Incident Management, Response and SOC (5 cr)
Code: TTC6060-3005
General information
- Enrollment
-
20.11.2023 - 04.01.2024
Registration for the implementation has ended.
- Timing
-
08.01.2024 - 30.04.2024
Implementation has ended.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 0 cr
- Virtual portion
- 5 cr
- Mode of delivery
- Online learning
- Unit
- School of Technology
- Teaching languages
- Finnish
- Seats
- 0 - 30
- Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Teachers
- Jarmo Nevala
- Heli Ciszek
- Groups
-
TTV21S3Tieto- ja viestintätekniikka (AMK)
-
TTV21S5Tieto- ja viestintätekniikka (AMK)
-
TTV21SMTieto- ja viestintätekniikka (AMK)
-
ZJA24KTIKY2Avoin amk, Kyberturvallisuus 2, Verkko
-
TTV21S2Tieto- ja viestintätekniikka (AMK)
-
TTV21S1Tieto- ja viestintätekniikka (AMK)
- Course
- TTC6060
Realization has 8 reservations. Total duration of reservations is 20 h 0 min.
Time | Topic | Location |
---|---|---|
Wed 06.03.2024 time 11:30 - 14:00 (2 h 30 min) |
Poikkeamien hallinta ja kyberturvakeskukset TTC6060-3005 |
Verkkototeutus
|
Wed 13.03.2024 time 11:30 - 14:00 (2 h 30 min) |
Poikkeamien hallinta ja kyberturvakeskukset TTC6060-3005 |
Verkkototeutus
|
Wed 20.03.2024 time 11:30 - 14:00 (2 h 30 min) |
Poikkeamien hallinta ja kyberturvakeskukset TTC6060-3005 |
Verkkototeutus
|
Wed 27.03.2024 time 11:30 - 14:00 (2 h 30 min) |
Poikkeamien hallinta ja kyberturvakeskukset TTC6060-3005 |
Verkkototeutus
|
Wed 03.04.2024 time 11:30 - 14:00 (2 h 30 min) |
Poikkeamien hallinta ja kyberturvakeskukset TTC6060-3005 |
Verkkototeutus
|
Wed 10.04.2024 time 11:30 - 14:00 (2 h 30 min) |
Poikkeamien hallinta ja kyberturvakeskukset TTC6060-3005 |
Verkkototeutus
|
Wed 17.04.2024 time 11:30 - 14:00 (2 h 30 min) |
Poikkeamien hallinta ja kyberturvakeskukset TTC6060-3005 |
Verkkototeutus
|
Wed 24.04.2024 time 11:30 - 14:00 (2 h 30 min) |
Poikkeamien hallinta ja kyberturvakeskukset TTC6060-3005 |
Verkkototeutus
|
Evaluation scale
0-5
Objective
The objective of the course
The student masters the most essential Security Operations Center functionalities such as organizational models, processes and technical environments.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
The student knows how to carry out different functionalities of a SOC: develop technical systems to enhance the detection capabilities of an organization, investigate detected incidents from information systems and work as a part of an organization's processes. The student can effectively work in a SOC and develop his/her work community.
Content
The course contains the concepts of SOC and organizational models. During the course, students design an organizational model for an SOC and technical tools to manage incidents.
Materials
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Employer connections
- excursions
- visiting lecturers
- projects
Exam schedules
The possible date and method of the exam will be announced in the course opening.
Completion alternatives
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Assessment criteria, satisfactory (1)
Sufficient 1: The student understands some of the theory basis of SOCs. The student is able to design and implement some technical information systems for SOC. The student participates in process design in a group.
Satisfactory 2: The student understands the theory basis of SOCs. The student is able to design and implement the installations of technical information systems for an SOC. The student designs processes for an organization in a group.
Assessment criteria, good (3)
Good 3: The student has a versatile understanding of the theory basis of SOCs. The student is able to versatilely design and implement installations of technical information systems for an SOC. The student designs extensively the processes for an organization in a group.
Very good 4: The student has an in-depth understanding of the theory basis of SOCs. The student is able to thoroughly design and implement installations of technical information systems in a cyber security exercise. The student designs extensively the processes for an organization in a group.
Assessment criteria, excellent (5)
Excellent 5: The student has an out of the ordinary, excellent understanding of the theory basis of SOCs. The student is able to design and implement outstandingly the installations of technical information systems in a cyber security exercise. The student designs superbly the processes for an organization in a group.
Qualifications
Cyber Security