-
1. Completing the course
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
-
2. Introduction
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
-
3. Risk Management and Governance
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
- 3.1 Introduction2
- 3.2 What is risk?
- 3.3 Why is risk assessment and management important?
- 3.4 What is cyber risk assessment and management?
- 3.5 Risk Governance
- 3.6 Risk Assessment and management principles
- 3.7 Business continuity: incident response and recovery planning
- 3.8 Questions for risk management
- 3.9 Feedback
-
4. Law and Regulation
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
- 4.1 Introductory principles of law and legal research
- 4.2 Jurisdiction
- 4.3 Privacy laws in general and electronic interception
- 4.4 Data protection
- 4.5 Computer crime
- 4.6 Contract
- 4.7 Tort
- 4.8 Intellectual property
- 4.9 Dematerialisation of documents and electronic trust services
- 4.10 Trust
- 4.11 Other
- 4.12 Public international law (Advanced)
- 4.13 Ethics
- 4.14 Conclusion: Legal Risk Management
- 4.15 Questions for laws
- 4.16 Feedback
-
5. Human Factors
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
6. Privacy & Online Rights
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
7. Malware & Attack Technologies
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
8. Adversarial Behaviour
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
9. Security Operations & Incident Management
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
- 9.1 Fundamental concepts
- 9.2 Monitor: Data sources
- 9.3 Analyse: Analysis methods
- 9.4 Plan: Security Information and Event Management
- 9.5 Execute: Mitigation and countermeasures
- 9.6 Knowledge: Intelligence and analytics
- 9.7 Human Factors: Incident management
- 9.8 Questions for incident management
- 9.9 Feedback
-
10. Forensics
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
11. Cryptology (theory)
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
12. Operating Systems and Virtualisation
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
- 12.1 Introduction to OS
- 12.2 Attacker Model
- 12.3 The role of operating systems and their design in security
- 12.4 Operating System Security Principles and Models
- 12.5 Primitives for Isolation and Mediation
- 12.6 Operating System Hardening
- 12.7 Operating Systems, Hypervisors-What about related areas?
- 12.8 Käyttöjärjestelmien yhteenvetokysymykset
- 12.9 Feedback
-
13. Distributed Systems Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
14. Formal Methods
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
15. Authentication, Authorisation, Accountability (AAA)
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
16. Software Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
17. Web & Mobile Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
18. Secure Software Lifecycle
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
19. Applied Cryptography
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
20. Network Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
21. Hardware Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
22. Cyber-Physical Systems Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
-
23. Physical Layer Security and Telecommunications
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
- 23.1 Physical Layer Schemes for Confidentiality, Integrity and Access Control 1
- 23.2 Physical Layer Schemes for Confidentiality, Integrity and Access Control
- 23.3 Physical-Layer Identification
- 23.4 Compromising Emanations and Sensor Spoofing
- 23.5 Physical Layer Security of Selected Communication Technologies
- 23.6 Questions for physical layer
- 23.7 Feedback
-
24. Feedback
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
questionnaire
0 / 3080