Please note! Course description is confirmed for two academic years (1.8.2018-31.7.2020), which means that in general, e.g. Learning outcomes, assessment methods and key content stays unchanged. However, via course syllabus, it is possible to specify or change the course execution in each realization of the course, such as how the contact sessions are organized, assessment methods weighted or materials used.
After taking the course, students are familiar with the key concepts and abstractions of information security and understand the purpose, function and weaknesses of several security technologies. They are able to model threats and analyze the security of a system critically, from the viewpoint of an attacker. Moreover, they can identify common security flaws in software and apply principles of secure programming.
Schedule: 13.09.2016 - 27.10.2016
Teacher in charge (valid 01.08.2020-31.07.2022): Tuomas Aura
Teacher in charge (applies in this implementation): Tuomas Aura
Contact information for the course (applies in this implementation):
CEFR level (applies in this implementation):
Language of instruction and studies (valid 01.08.2020-31.07.2022):
Teaching language: English
Languages of study attainment: English
CONTENT, ASSESSMENT AND WORKLOAD
Security models and terminology, authentication, access control, software security, cryptography, network security, threat analysis, identity management, privacy, security policies and regulation.
Assessment Methods and Criteria
Hands-on exercises, examination.
5 cr (133 h). Lectures 24 h, exercises 60 h, independent study 49 h.
Reading material will be recommended during the course.
Programming skills, broad knowledge computer-science concepts.
SDG: Sustainable Development Goals
4 Quality Education
9 Industry, Innovation and Infrastructure
16 Peace and Justice Strong Institutions