Cybersecurity 2 - Environments and hardening (5 cr)
Code: TT00CG62-3001
General information
- Enrollment
-
01.05.2025 - 30.09.2025
Registration for the implementation has begun.
- Timing
-
01.08.2025 - 31.12.2025
The implementation has not yet started.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 5 cr
- Mode of delivery
- Contact learning
- Unit
- Teknologia
- Teaching languages
- Finnish
- Degree programmes
- Bachelor’s Degree in Information and Communication Technology
Realization has 9 reservations. Total duration of reservations is 68 h 0 min.
Time | Topic | Location |
---|---|---|
Wed 27.08.2025 time 08:00 - 16:00 (8 h 0 min) |
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001 |
Teams opetus
|
Thu 04.09.2025 time 08:30 - 16:00 (7 h 30 min) |
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001 |
Teams opetus
|
Thu 11.09.2025 time 08:30 - 16:00 (7 h 30 min) |
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001 |
Teams opetus
|
Thu 18.09.2025 time 08:30 - 16:00 (7 h 30 min) |
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001 |
Teams opetus
|
Thu 25.09.2025 time 08:30 - 16:00 (7 h 30 min) |
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001 |
Teams opetus
|
Thu 02.10.2025 time 08:30 - 16:00 (7 h 30 min) |
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001 |
Teams opetus
|
Thu 09.10.2025 time 08:30 - 16:00 (7 h 30 min) |
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001 |
Teams opetus
|
Thu 23.10.2025 time 08:30 - 16:00 (7 h 30 min) |
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001 |
Teams opetus
|
Fri 24.10.2025 time 08:30 - 16:00 (7 h 30 min) |
Kyberturvallisuus 2 - Ympäristöt ja koventaminen TT00CG62-3001 |
Teams opetus
|
Objective
Student:
- Knows and applies most vital system cyber security controls
- Succeeds in hardening the system in laboratory tasks
- Succeeds in documenting the hardening of the target system and re-evaluates hardening/patching effects to the system
Content
Data and cyber security controls of systems
Data system vulnerability search and hardening/patching of the system
Laboratory tasks
Documentation of the hardening process and re-evaluation of the hardening/patching effects
Materials
Material distributed at the course, network sources, govermental sources, online learning system
Evaluation scale
0 - 5
Assessment criteria, excellent (5)
The student knows and handles essential security controls of systems in excellent level, knows how to execute system vulnerability scans and hardening related laboratory tasks in excellent level, knows how to document system hardening and re-evaluate and test hardened system security in excellent level.
Assessment criteria, good (3)
The student knows and handles essential security controls of systems in good level, knows how to execute system vulnerability scans and hardening related laboratory tasks in good level, knows how to document system hardening and re-evaluate and test hardened system security in good level.
Assessment criteria, satisfactory (1)
The student knows and handles essential security controls of systems in satisfactory level, knows how to execute system vulnerability scans and hardening related laboratory tasks in satisfactory level, knows how to document system hardening and re-evaluate and test hardened system security in satisfactory level.
Assessment criteria, approved/failed
The student knows and handles essential security controls of systems, knows how to execute system vulnerability scans and hardening related laboratory tasks, knows how to document system hardening and re-evaluate and test hardened system security in level which is sufficient to pass sequeling courses with approved marks.
Prerequisites
Cyber security 1 - Attack surfaces and vectors 5 cr
Objective
Student:
- Knows and applies most vital system cyber security controls
- Succeeds in hardening the system in laboratory tasks
- Succeeds in documenting the hardening of the target system and re-evaluates hardening/patching effects to the system
Execution methods
Contact and/or remote teaching, online studies, independent studies
Accomplishment methods
Participation to contact or remote studies or other activities
Course practice work and/or exam
Content
Data and cyber security controls of systems
Data system vulnerability search and hardening/patching of the system
Laboratory tasks
Documentation of the hardening process and re-evaluation of the hardening/patching effects
Qualifications
Cyber security 1 - Attack surfaces and vectors 5 cr