Master's Degree Program

IT-Security

part-time

The intertwinement of telecommunications, mobile communications and data networks is turning IT security into an explosive topic and a key risk factor in today's businesses. Services such as e-commerce, e-government or digital media and their copyright protection severely stress data, network and transmission security. In the master's degree program you will be specializing in aspects of technical security and the "human risk factor"

Department
Engineering
Topic
Technologies

Highlights

  • Holistic view of software, hardware, people

  • Current topics like cyber security and cyber defense and additional certifications in demand in the industry

  • Know-how transfer from FH's own research center for IT security

     

    Facts

    Final degree

    Master of Science in Engineering (MSc)

    Duration of course
    4 semesters
    Organisational form
    part-time

    Tuition fee per semester

    € 363,361

    + ÖH contribution + costs for optional additional services, if applicable2

    ECTS
    120 ECTS
    Language of instruction
    German

    Application winter semester 2026/27

    15. October 2025 - 31. July 2026

    Study places

    25

    1 Tuition fees for students from third countries € 727,- per semester. Details on tuition fees can be found in the general fee regulations.
    2 The costs depend on the additional services selected from the University of Applied Sciences Campus Vienna, such as work clothing, licenses, tutorials, or excursions.
    The duration of studies can also be extended to 6-8 semesters within the framework of a partial study programme with a correspondingly reduced ECTS workload.

    Before the studies

    Data protection and system security are your top priority. You have the ability to identify potentially weak points in systems and networks. This motivates you to find suitable measures to prevent manipulation and to block unauthorized access. New technologies arouse your interest - yet always with guaranteed security standards in mind. Your are familiar with encryption methods and you would like, in your master's degree program, to delve deeper into cryptography as a field for research and application.

    Why you should study with us

    Participate in interdisciplinary student or research projects

    This way, fun and experience are guaranteed!

    Practical training on campus

    Modern laboratory equipment and high-tech research facilities enable practice-oriented teaching.

    Unique job opportunities


    Obtain additional certificates while still studying and increase your market value.

    Relevant admission requirement

    The relevant admission requirement is

    • a completed relevant bachelor's degree or
    • the completion of an equivalent degree at a recognized domestic or foreign post-secondary educational institution

    with 180 ECTS credits. As a rule, at least 42 ECTS credits of these must be from a subject-relevant course, e.g. information technologies, software engineering, network technology, operating systems, fundamentals of computer science, etc. In exceptional cases, the FH-Council (university council) decides together with the head of the degree program.

    The bachelor's degree programs Computer Science and Digital Communications, Information Technologies and Telecommunications (discontinued) and Applied Electronics und Technical Informatics offered at Hochschule Campus Wien meet the relevant admission requirement.

    Language requirements for admission

    The required language level according to the Common European Framework of Reference for Languages (CEFR​​​​​​​) is at least

    • German - level B2.

    Legalization of foreign documents

    Applicants may require legalization of documents from countries other than Austria in order for them to have the evidential value of domestic public documents. Information on the required legalizations can be found here in PDF format.

    Translation of your documents

    For documents that are neither in German nor English, a translation by a sworn and court-certified interpreter is required. Your original documents should have all the necessary legalization stamps before translation so that the stamps are also translated. The translation must be firmly attached to the original document or a legalized copy.

    Online application - uploading documents

    As part of your online application, upload scans of your original documents including all required legalization stamps. For documents not issued in German or English, scans of the corresponding translations must also be uploaded. The head of the study program decides on the equivalence of international (higher) education qualifications. Therefore, your documents can only be checked as part of the ongoing application process.

    Your path to studying at Hochschule Campus Wien begins with your registration on our application platform. In your online account, you can start your application directly or activate a reminder if the application phase has not yet started.

    Documents for your online application

    Proof of identity

    • passport or
    • identity card or
    • Austrian driving license (proof of citizenship required) or
    • residence permit (proof of citizenship required)

    Change of name - proof

    • e.g. marriage certificate - only required if your current name does not match the name on your proof of identity or on the documents required to prove the admission requirements

    Proof of fulfillment of the relevant admission requirement

    • degree certificate and
    • Transcript of Records or Diploma Supplement

    If you have not yet completed your studies, please upload proof of all courses completed to date as part of the relevant degree program, including ECTS credits.


    Proof of language skills German B2

    For admission, German language skills of at least level B2 of the Common European Framework of Reference for Languages (CEFR) must be provided.

    The following applies as proof:

    • secondary school leaving certificate from a German-language school
    • completion of at least three years of studies in German
    • supplementary examination pre-study course - German B2
    • German certificate (not older than 3 years), for example:
      • Austrian German Language Diploma: ÖSD Certificate B2
      • Goethe Institute: Goethe Certificate B2
      • telc: German B2
      • German language test for university admission for foreign applicants: DSH-2
      • German Language Diploma of the Standing Conference of the Ministers of Education and Cultural Affairs of the Länder in the Federal Republic of Germany: DSD II
      • Test of German as a foreign language (Test DaF): Level TDN 4 in all parts
      • Language Center of the University of Vienna: Course and successfully passed exam at level B2

    Proof of a higher language level is also valid.


    Curriculum vitae in tabular form in German


    Legalizations and translations, if applicable

    • see tab “Foreign documents and degrees” above

    Your application is valid once you have completely uploaded the required documents. If you do not have all the documents at the time of your online application, please submit them immediately upon receipt by email to the administration of your study program (see section “Contact”).

    After completing your online application, you will receive an email confirmation with information on the next steps.

    The admission procedure checks the applicants' professional suitability for the master's program. It consists of a written test lasting approximately one hour and a subsequent interview with the admissions committee. You will receive the date for the admission procedure from the administration office. The admission interview usually takes place at the Hochschule Campus Wien.

    • Goal
      The goal is to offer a study place to those persons who complete the admission procedure with the best results.
    • Criteria
      The admission criteria are exclusively performance-based. You will receive points for the written test and the interview, after which the candidates will be ranked. Geographical assignments of the applicants have no influence on the admission. The admission requirements must be met. The entire process as well as the evaluations of the admission procedure are documented and archived in a comprehensible manner.

    During the studies

    IT security is a highly agile field. Attacks on servers and networks are getting increasingly sophisticated. Our state-of-the-art network laboratory where you may refine your strategies for preventing unauthorized access and develop measures and scenarios for protection is at your disposal. You will have the opportunity of participating in research and development (R&D) projects, engaging in active exchange between science and practice at the university. The degree program also includes a research center for IT security, working in close cooperation with companies. The research focuses on the transmission of data, safe from manipulation or eavesdropping.

    The number of mobile end devices will continue to increase and thereby also the demands made on data security for these tiny devices with their weak computing power. Sensor nodes which, albeit very versatile, are also small and have limited computing capacity and very little storage space are another example. Contrasting with these, we have the Cloud with its seemingly infinite computing and storage resources. The IT Security master's degree program addresses both these developments in its research program.

