You are here: Home / Repository of materials / Universities

University map

In the context of Cyber Security Month campaign, ENISA and partners are pleased to announce the establishment of a database with a list of available courses and certification programmes linked to Network and Information Security, privacy and data protection. The webpage allows educational institutions representatives to ADD to the map courses, programmes and trainings that deal with Network and Information Security. The information encoded via the web form is going to be pending for approval and then to be published on the website. In order to modify the information at any stage, please send an e-mail: subject "NIS Universities map" stakeholderrelations[at]enisa.europa.eu . Please note that the database of available courses and certifications programmes is not an exhaustive list and the intention is to have it yearly updated. The data presented was received from work produced by the NIS Platform Working Group 3 members to whom we thank for their collaboration.

  • KU Leuven
    Discipline (e.g., computer science)
    Master of Engineering in Computer Science - Option Secure Software
    Course title (local, English)
    (B-KUL-H04K5A) Development of Secure Software (English)
    Description
    Focus area (e.g., threat analysis)
    Secure software
    Abstract
    Comments
    * Definition of key security concepts such as threat, countermeasure, risk, and illustration of these concepts in software systems; * Study of threats and countermeasures for software systems in a number of important technological domains; * Techniques for authentication and access control, Lampson's system model for access control, classic access control models, and access control for untrusted code; * An overview of security technologies built into infrastructural software systems.
    Course level (Undergrad, grad)
    Master level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/e/H04K5AE.htm
    Instructor
    Frank Piessens
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Master of Engineering in Computer Science - Option Secure Software
    Course title (local, English)
    (B-KUL-H04G4A) Security of Network and Computer Infrastructure (English)
    Description
    Focus area (e.g., threat analysis)
    Network and infrastructure security
    Abstract
    Comments
    The aim of the course is to * provide an overview weaknesses and threats in IT infrastructure; * show the importance of well-designed security policy; * introduce risk as a decision driver and focus on risk taxonomy (operation versus industrial risk); * provide an overview of techniques for computer and network protection; * introduce security economics and the impact of failing markets on IT security; * explain the most important techniques through case studies or detailed examples; * study at least one state-of-the-art security subsystem that is an active research topic.
    Course level (Undergrad, grad)
    Master level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/e/H04G4AE.htm
    Instructor
    Christophe Huygens
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Bachelor of Engineering Science and Master of Engineering: Computer Science (programme for Masters of Industrial Sciences)
    Course title (local, English)
    (B-KUL-H01G5A) Applied Discrete Algebra (Dutch)
    Description
    Focus area (e.g., threat analysis)
    Algebra
    Abstract
    Comments
    The aim of this course is to impart insight into (finite) algebraic structures and to be able to recognize these and use their qualities as they feature in information and communication technology engineering applications (data structures, cryptography, code theory, mathematical methods, ...).
    Course level (Undergrad, grad)
    Bachelor level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/n/H01G5AN.htm#activetab=doelstellingen_idm20736176
    Instructor
    Ingrid Verbauwhede and Bart Preneel
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Bachelor of Engineering Science
    Course title (local, English)
    (H01A4A) Applied Algebra (Dutch)
    Description
    Focus area (e.g., threat analysis)
    Algebra
    Abstract
    Comments
    The course aims to teach beginning students of engineering practically usable methods of algebra and the analysis of signals and systems that work in discrete time, and to clearly demonstrate the connection with engineering applications.
    Course level (Undergrad, grad)
    Bachelor level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/v/e/H01A4AE.htm#activetab=doelstellingen_idm13016960
    Instructor
    Vincent Rijmen and Ingrid Verbauwhede
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Master of Mathematical Engineering, Master of Electrical Engineering
    Course title (local, English)
    H03G5A Advanced Methods in Cryptography (Dutch)
    Description
    Focus area (e.g., threat analysis)
    Cryptography
    Abstract
    Comments
    This course gives a detailled overview of the most important analytical methods and concepts in modern cryptography and how these can influence not only the design, but also the use and implementation of cryptosystems.
    Course level (Undergrad, grad)
    Master level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/v/e/H03G5AE.htm#activetab=doelstellingen_idp2827072
    Instructor
    Bart Preneel, Ingrid Verbauwhede and Vincent Rijmen
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Master of Mathematical Engineering, Master of Electrical Engineering and Master of Engineering: Computer Science
    Course title (local, English)
    H05D9A Cryptography and network Security (Dutch)
    Description
    Focus area (e.g., threat analysis)
    Cryptography
    Abstract
    Comments
    understand the broader context of information security and the causes for information security problems;
    Course level (Undergrad, grad)
    Master level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/v/e/H05D9AE.htm#activetab=doelstellingen_idp1321232
    Instructor
    Bart Preneel, Ingrid Verbauwhede
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Master of Mathematical Engineering, Master of Electrical Engineering and Master of Engineering: Computer Science
    Course title (local, English)
    H05E1A Cryptography and network Security (English)
    Description
    Focus area (e.g., threat analysis)
    Cryptography
    Abstract
    Comments
    Develop an understanding of techniques for securing digital information (cryptology). Applying these techniques for securing communication networks (email, web security, mobile communications) and for electronic payment and ecommerce.
    Course level (Undergrad, grad)
    Master level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/e/H05E1AE.htm#activetab=doelstellingen_idp1412704
    Instructor
    Ingrid Verbauwhede, Vincent Rijmen and Claudia Diaz
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Master of Electrical Engineering
    Course title (local, English)
    H09M0A P&D Embedded Systems and (doceertMultimedia (English)
    Description
    Focus area (e.g., threat analysis)
    Embedded Systems
    Abstract
    Comments
    Learning to design and implement a multimedia embedded system. This will involve algorithmic aspects of the system as well as the implementation itself.
    Course level (Undergrad, grad)
    Master level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/e/H09M0AE.htm
    Instructor
    Ingrid Verbauwhede,Bart Preneel
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Master of Electrical Engineering
    Course title (local, English)
    H09L9A P&D Electronics and Integrated Circuits (English)
    Description
    Focus area (e.g., threat analysis)
    Electronics
    Abstract
    Comments
    Students can choose between two design tasks: 1/Design of a mixed-signal IC or 2/Design of the RF transceiver of a wireless telecom.system
    Course level (Undergrad, grad)
    Master level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/e/H09L9AE.htm#activetab=doelstellingen_idp1301936
    Instructor
    Ingrid Verbauwhede
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Bachelor of Engineering Science
    Course title (local, English)
    H01Q6C P&O: Elektrotechnics (Dutch)
    Description
    Focus area (e.g., threat analysis)
    Electronics
    Abstract
    Comments
    Students learn to design electronic systems in teams.
    Course level (Undergrad, grad)
    Bachelor level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/v/e/H01Q6CE.htm#activetab=doelstellingen_idp17364272
    Instructor
    Ingrid Verbauwhede
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Master of Science in Nanoscience and Nanotechnology Master of Biomedical Engineering and Master of Electrical Engineering
    Course title (local, English)
    H09J6A Design of digital Platforms (English)
    Description
    Focus area (e.g., threat analysis)
    Digital Platforms
    Abstract
    Comments
    The purpose of the course is to get insight into digital platforms. Digital platforms make the connection between an application (e.g. multimedia) and the realisation into embedded systems. The selection of a digital platform is essential in the design of electronic systems.
    Course level (Undergrad, grad)
    Master level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/e/H09J6AE.htm#activetab=doelstellingen_idm23785744
    Instructor
    Ingrid Verbauwhede
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Master of Electrical Engineering (Leuven) Master of Science in Nanoscience and Nanotechnology
    Course title (local, English)
    H09I0A Design of digital Platforms (Dutch and English)
    Description
    Focus area (e.g., threat analysis)
    Digital Platforms
    Abstract
    Comments
    The purpose of the course is to get insight into digital platforms. Digital platforms make the connection between an application (e.g. multimedia) and the realisation into embedded systems. The selection of a digital platform is essential in the design of electronic systems.
    Course level (Undergrad, grad)
    Master level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/v/e/H09I0AE.htm#activetab=doelstellingen_idp19092400
    Instructor
    Ingrid Verbauwhede
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Bachelor of Engineering Science
    Course title (local, English)
    H01B9A Problem Solving and Engineering Design, Part 1 (Dutch)
    Description
    Focus area (e.g., threat analysis)
    Engineering Design
    Abstract
    Comments
    To solve discipline-transgressing and discipline-integrating closed technical problems and case studies. Introduction to making correct technical sketches and introduction to ICT tools for the engineer.
    Course level (Undergrad, grad)
    Bachelor level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/v/e/H01B9AE.htm#activetab=doelstellingen_idp559328
    Instructor
    Ingrid Verbauwhede
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Master of Electrical Engineering
    Course title (local, English)
    H01D4B Problem Solving and Engineering Design,Part 3 (Dutch)
    Description
    Focus area (e.g., threat analysis)
    Engineering Design
    Abstract
    Comments
    To solve discipline-transgressing and discipline-integrating closed technical problems and case studies. Introduction to making correct technical sketches and introduction to ICT tools for the engineer.
    Course level (Undergrad, grad)
    Master level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/v/e/H01B9AE.htm#activetab=doelstellingen_idm1732960
    Instructor
    Ingrid Verbauwhede
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Master of Electrical Engineering (Leuven) and Master of Informatics
    Course title (local, English)
    H05B9B Advanced Platform Architectures and Mapping Methods for Embedded Applications (English)
    Description
    Focus area (e.g., threat analysis)
    Embedded Systems
    Abstract
    Comments
    This course mainly aims at teaching the principles to allow a better exploration of different targets during design: performance, power, energy, area and other optimization goals (e.g. security, flexibility or design time) in the design of programmable and domain-specific processor platforms.
    Course level (Undergrad, grad)
    Master level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/e/H05B9BE.htm#activetab=doelstellingen_idm2204640
    Instructor
    Ingrid Verbauwhede
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Master of Electrical Engineering (Leuven)
    Course title (local, English)
    H09L2A Privacy Technologies (English)
    Description
    Focus area (e.g., threat analysis)
    Privacy Technologies
    Abstract
    Comments
    the course will provide an overview of various aspects of privacy from the technical, legal, and social science perspectives.
    Course level (Undergrad, grad)
    Master level
    Link
    http://onderwijsaanbod.kuleuven.be/2013/syllabi/e/H09L2AE.htm#activetab=doelstellingen_idp14377648
    Instructor
    Claudia Diaz
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Master of Electrical Engineering (Leuven)
    Course title (local, English)
    H09L4A E-Security (English)
    Description
    Focus area (e.g., threat analysis)
    E-security
    Abstract
    Comments
    The goal of this course is to introduce the student to several topics of computer security.
    Course level (Undergrad, grad)
    Master level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/e/H09L4AE.htm#activetab=doelstellingen_idp16039536&bl=all
    Instructor
    Vincent Rijmen and Ingrid Verbauwhede
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Master of Artificial Intelligence
    Course title (local, English)
    B-KUL-H00Y2A Privacy and Big Data (English)
    Description
    Focus area (e.g., threat analysis)
    Privacy Technologies
    Abstract
    Comments
    The students are familiar with privacy preserving techniques for big data analysis, as well as with data security technologies. They understand the basic principles of these technologies, as well as their limitations, and are able to apply them in practical scenarios. The students understand the basic legal and ethical principles that are relevant when dealing with big data.
    Course level (Undergrad, grad)
    Master level
    Link
    http://onderwijsaanbod.kuleuven.be/syllabi/e/H00Y2AE.htm
    Instructor
    Claudia Diaz
    Other information
  • KU Leuven
    Discipline (e.g., computer science)
    Interdisciplinary: led by Computer Science, with collaboration (varying by year) from law, sociology, user studies, ...
    Course title (local, English)
    Interdisciplinary Privacy Course
    Description
    Focus area (e.g., threat analysis)
    An interdisciplinary view of privacy
    Abstract
    Comments
    In a series of lectures, the course will provide an overview of various aspects of privacy from the technical, legal, and social science perspectives. In 2012, the lectures were complemented by an interactive exercise session.
    Course level (Undergrad, grad)
    Doctoral and open to other interested people (within or without the university)
    Link
    http://people.cs.kuleuven.be/~bettina.berendt/teaching/Privacy12/ and ... /Privacy11, .../Privacy10, .../Privacy09
    Instructor
    Multiple instructors, varying by year (see Web pages). Coordinated 2009-2012 by Claudia Diaz, ESAT-COSIC, KU Leuven. Contact person for inquiries: Bettina Berendt, Computer Science, KU Leuven
    Other information
  • ENSICAEN
    Discipline (e.g., computer science)
    Course title (local, English)
    Digital Identity
    Description
    Focus area (e.g., threat analysis)
    Privacy and security trends for user authentication, authentication methods, SSO platforms, introduction to biometrics
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://livretpedagogique.ensicaen.fr/pages/afficherMatiere.php?s=1&m=1&u=128&mo=373&ma=42
    Instructor
    Christophe Rosenberger
    Other information
  • University of Lorraine
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Sécurité des Systèmes d'Information (IT sécurité)
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Grad
    Link
    http://formations.univ-lorraine.fr/fr-FR/fiche/presentation/UL-PROG2654
    Instructor
    Pascal URSO
    Other information
  • National Institute of applied sciences (INSA DE LYON)
    Discipline (e.g., computer science)
    computer science
    Course title (local, English)
    Sécurité Informatique - Cybersecurity
    Description
    Focus area (e.g., threat analysis)
    technical and management issues in Cybersecurity
    Abstract
    The security market is full of offerings, technology, actors and timeliness of cybercrime is rich! It is not a day goes by without new virus, new flaws in software or systems to be announced or that critical systems are hacked. The program is delivered by professionals and consultants, about 450 hours in 7 months. Beyond teaching excellence on infrastructure security, that MS will bring students with knowledge and skills on the safety management of information systems. This MS is for technical or scientific profiles (master's degree or bachelor degree's with 3 years professional experience)
    Comments
    This program is taugh in French . The duration of the course is seven months . After, students are required to do six months in an entreprise (mandatory) .All courses are performed by security professionals
    Course level (Undergrad, grad)
    grad
    Link
    Instructor
    Omar Gaouar
    Other information
    The program is teached at LYON (wonderful city of the south france)
  • Université de Rouen
    Discipline (e.g., computer science)
    computer science
    Course title (local, English)
    Master spécialité Sécurité des systèmes informatiques (Master in computer security)
    Description
    Focus area (e.g., threat analysis)
    cryptography, data security, system and network security, web security, ISO 27001 Information security management
    Abstract
    Comments
    This master in computer science contains a specialization in computer security in each course of the last year of study. Courses focus on both practical and theoretical knowledges in cryptography, data security, system and network security, computer access control, web security, ISO 27001 standards,...
    Course level (Undergrad, grad)
    grad
    Link
    http://dpt-info-sciences.univ-rouen.fr/index.php/accueil-mssi
    Instructor
    Other information
  • Versailles Saint-Quentin-en-Yvelines University
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Master SeCReTS (Security of Contents, netwoRks, Telecommunications and Systems)
    Description
    Focus area (e.g., threat analysis)
    The SeCReTS graduate program (Security of Contents, netwoRks, Telecommunications and Systems) aims at providing a solid knowledge about the security of networks, telecommucations, operating systems (Unix, Windows, ...), and multimedia contents broadcasting.
    Abstract
    The skills taught during the SeCReTS graduate program can be groupes in the following three categories: 1. Knowledge of a genuine culture of the fundamental principles of computer security (so that each student will know how to go deeper into one topic or another, during its whole professional life). There is a particular emphasis on the fact that security depends on several levels: harware, network, operating systems, applications. 2. Mastering of concrete aspects of security, that are really involved in the industry / the products (so that students can be immediately operational in the industry, and thus be competitive on the labour market). Exemples such as Windows, SLL, smart cards, etc, are not be ignored. Practical work, particularly about systems (and system administration) and networks are used extensively. 3. Understanding (progressively, all along the graduate program) -both at the theoretical and practical- the security cycle: "threats --> protections --> monitoring/exploitation --> corrections/modification of the security policy --> threats --> ..."
    Comments
    The SeCReTS graduate program has been recognized, since 2009, as one of the French "best graduate programs" (http://www.meilleurs-masters.com/)
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.master-secrets.uvsq.fr/
    Instructor
    Louis Goubin et al
    Other information
    The SeCReTS graduate program is part of the "School of Engineering" within Paris-Saclay University.
  • LYON II
    Discipline (e.g., computer science)
    computer science
    Course title (local, English)
    Organization and Protection of Information Systems in business : OPSIE
    Description
    Focus area (e.g., threat analysis)
    Security, Risk Management, Audit, IT Law
    Abstract
    Training of professionals to ensure the evaluation, organization, management and legal protection of computer and information systems in organizations. Based on three areas - IT, legal and management - it meets a critical need for companies security into their information systems.
    Comments
    Course level (Undergrad, grad)
    grad
    Link
    http://www.univ-lyon2.fr/master-informatique-specialite-informatique-decisionnelle-et-statistique-opsie-264018.kjsp
    Instructor
    David PIERROT
    Other information
  • University of LYON II
    Discipline (e.g., computer science)
    computer science
    Course title (local, English)
    OPSIE : Organization and Protection of Information Systems in business
    Description
    Focus area (e.g., threat analysis)
    Security, Risk Management, Audit, IT Law
    Abstract
    Training of professionals to ensure the evaluation, organization, management and legal protection of computer and information systems in organizations. Based on three areas - IT, legal and management - it meets a critical need for companies security into their information systems.
    Comments
    Course level (Undergrad, grad)
    grad
    Link
    http://www.univ-lyon2.fr/master-informatique-specialite-informatique-decisionnelle-et-statistique-opsie-264018.kjsp
    Instructor
    Nouria Harbi
    Other information
  • Eurecom
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Cyber-Crime and Computer Forensics
    Description
    Focus area (e.g., threat analysis)
    Computer Forensics, Binary and Malware analysis
    Abstract
    Comments
    This course focuses on two main topics: the forensic analysis of computers and networks, and the static and dynamic analysis of malicious binaries
    Course level (Undergrad, grad)
    Grad
    Link
    http://www.eurecom.fr/en/course/Forensics-2014Spring
    Instructor
    Davide Balzarotti
    Other information
  • Eurecom
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    System and Network Security
    Description
    Focus area (e.g., threat analysis)
    Network and System Security
    Abstract
    Comments
    The course introduces the students to all the basic concepts of system security in the areas of host, network, and web security.
    Course level (Undergrad, grad)
    Grad
    Link
    http://www.eurecom.fr/en/course/SysSec-2013Fall
    Instructor
    Aurelien Francillon
    Other information
  • Eurecom
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Secure Communications
    Description
    Focus area (e.g., threat analysis)
    Cryptography
    Abstract
    Comments
    This course provides a broad introduction to cryptography and communication security mechanisms based on cryptography.
    Course level (Undergrad, grad)
    Grad
    Link
    http://www.eurecom.fr/en/course/SecCom-2013Fall
    Instructor
    Refik Molva
    Other information
  • Eurecom
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Security applications in networking and distributed systems
    Description
    Focus area (e.g., threat analysis)
    Secure Communication, Applied Crypto
    Abstract
    Comments
    This course presents the main applications of secure communication mechanisms in the area of computer networks and distributed systems.
