{"id":1204,"date":"2023-07-26T12:15:56","date_gmt":"2023-07-26T12:15:56","guid":{"rendered":"https:\/\/website.prod.unilu.spikeseed.cloud\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/"},"modified":"2025-06-13T11:22:30","modified_gmt":"2025-06-13T09:22:30","slug":"programme","status":"publish","type":"study-programs","link":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/","title":{"rendered":"Programme"},"content":{"rendered":"<div class=\"section py-0 static\">\n<section class=\"py-0 wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\"><!-- SecondaryNavigationMirror --><div class=\"js-secondary-nav--sticky wp-block-unilux-blocks-secondary-navigation\" id=\"d33b57aa-b644-4290-a8a2-2a7e77903cde\">\n    <nav id=\"secondary-navigation\" role=\"navigation\" aria-label=\"Secondary menu\" class=\"secondary-nav\">\n        <button class=\"secondary-nav__button btn btn-solid--primary w-full\" aria-expanded=\"false\" aria-controls=\"secondary-navigation__list\" title=\"The selected page is Overview\" type=\"button\">\n            <span class=\"btn__name mr-auto\">Overview<\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n                <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\" \/>\n            <\/svg>\n        <\/button>\n\n        <ul id=\"secondary-navigation__list\" class=\"secondary-nav__list\">\n            <li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Overview<\/span>\n    <\/a>\n<\/li>\n<li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link isactived\" aria-current=\"page\">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Programme<\/span>\n    <\/a>\n<\/li>\n<li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/career\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Career<\/span>\n    <\/a>\n<\/li>\n<li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/testimonials\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Testimonials<\/span>\n    <\/a>\n<\/li>\n<li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/teaching-staff\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Teaching staff<\/span>\n    <\/a>\n<\/li>\n<li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/admissions\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Admissions<\/span>\n    <\/a>\n<\/li>\n        <\/ul>\n    <\/nav>\n<\/div>\n<!-- end SecondaryNavigationMirror --><\/div><\/section>\n\n\n<section class=\"section section wp-block-unilux-blocks-headline-text-and-image\">\n    \n<div class=\"wp-block-unilux-blocks-wrapper container xl:max-w-screen-xl\">\n<h2 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"programme\"\n    >\nProgramme<\/h2>\n\n\n\n<div class=\"wp-block-unilux-blocks-wrapper flex flex-wrap lg:-mx-32\">\n<div class=\"wp-block-unilux-blocks-wrapper w-full lg:w-7\/12 lg:order-2 lg:px-32\">\n<div class=\"wp-block-unilux-blocks-image-video-wrapper\">\n    <figure class=\"wp-block-dev4-reusable-blocks-image  object-fit--cover\">\n    \n<img decoding=\"async\" class=\"wp-block-image unilux-custom-image-block\"\n                alt=\"\"\n            src=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2023\/07\/SuppCom_0226_108-scaled.jpg\"\n                srcset=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2023\/07\/SuppCom_0226_108-300x221.jpg 300w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2023\/07\/SuppCom_0226_108-1024x755.jpg 1024w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2023\/07\/SuppCom_0226_108-768x566.jpg 768w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2023\/07\/SuppCom_0226_108-1536x1133.jpg 1536w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2023\/07\/SuppCom_0226_108-2048x1510.jpg 2048w\"\n                style=\"object-position: 50.00% 50.00%; font-family: &quot;object-fit: cover; object-position: 50.00% 50.00%;&quot;; aspect-ratio: 3\/2; object-fit: cover; width: 100%;\"\n        loading=\"lazy\"\n\/>    <\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-unilux-blocks-wrapper w-full lg:w-5\/12 lg:order-1 lg:px-32\">\n<p>The Master in Information System Security Management offers a multidisciplinary insight, combining technical, legal, and professional aspects.<br>Courses start in September and take place over two academic years, in 25 two-day sessions, Friday and Saturday from 9:00 to 16:45. <br>The curriculum includes a professional project in semester four.<br><\/p>\n\n\n\n<ul class=\"wp-block-unilux-blocks-custom-buttons btn-list\"><li class=\"wp-block-unilux-blocks-custom-button\"    aria-disabled=\"false\"\n    >\n    <a\n        role=\"link\"\n        aria-disabled=\"false\"\n                    href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/admissions\/\"\n                target=\"_self\"\n        class=\"btn btn--primary\"\n            >Admissions<\/a>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\">\n<h2 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"academic-contents\"\n    >\nAcademic Contents<\/h2>\n\n\n\n<div id=\"tab-nav\" class=\"tab-nav\">\n    <button\n        type=\"button\"\n        class=\"button-toggle btn btn--white w-full\"\n        aria-expanded=\"false\"\n        aria-controls=\"tab-nav__listing\"\n        title=\"The selected tab is CONTENT OF THE CURRENT LABEL\"\n    >\n        <span class=\"btn__name mr-auto\">Semester 1<\/span>\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\" \/>\n        <\/svg>\n    <\/button>\n    <ul\n        id=\"tab-nav__listing\"\n        class=\"tab-nav__listing nav manual\"\n        role=\"tablist\"\n        aria-label=\"About me\"\n    >\n                <li role=\"presentation\" class=\"tab-nav__item\" key={button.id}>\n            <button\n                type=\"button\"\n                id=\"tab-f58fee3f-00b2-42df-b2f2-d6a681e770ba\"\n                data-bs-toggle=\"tab\"\n                data-bs-target=\"#tabpanel-f58fee3f-00b2-42df-b2f2-d6a681e770ba\"\n                role=\"tab\"\n                aria-controls=\"tabpanel-f58fee3f-00b2-42df-b2f2-d6a681e770ba\"\n                aria-selected=\"false\"\n                aria-current=\"false\"\n                class=\"tab-nav__button\"\n                tabIndex=\"-1\"\n            >\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n                    <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n                <\/svg>\n                <span class=\"tab-nav__name\">Semester 1<\/span>\n            <\/button>\n        <\/li>\n                <li role=\"presentation\" class=\"tab-nav__item\" key={button.id}>\n            <button\n                type=\"button\"\n                id=\"tab-15dad048-8987-4b3c-85fc-ed7252ccb15a\"\n                data-bs-toggle=\"tab\"\n                data-bs-target=\"#tabpanel-15dad048-8987-4b3c-85fc-ed7252ccb15a\"\n                role=\"tab\"\n                aria-controls=\"tabpanel-15dad048-8987-4b3c-85fc-ed7252ccb15a\"\n                aria-selected=\"false\"\n                aria-current=\"false\"\n                class=\"tab-nav__button\"\n                tabIndex=\"-1\"\n            >\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n                    <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n                <\/svg>\n                <span class=\"tab-nav__name\">Semester 2<\/span>\n            <\/button>\n        <\/li>\n                <li role=\"presentation\" class=\"tab-nav__item\" key={button.id}>\n            <button\n                type=\"button\"\n                id=\"tab-85762969-f63c-4ffa-b152-5e68bf2ccae1\"\n                data-bs-toggle=\"tab\"\n                data-bs-target=\"#tabpanel-85762969-f63c-4ffa-b152-5e68bf2ccae1\"\n                role=\"tab\"\n                aria-controls=\"tabpanel-85762969-f63c-4ffa-b152-5e68bf2ccae1\"\n                aria-selected=\"false\"\n                aria-current=\"false\"\n                class=\"tab-nav__button\"\n                tabIndex=\"-1\"\n            >\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n                    <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n                <\/svg>\n                <span class=\"tab-nav__name\">Semester 3<\/span>\n            <\/button>\n        <\/li>\n                <li role=\"presentation\" class=\"tab-nav__item\" key={button.id}>\n            <button\n                type=\"button\"\n                id=\"tab-5a71c36c-b7cf-4dd0-abc9-4a3d616d92d7\"\n                data-bs-toggle=\"tab\"\n                data-bs-target=\"#tabpanel-5a71c36c-b7cf-4dd0-abc9-4a3d616d92d7\"\n                role=\"tab\"\n                aria-controls=\"tabpanel-5a71c36c-b7cf-4dd0-abc9-4a3d616d92d7\"\n                aria-selected=\"false\"\n                aria-current=\"false\"\n                class=\"tab-nav__button\"\n                tabIndex=\"-1\"\n            >\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n                    <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n                <\/svg>\n                <span class=\"tab-nav__name\">Semester 4<\/span>\n            <\/button>\n        <\/li>\n            <\/ul>\n<\/div>\n<div class=\"tab-content\">\n    <section\n    id=\"tabpanel-f58fee3f-00b2-42df-b2f2-d6a681e770ba\"\n    aria-labelledby=\"tab-f58fee3f-00b2-42df-b2f2-d6a681e770ba\"\n    class=\"tab-panel fade hidden is-hidden\"\n>\n    <div class=\"wp-block-unilux-blocks-course-offer\">\n    <h3>Course offer for Semestre 1 (2025-2026 Winter)<\/h3>\n    \n<div id=\"accordion-module-69e18755dc60c\" class=\"accordion accordion--theme\">\n            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755dc634\"\n        >\n            <span class=\"accordion__title\">\n                1.1 Organisational Theory and Change (Th\u00e9orie des organisations et du changement)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-72                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755dc634\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755dc60c\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 1.1 Organisational Theory and Change (Th\u00e9orie des organisations et du changement)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-72<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 1 : Understanding Organisations &amp; Management (Compr\u00e9hension des organisations et du management)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Define the characteristics of the organizational context within which security management is deployed<br><br>Provide insight into the different components of the organization, their respective roles and their interrelations<br><br>Identify the organizational changes related to security management, and how to manage these as well as the socio organizational risks <br><br>Understand the challenges of security management in terms of sense-making within the organizations <br>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The course aims to develop your understanding of the organizational context.