Last modified: 23 Jul 2024 11:05
This course provides an introduction to the analysis of cybersecurity data. It will show how to use tools and methods from data science and machine learning to perform such analysis. Broader issues at the interface of security and privacy with AI will be discussed.
Study Type | Postgraduate | Level | 5 |
---|---|---|---|
Term | First Term | Credit Points | 15 credits (7.5 ECTS credits) |
Campus | Aberdeen | Sustained Study | No |
Co-ordinators |
|
This course provides an introduction to the analysis of cybersecurity data. It will show how to use tools and methods from data science and machine learning to perform such analysis. Broader issues at the interface of security and privacy with AI will be discussed.
Information on contact teaching time is available from the course guide.
Assessment Type | Summative | Weighting | 50 | |
---|---|---|---|---|
Assessment Weeks | 18 | Feedback Weeks | 20 | |
Feedback |
In writing |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Procedural | Evaluate | Familiarity with key concepts, techniques and tools in Artificial intelligence. |
Procedural | Evaluate | Appreciation of security and privacy issues arising from the use of Artificial Intelligence is software systems, including vulnerabilities and mitigations. |
Procedural | Evaluate | Appreciation of uses of specific Artificial Intelligence techniques and tools in cyber security defence and in privacy enhancing technologies. |
Assessment Type | Summative | Weighting | 50 | |
---|---|---|---|---|
Assessment Weeks | 19 | Feedback Weeks | 26 | |
Feedback |
In writing |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Procedural | Analyse | Detailed understanding of possible applications of Artificial Intelligence as an offensive technology. |
Procedural | Evaluate | Familiarity with key concepts, techniques and tools in Artificial intelligence. |
Procedural | Evaluate | Appreciation of security and privacy issues arising from the use of Artificial Intelligence is software systems, including vulnerabilities and mitigations. |
Procedural | Evaluate | Appreciation of uses of specific Artificial Intelligence techniques and tools in cyber security defence and in privacy enhancing technologies. |
There are no assessments for this course.
Assessment Type | Summative | Weighting | 50 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Feedback: In writing |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
Assessment Type | Summative | Weighting | 50 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Feedback: In writing |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Procedural | Evaluate | Appreciation of uses of specific Artificial Intelligence techniques and tools in cyber security defence and in privacy enhancing technologies. |
Procedural | Analyse | Detailed understanding of possible applications of Artificial Intelligence as an offensive technology. |
Procedural | Evaluate | Familiarity with key concepts, techniques and tools in Artificial intelligence. |
Procedural | Evaluate | Appreciation of security and privacy issues arising from the use of Artificial Intelligence is software systems, including vulnerabilities and mitigations. |
We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.