    The course experts implement, evaluate and compare a diversity of cryptographic algorithms in the affiliated Research Center IT Security.

    The goal is to establish easily realizable secure data encryption options in practice. Findings are directly incorporated into the degree program to assuring you, the master's student, of a decisive advantage of knowledge. The specialist know-how of our lecturers is also in high demand internationally. Experts of the IT Security Research Center are often asked to participate as speakers at international conferences on data security and data protection. Papers published by the IT experts often receive awards such as the FH Best Paper Award, repeatedly awarded to Hochschule Campus Wien.

    The master's degree program will impart to you the know-how enabling you to make overall system security assessments. To achieve this goal, you will combine your technical knowledge of information technology, data systems and communication networks with the focus on IT security. You will also acquire skills in personal development and business administration.

    • You have in-depth knowledge on the levels of software, networks, systems and security. The technical focus is on secure software design, cryptography, data protection, IT architecture and secure network engineering.
    • You will expand your social and management skills in terms of communication style, leadership and management know-how. Knowledge of business administration and the legal framework of data security will round out your education.

    Curriculum

    Module Applied Network Security and Access Management
    6 SWS
    10 ECTS
    Identity and Access Management | ILV

    Identity and Access Management | ILV

    2 SWS   4 ECTS

    Content

    • Technical basics of identity management, conceptual differences between centralized and decentralized systems (e.g. permissionless blockchains, such as Bitcoin and Etherum)
    • Single sign-on systems, Shibboleth, Kerberos
    • OAuth, OpenID Connect, SAML; FIDO, U2F
    • Secure management of user data, passwords, fingerprints, payment information in multi-user and distributed systems (including mobile operating systems).
    • Practical implementation in small groups or individually (e.g. setting up a U2F system, integrating a product into LDAP/AD, ... )

    Teaching method

    Lecture, practical exercises in small groups, distance learning

    Examination

    Final exam: Final inspection, presentations, standard

    Literature

    • Gottfried Vossen, Till Haselmann, Thomas Hoeren: Cloud Computing für Unternehmen. 1.Auflage 2012, dpunkt.Verlag, Heidelberg
    • John Roton: Cloud Computing Explained – 2013 Edition. Recursive Press, USA
    • Cloud Security Alliance: Security Guidance for Critical Areas of Focus in Cloud Computing v4.0. 2017

    Teaching language

    Deutsch

    2 SWS
    4 ECTS
    Network Security | ILV

    Network Security | ILV

    4 SWS   6 ECTS

    Content

    * Network Security

    • Firewalls, IDS, IPS, eMail, DNS
    • 802.1x
    • Dealing with Wireshark, possibly scripting Wireshark (e.g. creating a dissector)
    • Large Scale Firewalls (exercise with thousands of IP ranges) and other difficulties of scaling security measures to large systems.
    • SIEM (exercise with Splunk, etc.)
    • VPN basics
    • VLAN, segmentation of networks
    • Monitoring & testing, IMS
    • Security perimeter
    • Attack classification according to Cyber Killchain and MITRE AT&ACK, APTs

    * Wireless networks

    Comparison and deepening of security mechanisms and problems of managed and unmanaged computer networks.

    • WiFi, WEP, WPA, Enterprise WPA
    • LTE/5G
    • Bluetooth

    Differentiation: IoT networks such as LoraWan, Zigbee, Matter are taught in the IoT modules if required.

    Teaching method

    Lecture, guest lectures, practical exercises

    Examination

    Final exam: Final examination, exercises, standard

    Literature

    • Andrew S. Tanenbaum and Maarten van Steen. Distributed Systems: Principles and Paradigms, Prentice-Hall, 2006.
    • Lipp, Manfred: VPN - Virtuelle Private Netzwerke, Addison-Wesley, 1. Auflage, 2007
    • Fritsch, Jörg; Gundel, Steffen: Firewalls im Unternehmenseinsatz, dpunkt-Verlag, 2., überarbeitete und aktualisierte Auflage, 2005

    Teaching language

    Deutsch

    4 SWS
    6 ECTS
    Module Applied Cryptography
    3 SWS
    5 ECTS
    Applied Cryptography | ILV

    Applied Cryptography | ILV

    3 SWS   5 ECTS

    Content

    Symmetric cryptography (minimal, only the correct types)

    • AES (no DES, etc.); Block vs Streamcipher
    • Pseudorandom permutations (PRP)
      • Authenticated Encryption (AEAD concepts)
    • AES-GCM, possibly ChaCha20-Poly1305
    • Why Encrypt-than-MAC was historically important
    • Operating modes: conceptual only; ECB as a negative example
      • (Why AEAD is standard today - not how to implement each mode)

    Hash functions & passwords

    In addition to cryptographic hash functions (SHA-256/512) and their properties (preimage, collision, avalanche), the curriculum here extends well beyond the TLS focus in the direction of password storage:

    • why SHA-* is unsuitable
    • bcrypt/scrypt/argon2
    • salt, pepper, work factors

    Asymmetric cryptography

    • Diffie-Hellman (classic as a concept, ECDHE in practice)
    • RSA (only for signatures & legacy; typical errors e.g. padding)
    • Elliptic curves (not necessarily computation, but model, security assumptions, design philosophy, security, performance; specifically compare 2 curves e.g. SECp256r1, Curve25519)

    Protocol & system level

    • Certificates, PKI (X.509 structure, trust anchors, CA model: strengths & weaknesses)
    • Certificate Pinning (short), Certificate Transparency
    • Comparison between TLS 1.2 and TLS 1.3; history and design flaws

    Assembling a complete TLS handshake

    • Message by message
    • Who knows what and when?
    • Which element is responsible for which security properties?
    • How and where are keys created
    • then practically in Wireshark and own program code

    Outlook

    • Post-quantum cryptography
    • Possible basic idea (Shor, Grover)
    • Hybrid key exchange (TLS1.3 PQ)

    Teaching method

    Lecture, practical exercises

    Examination

    Final exam

    Literature

    • Menezes, Alfred J., et al.: Handbook of Applied Cryptography, 2018
    • Jean-Philippe Aumasson: Serious Cryptography: A Practical Introduction to Modern Encryption, 2017
    • Christof Paar, Jan Pelzl: Kryptografie verständlich: Ein Lehrbuch für Studierende und Anwender, 2016

    Teaching language

    Deutsch-Englisch

    3 SWS
    5 ECTS
    Module Secure Software Development
    6 SWS
    10 ECTS
    Advanced Project Management | ILV

    Advanced Project Management | ILV

    2 SWS   4 ECTS

    Content

    This course deals with the management and process aspects of secure software development and shows how security activities can be organizationally and strategically integrated into software projects. Students learn about established reference models and maturity level approaches for secure software development and examine how security-relevant activities can be systematically anchored throughout the entire development process.

