Skip to main content

Auditing, Penetration Testing and Red Teaming (5 cr)

Code: TTC6550-3008

General information


Enrollment
01.08.2024 - 22.08.2024
Registration for the implementation has ended.
Timing
26.08.2024 - 18.12.2024
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
5 cr
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
English
Seats
0 - 35
Degree programmes
Bachelor's Degree Programme in Information and Communications Technology
Bachelor's Degree Programme in Information and Communications Technology
Teachers
Heikki Järvinen
Joonatan Ovaska
Groups
TTV22S5
Tieto- ja viestintätekniikka (AMK)
TTV22S2
Tieto- ja viestintätekniikka (AMK)
TTV22S3
Tieto- ja viestintätekniikka (AMK)
TIC22S1
Bachelor's Degree Programme in Information and Communications Technology
TTV22S1
Tieto- ja viestintätekniikka (AMK)
TTV22S4
Tieto- ja viestintätekniikka (AMK)
Course
TTC6550

Realization has 17 reservations. Total duration of reservations is 41 h 0 min.

Time Topic Location
Mon 26.08.2024 time 13:15 - 15:15
(2 h 0 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
P2_D436 Tietoliikennelaboratorio
Mon 26.08.2024 time 15:15 - 16:45
(1 h 30 min)
Ethical hacking Moduuli info
P2_D110 Auditorio
Mon 02.09.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
P2_D436 Tietoliikennelaboratorio
Mon 09.09.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
P2_D436 Tietoliikennelaboratorio
Mon 16.09.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
P2_D436 Tietoliikennelaboratorio
Mon 23.09.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
Verkko/Online (KYHA)
Mon 30.09.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
P2_D436 Tietoliikennelaboratorio
Mon 07.10.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
P2_D436 Tietoliikennelaboratorio
Mon 21.10.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
P2_D436 Tietoliikennelaboratorio
Mon 28.10.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
P2_D436 Tietoliikennelaboratorio
Mon 04.11.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
Verkko/Online (KYHA)
Mon 11.11.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
P2_D436 Tietoliikennelaboratorio
Mon 18.11.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
P2_D436 Tietoliikennelaboratorio
Mon 25.11.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
P2_D436 Tietoliikennelaboratorio
Mon 02.12.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
P2_D436 Tietoliikennelaboratorio
Mon 09.12.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
Verkko/Online (KYHA)
Mon 16.12.2024 time 13:15 - 15:45
(2 h 30 min)
Auditing, Penetration Testing and Red Teaming TTC6550-3008
P2_D436 Tietoliikennelaboratorio
Changes to reservations may be possible.

Evaluation scale

0-5

Objective

The purpose of the course
You will learn the principles of auditing, penetration testing and Red Teaming.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 
EUR-ACE: Multidisciplinary competences 
EUR-ACE: Communication and team-working 

Learning objective of the course
After completing the course the student knows the most commonly used evaluation and auditing principles. The student is also able to apply security testing methods, techniques and tools in practice. Additionally, the student knows the basic concepts and implementation criteria of security testing.

Content

Auditing
- data security and data protection
- classification of data and protection methods
- data security assessment and auditing
- standardization and data security standards
- certification and accreditation
- data security testing and testing process
- data security testing methods and techniques

Penetration testing
- data security testing of data networks
- data security testing of systems
- data security testing of client applications
- data security testing of server applications
- vulnerability management

Red Teaming:
- operational models
- model for outline of requirements
- Red Teaming examples
- Threat modelling basics

Assessment criteria, satisfactory (1)

Sufficient 1: The student knows the theory sufficiently and recognizes some parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement parts of data security auditing.

Satisfactory 2: The student knows the theory satisfactorily and recognizes parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement parts of data security auditing.

Assessment criteria, good (3)

Good 3: The student knows the theory well and recognizes parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement parts of data security auditing.

Very good 4: The student knows the theory very well and recognizes parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement a data security audit.

Assessment criteria, excellent (5)

Excellent 5: The student knows the theory excellently and recognizes extensively parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement a data security audit.

Qualifications

Basics of linux, cyber security, data networks

Go back to top of page