1. Semester 2. Semester 3. Semester 4. Semester Cybercrime I ... [PDF]

Grundlagen der. Mobilfunkforensik. Navigationsgeräte und. Geoinformationssysteme. KOMPLEXPRAKTIKUM. (2/1/1). (2/2/0). (

5 downloads 39 Views 198KB Size

Recommend Stories


1. semester 2. semester
Everything in the universe is within you. Ask all from yourself. Rumi

Fall Semester Spring Semester
Knock, And He'll open the door. Vanish, And He'll make you shine like the sun. Fall, And He'll raise

Semester
If you want to become full, let yourself be empty. Lao Tzu

semester
Your big opportunity may be right where you are now. Napoleon Hill

Semester
No matter how you feel: Get Up, Dress Up, Show Up, and Never Give Up! Anonymous

Semester
Courage doesn't always roar. Sometimes courage is the quiet voice at the end of the day saying, "I will

semester
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

Semester
You can never cross the ocean unless you have the courage to lose sight of the shore. Andrè Gide

Semester
Don't be satisfied with stories, how things have gone with others. Unfold your own myth. Rumi

Semester
At the end of your life, you will never regret not having passed one more test, not winning one more

Idea Transcript


Qualifizierungslinie Netzwerkforensik

Qualifizierungslinie Mobile Forensics

Qualifizierungslinie Elektronische Forensik

Qualifizierungslinie Compliance

Qualifizierungslinie Modellierung/ Dunkelfeldforschung Qualifizierungslinie Kryptologie

Qualifizierungslinie Softwarearchitektur Qualifizierungslinie Höhere Konzepte der Informatik

1. Semester Cybercrime I (2/0/2)

2. Semester Cybercrime II (2/0/2)

3. Semester Social Engineering and OSINT (1/0/3)

Grundlagen der Mobilfunkforensik

Navigationsgeräte und Geoinformationssysteme

KOMPLEXPRAKTIKUM

(2/1/1)

(2/2/0)

(2/2/0)

Internet of Things

Embedded Systems Forensics und Speichertechnologien

Car Forensic

(2/2/1)

(2/1/1)

(0/2/2)

IT-Governance

IT-Compliance

Der Sachverständige vor Gericht

(2/2/0)

(2/2/0)

(1/3/0)

Stochastic Models (engl.) (2/1/1) Foundations of Modern Cryptography (engl.) (2/1/1)

Computational Intelligence (engl.) (2/1/1)

4. Semester

Masterprojekt

Predictive Policing/ Dunkelfeld (2/0/2)

Cryptanalysis (engl.)

Digitale Werte und Güter

(2/2/0)

(2/0/2)

Datenbankprogrammierung

Softwarepraktikum

Entwurf sicherer Systeme

(2/0/2)

(0/0/4)

(2/0/2)

Datennetze/ Cloud Forensik

Datenkompression

Intelligente Videoanalyse

(2/0/2) (0/2/2) (2/2/0) (30 Credits) 24 SWS (30 Credits) 24 SWS (30 Credits) 24 SWS (30 Credits) Jeder Studierende wählt durch seine Belegung im 1. Fachsemester sechs Qualifizierungslinien aus! Für die Studienrichtung Cybercrime sind die Qualifizierungslinien Netzwerkforensik und Mobile Forensics (hier gelb) verpflichtend. Für die Studienrichtung Cybersecurity sind die Qualifizierungslinien Softwarearchitektur und Höhere Konzepte der Informatik (hier blau) verpflichtend. Die fehlenden vier Qualifizierungslinien können aus den allgemeinen Linien (hier weiß) und den Qualifizierungslinien zur jeweils anderen Studienrichtung gewählt werden. Werden die vier Qualifizierungslinien Netzwerkforensik, Mobile Forensics, Softwarearchitektur und Höhere Konzepte der Informatik (gelb und blau) belegt, sind beide Studienrichtungen ausgewählt.

Qualification line Network forensics Qualification line Mobile Forensics

Qualification line Electronic forensics Qualification line Compliance Qualification line Modeling/ Darkfield research Qualification line Cryptology Qualification line Software architecture Qualification line Higher concepts of computer science

1st semester Cybercrime I (2/0/2) Fundamentals of mobile communications (2/1/1)

2nd semester Cybercrime II (2/0/2) Navigation devices and geoinformation systems (2/2/0) Embedded Systems Forensics and storage technologies (2/1/1) IT-Compliance (2/2/0) Computational Intelligence (engl.) (2/1/1)

3rd semester Social Engineering and OSINT (1/0/3)

Cryptanalysis (engl.)

Digital values and goods

(2/2/0) Software internship (0/0/4)

(2/0/2) Design of safe systems (2/0/2)

Data networks/ cloud Forensic

Data compression

Intelligent video analysis

(2/0/2) 24 SWS (30 Credits)

(0/2/2) 24 SWS (30 Credits)

(2/2/0) 24 SWS (30 Credits)

Internet of Things (2/1/1) IT-Governance (2/2/0) Stochastic Models (engl.) (2/1/1) Foundation of Modern Cryptography (engl.) (2/1/1) Database programming (2/0/2)

4th semester

Complex practical work (2/2/0) Car Forensic (0/2/2) The surveyor in court (1/3/0) Predictive Policing/ darkfield

Master Project

(2/0/2)

(30 Credits)

The students choose 6 out of 8 qualification lines. The qualification lines marked with a (*) place a strong focus on the field of cybercrime/ IT-forensics. If these two lines are occupied, the main emphasis will be on uncovering evidence on electronic lanes. The qualification lines, marked with a (+) focus the area of cybersecurity/ IT security. If these two lines are occupied, the students work more on the design of complex informatics systems. This includes databases and multimedia applications. Qualification lines without a marking complement both aspects very well and enable the students to center on their own and to specialize. By selecting the qualification lines, the students choose one of two courses of study. If the qualification lines of network forensics and mobile forensics are chosen, the course of study called "Cybercrime". If the qualification lines of software architecture and higher concepts of computer science are proven, the course of studies is called "cybersecurity". Through the occupancy of the four qualification levels mentioned above, it is also possible to prove both fields of study.

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.