- 
    
    
1. Completing the course
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
2. Introduction
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
3. Risk Management and Governance
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
- 3.1 Introduction2
 - 3.2 What is risk?
 - 3.3 Why is risk assessment and management important?
 - 3.4 What is cyber risk assessment and management?
 - 3.5 Risk Governance
 - 3.6 Risk Assessment and management principles
 - 3.7 Business continuity: incident response and recovery planning
 - 3.8 Questions for risk management
 - 3.9 Feedback
 
 - 
    
    
4. Law and Regulation
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
- 4.1 Introductory principles of law and legal research
 - 4.2 Jurisdiction
 - 4.3 Privacy laws in general and electronic interception
 - 4.4 Data protection
 - 4.5 Computer crime
 - 4.6 Contract
 - 4.7 Tort
 - 4.8 Intellectual property
 - 4.9 Dematerialisation of documents and electronic trust services
 - 4.10 Trust
 - 4.11 Other
 - 4.12 Public international law (Advanced)
 - 4.13 Ethics
 - 4.14 Conclusion: Legal Risk Management
 - 4.15 Questions for laws
 - 4.16 Feedback
 
 - 
    
    
5. Human Factors
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
6. Privacy & Online Rights
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
7. Malware & Attack Technologies
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
8. Adversarial Behaviour
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
9. Security Operations & Incident Management
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
- 9.1 Fundamental concepts
 - 9.2 Monitor: Data sources
 - 9.3 Analyse: Analysis methods
 - 9.4 Plan: Security Information and Event Management
 - 9.5 Execute: Mitigation and countermeasures
 - 9.6 Knowledge: Intelligence and analytics
 - 9.7 Human Factors: Incident management
 - 9.8 Questions for incident management
 - 9.9 Feedback
 
 - 
    
    
10. Forensics
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
11. Cryptology (theory)
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
12. Operating Systems and Virtualisation
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
- 12.1 Introduction to OS
 - 12.2 Attacker Model
 - 12.3 The role of operating systems and their design in security
 - 12.4 Operating System Security Principles and Models
 - 12.5 Primitives for Isolation and Mediation
 - 12.6 Operating System Hardening
 - 12.7 Operating Systems, Hypervisors-What about related areas?
 - 12.8 Käyttöjärjestelmien yhteenvetokysymykset
 - 12.9 Feedback
 
 - 
    
    
13. Distributed Systems Security
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
14. Formal Methods
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
15. Authentication, Authorisation, Accountability (AAA)
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
16. Software Security
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
17. Web & Mobile Security
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
18. Secure Software Lifecycle
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
19. Applied Cryptography
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
20. Network Security
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
21. Hardware Security
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
22. Cyber-Physical Systems Security
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 - 
    
    
23. Physical Layer Security and Telecommunications
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
- 23.1 Physical Layer Schemes for Confidentiality, Integrity and Access Control 1
 - 23.2 Physical Layer Schemes for Confidentiality, Integrity and Access Control
 - 23.3 Physical-Layer Identification
 - 23.4 Compromising Emanations and Sensor Spoofing
 - 23.5 Physical Layer Security of Selected Communication Technologies
 - 23.6 Questions for physical layer
 - 23.7 Feedback
 
 - 
    
    
24. Feedback
Tuesday, 1 June 2021, 12:00 – Monday, 31 August 2026, 12:00
 
questionnaire
0 / 3140