Learn security fundamentals to understand current trends. Blockchains, TOR network and video conference encryption all stand on these fundamentals.
- Weekly online video conference classes. Includes discussions and student presentations.
- Homework reported weekly. Reading tasks for theory and learning to follow cybersecurity. Hands-on tasks to connect theory to real life.
- Your own presentation to classmates.
Has reached excellent 4.9 out of 5 feedback.
Check out previous course instance agenda, homework and student feedback https://terokarvinen.com/2023/trust-to-blockchain/
Kari Hiekkanen
Material identified by the teacher during the course. Usually includes white papers, book chapters, tutorials, manuals and hacker conference presentations. Different types of material help you to get familiar with key sources of cyber security information. Most material is available using subsciptions paid by Haaga-Helia (free for students) or free, publicly available sources.
Classes are interactive, and you can hear your classmates work experiences and bring your own insight.
Pasila Campus
No exam.
English
Mixed group with both Finnish and international students.
21.10.2024 - 13.12.2024
- Weekly classes, online video conference - active participation required at class time - Weekly homework (theory + hands on) - Presentation Classes are interactive, encouraging student discussions and presentations. For each week, there is homework with written report. Homeworks have both reading and hands-on computer tasks. Some computer skills required. We'll use actual hacker tools and techniques, but mostly to understand and practice theory. Required tasks in this course require only regular computer knowledge. (This course does not have prerequisisite coding or hacking skills. I am teaching a different set of courses for those needing technical hacking and penetration testing skills: Tunkeutumistestaus ici001as3a, Sovellusten hakkerointi ja haavoittuvuudet ici012as3a-3001)
03.06.2024 - 18.10.2024
Online participation required. This course is based on class discussions and interactivity. You are expected to participate in online video conference during the class times each week.
Agenda will keep updating during the course. Initial agenda:
1. Welcome words. Overview of the course.
2. Fundamentals. Threat model.
3. Treath modeling. Current crime case example.
4. Hashes, passwords and cracking them.
5. Public key encryption and signing.
6. Bitcoin.
7. Modern applications (e.g. Darknet, Altcoins...).
8. Presentations.
Online video conference, active participation required at class time. Homework reported every week.
Tero Karvinen
15 - 30
Homework 50% and presentation 50%. Evaluation is based on totality of the skills and knowledge demonstrated.
Online classes require active participation. No tapes are provided.
BUTEM Degree Programme in Business Technologies, LITEM Degree Programme in Business Technologies
0.00 cr
1.00 cr
H-5