m_ITSecurity01_en

IT-Security

Master, part-time

Overview

The intertwinement of telecommunications, mobile communications and data networks is turning IT security into an explosive topic and a key risk factor in today's businesses. Services such as e-commerce, e-government or digital media and their copyright protection severely stress data, network and transmission security. In the Master's degree program you will be specializing in aspects of technical security and the "human risk factor"

Apply now
Contact us

Contact us!

Magdalena Brandeis, BA
Marina Paukovits
Julia Paukovits-Grünauer (leave)
Favoritenstraße 226, B.3.20 
1100 Vienna
T: +43 1 606 68 77-2460
F: +43 1 606 68 77-2469
informatik@fh-campuswien.ac.at

Office hours during the semester
Mon, 8.00-12.00 a.m. and 1.30-6.00 p.m.
Tue, 9.00-12.00 a.m. and 1.30-7.30 p.m.
Wed, 9.00-12.00 a.m. and 1.30-6.00 p.m.
Thu, 8.00-12.00 a.m.


Frau Herr

Ihre E-Mail wurde versendet

Stay up to date

Stay up to date!

Duration of course
4 Semester
Final degree
Master of Science in Engineering (MSc)
25Study places
120ECTS
Organisational form
part-time

Application period for academic year 2018/19

25th September 2017 to 30th June 2018

2tuition fee / semester:

€ 363,36*

+ ÖH premium + contribution**

 

* Tuition fees for students from third countries € 727 per semester

 

**for additional study expenses
(currently up to €83 depending on degree program and year)

What you can offer

Data protection and system security are your top priority. You have the ability to identify potentially weak points in systems and networks. This motivates you to find suitable measures to prevent manipulation and to block unauthorized access. New technologies arouse your interest - yet always with guaranteed security standards in mind. Your are familiar with encryption methods and you would like, in your Master's degree program, to delve deeper into cryptography as a field for research and application.

What we offer you

IT security is a highly agile field. Attacks on servers and networks are getting increasingly sophisticated. Our state-of-the-art network laboratory where you may refine your strategies for preventing unauthorized access and develop measures and scenarios for protection is at your disposal. You will have the opportunity of participating in research and development (R&D) projects, engaging in active exchange between science and practice at the university. The degree program also includes an own "IT security competence team", working in close cooperation with companies. The research focuses on the transmission of data, safe from manipulation or eavesdropping.

What makes this degree program special

The number of mobile end devices will continue to increase and thereby also the demands made on data security for these tiny devices with their weak computing power. Sensor nodes which, albeit very versatile, are also small and have limited computing capacity and very little storage space are another example. Contrasting with these, we have the Cloud with its seemingly infinite computing and storage resources. The IT Security Master's degree program addresses both these developments in its research program.

The course experts implement, evaluate and compare a diversity of cryptographic algorithms in the affiliated Competence Center for IT Security.

The goal is to establish easily realizable secure data encryption options in practice. Findings are directly incorporated into the degree program to assuring you, the Master's student, of a decisive advantage of knowledge. The specialist know-how of our lecturers is also in high demand internationally. Experts of the IT Security Competence Center are often asked to participate as speakers at international conferences on data security and data protection. Papers published by the IT experts often receive awards such as the FH Best Paper Award, repeatedly awarded to FH Campus Wien.


Curriculum

Grundstudium

Lecture SWS ECTS
Distributed Systems Dependability ILV

Distributed Systems Dependability ILV

Lector: Mag. Dipl.-Ing. Dr.techn. Lorenz Froihofer, Priv.-Doz. Mag. DI. DI. Dr.techn. Karl Michael Göschka

2 SWS
4 ECTS

Lecture contents

* Dependability and Fault Tolerance
* Distributed Agreement
* Group Communication and Membership
* Consistency and Replication
* Transactions

Assessment methods

Lecture: written exam, Distance Learning: Students' project in small groups

Teaching methods

LecturePractical work in small groups

Language

German

2 4
Introduction to Cryptography VO

Introduction to Cryptography VO

Lector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler

2 SWS
3 ECTS

Lecture contents

In this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality.

Assessment methods

Final written exam

Teaching methods

Presentation with slides and video projector, additional explanations on the whiteboard

Language

German

2 3
Introduction to Cryptography Übung UE

Introduction to Cryptography Übung UE

Lector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler, Dipl.-Ing. Manuel Koschuch, Bakk.techn.

