-
1. Completing the course
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
-
2. Introduction
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
-
3. Risk Management and Governance
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
- 3.1 Introduction2
- 3.2 What is risk?
- 3.3 Why is risk assessment and management important?
- 3.4 What is cyber risk assessment and management?
- 3.5 Risk Governance
- 3.6 Risk Assessment and management principles
- 3.7 Business continuity: incident response and recovery planning
- 3.8 Questions for risk management
-
4. Law and Regulation
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
- 4.1 Introductory principles of law and legal research
- 4.2 Jurisdiction
- 4.3 Privacy laws in general and electronic interception
- 4.4 Data protection
- 4.5 Computer crime
- 4.6 Contract
- 4.7 Tort
- 4.8 Intellectual property
- 4.9 Dematerialisation of documents and electronic trust services
- 4.10 Trust
- 4.11 Other
- 4.12 Public international law (Advanced)
- 4.13 Ethics
- 4.14 Conclusion: Legal Risk Management
- 4.15 Questions for laws
-
5. Human Factors
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
6. Privacy & Online Rights
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
7. Malware & Attack Technologies
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
8. Adversarial Behaviour
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
9. Security Operations & Incident Management
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
10. Forensics
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
11. Cryptology (theory)
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
12. Operating Systems and Virtualisation
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
- 12.1 Introduction to OS
- 12.2 Attacker Model
- 12.3 The role of operating systems and their design in security
- 12.4 Operating System Security Principles and Models
- 12.5 Primitives for Isolation and Mediation
- 12.6 Operating System Hardening
- 12.7 Operating Systems, Hypervisors-What about related areas?
- 12.8 Käyttöjärjestelmien yhteenvetokysymykset
-
13. Distributed Systems Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
14. Formal Methods
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
15. Authentication, Authorisation, Accountability (AAA)
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
16. Software Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
17. Web & Mobile Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
18. Secure Software Lifecycle
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
19. Applied Cryptography
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
20. Network Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
21. Hardware Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
22. Cyber-Physical Systems Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
-
23. Physical Layer Security and Telecommunications
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
- 23.1 Physical Layer Schemes for Confidentiality, Integrity and Access Control 1
- 23.2 Physical Layer Schemes for Confidentiality, Integrity and Access Control
- 23.3 Physical-Layer Identification
- 23.4 Compromising Emanations and Sensor Spoofing
- 23.5 Physical Layer Security of Selected Communication Technologies
- 23.6 Questions for physical layer
-
24. Feedback
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
questionnaire
0 / 3010