Skip to main content

Cyber security essentials - DWBL (5 cr)

Code: TT00BZ76-3002

General information


Enrollment
02.12.2020 - 31.12.2020
Registration for the implementation has ended.
Timing
01.01.2021 - 21.03.2021
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
5 cr
Mode of delivery
Contact learning
Unit
Teknologia
Teaching languages
English
Finnish
Degree programmes
Bachelor’s Degree in Information and Communication Technology
Teachers
Jarkko Tolonen
Course
TT00BZ76
No reservations found for realization TT00BZ76-3002!

Objective

Cyber security threats are constantly present in today’s world. Network infrastructure is vulnerable to various cyber attacks. This course contains essential information about the cyber world focusing especially on the servers and networks.

Learning outcomes:
1. Brute Force
2. Setting up a secure server
3. Setting up a web site with certificates
4. Testing WLAN-network’s vulnerability
5. Honeypot
6. Wireshark and insecure website

Content

A world of Experts and Criminals
The Cyber security Cube
Cyber security threats, vulnerabilities and attacks
The Art of Protecting secrets
The art of ensuring integrity
The five nines concept
Protecting a cyber security domain
Becoming a cyber security specialist

Evaluation scale

0 - 5

Objective

Cyber security threats are constantly present in today’s world. Network infrastructure is vulnerable to various cyber attacks. This course contains essential information about the cyber world focusing especially on the servers and networks.

Learning outcomes:
1. Brute Force
2. Setting up a secure server
3. Setting up a web site with certificates
4. Testing WLAN-network’s vulnerability
5. Honeypot
6. Wireshark and insecure website

Execution methods

Online

Accomplishment methods

Online

Content

A world of Experts and Criminals
The Cyber security Cube
Cyber security threats, vulnerabilities and attacks
The Art of Protecting secrets
The art of ensuring integrity
The five nines concept
Protecting a cyber security domain
Becoming a cyber security specialist

Go back to top of page