-
Notifications
You must be signed in to change notification settings - Fork 26
/
Copy pathindex.html
408 lines (347 loc) · 21.9 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
<!DOCTYPE html>
<html>
<head>
<title>Cyber Security Base</title>
<link href="https://fonts.googleapis.com/icon?family=Material+Icons" rel="stylesheet">
<link href="https://fonts.googleapis.com/css?family=Press+Start+2P" rel="stylesheet">
<link type="text/css" rel="stylesheet" href="dist/css/styles.min.css" media="screen,projection" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<meta charset="utf-8" />
</head>
<body>
<div class="main-header">
<div class="main-header-background-wrapper">
<div class="main-header-background-wrapper__background"></div>
<div class="main-header-background-wrapper__layer"></div>
<div class="main-header-background-wrapper__fade"></div>
<div class="main-header-title-wrapper">
<div class="main-header-title-wrapper__title">
<h1 class="cyber-text" style="display: flex">
<span class="blue-text"><</span>
<span class="baffled-title">Cyber Security Base</span>
<span class="blue-text">></span>
</h1>
<p>Cyber Security Base with F-Secure is a free course series by
<a href="https://www.helsinki.fi/en" target="_blank">University of Helsinki</a> and <a href="https://mooc.fi">MOOC.fi</a> in collaboration with
<a href="https://www.f-secure.com" target="_blank">F-Secure</a> Cyber Security Academy that focuses on building core knowledge and abilities related to the work
of a cyber security professional.</p>
</div>
</div>
</div>
</div>
<div class="content">
<div class="card course-card">
<div class="card-content">
<div class="card-title">
About the Course Series
</div>
<p>Learn about tools used to analyse flaws in software systems, necessary knowledge to build secure software systems (esp. within Web), the skills needed to perform risk and threat analysis on existing systems and the relevant legislation within EU. By the end of the course, hard working participants are expected to possess the skills required from those who work as Junior Security Consultants in the industry, for example at F-Secure.</p>
<br>
<p>The course series consists of multiple smaller courses, each with a specific theme. Themes include a brief introduction
to cyber security, operational security, web software development, types of vulnerabilities typical of web software,
discovery and mitigation of such vulnerabilities, and advanced topics such as secure software architectures and
cryptography. There will be several case studies as well as projects for participants. At the end of the course
series, we'll also organize a friendly capture-the-flag competition where participants will try to solve some security
puzzles.
</p>
<h5>Work load and prerequisites</h5>
<p>There will be programming assignments, essays, quizzes and puzzles throughout the courses, and completing a specific part of a course means working and completing most if not all of them. We expect that individuals work some 2-10 hours per week on the courses depending on their background. Some programming background and ICT experience is required.</p>
<p>The course has started! <b>You don't need to register to start doing the course. There is an optional registration for those who want ECTS credits that can be done AFTER completing the course.</b> More instructions in the material. So just head to the material and start doing the courses!</p>
<h5>ECTS credits for Finnish residents</h5>
<p>If you reside in Finland, you can get a total of 10 ECTS credits for the course from the <a href="https://www.helsinki.fi/en/open-university" target="_blank" onclick="ga('send', 'event', 'link', 'click', 'oubound-avoin')">Open University of University of Helsinki</a>. Your own school, college or university has the option of accepting these as a part of your studies -- you have to, however, ask your local administration whether they will do so. We are looking into the possibility of offering certificates for completion of the course series to all participants as well.</p>
<br>
<b>Please check out the frequently asked questions at the bottom of this page.</b>
<br>
<br/>
<!-- <p>
<form action="https://mooc.us8.list-manage.com/subscribe/post?u=db82662e446284fd41bd8370e&id=c37b72ffb9" method="post"
id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="validate" target="_blank" novalidate="">
<p>Leave us your email and we will send you updates about Cyber Security Base with F‑Secure.</p>
<br/>
<p style="display:flex">
<input class="action" style="text-transform:none; width: 100%" type="text" name="EMAIL" id="EMAIL" placeholder="[email protected]">
<input class="btn disabled action primary" type="submi>
</p>
</form>
<p></p> -->
</div>
</div>
</div>
<div class="content">
<h3 class="course-category-title">Courses</h3>
<div class="course-list">
<div class="card course-card">
<div class="card-content">
<div class="card-title">
Introduction to Cyber Security
<span class="label">1 Cr. (ECTS)</span>
</div>
<p>
<p class="muted-text">
<i class="material-icons">date_range</i> 28.10.2019 - 18.11.2019
</p>
<br/> This part of the course series will introduce the participant to the relevant issues in cyber security. These
issues include the stakeholders' and users' ability to disrupt the functionality of a system; corporate
responsibilities and liabilities; and the never-ending software crisis that is related to the increasing amount
of software and maintenance.
