Skip to main content

Planning of Cyber Security Exercise (5 cr)

Code: TTC7520-3003

General information


Enrollment
18.11.2024 - 09.01.2025
Registration for the implementation has ended.
Timing
13.01.2025 - 30.04.2025
Implementation is running.
Number of ECTS credits allocated
5 cr
Local portion
1 cr
Virtual portion
4 cr
Mode of delivery
Blended learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
Finnish
Seats
0 - 35
Degree programmes
Bachelor's Degree Programme in Information and Communications Technology
Teachers
Joonatan Ovaska
Groups
TTV22S5
Tieto- ja viestintätekniikka (AMK)
TTV22S2
Tieto- ja viestintätekniikka (AMK)
TTV22S3
Tieto- ja viestintätekniikka (AMK)
TTV22S1
Tieto- ja viestintätekniikka (AMK)
TTV22S4
Tieto- ja viestintätekniikka (AMK)
Course
TTC7520

Realization has 12 reservations. Total duration of reservations is 26 h 0 min.

Time Topic Location
Fri 17.01.2025 time 09:00 - 11:00
(2 h 0 min)
Kyberturvallisuusharjoituksen suunnittelu TTC7520-3003 ALOITUSKONTAKTI
P2_D330 Ohjelmointiluokka
Fri 24.01.2025 time 09:30 - 11:00
(1 h 30 min)
Kyberturvallisuusharjoituksen suunnittelu TTC7520-3003
Verkko
Fri 31.01.2025 time 09:30 - 11:00
(1 h 30 min)
Kyberturvallisuusharjoituksen suunnittelu TTC7520-3003
Verkko
Fri 07.02.2025 time 09:30 - 11:00
(1 h 30 min)
Kyberturvallisuusharjoituksen suunnittelu TTC7520-3003
Verkko
Fri 14.02.2025 time 09:30 - 11:00
(1 h 30 min)
Kyberturvallisuusharjoituksen suunnittelu TTC7520-3003
Verkko
Fri 21.02.2025 time 09:30 - 11:00
(1 h 30 min)
Kyberturvallisuusharjoituksen suunnittelu TTC7520-3003
Verkko
Fri 07.03.2025 time 09:30 - 11:00
(1 h 30 min)
Kyberturvallisuusharjoituksen suunnittelu TTC7520-3003
Verkko
Fri 14.03.2025 time 09:30 - 11:00
(1 h 30 min)
Kyberturvallisuusharjoituksen suunnittelu TTC7520-3003
Verkko
Fri 21.03.2025 time 08:00 - 12:00
(4 h 0 min)
Kyberturvallisuusharjoituksen suunnittelu TTC7520-3003 HARJOITUS
P2_D436 Tietoliikennelaboratorio
P2_D330 Ohjelmointiluokka
Fri 28.03.2025 time 08:00 - 12:00
(4 h 0 min)
Kyberturvallisuusharjoituksen suunnittelu TTC7520-3003 HARJOITUS
P2_D436 Tietoliikennelaboratorio
P2_D330 Ohjelmointiluokka
Fri 04.04.2025 time 08:00 - 12:00
(4 h 0 min)
Kyberturvallisuusharjoituksen suunnittelu TTC7520-3003 HARJOITUS
P2_D436 Tietoliikennelaboratorio
P2_D330 Ohjelmointiluokka
Fri 25.04.2025 time 09:30 - 11:00
(1 h 30 min)
Kyberturvallisuusharjoituksen suunnittelu TTC7520-3003
Verkko
Changes to reservations may be possible.

Evaluation scale

0-5

Objective

Objective of the course
You have a command of the parts related to the design of cyber security exercise: concepts of the exercise design, implementation and structure of a cyber security exercise.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

Content

The course contains the planning of a cyber security exercise, its implementation and discussion of the exercise based on various roles (organizer, defender, attacker)

Materials

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Employer connections

- visiting lecturers
- projects

Exam schedules

The possible date and method of the exam will be announced in the course opening.

Completion alternatives

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 10 h
- exercises 9 h
- small group learning 26 h
- independent study 90 h

Total 135 h

Assessment criteria, satisfactory (1)

Sufficient 1: The student understands something about the theoretical background of a cyber security exercise. The student is able to plan and implement some technical information systems in the cyber security exercise. The student takes part in the planning of the exercise in a group.

Satisfactory 2: The student understands the theoretical background of a cyber security exercise. The student is able to plan and implement the installations of information systems in a cyber security exercise. The student plans in a group a cyber security exercise for an organization.

Assessment criteria, good (3)

Good 3:The student has a versatile understanding of the theoretical background of a cyber security exercise. The student is able to plan and implement the installations of information systems in a cyber security exercise in a versatile way. The student plans in a group a comprehensive cyber security exercise for an organization.

Very good 4: The student has a profound understanding of the theoretical background of a cyber security exercise. The student is able to plan and implement the technical installations of information systems in a cyber security exercise thoroughly. The student plans in a group profoundly a cyber security exercise for an organization.

Assessment criteria, excellent (5)

Excellent 5: The student has an out of the ordinary deep understanding of the theory background of a cyber security exercise. The student is able to plan and implement an out of the ordinary technical installation of the information systems in a cyber security exercise. The student plans in a group a superb cyber security exercise for an organization.

Qualifications

Data networks, basics of linux, future factory project

Go back to top of page