. "Computer Science"@en . . "English"@en . . "Mathematics"@en . . "Introduction to cybersecurity"@en . . "6" . "The course “Introduction to Cybersecurity” is an essential component of IT specialist theoretical training that enables students to orient effectively in modern IT and security issues. This course focuses on basics and methods that ensure a global approach to the company’s IT security organization and management decision making to ensure the secured and effective achievement of business objectives. The course thoroughly examines the modern cyber security approach in the overall enterprise IT management context, IT governance frameworks, the company's IT security strategy, IT governance control methodology and IT audit, as well as the practical application of acquired knowledge.\n\nOutcome:\nAre able to define, interpret and use professional terminology in cybersecurity area. - While conducting discussions, the ability to constructively discuss the problem using professional terminology and to select the proper solution is demonstrated.\r\nAre able to reasonably discuss the choice of cybersecurity solutions, as well as to summarise the ideas of their colleagues when working in groups and present the results of group work. - During seminars and labs, the ability to constructively discuss the problem to be solved is shown (using brainstorming, discussions, group problem solving, etc.), based on theoretical knowledge and using professional terminology.\r\nAre able to analyse specific situations and draw independent conclusions on the use of cybersecurity and IT management methodologies in business. - While doing individual research project, the ability to suggest alternative solutions to the selected problem as well for performing a comparative analysis of those alternatives has been demonstrated.\r\nAre able to explain the cybersecurity approach, opportunities and role in business. - When passing the examination, the ability to understand the essence of the task stated is shown as well as the ability to provide a laconic and well-reasoned proper cybersecurity solution to the business." . . "Presential"@en . "TRUE" . . "Reliability of information systems"@en . . "6" . "The course is about organizational and technological aspects of information systems security. It provides the core knowledge for securing enterprise information systems. The course covers classification of information, analysis of information systems security risks, implementation of security control system as well as other aspects of information systems security management. It also includes an overview of typical information systems security threats and methods for aversion of these threats. The course covers not only the technological aspects of information systems security but also the impact of human factors.\n\nOutcome:\nKnowledge of information systems security management foundations, ability to minimize information systems security threats, to evaluate information systems security level and knowledge of information systems security components - Exam\r\nAbility to identify information systems security threats - Practical exercises\r\nAbility to elaborate solutions for preventing information systems security threats - Practical exercises\r\nAbility to define requirements to information systems security and to perform a risk analysis - Coursework and essay" . . "Presential"@en . "TRUE" . . "Information security and personal data protection"@en . . "6" . "Information security is the protection of corporate and personal data and digital identities. It is defined as the strategic capability of companies to ensure their continuous operation and achieve goals. The study course covers information security and personal data protection, information security management processes and information protection measures.\n\nOutcome:\nUnderstands the key concepts of information security and personal data protection. - Test and exam (in the form of knowledge test). Tests will include theoretical and practical tasks. To pass the tests, at least 70% of the questions must be answered correctly.\r\nAble to classify information. - Practical work in classes. Individual and group work.\r\nAble to analyse IT risks - be able to identify and assess the risks of IT resources and the risks of third parties. - Practical work in classes. Individual and group work.\r\nAble to plan business continuity, perform business impact analysis and plan IT business recovery. - Practical work in classes. Individual and group work.\r\nAble to identify, classify, analyse, prevent and communicate an information security incident. - Practical work in classes. Individual and group work.\r\nUnderstands forensic methods and is able to apply them to the investigation of an information security incident. - Practical work in classes. Individual and group work.\r\nUnderstands information security and personal data protection management methodologies, regulatory enactments and applicable standards (ISO 27000 group, etc.). - Test and exam (in the form of knowledge test). Tests will include theoretical and practical tasks. To pass the tests, at least 70% of the questions must be answered correctly.