<br>It focuses on the structure (organizational configurations), types of strategies and corporate culture that characterize an organization.<br>Content :<br> <ul><li>Class 1 : What is an organization ? Which configuration ? <\/li><li>Class 2 : What is Corporate Strategy ? What are the links between Strategy, Information systems and the organizational structure ? <\/li><li>Class 3 : What is change and how does it work ? What are the socio organizational risks related to security management ? <\/li><\/ul>\u00a0                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p><br>Group oral presentation and supporting documentation: Case study analysis of an organizational situation, using the theoretical frameworks seen in class.<br><\/p>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Oral presentations, PowerPoint presentations, Videos, case studies<br><br><ul><br><li>Pichault, F. (2013), Change management : Towards polyphony, Manager RH (Coll), De Boeck, 182p<\/li><br><li>Pichault, F., Schoenaers, F. (2003), &#8220;HRM practices in a process of organizational change: A contextualist perspective&#8221;, Applied Psychology, 52 (1), 120-143<\/li><br><li>K.Laudon J.P. Laudon (2014) Management Information Systems, Global Edition, 13E, Pearson Education<\/li><br><\/ul>                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755dc64a\"\n        >\n            <span class=\"accordion__title\">\n                2.1 Legal and Regulatory Aspects (Aspect l\u00e9gaux et r\u00e9glementaires)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-46                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755dc64a\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755dc60c\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 2.1 Legal and Regulatory Aspects (Aspect l\u00e9gaux et r\u00e9glementaires)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-46<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 2 : Regulatory Frameworks (Cadres r\u00e9glementaires)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            <p>Create good legal reflexes, enable students to identify \/ flag (for further analysis \/ resolution by management \/ legal counsels) potential legal or regulatory issues linked to their function \/ duties or information security in general.<\/p><br><p>Acquire sufficient legal knowledge in computer criminal law, data protection, contractual aspects and other regulatory issues related to information security in order to determine policies and lines of action in this area.<br><\/p>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        General introduction (laws, regulations, courts)<br> IT law fundamentals<br> Liability principles<br> Contract law principles, pre-contractual arrangements<br> Study of usual IT contracts (development, license, maintenance, escrow)<br> Intellectual property basics<br> Criminal law and IT crime<br> GDPR and personal data protection law principles<br> Employee IT monitoring<br> IT investigations and inforensics rules<br> IT security statutory obligations<br> Forthcoming EU \/ Luxembourg rules<br>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Task: Take-home assignment (100%)<br>Grading scheme: 20 points (0-20)<br>Objectives: Demonstrate a basic understanding of legal concepts, conduct an analysis of the legal aspects of a particular situation or risk, be able to identify legal issues within the CISO&#8217;s scope of expertise<br>Assessment rules: Students will work on their own.<br>Assessment criteria: The correctness of solutions to assigned questions, the existence of appropriate legal reasoning (even if the solution provided is not optimal).<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Slides<br>Relevant Luxembourg \/ EU laws and regulations (IT security, data protection, cybercrime)<br>                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755dc658\"\n        >\n            <span class=\"accordion__title\">\n                3.1 Information Security Management System &#8211; ISMS (Syst\u00e8mes de Management de la S\u00e9curit\u00e9 de l&#039;Information &#8211; SMSI)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-49                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755dc658\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755dc60c\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 3.1 Information Security Management System &#8211; ISMS (Syst\u00e8mes de Management de la S\u00e9curit\u00e9 de l&#039;Information &#8211; SMSI)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-49<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 3 : Information Security Management (Gestion de la s\u00e9curit\u00e9 de l&#039;information)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            <p>Introduce the ISO\/IEC 27001 standard about \u201cInformation Security Management Systems\u201d and detail how to comply with its requirements.<\/p>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        1.Students will understand ISO\/IEC 27001, its structure and its requirements.<br>2.Students will be able to interpret the requirements of the standards and to \u201cspeak the same language.<br>3.Students will have a first view on \u201chow\u201d to comply with the different requirements of the standards.<br>4. Students will be able to define an action plan towards compliance                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>1. The ISO\/IEC 27001 standard\u00a0<br>&#8211; Overview of the standard<\/p><p>2. ISMS establishment and management\u00a0<br>&#8211; Definition of an ISMS establishment and management project<\/p><p>3. Context and objectives<\/p><p>4. Document management<\/p><p>5. Leadership\u00a0<br>&#8211; Commitment, policy and roles &amp; responsibilities<\/p><p>6. Performance evaluation<br>&#8211; Indicators, internal audit and management review<\/p><p>7. Improvement<br>&#8211; Nonconformity and corrective action and incident management<\/p><p>8. Risk management\u00a0\u00a0<br>&#8211; Risk assessment\u00a0\u00a0<br>&#8211; Risk treatment<\/p><p>9. Information security policy(ies) and procedures<\/p><p>10. Conclusions and work plan<br><\/p>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Task 1: Written exam based on a MCQ and open questions (100%)<br>Grading scheme: 20 points (0-20)<br>Objectives: Prove that the standard and its interpretation have been understood and that the student is able to draw an implementation plan to comply with ISO\/IEC 27001.<br>Assessment rules: Students will work on their own.<br>Assessment criteria: The correctness of solutions to assigned questions.<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Syllabus\u2610Yes\u2612No<br>Literature list\u2610Yes\u2612No<br>Moodle page\u2612Yes\u2610No<br>Other, please specify:<\/p><br><p>Slideshow in a PDF file<br>ISO\/IEC 27001. Information technology &#8211; Security techniques &#8211; Information security management systems &#8211; Requirements. International Organization for Standardization, Geneva, 2005.<\/p><br>                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755dc664\"\n        >\n            <span class=\"accordion__title\">\n                3.2 Risk Analysis and Management (Analyse et gestion de risques)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-50                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755dc664\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755dc60c\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 3.2 Risk Analysis and Management (Analyse et gestion de risques)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-50<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 3 : Information Security Management (Gestion de la s\u00e9curit\u00e9 de l&#039;information)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            To introduce the concepts of risk regardless of context<br>To highlight the socio-cultural aspects of risk perception and its (empirical) assessment methods<br>To master the set of concepts related to Information System Security Risk Management (ISSRM)<br>To have the theoretical background to ease the understanding of risk management methods<br>To understand the ISO\/IEC 27005:2011 standard<br>To have a pragmatic and ready-to-use view of the standard<br>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Be able to present risks to people who have a different perception of those risks<br>Understand the economic relationship between the number of incidents, the financing of mitigation measures and the origin of this financing<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        \u00a0Introduction to risk management<br> Perception of risk and risk management in general<br> Influence of socio-cultural risk perception<br> Empirical methods<br> Endogenous and exogenous threats<br> Illustration based on examples<br> Relationship between frequency of losses, financing of the mitigation measures and origin of the funding for the mitigation. (Basel III approach)<br>* Introduction to information security risk management<br>* Outline of information security risk management concepts<br> Asset<br> Risk<br> Risk treatment<br>* Metrics of information security risk management<br>* The ISO\/IEC 27005:2011 process and its underlying activities<br> Context establishment<br> Risk identification<br> Risk analysis<br> Risk evaluation<br> Risk treatment<br> Risk acceptance<br> Risk communication and consultation<br> Risk monitoring and review<br>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\u00a0<\/p><br><p>2 projects (1 for each lecturer) to be done as homework.<\/p><br><p><br>Project on a case study (50%)<br><br>Grading scheme: 20 points (0-20)<br>Objectives: Prove that the concepts and the process have been understood and can be applied on a case.<br>Assessment rules: Students will work on their own or in pairs depending on what they prefer.<br>Assessment criteria: The alignment with the requirements of the standard and the relevance of suggested solutions.<\/p><br>Task 2: Project on a case study (50%)<br><br>Grading scheme: 20 points (0-20)<br>Objectives: Analysis of a non-ICT incident\/accident applying the concepts seen during the course and showing the process have been understood.<br>Assessment rules: Students will work on their own or in pairs depending on what they prefer.<br>Assessment criteria: Alignment with the approach seen during the course and the ability to identify changes in the standard applicable to the sector.