This privacy policy ("Policy") describes how the personally identifiable information ("Personal Information") you may provide on the learning4professionals.se website ("Website" or "Service") and any of its related products and services (collectively, "Services") is collected, protected and used. It also describes the choices available to you regarding our use of your Personal Information and how you can access and update this information.
This Policy is a legally binding agreement between you ("User", "you" or "your") and this Website operator ("Operator", "we", "us" or "our"). By accessing and using the Website and Services, you acknowledge that you have read, understood, and agree to be bound by the terms of this Agreement. This Policy does not apply to the practices of companies that we do not own or control, or to individuals that we do not employ or manage.
Our top priority is customer data security and, as such, we exercise the no logs policy. We may process only minimal user data, only as much as it is absolutely necessary to maintain the Website and Services.
Information collected automatically is used only to identify potential cases of abuse and establish statistical information regarding the usage and traffic of the Website and Services. This statistical information is not otherwise aggregated in such a way that would identify any particular user of the system.
You can access and use the Website and Services without telling us who you are or revealing any information by which someone could identify you as a specific, identifiable individual. If, however, you wish to use some of the features on the Website, you may be asked to provide certain Personal Information (for example, your name and e-mail address). We receive and store any information you knowingly provide to us when you fill any online forms on the Website. When required, this information may include contact information such as email address, address, etc.
Some of the information we collect is directly from you via the Website and Services. However, we may also collect Personal Information about you from other sources such as public databases and our joint marketing partners. You can choose not to provide us with your Personal Information, but then you may not be able to take advantage of some of the features on the Website. Users who are uncertain about what information is mandatory are welcome to contact us.
In order to make the Website and Services available to you, or to meet a legal obligation, we need to collect and use certain Personal Information. If you do not provide the information that we request, we may not be able to provide you with the requested products or services. Any of the information we collect from you may be used for the following purposes:
Respond to inquiries and offer support
Run and operate the Website and Services
Processing your Personal Information depends on how you interact with the Website and Services, where you are located in the world and if one of the following applies: (i) you have given your consent for one or more specific purposes; this, however, does not apply, whenever the processing of Personal Information is subject to California Consumer Privacy Act or European data protection law; (ii) provision of information is necessary for the performance of an agreement with you and/or for any pre-contractual obligations thereof; (iii) processing is necessary for compliance with a legal obligation to which you are subject; (iv) processing is related to a task that is carried out in the public interest or in the exercise of official authority vested in us; (v) processing is necessary for the purposes of the legitimate interests pursued by us or by a third party.
Note that under some legislations we may be allowed to process information until you object to such processing (by opting out), without having to rely on consent or any other of the following legal bases below. In any case, we will be happy to clarify the specific legal basis that applies to the processing, and in particular whether the provision of Personal Information is a statutory or contractual requirement, or a requirement necessary to enter into a contract.
Depending on the requested Services or as necessary to complete any transaction or provide any service you have requested, we may share your information with your consent with our trusted third parties that work with us, any other affiliates and subsidiaries we rely upon to assist in the operation of the Website and Services available to you. We do not share Personal Information with unaffiliated third parties. These service providers are not authorized to use or disclose your information except as necessary to perform services on our behalf or comply with legal requirements. We may share your Personal Information for these purposes only with third parties whose privacy policies are consistent with ours or who agree to abide by our policies with respect to Personal Information. These third parties are given Personal Information they need only in order to perform their designated functions, and we do not authorize them to use or disclose Personal Information for their own marketing or other purposes.
We will disclose any Personal Information we collect, use or receive if required or permitted by law, such as to comply with a subpoena, or similar legal process, and when we believe in good faith that disclosure is necessary to protect our rights, protect your safety or the safety of others, investigate fraud, or respond to a government request.
We will retain and use your Personal Information for the period necessary to comply with our legal obligations, resolve disputes, and enforce our agreements unless a longer retention period is required or permitted by law. We may use any aggregated data derived from or incorporating your Personal Information after you update or delete it, but not in a manner that would identify you personally. Once the retention period expires, Personal Information shall be deleted. Therefore, the right to access, the right to erasure, the right to rectification and the right to data portability cannot be enforced after the expiration of the retention period.
