{"id":8181,"date":"2024-02-08T11:51:40","date_gmt":"2024-02-08T10:51:40","guid":{"rendered":"https:\/\/www.uni.lu\/fstm-en\/?post_type=study-programs&#038;p=8181"},"modified":"2026-01-20T16:34:10","modified_gmt":"2026-01-20T15:34:10","slug":"programme","status":"publish","type":"study-programs","link":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/","title":{"rendered":"Programme"},"content":{"rendered":"<div class=\"section py-0 static\">\n<section class=\"py-0 wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\"><!-- SecondaryNavigationMirror --><div class=\"js-secondary-nav--sticky wp-block-unilux-blocks-secondary-navigation\" id=\"aea5f2a5-25f9-4df0-b8e4-0c536f302f73\">\n    <nav id=\"secondary-navigation\" role=\"navigation\" aria-label=\"Secondary menu\" class=\"secondary-nav\">\n        <button class=\"secondary-nav__button btn btn-solid--primary w-full\" aria-expanded=\"false\" aria-controls=\"secondary-navigation__list\" title=\"The selected page is Programme\" type=\"button\">\n            <span class=\"btn__name mr-auto\">Programme<\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n                <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\" \/>\n            <\/svg>\n        <\/button>\n\n        <ul id=\"secondary-navigation__list\" class=\"secondary-nav__list\">\n            <li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Overview<\/span>\n    <\/a>\n<\/li>\n<li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link isactived\" aria-current=\"page\">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Programme<\/span>\n    <\/a>\n<\/li>\n<li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/career\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Career<\/span>\n    <\/a>\n<\/li>\n<li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/teaching-staff\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Teaching staff<\/span>\n    <\/a>\n<\/li>\n<li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/admissions\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Admissions<\/span>\n    <\/a>\n<\/li>\n        <\/ul>\n    <\/nav>\n<\/div>\n<!-- end SecondaryNavigationMirror --><\/div><\/section>\n\n\n<section class=\"section section wp-block-unilux-blocks-headline-text-and-image\">\n    \n<div class=\"wp-block-unilux-blocks-wrapper container xl:max-w-screen-xl\">\n<h2 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"programme\"\n    >\nProgramme<\/h2>\n\n\n\n<div class=\"wp-block-unilux-blocks-wrapper flex flex-wrap lg:-mx-32\">\n<div class=\"wp-block-unilux-blocks-wrapper w-full lg:w-7\/12 lg:order-2 lg:px-32\">\n<div class=\"wp-block-unilux-blocks-image-video-wrapper\">\n    <figure class=\"wp-block-dev4-reusable-blocks-image  object-fit--cover\">\n    \n<img decoding=\"async\" class=\"wp-block-image unilux-custom-image-block\"\n                alt=\"\"\n            src=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2024\/02\/AdobeStock_718999901-scaled.jpeg\"\n                srcset=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2024\/02\/AdobeStock_718999901-300x150.jpeg 300w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2024\/02\/AdobeStock_718999901-1024x512.jpeg 1024w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2024\/02\/AdobeStock_718999901-768x384.jpeg 768w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2024\/02\/AdobeStock_718999901-1536x768.jpeg 1536w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2024\/02\/AdobeStock_718999901-2048x1024.jpeg 2048w\"\n                style=\"object-position: 29.00% 48.00%; font-family: &quot;object-fit: cover; object-position: 29.00% 48.00%;&quot;; aspect-ratio: 3\/2; object-fit: cover; width: 100%;\"\n        loading=\"lazy\"\n\/>    <\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-unilux-blocks-wrapper w-full lg:w-5\/12 lg:order-1 lg:px-32\">\n<p>Cybersecurity and cyber defence are interdisciplinary fields with theoretical and operational aspects. <br><br>Students will acquire a large body of knowledge covering theory, research methods, practices, policies and tools. This will prepare them to identify, understand, report, mitigate, and resolve cybersecurity incidents, while also developing state-of-the-art technologies to increase preparedness and resilience in the face of increasing cyberthreats worldwide.<\/p>\n\n\n\n<ul class=\"wp-block-unilux-blocks-custom-buttons btn-list\"><li class=\"wp-block-unilux-blocks-custom-button\"    aria-disabled=\"false\"\n    >\n    <a\n        role=\"link\"\n        aria-disabled=\"false\"\n                    href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/admissions\/\"\n                target=\"_self\"\n        class=\"btn btn--primary\"\n            >Admissions<\/a>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\">\n<h2 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"academic-contents\"\n    >\nAcademic contents<\/h2>\n\n\n\n<p>Semester 1 provides a set of common courses for all students that establish the foundation for more specialised courses. Semesters 2 and 3 offer a mix of compulsory and recommended courses to suit students&#8217; interests and specialisation. In Semester 4, students prepare a master thesis, usually in the context of a research project.<\/p>\n\n\n\n<div id=\"tab-nav\" class=\"tab-nav\">\n    <button\n        type=\"button\"\n        class=\"button-toggle btn btn--white w-full\"\n        aria-expanded=\"false\"\n        aria-controls=\"tab-nav__listing\"\n        title=\"The selected tab is CONTENT OF THE CURRENT LABEL\"\n    >\n        <span class=\"btn__name mr-auto\">Semester 1<\/span>\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\" \/>\n        <\/svg>\n    <\/button>\n    <ul\n        id=\"tab-nav__listing\"\n        class=\"tab-nav__listing nav manual\"\n        role=\"tablist\"\n        aria-label=\"About me\"\n    >\n                <li role=\"presentation\" class=\"tab-nav__item\" key={button.id}>\n            <button\n                type=\"button\"\n                id=\"tab-72632041-fed8-4a66-b795-326d06533510\"\n                data-bs-toggle=\"tab\"\n                data-bs-target=\"#tabpanel-72632041-fed8-4a66-b795-326d06533510\"\n                role=\"tab\"\n                aria-controls=\"tabpanel-72632041-fed8-4a66-b795-326d06533510\"\n                aria-selected=\"false\"\n                aria-current=\"false\"\n                class=\"tab-nav__button\"\n                tabIndex=\"-1\"\n            >\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n                    <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n                <\/svg>\n                <span class=\"tab-nav__name\">Semester 1<\/span>\n            <\/button>\n        <\/li>\n                <li role=\"presentation\" class=\"tab-nav__item\" key={button.id}>\n            <button\n                type=\"button\"\n                id=\"tab-8f71f9d7-bc8c-4fa0-bf98-70ef4245d9e6\"\n                data-bs-toggle=\"tab\"\n                data-bs-target=\"#tabpanel-8f71f9d7-bc8c-4fa0-bf98-70ef4245d9e6\"\n                role=\"tab\"\n                aria-controls=\"tabpanel-8f71f9d7-bc8c-4fa0-bf98-70ef4245d9e6\"\n                aria-selected=\"false\"\n                aria-current=\"false\"\n                class=\"tab-nav__button\"\n                tabIndex=\"-1\"\n            >\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n                    <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n                <\/svg>\n                <span class=\"tab-nav__name\">Semester 2<\/span>\n            <\/button>\n        <\/li>\n                <li role=\"presentation\" class=\"tab-nav__item\" key={button.id}>\n            <button\n                type=\"button\"\n                id=\"tab-91d69e16-8af9-453d-8d00-158f5bfb5826\"\n                data-bs-toggle=\"tab\"\n                data-bs-target=\"#tabpanel-91d69e16-8af9-453d-8d00-158f5bfb5826\"\n                role=\"tab\"\n                aria-controls=\"tabpanel-91d69e16-8af9-453d-8d00-158f5bfb5826\"\n                aria-selected=\"false\"\n                aria-current=\"false\"\n                class=\"tab-nav__button\"\n                tabIndex=\"-1\"\n            >\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n                    <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n                <\/svg>\n                <span class=\"tab-nav__name\">Semester 3<\/span>\n            <\/button>\n        <\/li>\n                <li role=\"presentation\" class=\"tab-nav__item\" key={button.id}>\n            <button\n                type=\"button\"\n                id=\"tab-adffcde8-7374-4a50-8d8b-d17f8cbac1e1\"\n                data-bs-toggle=\"tab\"\n                data-bs-target=\"#tabpanel-adffcde8-7374-4a50-8d8b-d17f8cbac1e1\"\n                role=\"tab\"\n                aria-controls=\"tabpanel-adffcde8-7374-4a50-8d8b-d17f8cbac1e1\"\n                aria-selected=\"false\"\n                aria-current=\"false\"\n                class=\"tab-nav__button\"\n                tabIndex=\"-1\"\n            >\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n                    <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n                <\/svg>\n                <span class=\"tab-nav__name\">Semester 4<\/span>\n            <\/button>\n        <\/li>\n            <\/ul>\n<\/div>\n<div class=\"tab-content\">\n    <section\n    id=\"tabpanel-72632041-fed8-4a66-b795-326d06533510\"\n    aria-labelledby=\"tab-72632041-fed8-4a66-b795-326d06533510\"\n    class=\"tab-panel fade hidden is-hidden\"\n>\n    <div class=\"wp-block-unilux-blocks-course-offer\">\n    <h3>Course offer for  Semester 1 (2025-2026 Winter)<\/h3>\n    \n<div id=\"accordion-module-69d0343dacd94\" class=\"accordion accordion--theme\">\n            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343dacdbb\"\n        >\n            <span class=\"accordion__title\">\n                Information Security Basics                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MICS2-3                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343dacdbb\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343dacd94\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Information Security Basics<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MICS2-3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 1.1 Computer, Software, and System Security I <\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            The objective of this course it to provide an introduction to information security                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        * explain the role of security protocols in the design of secure systems;<br>* use the standard building blocks for security protocols: nonces, symmetric and asymmetric encryption, hash functions;<br>* compare symmetric vs public key cryptography<br>* classify attacks by attack scenarios and by attack goals<br>* describe weaknesses of historical ciphers: substitution, transposition, WWII ciphers<br>* describe basic modes of operation of block ciphers: ECB, CBC, Counter mode<br>* describe the RSA public-key encryption scheme and the RSA signature scheme                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The goal of this course is to provide basic background in Cryptography and IT security and to show what expertise in these areas is available in the laboratory of Algorithms, Cryptography and Security (LACS) and CSC. The topics cover symmetric and public key cryptography and security of protocols                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p><br>67%: final exam.\u00a0<br><\/p><br><p><br>33%: homework.<br><\/p>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343dacddb\"\n        >\n            <span class=\"accordion__title\">\n                Research in Information Systems Engineering                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            4                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MICS2-69                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343dacddb\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343dacd94\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Research in Information Systems Engineering<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 4<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MICS2-69<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 1.1 Computer, Software, and System Security I <\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            1) Building a basic understanding on research and scientific methods in information systems engineering.<br>2) Providing an overview of the basic principles and research methods that are prevalent and relevant in the field of information systems engineering. This includes familiarising students with qualitative research methods, including interviews and coding strategies, quantitative research methods, including survey design and choice experiments, and formal methods, such as simulation and optimisation.<br>3) Developing skills in designing research studies that incorporate a mix of qualitative, quantitative, and formal methods.<br>4) Encouraging collaboration and interdisciplinary research projects within the field of information systems engineering.<br>5) Preparing students to pursue research in the field (e.g., in master projects, or a doctoral thesis).<br>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Upon completion of the course, students will be able to apply their knowledge of research methods to address complex research questions nested within information systems engineering, thereby demonstrating their understanding of how to use qualitative, quantitative or formal methods.<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The possible course outline is as follows: <br>1) Introduction\u00a0<br>2) Theory 101\u00a0<br>3) Sociotechnical Systems Theory\u00a0<br>4) Literature Reviews &amp; Taxonomy Building<br>5) Design Science Research\u00a0<br>6) Case Study Research<br>7) Survey Research<br>8) Discrete Choice Experiments<br>9) Computational Methods<br>10) Natural Language Processing\u00a0<br>11) Economic Modeling<br>12) Time-Series Analysis and Forecasting\u00a0<br>13) Optimisation under Uncertainty<br>14) Simulation<br>15) Question &amp; Answer Session<br>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        For each presentation there will be at least one \u201cCoach\u201d on post-doctoral level who guides the teams, mediates between Presenters and Challengers, and who assesses the individual participation.<br>Doctoral candidates can annually repeat the lecture and rotate through these roles, gaining experience and earning ECTS credits for their active participation and contributions to the learning process. The lecture is an effective learning environment only if doctoral students actively contribute to it. Therefore, contributions will be actively monitored by the Coach and during the presentation. Study credits will be granted accordingly:<br>1 ECTS:<br>&#8211; Presenter of new sessions<br>0.75 ECTS:<br>&#8211; Presenter of an updated session<br>0.5 ECTS:<br>&#8211; Supporter<br>0.25 ECTS:<br>&#8211; Challenger<br>&#8211; Discussant<br>1-year PhD students typically take the role of supporter for two lectures, the role of discussant for two lectures, and the role of challenger for two lectures. The roles you choose are mutually exclusive, meaning that you cannot be a supporter and\/or challenger for the same lecture.\u00a0<br>In case a candidate stays below a total of 2 ECTS in contributions the course is considered failed.