Master Track in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Slides:



Advertisements
Similar presentations
Master track Computer security: studying at the Kerckhoffs Institute Lejla Batina Digital Security Group Institute for Computing and Information Sciences.
Advertisements

1 Master Information Science Theo van der Weide Institute for Computing and Information Sciences Radboud Universiteit Nijmegen.
1 Hardware Security Organisational stuff Lejla Batina & Erik Poll Digital Security Radboud University Nijmegen.
RMIT UNIVERSITY Bachelor of Design (Multimedia Systems) Vic Ciesielski Program Leader Office: Open Consultation: Tues,
SCM-Tempus Project C015A05 Faculty of Electronic Engineering, Niš, March 24th, 2006 The Bologna Process at the University of Dortmund, Germany Transition.
Careers in Mathematics 24 March Careers In Mathematics What can you do with a B.Sc. degree in Mathematics ? Where do you want to work ?
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
EIT ICT Labs  ICT innovation is driving transformations in society to improve quality of life  Rapid disruptive ICT innovation is a key driver in the.
CS&CE 2006 The Bologna process for Computer Science and Computer Engineering at ISEL Departamento de Engenharia de Electrónica e Telecomunicações e de.
Special Master Track IST Information SecurityTechnology Sandro Etalle & Berry Schoenmakers.
Warren County Middle School Business And Information Technology Program “ A Different Approach”
INFSO-SSA International Collaboration to Extend and Advance Grid Education ICEAGE Forum Meeting at EGEE Conference, Geneva Malcolm Atkinson & David.
Katarina Krapež, MA researcher, Faculty of Management legal advisor, Technology Agency of Slovenia Faculty of Management Koper Undergraduate Courses: IT.
Workshop Notes Course development: Free and Open Software Development.
Structure of Study Programmes
Discrete Mathematics. - Coding Theory and Cryptology - Cryptographic Implementations eindhoven.cr.yp.to - Discrete Algebra and Geometry.
Ideas about ICT Management Faculty meeting to discuss the Comp/Tele program Henri Slettenhaar Webster University Geneva.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
OverviewOverview – Preparation – Day in the Life – Earnings – Employment – Career Path Forecast – ResourcesPreparationDay in the LifeEarningsEmploymentCareer.
Master Programmes Computing Science & Information Sciences Perry Groot March 2015.
Structure of Study Programmes Bachelor of Computer Science Bachelor of Information Technology Master of Computer Science Master of Information Technology.
FACULTY OF ORGANIZATIONAL SCIENCES UNIVERSITY OF BELGRADE FACULTY OF ORGANIZATIONAL SCIENCES Studies in INTERNET TECHNOLOGIES & ELECTRONIC BUSINESS Božidar.
Minor- or Premaster programme for Computing Science or Information Sciences Perry Groot March 2015.
School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile Dr. Nazar Abbas Saqib.
Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)
MFoCS Mathematical Foundations of Computer Science Tom Heskes and Jasper Derikx.
Minor - or Premaster programme for Computing Science or Information Sciences Perry Groot November 2014.
LEFIS General Assembly Firence 1 Information Technology Law Masters Programme Prof. Dr. Rimantas Petrauskas Mykolas Romeris University (Lithuania)
Center for Cybersecurity Research and Education (CCRE)
Introduction to Information Security J. H. Wang Sep. 18, 2012.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Tempus – DEUKS Doctoral School towards European Knowledge Society Mathematical Institute Serbian Academy of Sciences and Arts Belgrade Udine, May 6-9,
My audience will be excited to learn the basics of what a network systems & data communications analyst does.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Minor- or Premaster programme for Computing Science or Information Sciences Perry Groot November 2015.
Computing Science & Information Sciences Erik Poll November 2015.
Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science/
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Software Science Frits Vaandrager. Master Programme in Computing Science 2 years (120 ec), full time four specializations software science MFoCS data.
Koji OKAMURA Cybersecurity Center, Kyushu University Cybersecurity Education.
UNIVERSITY OF JYVÄSKYLÄ ICT Support in International MDPs Tuning International Master’s Programmes Merja Ruuska Planning Officer Information.
E-Governance Technologies and Services MASTER'S CURRICULUM IN IT INGMAR PAPPEL.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
University education Center affiliated to the University of Barcelona.
Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)
Computing Science & Information Sciences Erik Poll March 2016.
Introduction and information Master Communication Studies (CS) Academic year February 6, 2017.
Master Specialisation in Cyber security
Computing Science & Information Science Master programmes in
Master Specialisation in Cyber security
Master Information Sciences
Associate Degree in Cyber security
Master Information Sciences
What can we be if we are communication students?
Computing Science & Information Science Master programmes in Erik Poll
OCR Cambridge Technical Introductory Diploma in IT Bridging Work
AMSTERDAM SCHOOL OF INTERNATIONAL BUSINESS
Virginia Union University
Cambridge National Certificate in Information Technologies
Computing Science Peter Achten.
NordSecMob Master’s Programme in Security and Mobile Computing
Computer and Systems Engineering
Computing Science & Information Sciences Master programmes in
Study and internships abroad: a valuable experience!
Computing Science Information Sciences Master programmes Erik Poll
Careers week ICT/Computing.
Presentation transcript:

