Institute of Computer Science
Courses.cs.ut.ee Institute of Computer Science University of Tartu
  1. Courses
  2. 2025/26 spring
  3. Cyber Security Management (CE) (LTAT.CE.036)
ET
Log in

Cyber Security Management (CE) 2025/26 spring

  • Main
  • Lectures
  • Grading

Lectures

This site presents the schedule and guidance on the lecture material. All the lecture material is available in the course Moodle environment.

  • 13 February:
    • Introduction to Cyber Security Management (recording)
    • Before next lecture, study:
      • Individual preparation before the lecture: Lecture 2: Secure System Modelling
  • 20 February:
    • Secure System Modelling (recording)
    • Assignments:
      • Study the material and do the Test on Secure System Modelling
      • Homework assignment: LA2.4: Application of Modelling Languages; upload your solution as the PDF document
        • Create either the UML class diagram OR the Use Case diagram.
        • If you choose to create the UML class diagram, check the guidelines in A2.1: Application of the UML Class Diagram Modelling Language
        • If you choose to create the Use Case diagram, check the guidelines in LA2.2: Application of the UML Use Case Diagram Modelling Language
    • Individual preparation before the next lecture: Lecture 3: Security Management Standards
      • For reading material R3.2, only slides 1–53 are required; the remaining slides are optional.
  • 27 February:
    • Security Management Standards (recording)
    • Assignments:
      • Study the material and do the Test on Security Management Standards
      • LA3.1: Security Management Standards: Laboratory task 2. "Model the organisation management-related activities when implementing cybersecurity in the organization." is optional.
      • Submit in Moodle by 5 March, 2026
    • Individual preparation before the next lecture:
      • Lecture 4: Domain Model for Security Risk Management AND
      • Lecture 7: Managing Security Countermeasures: Requirements
      • NOTE: use book to access videos
  • 6 March: Domain model for security risk management and security requirements
    • Instructions for challenge-based learning presented (recording)
    • Domain Model for Security Risk Management AND Managing Security Countermeasures: Requirements
    • Assignments:
      • Study the material and do EITHER Lecture 4 Test: Domain Model for Security Risk Management OR Lecture 7 Test: Managing Security Countermeasures: Requirements
      • You can choose the laboratory assignment between EITHER LA4.1: What are the components of Security Risk Management? OR LA7.1: Security Requirements Review
      • Submit in Moodle by 12 March, 2026
    • Individual preparation before the next lecture:
      • Lecture 5: Managing Protected Assets and Security Risks AND
      • Lecture 6: Security Threat Modelling
      • NOTE: use book to access videos
  • 13 March Managing and Modelling Security Risks and Threats
    • Managing Protected Assets and Security Risks AND Security Threat Modelling
    • Assignments:
      • Study the material and do Lecture 6 Test: Security Threat Modelling
      • Homework assignment: LA6.2: Security Risk Modelling. On the scooter example, you can choose which language to use: BPMN, class diagrams or use/misuse cases (submit in Moodle by 26 March, 2026)
    • Individual preparation before the next lecture:
      • Lecture 12: Security Risk Management in Intelligent Infrastructure
    • ONSITE / HYBRID meeting
      • CYBERCHALLENGE: Challenge Solving in Cybersecurity Study Programs - recording
      • Demo lecture of the Cyber Security Management course within the CYBERCHALLENGE program - recording
  • 20 March: no lecture:
    • Challenge-based learning, individual study
  • 27 March:
    • Security Risk Management in Intelligent Infrastructure (recording)
    • Assignments:
      • Study the material and do Lecture 12 Test: Security Risk Management in Intelligent Infrastructure
      • Homework assignment:
        • LA12.1 - Identify system and Business assets and their security criteria.
        • LA12.2 - Following L12.1 - identify 1 (one) security risk
        • LA12.4 - Following L12.2 - identify security requirements to mitigate this risk
        • Submit your solution in Moodle under L12.4 by 9.April, 2026
    • Individual preparation before the next lecture: Lecture 13: Security Risk Management in Blockchain-Based Systems
  • 3 April : no lecture
    • Challenge-based learning, individual study
  • 10 April:
    • Security Risk Management in Blockchain-Based Systems (recording)
    • Assignments:
      • Study the material and do the Lecture 13 Test: Security Risk Management in Blockchain-Based Systems
      • Homework assignment: (L13.5) read the Walmart food supply chain case study and answer the following questions
        • Why does Walmart think a decentralised food supply ecosystem is a good fit to overcome the mentioned food supply chain challenge?
        • Identify which type of blockchain platform is more suitable?
        • Identify the main components of blockchain that are required to implement a decentralised food supply ecosystem.
        • Identify the main characteristics of blockchain that can help overcome the challenge mentioned.
        • Describe what type of security risks can be mitigated using blockchain.
        • Describe what type of security risks can appear in blockchain-based applications.
      • Submit your solution in Moodle under L13.5 by 16.April, 2026
    • Individual preparation before the next lecture: Lecture 15: Security Risk Management in Risk-Aware Forensic-Ready Systems
  • 17 April:
    • Security Risk Management in Risk-Aware Forensic-Ready Systems (recording)
    • Assignments:
      • Study the material and do test Lecture 15: Security Risk Management in Risk-Aware Forensic-Ready Systems
      • Homework assignment: LA15.5: Payment Forensic Readiness
    • Individual preparation before the next lecture: Lecture 9: Penetration Testing

  • 24 April: Penetration Testing
  • 1 May: no lecture:
    • Challenge-based learning, individual study
  • 8 May: Managing Security Countermeasures: Access Control
  • 15 May: Security Risk Management in Business Process-Aware Systems
  • 22 May: Understanding Security Needs and Organisation Security Level
    • Deadline to submit challenge-based learning solutions
  • 29 May: Summary
  • Institute of Computer Science
  • Faculty of Science and Technology
  • University of Tartu
In case of technical problems or questions write to:

Contact the course organizers with the organizational and course content questions.
The proprietary copyrights of educational materials belong to the University of Tartu. The use of educational materials is permitted for the purposes and under the conditions provided for in the copyright law for the free use of a work. When using educational materials, the user is obligated to give credit to the author of the educational materials.
The use of educational materials for other purposes is allowed only with the prior written consent of the University of Tartu.
Terms of use for the Courses environment