Cyber Security (CSE) - SPECTRO

Entry points, 1st year, Common Courses

Academic year 2024/2025

Eötvös Loránd University (ELTE)

Programme website

Programme Coordinator: Dr. Peter Burcsi, bupe@inf.elte.hu

FIRST SEMESTER

Compulsory Courses (18 ECTS) ECTS
Research Methodology 5
Symmetric Key Cryptography 4
Introduction to Offensive Security I. 4
Privacy-enhancing Technologies 4
Introductory Mathematics for Cybersecurity Specialisation 1
I&E (10 ECTS)  
I&E Basics 6
Business Development Lab I. 4


SECOND SEMESTER

Compulsory Courses (18 ECTS) ECTS
Design and Analysis of Algorithms 4
Public Key Cryptography 4
Introduction to Offensive Security II. 4
Advanced Software Technology 4
Network Security 2
I&E (14 ECTS)  
Innosocial Aspects of the Entrepreneurship 6
Thematic Summer Schools with I&E project 4
Business Development Lab II. 4

Babeș-Bolyai University (UBB)

Programme website

Programme Lead: Assoc. prof. Darius Bufnea: darius.bufnea@ubbcluj.ro, cyber-master@cs.ubbcluj.ro

FIRST SEMESTER

Compulsory Courses (17 ECTS) ECTS
Cryptography 7
Security Audit and Risk Management 6
Computer Ethics and Academic Integrity 4
I&E Compulsory Course (8 ECTS)  
Digital Economy Principles - I&E basics 8
I&E Elective Courses (5 ECTS)  
Agile Project Management 5
Strategic Business Process Automation 5
Business Intelligence for Entrepreneurs 5


SECOND SEMESTER

Compulsory Courses (12 ECTS) ECTS
Web and Internet Security 6
Quality Aspects of Security in Software Testing 6
I&E Compulsory Courses (11 ECTS)  
Innovation Management - I&E Business Dev Lab 7
(Thematic Project with Innovation Challenge) EIT Digital Summer School 4
Elective Courses (7 ECTS)  
Network Security and Administration 7
Blockchain Security 7
Complex Networks in Security 7
Quantum Cryptography 7

University of Rennes

Programme website

Academic Coordinator: Mohamed Sabt, mohamed.sabt@irisa.fr

FIRST SEMESTER

Compulsory Courses (20 ECTS) ECTS
Introduction to Security 5
Software Engineering and Security 5
Operating Systems and Security 5
Network Security 5
Elective Courses  
I&E  
Introduction to Innovation and Business 5
Knowledge and Intangible Assets Management 5
Business Development Laboratory 1 5


SECOND SEMESTER

Compulsory Courses (20 ECTS) ECTS
Algorithmics for Security 5
Privacy 5
System Security 5
Software Security 5
Elective Courses  
I&E  
Business Development Laboratory 2 5
Summer School 4

University of Trento (UniTN)

Programme website

Programme Lead: Bruno Crispo, bruno.crispo@unitn.it

FIRST & SECOND SEMESTER

Compulsory Courses (36 ECTS) ECTS
Introduction to Computer and Network Security 6
Cryptography 6
Software Security Testing 6
Cyber Security Risk Assessment 6
Network Security 6
Privacy and IPR 6
Advanced and Eligible Courses  
Machine Learning 6
Data Hiding 6
Formal Techniques for Crypto Protocol Analysis 6
Laboratory on Offensive Technologies 12
Finite Fields and Symmetric Cryptography 6
Distributed Systems 2 6
Innovation and Entrepreneurship Courses  
Innovation and Entrepreneurship Basics (Economics and Management) 6
Business Development Lab 9
ICT Innovation - Product Design and Development 6-9
I&E Studies 6

University of Turku (UTU)

Programme website

Academic Coordinator: Dr Seppo Virtanen, seppo.virtanen@utu.fi

FIRST & SECOND SEMESTER

Compulsory Courses (31 ECTS) ECTS
System and Application Security 5
Network Infrastructure Technologies and Security 5
Human Element in Information Security 5
Management of Information System Security 6
Foundations of Cryptography 5
Cryptography I 5
Innovation and Entrepreneurship  
Introduction to Innovation and Business 5
Lean Digital Business Design 10
Summer School 4
Elective Courses (choose one)  
Knowledge and Innovation Management 5
Enterprise Architecture 6
Digital Economy and Business Models 3-6

University of Twente (UT)

