List of courses

436 - Cyber Security

Course #: 436
Instructor: Engelbert Hubbers
Faculty: Computer science and engineering
Target and year audience: Bachelor students, 4 years
Course type: Elective
No. of credits: 6 ECTS
Major: Computer science
Academic year, semester: 2016-2017, Spring
Language: English
Grading mode: A, B, C, D
Passport course: 436_E.Hubbers_Cyber security.pdf

Course outline

This is an introductory course on Security. Security is about regulating access to assets. This course tries to activate security awareness. The course addresses several situations where security is (or should be) a concern. After the course students should be able to recognize these possible security concerns in different situations. Furthermore, students will learn the basic technology for solving these problems. In particular students will learn about security protocols and the mathematical primitives used within these protocols, like symmetric and asymmetric cryptography and hashes.

Course Delivery

The course will be given over six days. Two days in August, in September and in October. Typically the days include four hours of plenary lectures in the morning and four hours of exercise hours in the afternoon. But depending on the topics, it may happen that there are more plenary lectures on a day and less exercise hours. During the exercise hours students have to work in groups on assignments and some results have to be presented. The sixth day will be used for the final exam.

Prerequisite courses

“Operating systems and Networking” and “Discrete Mathematics”.

Required background knowledge

Students should have some programming experiences. Preferably in C, but Java or Python is probably also sufficient. Students should have basic knowledge about Linux systems. Furthermore, students should have basic knowledge about discrete mathematics, in particular modular arithmetic.


“Introduction to Computer Security” by Michael Goodrich and Roberto Tamassia. Pearson New International Edition, ISBN 978-1-292-02540-7, Pearson Education Limited.

Reference Materials

“Understanding Cryptography” by Christof Paar and Jan Pelzl. Springer-Verlag Berlin Heidelberg 2010, ISBN 978-3-642-44649-8.

Computer Resources

Students should have access to computers that can run virtual machines within VirtualBox.

Laboratory Exercises

This list is not compiled yet, but there will be some assignments where students have to implement well known protocols or attacks on protocols.

Laboratory Resources 

 Students should have access to computers that can run virtual machines within VirtualBox.

Late Submission Policy

This policy will be strictly applied in this course. If a personal emergency should arise that affects your ability to turn in an assignment in a timely fashion, you must contact the course instructor BEFORE the deadline to get a “Special Late Submission Approval” from the course instructor. Without the “Special Late Submission Approval” submissions will be still accepted up to 48 hours late, but with a 50% penalty. No “Special Late Submission Approval” will be granted after the deadline. All late submissions should be submitted by email directly to the instructor.

Cooperation Policy and Quotations

Most assignments will be made in groups. And although groups are allowed to discuss problems with other groups, any deliverable should be unique for each group. We also insist that if you include verbatim text from any source, you clearly indicate it using standard conventions of quotation or indentation and a note to indicate the source.

Сайт находится в технической разработке