    Another focus is on risk and compliance management in software projects. Students deal with the identification, evaluation and prioritization of security risks as well as the consideration of relevant norms, standards and legal requirements. They learn how to design development processes and project documentation in such a way that security and compliance requirements are met in a comprehensible manner.

    The course also covers organizational aspects of secure software engineering. Students deal with role models, team organization and communication structures and learn about measures to promote a sustainable security culture. Finally, current requirements and developments in the professional environment are reflected upon in order to be able to classify the acquired skills in a professional context.

    Teaching method

    Lecture, discussion and group discussions, analysis of case studies (e.g. known software security projects and security incidents from a management perspective), practical exercises (creation of security concepts, project plans, risk analyses in groups)

    Examination

    Final exam

    Literature

    • Olmsted, A. (2024). Security-Driven Software Development: Learn to analyze and mitigate risks in your software projects. Packt Publishing.
    • Microsoft Security Development Lifecycle. (n.d.). Microsoft.com. Retrieved February 9, 2026, from www.microsoft.com/en-us/securityengineering/sdl
    • Owasp samm. (n.d.). Owasp.org. Retrieved February 9, 2026, from owasp.org/www-project-samm/

    Teaching language

    Deutsch-Englisch

    2 SWS
    4 ECTS
    Secure Software Engineering | ILV

    Secure Software Engineering | ILV

    4 SWS   6 ECTS

    Content

    This course teaches the basics of secure software engineering and deals with the systematic integration of security aspects throughout the entire software development process. Students acquire knowledge of the Secure Software Development Lifecycle (SSDLC) and learn how security requirements are identified, specified and taken into account during requirements engineering using suitable methods such as misuse cases.

    Building on this, concepts of secure software architectures and security-oriented design approaches are taught. Students deal with secure design principles, security design patterns and methods of threat modeling and architecture risk analysis (e.g. STRIDE) in order to identify and evaluate potential attack surfaces at an early stage.

    Another focus is on secure implementation in practical programming languages and development environments. Using typical vulnerabilities, in particular the OWASP Top 10, the causes of security gaps and suitable countermeasures are discussed. Secure programming practices, the use of suitable frameworks and libraries as well as security mechanisms of modern application protocols for distributed applications are discussed.

    In addition, security-oriented quality assurance measures are taught. These include secure code reviews and the use of tools for static and dynamic security analysis, software composition analysis and advanced methods such as fuzzing and basic methods of penetration testing. Through practical exercises, students apply the content taught and deepen their understanding. The course enables students to systematically design and implement software securely and to recognize and resolve security problems at an early stage

    Teaching method

    Lecture, practical programming exercises (hands-on labs), discussion of case studies (e.g. analysis of real security incidents caused by insecure software) and supervised group work (e.g. joint threat modeling or code review session)

    Examination

    Final exam

    Literature

    Teaching language

    Deutsch

    4 SWS
    6 ECTS
    Module IT Security Project
    1 SWS
    5 ECTS
    IT-Security Project I | ILV

    IT-Security Project I | ILV

    1 SWS   5 ECTS

    Content

    1. Introduction to practice-oriented security projects
    2. Setting up and using secure test environments
    3. Attack & defense techniques (hands-on)
    4. Capture-the-flag (CTF) scenarios
    5. Project work:

    Working on a structured mini-security project in teams
    Analysis of a given infrastructure
    Identification, exploitation and protection of selected vulnerabilities
    Preparation of a technical project report

    Teaching method

    Lecture, discussion and group discussions, analysis of case studies (e.g. known software security projects and security incidents from a management perspective), practical exercises (creation of security concepts, project plans, risk analyses in groups)

    Examination

    Final exam: Project submission

    Literature

    Abhängig vom Projekt

    Teaching language

    Deutsch

    1 SWS
    5 ECTS

    Module Secure Software Development
    3 SWS
    5 ECTS
    DevSecOps | ILV

    DevSecOps | ILV

    3 SWS   5 ECTS

    Content

    This course deals with the integration of software development, IT operations and security in terms of the DevSecOps paradigm. Students gain an understanding of the basic concepts of DevOps and DevSecOps as well as principles such as automation, continuous integration and delivery, infrastructure as code and the systematic embedding of security measures along the entire software delivery process. Both shift-left approaches for early integration of security and shift-right approaches for monitoring and reacting during operation are covered.

    A central focus is on the development and operation of security-oriented CI/CD pipelines. Students learn how automated security checks can be integrated into all phases of the pipeline in order to continuously identify vulnerabilities and systematically secure releases. In addition, security aspects of modern operating environments are discussed, especially in the context of containerization, cloud deployment, configuration and secret management as well as monitoring and incident response.

    In addition, the course deals with current threats and protective measures in the DevSecOps environment, for example in the area of software supply chain security and modern cloud-native architectures. Practice-oriented exercises deepen the content and enable students to implement DevSecOps concepts, tools and processes in an exemplary manner. The course thus promotes a holistic understanding of the organizational, technical and cultural implementation of security in modern software delivery processes.

    Teaching method

    Lecture, lab-like exercises (hands-on in virtual CI/CD environments), team project work (configuration of a sample DevSecOps pipeline in small groups), live demonstrations of attack and defense techniques in a pipeline context as well as exchange of experiences/workshops.

    Examination

    Final exam

    Literature

    • Kim, G., Humble, J., Debois, P., Willis, J., & Forsgren, N. (2021). The DevOps handbook: How to create world-class agility, reliability, & security in technology organizations (2nd ed.). IT Revolution Press.
    • Vehent, J. (2017). Securing DevOps-safe services in the cloud. Manning Publications.
    • OWASP DevSecOps Guideline. (n.d.). Owasp.org. Retrieved February 9, 2026, from owasp.org/www-project-devsecops-guideline/

    Teaching language

    Deutsch

    3 SWS
    5 ECTS
    Module IT Security Project
    1 SWS
    5 ECTS
    IT-Security Project II | ILV

    IT-Security Project II | ILV

    1 SWS   5 ECTS

    Content

    1. Advanced attack scenarios
    2. Advanced red/blue team exercises
    3. Incident Response & Forensics (Introduction)
    4. Security architecture & resilience
    5. Project work (capstone character)

    Implementation of a comprehensive team project:

    • Planning
    • Attack simulation
    • Defense & analysis
    • Final report with catalog of risks and measures
    • Presentation to an expert audience (technical management perspective).

    Teaching method

    Lecture, lab-like exercises (hands-on in virtual CI/CD environments), team project work (configuration of a sample DevSecOps pipeline in small groups), live demonstrations of attack and defense techniques in a pipeline context as well as exchange of experiences/workshops.

