The standard programme consists of the courses marked with *** and **. Cultural & Socio-economic Introduction to Belgium (marked with ***) is mandatory. The other courses, marked with **, can only be replaced by elective courses from the Bachelor in Cyber Security or Bachelor in Applied Computer Science - major Cyber Security, with approval after a screening of the desired prerequisites. In case of doubt, an online interview will be organised.In our experience, the elective courses are quite difficult for some exchange students, and we want to make sure you have the required prior knowledge. Mind that you are responsible for selecting the right courses at your level. No intake interview is needed if you apply for the standard programme.Back to English Taught Semester Applied Computer ScienceApplied Computer Science II (spring) course overviewFind the course unit descriptions for this programme (course catalogue) Courses Cultural & socio-economic introduction to Belgium (3ECTS) *** You will learn about Belgian and Flemish culture (history, architecture, literature, music, ...), political structure and socio-economic data, all in comparison to the socioeconomic data of your home country. This course includes a survival course Dutch, a cultural and historical walk through Bruges, and if possible, also a visit to the Parlamentarium and the European Parliament in Brussels and an additional visit specifically linked to the English-taught semester you follow.History of Flanders & BelgiumPolitical system in Belgium & EuropeBelgian EconomyHealth & Wellfare system in BelgiumCrash course Dutch Computer Architectures & Operating Systems (6ECTS) ** This course is all about the hardware of the computer, the operating system on the computer and working with IT software from a point of view of a poweruser to execute different kind of tasks. The power user has administrator or root privileges on the OS and has only that pc.Hardware:Introduction to number systems, computer parts, bios, troubleshooting, ...Different types of computersElectronic components and logic functions in a circuitOS:Introduction to operating systems and virtualisationBasic administration- and automatisation tasks in Windows & LinuxUse the systemtasks in the CLI & GUI Programming Fundamentals (6ECTS) ** Control structures: sequencing, selection and iterationVariables and data typesAlgorithms and data structures: 1 and 2 dimensional listsFunctions: arguments, parameters and return values, complexitySoftware Design: decomposition, divide and conquerAlgorithms and data structures: binary and linear search in a listTesting: make use of unit testingBasic version control Web Frontend (6ECTS) ** Creating web applications using HTML, CSS and JavaScriptPART 1: HTML & CSSDeveloping websites with semantic and valid HTML5A plethora of tags, such as the semantic containers, lists, navigation elements, forms, tables and many others are taught in order to translate text to a logical HTML structure.Modern CSS techniques that will effortlessly translate into responsible design, most notably by deep knowledge of box model. All CSS properties required to design and develop a contemporary web applicationLeveraging CSS selectors (novice, intermediate and advanced) for efficient codingFlexIntegrating automated tools to validate the end result and emphasising code qualityPART 2: JavaScriptScripting for web applications following the latest ECMA script standardsApplication of:variables and scopeif, switch, while, forFunctions And ArraysObjects and JSONDOM selectionEvent handling ( binding, this )Higher order functionsHandling user inputLocal / session storageArrow functionsTimers and intervalsin practice, simulated in real world cases.GENERAL (applies to all course components):Code is developed with cross browser & cross device equivalent behaviour in mind.Code quality is a large part of the course. Several best practices as well as "Don't"s will be handled by means of examples.Working with git is an integral part of this course, for completing exercises and handing in assignments Cyber Security Essentials (6ECTS) ** Cybersecurity Introduction and OverviewCybersecurity ConceptsSecurity Architecture PrinciplesSecurity of Networks, Systems, Applications and DataIncident ResponseSecurity Implications and Adoption of Evolving Technology Databases Fundamentals (3ECTS) ** Introduction: database, database system, relational database system, SQLSQL: read, insert, update and delete dataMaking a relational data model using normalizationSQL: implementation of the relational data model Communication Skills (3ECTS) ** The assignment is to come up with a new product and / or service (or a range of) and to work out the launch as well and as completely as possible. This assignment is a group task.The following elements are covered:flawless and professional writing;communication with