. "Introduction to blockchain technology"@en . . "3" . "Description:\nA very brief description of major subjects or activities. Major activities include (1) self-study of the course material given in the course Website, (2) active participation at the workshop. During workshop students will have to perform the given work assignments, to fill in the questionnaires and to execute quizzes.\nLearning outcomes:\nLearning outcomes U1. Students will be able to\n\n1. Explain basic blockchain concepts, such as cryptographic components, consensus components, and major blockchain structures.\n\n2. explain basic principles and applications of the smart contracts.\n\nLearning outcomes U2. Students will be able to\n\n1. Select among the blockchain platform, select and formalise requirements for the specific scenario.\n\n2. Design a specification according to the given scenario.\n\nLearning outcomes U3. Students will be able to\n\n1. Apply regulatory and legal frameworks for the blockchain operations.\n\n2. Recommend blockchain technology for business and operation innovation.\n\n3. Perform SWOT analysis of the blockchain application.\n\n4. Design blockchain business processes and business logics.\n\n5. Explain blockchain features for the growth of the (impacted) industry.\n\nLearning outcomes U4. Students will be able to\n\n1. Engineer requirements and design the blockchain applications.\n\n2. Collect and formalise functional and non- functional requirements and to select the blockchain platform.\n\n3. Design and test existing blockchain based PoC.\n\n4. Develop and apply appropriate blockchain architecture." . . "Presential"@en . "FALSE" . . "Others"@en . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . "Master in Cybersecurity"@en . . "https://taltech.ee/en/masters-programmes/cybersecurity#p1817347" . "120"^^ . "Presential"@en . "The programme is taught jointly by the two largest public universities in Estonia. The Cybersecurity and Digital Forensics studies are concentrated in Tallinn, while the specialisation in Cryptography is concentrated in Tartu. Upon successful completion of the programme students will receive a joint degree signed by both universities - TalTech and the University of Tartu. \n- The public focus on the field of cyber security is growing around the world. Estonia is well known for its eagerness to put innovative IT solutions into everyday use. It is a pioneer in electronic identities and electronic voting and enthusiastically adopts mobile technology, online banking and electronic government services. However, with so many e-solutions and such extensive use of the internet, attention also needs to be turned to the security issue. By choosing electable courses, it is possible to specialise in one of the following aspects or a suitable mix of those:\n- Organisational aspects - law, organization, psychology, standards, etc.\n- Technological aspects - networking, attack/defence technology, cryptography.\n- Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The area is becoming critical for both data security and law enforcement and is involved in a complicated interplay between surveillance and counter-surveillance issues.\n- Cryptography is vital for the functioning of the modern interconnected world, since it is required to ensure privacy, data integrity, etc. Cryptography experts are required to develop new ways of keeping data secure, as well as making sure that the existing solutions are still strong enough. Study programme aims and objectives \nThe aim of the study program is to provide a broad background in cyber security, \nas well as the opportunity for in-depth study in the fields of Cybersecurity, Digital Forensics, or Cryptography. Students can focus their studies in technical, theoretical or organizational aspects or in a combination of those.\nA graduate of the program specializing in Cybersecurity is ready to be employed as a technical professional or a manager in the field of cybersecurity.\nA graduate of the program specializing in Digital Forensics is ready to be employed as a security incident handler in a company or a digital forensic expert in a law enforcement agency.\nA graduate of the program specializing in Cryptography is ready to be employed as a cybersecurity analyst.\nThe theoretical competence acquired is adequate for continuing studies as a Ph.D student."@en . . . "2"@en . "TRUE" . . "Master"@en . "Thesis" . "no tuition, other costs may apply" . "Euro"@en . "6000.00" . "Recommended" . "The programme conveys the specialist knowledge and professional skills needed on a career path leading to high-end technical roles (e.g. security analyst, architect or research engineer; security incident handler or a digital forensic expert in a law enforcement agency) or managerial roles (e.g. project/team leader or technology officer)."@en . "3"^^ . "TRUE" . "Midstream"@en . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .