Master of Science in Information Security - MIS
Short description
Information technology permeates all aspects of society and has become critical to industry, government, and individual well-being. Securing these vital services and structures and the availability of trustworthy information whenever and wherever it is required has become both an area of intensive research and also of burgeoning commercial activity. A master of science in information security will provide the students with the knowledge and theoretical background as well as with the requisite skills and attitudes to succeed in this challenging yet eminently rewarding field.
Duration
This is a two-year master program (120 ECTS credits) which is also available part-time over three or four years. The degree awarded upon completion is “Master of Science in Information Security”.
The program has two tracks: management and technology. Students have to choose which track they persue when entering the program (see the course structure below).
The program qualifies students to proceed to Ph.D. studies.
Expected learning outcomes
Upon completion of the programme, the students will have a solid understanding of the interdisciplinary field of information security. The graduated students will be proficient in core topics such as security management, computer and network security, and will be able to understand the critical information infrastructures and the security aspects of important IT services which society depends on. The students will also have gained a particular in-depth understanding of either technology or management issues dependent on their chosen programme track, and scientific depth in a specialized topic through their master thesis.
Internationalization
Students can travel abroad to do their master thesis. The information security group has strong links to many of the leading international academic groups within the field, and students are encouraged to contact their instructor in the course «research project planning» to ask for relevant travel opportunities.
Target Group
There are three focus groups for this study programme:
1. Undergraduate students entering the programme as a continuation of their bachelors degree without any prior work experience.
2. Industry students (or students in private/public sector in general) looking for a full-time or part-time masters programme which is flexible and can be adapted to their employers needs and their own individual needs.
3. International students: full-time, part-time or exchange students arriving for only single semesters.
Admission Criteria
Applicants must have a bachelors degree in computer science or a related subject to qualify for admission. The applicants must document that they have at least 10 ECTS credits in mathematics/statistics and at least 60 ECTS credits in computer science subjects. A grade point average (GPA) of C is required. It is expected that within these credits the following topics have been covered:
- Structural and object-oriented programming
- Algorithms and data structures
- Databases and XML
- Software engineering
- Computer network (Data communication)
- Operating systems and computer architecture
Students who have not had a dedicated course in each of these topics need to be prepared for a little bit of extra studying when entering topics that require background knowledge with which they are not sufficiently familiar beforehand.
Graduate studies in information security require a somewhat different mathematical platform than tha one included in most bachelor studies. To master the theoretical topics included in the masters programme we therefore recommend that the students attend the preporatory courses in number theory and theoretical computer science offered during the first weeks of the fall semester.
Course Structure
The programme is offered in a flexible manner to fit well to all the three target groups of students. In general, on campus presence is required only three times per semester (1-3 days each time), for a start-up session, for mid-term exams/presentations (and a start-up session of second part of the semester) and for final exams/presentations. Attendance is also strongly recommended for the initial first two weeks of the programme when two preparatory intense short-courses in number theory and theoretical computer science are offered . All courses are available online, but there will also be sessions on a regular weekly or bi-weekly schedule. The presence on these sessions is not requiered.
More details for the upcoming year of study will be given here: link to hig/imt/master
The program has two tracks (paths of study): management and technology. Students have to choose which track they persue when entering the programme. Common to both tracks are a set of courses covering the core topics in both information security technology and management: introduction to cryptology, applied information security, network security, IT governance, information society and security, and legal aspects of information security. In addition, each track have a set of specific courses and the students have to choose at least 15 credits of courses from the track-specific pool of electives. Students also have to choose their master thesis topic within their chosen track.
Ordinary mandatory courses from the other track of the programme and courses from the masters programme in media technology and the CIMET (Color in Informatics and Media Technology) master can be included as electives. Students can also use up to 20 ECTS of courses at the 3000 level as part of their masters programme, and are particularly encouraged to browse the course offerings of the bachelor programmes in network and system administration, software engineering, and economics and management. Some of the courses listed above can also be mobile in time, space and teaching format upon request by students (typically a course can be taken in a different semester through self-study and individual or group supervision).
Master-level courses from other institutions can be included as electives or can substitute for mandatory courses at the discretion of the programme director.
