During your Master’s in Computer Science, you will earn a total of 120 EC within two years. In addition to the mandatory course Computer Ethics, you will take four mandatory specialisation courses, advanced specialisation coursers, and elective courses. As part of the electives, you can also do an optional internship, take courses from other specialisations and programmes, or study abroad. You will complete your Master's by writing your master’s thesis.
Structure
Year 1 and 2 | Number | |
---|---|---|
Mandatory course | 5 EC | |
Core specialisation courses | 20 EC | |
Advanced specialisation courses | At least | Examples of advanced specialisation courses are: |
Profiling space | 25 EC | Some examples of how you can fill up your profiling space:
|
Individual final year project | 40 EC |
|
Total EC | 120 EC |
Internship
In the second year of your Master’s in Computer Science, you can choose to do an internship. This way, you can apply the knowledge and skills you have acquired during your studies at an accounting firm, a government agency, a bank, or an IT security company in the Netherlands or abroad. The EEMCS faculty at the University of Twente has connections with a large number of research institutes, corporations, and start-ups where you can do your internship project.
Previous students have done internships at:
- Software development companies such as Cofano Software Solutions BV and Juniper Networks
- Companies such as NetScout that provide cybersecurity and business intelligence solutions
- International IT services and consulting companies such as Accenture, Deloitte, and KMPG
Master's thesis
You will complete your Master’s by writing your master’s thesis. You can either do an external master’s thesis at a company or at another higher education institute or conduct research within one of the EEMCS research groups, especially at Design and Analysis of Communication Systems (DACS) or Semantics, Cybersecurity, and Services (SCS). You can, for example, investigate how personal data is collected through the use of cookies on a smart TV and come up with a technique that blocks the collection of data without disconnecting from the internet. Or you can focus your master’s thesis on developing ontologies to design and implement security protocols that prevent data breaches. Also, you can examine cryptographic techniques and protocols used in remote attestation, a mechanism that proves the identity of a software and its trustworthiness.