Education and Training

University Degrees

  • Habilitation in Computer Science, Faculty of Computer Science and Mathematics, Goethe University Frankfurt, Germany
    Thesis: "Requirements Engineering and Tool-Support for Security and Privacy"
    Habilitation presentation: "Fairness im Maschinellen Lernen"
  • Doctor of Science (Dr. rer. nat.), Department Electrical Engineering and Computer Science, University of Kassel, Germany
    Advisors: Prof. Dr. Lutz Wegner (Interactive Systems and Database Group, University of Kassel, Germany), Prof. Dr. Jan Jürjens (Software Engineering for Critical Systems Group, Technical University Dortmund)
    Thesis: "The Challenge of Authentication in Insecure Environments"
  • Diploma of Computer Science (Dipl.-Inform.), Department of Computer Science, Technical University, Darmstadt, Germany (equivalent to master of computer science)
    Advisors: Prof. Dr. Johannes Buchmann, Dr. Christoph Ludwig (Theoretical Computer Science - Cryptography and Computer Algebra Group, Technical University, Darmstadt)
    Thesis: "Securitymodels for Ajtai-Dwork’s cryptosystem"
  • Diploma of Mathematics (Dipl.-Math.), Department of Mathematics, Technical University, Darmstadt, Germany (equivalent to master of mathematics)
    Advisors: Prof. Dr. Johannes Buchmann, Dr. Christoph Ludwig (Theoretical Computer Science - Cryptography and Computer Algebra Group, Technical University, Darmstadt)
    Thesis: "Securitymodels for Ajtai-Dwork’s cryptosystem"
  • Training and Continuing Education

  • Training and Certificate: ISO/IEC 42001:2023 Lead Implementer by BSI Training Academy
    Topics covered: Requirements and benefits of ISO/IEC 42001:2023, Management System implementation process, Framework for implementing ISO/IEC 42001:2023 following the PDCA cycle, Base line review and gap analysis of current position of an organization, Implement key elements, Identify leadership skills
    Gainning an understanding of effective artificial intelligence management throughout an organization and therefore protection of your information (through integrity, confidentiality and availability) and those of your interested parties. Developing vital processes, policies and procedures that can be put into practice immediately. Creating the framework for your own artificial intelligence management system (AIMS). Gaining knowledge to develop your AIMS framework and build awareness and support for artificial intelligence across your organization. Encouraging continuous professional development across your organization.
  • Training and Certificate: ISO/IEC 42001:2023 Requirements by BSI Training Academy
    Topics covered: Identify the key requirements and benefits of ISO/IEC 42001:2023, Manage requirements for AI systems and drive continual improvement, Ensure that the AIMS is used as a core set of processes in the organization
    Identify the structure and requirements of an effective AIMS and what this means for you. Gain a thorough understanding of the history and development of ISO 42001:2023, key terms, definitions and the ISO harmonized structure. You’ll learn to interpret and apply the key concepts and principles of the standard to existing processes within your organization.
  • Training and Certificate: Certified AI Data Security Specialist by Proofpoint
    Topics covered: GenAI security risks and mitigation
    Proofpoint’s Certified AI Data Security Specialist course equips you with the knowledge to address the most pressing data security and compliance challenges posed by GenAI. You’ll explore key threats and risks, learn the requirements for compliant and secure adoption, and discover practical solutions to protect your organization’s sensitive data from misuse and abuse.
  • Training and Certificate: Embedded Systems Security Expert-Led by Riscure
    Topics covered: Security Engineering, Embedded Systems, Defense Strategy
    The student has learned and sufficiently proven they are able to make effective use of security terminology and concepts, recognize security assets in a given target, rate attacks, list defense methods, identify and determine the relevance of components in an embedded system, evaluate the required security properties of an asset, and evaluate and mitigate the effects of modern threats.
  • Certificate: Certified in Cybersecurity (CC) by ISC2
    The vendor-neutral CC credential starts newcomers on their path to advanced cybersecurity certifications and future leadership roles. It proves to organizations that newly certified team members understand fundamental security principles and operations, network security and access controls and that they have the skills to meet and exceed performance standards in their beginning roles. All this allows organizations to build a stronger line of defense.
  • iTraining and Certificate: The Development and Management of Research Projects at Kassel University and Philipps-University Marburg (152 hours)
    The course is a joint project between Kassel University and Philipps-University Marburg. It is planned as basis for learning integrated with practice to strengthen key skills pertaining for research. The course includes seminars covering the following areas: developping and applying for a project, managing a project, presenting the results, organising a conference, transferring results to the industry. The aim is to provide the participants with skills for developping, applying for and managing projects. It ends with the internal assessment and the succesfull defense of a participant's project proposal.
  • Training and Certificate: Llukas - Didactics of Continuing Higher Education at Kassel University (310 work units)
    Llukas is a modular continuing education certificate program of the didactics of higher education. The course is geared to national standards of continuing education concepts of the didactics of higher education. It provides an opportunity to develop and enrich competencies necessary for instructors at the higher education levels. At the same time, a proof of qualification is earned which certifies pedagogical-didactical competencies. The program includes seminars covering the following areas: teaching and learning, student advisement, testing and grading, evaluating, innovation development, key competencies for teachers, reflection and transfer. Traning includes the development of E-learning competencies which are incorperated across thematic areas.
  • Training and Certificate as Emergency Medical Technician (520 hours) with an additional Voice Radio Training (30 hours)
    The training includes 160 hours theory, 160 hours hands-on training at a hospital, 160 hours hands-on training on an ambulance, and a final course with examination lasting 40 hours. The theoretical part includes basic knowledge regarding anatomy and physiology, general matters and measures of emergency medicine, and special emergency profiency of important areas (e.g. internal medicine, surgery, neurology, psychiatry). Furthermore, the structure of the rescue service, legal and technical issues as well as hands-on exercises of emergency techniques are covered. The hand-on training in the hopital is done in the emergency ambulance, the intensive care unit, and anaesthesia. It teaches medical measures as preparing a fusion, assisting at an intubation, handling pharmaceuticals, and monitoring patients.