Educational objectives Knowledge and understanding.
The course aims to provide the knowledge required for understanding: (i) the specific characteristics of mobile apps compared to desktop apps; (ii) the main design patterns for mobile apps; (iii) the main security issues; (iv) the use of the main backend cloud services for mobile applications; (v) methods for designing and developing simple backend services deployed in the cloud; (vi) the classification of cloud service models
Applying knowledge and understanding.
The student must be able to design, develop and test native applications for android operating systems that interact with cloud services using the main official development, test and design tools. The student must also be able to design/develop and test their simple services deployed on cloud platforms, supporting mobile applications
Making judgments.
Based on the skills acquired, the student must be able to assess the advantages and disadvantages of the different technologies for developing apps (native applications, hybrid and web based), evaluate / choose optimally and critically the cloud support functions for the operation of mobile applications; to judge the feasibility, complexity and implications of new possible applications, also indicated by third parties. It will also have to be able to keep updated on the basis of possible future technologies related to mobile apps or cloud services.
Communication skills.
The student must be able to motivate the technological, methodological and architectural choices for new applications to other people in the sector, as well as to present, even to non-expert people, the functioning and characteristics of possible new applications.
Learning skills.
Practical exercises will be carried out on the various topics covered and will be requested to critically use information available for specific problems on various discussion platforms (e.g. Stack Overflow, official sites, blogs, etc.).
|
Educational objectives General objectives
The course deals with the evaluation of cyber risks that can damage an enterprise information system, the methodologies to mitigate these risks and the necessary countermeasures to be applied with the aim of making the company or public institution secure from the IT point of view.
Specific objectives
The course deals with the relationships between the operating mechanisms of information systems and computer networks and the computer threats to which they may be subject, the mechanisms for identifying and opposing attacks and their implementation through the application of specific countermeasures to reduce cyber risk. Particular attention is paid to the practical application of the notions learned through the analysis of case studies and exercises. The basic reference for the Risk Management course is the ISO 27005 standard, complemented by the NIST SP 800-30 framework.
Knowledge and understanding
Analyze the most common and dangerous threats, relating them to the vulnerabilities of systems and networks on which threats can have an impact. Assess the business risks associated with this impact and recommend the implementation of appropriate countermeasures; alternatively, suggest criteria for accepting the risks identified. Explain the basic mechanisms used to identify intrusion attempts into computers and networks. Determine and establish continuous improvement processes.
Application of knowledge and understanding
At the end of the course, students will be able to identify and assess the risks that can affect the functioning and security of an information system and their impacts. Based on the risk analysis and management methodologies learned in the course, the students will develop the ability to identify and select the appropriate countermeasures to protect the information system, from a technical, administrative, and cost point of view, determining the best governance profile of the security process.
Judgment skills
Students will develop the analytical skills necessary to evaluate different alternatives during the process of identifying the security risks of an Information System, with particular reference to the assessment of the architectural choices and the risks that they may involve and the security objectives imposed on the system in relation to the level of sensitivity of the information it manages.
Communicative skills
Students will learn how to document their choices, including through the use of automated reporting tools. They will also have acquired the ability to prepare presentations on topics related to risk management.
Ability to continue learning in an autonomous way
The notions acquired during the course will provide students with a basic knowledge in order to further deepen the more technical aspects, and to keep themselves informed about the continuous developments and updates of the assessment of cybersecurity risks of systems and networks.
|
Educational objectives General goals:
Blockchains emerged as a novel, game-changing paradigm for the distributed management of transactional systems. A blockchain is a protocol for the management of distributed ledgers, that is for the decentralised storage of a tamper-proof sequence of transactions (ledger), maintained and verified by the nodes participating in the network. A combination of peer-to-peer networks, consensus-making, cryptography, and market mechanisms is at the core of blockchains, which ensure data integrity and transparency thereby. An increasing number of blockchain platforms provides support for so-called smart contracts, that is, executable code expressing how business is to be conducted among contracting parties (e.g., transfer digital assets after a condition is fulfilled). The design of a secure, verifiable and efficient blockchain-based application requires the capability of properly architecting the behavioural structures amid the involved parties. The course covers in details the principles and technologies underpinning blockchain platforms and the properties they guarantee, on one hand, and is aimed at providing the means for the creation and analysis of blockchain-based solutions and applications, on the other hand.
Specific goals:
The course revolves around four main topics: 1) fundamentals of blockchains and distributed ledger technologies; 2) smart contracts programming; 3) development of a full-stack blockchain-based application; 4) assessment and analysis of a blockchain-based application.
