Skip to main content

Defensive Cyber Security (5 cr)

Code: TX00CO61-3008

General information


Enrollment
01.01.2020
Registration for the implementation has ended.
Timing
13.03.2023 - 07.05.2023
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
5 cr
Mode of delivery
On-campus
Unit
(2019-2024) School of ICT
Campus
Karaportti 2
Teaching languages
Finnish
Seats
0 - 24
Degree programmes
Professional Specialisation Studies in Cyber Security
Teachers
Jarno Niemelä
Groups
TE7A22S
Kyberturvallisuuden erikoistumiskoulutus
Course
TX00CO61

Implementation has 8 reservations. Total duration of reservations is 28 h 0 min.

Time Topic Location
Wed 15.03.2023 time 17:00 - 20:30
(3 h 30 min)
Puolustava kyberturvallisuus TX00CO61-3008
Etäopetus/Online
Wed 22.03.2023 time 17:00 - 20:30
(3 h 30 min)
Puolustava kyberturvallisuus TX00CO61-3008
Etäopetus/Online
Wed 29.03.2023 time 17:00 - 20:30
(3 h 30 min)
Puolustava kyberturvallisuus TX00CO61-3008
Etäopetus/Online
Wed 05.04.2023 time 17:00 - 20:30
(3 h 30 min)
Puolustava kyberturvallisuus TX00CO61-3008
Etäopetus/Online
Wed 12.04.2023 time 17:00 - 20:30
(3 h 30 min)
Puolustava kyberturvallisuus TX00CO61-3008
Etäopetus/Online
Wed 19.04.2023 time 17:00 - 20:30
(3 h 30 min)
Puolustava kyberturvallisuus TX00CO61-3008
Etäopetus/Online
Wed 26.04.2023 time 17:00 - 20:30
(3 h 30 min)
Puolustava kyberturvallisuus TX00CO61-3008
Etäopetus/Online
Wed 03.05.2023 time 17:00 - 20:30
(3 h 30 min)
Puolustava kyberturvallisuus TX00CO61-3008
Etäopetus/Online
Changes to reservations may be possible.

Objective

After completing this course the learner can implement counter measures against cyber-attacks and harden the information system security. The learner understands how to harden operating systems and principles of application security. The learner knows techniques for protecting industrial internet, intrusion detection and can apply counter measures based on the detected attacks.

Content

The course consists of theory studies about defensive cyber security, anatomy of a cyber-attack and overall principles of industrial internet, intrusion detection and counter measures. Course covers also hardening of information systems, application security and security measures.

Evaluation scale

0-5

Assessment criteria, satisfactory (1)

The student has achieved the course objectives fairly. The student is able to identify, define and use the course subject area’s concepts and models. The student has completed the required learning exercises in minimum required level. His/her competences have developed in a way that he/she may increase his/her knowledge in the given field of technology and finally work in job positions related to this field of technology.

Assessment criteria, good (3)

The student has achieved the course objectives well, even though the knowledge and skills need to be enhanced on some areas. The student has completed the required learning exercises in good or satisfactory level. The student is able to define the course concepts and models and is able to justify the analysis. The student is able to apply the knowledge of the course in study and work situations.

Assessment criteria, excellent (5)

The student has achieved the objectives of the course with excellent marks. The student master commendably the course subject area’s concepts and models. The student has completed the required learning exercises in good or excellent level. The student is able to make justified and fluent analysis and to present concrete development measures. The student is well prepared to apply the knowledge of the course in the study and work situations.

Assessment criteria, approved/failed

The student has achieved the course objectives fairly. The student is able to identify, define and use the course subject area’s concepts and models. The student has completed the required learning exercises in minimum required level. His/her competences have developed in a way that he/she may increase his/her knowledge in the given field of technology and finally work in job positions related to this field of technology.

Go back to top of page