SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
NordSecMob
                           Master's Programme
                           in Security and
                           Mobile Computing



Mobile computing
Data security
Computer science
Double degree
Scholarships




                                Coordinator:
                                Helsinki University of Technology – TKK (Finland)

                                Partners:
                                The Royal Institute of Technology – KTH (Sweden)
                                The Norwegian University of Science and
                                Technology – NTNU (Norway)
                                Technical University of Denmark – DTU (Denmark)
http://nordsecmob.tkk.fi        University of Tartu – UT (Estonia)
NordSecMob
Master's Programme in Security and Mobile Computing
                                                                                                           http://nordsecmob.tkk.fi

NordSecMob - Erasmus Mundus Programme

NordSecMob - Master's Programme in Security
and Mobile Computing is one of the European
top-quality Masters Courses selected by the
European Commission Erasmus Mundus pro-
gramme. Erasmus Mundus, which is a co-
operation and mobility programme, both pro-
motes the European Union (EU) as a centre of
excellence in higher education around the world
and supports European top-quality Masters
Courses.


Erasmus Mundus -programmes
offer culturally enriching higher
education opportunities for both                                                 ICELAND

European and Non-European
students. Students from any
country can apply to NordSec-                                                                                              Trondheim
                                                                                                                                                               FINLAND
Mob-Master’s programme in                                                                                             NORWAY              SWEDEN
Security and Mobile Computing.                                                                                                                                Espoo
Non-European students have an                                                                                                                                                                RUSSIA
                                                                                                                                                                      ESTONIA
                                                                                                                                         Stockholm
opportunity to apply for an                                                                                                                                           Tartu

Erasmus Mundus Scholarships.                                                                                                                                                    LATVIA

                                                                                                               DENMARK
                                                                                                                                                                    LITHUANIA
                                                                                    IRELAND
                                                                                                                                         Copenhagen

                                                                                              U. K.
                                                                                                                                                                                  BYELARUS
                                                                                                                    NETH

                                                                                                                           .

                                                                                                                               GERMANY                 POLAND
                                                                                                          BELGIUM


                                                                                                                                                                                             UKRAIN
                                                                                                                    LUX.
                                                                                                                                              CZECH
                                                                                                                                                         SLOVAKIA



                                                                                                 FRANCE                                   AUSTRIA
                                                                                                                                                      HUNGARY
                                                                                                                                                                                ROMANIA



Read more: http://ec.europa.eu/education/programmes/mundus/index_en.html
EU Member States: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland, France,
Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal,
Romania, Slovakia, Slovenia, Spain, Sweden, United Kingdom EAA/EFTA states: Iceland, Norway, Liechtenstein
EU Candidate States (presently): Croatia, Turkey and the Former Yugoslav Republic of Macedonia



The NordSecMob-consortium is responsible for the information included in this brochure.




2    NordSecMob
The World is Changing
Communications play a major role in today's
world. The rise of sophisticated communications
techniques and technologies is having a funda-
mental and profound impact, and digital com-
munications and mobile computing allow new
levels of freedom and flexibility for people, com-
panies, and governments.

Mobile computing studies embrace all aspects
related to wireless and mobile communication.
The future is very much wireless, and thus this
area of research and development is crucial for
the next generation services and applications.


Security and Mobile Computing
                 Security is an integral part of
                 today's IT world. Information
                 flows need to be secured and
                 communicating parties au-
                 thenticated. Computer net-
                 works, wired or wireless, are
                 vulnerable to all kinds of at-
                 tacks, and must be protected.
                 And mobile computing presents
                 a new range of security chal-
                 lenges that must be addressed.
                 Hence, security is an important
                 part of in this curriculum.   .


                 Be Mobile –
                 Join NordSecMob!
                Apply for the NordSecMob
  TKK           programme and help shape the
                future! Not only will you gain
                in-depth knowledge and prac-
                tical know-how of the mobile
revolution, but at the same time you will have
a chance to experience the cultures of two north-
ern European countries.




                                                3
                                NordSecMob
Doub
NordSecMob – Two Universities – Double Degree


NordSecMob is a two-year Master of Science
degree Programme (120 ECTS credits). During
the programme, the students will study at two
of the five Nordic partner universities: Helsinki
University of Technology (TKK) in Finland, Tech-
nical University of Denmark (DTU), The Royal
Institute of Technology (KTH) in Sweden, The
Norwegian University of Science and Technology
(NTNU) and the University of Tartu (UT) in Esto-
nia. After completing the two-year programme,
successful students will be awarded two officially
recognized M.Sc. degrees: one from each uni-
versity where they studied.




The programme offers students breadth and
deep of knowledge in the field of computer
science, data security and mobile comput-
ing, both in theory and in practice. The pro-
gramme develops the students' research skills
to enable them to take up further studies at PhD
level; it also provides experience of international
R&D environments, and enables access to major
international networks.




