Kieli: Englanti
Secure programming
The aim of secure programming is to prevent errors as early as possible. Core content Complementary knowledge Learning outcomes After completing the course, the student is able to apply secure programming skills in programming and decision making. In addition, the student selects a topic area from the course where they deepen their knowledge. Completion methods…
Human-centered product development
Core content Learning outcomes After completing the course, the student understands how to take user needs and requirements into account when developing interactive products in general and in software projects in particular. The student can apply a lean human-centered design process in design and development activities. The student also knows how to Completion methods The…
Gamification: A walkthrough of how games are shaping our lives
The course gives a broad overview of how games and game-related technologies shape our lives. The course enables the student to understand and analyse the pervasiveness of games and game-related technologies in different domains of culture and society, how they affect and shape our behaviours and interactions with the world. After completing the course, the…
Emerging technology adoption and use
Core content Complementary/specialist knowledge Learning outcomes After the course, the students Teaching methods Attending 50 % of the lectures and successfully completing 1) three lecture diary reports (individual assignment) and 2) the course exercise (group assignment). More information in Tampere University’s study guide. You can get a digital badge after completing this course.
Machine learning algorithms
Max amount of FITech students: 10 During this course, some of the most important machine learning algorithms are presented and examples for their applications are described. After the course, the student is able to understand and use some basic and advanced machine learning methods for data mining, pattern recognition and other problems to that learning-based…
Principles of programming graphical user interfaces
During the course, participants will learn how to create graphical user interfaces utilising commonly used user interface components. User interface creation is studied using both interface builders in integrated development environments and on program code level. In addition, event-based programming, software architecture designs related to graphical user interfaces and some common design models will be…
Rinnakkaisuus
Maksimimäärä FITech-opiskelijoita: 40 Kurssille valitaan ensisijaisesti sellaisia henkilöitä, joilla ei ole voimassaolevaa opiskeluoikeutta suomalaiseen korkeakouluun. Kurssin ydinsisältö Osaamistavoitteet Opiskelija tunnistaa rinnakkaisuuden aiheuttamat perusongelmat (kriittinen alue, nälkiintyminen, lukkiutuminen) ja osaa joko välttää tai ratkaista nämä ongelmat yksinkertaisissa tapauksissa. Lisätietoa Tampereen yliopiston opinto-oppaassa. Tämän kurssin suorituksesta on mahdollista saada digitaalinen suoritusmerkki.
Software engineering methodologies
This course gives students basic skills needed in software project work. Core content: Complementary/specialist knowledge include topics such as: More information in Tampere University’s study guide. You can get a digital badge after completing this course.
Software systems architecture
Core content Complementary/specialist knowledge Learning outcomes After passing the course, the student More information in the Tampere University study guide. You can get a digital badge after completing this course. This course was previously under the name Large scale software design.
Cyber security II: Specialisation
Core content Information security management, principles, instructions, associations and standards. Physical security, information warfare and critical infrastructure. Operating system security and security in other programs. Information security attack and prevention methods. Complementary knowledge IoT security, side channel attacks, cloud security Learning outcomes After completing the course the student knows what cyber security skills belong to…