Skip to main content

Defensive cybersecurityLaajuus (5 cr)

Code: CS00CU79

Credits

5 op

Objective

You are able to describe methods to detect and react against cyberattacks.
You know how to implement intrusion detection systems in an information system.
You know the principles of hardening the IT system and are able to perform basic hardening procedures on an operating system.
You know how to protect critical infrastructure and ensure quick response to ongoing attacks.

Content

How do you implement countermeasures against cyberattacks?
How to harden the security of an information system ?
What are the principles of application security?
How to protect critical infrastructure?
What are the key components of detecting cyberattacks?
How to apply counter-measures based on the detected attacks?

Qualifications

Introduction to Cybersecurity, Cybersecurity of modern networks

Enrollment

04.11.2024 - 17.11.2024

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Department of Information Technology

Campus

Kotka Campus

Teaching languages
  • Finnish
Seats

15 - 40

Degree programmes
  • Master's Degree Programme in Cybersecurity (instruction in Finnish)
Teachers
  • Vesa Kankare
  • Jarkko Hänninen
Teacher in charge

Vesa Kankare

Groups
  • KTKT24SY
    Cybersecurity, master studies

Objective

You are able to describe methods to detect and react against cyberattacks.
You know how to implement intrusion detection systems in an information system.
You know the principles of hardening the IT system and are able to perform basic hardening procedures on an operating system.
You know how to protect critical infrastructure and ensure quick response to ongoing attacks.

Content

How do you implement countermeasures against cyberattacks?
How to harden the security of an information system ?
What are the principles of application security?
How to protect critical infrastructure?
What are the key components of detecting cyberattacks?
How to apply counter-measures based on the detected attacks?

Opiskelumateriaali

Lecture presentations, online resources, laboratory exercises

Yksilölliset oppimisväylät

The course is mainly completed by participating in teaching according to the schedule, whereby studies progress according to the group's schedule and at the pace of independent exercises. The theory of the topic is discussed and exercises are done together during face-to-face teaching hours. The student also has the opportunity to complete the course at an accelerated pace by studying independently and doing tasks at their own pace. The course can also be studied independently, for example, alongside work. It is advisable to discuss independent study with the responsible teacher at the start of the course. The course is distance learning via the internet and it includes a extended group assignment.

TKI ja työelämäyhteistyö

The exercises carried out in the course are based on practical solutions in working life.

Tentit ja muut määräajat

During the course, scored exercises will be carried out at the end of each topic. All required tasks must be completed by the deadline set in the course schedule. Resits are arranged with the responsible teacher.

Opiskelijan työmäärä

Achieving the learning outcomes requires 135 hours of work of which about quarter are contact lessons and laboratory exercises and the rest are self study, group work, practice exams and remote laboratory exercises

Evaluation scale

1-5

Assessment methods and criteria

Assessment is based on learning activities

Assessment criteria, good (3-4)

(a) use professional vocabulary and concepts in an expert way in different situations.
(e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.

Qualifications

Introduction to Cybersecurity, Cybersecurity of modern networks

Enrollment

06.11.2023 - 17.11.2023

Timing

15.01.2024 - 31.05.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Department of Information Technology

Campus

Kotka Campus

Teaching languages
  • Finnish
Seats

10 - 40

Degree programmes
  • Master's Degree Programme in Cybersecurity (instruction in Finnish)
Teachers
  • Vesa Kankare
  • Jarkko Hänninen
Teacher in charge

Vesa Kankare

Groups
  • KTKT23SY
    Cybersecurity, master studies

Objective

You are able to describe methods to detect and react against cyberattacks.
You know how to implement intrusion detection systems in an information system.
You know the principles of hardening the IT system and are able to perform basic hardening procedures on an operating system.
You know how to protect critical infrastructure and ensure quick response to ongoing attacks.

Content

How do you implement countermeasures against cyberattacks?
How to harden the security of an information system ?
What are the principles of application security?
How to protect critical infrastructure?
What are the key components of detecting cyberattacks?
How to apply counter-measures based on the detected attacks?

