\BOOKMARK [1][-]{section.1}{Gliederung des Studiums und individuelle Schwerpunktbildung}{}% 1 \BOOKMARK [1][-]{section.2}{Kompetenzen in der Informatik}{}% 2 \BOOKMARK [1][-]{section.3}{Modul-Kompetenz-Matrix}{}% 3 \BOOKMARK [1][-]{section.4}{Abk\374rzungen der Studieng\344nge des Fachbereichs Technik}{}% 4 \BOOKMARK [1][-]{section.5}{Modulverzeichnis}{}% 5 \BOOKMARK [2][-]{subsection.5.1}{Pflichtmodule}{section.5}% 6 \BOOKMARK [3][-]{section*.2}{Arbeitstechniken}{subsection.5.1}% 7 \BOOKMARK [3][-]{section*.3}{Einf\374hrung in die Informatik}{subsection.5.1}% 8 \BOOKMARK [3][-]{section*.4}{Hardwaregrundlagen}{subsection.5.1}% 9 \BOOKMARK [3][-]{section*.5}{Java 1}{subsection.5.1}% 10 \BOOKMARK [3][-]{section*.6}{Mathematik 1}{subsection.5.1}% 11 \BOOKMARK [3][-]{section*.7}{Mensch-Computer-Kommunikation}{subsection.5.1}% 12 \BOOKMARK [3][-]{section*.8}{C/C++}{subsection.5.1}% 13 \BOOKMARK [3][-]{section*.9}{Java 2}{subsection.5.1}% 14 \BOOKMARK [3][-]{section*.10}{Mathematik 2}{subsection.5.1}% 15 \BOOKMARK [3][-]{section*.11}{Modellierung}{subsection.5.1}% 16 \BOOKMARK [3][-]{section*.12}{Rechnernetze}{subsection.5.1}% 17 \BOOKMARK [3][-]{section*.13}{Theoretische Informatik}{subsection.5.1}% 18 \BOOKMARK [3][-]{section*.14}{Algorithmen und Datenstrukturen}{subsection.5.1}% 19 \BOOKMARK [3][-]{section*.15}{Datenbanken}{subsection.5.1}% 20 \BOOKMARK [3][-]{section*.16}{Grundlagen der IT-Sicherheit}{subsection.5.1}% 21 \BOOKMARK [3][-]{section*.17}{Hardwarenahe Programmierung}{subsection.5.1}% 22 \BOOKMARK [3][-]{section*.18}{Mathematik 3}{subsection.5.1}% 23 \BOOKMARK [3][-]{section*.19}{Betriebssysteme}{subsection.5.1}% 24 \BOOKMARK [3][-]{section*.20}{Betriebswirtschaft}{subsection.5.1}% 25 \BOOKMARK [3][-]{section*.21}{Internet-Technologien}{subsection.5.1}% 26 \BOOKMARK [3][-]{section*.22}{Rechnerarchitekturen}{subsection.5.1}% 27 \BOOKMARK [3][-]{section*.23}{Softwareprojektmanagement}{subsection.5.1}% 28 \BOOKMARK [3][-]{section*.24}{Data Science}{subsection.5.1}% 29 \BOOKMARK [3][-]{section*.25}{Echtzeitdatenverarbeitung}{subsection.5.1}% 30 \BOOKMARK [3][-]{section*.26}{Projektgruppe}{subsection.5.1}% 31 \BOOKMARK [3][-]{section*.27}{Parallele und verteilte Systeme}{subsection.5.1}% 32 \BOOKMARK [3][-]{section*.28}{Projektarbeit}{subsection.5.1}% 33 \BOOKMARK [3][-]{section*.29}{Recht und Datenschutz}{subsection.5.1}% 34 \BOOKMARK [3][-]{section*.30}{Software-Qualit\344tsmanagement}{subsection.5.1}% 35 \BOOKMARK [3][-]{section*.31}{Praxisphase}{subsection.5.1}% 36 \BOOKMARK [3][-]{section*.32}{Bachelorarbeit}{subsection.5.1}% 37 \BOOKMARK [2][-]{subsection.5.2}{Wahlpflichtmodule}{section.5}% 38 \BOOKMARK [3][-]{section*.33}{WPM Angriffsszenarien und Gegenma\337nahmen}{subsection.5.2}% 39 \BOOKMARK [3][-]{section*.34}{WPM Antennen und Wellenausbreitung}{subsection.5.2}% 40 \BOOKMARK [3][-]{section*.35}{WPM Autonome Systeme}{subsection.5.2}% 41 \BOOKMARK [3][-]{section*.36}{WPM Cisco Networking Academy 1}{subsection.5.2}% 