Skip to main content

Offensive Cyber SecurityLaajuus (5 cr)

Code: MS00CR16

Credits

5 op

Objective

After completing the course, the student can take an adversarial view of the organization’s own information systems and identify the attack surface. Student is able to find and exploit vulnerabilities in the system using common offensive tools. Student understands the effect the vulnerabilities have to the security of the organization’s information systems and is able to communicate it effectively to all stakeholders.

Content

- Penetration testing methods and processes
- Ethical and legal considerations
- Testing tools and techniques
- Reporting

Enrollment

02.12.2024 - 27.01.2025

Timing

27.01.2025 - 31.05.2025

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Campus

Kupittaa Campus

Teaching languages
  • Finnish
Seats

10 - 36

Degree programmes
  • Master of Business Administration, Cyber Security
Teachers
  • Jani Ekqvist
Groups
  • YKYBTK25
  • YKYBIK25

Objective

After completing the course, the student can take an adversarial view of the organization’s own information systems and identify the attack surface. Student is able to find and exploit vulnerabilities in the system using common offensive tools. Student understands the effect the vulnerabilities have to the security of the organization’s information systems and is able to communicate it effectively to all stakeholders.

Content

- Penetration testing methods and processes
- Ethical and legal considerations
- Testing tools and techniques
- Reporting

Materials

We are using the TryHackMe.com training platform in addition to ItsLearning. Licenses for the duration of the course will be provided.

Exam schedules

Mandatory Practical exam is early April, with retake chance in April.

Completion alternatives

-

Student workload

Lectures 8h
Laboratory assignments 42h
Exam and preparations 10h
Testing project 75h

Content scheduling

Course begins with introductory lecture. In laboratory exercises student learns to use the tools of trade. Finally, students perform a penetration testing engagement and report the results.

Further information

All communication will be through ItsLearning

Evaluation scale

H-5

Assessment methods and criteria

Project report determines the grade. At least 3 successfully tested machines must be reported following the reporting requirements to get 1. Each successfully tested and reported machine above that will increase grade by 1. Incomplete reporting will lower the grade.
Exam is mandatory to pass. Getting 5 in exam increases overall grade by 1.
Laboratory assignments: returning at least 90% of the graded assignments will increase overall grade by 1.

Assessment criteria, fail (0)

Student is unable to perform and report a penetration testing engagement independently.

Assessment criteria, satisfactory (1-2)

Student understands the basics of penetration testing and is able to perform a penetration test against a web application independently. Student can write an understandable and actionable report about the test results.

Assessment criteria, good (3-4)

Student has a good grasp of information security testing methodologies and tools. Student can independently test various types of internet connected applications. Student can write an understandable and actionable report about the test results that contains guidance for both the management and the developers responsible for the application.

Assessment criteria, excellent (5)

Student has knowledge and is able to select the best suited tool and methodology for the engagement. Student can independently test most types of internet connected applications. Student can write a clear, concise and actionable report about the test results that effectively guides management decisions and provides the software developers with detailed guidance on both fixing to found issues and methods for avoiding similar issues in the future.

Enrollment

02.12.2023 - 09.01.2024

Timing

08.01.2024 - 30.04.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Engineering and Business

Teaching languages
  • Finnish
Degree programmes
  • Expert training in Cyber Security
Teachers
  • Jani Ekqvist
Groups
  • OSKYBEK24
    Cyber Security Expert in Higher Education Administration

Objective

After completing the course, the student can take an adversarial view of the organization’s own information systems and identify the attack surface. Student is able to find and exploit vulnerabilities in the system using common offensive tools. Student understands the effect the vulnerabilities have to the security of the organization’s information systems and is able to communicate it effectively to all stakeholders.

Content

- Penetration testing methods and processes
- Ethical and legal considerations
- Testing tools and techniques
- Reporting

Evaluation scale

H-5