IT Security
Progressive digitization and networking are continuously changing our lives and now influence a significant part of our daily activities. This results in many new possibilities and opportunities, but also great risks, e.g. through data theft or data manipulation as well as surveillance. The IT Security study profile focuses on cryptographic processes and especially on their use in complex IT systems. Security plays a central role in this, but legal aspects such as data protection, privacy, and the needs and limits of state surveillance in the use of security systems also play a decisive role. Graduates of the "IT Security" study profile should acquire knowledge of cryptographic procedures and, above all, their use in complex IT systems. This should enable them to assess the security of IT systems. Through additional competencies, e.g. from law, legal boundary conditions of IT security such as data protection, privacy as well as demands and limits of state monitoring in the use of security systems are taught; graduates should be able to assess these and take them into account in the development of IT security systems.
German name: IT-Sicherheit
Designated Speaker / Deputy Speaker: Prof. Jörn Müller-Quade / Dr. Willi Geiselmann
Special competencies acquired in the profile:
- Graduates are familiar with the underlying technologies, particularly in cryptography and IT security, and can analyze and evaluate them.
- They know relevant legal framework conditions and can take these into account in the development and use of IT security systems.
- master thesis from the subject area of IT security.
- the root module Security must be taken. If the root module has already been examined in the Bachelor's degree, more CP from the specialization subject "Kryptographie und Sicherheit" must be taken.
- Modules from the specialization "Kryptographie und Sicherheit" (compulsory elective block) amounting to at least 15 CP (in addition to the root module Security) must be taken.
- further thematically appropriate seminars, internships or research practice can be taken in consultation with the profile coordinator.
- a total of at least 45 CP from 2.-4. and the elective block must be completed. A maximum of 9 CP can be taken from the complementary subject.
V=Vorlesung (Lecture), S=Seminar (Seminar), P=Praktikum (Practical course), Ü=Übung (Practice)
Compulsory block (6 CP) | Course | Module | Partial achievement | CP | Course type |
Sicherheit (root module) | M-INFO-100834 | T-INFO-101371 | 6 | V | |
compulsory elective subject: courses from Area of Specialization "Kryptographie und Sicherheit" (at least 15 CP) | Course | Module | Partial achievement | CP | Course type |
Asymmetrische Verschlüsselungsverfahren | M-INFO-100723 | T-INFO-101260 | 3 | V | |
Ausgewählte Kapitel der Kryptographie | M-INFO-100836 | T-INFO-101373 | 3 | V | |
Betriebssystemsicherheit | M-INFO-105470 | T-INFO-111016 | 3 | V | |
Beweisbare Sicherheit in der Kryptographie | M-INFO-100722 | T-INFO-101259 | 3 | V | |
Digitale Signaturen | M-INFO-100743 | T-INFO-101280 | 3 | V | |
Komplexitätstheorie, mit Anwendungen in der Kryptographie | M-INFO-101575 | T-INFO-103014 | 6 | V | |
Kryptographische Protokolle | M-INFO-105631 | T-INFO-111261 | 3 | V | |
Kryptographische Wahlverfahren | M-INFO-100742 | T-INFO-101279 | 3 | V | |