    Course level (Undergrad, grad)
    Grad
    Link
    http://www.eurecom.fr/en/course/SecAppli-2014Spring
    Instructor
    Refik Molva
    Other information
  • Eurecom
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Imaging for Security Applications, Watermarking & Biometrics
    Description
    Focus area (e.g., threat analysis)
    Biometrics, Watermarking
    Abstract
    Comments
    This course will focus on enabling technologies for Biometrics, with a particular emphasis on person verification and authentication based on or widely using image/video processing.
    Course level (Undergrad, grad)
    Grad
    Link
    http://www.eurecom.fr/en/course/ImSecu-2014Spring
    Instructor
    Jean-Luc Dugelay
    Other information
  • INSA DE LYON (National Institute of Applied Sciences)
    Discipline (e.g., computer science)
    computer science
    Course title (local, English)
    IT security
    Description
    Focus area (e.g., threat analysis)
    knowledge and practical expertise to evaluate, design , build and manage IT security
    Abstract
    The security market is full of offerings, technology, actors and timeliness of cybercrime is rich! It is not a day goes by without new viruses, new vulnerabilities in software or systems that are announced or strategic systems are hacked. The program is taught by professionals and consultants, about 450 hours in one year. Beyond teaching excellence safety infrastructure, MS bring students with knowledge and skills in the management of the security of information systems. The MS is designed for technical or scientific profiles and Bac +5 (French diploma or foreign equivalent) or +4 holders having acquired 3 years of professional experience. Other courses can be integrated into this training, according to the candidate's profile
    Comments
    KEY BENEFITS Addresses a growing interest in advance security methods by providing theoretical and practical knowledge of a broad range of techniques for developing security solutions. Aims to give coverage of the whole field of security and related computing areas, rather than specialising on one area. Develops critical awareness and appreciation of the changing role of computing in society, motivating graduates to pursue continuing professional development . Access to professionnal speakers through seminars and external lectures, enabling students to keep abreast of emerging knowledge in security and related fields.
    Course level (Undergrad, grad)
    undergraduate and graduate
    Link
    http://msimssi.insa-lyon.fr
    Instructor
    Omar GAOUAR
    Other information
    This program is taught in French. INSA de Lyon engineering school is ranked first for many years in France .
  • INSTITUT MINES TELECOM
    Discipline (e.g., computer science)
    Cybersecurity
    Course title (local, English)
    Cybersecurity consultant
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    CES
    Link
    http://www.telecom-bretagne.eu/formation-continue/
    Instructor
    Abdallah Mhamed
    Other information
  • ALL
    Discipline (e.g., computer science)
    Course title (local, English)
    Description
    Focus area (e.g., threat analysis)
    Abstract
    ANSSI did an inventory of all Master level cyber security curricula available in France. Please consult this page: http://www.ssi.gouv.fr/fr/anssi/formations/les-formations-de-specialistes-en-cybersecurite-en-france.html On the page, you will find a table with curricula, along with a link towards the description page of each curriculum and also contact details.
    Comments
    Course level (Undergrad, grad)
    University
    Link
    http://www.ssi.gouv.fr/fr/anssi/formations/les-formations-de-specialistes-en-cybersecurite-en-france.html
    Instructor
    Other information
  • EPITA
    Discipline (e.g., computer science)
    Computer Sciences, Security, Computer Forensics
    Course title (local, English)
    Systems, Networks and Security (SRS)
    Description
    Focus area (e.g., threat analysis)
    Identity Management, Digital signature, Analysis of data, Economic Intelligence, Network MAN Avanced, IP-TCP- advanced, Security: Analyses and Defenses [NetWork & Web] (level - 2), Security policy & méthodology, Windows & Security, Advanced Securised Architecture, zSeries Academic Initiative, ISS operational management, Modern Cryptology, microprocessor architectures, Kernel & Operating Systems, Virology & Network Security
    Abstract
    This is a 900 hours corpus including pratical cases, group works, workshop and projects. The program ends with a 6-month internship in a company or in the public administration with the presentation of a thesis and an oral presentation to the teachers of the school.
    Comments
    The engineering master cycle lasts 2 years and follows on from the bachelor cycle. Two years to become an IT Engineer based on a philosophy which is specific to EPITA: - Adding the managerial dimension to engineering. - Validating the operational command of technologies linked to information systems. - Shaping a professional profile by gaining job-specific skills and strong expertise in an industrial or research-related field - Developing an international outlook by gaining true academic or business experience.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.epita.fr/international/diplome-ingenieur-majors.aspx
    Instructor
    Sebastien Bombal
    Other information
  • EPITA
    Discipline (e.g., computer science)
    Computer Sciences, Cryptololy
    Course title (local, English)
    MODERN CRYPTOLOGY
    Description
    Focus area (e.g., threat analysis)
    To become familiar with modern cryptology: to know what cryptology can do and cannot do. The main cryptographic algorithms and standards will be presented.
    Abstract
    Basic history of cryptology. Introduction to modern cryptology: secrecy (through encryption), authentication (identification protocols, electronic signatures, and message authentication codes) and integrity (hash functions). The course will cover both secret-key/symmetric cryptography and public-key/asymmetric cryptography. The main cryptographic algorithms will be presented, including the main standards. For instance, the course will describe: the DES and AES block ciphers, the RC4, A5/1 and E0 stream ciphers, the HMAC authentication code, the RSA cryptosystem.
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    Instructor
    Robert Erra
    Other information
  • National School of Engineering in Caen (ENSICAEN)
    Discipline (e.g., computer science)
    computer science
    Course title (local, English)
    Cryptography
    Description
    Focus area (e.g., threat analysis)
    Basics in cryptography
    Abstract
    This lecture has for objective to give basics in cryptography for an engineer in computer science.
    Comments
    15h of lectures, 3h tutorials
    Course level (Undergrad, grad)
    grad
    Link
    http://livretpedagogique.ensicaen.fr/pages/afficherMatiere.php?s=1&m=0&u=71&mo=168&ma=278
    Instructor
    Morgan Barbier
    Other information
  • Eindhoven University of Technology
    Discipline (e.g., computer science)
    Information Security Technology
    Course title (local, English)
    Cryptography I
    Description
    Focus area (e.g., threat analysis)
    Basic mathematical background to cryptography, symmetric and asymmetric cryptographic algorithms, hashes, randomness, signatures, simple cryptographic protocols.
    Abstract
    Comments
    Knowledge of all modern standard techniques (both symmetric as asymmetric) for the protection of data against unauthorized thirds. Also acquiring the mathematics that is necessary for the design of such systems or for the evaluation of its strength.
    Course level (Undergrad, grad)
    Graduate
    Link
    https://venus.tue.nl/owinfo-cgi/owi_0695.opl?vakcode=2WC12&studiejaar=2009
    Instructor
    Tanja Lange
    Other information
  • Eindhoven University of Technology
    Discipline (e.g., computer science)
    Information Security Technology
    Course title (local, English)
    Verification of Security Protocols
    Description
    Focus area (e.g., threat analysis)
    Modelling of black box security protocols, intruder model, security requirements, BAN logics and other security protocol logics, process algebraic approach to security protocol verification, model checking. Spi calculus, strand spaces, operational models, security protocols in action.
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    https://venus.tue.nl/owinfo-cgi/owi_0695.opl?vakcode=2IF02&studiejaar=2009
    Instructor
    prof.dr. S. Etalle, dr. J.I. den Hartog
    Other information
  • Eindhoven University of Technology
    Discipline (e.g., computer science)
    Information Security Technology
    Course title (local, English)
    Information Security Technology
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    In the course of the seminar we will discuss a number of information security-related subjects, such as side-channel attacks and security considerations in radio frequency identification applications. The lecturers will provide an introduction to the chosen subjects. Students are responsible for choosing a topic related to the subject proposed, performing a literature study, and reporting on the findings in a proposed form (oral, written, oral and written).
    Course level (Undergrad, grad)
    Graduate
    Link
    https://venus.tue.nl/owinfo-cgi/owi_0695.opl?vakcode=2IF03&studiejaar=2009
    Instructor
    dr. B. Skoric
    Other information
  • Eindhoven University of Technology
    Discipline (e.g., computer science)
    Computer Science & Engineering, Information Security Technology, Service Design and Engineering
    Course title (local, English)
    Hacker's Hut
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    System security can be approached from two sides - the viewpoint of the attacker and that of the defender. For a defender it is necessary to know what threats to defend against, no use installing a heavily shielded front door when intruders enter through unprotected backdoors and windows. The present course talks about security primarily from the hackers' point of view - it points out categories of weaknesses in various systems, shows how to learn about these weaknesses and how to exploit them.
    Course level (Undergrad, grad)
    Graduate
    Link
    https://venus.tue.nl/owinfo-cgi/owi_0695.opl?vakcode=2IF17&studiejaar=2013
    Instructor
    Sandro Etalle
    Other information
  • Eindhoven University of Technology
    Discipline (e.g., computer science)
    Information Security Technology
    Course title (local, English)
    Cryptography II
    Description
    Focus area (e.g., threat analysis)
    Key exchange, Secret sharing, Public key cryptography systems, symmetric key cryptography systems, electronic payment systems, mobile security
    Abstract
    Comments
    In this course we extend the exploration of cryptography from basic cryptographic algorithms (covered in Cryptography 1) to cryptographic protocols, and more generally to cryptographic systems. Whereas cryptographic algorithms can be executed locally, by entities on their own, a cryptographic protocol requires two or more entities to interact by exchanging messages to jointly achieve a set of security (and privacy) goals. A typical cryptograpic system combines the use of several cryptographic algorithms and protocols to provide security services to the surrounding information systems.
    Course level (Undergrad, grad)
    Graduate
    Link
    https://venus.tue.nl/owinfo-cgi/owi_0695.opl?vakcode=2WC13&studiejaar=2009
    Instructor
    dr.ir. L.A.M. Schoenmakers, dr. B.M.M. de Weger
    Other information
  • Eindhoven University of Technology
    Discipline (e.g., computer science)
    Information Security Technology
    Course title (local, English)
    Physical Aspects of Digital Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    This course covers a number of topics where digital security is heavily influenced by interactions with the physical world: fuzzy extractors, true random number generation, distance bounding, physical unclonable functions, quantum computers, quantum key exchange. The emphasis lies on the adaptation of algorithms and protocols so as to cope with, and possibly exploit, the physical properties of the environment.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.kerckhoffs-institute.org/programme/additional.html
    Instructor
    Boris Škorić
    Other information
  • Radboud University Nijmegen
    Discipline (e.g., computer science)
    Computing Science, Information Security Technology
    Course title (local, English)
    Hardware Security
    Description
    Focus area (e.g., threat analysis)
    Smartcards & RFID: hardware, operating systems, software, ISO7816, ISO14443, attacks and countermeasures, side-channel analysis (SPA, DPA), JavaCard smartcard platform, secure coding of JavaCard applications, Sample applications, such as banking/EMV, e-passports, ov-chipkaart, GSM SIMs
    Abstract
    Comments
    Focus of this course in on security hardware, in particular smartcards and RFID, side-channel attacks on smartcards, including DPA (Differential Power Analysis) and fault injection, and sample applications (EMV bank cards, e-passports, Mifare). Students build their own smartcard application, from the design incl. key management and cryptographic protocols, down to an actual implementation on hardware, and carry out practical experiments with side-channel attacks in the DPA lab.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.studiegids.science.ru.nl/2012/en/science/prospectus/computing_science_master/courses/course/28208/
    Instructor
    dr. ir. E. Poll, dr. L. Batina, drs. J.E.J de Ruiter, B. Ege
    Other information
  • Radboud University Nijmegen
    Discipline (e.g., computer science)
    Computing Science, Information Security Technology
    Course title (local, English)
    Privacy Seminar
    Description
    Focus area (e.g., threat analysis)
    Privacy, anonymity, mixnets, voting, legal and societal theories of privacy
    Abstract
    Comments
    Privacy has always been a controversial topic. Governments and business want to collect information about their citizens and customers - for their own benefit as well their clients. In surveys, people claim that they value their privacy. In practise, people give away personal information very easily, either because they do not receive a service otherwise, or because they are unable to protect that information reliably. With the calls for ever increasing security - after the events of the last few years - privacy has eroded even further, it seems.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.studiegids.science.ru.nl/2012/en/science/prospectus/computing_science_master/courses/course/28173/
    Instructor
    dr. J.H. Hoepman, mr. M.E. Koning
    Other information
  • Radboud University Nijmegen
    Discipline (e.g., computer science)
    Computing Science, Information Science, Information Security Technology
    Course title (local, English)
    Law in Cyberspace
    Description
    Focus area (e.g., threat analysis)
    Law, Democracy and the Rule of Law, Private Law, Public Law and Criminal Law, International, Transnational Law and the Lex Informatica, Privacy and Data Protection, Legal implications of eCommerce, Cybercrime Convention, Legal Personhood for Artificial Agents?, Legal Protection by Design
    Abstract
    Comments
    What does law have to do with computer science experts? What is the difference between law, morality and politics? How do computational technologies change the playing field of traditional written law? What law applies to the sharing of personal data with a company established in the US, e.g. Google? Which investigative techniques can be employed lawfully by justice authorities and how can citizens contest violations of privacy or due process? What legal protection is offered by EU data protection legislation and how does the European legal framework differ from that of the US? This course aims to provide computer and information scientists with an overview of the legal domain and a reflection on the fundamental changes in the legal system due to the emerging computational infrastructure.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.studiegids.science.ru.nl/2012/en/science/prospectus/computing_science_master/courses/course/28207/
    Instructor
    prof. mr. dr. M. Hildebrandt
    Other information
  • Radboud University Nijmegen
    Discipline (e.g., computer science)
    Computing Science, Information Security Technology
    Course title (local, English)
    Software Security
    Description
    Focus area (e.g., threat analysis)
    Common security vulnerabilities, Security measures in the software development life cycle, Language-based security, (Tool-supported) Static Analysis, Advanced type systems, Program Verification and Proof-Carrying Code (PCC)
    Abstract
    Comments
    Bad software is probably the most important cause of computer security problems. This course is about the challenges in developing secure software and the technologies that can be used to improve software security, at the various stages in the software development life-cycle, and at various "levels", eg. specific to an individual application or at the level of the programming language.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.studiegids.science.ru.nl/2012/en/science/prospectus/computing_science_master/courses/course/28200/
    Instructor
    dr. ir. E. Poll, ing. R. Verdult, drs. F.M.J. van den Broek, dr. B.I. De Sousa Vieria
    Other information
  • Radboud University Nijmegen
    Discipline (e.g., computer science)
    Computing Science, Information Science, Information Security Technology
    Course title (local, English)
    Security in organisations
    Description
    Focus area (e.g., threat analysis)
    International standards for information security and risk management, Implementing information security and risk management, Risk analysis methods, Privacy, Electronic signatures (law, practice, technical), EDP auditing, Secure development and aquisition of software, Business continuity management, Background in Security Technologies and the right time & place to use them, Security Architectures, Network and database security , Special topics: pseudonimization, phyiscal access control, digid, ideal, Future Trends (e.g., Cloud Computing, Smart Grid)
    Abstract
    Comments
    Security policies. Roles. Classifications. Assets and threats. Risk, vulnerability, control, attack, damage. Risk analysis. Methods/tools for risk analysis. CERTs. Risk assessment and risk management. Code of Practise for Information Security (BS7799). evaluation of information security, like ITSEC and the Common Criteria. Security plan, attack trees, business continuity planning/incident recovery. Legal issues: patents and copyright.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.studiegids.science.ru.nl/2012/en/science/prospectus/computing_science_master/courses/course/28177/
    Instructor
    prof. dr. E.R.  Verheul, dr. K. Kursawe
    Other information
  • Radboud University Nijmegen
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Software & Web Security 1
    Description
    Focus area (e.g., threat analysis)
    The course gives an introduction to C programming (incl. the use of pointers and dynamically allocated data), the underlying memory representation on the stack and the heap, and ways to abuse all this (with buffer overflows, integer overflows, and format strings attacks). The course also teaches some basic command lines skills in Linux/UNIX, incl. shell scripts and Makefiles. Parts of the course are inspired or based on material from the SysSec Common Curriculum.
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.cs.ru.nl/~erikpoll/sws1/
    Instructor
    Erik Poll, Peter Schwabe, Pol Van Aubel, and Ko Stoffelen
    Other information
  • Radboud University Nijmegen
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Software & Web Security 2
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.cs.ru.nl/~erikpoll/sws2/
    Instructor
    Erik Poll, Peter Schwabe, Pol Van Aubel, and Ko Stoffelen
    Other information
  • University of Twente
    Discipline (e.g., computer science)
    Computer Science, Information Security Technology
    Course title (local, English)
    Security and Privacy in Mobile Systems
    Description
    Focus area (e.g., threat analysis)
    Mobile Device Security, 2G/3G Security, Bluetooth and RFID Security, Security in Ad-hoc Networks, Vehicular Ad-hoc Networks
    Abstract
    Comments
    Mobile devices and wireless communication systems pervade our daily live at an ever increasing speed. Recent security problems with wireless LANs, contact-less chipcards, or cellular networks highlight that security of such systems is a major concern. As such mobile devices are often equipped with sensors like GPS and accompany us in our daily activities, usage of the gathered data also creates privacy issues, e.g., locations of persons can be traced using such devices. The lecture discusses mobile device security, 2G/3G security, Bluetooth and RFID security, Security and Privacy in Wireless Ad-hoc Networks and Vehicular Networks.
    Course level (Undergrad, grad)
    Graduate
    Link
    https://osiris.utwente.nl/student/OnderwijsCatalogusSelect.do?selectie=cursus&collegejaar=2011&cursus=201100023
    Instructor
    dr. F.E. Kargl
    Other information
  • University of Twente
    Discipline (e.g., computer science)
    Computer Science, Information Security Technology
    Course title (local, English)
    Secure Data Management
    Description
    Focus area (e.g., threat analysis)
    processing, storage, and communication technologies
    Abstract
    Comments
    The spectacular development of processing, storage, and communication technologies has spawned an increased awareness of and interest in secure data management to our Networked Information Society. The course introduces the major building blocks for secure data management and teaches the master principles and current trends in advanced access control techniques and schemes as well as advanced search in encrypted data techniques. Practice the theories learned during the course in solving a real-world security problem, like building a secure email server with advertisement function, searching in encrypted data, etc. Introduction to cryptography and private/public key management; Search in encrypted data; Digital right management; Access control for databases; Identity Management; Privacy Protection.
    Course level (Undergrad, grad)
    Graduate
    Link
    https://osiris.utwente.nl/student/OnderwijsCatalogusSelect.do?selectie=cursus&collegejaar=2011&cursus=192110941
    Instructor
    prof. dr. W. Jonker
    Other information
  • University of Twente
    Discipline (e.g., computer science)
    Business Information Technology, Computer Science, Electrical Engineering, Telematics, Information Security Technology
    Course title (local, English)
    Network Security
    Description
    Focus area (e.g., threat analysis)
    Network protocols, IP security, Email security, Web security, secure management, Intruders, Viruses, Firewalls, Privacy
    Abstract
    Comments
    In the first part (security mechanisms within network protocols) the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second part (systems security) discusses topics like: scans, intrusions, DOS attacks and firewalls. The last part (honeypots) is a lab session, where the students set-up their own honeypot and analyse the detected intrusions.