The course structure for part-time students can be composed individually as long the track-specific requirements mentioned above and any course interdependencies are respected. The most important course interdependencies are the following: 1. Students should enter their master thesis in the semester following the research project planning course, 2. All previous course work have to be completed before entering the master thesis (an exception of 10 credits missing can be made at the discretion of the master thesis instructor, but only if the missing credits are not relevant for the topic of the master thesis).
Students entering the programme from the bachelors programme in information security will be offered greater flexibility in the course structure due to potential overlap with some of the contents in the bachelors programme.
Study methods
- Lectures
- Exercises
- Project work
- Essay/Article writing
- Independent study
- Group exercises
- Lab exercises
Technical Prerequisites
Students who choose to participate in the study program on distance, need a relatively new computer and a broadband Internet connection. Software that is needed is mostly freely available on the Internet. In some courses commercial products, such as MatLab, are required.
For practical computer skills, it is expected that students can use any common operating system (MacOS, Solaris, GNU/Linux or Microsoft Windows) both with a graphical user interface and a command line interface.
Students who have not had a dedicated course on each of these topics should not worry, they just need to be prepared for a little bit of extra studying when entering topics that require background knowledge with which they are not sufficiently familiar beforehand.
Graduate studies in information security requires a somewhat different mathematical platform than the one included in most bachelor studies. To master the theoretical topics included in the masters programme we therefore recommend that you attend the preparatory courses in number theory and theoretical computer science offered during the first two weeks of the fall semester.
Table of subjects
Master of Science in Information Security 2009-2011 Technology full-time track
Coursecode | Course name | C/E *) | ECTS each. semester | |||
---|---|---|---|---|---|---|
S1(A) | S2(S) | S3(A) | S4(S) | |||
IMT4421 | Scientific Methodology | C | 5 | |||
IMT4541 | Foundations of Information Security | C | 5 | |||
IMT4561 | Applied Information Security | C | 5 | |||
IMT4531 | Introduction to Cryptology | C | 5 | |||
IMT4571 | IT Governance | C | 5 | |||
IMT4551 | Selected Topics in Cryptology | C | 5 | |||
IMT4581 | Network Security | C | 10 | |||
IMT4591 | Legal Aspects of Information Security | C | 5 | |||
IMT4481 | Information Society and Security | C | 5 | |||
Elective course, 5 ECTS | E | 5 | ||||
Elective course, 5 ECTS | E | 5 | ||||
IMT4601 | Research Project Planning | C | 5 | |||
Elective course, 5 ECTS | E | 5 | ||||
Elective course, 5 ECTS | E | 5 | ||||
Elective course, 5 ECTS | E | 5 | ||||
Elective course, 5 ECTS | E | 5 | ||||
Elective course, 5 ECTS | E | 5 | ||||
IMT4901 | Master's Thesis | C | 30 | |||
Sum: | 30 | 30 | 30 | 30 |
Master of Science in Information Security 2009-2011 Management full-time track
Coursecode | Course name | C/E *) | ECTS each. semester | |||
---|---|---|---|---|---|---|
S1(A) | S2(S) | S3(A) | S4(S) | |||
IMT4561 | Applied Information Security | C | 5 | |||
IMT4661 | Security Management Dynamics | C | 5 | |||
IMT4421 | Scientific Methodology | C | 5 | |||
IMT4531 | Introduction to Cryptology | C | 5 | |||
IMT4651 | Security as Continuous Improvement | C | 5 | |||
IMT4571 | IT Governance | C | 5 | |||
