Skip to main content

Breaking-in and Defense MethodsLaajuus (4 cr)

Code: TTKS1000

Credits

4 op

Teaching language

  • Finnish

Responsible person

  • Juha Piispanen

Objective

The student is familiar with the basic concepts of various malware and cyber attack methods. The student is able to design and implement various defence methods against cyber attacks and knows various defence tactics against cyber attacks. The student masters the basic processes of cyber security anomalies and ways to act as well as how to act in an anomaly situation in various roles. .

Content

- Basics of malware and vulnerabilities
- Malware families and types
- Cyber attacks and attack methods
- Utilization of defence methods and data security technologies in ICT environments
- Handling of processes and practices of cyber security anomalies
- Basics and methods of digital forensics

Qualifications

Basic technologies used in data networks and various data security technologies

Assessment criteria, satisfactory (1)

Sufficient 1: The student is able to implement only basic functionalities to defend ICT environment and is able to show understanding of various malware and attack methods only in theory. The exercises and the course assignment are briefly implemented and poorly or incorrectly documented.

Satisfactory 2: The student knows the basics of utlizing various data security technologies in protection and defence of ICT environments. The exercises and course assignment have been partly executed and the documentation is not comprehensive. The student is able to reflect on his/her learning in practice.

Assessment criteria, good (3)

Good 3: The defence methods carried out in exercises and course assignment and their utilization in digital forensics have been implemented operationally and they have been documented; also the course assignment has been presented.

Very good 4: The student is able to apply and choose various defence methods and tactics for various ICT environments. The student is able to analyze the effects of malware and various attack methods on ICT environments. The student understands the effect of various defence methods on the risk levels of ICT environment as well as their economic effect.

Assessment criteria, excellent (5)

Excellent 5: The student is able to apply and choose various defence methods and tactics versatilely and extensively for different ICT environments. The student is able to analyze comprehensively the effects of malware and various attack methods on ICT environments. The student understands the effect of various defence methods on the risk levels of ICT environment as well as their economic effect.

Enrollment

01.11.2021 - 09.01.2022

Timing

10.01.2022 - 29.04.2022

Number of ECTS credits allocated

4 op

Virtual portion

2 op

Mode of delivery

50 % Face-to-face, 50 % Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Joonatan Ovaska
Groups
  • TTV19S1
    Tieto- ja viestintätekniikka

Objectives

The student is familiar with the basic concepts of various malware and cyber attack methods. The student is able to design and implement various defence methods against cyber attacks and knows various defence tactics against cyber attacks. The student masters the basic processes of cyber security anomalies and ways to act as well as how to act in an anomaly situation in various roles. .

Content

- Basics of malware and vulnerabilities
- Malware families and types
- Cyber attacks and attack methods
- Utilization of defence methods and data security technologies in ICT environments
- Handling of processes and practices of cyber security anomalies
- Basics and methods of digital forensics

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student is able to implement only basic functionalities to defend ICT environment and is able to show understanding of various malware and attack methods only in theory. The exercises and the course assignment are briefly implemented and poorly or incorrectly documented.

Satisfactory 2: The student knows the basics of utlizing various data security technologies in protection and defence of ICT environments. The exercises and course assignment have been partly executed and the documentation is not comprehensive. The student is able to reflect on his/her learning in practice.

Evaluation criteria, good (3-4)

Good 3: The defence methods carried out in exercises and course assignment and their utilization in digital forensics have been implemented operationally and they have been documented; also the course assignment has been presented.

Very good 4: The student is able to apply and choose various defence methods and tactics for various ICT environments. The student is able to analyze the effects of malware and various attack methods on ICT environments. The student understands the effect of various defence methods on the risk levels of ICT environment as well as their economic effect.

Evaluation criteria, excellent (5)

Excellent 5: The student is able to apply and choose various defence methods and tactics versatilely and extensively for different ICT environments. The student is able to analyze comprehensively the effects of malware and various attack methods on ICT environments. The student understands the effect of various defence methods on the risk levels of ICT environment as well as their economic effect.

Prerequisites

Basic technologies used in data networks and various data security technologies