Skip to main content

The standard programme consists of the courses marked with *** and **.

Cultural & Socio-economic Introduction to Belgium (marked with ***) is mandatory. The other courses, marked with **, can only be replaced by elective courses from the Bachelor in Cyber Security or Bachelor in Applied Computer Science - major Cyber Security, with approval after a screening of the desired prerequisites. In case of doubt, an online interview will be organised.

In our experience, the elective courses are quite difficult for some exchange students, and we want to make sure you have the required prior knowledge. Mind that you are responsible for selecting the right courses at your level. No intake interview is needed if you apply for the standard programme.

Find the course unit descriptions for this programme (course catalogue)

Courses

Cultural & socio-economic introduction to Belgium (3ECTS) ***

You will learn about Belgian and Flemish culture (history, architecture, literature, music, ...), political structure and socio-economic data, all in comparison to the socioeconomic data of your home country. This course includes a survival course Dutch, a cultural and historical walk through Bruges, and if possible, also a visit to the Parlamentarium and the European Parliament in Brussels and an additional visit specifically linked to the English-taught semester you follow.

  • History of Flanders & Belgium
  • Political system in Belgium & Europe
  • Belgian Economy
  • Health & Wellfare system in Belgium
  • Crash course Dutch

Computer Architectures & Operating Systems (6ECTS) **

This course is all about the hardware of the computer, the operating system on the computer and working with IT software from a point of view of a poweruser to execute different kind of tasks. The power user has administrator or root privileges on the OS and has only that pc.

  • Hardware:
    • Introduction to number systems, computer parts, bios, troubleshooting, ...
    • Different types of computers
    • Electronic components and logic functions in a circuit
  • OS:
    • Introduction to operating systems and virtualisation
    • Basic administration- and automatisation tasks in Windows & Linux
    • Use the systemtasks in the CLI & GUI

Programming Fundamentals (6ECTS) **

  • Control structures: sequencing, selection and iteration
  • Variables and data types
  • Algorithms and data structures: 1 and 2 dimensional lists
  • Functions: arguments, parameters and return values, complexity
  • Software Design: decomposition, divide and conquer
  • Algorithms and data structures: binary and linear search in a list
  • Testing: make use of unit testing
  • Basic version control

Web Frontend (6ECTS) **

Creating web applications using HTML, CSS and JavaScript

PART 1: HTML & CSS

  • Developing websites with semantic and valid HTML5
  • A plethora of tags, such as the semantic containers, lists, navigation elements, forms, tables and many others are taught in order to translate text to a logical HTML structure.
  • Modern CSS techniques that will effortlessly translate into responsible design, most notably by deep knowledge of box model. All CSS properties required to design and develop a contemporary web application
  • Leveraging CSS selectors (novice, intermediate and advanced) for efficient coding
  • Flex

Integrating automated tools to validate the end result and emphasising code quality

PART 2: JavaScript

Scripting for web applications following the latest ECMA script standards

Application of:

  • variables and scope
  • if, switch, while, for
  • Functions And Arrays
  • Objects and JSON
  • DOM selection
  • Event handling ( binding, this )
  • Higher order functions
  • Handling user input
  • Local / session storage
  • Arrow functions
  • Timers and intervals
  • in practice, simulated in real world cases.

GENERAL (applies to all course components):

  • Code is developed with cross browser & cross device equivalent behaviour in mind.
  • Code quality is a large part of the course. Several best practices as well as "Don't"s will be handled by means of examples.
  • Working with git is an integral part of this course, for completing exercises and handing in assignments

Cyber Security Essentials (6ECTS) **

Cybersecurity Introduction and Overview

  • Cybersecurity Concepts
  • Security Architecture Principles
  • Security of Networks, Systems, Applications and Data
  • Incident Response
  • Security Implications and Adoption of Evolving Technology

Databases Fundamentals (3ECTS) **

  • Introduction: database, database system, relational database system, SQL
  • SQL: read, insert, update and delete data
  • Making a relational data model using normalization
  • SQL: implementation of the relational data model

Communication Skills (3ECTS) **

The assignment is to come up with a new product and / or service (or a range of) and to work out the launch as well and as completely as possible. This assignment is a group task.

The following elements are covered:

  • flawless and professional writing;
  • communication with colleagues, superiors (e-mail charter);
  • writing reports;
  • meeting techniques;
  • conversation techniques;
  • listening techniques;
  • presentation techniques;
  • teamwork;
  • feedback

Mobile Security (3ECTS)

Elements covered:

  • Securing and pentesting of mobile (web) applications
  • Android: (adb, root, inspect apk's, ...)
  • General: Static & dynamic analysis, Malware, ...

