Skip to main content

IoT Security (5 cr)

Code: TX00EX84-3002

General information


Enrollment
06.05.2024 - 18.08.2024
Registration for the implementation has ended.
Timing
19.08.2024 - 13.10.2024
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
5 cr
Mode of delivery
On-campus
Unit
(2019-2024) School of ICT
Campus
Leiritie 1
Teaching languages
English
Seats
0 - 45
Degree programmes
Degree Programme in Information Technology
Teachers
Erik Pätynen
Groups
ICT22-SI-E
Smart IoT Systems: Embedded IoT Devices
Course
TX00EX84

Implementation has 13 reservations. Total duration of reservations is 39 h 0 min.

Time Topic Location
Thu 29.08.2024 time 13:00 - 16:00
(3 h 0 min)
IoT Security TX00EX84-3002
Distance Learning
Fri 30.08.2024 time 10:00 - 13:00
(3 h 0 min)
IoT Security TX00EX84-3002
MMA119 Oppimistila
Thu 05.09.2024 time 13:00 - 16:00
(3 h 0 min)
IoT Security TX00EX84-3002
Distance Learning
Fri 06.09.2024 time 10:00 - 13:00
(3 h 0 min)
IoT Security TX00EX84-3002
MMA119 Oppimistila
Thu 12.09.2024 time 13:00 - 16:00
(3 h 0 min)
IoT Security TX00EX84-3002
Distance Learning
Fri 13.09.2024 time 10:00 - 13:00
(3 h 0 min)
IoT Security TX00EX84-3002
MMA119 Oppimistila
Thu 19.09.2024 time 13:00 - 16:00
(3 h 0 min)
IoT Security TX00EX84-3002
Distance Learning
Fri 20.09.2024 time 10:00 - 13:00
(3 h 0 min)
IoT Security TX00EX84-3002
MMA119 Oppimistila
Thu 26.09.2024 time 13:00 - 16:00
(3 h 0 min)
IoT Security TX00EX84-3002
Distance Learning
Fri 27.09.2024 time 10:00 - 13:00
(3 h 0 min)
IoT Security TX00EX84-3002
MMA119 Oppimistila
Thu 03.10.2024 time 13:00 - 16:00
(3 h 0 min)
IoT Security TX00EX84-3002
Distance Learning
Fri 04.10.2024 time 10:00 - 13:00
(3 h 0 min)
IoT Security TX00EX84-3002
MMA119 Oppimistila
Fri 11.10.2024 time 10:00 - 13:00
(3 h 0 min)
IoT Security TX00EX84-3002
MMA119 Oppimistila
Changes to reservations may be possible.

Objective

Upon completion this course the learner knows how to evaluate IoT security risks in an industry sector, use standards models to explain security requirements in IoT systems and perform threat modeling activities in IoT systems. The learner also can use threat modeling and risk management frameworks to recommend threat mitigation measures and can explain the impact of emerging technologies on IoT security.

Content

Introduction to IoT security
IoT systems and architectures
IoT device layer attack surface
IoT communication layer attack surface
IoT application layer attack surface
Vulnerability and risk assessment in an IoT systems

Teaching methods

Lectures
Learning assignments

Evaluation scale

0-5

Assessment criteria, satisfactory (1)

Student has achieved the course objectives. Student will be able to identify, define and use the course subject area’s concepts and models. Student understands the criteria and principles of the expertise development.

Assessment criteria, good (3)

Student has achieved the course objectives well, even though the knowledge and skills need improvement on some areas. Student is able to define the course concepts and models and is able to justify the analysis. Student is able to apply his/her knowledge in study and work situations. Student understands the importance of expertise in the field of information and communication technology and is able to analyze his/her own expertise.

Assessment criteria, excellent (5)

Student has achieved the objectives of the course with excellent marks. Student masters commendably the course subject area’s concepts and models. Student is able to make justified and fluent analysis and to present concrete development measures. Student is well prepared to apply his/her knowledge in study and work situations. Student is able to analyze expertise in the information and communication technology sector and the development of his/her own expertise.

Assessment criteria, approved/failed

Student has achieved the course objectives. Student will be able to identify, define and use the course subject area’s concepts and models. Student understands the criteria and principles of the expertise development.

Assessment methods and criteria

Learning assignments
Theory exam

Go back to top of page