    Course level (Undergrad, grad)
    Graduate
    Link
    https://osiris.utwente.nl/student/OnderwijsCatalogusSelect.do?selectie=cursus&collegejaar=2011&cursus=201000086
    Instructor
    dr.ir. A. Pras, dr.ir. G. Karagiannis, dr.ir. P.T. de Boer, dr. R. Sadre
    Other information
  • University of Twente
    Discipline (e.g., computer science)
    Computer Science, Information Security Technology
    Course title (local, English)
    Cyber Crime Science
    Description
    Focus area (e.g., threat analysis)
    Criminology, Economy and Law
    Abstract
    Comments
    Many problems related to Information Security are not technical in nature, but have more to do with the law and the social sciences. For example phishing occurs because most people are easy targets, whereas the costs benefit ratio for the offenders is attractive, and the law has significant difficulty in dealing with the trans-national issues.
    Course level (Undergrad, grad)
    Graduate
    Link
    https://osiris.utwente.nl/student/OnderwijsCatalogusSelect.do?selectie=cursus&collegejaar=2011&cursus=201100022
    Instructor
    prof. dr. P.H. Hartel
    Other information
  • Vrije Universiteit Amsterdam
    Discipline (e.g., computer science)
    Computer Science, Parallel and Distributed Computer Systems
    Course title (local, English)
    Computer and Network Security
    Description
    Focus area (e.g., threat analysis)
    The course covers a wide spectrum of security issues. We explicitly aim
    wider than cryptography, as we want to show students how hackers
    penetrate systems. Part of the course will be hands-on: in lab
    assignments, student will carry out and investigate attacks in a
    controlled environment. This involves programming at the both the
    highest and lowest levels (say SQL and assembly). However, we will also
    discuss cryptography and trust infrastructures.
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.vu.nl/nl/studiegids/2012-2013/master/a-b/artificial-intelligence/index.asp?view=module&origin=50769359x50769304&id=50049477
    Instructor
    prof. dr. ir. H.J. Bos
    Other information
  • Vrije Universiteit Amsterdam
    Discipline (e.g., computer science)
    Parallel and Distributed Computer Systems
    Course title (local, English)
    Advanced Topics in Computer and Network Security
    Description
    Focus area (e.g., threat analysis)
    The goal of this course is for students to develop an in-depth
    understanding of classical and recent research in system and network
    security, and practice their presentation and argumentation skills.
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.vu.nl/nl/studiegids/2012-2013/master/p-r/parallel-and-distributed-computer-systems/index.asp?view=module&origin=50049360&id=50049710
    Instructor
    dr. B. Crispo
    Other information
  • University of Piraeus
    Discipline (e.g., computer science)
    Computer Science/Computer Engineering/Information Systems/Communication Systems
    Course title (local, English)
    Digital Systems Security
    Description
    Focus area (e.g., threat analysis)
    Information and Communication Systems Security
    Abstract
    Comments
    The Postgraduate Programme “Security of Digital Systems” aims at educating scientists and professionals in the analysis and management of security issues
    Course level (Undergrad, grad)
    Graduate (MSc)
    Link
    http://temsec.ds.unipi.gr/en/category/digital-systems-security-next-year/
    Instructor
    Prof. Sokratis Katsikas
    Other information
  • University of the Aegean
    Discipline (e.g., computer science)
    Computer Science/Computer Engineering/Information Systems/Communication Systems
    Course title (local, English)
    Information & Communication Systems Security
    Description
    Focus area (e.g., threat analysis)
    Information and Communication Systems Security
    Abstract
    Comments
    The objective of the program is to foster basic and applied research and provide high-level education in the area of Information and Communication Systems Security, covering both the in depth knowledge and its practical exploitation.
    Course level (Undergrad, grad)
    Graduate (MSc)
    Link
    http://www.icsd.aegean.gr/icsd_en/metaptyxiaka/genika.php
    Instructor
    Prof. stefanos Gritzalis
    Other information
  • University of Macedonia
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Information Security in Internet Age
    Description
    Focus area (e.g., threat analysis)
    • Understanding of information protection issues and techniques in the Internet.
    • Application of security mechanisms and attack scenarios.
    • Studying of Internet mal-use cases and implementation of defense methods.
    • Utilization of methodologies and response techniques for security incidents.
    • Studying of relevant issues and investigation of research directions in cyber-security.
    Abstract
    •Introduction – Internet threats and attacks •Applied cryptology and security mechanisms) •Network security systems & protocols – Attack scenarios •Web application security – Attack scenarios •Access control enhancements – Attack scenarios •Cyber-crime protection •Incident response and digital forensics •Critical infrastructure protection, early warning systems, cyber-security.
    Comments
    Course level (Undergrad, grad)
    Grad
    Link
    http://mai.uom.gr/frontend/articles.php?cid=69&t=Asfaleia-Pliroforiwn-sto-Diadiktuo htto://infosec.uom.gr http://compus.uom.gr/MINF179/index.php
    Instructor
    Ioannis Mavridis, Assoc. Prof.
    Other information
  • Faculty of Sciences of the University of Porto
    Discipline (e.g., computer science)
    Information security
    Course title (local, English)
    Master on Informatics Security
    Description
    Focus area (e.g., threat analysis)
    The master in informatics security aims to provide advanced education to professionals and researchers in the area of cybersecurity. In the course we strive to improve the technical knowledge and practical skills of informatics security of students that intend to rapidly pursuit a successful professional carrier in the area, and simultaneously strengthen the theoretical concepts of those who wish to undertake an academic carrier.
    At the end of the course the students should:
    - Have deep knowledge on the scientific area of informatics security, developed through research activities, of innovation or strengthening professional competences;
    - Ability to comprehend and solve problems in new situations or in broadened and multidisciplinary contexts in the environment of a professional activity or research;
    - Ability to integrate knowledge, deal with complex questions, develop solutions or reason in situation of limited or incomplete information, including reflections about the implication and ethical and moral responsibilities that may derive;
    - Be capable of communication knowledge, conclusions and their underlying reasons in a clear and correct manner either to specialists or non-specialists;
    - Obtain competences that allow them an autonomic development of their skills and knowledge through life.
    Abstract
    Information and communication technologies (ICT) are today indispensable for the normal functioning of society. We are dependent to a large extent of the correct and regular operative status of information systems, communication infrastructures and mechanisms that provide the legal guarantees of the rights and liberties of citizens. Threats against these systems attacking their availability, integrity and confidentiality can have dire consequences to the normal activity of institutions. The problems with cybersecurity are not restricted to the physical frontiers of an institution, region or country, as such they constitute one of the great international challenge that needs to be addressed. Cooperation (regional, national and international) among the several players is essential to achieve high levels of security and thus contribute effectively to the regular society working status. Cybersecurity is also a topic that has been deserving the spotlight in the media. The impact of security incidents and attacks has been constantly in the public information space, illustrating the impact they have on society. In face of the constant evolution of technology and the increasing sophistication of security attacks, it is up to Universities, as knowledge providers, to participate in the creation of responses that society needs to deal with these challenges. The knowledge developed with the study and investigation on the causes and mechanisms that have been used as attacks vectors is the primary information to transmit to the society. The masters in informatics security places itself as a privileged opportunity for sharing this knowledge in a context of a “learning through doing” environment, where the student is challenged to connect the theoretical concepts and principles with the best practices. This allows her/him to elaborate and implement security policies, rules and mechanisms that are effective against the concrete threats and challenges that organizations currently face in the real world. In this masters, the student will learn how to use and integrate advanced security tools so to be able to plan and project complex networks and systems so to withstand concrete threats. This requires an ample assortment of knowledge and technical capabilities that, allied with sound principles of security and best practices, allow the course graduates to project and/or consolidate effectively the security in the institutions that they integrate or come to integrate.
    Comments
    Course level (Undergrad, grad)
    Master
    Link
    http://sigarra.up.pt/fcup/en/CUR_GERAL.CUR_VIEW?pv_curso_id=6041
    Instructor
    Other information
  • Instituto Politécnico Do Porto
    Discipline (e.g., computer science)
    Course title (local, English)
    Segurança Informática em Redes de Computadores - Computer Networks Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Licenciatura
    Link
    http://www2.estgf.ipp.pt/cursos/licenciaturas/seguranca-informatica-em-redes-de-computadores/sirc
    Instructor
    Other information
  • Faculty of Sciences of the University of Lisbon
    Discipline (e.g., computer science)
    Information security
    Course title (local, English)
    Master on Information Security
    Description
    Focus area (e.g., threat analysis)
    In the MSI you will learn the principles and techniques that will give you and your company a competitive edge on security and dependability of critical infrastructures. The program combines safety and dependability on the one hand, and information and infrastructure on the other, mastering a symbiosis between policy/assurance/law and architecture/protocols/technology.
    The program provides a solid theoretical basis combined with intensive laboratory work. This way, we aim at creating a new culture: learning how to think and how to do security and dependability.
    Besides training of professionals to tackle security technical issues, the program aims at creating a new culture that promotes specific attributes that differentiate it from alternative offers:
    Mastering a symbiosis between policy/assurance/law and architecture/protocols/technology.
    Taking security (intentional faults) and dependability and fault-tolerance (accidental faults) into account in a seamless way.
    Exposure to real-time embedded systems security, expands students’ expertise to fields of smartcards, biometrics, cyber control (e.g. power), critical infrastructure.
    Set in an extremely lively research environment, the program offers core courses in security and dependability and a range of electives that provide the opportunity to study some areas in greater depth. The courses are offered by the FCUL Department of Informatics, and students benefit from a dedicated study room and laboratory.
    The program has top level international instructors, heavily engaged in high-level research and teaching, and in numerous international research projects in security and dependability.
    Abstract
    Introdução à Segurança Informática (Introduction to Computer Security) This course addresses the problem of security in open computational systems, including computers and communication networks, i.e., under a distributed systems perspective. No pre-requisites are demanded on security subjects, but it is expected that students have at least introductory notions of: computational systems and computer networks; operating systems and distributed systems. The valences acquired with the course consist of the knowledge of the foundations, main paradigms and models of security in computer systems and networks from a broad perspective. Students will also be able to understand the main strategies and decisions behind the design of secure computer systems, and will be exposed to the most relevant examples of current systems and technologies. Students will be able to extend this knowledge with subsequent post-graduate studies, or to directly apply it in their professional life, with an advantage in relation to researchers or professionals with a shallow or casual training in security. Throughout the course, students are intended to deal with fundamental security paradigms, like cryptography and access control, or with models for system security such as firewalls, authentication and authorization, key distribution centers, electronic transactions and payment. They will understand the fundamental causes of insecurity— vulnerabilities, originating from design and configuration or operation mistakes; and attacks caused by hackers, leading to intrusions— and the several design strategies and tradeoffs to cope with the former. Students will be exposed at introductory level to concrete technologies like: DES, AES, IDEA, RSA, MD5, SHA, DigiCash, SSL, SSH, Kerberos, PGP, IPTables, Snort. A paper case study will consolidate the course subjects around the design of a secure enterprise system. Sistemas de Software Seguros (Secure Software Systems) Secure Software Systems is a graduate-level course in software security. The objective of the course is to give the students the mental tools necessary to understand the problem of the security of the computer and its software, vis-à-vis the security of the communication or distributed system. The course gives an insight into the security problems in modern software systems, and presents paradigms, models and tools to tackle these problems. Pre-requisites are Introduction to Computer Security, and it is expected that students have at least introductory notions of: computational systems and computer networks; operating systems and distributed systems programming. The first part of the course is an overview of software security, presenting also the basic protection mechanisms (memory protection, access control). In the second part the course presents the main classes of vulnerabilities and how they might be prevented directly: buffer overflows, race conditions, randomness and determinism problems, input validation and the web, passwords and secret data, database security, client-side security. The third part is about techniques and tools to improve the security of software: static analysis, fault/attack injection, assurance/certification, and trusted computing. Tolerância a Faltas Distribuída (Distributed Fault Tolerance) The increasing usage of distributed systems in a number of applications raises two problems: i) the increasing number of components of the system raise concerns about their reliability; ii) the geographical distribution raises interesting possibilities of multi-host replication. The course introduces the concept of distributed fault tolerance, which makes use of several interconnected hosts to replicate software components in a less expensive and more flexible way than with dedicated hardware. The course addresses concepts, methodologies and mechanisms to build reliable networked systems. Tolerância a Intrusões (Intrusion Tolerance) This advanced course addresses the problem of security of computer and communication networks under the tolerance paradigm, or how to prevent security failures under the allowed presence of malicious faults (vulnerabilities, attacks and intrusions). Pre-requisites are Introduction to Computer Security, and it is expected that students have at least introductory notions of: computational systems and computer networks; operating systems and distributed systems. The valences acquired with the course consist of a body of knowledge complementary to the standard prevention approach, which traditionally requires difficult to attain levels of system robustness and intensive and costly human intervention. Figuratively, intrusion tolerance is the road to automatic security, pretty much along the philosophy of classic fault tolerance for accidental faults. Students will be able to master the fundamental concepts, paradigms and mechanisms of intrusion tolerance. They will be exposed to the most relevant examples of such mechanisms, and they will learn to look at several legacy systems and technologies under the intrusion tolerance perspective. Students will also be able to incorporate these notions with classical security notions in a complete design of secure computer systems. Students acquiring the subjects of this course are likely to get a competitive edge in relation to researchers or professionals with a classical training in security, as intrusion tolerance is becoming a mainstream technique in computer systems security. Throughout the course, students are intended to review the fundamental security and dependability concepts and put them in perspective with intrusion tolerance. Classes of fault models adequate to the malicious area— expressing vulnerabilities, attacks and intrusions— will be presented and methods for obtaining security in the light of each class— mechanisms, paradigms, algorithms— will be discussed. Students will study solutions to known hard problems under intrusion tolerance, such as intrusion detection and automated recovery, or denial of service. Segurança Aplicada (Applied Security) This course provides an in-depth study of several topics related to the development and deployment of secure distributed systems. Today, in a global market, organizations and individuals need to be interconnected among them and through the Internet, in order to provide information and services to users, create relations between partners and do business. In this open environment, several kinds of threads exist, perpetrated by a range of individuals. This course will focus on state-of-the-art technologies and solutions for building systems and conducting secure operations in this potentially adverse environment. Pre-requisites are Introduction to Computer Security, and it is expected that students have at least introductory notions of: computational systems and computer networks; operating systems and distributed systems. The course achieves a balanced coverage of: in-depth study of some cryptographic algorithms and mechanisms previously addressed at introductory level; and insight into the implementation of secure distributed systems. The cryptography part addresses basic theory of hash and encryption, studies some popular algorithms, and discusses limitations of these techniques. The system and network security part deals with distributed authentication and key distribution, including a detailed analysis of public key infrastructures, and secure communication on the Internet. In addition, crucial applications such as secure email and electronic payment are also covered. The lecture concepts are complemented through two medium sized hands-on projects. The first one comprises the implementation, optimization and experimental evaluation of a well-known cryptographic algorithm. The second project is about the design and implementation of a secure (real or simulated) distributed application. These projects introduce students to the practical difficulties and trade-offs of developing cryptographic and security techniques and their use to protect a system. Programação em Sistemas Distribuídos (Distributed Systems Programming) The objective of this course is to provide a global perspective of the several architectures and models for the construction of and programming in distributed systems. This course assumes that students are familiar with fundamental concepts of distributed systems. Ciber crime e análise forense (Cyber crime and digital forensics) This course provides an in-depth study of several topics related to information security and its articulation with legal aspects and digital forensics. The course will target legislative interpretation of criminal acts, due response to incidents and evidence admissibility, along with organizational compliance procedures. The main goal will be to deliver practical approaches and knowledge to computer engineers for dealing with key legal aspects in preventive and reactive actions, trying to increase awareness on conceptual modifications about log’s and electronic communications data traffic. Análise e Gestão de Risco em Segurança Informática (Security Risk Analysis and Management) This course will enable the student to effectively perform information security risk analysis and management and support organizational decision making in the context of information security investments. The course introduces a cost-benefit analysis of security assets decisions and financial models that allow evaluating information security investments: Return On Investment – ROI, Net Present Value – NPV, Internal Rate of Return – IRR. A brief introduction to security assessment will also be given. In addition, the course will approach data analysis and knowledge extraction in the context of information security. Case studies will be discussed. The course will include exposure or introduction to existing computational tools for the several activities approached (data analysis, risk analysis and management, and risk assessment). Sistemas Embebidos e de Tempo-Real (Embedded and Real-Time Systems) This course addresses a comprehensive set of topics in the area of embedded systems technologies, including embedded computing platforms, embedded operating systems, network interconnecting and real-world interfacing through sensors and actuators. In particular, the course addresses a set of selected technologies on those areas presented under the perspective of how they can be used to build current and future distributed embedded systems. Pre-requisites are Embedded Systems and it is expected that students are familiar with the fundamental concepts of computer networks and distributed systems. The course provides the framework for understanding the role of each current and emerging technology under the perspective of building “real” distributed real-time fault-tolerant embedded systems while stimulating a hands-on approach on a relevant set of selected technologies and platforms. In particular, the students will have a comprehensive experimental contact with practical embedded platforms through laboratory experiments and through practical projects. The course will provide a set of valences in the area of embedded and distributed system technologies, which can be equated by the knowledge of practical solutions to attain real-time and dependability properties in distributed control systems that interface “real” devices through sensing and actuating. Students will learn how to build those systems using existing interfacing and networking technologies and how to integrate such technologies with computing and operating system platforms. The students will have a thorough contact with both the specification and the development of such distributed embedded systems. Qualidade de Software (Software Quality) After completing this course, the students are able to: Identify the unique characteristics of software as a product and as production process. Recognize the uniqueness of software quality assurance (SQA) and explain the environment for which SQA methods are developed. Define software quality and software quality assurance and explain the objectives of software quality assurance activities. Identify and explain the product quality models and assessment of their characteristics. Explain the structure of McCall’s classic factor model and ISO/IEC 9126 factor model. Identify and define the components of a SQA system: pre-project, project life cycle activities assessment, infrastructure, software quality management, standardization, certification and SQA system assessment and human components. The course includes a comprehensive coverage of the main quality management standards (ISO 9000-3, CMM, CMMI) and project process standards (ISO/IEC 12207, 1012-1998) Introdução à Criptografia Aplicada (Introduction to Applied Cryptography) This course will follow the initial structure of the course lectured at CMU – A wide array of communication and data protections employ cryptographic mechanisms. This course explores modern cryptographic (code making) and cryptanalytic (code breaking) techniques in detail. This course emphasizes how cryptographic mechanisms can be effectively used within larger security systems, and the dramatic ways in which cryptographic mechanisms can fall vulnerable to cryptanalysis in deployed systems. Topics covered include cryptographic primitives such as symmetric encryption, public key encryption, digital signatures, and message authentication codes; cryptographic protocols, such as key exchange, remote user authentication, and interactive proofs; cryptanalysis of cryptographic primitives and protocols, such as by side-channel attacks, differential cryptanalysis, or replay attacks; and cryptanalytic techniques on deployed systems, such as memory remanence, timing attacks, and differential power analysis. Procedimentos de Segurança e Manuseamento de Informação Classificada (Security procedures and handling of classified information) This course aims to give the students skills that allow them to manage communication and information systems, taking into account skills needed to make decisions, or delegation responsibilities’. In this context, they are also taught concepts that allow them to develop skills that enable the management activity in operations centers, in coordination with other centers of decision. Are well developed ability to enable collaboration in activities of project management, planning of information systems and information analysis. Configuração e Gestão de Sistemas (Systems Configuration and Management) The objective of the course is to complement the concepts obtained in systems’ courses with a systemic view of the configuration of computer systems, distributed systems and computer networks, and their management and exploitation. The idea is to consolidate a set of notions in the areas of systems and network administration, giving them a broad coverage of truly strategic systems management. Direito da Cibersegurança (Cybersecurity Law) Understanding the key issues related to the cybersecurity, and how they arise today. Providing depth and monographic approaches to this theme of scientific forefront, encouraging skills of research, analysis, criticism and debate, in order to enable participants to become protagonists of theoretical progress in this area of expertise.