Web Pentesting Advanced (3ECTS)

Web Pentesting Advanced continues where Web Pentesting Fundamentals has stopped and expands into a wider field of topics.

Datacenter Virtualization (3ECTS)

  • SAN / NAS
  • Windows storage management
  • Server Virtualisation (ESXi)
  • Hyper-V
  • KVM
  • Datacenter Deployment

Windows Server Security (6ECTS)

This course covers the following topics:

  • Windows Server
  • Auditing and Logging (eg audit GPOs, ...)
  • Update management (eg WSUS, ...)
  • Security (eg Bitlocker, ...)
  • Mixed Linux/Windows environments (eg Powershell on Linux, Linux in AD, ...)

Digital Forensics Analysis (6ECTS)

Elements covered:

  • The forensic process
  • Hard Drives - hardware details
  • Volumes analysis
  • File systems
  • Application level forensics
  • Windows registry forensics
  • Data Recovery
  • Secure data-removal
  • Data Hiding, steganography
  • Anti-Forensic tools

Practical Reverse Engineering and Malware Analysis (3ECTS)

Elements covered:

  • Computerhardware Recap
  • Basic Static
  • Basic Dynamic
  • Advanced Static
  • Advanced Dynamic
  • Malware Overview
  • Reverse Engineering

Network Infrastructure Security (3ECTS)

Knowledge of possible security problems (incl. data privacy) related to an IT solution or system in an organisation will be indetified.

  • actors, stakeholders and external systems that will integrate with the to-be developed IT system.
  • exceptional situations (necessity of a monitoring system) of an IT-solution/system.
  • necessary IT components and solutions in an IT system.

IT component

  • adaptive design
  • installation / configuration

Cryptography and Privacy Preserving Techniques (5ECTS)

  • Cryptography algorithms
    • Theory: Galois, prime numbers, Fermat, Euclidean
    • Symmetric block ciphers : Feistel, DES , AES , ...
    • Symmetric ciphers mode of operation: ECB, CBC, CFB, OFB, XTS-AES, GCM, CCM, KW
    • Hashing: SHA2, SHA3, perceptual hashing, ...
    • Random numbers: TRNG, PRNG, ANSI X 9.17
    • Stream ciphers: RC4, others, ...
    • Asymmetric cyphers : RSA , Diffie-Helman , El-Gamal, ECC , ...
    • Data integrity algorithms : Hash functions , MAC , DSA, ECDSA, RSA-PSS, ...
    • Mutual trust : Distribution of keys , X.509, PKI , ...
  • Applying crypto
    • Cryptography protocols
    • Cryptography applications: files, messages, databases, disks, e-id
    • Achieving privacy in a distributed network
    • Use of crypto in bitcoin and blockchain
    • Modern crypto / blockchain / distributed: secret sharing, secure multiparty, post quantum, homomorphic, attribute based / identity based encryption, electronic voting, light-weight crypto, zero-knowledge proof, oblivious RAM, blockchain
    • Differential privacy and other privacy preserving methods: PPDM, PPDP, PPML, federated learning
  • Cryptanalysis
  • Crypto libraries
  • Crypto guidelines
  • Using Python modules to apply these concepts

Emergent Security Techniques (3ECTS)

In this course, we’ll look at a number of innovative and emergent subjects within the security domain:

  • Industrial security
    • Introduction to industrial control systems
    • Introduction to PLC programming
    • Industrial fieldbus protocols
    • Security and auditing techniques for industrial installations
  • Cyber artificial intelligence
    • The history of AI
    • Basic concepts
    • Practical methods
    • Applications in intrusion detection
  • Software Defined Radio
    • Introduction to radio communication
    • Analog data radio communication
    • Digital data radio communication
  • Near-Field Communication (NFC)
    • Introduction to NFC
    • Security risks of NFC

Cybercrime and Warfare (3ECTS)

The course covers the following topics:

  • General law in Belgium
  • Judicial organisation
  • Police forces in Belgium
  • Criminal law and criminal proceedings
  • International computer crime
  • Relevant legislation
    • Cybercrime law
    • Law of the electronic economy
    • E-privacy Directive
    • KSZ
    • Cybersquatting
  • Typical forms of cybercrime
    • Cyberbullying
    • Child pornography
    • Internet fraud

Linux Server Security (6ECTS)

This course covers the following topics:

  • Different Linux distros and shells
  • Network configuration / firewalling (eg iptables, ...)
  • Authentication (eg NSS, PAM, ... )
  • Other security techniques (eg SELinux, ...)

Cyber Threat Intelligence (3ECTS)

Elements covered:

  • Pyramid of pain
  • Lockheed Martin Kill chain
  • Diamond
  • ATT&CK (incl ICS)
  • CAR
  • CAPEC
  • CWE
  • CVE
  • OWASP
  • ...