Cyber Threat Information and Data-analytics (5 cr)
Code: TTC6030-3011
General information
- Enrollment
-
01.08.2024 - 22.08.2024
Registration for the implementation has ended.
- Timing
-
26.08.2024 - 18.12.2024
Implementation has ended.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 0 cr
- Virtual portion
- 5 cr
- Mode of delivery
- Online learning
- Unit
- School of Technology
- Teaching languages
- Finnish
- Seats
- 0 - 35
- Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Teachers
- Tarja Ajo
- Heikki Järvinen
- Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
-
ZJA24STIKY2Avoin amk, Kyberturvallisuus 2, Verkko
- Course
- TTC6030
Realization has 31 reservations. Total duration of reservations is 76 h 30 min.
Time | Topic | Location |
---|---|---|
Wed 28.08.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 29.08.2024 time 11:15 - 12:45 (1 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 04.09.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 05.09.2024 time 11:15 - 13:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 11.09.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 12.09.2024 time 11:15 - 13:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 18.09.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 19.09.2024 time 11:15 - 13:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 25.09.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 26.09.2024 time 11:15 - 13:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 02.10.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 03.10.2024 time 11:15 - 13:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 09.10.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 10.10.2024 time 11:15 - 13:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 23.10.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 24.10.2024 time 11:15 - 13:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 30.10.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 31.10.2024 time 11:15 - 13:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 06.11.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 07.11.2024 time 11:15 - 13:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 13.11.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 14.11.2024 time 11:15 - 13:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 20.11.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 21.11.2024 time 11:15 - 13:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 27.11.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 28.11.2024 time 11:15 - 13:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 04.12.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 05.12.2024 time 11:15 - 13:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 11.12.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Thu 12.12.2024 time 11:15 - 13:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Wed 18.12.2024 time 08:15 - 10:45 (2 h 30 min) |
Kyberuhkatieto ja data-analytiikka TTC6030-3011 |
Verkko
|
Evaluation scale
0-5
Objective
Purpose:
You understand the principles of threat intelligence, its types and exploitability in cyber defense. You learn to utilise data analytics methods in handling great amounts of data from cyber security perspective. You understand the significance of enriching the data with external data sources.
EUR-ACE Competences:
Multidisciplinary competences
Knowledge and understanding
Engineering practice
Communication and team-working
Learning outcomes:
You know the basic concepts of threat intelligence, you understand the purpose of threat intelligence and data-analytics, you can apply correct methods to the specific problems, and you can do data-analytics using Python programming language.
Content
Content:
Principles and forms of threat intelligence
Exploitability of threat intelligence
Methods of data analytics in handling data and exploitation
Enriching threat intelligence with external sources
Teaching methods
Completing the course includes lecture recordings, written materials and returnable learning assignments. Course tasks and their return dates are described in the course workspace.
Assessment criteria, satisfactory (1)
Sufficient 1: You know superficially the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply the most common methods. Additionally, you are able to give a constricted assessment of their implementation and justify the conclusions.
Satisfactory 2: You knows the principles and types of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and you are to apply their technical competence to practice. Additionally, You are able to assess their implementation superficially and justify the conclusions.
Assessment criteria, good (3)
Good 3: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the most common methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Very good 4: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation versatilely and justify the conclusions.
Assessment criteria, excellent (5)
Excellent 5: You know the principles, types and exploitability of threat intelligence in cyber defense. You are able to select the correct methods for the problem to be solved and are able to apply their technical competence to practice. Additionally, you are able to assess their implementation critically and justify the conclusions.
Further information
Prior knowledge of Python programming language is recommended.