Erinevus lehekülje "Cyber" redaktsioonide vahel

Allikas: Kursused
Mine navigeerimisribale Mine otsikasti
35. rida: 35. rida:
 
* '''ITX8040''' [http://courses.cs.ttu.ee/pages/ITX8040 Cyber Defence seminar] (spring semester)
 
* '''ITX8040''' [http://courses.cs.ttu.ee/pages/ITX8040 Cyber Defence seminar] (spring semester)
  
* '''ITX8042''' [http://lambda.ee/w/index.php?title=Malware:ITX8042:2013 Malware]  
+
* '''ITX8042''' [[Malware:ITX8042:2014 | 2014 Malware]]  
  
 
* '''ITX8050''' [[ITX8050 | Special Course in Cyber Security]]
 
* '''ITX8050''' [[ITX8050 | Special Course in Cyber Security]]
  
* '''ITX8060''' [http://lambda.ee/w/index.php?title=Malware:ITX8060:2013 Malware II]
+
* '''ITX8060''' [[Malware:ITX8042:2014 | 2014 Malware II]]
  
 
* '''ITX8062''' [[ITX8062 | Information Systems Mass Attacks and Defence]]
 
* '''ITX8062''' [[ITX8062 | Information Systems Mass Attacks and Defence]]

Redaktsioon: 23. september 2014, kell 18:46

News for Fall 2014

  • IDN0110 (Data Mining and Network Analysis) and ITX8080 (Simulation of Attacks and Defense) are not offered this semester.
  • ITX8041 (Legal Aspects of Cyber Security) is also going to be offered in the spring semester. There will be limited slots for each semester.
  • Labs for courses ITV8040 (Network Technology I) and ITV8060 (Computer Network Security) will take place in IT College building in room ITK-415.

Studies

Administrative information

Academic Calendar in English (out of date)

Academic Calendar in Estonian

Study portal. See also:

  • Navigate to the Cyber Security curriculum: click ENG on the right, Select Curricula on the left, Select by "structural units" under Curricula, Open (click to the little +) "Faculty of Information Technology", "10. IVCM09 IVCM09/13 Cybersecurity" in the middle table
  • You must declare your courses for the semester by the so-called "red line" date, which is generally mid-September or mid-February, depending on the semester. Use the OIS study portal to declare courses.
  • Please contact Dean's office for necessary passwords if you cannot log in with your ID-card and for any other kind of technical administrative help!

Course web sites

Please note that this is not a complete list.

  • ITV8060 Computer Network Security (4 ECP) is available and free on Fall for second year students and can be moved to Specialization module after you have got a grade.
  • ITX8071 Cyber Defense Monitoring Solutions replaces the course ITX8070 Log Mining and Disc Forensics.

The courses are free (the invoices are cancelled) to Cyber Security RE students and can be moved to Specialization module after you get a grade.

Sources for free choice courses

You can look for additional free choice courses from the following sources

Scan the OIS study portal for available courses this semester (takes effort, but it is useful to learn to find your way in OIS). You can find all the courses given in English (timetables of all international programs) in TUT by looking at OIS -> Timetables -> click to GB flag in the center of the page.

You can take some other language course (French, German, Russian, Finnish) offered by the Language Centre in addition to the courses (HLI2200, HLX8040) in your curriculum. Some of the alternative courses may not be free to study. In such a case OIS will give notice when you declare the course.

ITX8510 and ITX8511 Practical Training in Information Technology

You can get credit for ITX8510 and ITX8511 if you have working experience in IT field. To get the credit you have to:

  • have a working experience equivalent for at least 3 months of full-time job.
  • fill an application in OIS (Applications -> Acceptance of practice). You cannot declare it as an ordinary course.
  • ask your employer to fill the form (form is in Estonian).
  • meet Tanel Tammet at consultancy or any other agreed time and explain your duties and results of the work done.

Thesis and graduation

The fourth semester is reserved for writing your thesis. This is a demonstration of your professional knowledge and skills, and the process typically involves the following steps (with the help of your supervisor):

  • identify a problem that matters
  • research possible solutions, and select or develop the most suitable one
  • implement the solution
  • analyze the results of your work
  • present your work in a professional manner in written (thesis) and oral (thesis defence) form

Thesis information - deadlines, proposed topics, requirements, etc.

Scholarships

There are special IT-Academy scholarships available for Cyber Security students. The scholarships are awarded based on rank in admission and the study results in the previous semesters. You don't have to apply for this scholarship. You will be notified if and when you qualify for it. The announcement and statute of the scholarship is available on the faculty web site.

You can also apply for Skype and IT Academy Master’s Scholarship and LHV Bank Scholarship.

Contact