Skip to main content

Expert training in Cyber Security

Degree:

Degree title:

Credits:
30 ects

Expert Training in Cyber Security
Cyber Security Expert in Higher Education Administration
Enrollment

02.07.2024 - 31.07.2024

Timing

01.08.2024 - 31.12.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Engineering and Business

Teaching languages
  • Finnish
Degree programmes
  • Expert training in Cyber Security
Teachers
  • Pia Satopää
  • Mikko Kiuru
  • Jani Vanharanta
Groups
  • OSKYBEK24
    Cyber Security Expert in Higher Education Administration

Objective

By the end of the course, the student will be able to:
• Explain the concepts of preparedness and business continuity.
• Recognize the importance of preparedness in various types of organizations and industries.
• Differentiate between preparedness, recovery, and resilience.
• Identify potential risks and threats within an organization.
• Understand the fundamentals of risk analysis and various risk assessment methods.
• Create a business impact analysis process.
• Develop business continuity, recovery, and resilience plans.
• Comprehend the significance of prioritization in maintaining operational capability during crisis situations.
• Plan business-oriented continuity strategies to minimize disruptions during incidents.
• Describe crisis management protocols and the creation of crisis management plans.
• Guide effective communication and decision-making during crisis situations.
• Analyze information security threats and their relevance to preparedness.
• Be capable of planning and executing preparedness and business continuity exercises and tests for organizations.
• Evaluate and test plan effectiveness under various scenarios.
• Understand the influence of stakeholders and partners on the organization's operational continuity.
• Recognize the importance of reporting in business continuity planning as part of information and cyber security management.

SUMMARY
This course provides a comprehensive overview of concepts, methods, and practical exercises in information and cyber security's business continuity, preparedness, and risk management. Students will learn how to strategize operations during disruptive situations, plan and document recovery and resilience measures, and understand the importance of internal and external crisis communication in maintaining operational continuity. The course equips students to identify factors jeopardizing organizational operations and their potential consequences and teaches them to evaluate measures reducing the impact and duration of adverse events. Moreover, the course offers insights into necessary resources for recovery and resilience situations.

Content

• Fundamentals of Preparedness and Business Continuity
• Identification, Assessment, and Analysis of Risks
• Preparedness, Recovery, and Resilience
• Business Impact Analysis
• Business Continuity Planning
• Information Security and Preparedness of Information Systems
• Training and Testing
• Business Continuity Standards and Frameworks
• Reporting

Evaluation scale

H-5

Enrollment

01.06.2024 - 17.09.2024

Timing

01.08.2024 - 31.12.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Engineering and Business

Teaching languages
  • Finnish
Degree programmes
  • Expert training in Cyber Security
Teachers
  • Pia Satopää
  • Mikko Kiuru
  • Jani Vanharanta
Groups
  • OSKYBEK24
    Cyber Security Expert in Higher Education Administration

Objective

Students are expected to broaden their knowledge of different ways to utilise cyber threat intelligence information (CTI), especially from the defenders’ viewpoint. Students conduct and perform data analysis on various cyber threat intel datasets gathered from different sources. Students will also design and implement customised datasets and information models for more efficient cyber threat contextualisation in various sectors.
The course is intended to stimulate the students' creativity, critical thinking, and threat assessment by engaging in the analysis of short-term and long-term, real-life cyber threats.
This course focuses on the correlation of information regarding threat-related data and metadata to assist in decision-making. The emphasis will be on proactive preparedness for and anticipation of potential threats to organisations

Content

COMPETENCES
• Utilise cyber threat intelligence platform for threat information management and dissemination
• Conduct and perform threat analysis and conclude its relevance to key stakeholders and industries
• Plan and document concept of operations for cyber protection teams
• Use enrichments and customised taxonomies to enhance threat contextualisation and to improve the CTI quality
• Utilise threat intelligence information in conventional detection systems

KNOWLEDGE
• Cyber threat intelligence sharing standards, methodologies, frameworks
• Cyber threat intelligence context development
• Cyber threats & threat actors
• Threat actors’ tactics, techniques, and procedures (TTPs)
• Cyberattack procedures
• Advanced and persistent cyber threats
• Ethical & responsible information-sharing procedures

SKILLS
• Assess and enhance an organisation’s cybersecurity posture
• Collect, analyse, correlate, and enrich cyber threat information originating from multiple sources
• Communicate, coordinate, and cooperate with internal and external stakeholders
• Model & identify threat actors’ TTPs and campaigns
• Conduct technical analysis and reporting
• Extend CTI platform’s functionalities through integrations

Evaluation scale

H-5

Enrollment

01.06.2024 - 20.08.2024

Timing

01.08.2024 - 31.12.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Engineering and Business

Teaching languages
  • Finnish
Degree programmes
  • Expert training in Cyber Security
Teachers
  • Pia Satopää
  • Mikko Kiuru
  • Jani Vanharanta
Groups
  • OSKYBEK24
    Cyber Security Expert in Higher Education Administration

Objective

Students are expected to extend their knowledge of the security operations centre’s concept and activities, to trial, compare and promote technical solutions suitable for SOC operation, and to implement threat hunting and monitoring controls and tools as part of the security operations centre’s tasks and processes.
After completing the course the students are expected to plan, implement and conduct different cyber security incident handling and threat-hunting activities to enhance the overall security posture of computer systems and the network infrastructure.
This course focuses on the enhancement of networked infrastructure monitoring as part of organisations’ operational activities with emphasis on reactive actions in anomaly detection and respective control processes.

Content

COMPETENCES
• List the relevant standards overarching information security management
• Perform structurisation for various data types
• Build capabilities for visualising and monitoring anomalies and correlated threats in computer networks
• Plan and document cyber security incident handling processes and workflows for various SOC tiers and operators
• Utilise threat intelligence information in threat-hunting
KNOWLEDGE
• Cybersecurity policies
• Cybersecurity recommendations and best practices
• Incident handling standards, methodologies and frameworks
• Incident handling tools
• Incident handling communication procedures
• Security Operation Centres (SOC) operation
• Computer Security Incident Response Teams (CSIRTs) operation
• Cybersecurity-related technologies
• Computer system vulnerabilities
SKILLS
• Practice technical, functional and operational aspects of cybersecurity incident handling and response
• Utilise cyber threat information in threat-hunting activities
• Work on operating systems and relevant infrastructures
• Analyse network traffic semantics
• Integrate cybersecurity solutions to the organisation’s infrastructure
• Configure solutions according to the organisation’s security policy
• Use XDR platform for threat-hunting

Evaluation scale

H-5