0 / 10 1. Completing the course
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 1.1 Personnel | |||
| 1.2 Completing the course and grading | |||
| 1.3 Exercises | |||
| 1.3.1 Esimerkkitehtävä | questionnaire | 0 / 7 | A 0 / 10 |
| 1.4 Exam | |||
| 1.5 Cybersecurity Module | |||
| 1.6 Themes | |||
| 1.7 Suggestions for improving course material | |||
| 1.8 Tervetuloa mukaan kyberturvallisuuden opetuksen tutkimukseen! | |||
| 1.9 Forum | |||
| 1.10 Map Accessibility | |||
0 / 190 2. Introduction
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 2.1 Cyber Security Definition | |||
| 2.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 |
| 2.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 40 |
| 2.2 Course Knowledge Areas | |||
| 2.3 Deploying CyBOK knowledge to address security issues | |||
| 2.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 2.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 2.3.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 2.4 Principles | |||
| 2.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 2.5 Crosscutting themes | |||
| 2.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 2.6 Questions from the intro | |||
| 2.6.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 2.6.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 2.7 Glossary | |||
0 / 200 3. Risk Management and Governance
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 3.1 Introduction2 | |||
| 3.2 What is risk? | |||
| 3.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 50 |
| 3.3 Why is risk assessment and management important? | |||
| 3.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 3.4 What is cyber risk assessment and management? | |||
| 3.5 Risk Governance | |||
| 3.6 Risk Assessment and management principles | |||
| 3.6.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 3.6.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 50 |
| 3.7 Business continuity: incident response and recovery planning | |||
| 3.8 Questions for risk management | |||
| 3.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 3.8.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 3.9 Feedback | |||
0 / 390 4. Law and Regulation
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
0 / 180 5. Human Factors
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 5.1 Introduction: Understanding human behaviour in security | |||
| 5.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 5.2 Usable security - the basics | |||
| 5.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 5.3 Human Error | |||
| 5.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 5.4 Cyber security awareness and education | |||
| 5.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 5.5 Positive Security | |||
| 5.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 5.6 Stakeholder Engagement | |||
| 5.7 Social engineering | |||
| 5.7.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 5.7.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 5.7.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 5.8 Questions for human factors | |||
| 5.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 5.8.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 5.9 Feedback | |||
0 / 130 6. Privacy & Online Rights
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 6.1 Introduction5 | |||
| 6.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 6.2 Privacy as Confidentiality | |||
| 6.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 6.2.2 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 6.3 Privacy as Control | |||
| 6.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 6.4 Privacy as Transparency | |||
| 6.5 Privacy Technologies and Democratic Values | |||
| 6.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 6.6 Privacy Engineering | |||
| 6.6.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 6.7 Questions for privacy | |||
| 6.7.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 6.7.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 6.8 Feedback | |||
0 / 70 7. Malware & Attack Technologies
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 7.1 A taxonomy of Malware | |||
| 7.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 7.2 Malicious Activities by Malware | |||
| 7.3 Malware Detection | |||
| 7.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 7.4 Malware Response | |||
| 7.5 Questions for malware | |||
| 7.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 7.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 7.6 Feedback | |||
0 / 100 8. Adversarial Behaviour
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 8.1 A Characterisation of Adversaries | |||
| 8.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 8.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 8.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 20 |
| 8.2 Recognition | |||
| 8.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 8.3 The Elements of a Malicious Operation | |||
| 8.4 Models to Understand Malicious Operations | |||
| 8.5 Questions for attacker | |||
| 8.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 8.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 8.6 Feedback | |||
0 / 70 9. Security Operations & Incident Management
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 9.1 Fundamental concepts | |||
| 9.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 |
| 9.2 Monitor: Data sources | |||
| 9.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 9.3 Analyse: Analysis methods | |||
| 9.4 Plan: Security Information and Event Management | |||
| 9.5 Execute: Mitigation and countermeasures | |||
| 9.6 Knowledge: Intelligence and analytics | |||
| 9.7 Human Factors: Incident management | |||
| 9.8 Questions for incident management | |||
| 9.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 20 |
| 9.9 Feedback | |||
0 / 130 10. Forensics
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 10.1 Definitions and Conceptual Models | |||
| 10.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 10.2 Application Forensics | |||
| 10.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 10.2.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 |
| 10.2.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 10.3 Artifact Analysis | |||
| 10.4 Forensics questions | |||
| 10.4.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 10.4.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 10.5 Feedback | |||
0 / 50 11. Cryptology (theory)
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 11.1 Theory | |||
| 11.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 11.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 40 |
| 11.2 Feedback | |||
0 / 250 12. Operating Systems and Virtualisation
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 12.1 Introduction to OS | |||
| 12.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 12.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 |
| 12.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 12.2 Attacker Model | |||
