Take control and staff up
with the right knowledge
We know what the industry is asking for. That is why we have the educations for you.
Cryptography is a collective for different methods that are used to modify data with the aim of prevent unauthorized access or modifications to it. As a result, cryptography is an important part of modern cyber security. During this course you will study the basics for different cryptographic methods. In addition, you will also learn how to use them in a practical way in order to increase the security for IT-systems.
The course aims to provide students with the skills of real-world threats analysis including phishing attacks, targeted attacks (APTs), cyber weapon, ransomware (cryptolockers) The analysis of such threats requires a special type of education focused on the analysis of modern threats and protection technologies. The course gives knowledge and practical skills in malware analysis for Windows and Android platforms (x86 and ARM). The students will obtain practical skills in reverse engineering, static and dynamic analysis of malware used in the real-life cyber attacks.
Smart maintenance means using advanced technologies and data to optimize and streamline the company's maintenance processes. By investing in this skill, a leader can not only understand and apply the latest innovations in the maintenance industry, but also increase company productivity, reduce costs and ensure long-term sustainability. This smart maintenance course provides a leader with the tools and knowledge needed to navigate the digital era and maximize business reliability and performance. Target group The course is aimed at technical managers and people with a leading position in producing companies. The course is also suitable for those who are responsible for maintenance and operational safety, for example in the role of maintenance engineer, maintenance coordinator or maintenance manager. It is also aimed at you who are responsible for and work with overall sustainability, quality and safety issues. Content The course consists of three parts. Part 1 - In the first part (w. 12–14) we focus on technology solutions and how these are used to achieve smart maintenance. You will gain a practical understanding of how the technology works and what possibilities and limitations they have. We also describe the basics of predictive maintenance. Part 2 - The second part (w. 15–17) focuses on information needs for smart maintenance and how this can be ensured with technology solutions. You do exercises where you get to define what data and information is needed to plan, prepare, implement and follow up smart maintenance and then identify how you get access to this data. Part 3 - The third part (w. 18–20) addresses how a digitization strategy can be established for the maintenance organization. Practical information The course alternates theory with practical examples and exercises. The individual tasks give you the opportunity to work with the course content in a practical way in your own business. The course literature is in both English and Swedish and includes both popular science texts and research articles. The language of instruction is primarily Swedish. Entry requirements The basic eligibility for this course is a bachelor's degree in Mechanical Engineering or equivalent. People with relevant work experience are also welcome to apply. Two years of relevant work experience is considered equivalent to one year of university studies at bachelor's level.
In a data-driven world, it is important to be able to analyze large amounts of data to identify patterns of interest and test hypotheses about them. Visual Analytics provides us with an interactive process of analytical reasoning facilitated by data visualization, combining the strengths of humans and computers in order to derive insight from massive, dynamic, ambiguous, and often conflicting data. In this course we will introduce basic concepts of data visualization, how to apply them to build interactive interfaces for data sets of different types, and which tools are useful in this process. Target group This course is for experienced developers working in the industry with an interest in data analysis and visualization. Content Foundations of perception and design that are important for creating new visualizations.Comparison between different types of visualization that work better for different types of data.Integration of multiple individual visualizations into interactive dashboards.Overview of the exploratory visual analysis process that incorporates all the above into a unified pipeline.Practical applications using interactive visualization libraries. Practical information All materials will be available digitally, including reading materials, lecture slides, videos, practical exercises, etc. The course will be given in a flexible manner to facilitate the combination of course work with your professional commitments. We recommend that you work on a project during the course that you can use in your daily work, with your own data, and your own problems. Entry requirements The basic eligibility for this course is a Bachelor degree. Candidates with relevant work experience are also invited to apply. Two years of relevant work experience is considered equivalent to one year of university studies at the Bachelor level.
This course explains how a secure development process is expected by industry regulators, and how to implement it in an agile and DevOps lifecycle. This course will cover secure agile and DevOps software development with a focus on the following components: People: Enablement of agile teams for security through awareness, training and coaching.Processes: Implementation of security activities into well-known agile development processes such as SCRUM or SAFe. Security activities are analyzed based on relevant industry security standards.Technology: Description of security tools and technologies that can automate security activities in the agile & DevOps way of working.
Knowing how well security measures work, or how protected an organisation or systems is, can be difficult to quantify. The course aims to answer questions such as: – How to measure security? – What can be measured? The course presents several security metrics and how they can be implemented and used as KPIs.
Web application security encompasses that the student should learn to understand and discover weaknesses and vulnerabilities in web applications both on the server side and on the client side as well as be able to develop solutions for protection and conduct tests.