4   NordSecMob
le Degree




                   5
      NordSecMob
Joint Study Programme
A joint curriculum is defined for the programme
and it involves always two universities. The 120
ECTS credit points are divided into two blocks:
1-2 semesters of teaching (30-60 ECTS credit
points) will be provided by the home university
and 1-2 semesters of teaching (30-60 ECTS
credit points) will be provided by the host uni-
versity. The programme includes three semes-
ters of courses followed by a fourth research
semester (Master's thesis, 30 ECTS) under su-
pervision and evaluation by both the home and
host university. The student takes courses fo-
cusing on advanced topics on the selected area
of specialization:




                                                             TKK
                                              1st
                                              autumn
                    1st year
                                                       DTU
                                              1st
                                              spring

                                                             KTH   NTNU   UT
                                              2nd
                    2nd year                  autumn


                                              2nd
                                              spring




Joint Study Pr
6   NordSecMob
TKK:            Technical Information Security and Network Services


      KTH:            Communications Systems Design


      NTNU:           Information Security


      DTU:            Software Security


      UT:             Mathematical Foundations of Cryptography




        KTH                                             NTNU



DTU                                             DTU



       TKK          NTNU          UT                     TKK          KTH           UT



  Master´s Thesis




ogramme
The first autumn term studies are taken at one of the three universities: TKK, KTH or
NTNU. Students with the specialization quot;Software Securityquot; move from home university
to DTU for the first spring semester and stay second year at DTU. Students with other
specialization tracks move after first year studies to other (TKK, NTNU, KTH and UT) for
the second autumn semester.




                                                                                      7
                                                                       NordSecMob
Content of the Programme


TKK: Technical Information Security
and Network Services

The focus of the first autumn at TKK is hands
on learning of security and computer networks
through laboratory works and with emphasis
on basic courses of security and mobile com-
puting. The first spring concentrates on ad-
vanced courses in mobile computing, security,
and services including interactive courses,
project works and seminars. The focus of the
studies of the second autumn is on advanced
courses in mobile computing, security, and
services including interactive courses, project
works and seminars.


KTH: Communications Systems
Design

The focus of the first autumn at KTH is on com-
munication security, including advanced topics
in networking and security, theory and laboratory
exercises. The focus of the first spring is on
problem-oriented, project-driven learning in
teams addressing real-life problems in the com-
munication systems area, with external project
owners, optionally in parallel with a few technical
specialization courses on mobile services. The
focus of the second autumn at KTH is on ad-
vanced operator related topics, including tech-
nical network management, technology man-
agement and business management/creation.




                                                      KTH

8   NordSecMob
NTNU: Information Security

The focus of the first autumn at NTNU is on
basic networking courses, dependability, per-
formance, simulation and basic cryptography.
The focus of the first spring is on communication
security, including basic topics in networking
and security, theory and laboratory exercises
and topics on technology management and busi-
ness management/creation. The focus of the
second autumn at NTNU is on advanced topics
in networking and security with a minor thesis
on a specialization topic, security management.


DTU – Software Security

At DTU, the focus is on Safe and Secure IT-
Systems: Methods, tools and techniques for
design, implementation, and validation of safe
and secure IT-systems. Covering Network Tech-
nology (privacy and intrusion detection) as well
as Language Based Technology (program anal-
ysis, operational semantics, process calculi,
and software validation).


UT – Mathematical Foundations of
Cryptography

The focus of the studies at Tartu is on strong
theoretical foundation on cryptography, crypto-
graphic solutions, construction of secure proto-
cols, and related fields of mathematics (e.g.,
combinatorics and number theory).              .




                                               9
                               NordSecMob
Consortium Partner
Consortium Partners

The consortium is made up of renowned research and educational institutions in Europe
and top-ranking universities of technology in the Nordic countries.
For further information see http://nordsecmob.tkk.fi/research.html



  Helsinki University of Technology – TKK

                                              poo, neighbor city of Helsinki. The Depart-
TKK was founded in 1849 and received
                                              ment of Computer Science and Engineer-
university status in 1908. There are twelve
                                              ing at TKK is coordinating the NordSec-
faculties with 19 degree programmes and
                                              Mob-programme.
250 professors. 15 000 under- and post-
graduate students are studying at TKK.
The campus is located in Otaniemi in Es-      In the TKK NordSecMob-programme the
                                              research focus is on the evolution of the
                                              Internet technologies as well as on the
                                              design, implementation, and verification
                                              of IP based systems. In addition to the
                                              Internet technologies, research addresses
                                              mobile networks and specifically the de-
                                              velopment of applications and services in
                                              heterogeneous network environments.
                                              Focal areas for both Internet and mobile
                                              networks are security, service architec-
                                              tures and subjects related to service man-
                                              agement such as mobility, quality-of-
                                              service and charging. Security issues in-
                                              cluding privacy, trust and identity man-
                                              agement are central for this research
                                              group.           .




10   NordSecMob
s     The Royal Institute of Technology – KTH

                    KTH was founded in 1827
                    and is the largest of
                    Sweden's universities of
                    technology. It consists of
                    nine schools with over
                    11,000 undergraduate
                    students, 1,500 active
    postgraduate students and a staff of 3,100
    people. There are four campuses with the
    main campus in central Stockholm. The
    KTH part of the programme is organised
    under the KTH School of ICT.

