Please note! Course description is confirmed for two academic years, which means that in general, e.g. Learning outcomes, assessment methods and key content stays unchanged. However, via course syllabus, it is possible to specify or change the course execution in each realization of the course, such as how the contact sessions are organized, assessment methods weighted or materials used.
In this course, you will become familiar with some timely, scientifically or techically demanding topic in the area of information security.
Schedule: 20.04.2021 - 27.05.2021
Teacher in charge (valid 01.08.2020-31.07.2022): Tuomas Aura, Chris Brzuska, Janne Lindqvist
Teacher in charge (applies in this implementation): Lachlan Gunn
Contact information for the course (valid 18.03.2021-21.12.2112):
Lachlan Gunn (email@example.com)
CEFR level (applies in this implementation):
Language of instruction and studies (valid 01.08.2020-31.07.2022):
Teaching language: English
Languages of study attainment: English
CONTENT, ASSESSMENT AND WORKLOAD
The topics, teachers and timing may change from year to year. Information about the arrangements will be published on the web pages before the beginning of the course.
Applies in this implementation:Many security courses are about how to design your application and configuration to keep your platform secure. This course is the opposite: what can your platform do to make your application secure, and how does it do it? In this course we will discuss security features like containers, mobile permissions, and control flow integrity, give you hands-on experience, and show how they work under the hood.
Assessment Methods and Criteria
Substitutes for Courses
SDG: Sustainable Development Goals
9 Industry, Innovation and Infrastructure
16 Peace and Justice Strong Institutions