<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Slideshow in a PDF file<br>                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755dc671\"\n        >\n            <span class=\"accordion__title\">\n                3.3 Risk Analysis Practices (Pratiques d&#039;analyse de risques)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            1                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-87                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755dc671\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755dc60c\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 3.3 Risk Analysis Practices (Pratiques d&#039;analyse de risques)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 1<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-87<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 3 : Information Security Management (Gestion de la s\u00e9curit\u00e9 de l&#039;information)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                \n                \n                \n                \n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755dc67d\"\n        >\n            <span class=\"accordion__title\">\n                4.1 Information Security 1 (Technologies de la s\u00e9curit\u00e9 1)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-51                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755dc67d\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755dc60c\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 4.1 Information Security 1 (Technologies de la s\u00e9curit\u00e9 1)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-51<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 4 : Technical Aspects (Aspects techniques)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            \u00a0<br><ul><br><li>Understand the basic concepts of modern cryptography such as: confidentiality, integrity and authentication, public and private key cryptography.\u00a0<\/li><br><li>Study the principles of operation of basic cryptographic algorithms: block ciphers, stream ciphers, hash functions, message authentication codes, public-key encryption and digital signatures.<\/li><br><li>Become familiar with the most widely used cryptographic standards: AES, DES, SHA,\u00a0 RSA, DSA, etc. &#8211; Given certain security requirements, be able to propose solutions using current best practices and state-of-the-art cryptographic standards.\u00a0<\/li><br><\/ul>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The course teaches the fundamental security components used as building blocks in modern security technologies. The material is divided in two parts. One part covers the basics of public-key cryptography: public-key encryption, digital signatures, etc. The second part is dedicated to symmetric-key cryptography and discusses topics such as stream ciphers, block ciphers, hash functions and message authentication codes. <br>A brief outline of the covered topics follows.<br><ul><li>Overview of cryptography<\/li><li>Introduction to public-key cryptography<\/li><li>Public key encryption- Digital signatures<\/li><li>Introduction to symmetric-key cryptography<\/li><li>Block ciphers, stream ciphers<\/li><li>Hash functions, Message authentication codes<\/li><li>Real life applications<\/li><\/ul><br>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Written exam                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul><br><li>Lecture slides and lecture notes<\/li><br><li>William Stallings, Cryptography and Network Security (5th edition)<\/li><br><li>Keith M.Martin, Everyday Cryptography<\/li><br><li>Alfred Menezes, Scott Vanstone, Paul van Oorschot, The Randbook of Applied Cryprography : http:\\\\cacr.uwaterloo.ca\/hac\/<\/li><br><\/ul>                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755dc68a\"\n        >\n            <span class=\"accordion__title\">\n                6.1 Working in Information Security Management (Le m\u00e9tier de responsable de la s\u00e9curit\u00e9 de l&#039;information)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            1                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-52                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755dc68a\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755dc60c\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 6.1 Working in Information Security Management (Le m\u00e9tier de responsable de la s\u00e9curit\u00e9 de l&#039;information)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 1<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-52<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 6 : Professional Part (Volet professionnel)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            <p>The course aims to provide students with a practical and strategic understanding of the role of a Chief Information Security Officer (CISO). It seeks to equip students with actionable knowledge, real-world tools, and critical thinking skills necessary for working in and leading information security management functions.<\/p>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Understand the multi-faceted role of a CISO in modern organizations<br>Identify typical threats and risks in the field of information security<br>Apply practical tools and methods used in risk and security management<br>Evaluate real-life challenges faced by security leaders and propose effective solutions<br>Demonstrate communication skills relevant for raising cybersecurity awareness<br>Reflect on their own readiness for working in information security management<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Introduction \u2013 The background and scope of a CISO\u2019s responsibilities<br> Career pathways \u2013 How to become a CISO<br> The multiple roles and expectations of a CISO<br> Strengths and common obstacles in the profession<br> Organizational intelligence and navigating corporate environments<br> Communication strategies for effective security awareness<br> Practical methods &amp; tools \u2013 Global paradigms, certifications and their combinations<br> The importance of risk management<br> A typical day in the life of a CISO<br> Becoming a future Chief Information Security Officer<br>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Task 1: In-class oral presentation (100%)<br>Grading scheme: 20 points (0\u201320)<br>Weight: 100% of the final course grade<br>Objectives: Demonstrate the ability to communicate clearly, apply given instructions or recommendations effectively, and adapt one&#8217;s discourse to a professional context.<br>Assessment rules: Individual oral presentation held during the final session. No group work.<br>Assessment criteria:<br>oClarity and structure of the presentation<br>oAbility to translate advice into actionable communication<br>oProfessionalism and delivery<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The PowerPoint used as support by the coordinator will be shared with the students after the course session, via Moodle.                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>    <\/div><\/div><\/section>\n<section\n    id=\"tabpanel-15dad048-8987-4b3c-85fc-ed7252ccb15a\"\n    aria-labelledby=\"tab-15dad048-8987-4b3c-85fc-ed7252ccb15a\"\n    class=\"tab-panel fade hidden is-hidden\"\n>\n    <div class=\"wp-block-unilux-blocks-course-offer\">\n    <h3>Course offer for Semestre 2 (2025-2026 Summer)<\/h3>\n    \n<div id=\"accordion-module-69e18755e0dcc\" class=\"accordion accordion--theme\">\n            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e0df4\"\n        >\n            <span class=\"accordion__title\">\n                1.2 Enterprise architecture \u2013 Structuring and Governing Strategic Digital Transformation                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-95                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e0df4\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e0dcc\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 1.2 Enterprise architecture \u2013 Structuring and Governing Strategic Digital Transformation<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-95<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 1 : Understanding Organisations &amp; Management (Compr\u00e9hension des organisations et du management)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            <p>This course explores Enterprise Architecture (EA) as a strategic discipline to structure and govern digital transformation. It focuses on how EA enables organizations to navigate complexity, coordinate change, and make informed decisions through structured modeling and architectural thinking. Students will engage with established frameworks such as TOGAF and ArchiMate, and apply EA practices to real-world scenarios, with particular attention to transformation governance and security risk management.<br><\/p>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Upon successful completion of the course, students will be able to:<\/p><br><p>Explain the strategic role of Enterprise Architecture in digital transformation.<br>Describe the key components of EA frameworks and modeling languages, including TOGAF and ArchiMate.<br>Apply EA modeling techniques to represent enterprise capabilities, processes, and systems.<br>Analyze how EA supports governance, decision-making, and security risk management.<br>Design and present a transformation proposal using EA models to justify architectural decisions and risk mitigation strategies.<br><\/p>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Each session combines theoretical insights with practical modeling exercises:<\/p><p>1. Introduction to Enterprise Architecture: Concepts, evolution, and value in digital transformation.<br>2. Modeling Frameworks and Languages: Overview of EA frameworks and the ArchiMate modeling language.<br>3. Enterprise Capabilities and EA Function: Understanding the role of EA in capability-based planning.<br>4. EA Process Overview: Structure, phases, and application of the TOGAF standard.<br>5. EA for Decision Making and Security Risk Management: Using EA models to identify, assess, and mitigate security risks in transformation projects.