Cybersecurity 1 - Attack surfaces and procedures (5 cr)
Code: TT00CG61-3001
General information
Enrollment
19.08.2024 - 22.09.2024
Timing
01.08.2024 - 31.12.2024
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Teknologia
Teaching languages
- Finnish
Degree programmes
- Bachelor’s Degree in Information and Communication Technology
Teachers
- Eero Huusko
Groups
-
TTV23SRAATTV23SRAA
- 03.09.2024 09:00 - 15:45, Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001
- 10.09.2024 12:30 - 15:45, Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001
- 17.09.2024 12:30 - 15:45, Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001
- 24.09.2024 12:30 - 15:45, Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001
- 01.10.2024 12:30 - 15:45, Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001
- 08.10.2024 12:30 - 15:45, Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001
- 22.10.2024 12:30 - 15:45, Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001
- 29.10.2024 08:15 - 11:30, Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001
- 05.11.2024 08:15 - 11:30, Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001
- 12.11.2024 08:15 - 11:30, Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001
- 19.11.2024 08:15 - 11:30, Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001
- 26.11.2024 08:15 - 11:30, Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001
- 03.12.2024 08:15 - 11:30, Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001
Objective
The student:
- Knows the attack surfaces and vectors and the parties which affect to them
- Knows the usage principles of attack software and hardware
- Successfully produces laboratory tasks such as penetration testing and attack vector scans
- Knows ost important interfaces
- Successfully plans counteractions to cyber attacks
Content
Introduction to attack surfaces and vectors and the parties involved
The use of attack and scanning tools and the principles related
Finding vulnerabilities and the data sources related to them
Basics of interfaces
Countermeasures
Laboratory work
Materials
Material distributed at the course, network sources, govermental sources, online learning system
Evaluation scale
0 - 5
Assessment criteria, excellent (5)
The student knows attack surfaces and vectors and the parties involved in excellent level. The student knows the basics of attack software and hardware in excellent level. The student produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces in excellent level. The student can plan versatile counteractions to attacks.
Assessment criteria, good (3)
The student knows attack surfaces and vectors and the parties involved in good level. The student knows the basics of attack software and hardware in good level. The student produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces in good level. The student can plan some counteractions to attacks.
Assessment criteria, satisfactory (1)
The student knows attack surfaces and vectors and the parties involved in satisfactory level. The student knows the basics of attack software and hardware in satisfactory level. The student produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces in satisfactory level. The student can plan basic counteraction to attacks.
Assessment criteria, approved/failed
The student knows attack surfaces and vectors and the parties involved, knows the basics of attack software and hardware, produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces and can plan basic counteraction to attacks such as the student can pass the sequeling courses with approved marks.
Prerequisites
Basics of data and cyber security 5 cr