• Cyber Security Implementation in Practice (YTCP0210-3003),
         10.01.2022 – 31.05.2022,  5 cr  (YTC21S2) — Face-to-face +-
    Learning outcomes of the course
    The course concentrates on hardening a technical environment before a cyber incident has happened. Students focus on these technical controls how they actively prevent a cyber incident with group work and personal assignments. If the prevention isn’t sufficient the incident handling is also investigated and reported by Indicators of Compromise.
    Main topics are updated each year, but mainly they correlate and draw inspiration from e.g. CIS Critical Security Controls and other related public recommendations. The students learn to implement these technical controls and test/audit them on the next course "Auditing and Testing Technical Security".

    Course Competences
    EUR-ACE: Engineering Design, Master's Degree
    EUR-ACE: Engineering Analysis, Master's Degree
    EUR-ACE: Engineering Practice, Master's Degree
    Course contents
    The key topics of the course are:
    - Cyber Threats
    - Malware Defences
    - Asset Inventory and Management
    - Hardening Operating System and Network Devices
    - Situational Awareness
    - User authentication & authorization
    - Boundary Defence
    - Maintenance, monitoring and analysis of security audit logs
    - Defence Strategies & Tactics
    - Red Teaming
    - Cyber Security Incident Handling
    - Conducting personal hands-on implementation and research of security controls
    - Conducting group implementations of security controls to an enterprise
    Assessment criteria
    Assessment criteria - grade 1 and 2
    Sufficient 1: The student demonstrates sufficient mastery of the practical implementations of cyber security and is able to analyze an enterprises existing state of implementations concerning cyber security. The student has satisfactory understanding of an enterprises technical cyber threats and risks that are formulated related to context. The student is able to design a satisfactory technical implementation to control cyber security based on given requirement definition. The student reflects on his (her) own learning sufficiently.

    Satisfactory 2: The student demonstrates satisfactory mastery of the practical implementations of cyber security and is able to analyze an enterprises existing state of implementations concerning cyber security. The student understands an enterprises technical cyber threats and risks that are formulated related to context. The student is able to design a satisfactory technical implementation to control cyber security based on given requirement definition. The student reflects on his (her) own learning.
    Assessment criteria - grade 3 and 4
    Good 3: The student demonstrates good mastery of the practical implementations of cyber security and is able to analyze an enterprises existing state of implementations concerning cyber security. The student understands well an enterprises the technical cyber threats and risks that are formulated related to context. The student is able to design a technical implementation to control cyber security based on given requirement definition. The student reflects on his (her) own learning well.

    Very Good 4: The student demonstrates very good mastery of the practical implementations of cyber security and is able to analyze an enterprises existing state of implementations concerning cyber security. The student understands very well an enterprises technical cyber threats and risks that are formulated related to context. The student is able to design a good technical implementation to control cyber security based on given requirement definition. The student reflects on his (her) own learning very well.
    Assessment criteria - grade 5
    Excellent 5: The student demonstrates excellent mastery of the practical implementations of cyber security and is able to analyze an enterprises existing state of implementations concerning cyber security. The student understands excellently enterprises technical cyber threats and risks that are formulated related to context. The student is able to design an excellent technical implementation to control cyber security based on given requirement definition. The student reflects on his (her) own learning commendably.

    Language of instruction

    English

    Lecturer(s)

    Karo Saharinen

    Lecturer(s)

    Tuula Kotikoski, Heli Ciszek

    Campus

    Lutakko Campus

    Timing

    10.01.2022 - 31.05.2022

    Enrollment

    01.11.2021 - 09.01.2022

    Groups
    • YTC21S2
    Seats

    0 - 35

    Degree Programme

    Master's Degree Programme in Information Technology, Cyber Security

    Mode of delivery

    Face-to-face

    Credits
    • 5 cr
    Unit

    School of Technology