Basics of Cyber Security ExercisesLaajuus (3 cr)
Code: TT00CE08
Credits
3 op
Teaching language
- Finnish
- English
Responsible person
- Jarmo Nevala
Objective
You master the most essential areas related to the planning and preparation of a cyber security exercise: concepts, used implementation methods and structural issues related to the general exercise. You know how to design an exercise model suitable for the company's personnel.
EUR-ACE Knowledge and understanding
The student can identify and analyze cyber security threats, vulnerabilities and risks in various operating environments. The student knows how to plan and evaluate cyber security solutions and measures in accordance with technical, organizational and legal requirements.
EUR-ACE Engineering practice
The student knows how to plan a cyber security exercise and act as a cyber security expert and partner with different stakeholders and communicate cyber security clearly and effectively.
Content
In this course, you will learn to design and prepare for cybersecurity exercises, including key concepts, implementation methods, and structural aspects. You will be able to create suitable training models for company personnel and identify and analyze cybersecurity threats, vulnerabilities, and risks. You will understand how to plan and evaluate cybersecurity solutions in accordance with technical, organizational, and legal requirements. The course equips you with the skills to act as a cybersecurity expert and collaborator with various stakeholders, and to communicate cybersecurity issues clearly and effectively.
Cyber security exercise concepts and training models
Exercise planning
Objectives, content, format and schedule of the exercise
Preparation of the exercise: roles, tasks, scenarios, materials
Exercise monitoring and evaluation: feedback collection, analysis and reporting.
Presentation and sharing of exercise results and learning
Acting in training in different roles (organizer, defender, attacker).
Qualifications
Cyber Security, Information Security Technologies
Assessment criteria, satisfactory (1)
Sufficient 1: The student understands some of the theoretical background of cyber security exercises. The student is able to plan and implement some technical information systems in the cyber security exercise. The student takes part in planning of the cyber security exercise in a group.
Satisfactory 2: The student understands the theoretical background of cyber security exercises. The student is able to plan and implement the technical installations of the information systems in the cyber security exercise. The student plans a cyber security exercise for an organization as member of a group.
Assessment criteria, good (3)
Good 3: The student understands versatilely the theoretical background of cyber security exercises. The student is able to plan and implement technical installations of information systems in a cyber security exercise. The student plans a comprehensive cyber security exercise for an organization in a group.
Very good 4: The student understands in-depth the theoretical background of cyber security exercises. The student is able to plan and implement thoroughly the technical installations of information systems in a cyber security exercise. The student plans thoroughly a cyber security exercise for an organization in a group.
Assessment criteria, excellent (5)
Excellent 5: The student shows extraordinary understanding of the theoretical background of cyber security exercises. The student can exceptionally well design and implement the technical installations of information systems in a cyber security exercise. The student plans a superb cyber security exercise for an organization in a group.