                                                 integration of IP and optics, as well as
    The ICT school of KTH conducts research
                                                 architectures for network systems with
    on communication systems, including
                                                 particular focus on decentralized, modu-
    their use, policy and regulation of com-
                                                 larized approaches to network system
    munication markets, design and imple-
                                                 design. Security aspects related to distrib-
    mentation of applications, services and
                                                 uted service architectures, proxy systems,
    network systems. In the area of commu-
                                                 and secure voice over IP communication
    nication systems design, the main re-
                                                 are important areas of research.           .
    search topics are network architectures
    and protocols for the future Internet, the



      The Norwegian University of Science and Technology – NTNU

                                                 of Norway. The Department of Telematics
    NTNU was established in 1996 as a further
                                                 ITEM is responsible for the teaching of
    development of the University of Trond-
                                                 the courses in the NordSecMob-prog-
    heim (UNiT). NTNU has seven faculties
                                                 ramme at NTNU.
    and the faculty of Information Technology,
    Mathematics and
    Electrical Engi-                                                     The Department of
    neering has six de-                                                  Telematics focuses
    partments. There                                                     its information se-
    are 20,000 students,                                                 curity research on
    half of these study-                                                 two main topics:
    ing technology or the natural sciences       Security as a pivotal ingredient of Quanti-
    and a staff of 3,300 of which over half in   tative Quality of Service and cryptographic
    academic or scientific positions. NTNU is    protocols. Modelling, design, analysis and
    located in Trondheim, on the western coast   evaluation of information security for ICT




                                                                                        11
                                                                          NordSecMob
Photo: NTNU Info/Rune Petter Ness




systems, services and protocols have in       tographic functions for securing distribut-
the past most frequently been performed       ed computerized communication systems,
by using qualitative principles, methods      their goals being to restrict, establish and
and measures. However, in the present         preserve the security properties of infor-
transition into an end user environment       mation. A specific long-standing inquiry
dominated by ubiquitous computing power       in the field of crypto-protocols is that of
and service realization, the information      defining and constructing information pri-
security research needs to be focused on      vacy, for instance in digital cash and e-
the quantitative aspects of description and   voting schemes. Digital Tracks is another
negotiation of perceived QoS. Crypto-         research activity which addresses both
graphic Protocols can be considered as        privacy and forensic concerns.
distributed algorithms that employ cryp-



     Technical University of Denmark – DTU

                                              ence and Engineering section at the Infor-
              DTU was originally founded
                                              matics and Mathematical Modelling de-
              as the College of Advanced
                                              partment at DTU is responsible for the
              Technology in 1829. DTU has
                                              teaching of the programme. The teaching
              a high international stan-
                                              in safe and secure IT-systems is an estab-
              dard within the technical-
                                              lished part of DTU's engineering curricu-
              natural sciences, based on
                                              lum and supported by active research at
15 individual departments as well as a
                                              the department.
number of research centers on campus
in Kongens Lyngby, the Copenhagen Met-
ropolitan area. The University has approx-    In the DTU NordSecMob-programme there
imately 900 researchers, 6,000 students       are two main research components. One
and 600 PhD students. The Computer Sci-       deals with software security and focuses




12    NordSecMob
on techniques that can be used to validate
designs of systems for the absence of
security flaws and to develop systems that
can be relied upon to adhere to given se-
curity policies. To be specific, research on
communication protocols using static
analysis, originally developed in the EU-
project DEGAS, has successfully used to
validate a number of voting and single-
sign on protocols; research on access




                                                                                               Photo: Bo Jarner
control and information flow, including
the Decentralised Label Model, gives con-
crete techniques for constructing software
systems where code is guaranteed to
                                               are likely to give users privacy and ano-
satisfy given confidentiality, integrity or
                                               nymity; another focus is the study of in-
authenticity properties. Another deals with
                                               trusion detection systems and how they
system security and network security. One
                                               can best be configured to protect the user.
focus is on how to construct systems that


   University of Tartu – UT

UT was originally founded as Academia          clinics. The total number of students is
Dorpatensis (Gustaviana) in 1632 and it        over 18,000, with a teaching staff of 1,300.
was reopened in 1802. UT has 11 faculties,     UT is located in Tartu, in the southeast
3 research institutes and 6 colleges with      part of Estonia. The responsibility of the
more than 70 departments, institutes and       teaching of the programme at University
                                               of Tartu is on the Institute of Computer
                                               Science of the Department of Mathematics
                                               and Computer Science.

                                               The main NordSecMob-related research
                                               areas in Tartu University are data security
                                               and cryptography. The interests of our
                                               working group reach from practical secu-
                                               rity analysis to foundations of cryptograph-
                                               ic primitives. The main research topics
                                               are the following: security models based
                                               on attack trees, economics of security,
                                               privacy preserving data mining, formal
                                               proof systems for cryptographic protocols
                                               and properties of hash functions and ap-
                                               plications of hash functions in digital time-
                                               stamping.




