Cybersecurity is important for our daily lives including various types of activities. There is a growing demand for students who can be researchers and engineers capable of understanding cybersecurity.
In order to satisfy this demand, Tokyo Tech launches Progressive Graduate Minor in Cybersecurity in April, 2016. We design the curriculum of Progressive Graduate Minor in Cybersecurity in collaboration with NRI as the core, also with Rakuten, NTT, and AIST. The following five classes are organized in School of Computing: Foundation of Cybersecurity (1Q, 2-0-0), Theory of Cryptography for Cybersecurity (3Q, 2-0-0), Attack and Defense on Cybersecurity I (2Q, 1-1-0), Attack and Defense on Cybersecurity II (3Q, 1-1-0), and Attack and Defense on Cybersecurity III (4Q, 1-1-0).
This course is one of the core courses in this minor. This course aims to help students to understand the overview and the backgrounds of cybersecurity. This course also focuses on the relationships between cybersecurity and other research topics in computer science, and on the primitives and the tools in cybersecurity.
By the end of this course, students will be able to understand:
1) the backgrounds of cybersecurity
2) the overview of cybersecurity
3) the relationships between cybersecurity and other research fields in computer science
4) the primitives and the tools used in cybersecurity.
security, information security, cybersecurity, cryptography, network, software, programming, web application, algorithm, computational complexity
✔ Specialist skills | Intercultural skills | Communication skills | ✔ Critical thinking skills | ✔ Practical and/or problem-solving skills |
The class offers a standard type of lecture. The instructors give the small exams solved in classes or as homework assignments.
Course schedule | Required learning | |
---|---|---|
Class 1 | The overview of this course (Keisuke Tanaka (School of Computing)), and the basic notions of cybersecurity (Satoshi Matsuura (GSIC)) | Understand the basic notions of cybersecurity. |
Class 2 | Fundamental elements of cybersecurity (Katsuyoshi Iida (GSIC), Masahiko Tomoishi (GSIC)) | Understand the fundamental elements of cybersecurity. |
Class 3 | Information and communication network and its security (Katsunori Yamaoka (School of Engineering)) | Understand the notion of Information and communication network. |
Class 4 | Theoretical computer science as a foundation of cybersecurity (Toshiya Ito (School of Computing), Osamu Watanabe (School of Computing)) | Understand the notion of theoretical computer science. |
Class 5 | Theory of cryptography as a fundamental element of cybersecurity (Wakaha Ogata (School of Engineering)) | Understand the notion of cryptography. |
Class 6 | Concurrent systems and its security (Shin-ya Nishizaki (School of Computing)) | Understand the notion of concurrent systems. |
Class 7 | Database and its security (Haruo Yokota (School of Computing)) | Understand the notion of database. |
Class 8 | Exercise-style lecture for understanding the elements of cybersecurity (Keisuke Tanaka (School of Computing)) | Understand the elements of cybersecurity. |
Class 9 | Exercise-style lecture for understanding the techniques for cybersecurity (Keisuke Tanaka (School of Computing)) | Understand the techniques for cybersecurity. |
Class 10 | Human computer interaction and its relation to cybersecurity (Hideki Koike (School of Computing)) | Understand the notion of human computer interaction. |
Class 11 | Machine learning and its possible application to cybersecurity (Taiji Suzuki (School of Computing)) | Understand the notion of machine learning. |
Class 12 | Formal methods and secure computing (Takuo Watanabe (School of Computing), Shigeki Hagihara (School of Computing)) | Understand the notion of formal methods and secure computing. |
Class 13 | Software verification and its application to cybersecurity (Yasuhiko Minamide (School of Computing)) | Understand the notion of software verification. |
Class 14 | Visualization of security information (Ken Wakita (School of Computing)) | Understand the techniques for visualization. |
Class 15 | Programming language design and its application to cybersecurity (Hidehiko Masuhara (School of Computing)) | Understand the notion of programming language design. |
Textbooks will be used in this course.
References will be announced in each class.
The evaluation consists of the small exams solved in classes or as homework assignments. The weights of the scores of the small exams are equal. The total score is calculated by omitting the worst three scores.
None. However, the knowledge on the basic notions of computer science can help students to understand the contents of the course smoothly.
keisuke[at]is.titech.ac.jp
Appointment by e-mail is required.