<br>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343dacde7\"\n        >\n            <span class=\"accordion__title\">\n                AI and Cybersecurity                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            5                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MA_ERAS_CYBERSECU_1-5                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343dacde7\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343dacd94\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> AI and Cybersecurity<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 5<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MA_ERAS_CYBERSECU_1-5<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 1.1 Computer, Software, and System Security I <\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            The objective of the course is to make the students familiar with the quality and security threats to AI systems, especially in light of\u00a0 (European) regulations. The course generally introduces the students to the foundations of security attacks, but enables also the manipulation of the related concepts through experiments (via Jupyter notebooks). The covered topics include: evasion attacks on computer vision, tabular data, NLP models; poisoning attacks; privacy concerns and threats; distribution drifts, presentation attacks on biometric systems, vulnerabilities in AI-based malware detectors, certifiable robustness, detection of generated content, regulation and auditing, etc. The course sessions will feature ex-cathedra presentations from the teaching team and external speakers, focused discussions, hands-on exercises, expert panels, paper reading and presentation by the students. <br>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Students understand the security concerns that AI system raised and the limitations of using AI systems for cybersecurity. Students can experiment on specific security attacks and defenses through the use of established Python libraries. Students can read advanced scientific papers and reproduce previous experiments. Students can have some understanding of the meaning and implications of regulations related to AI systems and their security.<\/p><br><p>\u00a0<\/p>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\u00a0<\/p><p>\u00a0<\/p>&#8211; Intro to machine learning security and offensive AI \/ Basic tool setup<br>&#8211; Evasion attacks on computer vision systems, white-box and black-box threat models, transferability<br>&#8211; Malware detection using AI and its pitfalls \/ Introduction to the end of year project<br>&#8211; Dense task security with application to healthcare and autonomous driving<br>&#8211; Tabular attacks in constrained domains, with application to financial systems<br>&#8211; Attacks on NLP model \/ Escape game<br>&#8211; Privacy of AI systems \/ Detection of generated content- Distribution drifts<br>&#8211; Poisoning attacks<br>&#8211; Attacks on biometrics systems<br>&#8211; Certified robustness<br>&#8211; Regulations and auditing<br><p>\u00a0<\/p><p>\u00a0<\/p>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p><br>Combined assessment based on:\u00a0<br><\/p><br><p><br>Presentation 50% .<br>Assessment criteria:\u00a0clarity of the presentation, quality of answers, depth of investigation, replicability of tooled artefacts<\/p><br><p><br>Active participation 50% .<br>Assessment criteria:<br>\u00a0\u00a0attendance, completion of in-class exercise, participation in discussions<\/p>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Student&#8217;s Laptop is required for this course<\/p>                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343dacdf3\"\n        >\n            <span class=\"accordion__title\">\n                Human Centered Security Design                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-19                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343dacdf3\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343dacd94\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Human Centered Security Design<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-19<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 1.2 Cybersecurity Systems, Risks, and Threats<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            <p>Provide an overview of the fundamental principles of Human-Computer Interaction and its role in designing secure interactive systems.<\/p><br><p>Introduce the landscape of user-centered methodologies and methods. <\/p><br><p>Present the practical steps for applying these methodologies in real-world academic and organizational security-related scenarios.<\/p>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>After successfully finishing the course, students will be able to: <\/p><br><p>Understand the fundamental principles of Human-Computer Interaction and its role in designing secure interactive systems, including approaches to user-centered design (humanity-centered design, value-sensitive design, etc.). <\/p><br><p>Recognize the ethical and societal implications of design, including the impact on privacy and security. <\/p><br><p>Motivate the need for user studies in academic and organizational settings, effectively communicating their importance to management and decision-makers.<\/p><br><p>Practically apply user-centered design methodologies in their work. <\/p><br><p>Evaluate security-related interface instances through various user evaluation methods. <\/p><br><p>Conduct a user-centered design process that is integrated into a project.<\/p>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        According to the study by Stanford and Tessian, nearly 88% of security breaches occur due to human error. At the same time, users are considered an organization&#8217;s last line of defence against malicious agents. Both of these points require an understanding of how people in the organization interact with security mechanisms and how to reduce human error to make these mechanisms more usable. The goal of the course is to introduce the concept of user-centred design and explore different approaches and methods to incorporate users\u2019 insights into secure system design.This helps create security measures that users can adopt without conflicting with their daily tasks and work priorities. Students will receive knowledge about the core principles of user-centred design, including ethical and value-based design considerations, as well as the behavioural and cognitive aspects of users that should be taken into account when introducing privacy and security-oriented measures. Students will also practice research processes from UX design and social sciences, such as study planning, user sampling, qualitative and quantitative data collection and analysis, with methods like interviews, questionnaires, prototyping, and user testing.\u00a0 By the end of the course, students will be capable of collecting and analyzing users\u2019 requirements and implementing them in their everyday work within the organization or while working on security projects with intensive user involvement.                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>100% presentation<\/p>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343dacdff\"\n        >\n            <span class=\"accordion__title\">\n                Intelligence Structured Analysis Techniques                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-16                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343dacdff\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343dacd94\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Intelligence Structured Analysis Techniques<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-16<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 1.2 Cybersecurity Systems, Risks, and Threats<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            The student will acquire basic knowledge of the following subjects: &#8211; critical thinking- process of thinking in analysis; &#8211; argumentation and fallacies; &#8211; cognitive bias in security. Besides, the student will be introduced to: &#8211; human factors in security design &#8211; social engineering attacks that take advantage of human factors &#8211; (phishing, on-line deception, and fake news) &#8211; be open-source intelligence methods and sources- intelligence analysis techniques.                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        After having taken this course, students will &#8211; avoid bias in reasoning- cope with uncertainty in intelligence analysis- be aware of the human limitations and idiosyncrasies in security &#8211; comprehend human factors in security &#8211; understand the principle of social engineering attacks- know open-source intelligence tools and methods- familiarize with intelligence analysis techniques.<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        1. Introduction to the course\u00a0<br>2. Critical thinking and biases<br>3. Argumentation and fallacies<br>4. Human factors in Cybersecurity, Human error, &amp; situational awareness<br>5. Human Factors and HCI analysis methods<br>6. Human Factors in Cybersecurity: Disinformation (use case)<br>7. Human Factors in Cybersecurity: Phishing (use case)<br>8. Introduction to Intelligence Analysis<br>9. Open-source intelligence<br>10. Threat intelligence and Cybercrime<br>11. Cybercrime, privacy, intelligence, and analysis.                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p><br>Assessment modality: Combined assessment<br>Assessment tasks\u00a0<\/p><br><p><br>Task 1: Homework\/Take-home assignment (40%)<br>Grading scheme: 20 points (0-20)<br>Objectives: Acquisition and ability to apply of the course\u2019s subjects<br>Assessment rules: (to be announced)<br>Assessment criteria: Quality of the solution and the report<br>Task 2: Presentation (+ questions) (60%)<br>Grading scheme: 20 points (0-20)<br>Grading scheme: 20 points (0-20)<br>Objectives: Acquisition and ability to apply of the course\u2019s subjects<br>Assessment rules: (to be announced)<br>Assessment criteria: Quality of the solution and the report<\/p><br><p>\u00a0<\/p><br><p>Retake exam: 100%<\/p>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343dace0a\"\n        >\n            <span class=\"accordion__title\">\n                Introduction to Cybersecurity                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            4                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-14                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343dace0a\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343dacd94\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Introduction to Cybersecurity<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 4<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-14<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 1.2 Cybersecurity Systems, Risks, and Threats<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            <ol><br><li>Develop foundational knowledge of cybersecurity principles and attack practices. Equip students with an understanding of core cybersecurity concepts, threats, technologies, and processes including security engineering, threat modelling, security testing, incident response and forensics.<\/li><br><li>Apply strategies for protecting and responding to cyber risks. Enable students to analyze threat models and attack techniques, evaluate security measures across diverse environments, and understand the requirements for effective incident preparation and response.<\/li><br><li>Understand the broader context of cybersecurity \u2013 Foster awareness of the technical, organizational, human, legal, and ethical dimensions of cybersecurity, and integrate theory with practice through real-world case studies and incident analyses.<\/li><br><\/ol>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        By completing this course, students will develop a broad understanding of the core concepts, architectures, technologies, and practices in cybersecurity. They will know the motivations of threat actors, understand their attack techniques, and have a basic knowledge how to engineer secure systems. The course will also equip students with the knowledge to prepare for and respond effectively to cyber threats. Beyond the technical aspects, students will develop an appreciation of the organizational, legal, ethical, and human\u00a0<br>factors that influence cybersecurity, and will be able to link theoretical knowledge to practical contexts through case studies and incident analyses                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>The possible course outline is as follows:<\/p><ol><li>Cybersecurity landscape and historical context<\/li><li>Attack frameworks and adversarial tactics<\/li><li>Threat modeling, governance and risk management<\/li><li>Security architectures and zero trust models<\/li><li>Security engineering foundations I (crypto, identity, access, and authentication)<\/li><li>Security engineering foundations II (network, wireless, IoT and cyberphysical security)<\/li><li>Security engineering foundations III (Hardware and OS security)<\/li><li>Security engineering foundations IV (Email, web and application security)<\/li><li>Security testing and vulnerability research<\/li><li>Intrusion detection, incident response, and threat intelligence<\/li><li>Digital forensics (memory, storage and network)<\/li><li>Human, legal and ethical dimensions<\/li><li>Emerging trends and research frontiers<\/li><li>Case studies<\/li><\/ol>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p><br>\u00a0Oral exam 80%<br><\/p><br><p><br>\u00a0Take-home assignment 20 %<br><\/p><br><p><br>RETAKE : oral 100%<br><\/p>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343dace15\"\n        >\n            <span class=\"accordion__title\">\n                Data Visualization                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-17                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343dace15\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343dacd94\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Data Visualization<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-17<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 1.3 Design and Analysis  Methods in Cybersecurity<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                \n                \n                \n                \n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343dace21\"\n        >\n            <span class=\"accordion__title\">\n                Programming Fundamentals                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-18                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343dace21\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343dacd94\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Programming Fundamentals<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-18<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 1.3 Design and Analysis  Methods in Cybersecurity<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Develop and demonstrate the ability to design, implement, debug, and refine complete Python programs. This includes planning problem-solving approaches, breaking down tasks into smaller components, and improving code quality through refactoring and clean coding practices.\u00a0                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Outline a step-by-step computational approach to solving a given problem, before implementing any code.<br>Decompose a multi-step programming challenge into 4-6 smaller and manageable sub-problems by creating a written problem breakdown plan, implementing each sub-problem as a separate function or module, and successfully integrating all components to produce a working solution that meets 100% of the original requirements.<br>Write a complete Python program (100-150 lines) that demonstrates mastery of core fundamentals by correctly implementing data types, control structures (loops and conditionals), functions with parameters and return values, and basic error handling.