Depending on your location, data transfers may involve transferring and storing your information in a country other than your own. You are entitled to learn about the legal basis of information transfers to a country outside the European Union or to any international organization governed by public international law or set up by two or more countries, such as the UN, and about the security measures taken by us to safeguard your information. If any such transfer takes place, you can find out more by checking the relevant sections of this Policy or inquire with us using the information provided in the contact section.
You may exercise certain rights regarding your information processed by us. In particular, you have the right to do the following: (i) you have the right to withdraw consent where you have previously given your consent to the processing of your information; (ii) you have the right to object to the processing of your information if the processing is carried out on a legal basis other than consent; (iii) you have the right to learn if information is being processed by us, obtain disclosure regarding certain aspects of the processing and obtain a copy of the information undergoing processing; (iv) you have the right to verify the accuracy of your information and ask for it to be updated or corrected; (v) you have the right, under certain circumstances, to restrict the processing of your information, in which case, we will not process your information for any purpose other than storing it; (vi) you have the right, under certain circumstances, to obtain the erasure of your Personal Information from us;
(vii) you have the right to receive your information in a structured, commonly used and machine readable format and, if technically feasible, to have it transmitted to another controller without any hindrance. This provision is applicable provided that your information is processed by automated means and that the processing is based on your consent, on a contract which you are part of or on pre-contractual obligations thereof.
Where Personal Information is processed for the public interest, in the exercise of an official authority vested in us or for the purposes of the legitimate interests pursued by us, you may object to such processing by providing a ground related to your particular situation to justify the objection.
If you are a resident of the European Economic Area (EEA), you have certain data protection rights and the Operator aims to take reasonable steps to allow you to correct, amend, delete, or limit the use of your Personal Information. If you wish to be informed what Personal Information we hold about you and if you want it to be removed from our systems, please contact us. In certain circumstances, you have the following data protection rights:
You have the right to request access to your Personal Information that we store and have the ability to access your Personal Information.
You have the right to request that we correct any Personal Information you believe is inaccurate. You also have the right to request us to complete the Personal Information you believe is incomplete.
You have the right to request the erase your Personal Information under certain conditions of this Policy. You have the right to object to our processing of your Personal Information.
You have the right to seek restrictions on the processing of your Personal Information. When you restrict the processing of your Personal Information, we may store it but will not process it further.
You have the right to be provided with a copy of the information we have on you in a structured, machine- readable and commonly used format.
You also have the right to withdraw your consent at any time where the Operator relied on your consent to process your Personal Information.
You have the right to complain to a Data Protection Authority about our collection and use of your Personal Information. For more information, please contact your local data protection authority in the European Economic Area (EEA).
In addition to the rights as explained in this Policy, California residents who provide Personal Information (as defined in the statute) to obtain products or services for personal, family, or household use are entitled to request and obtain from us, once a calendar year, information about the Personal Information we shared, if any, with other businesses for marketing uses. If applicable, this information would include the categories of Personal Information and the names and addresses of those businesses with which we shared such personal information for the immediately prior calendar year (e.g., requests made in the current year will receive information about the prior year). To obtain this information please contact us.
Any requests to exercise your rights can be directed to the Operator through the contact details provided in this document. Please note that we may ask you to verify your identity before responding to such requests. Your request must provide sufficient information that allows us to verify that you are the person you are claiming to be or that you are the authorized representative of such person. You must include sufficient details to allow us to properly understand the request and respond to it. We cannot respond to your request or provide you with Personal Information unless we first verify your identity or authority to make such a request and confirm that the Personal Information relates to you.
We do not knowingly collect any Personal Information from children under the age of 18. If you are under the age of 18, please do not submit any Personal Information through the Website and Services. We encourage parents and legal guardians to monitor their children's Internet usage and to help enforce this Policy by instructing their children never to provide Personal Information through the Website and Services without their permission. If you have reason to believe that a child under the age of 18 has provided Personal Information to us through the Website and Services, please contact us. You must also be at least 16 years of age to consent to the processing of your Personal Information in your country (in some countries we may allow your parent or guardian to do so on your behalf).
