Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Slides:



Advertisements
Similar presentations
Master track Computer security: studying at the Kerckhoffs Institute Lejla Batina Digital Security Group Institute for Computing and Information Sciences.
Advertisements

1 Master Information Science Theo van der Weide Institute for Computing and Information Sciences Radboud Universiteit Nijmegen.
1 Hardware Security Organisational stuff Lejla Batina & Erik Poll Digital Security Radboud University Nijmegen.
MSc Innovation Management Ed Nijssen / Hans Berends.
Chapter 1  Introduction 1 Introduction Chapter 1  Introduction 2 The Cast of Characters  Alice and Bob are the good guys  Trudy is the bad guy 
Chapter 1  Introduction 1 Chapter 1: Introduction.
Maersk Liner Graduate Programme
Information on internship Yolanda Hübner Study advisor bachelor.
Photo: Summer Oulu University of Applied Sciences School of Engineering The region of Oulu is famous for its technology expertise The education,
Careers in Mathematics 24 March Careers In Mathematics What can you do with a B.Sc. degree in Mathematics ? Where do you want to work ?
Masters in Information Science and Technology (IST) Thesis and Non-Thesis Option (30 Credits)
Master of Science in Innovation Management Professor Ed Nijssen Program Director.
Occupational Career Project By Jimmy Evans. I want to pursue a career in computer engineering. Specifically something in computer software. I think a.
“Bachelier en Droit”- Bachelor in Law at the University of Namur Robert Queck « Maître de conférences » at the Law Faculty Deputy Director CRID LEFIS General.
EIT ICT Labs  ICT innovation is driving transformations in society to improve quality of life  Rapid disruptive ICT innovation is a key driver in the.
(Under)graduate teaching in the field of Law and ICT General comments in the light of the Bachelor in Law organized by the University of Namur Robert Queck.
First... Background Topics Schedule Self Study Me Willem de Bruijn PhD candidate at Vrije Universiteit.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
INFSO-SSA International Collaboration to Extend and Advance Grid Education ICEAGE Forum Meeting at EGEE Conference, Geneva Malcolm Atkinson & David.
Katarina Krapež, MA researcher, Faculty of Management legal advisor, Technology Agency of Slovenia Faculty of Management Koper Undergraduate Courses: IT.
Structure of Study Programmes
Discrete Mathematics. - Coding Theory and Cryptology - Cryptographic Implementations eindhoven.cr.yp.to - Discrete Algebra and Geometry.
Software Science Jan Tretmans. Master Programme in Computing Science 2 years (120 ec), full time four specializations software science MFoCS data sciencecyber.
Project CC4U2 Setting an Efficient Partnership for Allowing International Student Exchanges: a Difficult Issue Philippe Lahire University of Nice Sophia.
Computer Science in a Nutshell Eugene Fink
Master Track in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
Master Programmes Computing Science & Information Sciences Perry Groot March 2015.
Structure of Study Programmes Bachelor of Computer Science Bachelor of Information Technology Master of Computer Science Master of Information Technology.
Web Service Development Within Different Study Years Maja Pušnik, Boštjan Šumak Institute of Informatics, FERI Maribor.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)
MFoCS Mathematical Foundations of Computer Science Tom Heskes and Jasper Derikx.
LEFIS General Assembly Firence 1 Information Technology Law Masters Programme Prof. Dr. Rimantas Petrauskas Mykolas Romeris University (Lithuania)
Education. Education at TU/e Bachelor program (undergraduate) Master’s program (2 years) Professional doctorate engineering (PDEng, 2 years) Doctorate.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Research Master Literary Studies November 2015 GRADUATE SCHOOL OF HUMANITIES.
Minor- or Premaster programme for Computing Science or Information Sciences Perry Groot November 2015.
Computing Science & Information Sciences Erik Poll November 2015.
Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science/
My career choices Game designer, Software designer, Engineer.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Software Science Frits Vaandrager. Master Programme in Computing Science 2 years (120 ec), full time four specializations software science MFoCS data.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
HAN Automotive European Master in Automotive Engineering EMAE HAN Automotive HAN-University Arnhem, The Netherlands.
Information Bachelor 2/3 How to design your BA 2/3 programme.
University education Center affiliated to the University of Barcelona.
Erik Poll1. Hi-tech bank robbery Erik Poll Digital Security Radboud University Nijmegen.
Computing Science & Information Sciences Erik Poll March 2016.
Master Specialisation in Cyber security
Computing Science & Information Science Master programmes in
Master Specialisation in Cyber security
BEng(CompSc) Curriculum Structure & Highlights
Information Bachelor 2/3
Master Information Sciences
Master Information Sciences
Computing Science & Information Science Master programmes in Erik Poll
OCR Cambridge Technical Introductory Diploma in IT Bridging Work
Cambridge National Certificate in Information Technologies
Cryptography and Computer Security for Undergraduates
School of Life Science, Engineering & Design
Master Introduction Computer Science Joint UvA-VU Degree Andrew S
Computing Science Peter Achten.
University of Nice Sophia Antipolis
Introduction Security Intro 1.
Computer and Systems Engineering
Computing Science & Information Sciences Master programmes in
Study and internships abroad: a valuable experience!
Computing Science Information Sciences Master programmes Erik Poll
Presentation transcript:

Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Why study computer security? Interesting and hot topic, with excellent job opportunities Real impact in everyday life & society Opportunities for multidisciplinary research And why study it here in Nijmegen? Leading research group in computer security in the Netherlands Broad range of research, from theoretical to practical eg work on online privacy & electronic identities in

Organisation & Practicalities The Master is taught together with TU Eindhoven Previously also with UTwente, as Courses in Nijmegen and Eindhoven You have to at least take 3 obligatory courses in Eindhoven To reduce travel hassle -Courses scheduled on the same day and not in the first 2 hours -Some courses via tele-lecturing Minimal travel hassle over 2 years: 1 quarter going to Eindhoven twice a week (for 2 mandatory courses, on same day); the 3rd mandatory course is tele-lectured.

Topics that you study Security protocols Cryptography Software security Network security Organisational aspects of computer security Privacy Hardware security – esp. smartcards and RFID Legal aspects of computer security

Programme 6 mandatory courses (30 EC) Seminar: Privacy Seminar at RU (or IST Seminar at TUE) Electives - choice from 6 optional security courses Free choice Computer Science & Society (3EC) plus Research internship (15EC) Master thesis (30 EC)

Specialisation-specific courses Optional Law in Cyberspace Hardware Security Cryptographic Engineering Physical Aspects of Computer Security Applied Cryptography Hacker’s Hut Mandatory At RU Software Security Security in Organisations Advanced Network Security Privacy Seminar At TUE Cryptography Principles of Data Protection Verification of Security Protocols

Some of the researchers Bart Jacobs correctness & security of software quantum logics Erik Poll software security smartcard security payment systems, smart grids Jaap Henk Hoepman privacy Internet of Things identity management Mireille Hildebrandt legal aspects of security, privacy and profiling Lejla Batina physical security lightweight crypto RFID Peter Schwabe high-speed crypto cryptanalysis Sepideh Ghanavati requirement engineering privacy & compliance

Industry connections Joan Daemen symmetric crypto Also works at ST Microelectronics Eric Verheul applied crypto organizational security auditing Also works at keycontrols

Master thesis projects with company?

Going abroad? Going abroad for a semester can be a great experience! Eg for your master thesis, or for regular courses & research internship. If you’re interested in this, plan ahead ! E.g. Elena Fuentes Bongenaar went to Chalmers for one semester to take courses and to Infineon in Munich for Master thesis

Master theses: topics, impact & careers Ruben Muijrers. RAM: Rapid Alignment Method Published at CARDIS 2012 & implemented in commercial tool. Joined Riscure

Master theses: topics, impact & careers Arjan Blom. ABN-AMRO E-dentifier2 reverse engineering Published at NordSec 2012 and lots of media attention. Started own company Georg Chalupar, Stefan Peherstorfer. Reverse Engineering Using LEGO Published at WOOT 2014 in San Diego

Master theses: topics, impact & careers Joost Rijneveld Implementing SPHINCS with restricted memory. Prestented at PKC 2015,Taiwan Tim Cooijmans. Cryptographic Key Storage and TEE on Android Presented at SPSM 2014, USA. Tim is now with SNS bank Manu Drijvers. Delegation in attribute based credentials Manu joined IBM research in Zurich as PhD student Mathias Morbitzer. TCP Idle scans in IPv6 Presented at Hack in the Box Malaysia and at HACK.LU. Joined Fox-IT Pol van Aubel. Effective host-based intrusion of real-time systems Joined DS group as PhD student on project with TenneT Arturo Cedillo Torres & Brinio Hond. Fuzzing the GSM protocol Presented at Essos They both joined KPMG Gerhard de Koning Gans. Analysis of the MIFARE classic. PhD in DS group, then High Tech Crime Unit of Dutch police, now FactorIT BV

More info? TRU/e Master: info at Peter Schwabe is the contact person for the Master specialisation in security Pre-master programme? If you have done HBO or other bachelor than computer science: contact study advisors Perry Groot