<br>Systematically identify and resolve at least 3 out of 4 different types of bugs (syntax, logic, runtime, and integration errors) in provided code\u00a0samples, using appropriate debugging tools and techniques, and document their debugging process with clear explanations of the problem identification, hypothesis formation, and solution implementation steps.<br>Refactor a provided code sample (50-100 lines) to demonstrate clean coding principles by applying consistent naming conventions, reducing code complexity through proper function decomposition, and adding meaningful comments.<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        1.\tIntroduction to Computational Thinking<br>2.\tData structures<br>3.\tClasses, Functions and Modularization<br>4.\tAlgorithms and (time- and space-) Complexity<br>5.\tRecursion and Search algorithms\u00a0 \u00a0<br>6.\tUse of AI in Software Development and Software Life Cycle<br>7.\tShared task presentations<br>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Combined assessment:<\/p><br><p>Presentation\u00a040%<\/p>Written exam\u00a060%<br>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343dace2c\"\n        >\n            <span class=\"accordion__title\">\n                Mathematics Foundation for Cybersecurity                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-20                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343dace2c\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343dacd94\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Mathematics Foundation for Cybersecurity<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-20<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 1.3 Design and Analysis  Methods in Cybersecurity<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            The course is to prepare MCYSD students for their specialized courses by providing basic mathematical background that they will need.\u00a0                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The students are expected to be able to solve computational problems and write short proofs.                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The course will cover basic probability theory, complexity theory, elementary number theory, and abstract algebra                    <\/div>\n                <\/li>\n                \n                \n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>    <\/div><\/div><\/section>\n<section\n    id=\"tabpanel-8f71f9d7-bc8c-4fa0-bf98-70ef4245d9e6\"\n    aria-labelledby=\"tab-8f71f9d7-bc8c-4fa0-bf98-70ef4245d9e6\"\n    class=\"tab-panel fade hidden is-hidden\"\n>\n    \n<p><\/p>\n<div class=\"wp-block-unilux-blocks-course-offer\">\n    <h3>Course offer for Semestre 2 (2025-2026 Summer)<\/h3>\n    \n<div id=\"accordion-module-69d0343db0625\" class=\"accordion accordion--theme\">\n            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db0649\"\n        >\n            <span class=\"accordion__title\">\n                Security Modelling                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            5                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MICS2-29                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db0649\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db0625\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Security Modelling<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 5<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MICS2-29<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 2.1 Cybersecurity Engineering<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            The objective of the course is to provide an overview of techniques used to model and analyze the security of systems.<br>After successful completion of this module the student should be able to<br>&#8211; understand the role of modelling in the design and analysis of secure systems<br>&#8211; understand the role of modelling in defining security properties and attacker capabilities.<br>&#8211; select a suitable modeling technique for a given problem<br>&#8211; apply a given modelling technique to a specific domain or problem<br>&#8211; assess the security of a given system through its modeling<br>&#8211; compare modelling techniques with respect to expressive power and suitability for a given domain<br>&#8211; identify the limitations of modelling techniques with respect to real-world security                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        * select a suitable modeling technique for a given problem<br>* apply a given modeling technique to a specific domain or problem<br>* assess the security of a given system through its modeling<br>* compare modeling techniques with respect to expressive power and suitability for a given domain<br>* describe new trends in security modeling<br>* identify the limitations of modeling techniques with respect to real-world security                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The following topics will be presented during the class<br>&#8211; The characterization of secrecy properties as process equivalence or indistinguishability.<br>&#8211; Commitment schemes and zero-knowledge proofs<br>&#8211; Quantum cryptography, in particular quantum key distribution<br>&#8211; Verifiable voting schemes<br>&#8211; Provable security                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Homework: 20%<br>Presentation + research report: 80%                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db065e\"\n        >\n            <span class=\"accordion__title\">\n                Security of Mobiles                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            4                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-4                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db065e\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db0625\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Security of Mobiles<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 4<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-4<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 2.1 Cybersecurity Engineering<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            This course provides students with an overview of the security aspects in mobiles, with a particular focus on the Android ecosystem. Students will explore state-of-the-art literature on mobile security, examine recent attacks and malicious code, and study both static and dynamic evasion techniques employed by adversaries. The course also delves into defense mechanisms, including reverse engineering, static and dynamic analysis techniques, and the application of AI techniques.\u00a0                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Through a combination of lectures, case studies, and hands-on projects, students will gain the skills necessary to analyze, detect, and mitigate security threats in mobile devices                    <\/div>\n                <\/li>\n                \n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p><br>50% Written Exam; 20% Active Participation; 30% Take-home assignment<\/p><br>Written Exam: Assess students&#8217; comprehensive understanding of the course material, measure their ability to integrate and apply knowledge, and evaluate their skill proficiency. Assessment rules: 2h00 written exam. No computer. Format: questions on the course materials\/content. No material allowed.\u00a0<br>Assessment criteria: Application of knowledge acquired during the course. Critical thinking about open questions.<br>Active Participation: Encourage students\u2019 participation and concentration. Make brainstorming sessions and discussions about latest findings in the literature active.<br>Take-home assignment: Apply and reinforce course concepts by analyzing practical mobile security challenges.\u00a0<br>In the event of failure, a retake will be scheduled for the following semester and conducted as an oral assessment covering the entire course. If the overall average from participation, the final exam, and take-home assignments is below the passing threshold, the student may take this oral examination in the following semester.\u00a0                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db066b\"\n        >\n            <span class=\"accordion__title\">\n                Focused Activities I                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-10                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db066b\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db0625\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Focused Activities I<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-10<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 2.2 Focused Activities I<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            The students will have insights on a series of up-to-date subjects related to cybersecurity and cyber defence practices and activities. This may include a revision, or different perspective of topics addressed in some other course, and\/or hands-on exercises under the guidance of experts which will complete the student\u2019s preparation.\u00a0<br>Thus, the student will acquire improved analytical skills, a broader understanding of the multi-faceted nature of cybersecurity, and operational skills.                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\u00a0<\/p><br><p>\u00a0<\/p>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>When and where requested, students will be assigned to work on texts or subjects that deepen, sometimes, or broaden, some others, topics relevant to building knowledge in cybersecurity.\u00a0<br>The selection of these texts or subjects will be made available time by time the lectures are delivered, but generally, the student will be asked and reflect on the texts or subjects guided by questions discussed in class.\u00a0<\/p><p><br><\/p>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>100%\u00a0Presentation of the final project deepening on some of the topics presented during the cours.\u00a0<\/p><br><p>Towards the end of the semester, the student will be asked to develop a small research project, delving deeper into one of the key themes covered in the course.\u00a0<\/p><br><p>This project will be developed in stages: a) abstract and choice of the topic; b) written work; and c) oral presentation with discussion.<\/p><br><p>\u00a0<\/p>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db0676\"\n        >\n            <span class=\"accordion__title\">\n                Software Vulnerabilities: Exploitation and Mitigation                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            5                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MICS2-44                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db0676\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db0625\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Software Vulnerabilities: Exploitation and Mitigation<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 5<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MICS2-44<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 2.3 Computer, Software, and System Security II<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Through this course students will understand software vulnerabilities from memory corruptions to command injections.<br>Both the defensive and offensive aspects will be studied: students will learn how to mitigate, find aNd exploit software vulnerabilities.                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        * Students should be able to critically read publications related to software vulnerabilities (research paper, etc.)<br>* Students should be able to identify vulnerable code and write robust code preventing vulnerabilities from being introduced in the code.<br>* Students should be able to exploit simple known vulnerabilities.                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Our lives and our societies rely on computer programs (software).<br>Every day, we use devices running software written in millions of lines of code because it makes our lives easier.<br>However, the complexity and the size of existing software, added to the fact that humans write most of the software,<br>introduce bugs.<br>Some of these bugs, called vulnerabilities, can be exploited by an attacker to compromise a device or leak information.<br>Have you ever wondered how programmers make their code more robust to avoid introducing vulnerabilities?<br>Have you ever wondered how attackers can find vulnerabilities and exploit them to take control of a remote device on<br>the Internet or of your smartphone?<br>Have you ever wondered how attacker can dump an entire database containing personal information about millions of<br>users?<br>In this course, you will learn both how to defend against vulnerabilities and how to exploit vulnerabilities.<br>This course covers memory corruption vulnerabilities such as buffer or heap overflow, type confusion, or use after free.<br>It also covers more high level vulnerabilities such as SQL injection or confused deputy.<\/p><p>The course will mix theory and practice.<br>On the offensive side, you will implement simple programs to exploit vulnerabilities.<br>On the defensive side, you will correct vulnerable programs to prevent exploitation but also learn how to use techniques such as fuzzing to find new vulnerabilities.<\/p>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Each student will get three grades: one for the assignments (labs), one for a project, and one for the exam(s). <br>The final grade is obtained by using the following weights:<br>50% assignments (labs)<br>20% for a project <br>30% for exam(s)<br>However, in order to pass, the student needs to get at least 7 out of 20 for the exam(s).<br>If the student gets less than 7 out of 20 for the exam(s), the final grade will be computed as follows:<br>50%(assignment grade \/2) + 20%(project grade \/2) + 30% exam grade<br>\u00a0<br>If a student fails, the student can keep his\/her grades related to the assignments and projects. <br>Only attending the exam(s) is mandatory. <br>Once the exam(s) is completed, the final grade is obtained by following the same weights as presented above (i.e., 50% assignments (labs), 20% for a project, 30% for exam(s)) <br>Again, getting at least 7 out of 20 for the exam(s) is mandatory.<br>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db0682\"\n        >\n            <span class=\"accordion__title\">\n                Microkernel Based Systems                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            5                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MICS2-57                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db0682\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db0625\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Microkernel Based Systems<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 5<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MICS2-57<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 2.3 Computer, Software, and System Security II<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            The main framework is a series of lectures with assignments<br>in the form of a combination of reading assignments and practical exercises<br>leveraging a virtualization environment, such as QEMU, and a state-of-the-art<br>microkernel-based system (e.g., L4.RE).<br>The course will introduce the C \/ C++ \/ Assembly level programming skills<br>that are necessary to implement system calls and to interact with devices and<br>the processor hardware.                