The standard programme consists of the courses marked with *** and **. Cultural & Socio-economic Introduction to Belgium (marked with ***) is mandatory. The other courses, marked with **, can only be replaced by elective courses from the Bachelor in Cyber Security or Bachelor in Applied Computer Science - major Cyber Security, with approval after a screening of the desired prerequisites. In case of doubt, an online interview will be organised.In our experience, the elective courses are quite difficult for some exchange students, and we want to make sure you have the required prior knowledge. Mind that you are responsible for selecting the right courses at your level. No intake interview is needed if you apply for the standard programme.Back to English Taught Semester Applied Computer ScienceApplied Computer Science II (spring) course overviewFind the course unit descriptions for this programme (course catalogue) Courses Cultural & socio-economic introduction to Belgium (3ECTS) *** You will learn about Belgian and Flemish culture (history, architecture, literature, music, ...), political structure and socio-economic data, all in comparison to the socioeconomic data of your home country. This course includes a survival course Dutch, a cultural and historical walk through Bruges, and if possible, also a visit to the Parlamentarium and the European Parliament in Brussels and an additional visit specifically linked to the English-taught semester you follow. History of Flanders & Belgium Political system in Belgium & Europe Belgian Economy Health & Wellfare system in Belgium Crash course Dutch Computer Architectures & Operating Systems (6ECTS) ** This course is all about the hardware of the computer, the operating system on the computer and working with IT software from a point of view of a poweruser to execute different kind of tasks. The power user has administrator or root privileges on the OS and has only that pc. Hardware: Introduction to number systems, computer parts, bios, troubleshooting, ... Different types of computers Electronic components and logic functions in a circuit OS: Introduction to operating systems and virtualisation Basic administration- and automatisation tasks in Windows & Linux Use the systemtasks in the CLI & GUI Programming Fundamentals (6ECTS) ** Control structures: sequencing, selection and iterationVariables and data typesAlgorithms and data structures: 1 and 2 dimensional listsFunctions: arguments, parameters and return values, complexitySoftware Design: decomposition, divide and conquerAlgorithms and data structures: binary and linear search in a listTesting: make use of unit testingBasic version control Web Frontend (6ECTS) ** Creating web applications using HTML, CSS and JavaScriptPART 1: HTML & CSSDeveloping websites with semantic and valid HTML5A plethora of tags, such as the semantic containers, lists, navigation elements, forms, tables and many others are taught in order to translate text to a logical HTML structure.Modern CSS techniques that will effortlessly translate into responsible design, most notably by deep knowledge of box model. All CSS properties required to design and develop a contemporary web applicationLeveraging CSS selectors (novice, intermediate and advanced) for efficient codingFlexIntegrating automated tools to validate the end result and emphasising code qualityPART 2: JavaScriptScripting for web applications following the latest ECMA script standardsApplication of:variables and scopeif, switch, while, forFunctions And ArraysObjects and JSONDOM selectionEvent handling ( binding, this )Higher order functionsHandling user inputLocal / session storageArrow functionsTimers and intervalsin practice, simulated in real world cases.GENERAL (applies to all course components):Code is developed with cross browser & cross device equivalent behaviour in mind.Code quality is a large part of the course. Several best practices as well as "Don't"s will be handled by means of examples.Working with git is an integral part of this course, for completing exercises and handing in assignments Databases Fundamentals (3ECTS) ** Introduction: database, database system, relational database system, SQLSQL: read, insert, update and delete dataMaking a relational data model using normalizationSQL: implementation of the relational data model Cyber Security Essentials (6ECTS) Cybersecurity Introduction and OverviewCybersecurity ConceptsSecurity Architecture PrinciplesSecurity of Networks, Systems, Applications and DataIncident ResponseSecurity Implications and Adoption of Evolving Technology Operating Systems Concepts (3ECTS) General Operating Systems Concepts Introduction to different operating systems Process Management & Scheduling Memory management Network Management User management File manager Functionality management (Packages/Features) OS-level Virtualization (with intro Docker) ... Conceptual differences between Unix/Linux & Windows Computer history Examples and implementation of the various general concepts Introduction to the Linux/Unix philosophy Introduction to Windows server (Active Directory) concepts ... Information Modeling & Exchange (3ECTS) You create the appropriate documents using the correct methodology for the analysis of a company request or need. Design of an information model for data based on the application and structure of data. Designs of the technical interfaces and communication channels for communication between a technical person an an IT system or between IT systems and components. Object Oriented Architectures and Secure Development (6ECTS) Object