<br><\/p>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Task 1: Take-home assignment (70%)<br>Grading scheme: 20 points (0-20)<br>Objectives: Prove that the methodological framework has been understood and can be applied in real life scenario<br>Assessment rules: Students will work in groups of 3 to 4 and deliver a digital transformation proposal governed with EA<br>Assessment criteria: Relevance and motivation of the proposal. Quality of the designed EA models. Exploitation of the models to govern the project and the security risks<br>Task 2: Presentation (30%)<br>Grading scheme: 20 points (0-20)<br>Objectives: Grading scheme: 20 points (0-20)<br>Assessment rules: Each student of the group will present a part of the delivered proposal<br>Assessment criteria: Clarity of the presentation (visual and explanations). Control of the subject. Pitching capability<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Syllabus\u00a0\u2610Yes\u2612No Remarks:Lecture slide deck is provided<br>Literature list\u00a0\u2612Yes\u2610No Remarks:Open access to the papers and articles<br>Moodle page\u00a0\u2610Yes\u2612No<br><\/p><br><p>Other, please specify:Standard Specifications<br>-TOGAF\u00a0<br>-ArchiMate\u00a0<br>-ISO\/IEC\/IEEE 42010:2022<br>Case study architecture models<br><\/p>                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e0e0b\"\n        >\n            <span class=\"accordion__title\">\n                1.3 Financial Management (Gestion financi\u00e8re)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            1                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-74                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e0e0b\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e0dcc\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 1.3 Financial Management (Gestion financi\u00e8re)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 1<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-74<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 1 : Understanding Organisations &amp; Management (Compr\u00e9hension des organisations et du management)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Students get familiar with fundamental tools of financial management: financial reporting, planning, and capital budgeting. Any person who manages investments and risks must be familiar with these concepts. Understand fundamental concepts of financial accounting, read the financial reports\u00a0 (balance sheet, income statement, cash-flow statement) and understand interlinkages, as well as the main value drivers and forecasting techniques. Understand some fundamentals of financial management: project financing, financial leverage, cost of capital, and valuation.<br>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        I. Financial reporting<br>1. Firms\u2019 disclosure of financial information\u00a0<br>2. The balance sheet\u00a0<br>3. The income statement<br>4. The statement of cash flows\u00a0<br>5. Other financial statement information<br>II. Financial planning and capital budgeting<br>1. Forecasting earnings<br>2. Determining free cash flow and NPV<br>3. The discounted free cash flow model\u00a0<br><p>\u00a0<\/p>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Task 1: Take-home assignment (40%)<br><br>Grading scheme: 20 points (0-20)<br>Objectives: Assure that logical concepts and methods have been understood and prepare students for the written exam<br>Assessment rules: Students will work on their own<br>Assessment criteria: The correctness of the answers<br>Task 2: Written exam (60%)<br>Grading scheme: 20 points (0-20)<br>Objectives: Assure that logical concepts and methods have been understood and can be applied for problem solving\u00a0<br>Assessment rules: Students will work on their own in the class<br>Assessment criteria: Correctness of each answer. Questions will be graded<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Course materials<br>Syllabus\u2612Yes\u2610No<br>Literature list\u2612Yes\u2610No<br>Remarks:Berk, J., DeMarzo, P. (2020). Corporate finance: Global edition (6th ed.). Pearson.<br>Moodle page\u2610Yes\u2612No<br>Remarks:Lecture and assessment material shared via\u00a0 Onedrive\u00a0<br>                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e0e19\"\n        >\n            <span class=\"accordion__title\">\n                1.5 Digital Product Management \u2013 Structuring, Designing, and Securing Digital Products                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            1                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-75                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e0e19\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e0dcc\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 1.5 Digital Product Management \u2013 Structuring, Designing, and Securing Digital Products<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 1<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-75<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 1 : Understanding Organisations &amp; Management (Compr\u00e9hension des organisations et du management)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            This course introduces students to the principles and practices of Digital Product Management as a modern alternative to traditional IT service management. It focuses on how digital products create value, how they are structured and managed across their lifecycle, and how they contribute to secure and sustainable digital transformation. The course emphasizes product-centric thinking, value-driven design, and the use of industry standards such as IT4IT to support product lifecycle management. It complements the course on Enterprise Architecture, offering a product-oriented perspective on digital governance.<br>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Upon successful completion of the course, students will be able to:<br>Define the concept of a digital product and explain its value in the context of secure information systems.<br>Describe the key modeling elements used in digital product management.<br>Apply product design practices to develop a roadmap aligned with business and security objectives.<br>Explain the stages of the digital product lifecycle and how they are supported by IT4IT.<br>Collaborate in teams to design and present a digital product strategy using real-world case studies.<\/p><br><p>\u00a0<\/p>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Each session combines theoretical foundations with practical application:<br>1.From IT Services to Digital Products<br>Understanding the shift in mindset and value creation.<br>2.What is a Digital Product?<br>Key characteristics, value proposition, and product thinking.<br>3.IT4IT Overview<br>Managing the digital product lifecycle: strategy, development, delivery, and operations.<br>4.Modeling Digital Products<br>Describing structure, capabilities, and outcomes.<br>5. Digital Product and Secure Transformation<br>Aligning product strategy with security, governance, and enterprise goals.<br>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Task 1: Take-home assignment (70%)<br><br>Grading scheme: 20 points (0-20)<br>Objectives: Prove that the methodological framework has been understood and can be applied in real life scenario<br>Assessment rules: Students will work in groups of 3 to 4 and deliver a roadmap for a digital product<br>Assessment criteria: Quality of the designed Product Roadmap<br>Task 2: Presentation (30%)<br>Grading scheme: 20 points (0-20)<br>Objectives: Understand the role of Digital Product in communication<br>Assessment rules: Each student of the group will present an aspect of the digital product<br>Assessment criteria: Clarity of the presentation (visual and explanations). Control of the subject. Pitching capability<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Syllabus\u2610Yes\u2612No<br>Remarks:Lecture slide deck is provided<br>Literature list\u2612Yes\u2610No<br>Moodle page\u2610Yes\u2612No<br>Other, please specify:Standard Specifications<br>-IT4IT<br>Case study product design models<br>                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e0e26\"\n        >\n            <span class=\"accordion__title\">\n                2.2 Law Enforcement (Mise en application des dispositions l\u00e9gales)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-77                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e0e26\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e0dcc\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 2.2 Law Enforcement (Mise en application des dispositions l\u00e9gales)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-77<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 2 : Regulatory Frameworks (Cadres r\u00e9glementaires)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Acquire basic knowledge about law enforcement action in the field of cyber-\/computer crime investigations.<br>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Students should become familiar with the legal and procedural environment of digital and cybercrime investigations.\u00a0<br>Students should also become familiar with good practices and learn about the specific procedural difficulties encountered by law enforcement bodies during (computer and cybercrime) investigations.\u00a0<br>Students should eventually become familiar with the specific problems linked to gathering and reporting digital evidence in court.<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Part I. Criminal procedure and (digital) investigations<\/p><p>1.\u00a0 Law enforcement bodies<br>2.\u00a0 General principles of criminal investigations<br>3.\u00a0 Specific procedures<br>\u00a0 &#8211; Native competences of LE bodies<br>\u00a0 &#8211; Emergency procedure<br>\u00a0 &#8211; Judicial examination<br>\u00a0 &#8211; Access to telecommunication data\u00a0 \u00a0 \u00a0<br>\u00a0 &#8211; Legal interception<br>4.\u00a0 Specific aspects of obtaining digital evidence<br>5.\u00a0 International police cooperation<br>6.\u00a0 Mutual legal assistance<\/p><p>Part II. Digital forensics<\/p><p>1. Good practice<br>2. Acquisition of numeric information<br>3. Authentication of digital evidence<br>4. Analysis of digital evidence and reporting<br>5. Professional\/Open source software<br>6. Examples<\/p>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Task 1: Written exam &#8211; Questionnaire (100%)<br>Grading scheme: 20 points (0-20)<br>Objectives: Assess the knowledge and the understanding of the course content.<br>Assessment rules: Individual answers to a written questionnaire. No documentation or electronic devices are allowed.\u00a0The questionnaire may contain short practical questions to answer in compliance with the course content.\u00a0Oral interruptions by participants during the assessment are not allowed. Fraud will be strictly sentenced.<br>Assessment criteria: Degree of compliance with the course handouts.\u00a0<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Handouts of powerpoint presentations<br>Official texts and good practice guides are provided as PDF files.                