Toteutus "Delphinus" 2024-2025
Course news
Hyvityspistekäytännöstä
Lisäpisteiden keräämisen käytäntöä on muutettu. Nyt on mahdollista kerätä lisäpisteitä myös hyväksytyn tentin jälkeen, mutta niiden hyödyntäminen edellyttää uutta hyväksyttyä tenttiä. Katso tarkemmin luku: 1.2 Suoritustapa ja arvostelu.
0 / 10 1. Completing the course
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
Assignment | Category | Submissions | Points |
---|---|---|---|
1.1 Personnel | |||
1.2 Completing the course and grading | |||
1.3 Exercises | |||
1.3.1 Esimerkkitehtävä | questionnaire | 0 / 7 | A 0 / 10 |
1.4 Exam | |||
1.5 Cybersecurity Module | |||
1.6 Themes | |||
1.7 Suggestions for improving course material | |||
1.8 Tervetuloa mukaan kyberturvallisuuden opetuksen tutkimukseen! | |||
1.9 Forum |
0 / 190 2. Introduction
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
Assignment | Category | Submissions | Points |
---|---|---|---|
2.1 Cyber Security Definition | |||
2.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 |
2.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 40 |
2.2 Course Knowledge Areas | |||
2.3 Deploying CyBOK knowledge to address security issues | |||
2.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
2.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
2.3.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
2.4 Principles | |||
2.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
2.5 Crosscutting themes | |||
2.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
2.6 Questions from the intro | |||
2.6.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
2.6.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
2.7 Glossary |
0 / 200 3. Risk Management and Governance
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
Assignment | Category | Submissions | Points |
---|---|---|---|
3.1 Introduction2 | |||
3.2 What is risk? | |||
3.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 50 |
3.3 Why is risk assessment and management important? | |||
3.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
3.4 What is cyber risk assessment and management? | |||
3.5 Risk Governance | |||
3.6 Risk Assessment and management principles | |||
3.6.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
3.6.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 50 |
3.7 Business continuity: incident response and recovery planning | |||
3.8 Questions for risk management | |||
3.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
3.8.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
3.9 Feedback |
0 / 360 4. Law and Regulation
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
0 / 180 5. Human Factors
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
5.1 Introduction: Understanding human behaviour in security | |||
5.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
5.2 Usable security - the basics | |||
5.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
5.3 Human Error | |||
5.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
5.4 Cyber security awareness and education | |||
5.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
5.5 Positive Security | |||
5.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
5.6 Stakeholder Engagement | |||
5.7 Social engineering | |||
5.7.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
5.7.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
5.7.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
5.8 Questions for human factors | |||
5.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
5.8.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
5.9 Feedback |
0 / 130 6. Privacy & Online Rights
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
6.1 Introduction5 | |||
6.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
6.2 Privacy as Confidentiality | |||
6.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
6.2.2 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
6.3 Privacy as Control | |||
6.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
6.4 Privacy as Transparency | |||
6.5 Privacy Technologies and Democratic Values | |||
6.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
6.6 Privacy Engineering | |||
6.6.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
6.7 Questions for privacy | |||
6.7.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
6.7.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
6.8 Feedback |
0 / 70 7. Malware & Attack Technologies
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
7.1 A taxonomy of Malware | |||
7.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
7.2 Malicious Activities by Malware | |||
7.3 Malware Detection | |||
7.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
7.4 Malware Response | |||
7.5 Questions for malware | |||
7.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
7.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
7.6 Feedback |
0 / 100 8. Adversarial Behaviour
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
8.1 A Characterisation of Adversaries | |||
8.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
8.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
8.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 20 |
8.2 Recognition | |||
8.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
8.3 The Elements of a Malicious Operation | |||
8.4 Models to Understand Malicious Operations | |||
8.5 Questions for attacker | |||
8.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
8.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
8.6 Feedback |
0 / 70 9. Security Operations & Incident Management
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
9.1 Fundamental concepts | |||
9.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 |
9.2 Monitor: Data sources | |||
9.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
9.3 Analyse: Analysis methods | |||
9.4 Plan: Security Information and Event Management | |||
9.5 Execute: Mitigation and countermeasures | |||
9.6 Knowledge: Intelligence and analytics | |||
9.7 Human Factors: Incident management | |||
9.8 Questions for incident management | |||
9.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 20 |
9.9 Feedback |
0 / 130 10. Forensics
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
10.1 Definitions and Conceptual Models | |||
10.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
10.2 Application Forensics | |||
10.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
10.2.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 |
10.2.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
10.3 Artifact Analysis | |||
10.4 Forensics questions | |||
10.4.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
10.4.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
10.5 Feedback |
0 / 40 11. Cryptology (theory)
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
11.1 Theory | |||
11.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 |
11.2 Feedback |
0 / 250 12. Operating Systems and Virtualisation
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