</p>
</div>
<div class="card-action clearfix">
<a class="waves-effect waves-light btn disabled right" target="_blank">
Course materials
<i class="material-icons right">arrow_forward</i>
</a>
</div>
</div>
<div class="card course-card">
<div class="card-content">
<div class="card-title">
Securing Software
<span class="label">3 Cr. (ECTS)</span>
</div>
<p>
<p class="muted-text">
<i class="material-icons">date_range</i> 04.11.2019 - 23.12.2019
</p>
<br/> This part focuses on security issues related to interconnected software. The participant will learn the principles
of developing web applications, typical security issues that are related to such applications, and how such issues
are discovered and mitigated.
</p>
</div>
<div class="card-action clearfix">
<a class="waves-effect waves-light btn disabled right" target="_blank">
COURSE MATERIALS
<i class="material-icons right">arrow_forward</i>
</a>
</div>
</div>
<div class="card course-card">
<div class="card-content">
<div class="card-title">
Course Project I
<span class="label">1 Cr. (ECTS)</span>
</div>
<p>
<p class="muted-text">
<i class="material-icons">date_range</i> 9.12.2019 - 30.12.2019
</p>
<br/> In the first project, the participants will construct software with security flaws, point out the flaws in the
project, and provide the steps to fix them.
</p>
</div>
<div class="card-action clearfix">
<a class="waves-effect waves-light btn disabled right" target="_bank">
Course Materials
<i class="material-icons right">arrow_forward</i>
</a>
</div>
</div>
<div class="card course-card">
<div class="card-content">
<div class="card-title">
Advanced Topics
<span class="label">3 Cr. (ECTS)</span>
</div>
<p>
<p class="muted-text">
<i class="material-icons">date_range</i> 13.1.2020 - 22.2.2020
</p>
<br/> This part focuses on security in networks, including internet security issues, issues in 4G networks as well
as the issues and remedies planned for the upcoming 5G network. This includes also relevant cryptography topics.
Architectural analysis of existing (software) systems will be also visited, and selected methods for log mining
for the purposes of identifying and tackling attacks will be studied.
</p>
</div>
<div class="card-action clearfix">
<a class="waves-effect waves-light btn disabled right" target="_blank">
Course materials
<i class="material-icons right">arrow_forward</i>
</a>
</div>
</div>
<div class="card course-card">
<div class="card-content">
<div class="card-title">
Course Project II
<span class="label">1 Cr. (ECTS)</span>
</div>
<p>
<p class="muted-text">
<i class="material-icons">date_range</i> 24.2.2020 - 9.3.2020
</p>
<br/> In the second project, the participants will install an operating system with a variety of vulnerabilities and
then install a network intrusion prevention system into it. Subsequently, the participants will familiarize themselves
with penetration testing software, and attack the system they installed.
</p>
</div>
<div class="card-action clearfix">
<a class="waves-effect waves-light btn disabled right" target="_blank">
Course Materials
<i class="material-icons right">arrow_forward</i>
</a>
</div>
</div>
<div class="card course-card">
<div class="card-content">
<div class="card-title">
Capture The Flag
<span class="label">1 Cr. (ECTS)</span>
</div>
<p>
<p class="muted-text">
<i class="material-icons">date_range</i> 9.3.2020 - 16.3.2020
</p>
<br/> A Capture the Flag (CTF) competition will be organized at the end of the course series. In the competition,
participants will be given a variety of tasks that are related to the topics of the course series. Participants
will gain points for every solved task. The amount of points depends on the complexity of the task as well as
the amount of time that the spent on the task.
