Logo of University of Applied Sciences Upper Austria

BScSecure Information Systems

University of Applied Sciences Upper Austria
Austria, Steyr / Wels / Hagenberg / Linz
More information

fh-ooe.at/..lor/secure-information-systems 

Overview

Interested? To learn more about this study programme, entry requirements and application process, please contact one of our consultants in a country nearest to you.

Programme structure

The training concept in the bachelor’s degree program “Secure Information Systems” is based on the following main topics:

-Network security – the transmission of data over insecure computer networks, such as the Internet, is becoming more and more problematic due to the extensive commercialization of these networks. A well-founded training in the correct use of cryptographic procedures to secure data transmission
is therefore a core area of ​​the SIB degree.

-Data security – the protection of EDP data from manipulation, theft, pirated copies, but also catastrophes, is another focus of the SIB course. The students experience a well-founded state-of-the-art training in the areas of data archiving, backup systems and disaster recovery.

-System security – in addition to the secure transmission of data and the protection of data, the secure operation of computer systems, the physical access protection to the systems and the necessary access control procedures are indispensable in a modern IT landscape. Biometric identification processes, chip cards and RF token systems are the most important electronic authentication systems today. Backup concepts …) and the use of the most modern recognition and authentication procedures are a matter of course in the SIB course.

Career opportunities

The need for well-trained IT security experts is constantly increasing. This means that excellent job prospects can also be forecast for the coming years. Successful students have the whole world open – as can be seen impressively from previous graduates.

In practice, for example, you deal with

the protection of company networks against unauthorized data access,
the detection and defense of cyberspace attacks as well as their forensic analysis,
the implementation of safety-critical and fail-safe software and server systems,
the development of state-of-the-art procedures for protecting corporate knowledge,
the establishment of a secure environment for smooth communication.
IT security experts are active in a wide variety of areas. These range from security officers in companies to specialists in the consulting environment to those responsible for security issues in the public sector.

Apply now! Fall semester 2023/24
Application period has ended
Notes

Please see the university profile or contact us for the deadlines that apply to you

Apply now! Fall semester 2023/24
Application period has ended
Notes

Please see the university profile or contact us for the deadlines that apply to you