1 SWS
2 ECTS

Lecture contents

In this lecture basic principles of cryptography such as symmetric and asymmetric encryption as well as data security will be discussed. The main topics are for example the process of encryption and decryption of data, digital signatures, general cryptographic protocols and the practical field of operation of these mechanisms. Current approaches like elliptic curves are also dealt with. In addition to the related key management aspects like the comprehensive security infrastructure will be addressed. Tangible examples of use are shown for illustration and for getting familiar with the functionality.
In the tutorial the students have the possibility to practise the formerly presented approaches, getting more familiar with them. Approaches of possible cryptanalysis will also be discussed.

Assessment methods

continous examination

Teaching methods

Presentation, discussion and solving problems

Language

German

1 2
Information Management ILV

Information Management ILV

Lector: Mag. Dipl.-Ing. Dr.techn. Wolfgang Radinger-Peer

2 SWS
4 ECTS

Lecture contents

• Goals, tasks, architectures and methods of information management
• Risk Management
• Big Data
• Case studies in small groups

Assessment methods

Collaboration during the lecture and presentation of an spezific topic

Teaching methods

Speech with slides, case studies in small groups

Language

German

2 4
Communicative and Social Competences ILV

Communicative and Social Competences ILV

Lector: Dipl.Ing. Franz Gober, MBA

2 SWS
2 ECTS

Lecture contents

Basic assumptions of comunication - main focus body language, presentation technics; social skills: ability of encountering, effective communication strategy, feedback, using feedback, impact of feedback. Rhetorical basics: Use of different discussion technics and questioning technics and feedback strategies, facilityting and inhibiting behaviour in communication. Conflict management, understanding conflicts, working on conflicts and methods.Selective perception and constructivism.

Assessment methods

Physical presenceActive cooperation Seminar paperReview-Journal

Teaching methods

Individual work, work in smaller and larger groups, teacher-centred information phases, review-journal

Language

German

2 2
Cryptographic Methods in IT ILV

Cryptographic Methods in IT ILV

Lector: DI Mathias Tausig

2 SWS
3 ECTS

Lecture contents

The course gives a broad view across the possibilites of cryptographic methods in a typical workday, especially those of a SysAdmin. For alll subjects, the theoretic background is presented alongside the practical usage implications.

The subjets consist of:

* Hard disk encryption
* SSH & Network tunneling
* E-mail security
* Data encoding using ASN.1
* Public Key Infrastructure

Assessment methods

Exercices and a final exam

Teaching methods

Theoretical lectures and individual tasks for all subjects

Language

German

2 3
Network Defense Technologies ILV

Network Defense Technologies ILV

Lector: Dipl.-Ing. Manuel Koschuch, Bakk.techn., DI(FH) Roland Supper

2 SWS
4 ECTS

Lecture contents

- Overview of Threats
- Firewalls (stateless/stateful)
- Intrusion Detection and Prevention
- IPsec-based VPNs
- Overview over SSL and TLS and other VPN-Technologien (L2TP, PPTP, MPLS)
- Advanced Persistent Thretas
- Expert Speeches

Assessment methods

Written final Exam

Teaching methods

Lecture with slides, whiteboard and external expert speechesLab Exercises

Language

German

2 4
Secure Software Development VO

Secure Software Development VO

Lector: DI Mathias Tausig

2 SWS
3 ECTS

Lecture contents

* Versioncontrol
* Test Driven Development
* Secure Development Lifecycle
* Risk analysis
* Security errors

Assessment methods

* Final exam* Grading of the presentations

Teaching methods

* Lessons* Presentations by student groups

2 3
Secure Software Development Übung UE

Secure Software Development Übung UE

Lector: DI Mathias Tausig

2 SWS
3 ECTS

Lecture contents

* Usage of git
* Usage of TDD
* prevention of security bugs

Assessment methods

Grading of the projects

Teaching methods

Programming exercises

2 3
Wireless Network Security VO

Wireless Network Security VO

Lector: DI (FH) Peter Krebs

1 SWS
2 ECTS

Lecture contents

- Basics of wireless network communication
- Security aspects of wireless networks
- Concrete wireless technologies and their security mechanisms
- WLAN (IEEE 802.11)
- Bluetooth
- IEEE 802.15.4/6LoWPAN/ZigBee
- Near Field Communication
- Cellular Networks

Assessment methods

Written final exam

Teaching methods

Lecture

Language

German

1 2

Grundstudium

Lecture SWS ECTS
Applied Cryptography ILV

Applied Cryptography ILV

Lector: DI Mathias Tausig

2 SWS
3 ECTS

Lecture contents

The practical par of this course teaches the use of cryptohraphic libraries.

