Department of Computer Science
FICT, Wrocław University of Technology
Second degree: cryptography and computer security speciality
Second degree program in Algorithmic Computer Science at the Faculty of Fundamental Problems of Technology, effective from the academic year 2019/20.
I semester
Code | Name | ECTS | lect. | exer. | lab. | sem. | ZZU | CNPS | | |
E2_BI01 | System Security I | 6 | 2 | 2 | 2 | | 90 | 180 | test | PDF |
E2_BI03 | Compliance and Operational Security | 4 | 2 | 2 | | | 60 | 120 | exam | PDF |
E2_I03 | Cryptography | 5 | 2 | 2 | 1 | | 75 | 150 | exam | PDF |
| Supplementary course 1 | 6 | 2 | 2 | | 60 | 180 | test | |
| Supplementary course 2 | 6 | 2 | 2 | | 60 | 180 | test | |
| Social lecture | 3 | 2 | | | | 30 | 90 | test | |
II semester
Code | Name | ECTS | lect. | exer. | lab. | sem. | ZZU | CNPS | | |
E2_BI02 | Embedded Security Systems | 5 | 2 | | 2 | | 60 | 150 | exam | PDF |
E2_BI04 | Cryptography and Security | 6 | 4 | 2 | | | 90 | 180 | exam | PDF |
E2_BI05 | System Security II | 3 | 2 | 1 | 1 | | 60 | 90 | exam | PDF |
| Supplementary course 3 | 6 | 2 | 2 | | 60 | 180 | test | |
| Supplementary course 4 | 6 | 2 | 2 | | 60 | 180 | test | |
| Humanistic lecture | 2 | 1 | | | | 15 | 60 | test | |
| Physics | 1 | 1 | | | | 15 | 30 | test | |
| Foreign language (B2+) | 1 | | 1 | | | 15 | 30 | test | |
III semester
Code | Name | ECTS | lect. | exer. | lab. | sem. | ZZU | CNPS | | |
E2_I01 | MSc Thesis | 20 | | | | | 0 | 600 | test | PDF |
E2_I07 | MSc Seminar | 2 | | | | 2 | 30 | 60 | test | PDF |
| Supplementary course 5 | 6 | 2 | 2 | | 60 | 180 | test | |
| Foreign language 2 (A1 or A2) | 2 | | 3 | | | 45 | 60 | test | |
Supplementary courses
Code | Name | ECTS | lect. | exer. | lab. | sem. | ZZU | CNPS | | |
E2_W04 | Distributed Algorithms | 6 | 2 | 1 | 1 | | 60 | 180 | test | PDF |
E2_W14 | Data Mining | 6 | 2 | 1 | 1 | | 60 | 180 | test | PDF |
E2_W15 | Applied Stochastic with Applications for Security and Privacy | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W17 | VLSI Systems | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W18 | Digital Signal Processing | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W19 | Introduction to Wireless Telecommunication Systems | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W20 | Introduction to Electronics for Security Engineers | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W21 | Physics for security engineers | 6 | 2 | 1 | 1 | | 60 | 180 | test | PDF |
E2_W25 | Identification Systems | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W26 | Monographic Lecture | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W27 | Group Programming Project | 6 | | 2 | 2 | | 60 | 180 | test | PDF |
E2_W31 | Security in Cloud Computing | 6 | 2 | | 2 | | 60 | 180 | test | PDF |
E2_W34 | Elliptic curves | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W36 | Monographic Lecture on Computer Security | 6 | 2 | 1 | 1 | | 60 | 180 | test | PDF |
E2_W39 | Algebraic Aspects of Cryptography | 6 | 2 | 2 | | | 60 | 180 | test | PDF |
E2_W40 | Efficiency and Security Aspects of Cryptographic Algorithms | 6 | 2 | 1 | 1 | | 60 | 180 | test | PDF |