Maybe you want to connect monitoring to a truck, or why not build a connected pump control? Do you want to measure temperatures, pressures or vibrations? Do you want knowledge about how to connect one of your existing products? Then this course is for you.
Do you work as an engineer in the industry and want to learn how to develop an idea with IoT? Do you work as a developer at an IT company and want to learn more about the hardware and the entire infrastructure within IoT? The course is primarily aimed at those who are professionals in the engineering profession, but you do not need to be either a programmer or an electronics engineer to take advantage of the course. The content is adapted so that you can work with your specific ideas.
The course is focused on providing both theoretical and practical knowledge in the field of Internet of Things. You will gain knowledge of the area's applications and definitions, and you will learn how to build an IoT device, all the way from hardware to visualization. You will have the opportunity to practically work with hardware, sensors, as well as infrastructure and security. We will work with, among other things, WiFi, BLE, LoRaWAN, SigFox, NB-IoT / LTE-M1, as well as insight into how data is transported throughout from the device to the database and then to the application.
The course will be held mostly at a distance with a couple of scheduled workshops (13/9, 6/10, 27/10) either on site or online. All lectures will be available online. The course will be delivered in a flexible way to facilitate the combination of coursework with your ongoing professional commitments.
You will need to buy IoT hardware before the start of the course, the cost can be different depending on the type of project, guide value is approx: SEK 1,000.
The total scope of the course is normally about 80 hours.Language of instruction: EnglishThe course is free of charge
With the advances of modern technology, cybersecurity has become hard to provide and guarantee. AI can enhance cybersecurity, but also undermine it. In this course, you will learn the different uses of AI for defending and attacking a cybersystem, from fingerprint recognition for authenticating legitimate users, to fuzzing attacks for crashing vulnerable targets.
This course provides an introduction into network security and covers core security concepts such as, e.g., firewalls, authentication, certificate management, encryption, "stateful packet inspection", VPN and others. During the course you are provided with slide and video materials as well as a set of practical assignments and thus gain both theoretical and practical knowledge and skills needed for the installation, troubleshooting, and monitoring of network devices to maintain the integrity, confidentiality, and availability of data and devices.
The Internet of Things (IoT) is a networking paradigm which enables different devices (from thermostats to autonomous vehicles) to collect valuable information and exchange it with other devices using different communications protocols over the Internet. This technology allows to analyse and correlate heterogeneous sources of information, extract valuable insights, and enable better decision processes. Although the IoT has the potential to revolutionise a variety of industries, such as healthcare, agriculture, transportation, and manufacturing, IoT devices also introduce new cybersecurity risks and challenges.
In this course, the students will obtain an in-depth understanding of the Internet of Things (IoT) and the associated cybersecurity challenges. The course covers the fundamentals of IoT and its applications, the communication protocols used in IoT systems, the cybersecurity threats to IoT, and the countermeasures that can be deployed.
The course is split in four main modules, described as follows:
Understand and illustrate the basic concepts of the IoT paradigm and its applications
Discern benefits and drawback of the most common IoT communication protocols
Identify the cybersecurity threats associated with IoT systems
Know and select the appropriate cybersecurity countermeasures
Module 1: Introduction to IoT
Definition and characteristics of IoT
IoT architecture and components
Applications of IoT
Module 2: Communication Protocols for IoT
Overview of communication protocols used in IoT
MQTT, CoAP, and HTTP protocols
Advantages and disadvantages of each protocol
Module 3: Security Threats to IoT
Overview of cybersecurity threats associated with IoT
Understanding the risks associated with IoT
Malware, DDoS, and phishing attacks
Specific vulnerabilities in IoT devices and networks
Module 4: Securing IoT Devices and Networks
Overview of security measures for IoT systems
Network segmentation, access control, and encryption
Best practices for securing IoT devices and networks
Organisation and Examination
Study hours: 80 hours distributed over 7 weeks
Scehduled online seminars: January 30th 2024, February 12th 2024 and 11th of March
Examination, one of the following:
Analysis and presentation of relevant manuscripts in the literature
Bring your own problem (BYOP) and solution. For example, analyse the cybersecurity of the IoT network of your company and propose improvements
The number of participants in the course is limited, so please hurry with your application!
Every sector of the global economy relies on software. This makes software one of the principal targets for state-sponsored groups, military, criminals and other type of adversaries. Such attacks try to exploit insecure code, that is seemingly innocent bugs, which allow the adversaries to obtain unauthorized access to information or to take full control of compromised systems. The purpose of this course is to train software professionals in understanding in depth how insecure code can be exploited. In addition, it will equip them with knowledge in how to defend against this type attacks.
The course begins by analyzing technical, psychological, and real-world factors that lead to production of vulnerable code. This is important knowledge for both developers and managers as it allows them to take actions that mitigate the impact of these factors, both when programming is performed but also during project management.
Software exploits use specially crafted input data to applications and services to leverage logic flaws in the code that processes the input. Typically, the exploits overwrite specific structures in the program memory space, which allows them to bypass access control mechanisms and/or execute code provided as part of the input data. Therefore, a large part of the course is dedicated to understanding how exploits are constructed, essentially learning attackers’ “modus operandi”.
Målet med kursen är att ge lärare fortbildning inom ämnet djurvälfärd och hållbarhet. Kursens mål är också att ge lärare inspiration att designa sin egen undervisning, att ge lärare möjlighet att ta till sig ny forskning och att dela med sig av läraktiviteter som kan användas av fler.