Download our brochure

Master in Information and Computer Sciences

The first semester is an orientation semester with a set of common courses for all students that establish a firm foundation for more specialised courses.

In semesters 2 and 3 she/he chooses 4 courses from the selected track and two more courses from other tracks.

In the semester 4, the student writes a master thesis, usually in the context of a research project. A cooperation with industry is possible for the master thesis.

Semester 2 (Summer 2019-2020)

Lecture (hours)Exercise (hours)ECTS
TOTAL (mandatory / optional) 0 / 0 0 / 0 0 / 0
Algorithmic Decision Theory
[MICS2-18]
  (optional)
Module 2.145 5
Algorithms for Numbers and Public-Key Cryptography
[MICS2-14]
  (optional)
Module 2.245 5
Dependable Systems
[MICS2-16]
  (optional)
Module 2.345 5
Formal Methods
[MICS2-22]
  (optional)
Module 2.445 5
Big Data Analytics
[MICS2-41]
  (optional)
Module 2.530 30 5
Information Theory and Coding
[MICS2-20]
  (optional)
Module 2.645 5
Intelligent Agents I
[MICS2-21]
  (optional)
Module 2.745 14 5
Knowledge Discovery and Data Mining
[MICS2-13]
  (optional)
Module 2.830 15 5
Networked Feedback Systems
[MICS2-15]
  (optional)
Module 2.1030 15 5
Optimisation for Computer Science
[MICS2-17]
  (optional)
Module 2.1145 5
Principles of Security Engineering
[MICS2-24]
  (optional)
Module 2.1245 5
Quality of Service in Computer Networks
[MICS2-23]
  (optional)
Module 2.1345 5
Symmetric Key Cryptography and Security of Communications
[MICS2-12]
  (optional)
Module 2.1445 5
Introduction to Static Program Analysis
[MICS2-40]
  (optional)
Module 2.1545 5
Software Vulnerabilities: Exploitation and Mitigation
[MICS2-44]
  (optional)
Module 2.1645 5

Semester 3 (Winter 2020-2021)

Lecture (hours)Exercise (hours)ECTS
TOTAL (mandatory / optional) 0 / 0 0 / 0 0 / 0
Intellectual Property
[MICS-COMMSYST-022]
Module 3.130 3
Coding theory
[MICS-COMMSYST-023]
Module 3.630 4
Advanced Project Management
[MICS-COMMSYST-027]
Module 3.230 3
Computational Statistics
[MICS2-26]
  (optional)
Module 3.430 4
Cryptocurrencies and the Cryptographic Blockchain
[MICS2-42]
  (optional)
Module 3.530 4
Advanced Database Topics
[MICS2-43]
  (optional)
Module 3.730 4
Autonomous Robot Software
[MICS2-31]
  (optional)
Module 3.830 4
Intelligent Agents II
[MICS-47]
  (optional)
Module 3.930 4
Machine Learning
[MICS-39]
  (optional)
Module 3.1030 4
Management of Information Security
[MICS-S-1]
  (optional)
Module 3.1130 4
Model-Driven Software Development
[MICS-32]
  (optional)
Module 3.1230 4
Selected Topics in Network and System Security
[MICS-COMMSYST-025]
  (optional)
Module 3.1330 4
Open Network Security
[MICS-41]
  (optional)
Module 3.1430 4
Parallel and Grid Computing
[MICS-COMMSYST-024]
  (optional)
Module 3.1516 30 4
Security Modelling
[MICS2-29]
  (optional)
Module 3.1630 4
Security Protocols
[MICS-SECURTRUST-014]
  (optional)
Module 3.1724 6 4
Selected topics in Artificial Intelligence
[MICS-IAS-024]
  (optional)
Module 3.1830 4
Software Engineering Environments
[MICS2-33]
  (optional)
Module 3.1910 20 4
Testing and Validation
[MICS-43]
  (optional)
Module 3.2126 4 4
Computer Vision and Image Analysis
[MICS2-46]
  (optional)
Module 3.2430 4
Connected and Autonomous Vehicles
[MICS2-48]
  (optional)
Module 3.2530 4
Fundamentals of causal learning
[MICS2-49]
  (optional)
Module 3.2630 4

Semester 4 (Summer 2019-2020)

Lecture (hours)Exercise (hours)ECTS
TOTAL (mandatory / optional) 0 / 0 0 / 0 0 / 0
Master thesis
[MICS2-30]
Module 4.1 30