    Examination

    Final exam: Project submission

    Literature

    Abhängig vom Projekt

    Teaching language

    Deutsch-Englisch

    1 SWS
    5 ECTS
    Module Security Engineering for IoT, OT and Operating Systems
    6 SWS
    10 ECTS
    IoT and OT Security | ILV

    IoT and OT Security | ILV

    3 SWS   5 ECTS

    Content

    The course provides a comprehensive understanding of security in the Internet of Things and introduces basic concepts, principles and technologies of IoT and OT systems, including hardware, software and communication aspects as well as their energy consumption. Particular attention is paid to the specific threat situations in the embedded area, which result from long life cycles, physical access to devices or limited computing resources, for example. Students deal with typical attacks on IoT and OT systems, including firmware extraction, side-channel attacks and manipulation of the boot process, ICS/SCADA threats, lateral movement between IT/OT, safety-security trade-offs and at the same time learn about suitable countermeasures at hardware, firmware and software level. The aim is to understand the particular security challenges of networked devices and to develop robust protection mechanisms for practical use.

    Teaching method

    Lecture, practical exercises

    Examination

    Final exam: Group work, final exam

    Literature

    • Peter Marwedel, Embedded System Design, Springer, 2021
    • Sheikh Muhammad Ibraheem And Sadia Adrees, Embedded Systems for Engineers and Students, National Library of Pakistan, 2023
    • Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler, Demystifying Internet of Things Security, Apress, 2019
    • Gildas Avoine, Julio Hernandez-Castro, Security of Ubiquitous Computing Systems, Springer, 2021
    • John Soldatos, Security Risk Management for the Internet of Things, Now Publishers Inc, 2020
    • Wolfgang Babel, Industrie 4.0, China 2025, IoT, Springer Nature 2021

    Teaching language

    Deutsch-Englisch

    3 SWS
    5 ECTS
    Operating Systems Security | ILV

    Operating Systems Security | ILV

    3 SWS   5 ECTS

    Content

    Basic concepts and architecture of modern operating systems (Windows, Linux, macOS, Android, iOS)

    • Goals such as isolation, least privilege, mediation, trust boundaries
    • Securing processes vs threads,
    • User roles and authorization concepts
    • Access control and security features of file systems
    • Storage protection, containers and virtualization

    Operating system-specific features

    • Mandatory access control systems (e.g. SELinux, AppArmor)
    • Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP) / NX-Bit
    • Linux ACLs and extended file system mechanisms
    • Windows NTFS-specific security features (e.g. Alternate Data Streams), UAC and Integrity Levels
    • Namespaces and control groups
    • Code signing and secure boot
    • Sandbox concepts on desktop and mobile platforms

    Hardware-supported security

    • Threat models and their limits
    • Trusted Platform Module (TPM), Secure Enclave and coprocessors.
    • Modern CPU-based measures such as Memory Protection Keys (MPK on Intel), Pointer Authentication (PAC on ARM)

    Virtualization and cloud

    • Containers, VM
    • Isolation, key management and trust anchors, e.g. with key vaults, HSM

    Security for shared resources

    • Side channels and covert channels
    • RAM attacks, cache-based side channel attacks
    • Countermeasures at operating system and platform level (effectiveness, side effects)

    The exercise deals with selected chapters in the form of hardening or implementation tasks.

    Teaching method

    Lecture, practical exercises

    Examination

    Final exam: Exercises, final exam

    Literature

    • S. Garfinkel, G. Spafford, A. Schwartz: Practical Unix & Internet Security, O’Reilly, 2003​

    Teaching language

    Deutsch

    3 SWS
    5 ECTS
    Module Security Management
    6 SWS
    10 ECTS
    AI and Security | ILV

    AI and Security | ILV

    2 SWS   4 ECTS

    Content

    The course deals with the fundamental relationships between artificial intelligence and security and provides an understanding of how modern AI systems can contribute to both strengthening and jeopardizing digital protection mechanisms. The most important threats to machine learning, including adversarial attacks, data poisoning, model inversion and other forms of manipulation, as well as the resulting requirements for robust, transparent and trustworthy AI models are discussed. In addition, established principles of cybersecurity are applied to AI systems, in particular risk analysis, system reliability, integrity and secure design of AI lifecycles. Students will explore methods to increase the resilience of AI, secure data collection and processing, monitoring and auditing of models, and governance and compliance aspects. Using current research and real-world case studies, they will learn to identify security vulnerabilities, anticipate threats and develop concepts for security-aware AI systems that meet the requirements of modern industrial and academic standards.

    Teaching method

    Lecture, practical exercises

    Examination

    Final exam

    Literature

    • John Sotiropoulos, Adversarial AI Attacks, Mitigations, and Defense Strategies, Packt Publishing, 2024
    • Aurélien Géron, Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 3rd Edition, O’reilly, 2022

    Teaching language

    Deutsch

    2 SWS
    4 ECTS
    Complex Problem Solving | ILV

    Complex Problem Solving | ILV

    2 SWS   3 ECTS

    Content

    In the Complex Problem Solving course, methods of the Theory of Constraints are applied to solve complex problems with a focus on software engineering and security. Starting from a structured and prioritized goal definition, the existing situation is analyzed and problems on the way to the desired situation are systematically analyzed and solved. Finally, the change management methods for implementing the desired situation are explained.
    The following content is covered in particular:

    • Introduction to the Theory of Constraints
    • Categories of the Legitimate Reservation
    • Intermediate Objectives Map
    • Current Reality Tree
    • Evaporating Cloud

    Teaching method

    Case studies, lecture, practical exercises in groups.

    Examination

    Final exam

    Literature

    • H William Dettmer: The Logical Thinking Process: A Systems Approach to Complex Problem Solving, ASQ, 2007.
    • Eliyahu M. Goldratt und Jeff Cox: The Goal: A Process of Ongoing Improvement, North River Pr Inc; 30th Edition, 2014

    Teaching language

    Deutsch

    2 SWS
    3 ECTS
    Information Security Management | ILV

    Information Security Management | ILV

    2 SWS   3 ECTS

    Content

    • IT Security Management and Risk Assessment
    • IT-Security Controls, Plans, and Procedures
    • Physical and Human Resources Security
    • Access Control Management
    • Security Compliance / Audit

    Security Management & IT Governance, ISO 27001:2013, Internal Control System for IT, ISMS Set-up, Risk Management & Business Continuity Management, Policy and Guideline Design, System Development Life Cycle, Access Control, Physical and environmental security, COBIT, Basic Protection Manual

    Teaching method

    Lecture, individual work on a case study, group work incl. presentation of the results

    Examination

    Final exam

    Literature

    Bücher:

    • Ortwin Renn (2008): Risk Governance. Taylor & Francis
    • Ortwin Renn (2014): Das Risikoparadox: Warum wir uns vor dem Falschen fürchten. Fischer
    • Gerd Gigerenzer (2009): Das Einmaleins der Skepsis: Über den richtigen Umgang mit Zahlen und Risiken. Berlin Verlag Taschenbuch
    • Gerd Gigerenzer (2013): Risiko: Wie man die richtigen Entscheidungen trifft. C. Bertelsmann Verlag
    • Daniel Kahnemann (2013): Schnelles Denken, langsames Denken. Siedler Verlag
    • M. Whitman, H. Mattord: Management of Information Security, Course Technology, 2013
    • S. Harris: All in one CISSP Exam Guide, McGraw-Hill, 2013
    • M. Helisch, D. Pokoyski: Security Awareness, Vieweg+Teubner, 2009

    Darüber hinaus steht eine umfangreiche Artikelliste zu neurophysiologischen, psychologischen und sozialpsychologischen Themen zur Verfügung, die für die konkrete Aufgabengestaltung genutzt werden kann.