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Understand advanced operating system techniques and their role in fault<br>containment, vulnerability mitigation and the construction of trusted systems<br>from untrusted components<br> Construct trustworthy systems with the help of virtualization techniques and<br>trusted execution environments<br> Gain practical experience programming at kernel level                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>This course gives an overview on microkernel construction and on the<br>fundamental design principles for constructing microkernel and<br>microhypervisor-based systems. The course covers advanced operating<br>system topics, such as device pass through in virtual machines, trusted<br>execution, etc., and serves as a deep dive into system-level techniques to<br>security and reliability. It prepares to pursuing research in resilient operating<br>systems or a related field (e.g., master projects or PhD theses).<\/p><p> Review of the evolution of Microkernels-\/Hypervisors and Microkernel-based<br>Systems<br> Foundations of Microkernel-Based Systems<br> Kernel Mechanisms and Abstractions<br> Architecting, Constructing and Programming Microkernels<br> Verification of Microkernel-Based Systems<br> Resilience Aspects at Application and Microkernel Level<br> Introduction to Systems Programming in C \/ C++<\/p>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Assignments: 40 %, Final Exam 60 %                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db068d\"\n        >\n            <span class=\"accordion__title\">\n                Introduction to Machine Learning                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            4                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-23                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db068d\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db0625\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Introduction to Machine Learning<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 4<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-23<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 2.4 Data Processing and Communication<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            \u200b\u200bTo get familiar with the ML principles, methods, and applications. To learn about practical aspects of implementing ML models and the relevant privacy concerns.\u200b\u00a0<br>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The students will learn:\u00a0<br>\u2013 both fundamentals of Machine Learning and implementation details of several representative approaches\u00a0<br>\u2013 will get familiar with several classical methods and more advanced techniques\u00a0<br>\u2013 practical aspects of implementing Machine Learning models\u00a0<br>\u2013 building secure ML and using ML for security applications\u00a0                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Students will learn the fundamentals of machine learning (ML) that form the foundation for understanding current advancements in the field. They will explore the principles behind various models, their potential, and their limitations. Through several examples, students will examine both classical and modern approaches and learn what it means to implement ML models in production environments. Finally, they will study how ML can be used to enhance the privacy and security of different systems, and why privacy sometimes needs to be built directly into ML models.\u00a0<br>The following is a preliminary list of topics, which can be adapted to better suit the audience:\u00a0<br>\u2002\u2002\u2002\u2002\u2002Fundamentals of Machine Learning (ML): types of tasks (classification, regression, anomaly detection, association rule mining, etc.); model training and validation; evaluation metrics.\u00a0<br>\u2002\u2002\u2002\u2002\u2002Implementation details of major method families: linear regression, tree-based methods, rule-based learning, support vector machines (SVMs), neural networks, etc.\u00a0<br>\u2002\u2002\u2002\u2002\u2002Advanced topics: causality in ML, uncertainty quantification, and related emerging areas.\u00a0<br>\u2002\u2002\u2002\u2002\u2002Practical aspects of implementing ML models at scale.\u00a0<br>\u2002\u2002\u2002\u2002\u2002Machine learning for privacy and security.\u00a0<br>\u2002\u2002\u2002\u2002\u2002Privacy-preserving machine learning.\u00a0<\/p>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p><br>Take-home assignment\u200b 30%\u00a0<br><br>\u200b\u200bStudents will be able to implement one of ML models from scratch. The goal is to improve understanding and to demystify ML.\u200b\u00a0<br>\u200b\u200bUsing lectures and online materials, the students should understand how a specific method is implemented and explain it to other students in the class. They should be able to guide a coding session for other students.\u200b\u00a0<br>\u200b\u200bFunctionally correct implementation (edge cases are taken care of; evaluation methodology is present) &#8211; 30%. 2. Understanding the method and ability to explain the implementation &#8211; 70%.\u200b\u00a0\u00a0<br>\u200b\u200b<\/p><br><p><br>Active participation\u200b 20%\u00a0<br><br>Engage constructively in class discussions and activities. 2. Critical evaluation of modelling and evaluation choices<br>\u200b\u200bStudents should be able to follow the explanations provided by the lecturer and peers, reason about modelling choices, implementation and application aspects of different ML methods.\u200b\u00a0<br>Participation during the semester \u2013 50%. 2. Participation during the project presentations \u2013 50%.\u00a0\u00a0<br><\/p><br><p><br>Presentation\u200b 50%<br><br>\u200b\u200bDevelop and present an ML project\u200b\u00a0\u00a0<br>\u200b\u200bStudents should be able to choose a problem which can be solved with ML methods. They should formulate the problem, find necessary data, choose a method, implement and evaluate their solution, present their learnings and findings in the class, and be able to discuss and defend their choices. \u200b\u00a0<br>Identification and collection of relevant data &#8211; 10%. 2. Choosing an appropriate ML approach &#8211; 30%. 3. Implementation of a solution\u200b &#8211; 40%. 4. Project presentation &#8211; 20%.<br>In case a student fails the course, a resit oral exam covering the entire course content is scheduled for the winter semester. The grade will depend 100% on the outcome of this exam.\u00a0\u00a0<\/p>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db0699\"\n        >\n            <span class=\"accordion__title\">\n                Science Communication                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-6                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db0699\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db0625\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Science Communication<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-6<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 2.4 Data Processing and Communication<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Understand different contexts of science communication and be capable of delivering outstanding presentations in each case                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        You will learn all aspects of preparing a scientific presentation and preparing yourself for delivering it, and you will understand the communication contexts of of oral and poster conference presentations, project and company pitches, and job interviews.                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Please see detailed syllabus in Moodle.                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Active Participation 100%<\/p>Objectives:\u00a0You will prepare for performances at each meeting.<br>Assessment rules:\u00a0Evaluation by instructor<br>Assessment criteria:\u00a075% for adherence to instructions and 25% for quality of performance.<br>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db06a4\"\n        >\n            <span class=\"accordion__title\">\n                Algorithms for Numbers and Public-Key Cryptography                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            5                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MICS2-14                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db06a4\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db0625\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Algorithms for Numbers and Public-Key Cryptography<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 5<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MICS2-14<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 2.5 PROFILE :  Information security and analysis &#8211; Cryptography<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            The objective of this course it to provide an introduction to algorithms for numbers and their use in public-key cryptography.                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        * describe the basic algorithms for numbers: gcd, CRT, modular exponentiation, primality tests.<br>* list some basic properties of numbers: modular computation, Euler function, generators of multiplicative groups.<br>* explain the RSA algorithm for public-key encryption and signature.<br>* explain basic security proofs for public-key encryption and signature.                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        * basic basic algorithms for numbers: gcd, CRT, modular<br>exponentiation, primality tests, etc.<br>* the RSA algorithm for public-key encryption and signature.<br>* main security notions for encryption and signature.<br>* basic security proofs for public-key encryption and signature.                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The final grade is based on homework only.                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db06b0\"\n        >\n            <span class=\"accordion__title\">\n                Symmetric Key Cryptography and Security of Communications                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            5                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MICS2-12                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db06b0\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db0625\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Symmetric Key Cryptography and Security of Communications<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 5<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MICS2-12<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 2.5 PROFILE :  Information security and analysis &#8211; Cryptography<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Introduction to symmetric cryptography and applied cryptography: the students will learn design and analysis principles for symmetric crypto primitives (ciphers, hash functions, MACs). They will be also introduced to the aspects of practical application of cryptography                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        * evaluate effects of cryptanalysis, side-channel attacks and traffic analysis on cryptographic primitives<br>* understand hardware and software implementation issues for cryptographic primitives<br>* understand the usage of cryptography on the blockchain<br>* apply differential power analysis (DPA) to smartcard implementations of ciphers<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The goal of the first half of this course is to introduce students to symmetric key cryptography, showing how ciphers and hash functions are designed and cryptanalyzed. We will start with some historical examples (M-209, Enigma) and then follow to the present day standards (DES, AES, SHA, GSM-A5, RC4, Bluetooth-E0). In the second half of the course we will discuss broader applied cryptography and network security topics such as crypto-hacking, cryptography on the blockchain and side-channel attacks.                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The grade for this class will be an average of the homework assignments given every week. Assignments are to be solved individually. There will be no final exam                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db06bb\"\n        >\n            <span class=\"accordion__title\">\n                Cybersecurity Risk Management                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-9                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db06bb\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db0625\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Cybersecurity Risk Management<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-9<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 2.5 PROFILE : Policies, compliance and defence &#8211; Cyber Defence and Cyber Policies<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Equip students with practical skills in cybersecurity risk management using NIST and EU frameworks (NIS2, DORA, etc), focusing on real-world case studies, risk assessment, and mitigation strategies                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        &#8211; Apply NIST and EU risk management frameworks to assess cybersecurity risks.\u00a0<br>&#8211; Utilize tools to analysis and monitor cybersecurity risks.<br>&#8211; Develop and propose effective risk mitigation strategies.<br>&#8211; Defend risk assessments and mitigation plans in a professional setting.<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The course covers cybersecurity risk management principles using NIST\u2019s Risk Management Framework and EU equivalents (NIS2, DORA, etc).\u00a0 Through hands-on use cases, students assess risks, utilize tools to analysis and monitor cybersecurity risks, and propose mitigation strategies. Key topics include risk identification, threat landscapes, applying frameworks in organizational contexts, and effective communication of risk plans. Group projects on real-world scenarios enhance analytical and presentation skills. The course also addresses regulatory compliance and ethical considerations. By engaging with case studies and practical exercises, students prepare to tackle real-world cybersecurity challenges effectively.                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>50% Individual Case Study Assessment: students independently analyze a cybersecurity risk scenario and propose mitigation strategies.\u00a0Grades reflect the quality of assessments, mitigations, and presentation effectiveness.<\/p><br><p>50 % Team Project and Presentation :\u00a0Teams assess risks for real-world scenarios, develop mitigation plans, and defend their strategies through a group presentation. Assessment criteria: Depth of analysis, effectiveness of proposed mitigations, teamwork, and presentation skills.<\/p><br><p>In case a student fails the course, a resit exam covering the entire course content is scheduled for the upcoming semester.<\/p>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db06c7\"\n        >\n            <span class=\"accordion__title\">\n                Cybersecurity Tool for Threat Intelligence and Forensics                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-7                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db06c7\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db0625\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Cybersecurity Tool for Threat Intelligence and Forensics<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-7<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 2.5 PROFILE : Policies, compliance and defence &#8211; Cyber Defence and Cyber Policies<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Gain proficiency in using open-source platforms and frameworks (such as MISP, AIL, Flowintel, Kunai) for cyber-threat intelligence (CTI) and digital forensics.