Skip to main content

Planning of Cyber Security ExerciseLaajuus (5 cr)

Course unit code: TTC7520

General information


Credits
5 cr
Teaching language
Finnish
Responsible person
Jarmo Nevala

Objective

Objective of the course
You have a command of the parts related to the design of cyber security exercise: concepts of the exercise design, implementation and structure of a cyber security exercise.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

Content

The course contains the planning of a cyber security exercise, its implementation and discussion of the exercise based on various roles (organizer, defender, attacker)

Qualifications

Data networks, basics of linux, future factory project

Assessment criteria, satisfactory (1)

Sufficient 1: The student understands something about the theoretical background of a cyber security exercise. The student is able to plan and implement some technical information systems in the cyber security exercise. The student takes part in the planning of the exercise in a group.

Satisfactory 2: The student understands the theoretical background of a cyber security exercise. The student is able to plan and implement the installations of information systems in a cyber security exercise. The student plans in a group a cyber security exercise for an organization.

Assessment criteria, good (3)

Good 3:The student has a versatile understanding of the theoretical background of a cyber security exercise. The student is able to plan and implement the installations of information systems in a cyber security exercise in a versatile way. The student plans in a group a comprehensive cyber security exercise for an organization.

Very good 4: The student has a profound understanding of the theoretical background of a cyber security exercise. The student is able to plan and implement the technical installations of information systems in a cyber security exercise thoroughly. The student plans in a group profoundly a cyber security exercise for an organization.

Assessment criteria, excellent (5)

Excellent 5: The student has an out of the ordinary deep understanding of the theory background of a cyber security exercise. The student is able to plan and implement an out of the ordinary technical installation of the information systems in a cyber security exercise. The student plans in a group a superb cyber security exercise for an organization.

Go back to top of page