| 12.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 12.3 The role of operating systems and their design in security | |||
| 12.3.1 Tehtäviä | questionnaire | 0 / 7 | A 0 / 20 |
| 12.4 Operating System Security Principles and Models | |||
| 12.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 12.5 Primitives for Isolation and Mediation | |||
| 12.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 12.5.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 |
| 12.5.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 12.6 Operating System Hardening | |||
| 12.6.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 12.7 Operating Systems, Hypervisors-What about related areas? | |||
| 12.8 Käyttöjärjestelmien yhteenvetokysymykset | |||
| 12.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 12.8.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 12.9 Feedback | |||
0 / 120 13. Distributed Systems Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 13.1 Classes of Distributed Systems and Vulnerabilities | |||
| 13.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 13.2 Distributed Systems: Decentralised P2P Models124 | |||
| 13.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 13.2.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 13.3 Distributed Systems: Decentralised P2P Models | |||
| 13.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 13.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 |
| 13.4 Distributed Systems: Decentralised P2P Models1 | |||
| 13.5 Distributed Systems: Decentralised P2P Models dfdsf | |||
| 13.6 Questions | |||
| 13.6.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 13.6.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 13.7 Feedback | |||
0 / 90 14. Formal Methods
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 14.1 Intro to AI and Formal Methods in cybersecurity | |||
| 14.2 Formal Methods for Security | |||
| 14.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 14.3 AI and Cybersecurity | |||
| 14.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 14.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 14.3.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 14.4 AI ja Formal Methods Questions | |||
| 14.4.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 20 |
| 14.5 Feedback | |||
0 / 230 15. Authentication, Authorisation, Accountability (AAA)
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 15.1 Authorisation | |||
| 15.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 15.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 |
| 15.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 15.1.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 |
| 15.1.5 Tehtävä 5 | questionnaire | 0 / 7 | A 0 / 10 |
| 15.2 Access control in distributed systems | |||
| 15.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
| 15.3 Authentication | |||
| 15.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 |
| 15.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 15.3.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 50 |
| 15.3.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 |
| 15.4 Accountability | |||
| 15.5 Questions for AAA | |||
| 15.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 15.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 15.6 Feedback | |||
0 / 30 16. Software Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 16.1 Categories of Vulnerabilities | |||
| 16.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 16.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 16.2 Detection of Vulnerabilities | |||
| 16.3 Mitigating Exploitation of Vulnerabilities | |||
| 16.4 Summary | |||
| 16.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 16.5 Feedback | |||
0 / 140 17. Web & Mobile Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 17.1 Introduction16 | |||
| 17.2 Fundamental Concepts and Approaches | |||
| 17.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 17.2.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 |
| 17.2.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 20 |
| 17.3 Client Side Vulnerabilities and Mitigations | |||
| 17.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 |
| 17.4 Server Side Vulnerabilities and Mitigations | |||
| 17.5 Questions for web and mobile security | |||
| 17.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 17.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 17.6 Feedback | |||
0 / 70 18. Secure Software Lifecycle
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 18.1 Prescriptive Secure Software Lifecycle Processes | |||
| 18.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 18.2 Adaptations of the Secure Software Lifecycle | |||
| 18.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 18.3 Questions for SDL | |||
| 18.3.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 18.3.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 18.4 Feedback | |||
0 / 350 19. Applied Cryptography
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
0 / 100 20. Network Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 20.1 Introduction19 | |||
| 20.2 Security Goals and Attacker Models | |||
| 20.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 20.3 Networking Applications | |||
| 20.4 Network Protocols and Their Security | |||
| 20.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 20.4.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 20.5 Network Security Tools | |||
| 20.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 20.5.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 20.6 Conclusion | |||
| 20.7 Questions for network security | |||
| 20.7.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 20.7.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 20.8 Feedback | |||
0 / 0 21. Hardware Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
0 / 100 22. Cyber-Physical Systems Security
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 22.1 Cyber-Physical Systems and their Security Risks | |||
| 22.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 22.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 |
| 22.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 |
| 22.1.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 |
| 22.2 Crosscutting Security | |||
| 22.3 CPS Domains | |||
| 22.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
| 22.4 Questions for cyber-physical systems | |||
| 22.4.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 |
| 22.4.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
| 22.5 Feedback | |||
0 / 50 23. Physical Layer Security and Telecommunications
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
0 / 20 24. Feedback
Tuesday, 1 June 2021, 12:00 – Saturday, 6 June 2026, 12:00
| Assignment | Category | Submissions | Points |
|---|---|---|---|
| 24.1 Give Feedback | |||
| 24.1.1 Tehtävä 1 | questionnaire | 0 / 7 | C 0 / 10 |
| 24.1.2 Tehtävä 2 | questionnaire | 0 / 7 | C 0 / 10 |
questionnaire
0 / 3070