VAMK

Change language: Suomi

Front Page > Current Education > Web-teknologioiden ja IoT -ratkaisujen täydennyskoulutus (H2C) > 2019 > Cyber Security (H2C2102)

Cyber Security

Structure Type: Study unit
Code: H2C2102
Type: Compulsory
Curriculum: H2C 2019
Level: Continuing Education etc.
Credits: 5 cr
Responsible Teacher: Virtanen, Antti
Language of Instruction: English

Courses

Impl.Group(s)Study TimeTeacher(s)LanguageEnrolment
1H2C2020-01-11 – 2020-03-01Antti Virtanen, Jukka Matila, Kenneth NorrgårdEnglish2019-08-09 – 2019-10-28

Learning Outcomes

Upon completion of the course, students will be able to perform the following tasks:

- Explain the role of the Cybersecurity Operations Analyst in the enterprise.
- Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
- Explain the features and characteristics of the Linux Operating System.
- Analyze the operation of network protocols and services.
- Explain the operation of the network infrastructure.
- Classify the various types of network attacks.
- Use network monitoring tools to identify attacks against network protocols and services.
- Use various methods to prevent malicious access to computer networks, hosts, and data.
- Explain the impacts of cryptography on network security monitoring.
- Explain how to investigate endpoint vulnerabilities and attacks.
- Identify network security alerts.
- Analyze network intrusion data to verify potential exploits.
- Apply incident response models to manage network security incidents.

Student's Workload

130h

Prerequisites / Recommended Optional Courses

Basics of Operating Systems (Windows and Linux), Basics of Cyber Security and Networking (TCP/IP)

Contents

An introduction to the knowledge and skills needed for a Security Analyst working with a Security Operations Center team. The core security skills needed for monitoring, detecting, investigating, analyzing and responding to security events, thus protecting systems and organizations from cybersecurity risks, threats and vulnerabilities.

Regional Impact

Internationality

When you participate in the Cisco Networking Academy, you are joining a global community linked by common goals and technologies. Schools, colleges, universities, and other entities in over 160 countries participate in the program.

Recommended or Required Reading and Other Learning Resources/Tools

Cisco Academy course material: CCNA Cybersecurity Operations

Mode of Delivery / Planned Learning Activities and Teaching Methods

E-doing is a design philosophy that applies the principle that people learn best by doing: Interactive activities, Labs, Packet Tracer and Assessments.
Interactive activities (“drag and drop” or "checkbox" method) are embedded within the chapters as checks for understanding. Labs are activities that are designed to be performed on physical equipment. In the Networking chapters, you will configure a simple network using Packet Tracer, the Networking Academy network simulation tool. Each chapter in this course has an online quiz and an online Chapter Exam. These are scored automatically, showing you the areas where you excel, as well as any areas where you may want to do some additional study or practice. There is also an online, end-of-course Final exam and Skills exam.

Assessment Criteria

Grade 5: The student is able to apply knowledge and skills to succesfully monitor, detect, investigate, analyze and respond to security incidents.
Grade 3: The student is able to apply knowledge and skills to monitor, detect, investigate, analyze and respond to security incidents.
Grade 1: The student understands the basics of cybersecurity operations network principles, tools and technologies and has basic skills to monitor, detect and investigate security incidents.

Assessment Methods

Assignments, laboratory exercises, final exam and skills exam.

Work Placement

Uncovering cybercrime, cyber espionage and other threats to the integrity of networks is an exciting new area that spans all industries. Learn the skills to qualify for exciting and growing opportunities in security operation centers as an analyst or incident responder.


Back