Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Slides:



Advertisements
Similar presentations
Master track Computer security: studying at the Kerckhoffs Institute Lejla Batina Digital Security Group Institute for Computing and Information Sciences.
Advertisements

1 Master Information Science Theo van der Weide Institute for Computing and Information Sciences Radboud Universiteit Nijmegen.
1 Hardware Security Organisational stuff Lejla Batina & Erik Poll Digital Security Radboud University Nijmegen.
MSc Innovation Management Ed Nijssen / Hans Berends.
Maersk Liner Graduate Programme
Careers in Computing Dr. Wolfgang Pelz June 18, 2009.
Information on internship Yolanda Hübner Study advisor bachelor.
Careers in Mathematics 24 March Careers In Mathematics What can you do with a B.Sc. degree in Mathematics ? Where do you want to work ?
Masters in Information Science and Technology (IST) Thesis and Non-Thesis Option (30 Credits)
Master of Science in Innovation Management Professor Ed Nijssen Program Director.
Occupational Career Project By Jimmy Evans. I want to pursue a career in computer engineering. Specifically something in computer software. I think a.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
“Bachelier en Droit”- Bachelor in Law at the University of Namur Robert Queck « Maître de conférences » at the Law Faculty Deputy Director CRID LEFIS General.
EIT ICT Labs  ICT innovation is driving transformations in society to improve quality of life  Rapid disruptive ICT innovation is a key driver in the.
Special Master Track IST Information SecurityTechnology Sandro Etalle & Berry Schoenmakers.
(Under)graduate teaching in the field of Law and ICT General comments in the light of the Bachelor in Law organized by the University of Namur Robert Queck.
First... Background Topics Schedule Self Study Me Willem de Bruijn PhD candidate at Vrije Universiteit.
INFSO-SSA International Collaboration to Extend and Advance Grid Education ICEAGE Forum Meeting at EGEE Conference, Geneva Malcolm Atkinson & David.
Katarina Krapež, MA researcher, Faculty of Management legal advisor, Technology Agency of Slovenia Faculty of Management Koper Undergraduate Courses: IT.
Structure of Study Programmes
Discrete Mathematics. - Coding Theory and Cryptology - Cryptographic Implementations eindhoven.cr.yp.to - Discrete Algebra and Geometry.
Computer Science in a Nutshell Eugene Fink
Master Track in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
Data Science Master Track
Master Programmes Computing Science & Information Sciences Perry Groot March 2015.
Structure of Study Programmes Bachelor of Computer Science Bachelor of Information Technology Master of Computer Science Master of Information Technology.
Web Service Development Within Different Study Years Maja Pušnik, Boštjan Šumak Institute of Informatics, FERI Maribor.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
MFoCS Mathematical Foundations of Computer Science Tom Heskes and Jasper Derikx.
March 4, 2004 Cryptography and Computer Security for Undergraduates Suzanne E. Gladfelter Penn State York
LEFIS General Assembly Firence 1 Information Technology Law Masters Programme Prof. Dr. Rimantas Petrauskas Mykolas Romeris University (Lithuania)
Education. Education at TU/e Bachelor program (undergraduate) Master’s program (2 years) Professional doctorate engineering (PDEng, 2 years) Doctorate.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Going abroad for PhD candidates Rob van Leeuwen International Office Comeniuslaan.
Minor- or Premaster programme for Computing Science or Information Sciences Perry Groot November 2015.
Computing Science & Information Sciences Erik Poll November 2015.
Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science/
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
1 Management of Information Technology master curriculum Peeter Normak.
HAN Automotive European Master in Automotive Engineering EMAE HAN Automotive HAN-University Arnhem, The Netherlands.
Information Bachelor 2/3 How to design your BA 2/3 programme.
E-Governance Technologies and Services MASTER'S CURRICULUM IN IT INGMAR PAPPEL.
Topics 1.Health and Safety, ACC, KiwiSaver 2.NZ style CVs, online applications – highlight 3.Interviews (role plays) 4.Cold calling and networking Week.
Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)
Erik Poll1. Hi-tech bank robbery Erik Poll Digital Security Radboud University Nijmegen.
Computing Science & Information Sciences Erik Poll March 2016.
Why Should You Apply to Graduate School? Masters Degree
Master Specialisation in Cyber security
Computing Science & Information Science Master programmes in
Master Specialisation in Cyber security
BEng(CompSc) Curriculum Structure & Highlights
Information Bachelor 2/3
Master Information Sciences
Master Information Sciences
Computing Science & Information Science Master programmes in Erik Poll
OCR Cambridge Technical Introductory Diploma in IT Bridging Work
AMSTERDAM SCHOOL OF INTERNATIONAL BUSINESS
Cambridge National Certificate in Information Technologies
Cryptography and Computer Security for Undergraduates
School of Life Science, Engineering & Design
Master Introduction Computer Science Joint UvA-VU Degree Andrew S
UNM Information Assurance Scholarship for Service (SFS) Program
Computing Science Peter Achten.
Computer and Systems Engineering
Computing Science & Information Sciences Master programmes in
Study and internships abroad: a valuable experience!
Computing Science Information Sciences Master programmes Erik Poll
UNM Information Assurance Scholarship for Service (SFS) Program
Presentation transcript:

Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Why study computer security? Interesting and hot topic, with excellent job opportunities Real impact in everyday life & society Opportunities for multidisciplinary research And why study it here in Nijmegen? Leading research group in computer security in the Netherlands Broad range of research, from theoretical to practical eg work on online privacy & electronic identities in

Organisation & Practicalities The Master is taught together with TU Eindhoven Previously also with UTwente, as Courses in Nijmegen and Eindhoven You have to at least take 3 obligatory courses in Eindhoven To reduce travel hassle -Courses scheduled on the same day and not in the first 2 hours -Some courses via tele-lecturing Minimal travel hassle over 2 years: 1 quarter going to Eindhoven twice a week (for 2 mandatory courses, on same day); the 3rd mandatory course is tele-lectured.

Topics that you study Security protocols Cryptography Software security Network security Organisational aspects of computer security Privacy Hardware security – esp. smartcards and RFID Legal aspects of computer security

Programme 6 mandatory courses (30 EC) Seminar: Privacy Seminar at RU (or IST Seminar at TUE) Electives - choice from 6 optional security courses Free choice Computer Science & Society (3EC) plus Research internship (15EC) Master thesis (30 EC)

Specialisation-specific courses Optional Law in Cyberspace Hardware Security Cryptographic Engineering Physical Aspects of Computer Security Applied Cryptography Hacker’s Hut Mandatory Software Security Security in Organisations Network Security Privacy Seminar At TUE Cryptography Principles of Data Protection Verification of Security Protocols

Some of the researchers Bart Jacobs correctness & security of software quantum logics Erik Poll software security smartcard security payment systems, smart grids Jaap Henk Hoepman privacy Internet of Things identity management Mireille Hildebrandt legal aspects of security, privacy and profiling Lejla Batina physical security lightweight crypto RFID Peter Schwabe high-speed crypto cryptanalysis

Master thesis projects with company?

Going abroad? Going abroad for a semester can be a great experience! Eg for your master thesis, or for regular courses & research internship. If you’re interested in this, plan ahead ! E.g. Bart van Delft went to Chalmers in Gothenborg, Sweden (and never came back...)

Master theses: topics, impact & careers Tim Cooijmans. Cryptographic Key Storage and TEE on Android Presented at SPSM 2014, USA. Tim is now with SNS bank Manu Drijvers. Delegation in attribute based credentials Manu joined IBM research in Zurich as PhD student Mathias Morbitzer. TCP Idle scans in IPv6 Presented at Hack in the Box Malaysia and at HACK.LU. Joined Fox-IT Pol van Aubel. Effective host-based intrusion of real-time systems Joined DS group as PhD student on project with TenneT Arturo Cedillo Torres & Brinio Hond. Fuzzing the GSM protocol Presented at Essos They both joined KPMG Gerhard de Koning Gans. Analysis of the MIFARE classic. Now with High Tech Crime Unit of Dutch police after PhD in DS group

Master theses: topics, impact & careers Ruben Muijrers. RAM: Rapid Alignment Method Published at CARDIS 2012 & implemented in commercial tool. Joined Riscure

Master theses: topics, impact & careers Arjan Blom. ABN-AMRO E-dentifier2 reverse engineering Published at NordSec 2012 and lots of media attention. Started own company Georg Chalupar, Stefan Peherstorfer. Reverse Engineering Using LEGO Published at WOOT 2014 in San Diego

More info? TRU/e Master: info at Peter Schwabe is the contact person for the Master specialisation in security Pre-master programme? If you have done HBO or other bachelor than computer science: contact study advisors Perry Groot