ru en
Faculty of Secure Information Technologies School of Computer Technologies and Control

Career. Vacancies

Visiting Lecturer

ITMO University Fellowship and Professorship Program is looking for lecturers for the Faculty of Secure Information Technologies in the following areas:

  1. Database Security;
  2. Information security laws and regulations;
  3. Computer Networks;
  4. Mobile Systems Security;
  5. Seminar on Software Systems, Technologies, and Security.

The auditory: 30-40 master students of the information security program.

The aim: to teach innovative courses designed by the candidate.

Contract Period: minimum two-week courses (3 ECTS, 108 academic hours).

Please note: Courses must be delivered exclusively in English.

Responsibilities: 

  • Teaching Master’s level courses in-class and/or in hybrid (in-class and online) mode. All courses are delivered in English.
  • Developing the course program, lecture content, and tasks for practical work and course projects. Verification and approval of the content developed are conducted by the head of the Master’s program.
  • Сourse content should be up-to-date, and practical tasks should relate to real-world cybersecurity tasks or present-day cases from the industry.
  • Leading, supporting and managing student projects.
  • Conducting final examinations on the course.
  • Working collaboratively with colleagues.

Requirements:

  • Ph.D. or Doctorate in Cybersecurity, Computer Engineering, Computer Science.
  • For holders of Russian Ph.D.: minimum of 3 years of international experience at the world’s leading universities.
  • At least 3 years of practical and recent experience in Database Security/Computer Networks/Mobile Systems Security (IoT security).
  • Teaching experience at a university or work experience in a leading position.
  • Excellence in teaching, preferably in both in-class and online modes.

 Preferred qualifications:

  • Assistant, Associate or Full Professor position (or similar) at one of the world’s leading universities.
  • Research experience in relevant fields.
  • Authorship of original course-related books.
  • Authorship of recognized online courses.
  • Publications in Cybersecurity-related topics in peer-reviewed journals (Scopus/Web of Science).
  • Conference presentations on Cybersecurity-related topics.
  • H-index from 10 preferable.
  • Additional certifications are highly desirable.

Courses description:

Course

Course description / preferable content

The auditory

ECTS

Lectures / Practice / Independent studies

(ac. hours)

Period

Database Security

  • The role of databases in information systems. Features control access to data. Cryptographic protection of data.
  • Delimiting access to database objects: tables, attribute, records. Application of triggers, views, masking requests for access control. Cryptographic methods of protection. Screening requests to the database. Control trace of operations. Ensuring integrity in the database. DB backups.
  • SQL statements for access control. Implementation of domain integrity, attributes, tables, referential integrity.
  • Tools for monitoring the operation of the database.
  • Overview of the main ways to analyze the security of databases. Security scanners.

1-year masters

3

8 / 32 / 64

Spring 2021

Information security laws and regulations

  • National cybersecurity strategies. NCSS Good Practice Guide (ENISA).
  • EU Directive on Security of Network and Information Systems.
  • EU Cybersecurity Act.
  • EU General Data Protection Regulation.
  • Cybersecurity standards.

1-year masters

3

16 / 16 / 76

Spring 2021

Computer Networks

  • Basic course on computer networks: OSI, TCP/IP.
  • Basic topics in networking (packet-switching, routing, socket programming, and congestion control).
  • Principles, architectures, and protocols used in modern networked systems.
  • TCP/IP stack: IP, TCP, UDP. DHCP, DNS, etc.
  • LAN configuring.

2-year masters

3

8 / 32 / 68

Fall 2020

Mobile Systems Security

  • IoT security. Common vulnerabilities and threats, typical attacks on IoT devices.
  • Security requirements in IoT systems and IoT threat modeling.
  • Industrial standards.
  • Vulnerabilities in the IoT systems (physical, communication, application layer).
  • Vulnerability and risk assessments, risk mitigation strategies for common security threats in IoT systems.

(CISCO technologies preferable)

2-year masters

3

8 / 32 / 68

Fall 2020

Seminar on Software Systems,

Technologies and Security (with course project)

  • Machine learning and artificial intelligence in cybersecurity.
  • Classification, clusterization, regression, anomaly detection in cyber security tasks.
  • Email filtering, spam filters. Basic examples of classification, modern algorithms.
  • Network attacks detection. Features selection. Classification.
  • User identification/authentication. Anomaly detection, identify account theft and masquerade.   
  • Malware detection. Clusterization, ensemble methods.
  • Security of artificial intelligence: adversarial attacks, etc.

2-year masters

3

8 / 32 / 68

Fall 2020

ITMO Fellowship and Professorship Program

Contacts: Ms. Alisa Vorobeva vorobeva@itmo.ru

Information © 2015-2024 ITMO University
2015 Department of Information Technology