Every sector of the global economy relies on software. This makes software one of the principal targets for state-sponsored groups, military, criminals and other type of adversaries. Such attacks try to exploit insecure code, that is seemingly innocent bugs, which allow the adversaries to obtain unauthorized access to information or to take full control of compromised systems. The purpose of this course is to train software professionals in understanding in depth how insecure code can be exploited. In addition, it will equip them with knowledge in how to defend against this type attacks.
The course begins by analyzing technical, psychological, and real-world factors that lead to production of vulnerable code. This is important knowledge for both developers and managers as it allows them to take actions that mitigate the impact of these factors, both when programming is performed but also during project management.
Software exploits use specially crafted input data to applications and services to leverage logic flaws in the code that processes the input. Typically, the exploits overwrite specific structures in the program memory space, which allows them to bypass access control mechanisms and/or execute code provided as part of the input data. Therefore, a large part of the course is dedicated to understanding how exploits are constructed, essentially learning attackers’ “modus operandi”.
The aim of this course is to give students insight about certification and about what it means to certify/self-assess safety- critical systems with focus on software system and to create a safety case, including a multi-concern perspective when needed and reuse opportunities, when appropriate.
This course provides an understanding of the fundamental problems in software testing, as well as solid foundation in the practical methods and tools for a systematic state-of-the-art approach to testing of software.
Maybe you want to connect monitoring to a truck, or why not build a connected pump control? Do you want to measure temperatures, pressures or vibrations? Do you want knowledge about how to connect one of your existing products? Then this course is for you.
Do you work as an engineer in the industry and want to learn how to develop an idea with IoT? Do you work as a developer at an IT company and want to learn more about the hardware and the entire infrastructure within IoT? The course is primarily aimed at those who are professionals in the engineering profession, but you do not need to be either a programmer or an electronics engineer to take advantage of the course. The content is adapted so that you can work with your specific ideas.
The course is focused on providing both theoretical and practical knowledge in the field of Internet of Things. You will gain knowledge of the area's applications and definitions, and you will learn how to build an IoT device, all the way from hardware to visualization. You will have the opportunity to practically work with hardware, sensors, as well as infrastructure and security. We will work with, among other things, WiFi, BLE, LoRaWAN, SigFox, NB-IoT / LTE-M1, as well as insight into how data is transported throughout from the device to the database and then to the application.
The course will be held mostly at a distance with a couple of scheduled workshops (13/9, 6/10, 27/10) either on site or online. All lectures will be available online. The course will be delivered in a flexible way to facilitate the combination of coursework with your ongoing professional commitments.
You will need to buy IoT hardware before the start of the course, the cost can be different depending on the type of project, guide value is approx: SEK 1,000.
The total scope of the course is normally about 80 hours.Language of instruction: EnglishThe course is free of charge
With the advances of modern technology, cybersecurity has become hard to provide and guarantee. AI can enhance cybersecurity, but also undermine it. In this course, you will learn the different uses of AI for defending and attacking a cybersystem, from fingerprint recognition for authenticating legitimate users, to fuzzing attacks for crashing vulnerable targets.
This course provides an introduction into network security and covers core security concepts such as, e.g., firewalls, authentication, certificate management, encryption, "stateful packet inspection", VPN and others. During the course you are provided with slide and video materials as well as a set of practical assignments and thus gain both theoretical and practical knowledge and skills needed for the installation, troubleshooting, and monitoring of network devices to maintain the integrity, confidentiality, and availability of data and devices.
Explore the different tools and software to design, test, and prototype custom robot parts and robust robot behaviour.
In recent years, industries around the world have been getting creative when it comes to incorporating robotics into their workflows. This three-week course offers a fascinating introduction to software and tools currently used in robotics. You’ll build basic knowledge of robotics tools and learn how they can be adapted for different industries.
Familiarise yourself with Ubuntu operating system and Gazebo framework
Gain hands-on experience using 3D robotics models in simulation
Learn from the experts at the cutting edge of control engineering, robotics, and AI
This course is designed for anyone interested in using robotic solutions in their role and who wants to learn the basics of robotics frameworks.
The course will be given in English.