    Online:

    • S. Brands, U-Prove technology overview
    • Beresford & Stajano, Location Privacy in Pervasive computing, IEEE pervasive Computing 2003
    • Project PRIME, www.prime-project.eu
    • Project PRECIOSA (Vehicular privacy) preciosa-project.org
    • www.epic.org

    Teaching language

    Deutsch

    2 SWS
    3 ECTS

    Module Master Thesis Project
    2 SWS
    5 ECTS
    Master Thesis Project | ILV

    Master Thesis Project | ILV

    2 SWS   5 ECTS

    Content

    Students work individually or in small groups on projects related to IT security technologies and applications in the context of university R&D activities or as part of their individual professional activities. These projects subsequently form the practice-relevant basis for the Master's theses.

    Teaching method

    Project support

    Examination

    Continuous assessment: Project progress, proof of function, project presentation

    Literature

    Projektabhängige Literaturempfehlungen

    Teaching language

    Deutsch-Englisch

    2 SWS
    5 ECTS
    Electives (25 ECTS of your choice)
    Module Deep Learning
    5 SWS
    10 ECTS
    Deep Learning | ILV

    Deep Learning | ILV

    5 SWS   10 ECTS

    Content

    The following contents will be discussed:

    • Introduction, mode, motivation, basics ML project
    • Machine Learning Project: data analysis, visualization, preparation, model selection and training, evaluation and optimization
    • Introduction to Deep Learning
    • Convolutional Neural Networks (CNN)
    • Recurrent Neural Networks (RNN)
    • Generative Adversarial Networks (GAN)
    • Reinforcement Learning (RL)
    • Applications in computer vision, robotics, natural language processing, medicine and biology.

    The exercise covers the following contents:

    • Development of DL algorithms
    • Creating, training and evaluating CNN, RNN, GAN and RL models
    • Development of a DL pipeline for the selected application
    • DL application in a field of your choice: biology/medicine, robotics, computer vision, natural language processing, etc.
    • DL project implementation and evaluation

    Teaching method

    Case studies, lecture, practical exercises in groups.

    Examination

    Continuous assessment: Elaboration of a case study, group work, final exam

    Literature

    • A. Geron: Hands on Machine Learning, O’Reilly, 2022
    • S. Raschka et. al. Machine Learning with PyTorch and Scikit-Learn, Packt, 2022
    • I. Goodfellow et. al: Deep Learning, The MIT Press, 2016
    • F. Chollet : Deep Learning with Python, Manning Publication, 2021
    • D. Foster: „Generative Deep Learning“, O‘Reilly, 2023

    Teaching language

    Englisch

    5 SWS
    10 ECTS
    Module Digital Leadership
    3 SWS
    5 ECTS
    Digital Leadership | ILV

    Digital Leadership | ILV

    3 SWS   5 ECTS

    Content

    Digital Leadership provides students with the necessary skills and knowledge to operate successfully in management positions in the digital environment. The course contents are:

    • Introduction to digital leadership
    • Strategic management in the digital age
    • Leadership techniques for software teams
    • Digital innovation and technology trends
    • Digital risk management

    Teaching method

    -

    Examination

    Continuous assessment: Project progress, proof of function, project presentation

    Literature

    Wird noch definiert.

    Teaching language

    Deutsch-Englisch

    3 SWS
    5 ECTS
    Module Distributed Ledger Technologies
    3 SWS
    5 ECTS
    Distributed Ledger Technologies | ILV

    Distributed Ledger Technologies | ILV

    3 SWS   5 ECTS

    Content

    The course covers the following content in particular:

    • Game Theory: Basics, static and dynamic games, completeness of information, cooperation and coalition.
    • Bitcoin: Cryptographic basics, wallet, transactions, network, blockchain, consensus, decentralization, mining, attacks.
    • Ethereum and Solidity: Basics, Externally Owned Accounts, Smart Contracts, Transactions, EVM Bytecode, Consensus, Tokens, FT & NFT, EIPs & ERCs, DApps, IPFS, ENS, GSN & Web3.0.
    • Privacy and scalability: mixing, ring signatures and stealth addresses, non-interactive zero knowledge proofs, sharding using the example of Ethereum 2.0, layer 2 scaling, payment and state channels, plasma and rollups
    • Other blockchains and DLTs, including Hyperledger Fabric, R3 Corda, MultiChain, Cardano, Polkadot, Solana, BigchainDB, Hashgraph, IOTA.
    • Use of DLT e.g. in finance, in value chains, in the energy industry and in the public sector.
    • Practical tasks of game theory.
    • Implementation of a DApp: Solidity Smart Contracts for business logic, deployed in an Ethereum testnet, integrated via Web3 with a simple SPA hosted on IPFS.

    Teaching method

    Lecture, Flipped Classroom (with check-off exercise)

    Examination

    Continuous assessment: Quality of game theory presentations by students.

    Lab group work - grading on the basis of submissions and discussions.