The Website and Services use "cookies" to help personalize your online experience. A cookie is a text file that is placed on your hard disk by a web page server. Cookies cannot be used to run programs or deliver viruses
to your computer. Cookies are uniquely assigned to you, and can only be read by a web server in the domain that issued the cookie to you.
We may use cookies to collect, store, and track information for statistical purposes to operate the Website and Services. You have the ability to accept or decline cookies. Most web browsers automatically accept cookies, but you can usually modify your browser setting to decline cookies if you prefer. To learn more about cookies and how to manage them, visit internetcookies.org
Some browsers incorporate a Do Not Track feature that signals to websites you visit that you do not want to have your online activity tracked. Tracking is not the same as using or collecting information in connection with a website. For these purposes, tracking refers to collecting personally identifiable information from consumers who use or visit a website or online service as they move across different websites over time. The Website and Services do not track its visitors over time and across third party websites. However, some third party sites may keep track of your browsing activities when they serve you content, which enables them to tailor what they present to you.
We offer electronic newsletters to which you may voluntarily subscribe at any time. We are committed to keeping your e-mail address confidential and will not disclose your email address to any third parties except as allowed in the information use and processing section. We will maintain the information sent via e-mail in accordance with applicable laws and regulations.
In compliance with the CAN-SPAM Act, all e-mails sent from us will clearly state who the e-mail is from and provide clear information on how to contact the sender. You may choose to stop receiving our newsletter or marketing emails by following the unsubscribe instructions included in these emails or by contacting us.
The Website and Services contain links to other resources that are not owned or controlled by us. Please be aware that we are not responsible for the privacy practices of such other resources or third parties. We encourage you to be aware when you leave the Website and Services and to read the privacy statements of each and every resource that may collect Personal Information.
We secure information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use, or disclosure. We maintain reasonable administrative, technical, and physical safeguards in an effort to protect against unauthorized access, use, modification, and disclosure of Personal Information in its control and custody. However, no data transmission over the Internet or wireless network can be guaranteed. Therefore, while we strive to protect your Personal Information, you acknowledge that (i) there are security and privacy limitations of the Internet which are beyond our control; (ii) the security, integrity, and privacy of any and all information and data exchanged between you and the Website and Services cannot be
guaranteed; and (iii) any such information and data may be viewed or tampered with in transit by a third party, despite best efforts.
In the event we become aware that the security of the Website and Services has been compromised or users Personal Information has been disclosed to unrelated third parties as a result of external activity, including, but not limited to, security attacks or fraud, we reserve the right to take reasonably appropriate measures, including, but not limited to, investigation and reporting, as well as notification to and cooperation with law enforcement authorities. In the event of a data breach, we will make reasonable efforts to notify affected individuals if we believe that there is a reasonable risk of harm to the user as a result of the breach or if notice is otherwise required by law. When we do, we will post a notice on the Website, send you an email.
We reserve the right to modify this Policy or its terms relating to the Website and Services from time to time in our discretion and will notify you of any material changes to the way in which we treat Personal Information.
When we do, we will revise the updated date at the bottom of this page. We may also provide notice to you in other ways in our discretion, such as through contact information you have provided. Any updated version of this Policy will be effective immediately upon the posting of the revised Policy unless otherwise specified. Your continued use of the Website and Services after the effective date of the revised Policy (or such other act specified at that time) will constitute your consent to those changes. However, we will not, without your consent, use your Personal Information in a manner materially different than what was stated at the time your Personal Information was collected. Policy was created with WebsitePolicies.
You acknowledge that you have read this Policy and agree to all its terms and conditions. By accessing and using the Website and Services you agree to be bound by this Policy. If you do not agree to abide by the terms of this Policy, you are not authorized to access or use the Website and Services.
