<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="et">
	<id>http://courses.cs.taltech.ee/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jaan</id>
	<title>Kursused - Kasutaja kaastöö [et]</title>
	<link rel="self" type="application/atom+xml" href="http://courses.cs.taltech.ee/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jaan"/>
	<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/pages/Eri:Kaast%C3%B6%C3%B6/Jaan"/>
	<updated>2026-04-06T18:04:35Z</updated>
	<subtitle>Kasutaja kaastöö</subtitle>
	<generator>MediaWiki 1.35.9</generator>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=ITC8050&amp;diff=3085</id>
		<title>ITC8050</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=ITC8050&amp;diff=3085"/>
		<updated>2015-10-06T14:46:41Z</updated>

		<summary type="html">&lt;p&gt;Jaan: /* 30.09 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Background ==&lt;br /&gt;
&lt;br /&gt;
As of Fall semester of 2015 ITC8050 replaces the ITX8062 course in the IVCM curriculum. It is mandatory for both specializations: cyber security and digital forensics.&lt;br /&gt;
&lt;br /&gt;
The course is intended for third or fourth semester students.&lt;br /&gt;
&lt;br /&gt;
= Strategic and Operational Aspects of Cyber Security = &lt;br /&gt;
&lt;br /&gt;
== Admin notes for 2015 Fall semester ==&lt;br /&gt;
&lt;br /&gt;
=== Where and when? ===&lt;br /&gt;
Room ICT-A1, 1745-2100 on Wednesdays, odd weeks only.&lt;br /&gt;
&lt;br /&gt;
== Instructors ==&lt;br /&gt;
&lt;br /&gt;
[http://www.linkedin.com/in/rainottis Rain Ottis], PhD, Associate Professor at TUT&lt;br /&gt;
&lt;br /&gt;
Jaan Priisalu, Researcher at TUT&lt;br /&gt;
&lt;br /&gt;
Practice led by Bernhards Blumbergs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Contacts: &lt;br /&gt;
rain dot ottis at ttu dot ee&lt;br /&gt;
jaan dot priisalu at ttu dot ee&lt;br /&gt;
&lt;br /&gt;
= Schedule =&lt;br /&gt;
&lt;br /&gt;
The lecture topic order may change depending on the availability of lecturers. Please check this wiki page before each lecture for the most up-to-date information.&lt;br /&gt;
&lt;br /&gt;
== 02.09 ==&lt;br /&gt;
Course introduction. Slides: [https://drive.google.com/file/d/0B7yq33Gize8yOVVzNkcwejFOQmc/view?usp=sharing (pdf)]&lt;br /&gt;
&lt;br /&gt;
Assignment of individual research topics.&lt;br /&gt;
&lt;br /&gt;
== 16.09 ==&lt;br /&gt;
Lecture covering the main actors in cyber conflict.&lt;br /&gt;
&lt;br /&gt;
Reading: Sun-Tzu&amp;#039;s Art of War: Chapters 1-3. (If you know your enemy and know yourself...)&lt;br /&gt;
&lt;br /&gt;
== 30.09 ==&lt;br /&gt;
Lecture about what should be protected and why in a digital society.&lt;br /&gt;
&lt;br /&gt;
[[Meedia:ITC8050-JP1.pdf]]&lt;br /&gt;
&lt;br /&gt;
== 14.10 ==&lt;br /&gt;
Lecture about how different aspects of cyber security fit together (technical, processes, people).&lt;br /&gt;
&lt;br /&gt;
== 28.10 ==&lt;br /&gt;
Lecture on incident handling and risk management.&lt;br /&gt;
&lt;br /&gt;
== 11.11 ==&lt;br /&gt;
Tabletop exercise preparation.&lt;br /&gt;
&lt;br /&gt;
== 25.11 ==&lt;br /&gt;
Tabletop exercise.&lt;br /&gt;
&lt;br /&gt;
== 09.12 ==&lt;br /&gt;
Course summary. Feedback.&lt;/div&gt;</summary>
		<author><name>Jaan</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Fail:ITC8050-JP1.pdf&amp;diff=3084</id>
		<title>Fail:ITC8050-JP1.pdf</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Fail:ITC8050-JP1.pdf&amp;diff=3084"/>
		<updated>2015-10-06T14:44:08Z</updated>

		<summary type="html">&lt;p&gt;Jaan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jaan</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=ITC8050&amp;diff=3079</id>
		<title>ITC8050</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=ITC8050&amp;diff=3079"/>
		<updated>2015-10-06T14:38:49Z</updated>

