Catalogue of Modules M. Sc. Security Management (2014)

Size: px
Start display at page:

Download "Catalogue of Modules M. Sc. Security Management (2014)"

Transcription

1 Catalogue of Modules M. Sc. Security Management (2014) May 2014

2 Impressum Autor: Prof. Dr. Sachar Paulus Redaktion: Prof. Dr. Sachar Paulus Druck: Druckerei der Fachhochschule Brandenburg Kontakt: Fachhochschule Brandenburg University of Applied Sciences Magdeburger Str Brandenburg an der Havel T F E sachar.paulus@fh-brandenburg.de Stand: 21. Februar 2014 Fachhochschule Brandenburg Seite 2/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

3 Inhaltsverzeichnis 1. Introduction Principles of Security Management Security and Crisis Management in the international Context Law, Compliance and Data Protection Organizational Elements of Security Management Network Security Mathematical and Technical Foundations of IT-Security Secure ICT Infrastructures and IT Services Secure Systems Lifecycle Management Scientific Writing Project Master s Thesis Seite 3/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

4 1. Introduction This document contains the descriptions of the mandatory modules of Brandenburg University of Applied Sciences M. Sc. Degree program on Security Management. The module content is of Students can choose a profile amongst a number of offerings. Part of the content consists of compulsory optional modules that the program management selects every term. The descriptions for compulsory optional modules can be found in a separate document, since they change relatively often. Module overview Ter m Module CP 1 2 Fundamentals of Security Management (6CP) Security and Crisis Management in International Contexts (6CP) Law, Compliance and Data Protection (6CP) Organizational Elements of Security Management (6 CP) Secure ICT Infrastructures and IT Services (6CP) Mathematical and Technical Foundations of IT Security (6CP) Secure Software Lifecycle Management (6CP) Network Security (6CP) Project (6CP) Scientific Writing (6CP) Compulsory Optional Module 1 (3CP) Compulsory Optional Module 2 (3CP) Compulsory Optional Module 3 (3CP) 9 Master Thesis incl. Colloquium (21CP) Topic area Security Management Law and Business Management Mathematical and Technical Foundations IT-Security Scientific Work Compulsory Optional Modules Seite 4/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

5 2. Principles of Security Management Brief module label: Module description: PrinciplesSecurityManagement Principles of Security Management Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: Usability of the module: Frequency of offering of modules: Author: Private lecturer: Language of instruction: Prerequisites: One semester SM Ma, 1st semester, required module The module is also offered as a compulsory lecture for the Master s course Business Informatics. The module can also be offered for Master s Informatics. Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Sachar Paulus German None ECTS-Credits: 6 Total workload and ist composition: Form of teaching/semester hours per week: 180 hours = 60 hours of attendance and 120 hours of self-study Lecture: 1 semester hour per week Exercise: 1 semester hour per week Practical application based on case studies: 2 semester hours per week Total: 4 semester hours per week Study and examination achievements: Homework (50%), Presentation (50%). Weighting of the grade in the overall grade: Learning outcomes: 2/5 of the subject grade 13.5% of all subject grades 4.725% of the final grade The objective is to enable the students to acquire basic knowledge and skills in the following aspects of learning: Preparation of security investigations Conducting risk evaluations Analysis of conditions of security and the significance of counter measures Development of understanding the importance of security in the process of decision making by entrepreneurs Assessment of organisation of security in enterprises Mapping exemplary security processes with the use of IT tools Drafting security measures and presenting the same to a committee of decision makers successfully In addition, the students are expected to achieve the following Seite 5/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

6 results of learning: Establish a security organisation in an enterprise Prepare a skill profile for an individual in charge of security Integrate IT and non IT security relevant aspects Introduce a security management system in an organisation Prepare a strategy for a section of IT, information or corporate security Contents: Teaching and learning methods: Literature: Primary aspects of corporate security: Security Governance and Security Management System Security Organisation Security Policy Risk management Security analyses Security processes Norms and standards for information security Return-on-Security-Investment calculations Crisis management Business Continuity Management Additionally: Selected specific areas of the IT and corporate security Interactive combination of lectures, preparations and presentation of contents, demonstration of concepts, practical tasks for groups, preparation of own content and role play. Security Management 2011: Manual of information security, IT security, security of locations, White-collar criminality and Management liability by Guido Birkner, Handbuch Unternehmenssicherheit [Manual of Corporate Security]: Comprehensive security, continuity and risk management with system by Klaus-Rainer Müller, Unternehmenssicherheit [Corporate Security] by Stephan Gundel, and Lars Mülli, Security Risk Management Body of Knowledge by Julian Talbot, Miles Jakeman, Wiley Additional information: Seite 6/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

7 3. Security and Crisis Management in the international Context Brief module label: Module description: SecurityCrisisManagementInternational Security and Crisis Management in the international Context Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: One semester SM Ma, 2nd semester, required module Usability of the module: Frequency of offering of modules: Author: Private lecturer: Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Sachar Paulus Language of instruction: German, partly English (10%) Prerequisites: None ECTS-Credits: 6 Total workload and its composition: Form of teaching/semester hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: 180 hours = 60 hours of attendance and 120 hours of selfstudy Lecture: 2 semester hours per week Exercise: 1 semester hour per week Practical application based on case studies: 1 semester hour per week Total: 4 semester hours per week Written examination or oral examination 2/5 of the subject grade 13.5% of all subject grades 4.725% of the final grade The objective is to enable the students to acquire knowledge and skills in the following aspects of learning: Analysis of security systems in the international context while taking into account the cultural, political and geographical conditions Management of security organisation in international corporations Preparation of security measures during travel or delegation of employees to foreign countries Introduction of a crisis management system Reaction in international crisis situations Controlling the global crisis communication Influencing the public perception of security topics Security management in global organisations Travel Security Seite 7/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

8 Security during delegation of employees Crisis management in the international context Communication during crises: principles and procedures for communication during crisis situations Internal and external crisis communication Message House Handling media during crisis situations Public image of security Campaigns for security topics Teaching and learning methods: Literature: Interactive combination of lecture, preparation and presentation of content, demonstration of concepts, practical tasks for groups, preparation of own content and role play. Notfall- und Krisenmanagement im Unternehmen [Emergency and Crisis Management in Companies] by Axel Bédé, Unternehmenskrisen und Krisenmanagement [Corporate Crises and Crisis Management] by Ronny Scharschmidt, Führen in Krisensituationen [Managing during Crisis Situations] by Markus Klaus, Global Threat: Target-Centered Assessment and Management by Robert Mandel, Security Risk Management Body of Knowledge by Julian Talbot and Miles Jakeman, Additional information: Seite 8/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