If you would like to contact us to understand more about this Policy or wish to contact us concerning any matter relating to individual rights and your Personal Information, you may send an email to contact@learning4professionals.se
This document was last updated on October 28, 2020
AI systems are increasingly being integrated into various industrial processes, including manufacturing, logistics, and autonomous vehicles. Trustworthy AI ensures that these systems operate reliably, reducing the risk of accidents or costly errors. Trustworthy AI helps companies comply with ethical standards and legal regulations. It ensures that AI systems do not discriminate against certain groups, violate privacy rights, or engage in other unethical behaviors. Trustworthy AI System course can support in the development of more advanced AI technologies, fostering research collaboration, and attracting talent.
Today, many industries face an increase in the design of dependable systems, often with a multitude of challenges including more complex electronics and intensive software. At the same time, most of the engineers graduating from universities do not have skills in designing fault tolerant systems. This online course aims to give engineers and students a toolbox of fail-safe design concepts, addressing both hardware and software techniques, such that they can understand the rationales for suitable mitigation strategies.
Companies and their IT systems are affected by advanced intrusions, various ransomware attacks and or thefts of both sensitive and secret information. In case of being compromised companies need to understand their weak points, ways of intrusion and attackers attributes. The course focuses on developing the student’s skills to investigate and analyze complex cyber attacks (Cyber Kill Chain) and to track the threat actor, discover exploited vulnerabilities so that companies can restore data and system integrity. Digital forensic is the process of detecting and investigating hacking attacks via properly extracted and analyzed evidence and artifacts to report the crime and prevent similar attacks in the future. The crime with computers and digital technologies in today’s cyber world is on the rise. Digital forensic techniques are being used by law enforcement agencies, police, government, and corporate entities around the world. The tools and techniques covered in the course will prepare the attendees to conduct digital forensic investigations using ground-breaking technologies.
Cryptography is a collective for different methods that are used to modify data with the aim of prevent unauthorized access or modifications to it. As a result, cryptography is an important part of modern cyber security. During this course you will study the basics for different cryptographic methods. In addition, you will also learn how to use them in a practical way in order to increase the security for IT-systems.
The course aims to provide students with the skills of real-world threats analysis including phishing attacks, targeted attacks (APTs), cyber weapon, ransomware (cryptolockers) The analysis of such threats requires a special type of education focused on the analysis of modern threats and protection technologies. The course gives knowledge and practical skills in malware analysis for Windows and Android platforms (x86 and ARM). The students will obtain practical skills in reverse engineering, static and dynamic analysis of malware used in the real-life cyber attacks.
This course explains how a secure development process is expected by industry regulators, and how to implement it in an agile and DevOps lifecycle. This course will cover secure agile and DevOps software development with a focus on the following components: People: Enablement of agile teams for security through awareness, training and coaching.Processes: Implementation of security activities into well-known agile development processes such as SCRUM or SAFe. Security activities are analyzed based on relevant industry security standards.Technology: Description of security tools and technologies that can automate security activities in the agile & DevOps way of working.
Knowing how well security measures work, or how protected an organisation or systems is, can be difficult to quantify. The course aims to answer questions such as: – How to measure security? – What can be measured? The course presents several security metrics and how they can be implemented and used as KPIs.
Web application security encompasses that the student should learn to understand and discover weaknesses and vulnerabilities in web applications both on the server side and on the client side as well as be able to develop solutions for protection and conduct tests.
The course addresses fundamental questions related to how to build trusted systems. The focus will be on specific characteristics and approaches that allow to build trust into systems. In addition, methods to ensure that computers and services behave faithfully to the implementation specifications will be presented as well as approaches for detecting malicious deviations from the specifications. This course also introduces Blockchain concepts, security perspective of blockchain, consensus in blockchain, the decentralized philosophy behind Blockchain, as well as the main discussions in Blockchain environment and its potential applications.
Every sector of the global economy relies on software. This makes software one of the principal targets for state-sponsored groups, military, criminals and other type of adversaries. Such attacks try to exploit insecure code, that is seemingly innocent bugs, which allow the adversaries to obtain unauthorized access to information or to take full control of compromised systems. The purpose of this course is to train software professionals in understanding in depth how insecure code can be exploited. In addition, it will equip them with knowledge in how to defend against this type attacks. The course begins by analyzing technical, psychological, and real-world factors that lead to production of vulnerable code. This is important knowledge for both developers and managers as it allows them to take actions that mitigate the impact of these factors, both when programming is performed but also during project management. Software exploits use specially crafted input data to applications and services to leverage logic flaws in the code that processes the input. Typically, the exploits overwrite specific structures in the program memory space, which allows them to bypass access control mechanisms and/or execute code provided as part of the input data. Therefore, a large part of the course is dedicated to understanding how exploits are constructed, essentially learning attackers’ “modus operandi”.
