Designing and Preparing a Cyber ExerciseLaajuus (10 cr)
Code: TTKW0310
Credits
10 op
Teaching language
- Finnish
Responsible person
- Jarmo Nevala
Objective
The student masters the most essential content for design and implementation of a cyber security exercise: concepts, utilized implementation methods and general information on the structure of an exercise. In addition, the student masters the exercise design principles and is able to design a suitable exercise model for the personnel of the company.
Content
The course consists of general concepts and requirements for a Cyber Security Exercise. The course includes organizing and acting in different roles (organizing, defending and attacking) in the exercise. The exercise structure and roles of participants are designed in the course for the implementation of Cyber Security Exercise course.
Qualifications
The student must have completed their professional studies of their specialization option in order to participate in the course. The knowledge is based on theory on Company Networks and practices, knowledge and practices of various network technologies and server operating systems.
Assessment criteria, satisfactory (1)
Sufficient 1: The student understands some of the theory behind Cyber Security Exercises. The student can design and implement some parts of a technical information system for a Cyber Security Exercise. The student contributes to design of a Cyber Security Exercise for an organization in a group.
Satisfactory 2: The student understands the basic theory behind Cyber Security Exercises. The student is able to design and implement a basic technical information system for a Cyber Security Exercise. The student is able to participate in the design of a Cyber Security Exercise for an organization in a group.
Assessment criteria, good (3)
Good 3: The student has a good understanding of the theory behind Cyber Security Exercises. The student is able to design and implement a technical information system for a Cyber Security Exercise. The student is able to participate in the design of a Cyber Security Exercise for an organization in a group .
Very good 4: The student has a thorough understanding of the theory behind Cyber Security Exercises. The student is able to commendably design and implement a technical information system for a Cyber Security Exercise. The student is able to design thoroughly a Cyber Security Exercise for an organization in a group.
Assessment criteria, excellent (5)
Excellent 5: The student understands exceptionally well the theory behind Cyber Security Exercises. The student is able to exceptionally well design and implement a technical information system for a Cyber Security Exercise. The student is able to design an excellent Cyber Security Exercise for an organization in a group.