Eridanus 2025-2026
Course news
Eridanus poistuu etuajassa. Tehtävien määräaika on marraskuussa 2026!
Eridanus-alusta sulkeutuu poikkeuksellisesti jo joulukuussa, sillä Plussa poistuu ja sen tilalle tulee Plussa2. Jos tarkoituksenasi on suorittaa kurssi Eridanuksella, huolehdithan, että olet palauttanut kaikki tehtävät hyväksytysti ilman lukkiutumia viimeistään marraskuussa. Tarkista myös, että yhtäkään tehtävää ei ole jäänyt välistä.
Kurssin aloittaminen kesällä 2026
Jos mietit kurssin aloittamista kesällä Eridanus-alustalla, mutta et ajatellut kiirehtiä suorituksen kanssa, voit odotella elo- syyskuun vaihteessa alkavaa Fornax-alustaa. Fornax tulee olemaan uudella Plussa2-palvelimella, ja on suoritettavissa vuoteen 2028. Huomaathan, että Fornaxin suoritustapa on erilainen, kuin Eridanuksella (mm. pakollinen tentti, oppimistilaisuuksia).
0 / 10 1. Completing the course
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 1.1 Personnel | |||
| 1.2 Completing the course and grading | |||
| 1.3 Exercises | |||
| 1.3.1 Esimerkkitehtävä | questionnaire | 0 / 7 | A 0 / 10 |
| 1.4 Exam | |||
| 1.5 Cybersecurity Module | |||
| 1.6 Themes | |||
| 1.7 Suggestions for improving course material | |||
| 1.8 Tervetuloa mukaan kyberturvallisuuden opetuksen tutkimukseen! | |||
| 1.9 Forum | |||
| 1.10 Map Accessibility | |||
0 / 190 2. Introduction
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 2.1 Cyber Security Definition | |||
| 2.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 |
| 2.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 40 |
| 2.2 Course Knowledge Areas | |||
| 2.3 Deploying CyBOK knowledge to address security issues | |||
| 2.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 2.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 2.3.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 2.4 Principles | |||
| 2.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 2.5 Crosscutting themes | |||
| 2.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 2.6 Questions from the intro | |||
| 2.6.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 2.6.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 2.7 Glossary | |||
0 / 200 3. Risk Management and Governance
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 3.1 Cyber Risk Management | |||
| 3.2 What Does Risk Mean? | |||
| 3.2.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 50 |
| 3.3 Why is it important to assess and manage risks? | |||
| 3.3.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 3.4 Example of Cyber Risk Management | |||
| 3.5 On security culture (advanced) | |||
| 3.6 More aspects of managing risks | |||
| 3.6.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 3.6.2 Problem 2 | questionnaire | 0 / 7 | A 0 / 50 |
| 3.7 Business Continuity | |||
| 3.8 Summary Questions on Risk Management | |||
| 3.8.1 Problem 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 3.8.2 Problem 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 3.9 Feedback | |||
0 / 390 4. Law and Regulation
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
0 / 180 5. Human Factors
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 5.1 Introduction: Understanding human behaviour in security | |||
| 5.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 5.2 Usable security - the basics | |||
| 5.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 5.3 Human Error | |||
| 5.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 5.4 Cyber security awareness and education | |||
| 5.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 5.5 Positive Security | |||
| 5.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 5.6 Stakeholder Engagement | |||
| 5.7 Social engineering | |||
| 5.7.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 5.7.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 5.7.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 5.8 Questions for human factors | |||
| 5.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 5.8.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 5.9 Feedback | |||
0 / 130 6. Privacy & Online Rights
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 6.1 Introduction5 | |||
| 6.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 6.2 Privacy as Confidentiality | |||
| 6.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 6.2.2 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 6.3 Privacy as Control | |||
| 6.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 6.4 Privacy as Transparency | |||
| 6.5 Privacy Technologies and Democratic Values | |||
| 6.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 6.6 Privacy Engineering | |||
| 6.6.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 6.7 Questions for privacy | |||
| 6.7.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 6.7.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 6.8 Feedback | |||
0 / 70 7. Malware & Attack Technologies
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 7.1 A taxonomy of Malware | |||
| 7.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 7.2 Malicious Activities by Malware | |||
| 7.3 Malware Detection | |||
| 7.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 7.4 Malware Response | |||
| 7.5 Questions for malware | |||
| 7.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 7.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 7.6 Feedback | |||
0 / 100 8. Adversarial Behaviour
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 8.1 Attacks and attackers | |||
| 8.1.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 8.1.2 Problem 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 8.1.3 Problem 3 | questionnaire | 0 / 7 | A 0 / 20 |
| 8.2 Identifying harmful activity | |||
| 8.2.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 8.3 Elements of harmful activity (advanced) | |||
| 8.4 Understanding harmful activity and its operating models (advanced) | |||
| 8.5 Summary questions on attacks and attackers | |||
| 8.5.1 Problem 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 8.5.2 Problem 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 8.6 Feedback | |||
0 / 70 9. Security Operations & Incident Management
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 9.1 Basic terminology of security incident management | |||
| 9.1.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 40 |
| 9.2 Monitor: data sources | |||
| 9.2.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 9.3 Analyse: analysis methods (advanced) | |||
| 9.4 Plan: security information and event management (advanced) | |||
| 9.5 Execute: attack mitigation and countermeasures (advanced) | |||
| 9.6 Know: intelligence and analytics (advanced) | |||
| 9.7 Human factors: security incident management (advanced) | |||
| 9.8 Summary questions on security incident management | |||
| 9.8.1 Problem 1 | questionnaire | 0 / 7 | B 0 / 20 |
| 9.9 Feedback | |||
0 / 130 10. Forensics
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 10.1 Definitions and basic information | |||
| 10.1.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 10.2 A reverse perspective on forensics | |||
| 10.2.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 10.2.2 Problem 2 | questionnaire | 0 / 7 | A 0 / 20 |
| 10.2.3 Problem 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 10.3 Overview of digital and other traces (advanced) | |||
| 10.4 Forensics: summary questions | |||
| 10.4.1 Problem 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 10.4.2 Problem 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 10.5 Feedback | |||
