On the basis of
Expected learning outcomes
After having successfully completed the course, students are expected to have mastered the following learning outcomes:
- Knowledge of advanced research in and understanding of academic theory of information security.
- Ability to select appropriate research methods and techniques.
- Ability to comprehend complex academic issues.
- Ability to understand and challenge the existing knowledge and practice in information security.
- Ability to argue the merits, limitations, and possibilities of new developments in information security.
The winter school can span all aspects of information security, i.e.
- Foundations of information security and security models, e.g. authentication, access control, biometrics, identity management, cryptography, modelling
- Secure programming, e.g. development processes, vulnerability analysis, embedded & cyberphysical systems
- Computer crime, digital forensics, privacy and civil liberties, including legal aspects, privacy
- Network security and security operations, e.g. perimeter security, intrusion detection, critical infrastructure protection
- Risk assessment, human factors and security, e.g. risk analysis, security management, security economics, incident management, awareness
The exact choice and composition of topics in a given year may vary.
In addition, COINS events address cross-cutting concerns like presentation of own research in the scientific community, and international collaboration.
Form(s) of Assessment
Form(s) of Assessment (additional text)
External or internal examiner. Exteranal examiner within 5 years period, next time at latast in 2018.
Whole course must be re-taken.
Scientific articles and hand-outs provided by lecturers.
The winter school needs to have been recognized by the COINS Research School of Computer and Information Security as fulfilling the requirements of Ph.D. training as laid out in the COINS project application.