Each module contains 3 ECTS. You choose a total of 10 modules/30 ECTS in the following module categories:
- 12-15 ECTS in technical scientific modules (TSM)
TSM modules teach profile-specific specialist skills and supplement the decentralised specialisation modules. - 9-12 ECTS in fundamental theoretical principles modules (FTP)
FTP modules deal with theoretical fundamentals such as higher mathematics, physics, information theory, chemistry, etc. They will teach more detailed, abstract scientific knowledge and help you to bridge the gap between abstraction and application that is so important for innovation. - 6-9 ECTS in context modules (CM)
CM modules will impart additional skills in areas such as technology management, business administration, communication, project management, patent law, contract law, etc.
In the module description (download pdf) you find the entire language information per module divided into the following categories:
- instruction
- documentation
- examination
This module is designed to provide a practical introduction to Cyber Security Operations. Students will learn about different operational security functions like SOCs, CERTs, DFIR teams, CTI and Hunt teams, Red and Blue teams, and the tools they use to detect and respond to cyber criminal activity. The module provides in depth coverage of digital forensics.
Prerequisites
Students should have a basic understanding of the fundamentals of cybersecurity, including network security, system security, and cryptography. Additionally, they should have a good understanding of operating systems, and network architecture. Basic knowledge of OSINT would also be beneficial.
Learning Objectives
Upon completion of the module, students should be able to:
- Understand operational cyber security roles and responsibilities within an organization,
- Explain basic concepts of detection, incident response, threat intelligence, and security testing.
- Perform digital evidence preservation and forensic analysis, conduct investigations
- Write forensic/incident reports for different recipients (police, regulators, management, technical peers)
- Restore an organization to a safe and operational state
- Understand how ethical hacking can be used to improve the security of systems
Contents of Module
DFIR: Digital Forensics and Incident Response (DFIR) is the main focus of the module. This includes securing and preserving digital evidence, forensic analysis, reconstructing past events, creating timelines, and performing investigations.
Detection: students will be introduced to logging and monitoring systems, intrusion and anomaly detection systems (HIDS and NIDS), and Security Information and Event Management (SIEM) systems, and other operational aspects of detection.
CTI: students will be introduced to Cyber Threat Intelligence (CTI), the intelligence process and lifecycle, intel sharing communities, intel / IOC exchange platforms (like MISP), and OSINT.
Security testing: The testing component covers a high level overview of penetration/Red-Team testing, security reviews, cyber excercises, and ethical hacking. The use of Bug-Bounty programs to improve security is also explained
Teaching and Learning Methods
Lectures with a mix of practical and theoretical exercises.
Literature
The following material is provided:
- Teacher's slides and notes
- Selected publications (papers, books)
- Relevant videos
Download full module description
Back