Auditing, Penetration Testing and Red Teaming (5 cr)
Code: TTC6550-3010
General information
- Enrollment
-
04.08.2025 - 21.08.2025
Registration for introductions has not started yet.
- Timing
-
25.08.2025 - 19.12.2025
The implementation has not yet started.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 5 cr
- Mode of delivery
- Face-to-face
- Unit
- School of Technology
- Campus
- Lutakko Campus
- Teaching languages
- English
- Seats
- 0 - 35
- Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Bachelor's Degree Programme in Information and Communications Technology
- Teachers
- It Instituutti
- Heikki Järvinen
- Groups
-
TTV23S2Tieto- ja viestintätekniikka (AMK)
-
TTV23S3Tieto- ja viestintätekniikka (AMK)
-
TTV23S5Tieto- ja viestintätekniikka (AMK)
-
TTV23SMTieto- ja viestintätekniikka (AMK)
-
TIC23S1Bachelor's Degree Programme in Information and Communications Technology
-
TTV23S1Tieto- ja viestintätekniikka (AMK)
- Course
- TTC6550
Realization has 42 reservations. Total duration of reservations is 115 h 45 min.
Time | Topic | Location |
---|---|---|
Fri 29.08.2025 time 10:30 - 12:15 (1 h 45 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
P2_D327
CISCO-laboratorio
|
Fri 05.09.2025 time 10:30 - 12:15 (1 h 45 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
P2_D327
CISCO-laboratorio
|
Fri 12.09.2025 time 10:30 - 12:15 (1 h 45 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
P2_D327
CISCO-laboratorio
|
Mon 15.09.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Thu 18.09.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Fri 19.09.2025 time 11:15 - 13:45 (2 h 30 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
Verkko/Online
|
Mon 22.09.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
Verkko/Online
|
Thu 25.09.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
Verkko/Online
|
Fri 26.09.2025 time 11:15 - 13:45 (2 h 30 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
Verkko/Online
|
Mon 29.09.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Thu 02.10.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Fri 03.10.2025 time 11:15 - 13:45 (2 h 30 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
P2_D327
CISCO-laboratorio
|
Mon 06.10.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Thu 09.10.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Fri 10.10.2025 time 11:15 - 13:45 (2 h 30 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
P2_D327
CISCO-laboratorio
|
Mon 20.10.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Thu 23.10.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Fri 24.10.2025 time 08:30 - 11:00 (2 h 30 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
P2_D331
Tietoverkkolaboratorio
|
Mon 27.10.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Thu 30.10.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Fri 31.10.2025 time 08:30 - 11:00 (2 h 30 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
Verkko/Online
|
Mon 03.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
Verkko/Online
|
Thu 06.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
Verkko/Online
|
Fri 07.11.2025 time 08:30 - 11:00 (2 h 30 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
Verkko/Online
|
Mon 10.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Thu 13.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Fri 14.11.2025 time 08:30 - 11:00 (2 h 30 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
P2_D331
Tietoverkkolaboratorio
|
Mon 17.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Thu 20.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Fri 21.11.2025 time 08:30 - 11:00 (2 h 30 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
P2_D331
Tietoverkkolaboratorio
|
Mon 24.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Thu 27.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Fri 28.11.2025 time 08:30 - 11:00 (2 h 30 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
P2_D331
Tietoverkkolaboratorio
|
Mon 01.12.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Thu 04.12.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Fri 05.12.2025 time 08:30 - 11:00 (2 h 30 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
P2_D331
Tietoverkkolaboratorio
|
Mon 08.12.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
Verkko/Online
|
Thu 11.12.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
Verkko/Online
|
Fri 12.12.2025 time 08:30 - 11:00 (2 h 30 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
P2_D331
Tietoverkkolaboratorio
|
Mon 15.12.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Thu 18.12.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Fri 19.12.2025 time 08:30 - 11:00 (2 h 30 min) |
Auditing, Penetration Testing and Red Teaming TTC6550-3010 |
P2_D331
Tietoverkkolaboratorio
|
Evaluation scale
0-5
Objective
The purpose of the course
You will learn the principles of auditing, penetration testing and Red Teaming.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
EUR-ACE: Multidisciplinary competences
EUR-ACE: Communication and team-working
Learning objective of the course
After completing the course the student knows the most commonly used evaluation and auditing principles. The student is also able to apply security testing methods, techniques and tools in practice. Additionally, the student knows the basic concepts and implementation criteria of security testing.
Content
Auditing
- data security and data protection
- classification of data and protection methods
- data security assessment and auditing
- standardization and data security standards
- certification and accreditation
- data security testing and testing process
- data security testing methods and techniques
Penetration testing
- data security testing of data networks
- data security testing of systems
- data security testing of client applications
- data security testing of server applications
- vulnerability management
Red Teaming:
- operational models
- model for outline of requirements
- Red Teaming examples
- Threat modelling basics
Materials
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Employer connections
- visiting lecturers
- projects
Exam schedules
The possible date and method of the exam will be announced in the course opening.
Completion alternatives
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 36 h
- independent study 32 h
Total 135 h
Assessment criteria, satisfactory (1)
Sufficient 1: The student knows the theory sufficiently and recognizes some parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement parts of data security auditing.
Satisfactory 2: The student knows the theory satisfactorily and recognizes parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement parts of data security auditing.
Assessment criteria, good (3)
Good 3: The student knows the theory well and recognizes parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement parts of data security auditing.
Very good 4: The student knows the theory very well and recognizes parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement a data security audit.
Assessment criteria, excellent (5)
Excellent 5: The student knows the theory excellently and recognizes extensively parts of auditing, penetration testing and Red Teaming. The student is able to plan and implement a data security audit.
Qualifications
Basics of linux, cyber security, data networks
Further information
The course assessment methods will be presented during the first meeting.