About the studyprogram
Research-oriented
Students who study Cyber Security at the BTU Cottbus-Senftenberg benefit from an accredited Master's degree based on recognized scientific standards.
Academically qualifying
With the completion of a Master's degree, all doors are open to you - decide for yourself whether you want to pursue a specialized position in industry or a career in science.
Master-Thesis
After a professional internship you set yourself up for your master thesis and you are ready to work on your own scientific work. Your mentor will help you.
System Security
Learn how to protect systems and networks from cyberattacks and prevent hackers from gaining access to sensitive data.
Ethical Hacking
Learn how to hack computers, networks and other systems without forgetting about the subject of ethics.
Legal Framework
Get to know the legal framework and essential legal regulations on the subject of IT security.
Specialize in Cyber Security with a self-designed study plan and use your knowledge from computer science and mathematics to research, explain and design complex security solutions to better protect IT systems. Our master's degree Cyber Security is ideal for a career in IT or for a PhD.
Inform yourself and decide for
your Cyber Security studies at BTU
We provide all the important information about the study program and the start of studies for your decision-making process.
Current modules in semester
Sommersemester 2025 (version from 31.03.2025)
Here you can find all modules and categories offered in this semester. Use our Timetable Creator → to create your individual timetable. If you have questions about the module selection, please contact the FSR or the academic advisor.
11863: Hands on Knowledge for Side Channel Attacks →
11898: Cyber Security Lab →
11899: Cyber Security Application Areas →
12790: Seminar Advanced Topics in Network and System Security →
12973: Network and System Security →
13490: Secure Cyber-Physical Systems →
11862: Pervasive System Security →
11892: Software Security →
11897: Security of Resource-constraint Systems →
12979: Internet Measurements and Forensics →
14035: Application of Side-Channel Analysis Methods in the Earlier Design Phase of Cryptographic Implementations →
12882: Embedded Real-Time Systems →
13690: Hands on Wireless Sensor Network Applications →
11847: Neural Networks and Learning Theory →
11860: Distributed and Parallel Systems II (Concurrency, Replication and Consistency) →
11861: Operating Systems II (Multi-Level Memory Management) →
11864: Wireless Sensor Networks: Concepts, Protocols and Applications →
11881: Foundations of Data Mining →
11886: Dependability and Fault Tolerance →
12431: Designing and Implementing Web Applications →
12975: Internet - Functionality, Protocols, Applications →
12976: Processor Architecture →
12979: Internet Measurements and Forensics →
13513: Communication Networks / Security Research Class →
14021: Explainable Machine Learning →
The provided Modules and Associations are subject to change without notice and may not be complete!