Signale und Codes | M-INFO-100823 | T-INFO-101360 | 3 | V | |
Symmetrische Verschlüsselungsverfahren | M-INFO-100853 | T-INFO-101390 | 3 | V | |
Decentralized Systems: Fundamentals, Modeling, and Applications | M-INFO-105334 | T-INFO-110820 | 4 | V | |
Praktische Einführung in die Hardware Sicherheit | M-INFO-104357 | T-INFO-108920 | 6 | V | |
Maschinelles Lernen für die Computersicherheit | M-INFO-105376 | T-INFO-110859 | 3 | V | |
Authentisierung und Verschlüsselung | M-INFO-105338 | T-INFO-110824 | 4 | V | |
Theoretische Grundlagen der Kryptographie | M-INFO-105584 | T-INFO-111199 | 6 | V | |
Praktikum: Anwendungssicherheit | M-INFO-103166 | T-INFO-106289 | 4 | P | |
Praktikum aus der Kryptographie | M-INFO-101558 | T-INFO-102989 | 3 | P | |
Praktikum: Sicherheit | M-INFO-101560 | T-INFO-102991 | 4 | P | |
Seminar: Kryptographie | M-INFO-101561 | T-INFO-102992 | 3 | S | |
Seminar: Sicherheit | M-INFO-101562 | T-INFO-102993 | 3 | S | |
Seminar: Kryptoanalyse | M-INFO-105337 | T-INFO-110823 | 3 | S | |
Quantum Information Theory | M-INFO-105408 | T-INFO-110904 | 3 | S | |
Seminar: Ausgewählte Themen der Public-Key-Kryptographie | M-INFO-105586 | T-INFO-111201 | 3 | S | |
Post-Quantum Cryptography | M-INFO-105585 | T-INFO-111200 | 3 | S | |
Scientific Methods to Design and Analyze Secure Decentralized Systems | M-INFO-105780 | T-INFO-111568 | 5 | V/Ü | |
Software Security Engineering | M-INFO-106344 | T-INFO-112862 | 3 | V | |
Elective block: courses from the field of IT Security | Course | Module | Partial achievement | CP | Course type |
Access Control Systems: Foundations and Practice | M-INFO-103046 | T-INFO-106061 | 4 | V | |
all modules from Supplementary subject Betriebswirtschaftslehre | 9 | V | |||
all modules from Supplementary subject Recht | 9 | V | |||
Cloud Security & Forensik | M-INFO-103952 | T-INFO-108096 | 5 | V | |
Formale Systeme | M-INFO-100799 | T-INFO-101336 | 6 | V | |
Internet of Everything | M-INFO-100800 | T-INFO-101337 | 4 | V | |
IT-Sicherheitsmanagement für vernetzte Systeme | M-INFO-100786 | T-INFO-101323 | 5 | V | |
Netzsicherheit: Architekturen und Protokolle | M-INFO-100782 | T-INFO-101319 | 4 | V | |
Sprachtechnologie und Compiler | M-INFO-100806 | T-INFO-101343 | 8 | V | |
Theorembeweiserpraktikum: Anwendungen in der Sprachtechnologie | M-INFO-102666 | T-INFO-105587 | 3 | V | |
Privacy Enhancing Technologies | M-INFO-105452 | T-INFO-110989 | 6 | V | |
Praktikum: Access Control Systems | M-INFO-104164 | T-INFO-108611 | 4 | P | |
Praktikum: Dezentrale Systeme und Netzdienste | M-INFO-103047 | T-INFO-106063 | 4 | P | |
Praktikum: Programmverifikation | M-INFO-101537 | T-INFO-102953 | 3 | P | |
Praktikum: Intelligente Datenanalyse (Datalab) | M-INFO-105494 | T-INFO-111038 | 4 | P | |
Praktikum: Penetration Testing | M-INFO-104895 | T-INFO-109929 | 4 | P | |
Seminar: Schwachstellensuche | M-INFO-105377 | T-INFO-110860 | 4 | S | |
Seminar: Privacy und Technischer Datenschutz | M-INFO-105224 | T-INFO-110597 | 4 | S | |
Seminar: Dezentrale Systeme und Netzdienste | M-INFO-103048 | T-INFO-106064 | 3 | S | |
Seminar: Hot Topics in Decentralized Sytems |
M-INFO-104891 | T-INFO-109922 | 3 | S | |
Einführung in das Quantencomputing (IQC) | M-INFO-106101 | T-INFO-112344 | 3 | V | |
Research Focus Class: Blockchain & Payment Channel Networks | M-INFO-105620 | T-INFO-111251 | 3 | V | |
T-INFO-111252 | 3 | S |