<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://eduwiki.innopolis.university/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=N.zlatanov</id>
	<title>IU - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://eduwiki.innopolis.university/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=N.zlatanov"/>
	<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php/Special:Contributions/N.zlatanov"/>
	<updated>2026-05-07T15:38:46Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=9830</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=9830"/>
		<updated>2026-01-30T06:14:18Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Course activities and grading breakdown */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* Excellent knowledge of probability and statistics.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are two requirements for passing this course:.&lt;br /&gt;
# You must have at least 50% on the Final Exam.&lt;br /&gt;
# You must have at least 50% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz/Assignment during each lecture  (weekly evaluations) || 10&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 25&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 45&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Plagiarism Rules ===&lt;br /&gt;
&lt;br /&gt;
* If a student submits a solution to a weekly assignment/quiz and/or lab that is identical to the one submitted from another student, then both students will obtain the maximum points for this task but with the negative sign.&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures and questions related to parts of the material that you find unclear.&lt;br /&gt;
* Submit solutions to the weekly quizzes.&lt;br /&gt;
* Submit the weekly lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly quizzes and weekly labs.&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 50% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in a written form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9813</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9813"/>
		<updated>2025-09-01T09:10:51Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Key concepts of the class */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 36   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 20&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 4&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===To pass the course, you need:===&lt;br /&gt;
&lt;br /&gt;
# To achieve more than 50% on the final exam.&lt;br /&gt;
# To achieve more than 50% on each individual lab&lt;br /&gt;
&lt;br /&gt;
=== Lab policy: ===&lt;br /&gt;
&lt;br /&gt;
# Only one extension of the deadline is allowed for the labs&lt;br /&gt;
# Students with less than 50% point of a lab, must retake the lab, in which case the highest score will be 55% of the overall score of the lab&lt;br /&gt;
&lt;br /&gt;
=== Retake: ===&lt;br /&gt;
&lt;br /&gt;
The retake of the exam will be oral, but only if the labs have been finished.&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 30%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 30%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 24h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9812</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9812"/>
		<updated>2025-09-01T09:10:29Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 36   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 20&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 4&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===To pass the course, you need:===&lt;br /&gt;
&lt;br /&gt;
# To achieve more than 50% on the final exam.&lt;br /&gt;
# To achieve more than 50% on each individual lab&lt;br /&gt;
&lt;br /&gt;
=== Lab policy: ===&lt;br /&gt;
&lt;br /&gt;
# Only one extension of the deadline is allowed for the labs&lt;br /&gt;
# Students with less than 50% point of a lab, must retake the lab, in which case the highest score will be 55% of the overall score of the lab&lt;br /&gt;
&lt;br /&gt;
=== Retake: ===&lt;br /&gt;
&lt;br /&gt;
The retake of the exam will be oral, but only if the labs have been finished.&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 30%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 30%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 24h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9811</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9811"/>
		<updated>2025-09-01T09:10:16Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 36   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 20&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 4&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===To pass the course, you need:===&lt;br /&gt;
&lt;br /&gt;
# To achieve more than 50% on the final exam.&lt;br /&gt;
# To achieve more than 50% on each individual lab&lt;br /&gt;
&lt;br /&gt;
=== Lab policy: ===&lt;br /&gt;
&lt;br /&gt;
# Only one extension of the deadline is allowed for the labs&lt;br /&gt;
# Students with less than 50% point of a lab, must retake the lab, in which case the highest score will be 55% of the overall score of the lab&lt;br /&gt;
&lt;br /&gt;
=== Retake: ===&lt;br /&gt;
&lt;br /&gt;
The retake of the exam will be oral, but only if the labs have been finished.&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 30%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 30%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 24h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9810</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9810"/>
		<updated>2025-09-01T09:10:04Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 36   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 20&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 4&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===To pass the course, you need:===&lt;br /&gt;
&lt;br /&gt;
# To achieve more than 50% on the final exam.&lt;br /&gt;
# To achieve more than 50% on each individual lab&lt;br /&gt;
&lt;br /&gt;
=== Lab policy: ===&lt;br /&gt;
&lt;br /&gt;
# Only one extension of the deadline is allowed for the labs&lt;br /&gt;
# Students with less than 50% point of a lab, must retake the lab, in which case the highest score will be 55% of the overall score of the lab&lt;br /&gt;
&lt;br /&gt;
=== Retake: ===&lt;br /&gt;
&lt;br /&gt;
The retake of the exam will be oral, but only if the labs have been finished.&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 30%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 30%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 24h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9809</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9809"/>
		<updated>2025-09-01T09:09:48Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 36   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 20&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 4&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===To pass the course, you need:===&lt;br /&gt;
&lt;br /&gt;
# To achieve more than 50% on the final exam.&lt;br /&gt;
# To achieve more than 50% on each individual lab&lt;br /&gt;
&lt;br /&gt;
=== Lab policy: ===&lt;br /&gt;
&lt;br /&gt;
# Only one extension of the deadline is allowed for the labs&lt;br /&gt;
# Students with less than 50% point of a lab, must retake the lab, in which case the highest score will be 55% of the overall score of the lab&lt;br /&gt;
&lt;br /&gt;
=== Retake: ===&lt;br /&gt;
&lt;br /&gt;
The retake of the exam will be oral, but only if the labs have been finished.&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 30%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 30%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 24h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9808</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9808"/>
		<updated>2025-09-01T09:08:55Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Course Sections */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 36   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 20&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 4&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===To pass the course, you need:===&lt;br /&gt;
&lt;br /&gt;
# To achieve more than 50% on the final exam.&lt;br /&gt;
# To achieve more than 50% on each individual lab&lt;br /&gt;
&lt;br /&gt;
=== Lab policy: ===&lt;br /&gt;
&lt;br /&gt;
# Only one extension of the deadline is allowed for the labs&lt;br /&gt;
# Students with less than 50% point of a lab, must retake the lab, in which case the highest score will be 55% of the overall score of the lab&lt;br /&gt;
&lt;br /&gt;
=== Retake: ===&lt;br /&gt;
&lt;br /&gt;
The retake of the exam will be oral, but only if the labs have been finished.&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 30%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 30%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 24h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9807</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9807"/>
		<updated>2025-09-01T09:06:10Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Lab policy: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 36   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 20&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 4&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===To pass the course, you need:===&lt;br /&gt;
&lt;br /&gt;
# To achieve more than 50% on the final exam.&lt;br /&gt;
# To achieve more than 50% on each individual lab&lt;br /&gt;
&lt;br /&gt;
=== Lab policy: ===&lt;br /&gt;
&lt;br /&gt;
# Only one extension of the deadline is allowed for the labs&lt;br /&gt;
# Students with less than 50% point of a lab, must retake the lab, in which case the highest score will be 55% of the overall score of the lab&lt;br /&gt;
&lt;br /&gt;
=== Retake: ===&lt;br /&gt;
&lt;br /&gt;
The retake of the exam will be oral, but only if the labs have been finished.&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 24h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9642</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9642"/>
		<updated>2024-08-26T07:07:14Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* To pass the course, you need: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 36   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 20&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 4&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===To pass the course, you need:===&lt;br /&gt;
&lt;br /&gt;
# To achieve more than 50% on the final exam.&lt;br /&gt;
# To achieve more than 50% on each individual lab&lt;br /&gt;
&lt;br /&gt;
=== Lab policy: ===&lt;br /&gt;
&lt;br /&gt;
# Only one extension of the deadline is allowed for the labs&lt;br /&gt;
# Students with less than 60% point of a lab, must retake the lab, in which case the highest score will be 65% of the overall score of the lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Retake: ===&lt;br /&gt;
&lt;br /&gt;
The retake of the exam will be oral, but only if the labs have been finished.&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 24h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9641</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9641"/>
		<updated>2024-08-26T03:33:33Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Course evaluation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 36   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 20&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 4&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===To pass the course, you need:===&lt;br /&gt;
&lt;br /&gt;
# To achieve more than 50% on the final exam.&lt;br /&gt;
# To achieve more than 60% on each individual lab&lt;br /&gt;
&lt;br /&gt;
=== Lab policy: ===&lt;br /&gt;
&lt;br /&gt;
# Only one extension of the deadline is allowed for the labs&lt;br /&gt;
# Students with less than 60% point of a lab, must retake the lab, in which case the highest score will be 65% of the overall score of the lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Retake: ===&lt;br /&gt;
&lt;br /&gt;
The retake of the exam will be oral, but only if the labs have been finished.&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 24h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9640</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9640"/>
		<updated>2024-08-26T03:28:47Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Course Sections */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 35   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 20&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 5&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===To pass the course, you need:===&lt;br /&gt;
&lt;br /&gt;
# To achieve more than 50% on the final exam.&lt;br /&gt;
# To achieve more than 60% on each individual lab&lt;br /&gt;
&lt;br /&gt;
=== Lab policy: ===&lt;br /&gt;
&lt;br /&gt;
# Only one extension of the deadline is allowed for the labs&lt;br /&gt;
# Students with less than 60% point of a lab, must retake the lab, in which case the highest score will be 65% of the overall score of the lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Retake: ===&lt;br /&gt;
&lt;br /&gt;
The retake of the exam will be oral, but only if the labs have been finished.&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 24h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9639</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9639"/>
		<updated>2024-08-26T03:27:47Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Course evaluation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 35   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 20&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 5&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===To pass the course, you need:===&lt;br /&gt;
&lt;br /&gt;
# To achieve more than 50% on the final exam.&lt;br /&gt;
# To achieve more than 60% on each individual lab&lt;br /&gt;
&lt;br /&gt;
=== Lab policy: ===&lt;br /&gt;
&lt;br /&gt;
# Only one extension of the deadline is allowed for the labs&lt;br /&gt;
# Students with less than 60% point of a lab, must retake the lab, in which case the highest score will be 65% of the overall score of the lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Retake: ===&lt;br /&gt;
&lt;br /&gt;
The retake of the exam will be oral, but only if the labs have been finished.&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 32h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9638</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=9638"/>
		<updated>2024-08-26T03:26:28Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Security of systems and networks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 30   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 30&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 10&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 30&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===To pass the course, you need:===&lt;br /&gt;
&lt;br /&gt;
# To achieve more than 50% on the final exam.&lt;br /&gt;
# To achieve more than 60% on each individual lab&lt;br /&gt;
&lt;br /&gt;
=== Lab policy: ===&lt;br /&gt;
&lt;br /&gt;
# Only one extension of the deadline is allowed for the labs&lt;br /&gt;
# Students with less than 60% point of a lab, must retake the lab, in which case the highest score will be 65% of the overall score of the lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Retake: ===&lt;br /&gt;
&lt;br /&gt;
The retake of the exam will be oral, but only if the labs have been finished.&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 32h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8680</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8680"/>
		<updated>2024-01-22T09:12:43Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Recommendations for students on how to succeed in the course */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* Excellent knowledge of probability and statistics.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are two requirements for passing this course:.&lt;br /&gt;
# You must have at least 50% on the Final Exam.&lt;br /&gt;
# You must have at least 50% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz/Assignment during each lecture  (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Plagiarism Rules ===&lt;br /&gt;
&lt;br /&gt;
* If a student submits a solution to a weekly assignment/quiz and/or lab that is identical to the one submitted from another student, then both students will obtain the maximum points for this task but with the negative sign.&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures and questions related to parts of the material that you find unclear.&lt;br /&gt;
* Submit solutions to the weekly quizzes.&lt;br /&gt;
* Submit the weekly lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly quizzes and weekly labs.&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 50% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in a written form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8679</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8679"/>
		<updated>2024-01-22T09:12:15Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Recommendations for students on how to succeed in the course */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* Excellent knowledge of probability and statistics.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are two requirements for passing this course:.&lt;br /&gt;
# You must have at least 50% on the Final Exam.&lt;br /&gt;
# You must have at least 50% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz/Assignment during each lecture  (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Plagiarism Rules ===&lt;br /&gt;
&lt;br /&gt;
* If a student submits a solution to a weekly assignment/quiz and/or lab that is identical to the one submitted from another student, then both students will obtain the maximum points for this task but with the negative sign.&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures and questions related to parts of the material that you find unclear.&lt;br /&gt;
* Submit solutions to the weekly quizzes.&lt;br /&gt;
* Submit all of the lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly quizzes and weekly labs.&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 50% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in a written form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8678</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8678"/>
		<updated>2024-01-22T09:11:59Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Recommendations for students on how to succeed in the course */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* Excellent knowledge of probability and statistics.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are two requirements for passing this course:.&lt;br /&gt;
# You must have at least 50% on the Final Exam.&lt;br /&gt;
# You must have at least 50% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz/Assignment during each lecture  (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Plagiarism Rules ===&lt;br /&gt;
&lt;br /&gt;
* If a student submits a solution to a weekly assignment/quiz and/or lab that is identical to the one submitted from another student, then both students will obtain the maximum points for this task but with the negative sign.&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures and and questions related to parts of the material that you find unclear.&lt;br /&gt;
* Submit solutions to the weekly quizzes.&lt;br /&gt;
* Submit all of the lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly quizzes and weekly labs.&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 50% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in a written form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8677</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8677"/>
		<updated>2024-01-22T09:08:10Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Plagiarism Rules */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* Excellent knowledge of probability and statistics.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are two requirements for passing this course:.&lt;br /&gt;
# You must have at least 50% on the Final Exam.&lt;br /&gt;
# You must have at least 50% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz/Assignment during each lecture  (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Plagiarism Rules ===&lt;br /&gt;
&lt;br /&gt;
* If a student submits a solution to a weekly assignment/quiz and/or lab that is identical to the one submitted from another student, then both students will obtain the maximum points for this task but with the negative sign.&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures&lt;br /&gt;
* Ask questions and provide answers to the questions during the onsite lectures.&lt;br /&gt;
* Attend all of the labs and submit all of the lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly quizzes and weekly labs.&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 50% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in a written form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8676</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8676"/>
		<updated>2024-01-22T09:07:56Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Grading */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* Excellent knowledge of probability and statistics.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are two requirements for passing this course:.&lt;br /&gt;
# You must have at least 50% on the Final Exam.&lt;br /&gt;
# You must have at least 50% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz/Assignment during each lecture  (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Plagiarism Rules ===&lt;br /&gt;
&lt;br /&gt;
# If a student submits a solution to a weekly assignment/quiz and/or lab that is identical to the one submitted from another student, then both students will obtain the maximum points for this task but with the negative sign.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures&lt;br /&gt;
* Ask questions and provide answers to the questions during the onsite lectures.&lt;br /&gt;
* Attend all of the labs and submit all of the lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly quizzes and weekly labs.&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 50% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in a written form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8675</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8675"/>
		<updated>2024-01-22T09:03:37Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Ongoing performance assessment */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* Excellent knowledge of probability and statistics.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are two requirements for passing this course:.&lt;br /&gt;
# You must have at least 50% on the Final Exam.&lt;br /&gt;
# You must have at least 50% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz/Assignment during each lecture  (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures&lt;br /&gt;
* Ask questions and provide answers to the questions during the onsite lectures.&lt;br /&gt;
* Attend all of the labs and submit all of the lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly quizzes and weekly labs.&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 50% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in a written form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8674</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8674"/>
		<updated>2024-01-22T09:02:52Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Course activities and grading breakdown */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* Excellent knowledge of probability and statistics.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are two requirements for passing this course:.&lt;br /&gt;
# You must have at least 50% on the Final Exam.&lt;br /&gt;
# You must have at least 50% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz/Assignment during each lecture  (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 20&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 40&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures&lt;br /&gt;
* Ask questions and provide answers to the questions during the onsite lectures.&lt;br /&gt;
* Attend all of the labs and submit all of the lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly questions and weekly labs&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 50% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in a written form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8673</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8673"/>
		<updated>2024-01-22T09:01:30Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Final assessment */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* Excellent knowledge of probability and statistics.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are two requirements for passing this course:.&lt;br /&gt;
# You must have at least 50% on the Final Exam.&lt;br /&gt;
# You must have at least 50% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz during each lecture  (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 50&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures&lt;br /&gt;
* Ask questions and provide answers to the questions during the onsite lectures.&lt;br /&gt;
* Attend all of the labs and submit all of the lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly questions and weekly labs&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 50% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in a written form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8672</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8672"/>
		<updated>2024-01-22T09:01:12Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* The retake exam */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* Excellent knowledge of probability and statistics.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are two requirements for passing this course:.&lt;br /&gt;
# You must have at least 50% on the Final Exam.&lt;br /&gt;
# You must have at least 50% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz during each lecture  (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 50&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures&lt;br /&gt;
* Ask questions and provide answers to the questions during the onsite lectures.&lt;br /&gt;
* Attend all of the labs and submit all of the lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly questions and weekly labs&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 51% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in a written form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8671</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8671"/>
		<updated>2024-01-22T09:01:03Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* The retake exam */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* Excellent knowledge of probability and statistics.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are two requirements for passing this course:.&lt;br /&gt;
# You must have at least 50% on the Final Exam.&lt;br /&gt;
# You must have at least 50% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz during each lecture  (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 50&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures&lt;br /&gt;
* Ask questions and provide answers to the questions during the onsite lectures.&lt;br /&gt;
* Attend all of the labs and submit all of the lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly questions and weekly labs&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 51% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in written form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8670</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8670"/>
		<updated>2024-01-22T09:00:34Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Minimum Requirements For Passing The Course */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* Excellent knowledge of probability and statistics.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are two requirements for passing this course:.&lt;br /&gt;
# You must have at least 50% on the Final Exam.&lt;br /&gt;
# You must have at least 50% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz during each lecture  (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 50&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures&lt;br /&gt;
* Ask questions and provide answers to the questions during the onsite lectures.&lt;br /&gt;
* Attend all of the labs and submit all of the lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly questions and weekly labs&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 51% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in oral form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8669</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8669"/>
		<updated>2024-01-22T08:59:24Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Prerequisite subjects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* Excellent knowledge of probability and statistics.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are four requirements for passing this course:&lt;br /&gt;
# You must attend all labs.&lt;br /&gt;
# You must submit all lab reports.&lt;br /&gt;
# You must have at least 50% on the Final Exam.&lt;br /&gt;
# You must have at least 50% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz during each lecture  (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 50&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures&lt;br /&gt;
* Ask questions and provide answers to the questions during the onsite lectures.&lt;br /&gt;
* Attend all of the labs and submit all of the lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly questions and weekly labs&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 51% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in oral form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8500</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8500"/>
		<updated>2023-08-30T08:06:42Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Grades range */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course number:'''&amp;lt;/span&amp;gt; SNE-08&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 30   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 30&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 10&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 30&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===To pass the course, you need:===&lt;br /&gt;
&lt;br /&gt;
# To achieve more than 50% on the final exam.&lt;br /&gt;
# To achieve more than 60% on each individual lab&lt;br /&gt;
&lt;br /&gt;
=== Lab policy: ===&lt;br /&gt;
&lt;br /&gt;
# Only one extension of the deadline is allowed for the labs&lt;br /&gt;
# Students with less than 60% point of a lab, must retake the lab, in which case the highest score will be 65% of the overall score of the lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Retake: ===&lt;br /&gt;
&lt;br /&gt;
The retake of the exam will be oral, but only if the labs have been finished.&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 32h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8499</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8499"/>
		<updated>2023-08-30T08:05:07Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Grades range */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course number:'''&amp;lt;/span&amp;gt; SNE-08&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 30   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 30&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 10&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 30&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
To pass the course, you need:&lt;br /&gt;
&lt;br /&gt;
# To achieve more than 50% on the final exam.&lt;br /&gt;
# To achieve more than 60% on each individual lab&lt;br /&gt;
&lt;br /&gt;
Lab policy:&lt;br /&gt;
&lt;br /&gt;
# Only one extension of the deadline is allowed for the labs&lt;br /&gt;
# Students with less than 60% point of a lab, must retake the lab, in which case the highest score will be 65% of the overall score of the lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Retake:&lt;br /&gt;
&lt;br /&gt;
The retake of the exam will be oral, but only if the labs have been finished.&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 32h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8495</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8495"/>
