Department of Computer Science
  FICT, Wrocław University of Technology
 
Second degree: cryptography and computer security speciality
Second degree program in Algorithmic Computer Science at the Faculty of Fundamental Problems of Technology, effective from the academic year 2019/20.
I semester
| Code | Name | ECTS | lect. | exer. | lab. | sem. | ZZU | CNPS |  |  | 
|---|
| E2_BI01 | System Security I | 6 | 2 | 2 | 2 |  | 90 | 180 | test | PDF | 
| E2_BI03 | Compliance and Operational Security | 4 | 2 | 2 |  |  | 60 | 120 | exam | PDF | 
| E2_I03 | Cryptography | 5 | 2 | 2 | 1 |  | 75 | 150 | exam | PDF | 
|  | Supplementary course 1 | 6 | 2 | 2 |  | 60 | 180 | test |  | 
|  | Supplementary course 2 | 6 | 2 | 2 |  | 60 | 180 | test |  | 
|  | Social lecture | 3 | 2 |  |  |  | 30 | 90 | test |  | 
II semester
| Code | Name | ECTS | lect. | exer. | lab. | sem. | ZZU | CNPS |  |  | 
|---|
| E2_BI02 | Embedded Security Systems | 5 | 2 |  | 2 |  | 60 | 150 | exam | PDF | 
| E2_BI04 | Cryptography and Security | 6 | 4 | 2 |  |  | 90 | 180 | exam | PDF | 
| E2_BI05 | System Security II | 3 | 2 | 1 | 1 |  | 60 | 90 | exam | PDF | 
|  | Supplementary course 3 | 6 | 2 | 2 |  | 60 | 180 | test |  | 
|  | Supplementary course 4 | 6 | 2 | 2 |  | 60 | 180 | test |  | 
|  | Humanistic lecture | 2 | 1 |  |  |  | 15 | 60 | test |  | 
|  | Physics | 1 | 1 |  |  |  | 15 | 30 | test |  | 
|  | Foreign language (B2+) | 1 |  | 1 |  |  | 15 | 30 | test |  | 
III semester
| Code | Name | ECTS | lect. | exer. | lab. | sem. | ZZU | CNPS |  |  | 
|---|
| E2_I01 | MSc Thesis | 20 |  |  |  |  | 0 | 600 | test | PDF | 
| E2_I07 | MSc Seminar | 2 |  |  |  | 2 | 30 | 60 | test | PDF | 
|  | Supplementary course 5 | 6 | 2 | 2 |  | 60 | 180 | test |  | 
|  | Foreign language 2 (A1 or A2) | 2 |  | 3 |  |  | 45 | 60 | test |  | 
Supplementary courses
| Code | Name | ECTS | lect. | exer. | lab. | sem. | ZZU | CNPS |  |  | 
|---|
| E2_W04 | Distributed Algorithms | 6 | 2 | 1 | 1 |  | 60 | 180 | test | PDF | 
| E2_W14 | Data Mining | 6 | 2 | 1 | 1 |  | 60 | 180 | test | PDF | 
| E2_W15 | Applied Stochastic with Applications for Security and Privacy | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W17 | VLSI Systems | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W18 | Digital Signal Processing | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W19 | Introduction to Wireless Telecommunication Systems | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W20 | Introduction to Electronics for Security Engineers | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W21 | Physics for security engineers | 6 | 2 | 1 | 1 |  | 60 | 180 | test | PDF | 
| E2_W25 | Identification Systems | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W26 | Monographic Lecture | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W27 | Group Programming Project | 6 |  | 2 | 2 |  | 60 | 180 | test | PDF | 
| E2_W31 | Security in Cloud Computing | 6 | 2 |  | 2 |  | 60 | 180 | test | PDF | 
| E2_W34 | Elliptic curves | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W36 | Monographic Lecture on Computer Security | 6 | 2 | 1 | 1 |  | 60 | 180 | test | PDF | 
| E2_W39 | Algebraic Aspects of Cryptography | 6 | 2 | 2 |  |  | 60 | 180 | test | PDF | 
| E2_W40 | Efficiency and Security Aspects of Cryptographic Algorithms | 6 | 2 | 1 | 1 |  | 60 | 180 | test | PDF |