9 4. Law, Compliance and Data Protection Brief module label: Module description: LawComplianceDataSecurity Law, Compliance and Data Security Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: One semester SecMan Master, 1st semester, required module Usability of the module: Frequency of offering of modules: Author: Private lecturer: Language of instruction: Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Michaela Schröter, Dipl. iur. Raoul Kirmes M.Sc., CISA, QMA German Prerequisites: ECTS-Credits: 6 Total workload and its composition: Form of teaching/semester hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: 180 hours = 60 hours of attendance and 120 hours of self-study Lecture: 4 semester hours per week Study assignments (30%), Written examination (70%). 2/3 of the subject grade; 8.33% of all subject grades; 2.916% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Identification of relevant legal position of important activities concerned with security in organisations Application of national, European and international legislations in order to meet the compliance specifications for companies Enabling critical discussion with legal target conflicts and for submitting an appropriate evaluation of the risk situation for companies as those affected by regulations 1. Introduction to juristic methodology 2. European and international security law 3. Introduction to the WTO law (focus on international law on product safety) 4. System of fundamental freedom and national security Seite 9/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

10 interests 5. Technical trade restrictions in security law 6. Compliance in the international context 7. International, European and national accreditation law 8. Principles of contractual liability ( 280 BGB) 9. Principles of tortious liability ( 823ff BGB, ProdHaftG) 10. Law governing the private security trade 11. Overview of the German law governing weapons 12. Main features of law of criminal proceedings 13. Electronic legal relations (ecommerce/signature law) 14. International emoluments and principles of law governing data security Teaching and learning methods: Literature: Lecture - Harald Jele, Wissenschaftliches Arbeiten: Zitieren [Scientific Working Methods: Quoting], Kohlhammer, 3rd ed., Calliess/Ruffert, EUV/AEUV 4th ed Röhl, Akkreditierung und Zertifizierung im Produktsicherheitsrecht [Accreditation and Certification in Law Governing Product Safety], Springer Verlag Ensthaler, Zertifizierung und Akkreditierung technischer Produkte [Certification and Accreditation of Technical Products], Springer Verlag Martin Schulte, Handbuch des Technikrechts [Manual of Law Governing Technology], 2nd ed. Springer Verlag, Abbott/ Kirchner/ et.al., International Standards and the Law, Stämpfli Verlag AG, Kurt Schellhammer, Schuldrecht nach Anspruchsgrundlagen [Law of Obligations According to Principles of Claims], 8 th ed., Martin Kutscha, Handbuch zum Recht der Inneren Sicherheit [Manual of Law Governing Internal Security], 2nd ed., BWV Verlag, Rolf Stober, Sven Eisenmenger, Besonderes Wirtschaftsverwaltungsrecht [Special Business Administration Law], 15th ed., Verlag Kohlhammer, Knemeyer: Polizei- und Ordnungsrecht [Police and Law Governing Public Order], Beck, Busche: Waffenrecht 2012 [Weapons law 2012], Kiel Hoeren: Internet- und Kommunikationsrecht [Internet and communication law], Otto Schmidt Cologne Schade: Arbeitsrecht [Labour law], Kohlhammer Martin T. Biegelman, Building World-Class Compliance Program: Best Practices and Strategies for Success, John Wiley & Sons; Acquisti/ Gritzalis/Lambrinoudakis, Digital Privacy: Theory, Technologies, and Practices, Auerbach Pubn, Sanjay Anand, Essentials of Sarbanes-Oxley, John Wiley & Sons, CCH Incorporated, SEC Compliance and Disclosure Interpretations, Harcourt Professional Publishing, Reyes, Carla, WTO-compliant Protection of Fundamental Rights: Lessons from the EU 'Privacy Directive, Melbourne Journal of International Law, Vol. 12, No. 1, Jun 2011: Seite 10/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

11 - Spiros Simitis, Bundesdatenschutzgesetz [Federal Law Governing Data Security], Nomos, 7 th ed., Current legal texts Additional information: Assignments for thorough reading Seite 11/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

12 5. Organizational Elements of Security Management Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: SM_MA_OrgAsp_Sicherheitsmanagement Organizational Elements of Security Management Security Leadership and Strategy Development Physical Security One semester SM Ma, 2nd semester, required module Usability of the module: Frequency of offering of modules: Author: Private lecturer: Language of instruction: Prerequisites: Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Robert Franz, Prof. Dr. Friedrich Holl, Holger Könnecke, Gerhard Reinhardt German None ECTS-Credits: 6 Total workload and its composition: Form of teaching/semester hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: 180 hours = 60 hours of attendance and 120 hours of selfstudy Lecture: 2 x 15 hours Working on examples: 2 x 15 hours Written report + presentation and/or oral examination 6,25 of the final grade The objective is to enable the students to acquire basic knowledge and skills in the following aspects of learning: Knowing the principles of successful corporate governance Influencing the corporate leaders for observing the security aspects and for constructive handling of crisis situations Derivation of a security strategy and security goals out of the corporate strategy Development of a strategy to strengthen the ethical aspects of corporate governance Resolution of conflicts Knowing the methods of protection and safety engineering Analysis of the possibilities of use and effectiveness of protective mechanisms against elementary damage, mechanical safety installations, hazard alert systems and surveillance systems Planning of a security system network Seite 12/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

13 Evaluation of solutions available in the market Appraisal of the legal aspects for the deployment of individual security mechanisms Contents: Teaching and learning methods: Literature: Functions of corporate governance (development of corporate goals, principles, culture; Formulation of strategies; Human Resources and Negotiations Management; international aspects in the global competition) Integration of security goals with the corporate strategy Ethical aspects of corporate governance (anti-corruption strategies, Code of Conduct etc.) Conflict management (conflict diagnosis, typology of conflicts, escalations, strategies for conflict handling) Fundamentals of building safety Terminology and overview of areas of tasks and available options Engineering principles Physical attacks and their effect Elementary damage Attackers, their aims and methods of attack Weapons and their effect Radiation of electronic devices Mechanical safety systems and access control Locks, locking systems and their security Securing doors, windows and fences against attacks Secure storage and data cabinets Engineering and legal regulations and directives Hazard alert systems Fundamentals Burglary alarm systems Attack alert systems Installation failure alert systems Fire alarm and fire fighting systems Engineering and legal regulations and directives Surveillance systems Technical possibilities Open and hidden monitoring Engineering and legal regulations and directives Emergency planning and operational safety Consequential damage analysis Handling untoward incidents Lecture K. Macharzina: Unternehmensführung [Corporate Governance] T. Hutzschenreuther: Krisenmanagement [Crisis Management] F. Glasl: Konfliktmanagement [Conflict Management] Seite 13/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

14 B. Stackpole, E. Osendahl: Security Strategy: From Requirements to Reality.Physical Security Systems Handbook by Michael Kairallah, Current Journals and Magazines covering the topic: kes, Der Sicherheitsberater [The Safety Advisor], S&I. Additional information: Seite 14/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

