Special Master's track Information Security Technology

Special Master's track Information Security Technology

A Master of Science in Information Security Technology (IST) is an academic expert in the area of information security in general, and in computer & network security in particular. Information security technology protects data that are stored, transmitted, accessed, or modified against all kinds of threats. Threats can vary from unauthorized access to malicious manipulations. Information security technology is essential for secure communication and data protection in many situations.

After taking some courses, you will probably have a more clear picture of the academic direction you want to pursue in your studies. If not, you may want to talk to several staff members or the academic advisor. In the specialization for your subject, there are people that you may want to be involved with for your final master project (see Section 5.4). In order to compose a well-balanced program that provides adequate prerequisites for this project, it is advisable to first choose and consult a project supervisor in the specialization of your interest before choosing elective courses. As a rule of thumb, you should start your search for a supervisor and the construction of your individual program not later than at the end of your first year.

A Master of Science in Information Security Technology can become involved in cryptographic primitives, security protocols, data storage, communication, or information security management. Additionally, he or she can act as internal or external consultant, regarding the security of information systems and networks, or regarding the security policy of an organization. A Master of Science in Information Security Technology can enter a job in a.o. the following institutions: 
​research laboratories and academic institutes (both for theoretical and applied work);  applied R&D in industry; the financial world; governmental agencies; consultancy agencies​ (all with respect to security in the area of information systems and relevant policy making).

Learning outcomes

The goal of the program is to transform Bachelors in Computer Science and Mathematics into academic experts in the area of information security in general and computer & networksecurity in particular. Alumni will be able to function as researcher or as system developer in university or society. They will be well aware of the state of the art in information security technology at the master level. They will be able to analyze complex security situations and to reduce them to solvable problems.

A graduate from the master program

  • is qualified to degree level in the domain of science, engineering and technology; 
  • is competent in the relevant domain-specific discipline, namely computer science and engineering; 
  • is capable of acquiring knowledge independently; 
  • approaches computer science problems in a thorough and scientifically founded manner; 
  • is capable of critical thinking, can reason logically and form opinions; 
  • has design skills, presentation skills, and communication skills; 
  • has insight into the role of computer science in industry, society, and science; 
  • and, in addition to a recognizable domain-specific profile, possesses a sufficiently broad basis to be able to work in an interdisciplinary and multidisciplinary context. 

In addition to these general learning outcomes, a graduate from IST 

  • has a broad view of information security; 
  • is able to evaluate existing and newly designed security systems; 
  • is able to list relevant security requirements in an application and to select the right techniques to address these issues; 
  • is an expert in at least one subarea of information security; 
  • can contribute to discussions about the role of information security in our society; 
  • has experience in the process of specifying, designing, and realization of an application in which security plays an important role.

Directly to

More information

Want to know more? Contact us via the contact form below.

Contact