Applied Cybersecurity (5ECTS)
Code: TX00GL49-3001
General information
- Enrollment
- 05.05.2025 - 27.06.2025
- Registration for the implementation has ended.
- Timing
- 04.08.2025 - 15.08.2025
- The implementation has not yet started.
- Number of ECTS credits allocated
- 5 ECTS
- Mode of delivery
- On-campus
- Unit
- School of ICT and Industrial Management
- Campus
- Leiritie 1
- Teaching languages
- English
- Seats
- 0 - 20
- Teachers
- ICT Exchange Teacher
- Course
- TX00GL49
Implementation has 10 reservations. Total duration of reservations is 37 h 30 min.
Time | Topic | Location |
---|---|---|
Mon 04.08.2025 time 17:00 - 20:45 | Applied Cybersecurity TX00GL49-3001 |
MMC310
Oppimistila
|
Tue 05.08.2025 time 17:00 - 20:45 | Applied Cybersecurity TX00GL49-3001 |
MMC310
Oppimistila
|
Wed 06.08.2025 time 17:00 - 20:45 | Applied Cybersecurity TX00GL49-3001 |
MMC310
Oppimistila
|
Thu 07.08.2025 time 17:00 - 20:45 | Applied Cybersecurity TX00GL49-3001 |
MMC310
Oppimistila
|
Fri 08.08.2025 time 17:00 - 20:45 | Applied Cybersecurity TX00GL49-3001 |
MMC310
Oppimistila
|
Mon 11.08.2025 time 17:00 - 20:45 | Applied Cybersecurity TX00GL49-3001 |
MMC310
Oppimistila
|
Tue 12.08.2025 time 17:00 - 20:45 | Applied Cybersecurity TX00GL49-3001 |
MMC310
Oppimistila
|
Wed 13.08.2025 time 17:00 - 20:45 | Applied Cybersecurity TX00GL49-3001 |
MMC310
Oppimistila
|
Thu 14.08.2025 time 17:00 - 20:45 | Applied Cybersecurity TX00GL49-3001 |
MMC310
Oppimistila
|
Fri 15.08.2025 time 17:00 - 20:45 | Applied Cybersecurity TX00GL49-3001 |
MMC310
Oppimistila
|
Learning outcomes
This course will provide an understanding of cybersecurity topics from foundational to intermediate levels. Labs and real-world case studies will reinforce terminology and provoke discussion about professional and ethical issues related to cybersecurity and data governance. Specific topics to be examined include networking protocols, threats, authentication models, cryptography, layer 2 security, application security, social engineering, access control lists, defense in depth, firewalls, risk management, and OS hardening.
Content
• Students will demonstrate knowledge of vulnerabilities, protocols, attacks, and defenses through labs and quizzes.
• Students will demonstrate knowledge of current policy, compliance, and risk management through discussions.
• Students will observe lab walkthroughs for real world exposure to defense against common attacks by securing operating systems and user permissions.
Teaching methods
This class will use a combination of lecture and lab walkthroughs for instruction. The instructor will provide all in class learning materials. Quizzes will be used for assessment at the end of each class. Participation in class discussions and LMS discussion boards will be tracked. A comprehensive final of roughly 70 questions will be given in class on the final day.
Evaluation scale
0-5
Assessment criteria, satisfactory (1)
Student's active attendance (6 classes)
Student's active participation in class discussions (6 classes)
Students submission of assignments (6 classes)
Assessment criteria, good (3)
Student's active attendance (8 classes)
Student's active participation in class discussions (8 classes)
Students submission of assignments (8 classes)
Assessment criteria, excellent (5)
Student's active attendance (10 classes)
Student's active participation in class discussions (10 classes)
Students submission of assignments (10 classes)
Assessment criteria, approved/failed
Student's active attendance (6 classes)
Student's active participation in class discussions (6 classes)
Students submission of assignments (6 classes)