Cyber

Allikas: Kursused
Redaktsioon seisuga 2. september 2015, kell 13:48 kasutajalt Rain (arutelu | kaastöö) (→‎Course web sites)
Mine navigeerimisribale Mine otsikasti

News for Fall 2015

  • Individual study plans must be submitted via OIS no later than 1700 on 10th of September.
  • The new instructor for ITX8090 (Information and Cyber Security Assurance in Organisations) is Dr Andro Kull.
  • If a course does not show up on your schedule:
    • try a manual search for that specific course. Electives (especially from different departments) are often not added to the full schedule.
    • wait. Some of them are not in the system yet, but this should be resolved by the end of this week.
  • ITX8041 (Legal Aspects of Cyber Security) is replaced by ITC8010 (same name). There are minor changes in content and the course is now given on both semesters. For the fall semester of 2015 the course is given by Agnes Käsper. Do not take it, if you have already passed ITX8041.
  • ITX8215 (Digital Evidence) is replaced by HOE7023 (same name); taught by Agnes Käsper. There are no significant changes to the content. Do not take it, if you have already passed ITX8215. NB! Schedule change: it takes place every week for weeks 1-8 in U03-222 on Mondays at 1745-2100.
  • ITX8062 (Information Systems Mass Attacks and Defence) is replaced by ITC8050 (Strategic and Operational Aspects of Cyber Security), which will be offered on both semesters. The course will be given on odd weeks throughout the semester (previously taught on weeks 1-8). The course is designed for second year students and there are limited number of seats available. If you do not fit into this fall's version, you can take it in the spring. Do not take it, if you have already passed ITX8062. NB! Schedule change: it takes place on odd weeks throughout the semester in ICT-A1 on Wednesday 1745-2100.
  • ITX8063 (Information Systems Hacking Attacks and Defence) is replaced by ITC8070 (Information Systems Attacks and Defence). The new course will be 4 ECTS and there are limited slots available. Do not take it, if you have already passed ITX8063. NB! Schedule change: it takes place every week on weeks 9-16 in SOC-212 on Tuesday 1745-2100.
  • If you enrolled in 2014 or earlier, then the replacement courses (see above) may not display in the correct modules. Do not worry about this, we will move them at the end of the semester. Just contact Rain Ottis during the exam session and let him know what the situation is.
  • A special course on forensics takes place (ITX8220/ITX8221 - you should pick a code that you have not used yet) in the second half of the semester. This will be a hands on course that is going to look at the forensics tools in Kali Linux. It is taught by Erika Matsak. If you consider taking it, you will have to sign up for it by September 10th. NB! Schedule change: it takes place every week on weeks 9-16 in ICT-403 on Monday 1930-2100 and Thursday 1930-2100.
  • The seminars ITX8040 and ITX8230 (depending on your focus) are taking place together on Tuesdays, 1600-1730 in room ICT-315. They are designed to help you with your thesis and should be taken on the third semester. However, you can also take it during your first semester, if you already have some idea about your thesis. You can only sign up for one seminar. If you have passed either one in the past, then you can attend, but not get credit for it.
  • IDN0110 and ITX8080 are not offered this semester.
  • Tartu University courses MTAT.03.246 and MTAT.03.247 will be combined into one 6 ECTS course MTAT.03.307 (Principles of Secure Software Design).
  • Tartu University Research Seminar on Cryptography (MTAT.07.019) gets a new code: MTAT.07.022.

Studies

Administrative information

Academic Calendar in English

Academic Calendar in Estonian (pdf)

Study portal. See also:

  • Navigate to the Cyber Security curriculum: click ENG on the right, Select Curricula on the left, Select by "structural units" under Curricula, Open (click to the little +) "Faculty of Information Technology", "10. IVCM09 IVCM09/13 Cybersecurity" in the middle table
  • You must declare your courses for the semester by the so-called "red line" date, which is generally mid-September or mid-February, depending on the semester. Use the OIS study portal to declare courses.
  • Please contact Dean's office for necessary passwords if you cannot log in with your ID-card and for any other kind of technical administrative help!

Course web sites

Please note that this is not a complete list.

  • ITV8060 Computer Network Security (4 ECP) is available and free on Fall for second year students and can be moved to Specialization module after you have got a grade.
  • ITX8071 Cyber Defense Monitoring Solutions replaces the course ITX8070 Log Mining and Disc Forensics.

The courses are free (the invoices are cancelled) to Cyber Security RE students and can be moved to Specialization module after you get a grade.

Sources for free choice courses

You can look for additional free choice courses from the following sources

Scan the OIS study portal for available courses this semester (takes effort, but it is useful to learn to find your way in OIS). You can find all the courses given in English (timetables of all international programs) in TUT by looking at OIS -> Timetables -> click to GB flag in the center of the page.

You can take some other language course (French, German, Russian, Finnish) offered by the Language Centre in addition to the courses (HLI2200, HLX8040) in your curriculum. Some of the alternative courses may not be free to study. In such a case OIS will give notice when you declare the course.

ITX8512 Practical Training in Information Technology

You can get credits if you have working experience in IT field. More information can be found here: ITX8512

Thesis and graduation

The fourth semester is reserved for writing your thesis. This is a demonstration of your professional knowledge and skills, and the process typically involves the following steps (with the help of your supervisor):

  • identify a problem that matters
  • research possible solutions, and select or develop the most suitable one
  • implement the solution
  • analyze the results of your work
  • present your work in a professional manner in written (thesis) and oral (thesis defence) form

Thesis information - deadlines, proposed topics, requirements, etc.

Scholarships

There are special IT-Academy scholarships available for Cyber Security students. The scholarships are awarded based on rank in admission and the study results in the previous semesters. You will have to apply for this scholarship on OIS and OIS will also tell you if you qualify for it. Check also: statute of the scholarship, which is available on the faculty web site.

In addition, you can apply for Skype and IT Academy Master’s Scholarship and LHV Bank Scholarship.

Contact