Skip to main content

Auditing and Testing Technical Security (5 cr)

Code: YTCP0300-3006

General information


Enrollment
01.08.2024 - 31.08.2024
Registration for the implementation has ended.
Timing
26.08.2024 - 18.12.2024
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
5 cr
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
English
Seats
0 - 35
Degree programmes
Master's Degree Programme in Information Technology, Cyber Security
Teachers
Jarmo Nevala
Joonatan Ovaska
Groups
YTC23S1
Master of Engineering, Degree Programme in Cyber Security
Course
YTCP0300

Realization has 6 reservations. Total duration of reservations is 33 h 0 min.

Time Topic Location
Fri 06.09.2024 time 15:00 - 20:00
(5 h 0 min)
Auditing and Testing Technical Security YTCP0300-3006
P2_D426 Mediatekniikka
Sat 07.09.2024 time 09:00 - 15:00
(6 h 0 min)
Auditing and Testing Technical Security YTCP0300-3006
P2_D426 Mediatekniikka
Fri 04.10.2024 time 15:00 - 20:00
(5 h 0 min)
Auditing and Testing Technical Security YTCP0300-3006
P2_D436 Tietoliikennelaboratorio
Sat 05.10.2024 time 09:00 - 15:00
(6 h 0 min)
Auditing and Testing Technical Security YTCP0300-3006
P2_D436 Tietoliikennelaboratorio
Fri 29.11.2024 time 15:00 - 20:00
(5 h 0 min)
Auditing and Testing Technical Security YTCP0300-3006
P2_D436 Tietoliikennelaboratorio
Sat 30.11.2024 time 09:00 - 15:00
(6 h 0 min)
Auditing and Testing Technical Security YTCP0300-3006
P2_D436 Tietoliikennelaboratorio
Changes to reservations may be possible.

Evaluation scale

0-5

Objective

The student understands the purpose of security auditing and knows the restrictions of related legislations and regulations. He (she) knows the security testing methods and techniques. The student can design testing processes and the activities needed when applying technical security.

Course Competences
EUR-ACE: Engineering Design, Master's Degree
EUR-ACE: Engineering Practice, Master's Degree
EUR-ACE: Investigations, Master's Degree

Content

The key topics of the course are:
- Restrictions of legislation and regulations
- Security testing, examination overview and techniques
- Target and environment identification and analysis techniques
- Target vulnerability validation techniques
- Testing process, activities and reporting (Remediation/Mitigation)

Materials

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars / visiting lecturers
- small group learning
- exercises
- learning tasks
- seminars

Employer connections

- visiting lecturers
- projects

Exam schedules

The possible date and method of the exam will be announced in the course opening.

Completion alternatives

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

Assessment criteria, satisfactory (1)

Sufficient 1: Student has sufficient knowledge of auditing and testing process and is able to choose some of the appropriate tools and methods as a part of a testing process designing. Student is able to form a partially comprehensive analysis from technical results and can create appropriate suggestions for mitigating and remediating some of the vulnerabilities found during the auditing and testing process. In addition, student understands the restrictions of legislation and regulations affecting the operations of actors in sufficient level.

Satisfactory 2: Student has satisfying knowledge of auditing and testing process and is able to choose some of the appropriate tools and methods as a part of a testing process designing. Student is able to form a partially comprehensive analysis from technical results and can create appropriate suggestions for mitigating and remediating all critical vulnerabilities found during the auditing and testing process. In addition, student understands the restrictions of legislation and regulations affecting the operations of actors in satisfying level.

Assessment criteria, good (3)

Good 3: Student has good knowledge of auditing and testing process and is able to choose most of the appropriate tools and methods as a part of a testing process designing. Student is able to form a partially comprehensive analysis from technical results and can create appropriate suggestions for mitigating and remediating all critical vulnerabilities found during the auditing and testing process. In addition, student understands the restrictions of legislation and regulations affecting the operations of actors well.

Very Good 4: Student has very good knowledge of auditing and testing process and is able to choose appropriate tools and methods as a part of a testing process designing. Student is able to form a comprehensive analysis from technical results and can create appropriate suggestions for mitigating and remediating most vulnerabilities found during the auditing and testing process. In addition, student understands the restrictions of legislation and regulations affecting the operations of actors very well.

Assessment criteria, excellent (5)

Excellent 5: Student has excellent knowledge of auditing and testing process and is able to choose appropriate tools and methods as a part of a testing process designing. Student is able to form a comprehensive analysis from technical results and can create appropriate suggestions for mitigating and remediating most vulnerabilities found during the auditing and testing process. In addition, student understands excellently the restrictions of legislation and regulations affecting the operations of actors.

Qualifications

YTCP0100 Security Management in Cyber Domain

Further information

The course includes individual work, group work and a final exam

Go back to top of page