</p>
</div>
<div class="card-action clearfix">
<a class="waves-effect waves-light btn disabled right" target>
COURSE MATERIALS
<i class="material-icons right">arrow_forward</i>
</a>
</div>
</div>
</div>
</div>
<div class="content">
<div class="card course-card">
<div class="card-content">
<div class="card-title">
Frequently asked questions
</div>
<br>
<b>Q: MOOC?</b>
<br>
A: Massive Open Online Courses (MOOCs) are as the name says they open, free, and online. You do not have to care about course fees, not on this MOOC anyway. You do not have to care about commute as you can do it where you are as long as you have Internet connectivity. You do not have to care about schedules, well you have a start and end dates but between them it is upto you when you do the tasks.
<br><br>
<b>Q: Is the course series free?</b>
<br>
A: Yes.
<br><br>
<b>Q: How many students can attend? </b>
<br>
A: There is no limit how many students can take part.
<br><br>
<b>Q: How many hours of work should I be prepared to put in?</b>
<br>
A: This will vary from person to person. But students should expect to spend 2-10 hours per week on the course.
<br><br>
<b>Q: Are there any prerequisites for registering?</b>
<br>
A: No, there are no formal requirements. But a basic understanding of coding, networks, and cyber security are needed to follow some of the course material. You are of course welcome to register without this background knowledge, but you’ll need to put in extra time learning these things if you want to complete all parts of the course.
<br><br>
<b>Q: I want to learn more about cyber security, but I’m not looking to become a cyber security specialist. Will parts of the course still be useful for me?</b>
<br>
A: Yes! Thanks to digitalization, cyber security is an issue that cuts across different industries and professions, so the knowledge and skills people learn in the course can be applied in a wide variety of careers.
<br><br>
<b>Q: What’s a good language to learn if I don’t have any coding experience?</b>
<br>
A: The course does not require knowledge of one specific language. The materials use Java for examples, but students are free to use whatever language they want to complete assignments.
Generally, Java and Python are both easy for beginners to learn, and fairly common. On the other hand, C/C++ can teach you more about how computers actually work, which can be useful for certain types of programming.
So if you’re learning from scratch, you should consider what kind of work you want to do after the course ends. You can check out this handy infographic for some insight into what different languages are used for by professionals.
<br><br>
<b>Q: Can I earn credits toward university degrees?</b>
<br>
A: Students at Finnish universities can receive up to 10 ECTS credits if they complete all parts of the course. These credits can be transferred to schools outside of Finland (students have done so in the past), but this requires a little bit of additional paperwork and approval by the recipient school.
<br><br>
<b>Q: What kind of topics does the MOOC cover?</b>
<br>
A: The MOOC addresses a range of topics that people need to know about to work in cyber security. These topics include: introductions to cyber security and operational security, web software development, types of vulnerabilities that are typical to web software, how such vulnerabilities are discovered and then mitigated, advanced topics such as secure software architectures and cryptography.
<br><br>
<b>Q: What do I learn on this course?</b>
<br>
A: As in any MOOC, we acknowledged that learner autonomy is a major factor. Students
effectively learn what they wish to learn, as they typically are not bound to the course
through any official mechanism. The course consists of six parts described below:<br><br>
Introduction (1 ECTS): Introduces the participant to the relevant issues in cyber security. These issues include the stakeholders' and users' ability to disrupt the functionality of a system; corporate responsibilities and liabilities; and the never-ending software crisis that is related to the increasing amount of software and maintenance.
Securing Software (3 ECTS): Focuses on security issues related to interconnected software. The participant will learn the principles of developing web applications, typical security issues that are related to such applications, and how such issues are discovered and mitigated.
Course Project I (1 ECTS): Participants will construct software with security flaws, point out the flaws in the project, and provide the steps to fix them.<br><br>
Advanced Topics (3 ECTS): Focuses on security in networks, including internet security issues, issues in 4G networks as well as the issues and remedies planned for the upcoming 5G network. This includes also relevant cryptography topics. Architectural analysis of existing (software) systems will be also visited, and selected methods for log mining for the purposes of identifying and tackling attacks will be studied.<br><br>
Course Project II (1 ECTS): Participants will install an operating system with a variety of vulnerabilities and then install a network intrusion prevention system into it. Subsequently, the participants will familiarize themselves with penetration testing software, and attack the system they installed.<br><br>
Capture The Flag (1 ECTS): A Capture the Flag (CTF) competition will be organized at the end of the course series. In the competition, participants will be given a variety of tasks that are related to the topics of the course series. Participants will gain points for every solved task. The amount of points depends on the complexity of the task as well as the amount of time that the spent on the task.
