Practical Cybersecurity (5 cr)
Code: TX00EX99-3001
General information
- Enrollment
-
06.05.2024 - 20.10.2024
Registration for the implementation has ended.
- Timing
-
21.10.2024 - 15.12.2024
Implementation has ended.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 5 cr
- Mode of delivery
- On-campus
- Unit
- (2019-2024) School of ICT
- Campus
- Karaportti 2
- Teaching languages
- English
- Seats
- 0 - 35
- Degree programmes
- Degree Programme in Information Technology
Implementation has 15 reservations. Total duration of reservations is 50 h 0 min.
Time | Topic | Location |
---|---|---|
Wed 23.10.2024 time 09:00 - 12:00 (3 h 0 min) |
Practical Cybersecurity TX00EX99-3001 |
|
Fri 25.10.2024 time 09:00 - 12:00 (3 h 0 min) |
Practical Cybersecurity TX00EX99-3001 |
|
Wed 30.10.2024 time 09:00 - 12:00 (3 h 0 min) |
Practical Cybersecurity TX00EX99-3001 |
|
Fri 01.11.2024 time 09:00 - 12:00 (3 h 0 min) |
Practical Cybersecurity TX00EX99-3001 |
|
Thu 07.11.2024 time 09:00 - 16:00 (7 h 0 min) |
Practical Cybersecurity TX00EX99-3001 |
|
Wed 13.11.2024 time 09:00 - 12:00 (3 h 0 min) |
Practical Cybersecurity TX00EX99-3001 |
|
Fri 15.11.2024 time 09:00 - 12:00 (3 h 0 min) |
Practical Cybersecurity TX00EX99-3001 |
|
Thu 21.11.2024 time 09:00 - 11:00 (2 h 0 min) |
Practical Cybersecurity TX00EX99-3001 |
|
Wed 27.11.2024 time 09:00 - 12:00 (3 h 0 min) |
Practical Cybersecurity TX00EX99-3001 |
|
Fri 29.11.2024 time 09:00 - 12:00 (3 h 0 min) |
Practical Cybersecurity TX00EX99-3001 |
|
Wed 04.12.2024 time 09:00 - 11:00 (2 h 0 min) |
Practical Cybersecurity TX00EX99-3001 |
KMD550
Oppimistila
|
Thu 05.12.2024 time 09:00 - 16:00 (7 h 0 min) |
Practical Cybersecurity TX00EX99-3001 |
|
Thu 12.12.2024 time 09:00 - 11:30 (2 h 30 min) |
Practical Cybersecurity TX00EX99-3001 |
|
Thu 12.12.2024 time 13:00 - 15:30 (2 h 30 min) |
Practical Cybersecurity TX00EX99-3001 |
|
Fri 13.12.2024 time 09:00 - 12:00 (3 h 0 min) |
Practical Cybersecurity TX00EX99-3001 |
Objective
After completing this course the student
• can analyse the local information systems from the attacker’s and defender's point of views
• knows how to examine information systems to find potential attackers
• knows how to use common tools for gathering information about the target systems.
Content
The course consists of theory studies about basic principles of offensive and defensive cyber security, anatomy of a cyber-attack and overall principles of cyber-attacks. Course covers also usage of common security evaluation and attack tools.
Evaluation scale
0-5
Assessment criteria, satisfactory (1)
The student
• has achieved the objectives of the course
• is able to identify, define and use concepts and models in the subject area of the course
• understands the conditions and principles of the development of expertise.
Assessment criteria, good (3)
The student
• has achieved the objectives of the course well, although there are still areas where knowledge and skills need to be improved
• has a good understanding of the concepts and models of the subject matter of the course and is able to carry out a reasoned analysis
• is able to apply what they have learned in learning and working life situations
• understands the importance of expertise in the ICT field and is able to analyse their own expertise.
Assessment criteria, excellent (5)
The student
• has achieved the objectives of the course with excellent marks
• has an excellent command of the concepts and models of the subject matter of the course
• is able to analyse clearly and reasonably and propose practical development measures
• has a good ability to apply what they have learned in learning and working life situations
• is able to analyse expertise in the ICT field and their own development towards expertise.
Assessment criteria, approved/failed
The student
• has achieved the objectives of the course
• is able to identify, define and use concepts and models in the subject area of the course
• understands the conditions and principles of the development of expertise.