Section for Cybersecurity Engineering
The success of digitalization fundamentally depends on the security of the data and computing systems that underpin our daily lives. Cybersecurity plays a central role in ensuring that these data and systems remain secure, resilient, and trustworthy. We focus on and advance the methods, processes, and tools used to design, develop, and analyze secure computing systems. We serve as a key partner for cybersecurity and cryptography research in Denmark and worldwide.
Cybersecurity engineering is concerned with the methods, processes, and technologies required to design, build, and analyze secure computing systems that are accessible through a network, typically the Internet (often known as cyberspace).
Our mission is to strengthen, advance and integrate foundational and applied research in cybersecurity and cryptography in order to anticipate and respond to evolving scientific, technological, and societal challenges.
The mission is realized through a strong synergy between cutting-edge research and research-driven education.
Through our educational activities, we prepare future engineers, scientists, and IT professionals with the theoretical foundations, practical methodologies, and state-of-the-art technologies needed to securely develop, deploy, and operate complex networked computing systems.
Education: Cybersecurity Specialization!
As society becomes increasingly dependent on computer systems, from controlling critical infrastructure to providing public services over the Web, the importance of protecting against cyber threats from criminals, industrial espionage and cyber terrorism has grown dramatically.
Our Cybersecurity specialization in the MSc in Computer Science and Engineering equips students with the essential knowledge and skills to address the secure design, development, deployment, and operation of interconnected computer systems across open, dynamic, and heterogeneous networks.
The specialization involves various key cybersecurity topics, including advanced courses on ethical hacking, risk management, incident response, usable security and privacy, and cryptography (including post-quantum cryptography).