Lectures
This site presents the schedule and guidance on the lecture material. All the lecture material is available in the course Moodle environment.
- 13 February:
- Introduction to Cyber Security Management (recording)
- Before next lecture, study:
- Individual preparation before the lecture: Lecture 2: Secure System Modelling
- 20 February:
- Secure System Modelling (recording)
- Assignments:
- Study the material and do the Test on Secure System Modelling
- Homework assignment: LA2.4: Application of Modelling Languages; upload your solution as the PDF document
- Create either the UML class diagram OR the Use Case diagram.
- If you choose to create the UML class diagram, check the guidelines in A2.1: Application of the UML Class Diagram Modelling Language
- If you choose to create the Use Case diagram, check the guidelines in LA2.2: Application of the UML Use Case Diagram Modelling Language
- Individual preparation before the next lecture: Lecture 3: Security Management Standards
- For reading material R3.2, only slides 1–53 are required; the remaining slides are optional.
- 27 February:
- Security Management Standards (recording)
- Assignments:
- Study the material and do the Test on Security Management Standards
- LA3.1: Security Management Standards: Laboratory task 2. "Model the organisation management-related activities when implementing cybersecurity in the organization." is optional.
- Submit in Moodle by 5 March, 2026
- Individual preparation before the next lecture:
- Lecture 4: Domain Model for Security Risk Management AND
- Lecture 7: Managing Security Countermeasures: Requirements
- NOTE: use book to access videos
- 6 March: Domain model for security risk management and security requirements
- Instructions for challenge-based learning presented (recording)
- Domain Model for Security Risk Management AND Managing Security Countermeasures: Requirements
- Assignments:
- Study the material and do EITHER Lecture 4 Test: Domain Model for Security Risk Management OR Lecture 7 Test: Managing Security Countermeasures: Requirements
- You can choose the laboratory assignment between EITHER LA4.1: What are the components of Security Risk Management? OR LA7.1: Security Requirements Review
- Submit in Moodle by 12 March, 2026
- Individual preparation before the next lecture:
- Lecture 5: Managing Protected Assets and Security Risks AND
- Lecture 6: Security Threat Modelling
- NOTE: use book to access videos
- 13 March -- ONSITE / HYBRID meeting
- REGISTER HERE
- 15:00 - 18:00
- Introduction to the CYBERCHALLENGE project
- Live lecture: Security threat modelling
- 20 March: no lecture:
- Challenge-based learning, individual study
- 27 March: Security Risk Management in Intelligent Infrastructure
- 3 April : no lecture
- Challenge-based learning, individual study
- 10 April: Security Risk Management in Blockchain-Based Systems
- 17 April: Security Risk Management in Risk-Aware Forensic-Ready Systems
- 24 April: Penetration Testing
- 1 May: no lecture:
- Challenge-based learning, individual study
- 8 May: Managing Security Countermeasures: Access Control
- 15 May: Security Risk Management in Business Process-Aware Systems
- 22 May: Understanding Security Needs and Organisation Security Level
- Deadline to submit challenge-based learning solutions
- 29 May: Summary