Erinevus lehekülje "ITC8050" redaktsioonide vahel

Allikas: Kursused
Mine navigeerimisribale Mine otsikasti
42. rida: 42. rida:
  
 
== 3 ==
 
== 3 ==
Lecture about what should be protected and why in a digital society.
+
Lecture  
 
 
[[Meedia:ITC8050-JP1.pdf]]
 
  
 
== 4 ==
 
== 4 ==
Lecture about how different aspects of cyber security fit together (technical, processes, people).
+
Lecture  
 
 
Tabletop exercise introduction brief. Slides [[Meedia:Tabletop_intro_brief_RO.pdf]]
 
  
 
== 5 ==
 
== 5 ==
Lecture on incident handling and risk management.
+
Lecture  
  
 
== 6 ==
 
== 6 ==
58. rida: 54. rida:
  
 
== 7 ==
 
== 7 ==
 +
Tabletop exercise preparation.
 +
 +
== 8 ==
 
Tabletop exercise.
 
Tabletop exercise.
  
== 8 ==
+
= Materials from previous years =
Course summary. Feedback.
+
* [[Meedia:ITC8050_-_Lesson_2_-_Actors_in_cyber_conflict_RO.pdf]]
 +
* [[Meedia:ITC8050-JP1.pdf]]
 +
* [[Meedia:Tabletop_intro_brief_RO.pdf]]
 +
 
 +
== Some lecture topics from previous years ==
 +
* cyber conflict and malicious actors
 +
* how different aspects of cyber security fit together (technical, processes, people).
 +
* what should be protected and why in a digital society.
 +
* incident handling and risk management.
  
 
= EXAMS =
 
= EXAMS =

Redaktsioon: 9. märts 2016, kell 13:39

Background

As of Fall semester of 2015 ITC8050 replaces the ITX8062 course in the IVCM curriculum. It is mandatory for both specializations: cyber security and digital forensics.

The course is intended for second or third semester students.

Strategic and Operational Aspects of Cyber Security

Admin notes for 2016 Spring semester

Where and when?

Room ICT-315, 1745-2100 on Wednesdays, even weeks only.

Exceptions:

  • First lecture will be 2000-2100 on 10 FEB.
  • There will be no lecture on 24 FEB. It will be re-sceduled later in the spring.

Instructors

Rain Ottis, PhD, Associate Professor at TUT

Jaan Priisalu, Researcher at TUT

Practice led by Bernhards Blumbergs


Contacts: rain dot ottis at ttu dot ee jaan dot priisalu at ttu dot ee

Schedule

The lecture topic order may change depending on the availability of lecturers. Please check this wiki page before each lecture for the most up-to-date information.

1

Course introduction.

Assignment of individual research topics.

2

Lecture by Jaan Priisalu

3

Lecture

4

Lecture

5

Lecture

6

Tabletop exercise preparation.

7

Tabletop exercise preparation.

8

Tabletop exercise.

Materials from previous years

Some lecture topics from previous years

  • cyber conflict and malicious actors
  • how different aspects of cyber security fit together (technical, processes, people).
  • what should be protected and why in a digital society.
  • incident handling and risk management.

EXAMS

General notes

This is an oral exam. Up to 8 students take the exam during one slot.

In the beginning of the exam you will get two questions (may be multi-part questions). At least one of the questions will be based on your paper topic (usually both). You will then have time to prepare your answers. You can use any materials at this time. However, when you come to answer the questions (and any follow-up questions that arise), you can only use your hand-written notes. You are free to leave once you have answered your questions.

Check this page for updates before coming to the exam.

Registration

Send an e-mail to Rain Ottis with your exam time preference in order to register. However, considering the 8 person limit, be prepared that your first preference may not be available. The registrations will be done on a first come first serve basis. Once registered, your initials will appear behind the date on this wiki.

Exam times

TBA