Cyber Threat Information and Data-analyticsLaajuus (5 cr)
Code: TTC6030
Credits
5 op
Teaching language
- Finnish
- English
Responsible person
- Mika Rantonen
Objective
Purpose:
You understand the principles of threat intelligence, its types and exploitability in cyber defense. You learn to utilise data analytics methods in handling great amounts of data from cyber security perspective. You understand the significance of enriching the data with external data sources.
EUR-ACE Competences:
Multidisciplinary competences
Knowledge and understanding
Engineering practice
Communication and team-working
Learning outcomes:
You know the basic concepts of threat intelligence, you understand the purpose of threat intelligence and data-analytics, you can apply correct methods to the specific problems, and you can do data-analytics using Python programming language.
Content
Content:
Principles and forms of threat intelligence
Exploitability of threat intelligence
Methods of data analytics in handling data and exploitation
Enriching threat intelligence with external sources
Assessment criteria, satisfactory (1)
Sufficient 1: You know superficially the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply the most common methods. Additionally, you are able to give a constricted assessment of their implementation and justify the conclusions.
Satisfactory 2: You knows the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and you are to apply their technical competence to practice. Additionally, You are able to assess their implementation superficially and justify the conclusions.
Assessment criteria, good (3)
Good 3: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Very good 4: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Assessment criteria, excellent (5)
Excellent 5: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation critically and justify the conclusions.
Enrollment
18.11.2024 - 09.01.2025
Timing
13.01.2025 - 30.04.2025
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Teaching languages
- English
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Tarja Ajo
- It Instituutti
- Heikki Järvinen
Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TIC22S1Bachelor's Degree Programme in Information and Communications Technology
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22SMTieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
-
TTV22SM2Tieto- ja viestintätekniikka (AMK)
-
ZJA25KTIKY2Avoin amk, Kyberturvallisuus 2, Verkko
Objectives
Purpose:
You understand the principles of threat intelligence, its types and exploitability in cyber defense. You learn to utilise data analytics methods in handling great amounts of data from cyber security perspective. You understand the significance of enriching the data with external data sources.
EUR-ACE Competences:
Multidisciplinary competences
Knowledge and understanding
Engineering practice
Communication and team-working
Learning outcomes:
You know the basic concepts of threat intelligence, you understand the purpose of threat intelligence and data-analytics, you can apply correct methods to the specific problems, and you can do data-analytics using Python programming language.
Content
Content:
Principles and forms of threat intelligence
Exploitability of threat intelligence
Methods of data analytics in handling data and exploitation
Enriching threat intelligence with external sources
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
Practical training and working life connections
- visiting lecturers
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 36 h
- independent study 32 h
Total 135 h
Further information for students
The course assessment methods will be presented during the first meeting. Prior knowledge of Python programming language is recommended.
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: You know superficially the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply the most common methods. Additionally, you are able to give a constricted assessment of their implementation and justify the conclusions.
Satisfactory 2: You knows the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and you are to apply their technical competence to practice. Additionally, You are able to assess their implementation superficially and justify the conclusions.
Evaluation criteria, good (3-4)
Good 3: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Very good 4: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Evaluation criteria, excellent (5)
Excellent 5: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation critically and justify the conclusions.
Enrollment
01.08.2024 - 22.08.2024
Timing
26.08.2024 - 18.12.2024
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Tarja Ajo
- Heikki Järvinen
Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22SMTieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
-
ZJA24STIKY2Avoin amk, Kyberturvallisuus 2, Verkko
-
TTV22SM2Tieto- ja viestintätekniikka (AMK)
Objectives
Purpose:
You understand the principles of threat intelligence, its types and exploitability in cyber defense. You learn to utilise data analytics methods in handling great amounts of data from cyber security perspective. You understand the significance of enriching the data with external data sources.
EUR-ACE Competences:
Multidisciplinary competences
Knowledge and understanding
Engineering practice
Communication and team-working
Learning outcomes:
You know the basic concepts of threat intelligence, you understand the purpose of threat intelligence and data-analytics, you can apply correct methods to the specific problems, and you can do data-analytics using Python programming language.
Content
Content:
Principles and forms of threat intelligence
Exploitability of threat intelligence
Methods of data analytics in handling data and exploitation
Enriching threat intelligence with external sources
Teaching methods
Completing the course includes lecture recordings, written materials and returnable learning assignments. Course tasks and their return dates are described in the course workspace.
Further information for students
Prior knowledge of Python programming language is recommended.
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: You know superficially the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply the most common methods. Additionally, you are able to give a constricted assessment of their implementation and justify the conclusions.
Satisfactory 2: You knows the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and you are to apply their technical competence to practice. Additionally, You are able to assess their implementation superficially and justify the conclusions.
Evaluation criteria, good (3-4)
Good 3: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Very good 4: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Evaluation criteria, excellent (5)
Excellent 5: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation critically and justify the conclusions.
Enrollment
20.11.2023 - 04.01.2024
Timing
08.01.2024 - 30.04.2024
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Tarja Ajo
- Jarmo Nevala
- Antti Junttila
- Heli Ciszek
Groups
-
TTV21S3Tieto- ja viestintätekniikka (AMK)
-
TTV21S5Tieto- ja viestintätekniikka (AMK)
-
TTV21SMTieto- ja viestintätekniikka (AMK)
-
ZJA24KTIKY2Avoin amk, Kyberturvallisuus 2, Verkko
-
TTV21S2Tieto- ja viestintätekniikka (AMK)
-
TTV21S1Tieto- ja viestintätekniikka (AMK)
Objectives
Purpose:
You understand the principles of threat intelligence, its types and exploitability in cyber defense. You learn to utilise data analytics methods in handling great amounts of data from cyber security perspective. You understand the significance of enriching the data with external data sources.
