Toteutus "Capricornus" 2023-2024
Course news
Tähdistöllä on väliä
Jos Plussa huomauttaa: "Palauttaaksesi tehtäviä sinun pitää ilmoittautua kurssille", tarkista, että olet sillä Plussan alustalla, johon olet ilmoittautunut: Andromeda tai Capricornus.
Kaksi alustaa Plussassa
Kurssista on nyt kaksi toteutusalustaa Plussassa. Ole tarkkana, mihin keräät pisteitä. Jos olet aloittanut vanhalla alustalla, jatka kerääminen loppuun asti siellä. Katso kuitenkin suoritusten voimassaolojen säännöt kohdasta 1.2 Suoritustapa ja arvostelu. Alustojen erottamiseksi lukuvuosi 2022-2023 on "Andromeda" ja lukuvuosi 2023-2024 "Capricornus".
Tähdistöllä on väliä
Jos Plussa huomauttaa: "Palauttaaksesi tehtäviä sinun pitää ilmoittautua kurssille", tarkista, että olet sillä Plussan alustalla, johon olet ilmoittautunut: Andromeda tai Capricornus.
0 / 10
1. Completing the course
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
1.1 Personnel | ||||
1.2 Completing the course and grading | ||||
1.3 Exercises | ||||
1.3.1 Esimerkkitehtävä | questionnaire | 0 / 7 | A 0 / 10 | |
1.4 Exam | ||||
1.5 Cybersecurity Module | ||||
1.6 Themes | ||||
1.7 Suggestions for improving course material | ||||
1.8 Tervetuloa mukaan kyberturvallisuuden opetuksen tutkimukseen! | ||||
1.9 Forum |
0 / 190
2. Introduction
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
2.1 Cyber Security Definition | ||||
2.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 | |
2.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 40 | |
2.2 Course Knowledge Areas | ||||
2.3 Deploying CyBOK knowledge to address security issues | ||||
2.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
2.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
2.3.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 | |
2.4 Principles | ||||
2.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
2.5 Crosscutting themes | ||||
2.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
2.6 Questions from the intro | ||||
2.6.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
2.6.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 | |
2.7 Glossary |
0 / 200
3. Risk Management and Governance
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
3.1 Introduction2 | ||||
3.2 What is risk? | ||||
3.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 50 | |
3.3 Why is risk assessment and management important? | ||||
3.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
3.4 What is cyber risk assessment and management? | ||||
3.5 Risk Governance | ||||
3.6 Risk Assessment and management principles | ||||
3.6.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
3.6.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 50 | |
3.7 Business continuity: incident response and recovery planning | ||||
3.8 Questions for risk management | ||||
3.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
3.8.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 360
4. Law and Regulation
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
0 / 180
5. Human Factors
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
5.1 Introduction: Understanding human behaviour in security | ||||
5.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
5.2 Usable security - the basics | ||||
5.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
5.3 Human Error | ||||
5.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
5.4 Cyber security awareness and education | ||||
5.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
5.5 Positive Security | ||||
5.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
5.6 Stakeholder Engagement | ||||
5.7 Social engineering | ||||
5.7.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
5.7.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
5.7.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 | |
5.8 Questions for human factors | ||||
5.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
5.8.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 130
6. Privacy & Online Rights
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
6.1 Introduction5 | ||||
6.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
6.2 Privacy as Confidentiality | ||||
6.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
6.2.2 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
6.3 Privacy as Control | ||||
6.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
6.4 Privacy as Transparency | ||||
6.5 Privacy Technologies and Democratic Values | ||||
6.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
6.6 Privacy Engineering | ||||
6.6.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
6.7 Questions for privacy | ||||
6.7.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
6.7.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 70
7. Malware & Attack Technologies
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
7.1 A taxonomy of Malware | ||||
7.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
7.2 Malicious Activities by Malware | ||||
7.3 Malware Detection | ||||
7.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
7.4 Malware Response | ||||
7.5 Questions for malware | ||||
7.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
7.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 100
8. Adversarial Behaviour
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
8.1 A Characterisation of Adversaries | ||||
8.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
8.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
8.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 20 | |
8.2 Recognition | ||||
8.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
8.3 The Elements of a Malicious Operation | ||||
8.4 Models to Understand Malicious Operations | ||||
8.5 Questions for attacker | ||||
8.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
8.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 70
9. Security Operations & Incident Management
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
9.1 Fundamental concepts | ||||
9.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 | |
9.2 Monitor: Data sources | ||||
9.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
9.3 Analyse: Analysis methods | ||||
9.4 Plan: Security Information and Event Management | ||||
9.5 Execute: Mitigation and countermeasures | ||||
9.6 Knowledge: Intelligence and analytics | ||||
9.7 Human Factors: Incident management | ||||
9.8 Questions for incident management | ||||
9.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 130
10. Forensics
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
10.1 Definitions and Conceptual Models | ||||
10.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
10.2 Application Forensics | ||||
10.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
10.2.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 | |
10.2.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 | |