\r\nAble to define and implement the main necessary measures for the protection of personal data in the company's IT control environment. - Practical work in classes. Individual or group work." . . "Presential"@en . "TRUE" . . "Cybersecurity solutions in high performance computing environment"@en . . "6" . "The study course covers the theoretical and practical principles of high-performance computing in the context of cybersecurity by using graphics processing hardware and dedicated software. The study course includes an overview of architecture, computing algorithms, software libraries and tools of parallel computing platform CUDA based on graphics processors. An in-depth attention is devoted to the cross-disciplinary application of CUDA in the areas of vulnerability analysis, parallel data encryption, surveillance data mining, object detection and recognition. Among to the theoretical knowledge acquisition during the lectures, the laboratory lessons provide opportunities to obtain practical skills in the development of information technology solutions with CUDA.\n\nOutcome:\nAre able to define, interpret and use the professional terminology in the areas of graphics processors based high performance computing technologies. - Successfully completed test.\r\nAre able to develop CUDA based software solution. - During the execution of the laboratory work, the ability to perform the assigned tasks following the instructions are shown.\r\nAre able to estimate the development ways, as well as application constraints and optimization possibilities of the proposed high-performance software solution. - During the laboratory work and individual studies, the student is able to identify possible solutions, limitations and alternative solutions of the given tasks.\r\nAre able to explain the essence, opportunities, constraints and role of high-performance computing in certain scientific and practical areas. - The ability to recognize the essence of the formulated thematic questions, as well as to provide a concise and correct explanation of the reasoned topics has been demonstrated during the exam." . . "Presential"@en . "TRUE" . . "Control fundamentals of critical infrastructures"@en . . "6" . "The study course starts with the explanation of the concept of critical infrastructure and operational fundamentals. Then the critical infrastructure reliability parameters and functional interdependencies are analysed. The networks of infrastructure is based on the analysis results. The critical infrastructure networks mutual interdependences assessment, modelling, and peripheral communication are developed during the practical work. Infrastructure control and security considerations are drawn in the results of an individual task.\n\nOutcome:\nCan evaluate selected technology qualitatively and quantitatively and compare the results with other similar technologies analytically. - Completed and defended 1st lab. work.\r\nCan evaluate selected technology qualitatively and quantitatively and compare the results with other similar technologies practically. - Completed and defended 2nd lab. work.\r\nCan measure network resistance parameters in practice and analyse the results of the measurements. - Completed and defended individual task/ work." . . "Presential"@en . "TRUE" . . "Industrial safety"@en . . "6" . "Students learn the principles of industrial security system design, are introduced to communication network resilience, security factors, external and internal system security, as well as infrastructure system security and appropriate communication protocols. Students master the design aspects: network architecture; detection of invasion; security in typical connections between automation control circuit elements; industrial network analysis. Students design industrial system from an individual task.\n\nOutcome:\nCan identify source of attack. - Completed and defended practical work.\r\nCan design resilient control scheme. - Completed and defended practical work.\r\nCan evaluate safety of industrial system and design it. - Completed and defended practical work." . . "Presential"@en . "TRUE" . . "Network security"@en . . "12" . "The study course covers principles of computer systems and network security. Various attack and defense techniques will be covered. Topics include network attacks, defense methods, operating system security, e-mail and other network service problems, social engineering attacks and privacy issues. The study course is aimed for designers of building reliable and attack resistant networks.\n\nOutcome:\nUnderstands computer systems' security basics, computer networks security analysis and protection methods. Main advantages and limitations of security methods. Demonstrates knowledge of infrastructure and technologies life cycles. - Exam.\r\nAble to access the necessity for network security technology implementation (non-implementation) depending on the type of production (business) process. - Tasks in the lab and homeworks.\r\nBy means of corresponding tools, is able to use ready-made methods and tools to implement network security. - Tests during semester.\r\nAble to specify, interpret and use cybersecurity terminology. - Tests during semester." . . "Presential"@en . "TRUE" . . "Software security"@en . . "6" . "Software security risk analysis and security assurance is the essential part of the information technology management. Students learn security risk analysis and management in the context of software life cycle, risks of software development process and risks mitigation methods, a use of reverse engineering techniques for analysis of weaknesses in software security, security testing and legal aspects of information system security. Teamwork approach is used for analysis of practical case studies.