ICT Security Basics - from Trust to Blockchain - ict4hm003 3001 2020 Spring

Learn security fundamentals to understand current trends.

Blockchains, TOR network and video conference encryption all stand on these fundamentals.

Online course - I (Tero) will give and evaluate all my courses completely online during 2020 Spring.

Moodle (requires Haaga-Helia account)

Learning goals

In this course, you will

In detail, you'll

This course gives you grand overview of security principles and practice with tools implementing these principles. Even though you're expected to be able to install and configure programs and troubleshoot some errors, this is not my most technical course. If you want a demanding, hands on technical course with exploitation practice, pick Tunkeutumistaus (Penetration Testing ict4tn027-3003) in addition to this.


This initial timetable will change during the course.

  1. w14 Mon 2020-03-30 Organizing, overivew of the course. Fundamentals. CIA triad. Adversarial situation. Business view. Attack tree. Attacker view and pentest. The most common ways to attack companies (spear phising, OWASP 10...).
  2. w15 Mon 2020-04-06 17:40-20:30 Niko Marjomaa, Accenture - Leading security. (Easter w16 Mon 2020-04-13)
  3. w17 Mon 2020-04-20 Low hanging fruit for the defender. Low hanging fruit for the attacker.
  4. w18 Mon 2020-04-27 Encryption. CIA in encryption. Symmetric and asymmetric encryption. Hashing. Two way authentication. Measurment. Breaking encryptions.
  5. w19 Mon 2020-05-04 Practical encryption technieques. PGP for email encryption. Public key infrastructure. Centralized and distributed trust (e.g. TLS vs PGP).
  6. w20 Mon 2020-05-11 New applications for encryption. Anonymous (pseudonymous?) networks: TOR. Virtual private networks and SSH tunneling. Distributed file sharing (e.g. syncthing). Blockchain and cryptocurrencies.
  7. w21 Mon 2020-05-18 Presentations.


Homeworks 50% and presentations 50%. Evaluation is based on totality of the skills and knowledge demonstrated.