Skip to main content

Cybersecurity 1 - Attack surfaces and proceduresLaajuus (5 cr)

Code: TT00CG61

Credits

5 op

Objective

The student:
- Knows the attack surfaces and vectors and the parties which affect to them
- Knows the usage principles of attack software and hardware
- Successfully produces laboratory tasks such as penetration testing and attack vector scans
- Knows ost important interfaces
- Successfully plans counteractions to cyber attacks

Content

Introduction to attack surfaces and vectors and the parties involved
The use of attack and scanning tools and the principles related
Finding vulnerabilities and the data sources related to them
Basics of interfaces
Countermeasures
Laboratory work

Materials

Material distributed at the course, network sources, govermental sources, online learning system

Assessment criteria, excellent (5)

The student knows attack surfaces and vectors and the parties involved in excellent level. The student knows the basics of attack software and hardware in excellent level. The student produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces in excellent level. The student can plan versatile counteractions to attacks.

Assessment criteria, good (3)

The student knows attack surfaces and vectors and the parties involved in good level. The student knows the basics of attack software and hardware in good level. The student produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces in good level. The student can plan some counteractions to attacks.

Assessment criteria, satisfactory (1)

The student knows attack surfaces and vectors and the parties involved in satisfactory level. The student knows the basics of attack software and hardware in satisfactory level. The student produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces in satisfactory level. The student can plan basic counteraction to attacks.

Assessment criteria, approved/failed

The student knows attack surfaces and vectors and the parties involved, knows the basics of attack software and hardware, produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces and can plan basic counteraction to attacks such as the student can pass the sequeling courses with approved marks.

en
Enrollment

19.08.2024 - 22.09.2024

Timing

01.08.2024 - 31.12.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Teknologia

Teaching languages
  • Finnish
Degree programmes
  • Bachelor’s Degree in Information and Communication Technology
Teachers
  • Eero Huusko
Groups
  • TTV23SRAA
    TTV23SRAA

Objective

The student:
- Knows the attack surfaces and vectors and the parties which affect to them
- Knows the usage principles of attack software and hardware
- Successfully produces laboratory tasks such as penetration testing and attack vector scans
- Knows ost important interfaces
- Successfully plans counteractions to cyber attacks

Content

Introduction to attack surfaces and vectors and the parties involved
The use of attack and scanning tools and the principles related
Finding vulnerabilities and the data sources related to them
Basics of interfaces
Countermeasures
Laboratory work

Materials

Material distributed at the course, network sources, govermental sources, online learning system

Evaluation scale

0 - 5

Assessment criteria, excellent (5)

The student knows attack surfaces and vectors and the parties involved in excellent level. The student knows the basics of attack software and hardware in excellent level. The student produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces in excellent level. The student can plan versatile counteractions to attacks.

Assessment criteria, good (3)

The student knows attack surfaces and vectors and the parties involved in good level. The student knows the basics of attack software and hardware in good level. The student produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces in good level. The student can plan some counteractions to attacks.

Assessment criteria, satisfactory (1)

The student knows attack surfaces and vectors and the parties involved in satisfactory level. The student knows the basics of attack software and hardware in satisfactory level. The student produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces in satisfactory level. The student can plan basic counteraction to attacks.

Assessment criteria, approved/failed

The student knows attack surfaces and vectors and the parties involved, knows the basics of attack software and hardware, produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces and can plan basic counteraction to attacks such as the student can pass the sequeling courses with approved marks.

Prerequisites

Basics of data and cyber security 5 cr