\n\nOutcome:\nCan summarize arguments on risk management stages and quantitative and qualitative methods of risk evaluation - Passed assignment or quiz on risk management and exam. Criteria: is able to explain and provide arguments on the stages of risk management; is able to explain risk assessment methods; is able to evaluate the strengths and weaknesses of risk assessment methods.\r\nIs able to perform risk analysis of software development project and prepare risk mitigation plan - Passed practical assignment performed on software development project risk evaluation case study. Criteria: is able to identify and assess project risks; is able to propose and justify a risk mitigation plan for a specific project.\r\nIs able to perform information system security risk analysis and prepare risk mitigation plan - Passed practical assignment performed on security risk evaluation case study. Criteria: is able to identify and assess the security risks of information systems; is able to propose and justify a risk mitigation plan for a specific project.\r\nCan summarize arguments on reverse engineering techniques for discovering software security risks and protecting intellectual property - Passed assignment or quiz on reverse engineering techniques and exam. Criteria: is able to explain the stages of risk management in a reasoned manner; is able to explain risk assessment methods; is able to assess the strengths and weaknesses of risk assessment methods.\r\nIs able to apply reverse engineering techniques for discovering software security risks and protecting intellectual property - Passed practical assignment. Criteria: is able to orientate in reverse engineering methods for software security risk detection; is able to select and apply specific methods for detection of security risks and protection of intellectual property.\r\nIs able to justify software security testing types and perform security testing - Passed practical assignment. Criteria: is able to explain the characteristics of software security testing methods; is able to assess the suitability of the security testing method for the task; is able to independently apply the chosen security method in testing.\r\nCan summarize arguments on personal data protection rules and principles of e-documents security - Passed assignment and exam. Criteria: is able to list the main articles of the specified law; is able to formulate the principles of e-document protection; is able to apply legal requirements and e-document protection principles in the analyzed situation." . . "Presential"@en . "TRUE" . . "Cryptography and data security technologies"@en . . "6" . "The study course covers organizational and technological aspects related to cryptography and data security technologies. It provides the in-depth knowledge needed to protect corporate information resources through cryptographic technology. Basics of number theory, electronic signature, cryptography and cryptanalysis, digital forensics, steganography, privacy, cryptographic currency are considered. It provides an overview of data protection tasks and their solutions, substitution and permutation-based encryption algorithms, virtual private and wireless networks, their security protocols, authentication and authorization.\n\nOutcome:\nUnderstands the basic principles of numerical theory and their application in solving the problem. Able to characterize encryption algorithms based on substitution and permutation - Laboratory work Nr.1. Test Nr.1. Exam.\r\nAble to solve tasks using the Euler function, the Euclidean algorithm, and the theorem on the Fermi. Orienteering to encryption algorithms based on substitution and permutation. - Homework No.1.\r\nAble to characterize the DES standard. - Laboratory work Nr.2. Test Nr.2. Exam.\r\nAble to describe the 'Public Key' (RSA) algorithm and SSL / TLS encryption protocol. - Laboratory work Nr.3. Test Nr.3. Exam.\r\nUnderstands network security protocols. Able to characterize the Information Authentication and Electronic Signature Principles. - Laboratory work Nr.4. Test Nr.4. Exam.\r\nAble to describe PGP algorithm. - Laboratory work Nr.5. Test Nr.5. Exam.\r\nAble to describe computer viruses, antivirus programs. Able to characterize the methods of creating a firewall. - Laboratory work Nr.6. Test Nr.6. Exam." . . "Presential"@en . "TRUE" . . "Design of adaptive systems"@en . . "6" . "The study course are planned from simple definitions to the practical design challenges of adaptive systems. It covers all related topics from introduction of adaptive systems until practical system design. Case studies of systems and their designs are presented, the design of individual task is performed.\n\nOutcome:\nDesign of adaptive system for healthcare. - Completed, defended 1. lab. work.\r\nDesign of adaptive system based on computer vision. - Completed, defended 2. lab. work.\r\nDesign of adaptive system (individual task). - Completed, defended individual project." . . "Presential"@en . "TRUE" . . "Engineering systems security"@en . . "6" . "The study course covers principles of engineering systems and the security of its networks. Various attack techniques and defend strategies will be discussed. Topics include network attacks, defense methods, operating system security, taking into account specifics of various engineering systems. the study course is aimed for designers of building reliable and attack resistant engineering systems.