15 6. Network Security Brief module label: Module description: SM_Ma_Network Security Network Security Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: One semester SecMan Master, 1st semester, required module Usability of the module: Frequency of offering of modules: Author: Private lecturer: Language of instruction: Prerequisites: Every academic year Prof. Dr. Eberhard von Faber Dipl. Ing. Dietmar Hausmann German Importance of IT security and its role in practice; technical and physical basic knowledge; knowledge of the basics of Internet networks, Operating Systems and cryptography-based techniques ECTS-Credits: 6 Total workload and ist composition: Form of teaching/semester hours per week: 180 hours = 60 hours of attendance and 120 hours of self-study Lectures at least 30 hours, practice at least 30 hours Study and examination achievements: Written report + presentation or oral examination Weighting of the grade in the overall grade: Learning outcomes: 6,25 % of the final grade Familiarization with the threats and challenges in networks, including important counter measures in the form of protocols and various security solutions Familiarization with the functioning of these solutions, understanding of their use, operation and interaction; ability to integrate and deploy independently some of these solutions; familiarization with supplementing measures and solutions Development of ability to analyse requirements and industrial practical factors and to integrate solutions based on the practical example of an industrial solution Familiarization with security modules and embedded systems as core components for distributed systems; properties, challenges and use Contents: Extended principles of Internet networks (TCP/IP Protocol, Seite 15/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

16 ISO/OSI, Routing, active components, cryptography) Dangers in the use of IT, categories of threats, weak points and hazards Security management, security audits with tools, network monitoring and network logging Attacks and counter measures Cryptography applications (encrypted communication, VPN protocols, certificates) Web Server Security, security In depth study and practical application of project topics on Firewalls, Honeypots and Intrusion Detection Systems, WLAN security and VPN Teaching and learning methods: Literature: Combination of lectures, exercises based on one s own computer and lab exercises; lectures deploying different media; tasks and exercise examples; control questions/revision course Cisco Networking Academy: CCNA Exploration Companion Guide, Vol. 1-4, Cisco Press, 2008 Alexander Michael: Netzwerke und Netzwerksicherheit - Das Lehrbuch [Networks and Network Security the text book], Hüthing publishers, Plötner Johannes, Wendzel Steffen: Praxishandbuch Netzwerk-Sicherheit [Practical Manual of Network Security], Galileo Computing, Other reference works on special project topics (VPN, IPSec, IPv6, IDS, WLAN, Attacks, and many more) Scripts and other teaching materials will be distributed directly to the students during the lecture, or made available on the learning platform of the university. Additional information: Seite 16/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

17 7. Mathematical and Technical Foundations of IT-Security Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: SM_MA_MathTechGrundlagen Mathematical and Technical Foundations of IT-Security Foundations of Forensics and Auditing Foundations of Technical Security One semester SecMan Master, 1st semester, required module Usability of the module: Frequency of offering of modules: Author: Private lecturer: Language of instruction: Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Igor Podebrad, Ralph Wölpert German Prerequisites: ECTS-Credits: 6 Total workload and its composition: Form of teaching/semester hours per week: 180 hours = 60 hours of attendance and 120 hours of self-study Lecture: 2 x 30 hours Study and examination achievements: Written or oral examination Weighting of the grade in the overall grade: Learning outcomes: Contents: 6,25% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Application of the mathematical and technical foundations to security, especially: Organisation of IT forensic analyses and IT audits Operating IT systems while taking into account the requirements of IT forensics and IT auditing Development and implementation of IT forensics related security guidelines Evaluation of the usability of IT audit results for forensics Selection of security technology Understanding and explanation of the basic principles of technical security systems Legal prerequisites for IT forensics Principles of IT auditing Organisation of IT forensic analyses Security technology: tools, systems and applications Seite 17/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

18 Teaching and learing methods: Literature: Lecture and exercises in small groups IT-Forensik [IT Forensics] by Alexander Geschonnek, 2011 The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics by John Sammons, 2012 Handbuch der Sicherheitstechnik: Freigeländesicherung, Zutrittskontrolle, Einbruch- und Überfallmeldetechnik von Georg Walz, 1992 Additional information: Seite 18/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

19 8. Secure ICT Infrastructures and IT Services Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: SM_MA_SichereIKTInf_ITDienste Secure ICT Infrastructures and IT Services Secure ICT Infrastructures (1st term) Secure IT Services (2nd term) Two terms SM Ma, 1 st and 2 nd semester, required module Usability of the module: Frequency of offering of modules: Author: Private lecturer: Language of instruction: Prerequisites: Every academic year Prof. Dr. Eberhard von Faber Dr. Eberhard von Faber German Importance of IT Security and its role in practical applications; technical and physical principles; basics of internet network technology, operating systems and cryptology technologies. Basic knowledge of business processes and corporate governance; Knowledge of Information and Communications Technology: Applications, Systems and Networks, including the underlying technology. ECTS-Credits: 6 Total workload and its composition: Form of teaching/semester hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: 180 hours = 60 hours of attendance and 120 hours of selfstudy 2 x 30 hours lecture using different media, project work and self testing elements. Practical examination + presentation or oral examination 6,25% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Development of the ability to integrate the required solutions adequately into various ITC infrastructures and usage scenarios; familiarization with service models including Cloud Computing and its implications Development of ability to analyse requirements and industrial practical factors and to integrate solutions based on the practical example of an industrial solution Familiarization with security modules and embedded systems as core components for distributed systems; properties, challenges and use; principles of usage and on Seite 19/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

20 the security of chip cards Details of PKI as infrastructure for secure communication, including testing schemes as international infrastructure for the risk management based on the example of payment systems Understanding of technologies and organisation of modern (industrial) ITC production, and especially the incidental security questions Usage and integration of IT services in business processes; assessment of security requirements, evaluation and selection of IT services Successful implementation of Identity and Access Management (IAM): understanding of basic terminology, architectures and technologies; planning and implementation in companies and in complex value-added chains Contents: Fundamentals of ITC production; ITC architectures and infrastructure elements; Security aspects; Management of solutions for the system and network security; processes and organisation; Tasks ranging from weak point management to Disaster Recovery User and Producer: IT services; Security requirements, evaluation, selection and integration; Security and risk management in outsourcing, basic problems and sourcing models Enterprise Security Architecture: ICT Production, Service Design, Transition, Service Delivery Management, Security Management, GRC Basic terminology IAM (from Identification to Accounting), Authentication: Types, methods, technologies; problems and solutions; Architectures and distributed systems (e.g. LDAP, RADIUS, Kerberos, ESSO, Single Sign-On, Federation), Authorization: Services and limitations; Strategies (DAC, MAC, RBAC, IF); Realization (Groups, Roles, ACL, Capabilities); Alternatives; Trends and Outlook including DRM, Identity Management: Administrative tasks, Registration, Workflows, Enrolment; Credential Management, User Self- Service, UHD etc. Accounting; Analytics; Attestation; Intelligence, SOD IAM-Architectures (the whole picture); Infrastructures Erection and implementation of IAM programs in large enterprises Integration of various solutions in the ITC network: business processes vs. ITC; Usage scenarios vs. ITC; service models and Cloud Computing: division of labour, Seite 20/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