The theoretical part constists of:

- Key generation
- Random numbers
- Authenticated Encryption
- Padding

Assessment methods

Grading of the coding tasks and a final exam

Teaching methods

- Lectures- Coding exercises

Language

German

2 3
Application Security ILV

Application Security ILV

Lector: Mag.a Dr.in Sigrid Schefer-Wenzl, MSc BSc

2 SWS
3 ECTS

Lecture contents

- SW Engineering methods and process models
- Android App development
- Security aspects of Android

Assessment methods

Examination, learning diary, project

Teaching methods

- inverted classroom- e-learning- lectures and tutorials- autonomous project work- coaching

Language

German

2 3
Cyber-Security ILV

Cyber-Security ILV

Lector: Privatdozent Dipl-Ing. Mag. Dr. Edgar Weippl

2 SWS
3 ECTS
2 3
Cryptographic Protocols ILV

Cryptographic Protocols ILV

Lector: DI Dr. Ulrich Haböck

2 SWS
3 ECTS

Lecture contents

This course discusses popular authentication and communication protocols and gives an impression of the versatile applicability of modern cryptography.

- Authentication protocols: elementary notions (challenge response, zero knowlegde), Kerberos,
- Communication protocols: TLS and known attacks on TLS <=1.2, what is new in TLS 1.3, Noise, OTR and Signal.

Further topics are chosen at request, e.g. auditable PKIs (Certificate Transparency, CONIKS), crypto currencies (central e-Cash and Bitcoins blockchain), voting protocols, secret sharing, searchable encryption.

Assessment methods

Final written exam

Teaching methods

Classic whiteboard lectures, exercise classes where appropriate.

Language

German-English

2 3
Security Lab LB 4 10
Service Computing and Cloud Security ILV

Service Computing and Cloud Security ILV

Lector: Priv.-Doz. Mag. DI. DI. Dr.techn. Karl Michael Göschka, DI Dr. Johannes Osrael, DI Mathias Tausig

3 SWS
4 ECTS

Lecture contents

Distributed Information Systems
Middleware
Enterprise Application Integration
Web Application Integration und Web Services Concepts
Component-based Software Engineering
Basic Web Services Technology
Service Coordination Protocols
Service Composition und Business Process Integration
Web Integration
Cloud Basics
Web Service and Cloud Security

Assessment methods

Lecture: written exam, Distance Learning: Students' project in small groups

Teaching methods

LectureDistance EducationPractical work in small groups

Language

German

3 4
Business and Ethics ILV

Business and Ethics ILV

Lector: Mag. Georg Conrad-Billroth, MSc (CS)

3 SWS
4 ECTS

Lecture contents

Business and ethics consists of:
Introduction and basic principles
legal structure of companies and business organization
The enterprise and its environment
Ethics in business
Human resources management
Marketing & sales & ethics
Procurement and logistics
Production
Accounting and finance

Assessment methods

continuous assessment, assessment of presentations and teamwork, final exam

Teaching methods

Lecture with PowerPoint slides and exercises.The ppt slides and handouts will be provided

Language

German

3 4

Grundstudium

Lecture SWS ECTS
Cyber-Crime Defense ILV 2 3
Digital Forensics VO

Digital Forensics VO

Lector: Dipl.-Ing. Katharina Krombholz, Dipl.-Ing. Dr. Martin Schmiedecker

2 SWS
2 ECTS

Lecture contents

- Forensic Methods
oFile System Forensics
oNetwork Forensics
oOperating System Forensics
oExamination of Application Data
oTime Line Analysis
oKeyword Search

Assessment methods

written exam

Teaching methods

Lessons are held, using at least some of following didactics: - Ex-cathedra teaching - Independent working in groups - Interactive Media Support - Computer room lessons

2 2
Digital Forensics Übung UE

Digital Forensics Übung UE

Lector: Dipl.-Ing. Katharina Krombholz, Dipl.-Ing. Dr. Martin Schmiedecker

1 SWS
2 ECTS

Lecture contents

Practical assignments in the scope of the lecture.

Assessment methods

Graded point of the reports

Teaching methods

Written reports

1 2
Interdisciplinary Project PJ

Interdisciplinary Project PJ

Lector: Dipl.-Ing. Manuel Koschuch, Bakk.techn., Julia Scheidinger, BSc

4 SWS
10 ECTS

Lecture contents

Summary of the essential aspects of project- and process-management, as well as system safety, and their practical meaning in concrete examples.
Clarification of the differences between safety and security, and of the interfaces between these two areas.
Diskussion and reflection of the insights from practical application of the above concepts.

Assessment methods

Assessment of the submitted implementation and the presentations.

Teaching methods

Implementing and presenting a practical example in small groups.

