UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com



Similar documents
PROGRAMME SPECIFICATION

MSc Studies in Computing

MScand Postgraduate Diploma in Information Security Royal Holloway, University of London

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

N/A. Computer Science. Software Engineering. Electrical and/or Electronic Engineering. Mathematics with Computer Science

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION

MSc Cyber Security. identity. hacker. virus. network. information

Kidričeva cesta 55a 4000 Kranj, Slovenia

(FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. June 2015

MSc Programme Intelligent Adaptive Systems (IAS)

UNIVERSITY OF BRADFORD Faculty of Social Sciences Division of Economics Programme title: MSc in Financial Economics

PROGRAMME SPECIFICATION MSc Speech, Language and Communication Needs in Schools: Advanced Practice

Programme name Mathematical Science with Computer Science Mathematical Science with Computer Science with Placement

Programme Specification and Curriculum Map for MSc Network Security and Pen Testing

Henley Business School at Univ of Reading

Cyber Security in the University of Oxford: Collaborating without Conforming?

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group

Programme Specification and Curriculum Map for MSc Computer and Network Security

How To Get A Masters Degree In Management At University Of Bromford

RESEARCH DEGREES ACADEMIC REGULATIONS. School of Engineering. Bangkok University

University of Bradford. 1 year full time, 2 years part-time

Programme Specification MASTER OF STUDIES IN INTERNATIONAL RELATIONS

Department of Information Systems and Cyber Security

POSTGRADUATE OPEN DAY

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

PROGRAMME SPECIFICATION

Dept. of Financial Information Security

Part-time MSc in Cyber Security from Northumbria University. masters.qa.com

Henley Business School at Univ of Reading

Programme Specification. MRes Developmental Psychology. Valid from: September 2012 Faculty of Health & Life Sciences

2. Cyber security research in the Netherlands

1. Awarding Institution: Imperial College London. 2. Teaching Institution: Imperial College London

Cybersecurity Major. College of Arts and Letters Interdisciplinary Studies. Program Guide. Version 3 August 2015.

Curriculum Form. 1. Name of the curriculum Küberturbe tehnoloogiad 2. Name of the curriculum in Cyber Security Engineering

PROGRAMME SPECIFICATION Postgraduate Diploma / Master of Science Psychology

Cyber Security in the Financial Industry

Henley Business School at Univ of Reading. Postgraduate Pre-Experience Board of Studies

TOP. Masters in Psychology. Acquire a deep understanding of human behaviour to drive performance in people and organisations

Henley Business School at Univ of Reading. Eligible for British Computer Society Professional Certificate in Business Analysis Practice

Relevant QAA subject Benchmarking group(s): Master's degrees in business and management, 2007 Henley Business School at Univ of Reading

Important Steps to a Masters or PhD in Public Health

ACADEMIC YEAR SCHOOL OF INFORMATION TECHNOLOGY. AS in INFORMATION TECHNOLOGY. BS in INFORMATION TECHNOLOGY

MSc in Physics Research For students entering in 2006

Computer Security and Investigations

Nottingham Trent University Course Specification

MSc in Computer and Information Security

KUBAN STATE UNIVERSITY: DOUBLE-DEGREE MASTER S PROGRAMME INNOVATION FOR THE INSTITUTION ENVIRONMENT

University of Sussex School of Mathematical and Physical Sciences. Mathematics.

Programme Specification 2015/16

(FHEQ) level 7] MA/MSc Postgraduate Diploma Postgraduate Certificate. September 2015

REVISED GRID FOR MICRO LEVEL APPROACH

Arts, Humanities and Social Science Faculty

BA Community Health and Nursing Studies

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION

How To Become A Financial Economist

Frequently Asked Questions (FAQ) on SUSPLACE vacancies

Psychology. Undergraduate

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Post-graduate Programmes in Construction. Royal Institution of Chartered surveyors (RICS), Chartered Institute of Building (CIOB)

COURSE TITLE COURSE DESCRIPTION

Introducing Chula Systems Engineering. An International Community of system engineers Creating culture of desirable technology

CURRICULUM AND INSTRUCTION

School of Management and Information Systems

Important Steps to Becoming an MA/MS or PhD in Engineering Psychology and Human Factors


MSc in Clinical Aspects of Psychology (full-time) For students entering Part 1 in 2014/5. Relevant QAA subject Benchmarking group(s):

Important Steps to a Career in Higher Education (MA/MS or or PhD)

The York Social Policy Masters Programme

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Masters in Management of Information Security and Risk

How To Get A Foundation Degree

PROGRAMME DETAIL SPECIFICATION. Programme Summary

The UK s European university EXTERNAL RESEARCH DEGREES

MASTER OF STUDIES IN INTERNATIONAL RELATIONS

UNIVERSITY OF ULSTER: COLERAINE PROGRAMME SPECIFICATION. COURSE TITLE: B.Sc. (HONS) SOCIAL PSYCHOLOGY/ B.Sc. (HONS) SOCIAL PSYCHOLOGY with DPP

Postgraduate Study at Manchester Business School. Rachel Tufft Head of Postgraduate Marketing

MSc in Cognitive Neuroscience (full-time) For students entering in 2013/4. Relevant QAA subject Benchmarking group(s): Life Sciences Faculty

Study at one of the top 25 universities in Europe

Published in German language in the official bulletin ( Amtliche Bekanntmachungen ) of Ulm University, No. 6 of 16 march 2015, p.