		<updated>2023-08-28T17:48:43Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* What forms of evaluation were used to test students’ performance in this section? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course number:'''&amp;lt;/span&amp;gt; SNE-08&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 30   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 30&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 10&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 30&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 32h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8494</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8494"/>
		<updated>2023-08-28T17:48:29Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* What forms of evaluation were used to test students’ performance in this section? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course number:'''&amp;lt;/span&amp;gt; SNE-08&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 30   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 30&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 10&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 30&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 32h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8493</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8493"/>
		<updated>2023-08-28T17:48:15Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* What forms of evaluation were used to test students’ performance in this section? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course number:'''&amp;lt;/span&amp;gt; SNE-08&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 30   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 30&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 10&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 30&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 32h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8492</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8492"/>
		<updated>2023-08-28T17:47:55Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* What forms of evaluation were used to test students’ performance in this section? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course number:'''&amp;lt;/span&amp;gt; SNE-08&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 30   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 30&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 10&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 30&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 32h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8491</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8491"/>
		<updated>2023-08-28T17:47:17Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Course evaluation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course number:'''&amp;lt;/span&amp;gt; SNE-08&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs  || 30   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 30&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quiz || 10&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 30&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 32h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
 &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8490</id>
		<title>BSc: Introduction To Computer Vision</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8490"/>
		<updated>2023-08-28T06:29:20Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Course activities and grading breakdown */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Introduction to Computer Vision =&lt;br /&gt;
* '''Course name''': Introduction to Computer Vision&lt;br /&gt;
* '''Code discipline''': XXX&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course covers the following concepts: Computer vision using machine learning models.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Representation of images and videos || &lt;br /&gt;
# Computer representation&lt;br /&gt;
# Rescaling/manipulating images&lt;br /&gt;
|-&lt;br /&gt;
| Image Classification || &lt;br /&gt;
# Loss Functions&lt;br /&gt;
# Backpropagation&lt;br /&gt;
# Neural Networks&lt;br /&gt;
# Training&lt;br /&gt;
|-&lt;br /&gt;
| Convolutional Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Recurrent Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Image Segmentation and object detection || &lt;br /&gt;
# Techniques&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
This course provides an introductory but detailed treatment of computer vision techniques using machine learning, with an emphasis on implementing the computer vision algorithms from the scratch and using them to solve real-world problems. The course will begin with the image representation, but will quickly transition to computer vision techniques using machine learning, finishing with image segmentation and object detection and recognition. A key focus of the course is on providing students with not only theory but also hands-on practice of building their computer vision applications.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Significant exposure to real-world implementations&lt;br /&gt;
* To develop research interest in the theory and application of computer vision&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Suitability of different computer vision models in different scenarios&lt;br /&gt;
* Ability to choose the right model for the given task&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Hands on experience to implement different models to know inside behavior&lt;br /&gt;
* Sufficient exposure to train and deploy model for the given task&lt;br /&gt;
* Fine tune the deployed model in the real-world settings &lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 91-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 78-90 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 60-77 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-59 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Labs || 50&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quizzes || 10&lt;br /&gt;
|-&lt;br /&gt;
| Midterm Exam || 15&lt;br /&gt;
|-&lt;br /&gt;
| Final Exam || 25&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* Handouts supplied by the instructor&lt;br /&gt;
* Materials from the internet and research papers shared by instructor&lt;br /&gt;
&lt;br /&gt;
=== Closed access resources ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
 &lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8489</id>
		<title>BSc: Introduction To Computer Vision</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8489"/>
		<updated>2023-08-28T06:28:23Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Activities and Teaching Methods */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Introduction to Computer Vision =&lt;br /&gt;
* '''Course name''': Introduction to Computer Vision&lt;br /&gt;
* '''Code discipline''': XXX&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course covers the following concepts: Computer vision using machine learning models.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Representation of images and videos || &lt;br /&gt;
# Computer representation&lt;br /&gt;
# Rescaling/manipulating images&lt;br /&gt;
|-&lt;br /&gt;
| Image Classification || &lt;br /&gt;
# Loss Functions&lt;br /&gt;
# Backpropagation&lt;br /&gt;
# Neural Networks&lt;br /&gt;
# Training&lt;br /&gt;
|-&lt;br /&gt;
| Convolutional Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Recurrent Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Image Segmentation and object detection || &lt;br /&gt;
# Techniques&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
This course provides an introductory but detailed treatment of computer vision techniques using machine learning, with an emphasis on implementing the computer vision algorithms from the scratch and using them to solve real-world problems. The course will begin with the image representation, but will quickly transition to computer vision techniques using machine learning, finishing with image segmentation and object detection and recognition. A key focus of the course is on providing students with not only theory but also hands-on practice of building their computer vision applications.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Significant exposure to real-world implementations&lt;br /&gt;
* To develop research interest in the theory and application of computer vision&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Suitability of different computer vision models in different scenarios&lt;br /&gt;
* Ability to choose the right model for the given task&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Hands on experience to implement different models to know inside behavior&lt;br /&gt;
* Sufficient exposure to train and deploy model for the given task&lt;br /&gt;
* Fine tune the deployed model in the real-world settings &lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 91-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 78-90 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 60-77 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-59 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Labs || 55&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quizzes || 10&lt;br /&gt;
|-&lt;br /&gt;
| Midterm Exam || 15&lt;br /&gt;
|-&lt;br /&gt;
| Final Exam || 20&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* Handouts supplied by the instructor&lt;br /&gt;
* Materials from the internet and research papers shared by instructor&lt;br /&gt;
&lt;br /&gt;
=== Closed access resources ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
 &lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8488</id>
		<title>BSc: Introduction To Computer Vision</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8488"/>
		<updated>2023-08-28T06:27:56Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Formative Assessment and Course Activities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Introduction to Computer Vision =&lt;br /&gt;
* '''Course name''': Introduction to Computer Vision&lt;br /&gt;
* '''Code discipline''': XXX&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course covers the following concepts: Computer vision using machine learning models.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Representation of images and videos || &lt;br /&gt;
# Computer representation&lt;br /&gt;
# Rescaling/manipulating images&lt;br /&gt;
|-&lt;br /&gt;
| Image Classification || &lt;br /&gt;
# Loss Functions&lt;br /&gt;
# Backpropagation&lt;br /&gt;
# Neural Networks&lt;br /&gt;
# Training&lt;br /&gt;
|-&lt;br /&gt;
| Convolutional Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Recurrent Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Image Segmentation and object detection || &lt;br /&gt;
# Techniques&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
This course provides an introductory but detailed treatment of computer vision techniques using machine learning, with an emphasis on implementing the computer vision algorithms from the scratch and using them to solve real-world problems. The course will begin with the image representation, but will quickly transition to computer vision techniques using machine learning, finishing with image segmentation and object detection and recognition. A key focus of the course is on providing students with not only theory but also hands-on practice of building their computer vision applications.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Significant exposure to real-world implementations&lt;br /&gt;
* To develop research interest in the theory and application of computer vision&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Suitability of different computer vision models in different scenarios&lt;br /&gt;
* Ability to choose the right model for the given task&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Hands on experience to implement different models to know inside behavior&lt;br /&gt;
* Sufficient exposure to train and deploy model for the given task&lt;br /&gt;
* Fine tune the deployed model in the real-world settings &lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 91-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 78-90 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 60-77 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-59 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Labs || 55&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quizzes || 10&lt;br /&gt;
|-&lt;br /&gt;
| Midterm Exam || 15&lt;br /&gt;
|-&lt;br /&gt;
| Final Exam || 20&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* Handouts supplied by the instructor&lt;br /&gt;
* Materials from the internet and research papers shared by instructor&lt;br /&gt;
&lt;br /&gt;
=== Closed access resources ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
 &lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Activities and Teaching Methods ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Activities within each section&lt;br /&gt;
|-&lt;br /&gt;
! Learning Activities !! Section 1 !! Section 2 !! Section 3 !! Section 4&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || 1 || 1 || 1 || 1&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8487</id>
		<title>BSc: Introduction To Computer Vision</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8487"/>
		<updated>2023-08-28T06:27:14Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Course grading range */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Introduction to Computer Vision =&lt;br /&gt;
* '''Course name''': Introduction to Computer Vision&lt;br /&gt;
* '''Code discipline''': XXX&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course covers the following concepts: Computer vision using machine learning models.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Representation of images and videos || &lt;br /&gt;
# Computer representation&lt;br /&gt;
# Rescaling/manipulating images&lt;br /&gt;
|-&lt;br /&gt;
| Image Classification || &lt;br /&gt;
# Loss Functions&lt;br /&gt;
# Backpropagation&lt;br /&gt;
# Neural Networks&lt;br /&gt;
# Training&lt;br /&gt;
|-&lt;br /&gt;
| Convolutional Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Recurrent Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Image Segmentation and object detection || &lt;br /&gt;
# Techniques&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
This course provides an introductory but detailed treatment of computer vision techniques using machine learning, with an emphasis on implementing the computer vision algorithms from the scratch and using them to solve real-world problems. The course will begin with the image representation, but will quickly transition to computer vision techniques using machine learning, finishing with image segmentation and object detection and recognition. A key focus of the course is on providing students with not only theory but also hands-on practice of building their computer vision applications.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Significant exposure to real-world implementations&lt;br /&gt;
* To develop research interest in the theory and application of computer vision&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Suitability of different computer vision models in different scenarios&lt;br /&gt;
* Ability to choose the right model for the given task&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Hands on experience to implement different models to know inside behavior&lt;br /&gt;
* Sufficient exposure to train and deploy model for the given task&lt;br /&gt;
* Fine tune the deployed model in the real-world settings &lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 91-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 78-90 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 60-77 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-59 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Labs || 55&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quizzes || 10&lt;br /&gt;
|-&lt;br /&gt;
| Midterm Exam || 15&lt;br /&gt;
|-&lt;br /&gt;
| Final Exam || 20&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* Handouts supplied by the instructor&lt;br /&gt;
* Materials from the internet and research papers shared by instructor&lt;br /&gt;
&lt;br /&gt;
=== Closed access resources ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
 &lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Activities and Teaching Methods ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Activities within each section&lt;br /&gt;
