Skip to main content

Threat HuntingLaajuus (5 cr)

Code: TTC7030

Credits

5 op

Teaching language

  • Finnish

Responsible person

  • Jarmo Viinikanoja

Objective

The student understands the procedures and tools related to threat hunting of cyber attacks and threats. Additionally, the student learns to use the most common structural methods of threat hunting in the course.
As a result of the course, the student has a clear picture of the benefits of threat hunting for identification of hidden threats.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

Content

Content
- Threat hunting methods
- Role of threat hunting in cyber defense
- Cyber attacks and threat hypotheses in cyber defense

Assessment criteria, satisfactory (1)

Sufficient 1: The student knows superficially the processes and methods of threat hunting. The student is able to choose the most common methods for the problem to be solved and apply them. Additionally, the student is able to assess their implementation and justify the conclusions.

Satisfactory 2: The student knows the processes and methods of threat hunting. The student is able to choose the most common methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation superficially and justify the conclusions.

Assessment criteria, good (3)

Good 3: The student knows the processes and methods of threat hunting and the significance of threat hunting in cyber defense and threat hypotheses. The student is able to choose the most common methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation in a versatile manner and justify the conclusions.

Very good 4: The student knows the processes and methods of threat hunting and the significance of threat hunting in cyber defense and threat hypotheses. The student is able to choose the correct methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation in a versatile manner and justify the conclusions.

Assessment criteria, excellent (5)

Excellent 5: The student has an in-depth knowledge of the processes and methods of threat hunting and the significance of threat hunting in cyber defense and threat hypotheses. The student is able to choose the correct methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation critically and justify the conclusions.