Undervisningen ges på svenska. Se Introduktion i hållbar produktutveckling G1N för information.
In this course you will learn how to design production systems using XR. By visualizing production processes using various XR technologies, you will gain an understanding of when each technology is best suited and how it can be implemented.
Numerical models are used in every engineering task, from conceptual design to optimization, control, and diagnostics. As the process becomes more complex, data driven models are a powerful tool that allows to quantify relationships between available data and observations, which forms the basis for machine learning. Image recognition, spam filtering, and predictive analytics are some examples of how we can use data driven models. This course provides a simple introduction to fundamental techniques for dimensionality reduction, classification, and regression, which can be applied to all types of engineering problems.
Learn more about climate change’s impact on society and how you can lead a wide range of transition processes and practically work with climate transitions within different areas. Ongoing and future climate impacts on different parts of society, the attempts to try to build sustainability within planetary boundaries and interconnected international crises’ have created a unique situation concerning the issues’ urgency, complexity and uncertainty. Within this shifting landscape knowledgeable, creative and brave leaders and citizens are necessary to being able to fundamentally change how businesses, regions, municipalities and different organizations work and achieve results. This online course introduces climate science, climate change’s impact on society, different perspectives on the causes and possible solutions to the climate dilemma, climate justice and international agreements, carbon budgets and different climate scenarios, leadership within different contexts on different levels, key areas for successful transitions and different good examples of climate transitions, the individual’s and the collective’s possibilities and responsibilities, and concrete first steps towards transitions work within your work and local context. The Uppsala University learning platform Studium course run will start January 15, 2024 Duration: 5 weeks Weekly study time: 4 hours
Den här kursen ger en inblick i batteriernas värld. Vi använder alla batterier varje dag, men vet du verkligen hur ett batteri fungerar, vad som finns i det, vad det är användbart för och hur forskare försöker förbättra dem för framtiden? I den här introduktionskursen kommer vi att berätta allt från batterigrunderna, till utvecklingen av litiumjonbatteriet, deras tillämpningar och krav, vilka typer av material som används för att bygga batterier, till vad som händer med ett batteri när det är slut. och hur batterier utvecklas för framtiden. Som deltagare i denna kurs har du helst någon form av teknisk bakgrund, troligen läst naturvetenskap på högskola eller till och med på högre utbildning, eller har erfarenhet av ett tekniskt yrke. Förhoppningen är att du efter kursen ska bli mycket mer medveten om batterivärlden, kraven, applikationerna och komponenterna i ett batteri, samt ett bredare perspektiv på hur denna viktiga teknik kommer att utvecklas under det kommande decenniet. Observera att videoinspelningarna i denna kurs är på engelska men är textade på svenska.
