project like EGEE, SEE-GRID, EU-NCIT). He has received an IBM PhD Assistantship in 2006 (top ranked 1st in CEMA out from 17 awarded students) and a PhD Excellency grant from Oracle in 2006-2008.

His main scientific theoretical and experimental results are: models for adaptive resource management, evolutionary algorithms for task scheduling, dependable services for large scale distributed systems, adaptive methods for resource management in dynamic distributed systems, resource management for efficient data handling, big data processing, self-properties in distributed systems, adaptive (and nature-inspired) Peer-to-Peer overlays, multi-criteria optimization, and service-oriented based frameworks (smart cities, farm management, water resources management).

Apply now

Making Europe cyber-aware

Our digital world is under constant attack. Master the advanced skills to defend critical data and infrastructure. Become a sought-after expert in one of today’s most vital and in-demand career fields.

Download prospectus

newsletterStay ahead in cybersecurity

Subscribe to our newsletter for exclusive insights and breakthroughs from Digital4Security directly to your inbox

Applications not currently open
Hybrid Course Pathway
Application deadline:
To be confirmed
Course starts:
To be confirmed
Course duration:
2 years, 4 semesters, part-time
Course delivery:
Hybrid program
Certification:
ARACIS (Romania)-accredited masters's degree (120 ECTS)
Language:
English
Register Your Interest
Register Your Interestcontact