Each module contains 3 ECTS. You choose a total of 10 modules/30 ECTS in the following module categories:
- 12-15 ECTS in technical scientific modules (TSM)
TSM modules teach profile-specific specialist skills and supplement the decentralised specialisation modules.
- 9-12 ECTS in fundamental theoretical principles modules (FTP)
FTP modules deal with theoretical fundamentals such as higher mathematics, physics, information theory, chemistry, etc. They will teach more detailed, abstract scientific knowledge and help you to bridge the gap between abstraction and application that is so important for innovation.
- 6-9 ECTS in context modules (CM)
CM modules will impart additional skills in areas such as technology management, business administration, communication, project management, patent law, contract law, etc.
In the module description (download pdf) you find the entire language information per module divided into the following categories:
This module provides an understanding of the fundamental principles of the security of Operational Technology (OT) in an industrial context. The module will cover the standards, key concepts and methodologies involved in securing OT systems commonly used in industrial environments, such as factories, power plants, and other critical infrastructure.
The module will begin by
exploring particularities of OT systems and the unique security challenges associated with OT environments. Different aspects of OT systems and their implication for security are studied, such as network technology and network architecture. Challenges related to product lifecycle and key management as well as existing solutions to those problems are explored. A specific focus is put on the implementation of standard IEC 62443.
Students should have a basic understanding of computer networks and security concepts. It is recommended that students have completed introductory courses in computer networking and security before taking this module.
Pre-reading material required for specific labs may be provided.
Upon completion of the module, students should be able to
- Understand the unique security challenges associated with OT environments
- Comprehend the main cybersecurity standards related to OT environments
- Identify and assess the risks and threats associated with OT systems
- Understand which security measures are suitable to protect OT systems and how to respond to incidents
Contents of Module
The module will address the following topics:
- An introduction to the particularities of OT systems in comparison to IT systems and Sensor Technology
- Securing OT-relevant aspects of SCADA, DCS & ICS
- Communication technology relevant to OT environment as well as the implications of air-gapped and connected systems
- Threat models for OT systems
- Product lifecycle, in particular issues related to key generation and key management
- Incident Response in an OT context
- The application of Standard IEC 62443, in particular weakness analysis, post-incidence analysis and auditing
Teaching and Learning Methods
In addition to lectures, the module is completed by exercises on simulated OT environments corresponding to industry standards. The exercises will apply the content from the lectures to specific situations inspired by the challenges of real world environments.