Skip to main content

The standard programme consists of the courses marked with *** and **.

Cultural & Socio-economic Introduction to Belgium (marked with ***) is mandatory. The other courses, marked with **, can only be replaced by elective courses from the Bachelor in Cyber Security or Bachelor in Applied Computer Science - major Cyber Security, with approval after a screening of the desired prerequisites. In case of doubt, an online interview will be organised.

In our experience, the elective courses are quite difficult for some exchange students, and we want to make sure you have the required prior knowledge. Mind that you are responsible for selecting the right courses at your level. No intake interview is needed if you apply for the standard programme.

Course unit descriptions for this programme (course catalogue)

Courses

Cultural & socio-economic introduction to Belgium (3ECTS) ***

You will learn about Belgian and Flemish culture (history, architecture, literature, music, ...), political structure and socio-economic data, all in comparison to the socioeconomic data of your home country. This course includes a survival course Dutch, a cultural and historical walk through Bruges, and if possible, also a visit to the Parlamentarium and the European Parliament in Brussels and an additional visit specifically linked to the English-taught semester you follow.

  • History of Flanders & Belgium
  • Political system in Belgium & Europe
  • Belgian Economy
  • Health & Wellfare system in Belgium
  • Crash course Dutch

International Project (6ECTS) **

Participation in the international project held at Howest. The project is multi-disciplinary and the topic of the last years has been Smart Car Race.

During one week, normally held the end of March, you will work together with students of other universities. Our mission is to build a car with IoT hardware and to control it with your mind. As a minimum, a robot will drive forward/stop with your mind while a LED shows the status. At the end of the week we organise a race to decide which car was the best in control and which had the most original design.

There is a participation cost of +/- 140 EUR is, which includes the sessions, labs, lunches, socio-cultural activities and farewell dinner.

Web backend (3ECTS) **

Capture the flag (3ECTS) **

Web Pentesting Fundamentals (3ECTS) **

Web Pentesting based on the OWASP top 10.

  • Fingerprinting
  • XSS
  • SQLi
  • ...

Scripting and code analysis (6ECTS) **

Computer Networks (6ECTS) **

  • Introduction (terminology, types of computer networks, network components etc.)
  • Usage of a NOS (network operating system)
  • Network models and protocols
  • Network access (wired vs wireless)
  • Ethernet
  • Network layer
  • Transport layer
  • IP addressing and subnetting
  • Application layer
  • Network security
  • Static routing
  • VLAN
  • NAT

Linux for Ethical Hackers (6ECTS) **

Data Privacy and IT Law (3ECTS) **

Study of the most important legal points of interest:

  • Intellectual Property
  • Electronic commerce
  • Law of obligations & in detail IT contracts
  • Proof and electronic signature
  • Open source software
  • Privacy and data processing
  • Camera legislation
  • Computer crime law

Server System Management (6ECTS)

  • Windows Server Lab
    • Installation and configuration of a (virtual) Windows network (domain model)
    • Querying, entry, adapting and removing Active Directory information using a GUI & Windows PowerShell cmdlets
    • Installation, configuration en usage of server roles on a server in a domain model (file server, DHCP server, DNS server, web server...)
    • Users and Group maintenance in a domain model
    • Setting up share- & NTFS-permissions on shared folders
    • Configuring users and computers through Group Policies
    • Introduction and exploration of the Microsoft Azure platform
    • Scripts
  • Linux Server Lab
    • Command line principles
    • Working with files & directories
    • Archiving and compression
    • Pipes & redirection
    • Managing packages & processen
    • Network Services configuration (incl. SSH, DHCP & DNS)
    • Managing users and groups
    • Ownership & permissions (including sudo)
    • Special permissions, links & file locations
    • Scripts
    • Network Booting (PXE)

Forensic Analysis (3ECTS)

  • The forensic process
  • Hard Drives - hardware details
  • Volumes analysis
  • File systems
  • Application level forensics
  • Windows registry forensics
  • Data Recovery
  • Secure data-removal
  • Data Hiding, steganography
  • Anti-Forensic tools

.NET Technology Fundamentals (3ECTS)

  • .NET Ecosystem
  • C# Fundamentals and OO
  • Libraries
    • creating
    • consuming
  • LinQ
  • Entity Framework
  • Web Application
    • viewmodels
    • forms and taghelpers
    • sessions
    • master/view sections
  • Security
    • identity
    • OAuth

Web Pentesting Advanced (3ECTS)

Web Pentesting Advanced continues where Web Pentesting Fundamentals has stopped and expands into a wider field of topics.

Security Management, Threat and Risk Assessment (3ECTS)

  • Requirements and risk management
    • System model
    • Security objectives
    • Risk assessment
  • Threats: attacker model
    • Attack patterns: CAPEC, MAEC, ...
    • Threat modeling: STRIDE-LM, LINDDUN, DREAD, ...
    • Threat intelligence: Pyramid of pain, Lockheed Martin Kill chain, Diamond, ATT&CK (incl ICS), CAR, CAPEC, CWE, CVE, OWASP, ...
  • Mitigations: Defense model
    • Security controls
    • Security and data protection by design
    • Incident response
  • Compliance and governance
    • Frameworks: ISO 27K, COBIT, COBIT Risk, COBIT Information Security, NIST SP 800.53, NIST CSF, CMMI, CIS, PCI DSS, ...
    • Legal: GDPR, LED, NIS, EIDAS, E-privacy, EU cybersecurity act, PSD2, PNR, ...
    • Security organisation and conclusions
  • Case study
  • Threat identification (information security and data protection)
  • Threat risk assessment
  • Controls