Breaking-in and Defense Methods (4 cr)
Code: TTKS1000-3001
General information
- Enrollment
-
02.11.2020 - 30.11.2020
Registration for the implementation has ended.
- Timing
-
11.01.2021 - 30.04.2021
Implementation has ended.
- Number of ECTS credits allocated
- 4 cr
- Local portion
- 4 cr
- Mode of delivery
- Face-to-face
- Unit
- School of Technology
- Campus
- Lutakko Campus
- Teaching languages
- Finnish
- Seats
- 0 - 32
- Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Evaluation scale
0-5
Objective
The student is familiar with the basic concepts of various malware and cyber attack methods. The student is able to design and implement various defence methods against cyber attacks and knows various defence tactics against cyber attacks. The student masters the basic processes of cyber security anomalies and ways to act as well as how to act in an anomaly situation in various roles. .
Content
- Basics of malware and vulnerabilities
- Malware families and types
- Cyber attacks and attack methods
- Utilization of defence methods and data security technologies in ICT environments
- Handling of processes and practices of cyber security anomalies
- Basics and methods of digital forensics
Materials
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Employer connections
- visiting lecturers
- projects
Exam schedules
The possible date and method of the exam will be announced in the course opening.
Completion alternatives
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Assessment criteria, satisfactory (1)
Sufficient 1: The student is able to implement only basic functionalities to defend ICT environment and is able to show understanding of various malware and attack methods only in theory. The exercises and the course assignment are briefly implemented and poorly or incorrectly documented.
Satisfactory 2: The student knows the basics of utlizing various data security technologies in protection and defence of ICT environments. The exercises and course assignment have been partly executed and the documentation is not comprehensive. The student is able to reflect on his/her learning in practice.
Assessment criteria, good (3)
Good 3: The defence methods carried out in exercises and course assignment and their utilization in digital forensics have been implemented operationally and they have been documented; also the course assignment has been presented.
Very good 4: The student is able to apply and choose various defence methods and tactics for various ICT environments. The student is able to analyze the effects of malware and various attack methods on ICT environments. The student understands the effect of various defence methods on the risk levels of ICT environment as well as their economic effect.
Assessment criteria, excellent (5)
Excellent 5: The student is able to apply and choose various defence methods and tactics versatilely and extensively for different ICT environments. The student is able to analyze comprehensively the effects of malware and various attack methods on ICT environments. The student understands the effect of various defence methods on the risk levels of ICT environment as well as their economic effect.
Qualifications
Basic technologies used in data networks and various data security technologies
Further information
Note: Limitations of the COVID-19 situation