Skip to main content

Tunkeutumis- ja puolustamismenetelmät (4 cr)

Code: TTKS1000-0K0V1

General information


Timing
01.01.2020 - 31.07.2020
Implementation has ended.
Number of ECTS credits allocated
4 cr
Local portion
4 cr
Mode of delivery
Face-to-face
Unit
School of Technology
Teaching languages
Finnish
Degree programmes
Bachelor's Degree Programme in Information and Communications Technology
Teachers
Markku Vajaranta
Groups
TTV17S1
Tieto- ja viestintätekniikka
Course
TTKS1000
No reservations found for realization TTKS1000-0K0V1!

Evaluation scale

0-5

Objective

The student is familiar with the basic concepts of various malware and cyber attack methods. The student is able to design and implement various defence methods against cyber attacks and knows various defence tactics against cyber attacks. The student masters the basic processes of cyber security anomalies and ways to act as well as how to act in an anomaly situation in various roles. .

Content

- Basics of malware and vulnerabilities
- Malware families and types
- Cyber attacks and attack methods
- Utilization of defence methods and data security technologies in ICT environments
- Handling of processes and practices of cyber security anomalies
- Basics and methods of digital forensics

Materials

Online learning material Other possible material discussed in the course.

Completion alternatives

Practical exercises 30% Course assignment 70%

Student workload

o lectures 24 h o exercises 30 h o independent work 54 ho other 8 h

Assessment criteria, satisfactory (1)

Sufficient 1: The student is able to implement only basic functionalities to defend ICT environment and is able to show understanding of various malware and attack methods only in theory. The exercises and the course assignment are briefly implemented and poorly or incorrectly documented.

Satisfactory 2: The student knows the basics of utlizing various data security technologies in protection and defence of ICT environments. The exercises and course assignment have been partly executed and the documentation is not comprehensive. The student is able to reflect on his/her learning in practice.

Assessment criteria, good (3)

Good 3: The defence methods carried out in exercises and course assignment and their utilization in digital forensics have been implemented operationally and they have been documented; also the course assignment has been presented.

Very good 4: The student is able to apply and choose various defence methods and tactics for various ICT environments. The student is able to analyze the effects of malware and various attack methods on ICT environments. The student understands the effect of various defence methods on the risk levels of ICT environment as well as their economic effect.

Assessment criteria, excellent (5)

Excellent 5: The student is able to apply and choose various defence methods and tactics versatilely and extensively for different ICT environments. The student is able to analyze comprehensively the effects of malware and various attack methods on ICT environments. The student understands the effect of various defence methods on the risk levels of ICT environment as well as their economic effect.

Qualifications

Basic technologies used in data networks and various data security technologies

Go back to top of page