Programme website

Programme Lead: Florian Hahn, f.w.hahn@utwente.nl  

FIRST SEMESTER

Compulsory Major Courses (15 ECTS) ECTS
Cyber Risk Management 5
Security and Cryptography 5
Software Security 5
Compulsory I&E Courses (15 ECTS)  
I&E Basics: Innovation and Entrepreneurial Finance for EIT 5
Business Development Lab I 5
Computer Ethics 5
Optional Courses  
Economics of Security 5
System Validation (only in comb. w/ SeV, if needed) 5
Basic Machine Learning (only in comb. w/ CDA, if needed) 5
I&E: Brand Management 5
I&E: Bioresource Business Development & Management 5
Introduction to Biometrics 5
Cyber Security Management 5
Distributed Systems (only in comb. w/ BCT, if needed) 5
I&E: Bioresource Supply Chain Management 5

 

SECOND SEMESTER

Compulsory Major Courses (15 ECTS) ECTS
Internet Security 5
Privacy-Enhancing Technologies 5
System Security 5
Compulsory I&E Courses (5 ECTS)  
Business Development Lab II 5
Optional Courses  
Software Testing and Reverse Engineering 5
Blockchain & Distr. Ledger Tech. (check w/ teacher if DiS req.) 5
Security Verification (check w/ teacher if SyV req.) 5
Cyber Crime Science 5
I&E: Global Strategy and Business Development 5
Cyber Data Analytics (check w/ teacher if MaL req.) 5
E-Law 5
Security Services for the Internet of Things 5
I&E: Information Systems for the Financial Services Industry 5
I&E: Empirical Methods for Designers 5

Exit points, 2nd year, Specialisation

Academic year 2025/2026

Eötvös Loránd University (ELTE)

Programme website

Programme Coordinator: Dr. Peter Burcsi, bupe@inf.elte.hu

THIRD & FOURTH SEMESTER

  • SPECIALISATION #1: Advanced Cryptography

The specialisation focuses on the general ideas, techniques and methods of applied cryptography as well as on the theoretical background and solid knowledge, putting security in a wider context. Security and privacy are considered both from the technological and from the economic point of view, which supports decisions in many practical cases. Applied cryptography serves as a base for most of the secure IT systems (e.g. in Future Media and Content Delivery, Smart Spaces, Digital cities, Health and ICT-Mediated Human Activity, and Enabling the Internet of the Future).

Compulsory Courses (24 ECTS) ECTS
Cyber Security Lab I. 4
Secure Multiparty Computation 4
Zero-knowledge proofs and application 4
Topics in cryptography seminar 4
Cryptographic Protocols 6
Provably Secure Modular Design of Cryptographic Protocols 4
Preparation course for master studies and developing learning skills (It can be substituted with any other technical CSE course) 2
I&E (6 ECTS)  
I&E Study 6
  • SPECIALISATION #2: Quantum-resistant Cryptography

The specialisation focuses on the general ideas, techniques and methods of security in the coming era of quantum technology. The theoretical background gives a solid understanding of cryptographic aspects and supports technological and economic decisions on security. In order to maintain the security and privacy of IT systems (e.g. in Future Media and Content Delivery, Smart Spaces, Digital cities, Health and ICT-Mediated Human Activity, and Enabling the Internet of the Future) when quantum devices are around, new physical communication layers, novel computational architecture and cryptographic protocols may be used. Quantum-resistant cryptography serves as a base to understanding and overcoming these challenges.

Compulsory Courses (24 ECTS) ECTS
Cyber Security Lab I. 4
Introduction to Quantum Information 4
Post-quantum Cryptography 4
Topics in cryptography seminar 4
Cryptographic Protocols 6
Provably Secure Modular Design of Cryptographic Protocols 4
Preparation course for master studies and developing learning skills (It can be substituted with any other technical CSE course) 2
I&E (6 ECTS)  
I&E Study 6


Peter Burcsi is an Associate Professor, Head of the Department of Computer Algebra at the Faculty of Informatics, ELTE - Eötvös Loránd University, Budapest. His research areas are algorithms in elementary number theory and cryptography. He has participated in several security-related research and industrial projects at ELTE.

EURECOM

Programme website

Academic Coordinator: Prof. Dr. Antonio Faonio, master-eit-cse@eurecom.fr

Dr. Antonio Faonio is a « Maître de Conférences » at EURECOM since July 2020. Previously, he held a postdoctoral researcher position at IMDEA Software Institute and Aarhus University. He got a Ph.D. in Computer Science at "Sapienza" Univ. of Rome. His research interest is in cryptography.

SPECIALISATION: Big Data Security

EURECOM is offering a specialization in Big Data Security that aims at providing a solid knowledge of security in cloud computing and networking combined with practical design and management skills. The students learn how to identify threats, vulnerabilities and privacy problems in networks and cloud systems including the Internet of Things. They learn to integrate security solutions to a cloud computing platform and explore methods for holding cloud stakeholders accountable for the privacy and confidentiality of data in cloud systems. 

