Offensive Cyber SecurityLaajuus (5 cr)
Code: MS00CR16
Credits
5 op
Objective
After completing the course, the student can take an adversarial view of the organization’s own information systems and identify the attack surface. Student is able to find and exploit vulnerabilities in the system using common offensive tools. Student understands the effect the vulnerabilities have to the security of the organization’s information systems and is able to communicate it effectively to all stakeholders.
Content
- Penetration testing methods and processes
- Ethical and legal considerations
- Testing tools and techniques
- Reporting
Enrollment
02.12.2024 - 27.01.2025
Timing
27.01.2025 - 31.05.2025
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Campus
Kupittaa Campus
Teaching languages
- Finnish
Seats
10 - 36
Degree programmes
- Master of Business Administration, Cyber Security
Teachers
- Jani Ekqvist
Groups
-
YKYBTK25
-
YKYBIK25
Objective
After completing the course, the student can take an adversarial view of the organization’s own information systems and identify the attack surface. Student is able to find and exploit vulnerabilities in the system using common offensive tools. Student understands the effect the vulnerabilities have to the security of the organization’s information systems and is able to communicate it effectively to all stakeholders.
Content
- Penetration testing methods and processes
- Ethical and legal considerations
- Testing tools and techniques
- Reporting
Evaluation scale
H-5
Enrollment
02.12.2023 - 09.01.2024
Timing
08.01.2024 - 30.04.2024
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Engineering and Business
Teaching languages
- Finnish
Degree programmes
- Expert training in Cyber Security
Teachers
- Jani Ekqvist
Groups
-
OSKYBEK24Cyber Security Expert in Higher Education Administration
Objective
After completing the course, the student can take an adversarial view of the organization’s own information systems and identify the attack surface. Student is able to find and exploit vulnerabilities in the system using common offensive tools. Student understands the effect the vulnerabilities have to the security of the organization’s information systems and is able to communicate it effectively to all stakeholders.
Content
- Penetration testing methods and processes
- Ethical and legal considerations
- Testing tools and techniques
- Reporting
Evaluation scale
H-5