                                                                                       13
                                                                        NordSecMob
NordSecMob
Admission Requirements                           cate. Either a TOEFL or IELTS test is ac-
                                                 cepted, with the following minimum total
                                                 scores:
The NordSecMob-programme is targeted
for top-quality students of all nationalities.
                                                 TOEFL minimum scores are 580 (PBT),
                                                 237 (CBT) and 92 (iBT).
The admission criteria to the programme
is a high quality Bachelor's degree en-
compassing a minimum of 180 ECTS                 IELTS minimum score is 6,5
credits in Engineering (Computer Science
or Information technology) or equivalent         For details, check NordSecMob-website.
studies, i.e., must be a degree of at least      http://nordsecmob.tkk.fi
three years of full-time studies.

The applicants should
have solid knowledge of
mathematics (discrete
m a t h e m a t i c s ) , p ro -
gramming skills, data
structures and algo-
rithms, computer archi-
tecture and basics of
computer networks. In
addition, a basic knowl-
edge of following subject
areas will be an advan-
tage: databases and da-
tabase management,
principles of theoretical computer sci-
                                                 Application deadline and
ence, logic in computer science, software
                                                 selection criteria
engineering, operating systems, and con-
current programming.
                                                 The annual application deadline is the
                                                 beginning of January. Details of required
The language of instruction of the Nord-
                                                 application documents and the on-line
SecMob-programme is English. Thus,
                                                 application form are on the NordSecMob-
applicants must have a good command
                                                 website. Admission to the programme is
of English and most applicants must
                                                 granted on a competitive basis.
present an official language test certifi-




14   NordSecMob
Scholarships for Students and Staff

Erasmus Mundus-scholarships               The amount of an average three-month
                                          scholarship for scholars is 13,000 Euro.
for Non-European students
                                          This includes three monthly grants of
                                          4,000 Euro and a fixed amount of 1,000
Non-European students can apply for
                                          Euro for travel expenses.
generous EU-funded Erasmus Mun-
dus scholarships. Eligible for the Er-
                                          Nordplus-scholarships for all
asmus Mundus scholarships are stu-
dents who are NOT nationals of the EU
                                          nationalities
member states, the EEA-states nor
nationals of the candidate countries      The selected NordSecMob-students
for accession to the EU. Furthermore,     can apply for Nordplus-scholar-
eligible students may not be residents    ships for the mobility period (max 10
of the EU/EEA/candidate countries,        months) to the host university. All na-
nor may they have carried out their       tionalities can apply for the Nordplus-
main activities (study, work, etc) for    scholarships.
more than a total of 12 months over
the last five years in the EU/EEA/can-    Erasmus-scholarships for
didate countries. These scholarships
                                          European students
are awarded to the best students on a
competitive basis.                        The European students selected to
                                          NordSecMob-programme can apply
The Erasmus Mundus scholarship to-        for Erasmus-scholarships for the mo-
tals 21,000 Euro per academic year.       bility period to the host university.
This includes 10 monthly grants of
1,600 Euro and a fixed amount of 5,000
                                          NordSecMob-consortium
Euro for fees, travel expenses, reloca-
                                          scholarships for EU/EEA
tion costs, etc. For NordSecMob-pro-
                                          citizens
gramme lasting two years the student
receives 42,000 Euro.
                                          The NordSecMob-consortium offers
                                          scholarships for excellent EU/EEA citi-
Erasmus Mundus scholarships               zens. For details, check NordSecMob-
for Non-European scholars                 website http://nordsecmob.tkk.fi
A scholar is an academic and/or pro-
                                          Programme fee
fessional of outstanding experience
who carries out teaching or research      There is no programme fee for
assignments and scholarly work in the     EU/EEA students. The programme
institutions participating in the Nord-   fee is charged from any other than EU
SecMob-programme. Erasmus Mun-            member state and EEA nationals. The
dus scholarships allow Non-European       programme fee is announced on the
scholars to perform the tasks defined     NordSecMob-website.
by the consortium for a maximum of
three months.




                                                                           15
                                                              NordSecMob
Helsinki University
                                                                             of Technology
                                                                             http://www.tkk.fi/




                                                                             The Royal Institute
                                                                             of Technology

                                                                             http://www.kth.se/

                                         Photo: Vadim Makarov www.vad1.com




                                                                             The Norwegian
                                                                             University of Science
                                                                             and Technology
                                                                             http://www.ntnu.no/




      Contact Information

       NordSecMob Consortium
                                                                             Technical University
                Faculty of Information
                                         Photo: Bo Jarner




                 and Natural Sciences                                        of Denmark
 Helsinki University of Technology TKK
                                                                             http://www.dtu.dk/
         Coordinator Ms Eija Kujanpää

street Konemiehentie 2 (P.O. Box 5400)
               02015 TKK, city: Espoo
                               Finland

     email: nordsecmob@tkk.fi

                 tel: +358-9-451 4773
                 fax +358-9-451 3015                                         University of Tartu

       http://nordsecmob.tkk.fi                                              http://www.ut.ee/

Weitere ähnliche Inhalte

Mehr von Febrian ‎

Cisco academy procedure cust
Cisco academy procedure custCisco academy procedure cust
Cisco academy procedure cust
Febrian ‎
 
QoS Cheatsheet by packetlife.net
QoS Cheatsheet by packetlife.netQoS Cheatsheet by packetlife.net
QoS Cheatsheet by packetlife.net
Febrian ‎
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010
Febrian ‎
 
MPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by KhatriMPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by Khatri
Febrian ‎
 
ipv6 mpls by Patrick Grossetete
ipv6 mpls by Patrick Grosseteteipv6 mpls by Patrick Grossetete
ipv6 mpls by Patrick Grossetete
Febrian ‎
 
BGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesBGP Advance Technique by Steven & James
BGP Advance Technique by Steven & James
Febrian ‎
 
Juniper MPLS Tutorial by Soricelli
Juniper MPLS Tutorial by SoricelliJuniper MPLS Tutorial by Soricelli
Juniper MPLS Tutorial by Soricelli
Febrian ‎
 
IPv6 Theory by Cisco
IPv6 Theory by CiscoIPv6 Theory by Cisco
IPv6 Theory by Cisco
Febrian ‎
 
Juniper IPv6 Workshop by Irzan
Juniper IPv6 Workshop by IrzanJuniper IPv6 Workshop by Irzan
Juniper IPv6 Workshop by Irzan
Febrian ‎
 

Mehr von Febrian ‎ (20)

Cisco academy procedure cust
Cisco academy procedure custCisco academy procedure cust
Cisco academy procedure cust
 
Iperf Tutorial
Iperf Tutorial Iperf Tutorial
Iperf Tutorial
 
QoS Cheatsheet by packetlife.net
QoS Cheatsheet by packetlife.netQoS Cheatsheet by packetlife.net
QoS Cheatsheet by packetlife.net
 
Tutorial: Internet Resource Management by Champika Wijayatunga, APNIC
Tutorial: Internet Resource Management by Champika Wijayatunga, APNICTutorial: Internet Resource Management by Champika Wijayatunga, APNIC
Tutorial: Internet Resource Management by Champika Wijayatunga, APNIC
 
Juniper mpls best practice part 2
Juniper mpls best practice   part 2Juniper mpls best practice   part 2
Juniper mpls best practice part 2
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010
 
MPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by KhatriMPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by Khatri
 
ipv6 mpls by Patrick Grossetete
ipv6 mpls by Patrick Grosseteteipv6 mpls by Patrick Grossetete
ipv6 mpls by Patrick Grossetete
 
Juniper mpls best practice part 1
Juniper mpls best practice   part 1Juniper mpls best practice   part 1
Juniper mpls best practice part 1
 
BGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesBGP Advance Technique by Steven & James
BGP Advance Technique by Steven & James
 
Juniper MPLS Tutorial by Soricelli
Juniper MPLS Tutorial by SoricelliJuniper MPLS Tutorial by Soricelli
Juniper MPLS Tutorial by Soricelli
 
IPv6 Theory by Cisco
IPv6 Theory by CiscoIPv6 Theory by Cisco
IPv6 Theory by Cisco
 
Juniper IPv6 Workshop by Irzan
Juniper IPv6 Workshop by IrzanJuniper IPv6 Workshop by Irzan
Juniper IPv6 Workshop by Irzan
 
Cisco IPv6 Tutorial by Hinwoto
Cisco IPv6 Tutorial by HinwotoCisco IPv6 Tutorial by Hinwoto
Cisco IPv6 Tutorial by Hinwoto
 
IPv6 by APNIC
IPv6 by APNICIPv6 by APNIC
IPv6 by APNIC
 
Internet Market
Internet MarketInternet Market
Internet Market
 
MyJalah200905
MyJalah200905MyJalah200905
MyJalah200905
 
Passion
PassionPassion
Passion
 
OnMobile Global Limited
OnMobile Global Limited OnMobile Global Limited
OnMobile Global Limited
 