\n\nOutcome:\nUnderstands computer systems' security basics, computer networks security analysis and protection methods. - Exam.\r\nAble to apply tools and perform computer system security analysis and propose improvements. - Practical tasks in the lab and homeworks.\r\nAble to discuss basic aspect of computer systems security. Compare different solutions and define advantages and disadvantages. - Tests during semester.\r\nAble to specify, interpret and use professional cybersecurity terminology. - Tests during semester." . . "Presential"@en . "TRUE" . . "Sociotechnical systems modelling"@en . . "6" . "The study course examines the basic principles of system modeling and simulation based on the analysis of technical and social systems. In describing the concepts of simulation, the main technologies and the conditions for their application are considered. Particular attention is paid to the design of an information technology introduction related model, which includes the collection of ideas and data, verification, validation, conceptual model creation, and quantitative modelling of critical contours. The role of the social factor in the operation of the system, as well as the application of appropriate visualization techniques for the information are considered.\n\nOutcome:\nAble to define, interpret and use professional terminology in the field of modelling. - During the defence of practical work results and preparation of individual design assignment, the skills have been demonstrated through professional terminology, to describe the problem and to offer a suitable solution.\r\nIs able to analyze a given situation and to draw independent conclusions about the socio-technical system modelling methodology for the use of the economic problem solutions. - In the course of the individual research work, the ability to analyze the system problems and develop a conceptual model of the solution to be concretized has been shown.\r\nBe able to evaluate the use of the developed model scenario limits and offer opportunities for change. - During the practical work, the student learns basic simulation techniques and identifies their application constraints.\r\nIt can be argued to discuss modeling applications for institution / company's problems solution, as well as the ability to work in International working groups and present the results achieved. - Individual research work is related to the student's intended field of activity, which ensures the practical application of the new knowledge and skills. Classes are conducted in groups, assessing the student's ability to work in mentally and socially diverse groups.\r\nAble to explain the essence, possibilities and importance of the application of modelling methodologies for improving the institution / company's operation. - During the exam, the ability to answer theoretical control questions and solve the problem situations in different sectors of the economy has been demonstrated." . . "Presential"@en . "TRUE" . . "Data mining and knowledge discovery"@en . . "6" . "Data Mining defines a process of mining potentially useful information from data. In most cases it is defined as knowledge discovery from large databases. Data Mining is a technology, which unites traditional data analysis methods with modern algorithms in order to process large amounts of data. This brings a wide range of possibilities for studying and analyzing new and existent types of data, applying new methods. In the scope of the present course topics as Data Preprocessing Technologies; Classification and Cluster analysis methods and algorithms; Approaches for processing and analyzing short time series; Pattern mining in sequence data methods and algorithms; Fuzzy logic and Swarm intelligence will be presented. As also possible areas of Data Mining application will be discussed.\n\nOutcome:\nAble to define preprocessing steps and select appropriate methods - Test, individual practical task\r\nAble to build an apply classification and clustering models for knowledge discovery - Test, individual practical task\r\nAble to analyse short time series using data mining technologies - Test, individual practical task\r\nAble to build, train and apply artificial neural networks for knowledge discovery - Test, individual practical task\r\nAble to implement fuzzy logic into data mining methods and mine knowledge in fuzzy data - Test, individual practical task" . . "Presential"@en . "TRUE" . . "Project management"@en . . "3" . "Project is an endeavour with defined start and finish aimed at producing a unique product or service. Project management uses a set of knowledge, skills, tools, and technologies to achieve project objectives. Projects in engineering disciples are characterized by high degree of complexity and require systemic approach to their planning, execution, and control. The course adopts the project life-cycle approach and covers all phases of the project execution. It focuses on formal and quantitative methods including computational tools used for successful project management.\n\nOutcome:\nIs able to identify project opportunities and define project scope. - Practical assignments, coursework, exam.\r\nIs able to plan complex projects. - Coursework, exam.\r\nIs able to control and analysed project execution. - Coursework, exam.\r\nIs able to use a project management information system. - Practical assignments.