Skip to main content

Threat Detection and ResponseLaajuus (5 cr)

Code: TTC7020

Credits

5 op

Teaching language

  • Finnish

Responsible person

  • Joni Gadd
  • Marko Vatanen
  • Jarmo Viinikanoja

Objective

The student understands the tools needed for detecting cyber attacks as well as the significance of attack analysis and response action. The student masters live forensics techniques in the course.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice

Content

- Threat detection methods and targets
- Response processes and tools
- Live forensics methods and technologies

Assessment criteria, satisfactory (1)

Sufficient 1: The student knows superficially the processes related to threat detection and response activities. The student is able to choose the most common methods for the problem to be solved and apply them. Additionally, the student is able to assess their implementation and justify the conclusions.

Satisfactory 2: The student knows the processes and technologies related to threat detection and response activities. The student is able to choose the most common methods for the problem to be solved and apply them to practice. Additionally, the student is able to assess their implementation superficially and justify the conclusions.

Assessment criteria, good (3)

Good 3: The student knows the processes and technologies related to threat detection and response activities as well as the live forensics tools. The student is able to choose the most common methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation in a versatile manner and justify the conclusions.

Very good 4: The student knows the processes and technologies related to threat detection and response activities as well as the live forensics tools. The student is able to choose the correct methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation in a versatile manner and justify the conclusions.

Assessment criteria, excellent (5)

Excellent 5: The student has an in-depth knowledge of the processes and technologies related to threat detection and response activities as well as the live forensics tools. The student is able to choose the correct methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation critically and justify the conclusions.