    Comments
    Course level (Undergrad, grad)
    Master
    Link
    http://msi.fc.ul.pt/
    Instructor
    Other information
  • Instituto Politécnico de Beja
    Discipline (e.g., computer science)
    Course title (local, English)
    Mestrado em Engenharia de Segurança Informática, Master in Enginnering of Information Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Master
    Link
    http://ubinet.ipbeja.pt/mesi/
    Instructor
    Other information
  • Singidunum University
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Contemporary Information Technologies
    Description
    Focus area (e.g., threat analysis)
    - Information Systems Security and Digital Forensics
    - Intelligent Business Systems
    - Contemporary Internet Technologies
    Abstract
    Contemporary business operations and the Internet rely heavily on each other. As a synonym for information and computing infrastructure, the Internet is mainly used for the purposes of transmission, processing and storage of data. Information will provide a reliable base for making business decisions only if its security, authenticity and integrity can be granted. In case of deterioration of these security services, digital forensic methods are used to detect and resolve the given problem. Through application of intelligent systems techniques and data mining, reliable and secure information transforms into valid and efficient business decisions. This study program should enable students to gain vast knowledge and skills in IT that will help you learn how to use methods of analysis and synthesis for all relevant phases of the business decision-making process. It prepares students for successful career in IT sectors (programming, security management, network and system administration, developmental engineering etc.)
    Comments
    Course level (Undergrad, grad)
    Postgraduate
    Link
    http://catalogs.singidunum.ac.rs/catalogs/eng/master/cit
    Instructor
    Prof. Milan Milosavljević, PhD
    Other information

    Students take six exams. First project assignment integrates three first semester courses, whereas the second one combines three second semester courses. During the course of studies, students specify their Master’s thesis topic. Project assignments completed in the first and second semester can be integrated into the Master’s thesis.

  • RWTH Aachen
    Discipline (e.g., computer science)
    Business Administration, Computer Science, Mathematics, Media Informatics, Software Systems Engineering
    Course title (local, English)
    IT-Security 1
    Description
    Focus area (e.g., threat analysis)
    IT-Security
    Abstract
    Comments
    In the lecture IT-Security 1 - Network Security we study measurements to protect data during transmission in interconnected networks.
    Course level (Undergrad, grad)
    Graduate
    Link
    https://www.campus.rwth-aachen.de/my/rwth/all/event.asp?gguid=0x284EC71520D0C84082377B175102E64E&tguid=0xFF3316DBBC27F94B9134B0BCD3B00625
    Instructor
    Prof. Dr. Ulrike Meyer
    Other information
  • Universität Augsburg
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Software- und Systemsicherheit / Software and System Security
    Description
    Focus area (e.g., threat analysis)
    Software Engineering and Programming languages
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.informatik.uni-augsburg.de/lehrstuehle/swt/se/teaching/ws1314/SuSS/
    Instructor
    Dr. Stenzel
    Other information
  • Freie Universität Berlin
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Rechnersicherheit / Computer Security
    Description
    Focus area (e.g., threat analysis)
    Security in Information Technology
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    https://www.mi.fu-berlin.de/kvv/course.htm?cid=10944&sid=27&iid=1
    Instructor
    Volker Roth, Jan-Ole Malchow
    Other information
  • Freie Universität Berlin
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    IT-Sicherheit / IT-Security
    Description
    Focus area (e.g., threat analysis)
    Research topics of the working group "Secure Identity"
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    https://www.mi.fu-berlin.de/kvv/course.htm?cid=10952&sid=27&iid=1
    Instructor
    Volker Roth
    Other information
  • Freie Universität Berlin
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Kryptographie und Sicherheit in Verteilten Systemen / Cryptography and Security in Distributed Systems
    Description
    Focus area (e.g., threat analysis)
    Cryptography, Computer Security, Networks
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    https://www.mi.fu-berlin.de/kvv/course.htm?cid=10711&sid=26&iid=1
    Instructor
    Volker Roth
    Other information
  • TU Berlin
    Discipline (e.g., computer science)
    Computer Science, Computer Engineering
    Course title (local, English)
    Sicherheitsaspekte in der Softwaretechnik / Security aspects in Software Engineering
    Description
    Focus area (e.g., threat analysis)
    Software Security, Software Engineering
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.swt.tu-berlin.de/menue/studium_und_lehre/lehrveranstaltungen/saswt/wise_201213/
    Instructor
    Steffen Helke
    Other information
  • Ruhr-Universität Bochum
    Discipline (e.g., computer science)
    IT Security/Information Technology
    Course title (local, English)
    Projekt Eingebettete Sicherheit / Project Embedded Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.ei.rub.de/studium/lehrveranstaltungen/608/
    Instructor
    Prof. Dr.Ing. Tim Güneysu
    Other information
  • Ruhr-Universität Bochum
    Discipline (e.g., computer science)
    IT Security/Information Technology
    Course title (local, English)
    Security and Privacy in Wireless Networks
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.ei.rub.de/studium/lehrveranstaltungen/690/
    Instructor
    Prof. Dr. Christina Pöpper
    Other information
  • Ruhr-Universität Bochum
    Discipline (e.g., computer science)
    Applied Computer Science, IT Security/Information Technology
    Course title (local, English)
    Netz- und Datensicherheit / Network and Data Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://nds.rub.de/teaching/lectures/290/
    Instructor
    Prof. Dr. Jörg Schwenk
    Other information
  • Ruhr-Universität Bochum
    Discipline (e.g., computer science)
    IT Security/Information Technology
    Course title (local, English)
    Praktikum Security Appliances / Practical Course Security Appliances
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://nds.rub.de/teaching/lectures/621/
    Instructor
    Prof. Dr. Jörg Schwenk
    Other information
  • Brandenburgische Technische Universität Cottbus
    Discipline (e.g., computer science)
    Computer Science, Engineering Economics, Technology and Innovation Management, Information and Media Technology, eBusiness
    Course title (local, English)
    IT-Sicherheit / IT-Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.tu-cottbus.de/fakultaet1/de/rechnernetze-und-kommunikationssysteme/lehre/semesteruebersicht/abgeschlossene-veranstaltungen/it-sicherheit.html
    Instructor
    Prof. König
    Other information
  • Universität Dortmund
    Discipline (e.g., computer science)
    Computer Science, Applied Computer Science
    Course title (local, English)
    Sicherheit und Softwareengineering / Security and Softwareengineering
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www-secse.cs.tu-dortmund.de/secse/pages/teaching/ws13-14/mbse-sem/index_de.shtml
    Instructor
    Prof. Dr. Jan Jürjens, Dr. Sven Wenzel
    Other information
  • TU Dresden
    Discipline (e.g., computer science)
    Computer Science, Media Computer Science, Information Systems Engineering
    Course title (local, English)
    Trustworthy and Energy-Efficient Smart Grids
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    The goal of this seminar is to contemplate aspects smart grids in Brasil and Germany with special focus on data security and privacy.
    Course level (Undergrad, grad)
    Graduate
    Link
    https://www.inf.tu-dresden.de/index.php?node_id=3375&ln=en
    Instructor
    Dr.-Ing. Elke Franz
    Other information
  • TU Dresden
    Discipline (e.g., computer science)
    Computer Science, Media Computer Science
    Course title (local, English)
    Komplexpraktikum Datenschutz in der Anwendungsentwicklung / Practical course on Data protection in Application Development
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.inf.tu-dresden.de/index.php?node_id=3252&ln=de
    Instructor
    Dr.-Ing. Katrin Borcea-Pfitzmann
    Other information
  • TU Dresden
    Discipline (e.g., computer science)
    Computer Science, Media Computer Science
    Course title (local, English)
    Komplexpraktikum Datenschutzfreundliche Technologien im Internet / Practical Course on Friendly Data Protection Technologies on the Internet
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    https://www.inf.tu-dresden.de/index.php?node_id=486&ln=de
    Instructor
    Dr.-Ing. Stefan Köpsell
    Other information
  • TU Dresden
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Anwendungsforschung Datenschutz und Datensicherheit / Applied Research on Data Protection and Data Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.inf.tu-dresden.de/index.php?node_id=3371&ln=de
    Instructor
    Martina Gersonde
    Other information
  • Universität Duisburg-Essen
    Discipline (e.g., computer science)
    Applied Computer Science, International Studies in Engineering, Electrical Engineering and Information Technology
    Course title (local, English)
    Entwicklung sicherer Software / Development of save and secure Software
    Description
    Focus area (e.g., threat analysis)
    Concept of Safety and Security, Safety and Security Requirements, Risk Analysis, Systems Security, Security Architectures, Security Infrastructures, Protocols, Safety and Security Standards, Process of Developing save and secure software
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate/Graduate
    Link
    https://www.uni-due.de/swe/ess.shtml
    Instructor
    Prof. Dr. Maritta Heisel, Dipl.-Wirt. Inform. Kristian Beckers
    Other information
  • Heinrich Heine Universität Düsseldorf
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Sicherheitskritische Systeme / Safety Critical Systems
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.stups.uni-duesseldorf.de/w/Sicherheitskritische_Systeme,_WiSe_13
    Instructor
    Prof. Dr. Michael Leuschel
    Other information
  • Uni Erlangen-Nürnberg
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Datenschutz und Compliance / Data protection and Compliance
    Description
    Focus area (e.g., threat analysis)
    Fundamentals of Data Protection, Compliance Requirements of IT-Systems
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    https://www1.informatik.uni-erlangen.de/courses/show/2013s/21152225
    Instructor
    Prof. Dr.-Ing. Michael Tielemann
    Other information
  • Uni Erlangen-Nürnberg
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    IT-Security Projekt / IT-Security Project
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    https://www1.informatik.uni-erlangen.de/courses/show/2013s/41187875
    Instructor
    Dr.-Ing. Tilo Müller, Dipl.-Wirtsch.-Inf. Johannes Stüttgen, Prof. Dr.-Ing. Felix Freiling
    Other information
  • Uni Erlangen-Nürnberg
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    IT-Sicherheits-Konferenzseminar / IT-Security Conference Seminar
    Description
    Focus area (e.g., threat analysis)
    Security, Safety
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    https://www1.informatik.uni-erlangen.de/courses/show/2013w/21308809
    Instructor
    Dipl.-Inform. Dipl.-Math. Hans-Georg Eßer, Prof. Dr.-Ing. Felix Freiling
    Other information
  • Goethe Universität Frankfurt a. M.
    Discipline (e.g., computer science)
    Computer Science, Business Informatics
    Course title (local, English)
    Informations- und Kommunikationssicherheit: Infrastrukturen, Technologien und Geschäftsmodelle / Information and Communication Security - Infrastructures, technologies, and business models
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    The "Information and Communication Security" lecture series provides a general introduction to the topic of information and communication security. Students will be qualified to identify security challenges that come along with using and employing information and communication systems, and to identify and apply adequate means and methods to solve them. Emphasis will be put on the organisational and technical set-up of infrastructures, also including aspects of risk management and profitability analysis of security concepts and technologies. Further, students will be qualified to identify and assess security risks, in order to develop and establish appropriate security strategies.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.m-chair.de/wps/wse/lv/det/rannenberg/148/
    Instructor
    Prof. Dr. Kai Rannenberg
    Other information
  • Goethe Universität Frankfurt a. M.
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Privacy vs. Data: Business Models in the digital, mobile Economy
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    The majority of business models in the digital, mobile economy heavily rely on the existence of user data in order to enable a value proposition for users. For instance, advertisers use data for the targeting of advertisements whereas others apply it for the personalisation of their service offerings. However, what is beneficial for businesses often becomes of a threat to the privacy of users – especially if highly sensitive data, such as location data, is collected and processed without their consent. Within the digital, mobile economy field and beyond, this course is going to explore the area of conflict between data- centric online/mobile business models and user privacy.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.m-chair.de/wps/wse/lv/det/rannenberg/160/
    Instructor
    Dr. Andreas Albers
    Other information
  • Goethe Universität Frankfurt a. M.
    Discipline (e.g., computer science)
    Computer Science, Business Informatics
    Course title (local, English)
    Identity management in the crossroad: business interests and users' privacy
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    The modern society has undergone rapid developments in the digital world, creating the concept of a digital society. Social networks, smart mobile devices, online shopping and services have encouraged new ways of doing business, and changed our habits and social interactions. Nevertheless, the impacts of these changes on the online users’ privacy have not always been fully understood by the users, as our personal information is released to different parties, which we have not full control of. On top of that, the many accounts we need for different services makes it difficult for the Users to properly manage their “different identities” in the digital world. In this seminar, we will investigate the different interesting topics around identity management in the light of the recent developments in technologies that promise taking into account multilaretal interests of both businesses and the users.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.m-chair.de/wps/wse/lv/det/rannenberg/171/
    Instructor
    Prof. Dr. Kai Rannenberg, M. Sc. Fatbardh Veseli
    Other information
  • Goethe Universität Frankfurt a. M.
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Mobile Business II - Application Design, Applications, Infrastructures and Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    The 2nd part of this lecture series (Mobile Business II) focuses on the variety of opportunities and challenges, that are offered by mobile communication technologies and their specific properties and which need to be considered and addressed by companies and regulators. The overall objective of the course is to provide advanced knowledge about mobile applications and mobile services, ranging from technical to economic aspects. Students will be qualified to pro-actively realize inherent commercial potential and to identify and to address challenges and problems in the area of mobile business. An important facet of this is the discussion of international regulation and its implications on the development and application scenarios for mobile services. Architectures for mobile services and their development are in the focus of the first part of the course. This includes topics such as security and privacy, usability, and the role of standardization. The presentation of exemplary application areas will allow students to understand and question how different design aspects are considered in current scenarios. The course concludes with a state of the art overview of current mobile business research topics and activities, enabling students to understand the lines of research and to draw connections to already existing mobile business applications and scenarios.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.m-chair.de/wps/wse/lv/det/rannenberg/161/
    Instructor
    Prof. Dr. Kai Rannenberg
    Other information
  • Goethe Universität Frankfurt a. M.
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Privacy in Online and Enterprise Social Networks
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.m-chair.de/wps/wse/lv/det/rannenberg/157/
    Instructor
    Prof. Dr. Kai Rannenberg, Dipl.-Wirt.-Inf. Stephan Heim, Dipl.-Wirt.-Inf. Markus Tschersich
    Other information
  • Westfälische Hochschule Gelsenkirchen
    Discipline (e.g., computer science)
    Internet Security
    Course title (local, English)
    Datenschutz und Ethik / Data Protection and Ethics
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.w-hs.de/erkunden/fachbereiche/informatik/lehrveranstaltungen/informatik/master/dse-datenschutz-und-ethik/
    Instructor
    Prof. Dr. Norbert Pohlmann
    Other information
  • Westfälische Hochschule Gelsenkirchen
    Discipline (e.g., computer science)
    Internet Security
    Course title (local, English)
    Internet-Sicherheit A + B / Internet Security A + B
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.internet-sicherheit.de/de/lehre/internet-sicherheit/internet-sicherheit-a/modulbeschreibung/
    Instructor
    Prof. Dr. Norbert Pohlmann
    Other information
  • Westfälische Hochschule Gelsenkirchen
    Discipline (e.g., computer science)
    Internet Security
    Course title (local, English)
    Programmiermethodik und Sicherheit / Programming methodology and Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.w-hs.de/erkunden/fachbereiche/informatik/lehrveranstaltungen/informatik/master/prms-programmiermethodik-und-sicherheit/
    Instructor
    Prof. Dr. Marcel Luis
    Other information
  • Westfälische Hochschule Gelsenkirchen
    Discipline (e.g., computer science)
    Internet Security
    Course title (local, English)
    Grundlagen der IT-Sicherheit / Fundamentals of IT Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.internet-sicherheit.de/de/institut/lehre/lehre/grundlagen-it-sicherheit/modulbeschreibung/
    Instructor
    Prof. Dr. Norbert Pohlmann
    Other information
  • TU Hamburg-Harburg
    Discipline (e.g., computer science)
    Computer Science/Engineering, Information and Media Technologies,
    Course title (local, English)
    Application Security
    Description
    Focus area (e.g., threat analysis)
    Security principles, Web services security, Web application security, Access control - trust management - Trusted Computing, Privacy: OECD principles, data protection legislation, Security solutions for selected applications
    Abstract
    Comments
    Current approaches to implementing security in distributed applications, in particular in web services
    Course level (Undergrad, grad)
    Graduate
    Link
    http://intranet.tuhh.de/kvvz/vorlesung.php3?Lang=en&id=2275
    Instructor
    Prof. Dr. Dieter Gollmann
    Other information
  • TU Ilmenau
    Discipline (e.g., computer science)
    Course title (local, English)
    Network Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.tu-ilmenau.de/telematik/lehre/wintersemester-20122013/network-security/
    Instructor
    Prof. Dr.-Ing. Günter Schäfer
    Other information
  • TU Ilmenau
    Discipline (e.g., computer science)
    Course title (local, English)
    Schutz von Kommunikationsinfrastrukturen / Protection of Communications Infrastructure
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.tu-ilmenau.de/telematik/lehre/sommersemester-2013/schutz-von-komm-infrastrukturen/
    Instructor
    Dr.-Ing. Michael Roßberg
    Other information
  • Universität Karlsruhe
    Discipline (e.g., computer science)
    Course title (local, English)
    Fortgeschrittene Verschlüsselungstechniken / Advanced Ciphering Techniques
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    https://crypto.iti.kit.edu/index.php?id=fv-sose13#c1878
    Instructor
    Jun.-Prof. Dennis Hofheinz, Florian Böhl, Björn Kaidel, Jessica Koch, Julia Rohlfing
    Other information
  • Universität Karlsruhe
    Discipline (e.g., computer science)
    Computer Science and Similar Disciplines
    Course title (local, English)
    Praktikum Kryptographie und Datensicherheit / Practical Course Cryptography and Data Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    https://crypto.iti.kit.edu/index.php?id=pkud-ws120
    Instructor
    Prof. Jörn Müller-Quade, Willi Geiselmann, Bernhard Löwe
    Other information
  • Universität Koblenz-Landau
    Discipline (e.g., computer science)
    Information Management, Computer Science, Computational Visualistics
    Course title (local, English)
    IT-Risk-Management
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    https://www.uni-koblenz-landau.de/koblenz/fb4/iwvi/aggrimm/lehre-en/sose13/itriskmanagement
    Instructor
    Prof. Dr. Rüdiger Grimm
    Other information
  • Universität Koblenz-Landau
    Discipline (e.g., computer science)
    Information Management, Computer Science, Computational Visualistics
    Course title (local, English)
    Sicherheit und Zuverlässigkeit für mobile Anwendungen / Security and reliability for mobile applications
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    https://www.uni-koblenz-landau.de/koblenz/fb4/iwvi/aggrimm/lehre-en/sose13/sicherheitmobianwendungen
    Instructor
    Prof. Dr. Rüdiger Grimm, Andreas Kasten, Daniela Simic-Draws
    Other information
  • Universität Lübeck
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    SOA, Sicherheit und Runtime-Verifikation / SOA, Security and Runtime Verification
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    https://www.itm.uni-luebeck.de/teaching/ss2013/master-seminar/
    Instructor
    Prof. Dr.-Ing. Dennis Pfisterer
    Other information
  • Universität Lübeck
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Sicherheit in Netzen und Verteilten Systemen / Security in Networks and Distributed Systems
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    The lecture covers security in computer networks and connected computer systems. During the lecture, we will uncover threads and weaknesses and develop resolutions.
