Siirry suoraan sisältöön

Web Application Security (5 op)

Toteutuksen tunnus: TTKW0210-3001

Toteutuksen perustiedot


Ilmoittautumisaika

02.11.2020 - 30.11.2020

Ajoitus

15.02.2021 - 30.04.2021

Opintopistemäärä

5 op

Virtuaaliosuus

5 op

Toteutustapa

Verkko-opetus

Yksikkö

Teknologiayksikkö

Toimipiste

Lutakon kampus

Opetuskielet

  • Englanti

Paikat

0 - 32

Koulutus

  • Tieto- ja viestintätekniikka (AMK)

Opettaja

  • Joni Gadd
  • Heikki Salo

Vastuuopettaja

Joonatan Ovaska

Ryhmät

  • TTV18S1
    Tieto- ja viestintätekniikka

Tavoitteet

This course enables the student to think about web application security in a holistic fashion. The student will learn an effective toolset and methodology for finding, exploiting, and fixing common web application vulnerabilities.

Sisältö

This is a course about applied cyber security. We will consider common web application vulnerabilities through a series of hands-on exercises using real-world examples (mostly).

We will address various topics related to web and web applications, such as the browser security model, input validation, servlet containers, databases and injections.

We will address current trends in cyber security landscape, and their effect on the web.

Oppimateriaali ja suositeltava kirjallisuus

Verkko-oppimisympäristössä julkaistava sähköinen materiaali.

Opetusmenetelmät

- luennot
- itseopiskelu
- verkko-opinnot
- webinaarit
- pienryhmätyöskentely
- harjoitustyöt
- oppimistehtävät
- seminaarit

Harjoittelu- ja työelämäyhteistyö

- vierailijaluennot
- projektit

Tenttien ajankohdat ja uusintamahdollisuudet

Mahdollinen tentin ajankohta ja toteutustapa ilmoitetaan opintojakson ensimmäisellä kerralla.

Vaihtoehtoiset suoritustavat

Hyväksilukemisen menettelytavat kuvataan tutkintosäännössä ja opinto-oppaassa. Opintojakson opettaja antaa lisätietoa mahdollisista opintojakson erityiskäytänteistä.

Opiskelijan ajankäyttö ja kuormitus

Yksi opintopiste (1 op) tarkoittaa keskimäärin 27 tunnin työtä.

- luennot 52 h
- harjoitustyöt 15 h
- tehtävät 35 h
- itsenäinen työskentely 33 h
Yhteensä 135 h

Lisätietoja opiskelijoille

Muistiin: COVID-19 tilanteen aiheuttamat rajoitukset

Arviointiasteikko

0-5

Arviointikriteerit, tyydyttävä (1-2)

5: The student is able to independently find, exploit, and mitigate common web application vulnerabilities. The student can create and modify exploits to achieve the desired goals. The student can write a succinct report that covers all the salient findings and mitigation recommendations for all vulnerability types addressed by this course. The student is able to update their knowledge independently by following various news and research outlets.

4: The student is able to find and mitigate common web application vulnerabilities. The student can modify and create simple exploits to achieve desired goals. The student can write a report that covers findings and mitigation recommendations for most vulnerability types addressed by this course. The student is able to update their knowledge independently by following various news and research outlets.

3: The student is able to find and mitigate common web application vulnerabilities. The student can understand the working principles of existing exploit techniques. The student can write a report that covers most findings and mitigation recommendations for most vulnerability types addressed by this course. The student is able to update their knowledge independently by following various news and research outlets.

2: The student is able to find common web application vulnerabilities. The student can understand the working principles of existing exploit techniques. The student can write a report that covers most findings and mitigation recommendations for most vulnerability types addressed by this course. The student is able to update their knowledge independently by following various news and research outlets.


1: The student is able to find simple web application vulnerabilities. The student can understand the basics of existing exploit techniques. The student can write a report that covers findings and mitigation recommendations for some vulnerability types addressed by this course. The student is able to find information about major news and events.

0: The student does not meet the criteria set for grade 1.

The learning outcomes of individual courses are assessed in relation to the objectives of the course concerned. Unless otherwise defined in the curriculum, a course accepted as completed is assessed either on the following five-step scale: 5 (Excellent), 4 (Very Good), 3 (Good), 2 (Satisfactory), 1 (Sufficient) or it is graded as Pass/Fail, marked as “S (Pass)” and “0 (Fail)”.
If the student does not meet the minimum criteria set for the course, the grade is 0 (Fail).

Esitietovaatimukset

The course requires a solid understanding of programming and previous experience in web technologies. The student must be comfortable using command line tools.