Voor de beste ervaring schakelt u JavaScript in en gebruikt u een moderne browser!
Je gebruikt een niet-ondersteunde browser. Deze site kan er anders uitzien dan je verwacht.
Why join this lecture series?
Insights

Gain cutting-edge insights

Read more
Into the latest developments in cybersecurity, ensuring you stay ahead in this rapidly evolving field.
Expertise

Learn from security experts

Read more
Benefit from UvA’s strong academic and industrial experience.
Knowledge

Obtain a broad understanding

Read more
Different IT security aspects will be discussed, including mathematics, software, networks and hardware, covering a wide range of applications.
Connections

Leverage networking opportunities 

Read more
Connect and exchange insights with fellow industry professionals

For whom?

This lecture series is designed for a wide range of IT professionals from diverse backgrounds including computer science, engineering, or related fields, as well as those who have learned coding through practical experience. It seeks to enhance participants' IT security expertise and deepen their understanding of security concepts.


What will you learn?

This lecture series provides you with greater insight into how you can elevate the IT security within your organization. More specifically, you will learn:

  • The basic notions of cybersecurity and cryptography
  • Network security protocols, firewalls, routing and intrusion detection techniques
  • Software vulnerabilities, exploits and countermeasures
  • Hardware security fundamentals, learning to attack IoT devices with side-channels and faults
  • Theory and practice of data protection and privacy enhancing technologies
     

Programme:

During five lectures we will focus on foundational aspects of security, providing a well-rounded understanding of different principles and techniques such as data protection, cryptographic techniques, software security, network security, intrusion detection and IoT security. Theory and newest insights based on academic and industrial experience will be alternated with real-world use cases. 

  • 18 March 2025 | Lecture 1: Security Concepts, Cryptography and Threat Models


    This session wil focus on:
    ▪ Explore the theoretical frameworks that form the basis of security, including confidentiality, integrity, availability, and beyond.
    ▪ Introduction to symmetric and public key cryptography.
    ▪ Understand the cybersecurity threats and threat modelling.

    Dr. Kostas Papagiannopoulos is researcher at the University of Amsterdam. His research interest are applied cryptography, efficient cryptographic implementations in software and hardware, side-channel analysis, fault injection and countermeasures. 

  • 25 March 2025 | Lecture 2: Network Security and Intrusion Detection Systems


    This session wil focus on:
    ▪ Firewalling: Understand both stateless and stateful firewalls
    ▪ AI driven analytics: Leverage AI for enhanced security insights
    ▪ Programmable network devices for security: Explore the use of programmable network devices for improved protection.
    ▪ Theory and practice of Intrusion Detection Systems: Dive into the theory and practical applications of IDS.

    Prof.dr. Paola Grosso is professor of Multiscale networks and Scientific Director of the Informatics Institute at the University of Amsterdam

    Dr. Kostas Papagiannopoulos is an assistant professor at the University of Amsterdam. His research interest are applied cryptography, efficient cryptographic implementations in software and hardware, side-channel analysis, fault injection and countermeasures. 

  • 01 April 2025 | Lecture 3: Software Security


    This session wil focus on:
    ▪ Common Software Vulnerabilities: Explore key threats like injection attacks, buffer overflows, cross-site scripting (XSS), and insecure deserialization.
    ▪ Secure Coding Practices: Learn essential techniques such as input validation, output encoding, authentication, authorization, session management, and error handling.
    ▪ Security in Software Development Life Cycle (SDLC): Understand how to integrate security throughout the software development lifecycle, including threat modeling, code reviews, and penetration testing.
    ▪ Web Application Security: Familiarize yourself with the OWASP Top 10, secure configuration, and defenses against attacks like SQL injection and XSS.
    ▪ Software Security Tools: Discover tools for static and dynamic code analysis, software composition analysis (SCA), and fuzzing.

    Dr. Vas Mavroudis is a Principal Research Scientist with a deep understanding of cyber threats. He co-leads the AI for Cyberdefence Center at the Alan Turing Institute in London, focusing on applying cutting-edge Machine Learning (ML) techniques to real-world security problems.  His expertise spans areas like autonomous network defense, large-scale traffic analysis, and countering intelligent adversaries.

  • 08 April 2025 | Lecture 4: Data Protection Technologies and Privacy-Enhancing Techniques


    This session wil focus on:
    ▪ Contextuale data protection technologies from multiple angles.
    ▪ Deep dive in to the key technologies such as cryptographic algorithms for Secure Multi-party Computation.
    ▪ Examine applications of data protection technologies, including privacy-preserving machine learning.

    Dr. Divya Ravi is an assistant professor in the Complex Cyber Infrastructure Group at the University of Amsterdam. Her research interests primarily include Secure Multi-party Computation and Distributed Computing.

    Dr. Lisa Kohl is a researcher in the Cryptology Group at CWI Amsterdam. Her research focuses on exploring new directions in secure computation with the goal of developing practical post-quantum secure protocols.

  • 15 April 2025 | Lecture 5: IoT and Hardware Security


    This session wil focus on:
    ▪ Gaining insight into practical solutions, emerging technologies, and best practices for securing IoT devices.
    ▪ Learn about common threats and vulnerabilities in IoT, including side-channel analysis and fault attack techniques.
    ▪ Explore countermeasures against hardware attacks.

    Dr. Kostas Papagiannopoulos is an assistant professor at the University of Amsterdam. His research interest are applied cryptography, efficient cryptographic implementations in software and hardware, side-channel analysis, fault injection and countermeasures. 

Contact

Do you have questions about this lecture series? Please contact us: 
E: professionaleducation-ivi@uva.nl