Department of Computer Science
  FFPT, Wrocław University of Technology
 
Second degree: computer security speciality
Second degree program in Computer Science at the Faculty of Fundamental Problems of Technology, effective from the academic year 2012/13.
I semester
| Code | Name | ETCS | lect. | exer. | lab. | sem. | ZZU | CNPS |  |  | 
|---|
| E2_I03 | Cryptography | 6 | 2 | 2 | 2 |  | 90 | 180 | exam | PDF | 
| E2_BI01 | System Security I | 6 | 2 | 2 | 2 |  | 90 | 180 | test | PDF | 
| E2_BI02 | Embedded Security Systems | 6 | 2 |  | 2 |  | 60 | 180 | exam | PDF | 
| E2_BI03 | Compliance and Operational Security | 5 | 2 | 2 |  |  | 60 | 150 | exam | PDF | 
|  | Suplementary course 1 |  | 
|  | Foreign language course 1 |  | 
II semester
| Code | Name | ETCS | lect. | exer. | lab. | sem. | ZZU | CNPS |  |  | 
|---|
| E2_BI04 | Cryptography and Security | 6 | 4 | 2 |  |  | 90 | 180 | exam | PDF | 
| E2_BI05 | System Security II | 4 | 2 | 1 | 1 |  | 60 | 120 | exam | PDF | 
|  | Suplementary course 2 |  | 
|  | Suplementary course 3 |  | 
|  | Suplementary course 4 |  | 
|  | Foreign language course 2 |  | 
III semester
| Code | Name | ETCS | lect. | exer. | lab. | sem. | ZZU | CNPS |  |  | 
|---|
| E2_I01 | MSc Thesis | 20 |  |  |  |  | 0 | 600 | test | PDF | 
| E2_I07 | MSc Seminar | 4 |  |  |  | 2 | 30 | 120 | test | PDF | 
|  | Suplementary course 5 |  | 
Suplementary courses
| Code | Name | ETCS | lect. | exer. | lab. | sem. | ZZU | CNPS |  |  | 
|---|
| E2_W01 | On-Line Algorithms | 6 | 2 | 1 | 1 |  | 60 | 180 | test | PDF | 
| E2_W02 | Approximation algorithms | 6 | 2 | 1 | 1 |  | 60 | 180 | test | PDF | 
| E2_W04 | Distributed Algorithms | 6 | 2 | 1 | 1 |  | 60 | 180 | test | PDF | 
| E2_W07 | Constraints technology | 6 | 2 |  | 2 |  | 60 | 180 | test | PDF | 
| E2_W08 | Numerical algebra | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W09 | Programming in Logic | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W11 | Declarative Programming | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W12 | Ad Hoc Systems | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W13 | Databases | 6 | 1 | 1 | 2 |  | 60 | 180 | test | PDF | 
| E2_W14 | Data Mining | 6 | 2 | 1 | 1 |  | 60 | 180 | test | PDF | 
| E2_W15 | Applied Stochastics with Applications for Security and Privacy | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W16 | P2P Networks | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W17 | VLSI Systems | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W18 | Digital Signal Processing | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W19 | Introduction to Wireless Telecomunication Systems | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W20 | Introduction to Electronics for Security Engineers | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W21 | Physics for security engineers | 6 | 2 | 1 | 1 |  | 60 | 180 | test | PDF | 
| E2_W22 | Randomized Algorithms | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W24 | Humane-Machine Interaction | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W25 | Identification Systems | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W26 | Monographic Lecture | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W27 | Group Programming Project | 6 |  | 2 | 2 |  | 60 | 180 | test | PDF | 
| E2_W28 | High Performance Computing | 6 | 2 |  | 2 |  | 60 | 180 | test | PDF |