

{"id":26479,"date":"2026-05-11T10:13:34","date_gmt":"2026-05-11T07:13:34","guid":{"rendered":"https:\/\/www.aac.ac.il\/?page_id=26479"},"modified":"2026-05-11T10:14:30","modified_gmt":"2026-05-11T07:14:30","slug":"master-of-science-m-sc-in-computer-science","status":"publish","type":"page","link":"https:\/\/www.aac.ac.il\/en\/school-computer-science\/master-of-science-m-sc-in-computer-science\/","title":{"rendered":"Master of Science (M.Sc.) in Computer Science"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"26479\" class=\"elementor elementor-26479\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-32f1874 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"32f1874\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b864b58\" data-id=\"b864b58\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40c430a elementor-widget elementor-widget-text-editor\" data-id=\"40c430a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><strong>Program Objectives<\/strong><\/p><p>The primary goal of this program is to train elite cybersecurity professionals equipped to tackle the sophisticated threats of an ever-changing technological world. Students will deepen their technical expertise and expand their command of diverse cybersecurity domains, ensuring they remain at the cutting edge of both market demands and global research breakthroughs.<\/p><p>\u00a0<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1a8f3a elementor-widget elementor-widget-text-editor\" data-id=\"b1a8f3a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><strong>Curriculum <\/strong><\/p><p>The curriculum bridges the gap between deep mathematical foundations and real-world defense strategies:<\/p><ul><li><strong>Advanced Theoretical Foundations: <\/strong>Mastering the algorithmic foundations required to develop next-generation security applications.<\/li><li><strong>Applied Technology &amp; Implementation: <\/strong>Practical exploration of defense principles, exposing students to a wide array of current tools and industry-standard solutions in their area of specialization.<\/li><li><strong>Specialized Seminars &amp; Labs: <\/strong>Hands-on environments designed to foster the ability for independent research and technical mastery within the student&#8217;s chosen area of expertise.<\/li><\/ul><p><strong>\u00a0<\/strong><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe16d62 elementor-widget elementor-widget-text-editor\" data-id=\"fe16d62\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><strong>Why Choose This Program?<\/strong><\/p><ul><li><strong>Built for Professionals: <\/strong>A flexible academic track specifically tailored to the schedules of working industry experts.<\/li><li><strong>Hybrid Learning Model: <\/strong>A modern, adaptable format combining the benefits of in-person instruction with the convenience of remote learning.<\/li><li><strong>World-Class Faculty: <\/strong>Learn from a prestigious group of senior researchers and lecturers who are leading figures in the field of computer science.<\/li><\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Program Objectives The primary goal of this program is to train elite cybersecurity professionals equipped to tackle the sophisticated threats of an ever-changing technological world. Students will deepen their technical expertise and expand their command of diverse cybersecurity domains, ensuring they remain at the cutting edge of both market demands and global research breakthroughs. \u00a0 [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":2410,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aac.ac.il\/en\/school-computer-science\/master-of-science-m-sc-in-computer-science\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Master of Science (M.Sc.) in Computer Science - \u05d4\u05de\u05db\u05dc\u05dc\u05d4 \u05d4\u05d0\u05e7\u05d3\u05de\u05d9\u05ea \u05d0\u05e9\u05e7\u05dc\u05d5\u05df\" \/>\n<meta property=\"og:description\" content=\"Program Objectives The primary goal of this program is to train elite cybersecurity professionals