0 / 50 11. Cryptology (theory)
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 11.1 Theory | |||
| 11.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 11.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 40 |
| 11.2 Feedback | |||
0 / 250 12. Operating Systems and Virtualisation
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 12.1 Fundamentals of Operating Systems | |||
| 12.1.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 12.1.2 Problem 2 | questionnaire | 0 / 7 | A 0 / 20 |
| 12.1.3 Problem 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 12.2 Attacker model | |||
| 12.2.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 12.3 The role of operating systems in security | |||
| 12.3.1 Problems | questionnaire | 0 / 7 | A 0 / 20 |
| 12.4 Security principles and models for operating systems | |||
| 12.4.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 12.5 Procedures for isolation and mediation | |||
| 12.5.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 12.5.2 Problem 2 | questionnaire | 0 / 7 | A 0 / 20 |
| 12.5.3 Problem 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 12.6 Operating system hardening | |||
| 12.6.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 12.7 From operating systems to databases (advanced) | |||
| 12.8 Summary questions on operating systems | |||
| 12.8.1 Problem 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 12.8.2 Problem 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 12.9 Feedback | |||
0 / 120 13. Distributed Systems Security
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 13.1 Security of Distributed Systems | |||
| 13.1.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 13.2 P2P systems | |||
| 13.2.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 13.2.2 Problem 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 13.3 Attacks on P2P systems | |||
| 13.3.1 Problem 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 13.3.2 Problem 2 | questionnaire | 0 / 7 | A 0 / 20 |
| 13.4 Coordinated distributed systems (advanced) | |||
| 13.5 Attacks on coordinated distributed systems (advanced) | |||
| 13.6 Summary questions on distributed systems | |||
| 13.6.1 Problem 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 13.6.2 Problem 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 13.7 Feedback | |||
0 / 90 14. Formal Methods
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 14.1 Intro to AI and Formal Methods in cybersecurity | |||
| 14.2 Formal Methods for Security | |||
| 14.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 14.3 AI and Cybersecurity | |||
| 14.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 14.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 14.3.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 14.4 AI ja Formal Methods Questions | |||
| 14.4.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 20 |
| 14.5 Feedback | |||
0 / 230 15. Authentication, Authorisation, Accountability (AAA)
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 15.1 Authorisation | |||
| 15.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 15.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 |
| 15.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 15.1.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 |
| 15.1.5 Tehtävä 5 | questionnaire | 0 / 7 | A 0 / 10 |
| 15.2 Access control in distributed systems | |||
| 15.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 15.3 Authentication | |||
| 15.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 15.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 15.3.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 50 |
| 15.3.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 |
| 15.4 Accountability | |||
| 15.5 Questions for AAA | |||
| 15.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 15.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 15.6 Feedback | |||
0 / 30 16. Software Security
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 16.1 Categories of Vulnerabilities | |||
| 16.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 16.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 16.2 Detection of Vulnerabilities | |||
| 16.3 Mitigating Exploitation of Vulnerabilities | |||
| 16.4 Summary | |||
| 16.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 16.5 Feedback | |||
0 / 140 17. Web & Mobile Security
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 17.1 Introduction16 | |||
| 17.2 Fundamental Concepts and Approaches | |||
| 17.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 17.2.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 |
| 17.2.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 20 |
| 17.3 Client Side Vulnerabilities and Mitigations | |||
| 17.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 |
| 17.4 Server Side Vulnerabilities and Mitigations | |||
| 17.5 Questions for web and mobile security | |||
| 17.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 17.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 17.6 Feedback | |||
0 / 70 18. Secure Software Lifecycle
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 18.1 Prescriptive Secure Software Lifecycle Processes | |||
| 18.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 18.2 Adaptations of the Secure Software Lifecycle | |||
| 18.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 18.3 Questions for SDL | |||
| 18.3.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 18.3.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 18.4 Feedback | |||
0 / 350 19. Applied Cryptography
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
0 / 100 20. Network Security
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 20.1 Introduction19 | |||
| 20.2 Security Goals and Attacker Models | |||
| 20.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 20.3 Networking Applications | |||
| 20.4 Network Protocols and Their Security | |||
| 20.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 20.4.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 20.5 Network Security Tools | |||
| 20.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 20.5.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 20.6 Conclusion | |||
| 20.7 Questions for network security | |||
| 20.7.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 20.7.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 20.8 Feedback | |||
0 / 0 21. Hardware Security
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
0 / 100 22. Cyber-Physical Systems Security
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 22.1 Cyber-Physical Systems and their Security Risks | |||
| 22.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 22.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 22.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 22.1.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 |
| 22.2 Crosscutting Security | |||
| 22.3 CPS Domains | |||
| 22.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 22.4 Questions for cyber-physical systems | |||
| 22.4.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 22.4.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 22.5 Feedback | |||
0 / 50 23. Physical Layer Security and Telecommunications
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
0 / 20 24. Feedback
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 24.1 Give Feedback | |||
| 24.1.1 Tehtävä 1 | questionnaire | 0 / 7 | C 0 / 10 |
| 24.1.2 Tehtävä 2 | questionnaire | 0 / 7 | C 0 / 10 |
questionnaire
0 / 3070