Planning of Cyber Security ExerciseLaajuus (5 cr)
Code: TTC7520
Credits
5 op
Teaching language
- Finnish
Responsible person
- Jarmo Nevala
Objective
Objective of the course
You have a command of the parts related to the design of cyber security exercise: concepts of the exercise design, implementation and structure of a cyber security exercise.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
The course contains the planning of a cyber security exercise, its implementation and discussion of the exercise based on various roles (organizer, defender, attacker)
Qualifications
Data networks, basics of linux, future factory project
Assessment criteria, satisfactory (1)
Sufficient 1: The student understands something about the theoretical background of a cyber security exercise. The student is able to plan and implement some technical information systems in the cyber security exercise. The student takes part in the planning of the exercise in a group.
Satisfactory 2: The student understands the theoretical background of a cyber security exercise. The student is able to plan and implement the installations of information systems in a cyber security exercise. The student plans in a group a cyber security exercise for an organization.
Assessment criteria, good (3)
Good 3:The student has a versatile understanding of the theoretical background of a cyber security exercise. The student is able to plan and implement the installations of information systems in a cyber security exercise in a versatile way. The student plans in a group a comprehensive cyber security exercise for an organization.
Very good 4: The student has a profound understanding of the theoretical background of a cyber security exercise. The student is able to plan and implement the technical installations of information systems in a cyber security exercise thoroughly. The student plans in a group profoundly a cyber security exercise for an organization.
Assessment criteria, excellent (5)
Excellent 5: The student has an out of the ordinary deep understanding of the theory background of a cyber security exercise. The student is able to plan and implement an out of the ordinary technical installation of the information systems in a cyber security exercise. The student plans in a group a superb cyber security exercise for an organization.
Enrollment
18.11.2024 - 09.01.2025
Timing
13.01.2025 - 30.04.2025
Number of ECTS credits allocated
5 op
Virtual portion
4 op
Mode of delivery
20 % Face-to-face, 80 % Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Joonatan Ovaska
Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22SMTieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
-
TTV22SM2Tieto- ja viestintätekniikka (AMK)
Objectives
Objective of the course
You have a command of the parts related to the design of cyber security exercise: concepts of the exercise design, implementation and structure of a cyber security exercise.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
The course contains the planning of a cyber security exercise, its implementation and discussion of the exercise based on various roles (organizer, defender, attacker)
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 10 h
- exercises 9 h
- small group learning 26 h
- independent study 90 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student understands something about the theoretical background of a cyber security exercise. The student is able to plan and implement some technical information systems in the cyber security exercise. The student takes part in the planning of the exercise in a group.
Satisfactory 2: The student understands the theoretical background of a cyber security exercise. The student is able to plan and implement the installations of information systems in a cyber security exercise. The student plans in a group a cyber security exercise for an organization.
Evaluation criteria, good (3-4)
Good 3:The student has a versatile understanding of the theoretical background of a cyber security exercise. The student is able to plan and implement the installations of information systems in a cyber security exercise in a versatile way. The student plans in a group a comprehensive cyber security exercise for an organization.
Very good 4: The student has a profound understanding of the theoretical background of a cyber security exercise. The student is able to plan and implement the technical installations of information systems in a cyber security exercise thoroughly. The student plans in a group profoundly a cyber security exercise for an organization.
Evaluation criteria, excellent (5)
Excellent 5: The student has an out of the ordinary deep understanding of the theory background of a cyber security exercise. The student is able to plan and implement an out of the ordinary technical installation of the information systems in a cyber security exercise. The student plans in a group a superb cyber security exercise for an organization.
Prerequisites
Data networks, basics of linux, future factory project
Enrollment
20.11.2023 - 04.01.2024
Timing
05.02.2024 - 30.04.2024
Number of ECTS credits allocated
5 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Joonatan Ovaska
Groups
-
TTV21S1Tieto- ja viestintätekniikka (AMK)
-
TTV21S2Tieto- ja viestintätekniikka (AMK)
-
TTV21S3Tieto- ja viestintätekniikka (AMK)
-
TTV21S5Tieto- ja viestintätekniikka (AMK)
-
TTV21SMTieto- ja viestintätekniikka (AMK)
Objectives
Objective of the course
You have a command of the parts related to the design of cyber security exercise: concepts of the exercise design, implementation and structure of a cyber security exercise.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
The course contains the planning of a cyber security exercise, its implementation and discussion of the exercise based on various roles (organizer, defender, attacker)
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 10 h
- exercises 9 h
- small group learning 26 h
- independent study 90 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student understands something about the theoretical background of a cyber security exercise. The student is able to plan and implement some technical information systems in the cyber security exercise. The student takes part in the planning of the exercise in a group.
Satisfactory 2: The student understands the theoretical background of a cyber security exercise. The student is able to plan and implement the installations of information systems in a cyber security exercise. The student plans in a group a cyber security exercise for an organization.
Evaluation criteria, good (3-4)
Good 3:The student has a versatile understanding of the theoretical background of a cyber security exercise. The student is able to plan and implement the installations of information systems in a cyber security exercise in a versatile way. The student plans in a group a comprehensive cyber security exercise for an organization.
Very good 4: The student has a profound understanding of the theoretical background of a cyber security exercise. The student is able to plan and implement the technical installations of information systems in a cyber security exercise thoroughly. The student plans in a group profoundly a cyber security exercise for an organization.
Evaluation criteria, excellent (5)
Excellent 5: The student has an out of the ordinary deep understanding of the theory background of a cyber security exercise. The student is able to plan and implement an out of the ordinary technical installation of the information systems in a cyber security exercise. The student plans in a group a superb cyber security exercise for an organization.
Prerequisites
Data networks, basics of linux, future factory project
Enrollment
01.11.2022 - 05.01.2023
Timing
06.02.2023 - 28.04.2023
Number of ECTS credits allocated
5 op
Virtual portion
4 op
Mode of delivery
20 % Face-to-face, 80 % Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Joonatan Ovaska
Objectives
Objective of the course
You have a command of the parts related to the design of cyber security exercise: concepts of the exercise design, implementation and structure of a cyber security exercise.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
The course contains the planning of a cyber security exercise, its implementation and discussion of the exercise based on various roles (organizer, defender, attacker)
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 16 h
- exercises 9 h
- small group learning 90 h
- independent study 20 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student understands something about the theoretical background of a cyber security exercise. The student is able to plan and implement some technical information systems in the cyber security exercise. The student takes part in the planning of the exercise in a group.
Satisfactory 2: The student understands the theoretical background of a cyber security exercise. The student is able to plan and implement the installations of information systems in a cyber security exercise. The student plans in a group a cyber security exercise for an organization.
Evaluation criteria, good (3-4)
Good 3:The student has a versatile understanding of the theoretical background of a cyber security exercise. The student is able to plan and implement the installations of information systems in a cyber security exercise in a versatile way. The student plans in a group a comprehensive cyber security exercise for an organization.
Very good 4: The student has a profound understanding of the theoretical background of a cyber security exercise. The student is able to plan and implement the technical installations of information systems in a cyber security exercise thoroughly. The student plans in a group profoundly a cyber security exercise for an organization.
Evaluation criteria, excellent (5)
Excellent 5: The student has an out of the ordinary deep understanding of the theory background of a cyber security exercise. The student is able to plan and implement an out of the ordinary technical installation of the information systems in a cyber security exercise. The student plans in a group a superb cyber security exercise for an organization.
Prerequisites
Data networks, basics of linux, future factory project