Knowledge and understanding:
Students will learn the basics of blockchain technologies and the interplay of the underlying techniques that lead to the immutability, persistency, security and eventual consistency of the blockchain platforms. Furthermore, they will learn how to encode smart contracts and, thereupon, create full-stack Decentralised Applications (DApps). To properly design DApps and the token systems they rely upon, learners will apply the principles of process behaviour modelling and execution. To that end, an overview of cybersecurity challenges, as well as legal and privacy aspects, will also be provided.
Application of knowledge and understanding:
At the end of the course, students will have gained a better understanding of the fundamental pillars of distributed ledger technologies and blockchains. Also, they will have the ability to design and implement blockchain-based systems. Furthermore, they will produce reports in a manner that provides the most value to the stakeholders of decentralised applications.
Critical and judgmental skills:
Learners will develop the ability to assess the quality of decentralized applications and blockchain-based solutions at large from the perspectives of reliability, behavioural soundness, execution cost, on-chain and off-chain load balance, applicability, cybersecurity, and privacy.
Communication skills:
Students will learn how to document their choices, including through the use of diagramming and reporting tools. They will also have acquired the ability to prepare presentations on scientific subjects.
Learning ability:
The notions acquired during the course will provide students with solid knowledge in order to further investigate the most advanced technical aspects and to keep themselves informed about the continuous developments and updates of blockchain and distributed ledger technologies.
|
Educational objectives The goal of the course "Data and Network Security" is to expose the most up-to-date problems and solutions in the cybersecurity field which is rapidly evolving.
Students will learn about the main open research problems, and will obtain the necessary basis for more in-depth studies on the subject and to keep abreast of developments in the field.
|
Educational objectives General objectives
The course aims at providing basic concepts and methodologies of control theory, operations research and game theory, which constitute an analytical framework for the modeling of cyber-physical systems and of the main types of attacks on cyber-physical systems (for example: "denial of service", " replay attack "," covert attack "," false data injection ") and for the solution of security games and decision problems. The course will summarize a number of such methodologies and show how their application is able to deal with cyber-physical security problems in numerous example use cases.
Specific objectives
Knowledge and understanding:
The students will learn methodologies for to model and solve security problems in cyber-physical systems by unsing control theory, game theory and operations research methodologies.
Apply knowledge and understanding:
At the end of the course, the student will be able to derive abstract mathematical models for a wide class of cyber-physical systems, to analyze, starting from these models, some important properties concerning their security.
Critical and judgment skills:
The student will be able to to face cybersecurity problems through control theory, game theory and operations research methodologies.
Communication skills:
The course activities allow the student to be able to communicate / share the main problems concerning cybersecurity problems in cyber-physical systems and the possible design choices for their soultions.
Learning ability:
The aim of the course is to make students aware on how to deal with control and decision-making problems in the context of cybersecurity problems in cyber-physical systems.
|
Educational objectives GENERAL OBJECTIVES
The course aims to approach security and privacy in advanced information systems. The recent developments of future internet technologies (e.g. ICN) decentralised architectures (e.g. blockchain) and the Internet of Things raise new and challenging security and privacy issues. The course will introduce innovative solutions presented in the literature to address such issues in order to design and develop secure and privacy-aware components of a modern integrated ecosystem of services based on the aforementioned technologies. The course will discuss topics related to privacy and security in different domains, including:
- Blockchain
- Internet of Things
- Future Internet Technologies
- Machine Learning
- Privacy-Preserving Systems
SPECIFIC OBJECTIVES
Knowledge and Understanding: The course stimulates the curiosity of the students toward new trending topics in cybersecurity. The student learns new concepts that allow them to acquire a basic knowledge of innovative information systems and their security.
Apply Knowledge and Understanding: At the end of the course, the students should be able to analyze recent scientific papers related to security, understand the main information, discuss them with their colleagues, and reproduce their results.
Critical and Judgment skills: The students acquire the ability to extract the main information from scientific papers and compare them with others in the literature. In this way, the student will be able to elaborate a critical judgment on the security of advanced information systems at the state of art and to assess what can be actually achieved and what is required to further progress in research.
Communication skills: The discussion of a scientific paper with the class, as part of the exam program, requires the student to go in-depth with one of the topics seen during the lessons. This stimulates interaction during the class and the student's communication skills.
Learning ability: In addition to the classic learning skills provided by the theoretical study of the teaching material, the course development methods, in particular related to the project activities, stimulate student self-learning.
|