Entry points, 1st year, Common Courses
Academic year 2024/2025
Eötvös Loránd University (ELTE)
Programme Coordinator: Dr. Peter Burcsi, bupe@inf.elte.hu
FIRST SEMESTER
Compulsory Courses (18 ECTS) | ECTS |
Research Methodology | 5 |
Symmetric Key Cryptography | 4 |
Introduction to Offensive Security I. | 4 |
Privacy-enhancing Technologies | 4 |
Introductory Mathematics for Cybersecurity Specialisation | 1 |
I&E (10 ECTS) | |
I&E Basics | 6 |
Business Development Lab I. | 4 |
SECOND SEMESTER
Compulsory Courses (18 ECTS) | ECTS |
Design and Analysis of Algorithms | 4 |
Public Key Cryptography | 4 |
Introduction to Offensive Security II. | 4 |
Advanced Software Technology | 4 |
Network Security | 2 |
I&E (14 ECTS) | |
Innosocial Aspects of the Entrepreneurship | 6 |
Thematic Summer Schools with I&E project | 4 |
Business Development Lab II. | 4 |
Babeș-Bolyai University (UBB)
Programme Lead: Assoc. prof. Darius Bufnea: darius.bufnea@ubbcluj.ro, cyber-master@cs.ubbcluj.ro
FIRST SEMESTER
Compulsory Courses (17 ECTS) | ECTS |
Cryptography | 7 |
Security Audit and Risk Management | 6 |
Computer Ethics and Academic Integrity | 4 |
I&E Compulsory Course (8 ECTS) | |
Digital Economy Principles - I&E basics | 8 |
I&E Elective Courses (5 ECTS) | |
Agile Project Management | 5 |
Strategic Business Process Automation | 5 |
Business Intelligence for Entrepreneurs | 5 |
SECOND SEMESTER
Compulsory Courses (12 ECTS) | ECTS |
Web and Internet Security | 6 |
Quality Aspects of Security in Software Testing | 6 |
I&E Compulsory Courses (11 ECTS) | |
Innovation Management - I&E Business Dev Lab | 7 |
(Thematic Project with Innovation Challenge) EIT Digital Summer School | 4 |
Elective Courses (7 ECTS) | |
Network Security and Administration | 7 |
Blockchain Security | 7 |
Complex Networks in Security | 7 |
Quantum Cryptography | 7 |
University of Rennes
Academic Coordinator: Mohamed Sabt, mohamed.sabt@irisa.fr
FIRST SEMESTER
Compulsory Courses (20 ECTS) | ECTS |
Introduction to Security | 5 |
Software Engineering and Security | 5 |
Operating Systems and Security | 5 |
Network Security | 5 |
Elective Courses | |
I&E | |
Introduction to Innovation and Business | 5 |
Knowledge and Intangible Assets Management | 5 |
Business Development Laboratory 1 | 5 |
SECOND SEMESTER
Compulsory Courses (20 ECTS) | ECTS |
Algorithmics for Security | 5 |
Privacy | 5 |
System Security | 5 |
Software Security | 5 |
Elective Courses | |
I&E | |
Business Development Laboratory 2 | 5 |
Summer School | 4 |
University of Trento (UniTN)
Programme Lead: Bruno Crispo, bruno.crispo@unitn.it
FIRST & SECOND SEMESTER
Compulsory Courses (36 ECTS) | ECTS |
Introduction to Computer and Network Security | 6 |
Cryptography | 6 |
Software Security Testing | 6 |
Cyber Security Risk Assessment | 6 |
Network Security | 6 |
Privacy and IPR | 6 |
Advanced and Eligible Courses | |
Machine Learning | 6 |
Data Hiding | 6 |
Formal Techniques for Crypto Protocol Analysis | 6 |
Laboratory on Offensive Technologies | 12 |
Finite Fields and Symmetric Cryptography | 6 |
Distributed Systems 2 | 6 |
Innovation and Entrepreneurship Courses | |
Innovation and Entrepreneurship Basics (Economics and Management) | 6 |
Business Development Lab | 9 |
ICT Innovation - Product Design and Development | 6-9 |
I&E Studies | 6 |
University of Turku (UTU)
Academic Coordinator: Dr Seppo Virtanen, seppo.virtanen@utu.fi
FIRST & SECOND SEMESTER
Compulsory Courses (31 ECTS) | ECTS |
System and Application Security | 5 |
Network Infrastructure Technologies and Security | 5 |
Human Element in Information Security | 5 |
Management of Information System Security | 6 |
Foundations of Cryptography | 5 |
Cryptography I | 5 |
Innovation and Entrepreneurship | |
Introduction to Innovation and Business | 5 |