    Literature

    • Winter – Grundzüge der Spieltheorie, 2.Auflage – Springer 2019
    • Holler, Illing, Napel – Einführung in die Spieltheorie, 8.Auflage – Springer 2019
    • Antonopoulos – Mastering Bitcoin 2nd edition – O’Reilly 2017
    • Antonopoulos, Wood – Mastering Ethereum: Building Smart Contracts and Dapps – O’Reilly 2018
    • Schütz, Fertig – Blockchain für Entwickler. Grundlagen, Programmierung, Anwendung – Rheinwerk Computing 2019
    • Narayanan et al – Bitcoin and Cryptocurrency Technologies – Princeton 2016

    Teaching language

    Deutsch

    3 SWS
    5 ECTS
    Module Game Engineering
    5 SWS
    10 ECTS
    Game Engineering | ILV

    Game Engineering | ILV

    5 SWS   10 ECTS

    Content

    • Project management (idea, concept, target group, publication) 
    • Conception and planning of a 3D video game (game design document) 
    • Game design (characters, story, worlds, fun) 
    • Basic concepts of a game engine (algorithms, camera, transformation tools, levels, lighting) 
    • Game loop (frame structure) 
    • Integration and structure of 3D models (vertices, polygons) 
    • Working in 3D space with models, lighting and physics 
    • Kinematic and simulated-physical movements in 3D space 
    • Graphical programming (materials, textures, shaders, lighting models) 
    • Render pipeline 
    • Implementation of interactive elements using scripting 
    • Simple behavioral design using modern AI-supported techniques 
    • Recognition and processing of user input with various devices devices 
    • Integration of audio (SFX, music) 
    • UI (main menu, HUD) 
    • Implementation and publication of the planned 3D game within a group using the technologies learned 

    Teaching method

    Case studies, practical exercises, lecture

    Examination

    Continuous assessment: Individual and group work, group work on a software project (group work)

    Literature

    • Robert Nystrom: Game Programming Patterns, Genever Benning, 2014
    • Jason Gregory: Game Engine Architecture, Third Edition, CRC Press, 2018
    • Dax Gazaway: Introduction to Game Systems Design, Addison-Wesley, 2021
    • Eric Lengyel: Foundations of Game Engine Development, Volume 1: Mathematics, Terathon Software LLC, 2016
    • Eric Lengyel: Foundations of Game Engine Development, Volume 2: Rendering, Terathon Software LLC, 2019

    Teaching language

    Deutsch

    5 SWS
    10 ECTS
    Module Advanced Embedded and IoT Security
    3 SWS
    5 ECTS
    Advanced Embedded and IoT Security | ILV

    Advanced Embedded and IoT Security | ILV

    3 SWS   5 ECTS

    Content

    The course provides advanced and practical knowledge for secure designs, attack detection and countermeasures in embedded and IoT environments over the entire life cycle. In the first part, students deal with the implementation of trust anchors, hardware security (secure elements, PUFs, TPM, memory/MPU hardening, RTOS security) and defensive engineering (secure boot/measured boot, key management under constraints, remote/measured attestation, hardening, zero trust/segmentation (zones/conduits), edge anomaly detection, update/patch strategies for long lifecycles, safety/security trade-offs). The second part includes red/blue exercises (build-break-fix, design review, audit preparation). Particular attention is paid to the practical implementation and peer review of the designs.

    Teaching method

    Lecture, practical exercises

    Examination

    Continuous assessment: Immanent performance assessment: group work, final examination

    Literature

    • Peter Marwedel, Embedded System Design, Springer, 2021
    • Sheikh Muhammad Ibraheem And Sadia Adrees, Embedded Systems for Engineers and Students, National Library of Pakistan, 2023
    • Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler, Demystifying Internet of Things Security, Apress, 2019
    • Gildas Avoine, Julio Hernandez-Castro, Security of Ubiquitous Computing Systems, Springer, 2021
    • John Soldatos, Security Risk Management for the Internet of Things, Now Publishers Inc, 2020

    Teaching language

    Deutsch

    3 SWS
    5 ECTS
    Module Digital Forensics & Incident Response
    3 SWS
    5 ECTS
    Digital Forensics & Incident Response | ILV

    Digital Forensics & Incident Response | ILV

    3 SWS   5 ECTS

    Content

    • Methods of digital forensics
      • file systems
      • Network forensics
      • Operating systems
      • Analysis of application data
      • Timeline analysis
      • Keyword Search
    • Norms and Standards / Related Documents
      • RFC 3227 "Guidelines for Evidence Collection and Archiving"
      • NIST SP 800-86 "Guide to Integrating Forensic Techniques into Incident Response"
    • Legal framework conditions
      • Legal foundations
      • Types and roles of expert witnesses
      • Form and content of an expert opinion

    Creation & analysis of hard disk images, file systems (esp. NTFS), memory forensics, network forensics, analysis of application data, smartphones, anti-forensics, legal requirements, best practices, ISO 3227 & NIST 800-86

    Acquisition and analysis of hard disk images, network analysis, smartphones and application data, cryptography & antiforensics

    Teaching method

    Lecture, practical exercises

    Examination

    Continuous assessment: Group work, final exam

    Literature

    Bücher:

    • S. Garfinkel, G. Spafford, A. Schwartz: Practical Unix & Internet Security, O’Reilly, 2003
    • B. Carrier: File System Forensic Analysis, Addison-Wesley, 2005
    • B. Dang, A. Gazet, E. Bachaalany, S. Josse: Practical reverse Engineering, Wiley, 2014
    • M. Ligh: The Art of Memory Forensics, Wiley, 2014

    Online:

    • Publikationen von IEEE S&P, USENIX Security, ACM CCS, und DFRWS
    • NIST SP 800-86, RFC 3227

    Teaching language

    Deutsch

    3 SWS
    5 ECTS
    Module Future Trends in IT-Security
    3 SWS
    5 ECTS
    Emerging Technologies and Future Threats | ILV

    Emerging Technologies and Future Threats | ILV

    3 SWS   5 ECTS

    Content

    The course covers selected emerging technologies and their security relevance with a focus on realistic threat models and long-term developments. The selection of topics is based on current papers at top conferences such as ACM CCS, Usenix Security, NDSS and IEEE S&P.

    Current planning includes a thematic block on blockchains and DLT with a special focus on which concepts have established themselves beyond the initial hype and which security-related problems still exist. Another possible focus is on software protection, in particular techniques for protecting software from analysis, manipulation and reverse engineering. In addition, security aspects of modern operating systems, including Linux and Windows security, as well as container and virtualization technologies and their impact on attack surfaces and isolation mechanisms will be covered.

    Teaching method

    Lecture, practical exercises

    Examination

    Final exam

    Literature

    Aktuelle Papers

    Teaching language

    Englisch

    3 SWS
    5 ECTS
    Module Penetration Testing
    5 SWS
    10 ECTS
    Penetration Testing | ILV

    Penetration Testing | ILV

    5 SWS   10 ECTS

    Content

    Reverse engineering on two operating systems (e.g. Linux, Windows) of binary applications, possibly also a mobile app (e.g. Android).

    Debugger, disassembler, decompiler (e.g. Ghidra, Hexrays, IDA Pro, ...), rudimentary understanding of machine code.

    Memory corruption (stack overflows, heap overflow, return-to-libc, return oriented programming), format string vulnerabilities, shellcode, race conditions, reverse engineering, malware analysis, binary analysis, rewriting, and patching.

    Security measures in programming languages and operating systems and how they can be circumvented.

    PREREQUISITE: Operating Systems Security covers the basic security concepts and infrastructure of the most common operating systems.

    Other prerequisites: OWASP Top 10 and similar web-based attacks are already known (Secure Software Engineering). Concepts such as buffer overflow are roughly known.

