Skip to main content

Offensive Cyber SecurityLaajuus (5 cr)

Code: MS00CR16

Credits

5 op

Objective

After completing the course, the student can take an adversarial view of the organization’s own information systems and identify the attack surface. Student is able to find and exploit vulnerabilities in the system using common offensive tools. Student understands the effect the vulnerabilities have to the security of the organization’s information systems and is able to communicate it effectively to all stakeholders.

Content

- Penetration testing methods and processes
- Ethical and legal considerations
- Testing tools and techniques
- Reporting

Enrollment

02.12.2024 - 27.01.2025

Timing

27.01.2025 - 31.05.2025

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Campus

Kupittaa Campus

Teaching languages
  • Finnish
Seats

10 - 36

Degree programmes
  • Master of Business Administration, Cyber Security
Teachers
  • Jani Ekqvist
Groups
  • YKYBTK25
  • YKYBIK25

Objective

After completing the course, the student can take an adversarial view of the organization’s own information systems and identify the attack surface. Student is able to find and exploit vulnerabilities in the system using common offensive tools. Student understands the effect the vulnerabilities have to the security of the organization’s information systems and is able to communicate it effectively to all stakeholders.

Content

- Penetration testing methods and processes
- Ethical and legal considerations
- Testing tools and techniques
- Reporting

Evaluation scale

H-5

Enrollment

02.12.2023 - 09.01.2024

Timing

08.01.2024 - 30.04.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Engineering and Business

Teaching languages
  • Finnish
Degree programmes
  • Expert training in Cyber Security
Teachers
  • Jani Ekqvist
Groups
  • OSKYBEK24
    Cyber Security Expert in Higher Education Administration

Objective

After completing the course, the student can take an adversarial view of the organization’s own information systems and identify the attack surface. Student is able to find and exploit vulnerabilities in the system using common offensive tools. Student understands the effect the vulnerabilities have to the security of the organization’s information systems and is able to communicate it effectively to all stakeholders.

Content

- Penetration testing methods and processes
- Ethical and legal considerations
- Testing tools and techniques
- Reporting

Evaluation scale

H-5