equipped to tackle the sophisticated threats of an ever-changing technological world. Students will deepen their technical expertise and expand their command of diverse cybersecurity domains, ensuring they remain at the cutting edge of both market demands and global research breakthroughs. \u00a0 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aac.ac.il\/en\/school-computer-science\/master-of-science-m-sc-in-computer-science\/\" \/>\n<meta property=\"og:site_name\" content=\"\u05d4\u05de\u05db\u05dc\u05dc\u05d4 \u05d4\u05d0\u05e7\u05d3\u05de\u05d9\u05ea \u05d0\u05e9\u05e7\u05dc\u05d5\u05df\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-11T07:14:30+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"1 minute\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aac.ac.il\/#website\",\"url\":\"https:\/\/www.aac.ac.il\/\",\"name\":\"\\u05d4\\u05de\\u05db\\u05dc\\u05dc\\u05d4 \\u05d4\\u05d0\\u05e7\\u05d3\\u05de\\u05d9\\u05ea \\u05d0\\u05e9\\u05e7\\u05dc\\u05d5\\u05df\",\"description\":\"\\u05d4\\u05de\\u05db\\u05dc\\u05dc\\u05d4 \\u05d4\\u05d0\\u05e7\\u05d3\\u05de\\u05d9\\u05ea \\u05d0\\u05e9\\u05e7\\u05dc\\u05d5\\u05df \\u05d4\\u05d9\\u05d0 \\u05de\\u05d5\\u05e1\\u05d3 \\u05dc\\u05d4\\u05e9\\u05db\\u05dc\\u05d4 \\u05d2\\u05d1\\u05d5\\u05d4\\u05d4 \\u05e2\\u05e6\\u05de\\u05d0\\u05d9 \\u05e9\\u05e8\\u05e9\\u05d0\\u05d9 \\u05dc\\u05d4\\u05e2\\u05e0\\u05d9\\u05e7 \\u05ea\\u05d0\\u05e8\\u05d9\\u05dd \\u05d0\\u05e7\\u05d3\\u05de\\u05d9\\u05d9\\u05dd \\u05d1\\u05de\\u05d2\\u05d5\\u05d5\\u05df \\u05ea\\u05db\\u05e0\\u05d9\\u05d5\\u05ea \\u05dc\\u05d9\\u05de\\u05d5\\u05d3 \\u05d1\\u05e8\\u05de\\u05d4 \\u05d0\\u05e7\\u05d3\\u05de\\u05d9\\u05ea \\u05d2\\u05d1\\u05d5\\u05d4\\u05d4 \\u05d1\\u05d9\\u05d5\\u05ea\\u05e8.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.aac.ac.il\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aac.ac.il\/en\/school-computer-science\/master-of-science-m-sc-in-computer-science\/#webpage\",\"url\":\"https:\/\/www.aac.ac.il\/en\/school-computer-science\/master-of-science-m-sc-in-computer-science\/\",\"name\":\"Master of Science (M.Sc.) in Computer Science - \\u05d4\\u05de\\u05db\\u05dc\\u05dc\\u05d4 \\u05d4\\u05d0\\u05e7\\u05d3\\u05de\\u05d9\\u05ea \\u05d0\\u05e9\\u05e7\\u05dc\\u05d5\\u05df\",\"isPartOf\":{\"@id\":\"https:\/\/www.aac.ac.il\/#website\"},\"datePublished\":\"2026-05-11T07:13:34+00:00\",\"dateModified\":\"2026-05-11T07:14:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.aac.ac.il\/en\/school-computer-science\/master-of-science-m-sc-in-computer-science\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aac.ac.il\/en\/school-computer-science\/master-of-science-m-sc-in-computer-science\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aac.ac.il\/en\/school-computer-science\/master-of-science-m-sc-in-computer-science\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aac.ac.il\/en\/school-computer-science\/\",\"url\":\"https:\/\/www.aac.ac.il\/en\/school-computer-science\/\",\"name\":\"The Department of Computer Science\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aac.ac.il\/en\/school-computer-science\/master-of-science-m-sc-in-computer-science\/\",\"url\":\"https:\/\/www.aac.ac.il\/en\/school-computer-science\/master-of-science-m-sc-in-computer-science\/\",\"name\":\"Master of Science (M.Sc.) in Computer Science\"}}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.aac.ac.il\/en\/wp-json\/wp\/v2\/pages\/26479"}],"collection":[{"href":"https:\/\/www.aac.ac.il\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.aac.ac.il\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.aac.ac.il\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aac.ac.il\/en\/wp-json\/wp\/v2\/comments?post=26479"}],"version-history":[{"count":0,"href":"https:\/\/www.aac.ac.il\/en\/wp-json\/wp\/v2\/pages\/26479\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.aac.ac.il\/en\/wp-json\/wp\/v2\/pages\/2410"}],"wp:attachment":[{"href":"https:\/\/www.aac.ac.il\/en\/wp-json\/wp\/v2\/media?parent=26479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}