2025 (Current Year) Faculty Courses School of Computing Major courses
Practice and Application for Cybersecurity
- Academic unit or major
- Major courses
- Instructor(s)
- Keisuke Tanaka /
- Class Format
- Lecture/Exercise (Face-to-face)
- Media-enhanced courses
- -
- Day of week/Period
(Classrooms) - 5-8 Wed (W8E-307(W833))
- Class
- -
- Course Code
- XCO.T480
- Number of credits
- 110
- Course offered
- 2025
- Offered quarter
- 3Q
- Syllabus updated
- Sep 18, 2025
- Language
- Japanese
Syllabus
Course overview and goals
With the advanced use of information and communications technology involving the internet, cybersecurity threats have become increasingly serious. Cyber attacks continue to have a serious impact on society, and the damage caused to society by the leakage of personal information and intelectual property due to cyber attacks is immeasurable. Despite the importance of the cybersecurity field, there is currently a significant shortage of human resources.
In response to such social needs, Tokyo Institute of Technology, the predecessor of Institute of Science Tokyo, has launched Progressive Graduate Minor in Cybersecurity in April 2016. In this minor, students wil learn the practical aspects of cybersecurity, in colaboration with NRI as core, Rakuten, NTT, and AIST, and at the same time acquire knowledge of the theoretical background by taking advantage of the strengths of the theoretical field, which is a distinctive feature of the information and communication research field at Institute of Science Tokyo.
The curriculum consists of the following seven courses as core, offerred at School of Computing.
Foundation of Cybersecurity (1Q, 2-0-0)
Theory of Cryptography for Cybersecurity (3Q, 2-0-0)
Practice and Application for Cybersecurity (3Q, 1-1-0)
Cybersecurity Governance (4Q, 1-1-0)
Attack and Defense on Cybersecurity I (2Q, 1-1-0)
Attack and Defense on Cybersecurity I (2-3Q, 1-1-0)
Attack and Defense on Cybersecurity II (4Q, 1-1-0)
As the threat of cyberattacks rapidly escalates, the evolution of IT and AI can be described as a double-edged sword for corporate security. We will explain and examine how companies should confront this situation, considering the latest technological advancements and regulatory trends.
Course description and aims
Upon completing this course, students will be able to understand and explain the following:
1) An overview of security measures in corporate systems and networks
2) Changes in security paradigms in light of IT and AI advancements
Student learning outcomes
実務経験と講義内容との関連 (又は実践的教育内容)
The instructor has over 20 years of practical experience as a security engineer and has also been involved in managing a specialized security company. Drawing on practical experience and knowledge grounded in real-world application—not mere theory—we will deepen our discussion on the current state and future outlook of cybersecurity, while welcoming candid questions and opinions from the students who will lead the next generation.
Keywords
Zero Trust, IoT Security, Security by Design, Supply Chain Security, Digital Trust, AI Security
Competencies
- Specialist skills
- Intercultural skills
- Communication skills
- Critical thinking skills
- Practical and/or problem-solving skills
Class flow
Classes will primarily follow a standard lecture format, but we place great emphasis on interactive dialogue with students.
Additionally, to provide hands-on experience with cybersecurity practices in actual corporate settings, we plan to include company visits and similar activities.
Course schedule/Objectives
Course schedule | Objectives | |
---|---|---|
Class 1 | Orientation, History and Evolution of Cyber Attacks |
Understanding the history and evolution of cyber attacks. |
Class 2 | Security Measures for Corporate Systems and Networks |
Understanding the countermeasures for corporate networks. |
Class 3 | Security Architecture Transformation Driven by Telework Adoption |
Understanding the background of increased security incidents. |
Class 4 | DX and IoT/OT Security |
Understanding DX (Digital Transformation) and its security. |
Class 5 | System Development Process |
Understanding the processes of the systems, their design, development, and operation. |
Class 6 | What is Security by Design? |
Understanding Security by Design. |
Class 7 | Trends and Countermeasures for Supply Chain Attacks |
Understanding the supply chain attacks and countermeasures. |
Class 8 | Trends in Cybersecurity Regulations |
Understanding the trends in cybersecurity-related regulations. |
Class 9 | What is Digital Trust? |
Understanding digital trust. |
Class 10 | ID Trust (Authentication & Authorization) |
Understanding ID trust. |
Class 11 | Data Trust (Digital Signatures, etc.) |
Understanding data trust. |
Class 12 | Software (Service) Trust |
Understanding software trust. |
Class 13 | AI Security |
Understanding AI security. |
Class 14 | Required Skills and Career Paths for Security Professionals |
Understanding the realities of security-related work. |
Study advice (preparation and review)
To enhance effective learning, students are encouraged to spend approximately 100 minutes preparing for class and another 100 minutes reviewing class content afterwards (including assignments) for each class. They should do so by referring to textbooks and other course material.
Textbook(s)
None
Reference books, course materials, etc.
None
Evaluation methods and criteria
Based on class attendance and contributions through questions, comments, and other participation during class.
Related courses
- XCO.T473 : Foundation of Cybersecurity
- XCO.T474 : Theory of Cryptography for Cybersecurity
- XCO.T478 : Cybersecurity Governance
- XCO.T475 : Attack and Defense on Cybersecurity I
- XCO.T476 : Attack and Defense on Cybersecurity II
- XCO.T477 : Attack and Defense on Cybersecurity III
Prerequisites
None. However, the knowledge on the basic notions of computer science can help students to understand the contents of the course smoothly. A computer wil be used in this course. Bring your own PC/Mac to the lecture room.