Please note! Course description is confirmed for two academic years, which means that in general, e.g. Learning outcomes, assessment methods and key content stays unchanged. However, via course syllabus, it is possible to specify or change the course execution in each realization of the course, such as how the contact sessions are organized, assessment methods weighted or materials used.

LEARNING OUTCOMES

The goal in this seminar-format course is to learn about the guiding technical principles behind cybersecurity governance and management, and apply them critically to systems using operational technology / industrial automation and machine learning components. These technologies that are used in business processes which are based on different understanding of risk models and threat models. The participant will learn to think critically, what kind of cybersecurity governance or management principles are valid e.g. in OT systems emphasizing availability, or machine learning systems which are highly dependent on data.

In this special course, the participants will learn about the most common cybersecurity management/governance standards, and the upcoming risk management frameworks for e.g. operational technology (OT) and artificial intelligence (AI) and judge them critically with respect to business processes.

Credits: 3

Schedule: 29.02.2024 - 06.06.2024

Teacher in charge (valid for whole curriculum period):

Teacher in charge (applies in this implementation): Mikko Kiviharju

Contact information for the course (applies in this implementation):

Instructor: Prof. of Practice Mikko Kiviharju, Please contact on the Aalto email for any questions regarding the course.

Department of Computer Science, Aalto University

29.2 - 23.5. (Exam on 6.6. )

Thursdays 14:15 – 16:00 in T3 (Exam at 13:00 in T1)

Credits: 3 cr 


CEFR level (valid for whole curriculum period):

Language of instruction and studies (applies in this implementation):

Teaching language: English. Languages of study attainment: English, Finnish

DETAILS

Substitutes for Courses
Prerequisites

FURTHER INFORMATION

Further Information
  • valid for whole curriculum period:

    Target groups: CCIS track Algorithms, Logic, and Computation and track Security and Cloud Computing), SECCLO.

    The maximum number of students in the course is 25. In the event of applicants exceeding the maximum number, students with existing studies or curriculums in cybersecurity and computer sciences are prioritized.