Skip to main content

Cybersecurity 2 - Environments and hardening (5 cr)

Code: TT00CG62-3001

General information


Enrollment
01.05.2025 - 30.09.2025
Registration for the implementation has begun.
Timing
01.08.2025 - 31.12.2025
The implementation has not yet started.
Number of ECTS credits allocated
5 cr
Local portion
5 cr
Mode of delivery
Contact learning
Unit
Teknologia
Teaching languages
Finnish
Degree programmes
Bachelor’s Degree in Information and Communication Technology
Teachers
Jussi Ala-Hiiro
Riku Ahoniemi
Groups
TTV23SRAA
TTV23SRAA
Course
TT00CG62

Realization has 9 reservations. Total duration of reservations is 68 h 0 min.

Time Topic Location
Wed 27.08.2025 time 08:00 - 16:00
(8 h 0 min)
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001
Teams opetus
Thu 04.09.2025 time 08:30 - 16:00
(7 h 30 min)
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001
Teams opetus
Thu 11.09.2025 time 08:30 - 16:00
(7 h 30 min)
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001
Teams opetus
Thu 18.09.2025 time 08:30 - 16:00
(7 h 30 min)
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001
Teams opetus
Thu 25.09.2025 time 08:30 - 16:00
(7 h 30 min)
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001
Teams opetus
Thu 02.10.2025 time 08:30 - 16:00
(7 h 30 min)
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001
Teams opetus
Thu 09.10.2025 time 08:30 - 16:00
(7 h 30 min)
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001
Teams opetus
Thu 23.10.2025 time 08:30 - 16:00
(7 h 30 min)
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001
Teams opetus
Fri 24.10.2025 time 08:30 - 16:00
(7 h 30 min)
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001
Teams opetus
Changes to reservations may be possible.

Objective

Student:
- Knows and applies most vital system cyber security controls
- Succeeds in hardening the system in laboratory tasks
- Succeeds in documenting the hardening of the target system and re-evaluates hardening/patching effects to the system

Content

Data and cyber security controls of systems
Data system vulnerability search and hardening/patching of the system
Laboratory tasks
Documentation of the hardening process and re-evaluation of the hardening/patching effects

Materials

Material distributed at the course, network sources, govermental sources, online learning system

Evaluation scale

0 - 5

Assessment criteria, excellent (5)

The student knows and handles essential security controls of systems in excellent level, knows how to execute system vulnerability scans and hardening related laboratory tasks in excellent level, knows how to document system hardening and re-evaluate and test hardened system security in excellent level.

Assessment criteria, good (3)

The student knows and handles essential security controls of systems in good level, knows how to execute system vulnerability scans and hardening related laboratory tasks in good level, knows how to document system hardening and re-evaluate and test hardened system security in good level.

Assessment criteria, satisfactory (1)

The student knows and handles essential security controls of systems in satisfactory level, knows how to execute system vulnerability scans and hardening related laboratory tasks in satisfactory level, knows how to document system hardening and re-evaluate and test hardened system security in satisfactory level.

Assessment criteria, approved/failed

The student knows and handles essential security controls of systems, knows how to execute system vulnerability scans and hardening related laboratory tasks, knows how to document system hardening and re-evaluate and test hardened system security in level which is sufficient to pass sequeling courses with approved marks.

Prerequisites

Cyber security 1 - Attack surfaces and vectors 5 cr

Objective

Student:
- Knows and applies most vital system cyber security controls
- Succeeds in hardening the system in laboratory tasks
- Succeeds in documenting the hardening of the target system and re-evaluates hardening/patching effects to the system

Execution methods

Contact and/or remote teaching, online studies, independent studies

Accomplishment methods

Participation to contact or remote studies or other activities
Course practice work and/or exam

Content

Data and cyber security controls of systems
Data system vulnerability search and hardening/patching of the system
Laboratory tasks
Documentation of the hardening process and re-evaluation of the hardening/patching effects

Qualifications

Cyber security 1 - Attack surfaces and vectors 5 cr

Go back to top of page