<br>Develop a solid workflow for threat information sharing, automation, and structured analysis to improve incident response.<br>Understand the forensic process on both Windows and Linux: evidence collection, analysis, and sandboxing or triaging of malware.<br>Learn to plan a cyber-threat intelligence strategy, set intelligence requirements, and incorporate best practices for data sharing and analysis.<br>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Upon successful completion of this course, students will be able to:<br>Apply MISP for threat data sharing, enrichment, and automation, demonstrating familiarity with MISP\u2019s data model and APIs.<br>Design and execute a simple CTI plan by identifying intelligence requirements, aligning them with organizational objectives, and leveraging intelligence frameworks.<br>Implement open-source frameworks (AIL) to crawl, index, and analyze data sources, extracting actionable threat intelligence.<br>Perform Windows-based forensic investigations, including evidence collection and case management using Flowintel or similar tools.<br>Investigate Linux malware in a sandboxed environment (Kunai), identifying malicious behavior, indicators of compromise (IoCs), and correlation with threat intelligence feeds.<br>Collaborate with peers to share artifacts, advisories, and best practices in an operational threat intelligence environment.<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        This course offers a practical and hands-on overview of key open-source tools and frameworks used in threat intelligence and digital forensics. The topics include MISP for threat sharing and automation, cyber-threat intelligence planning and best practices, the AIL framework for information extraction and analytics, as well as forensic analysis on both Windows and Linux platforms using open-source or freely available tools such as Flowintel and Kunai. By the end of the course, students will have developed the skills to collect, analyze, and share threat information effectively, to perform forensic investigations across multiple operating systems, and contribute to open source projects                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>100% project\u00a0<\/p><br><p>Objectives:\u00a0Integrate multiple course components into a cohesive threat intelligence or forensic investigation scenario (e.g., analyzing a malware sample, documenting IoCs, feeding them into MISP, presenting findings).<\/p><br><p>Assessment rules:\u00a0Individual or small-group project. Must produce a written report and a companion github repository holding materials and scripts produced in the frame of the project.<br><\/p><br><p>Assessment criteria:<\/p><br><p>Completeness of the investigation steps<br>Correct usage of relevant tools (MISP, AIL, etc.)<br>Quality of threat intelligence correlation<br>Clarity and professionalism of the final report.<\/p><br>If the student fails the course, they will be required to retake it in full during the upcoming summer semester, as no full resit option is offered for this course.<br><p>\u00a0<\/p>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db06d2\"\n        >\n            <span class=\"accordion__title\">\n                Cyber Policy                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            4                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-8                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db06d2\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db0625\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Cyber Policy<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 4<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-8<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 2.5 PROFILE : Policies, compliance and defence &#8211; Cyber Defence and Cyber Policies<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            \u200b\u200bThis course aims to provide an overview of the key legal instruments primarily at EU level, as well as at the international and national (Luxembourgish) level, that regulate cybersecurity.\u200b\u00a0                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        As per the course objectives, by the end of the course it is expected for the students to have a foundational comprehension of the legal framework established to regulate cybersecurity at the national, European and international level. They will have an in-depth understanding of the key legislative instruments that regulate cybersecurity and the different policy considerations that have shaped EU cyber policy.<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The main topics covered in the course are: EU Cybersecurity Law (NIS 2 Directive, Cybersecurity Act, Cyber Resilience Act, DORA); Cybersecurity and Data Protection law; Cybersecurity and AI; EU\u00a0\u00a0<br>bodies and agencies involved in cybersecurity; cyber defense; the right to cybersecurity.\u00a0<br>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        100 % oral exam<br>The objective of the oral exam is to ensure that the students have a solid understanding of the key elements covered in the course, which they can communicate to the examiner in a direct and concise manner with the ability for a nuanced response whereby the student can explain and clarify their thoughts.<br>The oral exam will enable the students to demonstrate a holistic understanding of the materials covered during the lectures.<br>Students will be provided with a list of questions to prepare from.<br>The assessment will be based on the quality and thoroughness of the answers given during the oral exam.\u00a0                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>    <\/div><\/div><\/section>\n<section\n    id=\"tabpanel-91d69e16-8af9-453d-8d00-158f5bfb5826\"\n    aria-labelledby=\"tab-91d69e16-8af9-453d-8d00-158f5bfb5826\"\n    class=\"tab-panel fade hidden is-hidden\"\n>\n    <div class=\"wp-block-unilux-blocks-course-offer\">\n    <h3>Course offer for Semester 3 (2025-2026 Winter)<\/h3>\n    \n<div id=\"accordion-module-69d0343db48ad\" class=\"accordion accordion--theme\">\n            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db48d1\"\n        >\n            <span class=\"accordion__title\">\n                Emerging Technologies in Society                 <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            4                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MICS2-72                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db48d1\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db48ad\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Emerging Technologies in Society <\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 4<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MICS2-72<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 3.1 Interdisciplinary Cybersecurity<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            <p>1) Explore key application areas of emerging technologies such as\u00a0 healthcare, recommendation systems, and democratic governance.\u00a0 <\/p><br><p>2) Examine the principles of agentic AI, hybrid intelligence, Explainable AI highlighting the evolving relationship between human and machine decision-making. <\/p><br><p>3) Critically evaluate the societal and ethical dimensions of advanced technologies, including issues related to bias, surveillance, and misinformation. <\/p><br><p>4) Prepare students to engage in advanced research or professional work related to the societal impact of emerging technologies.<\/p>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Upon completion of the course, students will be able to apply their understanding of emerging technologies\u2014such as machine learning, deep learning, natural language processing, and generative AI\u2014to critically evaluate their impact on society, design context-sensitive technological solutions, and engage in responsible innovation. They will be equipped to analyze the societal, ethical, and operational implications of AI applications in areas such as healthcare, democratic governance, and personalization systems, while also recognizing the importance of explainability, human centered design, and risk mitigation in the deployment of advanced intelligent systems.\u00a0                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        1) Introduction (Afshin)<br>2) Fundamentals of ML, DL and NLP in Information System (Afshin)<br>3) The rise of GenAI\/LLM in Information System (Afshin)<br>4) Optimizing LLMs for domain specific intelligence via fine tuning (Afshin)<br>5) Agentic AI (Igor)<br>6) Human \u2013 AI interaction (cooperation, collaboration): the need of human in the loop (Igor)\u00a0<br>7) Hybrid Intelligence: the need to empower humans (Igor)<br>8) Explainable AI: the need of human to understand the AI-driven decision-making (Igor)\u00a0<br>9) Applications of Emerging Technologies in health (Afshin)<br>10) Applications of Emerging Technologies in recommender systems (Igor)<br>11) Applications of Emerging Technologies in democracy and public governance (Igor)\u00a0<br>12) Data and ethical considerations of Emerging Technologies (Afshin)<br>13) Dark side of Emerging Technologies (Gilbert Fridgen, Afshin KHADANKISHANDI, Igor Tchappi)<br>14) Q&amp;A (all)<br><br>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Written exam                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db48e5\"\n        >\n            <span class=\"accordion__title\">\n                Open Network Security                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            4                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MICS-41                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db48e5\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db48ad\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Open Network Security<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 4<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MICS-41<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 3.2 Network Communication Security<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            The goal of this course is to introduce challenges in securing computer systems and networks. The curse covers the foundations of system and network security. It introduces basic security and privacy concepts as building blocks for later specialization.                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        * Master the epidemiological models for malware propagation and network-centric attacks<br>* Assess the security of networks and software systems.<br>* Explain the techniques for worm containment and detection.<br>* List statistical and machine learning approaches for network traffic monitoring                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        In the scope of this course, we explore the following topics:<br>Introduction and general concepts.<br>Definitions, security goals, attacker models.<br>Symmetric encryption.<br>Integrity protection.<br>Asymmetric encryption.<br>Certificates and public key infrastructure (PKI).<br>Authentication and key agreement.<br>Kerberos.<br>Security protocols (IPSec, DNSSec, Kerberos, SSH, TLS, etc.).<br>Spam, botnets, phishing.<br>Anonymity and privacy.<br>Machine learning and intrusion detection.<br>Wireless security.                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Final exam, active participation in exercises, practical assignments and presentation.                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db48f1\"\n        >\n            <span class=\"accordion__title\">\n                Quantum Communication Infrastructure Fundamentals  (elective course)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            F1_MAINTERSPACE-59                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db48f1\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db48ad\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Quantum Communication Infrastructure Fundamentals  (elective course)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> F1_MAINTERSPACE-59<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 3.2 Network Communication Security<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            \u200b\u200bThis course is designed to familiarize the attendees with the framework of quantum communication systems. <br>The course begins with a historical review of events that led to the development of quantum mechanics, before moving to the introduction of quantum states and their properties. <br>Later part of the course introduces fundamental protocols of quantum communications, tools of quantum information theory, and basic treatment of noise in quantum systems. <br>The final part of the course introduces quantum cryptography techniques, including quantum key distribution protocols, their implementations, and their analyses.\u200b\u00a0                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        \u200b\u200bAt the end of this course, students will be able to:<br>&#8211; precisely define quantum states and explain their properties <br>&#8211; design quantum circuits and perform calculation for fundamental quantum communication protocols <br>&#8211; model the effect of interactions with environment in open quantum systems <br>&#8211; analyze quantum noise in quantum communication systems and explain its effects<br>&#8211; describe basic quantum key distribution protocols and identify their potential use in the real-world scenarios.\u200b\u00a0                    <\/div>\n                <\/li>\n                \n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Continuous assessment: Take-Home assignment 60% Presentation 40%                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db48fd\"\n        >\n            <span class=\"accordion__title\">\n                Focused Activities II                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-11                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db48fd\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db48ad\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Focused Activities II<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-11<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 3.3 Focused Activities II<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> Yes<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>The students will have insights on a series of up-to-date subjects related to cybersecurity and cyber defence practices and activities. This may include a revision, or different perspective of topics addressed in some other course, and\/or hands-on exercises under the guidance of experts which will complete the student\u2019s preparation. <br>Thus, the student will acquire improved analytical skills, a broader understanding of the multi-faceted nature of cybersecurity, and operational skills.<\/p><br><p>When and where requested, students will be assigned to work on texts or subjects that deepen, sometimes, or broaden, some others, topics relevant to building knowledge in cybersecurity. <\/p><br><p>The selection of these texts or subjects will be made available time by time the lectures are delivered, but generally, the student will be askedand reflect on the texts or subjects guided by questions discussed in class. <\/p>                    <\/div>\n                <\/li>\n                \n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Towards the end of the semester, the student will be asked to develop a small research project, delving deeper into some of the key themes covered in the course.