Applications 2024-09-16 - 2025-01-05
COURSE DESCRIPTION
There is an increasing concern from users regarding the use and leakage of their personal data. Moreover, compliance with privacy regulations is required by the government and privacy should be incorporated by design and by default when developing software-intensive products and services. Hence, privacy has become a top challenge in software development and good privacy measures can improve data security and promote quality.
The course has the objective to provide proficiency in cybersecurity analysis and design in industrial settings, with a special focus on smart factories and Industry 4.0. To that aim, you will learn about advanced cybersecurity concepts, methodologies and tools. You will also be able to apply your knowledge to case-studies of industrial relevance.
The Internet of Things (IoT) is a networking paradigm which enables different devices (from thermostats to autonomous vehicles) to collect valuable information and exchange it with other devices using different communications protocols over the Internet. This technology allows to analyse and correlate heterogeneous sources of information, extract valuable insights, and enable better decision processes. Although the IoT has the potential to revolutionise a variety of industries, such as healthcare, agriculture, transportation, and manufacturing, IoT devices also introduce new cybersecurity risks and challenges. In this course, the students will obtain an in-depth understanding of the Internet of Things (IoT) and the associated cybersecurity challenges. The course covers the fundamentals of IoT and its applications, the communication protocols used in IoT systems, the cybersecurity threats to IoT, and the countermeasures that can be deployed. The course is split in four main modules, described as follows: Understand and illustrate the basic concepts of the IoT paradigm and its applications Discern benefits and drawback of the most common IoT communication protocols Identify the cybersecurity threats associated with IoT systems Know and select the appropriate cybersecurity countermeasures Course Plan Module 1: Introduction to IoT Definition and characteristics of IoT IoT architecture and components Applications of IoT Module 2: Communication Protocols for IoT Overview of communication protocols used in IoT MQTT, CoAP, and HTTP protocols Advantages and disadvantages of each protocol Module 3: Security Threats to IoT Overview of cybersecurity threats associated with IoT Understanding the risks associated with IoT Malware, DDoS, and phishing attacks Specific vulnerabilities in IoT devices and networks Module 4: Securing IoT Devices and Networks Overview of security measures for IoT systems Network segmentation, access control, and encryption Best practices for securing IoT devices and networks Organisation and Examination Study hours: 80 hours distributed over 6 weeks Scehduled online seminars: February 6th 2025, from 13:15 to 16:00 February 26th 2025, from 13:15 to 16:00 March 12th 2025, from 13:15 to 16:00 Examination, one of the following: Analysis and presentation of relevant manuscripts in the literature Bring your own problem (BYOP) and solution. For example, analyse the cybersecurity of the IoT network of your company and propose improvements The number of participants in the course is limited, so please hurry with your application!
AI systems are increasingly being integrated into various industrial processes, including manufacturing, logistics, and autonomous vehicles. Trustworthy AI ensures that these systems operate reliably, reducing the risk of accidents or costly errors. Trustworthy AI helps companies comply with ethical standards and legal regulations. It ensures that AI systems do not discriminate against certain groups, violate privacy rights, or engage in other unethical behaviors. Trustworthy AI System course can support in the development of more advanced AI technologies, fostering research collaboration, and attracting talent.
This course introduces the concept of secure architecture which implies mitigation of potential confidentiality, integrity, and availability (CIA triad) threats by incorporating security elements such as demilitarized zone (DMZ), Anti-DDoS, load balancing, logging-monitoring-alerting (LMA), and incident response domain as well as by using corresponding security practices at the design stage that include but not limited to analysis of attack surface, threat modeling (STRIDE), and risk assessment (CVSS and OWASP Risk Rating Methodology). The design of secure cloud-based architectures is the primary focus of the course in light of premise-to-cloud migration.
The course covers different aspects of securing OS and system services to provide the safe environment for running cloud-based services. The following guidelines will be considered during the course as well as pracTical implementation of Windows and Linux platforms hardening using scripts (e.g. PowerShell and Ansible) to provide automation.
The course on Large Language Models for Industry is designed to cater to the demands of industries amidst the global push for sustainability and green transitions. Large Language Models (LLMs) represent a pivotal technology thatcan revolutionize how industries operate, communicate, and innovate. In this course, participants explore the intricate mechanics and practical applications of LLMs within industry contexts. The course covers the principles and technologies spanning from traditional Natural Language Processing (NLP) to Natural Language Understanding (NLU), enabled through the development of LLMs. Emphasizing industry-specific challenges and opportunities, participants learn to utilize LLMs while considering sustainability concerns. Participants gain valuable insights from adapting LLMs to tackle real-world problems through examples and exercises tailored to industry needs. By the course completion,participants are equipped to leverage LLMs as transformative tools for driving industry innovation and, at the same time, advancing sustainability goals. Scheduled online seminars November 14th 2024, 15:00 - 17:00 December 12th 2024, 15:00 - 17:00 January 9th 2025, 14:00 - 17:00 Entry requirements At least 180 credits including 15 credits programming as well as qualifications corresponding to the course "English 5"/"English A" from the Swedish Upper Secondary School.