    Course level (Undergrad, grad)
    Graduate
    Link
    https://www.itm.uni-luebeck.de/teaching/ss2014/sec/
    Instructor
    Prof. Dr.-Ing. Dennis Pfisterer
    Other information
  • Universität Magdeburg
    Discipline (e.g., computer science)
    Computer Visualistics, Business Informatics, Computer Systems in Engineering, Computer Science, Data & Knowledge Engineering
    Course title (local, English)
    Multimedia and Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Focus of this lecture is the security of multimedia applications. The students will obtain the knowledge to apply multimedia specific security protocolls to media like image, audio and video.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://omen.cs.uni-magdeburg.de/itiamsl/lehre/sommersemester-13/multimedia-and-security-ss13.html
    Instructor
    Prof. Dr.-Ing. Jana Dittmann, Dipl.-Inform. Christian Krätzer
    Other information
  • Universität Magdeburg
    Discipline (e.g., computer science)
    Computer Visualistics, Computer Systems in Engineering, Computer Science, Business Informatics, Computational Mathematics, Data and Knowledge Engineering
    Course title (local, English)
    Selected Chapters of IT Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://omen.cs.uni-magdeburg.de/itiamsl/lehre/sommersemester-13/selected-chapters-of-it-security-ss13.html
    Instructor
    Prof. Dr.-Ing. Jana Dittmann, Prof. Dr.-Ing. Claus Vielhauer, Dipl. Infom. Stefan Kiltz
    Other information
  • Universität Magdeburg
    Discipline (e.g., computer science)
    Medical Systems Engineering
    Course title (local, English)
    Advanced Security Issues in Medical Systems
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
     Within this seminar the students work on selected actual topics on technical, organizational, judicial, social and ethical topics in IT security on the example of security considerations in medical sciences. The goal is to enable the student to understand and devise application field specific IT security strategies.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://omen.cs.uni-magdeburg.de/itiamsl/lehre/sommersemester-13/advanced-security-issues-in-medical-systems.html
    Instructor
    Prof. Dr.-Ing. Jana Dittmann, Dipl.-Inform. Stefan Kiltz
    Other information
  • Universität Magdeburg
    Discipline (e.g., computer science)
    Computer Science, Computer Visualistics, Business Informatics, Computer Systems in Engineering, Data & Knowledge Engineering
    Course title (local, English)
    Praktikum IT Sicherheit / Practical Course IT Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://omen.cs.uni-magdeburg.de/itiamsl/lehre/wintersemester-13-14/praktikum-it-sicherheit-ws13-14.html
    Instructor
    Prof. Dr.-Ing. Jana Dittmann
    Other information
  • LMU München
    Discipline (e.g., computer science)
    Computer Science, Media Computer Science
    Course title (local, English)
    IT-Sicherheit - Sicherheit vernetzter Systeme
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.nm.ifi.lmu.de/teaching/Vorlesungen/2013ws/itsec/
    Instructor
    Priv.-Doz. Dr. Helmut Reiser, Priv.-Doz. Dr. Wolfgang Hommel
    Other information
  • Universität Potsdam
    Discipline (e.g., computer science)
    IT Systems Engineering
    Course title (local, English)
    Network Security in Practice
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    In this seminar, we focus on study of the security problems of networked systems or applications. Several network security technologies, such as, firewall, IDS/IPS, SSH, VPN, Application Layer Gateway, Network Scanning and Monitoring, etc. will be concerned in this seminar. Some known implementations, tools and methods, incl. commercial products/open source software, are expected to be reviewed and tested with certain practical deployment scenario.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.hpi.uni-potsdam.de/meinel/lehre/lectures_classes/archive/network_security_in_practice.html
    Instructor
    Dr. Feng Cheng, Prof. Dr. Christoph Meinel
    Other information
  • Universität Potsdam
    Discipline (e.g., computer science)
    IT Systems Engineering
    Course title (local, English)
    Privacy and Security in IPv6
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Privacy and security are two important entities in any networks and have a close relationship. Privacy is the ability of the users to choose what data they want to share with others and what data they want to keep from others. Security, on the other hand, is the act of making these data confidential or preventing unauthorized access to these data. Unfortunately the wide use of the Internet and other online storage over the Internet to improve information availability decreases the privacy of the user's, governments' and businesses' information. This is because, it might be easier for an attacker to attack these storage in order to harm user's privacy and security. The purpose of this seminar is to teach students how to protect their privacy and security. The students are asked to integrate their findings and results to our IPv6SSL to improve this system. The purpose of IPv6SSL is to play a role of basic security and privacy consulting system and enhance users with a means to protect their privacy and security or helping them to be aware of the privacy and security issues in the network they are using.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.hpi.uni-potsdam.de/studium/lehrangebot/lehrangebotsarchiv/lehrangebotsarchiv_ws_1314/veranstaltung/privacy_and_security_in_ipv6.html
    Instructor
    Prof. Dr. Christoph Meinel, Hosnieh Rafiee
    Other information
  • Universität Potsdam
    Discipline (e.g., computer science)
    IT Systems Engineering
    Course title (local, English)
    Sicherheit in komplexen IT-Landschaften / Security in complex IT environment
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.hpi.uni-potsdam.de/studium/lehrangebot/lehrangebotsarchiv/lehrangebotsarchiv_ws_1314/veranstaltung/sicherheit_in_komplexen_it_landschaften.html
    Instructor
    Prof. Dr. Christoph Meinel, Dr. Michael Menzel
    Other information
  • Universität Regensburg
    Discipline (e.g., computer science)
    Business Informatics
    Course title (local, English)
    Sicherheit datenintensiver Anwendungen / Security of data-intensive applications
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www-ifs.uni-regensburg.de/Lehre/SdA/index.html.de
    Instructor
    Prof. Dr. Günther Pernul
    Other information
  • Universität Siegen
    Discipline (e.g., computer science)
    Course title (local, English)
    Kryptographische Verfahren und Anwendungen I / Cryptographic processes and applications I
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    Instructor
    Prof. Karl Christoph Ruland
    Other information
  • Universität Siegen
    Discipline (e.g., computer science)
    Course title (local, English)
    Kryptographische Verfahren und Anwendungen II / Cryptographic processes and applications II
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    Instructor
    Prof. Karl Christoph Ruland
    Other information
  • Universität Trier
    Discipline (e.g., computer science)
    Computer Science, Business Informatics, Applied Mathematics
    Course title (local, English)
    Moderne Kryptographie (IT-Sicherheit III) / Modern Cryptography (IT-Security III)
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.infsec.uni-trier.de/teaching/ws201314/it-sicherheit-iii-ws-201113.html
    Instructor
    Prof. Dr. Ralf Küsters
    Other information
  • Universität Trier
    Discipline (e.g., computer science)
    Computer Science, Business Informatics
    Course title (local, English)
    Ausgewählte Kapitel der Informationssicherheit und Kryptographie (IT-Sicherheit IV) / Selected Topics on Information Security and Cryptography (IT-Security IV)
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.infsec.uni-trier.de/teaching/sose2014/it-sicherheit4.html
    Instructor
    Prof. Dr. Ralf Küsters
    Other information
  • Universität Augsburg
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Safety and Security
    Description
    Focus area (e.g., threat analysis)
    Software Engineering and Programming languages
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.informatik.uni-augsburg.de/lehrstuehle/swt/se/teaching/ss14/safetyAndSecurity/
    Instructor
    Kuzman Katkalov, Johannes Leupolz
    Other information
  • Universität Augsburg
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Internetsicherheit / Internet security
    Description
    Focus area (e.g., threat analysis)
    Software Engineering and Programming languages
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.informatik.uni-augsburg.de/lehrstuehle/swt/se/teaching/ss14/internetsicherheit/
    Instructor
    Marian Borek, Kuzman Katkalov, Dr. Stenzel
    Other information
  • Ruhr-Universität Bochum
    Discipline (e.g., computer science)
    IT Security/Information Technology
    Course title (local, English)
    Vertiefungspraktikum Security Appliances / Immersion Practical Course Security Appliances
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.ei.rub.de/studium/lehrveranstaltungen/620/
    Instructor
    Prof. Dr. Jörg Schwenk
    Other information
  • FH Bonn-Rhein Sieg
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Sicherheit in Netzen / Network Security
    Description
    Focus area (e.g., threat analysis)
    VPN, Ipsec, TLS
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.leischner.inf.fh-bonn-rhein-sieg.de/lehre/sine/karte1.htm
    Instructor
    Prof. Dr. Martin Leischner
    Other information
  • TU Braunschweig
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Grundlagen der Sicherheit in Netzen und verteilten Systemen / Foundations of Network Security and Distributed Systems
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.ibr.cs.tu-bs.de/courses/ws0910/sec/index.html?lang=en
    Instructor
    Prof. Dr.-Ing. Lars Wolf, Dr. S. Milius
    Other information
  • Universität Dortmund
    Discipline (e.g., computer science)
    Computer Science, Applied Computer Science
    Course title (local, English)
    Werkzeugunterstützung für sichere Software / Tool support for secure Software
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www-secse.cs.tu-dortmund.de/secse/pages/teaching/ws13-14/proseminar_1/index_de.shtml
    Instructor
    Dr. Thomas P. Ruroth
    Other information
  • Universität Dortmund
    Discipline (e.g., computer science)
    Computer Science, Applied Computer Science
    Course title (local, English)
    Fachprojekt Softwaretechniken für sichere Cloud-Computing Systeme / Project Software techniques for secure Cloud-Computing Systems
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www-secse.cs.tu-dortmund.de/secse/pages/teaching/ws13-14/fp-cc/index_de.shtml
    Instructor
    Christian Wessel
    Other information
  • TU Dresden
    Discipline (e.g., computer science)
    Computer Science, Media Computer Science
    Course title (local, English)
    Sicherheit in Computersystemen / Security in Computer Systems
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.inf.tu-dresden.de/index.php?node_id=517
    Instructor
    Dr.-Ing. Sebastian Clauß
    Other information
  • TU Dresden
    Discipline (e.g., computer science)
    Computer Science, Media Computer Science
    Course title (local, English)
    Datenschutz in der Answendungsentwicklung / Data protection in Application Development
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    https://www.inf.tu-dresden.de/index.php?node_id=3251&ln=de
    Instructor
    Dr.-Ing. Katrin Borcea-Pfitzmann
    Other information
  • Uni Erlangen-Nürnberg
    Discipline (e.g., computer science)
    Computer Science, Medical Engineering
    Course title (local, English)
    IT-Sicherheits-Konferenzseminar / IT-Security Conference Seminar
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    https://www1.informatik.uni-erlangen.de/courses/show/2013w/21191506
    Instructor
    Dipl.-Inform. Dipl.-Math. Hans-Georg Eßer, Prof. Dr.-Ing. Felix Freiling
    Other information
  • TU Hamburg-Harburg
    Discipline (e.g., computer science)
    Information Technology
    Course title (local, English)
    Computersicherheit / Computer Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    https://www.sva.tuhh.de/joomla/index.php/courses/winter-term/proseminar-informatik-computersicherheit
    Instructor
    Prof. Dr. Dieter Gollmann
    Other information
  • Universität Koblenz-Landau
    Discipline (e.g., computer science)
    Information Management, Business Informatics
    Course title (local, English)
    Datenschutz / Data Protection
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.uni-koblenz-landau.de/koblenz/fb4/iwvi/agschubert/teaching/winter2013/data-privacy
    Instructor
    Dr. Michael Möhring
    Other information
  • Universität Koblenz-Landau
    Discipline (e.g., computer science)
    Information Management, Computer Science, Computational Visualistics
    Course title (local, English)
    Grundlagen der IT-Sicherheit / Fundamentals of IT Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.uni-koblenz-landau.de/koblenz/fb4/iwvi/aggrimm/lehre-en/wise1011/ITsec
    Instructor
    Prof. Dr. Rüdiger Grimm
    Other information
  • Universität Magdeburg
    Discipline (e.g., computer science)
    Course title (local, English)
    Sichere Systeme / Secure Systems
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://omen.cs.uni-magdeburg.de/itiamsl/lehre/sommersemester-13/sichere-systeme-sisy.html
    Instructor
    Prof. Dr.-Ing. Jana Dittmann
    Other information
  • Universität Magdeburg
    Discipline (e.g., computer science)
    Computer Science, Business Informatics, Computer Visualistics,Computer Systems in Engineering
    Course title (local, English)
    Secure Infrastructures Project
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://omen.cs.uni-magdeburg.de/itiamsl/lehre/sommersemester-13/secure-infrastructures-project-ss13.html
    Instructor
    Prof. Dr.-Ing. Jana Dittmann
    Other information
  • Universität Magdeburg
    Discipline (e.g., computer science)
    Computer Science, Business Informatics, Computer Visualistics,Computer Systems in Engineering
    Course title (local, English)
    Ausgewählte Kapitel der IT-Sicherheit / Selected Chapters of IT-Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://omen.cs.uni-magdeburg.de/itiamsl/lehre/sommersemester-13/ausgewaehlte-kapitel-der-it-sicherheit-akits.html
    Instructor
    Prof. Dr.-Ing. Jana Dittmann, Dipl.-Inform. Tobias Hoppe
    Other information
  • Universität Magdeburg
    Discipline (e.g., computer science)
    Computer Science, Business Informatics, Computer Systems in Engineering, Computer Visualistics
    Course title (local, English)
    Sicherheitsfragen eingebetteter Systeme / Safety Issues of Embedded Systems
    Description
    Focus area (e.g., threat analysis)
    Aspects of IT Security in embedded IT applications
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://omen.cs.uni-magdeburg.de/itiamsl/lehre/wintersemester-13-14/sicherheitsfragen-eingebetteter-systeme-ws13-14.html
    Instructor
    Prof. Dr.-Ing. Jana Dittmann, Dr.-Ing. Claus Vielhauer
    Other information
  • Universität Magdeburg
    Discipline (e.g., computer science)
    Computer Science, Business Informatics, Computer Systems in Engineering, Computer Visualistics
    Course title (local, English)
    Grundlagen IT-Sicherheit / Fundamentals of IT Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://omen.cs.uni-magdeburg.de/itiamsl/lehre/wintersemester-13-14/grundlagen-it-sicherheit-ws13-14.html
    Instructor
    Prof. Dr.-Ing. Jana Dittmann, Dipl.-Inform. Tobias Hoppe
    Other information
  • Universität Potsdam
    Discipline (e.g., computer science)
    IT Systems Engineering
    Course title (local, English)
    Internet Security: Weaknesses and Targets
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    "Internet Security - Weaknesses and Targets" provides an introduction to various topics concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, Internet security weaknesses and targets are discussed in detail. There are lectures about human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocols, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and current malware. The lecture course concludes with an introduction about possibilities to detect attacks and intrusions and a discussion about legal and ethical issues.
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.hpi.uni-potsdam.de/meinel/lehre/tele_lectures/internet_security.html
    Instructor
    Prof. Dr. Christoph Meinel
    Other information
  • Universität Regensburg
    Discipline (e.g., computer science)
    Business Informatics
    Course title (local, English)
    IT-Security I
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www-ifs.uni-regensburg.de/Lehre/IT-Security/index.html.de
    Instructor
    Prof. Dr. Günther Pernul
    Other information
  • Universität Regensburg
    Discipline (e.g., computer science)
    Business Informatics
    Course title (local, English)
    IT-Security II
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.winfor.uni-regensburg.de/Lehre/IT-Security-2.html.de
    Instructor
    Prof. Dr. Guido Schryen
    Other information
  • Universität Saarbrücken
    Discipline (e.g., computer science)
    Course title (local, English)
    Security and Privacy - A Beginner's Guide
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    The latest news about spying on private data and personal information by the US government has received increasing attention among governments, mass media, and the scientific community. This stresses the importance of developing and deploying secure and privacy-preserving systems in our digital lives. How do we securely transfer messages from one party to another? How can we browse the Internet anonymously? Which attacks on prominent protocols do exist? And how can we prove a given protocol or system secure? In this proseminar, we will conduct research to provide answers to these and other basic questions concerning security and privacy.
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.sps.cs.uni-saarland.de/teaching/13WS/proseminar/index.html
    Instructor
    Prof. Dr. Matteo Maffei
    Other information
  • Universität Trier
    Discipline (e.g., computer science)
    Computer Science, Business Informatics
    Course title (local, English)
    Einführung in die Informationssicherheit (IT-Sicherheit I) / Introduction to Information Security (IT-Security I)
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.infsec.uni-trier.de/teaching/ws201314/it-sicherheit-i-ws-201314.html
    Instructor
    Prof. Dr. Ralf Küsters
    Other information
  • Universität Trier
    Discipline (e.g., computer science)
    Computer Science, Business Informatics, Applied Mathematics
    Course title (local, English)
    System- und Netzwerksicherheit (IT-Sicherheit II) / System and Network Security (IT-Security II)
    Description
    Focus area (e.g., threat analysis)
    Computer and Network Security, enhancing mere Cryptography
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.infsec.uni-trier.de/teaching/sose2014/it-sicherheit-ii-ss-2014.html
    Instructor
    Prof. Dr. Ralf Küsters
    Other information
  • Universität Bamberg
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Informationssicherheit / Information and Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    https://www.uni-bamberg.de/gdi/leistungen/studium/uebersicht/informationssicherheit/
    Instructor
    Prof. Michael Mendler
    Other information
  • Ruhr-Universität Bochum
    Discipline (e.g., computer science)
    Applied Computer Science, IT Security/Information Technology
    Course title (local, English)
    Aktuelle Themen der IT-Sicherheit / Recent Topics in IT Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://www.ei.rub.de/studium/lehrveranstaltungen/511/
    Instructor
    Prof. Dr. Thorsten Holz
    Other information
  • Ruhr-Universität Bochum
    Discipline (e.g., computer science)
    Applied Computer Science, Electrical Engineering and Information Technology, IT Security/Information Technology
    Course title (local, English)
    Embedded Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://www.ei.rub.de/studium/lehrveranstaltungen/289/
    Instructor
    Prof. Dr.Ing. Tim Güneysu
    Other information
  • Ruhr-Universität Bochum
    Discipline (e.g., computer science)
    Electrical Engineering and Information Technology, IT Security/Information Technology
    Course title (local, English)
    Sichere Hardware / Secure Hardware
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://www.ei.rub.de/studium/lehrveranstaltungen/578/
    Instructor
    Prof. Dr.Ing. Tim Güneysu
    Other information
  • Ruhr-Universität Bochum
    Discipline (e.g., computer science)
    Applied Computer Science, IT Security/Information Technology
    Course title (local, English)
    Projekt Netz- und Datensicherheit / Project Network and Data Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://nds.rub.de/teaching/lectures/285/, http://nds.rub.de/teaching/lectures/29/
    Instructor
    Prof. Dr. Jörg Schwenk
    Other information
  • TU Chemnitz
    Discipline (e.g., computer science)
    Digital Manufacturing, Computational Science, Computer Science, Mathematics, etc.