The course addresses fundamental questions related to how to build trusted systems. The focus will be on specific characteristics and approaches that allow to build trust into systems. In addition, methods to ensure that computers and services behave faithfully to the implementation specifications will be presented as well as approaches for detecting malicious deviations from the specifications. This course also introduces Blockchain concepts, security perspective of blockchain, consensus in blockchain, the decentralized philosophy behind Blockchain, as well as the main discussions in Blockchain environment and its potential applications.
Every sector of the global economy relies on software. This makes software one of the principal targets for state-sponsored groups, military, criminals and other type of adversaries. Such attacks try to exploit insecure code, that is seemingly innocent bugs, which allow the adversaries to obtain unauthorized access to information or to take full control of compromised systems. The purpose of this course is to train software professionals in understanding in depth how insecure code can be exploited. In addition, it will equip them with knowledge in how to defend against this type attacks. The course begins by analyzing technical, psychological, and real-world factors that lead to production of vulnerable code. This is important knowledge for both developers and managers as it allows them to take actions that mitigate the impact of these factors, both when programming is performed but also during project management. Software exploits use specially crafted input data to applications and services to leverage logic flaws in the code that processes the input. Typically, the exploits overwrite specific structures in the program memory space, which allows them to bypass access control mechanisms and/or execute code provided as part of the input data. Therefore, a large part of the course is dedicated to understanding how exploits are constructed, essentially learning attackers’ “modus operandi”.
Undervisningen ges på svenska. Viss undervisning på engelska kan förekomma. Se Produktionseffektivisering med simulering A1N för mer information.
Undervisningen ges på svenska. Se MBD – Model Based Definition, CAD-modellen som informationsbärare A1N för mer information.
Course in English. The course provides an introduction to self-service businessintelligence. The course focuses on increasing awareness around managing challenges when implementing and using self-service business intelligence. The assignmentscontain an account and discussion to be able to succeed with an investment within self-service businessintelligence. See Introduktion till self-service business intelligence A1N for more information.
Undervisningen ges på svenska. Se Introduktion i hållbar produktutveckling G1N för information.
Undervisningen ges på svenska. Se Industriella robotar – så kan cobots omvandla industrin A1N för information.
See Cybersäkerhet - kultur och medvetenhet A1N for information. Course in english.
Course in English CNC machine tools have been popularly adopted in the modern factory to improve product quality, production efficiency and performance. Computer-Aided Manufacturing (CAM) software tools support the CNC programming in an either interactive or automatic way. Moreover, all the information required for CNC programming can be organized in a multiple-view manner so that all stakeholders such as production managers, production engineers, maintenance and CNC operators can access the information based on their requirements. The course is aimed at professionals in industry. The course participants will start learning the CNC programming language called Word Address Programming (WAP). Next, the participants will study the process planning skills with industrial case studies. After that the participants are expected to interpret part geometries and associated Product and Manufacturing Information (PMI) as feasible manufacturing processes with available manufacturing resources. In the end, the participants are capable of evaluating the planned manufacturing processes in terms of multiple criteria such as quality, time and cost. After completed course the student should be able to:TRANSLATION FROM SWEDISH create computer numerical control (CNC) codes based on ISO 6983 standard, analyze component 3D models with Product and Manufacturing Information (PMI) and plan themanufacturing process accordingly, evaluate the planned manufacturing process in terms of quality, time and cost. See Applikationer för datorstödd tillverkning (CAM) A1N for more information.
Undervisningen ges på svenska. Viss undervisning på engelska kan förekomma. Se Agil projektledning för industrin A1N för information.
The course provides a basic understanding of how the product interacts with industrial processes and how this can made more efficient. You will also learn how to use time-to-volume with high quality as a strategy to achieve high productivity and low cost. The course gives you the tools and methods for managing industrialization challenges. By using these, you can ensure fast and cost-effective industrialization. The course also provides an overview of how you can reduce the risk of failure with your industrialization.
In this course you will learn how to design production systems using XR. By visualizing production processes using various XR technologies, you will gain an understanding of when each technology is best suited and how it can be implemented.
A smart factory is an industrial manufacturing facility that uses technology such as the Internet of Things (IoT), automation, and artificial intelligence (AI) to increase productivity and profitability. Smart factories use sensors and other technology to collect, share, and analyze data that helps improve production, increase safety, reduce energy consumption, and improve product quality. You will learn The various major technological areas of smart factories Fundamental principles of operation and control of smart factories Understand and describe how smart machines and products interact in smart factories