0 / 10
1. Completing the course
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
1.1 Personnel | ||||
1.2 Completing the course and grading | ||||
1.3 Exercises | ||||
1.3.1 Esimerkkitehtävä | questionnaire | 0 / 7 | A 0 / 10 | |
1.4 Exam | ||||
1.5 Cybersecurity Module | ||||
1.6 Themes | ||||
1.7 Suggestions for improving course material | ||||
1.8 Tervetuloa mukaan kyberturvallisuuden opetuksen tutkimukseen! | ||||
1.9 Forum |
0 / 190
2. Introduction
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
2.1 Cyber Security Definition | ||||
2.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 | |
2.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 40 | |
2.2 Course Knowledge Areas | ||||
2.3 Deploying CyBOK knowledge to address security issues | ||||
2.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
2.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
2.3.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 | |
2.4 Principles | ||||
2.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
2.5 Crosscutting themes | ||||
2.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
2.6 Questions from the intro | ||||
2.6.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
2.6.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 | |
2.7 Glossary |
0 / 200
3. Risk Management and Governance
Monday, 17 January 2022, 12:00 – Friday, 6 June 2025, 23:59
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
3.1 Introduction2 | ||||
3.2 What is risk? | ||||
3.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 50 | |
3.3 Why is risk assessment and management important? | ||||
3.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
3.4 What is cyber risk assessment and management? | ||||
3.5 Risk Governance | ||||
3.6 Risk Assessment and management principles | ||||
3.6.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
3.6.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 50 | |
3.7 Business continuity: incident response and recovery planning | ||||
3.8 Questions for risk management | ||||
3.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
3.8.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 360
4. Law and Regulation
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
0 / 180
5. Human Factors
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
5.1 Introduction: Understanding human behaviour in security | ||||
5.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
5.2 Usable security - the basics | ||||
5.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
5.3 Human Error | ||||
5.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
5.4 Cyber security awareness and education | ||||
5.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
5.5 Positive Security | ||||
5.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
5.6 Stakeholder Engagement | ||||
5.7 Social engineering | ||||
5.7.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
5.7.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
5.7.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 | |
5.8 Questions for human factors | ||||
5.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
5.8.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 130
6. Privacy & Online Rights
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
6.1 Introduction5 | ||||
6.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
6.2 Privacy as Confidentiality | ||||
6.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
6.2.2 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
6.3 Privacy as Control | ||||
6.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
6.4 Privacy as Transparency | ||||
6.5 Privacy Technologies and Democratic Values | ||||
6.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
6.6 Privacy Engineering | ||||
6.6.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
6.7 Questions for privacy | ||||
6.7.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
6.7.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 70
7. Malware & Attack Technologies
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
7.1 A taxonomy of Malware | ||||
7.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
7.2 Malicious Activities by Malware | ||||
7.3 Malware Detection | ||||
7.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
7.4 Malware Response | ||||
7.5 Questions for malware | ||||
7.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
7.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 100
8. Adversarial Behaviour
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
8.1 A Characterisation of Adversaries | ||||
8.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
8.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
8.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 20 | |
8.2 Recognition | ||||
8.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
8.3 The Elements of a Malicious Operation | ||||
8.4 Models to Understand Malicious Operations | ||||
8.5 Questions for attacker | ||||
8.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
8.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 70
9. Security Operations & Incident Management
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
9.1 Fundamental concepts | ||||
9.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 | |
9.2 Monitor: Data sources | ||||
9.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
9.3 Analyse: Analysis methods | ||||
9.4 Plan: Security Information and Event Management | ||||
9.5 Execute: Mitigation and countermeasures | ||||
9.6 Knowledge: Intelligence and analytics | ||||
9.7 Human Factors: Incident management | ||||
9.8 Questions for incident management | ||||
9.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 130
10. Forensics
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
10.1 Definitions and Conceptual Models | ||||
10.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
10.2 Application Forensics | ||||
10.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
10.2.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 | |
10.2.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 | |
10.3 Artifact Analysis | ||||
10.4 Forensics questions | ||||
10.4.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
10.4.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 40
11. Cryptology (theory)
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
11.1 Theory | ||||
11.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 |
0 / 250
12. Operating Systems and Virtualisation
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