21 service models, security management Learning situation of a special industry application: requirements and solutions; Practical factors and their outcome, result and practice in industry Components for distributed systems and mobility: Embedded Systems; Properties, challenges and solutions; Internet of things; Life Cycle; Device Management and Security Design; Practical seminar: application, technology of the chip cards and practical attacks PKI: an infrastructure for secure communication (visible or invisible; function, realization, practice) Assurance: an infrastructure for Trust and Security in a (global) division of labour in industrial value-added chains Teaching and learning methods: Literature: Lecture utilizing various media, project assignments for practice, in depth study and self checks, including control questions/revision course Alexander Tsolkas and Klaus Schmidt: Rollen und Berechtigungskonzepte, Ansätze für das Identity- und Access Management im Unternehmen [Roles and Authorization Concepts, Approaches for the Identity and Access Management in the Company]; August 2010, Vieweg+Teubner Martin Kappes: Netzwerk- und Datensicherheit, Eine praktische Einführung [Network and Data Security, A Practical Introduction]; Vieweg+Teubner Hans-Peter Königs: IT-Risiko-Management mit System, Von den Grundlagen bis zur Realisierung. Ein praxisorientierter Leitfaden [IT Risk Management with System, From the Basics to Realization. A Practiceoriented Guide], Vieweg Claudia Eckert: IT Security, Concepts - Methods Protocols J. R. Winkler: Securing the Cloud: Cloud Computer Security Techniques and Tactics, Syngress. Current Journals and Magazines on the topic: kes, Der Sicherheitsberater [The Security Advisor], S&I. Anderson, Ross: Security Engineering, A Guide to Building Dependable Distributed Systems; John Wiley & Sons Common Criteria for Information Technology Security Evaluation; or ISO Rankl, Wolfgang and Wolfgang Effing: Handbuch der Chipkarten, Aufbau, Funktionsweise, Einsatz von Smart Cards; [Manual of Chip Cards, Structure, Functioning, Usage of Smart Cards] by Hanser technical publishers Additional information: Seite 21/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

22 9. Secure Systems Lifecycle Management Brief module label: Module description: SM_MA_SecureSystems Secure Systems Lifecycle Management Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: Usability of the module: Frequency of offering of modules: Author: Private lecturer: Language of instruction: Prerequisites: One semester SecMan Master, 2nd semester, required module The module can also be offered as compulsory optional module for WI [Information Systems] and Computer Science Master degree programmes. Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Sachar Paulus 80% German, 20% English Initial experience in programming web applications for an exemplary scenario. Normally, this should be ensured by studies completed until this point of time. Alternatively: selfstudy, for example, based on PHP 5.3: Program Dynamic Websites Professionally by Christian Wenz and Tobias Hauser (December 2009) ECTS-Credits: 6 Total workload and its composition: Form of teaching/semester hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: 180 hours = 60 hours of attendance and 120 hours of selfstudy 30 h lecture, 30 h exercices and supervised self-practicioning Practical examination + presentation or oral examination 6,25% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Knowing and application of Best Practices taught during the development of IT based systems for secure software Development of acceptance criteria for non-functional security requirements Carrying out threat models Avoidance of weak points during the development Carrying out security checks Secure installation and operation of software Establishment of a Security Response Program Analysis of existing software for security-related weak Seite 22/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

23 points Development and implementation of a protective program for software during the system development Establishment of a Management System for security in the development process, and integration of such Management System into a possibly available quality process Carrying out security analyses ( Hacking ) Presentation of investigation results Contents: Teaching and learning methods: Literature: Basic principles of secure software development: Security requirements Safe designing and threat models Architecture analyses Secure coding Security checks Secure systems Security Response Protection of own software against manipulation and know-how theft Interactive combination of lecture, exercises on own computer, lab exercises, preparation and presentation of content, demonstration of concepts, practical tasks in groups. Basiswissen sichere Software [Basics of secure software] by Sachar Paulus, dpunkt Software-Qualität, Testen, Analysieren und Verifizieren von Software [Software Quality, Testing, Analysis and Verification of Software] by Peter Liggesmeyer, Spektrum Akademischer Verlag, Writing Secure Code by Michael Howard & David LeBlanc, Additional information: Seite 23/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

24 10. Scientific Writing Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: SM_MA_WissSchreiben Scientific Writing Semester Thesis 1 Semester Thesis 2 Two terms SecMan Master, 1 st and 2 nd term, required module Usability of the module: Frequency of offering of modules: Author: Private lecturer: Language of instruction: Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Friedrich Holl and all other participating teaching faculty members German Prerequisites: ECTS-Credits: 3 Total workload and its composition: Form of teaching/semester hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: Teaching and learning methods: 180 hours = 60 hours of attendance and 120 hours of selfstudy Each semester 15h lecture and 15h seminar including presentations by students Written assignments 6,25% oft the final grade Preparation of scientific papers related to the topic of security Methods of collection of data (statistics, interviews, primary/secondary sources) Source discussion: research, reading, evaluation Creative techniques and self-organisation Situation-related requirements for writing styles (advertising, press releases, scientific papers etc.) Preparation of an exposé Methodical structure of scientific papers Phases of scientific working methods Material collection and research Material evaluation and selection Material and topic processing Method of quoting Lecture, discussion, presentation of own results. Seite 24/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

25 Literature: DIN 1421 (Classification and Numbering System in texts) Eco, U. (2005) Wie man eine wissenschaftliche Abschlussarbeit schreibt - Doktor-, Diplom- und Magisterarbeit in den Geistes- und Sozialwissenschaften [How to Compile Final Thesis for Doctorate, Graduate and Postgraduate Studies in Humanity and Social Science Studies], Müller, Heidelberg, Theisen, Manuel R.: Scientific Papers Technique & Methodology, Form, Peterssen, Wilhelm H.: Scientific Papers - An Introduction for School and Studies, Additional information: Seite 25/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

26 11. Project Brief module label: Module description: SM_MA_Projekt Project Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: One term SecMan Master, 2 nd term, required module Usability of the module: Frequency of offering of modules: Author: Private lecturer: Language of instruction: Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Friedrich Holl and all other participating teaching faculty members German Prerequisites: ECTS-Credits: 6 Total workload and its composition: Form of teaching/semester hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: 180 hours = 60 hours of attendance and 120 hours of selfstudy Lecture: 15 h Practical, demonstration of work: 45 h Practical work + presentation 6,25% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Conducting security projects Planning a security-related project while following all requirements of security Application of project management methodologies Problem identification: - Systematic preparation of the State of the Art technology - Integration into the available practical context - Basic conditions of deployment - Use of different techniques of analysis such as interview method, questionnaire Delphi method, preparation of the context concerning documents and so on. Development of expected concepts: - Systematically founded development of a practice- Seite 26/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

27 oriented approach to solutions - Use of creative methods - Cost-benefit analyses - Development of basic conditions for deployment Prototypical implementation - the prototypical implementation is carried out by developing a software prototype - implementation in an enterprise/organisation or e.g. development of an application for R&D sponsorship Teaching and learning methods: Literature: Additional information: Lecture, practical work in groups comprising maximum 7 participants, presentation of own results. A Guide to the Project Management Body of Knowledge, PMI, 2008 For this course, the candidate s willingness to undertake practical work with cooperating partners is a prerequisite. Seite 27/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

