Master in Information and Computer Sciences
The first semester is an orientation semester with a set of common courses for all students that establish a firm foundation for more specialised courses. In semesters 2 and 3, profiles define compulsory and recommended courses. Depending on the number of selected profiles she/he chooses further courses from the respective semester catalogue below. In each semester at least 30 ECTS have to be covered. In the semester 4, the student writes a master thesis, usually in the context of a research project. A cooperation with industry is possible for the master thesis. |
Semester 1 (Winter 2023-2024)
Lecture (hours)![]() | Exercise (hours)![]() | ECTS![]() | ||
---|---|---|---|---|
TOTAL (mandatory / optional)![]() | 0 / 0 | 0 / 0 | 0 / 0 | |
Algorithmic Number Theory [F1_MA_MAT_GM-6] (optional) |
Module 1.1 - Theoretical Foundations | 30 | 3 | |
Foundations of Computing [MICS2-6] |
Module 1.1 - Theoretical Foundations | 30 | 3 | |
Communication Theory [MICS2-7] |
Module 1.2 - Communication and Networking | 30 | 3 | |
Networking [MICS2-8] |
Module 1.2 - Communication and Networking | 30 | 3 | |
Distributed Systems [MICS2-2] |
Module 1.3 - Distributed Systems | 30 | 3 | |
Intelligent Systems - Agents and Reasoning [MICS2-36] |
Module 1.4 - Intelligent and Adaptive Systems | 30 | 3 | |
Intelligent Systems - Machine learning [MICS2-62] |
Module 1.4 - Intelligent and Adaptive Systems | 30 | 3 | |
Intelligent Systems - Problem Solving [MICS2-38] |
Module 1.4 - Intelligent and Adaptive Systems | 20 | 10 | 3 |
Information Security Basics [MICS2-3] |
Module 1.5 - Information Security Basics | 30 | 3 | |
Reliable software-intensive systems [MICS2-47] |
Module 1.6 - Reliable software-intensive systems | 22 | 8 | 3 |
Semester 2 (Summer 2022-2023)
Lecture (hours)![]() | Exercise (hours)![]() | ECTS![]() | ||
---|---|---|---|---|
TOTAL (mandatory / optional)![]() | 0 / 0 | 0 / 0 | 0 / 0 | |
Principles of Software Development [MICS2-50] (optional) |
Module 2.1 - Principles of Software Development | 30 | 15 | 5 |
Algorithms for Numbers and Public-Key Cryptography [MICS2-14] (optional) |
Module 2.2 - Algorithms for Numbers and Public-Key Cryptography | 45 | 5 | |
Formal Methods [MICS2-22] (optional) |
Module 2.3 - Formal Methods | 45 | 5 | |
Big Data Analytics [MICS2-41] (optional) |
Module 2.4 - Big Data Analytics | 30 | 30 | 5 |
Information Theory and Coding [MICS2-20] (optional) |
Module 2.5 - Information Theory and Coding | 45 | 5 | |
Intelligent Agents I [MICS2-21] (optional) |
Module 2.6 - Intelligent Agents I | 45 | 14 | 5 |
Knowledge Discovery and Data Mining [MICS2-13] (optional) |
Module 2.7 - Knowledge Discovery and Data Mining | 30 | 15 | 5 |
Computational Complexity Theory [MICS2-51] (optional) |
Module 2.8 - Computational Complexity Theory | 45 | 5 | |
Optimisation for Computer Science [MICS2-17] (optional) |
Module 2.9 - Optimisation for Computer Science | 45 | 5 | |
Principles of Security Engineering [MICS2-24] (optional) |
Module 2.10 - Principles of Security Engineering | 45 | 5 | |
Quality of Service in Computer Networks [MICS2-23] (optional) |
Module 2.11 - Quality of Service in Computer Networks | 45 | 5 | |
Symmetric Key Cryptography and Security of Communications [MICS2-12] (optional) |
Module 2.12 - Symmetric Key Cryptography and Security of Communications | 45 | 5 | |
Introduction to Static Program Analysis [MICS2-40] (optional) |