<br><br>
<b>Q: Grading?</b>
<br>
A: The grading is passed or not. We will provide an option to see your grading once it's ready.
<br><br>
<b>Q: Why isn’t the course graded yet?</b>
<br>
A: We have a lot of students and grading takes time. Please be patient! To make things easier and faster use your real name, email, and student number when registering to TMC.
<br><br>
<b>Q: What kind of assignments does the course include?</b>
<br>
A: Readings, essays, quizzes, and puzzles are used in different modules. Some modules include projects and programming assignments for students to work on. There will also be a competition where students find and fix vulnerabilities within an allotted amount of time.
<br><br>
<b>Q: What does it take to get passed?</b>
<br>
A: It depends on the course part. The criteria can be like the following: "In order to pass the course one had to pass both of the essays and 2/3 of the reviews. Some essays were rejected for being too short, for not containing deep enough discussion or for being flagged too many times as spam during the peer review."
<br><br>
<b>Q: How do I show someone I have passed a course part?</b>
<br>
A: You get an online certificate (you can print it if you like).
<br><br>
<b>Q: Where do I get the certificate?</b>
<br>
A: The grading and certificates for all the parts of the course will be available at https://cyber-points.mooc.fi/
<br><br>
<b>Q: How do I get the ECTS?</b>
<br>
A: We are working in cooperation with the Open University of Helsinki (OUH) and they will register the ECTS. Once a course part is finished and the list of students entitled to ECTS and their information is passed to the OUH. Email is sent to the email addresses used on the course with detailed instructions. So if you used an email address created just for this course, please, check it's inbox and use it as your communication mail.
<br><br>
<b>Q: How soon should I ask the registration of the ECTS to WebOodi?</b>
<br>
A: As soon as the Open University of Helsinki (OUH) contacts you you will have six (6) weeks time to aks the registration of the ECTS to WebOodi. After that we will not register them. You will still get the certificate.
<br><br>
<b>Q: Can I get the ECTS registered in my home university if I do not study in Finland?</b>
<br>
A: It is possible and it has been done. Sometimes extra paper work is needed. It really depends on the University in question. We suggest discussing with your local study counselor beforehand.
<br><br>
<b>Q: Can I get an extension to the deadlines or can I get some extra work to make up the lack of doing the tasks on time?</b>
<br>
A: This pops up regularly and the answer is no. No extensions, No extra work.
<br><br>
<b>Q: Is it possible for me to catch up if I join the course after it begins or miss part of it?</b>
<br>
A: Yes. The course consists of different modules, and they can be taken independently. So if you miss one module or don’t finish it for some reason, you can still take the others. _But do remember that If you study at University of Helsinki CS department and need the TKT20009 or CSM13204 course you need to complete the modules within a year otherwise the modules are not accepted as parts of that course (but you still get to keep the ECTS).
<br><br>
<b>Q: Is there going to be a CTF again?</b>
<br>
A: Yes. There will be a CTF with new puzzles.
</div>
</div>
</div>
</div>
<br>
<br>
<p style="text-align: center">This content is licenced under a
<a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/4.0/">Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License</a>.</p>
</div>
<script type="text/javascript" src="dist/js/scripts.min.js"></script>
<script>
(function (i, s, o, g, r, a, m) {
i['GoogleAnalyticsObject'] = r; i[r] = i[r] || function () {
(i[r].q = i[r].q || []).push(arguments)
}, i[r].l = 1 * new Date(); a = s.createElement(o),
m = s.getElementsByTagName(o)[0]; a.async = 1; a.src = g; m.parentNode.insertBefore(a, m)
})(window, document, 'script', 'https://www.google-analytics.com/analytics.js', 'ga');
ga('create', 'UA-86250620-1', 'auto');
ga('set', 'anonymizeIp', true);
ga('require', 'linkid');
ga('send', 'pageview');
var trackOutbound = function (url) {
ga('send', 'event', 'outbound', 'click', url, {
'transport': 'beacon',
'hitCallback': function () { window.open(url); }
});
}
</script>
<!-- COOKIES -->
<link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.0.1/cookieconsent.min.css"
/>
<script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.0.1/cookieconsent.min.js"></script>
<script>window.cookieconsent.initialise({ "palette": { "popup": { "background": "#000" }, "button": { "background": "#f1d600" } } });</script>
</body>
</html>