
Khalyasmaa Alexandra
Associate professor of the Electrical Engineering Department of the Ural Power Engineering Institute, Ural Federal University, PhD in technical sciences.
The course presents the principles of building and using digital substations, information and analytical systems, the vulnerabilities and threats in the field of information security in the power industry, the principles of building models and databases, database management systems and providing access to them.
The course also discusses the principles of using risk management, legislative, organizational and technical means of ensuring cybersecurity (cryptography, software and hardware) and the features of using machine learning in the power industry from the point of view of cybersecurity.
Associate professor of the Electrical Engineering Department of the Ural Power Engineering Institute, Ural Federal University, PhD in technical sciences.
Associate professor of the Electrical Engineering Department of the Ural Power Engineering Institute, Ural Federal University, PhD in technical sciences.
Senior Researcher of the Scientific Laboratory of Data Processing, Analysis and Visualization for Power Industry Applications, Electrical and Power Engineering Faculty, Novosibirsk State Technical University, PhD in technical sciences.
Course duration: 12 weeks
Workload per week: 5–7 hours
Number of ECTS: 3 credits
Graduate and postgraduate students, pursuing the degree in the fields related to the Fuel and Energy Sector and Applied Digital and Information Technologies.
Higher education
Digital transformation of the power industry
1.1. Digitization of the power industry
1.2. Data storage, transmission, processing and analysis in power industry information systems
Basic cybersecurity principles
2.1. Cybersecurity in the power industry
2.2. Features of cybersecurity ensuring in the power industry
2.3. Models and principles of data organization
2.4. Database management systems. Access control
2.5. Types of cyber threats at power facilities
3. Ensuring cybersecurity at power facilities
3.1. Methods of ensuring cybersecurity
3.2. Laws and regulations for cybersecurity
3.3. Organizational measures for ensuring cybersecurity at power facilities
3.4. Cryptographic cybersecurity techniques
3.5. Hardware and software cybersecurity tools, Part 1
3.6. Hardware and software cybersecurity tools, Part 2
3.7. Cybersecurity and machine learning