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e0e33\"\n        >\n            <span class=\"accordion__title\">\n                2.3 Special Businesses and Impacts (Sp\u00e9cificit\u00e9s du secteur financier)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-91                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e0e33\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e0dcc\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 2.3 Special Businesses and Impacts (Sp\u00e9cificit\u00e9s du secteur financier)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-91<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 2 : Regulatory Frameworks (Cadres r\u00e9glementaires)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            This course prepares students for working as an Information Security Officer in the financial sector, which plays a major role in the Luxembourg economy.<br>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Understand the Luxembourg financial sector and its national and European regulatory constraints. Explain the specificities of the CISO profession and its position within governance as defined in regulations, particularly DORA. Understand the role of the regulator. Understand cyber security issues related to new technologies like DLT and AI.                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Supervised entities, Legal &amp; regulatory context, ISD: Investment Services Directive, MIFID, Credit Institutions (banks), SSM, Access to the activity, Other Professionals of the Financial Sector, Classification of information, Professional secrecy and recent changes (2018), Refresh on basic components (C, I, A, P), Principles of internal contro, lCircular CSSF 20\/750 (ICT risk management), Circular CSSF 22\/806 (outsourcing), DORA, Information Security in the context of various financial services, Markets in Crypto-Assets Regulation (MiCA), AML &amp; KYC, Compensation scheme (fond de garantie des d\u00e9p\u00f4ts et syst\u00e8me d\u2019indemnisation &#8211; FGDL).                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Task 1: Written exam (100%) &#8211;\u00a0Max 2 hours<br>Grading scheme: 20 points (0-20)<br>Objectives: Assess the students\u2019 understanding of the financial sector based on 6 to 8 questions on the essential elements of the course. Questions are rated from 1 point to max 5 points depending on the complexity.<br>Assessment rules: End of course assessment during the course period. Minimum 3 weeks after the last course to give time to the students to prepare.<br>Assessment criteria: Accuracy of the answers to the questions.<br>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e0e40\"\n        >\n            <span class=\"accordion__title\">\n                4.2 Information Security Technologies 2 (Technologies de la s\u00e9curit\u00e9 2)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-79                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e0e40\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e0dcc\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 4.2 Information Security Technologies 2 (Technologies de la s\u00e9curit\u00e9 2)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-79<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 4 : Technical Aspects (Aspects techniques)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            The course is about the main fundamental security components\/technologies that are basic blocks used in most of security solutions. A first part of the course is dedicated to cryptography and the second one is about secured platforms. This second part is about public key infrastructures and how to build secure component-based platforms. The third part is about understanding the concepts of eIDAS Regulation and applying it to business uses cases.                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Content :<br>A.PKI applications<br><ul><li>Public key infrastructure<\/li><li>Authentication protocols<\/li><li>Application to the financial sector<\/li><li>Case study<\/li><\/ul><br>B.Architectures the secure platforms<br><ul><li>Modern web architectures<\/li><li>The different technical levels for securing a platform<\/li><li>Implementation of a component-based system embedding security policies<\/li><li>Case study<\/li><\/ul>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Task 1: Group project (30%)<br><br>Grading scheme: 20 points (0-20)<br>ObjectivesStudents need to design an access control policy based on a use case.<br>Task 2: Presentation &#8211; Group presentation (30%)<br>Grading scheme: 20 points (0-20)<br>Objectives: Students perform a group presentation on a security issue.<br>Task 3:\u00a0Presentation (40%)<br>Grading scheme: 20 points (0-20)<br>Objectives: Prove the understanding of the eIDAS Regulation by applying its concepts to business use cases.\u00a0<br>Assessment rules: Students will work on their own.<br>Assessment criteria: The correctness of solution to assigned use cases.<br>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e0e4d\"\n        >\n            <span class=\"accordion__title\">\n                4.3 Communication, Information Processing and Persistence 1 (Communication, traitement et persistances des informations 1)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-80                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e0e4d\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e0dcc\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 4.3 Communication, Information Processing and Persistence 1 (Communication, traitement et persistances des informations 1)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-80<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 4 : Technical Aspects (Aspects techniques)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Information systems combine three dimensions that must be independently and globally secured from a systemic viewpoint; the communication aspect (classical and dynamic networks), treatments (software, business logic), and persistency (databases and data storage). The objectives of this course can be formulated as: <ul><li>Apprehend the different parameters impacting network and communication security.<\/li><li>Understand the software layer and be familiar with the safe and secure design and deployment of software. <\/li><\/ul>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        An overview of security and safety challenges and solutions for network communication and software development.                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        This course treats the technological means that are available or required to secure the communication between users over a hostile network, software and information systems. This course will cover but not be limited to the topics listed below: <ul><li>Introduction to computer networks and protocols<\/li><li>ISO\/OSI layered communication model<\/li><li>Virtual private networks<\/li><li>IPSec, Firewalls, SSL\/TLS<\/li><li>Intrusion detection<\/li><li>E-mail security<\/li><li>Security protocols<\/li><li>Web security<\/li><li>User authentication<\/li><li>Viruses\/malware, RFID security, attack trees (optional)<\/li><\/ul>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Evaluation based on practices and assignments<br><br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The lectures and lecture notes are partly based on the following textbooks: <ul><li>W. Stallings, L. Brown, Computer Security &#8211; Principles and Practice<\/li><li>W. Stallings, Network Security Essentials &#8211; Applications and Standards<\/li><li>D. Gollmann &#8211; Computer Security<\/li><li>C.P. Pfleeger and S.L. Pfleeger &#8211; Security in Computing<\/li><\/ul>                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>    <\/div><\/div><\/section>\n<section\n    id=\"tabpanel-85762969-f63c-4ffa-b152-5e68bf2ccae1\"\n    aria-labelledby=\"tab-85762969-f63c-4ffa-b152-5e68bf2ccae1\"\n    class=\"tab-panel fade hidden is-hidden\"\n>\n    <div class=\"wp-block-unilux-blocks-course-offer\">\n    <h3>Course offer for Semestre 3 (2025-2026 Winter)<\/h3>\n    \n<div id=\"accordion-module-69e18755e51bc\" class=\"accordion accordion--theme\">\n            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e51e4\"\n        >\n            <span class=\"accordion__title\">\n                1.4 Project Management (Gestion des projets)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-82                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e51e4\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e51bc\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 1.4 Project Management (Gestion des projets)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-82<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 1 : Understanding Organisations &amp; Management (Compr\u00e9hension des organisations et du management)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            &#8211; Give students the keys to understanding the benefits of project mode<br>&#8211; To give students the ability to make decisions about activating and choosing project mode methods<br>&#8211; Provide students with the conceptual and practical fundamentals to enable them to implement project mode in their information security activities                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        &#8211; Working effectively in project mode as a team member<br>&#8211; The keys to coordinating a small project<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        &#8211; History of project management<br>&#8211; Why project mode<br>&#8211; The different project management standards \/ methods \/ certifications available                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Final exam<\/p>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Slides                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e51fa\"\n        >\n            <span class=\"accordion__title\">\n                3.4 Security Policy (Politique de s\u00e9curit\u00e9)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-83                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e51fa\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e51bc\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 3.4 Security Policy (Politique de s\u00e9curit\u00e9)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-83<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 3 :  Information Security Management (Gestion de la s\u00e9curit\u00e9 de l&#039;information)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                \n                \n                \n                \n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e5208\"\n        >\n            <span class=\"accordion__title\">\n                3.5 Compliance Assurance (Assurance de la conformit\u00e9)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-84                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e5208\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e51bc\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 