Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Cyber Security Base 2022

University of Helsinki via Independent

Overview

About the Course Series

Cyber Security Base is a free course series by University of Helsinki and MOOC.fi in collaboration with F-Secure that focuses on building core knowledge and abilities related to the work of a cyber security professional.

Learn about tools used to analyse flaws in software systems, necessary knowledge to build secure software systems (esp. within Web), the skills needed to perform risk and threat analysis on existing systems and the relevant legislation within EU.

The course series consists of 6 smaller courses, each with a specific theme. Themes include a brief introduction to cyber security, operational security, web software development, types of vulnerabilities typical of web software, discovery and mitigation of such vulnerabilities, and advanced topics such as secure software architectures and cryptography. There will be several case studies as well as projects for participants. At the end of the course series, we'll also organize a friendly capture-the-flag competition where participants will try to solve some security puzzles.

Each course is open for a certain period of time, and must be completed during that window.

Work load and prerequisites

There will be programming assignments, essays, quizzes and puzzles throughout the courses, and completing a specific part of a course means working and completing most if not all of them. See course descriptions for estimated required hours. Some programming background and ICT experience is required.

The course has started! You don't need to register to start doing the course. There is an optional registration for those who want ECTS credits that can be done AFTER completing the course. More instructions in the material. So just head to the material and start doing the courses!

Syllabus

Introduction to Cyber Security

Part I

In this part:

1. Introduction

2. Cyber security in the real world

3. Identifying threats

4. From Brain to Stuxnet: selected history of malware

5. How does the internet work

6. Encrypt, decrypt

Securing Software

Part I

In this part:

1. Ports and Applications

2. Web Servers and Web Applications

Part II

In this part:

1. Web Applications continued...

2. The Data has Value -- Let's store it!

3. The HTTP protocol

Part III

In this part:

1. Most Common Security Vulnerabilities

Part IV

In this part:

1. Finding defects

Part V

In this part:

1. Making Mistakes is (not) Harder with Modern Frameworks

Part VI

In this part:

1. Threat Analysis

Project I

Part I

In the first project, the participants will construct software with security flaws, point out the flaws in the project, and provide the steps to fix them.

Advanced Topics

Part I

In this part:

1. Categorizing and prioritizing threats

Part II

In this part:

1. Your system is the target

Part III

In this part:

1. Cryptography

2. Cryptanalysis

3. Public-key cryptography

4. Certificates

Part IV

In this part:

1. Cellular security

Part V

In this part:

1. Internet of Things

Project II

Part I

In the second project, the participants will install an operating system with a variety of vulnerabilities and then install a network intrusion prevention system into it. Subsequently, the participants will familiarize themselves with penetration testing software, and attack the system they installed.

CTF

Part I

The goal of the capture the flag (CTF) is to solve some simple problems related to the material you've studied so far. The challenges range from finding hidden messages, to encrypting and decrypting messages, and analyzing webpages and executables.

Reviews

Start your review of Cyber Security Base 2022

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.