Lean Digital Business Design | 10 |
Summer School | 4 |
Elective Courses (choose one) | |
Knowledge and Innovation Management | 5 |
Enterprise Architecture | 6 |
Digital Economy and Business Models | 3-6 |
University of Twente (UT)
Programme Lead: Florian Hahn, f.w.hahn@utwente.nl
FIRST SEMESTER
Compulsory Major Courses (15 ECTS) | ECTS |
Cyber Risk Management | 5 |
Security and Cryptography | 5 |
Software Security | 5 |
Compulsory I&E Courses (15 ECTS) | |
I&E Basics: Innovation and Entrepreneurial Finance for EIT | 5 |
Business Development Lab I | 5 |
Computer Ethics | 5 |
Optional Courses | |
Economics of Security | 5 |
System Validation (only in comb. w/ SeV, if needed) | 5 |
Basic Machine Learning (only in comb. w/ CDA, if needed) | 5 |
I&E: Brand Management | 5 |
I&E: Bioresource Business Development & Management | 5 |
Introduction to Biometrics | 5 |
Cyber Security Management | 5 |
Distributed Systems (only in comb. w/ BCT, if needed) | 5 |
I&E: Bioresource Supply Chain Management | 5 |
SECOND SEMESTER
Compulsory Major Courses (15 ECTS) | ECTS |
Internet Security | 5 |
Privacy-Enhancing Technologies | 5 |
System Security | 5 |
Compulsory I&E Courses (5 ECTS) | |
Business Development Lab II | 5 |
Optional Courses | |
Software Testing and Reverse Engineering | 5 |
Blockchain & Distr. Ledger Tech. (check w/ teacher if DiS req.) | 5 |
Security Verification (check w/ teacher if SyV req.) | 5 |
Cyber Crime Science | 5 |
I&E: Global Strategy and Business Development | 5 |
Cyber Data Analytics (check w/ teacher if MaL req.) | 5 |
E-Law | 5 |
Security Services for the Internet of Things | 5 |
I&E: Information Systems for the Financial Services Industry | 5 |
I&E: Empirical Methods for Designers | 5 |
Exit points, 2nd year, Specialisation
Academic year 2025/2026
Eötvös Loránd University (ELTE)
Programme Coordinator: Dr. Peter Burcsi, bupe@inf.elte.hu
THIRD & FOURTH SEMESTER
- SPECIALISATION #1: Advanced Cryptography
The specialisation focuses on the general ideas, techniques and methods of applied cryptography as well as on the theoretical background and solid knowledge, putting security in a wider context. Security and privacy are considered both from the technological and from the economic point of view, which supports decisions in many practical cases. Applied cryptography serves as a base for most of the secure IT systems (e.g. in Future Media and Content Delivery, Smart Spaces, Digital cities, Health and ICT-Mediated Human Activity, and Enabling the Internet of the Future).
Compulsory Courses (24 ECTS) | ECTS |
Cyber Security Lab I. | 4 |
Secure Multiparty Computation | 4 |
Zero-knowledge proofs and application | 4 |
Topics in cryptography seminar | 4 |
Cryptographic Protocols | 6 |
Provably Secure Modular Design of Cryptographic Protocols | 4 |
Preparation course for master studies and developing learning skills (It can be substituted with any other technical CSE course) | 2 |
I&E (6 ECTS) | |
I&E Study | 6 |
- SPECIALISATION #2: Quantum-resistant Cryptography
The specialisation focuses on the general ideas, techniques and methods of security in the coming era of quantum technology. The theoretical background gives a solid understanding of cryptographic aspects and supports technological and economic decisions on security. In order to maintain the security and privacy of IT systems (e.g. in Future Media and Content Delivery, Smart Spaces, Digital cities, Health and ICT-Mediated Human Activity, and Enabling the Internet of the Future) when quantum devices are around, new physical communication layers, novel computational architecture and cryptographic protocols may be used. Quantum-resistant cryptography serves as a base to understanding and overcoming these challenges.