    Course title (local, English)
    Datensicherheit / Data Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    https://www.tu-chemnitz.de/informatik/ThIS/site/lv.php#
    Instructor
    Prof. Dr. Lefmann
    Other information
  • Brandenburgische Technische Universität Cottbus
    Discipline (e.g., computer science)
    Computer Science, eBusiness, Information and Media Technology
    Course title (local, English)
    IT-Sicherheit in kritischen Infrastrukturen / IT-Security in critical infrastructures
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://www.tu-cottbus.de/fakultaet1/de/rechnernetze-und-kommunikationssysteme/lehre/semesteruebersicht/abgeschlossene-veranstaltungen/it-sicherheit-in-kritischen-infrastrukturen.html
    Instructor
    Franka Schuster
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Computer Science (or related areas, such as electrical engineering)
    Course title (local, English)
    Security, Privacy and Trust
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://www.tk.informatik.tu-darmstadt.de/de/teaching/wintersemester-201112-d/seminar-tk-security-privacy-and-trust-s3/
    Instructor
    Dr. Leonardo A. Martucci
    Other information
  • Universität Dortmund
    Discipline (e.g., computer science)
    Computer Science, Data Science
    Course title (local, English)
    Sicherheit: Fragen und Lösungsansätze / Security: Questions and Solution Approaches
    Description
    Focus area (e.g., threat analysis)
    Security interests and their interdependencies, information flow and inference control, controlling and monitoring, Cryptography
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://www-secse.cs.tu-dortmund.de/secse/pages/teaching/ws13-14/sfl/index_de.shtml
    Instructor
    Dr. Thomas P. Ruroth
    Other information
  • TU Dresden
    Discipline (e.g., computer science)
    Computer Science, Media Computer Science
    Course title (local, English)
    Security and Cryptography II
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://www.inf.tu-dresden.de/index.php?node_id=510&ln=de
    Instructor
    Dr.-Ing. Florian Kerschbaum
    Other information
  • TU Dresden
    Discipline (e.g., computer science)
    Computer Science, Media Computer Science, Information Systems Engineering
    Course title (local, English)
    Technischer Datenschutz / Technical Data Privacy
    Description
    Focus area (e.g., threat analysis)
    Data protection, Data security
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://www.inf.tu-dresden.de/index.php?node_id=515&ln=de
    Instructor
    Dr.-Ing. Sebastian Clauß
    Other information
  • TU Dresden
    Discipline (e.g., computer science)
    Computer Science, Media Computer Science
    Course title (local, English)
    Komplexpraktikum Kryptographie und Datensicherheit / Practical course on Cryptography and Data Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://www.inf.tu-dresden.de/index.php?node_id=516&ln=de
    Instructor
    Dr.-Ing. Sebastian Clauß
    Other information
  • TU Dresden
    Discipline (e.g., computer science)
    Computer Science, Media Computer Science, Computational Engineering, Computational Logic
    Course title (local, English)
    Security and Cryptography I
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    This module gives a thorough introduction to security in general and to multilateral security of IT-systems in particular. Protection goals and their interdependencies are discussed as well as reasonable attacker models. Different kinds of security mechanisms are introduced to provide examples and to clarify that security mechanisms are means to provide for protection goals against attackers at most as powerful as described in the attacker model. Cryptosystems are the fundamental security mechanisms to achieve the protection goals confidentiality and integrity in distributed IT-systems and are therefore discussed in depth: We start by a classification of cryptosystems according to the protection goal they are aiming at and the key-distribution they use. We concentrate on those cryptosystems, whose security is as much validated as possible or even provable. We stress the kind of validation or proof. Participants are enabled both to define and analyze security properties of IT-systems in two respects: What security properties the IT-system is supposed to have and how sure we can be that it really has these properties with respect to could be attackers. In addition, basic knowledge is acquired and basic skills are developed how to construct secure IT-systems.
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://www.inf.tu-dresden.de/index.php?node_id=483&ln=en
    Instructor
    Dr.-Ing. Stefan Köpsell
    Other information
  • TU Dresden
    Discipline (e.g., computer science)
    Computer Science, Media Computer Science
    Course title (local, English)
    Kryptographische Grundlagen der Datensicherheit / Cryptographic Fundamentals of Data Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://www.inf.tu-dresden.de/index.php?node_id=518&ln=de
    Instructor
    Dr.-Ing. Stefan Köpsell
    Other information
  • Uni Erlangen-Nürnberg
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Angewandte IT-Sicherheit / Applied IT-Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    https://www1.informatik.uni-erlangen.de/courses/show/2011w/41161862
    Instructor
    Prof. Dr.-Ing. Felix Freiling
    Other information
  • Fernuniversität Hagen
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Sicherheit im Internet I / Internet Security I
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://vu.fernuni-hagen.de/lvuweb/lvu/app/Kurs/1866/SS2013
    Instructor
    Prof. Dr. Jörg Keller
    Other information
  • TU Hamburg-Harburg
    Discipline (e.g., computer science)
    Computer Science/Engineering, Information and Media Technologies, Information and Communication Systems, Electromagnetic Theory
    Course title (local, English)
    Software Security
    Description
    Focus area (e.g., threat analysis)
    Reliability & software security, Unicode attacks, Integer overflows, Buffer overflows, Race conditions, Security testing, Type-safe languages, SQL attacks, Scripting languages, Identity-based access control, Code-based access control, Java security model, .NET CLR security model, Stack walks and history-based access control
    Abstract
    Comments
    Major causes for software vulnerabilities; current practices for identifying and avoiding software vulnerabilities; fundamentals of code-based access control.
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://intranet.tuhh.de/kvvz/vorlesung.php3?Lang=en&id=2276
    Instructor
    Prof. Dr. Dieter Gollmann
    Other information
  • TU Hamburg-Harburg
    Discipline (e.g., computer science)
    Computer Science/Engineering, Information and Media Technologies, Information and Communication Systems, Electromagnetic Theory
    Course title (local, English)
    Network Security
    Description
    Focus area (e.g., threat analysis)
    Security objectives, Cryptographic services and mechanisms, Hash functions, Digital signatures: RSA and DAS, Encryption algorithms: DES, AES, block cipher modes, stream ciphers, Diffie-Hellman key exchange, Kerberos, IPsec protocols, mobile IPv6·, SSL/TLS, DNS security, GSM/UMTS security protocols, Firewalls and Intrusion Detection Systems, WLAN security
    Abstract
    Comments
    Fundametal methods of modern cryptography; currently deployed standard network security protocols and mechanisms
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    http://intranet.tuhh.de/kvvz/vorlesung.php3?Lang=en&id=2274
    Instructor
    Prof. Dr. Dieter Gollmann
    Other information
  • Universität Karlsruhe
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Sicherheit / Security
    Description
    Focus area (e.g., threat analysis)
    Security in Information Technology
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate / Graduate
    Link
    https://crypto.iti.kit.edu/index.php?id=sic-sose13
    Instructor
    Jun.-Prof. Dennis Hofheinz
    Other information
  • RWTH Aachen
    Discipline (e.g., computer science)
    Course title (local, English)
    Selected Topics in IT-Security
    Description
    Focus area (e.g., threat analysis)
    IT-Security, Cryptography
    Abstract
    Comments
    In this seminar, we will discuss selected areas of research in IT-security and cryptography. Possible topics may include grid security, payment cards, mobile malware, SSL/TLS, key management, threshold cryptography or asymmetric encryption.
    Course level (Undergrad, grad)
    Link
    https://itsec.rwth-aachen.de/teaching/seminar-ss2013-selected-topics-in-it-security-and-cryptography
    Instructor
    Prof. Dr. Ulrike Meyer
    Other information
  • RWTH Aachen
    Discipline (e.g., computer science)
    Course title (local, English)
    Selected Topics in IT-Security and Cryptography
    Description
    Focus area (e.g., threat analysis)
    IT-Security, Cryptography
    Abstract
    Comments
    In this seminar, we will discuss selected areas of research in IT-security and cryptography. Possible topics may include authentication, deniability, key agreement, symmetric and asymmetric encryption, security notions such as "semantic security", attack methods such as "chosen ciphertext attacks" or binary exploitation techniques such as "Return Oriented Programming".
    Course level (Undergrad, grad)
    Link
    https://itsec.rwth-aachen.de/teaching/seminar-ss2012-it-security-and-cryptography
    Instructor
    Prof. Dr. Ulrike Meyer
    Other information
  • Ruhr-Universität Bochum
    Discipline (e.g., computer science)
    IT Security/Information Technology
    Course title (local, English)
    Betriebssystemsicherheit / Operating System Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    http://www.ei.rub.de/studium/lehrveranstaltungen/685/
    Instructor
    Prof. Dr. Thorsten Holz
    Other information
  • Ruhr-Universität Bochum
    Discipline (e.g., computer science)
    Applied Computer Science, Electrical Engineering and Information Technology, IT Security/Information Technology
    Course title (local, English)
    Systemsicherheit I + II / Systems Security I + II
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    http://www.ei.rub.de/studium/lehrveranstaltungen/108/
    Instructor
    Prof. Dr. Thorsten Holz
    Other information
  • Ruhr-Universität Bochum
    Discipline (e.g., computer science)
    Electrical Engineering and Information Technology, IT Security/Information Technology
    Course title (local, English)
    Netzsicherheit I + II / Network Security I + II
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    http://nds.rub.de/teaching/lectures/107/
    Instructor
    Prof. Dr. Jörg Schwenk
    Other information
  • Ruhr-Universität Bochum
    Discipline (e.g., computer science)
    IT Security/Information Technology
    Course title (local, English)
    Praktische Aspekte der Cybersicherheit / Practical Aspects of Cyber Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    http://nds.rub.de/teaching/lectures/647/
    Instructor
    Prof. Dr. Jörg Schwenk
    Other information
  • Ruhr-Universität Bochum
    Discipline (e.g., computer science)
    Applied Computer Science
    Course title (local, English)
    XML- und Webservice-Sicherheit / XML and Webservice Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    http://nds.rub.de/teaching/lectures/10/
    Instructor
    Prof. Dr. Jörg Schwenk
    Other information
  • TU Chemnitz
    Discipline (e.g., computer science)
    Computer Science, Applied Computer Science
    Course title (local, English)
    Praktikum Theoretische Informatik und Informationssicherheit / Practical Course Theoretical Computer Science and Information Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://www.tu-chemnitz.de/informatik/ThIS/site/lv.php#
    Instructor
    Prof. Dr. Lefmann
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Secure, Trusted and Trustworthy Computing
    Description
    Focus area (e.g., threat analysis)
    Secure, Trustworthy and Trusted Computing
    Abstract
    Comments
    Content:Security notions and basics, Special aspects of runtime, attacks (buffer overflows, return-oriented programming), Hardware-based secure computing (one-time programs, token-based secure computing), Trusted Computing (trustworthy architectures, infrastructures and applications), Trusted Platform Module (TPM), Software-based secure computing
    Course level (Undergrad, grad)
    Link
    http://www.trust.informatik.tu-darmstadt.de/teaching/lectures/stc/
    Instructor
    Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Embedded System Security
    Description
    Focus area (e.g., threat analysis)
    Trusted Computing, Mobile Security, Hardware-based Cryptography
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    http://www.trust.informatik.tu-darmstadt.de/teaching/lectures/ess/
    Instructor
    Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Practical Lab on Smartphone Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    In this practical course, the students deal with different aspects of smartphone security. The project tasks specifically target the open-source Android OS and comprise the following areas: Design and implementation of selected software attacks (ethical hacking), Design and implemenation of secure user apps, Modifications of the Android Middleware and Kernel to build security architectures, System programming in general
    Course level (Undergrad, grad)
    Link
    http://www.trust.informatik.tu-darmstadt.de/teaching/labs/smartphone-security-ws-20132014/
    Instructor
    Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Physical Layer Security in Drahtlosen Systemen / Physical Layer Security in Wireless Systems
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://www.tucan.tu-darmstadt.de/scripts/mgrqcgi?APPNAME=CampusNet&PRGNAME=COURSEDETAILS&ARGUMENTS=-N000000000000001,-N000335,-N0,-N351294054869115,-N351294054821116,-N0,-N0,-N3,-A4150504E414D453D43616D7075734E6574265052474E414D453D414354494F4E26415247554D454E54533D2D412D35394A4861624B797353582D6C6765542E6A635438494146373559446D6E4E757848656B692E4A537367586565726B39453362514347396C537A78425669343064785533723567567269373763487749677835712E51564E5A385A5465635473356C69524E545072714C484F6573585350796E7A68577A6161502E4C373D3D
    Instructor
    Prof. Dr.-Ing. Matthias Hollick
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Praktikum Sichere Mobile Netze / Practical Course on Secure Mobile Networks
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://www.tucan.tu-darmstadt.de/scripts/mgrqcgi?APPNAME=CampusNet&PRGNAME=COURSEDETAILS&ARGUMENTS=-N000000000000001,-N000335,-N0,-N345672975878400,-N345672975837401,-N0,-N0,-N3,-A4150504E414D453D43616D7075734E6574265052474E414D453D414354494F4E26415247554D454E54533D2D413950323348726261774C62673775654A2E2D7754344C4F77327579596C596E4F6A4378485A62726B63477A356C7854314B4D4F68794E4359535570307A683835756B5230584E7567675A4F43746D747532345052476E79756A76386A7A327930593746527462473877486C6B5A7A773243716A544C676476662E707A4D393D3D
    Instructor
    Prof. Dr.-Ing. Matthias Hollick
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Ausgewählte Themen der Netzsicherheit / Selected topics of Network Security
    Description
    Focus area (e.g., threat analysis)
    Network security, communication networks, Internet technology, mobile and wireless communication networks
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://www.tucan.tu-darmstadt.de/scripts/mgrqcgi?APPNAME=CampusNet&PRGNAME=COURSEDETAILS&ARGUMENTS=-N000000000000001,-N000335,-N0,-N349763844114852,-N349763844150853,-N0,-N0,-N3,-A4150504E414D453D43616D7075734E6574265052474E414D453D414354494F4E26415247554D454E54533D2D417770617A566C6866774C6D642E64613278464471744B74655356526F2E54784A6B54636D51756C384E533648662D5269376653376439794A59756F7A64624874766E307263713964767638306443396E4D595A6C3469745864776F6E544C6B795278646E71766D6B69593341316A53307678376C482E6C442D376A5351693D3D
    Instructor
    Prof. Dr.-Ing. Matthias Hollick
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Mining Facebook
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Suppose you are a member of a social network like Facebook. Did you ever ask yourself what your account and your contacts tell others about you? How well the attributes you are not posting can be guessed? In this course, we'll address this question using machine learning and data mining techniques. Every student is assigned a research question that is to be solved in the course of the class. Regular joint meetings with short talks by the students serve as a platform for mutually exchanging ideas, experiences, and perhaps even code for improving the current models. We will begin with very simple approaches and increase their complexity by continuously incorporating more information.
    Course level (Undergrad, grad)
    Link
    https://www.p2p.tu-darmstadt.de/teaching/winter-term-201314/mining-facebook/
    Instructor
    Prof. Dr. Thorsten Strufe
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Praktikum Smartphone Sicherheit für Android Applikationen / Practical Course Smartphone Security for Android Applications
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://www.tucan.tu-darmstadt.de/scripts/mgrqcgi?APPNAME=CampusNet&PRGNAME=COURSEDETAILS&ARGUMENTS=-N000000000000001,-N000335,-N0,-N351074223622927,-N351074223614928,-N0,-N0,-N3,-A4150504E414D453D43616D7075734E6574265052474E414D453D414354494F4E26415247554D454E54533D2D4136715A45502E7461394C4D376A523748462E333450346E533755574E4E4A634E476B6A654176327431675136432E6C71336B68346C4F334157416E6562366E726E7A4B512D65784E4A382D6851545574493436794243656A335477586463535A6868735732464C536D775A634954395663454561415A4F50645A6875646E3D3D
    Instructor
    M.Sc. Steven Arzt; Prof. Dr. phil. Eric Bodden; M.Sc. Siegfried Rasthofer
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Implementierung in Forensik und Mediensicherheit / Implementation in IT-Forensics and Multimedia Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://www.tucan.tu-darmstadt.de/scripts/mgrqcgi?APPNAME=CampusNet&PRGNAME=COURSEDETAILS&ARGUMENTS=-N000000000000001,-N000334,-N0,-N343644655274840,-N343644655204841,-N0,-N0,-N0
    Instructor
    Dr. Martin Steinbach, Prof. Dr. Michael Waidner
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Security and Privacy in Information Technology
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Web Application Firewalls, Security Architectures of Browsers, Trustworthyness of Websites, Secure Logging in Cloud Computing, Secure Deduplication in Cloud Computing, IT-Forensic in Cloud Computing, Overview of IT security vulnerability databases, overlappings and differences, Classification and summary of recent OS software vulnerabilities, Security & Privacy for Smart In-House Applications, Secure Evidence for Privacy on Mobile Platforms, Transparency Enhancing Technologies, Genomics, Personalized Medicine and Privacy
    Course level (Undergrad, grad)
    Link
    http://www.sit.informatik.tu-darmstadt.de/de/security-in-information-technology/teaching/current-semester/ws-1314-security-and-privacy-in-information-technology-seminar/
    Instructor
    Prof. Dr. Michael Waidner
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Sicherheit von SDN / Security of SDN
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://www.tucan.tu-darmstadt.de/scripts/mgrqcgi?APPNAME=CampusNet&PRGNAME=COURSEDETAILS&ARGUMENTS=-N000000000000001,-N000335,-N0,-N351074348680946,-N351074348641947,-N0,-N0,-N3,-A4150504E414D453D43616D7075734E6574265052474E414D453D414354494F4E26415247554D454E54533D2D4139776153502E3035364C7A4B5377584B717577494157413279384363316C566C504E3641577A324143596F464A6E335350736558613232594348517066514D616749686D346C646263705A634F5552654F48624C37733248726134736768625A563569732D44776A2D656E58356E7358686D57775A7A764956664E35416E3D3D
    Instructor
    Prof. Dr. Michael Waidner
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Cryptography, Privacy and Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Survey on CA compromises, Man-in-the-Middle Attacks on Internet communication, Levels of Assurance, Electronic Identities in the Internet of Things, System for Cross-domain Identity Management (SCIM), A Survey on I2P, Performance of Tor, A Survey on JAP, Tor Simulators, Security Education (von Laien)
    Course level (Undergrad, grad)
    Link
    https://www.cdc.informatik.tu-darmstadt.de/de/studium-und-lehre/lehre/ws-13-14/seminar/cryptography-privacy-and-security/
    Instructor
    Prof. Johannes Buchmann
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Building and Breaking Comply Software Systems
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    To efficiently manage and operate increasingly complex and diverse computer systems, sophisticated software infrastructures (such as operating systems, middleware, etc.) are required. This infrastructural software provides developers with convenient abstractions that facilitate programming complex systems. The downside of this approach is that it does not decrease the difficulty of programming complex systems, but rather shifts its burden from application developers to developers of the infrastructural software. Moreover, if such infrastructural software fails, any applications that make use of its services most likely also fail, making it a critical "single point of failure" in most computer systems. This results in the dilemma that infrastructural software is usually both highly complex and highly critical, where the increasing complexity detrimentally impacts delivery of critical services.