|-&lt;br /&gt;
! Learning Activities !! Section 1 !! Section 2 !! Section 3 !! Section 4&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || 1 || 1 || 1 || 1&lt;br /&gt;
|} &lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
&lt;br /&gt;
==== Section 1 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the color spaces and where it’s used? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the primary and secondary colors? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How image is formed into computers? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you will convert the RGB to grayscale images || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Loading and plotting the images in python environment || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Convertion of different color spaces || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you find the skin in the images based on the color space models || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || how to find red eye dot in face using color space models || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 2 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the challenges to perform histogram task? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Apply convolutional filter to calculate the response. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What kind of parameters are required to apply different image filters? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you will compute the gradients of the image and its benefits? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Otsu Method || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Sobel, Preweitt filters || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Canny edge detector || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Perform analysis over the different filtering on the given images || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 3 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || How feature extractor works over the given image? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What is the difference between the feature extraction and descriptors? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Explain the examples of descriptors and feature extractors. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Write down the pros and cons of SIFT, HOG and Harris. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement template matching algorithm || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement histogram of gradient using CV2 library || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement of SIFT for the given task || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Harris corner detection || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Analysis of different extractors for the given task || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 4 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || How classification task is different from detection task? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Explain the transfer learning mechanism for object detection task. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How many types of model exist for object tracking in videos. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Write down the pros and cons of YOLO, FCN and MDNet. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement YOLO using transfer learning mechanism || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement GAN for MNIST dataset || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement FCN and GOTURN || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Analysis of different models for the given task || 0&lt;br /&gt;
|} &lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
'''Section 1'''&lt;br /&gt;
# How you can distinguish different color spaces?&lt;br /&gt;
# Explain and provide the reason for the blind spot creation in human eye.&lt;br /&gt;
# In what scenarios computer vision is better than human vision?&lt;br /&gt;
# Write down different robotic application areas where computer vision is applied successfully.&lt;br /&gt;
'''Section 2'''&lt;br /&gt;
# Calculate the kernels for the given images&lt;br /&gt;
# Explain the difference between different filters&lt;br /&gt;
# What is image noise and how it contributes to make the computer vision task difficult?&lt;br /&gt;
# Apply different combination of the filters to achieve the required output of the given image.&lt;br /&gt;
'''Section 3'''&lt;br /&gt;
# How you distinguish different feature extractors and descriptors?&lt;br /&gt;
# What are the possible methods to detect the corners?&lt;br /&gt;
# How corners are useful to help the robotic vision task?&lt;br /&gt;
# How you will patch the different images to construct the map of the location?&lt;br /&gt;
'''Section 4'''&lt;br /&gt;
# What are the loss functions used in YOLO?&lt;br /&gt;
# What are the learnable parameters of FCN for semantic segmentation?&lt;br /&gt;
# How semantic segmentation is different from instance segmentation?&lt;br /&gt;
# Write the application areas for object tracking in robotics.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
'''Section 1'''&lt;br /&gt;
&lt;br /&gt;
'''Section 2'''&lt;br /&gt;
&lt;br /&gt;
'''Section 3'''&lt;br /&gt;
&lt;br /&gt;
'''Section 4'''&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8486</id>
		<title>BSc: Introduction To Computer Vision</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8486"/>
		<updated>2023-08-28T06:26:29Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Course activities and grading breakdown */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Introduction to Computer Vision =&lt;br /&gt;
* '''Course name''': Introduction to Computer Vision&lt;br /&gt;
* '''Code discipline''': XXX&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course covers the following concepts: Computer vision using machine learning models.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Representation of images and videos || &lt;br /&gt;
# Computer representation&lt;br /&gt;
# Rescaling/manipulating images&lt;br /&gt;
|-&lt;br /&gt;
| Image Classification || &lt;br /&gt;
# Loss Functions&lt;br /&gt;
# Backpropagation&lt;br /&gt;
# Neural Networks&lt;br /&gt;
# Training&lt;br /&gt;
|-&lt;br /&gt;
| Convolutional Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Recurrent Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Image Segmentation and object detection || &lt;br /&gt;
# Techniques&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
This course provides an introductory but detailed treatment of computer vision techniques using machine learning, with an emphasis on implementing the computer vision algorithms from the scratch and using them to solve real-world problems. The course will begin with the image representation, but will quickly transition to computer vision techniques using machine learning, finishing with image segmentation and object detection and recognition. A key focus of the course is on providing students with not only theory but also hands-on practice of building their computer vision applications.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Significant exposure to real-world implementations&lt;br /&gt;
* To develop research interest in the theory and application of computer vision&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Suitability of different computer vision models in different scenarios&lt;br /&gt;
* Ability to choose the right model for the given task&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Hands on experience to implement different models to know inside behavior&lt;br /&gt;
* Sufficient exposure to train and deploy model for the given task&lt;br /&gt;
* Fine tune the deployed model in the real-world settings &lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 91-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 75-90 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 60-74 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-59 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Labs || 55&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quizzes || 10&lt;br /&gt;
|-&lt;br /&gt;
| Midterm Exam || 15&lt;br /&gt;
|-&lt;br /&gt;
| Final Exam || 20&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* Handouts supplied by the instructor&lt;br /&gt;
* Materials from the internet and research papers shared by instructor&lt;br /&gt;
&lt;br /&gt;
=== Closed access resources ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
 &lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Activities and Teaching Methods ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Activities within each section&lt;br /&gt;
|-&lt;br /&gt;
! Learning Activities !! Section 1 !! Section 2 !! Section 3 !! Section 4&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || 1 || 1 || 1 || 1&lt;br /&gt;
|} &lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
&lt;br /&gt;
==== Section 1 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the color spaces and where it’s used? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the primary and secondary colors? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How image is formed into computers? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you will convert the RGB to grayscale images || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Loading and plotting the images in python environment || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Convertion of different color spaces || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you find the skin in the images based on the color space models || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || how to find red eye dot in face using color space models || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 2 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the challenges to perform histogram task? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Apply convolutional filter to calculate the response. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What kind of parameters are required to apply different image filters? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you will compute the gradients of the image and its benefits? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Otsu Method || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Sobel, Preweitt filters || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Canny edge detector || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Perform analysis over the different filtering on the given images || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 3 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || How feature extractor works over the given image? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What is the difference between the feature extraction and descriptors? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Explain the examples of descriptors and feature extractors. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Write down the pros and cons of SIFT, HOG and Harris. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement template matching algorithm || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement histogram of gradient using CV2 library || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement of SIFT for the given task || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Harris corner detection || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Analysis of different extractors for the given task || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 4 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || How classification task is different from detection task? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Explain the transfer learning mechanism for object detection task. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How many types of model exist for object tracking in videos. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Write down the pros and cons of YOLO, FCN and MDNet. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement YOLO using transfer learning mechanism || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement GAN for MNIST dataset || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement FCN and GOTURN || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Analysis of different models for the given task || 0&lt;br /&gt;
|} &lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
'''Section 1'''&lt;br /&gt;
# How you can distinguish different color spaces?&lt;br /&gt;
# Explain and provide the reason for the blind spot creation in human eye.&lt;br /&gt;
# In what scenarios computer vision is better than human vision?&lt;br /&gt;
# Write down different robotic application areas where computer vision is applied successfully.&lt;br /&gt;
'''Section 2'''&lt;br /&gt;
# Calculate the kernels for the given images&lt;br /&gt;
# Explain the difference between different filters&lt;br /&gt;
# What is image noise and how it contributes to make the computer vision task difficult?&lt;br /&gt;
# Apply different combination of the filters to achieve the required output of the given image.&lt;br /&gt;
'''Section 3'''&lt;br /&gt;
# How you distinguish different feature extractors and descriptors?&lt;br /&gt;
# What are the possible methods to detect the corners?&lt;br /&gt;
# How corners are useful to help the robotic vision task?&lt;br /&gt;
# How you will patch the different images to construct the map of the location?&lt;br /&gt;
'''Section 4'''&lt;br /&gt;
# What are the loss functions used in YOLO?&lt;br /&gt;
# What are the learnable parameters of FCN for semantic segmentation?&lt;br /&gt;
# How semantic segmentation is different from instance segmentation?&lt;br /&gt;
# Write the application areas for object tracking in robotics.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
'''Section 1'''&lt;br /&gt;
&lt;br /&gt;
'''Section 2'''&lt;br /&gt;
&lt;br /&gt;
'''Section 3'''&lt;br /&gt;
&lt;br /&gt;
'''Section 4'''&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8485</id>
		<title>BSc: Introduction To Computer Vision</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8485"/>
		<updated>2023-08-28T06:26:14Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Course activities and grading breakdown */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Introduction to Computer Vision =&lt;br /&gt;
* '''Course name''': Introduction to Computer Vision&lt;br /&gt;
* '''Code discipline''': XXX&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course covers the following concepts: Computer vision using machine learning models.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Representation of images and videos || &lt;br /&gt;
# Computer representation&lt;br /&gt;
# Rescaling/manipulating images&lt;br /&gt;
|-&lt;br /&gt;
| Image Classification || &lt;br /&gt;
# Loss Functions&lt;br /&gt;
# Backpropagation&lt;br /&gt;
# Neural Networks&lt;br /&gt;
# Training&lt;br /&gt;
|-&lt;br /&gt;
| Convolutional Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Recurrent Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Image Segmentation and object detection || &lt;br /&gt;
# Techniques&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
This course provides an introductory but detailed treatment of computer vision techniques using machine learning, with an emphasis on implementing the computer vision algorithms from the scratch and using them to solve real-world problems. The course will begin with the image representation, but will quickly transition to computer vision techniques using machine learning, finishing with image segmentation and object detection and recognition. A key focus of the course is on providing students with not only theory but also hands-on practice of building their computer vision applications.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Significant exposure to real-world implementations&lt;br /&gt;
* To develop research interest in the theory and application of computer vision&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Suitability of different computer vision models in different scenarios&lt;br /&gt;
* Ability to choose the right model for the given task&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Hands on experience to implement different models to know inside behavior&lt;br /&gt;
* Sufficient exposure to train and deploy model for the given task&lt;br /&gt;