3.5 Compliance Assurance (Assurance de la conformit\u00e9)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-84<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 3 :  Information Security Management (Gestion de la s\u00e9curit\u00e9 de l&#039;information)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                \n                \n                \n                \n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e5215\"\n        >\n            <span class=\"accordion__title\">\n                4.4 Communication, Information Processing and Persistence 2 (Communication, traitement et persistance des informations 2)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            4                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-94                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e5215\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e51bc\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 4.4 Communication, Information Processing and Persistence 2 (Communication, traitement et persistance des informations 2)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 4<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-94<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 4 : Technical Aspects (Aspects techniques)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            The course aims at presenting design techniques to develop a secure software integrating persistency. The course is two-fold : the first part is about modeling, development and testing of software (including security policies); the second one about secured databases. We thus introduce software engineering techniques for security.<br>Modelling will be done with UML standard, that will be briefly presented, as well as the link with programming. The student will understand the main challenges for efficient implementation of a maintainable security policy (access control, XACML standard)                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        A.Design and validation for safety and security <br><ol><li>Design methods for designing software and architectures<\/li><li>Security policies and their deployment<\/li><li>Software functional testing<\/li><li>Software security testing<\/li><\/ol><br>B.Secured databases<br> <ol><li>Architectures for persistency (databases, cloud, datacenters)<\/li><li>Securing a database<\/li><li>Performance, robustness and security testing of databases<\/li><\/ol>Use case :<br>A practical case will be (partly) implemented in Java (e.g. Auction system) or an Android application                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Evaluation via practical work and questionnaires                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Lectures (24hrs), personal work (72hrs)                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e5221\"\n        >\n            <span class=\"accordion__title\">\n                4.5 Threats, Attacks and Controls (Menaces, attaques et parades)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-86                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e5221\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e51bc\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 4.5 Threats, Attacks and Controls (Menaces, attaques et parades)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-86<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 4 : Technical Aspects (Aspects techniques)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Understand common web vulnerabilities, their impact on security properties, and how to fix them, prevent them. Acquire the ability to exploit web vulnerabilities through tools or manually.                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        SQL Injection &amp; other injection flaws in theory and in practice. Cross Site Scripting theory and practical exploitation. Common web application vulnerabilities. Web application auditing methodology.<br>Self-teaching ressources and material.                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Practical exam on real-world vulnerability discovery and exploitation                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Virtual machines, online ressources.<br>Web applications Hacker Handbook, OWASP Top 10, OWASP Wiki                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e522e\"\n        >\n            <span class=\"accordion__title\">\n                5.1 Human Risk (Risque humain)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-68                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e522e\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e51bc\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 5.1 Human Risk (Risque humain)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-68<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 5 : Human Aspects (Aspects humains)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Introducing and familiarizing course participants with basic principles and properties of the human risk, including:<br>Understanding how human mistakes and behaviors can cause cybersecurity risks<br>Learning how human factors (emotions, stress and attention,\u2026) impact our digital security actions<br>Recognizing how attackers use manipulation, social engineering and OSINT<br>Exploring ways to improve cybersecurity habits                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        After the course, students will understand how human behavior affects cybersecurity and how to recognize, prevent, and respond to human-related security risks.                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The course will encompass topics such as\u00a0<br>1. Human basics : understanding how some human factors influence our attitudes and behaviors in cybersecurity<br>2. Risky behaviors, how and why\u00a0<br>3. OSINT, social engineering : presentation of the main concepts and understanding of the uses and risks<br>4. Managing the human risk today<br>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Oral presentation of a selected topic from the field of human risks (small groups up to four students: 50%, on 20 points), written exam based on a questionnaire (individual: 50%, on 20 points).\u00a0<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Powerpoint presentations, video clips\u00a0<br>Cialdini, R. (2001). Influence. Science and practice. Boston, MA: Pearson Education, Inc.<br>Hadnagy, C. (2011). Social Engineering: The art of human hacking. Indianapolis, IN: John Wiley Sons Ltd.                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>    <\/div><\/div><\/section>\n<section\n    id=\"tabpanel-5a71c36c-b7cf-4dd0-abc9-4a3d616d92d7\"\n    aria-labelledby=\"tab-5a71c36c-b7cf-4dd0-abc9-4a3d616d92d7\"\n    class=\"tab-panel fade hidden is-hidden\"\n>\n    <div class=\"wp-block-unilux-blocks-course-offer\">\n    <h3>Course offer for Semestre 4 (2025-2026 Summer)<\/h3>\n    \n<div id=\"accordion-module-69e18755e92ce\" class=\"accordion accordion--theme\">\n            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e92f4\"\n        >\n            <span class=\"accordion__title\">\n                3.6 Business Continuity Management (Gestion de la continuit\u00e9)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            1                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-70                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e92f4\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e92ce\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 3.6 Business Continuity Management (Gestion de la continuit\u00e9)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 1<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-70<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 3 : Information Security Management (Gestion de la s\u00e9curit\u00e9 de l&#039;information)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Provide students with a comprehensive understanding of Business Continuity Management (BCM) principles, standards, and regulatory expectations, with a focus on ISO 22301.Equip students with the skills to design, implement, and maintain a BCM framework aligned with organizational risk appetite and critical business functions.Develop the ability to conduct a Business Impact Analysis (BIA) and create actionable Business Continuity (BCP) and Disaster Recovery Plans (DRP).                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        By the end of this course, students will be able to explain the core components of BCM and their alignment with ISO 22301 requirements. They will be able to perform a Business Impact Analysis, map critical business processes, and define recovery objectives (RTO\/RPO). Students will be capable of designing effective BCP and DRP plans that ensure organizational resilience and service continuity. They will learn how to integrate BCM into the wider risk management and information security strategy. Students will also understand how to test, maintain, and continuously improve BCM programs in a real-world context                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        This course introduces the ISO 22301 standard and its role in establishing a robust BCM framework. Students will learn the step-by-step process to design a BCM program, from context analysis to governance and communication planning. The course covers practical methods for conducting a BIA, determining critical processes, and setting RTO\/RPO targets. It explores how to develop and document BCPs and DRPs, including crisis management and IT recovery procedures. Finally, students will be trained in exercising, maintaining, and improving the BCM system through regular reviews and scenario-based tests.                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Task 1: Take-home assignment (100%)<br><br>Grading scheme: 20 points (0-20)<br>Objectives: Validate that the students understand how to perform a BIA<br>Assessment rules: Case study with 7 exercises (total 20 points)<br>Assessment criteria: Ability to follow what has been presented during the course and to explain the choices<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Syllabus\u2612Yes\u2610No<br>Remarks:PDF with all course content<br>Literature list\u2610Yes\u2612No<br>Moodle page\u2610Yes\u2612No<br>                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e930b\"\n        >\n            <span class=\"accordion__title\">\n                5.2 Human Communication (Communication humaine)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-71                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e930b\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e92ce\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 5.2 Human Communication (Communication humaine)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-71<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 5 : Human Aspects (Aspects humains)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Charles Max:<br> Understand essential components and theoretical models of human communication;<br> Reflect on and critically assess own communication styles in both personal and professional contexts;<br> Apply the core principles of communication in interactive tasks;<br> Develop strategies for managing complex communication tasks in academic and workplace environments.