Disclaimer: The following schedule might be updated as needed.
Legend: L - lecture, E - exercise, V - video, D - demo, GL - guest lecture
Lectures
- Course introduction: L000
Principles
- Lecture 1 (15.February):
- Lecture 2 (22.February):
- Lecture 3 (29.February): System modelling
- Lecture 4 (7.March): Securing organisation business processes
- Lecture 5 (14.March): Securing system functions and behaviour
- Lecture 6 (21.March):
- Lecture 7 (28.March): Workshop
- Lecture 8 (4. April): Workshop
- System context and asset modelling
- Security risk modelling
- Security requirements and controls
- Access control policy
- Whole template - 2 pdf, docx
Use Cases
- Lecture 9 (11.April): Secure business process-aware systems (lect.: R. Matulevičius)
- Use case slides
- Example of implement mockup
- Lecture 10 (18.April): Secure intelligent infrastructure and systems (lect.: AAO. Affia)
- Lecture 11 (25.April): Secure distributed systems (lect.: M. Iqbal)
- Use case slides
- Lecture 12 (2.May): Risk-aware forensic ready systems (lect.: L.Daubner)
- Use case slides
- Use case extras: model and docker container
- Lecture 13 (9.May): Secure identity management (lect.: M. Bakhtina)
- Lecture 14 (16.May): Workshop
- Goal: improve the workshop solution according to given feedback!
- Presentations of workshop solutions:
- Lecture 15 (23.May): Threshold Cryptography Workshop''' (lect.: A. Dufka and J. Kvapil)
- Lecture 16 (30.May): Summary