Cyber Security
Structure Type: | Study unit |
---|---|
Code: | H2C2102 |
Type: | Compulsory |
Curriculum: | H2C 2019 |
Level: | Continuing Education etc. |
Credits: | 5 cr |
Responsible Teacher: | Virtanen, Antti |
Language of Instruction: | English |
Courses
Impl. | Group(s) | Study Time | Teacher(s) | Language | Enrolment |
---|---|---|---|---|---|
1 | H2C | 2020-01-11 – 2020-03-01 | Antti Virtanen, Jukka Matila, Kenneth Norrgård | English | 2019-08-09 – 2019-10-28 |
Learning Outcomes
Upon completion of the course, students will be able to perform the following tasks:
- Explain the role of the Cybersecurity Operations Analyst in the enterprise.
- Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
- Explain the features and characteristics of the Linux Operating System.
- Analyze the operation of network protocols and services.
- Explain the operation of the network infrastructure.
- Classify the various types of network attacks.
- Use network monitoring tools to identify attacks against network protocols and services.
- Use various methods to prevent malicious access to computer networks, hosts, and data.
- Explain the impacts of cryptography on network security monitoring.
- Explain how to investigate endpoint vulnerabilities and attacks.
- Identify network security alerts.
- Analyze network intrusion data to verify potential exploits.
- Apply incident response models to manage network security incidents.
Student's Workload
130h
Prerequisites / Recommended Optional Courses
Basics of Operating Systems (Windows and Linux), Basics of Cyber Security and Networking (TCP/IP)
Contents
An introduction to the knowledge and skills needed for a Security Analyst working with a Security Operations Center team. The core security skills needed for monitoring, detecting, investigating, analyzing and responding to security events, thus protecting systems and organizations from cybersecurity risks, threats and vulnerabilities.
Regional Impact
Internationality
When you participate in the Cisco Networking Academy, you are joining a global community linked by common goals and technologies. Schools, colleges, universities, and other entities in over 160 countries participate in the program.
Recommended or Required Reading and Other Learning Resources/Tools
Cisco Academy course material: CCNA Cybersecurity Operations
Mode of Delivery / Planned Learning Activities and Teaching Methods
E-doing is a design philosophy that applies the principle that people learn best by doing: Interactive activities, Labs, Packet Tracer and Assessments.
Interactive activities (“drag and drop” or "checkbox" method) are embedded within the chapters as checks for understanding. Labs are activities that are designed to be performed on physical equipment. In the Networking chapters, you will configure a simple network using Packet Tracer, the Networking Academy network simulation tool. Each chapter in this course has an online quiz and an online Chapter Exam. These are scored automatically, showing you the areas where you excel, as well as any areas where you may want to do some additional study or practice. There is also an online, end-of-course Final exam and Skills exam.
Assessment Criteria
Grade 5: The student is able to apply knowledge and skills to succesfully monitor, detect, investigate, analyze and respond to security incidents.
Grade 3: The student is able to apply knowledge and skills to monitor, detect, investigate, analyze and respond to security incidents.
Grade 1: The student understands the basics of cybersecurity operations network principles, tools and technologies and has basic skills to monitor, detect and investigate security incidents.
Assessment Methods
Assignments, laboratory exercises, final exam and skills exam.
Work Placement
Uncovering cybercrime, cyber espionage and other threats to the integrity of networks is an exciting new area that spans all industries. Learn the skills to qualify for exciting and growing opportunities in security operation centers as an analyst or incident responder.
Further Information
https://www.netacad.com/courses/security/ccna-cybersecurity-operations