Student Type: Adult learner

  • Electrochemical energy storage and conversion technologies

    The course provides the student the ability to analyse battery energy storages and water electrolysis and fuel cell plants at system level. The student will learn how to model the components and systems, and study the energy efficiency and dynamics of the systems. Learning outcomes After successfully completing this course, the student will be able…

    Read More

  • Geology of components and sustainability

    Course contents The goal of the course is for the student to gain insight into the natural (geological) limitations that the ongoing transition to fossil-free energy may encounter. The student learns in which geological environments different critical materials are formed and how the occurrences are distributed on the globe. The student gains insights into Finland’s…

    Read More

  • Modern topics in telecommunications and radio engineering 10 – Intelligent security

    Max amount of FITech students: 20 Persons without a valid study right at a Finnish university or university of applied sciences have preference to this course. In this course we will introduce the requirements for security in future self-sustaining wireless networks that are defined with native, embedded artificial intelligence (AI) capability, where new security paradigms…

    Read More

  • Platform security

    Max amount of FITech students: 10 Persons without a valid study right to a Finnish university have preference to this course. Course contents Many security courses are about how to design your application and configuration to keep your platform secure. This course is the opposite: what can your platform do to make your application secure,…

    Read More

  • Introduction to cybersecurity

    This is a course with a flexible start. Please note that after submitting the application it will take approximately two weeks to access this course and start studying. Please wait for instructions from the University of Turku. Please note that the applications will not be processed and the course will not be evaluated between 15.6.–15.8.…

    Read More

  • Introduction to digital communication and 5G

    Please note that the applications will not be processed and the course will not be evaluated between 15.6.–15.8. This is a course with a flexible start. Please note that after submitting the application it will take approximately two weeks to access this course and start studying. Please wait for instructions from the University of Turku.…

    Read More

  • Introduction to Internet

    Max amount of FITech students: 30 Persons without a valid study right at a Finnish university or university of applied sciences have preference to this course. The course introduces the basic basic concepts, key terminology and design principles, functionality and challenges of the Internet and its architecture. The students are taken through the Internet protocol…

    Read More

  • Authentication, passwords and applied cryptography

    Max amount of FITech students: 30 Persons without a valid study right to a Finnish university have preference to this course. This course will teach the participants technologies and techniques how authentication and crypto is being broken/hacked in practice, and what are practical defence-in-depth approaches. Breaking authentication, passwords and crypto in many cybersecurity situations have…

    Read More

  • Introductory penetration testing and security assessment

    Max amount of FITech students: 30 Persons without a valid study right to a Finnish university have preference to this course. This course will explore foundations of penetration testing and security assessment from a cybersecurity professional perspective. We will explore basic/starting techniques and tools necessary to perform in real world/companies in relation to web security,…

    Read More

  • Computers, ethics and society

    Max amount of FITech students: 15 adult learners Characteristics of computer as a tool and the computing field. Theories and frameworks of moral psychology, ethics, business ethics, and social informatics. With the help of these theories student is able to create alternative courses of action for a moral conflict in the computing context and give…

    Read More