\r\nIs able to manage project risks. - Practical assignments.\r\nIs able to present project ideas and results. - Presentation of coursework.\r\nIs able to explain relationships between the field of studies and project management. - Exam." . . "Presential"@en . "TRUE" . . "Secure e-commerce technologies"@en . . "3" . "The course covers the latest computer technologies in the field of e-commerce, focusing on security risks, issues and solutions for the web environment and e-commerce systems. The course focuses on the use of e-commerce methods and information technology in business with the aim of implementing and maintaining effective security policies. Laboratory classes, based on an example of a website, provide the opportunity to gain practical skills in developing secure electronic commerce systems.\n\nOutcome:\nAbility to define, interpret and use professional terminology in e-commerce. - The test, based on theoretical knowledge, shows the ability to constructively analyze the problem to be solved using professional terminology.\r\nAbility to analyze problem situations and independently conclude on the use of secure e-commerce solutions in business. - During the laboratory work, the ability to identify possible solutions, limitations of the given task and to offer alternatives to alternative solutions is shown.\r\nAbility to develop an e-commerce solution project and implement a website prototype. - During the execution of the laboratory work, the ability to perform the assigned tasks following the instructions are shown.\r\nAbility to explain the nature, potential and importance of using security solutions in specific areas of e-commerce. - The examination demonstrates the ability to recognize the essence of formulated thematic issues, as well as to provide a concise and reasoned explanation of the given topics." . . "Presential"@en . "TRUE" . . "Data integration technologies"@en . . "3" . "Nowadays a large amount of data is being produced constantly and its processing is a complex task from theoretical and technical perspective. The potential data benefits increase when data is integrated from heterogeneous sources and processed in near real-time, thus minimizing the latency of useful information and knowledge.Stream and context processing, system adaptation technologies are used for this purpose. This course covers data integration technologies, mostly emphasizing data stream processing and integration technologies like Apache Spark and Apache Kafka. They are viewed in the context of data life-cycle, which includes data integration, processing and interpretation and usage of the acquired information for adapting systems near real-time. In data integration the logical integration process and infrastructure solutions play equally important role since data is integrated using distributed, horizontally scalable environment. Near real-time stream integration and system adaption use cases based on Apache Spark, Apache Kafka, Apache Cassandra, Docker and Cloudstack are being covered as part of this course.\n\nOutcome:\nAbility to choose the most suitable data stream integration technology - Exam\r\nAbility to define data integration solution on logical level - Exam and practical assignment\r\nAbility to integrate data streams - Practical assignment" . . "Presential"@en . "TRUE" . . "Enterprise information technology architecture, applications and integration"@en . . "6" . "Commercially available enterprise information systems are often used in implementation and automation of enterprise business processes. The objective of the course is to master main principles of enterprise information systems, their deployment and modification. Main topics covered in the course are business process modeling, application of ERP, workflow and other enterprise systems in process automation, modification and deployment of enterprise information systems, integration of enterprise information systems and adoption service-oriented computing in enterprise systems. Technologies for the modification of enterprise systems are explored in laboratories.\n\nOutcome:\nTo know main functional capabilities of enterprise applications and their application areas - Test\r\nAbility to select the most appropriate solution for business process automation - Coursework and examination\r\nTo understand implementation life-cycle of enterprise applications and main implementation activities - Examination\r\nAbility to document implementation of enterprise applications - Coursework\r\nAbility to configure enterprise applications and to modify user interface, reports and elements of enterprise portal - Laboratory work\r\nAbility to orchestrate executable business processes and knowledge of integration standards - Laboratory work" . . "Presential"@en . "TRUE" . . "Social responsibility and business ethics"@en . . "6" . "The course is built so as to demonstrate the development and role of social responsibility (SR) in Latvia and worldwide. Explore public opinions on social responsibility in business environment through analysis of situations of moral dilemmas. Introduce business ethics as a multidisciplinary academic field provide insight into business ethics-related issues and introduce a modern approach to solving typical business issues. .\r\nThe course is aimed at establishing the theoretical basis of the business ethics, value-orientation, SR classification and assessment. It develops practical skills in solving ethical problems and implementing SR strategy in an organization.