28 12. Master s Thesis Brief module label: Module description: Master s Thesis Master s Thesis incl. Master s Seminar Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: One semester SecMan Master, 3 rd term, required module Usability of the module: Frequency of offering of modules: Author: Private lecturer: Language of instruction: Prerequisites: Every academic year Prof. Dr. Sachar Paulus All faculty members of the university teaching in the course German / English (as per student s option). Only candidates may register themselves for Master s Thesis, who have successfully completed all examinations and course achievements except the compulsory optional modules1 ECTS-Credits: 21 Total workload and its composition: Form of teaching/semester hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: Teaching and learning methods: Literature: 600 hours of self-study Self-study. Master s Thesis (75%) Colloquium (25%) 30% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Preparation of a scientific paper under the guidance with own creative and/or constructive portions of the topic Security Management within a period of 4 months The Master s Thesis is intended as related preoccupation with an extensive topic and the resulting solution for a theoretical or practical problem. Self-study. Booth, W. C. et a. (1995). The draft of research. Chicago London Brown, S. R. et al. (1990) Experimental Design and Analysis. London Cialdini, R. B. (2001). Influence, Science and Practice. Bosten, M.A. Seite 28/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

29 Hussley, J., Hussley, R. (1997). Business Research. A practical guide for undergraduate and postgraduate students Karmasin, M. et al. (1999). Die Gestaltung wissenschaftlicher Arbeiten: ein Leitfaden für Haus-, Seminar- und Diplomarbeiten sowie Dissertationen [The Designing of Scientific Papers: A Guide for Homework, Seminar and Graduation Papers and Dissertations]. Vienna Pyrczak, S. et. Al. (1998). Writing empirical Research Reports. Los Angeles. C.A. Seale, C. (1999). The quality of quantitative research. London Trachim, W. M. K. (2000). The Research Knowledge Base. Cincinatti. Ohio Additional information: Seite 29/29 Catalogue of Modules M. Sc. Security Management V. of 2014 May 2014

How To Pass An It Forensics Course

How To Pass An It Forensics Course Catalogue of Modules M. Sc. Security Management February 2014 Impressum Autor: Prof. Dr. Sachar Paulus Redaktion: Prof. Dr. Sachar Paulus Druck: Druckerei der Fachhochschule Brandenburg Kontakt: Fachhochschule

More information

Catalogue of Compulsory Optional Modules M. Sc. Security Management (2014)

Catalogue of Compulsory Optional Modules M. Sc. Security Management (2014) Catalogue of Compulsory Optional Modules M. Sc. Security Management (2014) Juli 2014 Impressum Autor: Prof. Dr. Sachar Paulus Redaktion: Prof. Dr. Sachar Paulus Druck: Druckerei der Fachhochschule Brandenburg

More information

Guidance to the Master and PhD Programmes in Computer Science

Guidance to the Master and PhD Programmes in Computer Science Guidance to the Master and PhD Programmes in Computer Science at the Faculty of Science, University of Basel Department of Mathematics and Computer Science Bernoullistrasse 16, CH 4056 Basel Tel: +41 61

More information

M.A. Programme in Corporate Communication Management (Improved Programme for 2006)

M.A. Programme in Corporate Communication Management (Improved Programme for 2006) M.A. Programme in Corporate Communication Management (Improved Programme for 2006) 1. Programme Title Master of Arts Programme in Corporate Communication Management 2. Degree Full Title: Abbreviated Title:

More information

Bachelor s Degree Programme in International Sales and Marketing Professionsbachelor i international handel og markedsføring

Bachelor s Degree Programme in International Sales and Marketing Professionsbachelor i international handel og markedsføring Joint curriculum August 2014 Bachelor s Degree Programme in International Sales and Marketing Professionsbachelor i international handel og markedsføring Part 1: Common Part 1. PROGRAMME CONTENT... 2 1.1.

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

Program Catalog. Master s degree: Biology (Master of Science, M.Sc.)

Program Catalog. Master s degree: Biology (Master of Science, M.Sc.) Program Catalog Master s degree: Biology (Master of Science, M.Sc.) (60 ECTS points) Based on the Examination Regulations from September 21, 2012 88/026/---/M1/H/2012 Version: May 1, 2013 Table of Contents

More information

Programme Specification and Curriculum Map for MSc Network Security and Pen Testing

Programme Specification and Curriculum Map for MSc Network Security and Pen Testing Programme Specification and Curriculum Map for MSc Network Security and Pen Testing 1. Programme title MSc Network Security and Pen Testing 2. Awarding institution Middlesex University 3. Teaching institution

More information

School of Earth and Environmental Sciences (SEES) The University of Guyana. Proposal

School of Earth and Environmental Sciences (SEES) The University of Guyana. Proposal School of Earth and Environmental Sciences (SEES) The University of Guyana Proposal Postgraduate Diploma/Master of Science Degree in Environmental Management Expected Start Date: August 2012 Proposed by

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Module Description. Master Programme. International Business and Finance (M.A.)

Module Description. Master Programme. International Business and Finance (M.A.) Fakultät für Wirtschaft Module Description Master Programme International Business and Finance (M.A.) (Version: 2014-10-01) Introduction: The official requirements for the degree program 'International

More information

Program Catalog. Master s degree: Biology (Master of Science, M.Sc.)

Program Catalog. Master s degree: Biology (Master of Science, M.Sc.) Program Catalog Master s degree: Biology (Master of Science, M.Sc.) (60 ECTS points) Based on the Examination Regulations from September 21, 2012 88/026/---/M1/H/2012 Version: May 1, 2013 LUDWIG-MAXIMILIANS-UNIVERSITÄT

More information

ROMANIAN - AMERICAN UNIVERSITY. School of Domestic and International Business, Banking and Finance

ROMANIAN - AMERICAN UNIVERSITY. School of Domestic and International Business, Banking and Finance Invest in People! Project co-financed by European Social Fund through the Sectoral Operational Programme Human Resource Development 2007 2013 Priority Axis: 1. Education and training in support for growth

More information

TEACHING AND EXAMINATION REGULATIONS PART B: programme specific section MASTER S PROGRAMME SYSTEM AND NETWORK ENGINEERING

TEACHING AND EXAMINATION REGULATIONS PART B: programme specific section MASTER S PROGRAMME SYSTEM AND NETWORK ENGINEERING UNIVERSITY OF AMSTERDAM FACULTY OF SCIENCE TEACHING AND EXAMINATION REGULATIONS PART B: programme specific section Academic year 2015 2016 MASTER S PROGRAMME SYSTEM AND NETWORK ENGINEERING Chapter 1 Article

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Module Handbook for the Master Degree Programme "Intercultural Communication and European Studies (ICEUS)

Module Handbook for the Master Degree Programme Intercultural Communication and European Studies (ICEUS) Module Handbook for the Master Degree Programme "Intercultural Communication and European Studies (ICEUS) M 1 Communication, Intercultural Communication and Understanding the Cultural Other Learning Objectives:

More information

MSc in Computer and Information Security

MSc in Computer and Information Security MSc in Computer and Information Security Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.