<br>Rodolphe Mans:<br> Develop communication as a professional skill, with emphasis on practical applications and real-world challenges.<br> Ensure students\u2019 self-development by moving beyond technical expertise to soft skills critical for leadership.<br> Master verbal and non-verbal techniques to better prepare public interventions, manage stress, and adapt to professional situations.<br> Improve efficiency in professional interactions: meetings, presentations, negotiations, interviews.<br>Learn practical tips and tricks to avoid common pitfalls in workplace communication.<br>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Charles Max \u2013 By the end of the course, students will be able to:<br> Identify key components of effective communication.<br> Analyze the impact of communication styles in professional settings.<br> Apply communication strategies in complex and dynamic workplace scenarios.<br>Rodolphe Mans \u2013 By the end of the course, students will be able to:<br> Recognize and interpret non-verbal signals to enhance professional interactions.<br> Prepare, structure and deliver effective public presentations with confidence.<br> Apply communication strategies to make meetings more productive and impactful.<br> Design efficient presentation materials (slides) that reinforce rather than weaken communication.<br> Demonstrate professional behavior and communication skills during interviews, evaluations and negotiations.<br> Reflect on their own communication practices and identify areas for improvement.<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Charles Max \u2013 This course focuses on developing communication as a professional skill in the workplace. Students will explore both verbal and non-verbal communication techniques, map their communication landscape, reflect on communication processes in academic and corporate contexts. Emphasis will be placed on applying communication skills in diverse and challenging situations, including presentation, conflict resolution, intercultural communication, and team collaboration.<br>Rodolphe Mans \u2013 This module focuses on the pragmatic aspects of communication in professional environments, complementing the theoretical foundations provided in the first-year module. Topics include:<br> Non-verbal communication: understanding body language, gestures, eye contact, and stress signals.<br> Public presentations: preparation, stress management, audience engagement, voice and posture.<br> Effective slides: design principles, clarity, visual impact, and common mistakes to avoid.<br> Conducting and closing meetings: efficiency, professionalism, respect, and persuasion.<br> Performance reviews &amp; job interviews: preparing, presenting achievements, handling tricky questions.<br> Practical methods: tips, role-playing, and real-life examples.<br>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Task 1<br>: Presentation &#8211; Mapping my communication\u00a0 practice (25%)<br><br>Grading scheme: 20 points (0-20)<br>Objectives &#8211; Charles Max:<br> Reflect your private and professional communication regarding tools, addressees, time, styles, etc.;<br> Find a creative way (e.g., model, picture, road map, drawing&#8230;) to visualize your communication practice;<br> Map your landscape on a support of your choice;<br> Describe and explain the graphical representation by digital storytelling video.<br>Assessment rules &#8211; Charles Max:<br> Present your digital story as a short video clip ( 10 minutes);<br> Speak about relevant features of your communication landscape you want to emphasise or you became aware of while designing your landscape (about 3-4 minutes);<br> Illustrate major differences between your private and professional communication style \/ routines (about 3-4 minutes);<br> Upload the video onto the course Moodle page.<br>Assessment criteria &#8211; Charles Max\u00a0<br> Content (6 criteria);<br> Design principles (2 criteria);<br> Effective communication (6 criteria);<br> Creativity (3 criteria);<br> Learning outcome (1 criterion).<br>Task 2: Presentation &#8211; The conception of my MSSI thesis presentation (25%)<br>Grading scheme: 20 points (0-20)<br>Objectives &#8211; Charles Max:<br> Conceive a professional talk;<br> Transform your thesis manuscript into an appealing presentation;<br> Use Schulz von Thun\u2019s model as a heuristic device to analyse interactions with other participants involved;<br> Practice your communication skills in the video of your presentation;<br>Assessment rules &#8211; Charles Max:<br> Present your thesis talk as a short video clip ( 10 minutes);<br> Develop the four relevant dimensions of Schulz von Thun\u2019s model for your case in your contribution;<br> Upload the video onto the course Moodle page;<br>Assessment criteria &#8211; Charles Max<br> Content (6 criteria);<br> Design principles (2 criteria);<br> Effective communication (6 criteria);<br> Creativity (3 criteria);<br> Learning outcome (1 criterion).<br>Task 3: Oral exam &#8211; Case Study (50%)<br>Grading scheme: 20 points (0-20)<br>Objectives &#8211; Rodolphe Mans:<br> Demonstrate ability to apply communication principles in a professional context.<br> Translate practical advice into clear, structured and persuasive discourse.<br> Show adaptability, self-confidence and professionalism in public speaking.<br>Assessment rules &#8211; Rodolphe Mans:<br> Individual oral presentation delivered during the final session (no group work).<br> Duration: 8\u201310 minutes per student.<br> Presentation must be based on a professional communication situation (meeting, speech, negotiation, interview, etc.).<br>Assessment criteria &#8211; Rodolphe Mans:<br> Relevance and professionalism of delivery (voice, posture, confidence).<br> Ability to engage and convince the audience.<br> Use of supporting materials (slides, examples, storytelling).<br> Overall impact and persuasiveness of the presentation.<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Lecture support :<\/p><br>Set of slides to download from the related moodle space<br><p>\u00a0<\/p><br><p>Literature : <\/p><br><p>\u00a0<\/p><br><ul><br><li><br>Iyamu, T. Shaanika, I. (2019). The use of activity theory to guide information systems research. Education and Information Technologies, 24:165\u2013180 https:\/\/doi.org\/10.1007\/s10639-018-9764-9<br><\/li><br><li><br>Research Group on Socio-Digital Systems (2011). Things we have learnt about communication. Issue 1. Microsoft Corporation. Online available at: http:\/\/research.microsoft.com\/en-us\/projects\/thingswevelearnt\/things_issue1.pdf<br><\/li><br><li><br>Russell, D. (2001). Looking beyond the interface: Activity theory and distributed learning. In M. Lea K. Nicoll (Eds.).\u00a0Distributed learning\u00a0(pp. 64-82). New York: Routledge Falmer. Online available at: http:\/\/www.public.iastate.edu\/~drrussel\/drresume.html<br><\/li><br><\/ul>                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e9318\"\n        >\n            <span class=\"accordion__title\">\n                6.3 Professional Project (Projet professionnel)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            14                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-81                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e9318\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e92ce\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 6.3 Professional Project (Projet professionnel)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 14<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-81<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 6 : Professional Part (Volet professionnel)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Work on a project of the student\u2019s choice under the supervision of a tutor, who is also a teacher in the program.<br>Write a Master\u2019s thesis related to the professional project assigned to the student by the teaching team.<br>Understand the value of academic contributions in professional practices.<br>Become familiar with applying the knowledge acquired.<br>Take on real-world responsibility for information security.<br>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>The topic and content are to be defined by the student and their academic and professional supervisors at the start of the project.<\/p>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Task 1: Take-home assignment (100%)<br><br>Grading scheme: 20 points (0-20)<br>Objectives: Write a Master thesis. Formulate a problem statement. Survey the state of the art. Design a scientific contribution. Evaluate the contribution.<br>Assessment rules: Evaluation of the thesis manuscript and the defense\/presentation.<br>Assessment criteria: Novelty, rigor, soundness, significance\/impact, clarity of the presentation.<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Syllabus\u2610Yes\u2612No<br>Literature list\u2610Yes\u2612No<br>Moodle page\u2610Yes\u2612No<br>Remarks:Might use Moodle for submissions.<br><br>                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69e18755e9325\"\n        >\n            <span class=\"accordion__title\">\n                6.2 Security Emerging Technologies                 <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-93                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69e18755e9325\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69e18755e92ce\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 6.2 Security Emerging Technologies <\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-93<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> Module 6 : Professional Part (Volet professionnel)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            This course provides students with comprehensive knowledge of emerging technologies in information security, including distributed ledger technologies, artificial intelligence applications in security, and modern approaches to secure records management and digital archiving. Students will develop critical analysis skills to evaluate these technologies&#8217; security implications and practical applications in organizational contexts.                