\n\nOutcome:\nAble to describe theories and principles of business ethics, to analyze critically the situation of the company, to apply this knowledge in practice to make moral decisions and develop solutions for various business situations - Home work: ethical or unethical action and moral conflicts in business environment. Exam. Group project.\r\nDevelop understanding of the trade-offs organizations face in their efforts to combine their social responsibilities and immediate commercial goals and acquire capabilities of transforming these trade-offs into opportunities for both the organization and the society - 3 assignments - case studies: analysis of an actual recent (last 3 years) business situation. Presentation and discussion of results. Exam.\r\nAble to apply the skills and knowledge gained in making sound business decisions. Able to justify and argue the decisions made from the standpoint of ethical behaviour as well as understand the benefits of implementing a SR strategy - 3 assignments - case studies: SR in an organization. Presentation and discussion of results. Exam. Group project.\r\nAble to apply the main tools for building a trusting and respectful environment in an organization, implementing a socially responsible organizational development strategy and informing the society of organizational activities in the domain of social responsibility - Group project: analysis and evaluation of the internal environment and CSR strategy of an organization working in Latvia. Presentation and discussion of results. Exam.\r\nAble to critically evaluate the transparency and sustainability of a corporate social responsibility campaign. Able to develop suggestions for increasing the credibility of a corporate social responsibility campaign. - 4 assignments - case studies: the transparency and sustainability of the company. Presentation and discussion of results. Exam. Group project." . . "Presential"@en . "TRUE" . . "Master of Cybersecurity Engineering"@en . . "https://international.rtu.lv/masters-studies/cybersecurity-engineering/" . "120"^^ . "Presential"@en . "The mission of the academic master’s study programme “Cybersecurity Engineering” is to provide a set of theoretical knowledge and practical skills for students to achieve competencies corresponding to a Master’s degree in cybersecurity engineering. In the academic Master’s studies, the student acquires the necessary knowledge, skills and competence for comprehensive and effective action in the field of cybersecurity engineering in the chosen economic sector – design, implementation, improvement and management of IT security systems, understanding of professional ethics and socially responsible management, which forms the basis for further studies for a higher level of knowledge and skills acquisition.\n\nThe aim of the study programme “Cybersecurity Engineering” is to prepare top level specialists in cybersecurity who can (1) understand and develop the cybersecurity policy of companies and various organizations as well as public space; 2) design, implement, monitor and proactively develop cybersecurity measures; (3) conducting international research in cybersecurity; and (4) continue education for professional development or in doctoral studies.\n\nOutcome:\nAs a result of the studies the graduate is able to:\n- identify, justify and formulate information technology security issues;\n- design, implement and operate cybersecurity management systems;\n- analyse, evaluate and develop management systems according to IT security requirements;\n- develop a corporate digital strategy and align it with the information security strategy;\n- critically analyse a system monitoring data, identify and manage cybersecurity risks;\n- apply IT, cybersecurity, data mining and integration tools and techniques, as well as social technologies to protect company information assets;\n- develop organizational measures and technical solutions for cybersecurity threats;\n- integrate information security solutions at the network, hardware, software data and process levels and synthesize unified and systemic security management solutions;\n- ensure safe operation of engineering and socio-technical systems;\n- provide organizational measures and technical solutions for the protection of the company's critical infrastructure;\n- assess and ensure that information security solutions meet industry standards and legal requirements;\n- communicate, advise, collaborate and argue for cybersecurity objectives and outcomes;\n- independently conduct scientific research in information technologies"@en . . . "2"@en . "FALSE" . . "Master"@en . "Thesis" . "Not informative" . "no data"@en . "Not informative" . "None" . "Graduates of the study programme are prepared for work in both the state and local government, as well as in the private sector – in commercial companies, small and medium enterprises. The study programme is suitable for students who want to become a cybersecurity analyst, cybersecurity engineer, cybersecurity architect, cybersecurity consultant. Graduates are also prepared for continuing work in industrial research and development as well as in scientific research and higher education."@en . "no data" . "TRUE" . "Midstream"@en . . . . . . . . . . . . . . . . . . . . "Faculty of Computer Science and Information Technology"@en . .