Checking date: 20/06/2022

Course: 2022/2023

Technologies for privacy
Study: Bachelor in Computer Science and Engineering (218)

Coordinating teacher: PERIS LOPEZ, PEDRO

Department assigned to the subject: Department of Computer Science and Engineering

Type: Electives
ECTS Credits: 3.0 ECTS


Requirements (Subjects that are assumed to be known)
Cryptography and Computer Security (course 3 / semester 1) Computer Networks (course 3 / semester 1) Security Engineering applied to computer engineering / to information systems (course 3 / semester 2)
Skills and learning outcomes
Description of contents: programme
1. Introduction to Cybersecurity 2. Principles of privacy 3. Introduction to advanced cryptography 4. Privacy protection in Big Data 5. Regulations
Learning activities and methodology
AF1. THEORETICAL-PRACTICAL CLASSES. They will present the knowledge that students should acquire. They will receive the class notes and will have basic reference documents to facilitate the follow-up of the classes and the development of the subsequent work. Exercises and problems that students may have, will be solved and workshops and evaluation tests will be carried out to develope the necessary skills. AF2. TUTORIALS. Individualized (individual tutorials) or group (collective tutorials) assistance to students will be provided by the teacher. AF3. INDIVIDUAL OR GROUP STUDENT WORK. AF8: WORKSHOPS AND LABORATORIES AF9: FINAL EXAM. In which the knowledge, skills and abilities acquired throughout the course will be assessed globally. MD1: CLASS THEORY. Exhibitions in the teacher's class with support of computer and audiovisual media, in which the main concepts of the subject are developed and materials and bibliography are provided to complement the students' learning. MD2: PRACTICES. Resolution of practical cases, problems, etc. raised by the teacher individually or in groups. MD3: TUTORIALS. Individualized assistance (individual tutorials) or group (collective tutorials) to students by the teacher. MD6: LABORATORY PRACTICES. Applied / experimental teaching to workshops and laboratories under the supervision of a tutor.
Assessment System
  • % end-of-term-examination 60
  • % of continuous assessment (assigments, laboratory, practicals...) 40
Calendar of Continuous assessment
Basic Bibliography
  • Torra Vicenç. Data Privacy: Foundations, New Developments and the Big Data Challenge. Springer . 2017

The course syllabus may change due academic events or other reasons.