1 / 16

Master Specialisation in Cyber security

Explore cyber security through a leading research group in the Netherlands, offering a diverse curriculum and industry connections. Benefit from multidisciplinary research options and gain expertise in security protocols, cryptography, privacy, and more.

Download Presentation

Master Specialisation in Cyber security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Master Specialisation in Cyber security Lejla Batina Digital Security Group Institute for Computing and Information Sciences (ICIS)

  2. Why study computer security/cyber security? • Interesting and hot topic, with excellent job opportunities • Real impact in everyday life & society • Opportunities for multidisciplinary research And why study it here in Nijmegen? • Leading research group in computer security in the Netherlands (and broader) • Broad range of research, from theoretical to practical

  3. Organisation & Practicalities • The Master is taught together with TU Eindhoven Previously also with UTwente, as • Courses in Nijmegen and Eindhoven You have to at least take 3 mandatory courses in Eindhoven • To reduce travel hassle • Courses scheduled on the same day and not in the first 2 hours • Most of the lectures are recorded • Practically, yourtraveling over 2 years:1 quarter going to Eindhoven twice a week (for 2 mandatory courses, both on same day); the 3rd mandatory course is tele-lectures (andrecorded).

  4. Topics that you study • Security protocols • Cryptography • Software security • Network security • Organisational aspects of computer security • Privacy • Hardware security – esp. smartcards and RFID • Legal aspects of computer security

  5. Programme • 6 mandatory courses (30 EC) • Seminar: Privacy Seminar at RU (or IST Seminar at TUE) • Electives - choice from 6 optional security courses • Free choice • Computer Science & Society (3 EC) plus • Research internship (15 EC) • Master thesis (30 EC)

  6. Specialisation-specific courses Mandatory At RU • Software Security • Security in Organisations • Advanced Network Security • Privacy Seminar At TUE • Cryptography • Principles of Data Protection • Verification of Security Protocols Optional • Law in Cyberspace • Hardware Security • Cryptographic Engineering • Physical Aspects of Computer Security • Applied Cryptography • Hacker’s Hut

  7. Some of the researchers LejlaBatina side-channel analysis lightweight crypto Bart Jacobs identity management quantum logics Erik Poll software security smartcards payment systems Peter Schwabe high-speed crypto post-quantum crypto Joeri de Ruiter security protocols protocol analysis Mireille Hildebrandt legal aspects of security, privacy and profiling JaapHenkHoepman privacy Internet of Things identity management

  8. Industry connections Joan Daemen symmetric cryptography Also works at ST Microelectronics Eric Verheul e-id solutions organizational aspects of security Also works at keycontrols

  9. Master thesis project outside the university?

  10. Possible options (also abroad) • general consultancy companies • security evaluation labs and other companies specialising in IT security • any IT company • hardware manufacturers • software companies • network providers • any organisation that relies on ICT • banks • branches of government • NCSC, Police Team High Tech Crime,... • critical infrastructures: electricity, water, railways,...

  11. Side-channel analysis & cryptographic engineering • Side-channel analysis and countermeasures, • engineering resilient implementations • post-quantum cryptography • RaufMahmudlu: LDA-Based Clustering as a Side-Channel Distinguisher. Presented at RFIDSec2016, Hong Kong • Joost Rijneveld Implementing SPHINCS with restricted memory. • Presentedat PKC 2015,Taiwan

  12. Identity management • Hans Harmannij, Polymorphic Pseudonymization in Educational Identity Federations • Did his MSc thesis at SURFNet • Won the €2000 Joop Bautz award for best MSc thesis in Information Security

  13. Security testing of protocols and software • Patrick Verleg, Inferring SSH state machines using protocol state fuzzingJoined Deloitte • Arturo Cedillo Torres & Brinio Hond. Fuzzing the GSM protocol • Presented at Essos 2014. They both joined KPMG

  14. Applied security analysis • Tim Cooijmans. Cryptographic Key Storage and TEE on Android • At SNS bank. • Safet Acifovic, Security analysis of Paylevenmobile point-of-sale platformAt university. Joined Ernst & Young • Kevin Valk, Comprehensive security analysis of a toys-to-life game • Completed his thesis project at a company in the US

  15. Thesis topics: legal aspects & privacy • Jorritde Boer. An Analysis of the security & privacy qualities of a proposal for the Dutch eIDscheme.

  16. More info? TRU/eMaster: info at http://true-security.nl Peter Schwabe is the contact person for the Master specialisation in security Pre-master programme? If you have done HBO or other bachelor than computer science: contact study advisors Perry Groot

More Related