IMT4841 | Security Planning and Incident Management | C | 10 | |||
IMT4581 | Network Security | C | 10 | |||
IMT4481 | Information Society and Security | C | 5 | |||
IMT4591 | Legal Aspects of Information Security | C | 5 | |||
IMT4601 | Research Project Planning | C | 5 | |||
Elective course, 5 ECTS | E | 5 | ||||
Elective course, 5 ECTS | E | 5 | ||||
Elective course, 5 ECTS | E | 5 | ||||
Elective course, 5 ECTS | E | 5 | ||||
Elective course, 5 ECTS | E | 5 | ||||
IMT4901 | Master's Thesis | C | 30 | |||
Sum: | 30 | 30 | 30 | 30 |
Master of Science in Information Security 2009-2012 Technology part-time track (three years)
Coursecode | Course name | C/E *) | ECTS each. semester | |||||
---|---|---|---|---|---|---|---|---|
S1(A) | S2(S) | S3(A) | S4(S) | S5(A) | S6(S) | |||
IMT4531 | Introduction to Cryptology | C | 5 | |||||
IMT4551 | Selected Topics in Cryptology | C | 5 | |||||
IMT4421 | Scientific Methodology | C | 5 | |||||
IMT4571 | IT Governance | C | 5 | |||||
IMT4591 | Legal Aspects of Information Security | C | 5 | |||||
IMT4481 | Information Society and Security | C | 5 | |||||
IMT4581 | Network Security | C | 10 | |||||
IMT4601 | Research Project Planning | C | 5 | |||||
IMT4541 | Foundations of Information Security | C | 5 | |||||
IMT4561 | Applied Information Security | C | 5 | |||||
Elective course, 5 ECTS | E | 5 | ||||||
Elective course, 5 ECTS | E | 5 | ||||||
Elective course, 5 ECTS | E | 5 | ||||||
Elective course, 5 ECTS | E | 5 | ||||||
Elective course, 5 ECTS | E | 5 | ||||||
Elective course, 5 ECTS | E | 5 | ||||||
Elective course, 5 ECTS | E | 5 | ||||||
IMT4901 | Master's Thesis | C | 10 | 20 | ||||
Sum: | 20 | 20 | 20 | 20 | 20 | 20 |
Master of Science in Information Security 2009-2012 Management part-time track (three years)
Coursecode | Course name | C/E *) | ECTS each. semester | |||||
---|---|---|---|---|---|---|---|---|
S1(A) | S2(S) | S3(A) | S4(S) | S5(A) | S6(S) | |||
IMT4651 | Security as Continuous Improvement | C | 5 | |||||
IMT4421 | Scientific Methodology | C | 5 | |||||
IMT4661 | Security Management Dynamics | C | 5 | |||||
IMT4571 | IT Governance | C | 5 | |||||
IMT4841 | Security Planning and Incident Management | C | 10 | |||||
IMT4481 | Information Society and Security | C | 5 | |||||
IMT4591 | Legal Aspects of Information Security | C | 5 | |||||
IMT4531 | Introduction to Cryptology | C | 5 | |||||
IMT4561 | Applied Information Security | C | 5 | |||||
IMT4601 | Research Project Planning | C | 5 | |||||
Elective course, 5 ECTS | E | 5 | ||||||
IMT4581 | Network Security | C | 10 | |||||
Elective course, 5 ECTS | E | 5 | ||||||
Elective course, 5 ECTS | E | 5 | ||||||
Elective course, 5 ECTS | E | 5 | ||||||
Elective course, 5 ECTS | E | 5 | ||||||
IMT4901 | Master's Thesis | C | 10 | 20 | ||||
Sum: | 20 | 20 | 20 | 20 | 20 | 20 |
Electives
Coursecode | Course name | C/E *) | ECTS each. semester | |
---|---|---|---|---|
S1(A) | S2(S) | |||
IMT4671 | Organizational and Human Aspects of Information Security | E | 5 | |
IMT3491 | Ethical Hacking and Penetration Testing | E | 5 | |
IMT4632 | Machine Learning and Pattern Recognition II | E | 5 | |
IMT3551 | Digital Forensics | E | 5 | |
IMT4882 | Specialization Course II | E | 10 | 10 |
IMT3761 | Information Warfare | E | 5 | |
IMT4721 | Authentication | E | 5 | |
IMT4741 | Intrusion detection and prevention | E | 5 | |
IMT4762 | Risk Management I | E | 5 | |
IMT4751 | Wireless communication security | E | 5 | |
IMT4772 | Risk Management II | E | 5 | |
IMT4881 | Specialization Course | E | 5 | 5 |
IMT4641 | Computational Forensics | E | 5 | |
IMT4612 | Machine Learning and Pattern Recognition I | E | 5 | |
IMT4621 | Biometrics | E | 5 | |
IMT3511 | Discrete Mathematics | E | 10 | |
Sum: | 0 | 0 |