Siirry suoraan sisältöön

Cyber Security Implementation in Practice (5op)

Toteutuksen tunnus: YI00CH04-3002

Toteutuksen perustiedot


Ilmoittautumisaika
17.11.2025 - 08.01.2026
Ilmoittautuminen toteutukselle on käynnissä.
Ajoitus
12.01.2026 - 30.04.2026
Toteutus ei ole vielä alkanut.
Opintopistemäärä
5 op
Lähiosuus
5 op
Toteutustapa
Lähiopetus
Yksikkö
Teknologiayksikkö
Opetuskielet
englanti
Paikat
0 - 35
Koulutus
Master's Degree Programme in Information Technology, Cyber Security
Opettajat
Erno Vienonen
Ryhmät
YTC25S1
Master of Engineering, Degree Programme in Cyber Security
Opintojakso
YI00CH04

Toteutuksella on 6 opetustapahtumaa joiden yhteenlaskettu kesto on 33 t 0 min.

Aika Aihe Tila
Pe 23.01.2026 klo 15:00 - 20:00
(5 t 0 min)
Cyber Security Implementation in Practice YI00CH04-3002
P2_D331 Tietoverkkolaboratorio
La 24.01.2026 klo 09:00 - 15:00
(6 t 0 min)
Cyber Security Implementation in Practice YI00CH04-3002
P2_D331 Tietoverkkolaboratorio
Pe 20.02.2026 klo 15:00 - 20:00
(5 t 0 min)
Cyber Security Implementation in Practice YI00CH04-3002
P2_D426 Mediatekniikka
La 21.02.2026 klo 09:00 - 15:00
(6 t 0 min)
Cyber Security Implementation in Practice YI00CH04-3002
P2_D426 Mediatekniikka
Pe 27.03.2026 klo 15:00 - 20:00
(5 t 0 min)
Cyber Security Implementation in Practice YI00CH04-3002
P2_D426 Mediatekniikka
La 28.03.2026 klo 09:00 - 15:00
(6 t 0 min)
Cyber Security Implementation in Practice YI00CH04-3002
P2_D426 Mediatekniikka
Muutokset varauksiin voivat olla mahdollisia.

Arviointiasteikko

0-5

Tavoitteet

The students learn how to harden a technical environment before a cyber incident has happened. Different technical controls are learnt to minimize the risk of a future cyber incident. Students learn how to utilize information related to cyber threats, e.g. Indicators of Compromise, to further enhance the security of their technical environment.

Main topics are updated each year, but mainly they correlate and draw inspiration from e.g. CIS Critical Security Controls and other related public recommendations. The students learn to implement these technical controls based on the recommendations.

Course Competences
EUR-ACE: Engineering Design, Master's Degree
EUR-ACE: Engineering Analysis, Master's Degree
EUR-ACE: Engineering Practice, Master's Degree

Sisältö

The key topics of the course are:

- Cyber Threats
- Malware Defences
- Asset Inventory and Management
- Hardening Operating System and Network Devices
- User authentication & authorization
- Boundary Defence
- Maintenance, monitoring and analysis of security audit logs
- Cyber Security Incident Handling
- Defence Strategies & Tactics

Oppimateriaalit

Verkko-oppimisympäristössä julkaistava sähköinen materiaali.

Opetusmenetelmät

- luennot
- itseopiskelu
- verkko-opinnot
- webinaarit
- pienryhmätyöskentely
- harjoitustyöt
- oppimistehtävät
- seminaarit

Harjoittelu- ja työelämäyhteistyö

- vierailijaluennot
- projektit

Tenttien ajankohdat ja uusintamahdollisuudet

Mahdollinen tentin ajankohta ja toteutustapa ilmoitetaan opintojakson ensimmäisellä kerralla.

Toteutuksen valinnaiset suoritustavat

Hyväksilukemisen menettelytavat kuvataan tutkintosäännössä ja opinto-oppaassa. Opintojakson opettaja antaa lisätietoa mahdollisista opintojakson erityiskäytänteistä.

Opiskelijan ajankäyttö ja kuormitus

Yksi opintopiste (1 op) tarkoittaa keskimäärin 27 tunnin työtä.

- luennot 52 h
- harjoitustyöt 15 h
- tehtävät 35 h
- itsenäinen työskentely 30 h
- yritysvierailut 3 h
Yhteensä 135 h

Arviointikriteerit, tyydyttävä (1)

Sufficient 1: The student demonstrates sufficient mastery of the practical implementations of cyber security and is able to analyze an enterprises existing state of implementations concerning cyber security. The student has satisfactory understanding of an enterprises technical cyber threats and risks that are formulated related to context. The student is able to design a satisfactory technical implementation to control cyber security based on given requirement definition. The student reflects on his (her) own learning sufficiently.

Satisfactory 2: The student demonstrates satisfactory mastery of the practical implementations of cyber security and is able to analyze an enterprises existing state of implementations concerning cyber security. The student understands an enterprises technical cyber threats and risks that are formulated related to context. The student is able to design a satisfactory technical implementation to control cyber security based on given requirement definition. The student reflects on his (her) own learning.

Arviointikriteerit, hyvä (3)

Good 3: The student demonstrates good mastery of the practical implementations of cyber security and is able to analyze an enterprises existing state of implementations concerning cyber security. The student understands well an enterprises the technical cyber threats and risks that are formulated related to context. The student is able to design a technical implementation to control cyber security based on given requirement definition. The student reflects on his (her) own learning well.

Very Good 4: The student demonstrates very good mastery of the practical implementations of cyber security and is able to analyze an enterprises existing state of implementations concerning cyber security. The student understands very well an enterprises technical cyber threats and risks that are formulated related to context. The student is able to design a good technical implementation to control cyber security based on given requirement definition. The student reflects on his (her) own learning very well.

Arviointikriteerit, kiitettävä (5)

Excellent 5: The student demonstrates excellent mastery of the practical implementations of cyber security and is able to analyze an enterprises existing state of implementations concerning cyber security. The student understands excellently enterprises technical cyber threats and risks that are formulated related to context. The student is able to design an excellent technical implementation to control cyber security based on given requirement definition. The student reflects on his (her) own learning commendably.

Esitietovaatimukset

Recommended: Modern Management of IT

Lisätiedot

Jos kurssilla tehdään ryhmätöitä, ne vertaisarvioidaan.

Siirry alkuun