* Fine tune the deployed model in the real-world settings &lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 91-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 75-90 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 60-74 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-59 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Labs/seminar classes || 55&lt;br /&gt;
|-&lt;br /&gt;
| Weekly Quizzes || 10&lt;br /&gt;
|-&lt;br /&gt;
| Midterm Exam || 15&lt;br /&gt;
|-&lt;br /&gt;
| Final Exam || 20&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* Handouts supplied by the instructor&lt;br /&gt;
* Materials from the internet and research papers shared by instructor&lt;br /&gt;
&lt;br /&gt;
=== Closed access resources ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
 &lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Activities and Teaching Methods ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Activities within each section&lt;br /&gt;
|-&lt;br /&gt;
! Learning Activities !! Section 1 !! Section 2 !! Section 3 !! Section 4&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || 1 || 1 || 1 || 1&lt;br /&gt;
|} &lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
&lt;br /&gt;
==== Section 1 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the color spaces and where it’s used? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the primary and secondary colors? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How image is formed into computers? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you will convert the RGB to grayscale images || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Loading and plotting the images in python environment || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Convertion of different color spaces || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you find the skin in the images based on the color space models || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || how to find red eye dot in face using color space models || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 2 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the challenges to perform histogram task? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Apply convolutional filter to calculate the response. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What kind of parameters are required to apply different image filters? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you will compute the gradients of the image and its benefits? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Otsu Method || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Sobel, Preweitt filters || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Canny edge detector || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Perform analysis over the different filtering on the given images || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 3 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || How feature extractor works over the given image? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What is the difference between the feature extraction and descriptors? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Explain the examples of descriptors and feature extractors. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Write down the pros and cons of SIFT, HOG and Harris. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement template matching algorithm || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement histogram of gradient using CV2 library || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement of SIFT for the given task || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Harris corner detection || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Analysis of different extractors for the given task || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 4 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || How classification task is different from detection task? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Explain the transfer learning mechanism for object detection task. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How many types of model exist for object tracking in videos. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Write down the pros and cons of YOLO, FCN and MDNet. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement YOLO using transfer learning mechanism || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement GAN for MNIST dataset || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement FCN and GOTURN || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Analysis of different models for the given task || 0&lt;br /&gt;
|} &lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
'''Section 1'''&lt;br /&gt;
# How you can distinguish different color spaces?&lt;br /&gt;
# Explain and provide the reason for the blind spot creation in human eye.&lt;br /&gt;
# In what scenarios computer vision is better than human vision?&lt;br /&gt;
# Write down different robotic application areas where computer vision is applied successfully.&lt;br /&gt;
'''Section 2'''&lt;br /&gt;
# Calculate the kernels for the given images&lt;br /&gt;
# Explain the difference between different filters&lt;br /&gt;
# What is image noise and how it contributes to make the computer vision task difficult?&lt;br /&gt;
# Apply different combination of the filters to achieve the required output of the given image.&lt;br /&gt;
'''Section 3'''&lt;br /&gt;
# How you distinguish different feature extractors and descriptors?&lt;br /&gt;
# What are the possible methods to detect the corners?&lt;br /&gt;
# How corners are useful to help the robotic vision task?&lt;br /&gt;
# How you will patch the different images to construct the map of the location?&lt;br /&gt;
'''Section 4'''&lt;br /&gt;
# What are the loss functions used in YOLO?&lt;br /&gt;
# What are the learnable parameters of FCN for semantic segmentation?&lt;br /&gt;
# How semantic segmentation is different from instance segmentation?&lt;br /&gt;
# Write the application areas for object tracking in robotics.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
'''Section 1'''&lt;br /&gt;
&lt;br /&gt;
'''Section 2'''&lt;br /&gt;
&lt;br /&gt;
'''Section 3'''&lt;br /&gt;
&lt;br /&gt;
'''Section 4'''&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8484</id>
		<title>BSc: Introduction To Computer Vision</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8484"/>
		<updated>2023-08-28T06:24:56Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Course grading range */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Introduction to Computer Vision =&lt;br /&gt;
* '''Course name''': Introduction to Computer Vision&lt;br /&gt;
* '''Code discipline''': XXX&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course covers the following concepts: Computer vision using machine learning models.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Representation of images and videos || &lt;br /&gt;
# Computer representation&lt;br /&gt;
# Rescaling/manipulating images&lt;br /&gt;
|-&lt;br /&gt;
| Image Classification || &lt;br /&gt;
# Loss Functions&lt;br /&gt;
# Backpropagation&lt;br /&gt;
# Neural Networks&lt;br /&gt;
# Training&lt;br /&gt;
|-&lt;br /&gt;
| Convolutional Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Recurrent Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Image Segmentation and object detection || &lt;br /&gt;
# Techniques&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
This course provides an introductory but detailed treatment of computer vision techniques using machine learning, with an emphasis on implementing the computer vision algorithms from the scratch and using them to solve real-world problems. The course will begin with the image representation, but will quickly transition to computer vision techniques using machine learning, finishing with image segmentation and object detection and recognition. A key focus of the course is on providing students with not only theory but also hands-on practice of building their computer vision applications.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Significant exposure to real-world implementations&lt;br /&gt;
* To develop research interest in the theory and application of computer vision&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Suitability of different computer vision models in different scenarios&lt;br /&gt;
* Ability to choose the right model for the given task&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Hands on experience to implement different models to know inside behavior&lt;br /&gt;
* Sufficient exposure to train and deploy model for the given task&lt;br /&gt;
* Fine tune the deployed model in the real-world settings &lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 91-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 75-90 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 60-74 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-59 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Labs/seminar classes || 20&lt;br /&gt;
|-&lt;br /&gt;
| Interim performance assessment || 50&lt;br /&gt;
|-&lt;br /&gt;
| Exams || 30&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* Handouts supplied by the instructor&lt;br /&gt;
* Materials from the internet and research papers shared by instructor&lt;br /&gt;
&lt;br /&gt;
=== Closed access resources ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
 &lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Activities and Teaching Methods ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Activities within each section&lt;br /&gt;
|-&lt;br /&gt;
! Learning Activities !! Section 1 !! Section 2 !! Section 3 !! Section 4&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || 1 || 1 || 1 || 1&lt;br /&gt;
|} &lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
&lt;br /&gt;
==== Section 1 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the color spaces and where it’s used? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the primary and secondary colors? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How image is formed into computers? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you will convert the RGB to grayscale images || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Loading and plotting the images in python environment || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Convertion of different color spaces || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you find the skin in the images based on the color space models || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || how to find red eye dot in face using color space models || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 2 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the challenges to perform histogram task? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Apply convolutional filter to calculate the response. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What kind of parameters are required to apply different image filters? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you will compute the gradients of the image and its benefits? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Otsu Method || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Sobel, Preweitt filters || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Canny edge detector || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Perform analysis over the different filtering on the given images || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 3 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || How feature extractor works over the given image? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What is the difference between the feature extraction and descriptors? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Explain the examples of descriptors and feature extractors. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Write down the pros and cons of SIFT, HOG and Harris. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement template matching algorithm || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement histogram of gradient using CV2 library || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement of SIFT for the given task || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Harris corner detection || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Analysis of different extractors for the given task || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 4 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || How classification task is different from detection task? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Explain the transfer learning mechanism for object detection task. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How many types of model exist for object tracking in videos. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Write down the pros and cons of YOLO, FCN and MDNet. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement YOLO using transfer learning mechanism || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement GAN for MNIST dataset || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement FCN and GOTURN || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Analysis of different models for the given task || 0&lt;br /&gt;
|} &lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
'''Section 1'''&lt;br /&gt;
# How you can distinguish different color spaces?&lt;br /&gt;
# Explain and provide the reason for the blind spot creation in human eye.&lt;br /&gt;
# In what scenarios computer vision is better than human vision?&lt;br /&gt;
# Write down different robotic application areas where computer vision is applied successfully.&lt;br /&gt;
'''Section 2'''&lt;br /&gt;
# Calculate the kernels for the given images&lt;br /&gt;
# Explain the difference between different filters&lt;br /&gt;
# What is image noise and how it contributes to make the computer vision task difficult?&lt;br /&gt;
# Apply different combination of the filters to achieve the required output of the given image.&lt;br /&gt;
'''Section 3'''&lt;br /&gt;
# How you distinguish different feature extractors and descriptors?&lt;br /&gt;
# What are the possible methods to detect the corners?&lt;br /&gt;
# How corners are useful to help the robotic vision task?&lt;br /&gt;
# How you will patch the different images to construct the map of the location?&lt;br /&gt;
'''Section 4'''&lt;br /&gt;
# What are the loss functions used in YOLO?&lt;br /&gt;
# What are the learnable parameters of FCN for semantic segmentation?&lt;br /&gt;
# How semantic segmentation is different from instance segmentation?&lt;br /&gt;
# Write the application areas for object tracking in robotics.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
'''Section 1'''&lt;br /&gt;
&lt;br /&gt;
'''Section 2'''&lt;br /&gt;
&lt;br /&gt;
'''Section 3'''&lt;br /&gt;
&lt;br /&gt;
'''Section 4'''&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8483</id>
		<title>BSc: Introduction To Computer Vision</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8483"/>
		<updated>2023-08-28T06:24:22Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* What is the main purpose of this course? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Introduction to Computer Vision =&lt;br /&gt;
* '''Course name''': Introduction to Computer Vision&lt;br /&gt;
* '''Code discipline''': XXX&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course covers the following concepts: Computer vision using machine learning models.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Representation of images and videos || &lt;br /&gt;
# Computer representation&lt;br /&gt;
# Rescaling/manipulating images&lt;br /&gt;
|-&lt;br /&gt;
| Image Classification || &lt;br /&gt;
# Loss Functions&lt;br /&gt;
# Backpropagation&lt;br /&gt;
# Neural Networks&lt;br /&gt;
# Training&lt;br /&gt;
|-&lt;br /&gt;
| Convolutional Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Recurrent Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Image Segmentation and object detection || &lt;br /&gt;