12.1 Introduction to OS | |||
12.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
12.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 |
12.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
12.2 Attacker Model | |||
12.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
12.3 The role of operating systems and their design in security | |||
12.3.1 Tehtäviä | questionnaire | 0 / 7 | A 0 / 20 |
12.4 Operating System Security Principles and Models | |||
12.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
12.5 Primitives for Isolation and Mediation | |||
12.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
12.5.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 |
12.5.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
12.6 Operating System Hardening | |||
12.6.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
12.7 Operating Systems, Hypervisors-What about related areas? | |||
12.8 Käyttöjärjestelmien yhteenvetokysymykset | |||
12.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
12.8.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
12.9 Feedback |
0 / 120 13. Distributed Systems Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
13.1 Classes of Distributed Systems and Vulnerabilities | |||
13.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
13.2 Distributed Systems: Decentralised P2P Models124 | |||
13.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
13.2.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
13.3 Distributed Systems: Decentralised P2P Models | |||
13.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
13.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 |
13.4 Distributed Systems: Decentralised P2P Models1 | |||
13.5 Distributed Systems: Decentralised P2P Models dfdsf | |||
13.6 Questions | |||
13.6.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
13.6.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
13.7 Feedback |
0 / 90 14. Formal Methods
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
14.1 Intro to AI and Formal Methods in cybersecurity | |||
14.2 Formal Methods for Security | |||
14.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
14.3 AI and Cybersecurity | |||
14.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
14.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
14.3.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
14.4 AI ja Formal Methods Questions | |||
14.4.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 20 |
14.5 Feedback |
0 / 230 15. Authentication, Authorisation, Accountability (AAA)
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
15.1 Authorisation | |||
15.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
15.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 |
15.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
15.1.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 |
15.1.5 Tehtävä 5 | questionnaire | 0 / 7 | A 0 / 10 |
15.2 Access control in distributed systems | |||
15.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
15.3 Authentication | |||
15.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
15.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
15.3.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 50 |
15.3.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 |
15.4 Accountability | |||
15.5 Questions for AAA | |||
15.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
15.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
15.6 Feedback |
0 / 30 16. Software Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
16.1 Categories of Vulnerabilities | |||
16.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
16.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
16.2 Detection of Vulnerabilities | |||
16.3 Mitigating Exploitation of Vulnerabilities | |||
16.4 Summary | |||
16.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
16.5 Feedback |
0 / 140 17. Web & Mobile Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
17.1 Introduction16 | |||
17.2 Fundamental Concepts and Approaches | |||
17.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
17.2.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 |
17.2.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 20 |
17.3 Client Side Vulnerabilities and Mitigations | |||
17.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 |
17.4 Server Side Vulnerabilities and Mitigations | |||
17.5 Questions for web and mobile security | |||
17.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
17.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
17.6 Feedback |
0 / 70 18. Secure Software Lifecycle
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
18.1 Prescriptive Secure Software Lifecycle Processes | |||
18.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
18.2 Adaptations of the Secure Software Lifecycle | |||
18.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
18.3 Questions for SDL | |||
18.3.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
18.3.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
18.4 Feedback |
0 / 400 19. Applied Cryptography
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
0 / 100 20. Network Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
20.1 Introduction19 | |||
20.2 Security Goals and Attacker Models | |||
20.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
20.3 Networking Applications | |||
20.4 Network Protocols and Their Security | |||
20.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
20.4.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
20.5 Network Security Tools | |||
20.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
20.5.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
20.6 Conclusion | |||
20.7 Questions for network security | |||
20.7.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
20.7.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
20.8 Feedback |
0 / 0 21. Hardware Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
0 / 100 22. Cyber-Physical Systems Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
22.1 Cyber-Physical Systems and their Security Risks | |||
22.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
22.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
22.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
22.1.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 |
22.2 Crosscutting Security | |||
22.3 CPS Domains | |||
22.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
22.4 Questions for cyber-physical systems | |||
22.4.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
22.4.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
22.5 Feedback |
0 / 50 23. Physical Layer Security and Telecommunications
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
0 / 20 24. Feedback
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
Assignment | Category | Submissions | Points |
---|---|---|---|
24.1 Give Feedback | |||
24.1.1 Tehtävä 1 | questionnaire | 0 / 7 | C 0 / 10 |
24.1.2 Tehtävä 2 | questionnaire | 0 / 7 | C 0 / 10 |
questionnaire
0 / 3080