Loading...
hidden

View Mobile version

Meta navigation

Startseite – Hochschule Luzern

Language selection and important links

  • Contents
  • Contact
  • Login
  • De
  • En
Search

Main navigation

School navigation

  • Engineering and Architecture
  • Business
  • Computer Science
  • Social Work
  • Design, Film and Art​
  • Music
  • Health Sciences

Sub-navigation

  • Degree Programmes
  • Continuing Education
  • Research
  • International
  • Events
  • Campus
  • About us

Sub-navigation

  • Modules

Breadcrumbs

  1. Computer Science Computer Science
  2. Degree Programmes Degree Programmes
  3. Master's Master's
  4. Master of Science in Information and Cyber Security Master of Science in Information and Cyber Security
  5. Modules Modules

Modules What to expect in your studies

Learn about the building blocks—known as modules—that make up the program.

  1. Technical Core Modules
  2. Security and Technology Management
  3. Writing and Communication Skills
hidden

Technical Core Modules

Core modules impart essential subject knowledge and methodological skills.

more

Advanced Patterns for Cyber Security Architecture (3 ECTS, E. Richter)
Large and complex cyber systems, often spanning from legacy to cloud systems, are difficult to maintain and operate, including all questions on cyber security. Interactions of systems in distributed environments are challenging to design and design flaws may lead to serious issues in cyber security. The lecture discusses reducing complexity, robustness and resilience in building complex cyber environments. The focus will be on methodology, models, classifications, system analysis independent of specific technologies or environments. We will reflect case studies and practical use cases and explore patterns and anti-patterns of cyber security architecture.

Advanced System Security (3 ECTS, B. Egger) 
This course covers the challenges of system security, focusing on Linux environments and C-based programming. Topics include foundational attacks like buffer overflows and advanced exploitation techniques such as Return-Oriented Programming (ROP). Participants will explore modern tools like eBPF for real-time system monitoring and analyze high-stakes issues like supply chain security and kernel vulnerabilities. Case studies, including the Rowhammer attack and recent software supply chain compromises, will illustrate real-world implications. The course combines theoretical insights with hands-on exercises, equipping participants to identify, exploit, and mitigate complex security threats.
 
Security Management (3 ECTS, F. Heinzmann)
Security Management is a critical discipline that must be integrated holistically at the highest levels of an organization to ensure its desired impact and effectiveness. This principle applies to all types of businesses, from large multinational corporations to small and medium-sized enterprises (SMEs). 
This lecture establishes the foundation for semester 2 of this Master's program by equipping participants with the technical, organizational, and interpersonal skills required to comprehend, design, and implement governance, risk, and compliance processes within a comprehensive security management framework.
 
Forensic Analysis in Unknown Environments (3 ECTS, H. Spichiger)
Modern computer systems are generally large, complex, fulfill a wide range of tasks, and change on a regular basis because of frequent updates. This poses a challenge to forensic analyses attempting to reconstruct events related to an incident in such environments. They may be faced with devices they have never seen before, proprietary data structures and undocumented behavior. This course provides participants with a methodological framework for this challenge, presenting approaches, challenges, and risks linked to investigations in unknown environments. In practical exercises, participants will study undocumented systems with the aim to reconstruct activities within these environments.
 
Performing a Red Team Operation (3 ECTS, M. Bollhalder/F. Wamser)
This lecture will focus on the planning, setup of infrastructure and execution of a red team operation. It addresses setting up your own red team platform (command and control (C2), redirectors, etc.) using open-source tools. Further, it will look at how to evade detection, escalate privileges, and move laterally within a demo lab network. 
Advanced Software Protection on Critical Systems (3 ECTS, T. Blazytko)
Critical systems form the backbone of modern society, driving essential operations in sectors like healthcare, automotive, and defense. Failure or compromise in these systems can lead to devastating consequences—financial, operational, or even human. As such, they are prime targets for attackers aiming to exploit vulnerabilities, tamper with functionality, or undermine system integrity. Safeguarding these systems requires advanced software protection techniques that extend beyond conventional security practices to ensure resilience against such threats.
Software protection involves implementing measures that thwart reverse engineering efforts and shield software from unauthorized use and tampering. While commercial vendors use these techniques to prevent piracy and enforce licensing agreements, malicious actors employ them to obfuscate malware functionality, evading detection and analysis. In critical systems, the stakes are exponentially higher, as the impact of a successful attack could compromise safety, security, or mission-critical objectives. This course bridges the gap between theoretical foundations and practical applications, preparing students to design, analyze, and improve software protection strategies that uphold the integrity and confidentiality of critical systems.
Students will gain hands-on experience in crafting robust protections and analyzing advanced attacks, developing a skill set highly sought after in industries like cybersecurity, defense, automotive, and critical infrastructure.
 