    Teaching method

    Lecture, distance learning, learning platform with 5-10 practical exercises

    Examination

    Final exam

    Literature

    • S. Garfinkel, G. Spafford, A. Schwartz: Practical Unix & Internet Security, O’Reilly, 2003
    • B. Dang, A. Gazet, E. Bachaalany, S. Josse: Practical reverse Engineering, Wiley, 2014
    • Publikationen von IEEE S&P, USENIX Security, ACM CCS, und DFRWS
    • NIST SP 800-86, RFC 3227

    Teaching language

    Englisch

    5 SWS
    10 ECTS
    Module Mobile App Development
    5 SWS
    10 ECTS
    Mobile App Development | ILV

    Mobile App Development | ILV

    5 SWS   10 ECTS

    Content

    This module will cover the fundamentals of Mobile App Development. At the beginning, there will be a short overview of the current mobile development landscape. After that, we'll dive right into native iOS development with Swift and UIKit. 

    There will not be a final exam, but programing assignments (single person assignments). They will be split by VO/UE into fixed exercises and freeform exercises.

    The fixed exercises are pretty firm in their scope and tasks. They’re almost like an interactive tutorial, but without the solutions. The goal is for you to gain competence in the most important aspects of iOS development that everyone should know about.

    The freeform exercises are much more flexible. You can choose which topics you’d like to work on and pick from a variety of frameworks to learn and features to implement. To learn more about the exercises, see the class website below. 

    Overview of the topics:

    • Mobile Development Overview
    • Web-App vs Cross-Plattform vs Native mobile
    • Swift Fundamentals
    • Native iOS development Fundamentals
    • UIKit & Auto Layout Fundamentals
    • Networking
    • Persistence (Mobile Databases)

    You can also find more information about the topics on the class website.

    avf.github.io/mobile-app-dev

    If you'd like to participate, we strongly recommend that you bring a Mac with macOS 10.15.4 or higher. Alternatively, access to a Cloud-VM can be provided, but the development experience will be much better on a native machine. Owning an iOS device (iPhone/iPad) can be advantageous, but isn't required.

    Teaching method

    Lecture, live programming, case studies, programming tasks

    Examination

    Continuous assessment: Final exam, group work

    Literature

    Siehe Literaturverzeichnis auf der LV-Homepage:

    avf.github.io/mobile-app-dev/lectures/

    Teaching language

    Englisch

    5 SWS
    10 ECTS
    Module User Centered Design
    3 SWS
    5 ECTS
    User Centered Design | ILV

    User Centered Design | ILV

    3 SWS   5 ECTS

    Content

    This course includes in particular:

    • Conceptual Models
    • Affordances & Signifiers
    • Mapping
    • Conventions & Consistency
    • Constraints
    • Feedback
    • Design Thinking
    • Canomodel on product features
    • Market Analysis
    • User Research
    • Storyboards
    • Wireframes
    • Formative Usability Testing
    • Information Architecture
    • Interaction Design
    • Information Design
    • Visual Design
    • Usability Testing

    Teaching method

    Lecture, case studies, practical exercises

    Examination

    Continuous assessment: Group work - grading the group work protocols, final examination

    Literature

    • Donald Norman – The Design of everyday things – revised edition, Basic books Verlag 2013
    • User Experience Design – Christian Moser x.media.press; 2012
    • UX Redefined – Johannes Robier, Springer Verlag 2016

    Teaching language

    Deutsch

    3 SWS
    5 ECTS
    Module Web Engineering
    5 SWS
    10 ECTS
    Web Engineering | ILV

    Web Engineering | ILV

    5 SWS   10 ECTS

    Content

    The course covers the following content in particular:

    • Advanced Frontend Web Development. Creation of reliable, maintainable and robust frontend applications using modern web tools and technologies
    • Web Development Buildchain and Build First Development (Package Management, Dependency Management, Module Bundling, Linting and Formatting, Minification and Obfuscation, Preprocessing and Postprocessing)
    • Testing strategies in web applications using continuous integration and continuous deployment/delivery
    • System architectures on the web (layer architectures, single-page applications and multi-page applications, serverless computing and microservices)
    • Structure and functionality of modern front-end frameworks
    • Rendering technologies such as server-side rendering, client-side rendering, rehydration, pre-rendering and their application scenarios
    • Responsive design and web accessibility
    • Backend development. Web servers, authentication strategies, CORS, API technologies (eg.: REST, GraphQL and gRPC), frameworks
    • Current trends in web development (eg: progressive web applications, web assembly, microfrontends, web components ...)

    Teaching method

    Lecture, live coding, project work, practical exercises (individual tasks)

    Examination

    Continuous assessment: Final exam, group work, practical exercises

    Literature

    • Lucas da Costa, Testing JavaScript Applications, 2021 
    • James Padolsey, Clean Code in JavaScript: Develop Reliable, Maintainable, and Robust JavaScript, 2020 
    • Kyle Simpson, You don‘t know JS yet – Get started, Frontend Masters, 2020 
    • Nicolas Bevacqua, JavaScript Application Design: A Build First Approach, 2015 
    • Kappel et. al., Web Engineering – The Discipline of Systematic Development of Web Applications, 2006 

    Teaching language

    Deutsch

    5 SWS
    10 ECTS

    Module Master Thesis
    20 ECTS
    Master Thesis | MT

    Master Thesis | MT

    0 SWS   20 ECTS

    Content

    Independent work on a technically relevant topic based on the technical topics of the compulsory elective modules in the third semester at a scientific level under the guidance of a supervisor

    Completion of the Master's thesis

    Teaching method

    Independent work supported by coaching

    Examination

    Final exam: Approval of the master thesis

    Literature

    Abhängig vom gewählten Thema

    Teaching language

    Deutsch-Englisch

    20 ECTS
    Module Innovation Management
    6 SWS
    10 ECTS
    Entrepreneurship | ILV

    Entrepreneurship | ILV

    2 SWS   2 ECTS

    Content

    The process of innovation is a combination of creativity on the one hand and precise analysis and evaluation on the other. Methods and tools for the development of new ideas, their positioning and, above all, the recognition of critical success factors are essential. The team aspect is of great importance here. The lecture also refers to psychological criteria.
    Entrepreneurial thinking is a constant sequence of evaluation, decision-making and corrections. The course primarily deals with techniques that support decision-making, enable evaluation and support key performance indicator-based management.
    The course also refers to start-ups, in particular the phases of founding a new company, financing options, critical aspects of growth and managing business success.

