Learning Outcomes

On successful completion of this module, students should be able to:

  • Analyze scientific research papers and describe the role of cyberphysical systems and their needs from a security perspective.
  • Analyze security and privacy requirements for various deployment environments.
  • Analyze threats and vulnerabilities and methods that can be used by a threat agents to deploy an attack.
  • Apply standardized information security management methods that can be used to secure information systems.
  • Identify privacy issues and propose privacy-preserving solutions that can efficiently address them.
  • Familiarize with open source platforms used for the management of cyberphysical systems and their data.