42 \BOOKMARK [3][-]{section*.37}{WPM Cisco Networking Academy 2}{subsection.5.2}% 43 \BOOKMARK [3][-]{section*.38}{WPM Computeranimation}{subsection.5.2}% 44 \BOOKMARK [3][-]{section*.39}{WPM Computergrafik}{subsection.5.2}% 45 \BOOKMARK [3][-]{section*.40}{WPM Digitale Fotografie}{subsection.5.2}% 46 \BOOKMARK [3][-]{section*.41}{WPM Digitaltechnik f\374r Informatik}{subsection.5.2}% 47 \BOOKMARK [3][-]{section*.42}{WPM Drahtlose Sensortechnik}{subsection.5.2}% 48 \BOOKMARK [3][-]{section*.43}{WPM Einf\374hrung in die Simulation elektrischer Schaltungen}{subsection.5.2}% 49 \BOOKMARK [3][-]{section*.44}{WPM Elektroakustik}{subsection.5.2}% 50 \BOOKMARK [3][-]{section*.45}{WPM Elektrokonstruktion mittels EPLAN}{subsection.5.2}% 51 \BOOKMARK [3][-]{section*.46}{WPM Elektromagnetische Vertr\344glichkeit}{subsection.5.2}% 52 \BOOKMARK [3][-]{section*.47}{WPM Englisch}{subsection.5.2}% 53 \BOOKMARK [3][-]{section*.48}{WPM Fotografie und Bildgestaltung}{subsection.5.2}% 54 \BOOKMARK [3][-]{section*.49}{WPM Ger\344tetreiberentwicklung in Linux}{subsection.5.2}% 55 \BOOKMARK [3][-]{section*.50}{WPM HW/SW Codesign}{subsection.5.2}% 56 \BOOKMARK [3][-]{section*.51}{WPM Hardwareentwurf mit VHDL}{subsection.5.2}% 57 \BOOKMARK [3][-]{section*.52}{WPM Hochfrequenztechnik}{subsection.5.2}% 58 \BOOKMARK [3][-]{section*.53}{WPM Interdisziplin\344res Arbeiten}{subsection.5.2}% 59 \BOOKMARK [3][-]{section*.54}{WPM Kalkulation und Teamarbeit}{subsection.5.2}% 60 \BOOKMARK [3][-]{section*.55}{WPM Kommunikation in Marketing und Vertrieb}{subsection.5.2}% 61 \BOOKMARK [3][-]{section*.56}{WPM Kommunikationssysteme}{subsection.5.2}% 62 \BOOKMARK [3][-]{section*.57}{WPM Kryptologie}{subsection.5.2}% 63 \BOOKMARK [3][-]{section*.58}{WPM MATLAB Seminar}{subsection.5.2}% 64 \BOOKMARK [3][-]{section*.59}{WPM Marketing f\374r Ingenieure}{subsection.5.2}% 65 \BOOKMARK [3][-]{section*.60}{WPM Mikrocomputertechnik}{subsection.5.2}% 66 \BOOKMARK [3][-]{section*.61}{WPM Mikrowellenmesstechnik}{subsection.5.2}% 67 \BOOKMARK [3][-]{section*.62}{WPM Netzwerksicherheit \(CCNA Security\)}{subsection.5.2}% 68 \BOOKMARK [3][-]{section*.63}{WPM Produktion Digitaler Medien}{subsection.5.2}% 69 \BOOKMARK [3][-]{section*.64}{WPM Satellitenortung}{subsection.5.2}% 70 \BOOKMARK [3][-]{section*.65}{WPM Softwaresicherheit}{subsection.5.2}% 71 \BOOKMARK [3][-]{section*.66}{WPM Spezielle Themen der Informatik}{subsection.5.2}% 72 \BOOKMARK [3][-]{section*.67}{WPM Spezielle Themen der Nachrichtentechnik}{subsection.5.2}% 73 \BOOKMARK [3][-]{section*.68}{WPM Spezielle Verfahren der IT-Sicherheit}{subsection.5.2}% 74 \BOOKMARK [3][-]{section*.69}{WPM Statistik}{subsection.5.2}% 75 \BOOKMARK [3][-]{section*.70}{WPM Systemprogrammierung}{subsection.5.2}% 76 \BOOKMARK [3][-]{section*.71}{WPM Vertriebsprozesse}{subsection.5.2}% 77 \BOOKMARK [3][-]{section*.72}{WPM Visuelle Effekte}{subsection.5.2}% 78 \BOOKMARK [3][-]{section*.73}{WPM iOS-Programmierung}{subsection.5.2}% 79