IT Security
Progressive digitization and networking are continuously changing our lives and now influence a significant part of our daily activities. This results in many new possibilities and opportunities, but also great risks, e.g. through data theft or data manipulation as well as surveillance. The IT Security study profile focuses on cryptographic processes and especially on their use in complex IT systems. Security plays a central role in this, but legal aspects such as data protection, privacy, and the needs and limits of state surveillance in the use of security systems also play a decisive role. Graduates of the "IT Security" study profile should acquire knowledge of cryptographic procedures and, above all, their use in complex IT systems. This should enable them to assess the security of IT systems. Through additional competencies, e.g. from law, legal boundary conditions of IT security such as data protection, privacy as well as demands and limits of state monitoring in the use of security systems are taught; graduates should be able to assess these and take them into account in the development of IT security systems.
German name: IT-Sicherheit
Designated Speaker / Deputy Speaker: Prof. Jörn Müller-Quade / Dr. Willi Geiselmann
Special competencies acquired in the profile:
- Graduates are familiar with the underlying technologies, particularly in cryptography and IT security, and can analyze and evaluate them.
- They know relevant legal framework conditions and can take these into account in the development and use of IT security systems.
- master thesis from the subject area of IT security.
- the root module Security must be taken. If the root module has already been examined in the Bachelor's degree, more CP from the specialization subject "Kryptographie und Sicherheit" must be taken.
- Modules from the specialization "Kryptographie und Sicherheit" (compulsory elective block) amounting to at least 15 CP (in addition to the root module Security) must be taken.
- further thematically appropriate seminars, internships or research practice can be taken in consultation with the profile coordinator.
- a total of at least 45 CP from 2.-4. and the elective block must be completed. A maximum of 9 CP can be taken from the complementary subject.
V=Vorlesung (Lecture), S=Seminar (Seminar), P=Praktikum (Practical course), Ü=Übung (Practice)
Compulsory block (6 CP) | Course | Module | Partial achievement | CP | Course type |
IT-Sicherheit (root module) former: Sicherheit (root module) |
M-INFO-106315 | T-INFO-112818 | 6 | V | |
compulsory elective subject: courses from Area of Specialization "Kryptographie und Sicherheit" (at least 15 CP) | Course | Module | Partial achievement | CP | Course type |
Access Control Systems: Models and Technology früher bis WS 22/23 Access Control Systems: Foundations and Practice |
M-INFO-106303 | T-INFO-112775 | 5 | V | |
Authentisierung und Verschlüsselung | M-INFO-105338 | T-INFO-110824 | 4 | V | |
Betriebssystemsicherheit | M-INFO-105470 | T-INFO-111016 | 3 | V | |
Decentralized Systems: Fundamentals, Modeling, and Applications | M-INFO-105334 | T-INFO-110820 | 4 | V | |
IT-Sicherheitsmanagement für vernetzte Systeme | M-INFO-100786 | T-INFO-101323 | 5 | V | |
Komplexitätstheorie, mit Anwendungen in der Kryptographie | M-INFO-101575 | T-INFO-103014 | 6 | V | |
Kryptographische Protokolle | M-INFO-105631 | T-INFO-111261 | 3 | V | |
Kryptographische Wahlverfahren | M-INFO-100742 | T-INFO-101279 | 3 | V | |
Maschinelles Lernen für die Computersicherheit | M-INFO-105376 | T-INFO-110859 | 3 | V | |
Post-Quantum Cryptography | M-INFO-105585 | T-INFO-111200 | 3 | S | |
Praktische Einführung in die Hardware Sicherheit | M-INFO-104357 | T-INFO-108920 | 6 | V | |
Praktikum: Anwendungssicherheit | M-INFO-103166 | T-INFO-106289 | 4 | P | |
