Defensive cybersecurity (5 cr)
Code: CS00CU79-3009
General information
Enrollment
06.11.2023 - 17.11.2023
Timing
15.01.2024 - 31.05.2024
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Department of Information Technology
Campus
Kotka Campus
Teaching languages
- Finnish
Seats
10 - 40
Degree programmes
- Master's Degree Programme in Cybersecurity (instruction in Finnish)
Teachers
- Vesa Kankare
- Jarkko Hänninen
Teacher in charge
Vesa Kankare
Groups
-
KTKT23SYCybersecurity, master studies
- 18.01.2024 16:30 - 20:00, Puolustava kyberturvallisuus CS00CU79-3009
- 08.02.2024 16:30 - 20:00, Puolustava kyberturvallisuus CS00CU79-3009
- 14.03.2024 16:30 - 20:00, Puolustava kyberturvallisuus CS00CU79-3009
- 04.04.2024 16:30 - 20:00, Puolustava kyberturvallisuus CS00CU79-3009
- 18.04.2024 16:30 - 20:00, Puolustava kyberturvallisuus CS00CU79-3009
- 02.05.2024 16:30 - 20:00, Puolustava kyberturvallisuus CS00CU79-3009
Objective
You are able to describe methods to detect and react against cyberattacks.
You know how to implement intrusion detection systems in an information system.
You know the principles of hardening the IT system and are able to perform basic hardening procedures on an operating system.
You know how to protect critical infrastructure and ensure quick response to ongoing attacks.
Content
How do you implement countermeasures against cyberattacks?
How to harden the security of an information system ?
What are the principles of application security?
How to protect critical infrastructure?
What are the key components of detecting cyberattacks?
How to apply counter-measures based on the detected attacks?
Opiskelumateriaali
Lecture presentations, online resources, laboratory exercises
Yksilölliset oppimisväylät
Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.
Independent track:
You study the topics by yourself and execute required learning activities. You can also demonstrate the required skills via demonstration of prior learning of the topic. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.
Blended track:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.
TKI ja työelämäyhteistyö
-
Tentit ja muut määräajat
Retakes are arranged as needed in agreement with the responsible teacher
Opiskelijan työmäärä
Achieving the learning outcomes requires 135 hours of work of which about quarter are contact lessons and laboratory exercises and the rest are self study, group work, practice exams and remote laboratory exercises
Evaluation scale
1-5
Assessment methods and criteria
Assessment is based on learning activities
Assessment criteria, good (3-4)
(a) use professional vocabulary and concepts in an expert way in different situations.
(e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.
Qualifications
Introduction to Cybersecurity, Cybersecurity of modern networks