Attacks, Defence and ProtectionLaajuus (5 cr)
Code: TTC6040
Credits
5 op
Teaching language
- Finnish
- English
Responsible person
- Jarmo Nevala
Objective
The objective of the course
You learn the principles of attacks and defence methods as well as protection.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics
Assessment criteria, satisfactory (1)
Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.
Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.
Assessment criteria, good (3)
Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.
Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.
Assessment criteria, excellent (5)
Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.
Enrollment
18.11.2024 - 09.01.2025
Timing
13.01.2025 - 30.04.2025
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- English
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Pasi Hyytiäinen
Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TIC22S1Bachelor's Degree Programme in Information and Communications Technology
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22SMTieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
-
TTV22SM2Tieto- ja viestintätekniikka (AMK)
Objectives
The objective of the course
You learn the principles of attacks and defence methods as well as protection.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- independent study
- distance learning
- webinars
- exercises
- learning tasks
Practical training and working life connections
-
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.
Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.
Evaluation criteria, good (3-4)
Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.
Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.
Evaluation criteria, excellent (5)
Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.
Enrollment
01.08.2024 - 22.08.2024
Timing
26.08.2024 - 18.12.2024
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Pasi Hyytiäinen
Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22SMTieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
-
TTV22SM2Tieto- ja viestintätekniikka (AMK)
-
ZJA24STIKY1Avoin amk, Kyberturvallisuus 1, Verkko
Objectives
The objective of the course
You learn the principles of attacks and defence methods as well as protection.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- independent study
- distance learning
- webinars
- exercises
- learning tasks
Practical training and working life connections
-
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.
Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.
Evaluation criteria, good (3-4)
Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.
Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.
Evaluation criteria, excellent (5)
Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.
Enrollment
20.11.2023 - 04.01.2024
Timing
08.01.2024 - 29.03.2024
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Teaching languages
- Finnish
Seats
0 - 30
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Pasi Hyytiäinen
Groups
-
TTV21S3Tieto- ja viestintätekniikka (AMK)
-
TTV21S5Tieto- ja viestintätekniikka (AMK)
-
TTV21SMTieto- ja viestintätekniikka (AMK)
-
ZJA24KTIKY1Avoin amk, Kyberturvallisuus 1, Verkko
-
TTV21S2Tieto- ja viestintätekniikka (AMK)
-
TTV21S1Tieto- ja viestintätekniikka (AMK)
Objectives
The objective of the course
You learn the principles of attacks and defence methods as well as protection.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- independent study
- distance learning
- webinars
- exercises
- learning tasks
Practical training and working life connections
-
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.
Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.
Evaluation criteria, good (3-4)
Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.
Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.
Evaluation criteria, excellent (5)
Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.
Enrollment
01.08.2023 - 24.08.2023
Timing
28.08.2023 - 19.12.2023
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Teaching languages
- Finnish
Seats
0 - 30
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Pasi Hyytiäinen
Groups
-
TTV21S3Tieto- ja viestintätekniikka (AMK)
-
TTV21S5Tieto- ja viestintätekniikka (AMK)
-
TTV21SMTieto- ja viestintätekniikka (AMK)
-
TTV21S2Tieto- ja viestintätekniikka (AMK)
-
ZJA23STIKY1Avoin amk, Kyberturvallisuus 1, Verkko
-
TTV21S1Tieto- ja viestintätekniikka (AMK)
Objectives
The objective of the course
You learn the principles of attacks and defence methods as well as protection.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- independent study
- distance learning
- webinars
- exercises
- learning tasks
Practical training and working life connections
-
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.
Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.
Evaluation criteria, good (3-4)
Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.
Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.
Evaluation criteria, excellent (5)
Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.
Enrollment
01.11.2022 - 05.01.2023
Timing
09.01.2023 - 28.04.2023
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 30
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Nevala
Groups
-
ZJA23KTIKY1Avoin amk, Kyberturvallisuus 1, Verkko
Objectives
The objective of the course
You learn the principles of attacks and defence methods as well as protection.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- independent study
- distance learning
- webinars
- exercises
- learning tasks
Practical training and working life connections
-
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.
Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.
Evaluation criteria, good (3-4)
Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.
Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.
Evaluation criteria, excellent (5)
Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.
Enrollment
01.08.2022 - 25.08.2022
Timing
29.08.2022 - 16.12.2022
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 30
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Nevala
Groups
-
ZJA22STIKY1Avoin amk, Kyberturvallisuus 1, Verkko
Objectives
The objective of the course
You learn the principles of attacks and defence methods as well as protection.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- independent study
- distance learning
- webinars
- exercises
- learning tasks
Practical training and working life connections
-
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.
Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.
Evaluation criteria, good (3-4)
Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.
Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.
Evaluation criteria, excellent (5)
Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.
Timing
01.01.2022 - 22.05.2022
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Nevala
Groups
-
ZJA21STIKYAvoin AMK, tekniikka, ICT, Kyberturvallisuus
-
ZJA22KTIKY1Avoin AMK, tekniikka, ICT, Kyberturvallisuus 1
Objectives
The objective of the course
You learn the principles of attacks and defence methods as well as protection.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Further information for students
Online course
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.
Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.
Evaluation criteria, good (3-4)
Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.
Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.
Evaluation criteria, excellent (5)
Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.