Skip to main content

Attacks, Defence and ProtectionLaajuus (5 cr)

Code: TTC6040

Credits

5 op

Teaching language

  • Finnish
  • English

Responsible person

  • Jarmo Nevala

Objective

The objective of the course
You learn the principles of attacks and defence methods as well as protection.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

Content

- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics

Assessment criteria, satisfactory (1)

Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.

Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.

Assessment criteria, good (3)

Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.

Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.

Assessment criteria, excellent (5)

Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • English
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Pasi Hyytiäinen
Groups
  • TTV22S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S2
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S3
    Tieto- ja viestintätekniikka (AMK)
  • TIC22S1
    Bachelor's Degree Programme in Information and Communications Technology
  • TTV22S1
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S4
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM2
    Tieto- ja viestintätekniikka (AMK)

Objectives

The objective of the course
You learn the principles of attacks and defence methods as well as protection.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

Content

- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- independent study
- distance learning
- webinars
- exercises
- learning tasks

Practical training and working life connections

-

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.

Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.

Evaluation criteria, good (3-4)

Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.

Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.

Evaluation criteria, excellent (5)

Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.

Enrollment

01.08.2024 - 22.08.2024

Timing

26.08.2024 - 18.12.2024

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Pasi Hyytiäinen
Groups
  • TTV22S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S2
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S3
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S1
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S4
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM2
    Tieto- ja viestintätekniikka (AMK)
  • ZJA24STIKY1
    Avoin amk, Kyberturvallisuus 1, Verkko

Objectives

The objective of the course
You learn the principles of attacks and defence methods as well as protection.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

Content

- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- independent study
- distance learning
- webinars
- exercises
- learning tasks

Practical training and working life connections

-

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.

Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.

Evaluation criteria, good (3-4)

Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.

Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.

Evaluation criteria, excellent (5)

Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.

Enrollment

20.11.2023 - 04.01.2024

Timing

08.01.2024 - 29.03.2024

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Teaching languages
  • Finnish
Seats

0 - 30

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Pasi Hyytiäinen
Groups
  • TTV21S3
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV21SM
    Tieto- ja viestintätekniikka (AMK)
  • ZJA24KTIKY1
    Avoin amk, Kyberturvallisuus 1, Verkko
  • TTV21S2
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S1
    Tieto- ja viestintätekniikka (AMK)

Objectives

The objective of the course
You learn the principles of attacks and defence methods as well as protection.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

Content

- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- independent study
- distance learning
- webinars
- exercises
- learning tasks

Practical training and working life connections

-

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.

Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.

Evaluation criteria, good (3-4)

Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.

Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.

Evaluation criteria, excellent (5)

Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.

Enrollment

01.08.2023 - 24.08.2023

Timing

28.08.2023 - 19.12.2023

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Teaching languages
  • Finnish
Seats

0 - 30

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Pasi Hyytiäinen
Groups
  • TTV21S3
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV21SM
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S2
    Tieto- ja viestintätekniikka (AMK)
  • ZJA23STIKY1
    Avoin amk, Kyberturvallisuus 1, Verkko
  • TTV21S1
    Tieto- ja viestintätekniikka (AMK)

Objectives

The objective of the course
You learn the principles of attacks and defence methods as well as protection.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

Content

- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- independent study
- distance learning
- webinars
- exercises
- learning tasks

Practical training and working life connections

-

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.

Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.

Evaluation criteria, good (3-4)

Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.

Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.

Evaluation criteria, excellent (5)

Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.

Enrollment

01.11.2022 - 05.01.2023

Timing

09.01.2023 - 28.04.2023

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 30

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
Groups
  • ZJA23KTIKY1
    Avoin amk, Kyberturvallisuus 1, Verkko

Objectives

The objective of the course
You learn the principles of attacks and defence methods as well as protection.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

Content

- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- independent study
- distance learning
- webinars
- exercises
- learning tasks

Practical training and working life connections

-

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.

Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.

Evaluation criteria, good (3-4)

Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.

Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.

Evaluation criteria, excellent (5)

Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.

Enrollment

01.08.2022 - 25.08.2022

Timing

29.08.2022 - 16.12.2022

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 30

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
Groups
  • ZJA22STIKY1
    Avoin amk, Kyberturvallisuus 1, Verkko

Objectives

The objective of the course
You learn the principles of attacks and defence methods as well as protection.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

Content

- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- independent study
- distance learning
- webinars
- exercises
- learning tasks

Practical training and working life connections

-

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.

Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.

Evaluation criteria, good (3-4)

Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.

Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.

Evaluation criteria, excellent (5)

Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.

Timing

01.01.2022 - 22.05.2022

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
Groups
  • ZJA21STIKY
    Avoin AMK, tekniikka, ICT, Kyberturvallisuus
  • ZJA22KTIKY1
    Avoin AMK, tekniikka, ICT, Kyberturvallisuus 1

Objectives

The objective of the course
You learn the principles of attacks and defence methods as well as protection.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

Content

- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Further information for students

Online course

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.

Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.

Evaluation criteria, good (3-4)

Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.

Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.

Evaluation criteria, excellent (5)

Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.