Language

German

4 10
Mobile and Embedded Security VO

Mobile and Embedded Security VO

Lector: Silvia Schmidt, MSc, DI Mathias Tausig

2 SWS
3 ECTS

Lecture contents

ASN.1
Smartcards
Constrained Networking
Mobile Authentication
RIOT-OS
Secure Firmware Update
Internet-of-Things (IoT-Security)
Overview Embedded C

Assessment methods

Intermediate tests, distance/remote learning, final exam.

Teaching methods

Lectures and remote/distance learningEnglish slides

Language

English

2 3
Mobile and Embedded Security Übung UE

Mobile and Embedded Security Übung UE

Lector: Silvia Schmidt, MSc, DI Mathias Tausig

1 SWS
2 ECTS

Lecture contents

Implementations of the following subjects:

* Usage of cryptographic functions in RIOT-OS
* Smartcard usage

Assessment methods

The grade will be calculated based on the projects

Teaching methods

Programming in groups

Language

German

1 2
Security Management ILV

Security Management ILV

Lector: Dipl.-Ing. Manuel Koschuch, Bakk.techn.

2 SWS
3 ECTS

Lecture contents

- IT-Security Management and Risk Assessment
- IT-Security Controls, Plans, and Procedures
- Physical and Human Resources Security & Security Audit
- Access Control Management
- Overview of the ISO 27000-family, COBIT, ITIL and BSI Grundschutz

Assessment methods

1/3: Case study1/3: Group assignment1/3: Exam

Teaching methods

Lecture, case study, group assignment

Language

English

2 3
Business Crime SE

Business Crime SE

Lector: Dipl.Ing. Franz Gober, MBA

2 SWS
3 ECTS

Lecture contents

- values and needs espessially in working environment
- typologies of behaviour and inward urge
- change management poresses and impact
- Reasons for conflicts, behaviour during conflicts, and escalation
- behaviour pattern and situational behaviour in economic crime
- forms of economic crime
- examples of ecomonic crime and working it up
- future trends and development in economic crime

Assessment methods

Physical presenceActive cooperation Seminar paperReview-Journal

Teaching methods

PresentationWork on cases in small groupsSubject specific discussions in the classSeminar paperReview-journal

Language

German

2 3
Academic Research and Writing ILV

Academic Research and Writing ILV

Lector: Dipl.-Ing. Manuel Koschuch, Bakk.techn.

2 SWS
2 ECTS

Lecture contents

An important part of a comprehensive academic education is to aquire the qualification to treat problem statements from a scientific point of view. Therefore, an introduction to scientific work, writing, and well established methodologies will be taught in this course.

Assessment methods

The evaluation is based on the submitted material (disposition, paper, reviews) as well as on the presentations.

Teaching methods

During this course a scientific conference will be simulated. After a brief introduction to scientific writing, the attendees of this course shall treat a problem statement of a given field of research for which they shall prepare disposition that briefly describes the chosen topic. Based on it, a draft version of the scientific article will be written (draft paper). Afterwards, these draft versions of the papers will be critically reviewed by other colleagues (peer reviewing). Based on their reviews, a revised version of the scientific paper shall be created (camera-ready paper). At the end of this course, the scientific papers will be presented by the authors.

Language

German

2 2

Grundstudium

Lecture SWS ECTS
Master Thesis MT

Master Thesis MT

Lector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler

0 SWS
20 ECTS

Lecture contents

Autonomous authoring of a special, science-based theme under guidance by a supervisor, elaboration of the master's thesis

Assessment methods

Approbation of the master's thesis

Teaching methods

Diploma thesis: Autonomous scientific work under guidance by a supervisor

Language

German-English

0 20
Master Thesis Seminar SE

Master Thesis Seminar SE

Lector: FH-Prof. Dipl.-Inform. Dipl.-Wirt.Inform. Matthias Peter Hudler

2 SWS
2 ECTS

Lecture contents

The students present the current state of their Master's Thesis at regular intervals and discuss their work with the audience.

Assessment methods

Continous examination

Teaching methods

Presentations by the students

Language

German-English

2 2
Human Perception and Behaviour VO 2 3
Privacy in Internet VO

Privacy in Internet VO

Lector: Dr. Sandford Bessler

2 SWS
2 ECTS

Lecture contents

The lecture will give an overview on the technologies and the application areas of e-privacy protection:
- Definitions, Future scenarios of privacy
- Legal privacy environment
Technologies:
- Identity management
- Anonymous communication
- Privacy policies
- Database privacy

Application areas:
- Vehicular privacy, Location privacy
- Search engine privacy,
- Social network privacy,
- Privacy and the Smart grid

Assessment methods

Home work exercises and student presentation (40%) - Students will form small teams - Topics for the student presentation will be given (research papers) and presentation dates will be fixed Final written exam (60% of the grade)

Teaching methods

Frontal teaching using slide presentations and online sources. 2-3 home works to support learningDiscussions about certain privacy topics are welcome.