A thriving global society relies on the stability of the Earth and its resilience across oceans, forests, waterways, biodiversity, the atmosphere and more. So how do we shape sustainability at a global scale? The boundaries set by the planet’s natural resources, the resilience of those resources, and the human activities that impact sustainability all come into play. In this massive open online course, see the rapidly evolving trends in global environmental change and the responses aimed at slowing or eliminating these changes. Get an overview of what is seen by some scientists as our current geological epoch – the Anthropocene, or an age of global change driven most significantly by humans. Learn how unsustainable patterns of production, consumption and population growth have challenge planetary resilience, all in support of human activity – and how our societies can develop in a just and safe way within the planet’s boundaries. This course is for: * Anyone new to the concept of sustainable development who wants to understand the interplay between human actions and what the planet can support.* Graduate students and advanced undergraduate students interested in the key concepts and practices of sustainability, environmental science, responsible consumption and related topics* Sustainable development practitioners – as well as private-sector actors, such as those who work in corporate sustainability and responsibility – who want a concise overview of the latest developments in the field
With concerns about climate and global environmental changes, extreme events, and increases in social, economic, and political shocks, the concept of resilience is proving popular across a range of sectors as a way to understand and respond to our surprise-riddled world. This concept is now presented in a course led by the Stockholm Resilience Centre and the Centre for Complex Systems in Transitions and includes the latest research and practice on resilience. Resilience thinking includes the ability to persist in the face of challenges, adapt to new realities, or transform to fundamentally new paths for development. Resilience thinking is more than a theory, more than a set of tools. It is a way of seeing the world, offering a new perspective of how change in the world happens. Resilience thinking provides a new approach for building understanding and taking action in a complex world that is deeply interconnected and ever-changing. A world where controlled, planned approaches, existing knowledge and current solutions are not enough to effectively respond to the challenges in a highly dynamic and uncertain future. Addressing poverty, injustice, and inequality, and advancing human well-being remains a major ambition and challenge for the 21st century, and it now needs to consider that development will happen in a context radically different from the past. This course includes case studies and examples from practitioners who are working with resilience concepts in diverse contexts around the world. It is supported by strong scientific evidence and committed to being a platform to bring together and spark collaboration between individuals and organizations from around the world who are driven to transform development. This course is for: Development practitioners, policymakers and managers within development agencies around the world, as well as those working in the field with an interest in resilience thinking as it relates to development policy and practice.Students who are interested in the intersection of resilience, sustainability and development, and with a general interest in both local and global sustainability challengesAnyone with an interest in development, resilience thinking, and sustainability
Vill du få kunskap om hållbar utveckling och vara delaktig att göra en verklig förändring för en mer hållbar framtid? Då är denna kurs för dig! OM KURSENI den här kursen sätter vi fokus på hållbar utveckling och hållbarhetsutmaningar i dagens samhälle. Du får kunskap och förståelse för begreppet hållbar utveckling och hur det kan tillämpas i olika verksamheter. Du får insikt i de miljö- och resursproblem som mänskligheten står inför och tekniska och politiska styrmedel som kan användas för att lösa dem samt en inblick i de psykologiska faktorer som hindrar eller möjliggör transformation mot en hållbar riktning. Du lär dig att: Kritiskt reflektera över begreppet hållbar utveckling och skilja mellan normativa värderingar och vetenskapliga fakta och definitioner.Identifiera tekniska möjligheter och begränsningar för att lösa olika problem med tekniska lösningar.Redogöra för politiska styrmedel inom miljöområdet.Förstå förmågor inom Inner Development Goals som är avgörande för att nå en transformation i en hållbar riktning.MÅLGRUPPFör dig som är yrkesverksam och vill få mer kunskap kring hållbar utveckling. Företagsledare eller entreprenörer som vill integrera hållbarhetsperspektiv i din verksamhet och sträva efter en mer hållbar affärsmodell, anställda som vill förstå och bidra till hållbarhetsarbetet i sin organisation, miljö- och hållbarhetsrådgivare och konsulter som vill utveckla sin kompetens och förmåga att stödja olika organisationer i hållbarhetsfrågor, offentliga tjänstemän och beslutsfattare som behöver förstå de politiska styrmedel som finns tillgängliga för att hantera miljö- och resursfrågor och främja hållbar utveckling, samt samhällsengagerade personer som vill ha en ökad förståelse för hållbarhetsfrågor och bidra till en mer hållbar utveckling. GENOMFÖRANDEDu kommer att delta aktivt i digitala diskussioner och samarbeta med andra kursdeltagare för att ta fram nya insikter och tillämpa kursens teorier på egna