Threat Detection and ResponseLaajuus (5 cr)
Code: TTC7020
Credits
5 op
Teaching language
- Finnish
Responsible person
- Joni Gadd
- Marko Vatanen
- Jarmo Viinikanoja
Objective
The student understands the tools needed for detecting cyber attacks as well as the significance of attack analysis and response action. The student masters live forensics techniques in the course.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
- Threat detection methods and targets
- Response processes and tools
- Live forensics methods and technologies
Assessment criteria, satisfactory (1)
Sufficient 1: The student knows superficially the processes related to threat detection and response activities. The student is able to choose the most common methods for the problem to be solved and apply them. Additionally, the student is able to assess their implementation and justify the conclusions.
Satisfactory 2: The student knows the processes and technologies related to threat detection and response activities. The student is able to choose the most common methods for the problem to be solved and apply them to practice. Additionally, the student is able to assess their implementation superficially and justify the conclusions.
Assessment criteria, good (3)
Good 3: The student knows the processes and technologies related to threat detection and response activities as well as the live forensics tools. The student is able to choose the most common methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation in a versatile manner and justify the conclusions.
Very good 4: The student knows the processes and technologies related to threat detection and response activities as well as the live forensics tools. The student is able to choose the correct methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation in a versatile manner and justify the conclusions.
Assessment criteria, excellent (5)
Excellent 5: The student has an in-depth knowledge of the processes and technologies related to threat detection and response activities as well as the live forensics tools. The student is able to choose the correct methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation critically and justify the conclusions.