<\/p><br><p>This project will be developed in stages: a) abstract and choice of the topic; b) written work; and c) oral presentation with discussion.<\/p><br><p>A general discussion will follow each presentation.<\/p><br>Evaluation<br><p>The student will be evaluated on a) quality of a report (students are asked to review their understanding of the topics) and quality of an assignment given the teacher (where students deepen a subject), and b) an oral presentation of the report.\u00a0<\/p><br><p><br>Evaluation Criteria<br><\/p><br><ul><br><li>100% written report and oral presentation<\/li><br><\/ul>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db4908\"\n        >\n            <span class=\"accordion__title\">\n                3.1 Information Security Management System &#8211; ISMS (Syst\u00e8mes de Management de la S\u00e9curit\u00e9 de l&#039;Information &#8211; SMSI)                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MPMSSI-49                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db4908\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db48ad\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> 3.1 Information Security Management System &#8211; ISMS (Syst\u00e8mes de Management de la S\u00e9curit\u00e9 de l&#039;Information &#8211; SMSI)<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MPMSSI-49<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 3.4 Cybersecurity System Analysis<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            <p>Introduce the ISO\/IEC 27001 standard about \u201cInformation Security Management Systems\u201d and detail how to comply with its requirements.<\/p>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        1.Students will understand ISO\/IEC 27001, its structure and its requirements.<br>2.Students will be able to interpret the requirements of the standards and to \u201cspeak the same language.<br>3.Students will have a first view on \u201chow\u201d to comply with the different requirements of the standards.<br>4. Students will be able to define an action plan towards compliance                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>1. The ISO\/IEC 27001 standard\u00a0<br>&#8211; Overview of the standard<\/p><p>2. ISMS establishment and management\u00a0<br>&#8211; Definition of an ISMS establishment and management project<\/p><p>3. Context and objectives<\/p><p>4. Document management<\/p><p>5. Leadership\u00a0<br>&#8211; Commitment, policy and roles &amp; responsibilities<\/p><p>6. Performance evaluation<br>&#8211; Indicators, internal audit and management review<\/p><p>7. Improvement<br>&#8211; Nonconformity and corrective action and incident management<\/p><p>8. Risk management\u00a0\u00a0<br>&#8211; Risk assessment\u00a0\u00a0<br>&#8211; Risk treatment<\/p><p>9. Information security policy(ies) and procedures<\/p><p>10. Conclusions and work plan<br><\/p>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Task 1: Written exam based on a MCQ and open questions (100%)<br><br>Grading scheme: 20 points (0-20)<br>Objectives: Prove that the standard and its interpretation have been understood and that the student is able to draw an implementation plan to comply with ISO\/IEC 27001.<br>Assessment rules: Students will work on their own.<br>Assessment criteria: The correctness of solutions to assigned questions.<br>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Syllabus\u2610Yes\u2612No<br>Literature list\u2610Yes\u2612No<br>Moodle page\u2612Yes\u2610No<br>Other, please specify:<\/p><br><p>Slideshow in a PDF file<br>ISO\/IEC 27001. Information technology &#8211; Security techniques &#8211; Information security management systems &#8211; Requirements. International Organization for Standardization, Geneva, 2005.<\/p><br><br>                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db4913\"\n        >\n            <span class=\"accordion__title\">\n                Security of Databases                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MA_ERAS_CYBERSECU_1-15                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db4913\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db48ad\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Security of Databases<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MA_ERAS_CYBERSECU_1-15<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 3.4 Cybersecurity System Analysis<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            <p><br>At the end of this course, students will be familiar with database security risks, exploitation, and mitigations. The assignments will provide students with hands-on experience in securing database systems, preparing them for real-world scenarios in database administration and security<br><\/p><br><p>\u00a0<\/p><br><p>\u00a0<\/p>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        This course aims to familiarize students with database security\u00a0                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        In this course, Database Security risks and mitigations will be discussed in theory and implemented during practical assignments. This course will start with an introduction to common DBMS with an emphasis on server-side implementation (back-end) and the provided user application (front-end) and exploring their vulnerabilities followed by database security best practices.\u00a0The course will include the following topics but is not limited to: Database Access Controls, Database Authentication, Data encryption on the server-side and in transit, Auditing and Monitoring, and attacks such as SQL injections, inference, and privilege escalation.                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p><br>80% final exam, 20% project + presentation<br><\/p><br><p><br>RETAKE exam: 100%<br><\/p>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db491f\"\n        >\n            <span class=\"accordion__title\">\n                Security of Software defined networking                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MA_ERAS_CYBERSECU_1-7                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db491f\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db48ad\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Security of Software defined networking<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MA_ERAS_CYBERSECU_1-7<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 3.4 Cybersecurity System Analysis<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Familiarise with the intersection of cybersecurity and software-defined networking<br>Grasp the foundational concepts of software-defined networking. &#8211; Comprehend the distinction between the data plane and the control plane in SDN.<br>Delve into SDN programming methodologies and techniques.<br>Explore the diverse applications and use cases of software-defined networks.<br>Recognize and assess the vulnerabilities and potential threats inherent to SDN.<br>Implement strategies and measures to safeguard the SDN infrastructure<br>Explore the security advantages of adopting SDN in modern network architectures.<br>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Articulate the key components of SDN and their respective functions.<br>Compare and contrast SDN security approaches with traditional network security methodologies.<br>Illustrate the relevance and deployment of SDN in contemporary networking contexts.<br>Evaluate the inherent security features and vulnerabilities of software-defined networking.<br>Demonstrate proficiency in identifying and addressing SDN-specific security challenges.<br>Critically analyse potential threats of SDN security and recommend preventative measures to ensure data integrity.                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        This course offers a comprehensive introduction and a small dive into the subject, structured over a semester with a blend of lectures, labs, and presentations. Each session is designed to build on the knowledge from the previous weeks, fostering a robust understanding and practical skills. The course is designed to not only provide foundational knowledge but also to engage students in active learning through quizzes, practical labs, presentations, and paper reviews. It aims to prepare students for advanced studies in the field and real-world applications.                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The final grade is composed by :<br>35%Labs<br>30%Presentation\u00a0<br>25%Written Summary Report<br>10%Attendance, Participation to class                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db492a\"\n        >\n            <span class=\"accordion__title\">\n                Selected Topics in Network and System Security                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            4                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MICS-COMMSYST-025                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db492a\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db48ad\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Selected Topics in Network and System Security<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 4<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MICS-COMMSYST-025<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 3.4 Cybersecurity System Analysis<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            The objective of this course is an elaborated, active understanding of distributed vs. centralized communication security and privacy concepts and their application to cooperative environments. The course creates links between the fundamental concepts and applied scenarios with references to ongoing research activities within the SECAN-Lab research group.<br>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        * Describe existing concepts to set-up centralized and distributed secure communication systems and protocols.<br>* Name and reproduce definitions for quantitative parameters linked to anonymity, privacy and reputation systems<br>* Analyze and compare existing privacy-enabled systems for cooperative and non-cooperative environments<br>* Construct, adapt and assess real world communication architectures and protocols for a distributed cooperative communication problem                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        This course will provide an overview of the topic of security and privacy in computer networks. Concrete topics and application scenarios can vary depending on the particular focus of the methods discussed.<br>Typically, the methods of SECAN-Lab involve data analytics for network management, software defined networking, machine learning, algebraic graph transformation, symbolic execution, device and network fingerprinting, deterministic and probabilistic medium access control, routing strategies applied to scenarios around vehicular communications, network management and forensics, cybersecurity, anonymity and privacy, financial technologies and others.<br>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        For the final grade, we will assess the quality of your slides and talk (60%), the quality of your paper summary and review (30%), and your degree of active participation in the seminar (10%).<br>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db4935\"\n        >\n            <span class=\"accordion__title\">\n                Cybersecurity Ethics                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            4                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-21                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db4935\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db48ad\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Cybersecurity Ethics<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 4<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-21<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 3.5  PROFILE B : Policies, compliance and defence &#8211; Cybersecurity Regulations and Practices<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            This course introduces students to ethical challenges regarding information technology. Students will examine the ethical responsibilities required of cybersecurity professionals at different levels. Topics such as privacy, EU regulations, and sociocultural influences will also be explored. At the end of the course, students will understand the role of ethical and value frameworks in cybersecurity, analyze cybersecurity challenges and explain their reasoning, develop critical thinking and analysis skills through presentation and discussion, and be able to communicate in plain language                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        After the course, students will be able to: List the<br>ethical principles in cybersecurity. Define the meaning of ethical principles<br>in cybersecurity. Explain and purpose of ethical principles in cybersecurity<br>in terms that someone who has not taken this course would understand.<br>Determine relevant ethical principles in case studies and codes of conduct.<br>Explain their ethical analysis of a real-world problem in terms that someone<br>who has not taken this course would understand. Critique real world case studies<br>based on ethical principles related to this course. Function effectively as a<br>team member on a multidisciplinary project team, determined by assessment by<br>instructor, peer review, and self-assessment. Explain the roles of different<br>disciplines in the project and judge their relative importance.                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Ethical and Values Frameworks in the EU (such\nas: -Morals, Ethics, and Law in Society -Reasoning with Moral Theories -EU\nPrinciples and Values -Value Conflicts\u00a0Ethical and Values Frameworks in the EU (such as:\n -Morals, Ethics, and Law in Society -Reasoning with Moral Theories -EU\n Principles and Values -Value Conflicts -GDPR Principles) Professional\n Obligations and Codes of Conduct (such as: -CIRCL CVD \u2013GDPR\nObligations -Professional Codes of Conduct) Reasoning with Common Ethical\nChallenges (such as: -Harms to Privacy \u2013Breaches \u2013Transparency and Disclosure\n\u2013Balancing Values)                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p><br>\u00a0 Task 1. Active participation 30%<br><\/p><br><p><br>Objectives and Criteria :\u00a0<br>Engage in class discussions, listen to other<br>students, and think critically about the course material.\u00a0<br>Participation in class activities and homework (peer, self, and instructor feedback)<br><\/p><br><p><br>\u00a0<br><\/p><br><p><br>Task 2. Presentation 20%<br>\u00a0<br><\/p><br><p><br>Objectives and Criteria:<br>Summarize and explain cybersecurity challenges<br>for a specific domain in a way that is understandable to someone who has not<br>taken the class.\u00a0<br>Content, Confidence, Clarity,<br>Understandability, Sources used (scholarly, interview, news, etc.), Synthesis<br><\/p><br><p><br>\u00a0<br><\/p><br><p><br>Task 3.<br>\u00a0 Written exam<br>(Weekly Quiz) 30%<br><\/p><br><p><br>Objectives and Criteria :<br>Recall and demonstrate understanding of ethical<br>principles, cybersecurity professional obligations, and other class topics.\u00a0<br>Correct understanding of core class material\u00a0<br><\/p><br><p><br>\u00a0<br><\/p><br><p><br>Task 4.\u00a0<br>\u00a0 Take-home assignment 20%<br><\/p><br><p><br>Objectives and Criteria:<br>Compare and contrast code of conducts, classify<br>using ethical and value frameworks, and generate their own code of conduct.