    Course level (Undergrad, grad)
    Link
    http://www.deeds.informatik.tu-darmstadt.de/teaching/courses/ss2013/building-and-breaking-os/
    Instructor
    Prof. Neeraj Suri
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Implementing Secure & Reliable Software
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    A steadily increasing number of items that we daily interact with is being equipped with computers (mobile phones, vending machines, cars, ...), including considerable amounts of software due to flexibility and cost considerations. While erroneous or insecure software may be annoying in some applications (e.g. an MP3 player that randomly mixes up your preferences every 0xFFFF seconds), it may threaten human lives in others: According to experts, software-based computer systems account for more than 80% of all innovations in modern cars and software is being used to control critical infrastructures, such as nuclear power plants.
    Course level (Undergrad, grad)
    Link
    http://www.deeds.informatik.tu-darmstadt.de/teaching/courses/ws20132014/implementing-secure-reliable-software/
    Instructor
    Prof. Neeraj Suri
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Security and the Cloud - The Issues and Metrics
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    The Cloud is here and has arrived to redefine the on-demand availability of remotely-located computing Infrastructures, Platforms and Software to the user. Unfortunately, while many of the Cloud’s economic and effectiveness advantages are apparent, the migration of key sector applications to these new ecosystems (e.g. eHealth and eGoverment) has been limited due to a major show-stopper: the lack of quantifiable tradeoffs (features, performances, problems and economics) of security. Security practitioners agree that the co-residence among mutually untrusted customers is a major obstacle on the way to the wide Cloud's adoption. A variety of attacks have been demonstrated in the academic world managing to break the strong isolation that the Cloud Providers are assumed to guarantee to their customers. Security experts agree that metrics can help to quantitatively assess the security provided by a system in order to identify its vulnerabilities, and aid the process of providing a prioritized set of corrective actions based on technical and economic factors. The use of security metrics is increasingly gaining traction in the ICT sector, and despite the different criticisms about its feasibility, has already proven successful in different scenarios (e.g. critical infrastructure protection, Peer-to-Peer (P2P), etc.). Addressing the security of the Cloud taking into consideration its different aspects is the aim of this seminar.
    Course level (Undergrad, grad)
    Link
    http://www.deeds.informatik.tu-darmstadt.de/teaching/courses/ws20132014/security-and-the-cloud-the-issues-and-metrics/
    Instructor
    Prof. Neeraj Suri
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Course title (local, English)
    Smart Grid Informatics and Trustworthiness
    Description
    Focus area (e.g., threat analysis)
    Privacy of Smart Meterin Architectures, Wide Area Measurement Systems (WAMS) for SG, Efficient Analytics for "Big Energy Data", All-Wireless Control Loops for SG, Cybersecurity for SCADA Systems in SG
    Abstract
    Comments
    A modern energy system should support higher autonomy of utilities and features, such as demand-based dynamic pricing for its customers, building on high availability, high-reliability and high-performance service delivery. An illustrative example is the emerging Smart Grid that will utilize advances in Information and Communication (ICT) technologies in order to enable the smart/intelligent micro generation, transmission and distribution of energy. The Smart Grid integrates distributed renewable resources, secures the grid infrastructure to operational and malicious perturbations, supports the infrastructure for electric vehicles (EVs), and enables efficient demand-side energy management consumers to become potential producers. The Smart Grid also enables smart meters to actively communicate with smart appliances to establish the most cost-efficient operation cycles. Frontier Economics estimates the economical damage of one hour blackout in Germany by up to 1,3 billion Euro. Accordingly, a fundamental prerequisite for the success of the Smart Grid vision is its ability to provide on-demand, trustworthy and scalable connectivity. In addition, meeting hard real-time requirements as well as scalable and timely processing of the “big energy data” are the key open research topics towards a successful adoption of Smart Grid applications.
    Course level (Undergrad, grad)
    Link
    http://www.deeds.informatik.tu-darmstadt.de/teaching/courses/ws20122013/smart-grid-informatics-and-trustworthiness/
    Instructor
    Prof. Neeraj Suri
    Other information
  • TU Darmstadt
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Cloud Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Cloud Overview: Cloud Computing Security Issues & Cloud Computing Benefits; Low-Level: Virtual Machine Introspection, Virtual Machine Live Migration & Virtual Trusted Platform Module; High-Level: Trusted Virtual Domains, Data Deduplication & Security and Identity Management
    Course level (Undergrad, grad)
    Link
    http://www.seceng.informatik.tu-darmstadt.de/teaching/ss12/cs-ss12/
    Instructor
    Prof. Dr. Stefan Katzenbeisser, Dipl. Inform. Sebastian Biedermann
    Other information
  • Universität Freiburg
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Sicherheit in BPM / Security in BPM
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    http://www.telematik.uni-freiburg.de/lehre/lehrveranstaltungen/lehrveranstaltung?courseID=30&person=Accorsi_R
    Instructor
    Dr. Frank Böhr, Thomas Stocker
    Other information
  • Universität Freiburg
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    IT-Sicherheit / IT-Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://www.telematik.uni-freiburg.de/lehre/lehrveranstaltungen/lehrveranstaltung?term=20131&courseID=18
    Instructor
    Dr. Frank Böhr, Dr. Rafael Accorsi, Thomas Stocker
    Other information
  • Universität Freiburg
    Discipline (e.g., computer science)
    Economics
    Course title (local, English)
    Security and Risk Management
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://www.telematik.uni-freiburg.de/lehre/lehrveranstaltungen/lehrveranstaltung?term=20131&courseID=20
    Instructor
    Arnt Syting, Prof. Dr. Günter Müller
    Other information
  • Universität Freiburg
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Privacy and Security in der Informationsgesellschaft / Privacy and Security in the Information Society
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://www.telematik.uni-freiburg.de/lehre/lehrveranstaltungen/lehrveranstaltung?term=20132&courseID=28
    Instructor
    Dr. Frank Böhr, Julius Holderer
    Other information
  • Universität Freiburg
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Sicherheitstechnologien der Informationsgesellschaft / Resilient Business Process Management
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://www.telematik.uni-freiburg.de/lehre/lehrveranstaltungen/lehrveranstaltung?term=20141&courseID=32
    Instructor
    Dr. Rafael Accorsi, Julius Holderer, Richard Zahoransky
    Other information
  • Fernuniversität Hagen
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Parallelverarbeitung und IT-Sicherheit / Parallel processing and IT Security
    Description
    Focus area (e.g., threat analysis)
    Parallel Processing, Safety, Security
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://vu.fernuni-hagen.de/lvuweb/lvu/app/Kurs/1922/
    Instructor
    Prof. Dr. Jörg Keller
    Other information
  • Fernuniversität Hagen
    Discipline (e.g., computer science)
    Course title (local, English)
    Sicherheitsgerichtete Echtzeitsysteme / Safety-related real-time Systems
    Description
    Focus area (e.g., threat analysis)
    Safety-related real-time Systems
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    http://vu.fernuni-hagen.de/lvuweb/lvu/app/Kurs/21661/SS2014
    Instructor
    Prof. Dr. Wolfgang A. Halang
    Other information
  • Fernuniversität Hagen
    Discipline (e.g., computer science)
    Course title (local, English)
    IT-Sicherheit Konzepte, Standards, Verfahren und Anwendungen / IT Security Concepts, Standards, Proceedings and Applications
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://vu.fernuni-hagen.de/lvuweb/lvu/app/Kurs/78040/WS2013
    Instructor
    Other information
  • Universität Hamburg
    Discipline (e.g., computer science)
    Course title (local, English)
    Verteilte Systeme und Informationssicherheit / Distributed Systems and Information Security
    Description
    Focus area (e.g., threat analysis)
    Safety, Fault Tolerance, Cryptography, Steganography, Digital Rights Management
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://vsis-www.informatik.uni-hamburg.de/vsis/teaching/coursekvv/310
    Instructor
    Prof. Dr. Hannes Federrath, Dr. Winfried Lamersdorf
    Other information
  • TU Hamburg-Harburg
    Discipline (e.g., computer science)
    Course title (local, English)
    Introduction to Security
    Description
    Focus area (e.g., threat analysis)
    Security objectives, Security management, Malware - software security, Cryptography: fundamental mechanisms & services, Access control: IBAC, RBAC, code-based access control, Standards: ISO, ETSI, IETF, PKCS; Legal and regulatory frameworks, Case study: public key infrastructures
    Abstract
    Comments
    Differentiated view of security goals; fundamental mechanisms for computer security (access control, software security) and for communications security (cryptography)
    Course level (Undergrad, grad)
    Link
    https://intranet.tuhh.de/kvvz/vorlesung.php3?Lang=en&sg_s=&id=key2277
    Instructor
    Prof. Dr. Dieter Gollmann
    Other information
  • TU Hamburg-Harburg
    Discipline (e.g., computer science)
    Course title (local, English)
    IT Security Risk Management
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://www.sva.tuhh.de/joomla/index.php/courses/summer-term/it-security-risk-management-sose-2013
    Instructor
    Prof. Dr. Dieter Gollmann
    Other information
  • Universität Karlsruhe
    Discipline (e.g., computer science)
    Course title (local, English)
    Asymmetrische Verschlüsselungsverfahren / Asymmetric Ciphering Methods
    Description
    Focus area (e.g., threat analysis)
    Public Key Cryptography
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://crypto.iti.kit.edu/index.php?id=390
    Instructor
    Prof. Jörn Müller-Quade
    Other information
  • Universität Karlsruhe
    Discipline (e.g., computer science)
    Course title (local, English)
    Seitenkanalangriffe in der Kryptographie / Side Channel Attacks in Cryptography
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://crypto.iti.kit.edu/index.php?id=ska-ws10
    Instructor
    Prof. Jörn Müller-Quade, Daniel Kraschewski
    Other information
  • Universität Karlsruhe
    Discipline (e.g., computer science)
    Course title (local, English)
    Beweisbare Sicherheit in der Kryptographie / Verifiable Security in Cryptography
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://crypto.iti.kit.edu/index.php?id=bsk-ws10
    Instructor
    Jun.-Prof. Dennis Hofheinz
    Other information
  • Universität Karlsruhe
    Discipline (e.g., computer science)
    Course title (local, English)
    Symmetrische Verschlüsselungsverfahren / Symmetric Ciphering Methods
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    https://crypto.iti.kit.edu/index.php?id=svv-sose13
    Instructor
    Prof. Jörn Müller-Quade, Willi Geiselmann, Daniel Kraschewski
    Other information
  • Universität Magdeburg
    Discipline (e.g., computer science)
    Course title (local, English)
    Biometrics and Security
    Description
    Focus area (e.g., threat analysis)
    Mathematical, Statistical, and Technical Fundamentals & Sensor Technology, Security aspects, Error rates, detection reliability, Multimodal Biometrics and Multifactor Authentication: Fusion strategies, Examples & application of biometric techniques
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    http://omen.cs.uni-magdeburg.de/itiamsl/lehre/wintersemester-13-14/biometrics-and-security-ws13-14.html
    Instructor
    Prof. Dr.-Ing. Jana Dittmann, Prof. Dr.-Ing. Claus Vielhauer
    Other information
  • TU München
    Discipline (e.g., computer science)
    Course title (local, English)
    Sichere mobile Systeme / Secure mobile systems
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    http://www.sec.in.tum.de/sichere-mobile-systeme-ss14/
    Instructor
    Dipl.-Inf. Thomas Kittel, Prof. Dr. Claudia Eckert
    Other information
  • TU München
    Discipline (e.g., computer science)
    Course title (local, English)
    IT-Sicherheit / IT-Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    http://www.sec.in.tum.de/it-sicherheit-ws1314/
    Instructor
    Dipl.-Inf. Thomas Kittel, Prof. Dr. Claudia Eckert
    Other information
  • TU München
    Discipline (e.g., computer science)
    Course title (local, English)
    Practical Course Web Application Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    http://www.sec.in.tum.de/web-application-security-ws1314/
    Instructor
    Dipl.-Inf. Sebastian Vogl
    Other information
  • Universität Rostock
    Discipline (e.g., computer science)
    Course title (local, English)
    Rechnernetze und Datensicherheit / Computer Networks and Data Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    http://wwwiuk.informatik.uni-rostock.de/studium_lehre/aktuelles_semester_und_vorschau/?L=0
    Instructor
    Prof. Cap
    Other information
  • Universität Rostock
    Discipline (e.g., computer science)
    Course title (local, English)
    Datensicherheit / Data Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course level (Undergrad, grad)
    Link
    http://wwwiuk.informatik.uni-rostock.de/studium_lehre/aktuelles_semester_und_vorschau/?L=0
    Instructor
    Dr. Mundt
    Other information
  • Universität Saarbrücken
    Discipline (e.g., computer science)
    Course title (local, English)
    Language-Based Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    The former security mechanisms were typically defined and implemented at the level of operating systems. However, the increasing complexity of modern operating systems and security requirements makes the enforcement of security by exclusively reasoning at operating-system level very difficult. For instance, many attacks (think, e.g., of worms, malicious apps, cryptographic protocol vulnerabilities) work at application-level and, consequently, typically succeed in circumventing low-level security policies (e.g., file access permissions) by running on behalf of trusted users. An elegant and very effective approach for tackling this problem is to specify and verify security policies at application-level and, more precisely, on the programming languages used for developing the applications of interest. For this reason, this area is known as language-based security. This course will present methods and tools to certify security and privacy properties of programs, distributed systems, and mobile apps. We will focus, in particular, on static analysis techniques (e.g., type systems and abstract interpretation), which work by analyzing the program code and performing an abstraction of its semantic behavior. The advantage of these techniques is that they provide security guarantees at installation time, without causing any run-time overhead.
    Course level (Undergrad, grad)
    Link
    http://www.sps.cs.uni-saarland.de/teaching/13WS/lbs/index.html
    Instructor
    Prof. Dr. Matteo Maffei
    Other information
  • Universität Saarbrücken
    Discipline (e.g., computer science)
    Course title (local, English)
    Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    The course comprises three practical projects and six theoretical exercise sheets. You can work in teams (which have to be fixed throughout the entire course) of up to two people. For the practical projects the first team that manages to solve a subtask and provides proof of that by e-mail receives additional bonus points for that subtask. Each team can get at most three such extra points. The status of each subtask will be displayed by an internal webpage. The projects are going to be handed out at the end of the class and posted on the course web page roughly every 3 weeks (the precise dates are listed below). Sample solutions will be posted on an internal web page and discussed in the tutorials. The theoretical assignments are going to be handed out every other week. The teams from the practical projects are allowed to work together, but every student has to submit an own solution of the exercise sheet.
    Course level (Undergrad, grad)
    Link
    http://csl.cs.uni-saarland.de/teaching/security/2012-13/
    Instructor
    Prof. Dr. Michael Backes, Juniorprof. Dr.-Ing. Christian Hammer, Dr. Matteo Maffei
    Other information
  • Universität Saarbrücken
    Discipline (e.g., computer science)
    Course title (local, English)
    Hot Topics in Security & Privacy
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    The seminar addresses current research on information security and cryptography, both from a theoretical and a practical perspective.
    Course level (Undergrad, grad)
    Link
    http://www.infsec.cs.uni-saarland.de/teaching/12SS/Seminar/
    Instructor
    Prof. Dr. Michael Backes, Juniorprof. Dr.-Ing. Christian Hammer, Dr. Matteo Maffei
    Other information
  • Universität Saarbrücken
    Discipline (e.g., computer science)
    Course title (local, English)
    Privacy Enhancing Technologies (PETs)
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Privacy is a fundamental human right and privacy enhancing technologies (PETs) help to support this right. In light of worldwide electronic data protection laws, PETs play a fundamental role in the design and development of information systems. This advanced course focuses on the theoretical as well as practical aspects of PETs. We aim to discuss some important and practically relevant privacy scenarios and foundational technologies such as Differential Privacy, Zero knowledge proofs, Trusted Computing, Online Advertising, Anonymity, and Censorship Resistance.
    Course level (Undergrad, grad)
    Link
    http://crypsys.mmci.uni-saarland.de/courses/pets-advcourse13/
    Instructor
    Dr. Matteo Mattei, Dr. Aniket Kate
    Other information
  • LMU, TU, Uni Augsburg
    Discipline (e.g., computer science)
    computer science
    Course title (local, English)
    IT-Security
    Description
    Focus area (e.g., threat analysis)
    Secure Software Engineering
    Abstract
    Comments
    This block-course provides an overview of IT-Security and focuses on secure software engineering.
    Course level (Undergrad, grad)
    master-level
    Link
    https://swt.informatik.uni-augsburg.de/elite/se/
    Instructor
    Prof. Dr. Martin Wirsing
    Other information
  • Universität des Saarlandes
    Discipline (e.g., computer science)
    Cybersecurity
    Course title (local, English)
    Grundlagen der Cybersicherheit / Fundamentals of Cybersecurity
    Description
    Focus area (e.g., threat analysis)
    Fundamentals of Cryptography, Protection of Privacy, Systems Security, Usable Security, Network Security, Recognition of Cyber Attacks; Introduction to Responsibility, Security of critical Infrastructures and early recognition of risks
    Abstract
    Students will learn the fundamentals of Crytography, Systems Security, Network Security and protection against cyber attacks. They can choose protective goals for selected problems and are familiar with common attacking techniques.
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://cybersicherheit.uni-saarland.de/modules/grundlagen_cybersicherheit.php
    Instructor
    Prof. Dr. Michael Backes
    Other information
  • Universita` degli Studi di Milano
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Computer and network security (Sicurezza dei Sistemi e delle Reti Informatiche)
    Description
    Focus area (e.g., threat analysis)
    Computer and Network Security
    Abstract
    Comments
    The course provides a solid preparation and understanding of the cutting-edge technologies, techniques, and methods in the computer science area, with special attention to all aspects related to security and privacy, preparing students to design and implement secure services, application, and network infrastructures.
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.di.unimi.it/ecm/home/didattica/international-studies/activity
    Instructor
    Other information
  • Universita` degli Studi di Milano
    Discipline (e.g., computer science)
    Computer Science - Security
    Course title (local, English)
    Information Security
    Description
    Focus area (e.g., threat analysis)
    Computer and information security
    Abstract
    Comments
    The course provides the advanced knowledge and skills enabling graduates to design, develop, verify and manage complex information systems with particular attention to the problems of ensuring protection to data, systems, networks, and infrastructures. The graduate will acquire advance scientific, technological, and methodological competences, as well as operational skills.
