master
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
master [2020/07/04 14:21] – [External Projects:] zannonen | master [2023/06/01 17:06] (current) – ggankhuyag | ||
---|---|---|---|
Line 1: | Line 1: | ||
=====Master Degree in Cyber Security at TU/e===== | =====Master Degree in Cyber Security at TU/e===== | ||
- | TU/e, in joint collaboration with the RU Radboud University, offers a Master Specialization | + | Starting from 2021-2022 TU Eindhoven offers a fully local Information Security Technology master track where all lectures are offered on the TU/e campus. The IST track used to be part of the "TRU/e Master in Cyber Security" |
- | For more info, visit the website | + | |
====Courses offered by SEC==== | ====Courses offered by SEC==== | ||
===2IMS00: Seminar IST=== | ===2IMS00: Seminar IST=== | ||
- | In this course students train the skills required for doing independent research in security. The student has to be able to explore a new security topic on his/her own and present the results in oral and written form. The Seminar is a preparation for the masters | + | In this course, students train the skills required for doing independent research in security. The student has to be able to explore a new security topic on his/her own and present the results in oral and written form. The Seminar is a preparation for the master' |
===2IMS10: Physical Aspects of Digital Security=== | ===2IMS10: Physical Aspects of Digital Security=== | ||
The course covers a number of subjects where digital security is heavily influenced by interaction with the physical world: | The course covers a number of subjects where digital security is heavily influenced by interaction with the physical world: | ||
Fuzzy extractors, true random number generation, distance bounding, physical unclonable functions, quantum computers, quantum key exchange. | Fuzzy extractors, true random number generation, distance bounding, physical unclonable functions, quantum computers, quantum key exchange. | ||
- | The emphasis lies on the adaptation of algorithms and protocols to cope with, and maximally exploit, the properties of the physical world. | + | The emphasis lies on the adaptation of algorithms and protocols to cope with and maximally exploit, the properties of the physical world. |
===2IMS15: Verification of Security Protocols=== | ===2IMS15: Verification of Security Protocols=== | ||
The student will learn what are security protocols, which kind of flaws they can contain and how to detect and fix such flaws. The following topics are treated: | The student will learn what are security protocols, which kind of flaws they can contain and how to detect and fix such flaws. The following topics are treated: | ||
Line 19: | Line 18: | ||
* Information flow | * Information flow | ||
- | ===2IMS20: | + | ===2IMS20: |
- | The course comprises both theoretical lessons as well as practical exercises. Topics include: stack overflow, buffer overflows, cross site scripting attacks, cross site request forgery, sql injections, rootkits. | + | Objectives |
- | ===2IMS25: Principles | + | * Learn the principles of how IT systems can be exploited by cyberattackers. |
- | This course focuses on data protection | + | * Learn how cyber attackers actually operate, |
- | =====Master Projects===== | + | * Learn the principles |
+ | * Learn the basics | ||
+ | Content | ||
- | The Security Group of TU/e offers | + | We will start discussing the technical attack vectors (XSS, SQL Injections, XSRF, drive-by download) and how these vectors are embodied in complex attacks (malware, spyware, ransomware, botnets) Then, we will see how these attacks are used in the cybercrime economy (spam, phishing, infections and money laundering). We will discuss the principles |
+ | |||
+ | ===2IMS25: Principles of Data Protection=== | ||
+ | This course focuses on data protection technologies designed to prevent the dissemination of sensitive information of individuals. The course will provide a solid introduction to the most important access control models (e.g., DAC, MAC, RBAC) and their extensions for distributed systems (e.g., RT) and usage control (e.g., UCON). The course also covers industry standards | ||
- | ====External Projects:==== | + | ===2IMS30: Advanced Network Security=== |
- | [[http:// | + | The course is divided in THREE (3) parts. |
+ | - The first part is dedicated to the recall of basic notions, such as cryptography, | ||
+ | - The second part of the course is dedicated to the security of IoT networks. The course will mostly follow a bottom-up approach, following the ISO/OSI Stack. We will establish several comparisons between traditional security protocols | ||
+ | - The third part will focus on specific network security applications. It will cover network security and privacy aspects of several use-case protocols, such as avionics protocols, maritime scenarios, and GNSS architectures. | ||
- | * [[https:// | + | ===2IMS40: Intrusion Detection Laboratory=== |
- | * [[http:// | + | The goal of this course is to provide |
- | * [[iot-applets-NXP|Master Project | + | To do so, the course is not focused |
- | * [[https:// | + | The outcome of this setup is that all students will have developed, by the end of the course, a profound understanding of a technology of their choice, and at the same time get hands-on experience on a multitude of aspects of intrusion detection, through the lab activities developed by the fellow students. |
- | * [[https:// | + | |
- | * [[https:// | + | |
- | * [[https:// | + | |
- | * [[http:// | + | |
- | *[[http://www.win.tue.nl/ | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
- | | + | |
- | *[[http:// | + | |
- | *[[https:// | + | |
- | *[[https:// | + | |
- | //Projects listed here are proposed by companies and it is not guaranteed that these projects will be supervised by someone in the SEC group unless a prior agreement has been reached.// | ||
- | ====Internal Projects: | ||
- | | ||
- | | ||
- | | ||
- | | ||
- | | ||
- | |
master.1593865263.txt.gz · Last modified: 2021/01/10 20:59 (external edit)