erfarenheter. Kursen förutsätter självständigt arbete, kontinuerlig textinläsning och aktivt deltagande i undervisningen. Kursen examineras genom teoretiska och praktiska uppgifter som diskuteras och presenteras genom skriftliga och muntliga, individuella och gruppvisa uppgifter som diskuteras och presenteras på obligatoriska seminarier. Kursen är på avancerad nivå och ger 5 högskolepoäng. Undervisningen genomförs på distans via Canvas som är Karlstads universitets lärplattform och genom zoomträffar. FÖRELÄSARE Fredrik Wikström, professor miljö- och energisystem, och Helén Williams, docent miljö- och energisystem, båda verksamma vid Centrum för tjänsteforskning (CTF) och ämnet miljö- och energisystem vid Karlstads universitet. BEHÖRIGHETSKRAV90 hp varav lägst 30 hp på G2F-nivå eller högre inom samhälls-, beteende- eller naturvetenskap samt minst 2 års arbetslivserfarenhet inom för kursen relevant yrkesverksamhet. Gymnasiets engelska 6. Motsvarandebedömning kan göras. Läs mer och anmäl ditt intresse via kursens webbplats: https://www.kau.se/ctf/ise/transformation-hallbar-utveckling
The Internet of Things (IoT) is a networking paradigm which enables different devices (from thermostats to autonomous vehicles) to collect valuable information and exchange it with other devices using different communications protocols over the Internet. This technology allows to analyse and correlate heterogeneous sources of information, extract valuable insights, and enable better decision processes. Although the IoT has the potential to revolutionise a variety of industries, such as healthcare, agriculture, transportation, and manufacturing, IoT devices also introduce new cybersecurity risks and challenges. In this course, the students will obtain an in-depth understanding of the Internet of Things (IoT) and the associated cybersecurity challenges. The course covers the fundamentals of IoT and its applications, the communication protocols used in IoT systems, the cybersecurity threats to IoT, and the countermeasures that can be deployed. The course is split in four main modules, described as follows: Understand and illustrate the basic concepts of the IoT paradigm and its applications Discern benefits and drawback of the most common IoT communication protocols Identify the cybersecurity threats associated with IoT systems Know and select the appropriate cybersecurity countermeasures Course Plan Module 1: Introduction to IoT Definition and characteristics of IoT IoT architecture and components Applications of IoT Module 2: Communication Protocols for IoT Overview of communication protocols used in IoT MQTT, CoAP, and HTTP protocols Advantages and disadvantages of each protocol Module 3: Security Threats to IoT Overview of cybersecurity threats associated with IoT Understanding the risks associated with IoT Malware, DDoS, and phishing attacks Specific vulnerabilities in IoT devices and networks Module 4: Securing IoT Devices and Networks Overview of security measures for IoT systems Network segmentation, access control, and encryption Best practices for securing IoT devices and networks Organisation and Examination Study hours: 80 hours distributed over 7 weeks Scehduled online seminars: January 30th 2024, February 12th 2024 and 11th of March Examination, one of the following: Analysis and presentation of relevant manuscripts in the literature Bring your own problem (BYOP) and solution. For example, analyse the cybersecurity of the IoT network of your company and propose improvements The number of participants in the course is limited, so please hurry with your application!
Skills in development work are becoming increasing importance in professional life. This course offers you the opportunity to develop knowledge and skills in product development, production development, and business development, as well as the relationship between these areas. You will be introduced to systematic working methods for product development, production development, and business development, with a specific focus on innovation and creativity in practical contexts. The goal of the course is to provide a deep understanding of the application of various processes in different types of development work. The objective is for course participants to enhance their ability to understand and apply development processes and gain deeper insights into how these processes relate to organizations' innovation and business strategies in order to achieve circular flows, resilience, and sustainability in the manufacturing industry. The teaching consists of self-study using course literature, films, and other materials through an internet-based course platform, as well as scheduled webinars and written reflections. There are no physical meetings; only digital online seminars are incuded. Study hours: 40 hours distributed over 7 weeks from week 13, 2024 to week 22, 2024. Target Group This course is primarily intended for engineers in management or middle management positions within industry, whether they are recent graduates or individuals with extensive experience. The course is suitable for individuals with backgrounds in mechanical engineering, industrial engineering management, or similar educational background. Entry Requirements To be eligible for this course, participants must have completed courses equivalent to at least 120 credits, with a minimum of 90 ntry Requirementscredits in a technical subject area, with at least a passing grade, or equivalent knowledge. Proficiency in English is also required, equivalent to English Level 6. Link to Syllabus Please note that the number of participants for this course is limited, so we encourage you to apply as soon as possible!