# Techniques&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
This course provides an introductory but detailed treatment of computer vision techniques using machine learning, with an emphasis on implementing the computer vision algorithms from the scratch and using them to solve real-world problems. The course will begin with the image representation, but will quickly transition to computer vision techniques using machine learning, finishing with image segmentation and object detection and recognition. A key focus of the course is on providing students with not only theory but also hands-on practice of building their computer vision applications.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Significant exposure to real-world implementations&lt;br /&gt;
* To develop research interest in the theory and application of computer vision&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Suitability of different computer vision models in different scenarios&lt;br /&gt;
* Ability to choose the right model for the given task&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Hands on experience to implement different models to know inside behavior&lt;br /&gt;
* Sufficient exposure to train and deploy model for the given task&lt;br /&gt;
* Fine tune the deployed model in the real-world settings &lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 90-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 75-89 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 60-74 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-59 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Labs/seminar classes || 20&lt;br /&gt;
|-&lt;br /&gt;
| Interim performance assessment || 50&lt;br /&gt;
|-&lt;br /&gt;
| Exams || 30&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* Handouts supplied by the instructor&lt;br /&gt;
* Materials from the internet and research papers shared by instructor&lt;br /&gt;
&lt;br /&gt;
=== Closed access resources ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
 &lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Activities and Teaching Methods ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Activities within each section&lt;br /&gt;
|-&lt;br /&gt;
! Learning Activities !! Section 1 !! Section 2 !! Section 3 !! Section 4&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || 1 || 1 || 1 || 1&lt;br /&gt;
|} &lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
&lt;br /&gt;
==== Section 1 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the color spaces and where it’s used? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the primary and secondary colors? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How image is formed into computers? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you will convert the RGB to grayscale images || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Loading and plotting the images in python environment || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Convertion of different color spaces || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you find the skin in the images based on the color space models || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || how to find red eye dot in face using color space models || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 2 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the challenges to perform histogram task? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Apply convolutional filter to calculate the response. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What kind of parameters are required to apply different image filters? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you will compute the gradients of the image and its benefits? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Otsu Method || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Sobel, Preweitt filters || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Canny edge detector || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Perform analysis over the different filtering on the given images || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 3 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || How feature extractor works over the given image? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What is the difference between the feature extraction and descriptors? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Explain the examples of descriptors and feature extractors. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Write down the pros and cons of SIFT, HOG and Harris. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement template matching algorithm || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement histogram of gradient using CV2 library || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement of SIFT for the given task || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Harris corner detection || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Analysis of different extractors for the given task || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 4 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || How classification task is different from detection task? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Explain the transfer learning mechanism for object detection task. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How many types of model exist for object tracking in videos. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Write down the pros and cons of YOLO, FCN and MDNet. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement YOLO using transfer learning mechanism || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement GAN for MNIST dataset || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement FCN and GOTURN || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Analysis of different models for the given task || 0&lt;br /&gt;
|} &lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
'''Section 1'''&lt;br /&gt;
# How you can distinguish different color spaces?&lt;br /&gt;
# Explain and provide the reason for the blind spot creation in human eye.&lt;br /&gt;
# In what scenarios computer vision is better than human vision?&lt;br /&gt;
# Write down different robotic application areas where computer vision is applied successfully.&lt;br /&gt;
'''Section 2'''&lt;br /&gt;
# Calculate the kernels for the given images&lt;br /&gt;
# Explain the difference between different filters&lt;br /&gt;
# What is image noise and how it contributes to make the computer vision task difficult?&lt;br /&gt;
# Apply different combination of the filters to achieve the required output of the given image.&lt;br /&gt;
'''Section 3'''&lt;br /&gt;
# How you distinguish different feature extractors and descriptors?&lt;br /&gt;
# What are the possible methods to detect the corners?&lt;br /&gt;
# How corners are useful to help the robotic vision task?&lt;br /&gt;
# How you will patch the different images to construct the map of the location?&lt;br /&gt;
'''Section 4'''&lt;br /&gt;
# What are the loss functions used in YOLO?&lt;br /&gt;
# What are the learnable parameters of FCN for semantic segmentation?&lt;br /&gt;
# How semantic segmentation is different from instance segmentation?&lt;br /&gt;
# Write the application areas for object tracking in robotics.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
'''Section 1'''&lt;br /&gt;
&lt;br /&gt;
'''Section 2'''&lt;br /&gt;
&lt;br /&gt;
'''Section 3'''&lt;br /&gt;
&lt;br /&gt;
'''Section 4'''&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8482</id>
		<title>BSc: Introduction To Computer Vision</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8482"/>
		<updated>2023-08-28T06:21:09Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Course Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Introduction to Computer Vision =&lt;br /&gt;
* '''Course name''': Introduction to Computer Vision&lt;br /&gt;
* '''Code discipline''': XXX&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course covers the following concepts: Computer vision using machine learning models.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Representation of images and videos || &lt;br /&gt;
# Computer representation&lt;br /&gt;
# Rescaling/manipulating images&lt;br /&gt;
|-&lt;br /&gt;
| Image Classification || &lt;br /&gt;
# Loss Functions&lt;br /&gt;
# Backpropagation&lt;br /&gt;
# Neural Networks&lt;br /&gt;
# Training&lt;br /&gt;
|-&lt;br /&gt;
| Convolutional Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Recurrent Neural Networks || &lt;br /&gt;
# Training&lt;br /&gt;
# Architectures&lt;br /&gt;
|-&lt;br /&gt;
| Image Segmentation and object detection || &lt;br /&gt;
# Techniques&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
This course provides an intensive treatment of a cross-section of the key elements of computer vision, with an emphasis on implementing them in modern programming environments, and using them to solve real-world problems. The course will begin with the fundamentals of image processing and image filtering, but will quickly build to cover more advanced topics, including image segmentation, object detection and recognition, face detection, content-based image retrieval, artificial neural networks, convolutional neural networks, generative adversarial networks and much more. A key focus of the course is on providing students with not only theory but also hands-on practice of building their computer vision applications.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Significant exposure to real-world implementations&lt;br /&gt;
* To develop research interest in the theory and application of computer vision&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Suitability of different computer vision models in different scenarios&lt;br /&gt;
* Ability to choose the right model for the given task&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Hands on experience to implement different models to know inside behavior&lt;br /&gt;
* Sufficient exposure to train and deploy model for the given task&lt;br /&gt;
* Fine tune the deployed model in the real-world settings &lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 90-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 75-89 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 60-74 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-59 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Labs/seminar classes || 20&lt;br /&gt;
|-&lt;br /&gt;
| Interim performance assessment || 50&lt;br /&gt;
|-&lt;br /&gt;
| Exams || 30&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* Handouts supplied by the instructor&lt;br /&gt;
* Materials from the internet and research papers shared by instructor&lt;br /&gt;
&lt;br /&gt;
=== Closed access resources ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
 &lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Activities and Teaching Methods ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Activities within each section&lt;br /&gt;
|-&lt;br /&gt;
! Learning Activities !! Section 1 !! Section 2 !! Section 3 !! Section 4&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || 1 || 1 || 1 || 1&lt;br /&gt;
|} &lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
&lt;br /&gt;
==== Section 1 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the color spaces and where it’s used? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the primary and secondary colors? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How image is formed into computers? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you will convert the RGB to grayscale images || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Loading and plotting the images in python environment || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Convertion of different color spaces || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you find the skin in the images based on the color space models || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || how to find red eye dot in face using color space models || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 2 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the challenges to perform histogram task? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Apply convolutional filter to calculate the response. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What kind of parameters are required to apply different image filters? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you will compute the gradients of the image and its benefits? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Otsu Method || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Sobel, Preweitt filters || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Canny edge detector || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Perform analysis over the different filtering on the given images || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 3 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || How feature extractor works over the given image? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What is the difference between the feature extraction and descriptors? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Explain the examples of descriptors and feature extractors. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Write down the pros and cons of SIFT, HOG and Harris. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement template matching algorithm || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement histogram of gradient using CV2 library || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement of SIFT for the given task || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Harris corner detection || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Analysis of different extractors for the given task || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 4 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || How classification task is different from detection task? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Explain the transfer learning mechanism for object detection task. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How many types of model exist for object tracking in videos. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Write down the pros and cons of YOLO, FCN and MDNet. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement YOLO using transfer learning mechanism || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement GAN for MNIST dataset || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement FCN and GOTURN || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Analysis of different models for the given task || 0&lt;br /&gt;
|} &lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
'''Section 1'''&lt;br /&gt;
# How you can distinguish different color spaces?&lt;br /&gt;
# Explain and provide the reason for the blind spot creation in human eye.&lt;br /&gt;
# In what scenarios computer vision is better than human vision?&lt;br /&gt;
# Write down different robotic application areas where computer vision is applied successfully.&lt;br /&gt;
'''Section 2'''&lt;br /&gt;
# Calculate the kernels for the given images&lt;br /&gt;
# Explain the difference between different filters&lt;br /&gt;
# What is image noise and how it contributes to make the computer vision task difficult?&lt;br /&gt;
# Apply different combination of the filters to achieve the required output of the given image.&lt;br /&gt;
'''Section 3'''&lt;br /&gt;
# How you distinguish different feature extractors and descriptors?&lt;br /&gt;
# What are the possible methods to detect the corners?&lt;br /&gt;
# How corners are useful to help the robotic vision task?&lt;br /&gt;
# How you will patch the different images to construct the map of the location?&lt;br /&gt;
'''Section 4'''&lt;br /&gt;
# What are the loss functions used in YOLO?&lt;br /&gt;
# What are the learnable parameters of FCN for semantic segmentation?&lt;br /&gt;
# How semantic segmentation is different from instance segmentation?&lt;br /&gt;
# Write the application areas for object tracking in robotics.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
'''Section 1'''&lt;br /&gt;
&lt;br /&gt;
'''Section 2'''&lt;br /&gt;
&lt;br /&gt;
'''Section 3'''&lt;br /&gt;
&lt;br /&gt;
'''Section 4'''&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8481</id>
		<title>BSc: Introduction To Computer Vision</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=BSc:_Introduction_To_Computer_Vision&amp;diff=8481"/>
		<updated>2023-08-28T06:15:55Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Short Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Introduction to Computer Vision =&lt;br /&gt;
* '''Course name''': Introduction to Computer Vision&lt;br /&gt;