    This course includes in particular

    • Methods for the development and evaluation of innovation
    • Blue Ocean Method
    • The vision-mission-value pyramid
    • Rainmaking method
    • Basics of the Hammings Principle
    • Application forms of agile project management incl. Scrum
    • Leading and lagging indicators for the application of decision-making techniques
    • Team aspects in the innovation cycle
    • Evaluation options for innovations, e.g. Gartner Hypecycle, Magic quadrant
    • Dynamics of growth, cash flow and scalability
    • Starting a start-up, business mechanics
    • Financing options, angels vs. ventures and exit strategies

    Teaching method

    Case studies, lecture

    Examination

    Final exam: Elaboration of case studies, final examination

    Literature

    • Kevin Kelley, The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future, 2016
    • Geoffrey A. Moore, Crossing The Chasm, HarperBusiness, 3rd Edition, 2014
    • Alexander Osterwalder, Yves Pigneur, Business Modell Generation, 2010
    • Clayton Christensen, Michael Raynor, and Rory McDonald, What is Disruptive Innovation?, HBR, Dec 2015
    • Glenn LLopis, Thought Leadership Is The New Strategy For Corporate Growth, Forbes Article, Aug 2014
    • Barbara Minto, The Pyramid Principle, 1987
    • Clayton M. Christensen, Dina Wang, and Derek van Bever, Consulting on the cusp of disruption, HBR, Oct 2013
    • Clayton M. Christensen, The Innovators Dilemma, 1996
    • William Strunk Jr., The Elements of Style, Penguin Books, 2007
    • David O'Sullivan, Defining Innovation, 2008
    • Jeffrey J. Fox, How to Become a Rainmaker, 2000

    Teaching language

    Deutsch

    2 SWS
    2 ECTS
    Legal IT Aspects | ILV

    Legal IT Aspects | ILV

    2 SWS   2 ECTS

    Content

    The course teaches the basic structures of the Austrian and European legal system as well as their constitutional embedding, particularly with regard to fundamental rights.

    One focus is on data protection law with special consideration of the General Data Protection Regulation and national data protection law. Cybersecurity regulation, in particular the NIS-2 Directive, also plays a central role.

    In addition, current developments in EU law such as the AI Act, the Data Governance Act and the Digital Services Act are covered. The basics of intellectual property law, general contract law and IT criminal law are also covered.

    Teaching method

    Lecture, practical application, discussion

    Examination

    Final exam: Elaboration of case studies, final examination

    Literature

    Wird im Moodle-Kurs zur Verfügung gestellt.

    Teaching language

    Deutsch-Englisch

    2 SWS
    2 ECTS
    Master Examination | AP

    Master Examination | AP

    0 SWS   2 ECTS

    Content

    • Presentation and discussion of the final thesis
    • Specialist discussion

    Teaching method

    Independent development

    Examination

    Final exam: Commissioned examination (Master's examination)

    Literature

    Je nach Thema der Abschlussarbeit, bzw. vorgegebene Literatur für die Prüfungsfragen

    Teaching language

    Deutsch

    2 ECTS
    Master Thesis Seminar | SE

    Master Thesis Seminar | SE

    2 SWS   4 ECTS

    Content

    • Consolidation of the basic principles of scientific work
    • Reading, understanding and interpreting relevant scientific texts
    • literature research
    • Formal methods of scientific work
    • Students present the current development of their Master's thesis at regular intervals and put it up for discussion in the plenum

    Teaching method

    Lecture, Case Studies

    Examination

    Continuous assessment: Presentations, homework

    Literature

    • Matt Young: The Technical Writer’s Handbook. Writing with Style and Clarity, University Science Books, 2002.
    • M. Karmasin, R. Ribing: Die Gestaltung wissenschaftlicher Arbeiten. Ein Leitfaden für Haus-, Seminar- und Diplomarbeiten sowie Dissertationen. Wiener Universitätsverlag, 5.Auflage, 2010.
    • Umberto Eco: Wie man eine wissenschaftliche Arbeit schreibt, C.F. Müller, 13.Auflage, 2010.
    • Martin Kornmeir: Wissenschaftlich schreiben leicht gemacht, 7. Auflage Bern Haupt-UTB, 2016.
    • Karl M. Goeschka: Merkblatt für den Aufbau wissenschaftlicher Arbeiten. URL: i4c.at/goeschka/Merkblatt.pdf , 2006.

    Teaching language

    Deutsch-Englisch

    2 SWS
    4 ECTS

    Number of teaching weeks
    18 per semester

    Times
    5.30 p.m.-7.00 p.m. and 7.15 p.m.-8.45 p.m.


    After graduation

    As a graduate of this program, a wide range of occupational fields and career opportunities are open to you. Find out here where your path can take you.

    Graduates are active in both the core information technology and telecommunications industries as well as in sector spanning positions. Your task will be to design and implement comprehensive security solutions. You will specify, plan, integrate, test and operate voice and data networks, taking into account the necessary security standards. You will work in the following areas:

    • Companies with their own IT infrastructure

    • Banks and insurance companies

    • Companies in electronic commerce

    • Authorities and public institutions

    • Online service providers

    • Service providers (cable/radio network providers, telecom)

      • Entertainment industry and media companies

      • Software development companies and system integrators

      • Security services

      • Data centers

      • Consulting firms


        Studying made easy

        Two students holding books
        Buddy Network

        Support for getting started in Engineering

        >
        Personen arbeiten gemeinsam am Laptop
        Bridging courses

        Refresh your technical knowledge? More here

        >
        Bücher mit Geld
        Funding & Scholarships

        More information here

        >
        Hände zeigen auf Weltkarte
        Time abroad

        Expertise, language skills, broadening horizons

        >
        Open Lectures
        >
        Center for academic writing
        >
        Intensive German course
        >
        EICC
        >
        Doctoral Service
        >
        Validation
        >
        Accessibility
        >
        queer@HCW
        >

        Networking with graduates and organizations

        In teaching and research we work closely with renowned companies from commerce and industry, universities and research institutions. These partnerships provide you with opportunities to find a job, write your thesis, or participate in current research and development activities - also in our Research Center IT security. You can find many of our cooperations in the campus network. It is always worth taking a look and you might find a new job or an interesting event with one of our cooperation partners.


        Contact

        Head of Degree Program

        Administration office

        Marina Paukovits
        Melanie Paukovits
        Mag. Marion Bozsing
        Ayla Johanna Arazli, BA

        Favoritenstraße 226, B.3.20
        1100 Vienna
        43 1 606 68 77-2130
        informatik@hcw.ac.at

        Map main campus Favoriten (Google Maps)

        Office hours during the semester:

        Mon, 8.00 a.m.-12.00 p.m. and 3.00 p.m.-5.45 p.m.
        Tue, 1.30 p.m.-7.30 p.m.
        Wed, 9.00 a.m.-12.00 p.m. and 3.00 p.m.-5.45 p.m.
        Thu and Fr closed

         

        Teaching staff and research staff

         

        You want to know more? We will help you.

         

        Have you found all the information you are looking for?

        • Yes
        • No