Skip to main content

Basics of Cyber Security ExercisesLaajuus (5 cr)

Code: TTC7510

Credits

5 op

Teaching language

  • Finnish

Responsible person

  • Karo Saharinen

Objective

The objective of the course
You master the central parts of planning and preparing a cyber security exercise: terminology, used exercise models and usual structural things related to cyber exercises.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
You know how to design a cyber security exercise and can plan an exercise for a company’s personnel.

Content

The course contains the concepts of cyber security exercise and exercise models. The students are familiarized with the organization and the acting in various roles (organizer, defender, attacker) in the exercise.

Assessment criteria, satisfactory (1)

Sufficient 1: The student understands some of the theoretical background of cyber security exercises. The student is able to plan and implement some technical information systems in the cyber security exercise. The student takes part in planning of the exercise in a group.

Satisfactory 2: The student understands the theoretical background of cyber security exercises. The student is able to plan and implement the technical installations of the information systems of the cyber security exercise. The student plans as member of a group a cyber security exercise for an organization.

Assessment criteria, good (3)

Good 3: The student understands versatilely the theoretical background of cyber security exercises. The student is able to plan and implement technical installations of information systems in a cyber security exercise. The student plans in a group a comprehensive cyber security exercise for an organization.

Very good 4: The student understands in-depth the theoretical background of cyber security exercises. The student is able to plan and implement thoroughly the technical installations of information systems in a cyber security exercise. The student plans in a group thoroughly a cyber security exercise for an organization.

Assessment criteria, excellent (5)

Excellent 5: The student shows extraordinary understanding of the theoretical background of cyber security exercises. The student can exceptionally well design and implement the technical installations of information systems in a cyber security exercise. The student plan in a group a superb cyber security exercise for an organization.

Materials

Described in the implementation section.

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

5 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • English
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Pasi Hyytiäinen
Groups
  • TTV22S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S2
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S3
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S1
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S4
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM2
    Tieto- ja viestintätekniikka (AMK)

Objectives

The objective of the course
You master the central parts of planning and preparing a cyber security exercise: terminology, used exercise models and usual structural things related to cyber exercises.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
You know how to design a cyber security exercise and can plan an exercise for a company’s personnel.

Content

The course contains the concepts of cyber security exercise and exercise models. The students are familiarized with the organization and the acting in various roles (organizer, defender, attacker) in the exercise.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student understands some of the theoretical background of cyber security exercises. The student is able to plan and implement some technical information systems in the cyber security exercise. The student takes part in planning of the exercise in a group.

Satisfactory 2: The student understands the theoretical background of cyber security exercises. The student is able to plan and implement the technical installations of the information systems of the cyber security exercise. The student plans as member of a group a cyber security exercise for an organization.

Evaluation criteria, good (3-4)

Good 3: The student understands versatilely the theoretical background of cyber security exercises. The student is able to plan and implement technical installations of information systems in a cyber security exercise. The student plans in a group a comprehensive cyber security exercise for an organization.

Very good 4: The student understands in-depth the theoretical background of cyber security exercises. The student is able to plan and implement thoroughly the technical installations of information systems in a cyber security exercise. The student plans in a group thoroughly a cyber security exercise for an organization.

Evaluation criteria, excellent (5)

Excellent 5: The student shows extraordinary understanding of the theoretical background of cyber security exercises. The student can exceptionally well design and implement the technical installations of information systems in a cyber security exercise. The student plan in a group a superb cyber security exercise for an organization.

Enrollment

20.11.2023 - 04.01.2024

Timing

08.01.2024 - 30.04.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Pasi Hyytiäinen
  • Jarmo Nevala
Groups
  • TTV21S3
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV21SM
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S2
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S1
    Tieto- ja viestintätekniikka (AMK)

Objectives

The objective of the course
You master the central parts of planning and preparing a cyber security exercise: terminology, used exercise models and usual structural things related to cyber exercises.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
You know how to design a cyber security exercise and can plan an exercise for a company’s personnel.

Content

The course contains the concepts of cyber security exercise and exercise models. The students are familiarized with the organization and the acting in various roles (organizer, defender, attacker) in the exercise.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student understands some of the theoretical background of cyber security exercises. The student is able to plan and implement some technical information systems in the cyber security exercise. The student takes part in planning of the exercise in a group.

Satisfactory 2: The student understands the theoretical background of cyber security exercises. The student is able to plan and implement the technical installations of the information systems of the cyber security exercise. The student plans as member of a group a cyber security exercise for an organization.

Evaluation criteria, good (3-4)

Good 3: The student understands versatilely the theoretical background of cyber security exercises. The student is able to plan and implement technical installations of information systems in a cyber security exercise. The student plans in a group a comprehensive cyber security exercise for an organization.

Very good 4: The student understands in-depth the theoretical background of cyber security exercises. The student is able to plan and implement thoroughly the technical installations of information systems in a cyber security exercise. The student plans in a group thoroughly a cyber security exercise for an organization.

Evaluation criteria, excellent (5)

Excellent 5: The student shows extraordinary understanding of the theoretical background of cyber security exercises. The student can exceptionally well design and implement the technical installations of information systems in a cyber security exercise. The student plan in a group a superb cyber security exercise for an organization.

Enrollment

01.11.2022 - 05.01.2023

Timing

09.01.2023 - 28.04.2023

Number of ECTS credits allocated

5 op

Virtual portion

2 op

Mode of delivery

60 % Face-to-face, 40 % Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Pasi Hyytiäinen

Objectives

The objective of the course
You master the central parts of planning and preparing a cyber security exercise: terminology, used exercise models and usual structural things related to cyber exercises.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
You know how to design a cyber security exercise and can plan an exercise for a company’s personnel.

Content

The course contains the concepts of cyber security exercise and exercise models. The students are familiarized with the organization and the acting in various roles (organizer, defender, attacker) in the exercise.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student understands some of the theoretical background of cyber security exercises. The student is able to plan and implement some technical information systems in the cyber security exercise. The student takes part in planning of the exercise in a group.

Satisfactory 2: The student understands the theoretical background of cyber security exercises. The student is able to plan and implement the technical installations of the information systems of the cyber security exercise. The student plans as member of a group a cyber security exercise for an organization.

Evaluation criteria, good (3-4)

Good 3: The student understands versatilely the theoretical background of cyber security exercises. The student is able to plan and implement technical installations of information systems in a cyber security exercise. The student plans in a group a comprehensive cyber security exercise for an organization.

Very good 4: The student understands in-depth the theoretical background of cyber security exercises. The student is able to plan and implement thoroughly the technical installations of information systems in a cyber security exercise. The student plans in a group thoroughly a cyber security exercise for an organization.

Evaluation criteria, excellent (5)

Excellent 5: The student shows extraordinary understanding of the theoretical background of cyber security exercises. The student can exceptionally well design and implement the technical installations of information systems in a cyber security exercise. The student plan in a group a superb cyber security exercise for an organization.