Praktikum aus der Kryptographie (not applicable from SS 2024) | M-INFO-101558 | T-INFO-102989 | 3 | P | |
Praktikum: Hands-On Computer Security (Seclab) | M-INFO-105654 | T-INFO-111292 | 4 | P | |
Praktikum: Intelligente Datenanalyse (Datalab) | M-INFO-105494 | T-INFO-111038 | 4 | P | |
Praktikum: Intelligente Systemsicherheit | M-INFO-105493 | T-INFO_111037 | 4 | P | |
Praktikum: Kryptoanalyse | M-INFO-101559 | T-INFO-102990 | 3 | P | |
Praktikum: Penetration Testing | M-INFO-104895 | T-INFO-109929 | 4 | P | |
Praktikum: Sicherheit | M-INFO-101560 | T-INFO-102991 | 4 | P | |
Privacy Enhancing Technologies | M-INFO-105452 | T-INFO-110989 | 6 | V | |
Quantum Information Theory | M-INFO-105408 | T-INFO-110904 | 3 | S | |
Resilient Networking | M-INFO-105591 | T-INFO-111209 | 6 | V | |
Scientific Methods to Design and Analyze Secure Decentralized Systems | M-INFO-105780 | T-INFO-111568 | 5 | V/Ü | |
Seminar: Ausgewählte Themen der Public-Key-Kryptographie | M-INFO-105586 | T-INFO-111201 | 3 | S | |
Seminar: Hot Topics in Security of Machine Learning | M-INFO-106394 | T-INFO-112919 | 4 | S | |
Seminar: Kryptoanalyse | M-INFO-105337 | T-INFO-110823 | 3 | S | |
Seminar: Kryptographie
not eligible from SS 2024 |
M-INFO-101561 | T-INFO-102992 | 3 | S | |
Seminar: Sicherheit
not eligible from SS 2024 |
M-INFO-101562 | T-INFO-102993 | 3 | S | |
Signale und Codes | M-INFO-100823 | T-INFO-101360 | 3 | V | |
Sicherheit von Maschinellem Lernen | M-INFO-105869 | T-INFO-111802 | 3 | V | |
Symmetrische Verschlüsselungsverfahren | M-INFO-100853 | T-INFO-101390 | 3 | V | |
Theoretische Grundlagen der Kryptographie | M-INFO-105584 | T-INFO-111199 | 6 | V | |
Universal Composability in der Kryptographie | M-INFO-105783 | T-INFO-111584 | 3 | V | |
Elective block: courses from the field of IT Security | Course | Module | Partial achievement | CP | Course type |
all modules from Supplementary subject Betriebswirtschaftslehre | 9 | V | |||
all modules from Supplementary subject Recht | 9 | V | |||
Cybersicherheit für industrielle Automatisierungs- und Steuerungsanlagen | M-INFO-106355 | T-INFO-112880 | 4 | V | |
Einführung in das Quantencomputing (IQC) | M-INFO-106101 | T-INFO-112344 | 3 | V | |
Formale Systeme | M-INFO-100799 | T-INFO-101336 | 6 | V | |
Internet of Everything | M-INFO-100800 | T-INFO-101337 | 4 | V | |
Netzsicherheit: Architekturen und Protokolle | M-INFO-100782 | T-INFO-101319 | 4 | V | |
Research Focus Class: Blockchain & Payment Channel Networks | M-INFO-105620 | T-INFO-111251 | 3 | V | |
T-INFO-111252 | 3 | S | |||
Sprachtechnologie und Compiler | M-INFO-100806 | T-INFO-101343 | 8 | V | |
Theorembeweiserpraktikum: Anwendungen in der Sprachtechnologie | M-INFO-102666 | T-INFO-105587 | 3 | V | |
Praktikum: Access Control Systems | M-INFO-104164 | T-INFO-108611 | 4 | P | |
Praktikum: Dezentrale Systeme und Netzdienste | M-INFO-103047 | T-INFO-106063 | 4 | P | |
Praktikum: Programmverifikation | M-INFO-101537 | T-INFO-102953 | 3 | P | |
Seminar: Dezentrale Systeme und Netzdienste | M-INFO-103048 | T-INFO-106064 | 3 | S | |
Seminar: Hot Topics in Decentralized Sytems |
M-INFO-104891 | T-INFO-109922 | 3 | S | |
Seminar: Hot Topics in Explainable Artificial Intelligence (XAI) | M-INFO-106392 | T-INFO-112917 | 4 | S | |
Seminar: Hot Topics in Machine Learning for Computer Security | M-INFO-106393 | T-INFO-112918 | 4 | S | |
Seminar: Privacy und Technischer Datenschutz | M-INFO-105224 | T-INFO-110597 | 4 | S | |
Seminar: Privatsphäre und Sicherheit | M-INFO-106391 | T-INFO-112916 | 4 | S | |
Seminar: Schwachstellensuche not eligible from SS 2023 |
M-INFO-105377 | T-INFO-110860 | 4 | S | |
Seminar: Secure Multiparty Computation | M-INFO-105761 | T-INFO-111501 | 3 | S | |
Software Security Engineering | M-INFO-106344 | T-INFO-112862 | 3 | V | |
Virtuelle Systeme | M-INFO-100867 | T-INFO-101612 | 3 | V |