Department of Computer Science
FFPT, Wrocław University of Technology
Second degree: computer security speciality
Second degree program in Computer Science at the Faculty of Fundamental Problems of Technology, effective from the academic year 2012/13.
I semester
Code | Name | ETCS | lect. | exer. | lab. | sem. | ZZU | CNPS | | |
E2_I03 | Cryptography | 6 | 2 | 2 | 2 | | 90 | 180 | exam | PDF |
E2_BI01 | System Security I | 6 | 2 | 2 | 2 | | 90 | 180 | test | PDF |
E2_BI02 | Embedded Security Systems | 6 | 2 | | 2 | | 60 | 180 | exam | PDF |
E2_BI03 | Compliance and Operational Security | 5 | 2 | 2 | | | 60 | 150 | exam | PDF |
| Suplementary course 1 | |
| Foreign language course 1 | |
II semester
Code | Name | ETCS | lect. | exer. | lab. | sem. | ZZU | CNPS | | |
E2_BI04 | Cryptography and Security | 6 | 4 | 2 | | | 90 | 180 | exam | PDF |
E2_BI05 | System Security II | 4 | 2 | 1 | 1 | | 60 | 120 | exam | PDF |
| Suplementary course 2 | |
| Suplementary course 3 | |
| Suplementary course 4 | |
| Foreign language course 2 | |
III semester
Code | Name | ETCS | lect. | exer. | lab. | sem. | ZZU | CNPS | | |
E2_I01 | MSc Thesis | 20 | | | | | 0 | 600 | test | PDF |
E2_I07 | MSc Seminar | 4 | | | | 2 | 30 | 120 | test | PDF |
| Suplementary course 5 | |
Suplementary courses
Code | Name | ETCS | lect. | exer. | lab. | sem. | ZZU | CNPS | | |
E2_W01 | On-Line Algorithms | 6 | 2 | 1 | 1 | | 60 | 180 | test | PDF |
E2_W02 | Approximation algorithms | 6 | 2 | 1 | 1 | | 60 | 180 | test | PDF |
E2_W04 | Distributed Algorithms | 6 | 2 | 1 | 1 | | 60 | 180 | test | PDF |
E2_W07 | Constraints technology | 6 | 2 | | 2 | | 60 | 180 | test | PDF |
E2_W08 | Numerical algebra | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W09 | Programming in Logic | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W11 | Declarative Programming | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W12 | Ad Hoc Systems | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W13 | Databases | 6 | 1 | 1 | 2 | | 60 | 180 | test | PDF |
E2_W14 | Data Mining | 6 | 2 | 1 | 1 | | 60 | 180 | test | PDF |
E2_W15 | Applied Stochastics with Applications for Security and Privacy | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W16 | P2P Networks | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W17 | VLSI Systems | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W18 | Digital Signal Processing | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W19 | Introduction to Wireless Telecomunication Systems | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W20 | Introduction to Electronics for Security Engineers | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W21 | Physics for security engineers | 6 | 2 | 1 | 1 | | 60 | 180 | test | PDF |
E2_W22 | Randomized Algorithms | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W24 | Humane-Machine Interaction | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W25 | Identification Systems | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W26 | Monographic Lecture | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W27 | Group Programming Project | 6 | | 2 | 2 | | 60 | 180 | test | PDF |
E2_W28 | High Performance Computing | 6 | 2 | | 2 | | 60 | 180 | test | PDF |