Tietoverkkojen turvallisuus
Structure Type: | Study unit |
---|---|
Code: | TT00BI87 |
Curriculum: | TT 2024 |
Level: | Bachelor of Engineering |
Year of Study: | 3 (2026-2027) |
Semester: | Spring |
Credits: | 5 cr |
Responsible Teacher: | Virtanen, Antti |
Language of Instruction: | Finnish |
Taking the course in advance? See the courses during the academic year 2024-2025.
Learning Outcomes
On completion of the study, student understands cybersecurity operations network principles, roles and responsibilities as well as the related technologies, tools, regulations and frameworks available. Students are able to apply knowledge and skills to monitor, detect, investigate, analyze and respond to security incidents, thus protecting systems and organizations from cybersecurity risks, threats and vulnerabilities.
Student's Workload
135 h, which contains 50 h of scheduled contact studies.
Prerequisites / Recommended Optional Courses
Local Area Networks, Operating Systems and Domain Services, Linux Operating System, Cyber Security, TCP/IP Networks
Contents
An introduction to the knowledge and skills needed for a Security Analyst working with a Security Operations Center team. The core security skills needed for monitoring, detecting, investigating, analyzing and responding to security events, thus protecting systems and organizations from cybersecurity risks, threats and vulnerabilities.
Recommended or Required Reading and Other Learning Resources/Tools
Cisco Academy course material
Mode of Delivery / Planned Learning Activities and Teaching Methods
Lectures, assignments, laboratory exercises.
Assessment Criteria
Grade 5: The student is able to apply knowledge and skills to succesfully monitor, detect, investigate, analyze and respond to security incidents.
Grade 3: The student is able to apply knowledge and skills to monitor, detect, investigate, analyze and respond to security incidents.
Grade 1: The student understands the basics of cybersecurity operations network principles, tools and technologies and has basic skills to monitor, detect and investigate security incidents.
Assessment Methods
Assignments, laboratory exercises, final exam and skills exam.