Skip to main content

Cyber Threat Information and Data-analytics (5 cr)

Code: TTC6030-3010

General information


Enrollment
20.11.2023 - 04.01.2024
Registration for the implementation has ended.
Timing
08.01.2024 - 30.04.2024
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
0 cr
Virtual portion
5 cr
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
Finnish
Seats
0 - 35
Degree programmes
Bachelor's Degree Programme in Information and Communications Technology
Teachers
Jarmo Nevala
Tarja Ajo
Antti Junttila
Heli Ciszek
Groups
TTV21S3
Tieto- ja viestintätekniikka (AMK)
TTV21S5
Tieto- ja viestintätekniikka (AMK)
TTV21SM
Tieto- ja viestintätekniikka (AMK)
ZJA24KTIKY2
Avoin amk, Kyberturvallisuus 2, Verkko
TTV21S2
Tieto- ja viestintätekniikka (AMK)
TTV21S1
Tieto- ja viestintätekniikka (AMK)
Course
TTC6030

Realization has 15 reservations. Total duration of reservations is 34 h 0 min.

Time Topic Location
Wed 06.03.2024 time 08:15 - 10:45
(2 h 30 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Verkkototeutus
Tue 12.03.2024 time 18:00 - 20:00
(2 h 0 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Teams
Wed 13.03.2024 time 08:15 - 10:45
(2 h 30 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Verkkototeutus
Tue 19.03.2024 time 18:00 - 20:00
(2 h 0 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Teams
Wed 20.03.2024 time 08:15 - 10:45
(2 h 30 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Verkkototeutus
Tue 26.03.2024 time 18:00 - 20:00
(2 h 0 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Teams
Wed 27.03.2024 time 08:15 - 10:45
(2 h 30 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Verkkototeutus
Tue 02.04.2024 time 18:00 - 20:00
(2 h 0 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Teams
Wed 03.04.2024 time 08:15 - 10:45
(2 h 30 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Verkkototeutus
Tue 09.04.2024 time 18:00 - 20:00
(2 h 0 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Teams
Wed 10.04.2024 time 08:15 - 10:45
(2 h 30 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Verkkototeutus
Tue 16.04.2024 time 18:00 - 20:00
(2 h 0 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Teams
Wed 17.04.2024 time 08:15 - 10:45
(2 h 30 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Verkkototeutus
Tue 23.04.2024 time 18:00 - 20:00
(2 h 0 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Teams
Wed 24.04.2024 time 08:15 - 10:45
(2 h 30 min)
Kyberuhkatieto ja data-analytiikka TTC6030-3010
Verkkototeutus
Changes to reservations may be possible.

Evaluation scale

0-5

Objective

Purpose:
You understand the principles of threat intelligence, its types and exploitability in cyber defense. You learn to utilise data analytics methods in handling great amounts of data from cyber security perspective. You understand the significance of enriching the data with external data sources.

EUR-ACE Competences:
Multidisciplinary competences 
Knowledge and understanding 
Engineering practice 
Communication and team-working 

Learning outcomes:
You know the basic concepts of threat intelligence, you understand the purpose of threat intelligence and data-analytics, you can apply correct methods to the specific problems, and you can do data-analytics using Python programming language.

Content

Content:
Principles and forms of threat intelligence
Exploitability of threat intelligence
Methods of data analytics in handling data and exploitation
Enriching threat intelligence with external sources

Assessment criteria, satisfactory (1)

Sufficient 1: You know superficially the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply the most common methods. Additionally, you are able to give a constricted assessment of their implementation and justify the conclusions.

Satisfactory 2: You knows the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and you are to apply their technical competence to practice. Additionally, You are able to assess their implementation superficially and justify the conclusions.

Assessment criteria, good (3)

Good 3: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.

Very good 4: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.

Assessment criteria, excellent (5)

Excellent 5: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation critically and justify the conclusions.

Go back to top of page