Last modified: 21 Aug 2025 14:16
This course provides an introduction to the analysis of cybersecurity data. It will show how to use tools and methods from data science and machine learning to perform such analysis. Broader issues at the interface of security and privacy with AI will be discussed.
| Study Type | Postgraduate | Level | 5 |
|---|---|---|---|
| Term | First Term | Credit Points | 15 credits (7.5 ECTS credits) |
| Campus | Aberdeen | Sustained Study | No |
| Co-ordinators |
|
||
This course provides an introduction to the analysis of cybersecurity data. It will show how to use tools and methods from data science and machine learning to perform such analysis. Broader issues at the interface of security and privacy with AI will be discussed.
Information on contact teaching time is available from the course guide.
| Assessment Type | Summative | Weighting | 75 | |
|---|---|---|---|---|
| Assessment Weeks | Feedback Weeks | |||
| Feedback |
2-hour exam worth 75% of the overall grade. |
|||
| Knowledge Level | Thinking Skill | Outcome |
|---|---|---|
| Procedural | Analyse | Detailed understanding of possible applications of Artificial Intelligence as an offensive technology. |
| Procedural | Evaluate | Familiarity with key concepts, techniques and tools in Artificial intelligence. |
| Procedural | Evaluate | Appreciation of security and privacy issues arising from the use of Artificial Intelligence is software systems, including vulnerabilities and mitigations. |
| Procedural | Evaluate | Appreciation of uses of specific Artificial Intelligence techniques and tools in cyber security defence and in privacy enhancing technologies. |
| Assessment Type | Summative | Weighting | 25 | |
|---|---|---|---|---|
| Assessment Weeks | Feedback Weeks | |||
| Feedback |
1-hour invigilated class test worth 25% of the overall grade. |
|||
| Knowledge Level | Thinking Skill | Outcome |
|---|---|---|
| Procedural | Analyse | Detailed understanding of possible applications of Artificial Intelligence as an offensive technology. |
| Procedural | Evaluate | Familiarity with key concepts, techniques and tools in Artificial intelligence. |
| Procedural | Evaluate | Appreciation of security and privacy issues arising from the use of Artificial Intelligence is software systems, including vulnerabilities and mitigations. |
| Procedural | Evaluate | Appreciation of uses of specific Artificial Intelligence techniques and tools in cyber security defence and in privacy enhancing technologies. |
There are no assessments for this course.
| Assessment Type | Summative | Weighting | 100 | |
|---|---|---|---|---|
| Assessment Weeks | Feedback Weeks | |||
| Feedback |
Resit Exam (100%). |
|||
| Knowledge Level | Thinking Skill | Outcome |
|---|---|---|
|
|
||
| Knowledge Level | Thinking Skill | Outcome |
|---|---|---|
| Procedural | Analyse | Detailed understanding of possible applications of Artificial Intelligence as an offensive technology. |
| Procedural | Evaluate | Appreciation of security and privacy issues arising from the use of Artificial Intelligence is software systems, including vulnerabilities and mitigations. |
| Procedural | Evaluate | Appreciation of uses of specific Artificial Intelligence techniques and tools in cyber security defence and in privacy enhancing technologies. |
| Procedural | Evaluate | Familiarity with key concepts, techniques and tools in Artificial intelligence. |
We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.