1. Semesters LectureSWSECTSInformation Management VOInformation Management VOLector: Univ.-Prof. (FH) Dr. Dr. Gerald Quirchmayr1SWS2ECTS12Secure Software Development Übung UESecure Software Development Übung UELector: Silvia Schmidt, BSc MSc2SWS3ECTS23Distributed Systems Dependability ILVDistributed Systems Dependability ILVLector: DI (FH) Peter Krebs2SWS4ECTS24Introduction to Cryptography VOIntroduction to Cryptography VOLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Prof. Dr. Peter Lory2SWS3ECTSLecture contentsIn this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality.Assessment methodsFinal written examTeaching methodsPresentation with slides and video projector, additional explanations on the whiteboardLanguageGerman23Introduction to Cryptography Übung UEIntroduction to Cryptography Übung UELector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.1SWS2ECTSLecture contentsIn this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality. In the tutorial the students have the possibility to practise the formerly presented approaches, getting more familiar with them. Approaches of possible cryptanalysis will also be discussed.Assessment methodscontinous examinationTeaching methodsPresentation, discussion and solving problemsLanguageGerman12Communicative and Social Competences ILVCommunicative and Social Competences ILVLector: Dipl.Ing. Franz Gober, MBA2SWS2ECTS22Cryptographic Methods in IT ILVCryptographic Methods in IT ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsThe course gives a broad view across the possibilites of cryptographic methods in a typical workday, especially those of a SysAdmin. For alll topics, the theoretic background is presented alongside the practical usage implications. The covered topics are: * Hard disk encryption * Passwords * SSH & Network tunneling * E-mail security * Public Key InfrastructureAssessment methodsExercices and a final examTeaching methodsTheoretical lectures and individual tasks for all subjectsLanguageGerman23Network Defense Technologies ILVNetwork Defense Technologies ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Nenad Milanovic, MSc2SWS4ECTSLecture contents- Overview of Threats - Firewalls (stateless/stateful) - Intrusion Detection and Prevention - IPsec-based VPNs - Overview over SSL and TLS and other VPN-Technologien (L2TP, PPTP, MPLS) - Advanced Persistent Thretas - Expert TalksAssessment methodsWritten final ExamTeaching methodsLecture with slides, whiteboard and external expert speeches Lab ExercisesLanguageGerman24Secure Software Development VOSecure Software Development VOLector: DI Thomas Konrad, Silvia Schmidt, BSc MSc2SWS3ECTS23Wireless Network Security ILVWireless Network Security ILVLector: Tobias Buchberger, BSc MSc, DI (FH) Peter Krebs2SWS4ECTS24
2. Semesters LectureSWSECTSCryptographic Protocols ILVCryptographic Protocols ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsThis lecture gives an overview of many different cryptographic protocols, possible usage scenarios and their peculiarities. The students implement selected protocols from a given domain, compare them to each other and present the results. The main topics are - Public-Key Schemes - Key-Agreement/Key-Establishment - Challenge Response Schemes/Authentication - Signature SchemesAssessment methodsEvery presentation is a partial examination, there is no written final examTeaching methodsImplementations and presentations by the studentsLanguageGerman23Business and Ethics ILVBusiness and Ethics ILVLector: Mag. Georg Conrad-Billroth, MSc (CS)3SWS4ECTSLecture contentsBusiness and ethics consists of: Introduction and basic principles legal structure of companies and business organization The enterprise and its environment Ethics in business Human resources management Marketing & sales & ethics Procurement and logistics Production Accounting and financeAssessment methodscontinuous assessment, assessment of presentations and teamwork, final examTeaching methodsLecture with PowerPoint slides and exercises. The ppt slides and handouts will be providedLanguageGerman34Application Security ILVApplication Security ILVLector: Tobias Buchberger, BSc MSc, Silvia Schmidt, BSc MSc2SWS3ECTSLecture contentsThe course teaches security aspect with the runtime of applications as well as DevSecOps subjects: * Virtualisation * Container technologies * Security automation (Ansible) * Docker * CI/CD * OWASP SAMMAssessment methodsLab exercicesTeaching methodsexercises, presentationsLanguageGerman23Cyber-Security ILVCyber-Security ILVLector: Tobias Buchberger, BSc MSc, Ing. Reinhard Kugler, MSc, DI Mathias Tausig2SWS3ECTSLecture contentsIn this lectures, we shade light on the attacker's perspective on computer security. By learning how to attackers work and experience them first hand in our lab exercises, we create a deeper understanding of the methods and procedures of attackers. Thus, laying the foundation for better operational security and security design