\u00a0<br>Completeness of assignment and reflection task<br><\/p>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db4941\"\n        >\n            <span class=\"accordion__title\">\n                Entrepreneurship                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            2                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MA_ERAS_CYBERSECU_1-1                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db4941\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db48ad\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Entrepreneurship<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 2<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MA_ERAS_CYBERSECU_1-1<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 3.5  PROFILE B : Policies, compliance and defence &#8211; Cybersecurity Regulations and Practices<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Ability and skills to understand and critically evaluate business problems from the the perspective of entrepreneurship; deep knowledge on the entire startup process (from ideation to venture exit); evidence-based insights on entrepreneurship rooted in latest research insights; ability to apply these insights in real-world case studies that feature highly relevant problems and their solutions                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The course provides a bird\u2019s-eye view of important fundamentals of entrepreneurship.                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The course will cover the following topics: Entrepreneurship in general, entrepreneurial personalities, business planning, lean startup, entrepreneurial marketing, entrepreneurial finance, entrepreneurial growth, entrepreneurial exit, select types of entrepreneurship (e.g., social entrepreneurship, sustainable entrepreneurship). The course also features case studies, in which students will apply the concepts of the lecture to real business cases, preferably from the cybersecurity sector.                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Written Exam 50%<\/p><br><p>The objective of the exam is to evaluate students\u2019 understanding and application of key entrepreneurship concepts.<\/p><br><p><br>Presentation 50%<br><\/p><br><p>The students will solve and present their solutions to case study assignments. The objective of the case studies is to develop students\u2019 analytical and decision-making skills by applying theoretical concepts to real-world entrepreneurial scenarios and fostering critical thinking and strategic planning abilities.<\/p><br><p>RETAKE\u00a0 : Oral 100%<\/p>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db494c\"\n        >\n            <span class=\"accordion__title\">\n                EU Digital sovereignty : Securing EU digital sovereignity through Research and Innovation                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            4                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MA_ERAS_CYBERSECU_1-4                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db494c\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db48ad\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> EU Digital sovereignty : Securing EU digital sovereignity through Research and Innovation<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 4<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MA_ERAS_CYBERSECU_1-4<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 3.5  PROFILE B : Policies, compliance and defence &#8211; Cybersecurity Regulations and Practices<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            Analyze EU\u2019s &#8216;digital sovereignty&#8217; i.e. EU&#8217;s ability to act independently in the digital world. This means studying protective mechanisms and offensive tools designed by the EU to foster digital innovation (including in cooperation with non-EU companies) as well as related challenges                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Students will be able to: (i) Identify and explain different levers used by the EU for its digital sovereignty (notably economic and legal (normative) levers); (ii) breakdown legislative acts and proposals that aim at implementing EU\u2019s digital sovereignty; (iii) understand different UE budgetary instruments (including actors) to finance Research and innovation;(iv) describe strategic technological innovation for EU\u2019s digital sovereignty; (v) explain challenges to EU\u2019s digital sovereignty and suggest solutions; (vi) discuss ethics and technology\u00a0                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        Introduction to EU\u2019s framework for digital sovereignty \u2013 tools, mechanisms, and actors;; Chips market: the Chips Act as a mean to secure EU digital sovereignty; 5G infrastructure deployment: geopolitical and legal challenges; Digital infrastructure sharing imperative: perspectives on an EU Cloud; Software and software development: issues of liability in the context of automated processes\/decisions; Artificial Intelligence (AI): opportunities and challenges for the EU digital sovereignty; Blockchain and Distributed Ledger Technologies: beyond the hype \u2013 socio-economic and legal perspectives for the EU digital sovereignty; Quantum technologies: securing strategic autonomy through quantum R Data protection: General Data Protection Regulation (GDPR) as a flagship regulation for a digital sovereign EU; Digital services: the Digital Services Act for a safe and accountable online environment; Digital Markets Act: a bid for fairness towards and between \u2018gatekeepers\u2019?; European Digital Identity: the idea of a personal digital wallet for EU citizens and residents; Intellectual property: towards a harmonized EU patent rules to boost innovation, investment, and competitiveness; Beyond efficiency and legal niceties: Ethics and technology<br>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        50% Take-home assignment<br>30% Presentation<br>10% Active participation10% Attendance<br>\u00a0\u00a0                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        \u00a0<br>\u00a0                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db4957\"\n        >\n            <span class=\"accordion__title\">\n                Log Analysis                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-12                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db4957\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db48ad\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Log Analysis<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-12<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 3.5 PROFILE A: Information security, risks and analysis &#8211; Cybersecurity Risks and Resilience <\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            <p>Computer systems use logs to record runtime events, such as the arrival of a network message, the change of a setting, or an unexpected situation (like an error).\u00a0\u00a0Very often, logs are the only data available that provide information about the execution of a system.\u00a0Logs are processed\u00a0through log-driven analysis techniques, such as log parsing, run-time anomaly detection, and failure diagnosis.<\/p><br><p>The objective of this course is to provide students with the main knowledge to apply automated log analysis to improve the reliability and security of a system. This will include understanding the main concepts of software logging, how to use software logging, and how to analyze logs using techniques such as log parsing and log-based anomaly detection.<\/p><br><br><br><p>\u00a0<\/p>                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        At the end of the course the students will be able to:<br>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<br>Explain the main concepts related to software logging<br>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<br>Use software logging frameworks<br>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<br>Describe the main approaches for log parsing<br>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<br>Illustrate downstream log analysis techniques such as log mining, model inference and runtime verification<br>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<br>Understand the main techniques for log-based anomaly detection<br>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<br>Use log parsing, log-based anomaly detection, and runtime verification tools                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ol><li>\u00a0Introduction to Logging, logging mechanisms and libraries<\/li><li>Logging approaches: where to log, what to log, how to log<\/li><li>Log compression<\/li><li>Log parsing<\/li><li>Log mining: failure prediction, failure diagnosis<\/li><li>Anomaly Detection<\/li><li>Runtime verification<\/li><\/ol>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\u00a0Task 1\u00a0<\/p><br><p><br>\u00a0Take-home assignment 30%<br><\/p><br><p><br>Objectives: The student will be asked to write a report describing one or more log analysis tools, both from a conceptual and an experimental perspective (e.g., reporting on a replication study of a tool).<br><\/p><br><p><br>Assessment rule:\u00a0<br>Use of generative AI technologies must be disclosed upon submission; the prompts used to get the results should be included in the submission. Late submissions are penalized by 50% (24h), 75% (=24h and 48h), 100% (=48h)<br><\/p><br><p><br>Assessment criteria :<br>Depth and breadth of the report, soundness of the experimental methodology and data analysis (when applicable)\u00a0<br><\/p><br><p>\u00a0<\/p><br><p><br>Task 2<br><\/p><br><p><br>Presentation 30%<br><\/p><br><p><br>Objectives:<br>Presentation of one or more log analysis tools, based on the written report\u00a0<br><\/p><br><p><br>Assessment rule :<br>Use of generative AI technologies must be disclosed upon submission; the prompts used to get the results should be included in the submission. Late submissions are penalized by 50% (24h), 75% (=24h and 48h), 100% (=48h). An unjustified no-show of the presenter on the presentation day will imply a grade of 0 points (even if the presentation was submitted on time).<br><\/p><br><p><br>Assessment criteria:<br>depth and breadth of the presentation, quality of the visual support (slides)<br><\/p><br><p>\u00a0<\/p><br><p><br>Task 3<br><\/p><br><p><br>Written exam 30%<br><\/p><br><p><br>Objectives :<br>Assessing the students\u2019 understanding of the main concepts presented in the lectures.<br><\/p><br><p><br>Assessment rule:<br>The use of documents (including books and notes) is not authorized. The use of electronic devices is not authorized<br><\/p><br><p><br>Assessment criteria :<br>Correctness of the answers<br><\/p><br><p>\u00a0<\/p><br><p><br>Task 4<br><\/p><br><p><br>Active participation 10%<br><\/p><br><p><br>Objectives:<br>Students will be asked to answer questions during classes related to the concepts presented in the previous or current lecture<br><\/p><br><p><br>Assessment rule:<br>Answer to questions may be collected using digital tools like Moodle.\u00a0<br><\/p><br><p><br>Assessment criteria:<br>Participation in the discussion during class, relevance of the questions and correctness of the answers<br><\/p><br><p>\u00a0<\/p><br><p><br>RETAKE 30% :\u00a0 a student may retake the written exam. No resitting is foreseen for the take-home assignments and the presentations<br><\/p><br><p><br>Assessment rule:\u00a0<br>Same as task 3<br><\/p><br><p><br>Assessment criteria:<br>Same as task 3<br><\/p><br><p>\u00a0<\/p><br><p>\u00a0<\/p>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Note<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        The instructor will make available relevant scientific articles and will recommend reading selected chapters of the following book:<br>\u00a0<br>Kevin Schmidt, Chris Phillips, Anton Chuvakin. Logging and Log Management. Syngress 2012. 9781597496353. Available on A-Z.lu                    <\/div>\n                <\/li>\n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db4962\"\n        >\n            <span class=\"accordion__title\">\n                Fault and Intrusion Tolerant Systems                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            4                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MICS2-53                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db4962\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db48ad\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Fault and Intrusion Tolerant Systems<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 4<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MICS2-53<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 3.5 PROFILE A: Information security, risks and analysis &#8211; Cybersecurity Risks and Resilience <\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul><br><li>Understand fundamental limitations of fault and intrusion tolerant systems<\/li><br><li>Analyse a specific system structure and propose a fault and intrusion tolerant alternative<\/li><br><li>Knowledge in the construction of fault and intolerant systems and the protocols that govern their execution<\/li><br><\/ul>                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        This course gives an overview of the fundamental design principles and protocols for the construction of fault and intrusion tolerant systems. The course serves as an introduction to the field and its concepts. It prepares to pursuing research in resilient computing or a related field (e.g., master projects or PhD theses).<ul><li>Introduction and taxonomy of faults<\/li><li>Consistency in the presence of faults<\/li><li>Group communication<\/li><li>Replication<\/li><li>Homogeneous byzantine fault tolerant protocols<\/li><li>Hybrid protocols<\/li><li>System-level aspects<\/li><\/ul>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Assignments: 30 %, Project Presentation 20 %, Final Exam 50 %<\/p>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>            \n<div class=\"accordion__item\">\n    <h4 class=\"accordion__header\">\n        <button\n                type=\"button\"\n                class=\"accordion__button collapsed\"\n                aria-expanded=\"false\"\n                data-bs-toggle=\"collapse\"\n                data-bs-target=\"#accordion-panel-69d0343db496d\"\n        >\n            <span class=\"accordion__title\">\n                Generative AI and Cybersecurity: Architectures, Threats, and Defenses                <span class=\"accordion__data\">\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">ECTS credits:<\/span>\n                        <span class=\"accordion__data__value\">\n                            3                        <\/span>\n                    <\/span>\n                    <span class=\"accordion__data__item\">\n                        <span class=\"accordion__data__name\">Course code:<\/span>\n                        <span class=\"accordion__data__value\">\n                            MCYSD-13                        <\/span>\n                    <\/span>\n                <\/span>\n            <\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down icon--lg\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h4>\n\n    <div id=\"accordion-panel-69d0343db496d\" class=\"accordion__collapse collapse\" data-bs-parent=\"#accordion-module-69d0343db48ad\">\n        <div class=\"accordion__body p-0\">\n            <ul class=\"list-highlighted\">\n                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Details<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <ul>\n                            <li><span class=\"text-dark font-heading font-bold\">Course title:<\/span> Generative AI and Cybersecurity: Architectures, Threats, and Defenses<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Number of ECTS:<\/span> 3<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Course code:<\/span> MCYSD-13<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Module(s):<\/span> 3.5 PROFILE A: Information security, risks and analysis &#8211; Cybersecurity Risks and Resilience <\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Language:<\/span> EN<\/li>\n                            <li><span class=\"text-dark font-heading font-bold\">Mandatory:<\/span> No<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/li>\n\n                <!