No upcoming implementations. See the syllabus for more information.
Learning outcomes of the course
The student is familiar with the basic concepts of various malware and cyber attack methods. The student is able to design and implement various defence methods against cyber attacks and knows various defence tactics against cyber attacks. The student masters the basic processes of cyber security anomalies and ways to act as well as how to act in an anomaly situation in various roles. .
- Basics of malware and vulnerabilities
- Malware families and types
- Cyber attacks and attack methods
- Utilization of defence methods and data security technologies in ICT environments
- Handling of processes and practices of cyber security anomalies
- Basics and methods of digital forensics
Prerequisites and co-requisites
Basic technologies used in data networks and various data security technologies
Assessment criteria - grade 1 and 2
Sufficient 1: The student is able to implement only basic functionalities to defend ICT environment and is able to show understanding of various malware and attack methods only in theory. The exercises and the course assignment are briefly implemented and poorly or incorrectly documented.
Satisfactory 2: The student knows the basics of utlizing various data security technologies in protection and defence of ICT environments. The exercises and course assignment have been partly executed and the documentation is not comprehensive. The student is able to reflect on his/her learning in practice.
Assessment criteria - grade 3 and 4
Good 3: The defence methods carried out in exercises and course assignment and their utilization in digital forensics have been implemented operationally and they have been documented; also the course assignment has been presented.
Very good 4: The student is able to apply and choose various defence methods and tactics for various ICT environments. The student is able to analyze the effects of malware and various attack methods on ICT environments. The student understands the effect of various defence methods on the risk levels of ICT environment as well as their economic effect.
Assessment criteria - grade 5
Excellent 5: The student is able to apply and choose various defence methods and tactics versatilely and extensively for different ICT environments. The student is able to analyze comprehensively the effects of malware and various attack methods on ICT environments. The student understands the effect of various defence methods on the risk levels of ICT environment as well as their economic effect.