Cyber Protection Team 1 (5 op)
Toteutuksen tunnus: TE00CY44-3001
Toteutuksen perustiedot
Ilmoittautumisaika
02.12.2024 - 12.01.2025
Ajoitus
13.01.2025 - 30.04.2025
Opintopistemäärä
5 op
Toteutustapa
Lähiopetus
Yksikkö
Tekniikka ja liiketoiminta
Toimipiste
Kupittaan kampus
Opetuskielet
- Suomi
- Englanti
Paikat
10 - 15
Koulutus
- Tieto- ja viestintätekniikan koulutus
- Tietojenkäsittelyn koulutus
- Degree Programme in Information and Communications Technology
Opettaja
- Mikko Kiuru
- Jani Vanharanta
Vastuuopettaja
Jani Vanharanta
Ryhmät
-
PTIVIS23TData Networks and Cybersecurity
-
PTIETS23dncsData Networks and Cybersecurity
- 14.01.2025 13:00 - 15:00, Cyber Protection Team 1 TE00CY44-3001
- 28.01.2025 13:00 - 15:00, Cyber Protection Team 1 TE00CY44-3001
- 11.02.2025 13:00 - 15:00, Cyber Protection Team 1 TE00CY44-3001
- 25.02.2025 13:00 - 15:00, Cyber Protection Team 1 TE00CY44-3001
- 11.03.2025 13:00 - 15:00, Cyber Protection Team 1 TE00CY44-3001
- 25.03.2025 13:00 - 15:00, Cyber Protection Team 1 TE00CY44-3001
- 08.04.2025 13:00 - 15:00, Cyber Protection Team 1 TE00CY44-3001
- 22.04.2025 13:00 - 15:00, Cyber Protection Team 1 TE00CY44-3001
Tavoitteet
Huom! Tähän haetaan opiskelijoita erillishaulla. Tätä ei voi vapaasti valita.
Pedagogiset toimintatavat ja kestävä kehitys
Pedagogical method follows Problem-Based Learning (PBL). In the cybersecurity training program PBL emphasizes real-world problem-solving, critical thinking, and practical application of knowledge. Students are engaged in active learning through complex, real-world scenarios, enhancing their ability to analyse, collaborate, and develop practical solutions. This method aligns well with the program's goals of preparing students for competitive cybersecurity events by teaching essential skills such as teamwork, incident response, and adaptability.
Sisällön jaksotus
The Cyber Protection Team course implementation is designed to prepare students for competitive cybersecurity events by providing training in both offensive (red team) and defensive (blue team) tactics. This course is the first of two 5 credit blocks spread across two semesters. 10 credits combined, the course covers a wide range of technical aspects of cybersecurity, from foundational concepts to advanced techniques, ensuring participants gain a thorough understanding of operational-level cybersecurity and are prepared to engage in real-world cybersecurity competitions.
After completing the two semesters the students understand the construction, goals, stages, and phases of cyber attacks. Participants will learn to recognise and mitigate web application and system vulnerabilities, utilise network-based defense systems, and analyse endpoint security and logs. The training program also focuses on hardening operating systems, Active Directory, and cloud solutions, while mastering threat emulation, threat hunting, digital forensics, and malware analysis. Additionally, the program emphasizes enhancing teamwork, critical thinking, and incident response skills to ensure students can perform well under pressure. Each student will have the opportunity to customise some of their learning path based on individual interests and specializations.
COMPETENCES:
- Implement and manage cybersecurity frameworks and policies
- Conduct thorough threat and vulnerability assessments
- Plan and execute incident response and forensics investigations
- Utilize advanced tools and techniques for threat hunting and malware analysis
- Develop and implement security operations and monitoring strategies
KNOWLEDGE:
- Cyber Defence Frameworks
- Network and System Security
- Network Traffic Analysis
- Threat and Vulnerability Management
- Security Operations & Monitoring
- Incident Response and Forensics
- Endpoint Security Monitoring
- System and Cloud Hardening
- Threat Hunting
- Malware Analysis
- Red Teaming & Threat Emulation
- Cloud Security
- Scenario, Objectives and Injects in Cyber Exercises
SKILLS:
- Apply cybersecurity policies and best practices
- Use tools like BurpSuite, Nessus, and OpenVAS for vulnerability management
- Perform network and system security assessments
- Conduct threat hunting and utilize threat intelligence
- Analyze network traffic and perform digital forensics
- Execute advanced malware analysis and red teaming exercises
- Implement and manage cloud security measures
- Communicate, coordinate, and cooperate with internal and external stakeholders
- Model and identify threat actors’ tactics, techniques, and procedures (TTPs)
Arviointiasteikko
H-5
Arviointimenetelmät ja arvioinnin perusteet
The assessment will be based on the completion and performance in technical lab assignments across different modules running on different training and exercise platforms.
Grade criteria, number of successfully completed technical modules or assignments:
<50% = failed
50-59 % = 1
60-69 % = 2
70-79 % = 3
80-89 % = 4
>=90 % = 5