Master Track in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Why study computer security? And why here? Computer security is hot, with excellent job opportunities Computer security has a real impact in everyday life & on society! Opportunities for multidisciplinary research The Digital Security RU leading computer security group in the Netherlands broad range of research, with real impact – in science & society eg work on solutions for online privacy & electronic identities in many projects with companies, eg (security) consultancy companies, evaluation laboratories, electricity companies, government, … => many PhD study opportunities

Organisation Old security master : “Kerckhoffs” security master together with TU Eindhoven and Univ. Twente Last enrollment autumn 2014: New computer security master starting autumn 2015: together with TU Eindhoven Students already enrolled can of course still complete old programme

Practicalities Courses in Nijmegen and Eindhoven You have to at least take 3 obligatory courses in Eindhoven. To reduce travel hassle -Courses given on the same day, and not scheduled the first 2 hours -Some courses given through tele-lecturing Travel on average < 1 day a week One quarter 2 days a week, some quarters none

Research topics that you study Cryptography & security protocols Software security Hardware security - smartcards and RFID tags Network security Privacy Organisational aspects of computer security Legal aspects of computer security

Researchers working on these topics 1/2 Bart Jacobs: correctness and security of software, quantum logics Erik Poll: software security, smartcard security, payment systems, smart grids Jaap Henk Hoepman: privacy, Internet of Things, ddentity management

Researchers working on these topics 2/2 Mireille Hildebrandt: legal aspects of computer security, privacy & profiling, cyber crime, fundamental rights Lejla Batina: physical security, lightweight cryptography, implementations of cryptography Peter Schwabe: high-speed cryptography, cryptanalysis

Programme Track basis - 6 Mandatory courses (30 EC) Track electives - choice from 6 optional security courses Free choice Research Seminar (6 EC) Computer Science & Society (3EC) plus Research intership (15EC) Master thesis (30 EC)

Track-specific courses Optional Law in Cyberspace Hardware Security Cryptographic Engineering Physical Aspects of Computer Security Applied Cryptography Hacker’s Hut Mandatory Security in Organisations Software Security Network Security Privacy Seminar At TUE Cryptography Principles of Data Protection Verification of Security Protocols

Master thesis projects with companies

Master theses: topics, impact & careers Tim Cooijmans. Cryptographic Key Storage and TEE on Android Presented at SPSM 2014, USA. Tim is now with SNS bank Manu Drijvers. Delegation in attribute based credentials. Manu joined IBM research in Zurich as PhD student. Mathias Morbitzer. TCP Idle scans in IPv6 Presented at Hack in the Box Malaysia and at HACK.LU. Joined Fox-IT Pol van Aubel. Effective host-based intrusion of real-time systems Joined DS group as PhD student on project with TenneT Arturo Cedillo Torres & Brinio Hond. Fuzzing the GSM protocol Presented at Essos They both joined KPMG Arjan Blom. ABN-AMRO E-dentifier2 reverse engineering Published at NordSec 2012 and lots of media attention. Started own company Ruben Muijrers. RAM: Rapid Alignment Method Published at CARDIS 2012 & implemented in commercial tool. Joined Riscure Gerhard de Koning Gans. Analysis of the MIFARE classic. Now with High Tech Crime Unit of Dutch police after PhD in DS group.

More info? Detailed information on courses etc /2014/science Pre-master programme? (for HBO or other bachelor than computer science) Contact study advisor Perry de Groot Studying abroad? Make appointment with (Room HG But first contact Perry. Peter Schwabe is the contact person for the Master Security Track.