Nps320
Nps320Nps320
Nps320
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

Nsm Brochure

  • 1. NordSecMob Master's Programme in Security and Mobile Computing Mobile computing Data security Computer science Double degree Scholarships Coordinator: Helsinki University of Technology – TKK (Finland) Partners: The Royal Institute of Technology – KTH (Sweden) The Norwegian University of Science and Technology – NTNU (Norway) Technical University of Denmark – DTU (Denmark) http://nordsecmob.tkk.fi University of Tartu – UT (Estonia)
  • 2. NordSecMob Master's Programme in Security and Mobile Computing http://nordsecmob.tkk.fi NordSecMob - Erasmus Mundus Programme NordSecMob - Master's Programme in Security and Mobile Computing is one of the European top-quality Masters Courses selected by the European Commission Erasmus Mundus pro- gramme. Erasmus Mundus, which is a co- operation and mobility programme, both pro- motes the European Union (EU) as a centre of excellence in higher education around the world and supports European top-quality Masters Courses. Erasmus Mundus -programmes offer culturally enriching higher education opportunities for both ICELAND European and Non-European students. Students from any country can apply to NordSec- Trondheim FINLAND Mob-Master’s programme in NORWAY SWEDEN Security and Mobile Computing. Espoo Non-European students have an RUSSIA ESTONIA Stockholm opportunity to apply for an Tartu Erasmus Mundus Scholarships. LATVIA DENMARK LITHUANIA IRELAND Copenhagen U. K. BYELARUS NETH . GERMANY POLAND BELGIUM UKRAIN LUX. CZECH SLOVAKIA FRANCE AUSTRIA HUNGARY ROMANIA Read more: http://ec.europa.eu/education/programmes/mundus/index_en.html EU Member States: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, United Kingdom EAA/EFTA states: Iceland, Norway, Liechtenstein EU Candidate States (presently): Croatia, Turkey and the Former Yugoslav Republic of Macedonia The NordSecMob-consortium is responsible for the information included in this brochure. 2 NordSecMob
  • 3. The World is Changing Communications play a major role in today's world. The rise of sophisticated communications techniques and technologies is having a funda- mental and profound impact, and digital com- munications and mobile computing allow new levels of freedom and flexibility for people, com- panies, and governments. Mobile computing studies embrace all aspects related to wireless and mobile communication. The future is very much wireless, and thus this area of research and development is crucial for the next generation services and applications. Security and Mobile Computing Security is an integral part of today's IT world. Information flows need to be secured and communicating parties au- thenticated. Computer net- works, wired or wireless, are vulnerable to all kinds of at- tacks, and must be protected. And mobile computing presents a new range of security chal- lenges that must be addressed. Hence, security is an important part of in this curriculum. . Be Mobile – Join NordSecMob! Apply for the NordSecMob TKK programme and help shape the future! Not only will you gain in-depth knowledge and prac- tical know-how of the mobile revolution, but at the same time you will have a chance to experience the cultures of two north- ern European countries. 3 NordSecMob
  • 4. Doub NordSecMob – Two Universities – Double Degree NordSecMob is a two-year Master of Science degree Programme (120 ECTS credits). During the programme, the students will study at two of the five Nordic partner universities: Helsinki University of Technology (TKK) in Finland, Tech- nical University of Denmark (DTU), The Royal Institute of Technology (KTH) in Sweden, The Norwegian University of Science and Technology (NTNU) and the University of Tartu (UT) in Esto- nia. After completing the two-year programme, successful students will be awarded two officially recognized M.Sc. degrees: one from each uni- versity where they studied. The programme offers students breadth and deep of knowledge in the field of computer science, data security and mobile comput- ing, both in theory and in practice. The pro- gramme develops the students' research skills to enable them to take up further studies at PhD level; it also provides experience of international R&D environments, and enables access to major international networks. 4 NordSecMob
  • 5. le Degree 5 NordSecMob
  • 6. Joint Study Programme A joint curriculum is defined for the programme and it involves always two universities. The 120 ECTS credit points are divided into two blocks: 1-2 semesters of teaching (30-60 ECTS credit points) will be provided by the home university and 1-2 semesters of teaching (30-60 ECTS credit points) will be provided by the host uni- versity. The programme includes three semes- ters of courses followed by a fourth research semester (Master's thesis, 30 ECTS) under su- pervision and evaluation by both the home and host university. The student takes courses fo- cusing on advanced topics on the selected area of specialization: TKK 1st autumn 1st year DTU 1st spring KTH NTNU UT 2nd 2nd year autumn 2nd spring Joint Study Pr 6 NordSecMob
  • 7. TKK: Technical Information Security and Network Services KTH: Communications Systems Design NTNU: Information Security DTU: Software Security UT: Mathematical Foundations of Cryptography KTH NTNU DTU DTU TKK NTNU UT TKK KTH UT Master´s Thesis ogramme The first autumn term studies are taken at one of the three universities: TKK, KTH or NTNU. Students with the specialization quot;Software Securityquot; move from home university to DTU for the first spring semester and stay second year at DTU. Students with other specialization tracks move after first year studies to other (TKK, NTNU, KTH and UT) for the second autumn semester. 7 NordSecMob
  • 8. Content of the Programme TKK: Technical Information Security and Network Services The focus of the first autumn at TKK is hands on learning of security and computer networks through laboratory works and with emphasis on basic courses of security and mobile com- puting. The first spring concentrates on ad- vanced courses in mobile computing, security, and services including interactive courses, project works and seminars. The focus of the studies of the second autumn is on advanced courses in mobile computing, security, and services including interactive courses, project works and seminars. KTH: Communications Systems Design The focus of the first autumn at KTH is on com- munication security, including advanced topics in networking and security, theory and laboratory exercises. The focus of the first spring is on problem-oriented, project-driven learning in teams addressing real-life problems in the com- munication systems area, with external project owners, optionally in parallel with a few technical specialization courses on mobile services. The focus of the second autumn at KTH is on ad- vanced operator related topics, including tech- nical network management, technology man- agement and business management/creation. KTH 8 NordSecMob
