Master track in cyber security

Information Security Technology

From unauthorized access to malicious manipulation, the threats that exist when storing or sending electronic data are on the increase. Data security and system security are of ever greater importance. The IST master track provides the essential tools for digital security.

 

In short…


We offer an array of courses which address digital security from different angles, with the goal of:

  • learning security fundamentals 
  • understanding present systems 
  • analyzing security applications (incl. breaking them) 
  • designing robust security 
  • understanding the societal context.
  

In the IST specialisation track students take five core courses (on cryptology, cyberattacks, data protection, network security and software security), a seminar, and a number of electives.

Master of Science in Information Security Technology (IST)

A Master of Science in Information Security Technology (IST) is an academic expert in the area of information security in general, and in computer & network security in particular. Information security technology protects data that are stored, transmitted, accessed, or modified against all kinds of threats. Threats can vary from unauthorized access to malicious manipulations. Information security technology is essential for secure communication and data protection in many situations.

A Master of Science in Information Security Technology can become involved in cryptographic primitives, security protocols, data storage, communication, or information security management. Additionally, he or she can act as internal or external consultant, regarding the security of information systems and networks, or regarding the security policy of an organization. A Master of Science in Information Security Technology can enter a job in the following institutions: 

  •  
  • research laboratories and academic institutes (both for theoretical and applied work); 
  • applied R&D in industry; 
  • the financial world; 
  • governmental agencies; 
  • consultancy agencies
 

 Learning Outcomes

The goal of the program is to transform Bachelors in Computer Science and Mathematics into academic experts in the area of information security in general and computer & network security in particular. Alumni will be able to function as researcher or as system developer in industry, consulting, academia, or the government sector. They will be well aware of the state of the art in information security technology at the master level. They will be able to analyze complex security situations and to reduce them to solvable problems.

A graduate from the master program…

  • is qualified to masters level in the domain of science, engineering and technology;
  • is competent in the relevant domain-specific discipline, namely computer science and engineering;
  • is capable of acquiring knowledge independently;
  • approaches computer science problems in a thorough and scientifically founded manner;
  • is capable of critical thinking, can reason logically and form opinions;
  • has design skills, presentation skills, and communication skills;
  • has insight into the role of computer science in industry, society, and science;
  • and, in addition to a recognizable domain-specific profile, possesses a sufficiently broad basis to be able to work in an interdisciplinary and multidisciplinary context

In addition to these general learning outcomes, a graduate from IST…

  • has a broad view of information security; 
  • is able to evaluate existing and newly designed security systems; 
  • is able to list relevant security requirements in an application and to select the right techniques to address these issues; 
  • is an expert in at least one subarea of information security; 
  • can contribute to discussions about the role of information security in our society; 
  • has experience in the process of specifying, designing, and realization of an application in which security plays an important role.
For contact informaton see Team.

Master track in cyber security Information Security Technology