Both sides previous revisionPrevious revision | |
en:iot-reloaded:curriculum:security [2025/02/26 13:31] – pczekalski | en:iot-reloaded:curriculum:security [2025/03/20 10:57] (current) – [Table] pczekalski |
---|
====== Module: IoT Security (M4) ====== | ====== Module: IoT Security (M4) ====== |
| |
| **Study level** | Master || | | **Study level** | Master || |
| **ECTS credits** | 3 || | | **ECTS credits** | 3 || |
| **Study forms** | Hybrid or fully online || | | **Study forms** | Hybrid or fully online || |
| **Module aims** | The module aims to give an introductory overview of the security issues pertaining to IoT solutions. What are the usual topics that need to be considered from a security point of view when building an IoT system? || | | **Module aims** | The module aims to give an introductory overview of the security issues pertaining to IoT solutions. What are the usual topics that need to be considered from a security point of view when building an IoT system? || |
| **Pre-requirements** | The student/learner has based following modules:\\ - [[en:iot-reloaded:curriculum:general|Introduction to IoT]]\\ - [[en:iot-reloaded:curriculum:networks|IoT Architectures, inc. Networks]] || | | **Pre-requirements** | The student/learner has based following modules:\\ - [[en:iot-reloaded:curriculum:general|Introduction to IoT]]\\ - [[en:iot-reloaded:curriculum:networks|IoT Architectures, inc. Networks]] || |
| **Learning outcomes** | After completing this module, the student:\\ - has an overview of cybersecurity concepts in IoT systems\\ - understands the cybersecurity challenges and vulnerabilities in IoT system\\ - knows how to secure and defend IoT systems against cyber-attacks\\ - can implement best cybersecurity practices on IoT systems || | | **Learning outcomes** | After completing this module, the student:\\ - has an overview of cybersecurity concepts in IoT systems\\ - understands the cybersecurity challenges and vulnerabilities in IoT system\\ - knows how to secure and defend IoT systems against cyber-attacks\\ - can implement best cybersecurity practices on IoT systems || |
| **Topics** | __[[en:iot-reloaded:cybersecurity_in_iot_systems|Topic - Cybersecurity in IoT systems]]__\\ [[en:iot-reloaded:cybersecurity_concepts]]\\ [[en:iot-reloaded:hardware_and_cybersecurity]]\\ [[en:iot-reloaded:iot_cybersecurity_challenges]]\\ [[en:iot-reloaded:vulnerabilities_in_iot_systems]]\\ [[en:iot-reloaded:cybersecurity_issues_and_threats_in_iot_systems]]\\ [[en:iot-reloaded:typical_attack_patterns_on_iot_systems]]\\ [[en:iot-reloaded:iot_database_security]] || | | **Topics** | __[[en:iot-reloaded:cybersecurity_in_iot_systems|Topic - Cybersecurity in IoT systems]]__\\ [[en:iot-reloaded:cybersecurity_concepts]]\\ [[en:iot-reloaded:hardware_and_cybersecurity]]\\ [[en:iot-reloaded:iot_cybersecurity_challenges]]\\ [[en:iot-reloaded:vulnerabilities_in_iot_systems]]\\ [[en:iot-reloaded:cybersecurity_issues_and_threats_in_iot_systems]]\\ [[en:iot-reloaded:typical_attack_patterns_on_iot_systems]]\\ [[en:iot-reloaded:iot_database_security]] || |
| **Type of assessment** | The Prerequisite of a positive grade is a positive evaluation of module topics and presentation of practical work results with required documentation || | | **Type of assessment** | The Prerequisite of a positive grade is a positive evaluation of module topics and presentation of practical work results with required documentation || |
| **Blended learning** | Along with an MOOC course in hybrid mode. || | | **Blended learning** | Along with an MOOC course in hybrid mode. || |
| **References to\\ literature** | 1. Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab, Ethical hacking for IoT: Security issues, challenges, solutions and recommendations, Internet of Things and Cyber-Physical Systems 3 (2023) 280–308, Elsevier. \\ 2. Gustavo González-Granadillo, Susana González-Zarzosa, Rodrigo Diaz, Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures, Sensors, MDPI.\\ 3. Cybersecurity: A self-teaching introduction by C. P. Gupta and K. K. Goval, M ERCURY L EARNING AND INFORMATION, Dulles, Virginia. \\ 4. Introduction to cybersecurity by Jeetendra Pande, Uttarakhand Open University, Haldwani.\\ 5. Principles of Cyber Security by DR Babasaheb Ambedkar, Open University. || | | **References to\\ literature** | 1. Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab, Ethical hacking for IoT: Security issues, challenges, solutions and recommendations, Internet of Things and Cyber-Physical Systems 3 (2023) 280–308, Elsevier. \\ 2. Gustavo González-Granadillo, Susana González-Zarzosa, Rodrigo Diaz, Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures, Sensors, MDPI.\\ 3. Cybersecurity: A self-teaching introduction by C. P. Gupta and K. K. Goval, M ERCURY L EARNING AND INFORMATION, Dulles, Virginia. \\ 4. Introduction to cybersecurity by Jeetendra Pande, Uttarakhand Open University, Haldwani.\\ 5. Principles of Cyber Security by DR Babasaheb Ambedkar, Open University. || |
| **Lab equipment** | || | | **Lab equipment** | || |
| **Virtual lab** | || | | **Virtual lab** | || |
| **MOOC course** | http://edu.iot-open.eu/course/management.php?categoryid=6&courseid=9 || | | **MOOC course** | https://multiasm.eu/mooc/course/view.php?id=9 || |