Skip to main content

Cyber Threat Intelligence (5 cr)

Code: MS00CR18-3001

General information


Enrollment

01.06.2024 - 17.09.2024

Timing

01.08.2024 - 31.12.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Engineering and Business

Teaching languages

  • Finnish

Degree programmes

  • Expert training in Cyber Security

Teachers

  • Pia Satopää
  • Mikko Kiuru
  • Jani Vanharanta

Groups

  • OSKYBEK24
    Cyber Security Expert in Higher Education Administration
  • 17.09.2024 08:00 - 12:00, Kyberuhkatiedon hyödyntäminen MS00CR18-3001
  • 07.10.2024 12:00 - 16:00, Kyberuhkatiedon hyödyntäminen MS00CR18-3001
  • 04.11.2024 08:00 - 16:00, Kyberuhkatiedon hyödyntäminen MS00CR18-3001
  • 05.11.2024 08:00 - 12:00, Kyberuhkatiedon hyödyntäminen MS00CR18-3001
  • 25.11.2024 08:00 - 12:00, Kyberuhkatiedon hyödyntäminen MS00CR18-3001

Objective

Students are expected to broaden their knowledge of different ways to utilise cyber threat intelligence information (CTI), especially from the defenders’ viewpoint. Students conduct and perform data analysis on various cyber threat intel datasets gathered from different sources. Students will also design and implement customised datasets and information models for more efficient cyber threat contextualisation in various sectors.
The course is intended to stimulate the students' creativity, critical thinking, and threat assessment by engaging in the analysis of short-term and long-term, real-life cyber threats.
This course focuses on the correlation of information regarding threat-related data and metadata to assist in decision-making. The emphasis will be on proactive preparedness for and anticipation of potential threats to organisations

Content

COMPETENCES
• Utilise cyber threat intelligence platform for threat information management and dissemination
• Conduct and perform threat analysis and conclude its relevance to key stakeholders and industries
• Plan and document concept of operations for cyber protection teams
• Use enrichments and customised taxonomies to enhance threat contextualisation and to improve the CTI quality
• Utilise threat intelligence information in conventional detection systems

KNOWLEDGE
• Cyber threat intelligence sharing standards, methodologies, frameworks
• Cyber threat intelligence context development
• Cyber threats & threat actors
• Threat actors’ tactics, techniques, and procedures (TTPs)
• Cyberattack procedures
• Advanced and persistent cyber threats
• Ethical & responsible information-sharing procedures

SKILLS
• Assess and enhance an organisation’s cybersecurity posture
• Collect, analyse, correlate, and enrich cyber threat information originating from multiple sources
• Communicate, coordinate, and cooperate with internal and external stakeholders
• Model & identify threat actors’ TTPs and campaigns
• Conduct technical analysis and reporting
• Extend CTI platform’s functionalities through integrations

Evaluation scale

H-5