		<summary type="html">&lt;p&gt;Jaan: /* Instructors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Background ==&lt;br /&gt;
&lt;br /&gt;
As of Fall semester of 2015 ITC8050 replaces the ITX8062 course in the IVCM curriculum. It is mandatory for both specializations: cyber security and digital forensics.&lt;br /&gt;
&lt;br /&gt;
The course is intended for third or fourth semester students.&lt;br /&gt;
&lt;br /&gt;
= Strategic and Operational Aspects of Cyber Security = &lt;br /&gt;
&lt;br /&gt;
== Admin notes for 2015 Fall semester ==&lt;br /&gt;
&lt;br /&gt;
=== Where and when? ===&lt;br /&gt;
Room ICT-A1, 1745-2100 on Wednesdays, odd weeks only.&lt;br /&gt;
&lt;br /&gt;
== Instructors ==&lt;br /&gt;
&lt;br /&gt;
[http://www.linkedin.com/in/rainottis Rain Ottis], PhD, Associate Professor at TUT&lt;br /&gt;
&lt;br /&gt;
Jaan Priisalu, Researcher at TUT&lt;br /&gt;
&lt;br /&gt;
Practice led by Bernhards Blumbergs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Contacts: &lt;br /&gt;
rain dot ottis at ttu dot ee&lt;br /&gt;
jaan dot priisalu at ttu dot ee&lt;br /&gt;
&lt;br /&gt;
= Schedule =&lt;br /&gt;
&lt;br /&gt;
The lecture topic order may change depending on the availability of lecturers. Please check this wiki page before each lecture for the most up-to-date information.&lt;br /&gt;
&lt;br /&gt;
== 02.09 ==&lt;br /&gt;
Course introduction. Slides: [https://drive.google.com/file/d/0B7yq33Gize8yOVVzNkcwejFOQmc/view?usp=sharing (pdf)]&lt;br /&gt;
&lt;br /&gt;
Assignment of individual research topics.&lt;br /&gt;
&lt;br /&gt;
== 16.09 ==&lt;br /&gt;
Lecture covering the main actors in cyber conflict.&lt;br /&gt;
&lt;br /&gt;
Reading: Sun-Tzu&amp;#039;s Art of War: Chapters 1-3. (If you know your enemy and know yourself...)&lt;br /&gt;
&lt;br /&gt;
== 30.09 ==&lt;br /&gt;
Lecture about what should be protected and why in a digital society.&lt;br /&gt;
&lt;br /&gt;
== 14.10 ==&lt;br /&gt;
Lecture about how different aspects of cyber security fit together (technical, processes, people).&lt;br /&gt;
&lt;br /&gt;
== 28.10 ==&lt;br /&gt;
Lecture on incident handling and risk management.&lt;br /&gt;
&lt;br /&gt;
== 11.11 ==&lt;br /&gt;
Tabletop exercise preparation.&lt;br /&gt;
&lt;br /&gt;
== 25.11 ==&lt;br /&gt;
Tabletop exercise.&lt;br /&gt;
&lt;br /&gt;
== 09.12 ==&lt;br /&gt;
Course summary. Feedback.&lt;/div&gt;</summary>
		<author><name>Jaan</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Courses&amp;diff=3077</id>
		<title>Courses</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Courses&amp;diff=3077"/>
		<updated>2015-10-06T14:37:24Z</updated>

		<summary type="html">&lt;p&gt;Jaan: Lisasin ITC8050&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* [[Hybrid Systems]]&lt;br /&gt;
* [[Malware:ITX8042:2015| Malware (ITX8042)]]&lt;br /&gt;
* [[Malware:ITX8060:2015| Malware2 (ITX8060)]]&lt;br /&gt;
* [[ModernOS:2015 | Overview of Modern Operating systems ITV005 ]]&lt;br /&gt;
* [[Cyber Defense Monitoring Solutions|Cyber Defense Monitoring Solutions (ITX8071)]]&lt;br /&gt;
* [[ITI0130|Formal Methods (ITI0130,ITI8530)]]&lt;br /&gt;
* [[ITI8610|Tarkvara töökindlus / Software Assurance (ITI8610)]]&lt;br /&gt;
* [[ITC8050|Strategic and Operational Aspects of Cyber Security (ITC8050)]]&lt;/div&gt;</summary>
		<author><name>Jaan</name></author>
	</entry>
</feed>