The curriculum has a hands-on approach that combines laboratory work with classroom education, makes use of high-profile industry speakers to introduce the latest technologies, and includes a supervised semester-long team project on a topic of industrial relevance. One focus area is communication and organizational skills together with project planning and implementation competencies. A mandatory management course fosters an entrepreneurial mindset, and the elective courses enable students to further explore data science or networking.

THIRD SEMESTER

Semester 9 (30 ECTS) ECTS
UE Fundamentals EIT Digital Security (5 ECTS)  
Security and Privacy for Big Data and Cloud 2.5
Multipary Computation and Blockchains 2.5
Mobile Systems and Smartphone Security 5
UE Electives EIT Digital Security (10 ECTS)  
Machine Learning and Intelligent Systems 5
Distributed Systems and Cloud Computing 5
Quantum Information Science 5
Digital Image Processing 5
System and Network Security 5
Mobile Communication Systems 5
UE I&E (6 ECTS)  
Fundamental in Innovation and Entrepreneurship 6
Semester Project (8 ECTS) 8
UE Languages (1 ECTS) 1

FOURTH SEMESTER: MASTER THESIS (30 ECTS)

Babeș-Bolyai University (UBB)

Programme website

Programme Lead: Assoc. prof. Darius Bufnea: darius.bufnea@ubbcluj.ro, cyber-master@cs.ubbcluj.ro

SPECIALISATION: Software Security

The master’s programme offers a multiple perspective on the field of cyber security, addressing issues related to its various components: operating system security, network security, organisation and business process security, with a strong emphasis in the second year on the security of the software itself.

The courses in the 2nd year will have a strong focus on knowledge about 'Software Security', which is also the specialisation of the exit year. Students will be able to take courses like Advanced Software Security, Securing Mobile Applications, Program Analysis for Software Security, and Cloud Application and Infrastructure Security. These courses will address advanced topics such as software quality models, security as a quality factor in software, security analysis and verification of software, design of security checking tools, and cloud and mobile application security. The overall goal of this specialisation is for students to understand the secure by design principles and assess different software security issues, in order to learn how to detect security vulnerabilities as soon as possible in the development cycle and to develop a more secure software from design to implementation. Also, a new course on XDR (Extended Detection and Response) is offered in cooperation with an industry partner, and students have the opportunity to learn how to technically address security incidents.

The programme also has a strong emphasis on practical knowledge in the field of cyber security, the curricula being discussed with several companies that offer services and solutions in this field. Some of the students’ activities, such as the internship or the thematic projects, can be carried out in partnership with the partner companies/industry in the field. The latter has a strong local presence, the city of Cluj-Napoca, Romania, being known as a strong development hub in the field of IT&C.

THIRD SEMESTER

Compulsory Courses (24 ECTS) ECTS
Advanced Software Security 6
Securing Mobile and IoT Software 6
Program Analysis for Software Security 6
Cloud Application and Infrastructure Security 6
I&E Compulsory Course (6 ECTS)  
Entrepreneurship in IT - I&E Study 6
Extended Detection and Response Optional

 

FOURTH SEMESTER

(30 ECTS) ECTS
Internship in Specialisation 20
Project in Cybersecurity 6
Elaboration of the Dissertation Thesis 4

University of Trento (UniTN)

Programme website

Programme Lead: Bruno Crispo, bruno.crispo@unitn.it

SPECIALISATION: System Security

In recent years, the most popular computing and communications platforms have changed dramatically from old desktops and personal computers to a myriad of new devices, often embedded and personal usually interconnected using several communications technologies. Such novel platforms have pervaded all economic sectors, as well as those traditionally relying on analogue technology. This revolution has touched private, business and governmental domains (e.g., industry 4.0, smart homes, critical infrastructures, automotive, smart cities, etc.). This in turn has created entire new ecosystems that include technical, social and economic factors.

The specialisation System Security focuses on addressing security and privacy for these new ecosystems trying a holistic approach that does not focus only on technical issues. Of course, it covers the technological aspects such as investigating and experimenting with a new class of threats and vulnerabilities, developing new technology to establish trust, and designing novel ways to authenticate users and machines. But it covers also, methodology to assess and enhance the security of the software development process and the economic aspects that are crucial to understanding attackers, and their motivations and designing effective defence strategies

THIRD & FOURTH SEMESTER

Specialisation Courses ECTS
Multimedia Data Security 6
Ethical Hacking 6
Security Testing 6
Blockhain 6
Privacy and Intellectual Property Rights 6
Formal Techniques for Cryptographic Protocol Analysis 6
Network Intrusion and Anomaly Detection with Machine Learning 6
Embedded Systems 6
Ethics for computer science and engineering 6
Security experiments: attacks and defenses 12

University of Turku (UTU)

Programme website

Programme Lead: Dr Seppo Virtanen, seppo.virtanen@utu.fi

SPECIALISATION: Security Technologies and Intelligence

The Security Technologies and Intelligence specialisation focuses on researching pre-emptive, reactive and analytical security technologies to protect systems from cyber threats and malicious exploitation attempts in the era of artificial intelligence and machine learning. The compulsory studies are on intelligent technologies for protecting systems and networks (firewalls and intrusion prevention), ethical hacking (penetration testing) and analysing digital traces of malicious activity (digital forensics).

