5 ECTS cr / 135 hours of work
|Language of instruction
Autumn Semester, period 1.
Upon completion of this course, students know and understand the basics and advanced concepts of the following key areas of the course and cybersecurity, know key terminology and can write about the topics clearly and with justifications:
- Finding software errors and vulnerabilities with fuzz-testing
- Vulnerabilities and testing of websites and communication protocols
- Principles of hardware level vulnerabilities and their testing and detection
- Principles of different software vulnerabilities, malware programs and shellcode and memory protection measures
- Cyber crime, cyber forensics and botnets
- Mobile and IoT security and manufacturing security, testing and protection measures
Additionally, students that have attained grades 2 or 3 have demonstrated technical capacity to perform practical work relevant to the course key areas. Students that have attained grades 4 or 5 have additionally demonstrated capacity for independent, ambitious work on the key areas working on advanced and challenging security research questions.
The course covers the essential aspects of computer security and computer security research in theory and through practical examples.
|Mode of delivery
Contact teaching and independent work
|Learning activities and teaching methods
14 hours of lectures ja 28 hours of laboratory exercises, rest independent work alone or in groups.
The course is intended for computer engineering masters students and additionally to any student interested in computer security that has the sufficient technical background to complete the course exercises.
|Prerequisites and co-requisites
As prior knowledge students should have a basic understanding of how computers, operating systems and the Internet work and basic skills in programming. Examples of suitable courses to cover these fundamentals are Operating Systems 521453A, Introduction to Programming 521141P and Computer Engineering 521267A.
|Recommended optional programme components
The course is an independent entity.
|Recommended or required reading
|Assessment methods and criteria
Grading of the course is made based on the course practical assignments.
Numerical grade 0-5, where 0 stands for a fail.
Juha Röning, Teemu Tokola
|Working life cooperation
Course work space can be found from University of Oulu Moodle platform moodle.oulu.fi.