EUR-ACE Competences:
Multidisciplinary competences
Knowledge and understanding
Engineering practice
Communication and team-working
Learning outcomes:
You know the basic concepts of threat intelligence, you understand the purpose of threat intelligence and data-analytics, you can apply correct methods to the specific problems, and you can do data-analytics using Python programming language.
Content
Content:
Principles and forms of threat intelligence
Exploitability of threat intelligence
Methods of data analytics in handling data and exploitation
Enriching threat intelligence with external sources
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: You know superficially the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply the most common methods. Additionally, you are able to give a constricted assessment of their implementation and justify the conclusions.
Satisfactory 2: You knows the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and you are to apply their technical competence to practice. Additionally, You are able to assess their implementation superficially and justify the conclusions.
Evaluation criteria, good (3-4)
Good 3: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Very good 4: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Evaluation criteria, excellent (5)
Excellent 5: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation critically and justify the conclusions.
Enrollment
01.08.2023 - 24.08.2023
Timing
28.08.2023 - 19.12.2023
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Teaching languages
- Finnish
Seats
0 - 30
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Mika Rantonen
- Tarja Ajo
- Jarmo Nevala
- Karo Saharinen
- Heli Ciszek
Groups
-
TTV21S3Tieto- ja viestintätekniikka (AMK)
-
TTV21S5Tieto- ja viestintätekniikka (AMK)
-
TTV21SMTieto- ja viestintätekniikka (AMK)
-
TTV21S2Tieto- ja viestintätekniikka (AMK)
-
ZJA23STIKY2Avoin amk, Kyberturvallisuus 2, Verkko
-
TTV21S1Tieto- ja viestintätekniikka (AMK)
Objectives
Purpose:
You understand the principles of threat intelligence, its types and exploitability in cyber defense. You learn to utilise data analytics methods in handling great amounts of data from cyber security perspective. You understand the significance of enriching the data with external data sources.
EUR-ACE Competences:
Multidisciplinary competences
Knowledge and understanding
Engineering practice
Communication and team-working
Learning outcomes:
You know the basic concepts of threat intelligence, you understand the purpose of threat intelligence and data-analytics, you can apply correct methods to the specific problems, and you can do data-analytics using Python programming language.
Content
Content:
Principles and forms of threat intelligence
Exploitability of threat intelligence
Methods of data analytics in handling data and exploitation
Enriching threat intelligence with external sources
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: You know superficially the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply the most common methods. Additionally, you are able to give a constricted assessment of their implementation and justify the conclusions.
Satisfactory 2: You knows the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and you are to apply their technical competence to practice. Additionally, You are able to assess their implementation superficially and justify the conclusions.
Evaluation criteria, good (3-4)
Good 3: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Very good 4: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Evaluation criteria, excellent (5)
Excellent 5: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation critically and justify the conclusions.
Enrollment
01.11.2022 - 05.01.2023
Timing
09.01.2023 - 28.04.2023
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 30
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Mika Rantonen
- Jarmo Nevala
- Heli Ciszek
Groups
-
ZJA23KTIKY2Avoin amk, Kyberturvallisuus 2, Verkko
Objectives
Purpose:
You understand the principles of threat intelligence, its types and exploitability in cyber defense. You learn to utilise data analytics methods in handling great amounts of data from cyber security perspective. You understand the significance of enriching the data with external data sources.
EUR-ACE Competences:
Multidisciplinary competences
Knowledge and understanding
Engineering practice
Communication and team-working
Learning outcomes:
You know the basic concepts of threat intelligence, you understand the purpose of threat intelligence and data-analytics, you can apply correct methods to the specific problems, and you can do data-analytics using Python programming language.
Content
Content:
Principles and forms of threat intelligence
Exploitability of threat intelligence
Methods of data analytics in handling data and exploitation
Enriching threat intelligence with external sources
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- excursions
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: You know superficially the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply the most common methods. Additionally, you are able to give a constricted assessment of their implementation and justify the conclusions.
Satisfactory 2: You knows the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and you are to apply their technical competence to practice. Additionally, You are able to assess their implementation superficially and justify the conclusions.
Evaluation criteria, good (3-4)
Good 3: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Very good 4: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Evaluation criteria, excellent (5)
Excellent 5: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation critically and justify the conclusions.
Enrollment
01.08.2022 - 25.08.2022
Timing
29.08.2022 - 16.12.2022
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 30
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Mika Rantonen
- Jarmo Nevala
- Heli Ciszek
Groups
-
ZJA22STIKY2Avoin amk, Kyberturvallisuus 2, Verkko
Objectives
Purpose:
You understand the principles of threat intelligence, its types and exploitability in cyber defense. You learn to utilise data analytics methods in handling great amounts of data from cyber security perspective. You understand the significance of enriching the data with external data sources.
EUR-ACE Competences:
Multidisciplinary competences
Knowledge and understanding
Engineering practice
Communication and team-working
Learning outcomes:
You know the basic concepts of threat intelligence, you understand the purpose of threat intelligence and data-analytics, you can apply correct methods to the specific problems, and you can do data-analytics using Python programming language.
Content
Content:
Principles and forms of threat intelligence
Exploitability of threat intelligence
Methods of data analytics in handling data and exploitation
Enriching threat intelligence with external sources
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- excursions
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: You know superficially the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply the most common methods. Additionally, you are able to give a constricted assessment of their implementation and justify the conclusions.
Satisfactory 2: You knows the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and you are to apply their technical competence to practice. Additionally, You are able to assess their implementation superficially and justify the conclusions.
Evaluation criteria, good (3-4)
Good 3: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Very good 4: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Evaluation criteria, excellent (5)
Excellent 5: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation critically and justify the conclusions.