User Tools

Site Tools


teaching_activities

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
teaching_activities [2018/09/14 22:35]
fabio.massacci@unitn.it
teaching_activities [2021/01/29 10:58] (current)
Line 46: Line 46:
  
 ^Title ^Credits ^Year ^Semester ^Lecturer ^Brief Info^ ^Title ^Credits ^Year ^Semester ^Lecturer ^Brief Info^
-|[[http://​disi.unitn.it/​~passerini/​teaching/​2016-2017/​MachineLearning/​|Machine Learning]]|6ECTS| 1,2 | 1 | Andrea Passerini | An introductory course in Machine Learning. SandP students will conclude the course with a project on Intrusion Detection. Recommended to those who wants to continue with Cyber Data Analytics in Twente.| +|[[http://​disi.unitn.it/​~passerini/​teaching/​2018-2019/​MachineLearning/​|Machine Learning]]|6ECTS| 1,2 | 1 | Andrea Passerini | An introductory course in Machine Learning. SandP students will conclude the course with a project on Intrusion Detection. Recommended to those who wants to continue with Cyber Data Analytics in Twente.| 
-|{{https://​www.esse3.unitn.it/​Guide/​PaginaADContest.do?ad_cont_id=10153*88484*2015*2012*9999&​ANNO_ACCADEMICO=2015&​ANNO_COORTE=2015|Data Hiding}}|6ECTS| 1,2 | 1 | Giulia Boato|This optional course is specifically devoted to DRM, digital watermarking and digital forensics. (You need to log in with UNITN credential to see the material)|+|{{https://​www.esse3.unitn.it/​Guide/​StampaContenutiCorso.do?AD_ID=92750|Multimedia ​Data Security}}|6ECTS| 1,2 | 1 | Giulia Boato|This optional course is specifically devoted to DRM, digital watermarking and digital forensics. (You need to log in with UNITN credential to see the material)|
 |[[http://​disi.unitn.it/​~zunino/​teaching/​formalTechniques/​|Formal Techniques for Crypto Protocol Analysis]]|6ECTS| 1,2 | 2 | Roberto Zunino | This optional course introduce formal methods for security using the Coq proof assistant.| |[[http://​disi.unitn.it/​~zunino/​teaching/​formalTechniques/​|Formal Techniques for Crypto Protocol Analysis]]|6ECTS| 1,2 | 2 | Roberto Zunino | This optional course introduce formal methods for security using the Coq proof assistant.|
 | [[Course on Offensive Technologies|Laboratory on Offensive Technologies]] | 12ECTS | 2 | 1 | Not in 2018-2019 | This optional course targets the development of one or more real-world exploits with actual malware.| | [[Course on Offensive Technologies|Laboratory on Offensive Technologies]] | 12ECTS | 2 | 1 | Not in 2018-2019 | This optional course targets the development of one or more real-world exploits with actual malware.|
 |Finite Fields and Symmetric Cryptography|6ECTS| 1,2 | 2 | Massimiliano Sala | An advanced course on Cryptography (follow-up course on Cryptography)| |Finite Fields and Symmetric Cryptography|6ECTS| 1,2 | 2 | Massimiliano Sala | An advanced course on Cryptography (follow-up course on Cryptography)|
 |[[http://​cricca.disi.unitn.it/​montresor/​teaching/​ds2/​|Distributed Systems 2]]|6ECTS| 1,2 | 1 | Alberto Montresor | An advanced course on Distributed Systems (Byzantine Failures, blockchains)| |[[http://​cricca.disi.unitn.it/​montresor/​teaching/​ds2/​|Distributed Systems 2]]|6ECTS| 1,2 | 1 | Alberto Montresor | An advanced course on Distributed Systems (Byzantine Failures, blockchains)|
-|[[Complexity, ​Cryptography and Financial Technology]]|12ECTS| 2 | 1 | Fabio Massacci, Chan Nam Ngo | An advanced course on modern crypto-based Financial Technology (currencies,​ virtual markets) and their foundations,​ in cooperation with INNOPAY NL|+|[[Cryptography and Financial Technology]]|6ECTS| 2 | 1 | Fabio Massacci, Chan Nam Ngo | An advanced course on modern crypto-based Financial Technology (currencies,​ virtual markets) and their foundations,​ in cooperation with INNOPAY NL|
  
  
Line 74: Line 74:
 The last semester (30ECTS) is normally taken by the internship at a company and the thesis. Some information on some places where students have gone. The last semester (30ECTS) is normally taken by the internship at a company and the thesis. Some information on some places where students have gone.
  