  • 9. NTNU: Information Security The focus of the first autumn at NTNU is on basic networking courses, dependability, per- formance, simulation and basic cryptography. The focus of the first spring is on communication security, including basic topics in networking and security, theory and laboratory exercises and topics on technology management and busi- ness management/creation. The focus of the second autumn at NTNU is on advanced topics in networking and security with a minor thesis on a specialization topic, security management. DTU – Software Security At DTU, the focus is on Safe and Secure IT- Systems: Methods, tools and techniques for design, implementation, and validation of safe and secure IT-systems. Covering Network Tech- nology (privacy and intrusion detection) as well as Language Based Technology (program anal- ysis, operational semantics, process calculi, and software validation). UT – Mathematical Foundations of Cryptography The focus of the studies at Tartu is on strong theoretical foundation on cryptography, crypto- graphic solutions, construction of secure proto- cols, and related fields of mathematics (e.g., combinatorics and number theory). . 9 NordSecMob
  • 10. Consortium Partner Consortium Partners The consortium is made up of renowned research and educational institutions in Europe and top-ranking universities of technology in the Nordic countries. For further information see http://nordsecmob.tkk.fi/research.html Helsinki University of Technology – TKK poo, neighbor city of Helsinki. The Depart- TKK was founded in 1849 and received ment of Computer Science and Engineer- university status in 1908. There are twelve ing at TKK is coordinating the NordSec- faculties with 19 degree programmes and Mob-programme. 250 professors. 15 000 under- and post- graduate students are studying at TKK. The campus is located in Otaniemi in Es- In the TKK NordSecMob-programme the research focus is on the evolution of the Internet technologies as well as on the design, implementation, and verification of IP based systems. In addition to the Internet technologies, research addresses mobile networks and specifically the de- velopment of applications and services in heterogeneous network environments. Focal areas for both Internet and mobile networks are security, service architec- tures and subjects related to service man- agement such as mobility, quality-of- service and charging. Security issues in- cluding privacy, trust and identity man- agement are central for this research group. . 10 NordSecMob
  • 11. s The Royal Institute of Technology – KTH KTH was founded in 1827 and is the largest of Sweden's universities of technology. It consists of nine schools with over 11,000 undergraduate students, 1,500 active postgraduate students and a staff of 3,100 people. There are four campuses with the main campus in central Stockholm. The KTH part of the programme is organised under the KTH School of ICT. integration of IP and optics, as well as The ICT school of KTH conducts research architectures for network systems with on communication systems, including particular focus on decentralized, modu- their use, policy and regulation of com- larized approaches to network system munication markets, design and imple- design. Security aspects related to distrib- mentation of applications, services and uted service architectures, proxy systems, network systems. In the area of commu- and secure voice over IP communication nication systems design, the main re- are important areas of research. . search topics are network architectures and protocols for the future Internet, the The Norwegian University of Science and Technology – NTNU of Norway. The Department of Telematics NTNU was established in 1996 as a further ITEM is responsible for the teaching of development of the University of Trond- the courses in the NordSecMob-prog- heim (UNiT). NTNU has seven faculties ramme at NTNU. and the faculty of Information Technology, Mathematics and Electrical Engi- The Department of neering has six de- Telematics focuses partments. There its information se- are 20,000 students, curity research on half of these study- two main topics: ing technology or the natural sciences Security as a pivotal ingredient of Quanti- and a staff of 3,300 of which over half in tative Quality of Service and cryptographic academic or scientific positions. NTNU is protocols. Modelling, design, analysis and located in Trondheim, on the western coast evaluation of information security for ICT 11 NordSecMob
  • 12. Photo: NTNU Info/Rune Petter Ness systems, services and protocols have in tographic functions for securing distribut- the past most frequently been performed ed computerized communication systems, by using qualitative principles, methods their goals being to restrict, establish and and measures. However, in the present preserve the security properties of infor- transition into an end user environment mation. A specific long-standing inquiry dominated by ubiquitous computing power in the field of crypto-protocols is that of and service realization, the information defining and constructing information pri- security research needs to be focused on vacy, for instance in digital cash and e- the quantitative aspects of description and voting schemes. Digital Tracks is another negotiation of perceived QoS. Crypto- research activity which addresses both graphic Protocols can be considered as privacy and forensic concerns. distributed algorithms that employ cryp- Technical University of Denmark – DTU ence and Engineering section at the Infor- DTU was originally founded matics and Mathematical Modelling de- as the College of Advanced partment at DTU is responsible for the Technology in 1829. DTU has teaching of the programme. The teaching a high international stan- in safe and secure IT-systems is an estab- dard within the technical- lished part of DTU's engineering curricu- natural sciences, based on lum and supported by active research at 15 individual departments as well as a the department. number of research centers on campus in Kongens Lyngby, the Copenhagen Met- ropolitan area. The University has approx- In the DTU NordSecMob-programme there imately 900 researchers, 6,000 students are two main research components. One and 600 PhD students. The Computer Sci- deals with software security and focuses 12 NordSecMob
