Siirry suoraan sisältöön

Applied Cybersecurity (5 op)

Toteutuksen tunnus: TX00GL49-3001

Toteutuksen perustiedot


Ilmoittautumisaika
05.05.2025 - 30.07.2025
Ilmoittautuminen toteutukselle on käynnissä.
Ilmoittaudu toteutukselle OMAssa
Ajoitus
04.08.2025 - 15.08.2025
Toteutus ei ole vielä alkanut.
Opintopistemäärä
5 op
Toteutustapa
Lähiopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Leiritie 1
Opetuskielet
englanti
Paikat
0 - 20
Opettajat
ICT Exchange Teacher
Ryhmät
ICTSUMMER
ICT Summer School
Opintojakso
TX00GL49

Toteutuksella on 10 opetustapahtumaa joiden yhteenlaskettu kesto on 37 t 30 min.

Aika Aihe Tila
Ma 04.08.2025 klo 17:00 - 20:45
(3 t 45 min)
Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Ti 05.08.2025 klo 17:00 - 20:45
(3 t 45 min)
Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Ke 06.08.2025 klo 17:00 - 20:45
(3 t 45 min)
Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
To 07.08.2025 klo 17:00 - 20:45
(3 t 45 min)
Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Pe 08.08.2025 klo 17:00 - 20:45
(3 t 45 min)
Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Ma 11.08.2025 klo 17:00 - 20:45
(3 t 45 min)
Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Ti 12.08.2025 klo 17:00 - 20:45
(3 t 45 min)
Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Ke 13.08.2025 klo 17:00 - 20:45
(3 t 45 min)
Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
To 14.08.2025 klo 17:00 - 20:45
(3 t 45 min)
Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Pe 15.08.2025 klo 17:00 - 20:45
(3 t 45 min)
Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Muutokset varauksiin voivat olla mahdollisia.

Tavoitteet

This course will provide an understanding of cybersecurity topics from foundational to intermediate levels. Labs and real-world case studies will reinforce terminology and provoke discussion about professional and ethical issues related to cybersecurity and data governance. Specific topics to be examined include networking protocols, threats, authentication models, cryptography, layer 2 security, application security, social engineering, access control lists, defense in depth, firewalls, risk management, and OS hardening.

Sisältö

• Students will demonstrate knowledge of vulnerabilities, protocols, attacks, and defenses through labs and quizzes.
• Students will demonstrate knowledge of current policy, compliance, and risk management through discussions.
• Students will observe lab walkthroughs for real world exposure to defense against common attacks by securing operating systems and user permissions.

Työmuodot

This class will use a combination of lecture and lab walkthroughs for instruction. The instructor will provide all in class learning materials. Quizzes will be used for assessment at the end of each class. Participation in class discussions and LMS discussion boards will be tracked. A comprehensive final of roughly 70 questions will be given in class on the final day.

Arviointiasteikko

0-5

Arviointikriteerit arvosanalle 1 tyydyttävä

Student's active attendance (6 classes)
Student's active participation in class discussions (6 classes)
Students submission of assignments (6 classes)

Arviointikriteerit arvosanalle 3 hyvä

Student's active attendance (8 classes)
Student's active participation in class discussions (8 classes)
Students submission of assignments (8 classes)

Arviointikriteerit arvosanalle 5 kiitettävä

Student's active attendance (10 classes)
Student's active participation in class discussions (10 classes)
Students submission of assignments (10 classes)

Arviointikriteerit arvosanalle hyväksytty

Student's active attendance (6 classes)
Student's active participation in class discussions (6 classes)
Students submission of assignments (6 classes)

Siirry alkuun