More information

Hochschule Esslingen University of Applied Sciences

Hochschule Esslingen University of Applied Sciences Hochschule Esslingen University of Applied Sciences Campus Göppingen Campus Hilltop Faculty of Engineering Management Faculty of Information Technology - English Lectures - English Lectures Core Courses:

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

Comparative Social Policy and Welfare

Comparative Social Policy and Welfare K 066/929 Curriculum Joint Master s Degree Programme Comparative Social Policy and Welfare In English, organised jointly with Mykolas Romeris University (Lithuania) University of Tampere (Finland) 5_MS_CompSocialPolicyWelfare

More information

11741 E-Business Credit Hours: 3 11752 Integrated Application Systems Credit Hours: 3 11742 Enterprise Systems Architecture Credit Hours: 3

11741 E-Business Credit Hours: 3 11752 Integrated Application Systems Credit Hours: 3 11742 Enterprise Systems Architecture Credit Hours: 3 11741 E-Business E-Business is radically changing the ways in which business organizations operate and compete in the global market. This course introduces students to various aspects and models for e-business.

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

1. Programme title and designation Advanced Software Engineering

1. Programme title and designation Advanced Software Engineering PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION 1. Programme title and designation Advanced Software Engineering 2. Final award Award Title Credit Value MSc Advanced Software Engineering

More information

M.Sc. Health Economics and Health Care Management

M.Sc. Health Economics and Health Care Management List of Courses M.Sc. Health Economics and Health Care Management METHODS... 2 QUANTITATIVE METHODS... 2 ADVANCED ECONOMETRICS... 3 MICROECONOMICS... 4 DECISION THEORY... 5 INTRODUCTION TO CSR: FUNDAMENTALS

More information

Module Catalogue for the Master s Program National and International Administration and Policy (MANIA) Master of Arts.

Module Catalogue for the Master s Program National and International Administration and Policy (MANIA) Master of Arts. Module Catalogue for the Master s Program National and International Administration and Policy (MANIA) Master of Arts Page 1 of 17 Table of Contents COURSE OF STUDY... 3 Figure 1: Course of Study for the

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

Description of the program

Description of the program Study program Faculty Cycle Software Engineering Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program The Masters programme in Software Engineering

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

MEng Engineering Management

MEng Engineering Management MEng Engineering Management PROGRAMME SPECIFICATION COURSE TITLES: MEng Engineering Management with DPP (6614) BEng Hons Engineering Management with DPP (Exit Award) AB Engineering Management with or without

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

MSc Business Analysis and Finance.

MSc Business Analysis and Finance. MSc Business Analysis and Finance Programme Specification Course Title MSc Business Analysis and Finance. Course Overview The MSc Business Analysis and Finance degree is a one-year full-time course for

More information

BEng Hons Engineering Management

BEng Hons Engineering Management BEng Hons Engineering Management PROGRAMME SPECIFICATION COURSE TITLES: BEng Hons Engineering Management with DPP (3262) AB Engineering Management with or without DPP (Exit Award) Certificate of Higher

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

MSc Financial Economics.

MSc Financial Economics. MSc Financial Economics Programme Specification Course Title MSc Financial Economics. Course Overview The MSc in Financial Economics degree is a one-year full-time course for graduates who wish to apply

More information

Media: Conception and Production (B.A.) English taught courses

Media: Conception and Production (B.A.) English taught courses Media: Conception and Production (B.A.) English taught courses Module 06 Production Module name Module name in English Production Production MO 06MCP Module Number (optional) 1600 Degree program Person

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

Programme Specification and Curriculum Map for MSc Computer Networks

Programme Specification and Curriculum Map for MSc Computer Networks Programme Specification and urriculum Map for MSc omputer Networks 1. Programme title MSc omputer Networks 2. Awarding institution Middlesex University 3. Teaching institution Middlesex University 4. Programme

More information

Course Curriculum for Master Degree in Nursing / Services Administration

Course Curriculum for Master Degree in Nursing / Services Administration Course Curriculum for Master Degree in Nursing / Services Administration The Master Degree in Administration is awarded by the Faculty of Graduate Studies at Jordan University of Science and Technology

More information

INSTITUTE OF CONTINUING AND DISTANCE EDUCATION

INSTITUTE OF CONTINUING AND DISTANCE EDUCATION INSTITUTE OF CONTINUING AND DISTANCE EDUCATION PHD IN ADULT EDUCATION AND HUMAN RESOURCE STUDIES OVERVIEW The Doctor of Philosophy (Ph.D.) in Adult Education and Human Resource Studies is to provide leadership

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Integrated degree of PhD and LLM (Legal Studies) 1

Integrated degree of PhD and LLM (Legal Studies) 1 Integrated degree of PhD and LLM (Legal Studies) 1 Programme of Study for Integrated degree of PhD and LLM (Legal Studies) 2 A minimum of 180 credits in modular courses will be taken in Years One and Two:

More information

Conditions of Studies Economics - Business Administration (B.A.) for the bachelor study programme of Business Administration (B.A.

Conditions of Studies Economics - Business Administration (B.A.) for the bachelor study programme of Business Administration (B.A. Study Regulations* for the bachelor study programme of Business Administration (B.A.) at SRH Hochschule Berlin according to the decision of the senate 17 of the basic statutes 27. May 2010 1 * Whenever

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

Comparative Social Policy and Welfare

Comparative Social Policy and Welfare K 066/929 Curriculum Joint Master s Degree Programme Comparative Social Policy and Welfare In English, organised jointly with Mykolas Romeris University (Lithuania) University of Tampere (Finland) 3_MS_ComSocialPolicy

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Professionsbachelor i Innovation og Entrepreneurship Bachelor of Innovation and Entrepreneurship

Professionsbachelor i Innovation og Entrepreneurship Bachelor of Innovation and Entrepreneurship Bachelor of Innovation and Entrepreneurship 2012-2014 Professionsbachelor i Innovation og Entrepreneurship Bachelor of Innovation and Entrepreneurship August 2012 Bachelor of Innovation and Entrepreneurship

More information

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: OCCUPATIONAL GROUP: Information Technology CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: This family of positions provides security and monitoring for the transmission of information in voice, data,

More information

Faculty of Business Management. Undergraduate Programme English Courses - Descriptions

Faculty of Business Management. Undergraduate Programme English Courses - Descriptions Faculty of Business Management Undergraduate Programme English Courses - Descriptions Summer Semester 2015 Fachhochschule Kiel - University of Applied Sciences Faculty of Business Management Christina

More information

UNIVERSITY OF BELGRADE FACULTY OF PHILOSOPHY. Part two: INFORMATION ON DEGREE PROGRAMS

UNIVERSITY OF BELGRADE FACULTY OF PHILOSOPHY. Part two: INFORMATION ON DEGREE PROGRAMS Part two: INFORMATION ON DEGREE PROGRAMS Part two: Information on Degree Programs Philosophy Bachelor s Degree Philosophy Master s Degree Philosophy Doctoral Degree Sociology Bachelor s Degree Sociology

More information

Business Analytics (AQM5201)

Business Analytics (AQM5201) Prof. Dr. Thomas Cleff Office hours: Thu, 3.30pm-5pm E-mail: thomas.cleff@hs-pforzheim.de Business Analytics (AQM5201) Syllabus Summerterm 2015 Time: Thursday 9.45am-11.15am Room: W2.3.12 Begin: 19 th

More information

K 066/921. Master Curriculum. Computer Science. (in English)

K 066/921. Master Curriculum. Computer Science. (in English) K 066/921 Master Curriculum Computer Science (in English) 1_MS_ComputerScience_Curr Seite 1 von 11 Inkrafttreten: 1. 10. 2013 Table of Contents 1 Qualification Profile...3 2 Admissions...5 3 Structure

More information

Programme Specification

Programme Specification LOUGHBOROUGH UNIVERSITY Programme Specification Information Technology & Physics Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes

More information

Bachelor of International Sales and Marketing Management Professionsbachelor i international handel og markedsføring

Bachelor of International Sales and Marketing Management Professionsbachelor i international handel og markedsføring August 2009 Curriculum Bachelor of International Sales and Marketing Management Professionsbachelor i international handel og markedsføring Contents Contents... 1 Section 1: General... 3 1 The Course...