    Course level (Undergrad, grad)
    Graduate (master)
    Link
    http://www.di.unimi.it/ecm/home/didattica/international-studies/activity
    Instructor
    Other information
  • University of Modena and Reggio Emilia
    Discipline (e.g., computer science)
    Computer science, Computer engineering, Law
    Course title (local, English)
    Master on "Information security and Legal disciplines"
    Description
    Focus area (e.g., threat analysis)
    Risk management, Information security, ISO27000 standard, legal aspects related to information security
    Abstract
    Comments
    The course focuses on fundamental strategies to manage the entire security process from the technical,legal and management point of view
    Course level (Undergrad, grad)
    Graduate
    Link
    http://cris.unimore.it/master/sicurezza
    Instructor
    Responsable: Prof. Michele Colajanni
    Other information
  • University of Modena and Reggio Emilia
    Discipline (e.g., computer science)
    Computer science, Computer engineering
    Course title (local, English)
    Master on "Digital forensics"
    Description
    Focus area (e.g., threat analysis)
    Technical and legal aspects related to digital forensics
    Abstract
    Comments
    The course focuses on fundamental rules, tools, and techniques to manage the entire process related to digital forensics
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.cris.unimore.it/stelmilit/corsoDF
    Instructor
    Responsable: Prof. Michele Colajanni
    Other information
  • University of Modena and Reggio Emilia
    Discipline (e.g., computer science)
    Computer science, Computer engineering
    Course title (local, English)
    Master on "Cyberdefence"
    Description
    Focus area (e.g., threat analysis)
    Techniques, achitectures and tools related to the defence of information security
    Abstract
    Comments
    The course focuses on methodologies and fundamental tools, and techniques to protect digital information and services
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.cris.unimore.it/stelmilit/corsoCD
    Instructor
    Responsable: Prof. Michele Colajanni
    Other information
  • Politecnico di Milano
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Security Specialist
    Description
    Focus area (e.g., threat analysis)
    Security management and consulting
    Abstract
    Comments
    Jointly organized by Politecnico di Milano and Cefriel, this 2-year course offers specific professional training in the field of enterprise security management, both for operators within companies and organization and for consultants. The course is designed to complement on-the-job training as full time employees of select organizations. Instructors are both academics and industry professionals. The course encompasses physical security, business protection, worker safety, information security and risk management.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.deib.polimi.it/didattica/master/master.php?idlang=ita
    Instructor
    Prof. Stefano Zanero (director)
    Other information
  • Universita` degli Studi di Milano
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Computer and network security (Sicurezza dei Sistemi e delle Reti Informatiche)
    Description
    Focus area (e.g., threat analysis)
    Computer Security
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.di.unimi.it/ecm/home/didattica/international-studies/activity
    Instructor
    Other information
  • Universita` degli Studi di Milano
    Discipline (e.g., computer science)
    Computer Science - Security
    Course title (local, English)
    Information Security
    Description
    Focus area (e.g., threat analysis)
    Computer and information security
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate (master)
    Link
    http://www.di.unimi.it/ecm/home/didattica/international-studies/activity
    Instructor
    Other information
  • UCBM Univerity CAMPUS BioMedico di Roma
    Discipline (e.g., computer science)
    Economic, Law, Risk Management, Cybersecurity, Physical Security, Technologies, Complex Systemn Design
    Course title (local, English)
    Master in Homelaand Security
    Description
    Focus area (e.g., threat analysis)
    All-Hazard
    Abstract
    Comments
    The course provide an holistic approch to the security from the analysis of the contest, to the qualification and quantification of the risk, to the design of procedure and systems for the security with a focus on physical, cyber and organizational security. It analyse the doifferent technologies for the security and their applicatiohn to several frameworks including the Critical Infrastructures
    Course level (Undergrad, grad)
    Post-graduated
    Link
    www.MasterHomelnadSecurity.eu
    Instructor
    Prof. Roberto Setola
    Other information
  • University of Catania
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Internet Security
    Description
    Focus area (e.g., threat analysis)
    Foundations of security; hands-on defensive and offensive tools
    Abstract
    Comments
    Course level (Undergrad, grad)
    Undergraduate
    Link
    Instructor
    Prof. Giampaolo Bella
    Other information
  • University
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Computer Security
    Description
    Focus area (e.g., threat analysis)
    Tools for security protocol analsis; individual hands-on coursework on recent hot topics in the area of computer security
    Abstract
    Comments
    Course level (Undergrad, grad)
    Graduate
    Link
    Instructor
    Prof. Giampaolo Bella
    Other information
  • University of Padua
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Computer and Network Security
    Description
    Focus area (e.g., threat analysis)
    Advances Security Issues
    Abstract
    Comments
    Acquire knowledge about primary current security issues
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.math.unipd.it/~conti/teaching/CNS1314/index.html
    Instructor
    Prof. Mauro Conti
    Other information
  • Sapienza - Università di Roma
    Discipline (e.g., computer science)
    Computer Science
    Course title (local, English)
    Master on "Information Security and Governance"
    Description
    Focus area (e.g., threat analysis)
    - Master in System and Network Security.
    - Master in IT Security and Management.
    - Master in Governance and Audit of Information Systems.
    Abstract
    Comments
    - Master in System and Network Security: this program mainly emphasizes on the technical skill-set required for system and network security. Along with the technological know-how, it also involves the managerial and legal aspects related to the security process. Some of the standards and best practices covered by the program are skills for Course Completion CISCO CCNA Discovery/Exploration and CCE (Clavister Certified Engineer) Certification. - Master in IT Security and Management: security is a process and needs continuous evolution in accordance with evolving threats and there is a strong need to manage it effectively. The main emphasis of this course is to enhance/introduce the management practices involved in security process. The program is especially intended for management personnel of an organization. The practices and standards taught under this program help in effectively coordinating and managing the security process. Some of the standards and best practices covered by the program are ISO 27001:2013 standard. - Master in Governance and Audit of Information Systems: this program emphasizes on two key competencies needed today to manage and control the information systems within a complex organization: IT Governance and IT Audit methodologies, standard and practices. The program is especially intended for training of management personnel of an organization on topics as Project Management, Risk Management, strategic alignment, legal and compliance, performance measurement and so on. Some of the standards and best practices covered by the program are CObIT and ISIPM Base Certification.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://mastersicurezza.uniroma1.it
    Instructor
    Other information
  • National University of Public Service
    Discipline (e.g., computer science)
    Computer Science, Information Security
    Course title (local, English)
    Elektronikus Információbiztonsági Vezető, CIO
    Description
    Focus area (e.g., threat analysis)
    Information Governance. Information Security, Management, Risk management, Ethical hacking.
    Abstract
    Comments
    Information Governance will introduce you to the challenges and best practice methods that determine the flow of information within and between organisations and their users. You will study the core concepts, theories and models of information governance and apply your learning in a variety of organizational contexts, both in the public and private sectors.
    Course level (Undergrad, grad)
    Master
    Link
    http://ktk.uni-nke.hu/oktatasi-egysegek/e-kozszolgalati-fejlesztesi-intezet/munkatarsak
    Instructor
    Multiple instructors: Ferenc Leitold, Zoltán Som
    Other information
  • University of Oslo
    Discipline (e.g., computer science)
    Course title (local, English)
    Security in distributed systems
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    The course tackles the concept of security and gives a short introduction into cryptography. The threats to distributed computer systems are mentioned, as are the basic mechanisms that are used to make computer systems secure, plus the more complex mechanisms. There will also be some mention of making databases secure, as these are exposed to some extra threats, above and beyond the usual.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.uio.no/studier/emner/matnat/ifi/UNIK4250/index-eng.html#prerequisites
    Instructor
    Other information
  • University of Oslo
    Discipline (e.g., computer science)
    Course title (local, English)
    Security in operation systems and software
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    The seminar introduces the concept of security in operating system and software, and gives a brief overview of applications of cryptography. Main subjects are models and implementation of authentication, identity and access control mechanisms, theory of exploits and malicious software, and techniques for mitigating these threats.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.uio.no/studier/emner/matnat/ifi/UNIK4270/index-eng.html
    Instructor
    Other information
  • University of Oslo
    Discipline (e.g., computer science)
    Course title (local, English)
    Information Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    This course gives a broad overview of the main areas of information security. In particular it focuses on: The concepts of information security, such as CIA properties (Confidentiality, Integrity & Availability) , identity, authenticity, authorization, Information security risk management and disaster recovery, Security models and access control, Cryptography, Key Management, User Authentication, Identity Management, Communication Security, Network perimeter defense, Computer Security, Trusted Systems, Computer Forensics
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://www.uio.no/studier/emner/matnat/ifi/INF3510/index-eng.html
    Instructor
    Other information
  • University of Oslo
    Discipline (e.g., computer science)
    Course title (local, English)
    Intrusion detection and firewalls
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Course Contents: Threats to security from the network, Security strategies and policies, Firewall architecture, Intrusion-detection systems (snort), Pattern matching and artificial intelligence versus computer immunology, Reading and analyzing log files and audits (Perimeter logs), IP-spoofing and sequence guessing, Malicious ICMP activity and router/switch poisoning, Use of TCPdump for protocol analysis, Denial of Service attacks, structure, detecting and preventing, IPSec filters, Windows filtering, IP filters in Linux and BSD, Anomaly detection: research directions, IETF XML standard for exchange of intrusion information
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.uio.no/studier/emner/matnat/ifi/INF5004NSA/
    Instructor
    Other information
  • University of Oslo
    Discipline (e.g., computer science)
    Course title (local, English)
    Unassailable IT-systems
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    The techniques presented have for several years been used in design of real time systems and other parallel programs. We concentrate on systems of interacting actors and model such systems in UML 2.0 (Unified Modeling Language). Sequence Diagrams of UML are the core notation for intuitive and formal description of interaction patterns. Topics of the course include: theoretic foundation for UML, refinement concepts in a UML context, modularity through contract-oriented specification, modular security analysis.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://www.uio.no/studier/emner/matnat/ifi/INF5150/index-eng.html
    Instructor
    Other information
  • NTNU - Trondheim
    Discipline (e.g., computer science)
    Course title (local, English)
    Wireless Network Security
    Description
    Focus area (e.g., threat analysis)
    IKT, Safety and Reliability, Technological subjects, Telematics
    Abstract
    Comments
    Functions, protocols and configurations for realizing authentication, key distribution, integrity, confidentiality and anonymity in wireless access networks for mobile users. The course presents security techniques employed in existing systems, such as WPAN, WLAN, UMTS, IMS. Proposed solutions for new network technology, such as various types of ad-hoc networks. Digital forensics in wireless systems.
    Course level (Undergrad, grad)
    Second degree level
    Link
    http://www.ntnu.edu/studies/courses/TTM4137/2014#tab=omEmnet
    Instructor
    Svein Yngvar Willassen, Stig Frode Mjølsnes, Thomas Jelle
    Other information
  • NTNU - Trondheim
    Discipline (e.g., computer science)
    Course title (local, English)
    ICT-Security Evaluation
    Description
    Focus area (e.g., threat analysis)
    Communication and Information Science, Security Technique, Telecommunication, Telematics
    Abstract
    Comments
    The course is about principles and methods for development of criteria for ICT security evaluation and how these are used to evaluate security. Example topics are: protection profiles (PPs),security targets (STs), security functionality, functionality classes, assurance correctness, assurance effectiveness, evaluation assurance levels (EALs), certification, accreditation, standardisation of evaluation criteria, national scheme for evaluation and certification.
    Course level (Undergrad, grad)
    Doctoral degree level
    Link
    http://www.ntnu.edu/studies/courses/TM8104/2014#tab=omEmnet
    Instructor
    Other information
  • NTNU - Trondheim
    Discipline (e.g., computer science)
    Course title (local, English)
    Information Security
    Description
    Focus area (e.g., threat analysis)
    IKT, Safety and Reliability, Technological subjects, Telematics
    Abstract
    Comments
    Cryptography; symmetric and public-key, cryptographic protocols, key distribution, authentication, digital signature structures. Network security; access control, services and mechanisms for authentication, network security protocols, application layer security and secure network management. System security; intrusion detection, malicious software, firewalls, identification.
    Course level (Undergrad, grad)
    Second degree level
    Link
    http://www.ntnu.edu/studies/courses/TTM4135/2014#tab=omEmnet
    Instructor
    Colin Alexander Boyd
    Other information
  • NTNU - Trondheim
    Discipline (e.g., computer science)
    Course title (local, English)
    Software Security
    Description
    Focus area (e.g., threat analysis)
    Computer and Information Science, Communication and Information Science
    Abstract
    Comments
    The course will go through all the phases in the secure software development lifecycle (requirements, design, implementation and testing) focusing on how to incorporate security in each phase and what techniques to use. The main focus is on web-based applications.
    Course level (Undergrad, grad)
    Second degree level
    Link
    http://www.ntnu.edu/studies/courses/TDT4237/2014#tab=omEmnet
    Instructor
    Lillian Røstad
    Other information
  • NTNU - Trondheim
    Discipline (e.g., computer science)
    Course title (local, English)
    Cryptographic Protocols and Their Applications
    Description
    Focus area (e.g., threat analysis)
    Algorithm Construction, Mathematics/Communication Theory, Telematics
    Abstract
    Comments
    The course will study mechanisms and properties of cryptographic protocols that establish and maintain security properties of information exchange in two-party and multiparty settings within ambient open communications networks. More complex requirements beyond basic communication secrecy and authenticity are identified in e-commerce, banking services, health informatics, digital payments and credentials, auctions, voting. The course will give models and classes of attack; computational classes, parameter and key establishment protocols; authentication protocols; commitment protocols; zero-knowledge techniques; consensus/multiparty computations; privacy-preserving protocols, and formal specification and reasoning.
    Course level (Undergrad, grad)
    Doctoral degree level
    Link
    http://www.ntnu.edu/studies/courses/TM8107/2014#tab=omEmnet
    Instructor
    Other information
  • NTNU - Trondheim
    Discipline (e.g., computer science)
    Course title (local, English)
    Cryptography
    Description
    Focus area (e.g., threat analysis)
    Mathematics, Technological subjects
    Abstract
    Comments
    A brief overview of classical ciphers. Algorithms for primality testing. Basic algorithms for computation of discrete logarithms in cyclic groups. Index-calculus algorithms for computation of discrete logarithms in finite fields. Elliptic curves over finite fields. Algorithms for factorization of integers. Diffie-Hellman, public-key encryption (ElGamal, RSA), digital signatures (RSA, Schnorr).
    Course level (Undergrad, grad)
    Second degree level
    Link
    http://www.ntnu.edu/studies/courses/TMA4160/2014#tab=omEmnet
    Instructor
    Kristian Gjøsteen
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Introduction to Information Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Background, motivation and need for information security, legal and ethical issues, risk management in information security, planning for security, firewalls and VPN, intrusion detection systems, authentication, cryptography, physical security
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://english.hig.no/content/view/full/31033/language/eng-US
    Instructor
    Nils Kalstad Svendsen
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Introduction to Information Security Risk Management
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Project work, Information security and risk, Risk evaluation, analysis and assessment, Standards and guidelines, Information security management systems
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://english.hig.no/content/view/full/31046/language/eng-US
    Instructor
    Nils Kalstad Svendsen
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Data Communication and Network Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Basics of computer networks, Application layer (HTTP, SMTP, DNS), Transport layer (TCP, UDP), Network layer (IP, ICMP, routing), IPv4 Network addressing, Data link and physical layer (Ethernet, MAC, ARP), Basics of network security, including applied cryptography, Authentication in networks (Kerberos), Firewalls, Network Intrusion Detection Systems, Tunneling of protocols (PPP over SSH)
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://english.hig.no/content/view/full/31008/language/eng-US
    Instructor
    Thomas Kemmerich
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Introduction to security Plannin and Incident Handling
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Introduction and Overview of Contingency Planning, Planning for Organizational Readiness: Risk management, limits to risk management, incident reporting systems, business impact analysis, Incident Response: Preparation, organization, prevention, detection, notification, reaction, recovery, maintenance, operational problems for CSIRTS and organizational models for CSIRTs, Disaster Recovery: Preparation, implementation, operation and maintenance, Business Continuity: Preparation, implementation, operations and Maintenance, Crisis Management and Human Factors
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://english.hig.no/content/view/full/31063/language/eng-US
    Instructor
    Marie Gaup Moe
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Software Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Software Assurance, Secure Software Development Lifecycle, Coding Practices and Rules, Source Code Analysis, Security Testing, Attack Patterns
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://english.hig.no/content/view/full/31096/language/eng-US
    Instructor
    Hanno Langweg
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Ethical Hacking and Penetration Testing
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Ethical hacking and penetration testing - definitions, penetration testing methodologies, hands-on penetration testing
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://english.hig.no/content/view/full/31086/language/eng-US
    Instructor
    Lasse Øverlier
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Introduction to Cryoptology
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Classical cryptography - history of cryptography and classical cipher systems, Symmetric ciphers - introduction to stream and block ciphers, Asymmetric ciphers - definition and fundamentals, Hash functions and digital signatures.
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://english.hig.no/content/view/full/31104/language/eng-US
    Instructor
    Professor Slobodan Petrovic
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Digital Forensics
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Digital investigations and evidence, Chain of custody and forensic soundness, Timeline analysis, Live system forensics, File system forensics, Forensic reconstructions, Internet and network forensics, Cybercrime law, Advanced topics if time permits
    Course level (Undergrad, grad)
    Undergraduate
    Link
    http://english.hig.no/content/view/full/31065/language/eng-US
    Instructor
    Associate Professor Andrè Årnes
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Cryptology I
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Classical cryptography - history of cryptography, fundamentals of information theory and its application in cryptography, Symmetric ciphers - stream and block ciphers, Asymmetric ciphers - fundamentals, RSA, Hash functions and digital signatures.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://english.hig.no/content/view/full/31080/language/eng-US
    Instructor
    Professor Slobodan Petrovic
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Applied Information Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Core concepts in information security and privacy, Security design principles, Security policies, Security architecture: Operating systems and applications, Access control principles, Identification and authentication, Vulnerabilities and attack mechanisms, Attack methods and malicious software, Database security
    Course level (Undergrad, grad)
    Graduate
    Link
    http://english.hig.no/content/view/full/31083/language/eng-US
    Instructor
    Professor Stephen Wolthusen
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Legal Aspects of Information Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: General requirement according to privacy and information security, especially e-government.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://english.hig.no/content/view/full/31094/language/eng-US
    Instructor
    Lise Nilsen
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Socio-technical Security Riks Modeling and Analysis 1
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Introduction to Systems Thinking and Socio-technical modeling and analysis, Technology Adoption and Security, Overview of the Information security landscape, How to conduct a socio-technical security and risk assessment of a organization or business, Strategic, Tactical and Operational areas in Information security organization and risk Management.
    Course level (Undergrad, grad)
    Graduate
    Link
    http://english.hig.no/content/view/full/31032/language/eng-US
    Instructor
    Professor Stewart Kowalski
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Foundations of Information Security
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Identification and authentication mechanisms, Access control models and formalisms, Decidability results and limitations of access controls and security models, Security models, including the Bell-LaPadula, role-based access control, and Chinese Wall models, Information theoretic models of information flow and covert channels, Developmental assurance and evaluation criteria
    Course level (Undergrad, grad)
    Graduate
    Link
    http://english.hig.no/content/view/full/31082/language/eng-US
    Instructor
    Professor Stephen Wolthusen
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Cryptology II
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Stream ciphers, Block ciphers, Public key ciphers with applications
    Course level (Undergrad, grad)
    Graduate
    Link
    http://english.hig.no/content/view/full/31081/language/eng-US
    Instructor
    Professor Slobodan Petrovic
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Software Security Trends
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: Goals and technical trends of software security, system design, software vulnerabilities, code inspections, software security testing
    Course level (Undergrad, grad)
    Graduate
    Link
    http://english.hig.no/content/view/full/31179/language/eng-US
    Instructor
    Hanno Langweg
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Security as Continuous Improvement
    Description
    Focus area (e.g., threat analysis)
    Abstract
    Comments
    Topics: The quality improvement paradox, Security and quality improvement processes, Improving the Performance of Computer Security Incident Response Teams (CSIRTs), Incident reporting systems and Learning from incidents, Security risks in the transition to Integrated Operations, Security-dependent safety. Continuous improvement of security in Critical Infrastructure
    Course level (Undergrad, grad)
    Graduate
    Link
    http://english.hig.no/content/view/full/31098/language/eng-US
    Instructor
    Professor Jose Gonzalez
    Other information
  • Gjøvik University College (GUC)
    Discipline (e.g., computer science)
    Information Security
    Course title (local, English)
    Security Management Dynamics
    Description
    Focus area (e.g., threat analysis)
    Abstract