A close link between education, research and collaboration is the starting point for all our activities. We offer a wide range of attractive professional programs, in medicine, psychology, law and engineering. Our vision is to be a prominent university for a knowledge-driven society.
1 RESULTS
SHOW
SORT BY:
The Internet of Things (IoT) is a networking paradigm which enables different devices (from thermostats to autonomous vehicles) to collect valuable information and exchange it with other devices using different communications protocols over the Internet. This technology allows to analyse and correlate heterogeneous sources of information, extract valuable insights, and enable better decision processes. Although the IoT has the potential to revolutionise a variety of industries, such as healthcare, agriculture, transportation, and manufacturing, IoT devices also introduce new cybersecurity risks and challenges. In this course, the students will obtain an in-depth understanding of the Internet of Things (IoT) and the associated cybersecurity challenges. The course covers the fundamentals of IoT and its applications, the communication protocols used in IoT systems, the cybersecurity threats to IoT, and the countermeasures that can be deployed. The course is split in four main modules, described as follows: Understand and illustrate the basic concepts of the IoT paradigm and its applications Discern benefits and drawback of the most common IoT communication protocols Identify the cybersecurity threats associated with IoT systems Know and select the appropriate cybersecurity countermeasures Course Plan Course syllabus Module 1: Introduction to IoT Definition and characteristics of IoT IoT architecture and components Applications of IoT Module 2: Communication Protocols for IoT Overview of communication protocols used in IoT MQTT, CoAP, and HTTP protocols Advantages and disadvantages of each protocol Module 3: Security Threats to IoT Overview of cybersecurity threats associated with IoT Understanding the risks associated with IoT Malware, DDoS, and phishing attacks Specific vulnerabilities in IoT devices and networks Module 4: Securing IoT Devices and Networks Overview of security measures for IoT systems Network segmentation, access control, and encryption Best practices for securing IoT devices and networks Organisation and Examination Study hours: 80 hours distributed over 6 weeks Scehduled online seminars: February 6th 2025, from 13:15 to 16:00 February 26th 2025, from 13:15 to 16:00 March 12th 2025, from 13:15 to 16:00 Examination, one of the following: Analysis and presentation of relevant manuscripts in the literature Bring your own problem (BYOP) and solution. For example, analyse the cybersecurity of the IoT network of your company and propose improvements The number of participants in the course is limited, so please hurry with your application!