More information

Master Business Intelligence and Process Management

Master Business Intelligence and Process Management Hochschule für Wirtschaft und Recht Berlin Berlin School of Economics and Law Department of Business and Economics Master Business Intelligence and Process Management Business Intelligence and Process

More information

Faculty of Organizational Sciences

Faculty of Organizational Sciences Faculty of Organizational Sciences Management EC TS: 60/ L anguage of instruc tion: Serbian/ degree: M A S TER The Master s degree study program of Management is the continuation of undergraduate studies

More information

Zurich Universities of Applied Sciences and Arts. Master of Science in Facility Management

Zurich Universities of Applied Sciences and Arts. Master of Science in Facility Management Zurich Universities of Applied Sciences and Arts Master of Science in Facility Management The Master of Science in Facility Management is modular, and each semester has a specific focus. In the first semester,

More information

Programme Specification and Curriculum Map for MSc Computer and Network Security

Programme Specification and Curriculum Map for MSc Computer and Network Security Programme Specification and Curriculum Map for MSc Computer and Network Security 1. Programme title MSc Computer and Network Security 2. Awarding institution Middlesex University 3. Teaching institution

More information

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with

More information

Software Quality. Introduction " Martin Glinz. Chapter 1. Department of Informatics!

Software Quality. Introduction  Martin Glinz. Chapter 1. Department of Informatics! Department of Informatics! Martin Glinz Software Quality Chapter 1 Introduction 2014 Martin Glinz. All rights reserved. Making digital or hard copies of all or part of this work for educational, non-commercial

More information

Customised programmes

Customised programmes Customised programmes for your company s needs Design your education programme Table of Contents P03 Steinbeis Business Academy P04 Your benefit - Project Competence Concept P05 Added value for the customer

More information

Verfahrenstechnik und Chemieingenieurwesen

Verfahrenstechnik und Chemieingenieurwesen Verfahrenstechnik und Chemieingenieurwesen Qualification Frames and Curricula for Degree Courses for Process Engineering, Chemical Engineering and Biomolecular or Bioprocess Engineering at Universities

More information

Programme Specification and Curriculum Map for MSc Network Management and Cloud Computing

Programme Specification and Curriculum Map for MSc Network Management and Cloud Computing Programme Specification and Curriculum Map for MSc Network Management and Cloud Computing 1. Programme title MSc Network Management and Cloud Computing 2. Awarding institution Middlesex University 3. Teaching

More information

SUBJECT-SPECIFIC CRITERIA

SUBJECT-SPECIFIC CRITERIA SUBJECT-SPECIFIC CRITERIA Relating to the accreditation of Bachelor s and Master s degree programmes in the field of mathematics (09 December 2011) The following specifications complement the ASIIN General

More information

Module compendium of the Master s degree course of Information Systems

Module compendium of the Master s degree course of Information Systems Module compendium of the Master s degree course of Information Systems Information Management: Managing IT in the Information Age Information Management: Theories and Architectures Process Management:

More information

Translation of the Fachprüfungsordnung Biologische Ozeanographie only the German version is legally binding! -

Translation of the Fachprüfungsordnung Biologische Ozeanographie only the German version is legally binding! - Translation of the Fachprüfungsordnung Biologische Ozeanographie only the German version is legally binding! - Regulations for Qualifying Examinations (Ordinance) for the Faculty of Mathematics and Natural

More information

Curriculum. for the Master s Degree Program in MEDIA AND CONVERGENCE MANAGEMENT

Curriculum. for the Master s Degree Program in MEDIA AND CONVERGENCE MANAGEMENT Curriculum for the Master s Degree Program in MEDIA AND CONVERGENCE MANAGEMENT Entry into effect: 1.10.2013 Curriculum for the Master s degree program in MEDIA AND CONVERGENCE MANAGEMENT Content 1 General...

More information

JOB DESCRIPTION. 1. JOB TITLE: Senior Lecturer in Computer Science (Cyber Security)

JOB DESCRIPTION. 1. JOB TITLE: Senior Lecturer in Computer Science (Cyber Security) JOB DESCRIPTION 1. JOB TITLE: Senior Lecturer in Computer Science (Cyber Security) 2. HRMS REFERENCE NUMBER: HR14195 3. ROLE CODE: FINSLTSR4 4. DEPARTMENT: Department of Computer Science Faculty of Science

More information

continue to advance their Manufacturing Management knowledge and understanding, and develop new skills to a high level;

continue to advance their Manufacturing Management knowledge and understanding, and develop new skills to a high level; PROGRAMME SPECIFICATION COURSE TITLES: PgD Manufacturing Management MSc Manufacturing Management PgC Engineering (Exit award only) PLEASE NOTE: This specification provides a concise summary of the main

More information

MSc Economics Programme Specification. Course Title MSc Economics.

MSc Economics Programme Specification. Course Title MSc Economics. MSc Economics Programme Specification Course Overview Course Title MSc Economics. The MSc Economics degree is a one-year full-time course. It provides a foundation in modern techniques of quantitative

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

DoQuP project. WP.1 - Definition and implementation of an on-line documentation system for quality assurance of study programmes in partner countries

DoQuP project. WP.1 - Definition and implementation of an on-line documentation system for quality assurance of study programmes in partner countries DoQuP project WP.1 - Definition and implementation of an on-line documentation system for quality assurance of study programmes in partner countries Deliverable 1.3 - Methodologies and procedures of definition,

More information

Curriculum Form. 1. Name of the curriculum Küberturbe tehnoloogiad 2. Name of the curriculum in Cyber Security Engineering

Curriculum Form. 1. Name of the curriculum Küberturbe tehnoloogiad 2. Name of the curriculum in Cyber Security Engineering Curriculum Form 1. Name of the curriculum Küberturbe tehnoloogiad 2. Name of the curriculum in Cyber Security Engineering English 3. Level of higher education Applied higher education 4. Form of study

More information

DEPARTMENT OF MATHEMATICS

DEPARTMENT OF MATHEMATICS UNIVERSITY OF PATRAS DEPARTMENT OF MATHEMATICS PROGRAM OF POSTGRADUATE STUDIES (For general information about the Department see the PROGRAM OF UNDERGRADUATE STUDIES) ACADEMIC YEAR 2005-2006 1. GENERAL