* '''Code discipline''': XXX&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course covers the following concepts: Computer vision using machine learning models.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Image Acquisition and Basic Image Processing || &lt;br /&gt;
# Computer vision in action&lt;br /&gt;
# The Human Vision System&lt;br /&gt;
# Optical Illusions&lt;br /&gt;
# Sampling and Quantization&lt;br /&gt;
# Image Representation&lt;br /&gt;
# Colour Spaces&lt;br /&gt;
|-&lt;br /&gt;
| Image Filtering and Binary Vision || &lt;br /&gt;
# Image noise&lt;br /&gt;
# Convolutions and kernels&lt;br /&gt;
# Smoothing and blurring&lt;br /&gt;
# Thresholding and histograms&lt;br /&gt;
# Morphological operations&lt;br /&gt;
# Gradients and Edge detection&lt;br /&gt;
|-&lt;br /&gt;
| Feature Extractors and Descriptors || &lt;br /&gt;
# Histogram of Gradients (HoG)&lt;br /&gt;
# Scale-invariant feature transform (SIFT)&lt;br /&gt;
# Harris corner detector&lt;br /&gt;
# Template matching&lt;br /&gt;
# Bag of visual words&lt;br /&gt;
# Face Detection and Recognition (Viola Johns)&lt;br /&gt;
|-&lt;br /&gt;
| Deep learning models for computer vision || &lt;br /&gt;
# You Only Look Once: Unified, Real-Time Object Detection (YOLO)&lt;br /&gt;
# Generative Adversarial Networks (GAN)&lt;br /&gt;
# Fully Convolutional Networks (FCN) for semantic segmentation&lt;br /&gt;
# Multi Domain Network (MDNet) for object tracking&lt;br /&gt;
# Generic Object Tracking Using Regression Networks (GOTURN) for object tracking&lt;br /&gt;
|} &lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
This course provides an intensive treatment of a cross-section of the key elements of computer vision, with an emphasis on implementing them in modern programming environments, and using them to solve real-world problems. The course will begin with the fundamentals of image processing and image filtering, but will quickly build to cover more advanced topics, including image segmentation, object detection and recognition, face detection, content-based image retrieval, artificial neural networks, convolutional neural networks, generative adversarial networks and much more. A key focus of the course is on providing students with not only theory but also hands-on practice of building their computer vision applications.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Significant exposure to real-world implementations&lt;br /&gt;
* To develop research interest in the theory and application of computer vision&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Suitability of different computer vision models in different scenarios&lt;br /&gt;
* Ability to choose the right model for the given task&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Hands on experience to implement different models to know inside behavior&lt;br /&gt;
* Sufficient exposure to train and deploy model for the given task&lt;br /&gt;
* Fine tune the deployed model in the real-world settings &lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 90-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 75-89 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 60-74 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-59 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Labs/seminar classes || 20&lt;br /&gt;
|-&lt;br /&gt;
| Interim performance assessment || 50&lt;br /&gt;
|-&lt;br /&gt;
| Exams || 30&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* Handouts supplied by the instructor&lt;br /&gt;
* Materials from the internet and research papers shared by instructor&lt;br /&gt;
&lt;br /&gt;
=== Closed access resources ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
 &lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Activities and Teaching Methods ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Activities within each section&lt;br /&gt;
|-&lt;br /&gt;
! Learning Activities !! Section 1 !! Section 2 !! Section 3 !! Section 4&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || 1 || 1 || 1 || 1&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || 1 || 1 || 1 || 1&lt;br /&gt;
|} &lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
&lt;br /&gt;
==== Section 1 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the color spaces and where it’s used? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the primary and secondary colors? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How image is formed into computers? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you will convert the RGB to grayscale images || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Loading and plotting the images in python environment || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Convertion of different color spaces || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you find the skin in the images based on the color space models || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || how to find red eye dot in face using color space models || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 2 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || What are the challenges to perform histogram task? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Apply convolutional filter to calculate the response. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What kind of parameters are required to apply different image filters? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How you will compute the gradients of the image and its benefits? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Otsu Method || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Sobel, Preweitt filters || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Canny edge detector || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Perform analysis over the different filtering on the given images || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 3 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || How feature extractor works over the given image? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || What is the difference between the feature extraction and descriptors? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Explain the examples of descriptors and feature extractors. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Write down the pros and cons of SIFT, HOG and Harris. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement template matching algorithm || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement histogram of gradient using CV2 library || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement of SIFT for the given task || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement Harris corner detection || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Analysis of different extractors for the given task || 0&lt;br /&gt;
|} &lt;br /&gt;
==== Section 4 ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Content !! Is Graded?&lt;br /&gt;
|-&lt;br /&gt;
| Question || How classification task is different from detection task? || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Explain the transfer learning mechanism for object detection task. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || How many types of model exist for object tracking in videos. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Write down the pros and cons of YOLO, FCN and MDNet. || 1&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement YOLO using transfer learning mechanism || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement GAN for MNIST dataset || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Implement FCN and GOTURN || 0&lt;br /&gt;
|-&lt;br /&gt;
| Question || Analysis of different models for the given task || 0&lt;br /&gt;
|} &lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
'''Section 1'''&lt;br /&gt;
# How you can distinguish different color spaces?&lt;br /&gt;
# Explain and provide the reason for the blind spot creation in human eye.&lt;br /&gt;
# In what scenarios computer vision is better than human vision?&lt;br /&gt;
# Write down different robotic application areas where computer vision is applied successfully.&lt;br /&gt;
'''Section 2'''&lt;br /&gt;
# Calculate the kernels for the given images&lt;br /&gt;
# Explain the difference between different filters&lt;br /&gt;
# What is image noise and how it contributes to make the computer vision task difficult?&lt;br /&gt;
# Apply different combination of the filters to achieve the required output of the given image.&lt;br /&gt;
'''Section 3'''&lt;br /&gt;
# How you distinguish different feature extractors and descriptors?&lt;br /&gt;
# What are the possible methods to detect the corners?&lt;br /&gt;
# How corners are useful to help the robotic vision task?&lt;br /&gt;
# How you will patch the different images to construct the map of the location?&lt;br /&gt;
'''Section 4'''&lt;br /&gt;
# What are the loss functions used in YOLO?&lt;br /&gt;
# What are the learnable parameters of FCN for semantic segmentation?&lt;br /&gt;
# How semantic segmentation is different from instance segmentation?&lt;br /&gt;
# Write the application areas for object tracking in robotics.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
'''Section 1'''&lt;br /&gt;
&lt;br /&gt;
'''Section 2'''&lt;br /&gt;
&lt;br /&gt;
'''Section 3'''&lt;br /&gt;
&lt;br /&gt;
'''Section 4'''&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8480</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8480"/>
		<updated>2023-08-28T06:09:49Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Typical questions for seminar classes (labs) within this section */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course number:'''&amp;lt;/span&amp;gt; SNE-08&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs/seminar classes  || 30   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 35&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 35&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 32h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
 &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8479</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8479"/>
		<updated>2023-08-28T06:09:14Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Typical questions for ongoing performance evaluation within this section */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course number:'''&amp;lt;/span&amp;gt; SNE-08&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs/seminar classes  || 30   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 35&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 35&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 32h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
 &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement IPSec&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8478</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8478"/>
		<updated>2023-08-28T06:08:21Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Grades range */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course number:'''&amp;lt;/span&amp;gt; SNE-08&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs/seminar classes  || 30   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 35&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 35&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 91-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 81-90&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-80 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 32h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
 &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
# Why IPSec is so over-engineered? and what are the security flaws?&lt;br /&gt;
# What are different components of IPSec&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement IPSec&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8477</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8477"/>
		<updated>2023-08-28T06:07:07Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* What is the purpose of this course? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course number:'''&amp;lt;/span&amp;gt; SNE-08&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, crypto. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs/seminar classes  || 30   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 35&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 35&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 88-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 77-87&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-76 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 32h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
 &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
# Why IPSec is so over-engineered? and what are the security flaws?&lt;br /&gt;
# What are different components of IPSec&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement IPSec&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8476</id>
		<title>MSc:SecurityOfSystemsAndNetworks</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:SecurityOfSystemsAndNetworks&amp;diff=8476"/>
		<updated>2023-08-28T06:06:01Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: Created page with &amp;quot;= Security of systems and networks =  * &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN) * &amp;lt;span&amp;gt;'''Course number:'''&amp;lt;/span&amp;gt; SNE-08   == Course character...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Security of systems and networks =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course name:'''&amp;lt;/span&amp;gt; Security of systems and networks (SSN)&lt;br /&gt;
* &amp;lt;span&amp;gt;'''Course number:'''&amp;lt;/span&amp;gt; SNE-08&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course characteristics ==&lt;br /&gt;
&lt;br /&gt;
=== Key concepts of the class ===&lt;br /&gt;
&lt;br /&gt;
* Applied cryptography&lt;br /&gt;
* Security protocols&lt;br /&gt;
* Network and Internet security&lt;br /&gt;
* Authentication and Authorization&lt;br /&gt;
* Software Security&lt;br /&gt;
&lt;br /&gt;
=== What is the purpose of this course? ===&lt;br /&gt;
&lt;br /&gt;
This course will cover the fundamentals of security, security protocols, and their&lt;br /&gt;
applications in real-world. The topics covered in this course include applied&lt;br /&gt;
cryptography, authentication, passwords, practical security, social aspects of&lt;br /&gt;
security, SSL/TLS, email security, PKI, and IPSec. Furthermore, this course&lt;br /&gt;
will strengthen the security knowledge of the students and guide them in the&lt;br /&gt;
right direction for their upcoming research projects and advanced courses. The&lt;br /&gt;
course is divided into two parts. The first part will cover the theory and hands-on practice of the concepts taught at class. And the second part of the course&lt;br /&gt;
will focus on the course projects. The student will work on a security project&lt;br /&gt;
by using the concepts taught in the class.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* No specific prerequisites are mandated. &lt;br /&gt;
&lt;br /&gt;
== Recommendations for students on how to succeed in the course ==&lt;br /&gt;
References:&lt;br /&gt;
* Attend the lectures&lt;br /&gt;
* Read the lecture notes&lt;br /&gt;
* Read the related chapters in the book&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Attend and finish the labs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Finish your assigned project successfully&lt;br /&gt;
&lt;br /&gt;
== Course Objectives Based on Bloom’s Taxonomy ==&lt;br /&gt;
&lt;br /&gt;
=== What should a student remember at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to:&lt;br /&gt;
&lt;br /&gt;
* Demonstrate the acquired knowledge and skills in applied cryptography (symmetric and asymmetric cryptography),&lt;br /&gt;
* Operate classical enigma machine, encode and decode messages with it&lt;br /&gt;
* Demonstrate the working knowledge of famous cryptographic algorithms and discuss their shortcomings&lt;br /&gt;
* Demonstrate and operate the already implemented security protocols over internet,&lt;br /&gt;
* Reason about the problems in the security of networked systems and current internet and their existing solutions,&lt;br /&gt;
* Solve mathematical problems (especially in number theory),&lt;br /&gt;
&lt;br /&gt;
=== What should a student be able to apply at the end of the course? ===&lt;br /&gt;
&lt;br /&gt;
By the end of the course, the students should be able to apply: &lt;br /&gt;
&lt;br /&gt;
