Cyber Security Base
Offered By: University of Helsinki via Independent
Course Description
Overview
About the Course Series
Cyber Security Base is a free course series by University of Helsinki and MOOC.fi in collaboration with F-Secure that focuses on building core knowledge and abilities related to the work of a cyber security professional.Learn about tools used to analyse flaws in software systems, necessary knowledge to build secure software systems (esp. within Web), the skills needed to perform risk and threat analysis on existing systems and the relevant legislation within EU.The course series consists of 6 smaller courses, each with a specific theme. Themes include a brief introduction to cyber security, operational security, web software development, types of vulnerabilities typical of web software, discovery and mitigation of such vulnerabilities, and advanced topics such as secure software architectures and cryptography. There will be several case studies as well as projects for participants. At the end of the course series, we'll also organize a friendly capture-the-flag competition where participants will try to solve some security puzzles.Each course is open for a certain period of time, and must be completed during that window.
Work load and prerequisites
There will be programming assignments, essays, quizzes and puzzles throughout the courses, and completing a specific part of a course means working and completing most if not all of them. See course descriptions for estimated required hours. Some programming background and ICT experience is required.The course has started! You don't need to register to start doing the course. There is an optional registration for those who want ECTS credits that can be done AFTER completing the course. More instructions in the material. So just head to the material and start doing the courses!
Cyber Security Base is a free course series by University of Helsinki and MOOC.fi in collaboration with F-Secure that focuses on building core knowledge and abilities related to the work of a cyber security professional.Learn about tools used to analyse flaws in software systems, necessary knowledge to build secure software systems (esp. within Web), the skills needed to perform risk and threat analysis on existing systems and the relevant legislation within EU.The course series consists of 6 smaller courses, each with a specific theme. Themes include a brief introduction to cyber security, operational security, web software development, types of vulnerabilities typical of web software, discovery and mitigation of such vulnerabilities, and advanced topics such as secure software architectures and cryptography. There will be several case studies as well as projects for participants. At the end of the course series, we'll also organize a friendly capture-the-flag competition where participants will try to solve some security puzzles.Each course is open for a certain period of time, and must be completed during that window.
Work load and prerequisites
There will be programming assignments, essays, quizzes and puzzles throughout the courses, and completing a specific part of a course means working and completing most if not all of them. See course descriptions for estimated required hours. Some programming background and ICT experience is required.The course has started! You don't need to register to start doing the course. There is an optional registration for those who want ECTS credits that can be done AFTER completing the course. More instructions in the material. So just head to the material and start doing the courses!
Syllabus
Introduction to Cyber Security
Part IIn this part:1. Introduction2. Cyber security in the real world3. Identifying threats4. From Brain to Stuxnet: selected history of malware5. How does the internet work6. Encrypt, decrypt
Securing Software
Part IIn this part:1. Ports and Applications2. Web Servers and Web Applications
Part IIIn this part:1. Web Applications continued...2. The Data has Value -- Let's store it!3. The HTTP protocol
Part IIIIn this part:1. Most Common Security Vulnerabilities
Part IVIn this part:1. Finding defects
Part VIn this part:1. Making Mistakes is (not) Harder with Modern Frameworks
Part VIIn this part:1. Threat Analysis
Project I
Part IIn the first project, the participants will construct software with security flaws, point out the flaws in the project, and provide the steps to fix them.
Advanced Topics
Part IIn this part:1. Categorizing and prioritizing threats
Part IIIn this part:1. Your system is the target
Part IIIIn this part:1. Cryptography2. Cryptanalysis3. Public-key cryptography4. Certificates
Part IVIn this part:1. Cellular security
Part VIn this part:1. Internet of Things
Project II
Part IIn the second project, the participants will install an operating system with a variety of vulnerabilities and then install a network intrusion prevention system into it. Subsequently, the participants will familiarize themselves with penetration testing software, and attack the system they installed.
CTF
Part IThe goal of the capture the flag (CTF) is to solve some simple problems related to the material you've studied so far. The challenges range from finding hidden messages, to encrypting and decrypting messages, and analyzing webpages and executables.
Part IIn this part:1. Introduction2. Cyber security in the real world3. Identifying threats4. From Brain to Stuxnet: selected history of malware5. How does the internet work6. Encrypt, decrypt
Securing Software
Part IIn this part:1. Ports and Applications2. Web Servers and Web Applications
Part IIIn this part:1. Web Applications continued...2. The Data has Value -- Let's store it!3. The HTTP protocol
Part IIIIn this part:1. Most Common Security Vulnerabilities
Part IVIn this part:1. Finding defects
Part VIn this part:1. Making Mistakes is (not) Harder with Modern Frameworks
Part VIIn this part:1. Threat Analysis
Project I
Part IIn the first project, the participants will construct software with security flaws, point out the flaws in the project, and provide the steps to fix them.
Advanced Topics
Part IIn this part:1. Categorizing and prioritizing threats
Part IIIn this part:1. Your system is the target
Part IIIIn this part:1. Cryptography2. Cryptanalysis3. Public-key cryptography4. Certificates
Part IVIn this part:1. Cellular security
Part VIn this part:1. Internet of Things
Project II
Part IIn the second project, the participants will install an operating system with a variety of vulnerabilities and then install a network intrusion prevention system into it. Subsequently, the participants will familiarize themselves with penetration testing software, and attack the system they installed.
CTF
Part IThe goal of the capture the flag (CTF) is to solve some simple problems related to the material you've studied so far. The challenges range from finding hidden messages, to encrypting and decrypting messages, and analyzing webpages and executables.
Tags
Related Courses
Analysing ComplexityMacquarie University via Coursera Probability Fundamentals
Brilliant Business Analytics for Decision Making
University of Colorado Boulder via Coursera 의사 결정을 위한 비즈니스 분석
University of Colorado Boulder via Coursera Certified Blockchain Security Professional (CBSP) Exam Prep
SkillUp EdTech via Coursera