  • 13. on techniques that can be used to validate designs of systems for the absence of security flaws and to develop systems that can be relied upon to adhere to given se- curity policies. To be specific, research on communication protocols using static analysis, originally developed in the EU- project DEGAS, has successfully used to validate a number of voting and single- sign on protocols; research on access Photo: Bo Jarner control and information flow, including the Decentralised Label Model, gives con- crete techniques for constructing software systems where code is guaranteed to are likely to give users privacy and ano- satisfy given confidentiality, integrity or nymity; another focus is the study of in- authenticity properties. Another deals with trusion detection systems and how they system security and network security. One can best be configured to protect the user. focus is on how to construct systems that University of Tartu – UT UT was originally founded as Academia clinics. The total number of students is Dorpatensis (Gustaviana) in 1632 and it over 18,000, with a teaching staff of 1,300. was reopened in 1802. UT has 11 faculties, UT is located in Tartu, in the southeast 3 research institutes and 6 colleges with part of Estonia. The responsibility of the more than 70 departments, institutes and teaching of the programme at University of Tartu is on the Institute of Computer Science of the Department of Mathematics and Computer Science. The main NordSecMob-related research areas in Tartu University are data security and cryptography. The interests of our working group reach from practical secu- rity analysis to foundations of cryptograph- ic primitives. The main research topics are the following: security models based on attack trees, economics of security, privacy preserving data mining, formal proof systems for cryptographic protocols and properties of hash functions and ap- plications of hash functions in digital time- stamping. 13 NordSecMob
  • 14. NordSecMob Admission Requirements cate. Either a TOEFL or IELTS test is ac- cepted, with the following minimum total scores: The NordSecMob-programme is targeted for top-quality students of all nationalities. TOEFL minimum scores are 580 (PBT), 237 (CBT) and 92 (iBT). The admission criteria to the programme is a high quality Bachelor's degree en- compassing a minimum of 180 ECTS IELTS minimum score is 6,5 credits in Engineering (Computer Science or Information technology) or equivalent For details, check NordSecMob-website. studies, i.e., must be a degree of at least http://nordsecmob.tkk.fi three years of full-time studies. The applicants should have solid knowledge of mathematics (discrete m a t h e m a t i c s ) , p ro - gramming skills, data structures and algo- rithms, computer archi- tecture and basics of computer networks. In addition, a basic knowl- edge of following subject areas will be an advan- tage: databases and da- tabase management, principles of theoretical computer sci- Application deadline and ence, logic in computer science, software selection criteria engineering, operating systems, and con- current programming. The annual application deadline is the beginning of January. Details of required The language of instruction of the Nord- application documents and the on-line SecMob-programme is English. Thus, application form are on the NordSecMob- applicants must have a good command website. Admission to the programme is of English and most applicants must granted on a competitive basis. present an official language test certifi- 14 NordSecMob
  • 15. Scholarships for Students and Staff Erasmus Mundus-scholarships The amount of an average three-month scholarship for scholars is 13,000 Euro. for Non-European students This includes three monthly grants of 4,000 Euro and a fixed amount of 1,000 Non-European students can apply for Euro for travel expenses. generous EU-funded Erasmus Mun- dus scholarships. Eligible for the Er- Nordplus-scholarships for all asmus Mundus scholarships are stu- dents who are NOT nationals of the EU nationalities member states, the EEA-states nor nationals of the candidate countries The selected NordSecMob-students for accession to the EU. Furthermore, can apply for Nordplus-scholar- eligible students may not be residents ships for the mobility period (max 10 of the EU/EEA/candidate countries, months) to the host university. All na- nor may they have carried out their tionalities can apply for the Nordplus- main activities (study, work, etc) for scholarships. more than a total of 12 months over the last five years in the EU/EEA/can- Erasmus-scholarships for didate countries. These scholarships European students are awarded to the best students on a competitive basis. The European students selected to NordSecMob-programme can apply The Erasmus Mundus scholarship to- for Erasmus-scholarships for the mo- tals 21,000 Euro per academic year. bility period to the host university. This includes 10 monthly grants of 1,600 Euro and a fixed amount of 5,000 NordSecMob-consortium Euro for fees, travel expenses, reloca- scholarships for EU/EEA tion costs, etc. For NordSecMob-pro- citizens gramme lasting two years the student receives 42,000 Euro. The NordSecMob-consortium offers scholarships for excellent EU/EEA citi- Erasmus Mundus scholarships zens. For details, check NordSecMob- for Non-European scholars website http://nordsecmob.tkk.fi A scholar is an academic and/or pro- Programme fee fessional of outstanding experience who carries out teaching or research There is no programme fee for assignments and scholarly work in the EU/EEA students. The programme institutions participating in the Nord- fee is charged from any other than EU SecMob-programme. Erasmus Mun- member state and EEA nationals. The dus scholarships allow Non-European programme fee is announced on the scholars to perform the tasks defined NordSecMob-website. by the consortium for a maximum of three months. 15 NordSecMob
  • 16. Helsinki University of Technology http://www.tkk.fi/ The Royal Institute of Technology http://www.kth.se/ Photo: Vadim Makarov www.vad1.com The Norwegian University of Science and Technology http://www.ntnu.no/ Contact Information NordSecMob Consortium Technical University Faculty of Information Photo: Bo Jarner and Natural Sciences of Denmark Helsinki University of Technology TKK http://www.dtu.dk/ Coordinator Ms Eija Kujanpää street Konemiehentie 2 (P.O. Box 5400) 02015 TKK, city: Espoo Finland email: nordsecmob@tkk.fi tel: +358-9-451 4773 fax +358-9-451 3015 University of Tartu http://nordsecmob.tkk.fi http://www.ut.ee/