This course has already ended.
				
			
		
		
		
		
		
		
		- 
    
    
1. Completing the course
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
2. Introduction
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
3. Risk Management and Governance
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
- 3.1 Introduction2
 - 3.2 What is risk?
 - 3.3 Why is risk assessment and management important?
 - 3.4 What is cyber risk assessment and management?
 - 3.5 Risk Governance
 - 3.6 Risk Assessment and management principles
 - 3.7 Business continuity: incident response and recovery planning
 - 3.8 Questions for risk management
 
 - 
    
    
4. Law and Regulation
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
- 4.1 Introductory principles of law and legal research
 - 4.2 Jurisdiction
 - 4.3 Privacy laws in general and electronic interception
 - 4.4 Data protection
 - 4.5 Computer crime
 - 4.6 Contract
 - 4.7 Tort
 - 4.8 Intellectual property
 - 4.9 Dematerialisation of documents and electronic trust services
 - 4.10 Trust
 - 4.11 Other
 - 4.12 Public international law (Advanced)
 - 4.13 Ethics
 - 4.14 Conclusion: Legal Risk Management
 - 4.15 Questions for laws
 
 - 
    
    
5. Human Factors
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
6. Privacy & Online Rights
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
7. Malware & Attack Technologies
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
8. Adversarial Behaviour
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
9. Security Operations & Incident Management
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
10. Forensics
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
11. Cryptology (theory)
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
12. Operating Systems and Virtualisation
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
- 12.1 Introduction to OS
 - 12.2 Attacker Model
 - 12.3 The role of operating systems and their design in security
 - 12.4 Operating System Security Principles and Models
 - 12.5 Primitives for Isolation and Mediation
 - 12.6 Operating System Hardening
 - 12.7 Operating Systems, Hypervisors-What about related areas?
 - 12.8 Käyttöjärjestelmien yhteenvetokysymykset
 
 - 
    
    
13. Distributed Systems Security
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
14. Formal Methods
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
15. Authentication, Authorisation, Accountability (AAA)
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
16. Software Security
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
17. Web & Mobile Security
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
18. Secure Software Lifecycle
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
19. Applied Cryptography
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
20. Network Security
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
21. Hardware Security
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
22. Cyber-Physical Systems Security
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 - 
    
    
23. Physical Layer Security and Telecommunications
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
- 23.1 Physical Layer Schemes for Confidentiality, Integrity and Access Control 1
 - 23.2 Physical Layer Schemes for Confidentiality, Integrity and Access Control
 - 23.3 Physical-Layer Identification
 - 23.4 Compromising Emanations and Sensor Spoofing
 - 23.5 Physical Layer Security of Selected Communication Technologies
 - 23.6 Questions for physical layer
 
 - 
    
    
24. Feedback
Monday, 1 June 2020, 12:00 – Sunday, 31 August 2025, 12:00
 
questionnaire
0 / 3010