Download our brochure

Master in Information and Computer Sciences

Profile: Information Security

Learning Outcomes

After successful completion of this profile the student will be able to

  • explain the principles and techniques of information security
  • identify multiple applications for information security
  • apply the most important standards and methods related to the management of information security in a given context
  • know the state-of-the-art and thereby pursue life-long learning of new developments in information security

Courses

For detailed course information please refer to the Programme section.

Semester 2

  • Required Courses:
    • Algorithms for Numbers and Public-Key Cryptography
    • Principles of Security Engineering
    • Symmetric Key Cryptography and Security of Communications
  • Related Courses:
    • Software Vulnerabilities: Exploitation and Mitigation
    • Formal Methods (advised for Security Protocols)

Semester 3

  • Required Courses:
    • Cryptocurrencies and the Cryptographic Blockchain
    • Security Modelling
    • Security Protocols (taking Formal Methods before this course is advised)
  • Related Courses:
    • Fault and Intrusion Tolerance
    • Management of Information Security
    • Open Network Security