studies

M.Sc. in "Distributed Systems, Security and Emerging Information Technologies"

Pervasive Computing Systems and Architectures

1st semester

Network and Communications Security Network and Communications Security

Network and network system security includes all those security methods, techniques and tools that lead to the design, implementation and audit of a structured and well-defined network security pol-icy. The theoretical part of the course includes the analysis of security vulnerabilities in all the net-work layers of TCP/IP and the definition of a network security policy. The practical part of the course includes the practical application of security controls that correctly enforce the security policy such as network and application-layer firewalls, intrusion detection/prevention (IDS/IPS) systems and virtual private networks.

302/Lam.126
+302104142123

Dr. G. Stergiopoulos

Internet of Things and Embedded Systems

- Basic concepts of IoT (technologies, architecture, standards), IoT applications, sensor networks, wireless communication protocols

- Architecture of integrated processors / systems, built-in software, low consumption techniques, wireless protocol communication (BLE, Zigbee)

- Attacks / threats on IoT systems, security of built-in IoT systems / devices

- Laboratory courses for the development of IoT application using a built-in development platform (e.g. integrated communication / IoT platform with a smartphone via Bluetooth)

302, Central Building
+30 210 4142137
fax +30 210 4142472

302/Lam.126
+302104142425

Network and Distributed Systems Modeling

Overview of Fundamental Concepts, Physical Level and Level of Data Linking Telecommunication Networks (SONET / SDH Protocols, DSL), Local Wired and Wireless Networks, ATM Networks Traffic and Traffic Management in IP Networks, Semantic Web - Security in a Network Environment - Attacks, Denial of Service.

Despotis Dimitrios

702/Lam.126
+302104142411

Professor
104/Lam.126
+30 210 4142479 | fax +30 210 4142119

Zormpas Dimitrios

As-a-Service Business Model

Nowadays, more and more companies choose to satisfy their requirements in Enterprise software not by following traditional approaches such as: buying ready software solutions or developing software solutions to meet their business needs. Instead more and more companies choose a software-as-a-service (SaaS) business model to satisfy their needs. Thus, Customer Relationship Management (CRM) solutions, Enterprise Resource Planning (ERP) systems and Supply Chain Management (SCM) systems are provided as software-as-a-service. A SaaS business model provides flexibility to the companies, but also creates new challenges. In this module we analyze these challenges and the new opportunities that arise in this new and dynamic business environment. At the same time we analyze issues that are related to the three basic types of cloud computing: Infrastructure as a service (IaaS), Platform as a service (PaaS) and Software as a service (SaaS).

302, Central Building
+30 210 4142137
fax +30 210 4142472

302/Lam.126
+302104142123

Liagkouras Konstantinos

303/Lam.126

2nd semester

Penetration Testing

Penetration testing includes the controls that aim to test the correct implementation of the network security policy, as well as of the technical security controls and protocols that have been implement-ed. The course includes the analysis of the methodologies and tools that are used for network and system penetration testing. The theoretical part includes the study of penetration testing methodolo-gies and best practices for the network, as well as for the system. The practical part of the course includes the practical application of penetration testing tools, through the examine of realistic cases that are based on real-world security incidents. The goal of these tests is tο validate the effective-ness of the installed security controls.

302/Lam.126
+302104142123

Papageorgiou Spyridon

Pervasive Mobile Systems

Wireless Communication Environment. Mobile Communication Networks. 3rd, 4th and 5th Generation Networks (3G, 4G & 5G). Wireless Transmission, Multiple Access and Channel Capacity. Mobility Management. Communication Management. Radio Reporter Management. Wireless Local Area Networks (802.11x). Mobile IP. Case Networks (Ad hoc). Multi-step networks. Programming and Development of Applications in Wireless Environment and Mobile Devices.

302, Central Building
+30 210 4142137
fax +30 210 4142472

Professor
104/Lam.126
+30 210 4142479 | fax +30 210 4142119

Cloud Computing

In recent years, a new generation of services has emerged based on the idea of the "computing cloud", with the aim of accessing information and data from anywhere and at any time, by limiting or eliminating the need for hardware. The term "cloud computing" refers to the use of computing resources for both hardware and software, using services that are transmitted over the Internet. Cloud computing services are one of the world's largest competing platforms today among computer and software giants such as Google, Amazon and Microsoft, which are vying to gain an advantage in due to a rapidly growing industry. The subject of the course is the acquaintance with the field of computational clouds, as well as the practical design of the infrastructures for their use and operation. The technologies of cloud computing theory are studied, Service Oriented architectures are presented and the necessary equipment for the integration of this technology in the programming tools of modern software technology is given.

302, Central Building
+30 210 4142137
fax +30 210 4142472

Michalas Angelos

Special Topics

Emerging architectures, technologies and algorithms of the 4th Industrial Revolution (Industry 4.0), Models, methodologies and supply chain security systems (Supply Chain Security), Security and privacy in the age of Cybersecurity in Artificial Intelligence and the European Approach, Requirements arising from the European Legislative framework and the technological challenges that arise in matters of cybersecurity and Artificial Intelligence.

502, Central Building
+302104142270 , Phone Number: +30 6944783685 , +32(0) 485064238 , skype: nineta.polemi

Mpousdekis Aleksandros

3rd semester

MSc Thesis