Skip to main content

Incident Management, Response and SOCLaajuus (5 cr)

Course unit code: TTC6060

General information


Credits
5 cr
Teaching language
Finnish
English
Responsible person
Heli Ciszek

Objective

The objective of the course
The student masters the most essential Security Operations Center functionalities such as organizational models, processes and technical environments.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
The student knows how to carry out different functionalities of a SOC: develop technical systems to enhance the detection capabilities of an organization, investigate detected incidents from information systems and work as a part of an organization's processes. The student can effectively work in a SOC and develop his/her work community.

Content

The course contains the concepts of SOC and organizational models. During the course, students design an organizational model for an SOC and technical tools to manage incidents.

Qualifications

Cyber Security

Assessment criteria, satisfactory (1)

Sufficient 1: The student understands some of the theory basis of SOCs. The student is able to design and implement some technical information systems for SOC. The student participates in process design in a group.

Satisfactory 2: The student understands the theory basis of SOCs. The student is able to design and implement the installations of technical information systems for an SOC. The student designs processes for an organization in a group.

Assessment criteria, good (3)

Good 3: The student has a versatile understanding of the theory basis of SOCs. The student is able to versatilely design and implement installations of technical information systems for an SOC. The student designs extensively the processes for an organization in a group.

Very good 4: The student has an in-depth understanding of the theory basis of SOCs. The student is able to thoroughly design and implement installations of technical information systems in a cyber security exercise. The student designs extensively the processes for an organization in a group.

Assessment criteria, excellent (5)

Excellent 5: The student has an out of the ordinary, excellent understanding of the theory basis of SOCs. The student is able to design and implement outstandingly the installations of technical information systems in a cyber security exercise. The student designs superbly the processes for an organization in a group.

Materials

Described in the implementation section.

Go back to top of page