Big Data Analytics in Cybersecurity 2100-CB-M-D4BIGD
The course discusses the subject of conducting scientific research in the field of cybersecurity and large data sets. The course covers modern tools used in research and analytical work, m.in. artificial intelligence algorithms. During the course, such elements as information refining, information content analysis, digital information sources, algorithms for the analysis of large data sets, tools for the analysis of large data sets, including the principles of building your own solutions, methods and tools for collecting data, and systems for storing big data sets m.in are discussed. The course prepares students to independently conduct research in cybersecurity. The subject opens the way to understanding the principles of conducting more complex research in the subject area.
Term 2024L:
The course discusses the subject of conducting scientific research in the field of cybersecurity and large data sets. The course covers modern tools used in research and analytical work, m.in. artificial intelligence algorithms. During the course, such elements as information refining, information content analysis, digital information sources, algorithms for the analysis of large data sets, tools for the analysis of large data sets, including the principles of building your own solutions, methods and tools for collecting data, and systems for storing big data sets m.in are discussed. The course prepares students to independently conduct research in cybersecurity. The subject opens the way to understanding the principles of conducting more complex research in the subject area. |
Mode
Blended learning
Prerequisites (description)
Course coordinators
Learning outcomes
KNOWLEDGE:
------------------------
• They have knowledge in the field of information refining and extracting new useful information from a large data set in the field of negative phenomena that may occur in cybersecurity.
• They have knowledge in the field of methods of diagnosing, analyzing and assessing the risk of a situation posing a threat in cyberspace.
• They have knowledge of the role of artificial intelligence algorithms in detecting and preventing the occurrence of cyber threats.
• They have knowledge of the threats to which organizations, countries and their citizens are exposed from cyberspace.
• They have basic knowledge of collecting and processing data from various sources of information.
• They have knowledge in the field of planning research in areas related to cybersecurity.
SKILLS:
---------------
• They have the skills to plan the research process in the field of cybersecurity using large data sets, information refining and artificial intelligence algorithms.
• They can use the knowledge gained from the research process in the field of cyber threat detection.
• Have skills in the areas of risk management and implementation of preventive strategies to ensure the security of enterprises and state institutions
OTHER COMPETENCES:
--------------------------------------------
• They have competence in the field of popularization of knowledge and shaping responsible attitudes regarding the use of cyberspace.
• They have competence in the field of critical reference to IT security problems in social and economic life.
• They have competence in cooperation with specialists responsible for monitoring threats occurring in cyberspace.
Assessment criteria
Lectures:
----------------
Lectures: Written exam in the form of a test (open and/or closed questions), 50% of correct answers to the positive grade required.
Exercise:
---------------
Assessment based on:
attendance and participation in class (required) - weight 30%,
completion of tasks (projects) assigned by the teacher,
homework - weight 70%"
Practical placement
n/a
Bibliography
Bibliography - please refer to the Polish version of this syllabus.
Additional information
Additional information (registration calendar, class conductors, localization and schedules of classes), might be available in the USOSweb system: