Skip to main content

Operational Security (5 cr)

Code: 5051245-3005

General information


Enrollment
01.06.2024 - 02.09.2024
Registration for the implementation has ended.
Timing
01.09.2024 - 20.12.2024
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
5 cr
Mode of delivery
Contact learning
Unit
Engineering and Business
Campus
Kupittaa Campus
Teaching languages
English
Seats
40 - 75
Degree programmes
Degree Programme in Information and Communications Technology
Degree Programme in Information and Communication Technology
Teachers
Mikko Kiuru
Groups
PTIVIS22T
Data Networks and Cybersecurity
PTIETS22dncs
PTIETS22 Data Networks and Cybersecurity
Course
5051245

Realization has 20 reservations. Total duration of reservations is 52 h 0 min.

Time Topic Location
Mon 02.09.2024 time 12:00 - 14:00
(2 h 0 min)
Lecture, Operational Security 5051245-3005
ICT_C1042_Myy MYY
Wed 11.09.2024 time 08:00 - 10:00
(2 h 0 min)
Lecture, Operational Security 5051245-3005
ICT_C1042_Myy MYY
Wed 18.09.2024 time 08:00 - 10:00
(2 h 0 min)
Lecture, Operational Security 5051245-3005
ICT_C1042_Myy MYY
Mon 23.09.2024 time 10:00 - 12:00
(2 h 0 min)
Lecture, Operational Security 5051245-3005
EDU_2057 Taidon portaat
EDU_2072 Työkahvila Aurinkokylpy /Esitystila avo
Mon 30.09.2024 time 10:00 - 13:00
(3 h 0 min)
Lab group 1, Operational Security 5051245-3005
ICT_C3036 Cyberlab / BYOD
Thu 03.10.2024 time 08:00 - 11:00
(3 h 0 min)
Lab group 2, Operational Security 5051245-3005
ICT_C3036 Cyberlab / BYOD
Wed 09.10.2024 time 08:00 - 10:00
(2 h 0 min)
Lecture, Operational Security 5051245-3005
ICT_C1042_Myy MYY
Mon 21.10.2024 time 10:00 - 13:00
(3 h 0 min)
Lab group 1, Operational Security 5051245-3005
ICT_C3036 Cyberlab / BYOD
Thu 24.10.2024 time 08:00 - 11:00
(3 h 0 min)
Lab group 2, Operational Security 5051245-3005
ICT_C3036 Cyberlab / BYOD
Mon 28.10.2024 time 10:00 - 12:00
(2 h 0 min)
Lecture, Operational Security 5051245-3005
EDU_1002 Moriaberg Esitystila byod
Wed 06.11.2024 time 08:00 - 11:00
(3 h 0 min)
Lab group 1, Operational Security 5051245-3005
ICT_C3036 Cyberlab / BYOD
Thu 07.11.2024 time 08:00 - 11:00
(3 h 0 min)
Lab group 2, Operational Security 5051245-3005
ICT_C3036 Cyberlab / BYOD
Wed 13.11.2024 time 08:00 - 10:00
(2 h 0 min)
Lecture, Operational Security 5051245-3005
ICT_C1042_Myy MYY
Mon 18.11.2024 time 08:00 - 11:00
(3 h 0 min)
Lab group 1, Operational Security 5051245-3005
ICT_C3036 Cyberlab / BYOD
Thu 21.11.2024 time 08:00 - 11:00
(3 h 0 min)
Lab group 2, Operational Security 5051245-3005
ICT_C3036 Cyberlab / BYOD
Wed 27.11.2024 time 08:00 - 10:00
(2 h 0 min)
Lecture, Operational Security 5051245-3005
ICT_C1042_Myy MYY
Mon 02.12.2024 time 08:00 - 11:00
(3 h 0 min)
Lab group 1, Operational Security 5051245-3005
ICT_C3036 Cyberlab / BYOD
Thu 05.12.2024 time 08:00 - 11:00
(3 h 0 min)
Lab group 2, Operational Security 5051245-3005
ICT_C3036 Cyberlab / BYOD
Wed 11.12.2024 time 08:00 - 10:00
(2 h 0 min)
Lecture, Operational Security 5051245-3005
ICT_C1042_Myy MYY
Wed 11.12.2024 time 10:00 - 14:00
(4 h 0 min)
Operational Security 5051245-3005 EXTRA LAB
ICT_C3036 Cyberlab / BYOD
Changes to reservations may be possible.

Evaluation scale

H-5

Content scheduling

The course consists of contact lectures and contact laboratory sessions. There will be 9 lectures, which will cover theory and technologies behind Operational Security in the context of Security Operations Centers. In 5 laboratory sessions, students will practice detecting and reporting anomalies found in IT systems through laboratory assignments.

The course will begin on week 22/2024 and end by week 50/2024.

Objective

After completing the course the student:
- is able identify and mitigate cyber threats in networks
- can detect cyber threats and defend against them
- can recognize Internet-based cyber threats such as denial of service attacks and mitigate them

Content

Students will protect enterprise-level network against cyber attacks. Students learn to detect network attacks and successfully defend against them.
In the lab exercises students
- configure firewalls and intrusion detection systems
- monitor network activities and detect cyber attacks
- react when network attack is happening

Materials

Learning material consists of material produced by the Lecturer as well as extra material obtainable from TUAS resources (ebooks).

Teaching methods

Learning is achieved through contact lectures, written home assignments and laboratory assignments.

Go back to top of page