Vous êtes sur la page 1sur 2

Print: LULEÅ GRAFISK A, LULEÅ 2007

Contact

PROGRAMME
COORDINATOR:

Production: JOB REKL AMBYRÅ Photo: PEDER SUNDSTRÖM, PER PETTERSSON


Lars Furberg,
lars.furberg@ltu.se,
tel: +46 (0)920-49 17 30

HEAD TEACHER:
Harriet Nilsson,
harriet.nilsson@ltu.se,
tel: +46 (0)920-49 16 86 Information,
application LULEÅ UNIVERSITY OF
and contact
TECHNOLOGY
LULEÅ UNIVERSITY OF TECHNOLOGY has an annual turnover of more than EUR 140 million. Today the
University has 1,600 employees and about 14,000 students. Research is carried out in close coopera-
tion with companies such as Shell, Ericsson, Ford/Volvo, LKAB, Airbus, Volvo Aero and IBM and with the
University’s international partners such as MIT and Stanford University. This research has a turnover of
Information is available at
more than EUR 67 million. Luleå University of Technology provides world-class research and education.
www.systemvetenskap.ltu.se/application
To find out how to apply for the pro-
gramme, visit the website and look
under the appropriate link.

LULEÅ UNIVERSITY OF
TECHNOLOGY MSc programme with a Major in

Information security
LULEÅ UNIVERSITY OF TECHNOLOGY has an annual turnover of more than EUR 140 million.
Today the University has 1,600 employees and about 14,000 students. Research is carried out in
MASTER
close cooperation with companies such as Shell, Ericsson, Ford/Volvo, LKAB, Airbus, Volvo Aero
PROGRAM
and IBM and with the University’s international partners such as MIT and Stanford University.
This research has a turnover of more than EUR 67 million. Luleå University of Technology provi-
des world-class research and education.

ADDRESS: Luleå University of Technology, SE-97187 Luleå, Sweden


PHONE: +46 920 49 10 00 (reception).
DEADLINES AND APPLICATION FORM CAN BE FOUND AT: www.systemvetenskap.ltu.se/application A DDRE S S : LULEÅ UNIVERSITY OF TECHNOLOGY,
SE-97187 LULEÅ, SWEDEN
MASTER
PROGRAM
MASTER’S DEGREE IN INFORMATION SECURITY
For corporations and public-sector bodies, information is a valuable asset. Protecting informa-
tion has become a vital task. The Master’s degree programme in Information Security will give
Labour market
As the number of networks and databases increases with the and address security issues. Parallel to the growth of E-servi-
you knowledge of how information is protected and how information security is managed. expansion of global information systems, security aspects ces, there is a growing demand for secure management and
become all the more crucial and complex. The marketing and verification of identities in situations where public authorities
sale of goods and services via the Internet presents a demand and public-sector bodies communicate with citizens via the
for personnel who are able to develop new security systems Internet.
Year 1: We define the concepts of information security: Year 2: Throughout the entire second year of studies,
safety, critical systems, security classification, vulnera- your work on a thesis project in cooperation with a local
bility, risk management and risk analysis, etc. You will company or organization will involve both practical work
study techniques for transferring information between
individuals and how information can be achieved safely
and writing. You will learn more about secure E-services,
critical systems and Internet security. Important com- Distance studies
and securely, professional roles in which security is cruci- ponents are control and management of security, which
Your distance studies will entail communication with
al, standards of information security, and current research entail e.g., security planning and continuity planning
teachers and other students via e-mail, videoconferen-
in the field. Important aspects of security also include as tools for minimizing the cost of damage incurred in
cing, telephone, chatting and other appropriate means. An
collaboration and decision-making. In addition, security the event of disruptions in operations. Other important
important medium for distance studies will be the course
problems associated with so-called E-services will be aspects are the formulation and implementation of secu-
room provided by Fronter, the joint web-based teaching
considered. Your first year of studies will conclude with rity policy.
platform at Luleå University of Technology. Here, informa-
independent project work in a company. Courses are designed so that you are always in contact with the tion including course information, study guides, links and
companies and organizations in which your newly acquired theo- class lists will be provides. Via Fronter, you will submit your
retical knowledge can be applied. This will allow you to make the assignments. Here, you will also be able to access your
connection between theory and practice. study results and your personal portfolio.
Some teaching and certain meetings will take place with
the aid of Marratech, which is a computer-based video-
COURSES
conferencing tool. Lectures given via Marratech will be
recorded. This means that you will be able to view lectures,
“The university’s teachers
even if you were not present when they were given. For
and students are very coo- YEAR 1 AUG-OCT NOV-JAN JAN-MARCH MARCH-JUNE
e.g., project meetings and examinations, attendance/active
perative and polite. Now
Knowledge Management Data Communication Safe E-services I Business Case Project participation is compulsory. The client software for Mar-
that I have completed my
– Informations Security in Information Systems ratech is provided free of charge and is available for most
studies, I would really like
7,5 ECTS 7,5 ECTS 7,5 ECTS 15 ECTS common operating systems.
to give something to Swe-
den in return.” Information Security Safety I Scientific Methods You must have access to a computer in a location
Tariq Latif, 7,5 ECTS 7,5 ECTS 7,5 ECTS where you are authorized to install software, as well as an
Master´s Degree Internet connection with capacity for at least 1 Mb/s. In
addition, you will require a headset, microphone and web of choice with respect to study methods and the time and
YEAR 2 AUG-OCT NOV-JAN JAN-MARCH MARCH-JUNE camera. location of your studies. Each section will be concluded
Master Thesis Each course consists of several sections, blocks or with an examination, although in some cases, the section
in Information Security themes. Sections usually begin with a lecture. For each exams may be part of the final examination for the course.
30 ECTS course section, there is a study guide with a description of Some sections primarily involve individual assignments
course objectives, suggested activities, literature and study for which there will be opportunity for collaboration and
Internet Security Strategic Security Safe E-services II Safety II guidance. You work through each course section with the discussion with classmates, while other sections will entail
and IT-management aid of the study guide. You will have considerable freedom project work or smaller group assignments.
7,5 ECTS 7,5 ECTS 7,5 ECTS 7,5 ECTS

MASTER
PROGRAM

Vous aimerez peut-être aussi