--<li class=\"list-highlighted__item items-start\">-->\n                <!--    <header class=\"list-highlighted__header\">-->\n                <!--        <h5 class=\"text-18\"><strong>--><!--<\/strong><\/h5>-->\n                <!--    <\/header>-->\n                <!--    <div class=\"list-highlighted__body\">-->\n                <!--        <div class=\"speaker-group\">-->\n                <!--            -->                <!--        <\/div>-->\n                <!--    <\/div>-->\n                <!--<\/li>-->\n\n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Objectives<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>\n                            This course aims to: (1) equip students with a deep understanding of security, privacy, and robustness issues in large language models (LLMs) and LLM-based systems; (2) introduce state-of-the-art attacks (e.g., data poisoning, backdoors, membership inference) and defensive techniques (e.g., adversarial training, attack detection); (3) enable students to critically evaluate cutting-edge research papers and understand both theoretical foundations and real-world implications of LLM vulnerabilities; (4) prepare students for research or advanced engineering roles in AI security, with an emphasis on responsible and secure deployment of language models.                        <\/p>\n                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Course learning outcomes<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        By the end of this course, students will be able to: (1) identify and describe various classes of attacks on LLMs (e.g., poisoning, inference, jailbreaks); (2) analyze and critique research methodologies used to evaluate LLM vulnerabilities and defenses; (3) evaluate LLM behavior under adversarial conditions and identify failure modes; (4) understand the trade-offs between model utility, robustness, fairness, and security; (5) understand security-by-design principles to mitigate prompt injection and other systemic threats.                    <\/div>\n                <\/li>\n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Description<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>This course offers an in-depth examination of security, privacy, robustness, and alignment challenges in the development and deployment of Large Language Models (LLMs). Spanning 14 sessions, it covers adversarial attacks, mitigation strategies, and emerging vulnerabilities through lectures, research paper discussions, and applied labs.<\/p><p><br>DAY 1: Introduction \u2013 LLM Landscape and Agent Security: Security risks in the LLM ecosystem, multi-agent risks, taxonomy of threats.<br>DAY 2: Data Poisoning Attacks: Pre-training and fine-tuning time attacks; clean-label vs. targeted poisoning.<br>DAY 3: Backdoor Attacks: Trigger-based and trojan backdoors; stealth and persistence.<br>DAY 4: Attribute Inference Attacks: Inferring latent attributes about training data or users.<br>DAY 5: Membership Inference Attacks: Detecting if a sample was used during training.<br>DAY 6: Model Stealing Attacks: Query-based model extraction, functionality replication.<br>DAY 7: Training Data Extraction: Reconstructing sensitive content from training data.<br>DAY 8: Exploiting Bias: Bias amplification, demographic risks, toxic content generation.<br>DAY 9: Jailbreaking: Prompt exploits, role-play jailbreaks, intent obfuscation.<br>DAY 10: Prompt Injection: Injection chains, system prompt vulnerabilities, sandbox evasion.<br>DAY 11: Adversarial Training and Robust Fine-Tuning: Fine-tuning for robustness, adversarial loss functions<br>DAY 12: Detection of Adversarial Attacks: Prompt filters, anomaly detection, activation monitoring.<br>DAY 13: Tracing the Thoughts of a LLM: Interpretability, intermediate representations, model cognition.<br>DAY 14: Defeating Prompt Injections by Design: Defense architectures, input sanitization, execution layers.<\/p>                    <\/div>\n                <\/li>\n                \n                \n                                <li class=\"list-highlighted__item items-start\">\n                    <header class=\"list-highlighted__header\">\n                        <h5 class=\"text-18\"><strong>Assessment<\/strong><\/h5>\n                    <\/header>\n                    <div class=\"list-highlighted__body\">\n                        <p>Active participation 40%<\/p><br><p>Assessment rule: Attendance at a minimum of 11 out of 14 lectures required. Student expected to participate in at least 5 paper discussions.<\/p><br><p><br>Assessment criteria :\u00a0Attendance (5 points), frequency (5) and quality (10 points) of contributions<\/p><br><p>Objective: Foster Active Engagement with peers and materials. Support the development of communication skills.\u00a0<\/p><br><p>\u00a0<\/p><br><p>Oral Exam 60%<\/p><br><p>Assesment rule : The student chooses any 2 papers from the course and present it to the examiner. Follow-up questions can cover all the other papers and topic covered in the course.<\/p><br><p><br>Assessment criteria:<br>Understanding of key concepts and contributions (5 pts); Critical analysis and identification of limitations (5 pts); Clarity of explanation (5 pts); Integration with broader course context (5 pts)<br><\/p><br><p>Objective: Develop critical thinking and comprehension of advanced research. Relate a specific paper\u2019s findings to broader course theme<\/p><br><p><br>\u00a0<br><\/p><br><p><br>RETAKE Exam: 100% oral exam<br><\/p>                    <\/div>\n                <\/li>\n                \n                \n            <\/ul>\n        <\/div>\n    <\/div>\n<\/div>    <\/div><\/div><\/section>\n<section\n    id=\"tabpanel-adffcde8-7374-4a50-8d8b-d17f8cbac1e1\"\n    aria-labelledby=\"tab-adffcde8-7374-4a50-8d8b-d17f8cbac1e1\"\n    class=\"tab-panel fade hidden is-hidden\"\n>\n    \n<p><\/p>\n<\/section>\n<\/div>\n<\/div><\/section>\n\n\n<section class=\"section section wp-block-unilux-blocks-quick-link-discover-section\">\n    <div class=\"container xl:max-w-screen-xl\">\n        \n<h2 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"discover-more\"\n    >\nDiscover more<\/h2>\n\n<ul class=\"wp-block-unilux-blocks-quick-link-discover quick-link-list\">\n<li class=\"wp-block-unilux-blocks-quick-link-discover-item\">\n    <a\n                    href=\"https:\/\/www.uni.lu\/life-en\/financial-support\/\"\n                    class=\"quick-link\"\n            target=\"\"\n    >\n            <span class=\"quick-link__container\">\n                <span class=\"quick-link__text\">\n                    Financing possibilities                <\/span>\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>            <\/span>\n    <\/a>\n<\/li>\n\n\n\n<li class=\"wp-block-unilux-blocks-quick-link-discover-item\">\n    <a\n                    href=\"https:\/\/www.uni.lu\/life-en\/accommodation\/\"\n                    class=\"quick-link\"\n            target=\"\"\n    >\n            <span class=\"quick-link__container\">\n                <span class=\"quick-link__text\">\n                    Discover your future home                <\/span>\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>            <\/span>\n    <\/a>\n<\/li>\n\n\n\n<li class=\"wp-block-unilux-blocks-quick-link-discover-item\">\n    <a\n                    href=\"https:\/\/service.uni.lu\/public?id=sn_seve_contact&#038;sys_id=21f444631be41d10466b20a1b24bcb67\"\n                    class=\"quick-link\"\n            target=\"_blank\"\n    >\n            <span class=\"quick-link__container\">\n                <span class=\"quick-link__text\">\n                    Any questions? Contact us                <\/span>\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--external-link \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--external-link\"><\/use><\/svg>            <\/span>\n    <\/a>\n<\/li>\n<\/ul>\n    <\/div>\n<\/section><\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and cyber defence are interdisciplinary fields with theoretical and operational aspects. <\/p>\n<p>Students will acquire a large body of knowledge covering theory, research methods, practices, policies and tools. This will prepare them to identify, understand, report, mitigate, and resolve cybersecurity incidents, while also developing state-of-the-art technologies to increase preparedness and resilience in the face of increasing cyberthreats worldwide.<\/p>\n","protected":false},"author":219,"featured_media":0,"parent":8180,"menu_order":0,"template":"","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"Master in Cybersecurity and Cyber Defence","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"study_program_identifiers":"MCSCD__F1_MA_CSCD__F1_MA_CSCD","override_seo_title":false},"type-of-studies":[],"teaching-languages":[],"field-of-interest":[],"organisation":[],"authorship":[219,326,417],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Master in Cybersecurity and Cyber Defence: Courses | University of Luxembourg<\/title>\n<meta name=\"description\" content=\"The Master Cybersecurity and Cyber Defence is an interdisciplinary programme with theoretical and operational aspects.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Programme\" \/>\n<meta property=\"og:description\" content=\"The Master Cybersecurity and Cyber Defence is an interdisciplinary programme with theoretical and operational aspects.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/\" \/>\n<meta property=\"og:site_name\" content=\"FSTM EN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/fstm.uni.lu\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-20T15:34:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/\",\"url\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/\",\"name\":\"Programme - Master in Cybersecurity and Cyber Defence - FSTM I University of Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#website\"},\"datePublished\":\"2024-02-08T10:51:40+00:00\",\"dateModified\":\"2026-01-20T15:34:10+00:00\",\"description\":\"The Master Cybersecurity and Cyber Defence is an interdisciplinary programme with theoretical and operational aspects.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Faculty of Science, Technology and Medicine\",\"item\":\"https:\/\/www.uni.lu\/fstm-en\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Study Programmes\",\"item\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Master in Cybersecurity and Cyber Defence\",\"item\":\"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Programme\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#website\",\"url\":\"https:\/\/www.uni.lu\/fstm-en\/\",\"name\":\"FSTM\",\"description\":\"Faculty of Science, Technology and Medicine I Uni.lu\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#organization\"},\"alternateName\":\"Faculty of Science, Technology and Medicine I University of Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/fstm-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#organization\",\"name\":\"FSTM - University of Luxembourg I Uni.lu\",\"alternateName\":\"Faculty of Science, Technology and Medicine\",\"url\":\"https:\/\/www.uni.lu\/fstm-en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"FSTM - University of Luxembourg I Uni.lu\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/fstm.uni.lu\/\",\"https:\/\/www.linkedin.com\/showcase\/fstm-uni-lu\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Master in Cybersecurity and Cyber Defence: Courses | University of Luxembourg","description":"The Master Cybersecurity and Cyber Defence is an interdisciplinary programme with theoretical and operational aspects.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/","og_locale":"en_GB","og_type":"article","og_title":"Programme","og_description":"The Master Cybersecurity and Cyber Defence is an interdisciplinary programme with theoretical and operational aspects.","og_url":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/","og_site_name":"FSTM EN","article_publisher":"https:\/\/www.facebook.com\/fstm.uni.lu\/","article_modified_time":"2026-01-20T15:34:10+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/","url":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/","name":"Programme - Master in Cybersecurity and Cyber Defence - FSTM I University of Luxembourg","isPartOf":{"@id":"https:\/\/www.uni.lu\/fstm-en\/#website"},"datePublished":"2024-02-08T10:51:40+00:00","dateModified":"2026-01-20T15:34:10+00:00","description":"The Master Cybersecurity and Cyber Defence is an interdisciplinary programme with theoretical and operational aspects.","breadcrumb":{"@id":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/programme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/en"},{"@type":"ListItem","position":2,"name":"Faculty of Science, Technology and Medicine","item":"https:\/\/www.uni.lu\/fstm-en\/"},{"@type":"ListItem","position":3,"name":"Study Programmes","item":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/"},{"@type":"ListItem","position":4,"name":"Master in Cybersecurity and Cyber Defence","item":"https:\/\/www.uni.lu\/fstm-en\/study-programs\/master-in-cybersecurity-and-cyber-defence\/"},{"@type":"ListItem","position":5,"name":"Programme"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/fstm-en\/#website","url":"https:\/\/www.uni.lu\/fstm-en\/","name":"FSTM","description":"Faculty of Science, Technology and Medicine I Uni.lu","publisher":{"@id":"https:\/\/www.uni.lu\/fstm-en\/#organization"},"alternateName":"Faculty of Science, Technology and Medicine I University of Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/fstm-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/fstm-en\/#organization","name":"FSTM - University of Luxembourg I Uni.lu","alternateName":"Faculty of Science, Technology and Medicine","url":"https:\/\/www.uni.lu\/fstm-en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"FSTM - University of Luxembourg I Uni.lu"},"image":{"@id":"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/fstm.uni.lu\/","https:\/\/www.linkedin.com\/showcase\/fstm-uni-lu"]}]}},"_links":{"self":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/study-programs\/8181"}],"collection":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/study-programs"}],"about":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/types\/study-programs"}],"author":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/users\/219"}],"version-history":[{"count":0,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/study-programs\/8181\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/study-programs\/8180"}],"wp:authorship":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/users\/219"},{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/users\/326"},{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/users\/417"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/media?parent=8181"}],"wp:term":[{"taxonomy":"type-of-studies","embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/type-of-studies?post=8181"},{"taxonomy":"teaching-languages","embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/teaching-languages?post=8181"},{"taxonomy":"field-of-interest","embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/field-of-interest?post=8181"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/organisation?post=8181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}