Skip to main content

Applied Cybersecurity (5ECTS)

Code: TX00GL49-3001

General information


Enrollment
05.05.2025 - 27.06.2025
Registration for the implementation has ended.
Timing
04.08.2025 - 15.08.2025
The implementation has not yet started.
Number of ECTS credits allocated
5 ECTS
Mode of delivery
On-campus
Unit
School of ICT and Industrial Management
Campus
Leiritie 1
Teaching languages
English
Seats
0 - 20

Implementation has 10 reservations. Total duration of reservations is 37 h 30 min.

Time Topic Location
Mon 04.08.2025 time 17:00 - 20:45 Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Tue 05.08.2025 time 17:00 - 20:45 Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Wed 06.08.2025 time 17:00 - 20:45 Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Thu 07.08.2025 time 17:00 - 20:45 Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Fri 08.08.2025 time 17:00 - 20:45 Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Mon 11.08.2025 time 17:00 - 20:45 Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Tue 12.08.2025 time 17:00 - 20:45 Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Wed 13.08.2025 time 17:00 - 20:45 Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Thu 14.08.2025 time 17:00 - 20:45 Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Fri 15.08.2025 time 17:00 - 20:45 Applied Cybersecurity TX00GL49-3001
MMC310 Oppimistila
Changes to reservations may be possible.

Learning outcomes

This course will provide an understanding of cybersecurity topics from foundational to intermediate levels. Labs and real-world case studies will reinforce terminology and provoke discussion about professional and ethical issues related to cybersecurity and data governance. Specific topics to be examined include networking protocols, threats, authentication models, cryptography, layer 2 security, application security, social engineering, access control lists, defense in depth, firewalls, risk management, and OS hardening.

Content

• Students will demonstrate knowledge of vulnerabilities, protocols, attacks, and defenses through labs and quizzes.
• Students will demonstrate knowledge of current policy, compliance, and risk management through discussions.
• Students will observe lab walkthroughs for real world exposure to defense against common attacks by securing operating systems and user permissions.

Teaching methods

This class will use a combination of lecture and lab walkthroughs for instruction. The instructor will provide all in class learning materials. Quizzes will be used for assessment at the end of each class. Participation in class discussions and LMS discussion boards will be tracked. A comprehensive final of roughly 70 questions will be given in class on the final day.

Evaluation scale

0-5

Assessment criteria, satisfactory (1)

Student's active attendance (6 classes)
Student's active participation in class discussions (6 classes)
Students submission of assignments (6 classes)

Assessment criteria, good (3)

Student's active attendance (8 classes)
Student's active participation in class discussions (8 classes)
Students submission of assignments (8 classes)

Assessment criteria, excellent (5)

Student's active attendance (10 classes)
Student's active participation in class discussions (10 classes)
Students submission of assignments (10 classes)

Assessment criteria, approved/failed

Student's active attendance (6 classes)
Student's active participation in class discussions (6 classes)
Students submission of assignments (6 classes)

Go back to top of page