Cybersecurity 1 - Attack surfaces and procedures (5 cr)
Code: TT00CG61-3001
General information
- Enrollment
-
19.08.2024 - 22.09.2024
Registration for the implementation has ended.
- Timing
-
01.08.2024 - 31.12.2024
Implementation has ended.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 5 cr
- Mode of delivery
- Contact learning
- Unit
- Teknologia
- Teaching languages
- Finnish
- Degree programmes
- Bachelor’s Degree in Information and Communication Technology
Realization has 13 reservations. Total duration of reservations is 45 h 45 min.
Time | Topic | Location |
---|---|---|
Tue 03.09.2024 time 09:00 - 15:45 (6 h 45 min) |
Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001 |
Lähiopetus Raaahessa
|
Tue 10.09.2024 time 12:30 - 15:45 (3 h 15 min) |
Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001 |
Teams opetus
|
Tue 17.09.2024 time 12:30 - 15:45 (3 h 15 min) |
Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001 |
Teams opetus
|
Tue 24.09.2024 time 12:30 - 15:45 (3 h 15 min) |
Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001 |
Teams opetus
|
Tue 01.10.2024 time 12:30 - 15:45 (3 h 15 min) |
Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001 |
Teams opetus
|
Tue 08.10.2024 time 12:30 - 15:45 (3 h 15 min) |
Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001 |
Teams opetus
|
Tue 22.10.2024 time 12:30 - 15:45 (3 h 15 min) |
Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001 |
Teams opetus
|
Tue 29.10.2024 time 08:15 - 11:30 (3 h 15 min) |
Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001 |
Teams opetus
|
Tue 05.11.2024 time 08:15 - 11:30 (3 h 15 min) |
Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001 |
Teams opetus
|
Tue 12.11.2024 time 08:15 - 11:30 (3 h 15 min) |
Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001 |
Teams opetus
|
Tue 19.11.2024 time 08:15 - 11:30 (3 h 15 min) |
Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001 |
Teams opetus
|
Tue 26.11.2024 time 08:15 - 11:30 (3 h 15 min) |
Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001 |
Teams opetus
|
Tue 03.12.2024 time 08:15 - 11:30 (3 h 15 min) |
Kyberturvallisuus 1 - Hyökkäyspinnat ja -menetelmät TT00CG61-3001 |
Teams opetus
|
Objective
The student:
- Knows the attack surfaces and vectors and the parties which affect to them
- Knows the usage principles of attack software and hardware
- Successfully produces laboratory tasks such as penetration testing and attack vector scans
- Knows ost important interfaces
- Successfully plans counteractions to cyber attacks
Content
Introduction to attack surfaces and vectors and the parties involved
The use of attack and scanning tools and the principles related
Finding vulnerabilities and the data sources related to them
Basics of interfaces
Countermeasures
Laboratory work
Materials
Material distributed at the course, network sources, govermental sources, online learning system
Evaluation scale
0 - 5
Assessment criteria, excellent (5)
The student knows attack surfaces and vectors and the parties involved in excellent level. The student knows the basics of attack software and hardware in excellent level. The student produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces in excellent level. The student can plan versatile counteractions to attacks.
Assessment criteria, good (3)
The student knows attack surfaces and vectors and the parties involved in good level. The student knows the basics of attack software and hardware in good level. The student produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces in good level. The student can plan some counteractions to attacks.
Assessment criteria, satisfactory (1)
The student knows attack surfaces and vectors and the parties involved in satisfactory level. The student knows the basics of attack software and hardware in satisfactory level. The student produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces in satisfactory level. The student can plan basic counteraction to attacks.
Assessment criteria, approved/failed
The student knows attack surfaces and vectors and the parties involved, knows the basics of attack software and hardware, produces laboratory assignments such as penetration testing and attack vector scans and knows most relevant interfaces and can plan basic counteraction to attacks such as the student can pass the sequeling courses with approved marks.
Prerequisites
Basics of data and cyber security 5 cr