10.3 Artifact Analysis | ||||
10.4 Forensics questions | ||||
10.4.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
10.4.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 40
11. Cryptology (theory)
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
11.1 Theory | ||||
11.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 |
0 / 250
12. Operating Systems and Virtualisation
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
12.1 Introduction to OS | ||||
12.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
12.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 | |
12.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 | |
12.2 Attacker Model | ||||
12.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
12.3 The role of operating systems and their design in security | ||||
12.3.1 Tehtäviä | questionnaire | 0 / 7 | A 0 / 20 | |
12.4 Operating System Security Principles and Models | ||||
12.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
12.5 Primitives for Isolation and Mediation | ||||
12.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
12.5.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 | |
12.5.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 | |
12.6 Operating System Hardening | ||||
12.6.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
12.7 Operating Systems, Hypervisors-What about related areas? | ||||
12.8 Käyttöjärjestelmien yhteenvetokysymykset | ||||
12.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
12.8.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 120
13. Distributed Systems Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
13.1 Classes of Distributed Systems and Vulnerabilities | ||||
13.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
13.2 Distributed Systems: Decentralised P2P Models124 | ||||
13.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
13.2.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
13.3 Distributed Systems: Decentralised P2P Models | ||||
13.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
13.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 | |
13.4 Distributed Systems: Decentralised P2P Models1 | ||||
13.5 Distributed Systems: Decentralised P2P Models dfdsf | ||||
13.6 Questions | ||||
13.6.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
13.6.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 30
14. Formal Methods
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
14.1 Formal Methods for Security | ||||
14.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
0 / 230
15. Authentication, Authorisation, Accountability (AAA)
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
15.1 Authorisation | ||||
15.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
15.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 | |
15.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 | |
15.1.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 | |
15.1.5 Tehtävä 5 | questionnaire | 0 / 7 | A 0 / 10 | |
15.2 Access control in distributed systems | ||||
15.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
15.3 Authentication | ||||
15.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
15.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
15.3.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 50 | |
15.3.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 | |
15.4 Accountability | ||||
15.5 Questions for AAA | ||||
15.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
15.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 30
16. Software Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
16.1 Categories of Vulnerabilities | ||||
16.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
16.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
16.2 Detection of Vulnerabilities | ||||
16.3 Mitigating Exploitation of Vulnerabilities | ||||
16.4 Summary | ||||
16.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
0 / 140
17. Web & Mobile Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
17.1 Introduction16 | ||||
17.2 Fundamental Concepts and Approaches | ||||
17.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
17.2.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 | |
17.2.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 20 | |
17.3 Client Side Vulnerabilities and Mitigations | ||||
17.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 | |
17.4 Server Side Vulnerabilities and Mitigations | ||||
17.5 Questions for web and mobile security | ||||
17.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
17.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 70
18. Secure Software Lifecycle
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
18.1 Prescriptive Secure Software Lifecycle Processes | ||||
18.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
18.2 Adaptations of the Secure Software Lifecycle | ||||
18.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
18.3 Questions for SDL | ||||
18.3.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
18.3.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 400
19. Applied Cryptography
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
0 / 100
20. Network Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
20.1 Introduction19 | ||||
20.2 Security Goals and Attacker Models | ||||
20.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
20.3 Networking Applications | ||||
20.4 Network Protocols and Their Security | ||||
20.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
20.4.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
20.5 Network Security Tools | ||||
20.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
20.5.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
20.6 Conclusion | ||||
20.7 Questions for network security | ||||
20.7.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
20.7.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 0
21. Hardware Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
0 / 100
22. Cyber-Physical Systems Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
22.1 Cyber-Physical Systems and their Security Risks | ||||
22.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
22.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
22.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 | |
22.1.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 | |
22.2 Crosscutting Security | ||||
22.3 CPS Domains | ||||
22.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
22.4 Questions for cyber-physical systems | ||||
22.4.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
22.4.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 50
23. Physical Layer Security and Telecommunications
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
0 / 10
24. Feedback
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
24.1 Give Feedback | ||||
24.1.1 Tehtävä 1 | questionnaire | 0 / 7 | C 0 / 10 |
questionnaire
0 / 3010