The specialisation gives its students profound and substantial education and expertise in the field. Optional studies selected personally for each student build a special individual information security expertise profile. The curriculum consists of both theoretical and hands-on study modules. Also, a large group project module called 'Capstone project' can be included in the studies.

The graduates of this specialisation will have a strong technological, theoretical and practical understanding of security technologies for protecting systems and environments against cyber threats. With these new skills and knowledge, graduates can proceed to building a successful career in securing and protecting the ICT intensive industry. The graduate’s unique expertise profile may lead to a career title of, for example, one of the following: Cyber Security Analyst, Penetration and Vulnerability Tester, Cyber Security Consultant, Cyber Security Manager, Network Security Specialist, Cyber Security Entrepreneur, System / Network Administrator, Business Information Security Officer, Chief Information Officer, Chief Information Security Officer, Head of Corporate IT.

THIRD & FOURTH SEMESTER

Compulsory Courses (15 ECTS) ECTS
Firewall and IPS Technology 5
Ethical Hacking    5
Digital Forensics 5
I&E (6 ECTS)  
I&E Study 6
Elective Courses  
Communication Technologies and Security in IoT 5
Capstone Project 10
Cryptography 2 5
Algebraic Structures in Cryptography 5
Privacy and Security for Software Systems 5
Protocol Processing and Security 5
Security Engineering 5
Seminar 1 (TurkuSec meetings) 1-5
In addition to the courses listed above, a variety of courses qualifying as elective studies are available annually. Electives are chosen individually for each student when their personal study plan is made.  


Dr Seppo Virtanen is Professor of Cyber Security Engineering and Vice Head of the Department of Computing at University of Turku, Finland. Dr Virtanen received his MSc degree in Electronics and Information Technology in 1998 and DSc (Tech.) degree in Communication Systems in 2004 from the University of Turku. He serves regularly as a program committee member and referee for international journals and conferences. He is a senior member of the IEEE. He has supervised or examined 10 PhD theses, 160 Master’s theses and 40 Bachelor’s theses. He has taught more than 80 instances of 25 different university courses in the field of ICT. His current research interests are the application of artificial intelligence and machine learning to cyber security, cyber security in smart environments and technologies for network and IoT security.

University of Twente (UT)

Programme website

Academic Coordinator: Dr Florian Hahn, f.w.hahn@utwente.nl, Dr Andreas Peter, a.peter@utwente.nl

SPECIALISATION: Circular Security

With the transformation into a digital society, our world is relying more and more on interconnected ICT systems. Despite this increasing dependency on computer systems, cybersecurity is still often an afterthought and only considered at the end of the development process or even later during deployment; think about IoT devices that are installed in isolated networks or zero-day exploits that are patched in live systems.

It is common practice to offer only time-limited support after release and end-of-life products do not receive further (security) updates. This planned obsolescence does not only lead to wasteful consumption of resources but also exposes computer networks with outdated systems to significant security risks.

Contradicting this practice, the adoption of computer systems into long-living facilities such as power plants or cars leads to the new challenge of secure systems that stand the test of time. Notably, many risks for such systems are not solely of a technical nature. Thus, we address the challenge of circular security from the technical perspective and complement it with the socio-economic context.

Our specialisation looks at the many risks in the above-mentioned setting and provides mitigations that can be used already at the beginning of the design phase. Additionally, students get introduced to approaches for subsequent monitoring of live systems, while taking into account the specific requirements and the impact of various risks over the system’s complete lifecycle.

Specialisation Courses ECTS
Secure Data Management 5
Secure Cloud Computing 5
Cloud Networking 5
Advanced Networking 5
Empirical Security Analysis & Engineering      5
Introduction to Biometrics 5
Cyber Risk Management 5
System Validation 5
Design of Software Architectures 5
Machine Learning 1 5
Security Verification 5
Distributed Systems 5
Internet of Things 5
Quantum Information 5
Computer Ethics 5


The University of Twente (UT) holds the title of the most entrepreneurial university in Europe. As such, it has an extremely large network in the industry that includes around 1000 university spin-offs (e.g., Booking.com was founded by a UT alumni). This provides excellent opportunities to connect to industry and access to a multitude of internship offers. Of particular interest for cybersecurity students is the Twente University Centre for Cybersecurity Research (TUCCR); a public-private partnership where experts, professionals, entrepreneurs, researchers, and students from industry and knowledge partners collaborate.

Scroll up

Co-Funded by the European Union