In PROMIS, many courses use a case-based learning approach which allows you, at different levels, to bring your own case/ problem to the course. Case-based learning approach lessens the participation cost; you can utilize your domain-specific challenges while maximizing your end value. For two courses, we have adopted an even larger case-based approach where you can work on cases and challenges that are directly reusable and relevant for your work/organization. The aim of the course is that you, either individually or in a group, identify a challenge related to security and preferably linked to your company. In the course, you will study the topic in detail, apply knowledge and receive the opportunity to deepen your problem-solving. You will be assigned one or several mentors within the relevant area during the course. They will supervise and help you plan, carry out, present, and guide you to find solutions for your real-world context challenge as part of the learning – in essence; they will be mentors.
This course is targeting software professionals who aim to improve the security of the applications and services they develop through the use ofcryptographic algorithms . The main focusof the course will be on how to address the main goals of information security, confidentiality, integrity, availability, authenticity and accountability (CIA++) from a practical perspective. The course will introduce specific frameworks that can be used to implement these features using different programming languages, such as C/C++, Python and Java. In addition, the course will highlight typical pitfalls related to the implementation of these security functions.
This course explains how a secure development process is expected by industry regulators, and how to implement it in an agile and DevOps lifecycle. This course will cover secure agile and DevOps software development with a focus on the following components: People: Enablement of agile teams for security through awareness, training and coaching.Processes: Implementation of security activities into well-known agile development processes such as SCRUM or SAFe. Security activities are analyzed based on relevant industry security standards.Technology: Description of security tools and technologies that can automate security activities in the agile & DevOps way of working.
In this course, you will be made aware of the state-of-the-art in cybersecurity research and state of practice in industry. Cybersecurity vulnerabilities are a threat to progress in the business sector and society. This is an accelerating threat due to the current rapid digitalisation, which in manufacturing is termed Industry 4.0. Companies are aware of this threat and realise the need to invest in countermeasures, but development is hampered by lack of competence.
The course has the objective to provide proficiency in cybersecurity analysis and design in industrial settings, with a special focus on smart factories and Industry 4.0. To that aim, you will learn about advanced cybersecurity concepts, methodologies and tools. You will also be able to apply your knowledge to case-studies of industrial relevance.
The course provides knowledge and skills needed for defending critical infrastructure against cyber attacks. The example if such attack is Blackenergy cyberattack on the Ukrainian electrical grid in 2015 by Sandworm group (Russian GRU). This course covers security in SCADA and cyberphysical systems (CPS) as well as the regulations and standards that are applicable that helps to ensure an audit trail.
The purpose of the course is to show how security practices can be integrated into different software development processes (traditional, agile, continuous) and how to assess the maturity of the integration. The student will learn about different models, with a focus on a specific one touching upon security practices during software design, implementation, verification, and operation. In order to take different backgrounds and previous knowledge of the students into account, the course also covers the necessary background information on classical and security-oriented software development process models. The course enables students to assess the maturity of secure software development processes based on a model.
Every sector of the global economy relies on software. This makes software one of the principal targets for state-sponsored groups, military, criminals and other type of adversaries. Such attacks try to exploit insecure code, that is seemingly innocent bugs, which allow the adversaries to obtain unauthorized access to information or to take full control of compromised systems. The purpose of this course is to train software professionals in understanding in depth how insecure code can be exploited. In addition, it will equip them with knowledge in how to defend against this type attacks. The course begins by analyzing technical, psychological, and real-world factors that lead to production of vulnerable code. This is important knowledge for both developers and managers as it allows them to take actions that mitigate the impact of these factors, both when programming is performed but also during project management. Software exploits use specially crafted input data to applications and services to leverage logic flaws in the code that processes the input. Typically, the exploits overwrite specific structures in the program memory space, which allows them to bypass access control mechanisms and/or execute code provided as part of the input data. Therefore, a large part of the course is dedicated to understanding how exploits are constructed, essentially learning attackers’ “modus operandi”.
The course addresses fundamental questions related to how to build trusted systems. The focus will be on specific characteristics and approaches that allow to build trust into systems. In addition, methods to ensure that computers and services behave faithfully to the implementation specifications will be presented as well as approaches for detecting malicious deviations from the specifications. This course also introduces Blockchain concepts, security perspective of blockchain, consensus in blockchain, the decentralized philosophy behind Blockchain, as well as the main discussions in Blockchain environment and its potential applications.
Modern web applications can often be described in terms of cooperation and sharing, both on the level of the users of the application and on the level of the application and the service providers. This course covers the most prevalent security challenges of web applications, from a theoretical and practical perspective.
Web application security encompasses that the student should learn to understand and discover weaknesses and vulnerabilities in web applications both on the server side and on the client side as well as be able to develop solutions for protection and conduct tests.