Advanced Binary Reverse Engineering (3 ECTS, T. Blazytko)
Modern software reverse engineering requires a cohesive understanding of multiple, complementary methods. It spans a wide range of goals—from vulnerability research and malware analysis to software validation and digital forensics—and must account for diverse platforms, architectures, and protections. This course introduces advanced concepts that bridge traditional static analysis, runtime exploration, and constraint-based reasoning, forming a unified approach to dissecting complex binaries. Students will learn how intermediate representations streamline cross-architecture understanding, how dynamic instrumentation complements static insights, and how symbolic execution and SMT-solving provide deep, systematic guidance. The curriculum also highlights emerging AI-based approaches that, when integrated thoughtfully, can assist in semi-automated analysis workflows.
By connecting these methods, students will gain both a conceptual and practical toolkit. They will learn not only to apply each technique individually but also to orchestrate them effectively, enabling more informed decisions, quicker insights, and a broader perspective on reverse engineering tasks. This holistic understanding positions graduates to handle the complexities of modern binaries with confidence and precision.
 
Security Operations Technology & Management (3 ECTS, Mark Barwinski)
This course explores Cyber Operations' origins in intelligence agencies and their evolution into modern enterprise security operations centers (SOCs). We will assess critical SOC technology components—including SIEM, EDR, NDR, and SOAR platforms - examining their integration for effective threat monitoring and response. The course evaluates operational considerations including staffing models, workflow optimization, and the application of SOC-CMM and other maturity frameworks alongside MITRE ATT&CK and NIST SP 800-61 to improve detection capabilities and incident handling. Through case studies and projects, students develop skills to design and optimize security operations in complex environments.

hidden

Security and Technology Management

Security and Technology Management is an important component of Cyber Security in studies because it enables students to understand and apply the strategic planning and integration of security technologies within an organization. Additionally, it imparts the skills to proactively manage risks and effectively communicate security strategies, which is crucial for protecting digital infrastructures.

more

Security Technology Management (3 ECTS, M. Barwinski)
This lecture discusses the strategic planning, selection, integration, and management of cybersecurity technologies within an organization. It also covers network security management, including policy enforcement, resource allocation, and incident response management.

Strategic Technical Security Management Principles (3 ECTS, F. Heinzmann)
This lecture covers the establishment of a comprehensive security ecosystem, including planning, implementing, monitoring, and controlling security measures, and the development of effective security policies and procedures. It also addresses the use of security intelligence, designing and measuring security indicators, and managing security reporting, escalation, and crisis communication.

Organizational and Cultural Aspects of Security (3 ECTS, D. Frei + invited guest lecturers from the industry)
This lecture focuses on setting up an effective security organization, managing key stakeholders, and defining roles and responsibilities using models like RACI. It also emphasizes workforce strategies for attracting and retaining top talent and embedding a strong security culture within the organization.

hidden

Writing and Communication Skills

Writing and communication skills are an important part of cybersecurity studies, as they enable professionals to effectively convey complex technical information to diverse audiences, from technical teams to executives. Additionally, these skills help in creating clear reports and documentation, which are crucial for analyzing security incidents and developing security policies.

more

IT Rhetoric’s for Security and Risk Management in Practice (3 ECTS, S. Kowalski, H. Wiese)
The information security responsible needs to constantly adapt to the evolving communication eco-system in their organization and the world. They need to use many different types of tools ranging from simple PPTs to ChatGPT to be heard. However regardless of the technological medium used to communicate there are classical principes of rhetoric’s that can be applied to communicate and argue for cybersecurity solutions and problems. In this course the students will learn how to argue for and against cybersecurity issues and investments using classical argumentation techniques embedded into modern media technology.

Scientific, Technical and Legal Writing (3 ECTS, U. Uttinger, B. Hämmerli)
The three different types of reports, Scientific, Technical and Legal Writing, will be introduced, including subclassification, as e.g. in legal writing this means: for court, audit-report, interna investigation etc. Examples are given and exercise (case studies) will provide skills for writing in job function.

Broad Communication Skills (3 ECTS, F. Heinzmann)
The information security responsible needs many types of different communications: to the general workforce, to IT, to audit, to executive management, to the board, to media, to shareholders etc. These broad and different styles are introduced, and examples (good and bad) will be given for training. In case students will write their own text, which will be discussed on strength and weaknesses in-depth.

  • Master of Science in Information and Cyber Security
  • Modules

Footer(s)

FH Zentralschweiz

Social media links

  •  Instagram
  •  LinkedIn
  •  TikTok
  •  Facebook
  •  YouTube
  •  Flickr

Contact

Logo Lucerne School of Computer Science and Information Technology

Lucerne School of Computer Science and Information Technology


Campus Zug-Rotkreuz
6343

+41 41 349 30 70

informatik@hslu.ch

Direct entry

  • Bachelor’s Degree
  • Master’s Degree
  • Prospective Students (Continuing & Executive Programmes)
  • Unternehmen & Institutionen
  • Media Relations
  • For Students
  • For Employees

Quick link

  • People Finder
  • University Buildings & Campus Locations
  • News
  • Library of Computer Science and Business
  • Events
  • Jobs and Careers
  • Hiring Rooms
  • Blog
  • Informatik Newsletter

Static links

  • Newsletter
  • Data protection notice
  • Publishing Acknowledgements
Logo Swissuniversities

QrCode

QrCode