practices. This lecture is part 1 of our two-semester lecture series at FH Campus Wien.Assessment methods5 practical challenges (of which you need to solve 3) and a written exam.Teaching methodsLectures with practical examples and demonstrations. Additionally, we offer an online platform, where students have to solve challenges. Those challenges range from attacking a Windows or Linux platform, performing a buffer overflow, and the analysis and manipulation of a mobile App.LanguageGerman-English23Security Lab LBSecurity Lab LBLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Nenad Milanovic, MSc4SWS10ECTSLecture contents- Practical application of IT-Security knowledge - Selected topics supplementing related courses - Protection of IT-Systems using Firewalls and Intrusion Prevention Systems - Design and Integration of a SIEM solutionAssessment methodsContinuous examination and documentationTeaching methods- Independent implementation of a project - Support is given at any time on request - Continuous progress reviewsLanguageGerman410Cloud Security and Identity Management ILVCloud Security and Identity Management ILVLector: Tobias Buchberger, BSc MSc, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.3SWS4ECTSLecture contentsPractical Project Cloud Paradigms (IAAS, PAAS, SAAS) Security in the Cloud (Searchable/Homomorphic Encryption) Basics of Identity Management Single-Sign-On Systems, Shibboleth, Kerberos OAuth, OpenID Connect, SAML; FIDO, U2FAssessment methodswritten examTeaching methodsLecture Distance Education Practical work in small groupsLanguageGerman34Applied Cryptography ILVApplied Cryptography ILVLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsThis course covers the differences between the „textbook” and the “real-world” implementations of cryptographic algorithms. Symmetric techniques like DES and especially AES with its most important variations are dealt with in detail, as well as padding techniques and selected parts from the PKCS. These topics are supplemented with a basic introduction to the efficient implementation of long integer arithmetic.Assessment methodsWritten elaboration of selected lecture contents Presentation Written examinationTeaching methodsPresentation with slides and video projectorLanguageGerman23
3. Semesters LectureSWSECTSDigital Forensics VODigital Forensics VOLector: Dipl.-Ing. Dr. Martin Schmiedecker, Dip.-Inf. (FH) Karsten Theiner2SWS2ECTS22Mobile and Embedded Security VOMobile and Embedded Security VOLector: Tobias Buchberger, BSc MSc, FH-Prof. DI Gerhard Engelmann, Silvia Schmidt, BSc MSc, DI Mathias Tausig2SWS3ECTS23Mobile and Embedded Security Übung UEMobile and Embedded Security Übung UELector: Tobias Buchberger, BSc MSc, Silvia Schmidt, BSc MSc1SWS2ECTS12Business Crime SEBusiness Crime SELector: Dipl.Ing. Franz Gober, MBA2SWS3ECTS23Academic Research and Writing SEAcademic Research and Writing SELector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn.2SWS3ECTSLecture contentsAn important part of a comprehensive academic education is to aquire the qualification to treat problem statements from a scientific point of view. Therefore, an introduction to scientific work, writing, and well established methodologies will be taught in this course.Assessment methodsThe evaluation is based on the submitted material (disposition, paper, reviews) as well as on the presentations.Teaching methodsDuring this course a scientific conference will be simulated. After a brief introduction to scientific writing, the attendees of this course shall treat a problem statement of a given field of research for which they shall prepare disposition that briefly describes the chosen topic. Based on it, a draft version of the scientific article will be written (draft paper). Afterwards, these draft versions of the papers will be critically reviewed by other colleagues (peer reviewing). Based on their reviews, a revised version of the scientific paper shall be created (camera-ready paper). At the end of this course, the scientific papers will be presented by the authors.LanguageGerman23Cyber-Crime Defense ILVCyber-Crime Defense ILVLector: Tobias Buchberger, BSc MSc, Ing. Reinhard Kugler, MSc2SWS3ECTS23Digital Forensics Übung UEDigital Forensics Übung UELector: Dipl.-Ing. Dr. Martin Schmiedecker, Dip.-Inf. (FH) Karsten Theiner1SWS2ECTS12Interdisciplinary Project UEInterdisciplinary Project UELector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Julia Teissl, BSc MSc4SWS9ECTSLecture contentsSummary of the essential aspects of project- and process-management, as well as system safety, and their practical meaning in concrete examples. Clarification of the differences between safety and security, and of the interfaces between these two areas. Diskussion and reflection of the insights from practical application of the above concepts.Assessment methodsAssessment of the submitted implementation and the presentations.Teaching methodsImplementing and presenting a practical example in small groups.LanguageGerman49Security Management ILVSecurity Management ILVLector: Dipl-HTL-Ing. Andreas Schaupp, MSc, MSc, MAS2SWS3ECTS23