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Upon successful completion, students will be able to:<\/p><br><p>&#8211; Analyze security properties and vulnerabilities of distributed ledger technologies<br>&#8211; Evaluate AI\/ML applications in cybersecurity and their associated risks<br>&#8211; Design secure electronic records management strategies<br>&#8211; Assess security requirements for digital transformation and archiving projects<br>&#8211; Apply security principles across emerging technology implementations<br>&#8211; Critically evaluate research and industry developments in security technologies<br><\/p>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        1. Distributed Ledger Technologies (DLT) and Blockchain\u00a0<br>SecurityFundamentals of blockchain and distributed ledgers<br>Security properties and consensus mechanisms<br>Smart contracts and their vulnerabilities<br>Applications in cybersecurity<br>2. Artificial Intelligence and Machine Learning in Security<br>Machine Learning fundamentals for security applications<br>AI for cybersecurity (threat detection, anomaly detection)<br>Security challenges in AI\/ML systems<br>Adversarial machine learning and defenses<br>3. Electronic Records Management (ERM)<br>Security aspects of electronic records management<br>Information governance and compliance<br>Digital preservation and long-term security<br>Records lifecycle management<br>4. Dematerialization and Digital Archiving<br>Security constraints in dematerialization processes<br>Archiving policies and procedures<br>Digital document management security<br>Legal and regulatory requirements<br>5. Information Security in Records Management<br>Specific security challenges in records management<br>Access control and confidentiality<br>Integrity and authenticity of digital records<br>Audit trails and compliance<br>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Task 1: Take-home assignment (100%)<br><br>Grading scheme: 20 points (0-20)<br>Objectives: Demonstrate understanding of emerging security technologies including DLT, AI\/ML applications, and critical thinking wrt to novel approach propositions.<br>Assessment rules: Students will work individually.\u00a0 A critical review of 1 to 2 pages targeting one research paper published in top-tiers venues (SP, Usenix Sec, CCS, NDSS).<br>Assessment criteria: Technical understanding (35%), critical analysis quality (30%), practical applications and implications (20%), writing clarity and structure (15%)<br>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>    <\/div><\/div><\/section>\n<\/div>\n<\/div><\/section>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The Master in Information System Security Management offers a multidisciplinary insight, combining technical, legal, and professional aspects.<br \/>\nCourses start in September and take place over two academic years, in 25 two-day sessions, Friday and Saturday from 9:00 to 16:45.<br \/>\nThe curriculum includes a professional project in semester four.<\/p>\n","protected":false},"author":259,"featured_media":1199,"parent":1203,"menu_order":0,"template":"","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"Master in Information System Security Management","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"study_program_identifiers":"MANGSECUSYSINFO__F1_MP_MSSI_2__F1_M_MSSI_2","override_seo_title":false},"type-of-studies":[],"teaching-languages":[],"field-of-interest":[],"organisation":[],"authorship":[259],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Master in Information System Security Management: Courses | University of Luxembourg<\/title>\n<meta name=\"description\" content=\"The Master in Information System Security Management offers a combination of technical, legal, and professional aspects.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Programme\" \/>\n<meta property=\"og:description\" content=\"The Master in Information System Security Management offers a combination of technical, legal, and professional aspects.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/\" \/>\n<meta property=\"og:site_name\" content=\"FSTM EN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/fstm.uni.lu\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-13T09:22:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2023\/07\/MISSM_13Yl3GI.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/\",\"url\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/\",\"name\":\"Programme - Master in Information System Security Management - FSTM I University of Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2023\/07\/MISSM_13Yl3GI.jpg\",\"datePublished\":\"2023-07-26T12:15:56+00:00\",\"dateModified\":\"2025-06-13T09:22:30+00:00\",\"description\":\"The Master in Information System Security Management offers a combination of technical, legal, and professional aspects.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2023\/07\/MISSM_13Yl3GI.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2023\/07\/MISSM_13Yl3GI.jpg\",\"width\":2000,\"height\":1500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Faculty of Science, Technology and Medicine\",\"item\":\"https:\/\/www.uni.lu\/fstm-en\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Study Programmes\",\"item\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Master in Information System Security Management\",\"item\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Programme\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#website\",\"url\":\"https:\/\/www.uni.lu\/fstm-en\/\",\"name\":\"FSTM\",\"description\":\"Faculty of Science, Technology and Medicine I Uni.lu\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#organization\"},\"alternateName\":\"Faculty of Science, Technology and Medicine I University of Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/fstm-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#organization\",\"name\":\"FSTM - University of Luxembourg I Uni.lu\",\"alternateName\":\"Faculty of Science, Technology and Medicine\",\"url\":\"https:\/\/www.uni.lu\/fstm-en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"FSTM - University of Luxembourg I Uni.lu\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/fstm.uni.lu\/\",\"https:\/\/www.linkedin.com\/showcase\/fstm-uni-lu\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Master in Information System Security Management: Courses | University of Luxembourg","description":"The Master in Information System Security Management offers a combination of technical, legal, and professional aspects.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/","og_locale":"en_GB","og_type":"article","og_title":"Programme","og_description":"The Master in Information System Security Management offers a combination of technical, legal, and professional aspects.","og_url":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/","og_site_name":"FSTM EN","article_publisher":"https:\/\/www.facebook.com\/fstm.uni.lu\/","article_modified_time":"2025-06-13T09:22:30+00:00","og_image":[{"width":2000,"height":1500,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2023\/07\/MISSM_13Yl3GI.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/","url":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/","name":"Programme - Master in Information System Security Management - FSTM I University of Luxembourg","isPartOf":{"@id":"https:\/\/www.uni.lu\/fstm-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2023\/07\/MISSM_13Yl3GI.jpg","datePublished":"2023-07-26T12:15:56+00:00","dateModified":"2025-06-13T09:22:30+00:00","description":"The Master in Information System Security Management offers a combination of technical, legal, and professional aspects.","breadcrumb":{"@id":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2023\/07\/MISSM_13Yl3GI.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2023\/07\/MISSM_13Yl3GI.jpg","width":2000,"height":1500},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/programme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/en"},{"@type":"ListItem","position":2,"name":"Faculty of Science, Technology and Medicine","item":"https:\/\/www.uni.lu\/fstm-en\/"},{"@type":"ListItem","position":3,"name":"Study Programmes","item":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/"},{"@type":"ListItem","position":4,"name":"Master in Information System Security Management","item":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-information-system-security-management\/"},{"@type":"ListItem","position":5,"name":"Programme"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/fstm-en\/#website","url":"https:\/\/www.uni.lu\/fstm-en\/","name":"FSTM","description":"Faculty of Science, Technology and Medicine I Uni.lu","publisher":{"@id":"https:\/\/www.uni.lu\/fstm-en\/#organization"},"alternateName":"Faculty of Science, Technology and Medicine I University of Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/fstm-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/fstm-en\/#organization","name":"FSTM - University of Luxembourg I Uni.lu","alternateName":"Faculty of Science, Technology and Medicine","url":"https:\/\/www.uni.lu\/fstm-en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"FSTM - University of Luxembourg I Uni.lu"},"image":{"@id":"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/fstm.uni.lu\/","https:\/\/www.linkedin.com\/showcase\/fstm-uni-lu"]}]}},"_links":{"self":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/study-programs\/1204"}],"collection":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/study-programs"}],"about":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/types\/study-programs"}],"author":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/users\/259"}],"version-history":[{"count":0,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/study-programs\/1204\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/study-programs\/1203"}],"wp:authorship":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/users\/259"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/media\/1199"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/media?parent=1204"}],"wp:term":[{"taxonomy":"type-of-studies","embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/type-of-studies?post=1204"},{"taxonomy":"teaching-languages","embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/teaching-languages?post=1204"},{"taxonomy":"field-of-interest","embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/field-of-interest?post=1204"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/organisation?post=1204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}