Language

English

2 2
Legal Framework of Privacy Policies ILV 2 3

Times
5.30 p.m.-7.00 p.m. and 7.15 p.m.-8.45 p.m.

As a service to students, the IT Security degree program offers six elective subjects in the third semester, of which three courses must be selected (instead of the fixed assignment of courses to areas of specialization). An elective subject is only offered if it is selected by at least three students. This change offers students more flexibility at no extra cost.


Career opportunities

Graduates are active in both the core information technology and telecommunications industries as well as in sector spanning positions. Your task will be to design and implement comprehensive security solutions. You will specify, plan, integrate, test and operate voice and data networks, taking into account the necessary security standards. You will work in the following areas:

  • Companies with their own IT infrastructure
  • Banks and insurance companies
  • Companies in electronic commerce
  • Authorities and public institutions
  • Online service providers
  • Service providers (cable/radio network providers, telecom)
  • Entertainment industry and media companies
  • Software development companies and system integrators
  • Security services
  • Data centers
  • Consulting firms

Admission

Admission requirements

  • A Bachelor degree or diploma certificate from an institute of higher education with a total of 180 ECTS credits with at least 50 ECTS credits in the relevant subjects of information technology, software engineering and network engineering. In exceptional cases, the University Council will make a joint decision with the Program Director.
  • Equivalent certification from abroad

Equivalence is determined by international agreements, validation or in individual cases a decision by the head of the academic section.

Application

To apply you will require the following documents:

  • Birth certificate
  • Proof of citizenship
  • Proof of residence
  • A Bachelor degree or diploma certificate/equivalent certification from abroad and CV in table form.

Please note:

It is not possible to save incomplete online applications. You must complete your application in one session. Your application will be valid as soon as you upload all of the required documents and certificates. In the event that some documents (e.g. references) are not available at the time you apply, you may submit these later via e-mail, mail or in person by no later than the start of the admission process.

The selection process

The selection process examines the technical aptitude of the applicants for the Master's degree program. It consists of a written test and an interview. The secretary's office will notify you of the date for the selection process.

  • Aim
    The aim is to ensure places are offered to those persons who complete the multi-level selection process with the best results. The test procedures are customized for the skills required in your preferred career.
  • Procedure
    The written selection test assesses your logical thinking processes and your understanding of scientific processes. This test will not assess your existing knowledge, but will examine your aptitude for an education in science. All applicants will afterwards be invited to a selection interview to establish your ability and readiness to learn, your motivation in your selection of the degree program and career, your personal aptitude and your verbal communication skills.
  • Criteria
    > The criteria for acceptance are based solely on performance. Points are awarded for the written test results and the selection interview. The applicants will be ranked correspondingly.
    > The geographical origin of the applicant has no influence on the selection decision.
    > The admission requirements must be met in all cases.
    > The process as a whole and all test and assessment results from the selection process are documented in a transparent and verifiable manner.

Getting Started

Buddy network

Experience shows that many questions arise during the application phase and the start of the degree program. We therefore propose that interested persons and applicants should network with higher semester students in the same degree program as yours. Personal and individual contact with your buddy should facilitate your entry into the degree program.

To the Buddy network


Contact

Secretary's office

Magdalena Brandeis, BA
Marina Paukovits
Julia Paukovits-Grünauer (leave)
Favoritenstraße 226, B.3.20 
1100 Vienna
T: +43 1 606 68 77-2460
F: +43 1 606 68 77-2469
informatik@fh-campuswien.ac.at

Office hours during the semester
Mon, 8.00-12.00 a.m. and 1.30-6.00 p.m.
Tue, 9.00-12.00 a.m. and 1.30-7.30 p.m.
Wed, 9.00-12.00 a.m. and 1.30-6.00 p.m.
Thu, 8.00-12.00 a.m.

Teaching staff and research staff


Cooperations and Campusnetzwerk

We work closely with renowned companies in commerce and industry, with universities, institutions and schools. This guarantees you contacts for employment or participation in research and development. In the course of exciting school cooperations, students may contribute to firing up pupils on topics such as our Bionics Project with the Festo company. You can find information about our cooperation activities and much more at Campusnetzwerk. It's well worth visiting the site as it may direct you to a new job or interesting event held by our cooperation partners!

Campusnetzwerk