Skip to main content

Defensive cybersecurity (5cr)

Code: CS00CU79-3001

General information


Enrollment
29.09.2017 - 13.10.2017
Registration for the implementation has ended.
Timing
01.01.2018 - 29.04.2018
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
5 cr
RDI portion
2 cr
Mode of delivery
Contact learning
Unit
Department of Information Technology
Campus
Kotka Campus
Teaching languages
Finnish
Seats
16 - 30
Degree programmes
Master's Degree Programme in Cybersecurity (instruction in English)
Teachers
Vesa Kankare
Teacher in charge
Vesa Kankare
Groups
CSKT17SY
Cybersecurity, master studies
Course
CS00CU79

Unfortunately, no reservations were found for the realization Defensive cybersecurity CS00CU79-3001. It's possible that the reservations have not yet been published or that the realization is intended to be completed independently.

Objective

You are able to describe methods to detect and react against cyberattacks.
You know how to implement intrusion detection systems in an information system.
You know the principles of hardening the IT system and are able to perform basic hardening procedures on an operating system.
You know how to protect critical infrastructure and ensure quick response to ongoing attacks.

Content

How do you implement countermeasures against cyberattacks?
How to harden the security of an information system ?
What are the principles of application security?
How to protect critical infrastructure?
What are the key components of detecting cyberattacks?
How to apply counter-measures based on the detected attacks?

Evaluation

Students are able to
a. use professional vocabulary and concepts in an expert way in different situations.
e. choose appropriate models, methods, software and techniques according to the purpose and justify these choices.

Course material

Lecture presentations, online resources, laboratory exercises

Study forms and methods

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Independent track:
If you are working in a company, organization or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practice. You must show your skills via a demonstration, which is determined based on learning objectives.

Blended track:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills

Student workload

Achieving the learning outcomes requires 135 hours of work of which about quarter are contact lessons and laboratory exercises and the rest are self study, practice exams and remote laboratory exercises

Evaluation scale

1-5

Assessment methods and criteria

Assessment is based on learning diary and learning activities

Assessment criteria, good (3-4)

(a) use professional vocabulary and concepts in an expert way in different situations.
(e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.

Qualifications

Introduction to Cybersecurity, Cybersecurity of modern networks

Go back to top of page