-^Company ^Location ^Description ​^More Information+^Company ^Location ^Description ^ 
-|[[http://​www.utrc.utc.com|Ales-UTC]] | Italian Subsidiary of United Technologies (US) | The lab specialized in model based technologies and methodologies for the design and verification of distributed security and safety critical embedded systems. ALES-UTC competences cross several application domains, such as avionics, refrigeration and building automation. ​{{:​teaching:​internship:​ales_intership-thesis.pdf|Short Presentation}}| +|[[http://​www.utrc.utc.com|Ales-UTC]] | Italian Subsidiary of United Technologies (US) | The lab specialized in model based technologies and methodologies for the design and verification of distributed security and safety critical embedded systems. ALES-UTC competences cross several application domains, such as avionics, refrigeration and building automation. ​({{:​teaching:​internship:​ales_intership-thesis.pdf|Short Presentation}})) 
-|[[https://​www.atlassian.com/​|Atlassian]] | Australian subsidiary of Atlassian | Atlassian is a leading provider of collaboration,​ development,​ and issue tracking software for teams. The Sideny team is particularly focussed on security bugs (Aka Bug Bounties). ​| [[https://​jobs.smartrecruiters.com/​Atlassian/​743999652268200-2018-sydney-graduate-program-security-engineer|Job call]] ​+|[[https://​www.atlassian.com/​|Atlassian]] | Australian subsidiary of Atlassian | Atlassian is a leading provider of collaboration,​ development,​ and issue tracking software for teams. The Sideny team is particularly focussed on security bugs (Aka Bug Bounties). | 
-|[[http://​auxiliumcybersec.com/​en/​| Auxilium Cyber Security Gmbh]] | Company based in Ettlingen (DE)| Auxilium offers information security consultancy in several areas including information security management systems (ISO27001, NIST CBF) as well as technical security focusing especially on IoT, automotive and industrial security. ​| New internships coming soon +|[[http://​auxiliumcybersec.com/​en/​| Auxilium Cyber Security Gmbh]] | Company based in Ettlingen (DE)| Auxilium offers information security consultancy in several areas including information security management systems (ISO27001, NIST CBF) as well as technical security focusing especially on IoT, automotive and industrial security. | 
-|[[https://​chino.io/​|Chino.io]]| Startup based in Trento/​Rovereto (IT) | Chino.io helps digital health companies to solve security and regulatory compliance issues by offering a secure Backend and Database as a Service (BAAS) | | +|[[https://​chino.io/​|Chino.io]]| Startup based in Trento/​Rovereto (IT) | Chino.io helps digital health companies to solve security and regulatory compliance issues by offering a secure Backend and Database as a Service (BAAS) | 
-|[[http://​www.endian.com/​|Endian]]| Company Based in Appiano and Milano (IT) | Endian offers Firewalls, Unified Threat Management, IoT Security, ​ and other Industrial Security Appliances. Mostly known for the open source Linux firewall.+|[[https://​cybertrap.com/​|Cybertrap]] | Company based in Vienna (AT) | Cybertrap specialises in deception technology for government organisations and large enterprises. It is a spin-off of SEC Consult, a leading European Cybersecurity consulting firm 
-|FBK| Applied Research Center based in Trento (IT) | FBK has two major research units working on security, safety and software engineering ​| | +|[[http://​www.endian.com/​|Endian]]| Company Based in Appiano and Milano (IT) | Endian offers Firewalls, Unified Threat Management, IoT Security, ​ and other Industrial Security Appliances. Mostly known for the open source Linux firewall. | 
-|SAP AG| Security Research Lab in Sofia-Antipolis (FR) | The Security Team of SAP has often internship positions in a variety of topics from security testing to cloud security | +|FBK| Applied Research Center based in Trento (IT) | FBK has two major research units working on security, safety and software engineering | 
-|[[https://​www.quarkslab.com/​en/​|Quarkslab]]| Company based in Paris (FR) | Quarkslab offers services related to vulnerability research, vulnerability intelligence,​ reverse engineering and software and hardware security. Moreover, the company develops a software protection solution, Epona, and a file analysis platform, IRMA. They publish internship offers on their blog in autumn.| [[https://blog.quarkslab.com/index.html|Blog]]|+|[[https://​www.quarkslab.com/​en/​|Quarkslab]]| Company based in Paris (FR) | Quarkslab offers services related to vulnerability research, vulnerability intelligence,​ reverse engineering and software and hardware security. Moreover, the company develops a software protection solution, Epona, and a file analysis platform, IRMA. They publish internship offers on their [[https://blog.quarkslab.com/​index.html|blog]] ​in autumn. ​
 +|SAP AG | [[https://d.dam.sap.com/m/​UUAxmd/​53596_GB_53596_enUS.pdf|Security Research Lab in Sofia-Antipolis (FR)]] | The Security Team of SAP has often internship positions in a variety of topics from security testing to cloud security. They circulate two calls, one in winter for the spring semester and one in summer for the winter semester. They are normally circulated to interested students. | 
 +| Others |  | Students in the past have done their internships at Apple Inc (US) on fuzzing, Bosch (DE) on IoT Security, Ernst & Young (IT) on Network Forensics, as well as the research centres CISPA (DE) and SICS (SE) on a variety of topics. As a student you may also bring your own company. | 
  
  
teaching_activities.txt · Last modified: 2021/01/29 10:58 (external edit)