Compulsory Courses (24 ECTS) | ECTS |
Cyber Security Lab I. | 4 |
Introduction to Quantum Information | 4 |
Post-quantum Cryptography | 4 |
Topics in cryptography seminar | 4 |
Cryptographic Protocols | 6 |
Provably Secure Modular Design of Cryptographic Protocols | 4 |
Preparation course for master studies and developing learning skills (It can be substituted with any other technical CSE course) | 2 |
I&E (6 ECTS) | |
I&E Study | 6 |
Peter Burcsi is an Associate Professor, Head of the Department of Computer Algebra at the Faculty of Informatics, ELTE - Eötvös Loránd University, Budapest. His research areas are algorithms in elementary number theory and cryptography. He has participated in several security-related research and industrial projects at ELTE.
EURECOM
Academic Coordinator: Prof. Dr. Antonio Faonio, master-eit-cse@eurecom.fr
Dr. Antonio Faonio is a « Maître de Conférences » at EURECOM since July 2020. Previously, he held a postdoctoral researcher position at IMDEA Software Institute and Aarhus University. He got a Ph.D. in Computer Science at "Sapienza" Univ. of Rome. His research interest is in cryptography.
SPECIALISATION: Big Data Security
EURECOM is offering a specialization in Big Data Security that aims at providing a solid knowledge of security in cloud computing and networking combined with practical design and management skills. The students learn how to identify threats, vulnerabilities and privacy problems in networks and cloud systems including the Internet of Things. They learn to integrate security solutions to a cloud computing platform and explore methods for holding cloud stakeholders accountable for the privacy and confidentiality of data in cloud systems.
The curriculum has a hands-on approach that combines laboratory work with classroom education, makes use of high-profile industry speakers to introduce the latest technologies, and includes a supervised semester-long team project on a topic of industrial relevance. One focus area is communication and organizational skills together with project planning and implementation competencies. A mandatory management course fosters an entrepreneurial mindset, and the elective courses enable students to further explore data science or networking.
THIRD SEMESTER
Semester 9 (30 ECTS) | ECTS |
UE Fundamentals EIT Digital Security (5 ECTS) | |
Security and Privacy for Big Data and Cloud | 2.5 |
Multipary Computation and Blockchains | 2.5 |
Mobile Systems and Smartphone Security | 5 |
UE Electives EIT Digital Security (10 ECTS) | |
Machine Learning and Intelligent Systems | 5 |
Distributed Systems and Cloud Computing | 5 |
Quantum Information Science | 5 |
Digital Image Processing | 5 |
System and Network Security | 5 |
Mobile Communication Systems | 5 |
UE I&E (6 ECTS) | |
Fundamental in Innovation and Entrepreneurship | 6 |
Semester Project (8 ECTS) | 8 |
UE Languages (1 ECTS) | 1 |
FOURTH SEMESTER: MASTER THESIS (30 ECTS)
Babeș-Bolyai University (UBB)
Programme Lead: Assoc. prof. Darius Bufnea: darius.bufnea@ubbcluj.ro, cyber-master@cs.ubbcluj.ro
SPECIALISATION: Software Security
The master’s programme offers a multiple perspective on the field of cyber security, addressing issues related to its various components: operating system security, network security, organisation and business process security, with a strong emphasis in the second year on the security of the software itself.
