ONLINE: Fully remote, mandatory participation to classes.
Online course, fully remote. Requires active participation to classes in video conference, at the time marked in the timetable.
To participate, you'll need Internet connection, headphones, camera and a computer where you can install Linux on a virtual machine (with instructions). To be able to discuss practical hacking techniques, you must accept course rules.
Articles, videos and book chapters provided by teacher. Software is mostly free open source software used in the industry, with the aim of providing a fully licensed copy to student's use even after the course.
For example
- Schneier 2015: Applied Cryptography
- Hutchins et al 2011: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains (cyber kill chain)
- MITRE: ATT&CK Enterprise Matrix.
- Felten et al 2015: Bitcoin and Cryptocurrency Technologies
- Schneier 1999: Modeling security threats
- Cryptopals
- Karvinen 2022: Cracking Passwords with Hashcat
Please note that this is not a penetration testing course, even if some of the exercises demonstrate simplified versions of the same tools, tactics and procedures. If you want to learn penetration testing, have the time and technical background, consider my non-masters level course "Tunkeutumistestaus" in addition to this course.
Reading list is likely to change during the course. Paid content behind paywalls could be available for free using Haaga-Helia student access.
Many participants are usually already working in the field, which hopefully leads to interesting discussions. No matter if you're a CEO, CIO, helpdesk worker (or not working with IT at all), you're welcome here.
Pasila Campus
No exam.
English
Likely international participation. It's possible to publish homework reports to talk to an international audience. Course material is developed by authors from many countries, and some technical tools are multinational FOSS (Free, open source software) projects.
20.10.2025 - 12.12.2025
- Active participation in the classes, including discussions and technical tasks - Presentation - Homework, including reporting technical tasks - Cross evaluation of reports and giving helpful feedback to fellow students
14.05.2025 - 22.05.2025
As this is an advanced course, the agenda can update during the course.
- Threat modeling
- Overview of current security scene
- Standards and models
- Security maturity
- Business continuity
- Encryption
- Authentication
- Student presentations
Student presentations are best enjoyed & discussed troughout the course - so reserve yours early.
Tero Karvinen
31 - 60
Homework reports, active participation in classes and discussions, cross evaluation, presentations.
LITEM Liiketoiminnan teknologiat -koulutus
0.00 cr
5.00 cr
H-5