Kieli: Englanti

  • Basic principles in networking

    Max amount of FITech students: 20 This course provides a theoretical and practical basis for computer networking. Besides basic networking principles, the course provides case studies of network protocols at each layer of the OSI model. Examples include HTTP and TCP/IP for data center networking, Bluetooth and Bluetooth Low Energy for short-distance device-to-device communication, and…

    Lue lisää

  • Architecture of complex systems

    Max amount of FITech students: 20 adult learners System architecture is the study of early decision making in complex systems. This course teaches how to capture experience and analysis about early system decisions, and how to choose architectures that meet stakeholder needs, integrate easily, and evolve flexibly. This knowledge you can apply to traditional business…

    Lue lisää

  • User experience in robotics

    Learning outcomes After passing this course, the student Course completion Lecture participation. Active participation in exercise sessions and teamwork, as well as homeworks. Small robotic programming task. Written report and presentation of the group assignment. Individual literature review related to the assignment topic (3-5 scientific articles). Experiencing demos and visits. More information in the Tampere…

    Lue lisää

  • Privacy and security for software systems

    Security, privacy, and data protection are increasingly important for software systems and information technology in general. None of the concepts can be separated from each other. Thus, after this course, the participants will have advanced and holistic understanding of privacy and data protection on one hand and security on the other. In addition to exposing…

    Lue lisää

  • Networked systems and services

    Max amount of FITech students: 10 Persons without a valid study right to a Finnish university have preference to this course. The course focuses on core networking themes and problems at the higher layers of the protocol stack. Examples of topics we will cover are reliability (e.g., forward error correction), HTTP, RPC, video delivery, fate…

    Lue lisää

  • Introduction to the internet of things

    Max amount of FITech students: 15 Persons without a valid study right to a Finnish university have preference to this course. Understand and learn the fundamental concepts and key enablers of the #InternetofThings and how to identify and design #IoT applications! Internet of Things (IoT) is an extension of Internet connectivity into everyday objects and…

    Lue lisää

  • Introduction to machine learning

    Max amount of FITech students: 15 (the course is full) Persons without a valid study right to a Finnish university have preference to this course. Learn the basics of machine learning theory and learn to apply it to real-life problems! The course has a short prerequisite knowledge test – available on the course website –…

    Lue lisää

  • Internet protocols

    Max amount of FITech students: 10 Course contents The course focuses on the core Internet protocols and algorithms. Internet Protocol (IPv4 and IPv6) and related core protocols and mechanisms, congestion control, routing in the Internet, multicasting and multicast routing, support for host mobility, and multimedia networking and Quality of Service support in the Internet. Learning…

    Lue lisää

  • Distributed systems

    Max amount of FITech students: 15 Persons without a valid study right to a Finnish university have preference to this course. During the course, students learn essential motivations and solution techniques for distributed systems. Course contents On a more detailed level, we discuss about the basic distributed system techniques, including architectures, processes, communication, naming, modelling,…

    Lue lisää

  • Cryptography in networking

    Max amount of FITech students: 15 Persons without a valid study right to a Finnish university have preference to this course. Course contents Learning outcomes The student learns the most important cryptographic concepts and relevant mechanisms that are used in realizing those concepts. Examples of these concepts are symmetric ciphers, public-key encryption, digital signatures, message…

    Lue lisää