Defensive cybersecurity (5 cr)
Code: CS00CU79-3010
General information
- Enrollment
-
04.11.2024 - 17.11.2024
Registration for the implementation has ended.
- Timing
-
13.01.2025 - 30.04.2025
Implementation is running.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 5 cr
- Mode of delivery
- Contact learning
- Unit
- Department of Information Technology
- Campus
- Kotka Campus
- Teaching languages
- Finnish
- Seats
- 15 - 40
- Degree programmes
- Master's Degree Programme in Cybersecurity (instruction in Finnish)
- Teachers
- Vesa Kankare
- Jarkko Hänninen
- Teacher in charge
- Vesa Kankare
- Groups
-
KTKT24SYCybersecurity, master studies
- Course
- CS00CU79
Realization has 6 reservations. Total duration of reservations is 21 h 0 min.
Time | Topic | Location |
---|---|---|
Thu 16.01.2025 time 16:30 - 20:00 (3 h 30 min) |
Puolustava kyberturvallisuus CS00CU79-3010 |
Etäopetus lukujärjestyksen mukaan (Zoom)
|
Thu 30.01.2025 time 16:30 - 20:00 (3 h 30 min) |
Puolustava kyberturvallisuus CS00CU79-3010 |
Etäopetus lukujärjestyksen mukaan (Zoom)
|
Thu 13.02.2025 time 16:30 - 20:00 (3 h 30 min) |
Puolustava kyberturvallisuus CS00CU79-3010 |
Etäopetus lukujärjestyksen mukaan (Zoom)
|
Thu 20.03.2025 time 16:30 - 20:00 (3 h 30 min) |
Puolustava kyberturvallisuus CS00CU79-3010 |
Etäopetus lukujärjestyksen mukaan (Zoom)
|
Thu 03.04.2025 time 16:30 - 20:00 (3 h 30 min) |
Puolustava kyberturvallisuus CS00CU79-3010 |
Etäopetus lukujärjestyksen mukaan (Zoom)
|
Thu 08.05.2025 time 16:30 - 20:00 (3 h 30 min) |
Puolustava kyberturvallisuus CS00CU79-3010 |
Etäopetus lukujärjestyksen mukaan (Zoom)
|
Objective
You are able to describe methods to detect and react against cyberattacks.
You know how to implement intrusion detection systems in an information system.
You know the principles of hardening the IT system and are able to perform basic hardening procedures on an operating system.
You know how to protect critical infrastructure and ensure quick response to ongoing attacks.
Content
How do you implement countermeasures against cyberattacks?
How to harden the security of an information system ?
What are the principles of application security?
How to protect critical infrastructure?
What are the key components of detecting cyberattacks?
How to apply counter-measures based on the detected attacks?
Course material
Lecture presentations, online resources, laboratory exercises
Study forms and methods
The course is mainly completed by participating in teaching according to the schedule, whereby studies progress according to the group's schedule and at the pace of independent exercises. The theory of the topic is discussed and exercises are done together during face-to-face teaching hours. The student also has the opportunity to complete the course at an accelerated pace by studying independently and doing tasks at their own pace. The course can also be studied independently, for example, alongside work. It is advisable to discuss independent study with the responsible teacher at the start of the course. The course is distance learning via the internet and it includes a extended group assignment.
RDI and work-related cooperation
The exercises carried out in the course are based on practical solutions in working life.
Timing of exams and assignments
During the course, scored exercises will be carried out at the end of each topic. All required tasks must be completed by the deadline set in the course schedule. Resits are arranged with the responsible teacher.
Student workload
Achieving the learning outcomes requires 135 hours of work of which about quarter are contact lessons and laboratory exercises and the rest are self study, group work, practice exams and remote laboratory exercises
Evaluation scale
1-5
Assessment methods and criteria
Assessment is based on learning activities
Assessment criteria, good (3-4)
(a) use professional vocabulary and concepts in an expert way in different situations.
(e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.
Qualifications
Introduction to Cybersecurity, Cybersecurity of modern networks