12.1 Introduction to OS | ||||
12.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
12.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 | |
12.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 | |
12.2 Attacker Model | ||||
12.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
12.3 The role of operating systems and their design in security | ||||
12.3.1 Tehtäviä | questionnaire | 0 / 7 | A 0 / 20 | |
12.4 Operating System Security Principles and Models | ||||
12.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
12.5 Primitives for Isolation and Mediation | ||||
12.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
12.5.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 | |
12.5.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 | |
12.6 Operating System Hardening | ||||
12.6.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
12.7 Operating Systems, Hypervisors-What about related areas? | ||||
12.8 Käyttöjärjestelmien yhteenvetokysymykset | ||||
12.8.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
12.8.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 120
13. Distributed Systems Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
13.1 Classes of Distributed Systems and Vulnerabilities | ||||
13.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
13.2 Distributed Systems: Decentralised P2P Models124 | ||||
13.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
13.2.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
13.3 Distributed Systems: Decentralised P2P Models | ||||
13.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
13.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 | |
13.4 Distributed Systems: Decentralised P2P Models1 | ||||
13.5 Distributed Systems: Decentralised P2P Models dfdsf | ||||
13.6 Questions | ||||
13.6.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
13.6.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 30
14. Formal Methods
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
14.1 Formal Methods for Security | ||||
14.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 |
0 / 230
15. Authentication, Authorisation, Accountability (AAA)
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
15.1 Authorisation | ||||
15.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
15.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 | |
15.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 | |
15.1.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 | |
15.1.5 Tehtävä 5 | questionnaire | 0 / 7 | A 0 / 10 | |
15.2 Access control in distributed systems | ||||
15.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 30 | |
15.3 Authentication | ||||
15.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 20 | |
15.3.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
15.3.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 50 | |
15.3.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 | |
15.4 Accountability | ||||
15.5 Questions for AAA | ||||
15.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
15.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 30
16. Software Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
16.1 Categories of Vulnerabilities | ||||
16.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
16.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
16.2 Detection of Vulnerabilities | ||||
16.3 Mitigating Exploitation of Vulnerabilities | ||||
16.4 Summary | ||||
16.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 |
0 / 140
17. Web & Mobile Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
17.1 Introduction16 | ||||
17.2 Fundamental Concepts and Approaches | ||||
17.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
17.2.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 20 | |
17.2.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 20 | |
17.3 Client Side Vulnerabilities and Mitigations | ||||
17.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 40 | |
17.4 Server Side Vulnerabilities and Mitigations | ||||
17.5 Questions for web and mobile security | ||||
17.5.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
17.5.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 70
18. Secure Software Lifecycle
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
18.1 Prescriptive Secure Software Lifecycle Processes | ||||
18.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
18.2 Adaptations of the Secure Software Lifecycle | ||||
18.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
18.3 Questions for SDL | ||||
18.3.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
18.3.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 400
19. Applied Cryptography
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
0 / 100
20. Network Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
20.1 Introduction19 | ||||
20.2 Security Goals and Attacker Models | ||||
20.2.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
20.3 Networking Applications | ||||
20.4 Network Protocols and Their Security | ||||
20.4.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
20.4.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
20.5 Network Security Tools | ||||
20.5.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
20.5.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
20.6 Conclusion | ||||
20.7 Questions for network security | ||||
20.7.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
20.7.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 0
21. Hardware Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
0 / 100
22. Cyber-Physical Systems Security
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
22.1 Cyber-Physical Systems and their Security Risks | ||||
22.1.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
22.1.2 Tehtävä 2 | questionnaire | 0 / 7 | A 0 / 10 | |
22.1.3 Tehtävä 3 | questionnaire | 0 / 7 | A 0 / 10 | |
22.1.4 Tehtävä 4 | questionnaire | 0 / 7 | A 0 / 10 | |
22.2 Crosscutting Security | ||||
22.3 CPS Domains | ||||
22.3.1 Tehtävä 1 | questionnaire | 0 / 7 | A 0 / 10 | |
22.4 Questions for cyber-physical systems | ||||
22.4.1 Tehtävä 1 | questionnaire | 0 / 7 | B 0 / 30 | |
22.4.2 Tehtävä 2 | questionnaire | 0 / 7 | B 0 / 20 |
0 / 50
23. Physical Layer Security and Telecommunications
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
0 / 10
24. Feedback
Monday, 1 June 2020, 12:00 – Friday, 6 June 2025, 12:00
Assignment | Category | Submissions | Points | |
---|---|---|---|---|
24.1 Give Feedback | ||||
24.1.1 Tehtävä 1 | questionnaire | 0 / 7 | C 0 / 10 |
questionnaire
0 / 3010