Skip to main content

Cyber Threat IntelligenceLaajuus (5 cr)

Code: MS00CR18

Credits

5 op

Objective

Students are expected to broaden their knowledge of different ways to utilise cyber threat intelligence information (CTI), especially from the defenders’ viewpoint. Students conduct and perform data analysis on various cyber threat intel datasets gathered from different sources. Students will also design and implement customised datasets and information models for more efficient cyber threat contextualisation in various sectors.
The course is intended to stimulate the students' creativity, critical thinking, and threat assessment by engaging in the analysis of short-term and long-term, real-life cyber threats.
This course focuses on the correlation of information regarding threat-related data and metadata to assist in decision-making. The emphasis will be on proactive preparedness for and anticipation of potential threats to organisations

Content

COMPETENCES
• Utilise cyber threat intelligence platform for threat information management and dissemination
• Conduct and perform threat analysis and conclude its relevance to key stakeholders and industries
• Plan and document concept of operations for cyber protection teams
• Use enrichments and customised taxonomies to enhance threat contextualisation and to improve the CTI quality
• Utilise threat intelligence information in conventional detection systems

KNOWLEDGE
• Cyber threat intelligence sharing standards, methodologies, frameworks
• Cyber threat intelligence context development
• Cyber threats & threat actors
• Threat actors’ tactics, techniques, and procedures (TTPs)
• Cyberattack procedures
• Advanced and persistent cyber threats
• Ethical & responsible information-sharing procedures

SKILLS
• Assess and enhance an organisation’s cybersecurity posture
• Collect, analyse, correlate, and enrich cyber threat information originating from multiple sources
• Communicate, coordinate, and cooperate with internal and external stakeholders
• Model & identify threat actors’ TTPs and campaigns
• Conduct technical analysis and reporting
• Extend CTI platform’s functionalities through integrations

Enrollment

01.06.2024 - 17.09.2024

Timing

01.08.2024 - 31.12.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Engineering and Business

Teaching languages
  • Finnish
Degree programmes
  • Expert training in Cyber Security
Teachers
  • Pia Satopää
  • Mikko Kiuru
  • Jani Vanharanta
Groups
  • OSKYBEK24
    Cyber Security Expert in Higher Education Administration

Objective

Students are expected to broaden their knowledge of different ways to utilise cyber threat intelligence information (CTI), especially from the defenders’ viewpoint. Students conduct and perform data analysis on various cyber threat intel datasets gathered from different sources. Students will also design and implement customised datasets and information models for more efficient cyber threat contextualisation in various sectors.
The course is intended to stimulate the students' creativity, critical thinking, and threat assessment by engaging in the analysis of short-term and long-term, real-life cyber threats.
This course focuses on the correlation of information regarding threat-related data and metadata to assist in decision-making. The emphasis will be on proactive preparedness for and anticipation of potential threats to organisations

Content

COMPETENCES
• Utilise cyber threat intelligence platform for threat information management and dissemination
• Conduct and perform threat analysis and conclude its relevance to key stakeholders and industries
• Plan and document concept of operations for cyber protection teams
• Use enrichments and customised taxonomies to enhance threat contextualisation and to improve the CTI quality
• Utilise threat intelligence information in conventional detection systems

KNOWLEDGE
• Cyber threat intelligence sharing standards, methodologies, frameworks
• Cyber threat intelligence context development
• Cyber threats & threat actors
• Threat actors’ tactics, techniques, and procedures (TTPs)
• Cyberattack procedures
• Advanced and persistent cyber threats
• Ethical & responsible information-sharing procedures

SKILLS
• Assess and enhance an organisation’s cybersecurity posture
• Collect, analyse, correlate, and enrich cyber threat information originating from multiple sources
• Communicate, coordinate, and cooperate with internal and external stakeholders
• Model & identify threat actors’ TTPs and campaigns
• Conduct technical analysis and reporting
• Extend CTI platform’s functionalities through integrations

Evaluation scale

H-5