Module 2.13 - Introduction to Static Program Analysis | 45 | 5 | |
Software Vulnerabilities: Exploitation and Mitigation [MICS2-44] (optional) |
Module 2.14 - Software Vulnerabilities: Exploitation and Mitigation | 45 | 5 | |
Virtual and Aumented Reality [MICS2-56] (optional) |
Module 2.15 - Virtual and Augmented Reality | 45 | 5 | |
Designing Interactive Systems [MICS2-55] (optional) |
Module 2.16 - Designing Interactive Systems | 45 | 5 | |
Microkernel Based Systems [MICS2-57] (optional) |
Module 2.17 - Microkernel Based Systems | 45 | 5 |
Semester 3 (Winter 2023-2024)
Lecture (hours)![]() | Exercise (hours)![]() | ECTS![]() | ||
---|---|---|---|---|
TOTAL (mandatory / optional)![]() | 0 / 0 | 0 / 0 | 0 / 0 | |
Intellectual Property [MICS-COMMSYST-022] |
Module 3.1 - Intellectual Property | 30 | 3 | |
Advanced Project Management [MICS-COMMSYST-027] |
Module 3.2 - Advanced Project Management | 30 | 3 | |
Cryptocurrencies and the Cryptographic Blockchain [MICS2-42] (optional) |
Module 3.5 - Cryptocurrencies and the Cryptographic Blockchain | 30 | 4 | |
Coding theory [MICS-COMMSYST-023] (optional) |
Module 3.6 - Coding theory | 30 | 4 | |
Autonomous Robot Software [MICS2-31] (optional) |
Module 3.8 - Autonomous Robot Software | 30 | 4 | |
Intelligent Agents II [MICS-47] (optional) |
Module 3.9 - Intelligent Agents II | 30 | 4 | |
Machine Learning [MICS-39] (optional) |
Module 3.10 - Machine Learning | 30 | 4 | |
Model-Driven Software Development [MICS-32] (optional) |
Module 3.12 - Model-Driven Software Development | 30 | 4 | |
Selected Topics in Network and System Security [MICS-COMMSYST-025] (optional) |
Module 3.13 - Selected Topics in Network and System Security | 30 | 4 | |
Open Network Security [MICS-41] (optional) |
Module 3.14 - Open Network Security | 30 | 4 | |
Parallel and Grid Computing [MICS-COMMSYST-024] (optional) |
Module 3.15 - Parallel and Grid Computing | 16 | 15 | 4 |
Security Modelling [MICS2-29] (optional) |
Module 3.16 - Security Modelling | 30 | 4 | |
Security Protocols [MICS-SECURTRUST-014] (optional) |
Module 3.17 - Security Protocols | 24 | 6 | 4 |
Selected topics in Artificial Intelligence [MICS-IAS-024] (optional) |
Module 3.18 - Selected topics in Artificial Intelligence | 30 | 4 | |
Software Engineering Environments [MICS2-33] (optional) |
Module 3.19 - Software Engineering Environments | 10 | 20 | 4 |
Testing and Validation [MICS-43] (optional) |
Module 3.21 - Testing and Validation | 26 | 4 | 4 |
Computer Vision and Image Analysis [MICS2-46] (optional) |
Module 3.24 - Computer Vision and Image Analysis | 56 | 4 | |
Connected and Autonomous Vehicles [MICS2-48] (optional) |
Module 3.25 - Connected and Autonomous Vehicles | 30 | 4 | |
Fundamentals of causal learning [MICS2-49] (optional) |
Module 3.26 - Fundamentals of causal learning | 30 | 4 | |
Fault and Intrusion Tolerant Systems [MICS2-53] (optional) |
Module 3.27 - Fault and Intrusion Tolerant Systems | 35 | 4 | |
Advanced Public-Key Encryption [MICS2-59] (optional) |
Module 3.29 - Advanced Public-Key Encryption | 30 | 4 | |
Post-quantum Cryptography [MICS2-60] (optional) |
Module 3.30 - Post-quantum Cryptography | 30 | 4 | |
Green IT [MICS2-63] (optional) |
Module 3.31 - Green IT | 15 | 4 |
Semester 4 (Summer 2022-2023)
Lecture (hours)![]() | Exercise (hours)![]() | ECTS![]() | ||
---|---|---|---|---|
TOTAL (mandatory / optional)![]() | 0 / 0 | 0 / 0 | 0 / 0 | |
Master thesis [MICS2-30] |
Module 4.1 | 30 |