The courses in the 2nd year will have a strong focus on knowledge about 'Software Security', which is also the specialisation of the exit year. Students will be able to take courses like Advanced Software Security, Securing Mobile Applications, Program Analysis for Software Security, and Cloud Application and Infrastructure Security. These courses will address advanced topics such as software quality models, security as a quality factor in software, security analysis and verification of software, design of security checking tools, and cloud and mobile application security. The overall goal of this specialisation is for students to understand the secure by design principles and assess different software security issues, in order to learn how to detect security vulnerabilities as soon as possible in the development cycle and to develop a more secure software from design to implementation. Also, a new course on XDR (Extended Detection and Response) is offered in cooperation with an industry partner, and students have the opportunity to learn how to technically address security incidents.
The programme also has a strong emphasis on practical knowledge in the field of cyber security, the curricula being discussed with several companies that offer services and solutions in this field. Some of the students’ activities, such as the internship or the thematic projects, can be carried out in partnership with the partner companies/industry in the field. The latter has a strong local presence, the city of Cluj-Napoca, Romania, being known as a strong development hub in the field of IT&C.
THIRD SEMESTER
Compulsory Courses (24 ECTS) | ECTS |
Advanced Software Security | 6 |
Securing Mobile and IoT Software | 6 |
Program Analysis for Software Security | 6 |
Cloud Application and Infrastructure Security | 6 |
I&E Compulsory Course (6 ECTS) | |
Entrepreneurship in IT - I&E Study | 6 |
Extended Detection and Response | Optional |
FOURTH SEMESTER
(30 ECTS) | ECTS |
Internship in Specialisation | 20 |
Project in Cybersecurity | 6 |
Elaboration of the Dissertation Thesis | 4 |
University of Trento (UniTN)
Programme Lead: Bruno Crispo, bruno.crispo@unitn.it
SPECIALISATION: System Security
In recent years, the most popular computing and communications platforms have changed dramatically from old desktops and personal computers to a myriad of new devices, often embedded and personal usually interconnected using several communications technologies. Such novel platforms have pervaded all economic sectors, as well as those traditionally relying on analogue technology. This revolution has touched private, business and governmental domains (e.g., industry 4.0, smart homes, critical infrastructures, automotive, smart cities, etc.). This in turn has created entire new ecosystems that include technical, social and economic factors.
The specialisation System Security focuses on addressing security and privacy for these new ecosystems trying a holistic approach that does not focus only on technical issues. Of course, it covers the technological aspects such as investigating and experimenting with a new class of threats and vulnerabilities, developing new technology to establish trust, and designing novel ways to authenticate users and machines. But it covers also, methodology to assess and enhance the security of the software development process and the economic aspects that are crucial to understanding attackers, and their motivations and designing effective defence strategies
THIRD & FOURTH SEMESTER
Specialisation Courses | ECTS |
Multimedia Data Security | 6 |
Ethical Hacking | 6 |
Security Testing | 6 |
Blockhain | 6 |
Privacy and Intellectual Property Rights | 6 |
Formal Techniques for Cryptographic Protocol Analysis | 6 |
Network Intrusion and Anomaly Detection with Machine Learning | 6 |
Embedded Systems | 6 |
Ethics for computer science and engineering | 6 |
Security experiments: attacks and defenses | 12 |
University of Turku (UTU)
Programme Lead: Dr Seppo Virtanen, seppo.virtanen@utu.fi
SPECIALISATION: Security Technologies and Intelligence
The Security Technologies and Intelligence specialisation focuses on researching pre-emptive, reactive and analytical security technologies to protect systems from cyber threats and malicious exploitation attempts in the era of artificial intelligence and machine learning. The compulsory studies are on intelligent technologies for protecting systems and networks (firewalls and intrusion prevention), ethical hacking (penetration testing) and analysing digital traces of malicious activity (digital forensics).
The specialisation gives its students profound and substantial education and expertise in the field. Optional studies selected personally for each student build a special individual information security expertise profile. The curriculum consists of both theoretical and hands-on study modules. Also, a large group project module called 'Capstone project' can be included in the studies.