Opiskelumateriaali

Lecture presentations, online resources, laboratory exercises

Yksilölliset oppimisväylät

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Independent track:
You study the topics by yourself and execute required learning activities. You can also demonstrate the required skills via demonstration of prior learning of the topic. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

Blended track:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

TKI ja työelämäyhteistyö

-

Tentit ja muut määräajat

Retakes are arranged as needed in agreement with the responsible teacher

Opiskelijan työmäärä

Achieving the learning outcomes requires 135 hours of work of which about quarter are contact lessons and laboratory exercises and the rest are self study, group work, practice exams and remote laboratory exercises

Evaluation scale

1-5

Assessment methods and criteria

Assessment is based on learning activities

Assessment criteria, good (3-4)

(a) use professional vocabulary and concepts in an expert way in different situations.
(e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.

Qualifications

Introduction to Cybersecurity, Cybersecurity of modern networks

Enrollment

07.11.2022 - 18.11.2022

Timing

01.01.2023 - 31.05.2023

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Department of Information Technology

Campus

Kotka Campus

Teaching languages
  • Finnish
Degree programmes
  • Master's Degree Programme in Cybersecurity (instruction in English)
Teachers
  • Vesa Kankare
Teacher in charge

Vesa Kankare

Groups
  • KTKT22SY
    Cybersecurity, master studies

Objective

You are able to describe methods to detect and react against cyberattacks.
You know how to implement intrusion detection systems in an information system.
You know the principles of hardening the IT system and are able to perform basic hardening procedures on an operating system.
You know how to protect critical infrastructure and ensure quick response to ongoing attacks.

Content

How do you implement countermeasures against cyberattacks?
How to harden the security of an information system ?
What are the principles of application security?
How to protect critical infrastructure?
What are the key components of detecting cyberattacks?
How to apply counter-measures based on the detected attacks?

Opiskelumateriaali

Lecture presentations, online resources, laboratory exercises

Yksilölliset oppimisväylät

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Independent track:
You study the topics by yourself and execute required learning activities. You can also demonstrate the required skills via demonstration of prior learning of the topic. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

Blended track:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

TKI ja työelämäyhteistyö

-

Tentit ja muut määräajat

Retakes are arranged as needed in agreement with the responsible teacher

Opiskelijan työmäärä

Achieving the learning outcomes requires 135 hours of work of which about quarter are contact lessons and laboratory exercises and the rest are self study, group work, practice exams and remote laboratory exercises

Evaluation scale

1-5

Assessment methods and criteria

Assessment is based on learning activities

Assessment criteria, good (3-4)

(a) use professional vocabulary and concepts in an expert way in different situations.
(e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.

Qualifications

Introduction to Cybersecurity, Cybersecurity of modern networks

Enrollment

08.11.2021 - 21.11.2021

Timing

01.01.2022 - 02.05.2022

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Department of Information Technology

Campus

Kotka Campus

Teaching languages
  • Finnish
Seats

10 - 30

Degree programmes
  • Master's Degree Programme in Cybersecurity (instruction in Finnish)
Teachers
  • Vesa Kankare
Teacher in charge

Vesa Kankare

Groups
  • KTKT21SY
    Cybersecurity, master studies

Objective

You are able to describe methods to detect and react against cyberattacks.
You know how to implement intrusion detection systems in an information system.
You know the principles of hardening the IT system and are able to perform basic hardening procedures on an operating system.
You know how to protect critical infrastructure and ensure quick response to ongoing attacks.

Content

How do you implement countermeasures against cyberattacks?
How to harden the security of an information system ?
What are the principles of application security?
How to protect critical infrastructure?
What are the key components of detecting cyberattacks?
How to apply counter-measures based on the detected attacks?

Opiskelumateriaali

Lecture presentations, online resources, laboratory exercises

Yksilölliset oppimisväylät

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Independent track:
You study the topics by yourself and execute required learning activities. You can also demonstrate the required skills via demonstration of prior learning of the topic. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

Blended track:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

TKI ja työelämäyhteistyö

-

Tentit ja muut määräajat

Retakes are arranged as needed in agreement with the responsible teacher

Opiskelijan työmäärä

Achieving the learning outcomes requires 135 hours of work of which about quarter are contact lessons and laboratory exercises and the rest are self study, group work, practice exams and remote laboratory exercises

Evaluation scale

1-5

Assessment methods and criteria

Assessment is based on learning activities

Assessment criteria, good (3-4)

(a) use professional vocabulary and concepts in an expert way in different situations.
(e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.

Qualifications

Introduction to Cybersecurity, Cybersecurity of modern networks