LEARNING OUTCOMES
The goal in this seminar-format course is to learn about the guiding technical principles behind cybersecurity governance and management, and apply them critically to systems using operational technology / industrial automation and machine learning components. These technologies that are used in business processes which are based on different understanding of risk models and threat models. The participant will learn to think critically, what kind of cybersecurity governance or management principles are valid e.g. in OT systems emphasizing availability, or machine learning systems which are highly dependent on data.
In this special course, the participants will learn about the most common cybersecurity management/governance standards, and the upcoming risk management frameworks for e.g. operational technology (OT) and artificial intelligence (AI) and judge them critically with respect to business processes.
Credits: 3
Schedule: 29.02.2024 - 06.06.2024
Teacher in charge (valid for whole curriculum period):
Teacher in charge (applies in this implementation): Mikko Kiviharju
Contact information for the course (applies in this implementation):
Instructor: Prof. of Practice Mikko Kiviharju, Please contact on the Aalto email for any questions regarding the course.
Department of Computer Science, Aalto University
29.2 - 23.5. (Exam on 6.6. )
Thursdays 14:15 – 16:00 in T3 (Exam at 13:00 in T1)
Credits: 3 cr
CEFR level (valid for whole curriculum period):
Language of instruction and studies (applies in this implementation):
Teaching language: English. Languages of study attainment: English, Finnish
DETAILS
Substitutes for Courses
valid for whole curriculum period:
Prerequisites
valid for whole curriculum period:
FURTHER INFORMATION
Further Information
valid for whole curriculum period:
Target groups: CCIS track Algorithms, Logic, and Computation and track Security and Cloud Computing), SECCLO.
The maximum number of students in the course is 25. In the event of applicants exceeding the maximum number, students with existing studies or curriculums in cybersecurity and computer sciences are prioritized.