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

CONTENT. King Abdullah II Faculty of Engineering

G603: Software Development for Business

UNIVERSITY OF AMSTERDAM FACULTY OF SCIENCE. EDUCATION AND EXAMINATION REGULATIONS Academic Year PART B THE MASTER S PROGRAMME IN LOGIC

SMU PhD IN PSYCHOLOGY. Cutting-edge insights into individuals, organisations and societies

Henley Business School at Univ of Reading. Accreditation from the British Computer Society will be sought

Study in India, graduate from the University of London

Transcription:

UCL MSc in Information Security Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com

About UCL Established in 1826 First institution to welcome students of any race, class or religion, and female students on equal terms with men Today, a globally leading university with a strong research focus 29 Nobel Prize Winners and 3 Fields Medalists London s Global University

UCL Computer Science 80 faculty, 300+ researchers Hosts the Science of Security Institute, recognized as Academic Centre of Excellence in Cybersecurity Ranked #1 in the UK as per recent Research Excellence Framework Why Study Information Security at UCL? World-class faculty Cutting-edge research Hands-on experience and industry collaborations Balanced mix of theory and practice

Our Graduates Keenly sought by leading security organisations UCL-CS international reputation, strong links with industry, and world-class research Top graduate destinations: IBM, Ernst&Young, Cisco, KPMG Top graduate roles: Security consultant, secure software designer, information protection advisor, security analyst Avg starting salary 31,200 (Jan 2013)

What We Teach Computer and Network Security Cryptography and Cryptanalysis Cybercrime Human-centered Security Privacy Technologies Software Security Engineering

Meet Our Faculty Earl Barr Research in program analysis, information theory, optimisation Teaches Malware David Clark Research in analysis and verification, understanding software and specifications Teaches Malware, Language Based Security

Nicolas Courtois Research in cryptanalysis, crypto currencies, infosec Teaches Cryptanalysis, Applied Cryptography George Danezis Research in anonymous comms, privacy technologies, cryptography engineering Teaches Computer Security I, Privacy

Emiliano De Cristofaro Research in applied crypto, privacy technologies, measuring security and privacy issues Teaches Computer Security II, Intro to Crypto Brad Karp Research in systems security, wireless networks, distributed systems, networking, operating systems Teaches Distributed Systems and Security

Jens Krinke Research in program analysis, malware analysis, taint analysis, information flow control bug detection Teaches Malware, Language Based Security Granville Moore Research Co-Ordinator of Institute in Science of Cyber Security (RISCS) Teaches Information Security Management

Steven Murdoch Research in authentication, passwords, banking security, anonymous comms, censorship resistance and covert channels Teaches Research in Information Security Angela Sasse Research in human and economic aspects of security, usable security Teaches People and Security

Gianluca Stringhini Research in social network security, web security, botnet mitigation, and cyber crime Teaches Computer Security II, Cybercrime Jens Groth Research in cryptography, zero-knowledge proofs

Sarah Meiklejohn Research in cryptography, crypto currencies David Pym Research in security economics, policy, logic, access control

Our Modules Four compulsory modules 1. Introduction to Cryptography 2. Computer Security I 3. Computer Security II 4. Research in Information Security Four optional modules From official MSc ISec modules From other programmes

MSc ISec Optional Modules Four optional modules to choose from: Applied Cryptography Cryptanalysis Privacy Technologies Malware Language based Security People and Security Information Security Management Cybercrime Distributed Systems and Security Cryptography Software Security Human Centered Security Network Security

Other optional modules: Examples Interested in Software Security Engineering? Requirements Engineering and Software Architecture Validation and Verification Or Human Aspects of Security? Understanding Usability and Use Organisational Psychology Sociotechnical Systems: IT and the Future of Work More Human Computer Interaction, Communications and Networks, Entrepreneurship, Risk, Regulation and Compliance, Elliptic Curves, etc.

Thesis Independent piece of research Thesis (50+ pages) + oral exam Can be completed whilst working alongside a company Extra-Curricular Activities Weekly InfoSec Seminars Invited speakers UCL academics, researchers, PhD students Weekly Hacking Seminar Bitcoin Research Seminar Industry Day

Options Full-time MSc programme 8 modules and a thesis in one year Part-time MSc programme 8 modules over 2 years and thesis in last year Students must be available to follow modules during day time teaching hours Diploma 8 modules but no thesis

Prerequisites Bachelors or Masters degree in Computer Science Mathematics Or other quantitative discipline Application Ability to understand theory Programming and understanding of algorithms Good English language skills Interest in Information Security

Schedule Term 1: October December Term 2: January March Exams for all modules: May Thesis: June August (Preparation: January - May) Oral exam: September Graduation: November

Personal tutor Member of academic staff Academic advice Should I take module X or module Y? My thesis adviser and I do not get along Student representative Speaks on behalf of the MSc group General issues that affect the entire group Scheduling conflict between core modules Suggestions for improvement Etc Confidential Problem with personal tutor Course director, graduate tutor, Head of Dept

Relevant Contacts Programme Director Dr Emiliano De Cristofaro e.decristofaro@ucl.ac.uk Admissions Tutor Dr George Danezis g.danezis@ucl.ac.uk Programme Administrator Sean Taylor sean.taylor@ucl.ac.uk

More info UCL MSc ISec http://www.cs.ucl.ac.uk/admissions/msc_isec/ UCL Information Security Group http://sec.cs.ucl.ac.uk https://benthamsgaze.org/ (blog) Academic Centre of Excellence in Cyber Security http://sec.cs.ucl.ac.uk/ace_csr/ @uclisec UCL MSc Information Security