oriented programming: SOLID Secure Development (Oracle's Secure Coding Standards) High-quality development: design patterns and unit testing Software architectures: 3-layered model, multi-layered model, client-server Java-application with GUI Java-application with persistency (file and database) Java-application with sockets communication (network) Capita selecta of advanced topics Data Analytics (3ECTS) Statistics Descriptive statistics Probability Probability distributions Data Mining / Machine Learning Regression Classification Clustering Web Technology, Security and Honeypot (6ECTS) Working with different types webservers (Apache, NGINX, IIS) Setup of a webserver: request & response model HTTPS Authentication Use of modern server side scripting technologies Security aspects of a webserver Security aspects of a modern web application Advanced web techniques Security OWASP top 10 Datacenter Virtualization (3ECTS) SAN / NAS Windows storage management Server Virtualisation (ESXi) Hyper-V KVM Datacenter Deployment Windows and Linux Server Security (3ECTS) Linux Different Linux distros and shells Network configuration / firewalling (eg iptables, ...) Authentication (eg NSS, PAM, ... ) Other security techniques (eg SELinux, ...) Windows Windows Server Auditing and Logging (eg audit GPOs, ...) Update management (eg WSUS, ...) Security (eg Bitlocker, ...) Mixed Linux/Windows environments (eg Powershell on Linux, Linux in AD, ...) Network Infrastructure Security (3ECTS) Knowledge of possible security problems (incl. data privacy) related to an IT solution or system in an organisation will be indetified. actors, stakeholders and external systems that will integrate with the to-be developed IT system. exceptional situations (necessity of a monitoring system) of an IT-solution/system. necessary IT components and solutions in an IT system. IT component adaptive design installation / configuration Security Management, Threat and Risk Assesment (3ECTS) Requirements and risk managementSystem modelSecurity objectivesRisk assessmentThreats: attacker modelAttack patterns: CAPEC, MAEC, ...Threat modeling: STRIDE-LM, LINDDUN, DREAD, ...Threat intelligence: Pyramid of pain, Lockheed Martin Kill chain, Diamond, ATT&CK (incl ICS), CAR, CAPEC, CWE, CVE, OWASP, ...Mitigations: Defense modelSecurity controlsSecurity and data protection by designIncident responseCompliance and governanceFrameworks: ISO 27K, COBIT, COBIT Risk, COBIT Information Security, NIST SP 800.53, NIST CSF, CMMI, CIS, PCI DSS, ...Legal: GDPR, LED, NIS, EIDAS, E-privacy, EU cybersecurity act, PSD2, PNR, ...Security organisation and conclusionsCase studyThreat identification (information security and data protection)Threat risk assessmentControls Cryptography and Blockchain (5ECTS) Cryptography algorithms Theory: Galois, prime numbers, Fermat, Euclidean Symmetric block ciphers : Feistel, DES , AES , ... Symmetric ciphers mode of operation: ECB, CBC, CFB, OFB, XTS-AES, GCM, CCM, KW Hashing: SHA2, SHA3, perceptual hashing, ... Random numbers: TRNG, PRNG, ANSI X 9.17 Stream ciphers: RC4, others, ... Asymmetric cyphers : RSA , Diffie-Helman , El-Gamal, ECC , ... Data integrity algorithms : Hash functions , MAC , DSA, ECDSA, RSA-PSS, ... Mutual trust : Distribution of keys , X.509, PKI , ... Applying crypto Cryptography protocols Cryptography applications: files, messages, databases, disks, e-id Achieving privacy in a distributed network Use of crypto in bitcoin and blockchain Modern crypto / blockchain / distributed: secret sharing, secure multiparty, post quantum, homomorphic, attribute based / identity based encryption, electronic voting, light-weight crypto, zero-knowledge proof, oblivious RAM, blockchain Differential privacy and other privacy preserving methods: PPDM, PPDP, PPML, federated learning Cryptanalysis Crypto libraries Crypto guidelines Using Python modules to apply these concepts IT Governance (3ECTS) Mission, Vision & StrategyCobit 2019 : a practical approachThe do's and don't of FrameworksPMI, Prince2Agile & ScrumDesign ThinkingITIL Emergent Security Techniques (3ECTS) In this course, we’ll look at a number of innovative and emergent subjects within the security domain:Industrial securityIntroduction to industrial control systemsIntroduction to PLC programmingIndustrial fieldbus protocolsSecurity and auditing techniques for industrial installationsCyber artificial intelligenceThe history of AIBasic conceptsPractical methodsApplications in intrusion detectionSoftware Defined RadioIntroduction to radio communicationAnalog data radio communicationDigital data radio communicationNear-Field Communication (NFC)Introduction to NFCSecurity risks of NFC Cybercrime (3ECTS) The course covers the following topics:General law in BelgiumJudicial organisationPolice forces in BelgiumCriminal law and criminal proceedingsInternational computer crimeRelevant legislationCybercrime lawLaw of the electronic economyE-privacy DirectiveKSZCybersquattingTypical forms of cybercrimeCyberbullyingChild pornographyInternet fraud Cultural & socio-economic introduction to Belgium Computer Architectures & Operating Systems Programming Fundamentals Web Frontend Databases Fundamentals Cyber Security Essentials Operating Systems Concepts Information Modeling & Exchange Object Oriented Architectures and Secure Development Data Analytics Web Technology, Security and Honeypot Datacenter Virtualization Windows and Linux Server Security Network Infrastructure Security Security Management, Threat and Risk Assesment Cryptography and Blockchain IT Governance Emergent Security Techniques Cybercrime