The graduates of this specialisation will have a strong technological, theoretical and practical understanding of security technologies for protecting systems and environments against cyber threats. With these new skills and knowledge, graduates can proceed to building a successful career in securing and protecting the ICT intensive industry. The graduate’s unique expertise profile may lead to a career title of, for example, one of the following: Cyber Security Analyst, Penetration and Vulnerability Tester, Cyber Security Consultant, Cyber Security Manager, Network Security Specialist, Cyber Security Entrepreneur, System / Network Administrator, Business Information Security Officer, Chief Information Officer, Chief Information Security Officer, Head of Corporate IT.
THIRD & FOURTH SEMESTER
Compulsory Courses (15 ECTS) | ECTS |
Firewall and IPS Technology | 5 |
Ethical Hacking | 5 |
Digital Forensics | 5 |
I&E (6 ECTS) | |
I&E Study | 6 |
Elective Courses | |
Communication Technologies and Security in IoT | 5 |
Capstone Project | 10 |
Cryptography 2 | 5 |
Algebraic Structures in Cryptography | 5 |
Privacy and Security for Software Systems | 5 |
Protocol Processing and Security | 5 |
Security Engineering | 5 |
Seminar 1 (TurkuSec meetings) | 1-5 |
In addition to the courses listed above, a variety of courses qualifying as elective studies are available annually. Electives are chosen individually for each student when their personal study plan is made. |
Dr Seppo Virtanen is Professor of Cyber Security Engineering and Vice Head of the Department of Computing at University of Turku, Finland. Dr Virtanen received his MSc degree in Electronics and Information Technology in 1998 and DSc (Tech.) degree in Communication Systems in 2004 from the University of Turku. He serves regularly as a program committee member and referee for international journals and conferences. He is a senior member of the IEEE. He has supervised or examined 10 PhD theses, 160 Master’s theses and 40 Bachelor’s theses. He has taught more than 80 instances of 25 different university courses in the field of ICT. His current research interests are the application of artificial intelligence and machine learning to cyber security, cyber security in smart environments and technologies for network and IoT security.
University of Twente (UT)
Academic Coordinator: Dr Florian Hahn, f.w.hahn@utwente.nl, Dr Andreas Peter, a.peter@utwente.nl
SPECIALISATION: Circular Security
With the transformation into a digital society, our world is relying more and more on interconnected ICT systems. Despite this increasing dependency on computer systems, cybersecurity is still often an afterthought and only considered at the end of the development process or even later during deployment; think about IoT devices that are installed in isolated networks or zero-day exploits that are patched in live systems.
It is common practice to offer only time-limited support after release and end-of-life products do not receive further (security) updates. This planned obsolescence does not only lead to wasteful consumption of resources but also exposes computer networks with outdated systems to significant security risks.
Contradicting this practice, the adoption of computer systems into long-living facilities such as power plants or cars leads to the new challenge of secure systems that stand the test of time. Notably, many risks for such systems are not solely of a technical nature. Thus, we address the challenge of circular security from the technical perspective and complement it with the socio-economic context.
Our specialisation looks at the many risks in the above-mentioned setting and provides mitigations that can be used already at the beginning of the design phase. Additionally, students get introduced to approaches for subsequent monitoring of live systems, while taking into account the specific requirements and the impact of various risks over the system’s complete lifecycle.
Specialisation Courses | ECTS |
Secure Data Management | 5 |
Secure Cloud Computing | 5 |
Cloud Networking | 5 |
Advanced Networking | 5 |
Empirical Security Analysis & Engineering | 5 |
Introduction to Biometrics | 5 |
Cyber Risk Management | 5 |
System Validation | 5 |
Design of Software Architectures | 5 |
Machine Learning 1 | 5 |
Security Verification | 5 |
Distributed Systems | 5 |
Internet of Things | 5 |
Quantum Information | 5 |
Computer Ethics | 5 |
The University of Twente (UT) holds the title of the most entrepreneurial university in Europe. As such, it has an extremely large network in the industry that includes around 1000 university spin-offs (e.g., Booking.com was founded by a UT alumni). This provides excellent opportunities to connect to industry and access to a multitude of internship offers. Of particular interest for cybersecurity students is the Twente University Centre for Cybersecurity Research (TUCCR); a public-private partnership where experts, professionals, entrepreneurs, researchers, and students from industry and knowledge partners collaborate.