colleagues, superiors (e-mail charter);writing reports;meeting techniques;conversation techniques;listening techniques;presentation techniques;teamwork;feedback Mobile Security (3ECTS) Elements covered:Securing and pentesting of mobile (web) applicationsAndroid: (adb, root, inspect apk's, ...)General: Static & dynamic analysis, Malware, ... Web Pentesting Advanced (3ECTS) Web Pentesting Advanced continues where Web Pentesting Fundamentals has stopped and expands into a wider field of topics. Datacenter Virtualization (3ECTS) SAN / NASWindows storage managementServer Virtualisation (ESXi)Hyper-VKVMDatacenter Deployment Windows Server Security (6ECTS) This course covers the following topics:Windows ServerAuditing and Logging (eg audit GPOs, ...)Update management (eg WSUS, ...)Security (eg Bitlocker, ...)Mixed Linux/Windows environments (eg Powershell on Linux, Linux in AD, ...) Digital Forensics Analysis (6ECTS) Elements covered:The forensic processHard Drives - hardware detailsVolumes analysisFile systemsApplication level forensicsWindows registry forensicsData RecoverySecure data-removalData Hiding, steganographyAnti-Forensic tools Practical Reverse Engineering and Malware Analysis (3ECTS) Elements covered:Computerhardware RecapBasic StaticBasic DynamicAdvanced StaticAdvanced DynamicMalware OverviewReverse Engineering Network Infrastructure Security (3ECTS) Knowledge of possible security problems (incl. data privacy) related to an IT solution or system in an organisation will be indetified.actors, stakeholders and external systems that will integrate with the to-be developed IT system.exceptional situations (necessity of a monitoring system) of an IT-solution/system.necessary IT components and solutions in an IT system.IT componentadaptive designinstallation / configuration Cryptography and Privacy Preserving Techniques (5ECTS) Cryptography algorithmsTheory: Galois, prime numbers, Fermat, EuclideanSymmetric block ciphers : Feistel, DES , AES , ...Symmetric ciphers mode of operation: ECB, CBC, CFB, OFB, XTS-AES, GCM, CCM, KWHashing: SHA2, SHA3, perceptual hashing, ...Random numbers: TRNG, PRNG, ANSI X 9.17Stream ciphers: RC4, others, ...Asymmetric cyphers : RSA , Diffie-Helman , El-Gamal, ECC , ...Data integrity algorithms : Hash functions , MAC , DSA, ECDSA, RSA-PSS, ...Mutual trust : Distribution of keys , X.509, PKI , ...Applying cryptoCryptography protocolsCryptography applications: files, messages, databases, disks, e-idAchieving privacy in a distributed networkUse of crypto in bitcoin and blockchainModern crypto / blockchain / distributed: secret sharing, secure multiparty, post quantum, homomorphic, attribute based / identity based encryption, electronic voting, light-weight crypto, zero-knowledge proof, oblivious RAM, blockchainDifferential privacy and other privacy preserving methods: PPDM, PPDP, PPML, federated learningCryptanalysisCrypto librariesCrypto guidelinesUsing Python modules to apply these concepts Emergent Security Techniques (3ECTS) In this course, we’ll look at a number of innovative and emergent subjects within the security domain:Industrial securityIntroduction to industrial control systemsIntroduction to PLC programmingIndustrial fieldbus protocolsSecurity and auditing techniques for industrial installationsCyber artificial intelligenceThe history of AIBasic conceptsPractical methodsApplications in intrusion detectionSoftware Defined RadioIntroduction to radio communicationAnalog data radio communicationDigital data radio communicationNear-Field Communication (NFC)Introduction to NFCSecurity risks of NFC Cybercrime and Warfare (3ECTS) The course covers the following topics:General law in BelgiumJudicial organisationPolice forces in BelgiumCriminal law and criminal proceedingsInternational computer crimeRelevant legislationCybercrime lawLaw of the electronic economyE-privacy DirectiveKSZCybersquattingTypical forms of cybercrimeCyberbullyingChild pornographyInternet fraud Linux Server Security (6ECTS) This course covers the following topics:Different Linux distros and shellsNetwork configuration / firewalling (eg iptables, ...)Authentication (eg NSS, PAM, ... )Other security techniques (eg SELinux, ...) Cyber Threat Intelligence (3ECTS) Elements covered:Pyramid of painLockheed Martin Kill chainDiamondATT&CK (incl ICS)CARCAPECCWECVEOWASP ... Cultural & socio-economic introduction to Belgium Computer Architectures & Operating Systems Programming Fundamentals Web Frontend Cyber Security Essentials Databases Fundamentals Communication Skills Mobile Security Web Pentesting Advanced Datacenter Virtualization Windows Server Security Digital Forensics Analysis Practical Reverse Engineering and Malware Analysis Network Infrastructure Security Cryptography and Privacy Preserving Techniques Emergent Security Techniques Cybercrime and Warfare Linux Server Security Cyber Threat Intelligence