Diese Veranstaltung ist Teil des Clusters "Profilierung: 5-I-IP-TM3"
Studierende 0
Beachten Sie bitte: Aktuelle Änderungen, Informationen, Details, Material und Aufgaben werden auf der zugehörigen Online-Plattform kommuniziert.
Literatur:
J.R. Tietsort. 17 Types of Cyber Attacks Commonly Used By Hackers. URL: https://www.aura.com/learn/types-of-cyber-attacks
Complete Data Privacy (GDPR) Fundamentals course. Udemy. URL: https://www.udemy.com/course/data-privacy-fundamental/
Live Cyber-attack simulation. Cyberreason. URL: https://www.youtube.com/watch?v=WRIakA5CP3I
Frequency | Weekday | Time | Format / Place | Period | |
---|---|---|---|---|---|
one-time | Mo | 16:00-17:30 | R2-A4-310 | 12.05.2025 |
Module | Course | Requirements | |
---|---|---|---|
5-I-IP-TM3 Digitale Medizin | Digitale Medizin (Workshop) | Student information |
The binding module descriptions contain further information, including specifications on the "types of assignments" students need to complete. In cases where a module description mentions more than one kind of assignment, the respective member of the teaching staff will decide which task(s) they assign the students.