-
1. Completing the course
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
2. Introduction
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
3. Risk Management and Governance
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
4. Law and Regulation
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
- 4.1 Introductory principles of law and legal research
- 4.2 Jurisdiction
- 4.3 Privacy laws in general and electronic interception
- 4.4 Data protection
- 4.5 Computer crime
- 4.6 Contract
- 4.7 Tort
- 4.8 Intellectual property
- 4.9 Dematerialisation of documents and electronic trust services
- 4.10 Trust
- 4.11 Other
- 4.12 Public international law (Advanced)
- 4.13 Ethics
- 4.14 Conclusion: Legal Risk Management
- 4.15 Questions for laws
- 4.16 Feedback
-
5. Human Factors
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
6. Privacy & Online Rights
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
7. Malware & Attack Technologies
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
8. Adversarial Behaviour
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
9. Security Operations & Incident Management
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
- 9.1 Basic terminology of security incident management
- 9.2 Monitor: data sources
- 9.3 Analyse: analysis methods (advanced)
- 9.4 Plan: security information and event management (advanced)
- 9.5 Execute: attack mitigation and countermeasures (advanced)
- 9.6 Know: intelligence and analytics (advanced)
- 9.7 Human factors: security incident management (advanced)
- 9.8 Summary questions on security incident management
- 9.9 Feedback
-
10. Forensics
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
11. Cryptology (theory)
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
12. Operating Systems and Virtualisation
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
- 12.1 Fundamentals of Operating Systems
- 12.2 Attacker model
- 12.3 The role of operating systems in security
- 12.4 Security principles and models for operating systems
- 12.5 Procedures for isolation and mediation
- 12.6 Operating system hardening
- 12.7 From operating systems to databases (advanced)
- 12.8 Summary questions on operating systems
- 12.9 Feedback
-
13. Distributed Systems Security
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
14. Formal Methods
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
15. Authentication, Authorisation, Accountability (AAA)
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
16. Software Security
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
17. Web & Mobile Security
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
18. Secure Software Lifecycle
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
19. Applied Cryptography
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
20. Network Security
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
21. Hardware Security
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
22. Cyber-Physical Systems Security
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
-
23. Physical Layer Security and Telecommunications
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
- 23.1 Physical Layer Schemes for Confidentiality, Integrity and Access Control 1
- 23.2 Physical Layer Schemes for Confidentiality, Integrity and Access Control
- 23.3 Physical-Layer Identification
- 23.4 Compromising Emanations and Sensor Spoofing
- 23.5 Physical Layer Security of Selected Communication Technologies
- 23.6 Questions for physical layer
- 23.7 Feedback
-
24. Feedback
Tuesday, 1 June 2021, 12:00 – Monday, 30 November 2026, 12:00
questionnaire
0 / 3070