4. Semesters LectureSWSECTSMaster Thesis MTMaster Thesis MTLector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler0SWS20ECTSLecture contentsAutonomous authoring of a special, science-based theme under guidance by a supervisor, elaboration of the master's thesisAssessment methodsApprobation of the master's thesisTeaching methodsDiploma thesis: Autonomous scientific work under guidance by a supervisorLanguageGerman-English020Master Thesis Seminar SEMaster Thesis Seminar SELector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler2SWS2ECTSLecture contentsThe students present the current state of their Master's Thesis at regular intervals and discuss their work with the audience.Assessment methodsContinous examinationTeaching methodsPresentations by the studentsLanguageGerman-English22Privacy in Internet VOPrivacy in Internet VOLector: Dr. Sandford Bessler2SWS2ECTSLecture contentsThe lecture will give an overview on the technologies and the application areas of e-privacy protection: Definitions, Introduction, Legal aspects - GDPR, DPIA Technologies: - Identity management - Anonymous communication - Privacy policies - Database privacy Application areas: - Vehicular privacy, Location privacy - Search engine privacy, - Social network privacy, - Privacy and the Smart gridAssessment methodsHomework exercises and project work (40%) Final written exam (60% of the grade)Teaching methodsFrontal teaching using slide presentations and online sources. 2-3 home works to support learning Small group project work and presentation.LanguageEnglish22Human Perception and Behaviour VOHuman Perception and Behaviour VOLector: MMag. Dr. André Gazsó2SWS3ECTSLecture contentsThis course discusses the main principles of human perception especially regarding risk and safety relevant decisions and actions. The leading context is the societal attitude to risk and safety and the political conditions of safety governance.Assessment methodsTeaching methods.LanguageGerman-English23Legal Framework of Privacy Policies ILVLegal Framework of Privacy Policies ILVLector: DI Wolfgang Aigner, Mag.iur. Philip Raffling2SWS3ECTSLecture contentsGeneral orientation in law with a focus on data protection.Assessment methodsLanguageGerman23
Admission requirements A Bachelor degree or diploma certificate from an institute of higher education with a total of 180 ECTS credits with at least 42 ECTS credits in the relevant subjects of information technology, software engineering and network engineering. In exceptional cases, the University Council will make a joint decision with the Program Director.Equivalent certification from abroad Equivalence is determined by international agreements, validation or in individual cases a decision by the head of the academic section.The admission requirements are satisfied with successful graduation from the Computer Science and Digital Communications, Information Technologies and Telecommunication (discontinued) and Applied Electronics Bachelor degree programs offered at FH Campus Wien.Regulation for the admission of third country citizens (PDF 233 KB)Information for applicants with non-Austrian (school) certificates (PDF 145 KB)
Application To apply you will require the following documents:Birth certificateProof of citizenshipA Bachelor degree or diploma certificate/equivalent certification from abroad and CV in table form.Please note: It is not possible to save incomplete online applications. You must complete your application in one session. Your application will be valid as soon as you upload all of the required documents and certificates. In the event that some documents (e.g. references) are not available at the time you apply, you may submit these later via e-mail, mail or in person by no later than the start of the admission process.
Admission procedure The admission procedure assesses the professional suitability of the applicants for the Master's program. It consists of an oral interview. You will receive the date for the admission procedure from the secretary's office. The admission interview usually takes place online via ZOOM.GoalThe goal is to offer a study place to those persons who complete the admission procedure with the best results.CriteriaThe admission criteria are exclusively performance-based. You will receive points for the interview, after which the ranking of the candidates will be determined. Geographical assignments of the applicants have no influence on the admission. The admission requirements must be met. The entire process as well as the evaluations of the admission procedure are documented and archived in a comprehensible manner.
> FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler Head of Degree Program IT-Security, Head of Competence Center for IT-Security T: +43 1 606 68 77-2461matthias.hudler@fh-campuswien.ac.at