* Crypt-analyze ciphertext and decrypt through frequency analysis and other important techniques&lt;br /&gt;
* Design security protocols&lt;br /&gt;
* Find security flaws in security protocols&lt;br /&gt;
* Get hands-on experience of the existing enterprise cryptographic algorithms and use them in projects,&lt;br /&gt;
* Demonstrate the skill of finding out security issues in networked systems and internet technologies,&lt;br /&gt;
&lt;br /&gt;
=== Course evaluation ===&lt;br /&gt;
 &lt;br /&gt;
The acquired  knowledge will be evaluated via labs, a project, and the exam, with points as in the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Type of Evaluation !! Points&lt;br /&gt;
|-&lt;br /&gt;
| Labs/seminar classes  || 30   &lt;br /&gt;
|-&lt;br /&gt;
| Project || 35&lt;br /&gt;
|-&lt;br /&gt;
| Exam || 35&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Grades range ===&lt;br /&gt;
&lt;br /&gt;
The grades will be given according to the following table:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade  !! Range of points&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent   || 88-100  &lt;br /&gt;
|-&lt;br /&gt;
| B. Good  || 77-87&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-76 &lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Resources and reference material ===&lt;br /&gt;
&lt;br /&gt;
* Lecture slides&lt;br /&gt;
* Book&lt;br /&gt;
* Links to the online material will be provided (if any)&lt;br /&gt;
&lt;br /&gt;
== Course Sections ==&lt;br /&gt;
&lt;br /&gt;
The main sections of the course and approximate hour distribution between them is as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Section !! Section Title !! Teaching Hours&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Cryptography || 40%&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Access Control || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Protocols || 25%&lt;br /&gt;
|-&lt;br /&gt;
| 4 ||  Software || 10%&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Labs|| 24h&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Project|| 32h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Section 1 title: ===&lt;br /&gt;
&lt;br /&gt;
Cryptography&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
* Basics of Crypto &lt;br /&gt;
* Symmetric Key Crypto&lt;br /&gt;
* Public Key Crypto&lt;br /&gt;
* Hash Functions&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
 &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are typical classic crypto methods?&lt;br /&gt;
# What are the differences in stream and block ciphers from performance standpoint?&lt;br /&gt;
# How to measure the security of cryptographic algorithms?&lt;br /&gt;
# How to encrypt and decrypt with different asymmetric crypto algorithms?&lt;br /&gt;
# How to embedd backdoors in crypto algorithms?&lt;br /&gt;
# How to realize key exchange through Hiffie-Hellman using traditional techniques and elliptic curve techniques?&lt;br /&gt;
# How to make security algorithms efficient?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Make enigma machine with pringle box&lt;br /&gt;
# Assess the security of different setups of RSA&lt;br /&gt;
# Implement man in the middle attack&lt;br /&gt;
# Implement addition over elliptic curves&lt;br /&gt;
# Solve crypto math problems&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 2  title: ===&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# What are pros and cons of using symmetric and asymmetric cryptographic mechanisms for authentication?&lt;br /&gt;
# What is man in the middle attack?&lt;br /&gt;
# Develop home-grown authentication mechanisms?&lt;br /&gt;
# How Kerberos reduces the communication overhead?&lt;br /&gt;
# Where is shibboleth used?&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement different variants of authentication protocols&lt;br /&gt;
# Find out security flaws in authentication protocols&lt;br /&gt;
# Identify shortcomings of different protocols&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 3  title: ===&lt;br /&gt;
&lt;br /&gt;
Protocols&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Simple Authentication Protocols&lt;br /&gt;
* Real-World Security Protocols&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
# How does SSL and TLS work?&lt;br /&gt;
# HOw does SSL and TLS combine symmetric and asymmetric cryptography?&lt;br /&gt;
# Why IPSec is so over-engineered? and what are the security flaws?&lt;br /&gt;
# What are different components of IPSec&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for seminar classes (labs) within this section ===&lt;br /&gt;
&lt;br /&gt;
# Implement IPSec&lt;br /&gt;
# Assess the security of SSL and TLS handshakes&lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# Same as above&lt;br /&gt;
&lt;br /&gt;
=== Section 4   title: ===&lt;br /&gt;
&lt;br /&gt;
Software&lt;br /&gt;
&lt;br /&gt;
=== Topics covered in this section: ===&lt;br /&gt;
&lt;br /&gt;
* Software Flaws and Malware&lt;br /&gt;
* Insecurity in Software&lt;br /&gt;
* Operating Systems and Security&lt;br /&gt;
&lt;br /&gt;
=== What forms of evaluation were used to test students’ performance in this section? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+  &lt;br /&gt;
|-&lt;br /&gt;
! Form  !! Yes/No&lt;br /&gt;
|-&lt;br /&gt;
| Development of individual parts of software product code || No  &lt;br /&gt;
|-&lt;br /&gt;
| Homework and group projects || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Midterm evaluation || No &lt;br /&gt;
|-&lt;br /&gt;
| Testing (written or computer based) || Yes  &lt;br /&gt;
|-&lt;br /&gt;
| Reports || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Essays || No&lt;br /&gt;
|-&lt;br /&gt;
| Oral polls || No&lt;br /&gt;
|-&lt;br /&gt;
| Discussions || Yes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Typical questions for ongoing performance evaluation within this section ===&lt;br /&gt;
&lt;br /&gt;
#  Why is software as important to security as crypto, access control, protocols?&lt;br /&gt;
# If your software is subject to attack, can your security can be broken Regardless of strength of crypto, access control, or protocols? Why?&lt;br /&gt;
# What are the main factors of software that compromise the security of systems?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== Test questions for final assessment in this section ===&lt;br /&gt;
&lt;br /&gt;
# As above&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8198</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8198"/>
		<updated>2023-05-21T11:45:11Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Minimum Requirements For Passing The Course */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* CSE329 - Empirical Methods&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are four requirements for passing this course:&lt;br /&gt;
# You must attend all labs.&lt;br /&gt;
# You must submit all lab reports.&lt;br /&gt;
# You must have at least 50% on the Final Exam.&lt;br /&gt;
# You must have at least 50% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz during each lecture  (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 50&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures&lt;br /&gt;
* Ask questions and provide answers to the questions during the onsite lectures.&lt;br /&gt;
* Attend all of the labs and submit all of the lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly questions and weekly labs&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 51% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in oral form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8197</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8197"/>
		<updated>2023-05-21T11:44:55Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Course grading range */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* CSE329 - Empirical Methods&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 85-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 70-84 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 50-69 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-49 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are four requirements for passing this course:&lt;br /&gt;
# You must attend all labs.&lt;br /&gt;
# You must submit all lab reports.&lt;br /&gt;
# You must have at least 51% on the Final Exam.&lt;br /&gt;
# You must have at least 51% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz during each lecture  (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 50&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures&lt;br /&gt;
* Ask questions and provide answers to the questions during the onsite lectures.&lt;br /&gt;
* Attend all of the labs and submit all of the lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly questions and weekly labs&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 51% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in oral form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
	<entry>
		<id>https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8045</id>
		<title>MSc: Advanced Statistics</title>
		<link rel="alternate" type="text/html" href="https://eduwiki.innopolis.university/index.php?title=MSc:_Advanced_Statistics&amp;diff=8045"/>
		<updated>2023-01-22T15:21:28Z</updated>

		<summary type="html">&lt;p&gt;N.zlatanov: /* Teaching Methodology: Methods, techniques, &amp;amp; activities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Advanced Statistics =&lt;br /&gt;
* '''Course name''': Advanced Statistics&lt;br /&gt;
* '''Code discipline''': DS-03&lt;br /&gt;
* '''Subject area''': &lt;br /&gt;
&lt;br /&gt;
== Short Description ==&lt;br /&gt;
This course in advanced statistics with a view toward applications in data sciences. It is intended for masters students who are looking to expand their knowledge of theoretical methods used in modern research in data sciences. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. It teaches basic theoretical skills for the analysis of these objects, which include concentration inequalities, covering and packing arguments, decoupling and symmetrization tricks, chaining and comparison techniques for stochastic processes, combinatorial reasoning based on the VC dimension, and a lot more. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite subjects ===&lt;br /&gt;
* CSE329 - Empirical Methods&lt;br /&gt;
&lt;br /&gt;
=== Prerequisite topics ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Course Topics ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Course Sections and Topics&lt;br /&gt;
|-&lt;br /&gt;
! Section !! Topics within the section&lt;br /&gt;
|-&lt;br /&gt;
| Concentration of sums of independent random variables || &lt;br /&gt;
# Hoeffding’s inequality&lt;br /&gt;
# Chernoff ’s inequality&lt;br /&gt;
# Sub-gaussian distributions&lt;br /&gt;
# Sub-exponential distributions&lt;br /&gt;
|-&lt;br /&gt;
| Random vectors in high dimensions || &lt;br /&gt;
# Concentration of the norm&lt;br /&gt;
# Covariance matrices and principal component analysis&lt;br /&gt;
|-&lt;br /&gt;
| Random matrices || &lt;br /&gt;
# Nets, covering numbers and packing numbers&lt;br /&gt;
# Covariance estimation and clustering&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Intended Learning Outcomes (ILOs) ==&lt;br /&gt;
&lt;br /&gt;
=== What is the main purpose of this course? ===&lt;br /&gt;
The main purpose of this course is to present the fundamentals of high-dimensional statistics with applications to data science. The course presents some of the key probabilistic methods and results that may form an essential mathematical toolbox for a data scientist. This course places particular emphasis on random vectors, random matrices, and random projections. This course integrates theory with applications for covariance estimation, semidefinite programming, networks, elements of statistical learning, error correcting codes, clustering, matrix completion, dimension reduction, sparse signal recovery, sparse regression, and more.&lt;br /&gt;
&lt;br /&gt;
=== ILOs defined at three levels ===&lt;br /&gt;
&lt;br /&gt;
==== Level 1: What concepts should a student know/remember/explain? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Explain the difference between low-dimensional and high-dimensional data&lt;br /&gt;
* Explain concentration inequalities and their application&lt;br /&gt;
* Remember the main statistical properties of high-dimensional vectors and matrices&lt;br /&gt;
&lt;br /&gt;
==== Level 2: What basic practical skills should a student be able to perform? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* Perform basic Monte Carlo computations, such as Monte Carlo integration&lt;br /&gt;
* Obtain simple but accurate bounds of complex statistical metrics&lt;br /&gt;
* Apply the median of means estimator&lt;br /&gt;
* Investigate simple statistics of social networks&lt;br /&gt;
* Exploit the thin-shell phenomenon when analysing data&lt;br /&gt;
* Apply data clustering and dimension reduction&lt;br /&gt;
&lt;br /&gt;
==== Level 3: What complex comprehensive skills should a student be able to apply in real-life scenarios? ====&lt;br /&gt;
By the end of the course, the students should be able to ...&lt;br /&gt;
* To understand the problems related to statistical analysis of data.&lt;br /&gt;
* To apply theoretical statistics in real-life via computer simulations and thereby confirm or reject the correctness of the theoretical concepts.&lt;br /&gt;
* To identify the correct statistical methods that needs to be applied to data in order to solve the given tasks in real-life.&lt;br /&gt;
* To be able to generate and run experiments on random data samples.&lt;br /&gt;
&lt;br /&gt;
== Grading ==&lt;br /&gt;
&lt;br /&gt;
=== Course grading range ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Grade !! Range !! Description of performance&lt;br /&gt;
|-&lt;br /&gt;
| A. Excellent || 90-100 || -&lt;br /&gt;
|-&lt;br /&gt;
| B. Good || 75-89 || -&lt;br /&gt;
|-&lt;br /&gt;
| C. Satisfactory || 51-74 || -&lt;br /&gt;
|-&lt;br /&gt;
| D. Poor || 0-50 || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Minimum Requirements For Passing The Course ===&lt;br /&gt;
&lt;br /&gt;
There are four requirements for passing this course:&lt;br /&gt;
# You must attend all labs.&lt;br /&gt;
# You must submit all lab reports.&lt;br /&gt;
# You must have at least 51% on the Final Exam.&lt;br /&gt;
# You must have at least 51% of the overall grade.&lt;br /&gt;
&lt;br /&gt;
=== Course activities and grading breakdown ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ &lt;br /&gt;
|-&lt;br /&gt;
! Activity Type !! Percentage of the overall course grade&lt;br /&gt;
|-&lt;br /&gt;
| Quiz during each lecture  (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Labs classes (weekly evaluations) || 15&lt;br /&gt;
|-&lt;br /&gt;
| Midterm || 20&lt;br /&gt;
|-&lt;br /&gt;
| Final exam || 50&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for students on how to succeed in the course ===&lt;br /&gt;
* Watch the video lecture and read the lecture notes before coming to the onsite lectures and to the labs.&lt;br /&gt;
* Attend the onsite lectures&lt;br /&gt;
* Ask questions and provide answers to the questions during the onsite lectures.&lt;br /&gt;
* Attend all of the labs and submit all of the lab reports.&lt;br /&gt;
* Prepare seriously for the midterm exam.&lt;br /&gt;
* Prepare seriously for the final exam.&lt;br /&gt;
&lt;br /&gt;
== Resources, literature and reference materials ==&lt;br /&gt;
&lt;br /&gt;
=== Open access resources ===&lt;br /&gt;
* The lecture notes and the video lectures provided via Moodle are sufficient for passing this course with grade A.&lt;br /&gt;
&lt;br /&gt;
=== Software and tools used within the course ===&lt;br /&gt;
* You can use any software by your choice to perform the lab tasks.&lt;br /&gt;
&lt;br /&gt;
= Teaching Methodology: Methods, techniques, &amp;amp; activities =&lt;br /&gt;
&lt;br /&gt;
== Formative Assessment and Course Activities ==&lt;br /&gt;
&lt;br /&gt;
=== Ongoing performance assessment ===&lt;br /&gt;
The performance will be assessed via weekly questions and weekly labs&lt;br /&gt;
&lt;br /&gt;
=== Final assessment ===&lt;br /&gt;
&lt;br /&gt;
The final assessment is in a written form. You mast have at least 51% on the final exam to pass the course.&lt;br /&gt;
&lt;br /&gt;
=== The retake exam ===&lt;br /&gt;
The retake of the exam will be in oral form.&lt;/div&gt;</summary>
		<author><name>N.zlatanov</name></author>
	</entry>
</feed>