More information

MBA AND EMBA PROGRAMMES AT COLOGNE BUSINESS SCHOOL

MBA AND EMBA PROGRAMMES AT COLOGNE BUSINESS SCHOOL WWW.CBS.DE/EN MBA AND EMBA PROGRAMMES AT COLOGNE BUSINESS SCHOOL ACADEMIC EXCELLENCE COLOGNE BUSINESS SCHOOL WHO WE ARE COLOGNE BUSINESS SCHOOL Since opening its doors in 1993, the Cologne Business School

More information

School of Computer Science

School of Computer Science School of Computer Science Head of School Professor S Linton Taught Programmes M.Sc. Advanced Computer Science Artificial Intelligence Computing and Information Technology Information Technology Human

More information

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS COURSE PROFILE Course Name Code Semester Term Theory+PS+Lab (hour/week) Local Credits ECTS Network Security IT527 Fall 3 + 0 + 0 3 8 Prerequisites None Course Language Course Type Course Lecturer Course

More information

Modulhandbuch / Program Catalog. Master s degree Evolution, Ecology and Systematics. (Master of Science, M.Sc.)

Modulhandbuch / Program Catalog. Master s degree Evolution, Ecology and Systematics. (Master of Science, M.Sc.) Modulhandbuch / Program Catalog Master s degree Evolution, Ecology and Systematics (Master of Science, M.Sc.) (120 ECTS points) Based on the Examination Regulations from March 28, 2012 88/434/---/M0/H/2012

More information

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT UNDERGRADUATE Bachelor's programs Bachelor of Business Administration with a concentration in information systems and technology management (http:// bulletin.gwu.edu/business/undergraduate-programs/

More information

STUDY REGULATIONS Study regulations for International Executive Master of Business Administration (MBA) program, applicable to English language

STUDY REGULATIONS Study regulations for International Executive Master of Business Administration (MBA) program, applicable to English language STUDY REGULATIONS Study regulations for International Executive Master of Business Administration (MBA) program, applicable to English language version Table of contents Page 2 1 Equity principle... 3

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

Information and Network Security Certificate Program

Information and Network Security Certificate Program Information and Network Security Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA 92612-6050 www.extension.uci.edu PROGRAM DESCRIPTION Data security is critical and increasingly

More information

Programme Title: MSc in International Business History

Programme Title: MSc in International Business History Programme Title: MSc in International Business History Awarding Institution: The University of Reading Teaching Institution: The University of Reading Faculty of Economics and Social Sciences Programme

More information

PUBLIC HEALTH NUTRITION Master of Science (M.Sc.)

PUBLIC HEALTH NUTRITION Master of Science (M.Sc.) MODULE HANDBOOK PUBLIC HEALTH NUTRITION Master of Science (M.Sc.) Module Nutritional and Health Politics Credit Points: 10 Degree Programme: MSc Public Health Nutrition ID: OE-MS-GEE Faculty: Nursing and

More information

Curriculum for Bachelor s Degree Programme in Procuct Development and Technology Integration. September 2011

Curriculum for Bachelor s Degree Programme in Procuct Development and Technology Integration. September 2011 Curriculum for Bachelor s Degree Programme in Procuct Development and Technology Integration September 2011 Table of Contents The purpose of the curriculum is: 4 1. The purpose of the educational programme

More information

REGULATIONS OF UNDERGRADUATE KAZAKH NATIONAL UNIVERSITY NAMED AFTER AL-FARABI

REGULATIONS OF UNDERGRADUATE KAZAKH NATIONAL UNIVERSITY NAMED AFTER AL-FARABI 12 REGULATIONS OF UNDERGRADUATE KAZAKH NATIONAL UNIVERSITY NAMED AFTER AL-FARABI This provision establishes the requirements for the content of education, educational trajectories of students, development

More information

International Media Studies. Master s degree

International Media Studies. Master s degree International Media Studies Master s degree International Media Studies Identifying global trends, fostering international networks, applying cross-media journalistic skills these are challenges facing

More information

MSc Money and Banking Programme Specification. Course Title

MSc Money and Banking Programme Specification. Course Title MSc Money and Banking Programme Specification Course Title MSc Money and Banking. Course Overview The MSc in Money and Banking degree is a one-year full-time course for graduates who wish to apply their

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

CURRICULUM MASTER OF DISASTER MANAGEMENT

CURRICULUM MASTER OF DISASTER MANAGEMENT CURRICULUM MASTER OF DISASTER MANAGEMENT Applicable to students enrolling in one or more of the below components of the Master of Disaster Management (MDMa) as of September 1 st 2013 The programme is delivered

More information

Study, Internship, and Examination Regulations. Academy Profession and Bachelor Degrees INTERNATIONAL BUSINESS COLLEGE MITROVICA

Study, Internship, and Examination Regulations. Academy Profession and Bachelor Degrees INTERNATIONAL BUSINESS COLLEGE MITROVICA Study, Internship, and Examination Regulations Academy Profession and Bachelor Degrees INTERNATIONAL BUSINESS COLLEGE MITROVICA These study and examination regulations apply for the two year Academy Profession

More information

RISK MANAGEMENT IN COMPANIES A QUESTIONNAIRE AS AN INSTRUMENT FOR ANALYSING THE PRESENT SITUATION

RISK MANAGEMENT IN COMPANIES A QUESTIONNAIRE AS AN INSTRUMENT FOR ANALYSING THE PRESENT SITUATION RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA 2014 Volume 22, Special Number RISK MANAGEMENT IN COMPANIES A QUESTIONNAIRE AS AN INSTRUMENT

More information

Economics and Business Management. BA Programme Handbook 2015 2016

Economics and Business Management. BA Programme Handbook 2015 2016 Economics and Business Management BA Programme Handbook 2015 2016 Contents The Degree Programme: Aims, Objectives and Outcomes The Degree Programme Structure The Degree Programme Regulations Strategies

More information

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS. School of Arts and Social Sciences Department or equivalent Department of Psychology

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS. School of Arts and Social Sciences Department or equivalent Department of Psychology PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Programme name Psychology Award BSc (Hons) School School of Arts and Social Sciences Department or equivalent Department of Psychology UCAS Code

More information

MASTER OF PHILOSOPHY IN RISK PSYCHOLOGY, ENVIRONMENT AND SAFETY

MASTER OF PHILOSOPHY IN RISK PSYCHOLOGY, ENVIRONMENT AND SAFETY MPHIL IN RISK PSYCHOLOGY, ENVIRONMENT AND SAFETY SIDE 575 MASTER OF PHILOSOPHY IN RISK PSYCHOLOGY, ENVIRONMENT AND SAFETY Approved by the Board of NTNU 01.10.2008, with changes made by the Faculty of Social

More information

Course Catalogue. Masters Programme Human-Computer Interaction (MINF-M-120-MCI) 120 credit points

Course Catalogue. Masters Programme Human-Computer Interaction (MINF-M-120-MCI) 120 credit points Course Catalogue Masters Programme Human-Computer Interaction (MINF-M-120-MCI) 120 credit points According to the Examination Regulations from 25.09.2012 Version(2014/12/18) 1 About the Programme of Studies

More information