Auditing, Penetration Testing and Red Teaming (5 cr)
Code: TTC6550-3008
General information
Enrollment
01.08.2024 - 22.08.2024
Timing
26.08.2024 - 18.12.2024
Number of ECTS credits allocated
5 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- English
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Heikki Järvinen
- Joonatan Ovaska
Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TIC22S1Bachelor's Degree Programme in Information and Communications Technology
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
- 26.08.2024 13:15 - 15:15, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 26.08.2024 15:15 - 16:45, Ethical hacking Moduuli info
- 02.09.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 09.09.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 16.09.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 23.09.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 30.09.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 07.10.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 21.10.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 28.10.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 04.11.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 11.11.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 18.11.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 25.11.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 02.12.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 09.12.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
- 16.12.2024 13:15 - 15:45, Auditing, Penetration Testing and Red Teaming TTC6550-3008
Objectives
The purpose of the course
You will learn the principles of auditing, penetration testing and Red Teaming.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
EUR-ACE: Multidisciplinary competences
EUR-ACE: Communication and team-working
Learning objective of the course
After completing the course the student knows the most commonly used evaluation and auditing principles. The student is also able to apply security testing methods, techniques and tools in practice. Additionally, the student knows the basic concepts and implementation criteria of security testing.
Content
Auditing
- data security and data protection
- classification of data and protection methods
- data security assessment and auditing
- standardization and data security standards
- certification and accreditation
- data security testing and testing process
- data security testing methods and techniques
Penetration testing
- data security testing of data networks
- data security testing of systems
- data security testing of client applications
- data security testing of server applications
- vulnerability management
Red Teaming:
- operational models
- model for outline of requirements
- Red Teaming examples
- Threat modelling basics
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student knows the theory sufficiently and recognizes some parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement parts of data security auditing.
Satisfactory 2: The student knows the theory satisfactorily and recognizes parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement parts of data security auditing.
Evaluation criteria, good (3-4)
Good 3: The student knows the theory well and recognizes parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement parts of data security auditing.
Very good 4: The student knows the theory very well and recognizes parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement a data security audit.
Evaluation criteria, excellent (5)
Excellent 5: The student knows the theory excellently and recognizes extensively parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement a data security audit.
Prerequisites
Basics of linux, cyber security, data networks