MSE Master of Science in Engineering

The Swiss engineering master's degree


Each module contains 3 ECTS. You choose a total of 10 modules/30 ECTS in the following module categories: 

  • 12-15 ECTS in technical scientific modules (TSM)
    TSM modules teach profile-specific specialist skills and supplement the decentralised specialisation modules.
  • 9-12 ECTS in fundamental theoretical principles modules (FTP)
    FTP modules deal with theoretical fundamentals such as higher mathematics, physics, information theory, chemistry, etc. They will teach more detailed, abstract scientific knowledge and help you to bridge the gap between abstraction and application that is so important for innovation.
  • 6-9 ECTS in context modules (CM)
    CM modules will impart additional skills in areas such as technology management, business administration, communication, project management, patent law, contract law, etc.

In the module description (download pdf) you find the entire language information per module divided into the following categories:

  • instruction
  • documentation
  • examination 
Cyber Security Operations (TSM_CyberSecOp)

This module is designed to provide a practical introduction to Cyber Security Operations. Students will learn about different operational security functions like SOCs, CERTs, DFIR teams, CTI and Hunt teams, Red and Blue teams, and the tools they use to detect and respond to cyber criminal activity. The module provides in depth coverage of digital forensics.

Prerequisites

Students should have a basic understanding of the fundamentals of cybersecurity, including network security, system security, and cryptography. Additionally, they should have a good understanding of operating systems, and network architecture. Basic knowledge of OSINT would also be beneficial.

Learning Objectives

Upon completion of the module, students should be able to:

  • Understand operational cyber security roles and responsibilities within an organization,
  • Explain basic concepts of detection, incident response, threat intelligence, and security testing.
  • Perform digital evidence preservation and forensic analysis, conduct investigations
  • Write forensic/incident reports for different recipients (police, regulators, management, technical peers)
  • Restore an organization to a safe and operational state
  • Understand how ethical hacking can be used to improve the security of systems

Contents of Module

DFIR: Digital Forensics and Incident Response (DFIR) is the main focus of the module. This includes securing and preserving digital evidence, forensic analysis, reconstructing past events, creating timelines, and performing investigations.

Detection:
students will be introduced to logging and monitoring systems, intrusion and anomaly detection systems (HIDS and NIDS), and Security Information and Event Management (SIEM) systems, and other operational aspects of detection.

CTI: students will be introduced to Cyber Threat Intelligence (CTI), the intelligence process and lifecycle, intel sharing communities, intel / IOC exchange platforms (like MISP), and OSINT.

Security testing:
The testing component covers a high level overview of penetration/Red-Team testing, security reviews, cyber excercises, and ethical hacking. The use of Bug-Bounty programs to improve security is also explained

Teaching and Learning Methods

Lectures with a mix of practical and theoretical exercises.

Literature

The following material is provided:

  • Teacher's slides and notes
  • Selected publications (papers, books)
  • Relevant videos


 

Download full module description

Back