Aalto University


Information Security


Security models and terminology, authentication, access control, software security, cryptography, network security, threat analysis, examples of advanced security technologies, privacy, security policies and regulation

After taking the course, students are familiar with the key concepts and abstractions of information security and understand the purpose, function and weaknesses of several security technologies. They are able to model threats and analyze the security of a system critically, from the viewpoint of an attacker. Moreover, they can identify common security flaws in software and apply principles of secure programming. During course, students also practice the use of English in an engineering context.


We use cookies to ensure we give you the best browsing experience on our website. Find out more on how we use cookies and how you can change your settings.

Ok, I understand No, tell me more